Skip to content

Breathing Windows 70-680 pdf

Exam Code: 70 680 practice test (Practice Exam Latest Test Questions VCE PDF)
Exam Name: TS:Windows 7,Configuring
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70 680 practice test Exam.

2018 NEW RECOMMEND

Free VCE & PDF File for Microsoft 70-680 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-680-dumps.html

Q171. – (Topic 2) 

You have a computer that runs Windows 7. The computer is in a workgroup. 

You need to ensure that you can decrypt Encrypting File System (EFS) files on the computer if you forget your password. 

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. From Credential Manager, select Back up vault. 

B. From User Accounts, select Create a password reset disk. 

C. From User Accounts, select Manage your file encryption certificates. 

D. From Authorization Manager, modify the Authorization Manager options. 

Answer: B,C 

Explanation: 

Password reset disks It is not unusual for users to forget their passwords to local user accounts from time to time, especially when they use strong passwords. Before the advent of password reset disks, the only way for administrators to restore a forgotten local user account password was to manually reset the user's password. In the process, the following information was lost: E-mail that was encrypted with the user's public key Internet passwords that were saved on the computer Files that the user had encrypted Password reset disks offer another solution to the problem of a forgotten password for a local user account. If users create password reset disks for their local accounts before they forget their passwords, they can reset the passwords without losing valuable data that was lost previously with administrative password resets. When you create a password reset disk, a public key and private key pair are created. The private key is stored on a disk: the password reset disk. The public key encrypts the local user account password. If users forget their passwords, they can insert the password reset disk, which contains the private key, and decrypt the current password. The Forgotten Password Wizard prompts the user for a new password, which is then encrypted with the public key. Data is not lost because, basically, the user is simply changing a password. It is essential that password reset disks be stored in secured locations.Back up your Encryption Certificate 

1. Open User Accounts by clicking the Start button, clicking Control Panel, clicking User Accounts and Family Safety (or clicking User Accounts, if you are connected to a network domain), and then clicking User Accounts. 

2. In the left pane, click Manage your file encryption certificates. 

3. In the Encrypting File System wizard, click Next. 

4. Click Use this certificate, and then click Next. If you need more details to identify the certificate that is listed, click View certificate. If you want to choose a different certificate, click Select certificate, and then click the certificate 

you want to back up. 

5. Click Back up the certificate and key now. 

6. Type or navigate to the location where you want to store the backup. We recommend that you store the backup on removable media such as a disc or USB flash drive. 

7. Type and then confirm a password for the backup file, and then click Next. We recommend that you protect the backup file with a strong password. 

8. Select the I'll update my encrypted files later check box, and then click Next. 

Q172. DRAG DROP – (Topic 5) 

You deploy Windows 7 on client computers by using a default Windows 7 DVD. 

You discover that the client computers use the most recently released critical updates. 

You download the updates' package files from the Microsoft site to your desktop. 

You need to prepare a new installation DVD that includes the updates. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 

Q173. – (Topic 5) 

You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:\\Software. 

User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\\Software folder. 

You need to verify whether User1 can save files to C:\\Software. 

What should you do? 

A. Run the Net Share command. 

B. Run the Wfs C:\\Software command. 

C. In the Advanced Security Settings for the Documents folder, select the Effective Permissions tab. 

D. Run the Fsutil C:\\Software command. 

Answer:

Explanation: To view effective permissions on files and folders . Open Windows Explorer, and then locate the file or folder for which you want to view effective permissions. 

Right-click the file or folder, click Properties, and then click the Security tab. 

Click Advanced, click the Effective Permissions tab, and then click Select. 

In Enter the object name to select (examples), enter the name of a user or group, and then click OK. The selected check boxes indicate the effective permissions of the user or group for that file or folder. 

Q174. – (Topic 6) 

You are a network administrator for a global company that has Windows Server 2008 R2 servers and Windows 7 Enterprise computers. 

Management wants to decrease VPN costs by implementing DirectAccess for remote network access. 

They assign you to evaluate the current network infrastructure, which includes the following elements: 

Active Directory 

IPv6 network and applications 

Server for DirectAccess service 

You need to ensure that all critical infrastructure components are present. 

What should you add to the infrastructure? 

A. Windows Internet Name Service (WINS) server 

B. Public key infrastructure 

C. NAT-PT devices 

D. Windows Software Update Services (WSUS) server 

Answer:

Explanation: DirectAccess With Windows Server 2008 R2 requires: 

* Public key infrastructure (PKI) to issue computer certificates. 

* One or more DirectAccess servers running Windows Server 2008 R2 with two network adapters: one that is connected directly to the Internet, and a second that is connected to the intranet. 

* On the DirectAccess server, at least two consecutive, public IPv4 addresses assigned to the network adapter that is connected to the Internet. 

* DirectAccess clients running Windows 7 or Windows 8 "Enterprise" edition clients 

* At least one domain controller and Domain Name System (DNS) server running Windows Server 2008 SP2 or Windows Server 2008 R2. 

Q175. – (Topic 3) 

You need to provide an administrator the ability to view and interact with your current logon session. 

What should you do? 

A. At the command prompt, run Psr.exe. 

B. At the command prompt, run Winrm.exe quickconfig. 

C. From the Start menu, open Remote Desktop Connection. 

D. From the Start menu, open Windows Remote Assistance. 

Answer:

Explanation: 

Remote Assistance Both Remote Assistance and Remote Desktop allow the user at the management computer to see the desktop and applications that are present on the remote computer. The difference between Windows Remote Assistance and Remote Desktop is that a user is logged on to the remote computer and initiates the remote assistance session, whereas a Remote Desktop session is initiated on the management computer. Remote Assistance is a support tool used by help-desk staff to allow them to view the screen of the person to whom they are providing assistance. Remote Assistance reduces the need for nontechnical users to accurately describe the problem that they are having with their computers because support personnel can see the desktop directly. Unlike the version of Remote Assistance that shipped with Windows XP, the version of Remote Assistance that is included with Windows 7 does not include a voice client. If you are going to talk to the person whom you are helping using Remote Assistance, you are going to have to use another method, such as the telephone. 

Q176. HOTSPOT – (Topic 6) 

You are the network administrator at a scientific research firm. You have a network of Windows Server 2008 R2 servers and Windows 7 Enterprise computers in a domain configuration. 

Management needs to support a new, remote laboratory that is connected by a very slow network link. The primary work of the five scientists is to carry out experiments by following documentation that is stored on the corporate network. The only equipment at the remote site includes five computers and network connectivity devices. 

You receive the following three email messages: 

Message 1 

All, 

Due to business constraints, we are unable to support the purchase of a server at the new remote location to service such a small number of users. The minimum number of users to support a server purchase is 10. 

Bart Cushing 

Purchasing Department 

Message 2 

Dear all, 

The new lab is up and running. By far the biggest problem is the exceptionally slow speed downloading the experiment descriptions from corporate headquarters. Is there a way to fix 

the problem? Thanks! Dana Wright 

Remote Lab Manager 

Message 3 

To all employees of A Datum Corp: 

This is a friendly reminder that corporate security policy prohibits users from creating file 

shares computers. 

Thank you for your attention to this matter 

Gwen Francis 

You need to determine if BranchCache can support the environment. 

Consider each of the following statements. Does the information in the three messages support the interference as stated? Each correct selection is worth one point. 

Answer: 

Q177. DRAG DROP – (Topic 6) 

You have a Windows XP computer. 

You need to migrate to Windows 7 and determine that all third-party applications installed on the computer continue to operate with the new operating system. 

Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. ) 

Answer: 

Q178. – (Topic 5) 

You plan to deploy a custom Windows 7 image to computers that are not connected to a corporate network. 

You need to ensure that a custom application installs automatically after the image is deployed. 

What should you do? 

A. Use the Microsoft Deployment Toolkit (MDT) to create a custom task sequence and run the New Media Wizard. 

B. Run Dism.exe and specify the /mount-WIM parameter. Add the application installation files to the image and then modify the winrm.cmd file. 

C. Create a Group Policy object (GPO) that includes a software installation package. 

D. Use the Windows System Image Manager (Windows SIM) to open the image and add the applications to the windowsPE configuration pass. 

Answer:

Q179. – (Topic 4) 

Your company network includes client computers that have Windows 7 installed. The computers are members of an Active Directory domain and receive Windows Firewall configuration through Group policy. 

A user indicates that he is unable to connect to a remote FTP server. 

You need to view the status of TCP/UDP ports at the user's computer. 

Which command should you run? 

A. netstat -o 

B. netstat -a 

C. ipconfig /all 

D. netstat –an 

Answer:

Q180. – (Topic 5) 

You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. 

You need to analyze the performance of the computer to meet the following requirements: 

Include the CPU, Memory, and Disk subsystems. 

Display real-time performance. 

Obtain a list of users who have logged on by using the same tool. 

What should you do? 

A. Run powercfg.exe. 

B. Run the Windows Experience Index. 

C. Configure Event Viewer subscriptions. 

D. Open Task Manager. 

E. Open System Properties, and configure performance settings. 

F. Open System Properties, and configure environment variables. 

G. Open System Properties, and configure user profiles settings. 

H. Open System Properties, and configure the page file settings. 

I. Open Performance Monitor, and configure a Data Collector Set. 

J. Open Performance Monitor, and customize the System Monitor view. 

Answer: