exam 70-680 windows 7 configuration pdf : Jun 2016 Edition

Accurate of 70-680 actual exam materials and bootcamp for Microsoft certification for IT candidates, Real Success Guaranteed with Updated 70-680 pdf dumps vce Materials. 100% PASS TS:Windows 7,Configuring exam Today!

2016 Jun 70-680 Study Guide Questions:

Q11. – (Topic 1) 

You have a computer that runs Windows 7. The computer has two volumes named volume 

C and volume D. 

You create a document on volume D. 

You manually create a restore point and modify the document. 

You view the properties of the document as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can restore the current version of the document if the document is modified. 

What should you do first? 

A. Run Disk Cleanup on volume D. 

B. Enable auditing on the document. 

C. Turn on System Protection for volume D. 

D. Start the Volume Shadow Copy Service (VSS). 

Answer: C 

Explanation: 

System Protection System protection regularly creates and saves information about your computer's system files and settings. It also saves previous versions of files that you have modified. It saves these files in restore points, which are created just before significant system events, such as the installation of a program or device driver. Restore points are also created automatically every seven days if no other restore points were created in the previous seven days. You can create restore points manually at any time. System protection is automatically on for the drive that holds the operating system and can be enabled only for drives that are formatted using the NTFS file system. It enables you to use system restore and to restore files to previous versions. You will configure system protection, create a restore point, and perform a system restore in the practice later in this lesson. 

Q12. DRAG DROP – (Topic 4) 

A company has client computers that run Windows XP. The company plans to deploy Windows 7 to all client computers. Each employee will keep the same computer. 

You need to migrate the client computers from Windows XP to Windows 7 while maintaining each user's files and settings. 

Which actions would you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them into the correct order). 

Answer: 

Q13. – (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

A user is asked to remove encryption from a locally saved folder so that other users can read and write to that folder. 

You need to verify that the folder is not encrypted with the Encrypting File System (EFS). 

What should you use to accomplish this goal? 

A. Device Manager 

B. Local Users and Groups 

C. the User Account Control Settings Control Panel window 

D. the icacls command 

E. the Group Policy management console 

F. share permissions 

G. the netsh command 

H. the Services management console 

I. the folder Properties window 

Answer: I 

Explanation: 

http://technet.microsoft.com/en-us/windows/how-do-i-get-started-with-the-encrypting-file-system-in-windows-7.aspx 

70-680  exam engine

Improve 70-680 in pdf:

Q14. – (Topic 5) 

You have a computer that has the following hardware configuration: 

1.6-gigahertz (GHz) processor (64-bit) 

8-GB RAM 

500-GB hard disk 

Graphics card that has 128-MB RAM 

You need to select an edition of Windows 7 to meet the following requirements: 

Support DirectAccess 

Support Windows XP Mode 

Use all of the installed memory 

Support joining an Active Directory domain 

Which edition should you choose? 

A. Windows 7 Enterprise (x86) 

B. Windows 7 Professional (64-bit) 

C. Windows 7 Enterprise (64-bit) 

D. Windows 7 Ultimate (x86) 

Answer: C 

Q15. – (Topic 5) 

You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits: 

. The Disk Management console (Click the Exhibit button.) 

. The System Properties window (Click the Exhibit button.)

 

. The System protection for Local Disk C window (Click the Exhibit button.) 

You share your Documents library over a network. 

You discover that one of the files was deleted from the library by a network user. 

You need to restore the most recent version of the deleted file. 

What should you do? 

A. Delete restore points. 

B. Create a restore point. 

C. Perform a system restore. 

D. Search for the file in the Recycle Bin. 

E. Increase disk space used for system protection. 

F. Copy the file from a previous version of a folder. 

G. Set restore settings to only restore previous versions of files. 

H. Run the cipher /x command from the elevated command prompt, 

I. Run the vssadmin list volumes command from the elevated command prompt. 

J. Run the vssadmin list shadows command from the elevated command prompt, 

K. Run the compact /U <file_name> command from the elevated command prompt. 

Answer: F 

Explanation: Note: To restore a previous version of a file or folder that's included in a library, right-click the file or folder in the location where it's saved, rather than in the library. For example, to restore a previous version of a picture that's included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions. 

Q16. – (Topic 2) 

You have a customized image of Windows 7 Professional. 

You need to create a new unattended file to automate the deployment of the image. You must achieve this goal by using the minimum amount of administrative effort. 

What should you do first? 

A. Run Imagex.exe and specify the /mount parameter. 

B. Run Dism.exe and specify the /mount-WIM parameter. 

C. From Microsoft Deployment Toolkit (MDT), add the custom Windows image (WIM). 

D. From Windows System Image Manager (Windows SIM), open the custom Windows image (WIM). 

Answer: D 

Explanation: 

Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets.NOT DismDeployment Image Servicing and Management (DISM) is a command-line tool used to service Windows. images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system.NOT ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./mountMounts a .wim file from Windows XP with Service Pack 2 (SP2), Windows Server 2003 with Service Pack 1 (SP1), or Windows Vista with read-only permission to a specified directory. Once the file is mounted, you may view, but not modify, all the information contained in the directory.NOT MDT MDT 2010 is the Microsoft solution accelerator for operating system and application deployment and offers flexible driver management, optimized transaction processing, and access to distribution shares from any location. You can use the MDT on imaging and deployment servers to implement the automatic deployment of Windows 7 (for example) on client computers. It is possible to run MDT 2010 on a client running Windows 7, but in practice it would typically run from a distribution server running Windows Server 2008. The MDT provides detailed guidance and job aids and offers a common deployment console that contains unified tools and processes that you can use for client and server deployment. The toolkit offers standardized desktop and server images, along with improved security and ongoing configuration management. 

70-680  exam engine

Vivid certification mcts 70-680:

Q17. HOTSPOT – (Topic 4) 

A company is upgrading its client computers from Windows XP to Windows 7. You add an application to the Windows 7 base image. 

The menu on the title bar of the application is not displayed properly, although other graphical elements are displayed correctly. 

You need to ensure that the application's menu is displayed correctly on client computers that run Windows 7. 

Which option should you choose to achieve this goal? (To answer, select the appropriate check box in the dialog box.) 

Answer: 

Q18. – (Topic 2) 

You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of an Active Directory domain. 

Windows Remote Management (WinRM) is enabled on both computers. 

You need to remotely create additional disk volumes on Computer1 from Computer2. 

What should you do? 

A. On Computer2, run Winrs and then run Diskpart. 

B. On Computer2, run Winrs and then run Diskmgmt.msc. 

C. On Computer1, install the Telnet Client and then run Diskpart from Computer2. 

D. On Computer1, install the Telnet Client and then use Disk Management from Computer2. 

Answer: A 

Explanation: 

Winrs You can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS –r: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS –r:Aberdeen ipconfig The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt. 

Diskpart: Microsoft command-line tool Diskpart is used to create and format volumes on the target computer. 

Q19. – (Topic 1) 

You have a computer that runs Windows 7. Your company has three custom applications named app1.exe, app2.exe, and app3.exe. The applications have been digitally signed by the company. 

You need to create a policy that allows only applications that have been digitally signed by the company to run. 

What should you create? 

A. an AppLocker executable rule 

B. an AppLocker Windows Installer rule 

C. a software restriction policy and a certificate rule 

D. a software restriction policy and a hash rule 

Answer: A 

Q20. – (Topic 2) 

You have two portable computers named Computer1 and Computer2 that run Windows 7. 

You configure Computer1 to connect to a wireless network named Network1. 

You need to configure Computer2 to connect to Network1 by using the same settings as Computer1. 

What should you do on Computer1? 

A. At the command prompt, run Wecutil.exe -es -gr. 

B. At the command prompt, run Winrs.exe -environment. 

C. From Windows Firewall with Advanced Security, export the policy. 

D. From the wireless network properties of Network1, copy the network profile to a USB flash drive. 

Answer: D 

Explanation: 

The Copy this network profile to a USB flash drive link launches the Copy Network Settings wizard, which writes the wireless network profile settings to a USB flash drive. You can then use this flash drive to automate the wireless network profile configuration of other computers. To save your wireless network settings to a USB flash drive, insert a USB flash drive into the computer, and then follow these steps: 

1. Click to open Network and Sharing Center. 

2. In the left pane, click Manage wireless networks. 

3. Right-click the network, click Properties, and then click Copy this network profile to a USB flash drive. 

4. Select the USB device, and then click Next. 

5. Follow the instructions in the wizard, and then click Close. 

About 70-680 Information: 70-680 Dumps

Certleader Dumps
Certleader is a company specialized on providing high quality IT exam materials and fully committed to assist our respected clients crack any IT certification tests on their 1st efforts.