we provide Tested Microsoft microsoft 70 680 test question which are the best for clearing 70 680 exam test, and to get certified by Microsoft TS:Windows 7,Configuring. The 70 680 practice test Questions & Answers covers all the knowledge points of the real 70 680 exam exam. Crack your Microsoft 70 680 practice test Exam with latest dumps, guaranteed!
2017 NEW RECOMMEND
Free VCE & PDF File for Microsoft 70-680 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q201. HOTSPOT – (Topic 5)
You use a computer that has Windows 7 and a legacy application named App1 installed.
App1 is designed for Windows 2000 and implements large-scale font sizes.
You need to configure application compatibility settings for App1 according to the following
. Compatible with Windows 2000
. Large-scale fonts must not be resized
What should you do? (To answer, select the appropriate check boxes in the Application "App1" Compatibility Properties tab in the answer area.)
Q202. – (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You have a computer that runs Windows 7.
You run Runas and specify the /savecred parameter to start an application.
The stored password needs to be deleted.
What action should you perform?
A. The Windows credentials should be modified from Credential Manager.
B. The Authorization Manager options should be modified from Authorization Manager.
C. Del should be run and the /p parameter should be specified.
D. Runas should be run and the /noprofile parameter should be specified.
Q203. – (Topic 2)
You are installing a 64bit edition of Windows 7. During the installation, you receive an error message when you attempt to add mass storage driver. You need to complete the installation of Windows 7. You start the computer from the Windows 7 installation media. What should you do next?
A. From the Install Windows dialog box, click RESCAN.
B. From the Install Windows dialog box, click DRIVE OPTIONS (ADVANCED)
C. From the Advanced Boot options menu, select SAFE MODE.
D. From the Advanced Boot options menu, select DISABLE DRIVER SIGNATURE ENFORCEMENT.
Q204. DRAG DROP – (Topic 5)
You use a computer that has Windows 7 Professional SP1 installed. The computer has a single network interface.
You need to prevent the computer from using NetBIOS applications.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Q205. – (Topic 3)
You have a computer that runs Windows 7.
The Encrypting File System (EFS) key is compromised.
You need to create a new EFS key.
Which command should you run?
A. Certutil -getkey
B. Cipher.exe /k
C. Icacls.exe /r
Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains.Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed.When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. /K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521.
Q206. – (Topic 2)
You have a computer that runs windows 7.
The computer is configured as shown in the following table.
You plan to install a new application that requires 40 GB of space. The application will be installed to C:\\app1.
You need to provide 40 GB of free space for the application.
What should you do?
A. Create a shortcut.
B. Create hard link.
C. Create a mount point.
D. Change the quota settings.
Assign a mount point folder path to a driveYou can use Disk Management to assign a mount-point folder path (rather than a drive letter) to the drive. Mount-point folder paths are available only on empty folders on basic or dynamic NTFS volumes.Volume Mount PointsVolume mount points are new system objects in the internal namespace of Windows 2000 that represent storage volumes in a persistent, robust manner. This feature allows multiple disk volumes to be linked into a single tree, similar to the way Dfs links remote network shares. You can have many disk volumes linked together, with only a single drive letter pointing to the root volume. The combination of an NTFS junction and a Windows 2000 volume mount point can be used to graft multiple volumes into the namespace of a host NTFS volume. Windows 2000 offers this new mounting feature as an alternative to drive letters so system administrators can transcend the 26-drive letter limit that exists in Windows NT. Volume mount points are robust against system changes that occur when devices are added or removed from a computer. Important-icon Important A volume is a self-contained unit of storage administered by a file system. The file system that administers the storage in a volume defines a namespace for the volume. A volume mount point is a directory name in an NTFS file system that denotes the root of an arbitrary volume. A volume mount point can be placed in any empty directory of the namespace of the containing NTFS volume. Because volumes can be denoted by arbitrary directory names, they are not required to have a traditional drive letter. Placing a volume mount point on an NTFS directory causes the storage subsystem to resolve the directory to a specified local volume. This "mounting" is done transparently and does not require a drive letter to represent the volume. A Windows 2000 mount point always resolves to the root directory of the desired volume. Volume mount points require that the version of NTFS included with Windows 2000 be used because they are based on NTFS reparse points.
Q207. – (Topic 1)
Which of the following can be used to increase the physical memory on your Windows 7 PC and increase the speed?
B. Aero Glass
Q208. – (Topic 4)
You have a computer running Windows 7. You create a VHD and install Windows 7 in it.
You reboot your system and notice that the boot menu now shows two installations of Windows 7.
How do you fix it?
A. Use Sysprep with an answer file to disable one installation.
B. Run the BCDEdit command.
C. Run the Start/w ocsetup command.
D. Run the Dism command
E. Add a boot image and create a capture image in WDS.
F. Run the PEImg /Prepcommand.
G. Run the ImageX command with the /Mount parameter.
H. Run the Dism command with the /Mount-Wim option.
I. Run the Dism command with the /Add-Package option.
J. Run the DiskPart command and the Attach command option.
K. Add a boot image and create a capture image in WDS
BCDEdit Command-Line Options Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini. BCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe. BCDEdit has improved scripting support.
Administrative privileges are required to use BCDEdit to modify BCD.
BCDEdit is the primary tool for editing the boot configuration of Windows Vista and later versions of Windows. It is included with the Windows Vista distribution in the %WINDIR%\\System32 folder.
BCDEdit is limited to the standard data types and is designed primarily to perform single common changes to BCD. For more complex operations or nonstandard data types, consider using the BCD Windows Management
Instrumentation (WMI) application programming interface (API) to create more powerful and flexible custom tools.
Q209. – (Topic 5)
You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits:
. The Disk Management console (Click the Exhibit button.)
. The System Properties window (Click the Exhibit button.)
. The System protection for Local Disk C window (Click the Exhibit button.)
You share your Documents library over a network.
You discover that one of the files was deleted from the library by a network user.
You need to restore the most recent version of the deleted file.
What should you do?
A. Delete restore points.
B. Create a restore point.
C. Perform a system restore.
D. Search for the file in the Recycle Bin.
E. Increase disk space used for system protection.
F. Copy the file from a previous version of a folder.
G. Set restore settings to only restore previous versions of files.
H. Run the cipher /x command from the elevated command prompt,
I. Run the vssadmin list volumes command from the elevated command prompt.
J. Run the vssadmin list shadows command from the elevated command prompt,
K. Run the compact /U <file_name> command from the elevated command prompt.
Explanation: Note: To restore a previous version of a file or folder that's included in a library, right-click the file or folder in the location where it's saved, rather than in the library. For example, to restore a previous version of a picture that's included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions.
Q210. – (Topic 5)
You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at your company has a network projector installed on a server within the company network.
You need to connect to the projector from your computer.
What should you do?
A. From Accessories, click Connect to a Network Projector.
B. From PowerShell, run the Net Config command.
C. From Display, click Connect to a projector.
D. Run the Displayswitch.exe command and select Projector only.