Resources to 70 680 practice test

Examcollection 70 680 practice test Questions are updated and all microsoft 70 680 answers are verified by experts. Once you have completely prepared with our 70 680 pdf exam prep kits you will be ready for the real 70 680 pdf exam without a problem. We have Refresh Microsoft 70 680 practice test dumps study guide. PASSED microsoft 70 680 First attempt! Here What I Did.


Free VCE & PDF File for Microsoft 70-680 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on:

Q321. – (Topic 3) 

You have a computer that runs Windows 7. You generate a System Diagnostic Report and receive the following warning message: The Graphics rating for the system is poor and may be the cause of performance problems. 

You need to increase the graphics performance of the computer without modifying the current hardware or drivers. 

What should you do? 

A. From Personalization, modify the screen saver. 

B. From Indexing Options, modify the Advanced options. 

C. From Performance Options, modify the visual effects. 

D. From Performance Options, modify the processor scheduling. 


Explanation: Configuring Performance Options The Performance Options tool is a Windows 7 Performance And Analysis tool that you can access by clicking Advanced Tools on the Performance Information And Tools dialog box and then clicking Adjust The Appearance And Performance Of Windows. You can let Windows decide what is best for your computer, adjust for best appearance, adjust for best performance, or select Custom and specify the appearance settings for your computer manually. If you select Custom, you can choose which visual effects to turn off, one by one. There are 18 visual effects that you can control, such as whether shadows are displayed under screen icons or under the mouse pointer. On the Advanced tab, you can adjust for the best performance of programs or background services. If your computer is running applications (as a typical workstation does), you would specify Adjust For Best Performance Of Programs. On a server that is functioning as a Web server (for example), you would specify Adjust For Best Performance Of Background Services. 

Q322. – (Topic 3) 

You have two computers named Computer1 and Computer2 that run Windows 7. 

You use Remote Desktop to connect from Computer1 to Computer2. 

You need to prevent the desktop background of Computer2 from being displayed when you use Remote Desktop to connect to Computer2. 

What should you do on Computer1? 

A. From the Personalization options, change the theme. 

B. From the System properties, modify the Remote settings. 

C. From the Remote Desktop Connection options, modify the Performance setting. 

D. From the Remote Desktop Connection options, modify the Display configuration settings. 



Configuring the Desktop ExperienceYou can configure the connection speed and fine-tune the desktop environment for optimal performance by using the settings located on the Experience tab of the Remote Desktop Connection tool. Most of these settings relate to the graphical nature of the desktop. Because the processing for graphics happens on the server and must be transmitted to the desktop over the network connection, you can increase performance by allowing only the minimal settings that are necessary for your users. When you choose a connection speed, the check boxes are automatically selected to indicate the recommended settings for the richest visual experience possible at that speed.ExperienceConfigure the connection speed and adjust the desktop environment for optimal performance.Desktop background Allows user to choose a custom background or wallpaper for their desktop. Because these can be very graphicintensive, disable this setting unless it is necessary for your users. 

Q323. – (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

A user is asked to remove encryption from a locally saved folder so that other users can read and write to that folder. 

You need to verify that the folder is not encrypted with the Encrypting File System (EFS). 

What should you use to accomplish this goal? 

A. Device Manager 

B. Local Users and Groups 

C. the User Account Control Settings Control Panel window 

D. the icacls command 

E. the Group Policy management console 

F. share permissions 

G. the netsh command 

H. the Services management console 

I. the folder Properties window 



Q324. – (Topic 4) 

A company has a server running Windows Server 2008 R2, with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) set up. The company also has client computers running Windows 7 Enterprise. 

You need to remove some files from a virtual hard disk on a client computer. 

What should you do first? 

A. use Sysprep with an answer file and set the PersistAHDeviceinstalls option in the answer file to True. 

B. Run the BCDEdit /delete command. 

C. Run the Start/w ocsetup command. 

D. Use Sysprep with an answer file and set the UpdateinstalledDriversoption in the answer file to Yes. 

E. Run the Dism command with the /Add-Driver option. 

F. Add a boot image and create a capture image in WDS. 

G. Run the PEImg /Prepcommand. 

H. Run the ImageX command with the /Mount parameter. 

I. Run the Dism command with the /Mount-Wim option. 

J. Use Sysprep with an answer file and set the UpdateInstalledDriversoption in the answer file to No. 

K. Run the Dism command with the /Add-Package option. 

L. Run the DiskPart command and the Attach command option. 

M. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False. 



DiskPart.exe and managing Virtual Hard Disks (VHDs) in Windows 7 In Windows 7, new commands have been added in DiskPart to allow for the creation and management of Virtual Hard Disks (.vhd files). The DiskPart VHD management commands have been provided below in 2 sections – commonly used commands with examples and other commands. It is assumed in each of the examples that DiskPart.exe has already been launched in an elevated command prompt. 

Creating a VHD 

The example below creates a 20GB dynamically expanding VHD called "test.vhd" and places it in the root of the C: drive. Note that the type parameter is optional and the default type is fixed. create vdisk file=c:\\test.vhd maximum=20000 type=expandable 

Attaching a VHD 

The following example shows how to select and attach the VHD. It also provides steps for partitioning, formatting and assigning a drive letter to the attached VHD. 

select vdisk file=c:\\test.vhd 

attach vdisk 

create partition primary 

format fs=ntfs label="Test VHD" quick 

assign letter=v 

Detaching the VHD 

To detach (i.e. unmount) the VHD, use the following example: 

select vdisk file=c:\\test.vhd 

detach vdisk 

Q325. – (Topic 6) 

You manage Windows 7 computers in your company. 

The company uses a file share to store files. A group currently has permissions to access the share, but not the files in it They need permissions to update and delete files in the share but not to modify the permissions on the files. 

You need to grant NTFS permissions to the group by using the standard permissions dialog. 

Which permission(s) should you grant the group on the folder? 

A. Read and Execute 

B. Modify 

C. Full Control 

D. Write 


Explanation: Ref: 

Q326. – (Topic 2) 

You work as the desktop support technician at The network consists of a single Active Directory domain named All client computers on the network run Windows Vista Business. 

You have been instructed to upgrade a client computer named CERTKILLER-WS620 to Microsoft Windows 7 Professional. CERTKILLER-WS620 has the following specifications: 

Drive C (system drive) has 12 gigabytes (GB) of free space. 

Drive D (data drive) has 40 GB of free space. 

Four memory slots with two occupied by 512 megabyte (MB) memory sticks. 

One 2.0 gigahertz (GHz) 32-bit processor. 

You need to ensure that Windows 7 Professional can be installed on CERTKILLER-WS620. 

What should you do? 

A. You should consider installing Windows 7 on Drive D. 

B. You should consider creating more free space on Drive C. 

C. You should consider upgrading the memory. 

D. You should consider upgrading the processor. 


Q327. DRAG DROP – (Topic 6) 

You install Windows 7 Enterprise 64-bit on a client computer and create a reference image. 

The image file is stored on your computer and is named C:\\Images\\StandardDesktop.wim. You discover that a target computer deployed from the reference image is unable to automatically install drivers for some scanners and printers. 

The required drivers are located in the C:\\Drivers folder on your computer. 

You need to include third-party signed drivers into the reference image. 

What should you do? (To answer, move the appropriate commands from the list of commands to the answer area and arrange them in the correct order.) 


Q328. – (Topic 2) 

A user on your company network creates a new file and works on it during the day. He saves the file but decides he no longer needs it and deletes it just before the office closes. Overnight, a file and folder backup takes place. The next morning, the user decides he needs the file after all. He calls you for help. 

What action can you take? 

A. Restore the file from the previous night's backup. 

B. Restore the Recycle Bin from the previous night's backup. The file will be in the restored Recycle Bin. 

C. Restore the file from an older backup. 

D. Ask the user to open his Recycle Bin. 


Q329. – (Topic 1) 

You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate. 

You need to ensure that your user account can decrypt all EFS files on the computer. 

What should you do? 

A. From Credential Manager, add a Windows credential. 

B. From Credential Manager, add a certificate-based credential. 

C. From the local computer policy, add a data recovery agent. 

D. From the local computer policy, modify the Restore files and directories setting. 



EFS Recovery Recovery Agents are certificates that allow the restoration of EFS encrypted files. When a recovery agent has been specified using local policies, all EFS encrypted files can be recovered using the recovery agent private key. You should specify a recovery agent before you allow users to encrypt files on a client running Windows 7. You can recover all files that users encrypt after the creation of a recovery agent using the recovery agent's private key. You are not able to decrypt files that were encrypted before a recovery agent certificate was specified. You create an EFS recovery agent by performing the following steps: 

1. Log on to the client running Windows 7 using the first account created, which is the default administrator account. 

2. Open a command prompt and issue the command Cipher.exe /r:recoveryagent 

3. This creates two files: Recoveryagent.cer and Recoveryagent.pfx. Cipher.exe prompts you to specify a password when creating Recoveryagent.pfx. 

4. Open the Local Group Policy Editor and navigate to the \\Computer Configuration\\Windows Settings\\Security Settings\\Public Key Policies\\Encrypting File System node. Right-click this node and then click Add Data Recovery Agent. Specify the location of Recoveryagent.cer to specify this certificate as the recovery agent. 

5. To recover files, use the certificates console to import Recoveryagent.pfx. This is the recovery agent's private key. Keep it safe because it can be used to open any encrypted file on the client running Windows 7. 

Q330. – (Topic 4) 

You use a portable computer that has Windows 7 SP1 installed and is a member of an Active Directory domain. The computer is connected to your Home network. 

You run the ipconfig.exe command as shown in the exhibit. (Click the Exhibit button.) 

You need to establish a DirectAccess connection from the computer to a DirectAccess server. 

What should you do first? 

A. Add the computer to a new HomeGroup. 

B. Configure a static IPv4 address. 

C. Create a new VPN connection. 

D. Enable IPv6 on the network adapter.