Super to windows 7 configuration exam 70-680 answers

Exam Code: 70-680 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: TS:Windows 7,Configuring
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-680 Exam.

2016 Jun 70-680 Study Guide Questions:

Q381. – (Topic 3) 

You deploy a Windows 7 Enterprise image to a computer on the network. 

You need to display the detailed activation and license status of the computer. 

What should you run? 

A. Msconfig.exe 

B. Slui.exe 

C. Slmgr.vbs and specify the dli parameter 

D. Winrm.vbs and specify the id parameter 

Answer: C 


Slmgr.vbs /dli [Activation ID | All]Display license information. By default, /dli displays the license information for the installed active Windows edition. Specifying the [Activation ID] parameter displays the license information for the specified edition associated with that Activation ID. Specifying the [All] as the parameter will display all applicable installed products' license information. This operation does not require elevated privileges. 

Q382. – (Topic 5) 

A stand-alone computer that runs Windows 7 has only one partition. Two users named User1 and User2 share this computer. 

User1 encrypts a file by using Encrypting File System (EFS). User1 attempts to grant 

User2 access to the file as shown in the exhibit. 

You need to ensure that User1 can grant User2 access to the file. 

What should you do? 


A. Instruct User2 to log on to the computer and take ownership of the file. 

B. Instruct User1 to move the file to a shared folder on the computer. 

C. Instruct User2 to export the EFS certificate to a certificate file. 

D. Instruct User1 to export the EFS certificate to a certificate file. 

Answer: C 

Q383. – (Topic 1) 

You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You manage a stand-alone computer which has only one partition. Windows 7 is run by this computer. The computer is shared by two users that are respectively named User1 and User2. User01 uses Encrypting File System (EFS) to encrypt a file. User01 tries to grant User2 access to the file as shown in the exhibit. You have to make sure that User1 are able to grant User2 access to the file. So what action should you perform to make sure of this? 

A. User02 should be instructed to log on to the computer and take ownership of the file. 

B. User02 should be instructed to log on to the computer and encrypt a file. 

C. User1 should be instructed to export his certificate to a certificate (.cer) file. 

D. User01 should be instructed to move the file to a shared folder on the computer. 

Answer: B 

70-680  test questions

Renovate exam 70-680 windows 7 configuration pdf:

Q384. DRAG DROP – (Topic 6) 

You have a computer that runs WindowsXP. The computer has one partition. You install Windows 7 on the computer. 

You need to migrate a user profile from the Windows XP installation to Windows 7 installation. 

What should you do first? (To answer, drag the appropriate command from the list of command to the correct location or locations in the work area.) 


Q385. HOTSPOT – (Topic 4) 

A company has client computers that run Windows 7. 

You need to secure a virtual private network (VPN) connection on the client computers so that two-factor authentication is used. 

Which setting should you choose? (To answer, select the appropriate setting in the work area.) 


Q386. – (Topic 6) 

You administer computers that have Windows 7 and Internet Explorer 8 installed. 

You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. 

You need to ensure that any data about your browser session is not saved on the computer. What should you do? 

A. From Internet Options, modify the security settings for the Internet zone. 

B. Start the Microsoft Network Access Protection service. 

C. From the Safety drop-down menu, configure InPrivate Filtering. 

D. From Internet Options, select Delete browsing history on exit. 

Answer: B 

70-680  test questions

Exact exam 70-680:

Q387. – (Topic 3) 

A user named User1 uses a shared computer that runs Windows 7. 

User1 is a standard user. User1 attempts to connect a USB device to the computer and is prompted to enter administrative credentials. 

You need to ensure that User1 can use the USB device without requiring administrative credentials. 

What should you do first? 

A. Add User1 to the Power Users group. 

B. Run Pnputil.exe and specify the – i- a parameters. 

C. Run Driverquery.exe and specify the /SI parameter. 

D. Copy the driver files to the C:\\windows\\system32 folder. 

Answer: B 


When a driver is staged, it is placed in the device driver store and non-administrators can install the device, provided they have permission to install devices in the appropriate device setup class. Pnputil.exe is a command line utility that you can use to manage the driver store. You can use Pnputil to add driver packages, remove driver packages, and list driver packages that are in the store. -i Specifies to install the identified INF file. Cannot be used in conjunction with the -f parameter. 

Example pnputil.exe -i -a a:\\usbcam\\USBCAM.INF Adds and installs the specified driver 

Q388. – (Topic 5) 

You are evaluating the purchase a netbook computer that has the following hardware: 

1.6-gigahertz (GHz) 32-bit processor 

1024-MB RAM 

1 video card that uses shared memory 

. 4-G8 solid state drive 

You need to ensure that you can install Windows 7 Enterprise on the netbook computer. Which hardware component should you change or add? 

A. storage device 

B. video card 

C. processor 

D. ram 

Answer: A 

Q389. – (Topic 2) 

Your computer running Windows 7 Enterprise has two internal hard disks. 

System protection is configured by default on the C: drive, which holds the operating system and installed applications. 

The D: drive is a 500-GB hard disk formatted with the NTFS filing system, and you use it to store your personal files. 

You want to store previous versions going back several months and therefore intend to reserve 200 GB of this disk for system protection. 

You are not using either of your internal disks for backup; instead, you store your backups on a 1-TB external USB hard disk. 

How do you configure system protection on your D: drive? (Choose all that apply; each answer forms part of the complete solution.) 

A. Select Restore System Settings And Previous Versions Of Files 

B. Select Only Restore Previous Versions Of Files 

C. Set the Max Usage slider control to 40 percent 

D. Set the Max Usage slider control to 4 percent 

Answer: B,C 

Q390. – (Topic 3) 

You need to configure a computer to encrypt all inbound connections by using IPSec. 

What should you do? 

A. From Network and Sharing Center, click Connect to a network. 

B. From Network and Sharing Center, click Set up a new connection or network. 

C. From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule. 

D. From Windows Firewall with Advanced Security, click Connection Security Rules and then click New Rule. 

Answer: D 


Connection Security Rules Connection security rules are a special type of rule that deal with authenticated and encrypted traffic. You can use connection security rules to manage how communication occurs between different hosts on the network. You use the New Connection Security Rule Wizard, to create connection security rules. Connections can be authenticated using the Kerberos V5 protocol requiring a domain computer and user account or a domain computer account. If you select advanced properties, connections can be authenticated using NTLMv2, computer certificates from a particular certificate authority (CA) or using a pre-shared key.Connection Security Rules and IPSec policies The relationship between connection security rules and IPSec policies is similar to the relationship between AppLocker and Software Restriction Policies. Both sets of rules do similar things, but the ones that you use depend on the operating systems used by the client computers in your organization. All editions of Windows 7 and Windows Vista support connection security rules, but Windows XP does not. 

About 70-680 Information: 70-680 Dumps

Certleader Dumps
Certleader is a company specialized on providing high quality IT exam materials and fully committed to assist our respected clients crack any IT certification tests on their 1st efforts.