Examcollection offers free demo for microsoft 70 680 exam. “TS:Windows 7,Configuring”, also known as exam 70 680 exam, is a Microsoft Certification. This set of posts, Passing the Microsoft mcts 70 680 exam, will help you answer those questions. The 70 680 practice test Questions & Answers covers all the knowledge points of the real exam. 100% real Microsoft 70 680 pdf exams and revised by experts!
2017 NEW RECOMMEND
Free VCE & PDF File for Microsoft 70-680 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q271. – (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You use a computer that runs Windows 7.
Now your company assigns a task to you. You are asked to prevent users from copying unencrypted files to removable drives. What action should you perform?
A. The Trusted Platform Module (TPM) settings should be modified from a local Group Policy.
B. TPM should be initialized from the Trusted Platform Module (TPM) snap-in.
C. The BitLocker Drive Encryption settings should be modified from Control Panel.
D. The BitLocker Drive Encryption settings should be modified from a local Group Policy.
Q272. – (Topic 1)
You plan to install Windows 7 by using a Windows 7 DVD. You need to perform an automated installation of Windows 7. What should you do?
A. Create an answer file named oobe.xml. Copy the file to a network share.
B. Create an answer file named winnt.sif. Place the file on a removable drive.
C. Create an answer file named sysprep.inf. Copy the file to a network share.
D. Create an answer file named autounattend.xml. Place the file on a removable drive.
Q273. – (Topic 4)
A company has client computers that run Windows 7 Enterprise.
You need to ensure that Windows does not display notifications when programs try to install software or make changes to the computer, or if users make changes to Windows settings.
Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. the leads command
B. the netsh command
C. share permissions
D. Device Manager
E. Local Users and Groups
F. the folder Properties window
G. the Services management console
H. the Group Policy management console
I. the User Account Control Settings Control Panel window
Q274. – (Topic 5)
You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:\\Software.
User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\\Software folder.
You need to verify whether User1 can save files to C:\\Software.
What should you do?
A. Run the Net View command.
B. view the Share permissions on C:\\Software.
C. in the Advanced Security Settings for the Documents folder, select the Effective Permissions tab.
D. Run the Wfs C:\\Software command.
Q275. – (Topic 2)
You have two portable computers that run Windows 7. The computers are not connected to a network.
The computers are configured as shown in the following table.
You need to transfer a 1-gigabit file from Computer1 to Computer2. What should you do first?
A. On Computer1, create a wireless ad hoc network.
B. On Computer2, configure the Bluetooth File Transfer Wizard to send files.
C. On Computer2, create a network profile to connect to a network named Homegroup.
D. On Computer1, configure the computer to be a member of a workgroup named Homegroup.
Explanation: Wireless Ad Hoc network You can set up a temporary wireless network, or ad hoc network, between two or more computers running Windows 7 (or between computers running Windows 7 and Windows Vista) provided they are all within 30 feet (9 meters) of each other. A WAP is not required to set up an ad hoc network. This enables users to share folders and other resources without needing to connect to an organizational network. On the first computer on the network, you open Network And Sharing Center and click Set Up A New Connection Or Network. You then choose the option Set Up A Wireless Ad Hoc (Computer To Computer) Network. You give the network a name and (if you want) set up a security key so that users joining the network need to supply a password. For WEP, this can be 5 case-sensitive characters, 13 case-sensitive characters, 10 hexadecimal caseinsensitive characters, or 26 hexadecimal case-insensitive characters, depending on security considerations. (If you choose WPA-2 Personal, you can insist on a 64-character password, but by the time everyone has typed it in correctly, the meeting would probably be over.)BluetoothWindows supports Bluetooth version 1.1 and later versions. Windows does not support Bluetooth version 1.0 because that specification lacks several critical updates that Windows requires to support Bluetooth wireless technology well.
Q276. – (Topic 2)
An employee who works from home telephones your help desk. A virus attack has deleted his computer's single internal hard disk. He carried out a System Image backup on his computer three months ago and automatically backs up his personal files every night. He uses an external USB hard drive formatted with the NTFS file system to hold his backups.
All his personal files are in his Documents library. What do you advise? (Choose all that apply; the answers form a complete solution.)
A. Carry out a System Image restore.
B. Carry out a system restore.
C. Use Restore Previous Versions to restore his Documents library from a shadow copy.
D. Use Restore My Files in the Backup And Restore console to restore his Documents library folder.
Q277. – (Topic 4)
You have two computers named Workstation! and Workstation2 that have Windows 7 SP1 installed.
You connect to Workstation2 from Workstation1 by using Remote Desktop.
You need to be able to copy files between the computers during the Remote Desktop session.
What should you do?
A. On Workstation2, open Remote Desktop Connection and configure the Local devices and resources settings.
B. On Workstation1, open Remote Desktop Connection and configure the Local devices and resources settings.
C. On Workstation2, type MSTSC /v:Computer1 /f /console.
D. On Workstation1, open Remote Desktop Connection and configure the Connect from Anywhere settings.
How can I use my devices and resources in a Remote Desktop session? Redirecting a device on your computer makes it available for use in a Remote Desktop session. If you have a recent version of Remote Desktop, you can redirect most devices, including printers, smart cards, serial ports, drives, Plug and Play devices, media players based on the Media Transfer Protocol (MTP), and digital cameras based on the Picture Transfer Protocol (PTP). Some USB devices can be redirected, and you can also redirect your Clipboard.
Q278. – (Topic 3)
You need to prevent a custom application from connecting to the Internet.
What should you do?
A. From Windows Firewall, add a program.
B. From Windows Defender, modify the Allowed items list.
C. From Windows Firewall with Advanced Security, create an inbound rule.
D. From Windows Firewall with Advanced Security, create an outbound rule.
Outbound Rule Outbound rules allow you to block and allow traffic that originates on the computer from traveling out to the network.Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.QUESTION NO: 290 You have a computer that runs Windows 7. The network contains a monitoring server named Server1. The computer runs a monitoring service named Service1. Service1 uses Remote Procedure Calls (RPCs). You need to ensure that Service1 can receive requests from Server1.
What should you do?
A. From Windows Firewall with Advanced Security, create a predefined rule.
B. From Windows Firewall with Advanced Security, create a custom rule.
C. From Network and Sharing Center, modify the network location settings.
D. From Network and Sharing Center, modify the advanced sharing settings.
Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.
Q279. – (Topic 5)
You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits:
The Disk Management console (Click the Exhibit button.)
The System Properties window (Click the Exhibit button.)
The System protection for Local Disk C window (Click the Exhibit button.)
You need to create a backup copy of a 40-GB Virtual Hard Disk (VHD) file in a local folder on drive C.
What should you do?
A. Delete restore points.
B. Create a restore point.
C. Perform a system restore.
D. Search for the file in the Recycle Bin.
E. Increase disk space used for system protection.
F. Copy the file from a previous version of a folder.
G. Set restore settings to Only restore previous versions of files.
H. Run the cipher /x command from the elevated command prompt.
I. Run the vssadmin list volumes command from the elevated command prompt.
J. Run the vssadmin list shadows command from the elevated command prompt.
K. Run the compact /U <file_name> command from the elevated command prompt.
Q280. DRAG DROP – (Topic 5)
Your company network includes a Windows Server 2008 R2 server named Server 1. You use a client computer named Client1 that has Windows 7 Enterprise installed. Both computers are members of an Active Directory domain.
You want to automatically collect events from Client1 to Server1. Bandwidth delivery optimization will not be used along with the subscription.
You need to configure the required collector-initiated subscription.
What should you do? (To answer, drag the appropriate configuration step or configuration steps to the correct target computer or target computers in the answer area. An answer choice can be used once, more than once, or not at all.)