The Only Tip You Need: mcts 70 680

Proper study guides for Up to date Microsoft TS:Windows 7,Configuring certified begins with Microsoft 70 680 exam preparation products which designed to deliver the Tested mcts 70 680 questions by making you pass the 70 680 pdf test at your first time. Try the free 70 680 pdf demo right now.

2018 NEW RECOMMEND

Free VCE & PDF File for Microsoft 70-680 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-680-dumps.html

Q21. – (Topic 5) 

You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:\\Software. 

User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\\Software folder. 

You need to verify whether User1 can save files to C:\\Software. 

What should you do? 

A. View the User Account Control Settings Control Panel window. 

B. Run the Net Share command. 

C. View the Share permissions on C:\\Software. 

D. In the Advanced Security Settings for the Documents folder, select the Effective Permissions tab. 

Answer:

Explanation: To view effective permissions on files and folders 

Open Windows Explorer, and then locate the file or folder for which you want to view effective permissions. 

Right-click the file or folder, click Properties, and then click the Security tab. 

Click Advanced, click the Effective Permissions tab, and then click Select. 

In Enter the object name to select (examples), enter the name of a user or group, and then click OK. The selected check boxes indicate the effective permissions of the user or group for that file or folder. 

Q22. – (Topic 2) 

You have a computer that runs Windows 7. 

You need to provide standard users the ability to update the drivers for display adapters. 

What should you modify from the Local Group Policy? 

A. driver installation settings for the user 

B. device installation settings for the computer 

C. driver installation settings for the computer 

D. display settings for the user 

Answer:

Explanation: 

To Update the Drivers you need permissions to install drivers. Apply this to the computer for all local users, as opposed to only one user. 

Q23. – (Topic 4) 

A company has client computers that run Windows 7 Enterprise. The company also has a file server running Windows Server 2008 R2 that is configured to use BranchCache. 

You need to configure the client computers to be BranchCache clients. 

Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. Device Manager 

B. Local Users and Groups 

C. the User Account Control Settings Control Panel window 

D. the Group Policy management console 

E. the Services management console 

F. the folder Properties window 

G. the netsh command 

H. the icacls command 

I. share permissions 

Answer: D,G 

Explanation: 

To enable BranchCache on Windows 7 client computers using Group Policy, you must first create a Group Policy object (GPO) that will carry the BranchCache configuration. After creating the GPO, you configure the setting that enables BranchCache and choose whether BranchCache will operate in Distributed Cache mode or Hosted Cache mode. 

To create a GPO, enable BranchCache, and select the cache mode 

Click Start, point to Administrative Tools, and click Group Policy Management Console. 

Client configuration using netsh 

When configuring client computers, you can enable BranchCache and choose between Distributed Cache mode and Hosted Cache mode with a single netsh command. 

Q24. – (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

A user is asked to remove encryption from a locally saved folder so that other users can read and write to that folder. 

You need to verify that the folder is not encrypted with the Encrypting File System (EFS). 

What should you use to accomplish this goal? 

A. Device Manager 

B. Local Users and Groups 

C. the User Account Control Settings Control Panel window 

D. the icacls command 

E. the Group Policy management console 

F. share permissions 

G. the netsh command 

H. the Services management console 

I. the folder Properties window 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/windows/how-do-i-get-started-with-the-encrypting-file-system-in-windows-7.aspx 

Q25. – (Topic 1) 

You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. A pre-shared key is not configured on the wireless access point. 

You need to connect a computer that runs Windows 7 to the wireless access point. 

Which security setting should you select for the wireless connection? 

A. 802.1x 

B. WPA-Personal 

C. WPA2-Enterprise 

D. WPA2-Personal 

Answer:

Explanation: 

WPA and WPA2 indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks. WPA2 enhances WPA, which in turn addresses weaknesses in the previous system, WEP. WPA was intended as an intermediate measure to take the place of WEP while an IEEE 802.11i standard was prepared. 802.1X provides port-based authentication, which involves communications between a supplicant (a client computer), an authenticator (a wired Ethernet switch or WAP), and an authentication server (typically a Remote Authentication Dial In User Service, or RADIUS, server). WPA2-Enterprise WPA-Enterprise and WPA2-Enterprise authenticate through the Extensible Authentication Protocol (EAP) and require computer security certificates rather than PSKs. The following EAP types are included in the certification program: 

-EAP-TLS 

-EAP-TTLS/MSCHAPv2 

-PEAPv0/EAP-MSCHAPv2 

-PEAPv1/EAP-GTC 

-EAP-SIM 

If you want to use AES and to use computer certificates rather than a PSK, you would choose WPA2- Enterprise.WPA2-PersonalIf you have a small network that is not in a domain and cannot access a CA server, but you install a modernWAP that supports AES, you would use WPA2-Personal (with a PSK).WPA-Personal If you have a small network that is not in a domain and cannot access a CA server and your WAP does not support AES, you would use WPA-Personal.802.1x If you have a RADIUS server on your network to act as an authentication server and you want the highest possible level of security, you would choose 802.1X. 

Q26. – (Topic 3) 

You have a Windows 7 computer that is a member of a workgroup. 

You need to prevent members of a local group from starting a specific application. 

You must achieve this goal by using the minimum amount of administrative effort. 

What should you create? 

A. administrative template 

B. application control policy 

C. IPSec policy 

D. software restriction policy 

Answer:

Explanation: 

AppLocker Application Control Policies AppLocker is a feature new to Windows 7 that is available only in the Enterprise and Ultimate editions of the product. AppLocker policies are conceptually similar to Software Restriction Policies, though AppLocker policies have several advantages, such as the ability to be applied to specific user or group accounts and the ability to apply to all future versions of a product. Hash rules apply only to a specific version of an application and must be recalculated whenever you apply software updates to that application. AppLocker policies are located in the Computer Configuration\\Windows Settings\\ Security Settings\\Application Control Policies node of a standard Windows 7 or Windows Server 2008 R2 GPO. 

AppLocker relies upon the Application Identity Service being active. When you install Windows 7, the startup type of this service is set to Manual. When testing AppLocker, you should keep the startup type as Manual in case you configure rules incorrectly. In that event, you can just reboot the computer and the AppLocker rules will no longer be in effect. Only when you are sure that your policies are applied correctly should you set the startup type of the Application Identity Service to Automatic. You should take great care in testing AppLocker rules because it is possible to lock down a computer running Windows 7 to such an extent that the computer becomes unusable. AppLocker policies are sometimes called application control policies. 

Q27. – (Topic 5) 

You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:\\Software. 

User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\\Software folder. 

You need to verify whether User1 can save files to C:\\Software. 

What should you do? 

A. Run the Net Share command. 

B. Run the Wfs C:\\Software command. 

C. In the Advanced Security Settings for the Documents folder, select the Effective Permissions tab. 

D. Run the Fsutil C:\\Software command. 

Answer:

Explanation: To view effective permissions on files and folders . Open Windows Explorer, and then locate the file or folder for which you want to view effective permissions. 

Right-click the file or folder, click Properties, and then click the Security tab. 

Click Advanced, click the Effective Permissions tab, and then click Select. 

In Enter the object name to select (examples), enter the name of a user or group, and then click OK. The selected check boxes indicate the effective permissions of the user or group for that file or folder. 

Q28. – (Topic 4) 

You have two computers named Workstation! and Workstation2 that have Windows 7 SP1 installed. 

You connect to Workstation2 from Workstation1 by using Remote Desktop. 

You need to be able to copy files between the computers during the Remote Desktop session. 

What should you do? 

A. On Workstation2, open Remote Desktop Connection and configure the Local devices and resources settings. 

B. On Workstation1, open Remote Desktop Connection and configure the Local devices and resources settings. 

C. On Workstation2, type MSTSC /v:Computer1 /f /console. 

D. On Workstation1, open Remote Desktop Connection and configure the Connect from Anywhere settings. 

Answer:

Explanation: 

How can I use my devices and resources in a Remote Desktop session? Redirecting a device on your computer makes it available for use in a Remote Desktop session. If you have a recent version of Remote Desktop, you can redirect most devices, including printers, smart cards, serial ports, drives, Plug and Play devices, media players based on the Media Transfer Protocol (MTP), and digital cameras based on the Picture Transfer Protocol (PTP). Some USB devices can be redirected, and you can also redirect your Clipboard. 

Q29. – (Topic 6) 

You use a computer that has Windows 7 SP1 installed and has a folder named C:\\Data. 

The active network connection for the computer is configured as Public. 

You assign User1 to a local group called DataUsers. The group has been granted Read NTFS permissions for the folder. 

User1 browses to the shared folder across the network and receives the following error message: 

"Access is Denied." 

You need to ensure that the user can download files from the shared folder. 

What should you do? 

A. Allow file and printer sharing through Windows Firewall. 

B. Change the network location of the computer from a Public network to a Home or Work network. 

C. From the Security settings of the C:\\Data folder, assign the Full Control NTFS permissions to User1. 

D. From the Advanced Sharing settings of the folder, assign the Read share permission to User1. 

E. From the Advanced Sharing permissions, enable caching. 

Answer:

Q30. – (Topic 3) 

You are the administrator of a computer named Computer1 that runs Windows 7. Several users share Computer1. The users plan to encrypt files on the computer. 

You need to ensure that you can access all encrypted files on the computer. 

What should you do first? 

A. At a command prompt, run Cipher.exe. 

B. At a command prompt, run Certutil.exe. 

C. From the local computer policy, modify the User Rights Assignment. 

D. From User Accounts, run the Manage your file encryption certificates wizard. 

Answer:

Explanation: 

Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed. When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software. 

If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. 

/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521.