[UPDATED] Download Free Microsoft 70-680 VCE Files From Braindump2go – Get Microsoft 70-680 Certification Right Now (291-305)

Microsoft Official Exam Center Latest Added Questions and Answers For 70-680 Exam Free Download from Braindump2go!

Vendor: Microsoft
Exam Code: 70-680
Exam Name: TS: Windows 7, Configuring

120[2][2]

QUESTION 291
You have a computer that runs Windows 7 Professional. A USB disk is attached to the computer. You need to ensure that you can enable BitLocker To Go on the USB disk.
What should you do?

A.    Enable Encrypting File System (EFS).
B.    Upgrade the computer to Windows 7 Enterprise.
C.    Initialize the Trusted Platform Module (TPM) hardware.
D.    Obtain a client certificate from an enterprise certification authority (CA).

Answer: B
Explanation:
Windows 7 ProfessionalWindows 7 Professional is available from retailers and on new computers installed by manufacturers. It supports all the features available in Windows Home Premium, but you can join computers with this operating system installed to a domain. It supports EFS and Remote Desktop Host but does not support enterprise features such as AppLocker, DirectAccess, BitLocker, and BranchCache.Windows 7 Enterprise and Ultimate EditionsThe Windows 7 Enterprise and Ultimate editions are identical except for the fact that Windows 7 Enterprise is available only to Microsoft’s volume licensing customers, and Windows 7 Ultimate is available from retailers and on new computers installed by manufacturers. The Enterprise and Ultimate editions support all the features available in other Windows 7 editions but also support all the enterprise features such as EFS, Remote Desktop Host, AppLocker, DirectAccess, BitLocker, BranchCache, and Boot from VHD.

QUESTION 292
You have a computer that runs Windows 7.
You need to prevent Internet Explorer from saving any data during a browsing session.
What should you do?

A.    Disable the BranchCache service.
B.    Modify the InPrivate Blocking list.
C.    Open an InPrivate Browsing session.
D.    Modify the security settings for the Internet zone.

Answer: C
Explanation:
InPrivate Mode consists of two technologies: InPrivate Filtering and InPrivate Browsing. Both InPrivate Filtering and InPrivate Browsing are privacy technologies that restrict the amount of information available about a user’s browsing session. InPrivate Browsing restricts what data is recorded by the browser, and InPrivate Filtering is used to restrict what information about a browsing session can be tracked by external third parties.

QUESTION 293
You have a stand-alone computer named Computer1 that runs Windows 7.
Several users share Computer1.
You need to prevent all users who are members of a group named Group1 from running Windows Media Player. All other users must be allowed to run Windows Media Player.
You must achieve this goal by using the least amount of administrative effort.
What should you do?

A.    From Software Restriction Policies, create a path rule.
B.    From Software Restriction Policies, create a hash rule.
C.    From Application Control Policies, create the default rules.
D.    From Application Control Policies, create an executable rule.

Answer: D
Explanation:
Executable Rules
Executable rules apply to files that have .exe and .com file extensions. AppLocker policies are primarily about executable files, and it is likely that the majority of the AppLocker policies that you work with in your organizational environment will involve executable rules.
The default executable rules are path rules that allow everyone to execute all applications in the Program Files folder and the Windows folder. The default rules also allow members of the administrators group to execute applications in any location on the computer. It is necessary to use the default executable rules, or rules that mirror their functionality, because Windows does not function properly unless certain applications, covered by these default rules, are allowed to execute. When you create a rule, the scope of the rule is set to Everyone, even though there is not a local group named Everyone. If you choose to modify the rule, you can select a specific security group or user account. NOT Default rulesDefault rules are a set of rules that can be created automatically and which allow access to default Windows and program files. Default rules are necessary because AppLocker has a built-in fallback block rule that restricts the execution of any application that is not subject to an Allow rule. This means that when you enable AppLocker, you cannot execute any application, script, or installer that does not fall under an Allow rule. There are different default rules for each rule type. The default rules for each rule type are general and can be tailored by administrators specifically for their environments. For example, the default executable rules are path rules. Security-minded administrators might replace the default rules with publisher or hash rules because these are more secure.NOT Path RulesPath rules, allow you to specify a file, folder, or registry key as the target of a Software Restriction Policy. The more specific a path rule is, the higher its precedence. For example, if you have a path rule that sets the file C: \Program files\Application\App.exe to Unrestricted and one that sets the folder C:\Program files\Application to Disallowed, the more specific rule takes precedence and the application can execute. Wildcards can be used in path rules, so it is possible to have a path rule that specifies C:\Program files\Application\*.exe. Wildcard rules are less specific than rules that use a file’s full path. The drawback of path rules is that they rely on files and folders remaining in place. For example, if you created a path rule to block the application
C:\Apps\Filesharing.exe, an attacker could execute the same application by moving it to another directory or renaming it something other than Filesharing.exe. Path rules work only when the file and folder permissions of the underlying operating system do not allow files to be moved and renamed.NOT Hash RulesHash rules, work through the generation of a digital fingerprint that identifies a file based on its binary characteristics. This means that a file that you create a hash rule for will be identifiable regardless of the name assigned to it or the location from which you access it. Hash rules work on any file and do not require the file to have a digital signature. The drawback of hash rules is that you need to create them on a per-file basis. You cannot create hash rules automatically for Software Restriction Policies; you must generate each rule manually. You must also modify hash rules each time that you apply a software update to an application that is the subject of a hash rule. Software updates modify the binary properties of the file, which means that the modified file does not match the original digital fingerprint.

QUESTION 294
You have a computer that runs Windows 7. The IPv6 address of the computer is configured automatically.
You need to identify the IPV6 address of the computer.
What should you do?

A.    At the command prompt, run Netstat.
B.    At the command prompt run Net config.
C.    From the network connection status, click Details.
D.    From network connection properties, select Internet Protocol Version 6 (TCP/IPv6) and click Properties.

Answer: C
Explanation:
You can view a list of all the connection interfaces (wired and wireless) on a computer by opening Network And Sharing Center and clicking Change Adapter Settings. You can right-click any network connection and select Status. If you click Details on the Local Area Connection Status dialog box, you access the Network Connection Details information box. You can configure wireless connection behavior by clicking Change Adapter Settings in Network And Sharing Center, right-clicking your wireless adapter, and clicking Status. Clicking Details on the Status dialog box displays the adapter configuration.

wps94CA.tmp_thumb

QUESTION 295
You have a computer that runs Windows 7.
You need to view the processes that currently generate network activity.
What should you do?

A.    Open Resource Monitor and click the Network tab.
B.    Open Windows Task Manager and click the Networking tab.
C.    Open Event Viewer and examine the NetworkProfile Operational log.
D.    Open Performance Monitor and add all the counters for network interface.

Answer: A
Explanation:
Resource Monitor
Windows 7 offers an enhanced version of the Resource Monitor tool. Windows 7 Resource Monitor allows you to view information about hardware and software resource use in real time. You can filter the results according to the processes or services that you want to monitor. You can also use Resource Monitor to start, stop, suspend, and resume processes and services, and to troubleshoot unresponsive applications.
You can start Resource Monitor from the Processes tab of Task Manager or by entering resmon in the Search box on the Start menu. To identify the network address that a process is connected to, click the Network tab and then click the title bar of TCP Connections to expand the table. Locate the process whose network connection you want to identify.
You can then determine the Remote Address and Remote Port columns to see which network address and port the process is connected to.

wps1263.tmp_thumb

QUESTION 296
You have a computer that runs Windows 7. The computer contains two volumes, C and D.
You create a new folder called D:\Reports.
You need to ensure that all files stored in the Reports folder are indexed by Windows Search.
What should you do?

A.    Enable the archive attribute on the folder.
B.    Modify the Folder Options from Control Panel.
C.    Modify the properties of the Windows Search service.
D.    Create a new library and add the Reports folder to the library.

Answer: D
Explanation:
Libraries enable you to organize files by using metadata about the file, such as author, date, type, tags, and so on-instantly. You’re not limited to just browsing files by folder hierarchy. When you save files in a Library, Windows?7 indexes the files. You can use Library features like the Arrange By control to instantly browse the files in the Library by metadata or use the Search Builder, which is built into the Search box in Windows Explorer, to instantly search the files in the Library by metadata.

QUESTION 297
You have a computer that runs Windows 7.
You update the driver for the computer’s video card and the computer becomes unresponsive. You need recover the computer in the minimum amount of time.
What should you do?

A.    Restart in safe mode and then roll back the video card driver.
B.    Restart in safe mode and then revert the computer to a previous restore point.
C.    Start the computer from the Windows 7 installation media. Select Repair your computer and then select
System Restore.

D.    Start the computer from the Windows 7 installation media. Select Repair your computer and then select
System Image Recovery.

Answer: A
Explanation:
If you install a driver that causes your computer to become unstable, you should first attempt to roll back the driver. If this does not solve the problem, you can restore system files and settings by performing a system restore to restore the computer to its last system restore point. A system restore returns a computer system to a selected restore point. System restores do not alter user files. Note that a system restore is not the same as a System Image restore.

QUESTION 298
You plan to install Windows 7 on a computer that contains a single hard disk drive. The hard disk drive is connected to a RAID controller. During the installation, you discover that the Windows 7 installation media does not include the files required to install the RAID controller.
You need ensure that you can install Windows 7 on the hard disk drive.
What should you do?

A.    Insert the Windows installation media and press remove some files during the computer’s power-on self
test (POST).

B.    Insert the Windows installation media and press F6 during the computer’s power-on self test (POST).

C.    Start the computer from the Windows installation media.
From the Install Windows dialog box, click Load Driver.

D.    Start the computer from the Windows installation media.
From the Install Windows dialog box, click Drive options (advanced).

Answer: C
Explanation:
If your computer has special disk drive hardware, such as a redundant array of independent disks (RAID) array, it may be necessary to use the Load Driver option. It is necessary to use this option only if the disk that you want to install Windows on is not shown as a possible install location. If your disk is shown as an available option, Windows 7 has already loaded the appropriate drivers. Once you select the location where you want to install Windows 7, the Windows 7 installation process begins.

QUESTION 299
You have an offline virtual hard disk (VHD) that contains a generalized installation of Windows 7 Ultimate.
You need to disable the built-in games in the VHD.
You must achieve this goal by using the minimum amount of administrative effort.
What should you do?

A.    Start a computer from the VHD.
Run Ocsetup.exe and specify the /uninstall parameter.
Recapture the VHD.

B.    Start a computer from the VHD.
From Programs and Features, turn off the Games feature and then recapture the VHD.

C.    Create an answer file that has InboxGames disabled.
On a computer that runs Windows 7, attach the VHD.
Run Pkgmgr.exe and specify the /uu parameter.

D.    Create an answer file that has InboxGames disabled.
On a computer that runs Windows 7, attach the VHD.
Run Dism.exe and specify the /apply-unattend parameter.

Answer: D
Explanation:
Dism
Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. /Apply-Unattend (Applies an unattend.xml file to an image.) If you are updating device drivers using an unattended answer file, you must apply the answer file to an offline image and specify the settings in the offlineServicing configuration pass. If you are updating packages or other settings using an unattended answer file, you can apply the answer file to an offline or online image. Specify the settings in the offlineServicing configuration pass.

QUESTION 300
You have a computer that runs Windows 7 Professional.
You need to upgrade the computer to Windows 7 Ultimate.
You must achieve this goal in the minimum amount of time.
What should you do?

A.    Run Windows Update.
B.    Run Windows Anytime Upgrade.
C.    From the Windows 7 installation media, run Setup.exe.
D.    From the Windows 7 installation media, run Migwiz.exe.

Answer: B
Explanation:
Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small businesses where a small number of intra-edition upgrades is required.

wps7116.tmp_thumb

Windows Anytime Upgrade

QUESTION 301
You need to create a VPN connection. What should you do?

A.    From Windows Explorer, right-click Computer and then click Map network drive.
B.    From Windows Explorer, right-click Computer and then click Add a network location.
C.    From Network and Sharing Center, click Set up a new connection or network and then click Set up a new
network.

D.    From Network and Sharing Center, click Set up a new connection or network and then click Connect to a
workplace.

Answer: D
Explanation:
Virtual Private Networks
When you create a VPN connection, you need to specify the address of the VPN server that you are connecting to and your authentication credentials. You can create a new VPN connection in the Network And Sharing Center by clicking Set Up A New Connection Or Network and then Connect to a Workplace. When you create a new VPN connection, Windows 7 sets the VPN type to Automatic. You can configure a connection to use a specific VPN protocol, but if you do this, Windows 7 does not try to use other VPN protocols if the protocol you select is not available.

QUESTION 302
You have two computers named Computer1 and Computer2 that run Windows 7. Computer2 is configured for remote management. From Computer1, you need to remotely execute a third-party command line tool named disk.exe on Computer2.
Which command should you run?

A.    Start disk.exe /d \\computer2
B.    Tscon disk.exe /dest:computer2
C.    Winrm e disk.exe r:computer2
D.    Winrs r:computer2 disk.exe

Answer: D
Explanation:
WinrsYou can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS ?: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS ?:Aberdeen ipconfig.
The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt.

QUESTION 303
You have two computers named Computer1 and Computer2.
You migrate user state data from Computer1 to Computer2.
The migrated data contains several Microsoft Office Excel files.
You need to ensure that you can open the Excel files by using Excel on Computer2.
What should you do?

A.    Install Office.
B.    Disable User Account Control (UAC).
C.    Modify the default program settings.
D.    Run Loadstate.exe /i:migapp.xml.

Answer: A
Explanation:
The applications are required to be installed in order to use the migrated data. In this case Microsoft Office is required to open Excel files.
LoadStateLoadState is run on the destination computer.
You should install all applications that were on the source computer on the destination before you run LoadState. You must run Loadstate. exe on computers running Windows Vista and Windows 7 from an administrative command prompt. To load profile data from an encrypted store named Mystore that is stored on a share named Migration on a file server named Fileserver and which is encrypted with the encryption key Mykey, use this command: loadstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /decrypt /key:”mykey”

QUESTION 304
You have a computer that has the following hardware configuration:
– 1.6 GHz processor (64-bit)
– 8 GB RAM
– 500-GB hard disk
– Graphics card that has 128 MB RAM
You need to select an edition of Window 7 to meet the following requirements:
– Support Direct Access.
– Support Windows XP Mode.
– Use all of the installed memory.
– Support joining an Active Directory domain.
Which edition should you choose?

A.    Windows 7 Enterprise (64-bit)
B.    Windows 7 Enterprise (x86)
C.    Windows 7 Professional (64-bit)
D.    Windows 7 Ultimate (x86)

Answer: A
Explanation:
The only applicable solution is Windows 7 Enterprise (64-bit) as for the following reasons:All versions are support Hardware wise.Requirements:Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements:
– 1 GHz 32-bit (x86) or 64-bit (x64) processor
– 1 GB of system memory
– A 40-GB hard disk
drive (traditional or SSD) with at least 15 GB of available space- A graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver,- Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics memory
XP Mode
Windows XP Mode is a downloadable compatibility option that is available for the Professional, Enterprise, and Ultimate editions of Windows 7. Windows XP Mode uses the latest version of Microsoft Virtual PC to allow you to run an installation of Windows XP virtually under Windows 7.
Use all of the installed memory The x86 version supports a maximum of 4 GB of RAM, whereas the x64 version supports a maximum of 8 GB of RAM.
Windows 7 ProfessionalWindows 7 Professional is available from retailers and on new computers installed by manufacturers. It supports all the features available in Windows Home Premium, but you can join computers with this operating system installed to a domain. It supports EFS and Remote Desktop Host but does not support enterprise features such as AppLocker, DirectAccess, BitLocker, and BranchCache.Windows 7 Enterprise and Ultimate Editions The Windows 7 Enterprise and Ultimate editions are identical except for the fact that Windows 7 Enterprise is available only to Microsoft’s volume licensing customers, and Windows 7 Ultimate is available from retailers and on new computers installed by manufacturers. The Enterprise and Ultimate editions support all the features available in other Windows 7 editions but also support all the enterprise features such as EFS, Remote Desktop Host, AppLocker, DirectAccess, BitLocker, BranchCache, and Boot from VHD.

QUESTION 305
You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. Computer1 has a custom application installed.
You create a custom XML file named app1.xml that contains the migration settings for the application.
You need to migrate the configuration and application data for the custom application from Computer1 to Computer2.
What should you do?

A.    On Computer1, run Loadstate.exe /l:app1.
On Computer2, run Scanstate.exe /l:app1.xml.

B.    On Computer1, run Scanstate.exe /i:app1.xml.
On Computer2, run Loadstate.exe /i:app1.xml.

C.    On Computer1, run Loadstate.exe /keyfile:app1.xml.
On Computer2, run Loadstate.exe /keyfile:app1. xml.

D.    On Computer1, run Scanstate.exe /genconfig:app1.xml.
On Computer2, run Loadstate.exe /config: app1.xml.

Answer: B
Explanation:
User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState. (include) /i:[Path\]FileName Specifies an .xml file that contains rules that define what user, application or system state to migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml, MigUser.xml and any custom .xml files that you create). Path can be either a relative or full path. If you do not specify the Path variable, then FileName must be located in the current directory.


Guaranteed 100% Microsoft 70-680 Exam Pass OR Full Money Back! Braindump2go Provides you the latest 70-680 Dumps PDF & VCE for Instant Download!

120[2][2]

http://www.braindump2go.com/70-680.html