High quality 70-680 Exam Questions 2021

Proper study guides for 70-680 TS:Windows 7,Configuring certified begins with exam 70 680 preparation products which designed to deliver the microsoft 70 680 by making you pass the 70-680 test at your first time. Try the free 70 680 pdf right now.

Online Microsoft 70-680 free dumps demo Below:

NEW QUESTION 1
You have a computer that runs windows 7.
You log on to the computer by using a user account that is a member of Administrator Group.
From Windows Explorer you open C:windowssystem32driversetchosts in notepad.
You attempt to save the file and receive the save as dialog box.
You need to ensure that you can save changes to c:windowssystem32drivers
What should you do?

  • A. Stop the windows search service
  • B. Remove the inherited permissions from the fil
  • C. Start Windows Notepad by using elevated privilege
  • D. Change the user account control (UAS) settings to Notify Me Only when programs try to make changes to my compute

Answer: C

Explanation:
Windows 7 does not allow applications to write data to these secure locations.
User Account Control (UAC)UAC is a security feature of Windows 7 that informs you when
the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks.Privilege elevationAll users of clients running Windows 7 run with the rights of a standard user. When a user attempts an act that requires administrative privileges, such as creating a new user account, her rights need to be raised from those of a standard user to those of an administrative user. This increase in rights is termed privilege elevation. UAC is a gateway to privilege elevation. It allows users who are members of the local Administrators group to access administrative rights, but ensures that the person accessing the Administrative rights is aware that they are doing so. This privilege elevation occurs only for a specific task. Another task executed at the same time that also requires privilege elevation generates its own UAC

NEW QUESTION 2
A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named
Group1. The computer contains a folder named Folder1. The permissions for User1 are shown in the User1 Permissions exhibit. (Click the Exhibit button.)
70-680 dumps exhibit
The permissions for Group1 are shown in the Group1 Permissions exhibit. (Click the Exhibit button.)
70-680 dumps exhibit
You need to ensure that User1 can create files in Folder1. All other members of Group1 must be prevented from creating files in Folder1. What should you do?

  • A. On Folder1, assign the Full control permission to User1.
  • B. On Folder1, remove the Deny - Write permission for Group1.
  • C. Share Folder1. Assign User1 the Read and Change share permissio
  • D. Share Folder1. Assign Group1 the Read and Change share permissio

Answer: B

NEW QUESTION 3
You have a computer named Computer1 that runs Windows 7.
You need to configure Computer1 to support the collection of Windows system events from other computers.
Which command should you run?

  • A. Wecutil.exe qc
  • B. Winrm.exe quickconfig
  • C. Winrs r: Computer1
  • D. Wmic /aggregate

Answer: A

Explanation:
Wecutil To configure a computer running Windows 7 to collect events, open an elevated command prompt and enter the following command to configure the Windows Event Collector service: wecutil qc{qc | quick-config}Configures the Windows Event Collector service to ensure a subscription can be created and sustained through reboots. This includes the following steps:
8. Enable the ForwardedEvents channel if it is disabled.
9. Set the Windows Event Collector service to delay start.
10. Start the Windows Event Collector service if it is not running.

NEW QUESTION 4
You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1 attempts to access a Web page.
User1 fails to access the Web page and receives an error message stating that the page does not have a rating.
You need to configure Internet Explorer to allow User1 to access Web pages that do not have a rating.
Which settings should you modify?

  • A. Content Advisor
  • B. InPrivate Filtering
  • C. Parental Controls
  • D. Restricted Sites

Answer: A

Explanation:
Using Content Advisor to help block inappropriate web content The Internet is a great resource for children, offering a wealth of information and experiences. However, it can also expose children to information that might not be appropriate for them. Content Advisor allows you to control the types of Internet content that can be viewed on your computer. Depending on how you configure it, Content Advisor uses ratings that websites voluntarily provide to block or allow certain content. Because not all websites are rated, unrated websites are automatically blocked (but you can choose to allow them). Once you've adjusted the settings and turn Content Advisor on, it checks websites as you visit them. To use Content Advisor, you first need to create the supervisor password, and then you can specify the filters and rules you want applied to your children's web use. To change settings, you'll need to log in with the supervisor password before you can make changes. The following procedures describe how to create or change your supervisor password, and how to make specific changes to control Internet use. To allow unrated sites By default, content advisor will block unrated websites. To allow unrated sites to be viewed, follow the steps below.
9. Click to open Internet Explorer.
10. Click the Tools button, and then click Internet Options.
11. Click the Content tab, and then, under Content Advisor, click Settings. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
12. In the Supervisor Password Required dialog box, type your password, and then click OK.
13. In the Content Advisor dialog box, click the General tab.
14. Under User options

NEW QUESTION 5
You have a computer that runs Windows 7.
The computer is configured to use an intranet Microsoft update service location.
You need to view the name of the intranet service location.
What should you do?

  • A. At a command prompt, run Wusa.ex
  • B. Open Event Viewer and examine the Application lo
  • C. Open Windows Update and click View update histor
  • D. Review the contents of the C:windowswindowsupdate.log fil

Answer: D

Explanation:
WindowsUpdate.log Provides information about when the Windows Update Agent connects to the WSUS server and retrieves the software updates for compliance assessment and whether there are updates to the agent components.

NEW QUESTION 6
You have a virtual hard disk (VHD) and a computer that runs Windows 7.
The VHD has Windows 7 installed.
You need to start the computer from the VHD.
What should you do?

  • A. Run the System Configuration Utility and modify the Boot sectio
  • B. Run the System Configuration Utility and modify the Startup sectio
  • C. Run Bootcfg.exe and specify the /Copy paramete
  • D. Run Bcdedit.exe and modify the Windows Boot Manager setting

Answer: D

NEW QUESTION 7
You have two computers named Workstation! and Workstation2 that have Windows 7 SP1 installed.
You connect to Workstation2 from Workstation1 by using Remote Desktop.
You need to be able to copy files between the computers during the Remote Desktop session.
What should you do?

  • A. On Workstation2, open Remote Desktop Connection and configure the Local devices and resources setting
  • B. On Workstation1, open Remote Desktop Connection and configure the Local devices and resources setting
  • C. On Workstation2, type MSTSC /v:Computer1 /f /consol
  • D. On Workstation1, open Remote Desktop Connection and configure the Connect from Anywhere setting

Answer: B

Explanation:
How can I use my devices and resources in a Remote Desktop session? Redirecting a device on your computer makes it available for use in a Remote Desktop session. If you have a recent version of Remote Desktop, you can redirect most devices, including printers, smart cards, serial ports, drives, Plug and Play devices, media players based on the Media Transfer Protocol (MTP), and digital cameras based on the Picture Transfer Protocol (PTP). Some USB devices can be redirected, and you can also redirect your Clipboard.
70-680 dumps exhibit
70-680 dumps exhibit

NEW QUESTION 8
HOTSPOT
You are running windows 7 on a portable computer. A custom power plan named "On The Move" is optimized for battery life.
The computer enters sleep mode when the portable computer is closed.
You need to change a setting so that when you close the portable computer, nothing happens.
Which setting should you change? (To answer, select the appropriate setting in the work area.)
70-680 dumps exhibit

    Answer:

    Explanation: 70-680 dumps exhibit

    NEW QUESTION 9
    You have an answer file for a Windows 7 installation.
    You need to perform an unattended installation of Windows 7 by using the answer file.
    You must achieve this goal by using the minimum amount of administrative effort.
    What should you do?

    • A. Name the answer file autounattend.ini and save it to a USB dis
    • B. Start the computer from the Windows 7 DV
    • C. Name the answer file unattend.txt and save it to a USB dis
    • D. Start the computer from the Windows Preinstallation Environment (Windows PE).
    • E. Name the answer file autounattend.xml and save it to a USB dis
    • F. Start the computer from the Windows 7 DV
    • G. Name the answer file unattend.xml and save it to a USB dis
    • H. Start the computer from the Windows Preinstallation Environment (Windows PE).

    Answer: C

    Explanation:
    Unattended installation You can perform an unattended installation of Windows 7 by using an installation file called Unattend.xml. These installation files store answers to the questions asked by the Setup Wizard. When the Windows 7 installation process starts, Windows checks for attached USB storage devices that have this file in their root directory. Unattended installations are suitable when you need to deploy Windows 7 to a large number of computers because you do not have to interact with them manually, responding to prompts, as the installation progresses.Building a Reference Installation You configure your reference computer with a customized installation of Windows 7 that you then duplicate onto one or more destination computers. You can create a reference installation by using the Windows product DVD and (optionally) the answer file you created in the previous section. To install your reference computer using an answer file, perform the following procedure:
    1. Turn on the reference computer. Insert the Windows 7 product DVD and the UFD containing the answer file (Autounattend.xml) that you created in the previous section. Note that the use of an answer file is optional, although it is the method Microsoft recommends. If you prefer, you can install Windows 7 manually from the installation DVD-ROM.
    2. Restart the computer by pressing CTRL+ALT+DEL. You may have to override the boot order to boot from the CD/DVD-ROM disk. If so, select the appropriate function key to override the boot order during initial boot. Windows Setup (Setup.exe) starts automatically and searches the root directory of all removable media for an answer file called Autounattend.xml.
    3. After Setup finishes, you can validate that all customizations were applied. For example, if you included the optional Microsoft-Windows-IE-InternetExplorer feature and set the Home_Page setting in your answer file, you can verify these settings by opening Internet Explorer.
    4. To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart.

    NEW QUESTION 10
    Your network has a main office and a branch office.
    The branch office has five client computers that run Windows 7 and a server that runs Windows Server 2008 R2. The branch office server is enabled for BranchCache.
    You need to configure Windows Firewall on each client computer so that cached content can be retrieved from the branch office server.
    Which firewall rule should you enable on the client computers?

    • A. BranchCache - Content Retrieval (Uses HTTP)
    • B. BranchCache - Hosted Cache Server (Uses HTTPS)
    • C. BranchCache - Peer Discovery (Uses WSD)
    • D. File and Printer Sharing

    Answer: A

    Explanation:
    Configure domain member client distributed cache mode firewall rules When you configure BranchCache in distributed cache mode, BranchCache client computers use the Hypertext Transfer Protocol (HTTP) for data transfer with other client computers. BranchCache client computers also use the Web Services Dynamic Discovery (WS-Discovery) protocol when they attempt to discover content on client cache servers. You can use this procedure to configure client firewall exceptions to allow incoming HTTP and WS-Discovery traffic on client computers that are configured for distributed cache mode. The BranchCache – Content Retrieval (Uses HTTP) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on TCP port 80. This rule is required for both Hosted Cache and Distributed Cache mode. The BranchCache – Peer-Discovery (Uses WSD) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on UDP port 3702. This rule is only required when using Distributed Cache mode. The BranchCache – Hosted Cache Client (HTTPS-Out) predefined rule. It this rule is not available, configure a rule that allows outbound traffic on TCP port 443. This rule is required only when using Hosted Cache mode.

    NEW QUESTION 11
    You have a computer that runs Windows 7.
    You manually create a system restore point.
    You need to restore a copy of a file stored on a drive C from two days ago.
    You must act with minimum administrative effort.
    What should you do?

    • A. From recovery, select System Restor
    • B. From Backup and restore, select Rrestore my file
    • C. From the command prompt, run Wbadmin get item
    • D. From the properties of the file, select Previous Version

    Answer: D

    Explanation:
    How do I view or restore previous versions of a file and folder? Right-click the file or folder, and then click Restore previous versions. You'll see a list of available previous versions of the file or folder. The list will include files saved on a backup (if you're using Windows Backup to back up your files) as well as restore points. To restore a previous version of a file or folder that's included in a library, right-click the file or folder in the location where it's saved, rather than in the library. For example, to restore a previous version of a picture that's included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions. For more information about libraries, see Include folders in a library.
    70-680 dumps exhibit
    The Previous Versions tab, showing some previous versions of files
    NOT System Restore: System Restore restores system files and settings and does not affect any of your documents, pictures, or other personal data.
    NOT Backup and Restore: System restore point was created, no backup meantioned.NOT Wbadmin: The Backup And Restore console does not provide a graphical tool for scheduling System Image backups. You need to create a System Image backup manually from the Backup And Restore console whenever you have made significant changes to a computer's configuration. Take care that if you restore a System Image backup and boot from it, or if you make the VHD bootable for failover protection, your computer could be vulnerable unless the System Image includes security updates. Although you cannot use Backup And Restore to schedule System Image backups, you can use the Wbadmin command-line utility to perform this function. For example, to initiate a System Image backup of the C: drive to the H: drive, you run the following command from an elevated command prompt: wbadmin start backup –backuptarget:h: -include:c: -quiet

    NEW QUESTION 12
    You have a computer that runs Windows 7.
    You need to modify the file extensions that are associated to Internet Explorer.
    What should you do?

    • A. From Internet Explorer, click Tools and then click Manage Add-on
    • B. From Control Panel, open Default Programs and then click Set Association
    • C. From the local Group Policy, expand Computer Configuration and then click Software Setting
    • D. From Window Explorer, right-click %programfiles%Internet Exploreriexplore.exe and then click Propertie

    Answer: B

    NEW QUESTION 13
    DRAG DROP
    A company has an Active Directory forest which is shown in the following graphic.
    70-680 dumps exhibit
    The company's client computers run Windows 7. You deploy BitLocker Drive Encryption on all the client computers.
    You need to configure BitLocker Drive Encryption to back up recovery information to Active Directory for BitLocker protected drives and the Trusted Platform Module (TPM).
    Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
    70-680 dumps exhibit

      Answer:

      Explanation: 70-680 dumps exhibit

      NEW QUESTION 14
      You have a computer that runs Windows 7. The network connection details are shown in the exhibit. (Click the Exhibit button.)
      70-680 dumps exhibit
      You need to manually assign an IP address of 192.168.1.50 to the computer.
      What should you do first?

      • A. Enable TCP/IPv4.
      • B. Disable TCP/IPv6.
      • C. Run Ipconfig and specify the /renew paramete
      • D. Run Netsh and specify the Interface ipv4 add address comman

      Answer: A

      Explanation:
      IPv4 is not currently enabled and 192.168.1.50 is an IPv4 address.Therefore IPv4 is required so ENABLE it.

      NEW QUESTION 15
      You have a computer that runs Windows 7.
      Your network contains a VPN server that runs Windows Server 2008.
      You need to authenticate to the VPN server by using a smart card.
      Which authentication setting should you choose?

      • A. CHAP
      • B. EAP
      • C. MS-CHAP v2
      • D. PAP

      Answer: B

      Explanation:
      VPN Server Software Requirements VPN server software requirements for smart card access are relatively straightforward. The remote access servers must run Windows 2000 Server or later, have Routing and Remote Access enabled, and must support Extensible Authentication Protocol-Transport Layer Security (EAP-TLS). EAP-TLS is a mutual authentication mechanism developed for use in conjunction with security devices, such as smart cards and hardware tokens. EAP-TLS supports Point-to-Point Protocol (PPP) and VPN connections, and enables exchange of shared secret keys for MPPE, in addition to Ipsec. The main benefits of EAP-TLS are its resistance to brute-force attacks and its support for mutual authentication. With mutual authentication, both client and server must prove their identities to each other. If either client or server does not send a certificate to validate its identity, the connection terminates.Microsoft Windows Server. 2003 supports EAP-TLS for dial-up and VPN connections, which enables the use of smart cards for remote users. For more information about EAP-TLS, see the Extensible Authentication Protocol (EAP) topic at www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/auth_eap. mspx. For more information about EAP certificate requirements, see the Microsoft Knowledge Base article "Certificate Requirements when you use EAP-TLS or PEAP with EAP-TLS" at http://support.microsoft.com/default.aspx? scid=814394.

      NEW QUESTION 16
      You have a workgroup that contains five computers. The computers run Windows 7.
      A computer named Computer1 has video and audio files.
      You need to share Computer1's video and audio files on the network.
      Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

      • A. Create a HomeGrou
      • B. Move the files to a Media Librar
      • C. Enable all BranchCache rules in Windows Firewal
      • D. Connect a removable drive and enable BitLocker To G

      Answer: AB

      Explanation:
      HomeGroup ConnectionsThis option decides how authentication works for connections to HomeGroup resources. If all computers in the HomeGroup have the same user name and passwords configured, you can set this option to allow Windows to manage HomeGroup connections. If different user accounts and passwords are present, you should configure the option to use user accounts and passwords to connect to other computers. This option is available only in the Home/Work network profile.Media Library SharingBefore you turn on Media Library Sharing for a shared folder, you should know that Media Library Sharing bypasses any type of user-account access that you set for the shared folder. For example, let's say that you turn on Media Library Sharing for the Photos shared folder, and you set the Photos shared folder to No Access for a user account named Bobby. Bobby can still stream any digital media from the Photos shared folder to any supported digital media player or DMR. If you have digital media that you do not want to stream in this manner, store the files in a folder that does not have Media Library Sharing turned on. If you turn on Media Library Sharing for a shared folder, any supported digital media player or DMR that can access your home network can also access your digital media in that shared folder. For example, if you have a wireless network and you have not secured it, anybody within range of your wireless network can potentially access your digital media in that folder. Before you turn on Media Library Sharing, make sure that you secure your wireless network. For more information, see the documentation for your wireless access point.

      NEW QUESTION 17
      You have two computers named Computer1 and Computer2 that run Windows 7.
      You need to ensure that Computer2 has exactly the same firewall rules as Computer1.
      What should you do on Computer1?

      • A. Run Winrm.exe quickconfi
      • B. From Windows Firewall with Advanced Security, select Export Polic
      • C. From Windows Firewall with Advanced Security, click Inbound Rules and then click Export Lis
      • D. Open Local Security Polic
      • E. Right-click IP Security Policies on Local Computer and then click Export Lis

      Answer: B

      Explanation:
      Importing and Exporting Firewall ConfigurationMost organizations that use clients running Windows 7 apply firewall rules through Group Policy. In the event that you need to support a number of stand-alone clients running Windows 7, you can replicate complex firewall configurations using the WFAS Import Policy and Export Policy options. Importing and exporting policy also allows you to save the current firewall configuration state before you make changes to it. Exported policy files use the .wfw extension. Exported policies use a binary format, not Extensible Markup Language (XML) format like many other Windows 7 configuration files. You can also export and import firewall policies in the same .wfw format using the netsh advfirewall export or netsh advfirewall import commands.

      NEW QUESTION 18
      You have a portable computer that runs Windows 7. Windows Backup is configured to run every day at 15:00.
      You need to prevent backups from automatically running when the computer is running on the battery.
      What should you do?

      • A. From Backup and Restore, click Change setting
      • B. From Task Scheduler, modify the Automatic Backup tas
      • C. From Power Options, modify the settings of the current power pla
      • D. From the local computer policy, modify the power management setting

      Answer: B

      Explanation: To set power management options for a scheduled task
      -Open Task Scheduler.
      -Right-click the task for which you want to set power management options, and then click Properties.
      -On the Settings tab, under Power Management, do one or more of the following:
      -To conserve the battery power of your computer, select the Don't start the task if the computer is running on batteries check box.
      -To stop the task if the computer starts running on battery power, select the Stop the task if battery mode begins check box.
      -To wake your computer from hibernation or standby to run a task, select the Wake the computer to run this task check box.
      Task Scheduler
      With Scheduled Tasks, you can schedule any script, program, or document to run at a time that is most convenient for you. Scheduled Tasks starts every time that you start Windows and runs in the background, and it starts each task that you schedule at the time that you specify when you create the task.

      100% Valid and Newest Version 70-680 Questions & Answers shared by Certleader, Get Full Dumps HERE: https://www.certleader.com/70-680-dumps.html (New 564 Q&As)