70-680 preparation exams(391 to 405) for client: Mar 2016 Edition

Question No. 391

- (Topic 3) 

You plan to deploy Windows 7 by using a virtual hard disk (VHD). 

You need to ensure that when a computer starts from the VHD, the Windows 7 installation programs will run the out-of-box-experience (OOBE) portion of the setup. 

What should you do? 

A. Copy install.wim from the Windows 7 installation media to the VHD. 

B. Use ImageX to apply install.wim from the Windows 7 installation media to the VHD. 

C. Start the computer by using the Windows 7 installation media and then select Install now. 

D. Start the computer by using the Windows Preinstallation Environment (Windows PE) and then run Diskprep.exe. 

Answer:

Explanation: 

WIM images are file-based and can be installed on a VHD or placed on a network share for distribution. You can store several images in the same WIM file. Talks about Capturing the Installation onto a Network Share, but still applies. You can capture an image of your reference computer by using Windows PE and the ImageX tool. Then you store that image on a network share. Alternatively, on a computer running Windows 7 Enterprise or Ultimate edition, you can store the image on a VHD and make that VHD bootable. To capture the installation image you have created on your reference computer to a network share, perform the following procedure: 

1. Insert your Windows PE media into your reference computer and restart the computer. As before, you may have to override the boot order to boot from the CD/DVD-ROM drive. If so, select the appropriate function key to override the boot order during initial boot. 

2. Windows PE starts and opens a command-prompt window. Use the ImageX tool located on your Windows PE media to capture an image of your reference computer installation. For example, if your optical drive is drive E:, your installation is on drive C:, and you want to capture the image on drive D:, you would enter: e:\imagex.exe /capture C: d:\installationimage.wim "my Win7 Install" /compress fast /verify 

3. Copy the image to a network location. For example, enter: net use y: \\network_share\images copy d:\myimage.wim y: 

4. If necessary, provide network credentials for appropriate network access. Your image is now on volume Y: 


Question No. 392

- (Topic 6) 

You are a network administrator for a global company that has Windows Server 2008 R2 servers and Windows 7 Enterprise computers. 

Management wants to decrease VPN costs by implementing DirectAccess for remote network access. 

They assign you to evaluate the current network infrastructure, which includes the following elements: 

Active Directory 

IPv6 network and applications 

Server for DirectAccess service 

You need to ensure that all critical infrastructure components are present. 

What should you add to the infrastructure? 

A. Windows Internet Name Service (WINS) server 

B. Public key infrastructure 

C. NAT-PT devices 

D. Windows Server 2012 

Answer:

Explanation: DirectAccess With Windows Server 2008 R2 requires: 

* Public key infrastructure (PKI) to issue computer certificates. 

* One or more DirectAccess servers running Windows Server 2008 R2 with two network adapters: one that is connected directly to the Internet, and a second that is connected to the intranet. 

* On the DirectAccess server, at least two consecutive, public IPv4 addresses assigned to the network adapter that is connected to the Internet. 

* DirectAccess clients running Windows 7 or Windows 8 "Enterprise" edition clients 

* At least one domain controller and Domain Name System (DNS) server running Windows Server 2008 SP2 or Windows Server 2008 R2. 

Note: DirectAccess, also known as Unified Remote Access, is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet. Unlike many traditional VPN connections, which must be initiated and terminated by explicit user action, DirectAccess connections are designed to connect automatically as soon as the computer connects to the Internet. DirectAccess was introduced in Windows Server 2008 R2, providing this service to Windows 7 and Windows 8 "Enterprise" edition clients. 


Question No. 393

- (Topic 5) 

Your company network has a single-domain Active Directory forest. The forest functional level is set to Windows Server 2008 R2. All computers are members of the domain. 

You plan to deploy Windows BitLocker Drive Encryption (BitLocker) on portable computers that have Windows 7 Enterprise installed. 

You need to be able to automatically back up recovery passwords for BitLocker-protected disk volumes on the portable computers. 

What should you do before you start encrypting the disk volumes with BitLocker? 

A. Run the cscript Get-TPMOwnerlnfo.vbs script on the client computers. 

B. Select the Turn on BitLocker backup to Active Directory option in local policy on the portable computers. 

C. Run the cscript Get-BitLockerRecoverylnfo.vbs script on the portable computers. 

D. Run the Idifde -i -v -f BitLockerTPMSchemaExtension.ldf -c script on a domain controller. 

Answer:


Question No. 394

- (Topic 5) 

You administer a computer that has Windows 7 and Internet Explorer 8 installed. A user has installed a third-party toolbar in Internet Explorer 8. 

You need to permanently remove the toolbar. 

What should you do? 

A. From Programs and Features in the Control Panel, uninstall the toolbar. 

B. From an elevated command prompt, run °/osystemdrive°/o\Program Files\Internet Explorer\iecleanup.exe. 

C. From Internet Explorer, launch Manage Add-ons and disable the toolbar. 

D. Start Internet Explorer in an InPrivate Browsing session. 

Answer:


Question No. 395

- (Topic 3) 

Your network contains computers that run either Windows Vista (x86) or Windows 7 (x86). All computers are joined to a domain. 

You install a computer named Computer1 that runs Windows 7 (64-bit). You share a printer named Printer1 on Computer1. 

You need to ensure that any user can automatically download and install the drivers for Printer1. 

What should you do from Printer Properties? 

A. Install a new driver. 

B. Enable bidirectional support. 

C. Modify the Additional Drivers settings. 

D. Assign the Manage this printer permission to the Domain Users group. 

Answer:

Explanation: 

If you are going to be sharing a printer with computers running previous versions of Microsoft Windows, you can add the drivers for the printer using Additional Drivers. When you add additional drivers, other computers on the network that do not have the printer drivers installed are able to download them from the computer that is sharing the printer. 


70-680 training

Question No. 396

DRAG DROP - (Topic 6) 

You capture a Windows Image (.wim) file from a reference computer. 

You want to use Windows Deployment Services (WDS) in an unattended mode to deploy the image f\\e to target desktops. 

You need to encrypt an administrator account password in the answer file used for the image deployment. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 


Answer: 



Question No. 397

- (Topic 1) 

You have a computer that runs Windows 7. 

You need to view the processes that currently generate network activity. 

What should you do? 

A. Open Resource Monitor and click the Network tab. 

B. Open Windows Task Manager and click the Networking tab. 

C. Open Event Viewer and examine the NetworkProfile Operational log. 

D. Open Performance Monitor and add all the counters for network interface. 

Answer:

Explanation: 

Resource Monitor Windows 7 offers an enhanced version of the Resource Monitor tool. Windows 7 Resource Monitor allows you to view information about hardware and software resource use in real time. You can filter the results according to the processes or services that you want to monitor. You can also use Resource Monitor to start, stop, suspend, and resume processes and services, and to troubleshoot unresponsive applications. You can start Resource Monitor from the Processes tab of Task Manager or by entering resmon in the Search box on the Start menu. To identify the network address that a process is connected to, click the Network tab and then click the title bar of TCP Connections to expand the table. Locate the process whose network connection you want to identify. You can then determine the Remote Address and Remote Port columns to see which network address and port the process is connected to. 



Question No. 398

- (Topic 2) 

You are installing a 64bit edition of Windows 7. During the installation, you receive an error message when you attempt to add mass storage driver. You need to complete the installation of Windows 7. You start the computer from the Windows 7 installation media. What should you do next? 

A. From the Install Windows dialog box, click RESCAN. 

B. From the Install Windows dialog box, click DRIVE OPTIONS (ADVANCED) 

C. From the Advanced Boot options menu, select SAFE MODE. 

D. From the Advanced Boot options menu, select DISABLE DRIVER SIGNATURE ENFORCEMENT. 

Answer:


Question No. 399

- (Topic 1) 

Which of the following is true of Windows 7? 

A. MailCentral is included as the new default mail client with Windows 7. 

B. Outlook Express is included with Windows 7. 

C. Microsoft Outlook is included with Windows 7. 

D. There is no preinstalled mail client included with Windows 7. 

Answer:


Question No. 400

- (Topic 4) 

Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BrachCache features installed. 

You create a shared folder on the server and enable BranchCache on the shared folder. 

You discover that the users of the client computers are unable to access files in the shared folder. 

You need to provide access for the users to the shared folder. 

What should you do? 

A. Run the Netsh branchcache set service mode=HOSTEDSERVER client authentication=NONE command 

B. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80. 

C. Create a Group Policy that sets Hash Publication for BranchCache as disabled. 

D. Run the netsh branchcache set service mode=DISTRIBUTED command. 

E. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option. 

F. Check permissions. 

G. Run the netsh branchcache set service mode=HOSTEDCLIENT command. 

H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy. 

I. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443. 

Answer:

Explanation: 

Have the users been given access to the files (what does BranchCache have to do with accessing files locally etc). 


70-680 rapidshare

Question No. 401

HOTSPOT - (Topic 6) 

A company has Windows XP, Windows vista, and windows 7 computers. You receive the following emails. 

Email 1 

From: Company CIO 

Message: We are in the process of upgrading all computers. We need to ensure that everyone is running Windows 7. 

Email 2 

From: System Administrator 

Message: During the upgrades of all of the computers, we need to make sure we keep the user's Favorites folder, My Documentsfolder, and Outlook archive files. 

Email 3 

From: Accounting Department Message: Our payroll application does NOT work on Windows 7. Should we be worried? Consider each of the following statements. Does the information in the three emails support 

the inference as stated? (This question is worth three points. ) 


Answer: 



Question No. 402

- (Topic 2) 

You have a computer that runs Windows 7. IPv6 is disabled on the computer. 

The computer has the following IPv4 settings: 

IP address: 10.1.1.193 

Subnet mask: 25S.255.0.0 

Default gateway: 10.1.1.194 

. Preferred DNS server: 10.1.1.195 

You need to ensure that the computer can only communicate with computers on the local subnet. 

What should you do? 

A. Delete the default gateway address. 

B. Delete the preferred DNS server IP address 

C. Configure the subnet mask to use 255.255.255.0 

D. Configure the subnet mask to use 255.255.255.192 

Answer:

Explanation: 

Why gateways work Default gateways are important to make IP routing work efficiently. In most cases, the router that acts as the default gateway for TCP/IP hosts--either a dedicated router or a computer that connects two or more network segments--maintains knowledge of other networks in the larger network and how to reach them. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain extensive and continuously updated knowledge about individual remote IP network segments. Only the router that acts as the default gateway needs to maintain this level of routing knowledge to reach other remote network segments in the larger internetwork. If the default gateway fails, communication beyond the local network segment may be impaired. To prevent this, you can use the Advanced TCP/IP Settings dialog box (in Network Connections) for each connection to specify multiple default gateways. You can also use the route command to manually add routes to the routing table for heavily used hosts or networks. 


Question No. 403

- (Topic 6) 

You manage Windows 7 computers in your company. 

The company uses a file share to store files. A group currently has permissions to access the share, but not the files in it They need permissions to update and delete files in the share but not to modify the permissions on the files. 

You need to grant NTFS permissions to the group by using the standard permissions dialog. 

Which permission(s) should you grant the group on the folder? 

A. Read and Execute 

B. Modify 

C. Full Control 

D. Write 

Answer:

Explanation: Ref: http://msdn.microsoft.com/en-us/library/bb727008.aspx 


Question No. 404

- (Topic 5) 

You administer client computers that have Windows 7 Enterprise installed for the marketing department of your company. The client computers are members of a single Active Directory domain. All regular client computer user accounts are members of the domain security group named Marketing. 

You install a new printer on one of the client computers. You remove the Everyone group from the access control list (ACL) for the printer, and then share the printer. 

You need to achieve the following goals: 

. Prevent members of the Marketing group from modifying the print jobs of other users. 

. Ensure that members of the Marketing group can modify the print jobs that they submit. 

What should you do? 

A. Modify local Group Policy on the desktops and disable the Point and Print Restrictions user right to the Marketing group. 

B. From the printer's properties, assign the Print permission to the Marketing group. 

C. From the printer's properties, assign the Manage Documents permission to the Marketing group. 

D. Modify local Group Policy on the desktops and assign the Take ownership of files or other objects user right to the Marketing group. 

Answer:


Question No. 405

- (Topic 5) 

Your company has an Active Directory domain and several branch locations. All sales employees use portable computers that have Windows 7 Enterprise installed. 

Employees report that when they travel to different branch locations, documents that must be printed are sent to printers in their home office. 

You need to ensure that documents that must be printed are automatically sent to printers at their current locations. 

What should you do first? 

A. Publish all printers to Active Directory. 

B. From Devices and Printers, select Change my default printer when I change networks. 

C. From Devices and Printers, select the branch office printer, and then select set as default. 

D. Configure alternate IP settings. 

Answer: