Tips for cbt nuggets 70-680

Relying on outstanding technology, better service for patrons. Examcollection offer you Round-the-clock customer support regarding Microsoft examinee and you can obtain what you would like understand at any time. The fulfillment of our own 70-680 is the service objective, their shared improvement with consumers is the prolonged goal inside a large number. Therefore please dont wait to get hold of all of us when you have questions associated with 70-680 test.

2016 Jun windows 7 70-680 practice exam:

Q301. - (Topic 2) 

Your network consists of a single Active Directory domain named contoso.com. 

You have a server named Server1 that runs a custom network application. 

Server1 has the following IP addresses: 

. 192.168.15.10 

. 192.168.15.11 

You need to ensure that a client computer resolves server1.contoso.com to only the 192.168.15.11 IP address. 

What should you do from the computer? 

A. Edit the hosts file 

B. Edit the lmhosts file 

C. Run Ipconfig.exe /flushdns 

D. Run Netsh interface ipv4 reset 

Answer: A 

Explanation: 

Differences Between the HOSTS and LMHOSTS Files in Windows NT In Windows NT, the HOSTS file is for TCP/IP utilities, and the LMHOSTS file is for LAN Manager NET utilities. If you cannot PING another computer (using a friendly name), check the HOSTS file. If you cannot NET VIEW a server using only the TCP/IP protocol, check the LMHOSTS file. 

Hosts fileThe Hosts file is a common way to resolve a host name to an IP address through a locally stored text file that contains IP-address-to-host-name mappings. On most UNIX-based computers, this file is /etc/hosts. On Windows-based computers, this file is the Hosts file in the systemroot\System32\Drivers\Etc folder. The following describes the attributes of the Hosts file for Windows: A single entry consists of an IP (IPv4 or IPv6) address and one or more host names. The Hosts file is dynamically loaded into the DNS client resolver cache, which Windows Sockets applications use to resolve a host name to an IP address on both local and remote subnets. When you create entries in the Hosts file and save it, its contents are automatically loaded into the DNS client resolver cache. The Hosts file contains a default entry for the host name localhost. The Hosts file can be edited with any text editor. Each host name is limited to 255 characters. Entries in the Hosts file for Windows–based computers are not case sensitive. The advantage of using a Hosts file is that users can customize it for themselves. Each user can create whatever entries they want, including easy-to-remember nicknames for frequently accessed resources. However, the individual maintenance required for the Hosts file does not scale well to storing large numbers of FQDN mappings or reflecting changes to IP addresses for servers and network resources. The solution for the large-scale storage and maintenance of FQDN mappings is DNS. The solution for the maintenance of FQDN mappings for changing IP addresses is DNS dynamic update.NOT LMHOSTS FileThe LMHOSTS file is a local text file that maps IP addresses to NetBIOS names of remote servers with which you want to communicate over the TCP/IP protocol. Windows recognizes names instead of IP addresses for network requests and a name discovery process is used to correctly route network requests with TCP/IP. Because the name discovery process is generally not routed by an IP router, the LMHOSTS file allows Windows machines to communicate using TCP/IP across a subnet. 

-LMHOSTS contains IP address to "NetBIOS over TCP/IP" name translations. 

-LMHOSTS is only used by the NBT (NetBIOS over TCP/IP) interface. 

-LMHOSTS file contains some valuable additions to the LAN Manager and Windows for Workgroups 

-LMHOSTS file, such as the ability to support routed domain logon validation. 

-LMHOSTS contains static information about TCP/IP addresses, but using logon scripts and/or the replicator service, the "master" file can be distributed transparently across all stations. 

-By default, the LMHOSTS file should be located in the directory %SYSTEMROOT%\SYSTEM32\DRIVERS \ETC (usually C:\WINNT\SYSTEM32\DRIVERS\ETC). 

Other info http://support.microsoft.com/kb/105997 


Q302. - (Topic 2) 

Which of the following steps will keep a Microsoft Word shortcut icon on the Taskbar after the next reboot? 

A. Copy and paste a Microsoft Word icon to the Taskbar. 

B. Right click on the Microsoft Word icon and choose, "Staple to Superbar". 

C. Right click on the Microsoft Word icon and choose, "Pin this programm to taskbar". 

D. Open Microsoft Word. While the Icon is on the Taskbar, right click the icon and choose, "Pin this program to taskbar". 

Answer: D 


Q303. - (Topic 5) 

All client computers in your company network have Windows 7 Professional installed. The computers are configured with automatic scheduled Microsoft updates installation. 

You receive a support call indicating that after the recently installed update, one of the business applications is unable to start on the computers. 

You need to remove the most recent Microsoft update from the computers. 

What should you do first? 

A. From the Programs and Features, open the Installed Updates window. 

B. From the Services console, open the Windows Update service. 

C. From the Event Viewer, open the System log. 

D. From the Task Scheduler, view the WindowsBackup node. 

Answer: C 


Q304. - (Topic 5) 

Your company network includes desktop computers that have Windows XP Professional SP1 64-bit installed. 

The company has purchased new portable computers that have Windows 7 Professional 32-bit installed. 

You need to be able to migrate user profiles from the desktop computers to the portable computers. 

What should you do? 

A. Run scanstate /nocompress on the desktop computers. 

B. Stop the User Profile Service on the desktop computers. 

C. Add each desktop user to the local Administrators on the desktop computers. 

D. Replace all versions of Windows 7 with 64-bit. 

Answer: D 


Q305. - (Topic 2) 

You have a computer that runs Windows 7. 

You perform regular data backups and system image backups. The computer experiences a hard disk failure. You replace the failed hard disk. 

You need to recover the computer to the previous Windows 7 environment. 

You start the computer from the Windows 7 installation media. 

Which recover option should you select? 

A. Command Prompt 

B. Startup Repair 

C. System Image Recovery 

D. System Restore 

Answer: C 

Explanation: 

System Image Recovery Enables you to implement a System Image restore. You would choose this option if your hard disk failed or needed to be wiped. If system changes are causing problems, you would choose the System Restore option.NOT Startup Repair Automatically fixes problems that prevent Windows from starting. If Windows 7 had boot problems during a previous restart, a normal boot (without accessing the Advanced Boot dialog box) gives you the option of selecting Startup Repair.NOT System Restore Gives you another method of starting a system restore to a previous restore point. Because you can access this menu when you boot from a DVD-ROM, this lets you repair your system when recent changes to system settings prevent your computer from booting normally.NOT Command Prompt Gives access to the file system, volumes, and files through a command-line interface. 


Q306. - (Topic 3) 

You need to configure a computer to encrypt all inbound connections by using IPSec. 

What should you do? 

A. From Network and Sharing Center, click Connect to a network. 

B. From Network and Sharing Center, click Set up a new connection or network. 

C. From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule. 

D. From Windows Firewall with Advanced Security, click Connection Security Rules and then click New Rule. 

Answer: D 

Explanation: 

Connection Security Rules Connection security rules are a special type of rule that deal with authenticated and encrypted traffic. You can use connection security rules to manage how communication occurs between different hosts on the network. You use the New Connection Security Rule Wizard, to create connection security rules. Connections can be authenticated using the Kerberos V5 protocol requiring a domain computer and user account or a domain computer account. If you select advanced properties, connections can be authenticated using NTLMv2, computer certificates from a particular certificate authority (CA) or using a pre-shared key.Connection Security Rules and IPSec policies The relationship between connection security rules and IPSec policies is similar to the relationship between AppLocker and Software Restriction Policies. Both sets of rules do similar things, but the ones that you use depend on the operating systems used by the client computers in your organization. All editions of Windows 7 and Windows Vista support connection security rules, but Windows XP does not. 


Q307. HOTSPOT - (Topic 4) 

You have a computer running Windows 7 Enterprise. You need to set up a VPN connection using PPP protocol over SSL (Secure Socket Layer) using HTTPS channel. What type of VPN connection would you need? 


Answer: 



70-680  free draindumps

Most up-to-date self-paced training kit (exam 70-680):

Q308. - (Topic 5) 

You administer a desktop computer that has the following hardware specifications: 

Dual-core 2.5 GHz processor 

1 GB RAM 

25 GB unpartitioned disk space 

Onboard graphics that has WDDM 1.0 

You install a customized Windows 7 Enterprise 64-btt image on the computer by using unpartitioned disk space. The computer operates unacceptably slow. 

You need to improve the performance of the computer. What should you do? 

A. Install another 1 GB of RAM. 

B. Upgrade the processor, 

C. Open Performance Monitor. Run the System Performance Data Collector Set. 

D. Install a video card that has 128 MB of video RAM. 

Answer: A 


Q309. - (Topic 5) 

You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point. 

You set the startup type of the NAP Agent service to Automatic on the computer. 

You need to complete the configuration of the computer as a NAP client. 

What should you do? 

A. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command. 

B. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the ipconfig command. 

C. From the NAP Client Configuration console, configure the user interface settings. 

D. From the NAP Client Configuration console, configure the Health Registration settings. 

Answer: A 


Q310. - (Topic 5) 

You use a client computer named Marketing that has Windows 7 SP1 installed. The computer allows connections from other computers that have any version of Remote Desktop installed. The computer has a locally attached printer shared as Printer1. 

A MarketingUsers group is a member of the local Remote Desktop Users group on the computer. Only the MarketingUsers group has access to Printer1. A user named User1 is a member of MarketingUsers. 

You need to configure the computer to meet the following requirements: 

. Prevent User1 from establishing Remote Desktop sessions to the Marketing computer. 

. Allow other members of MarketingUsers to connect to the Marketing computer by using Remote Desktop. 

. Ensure that User1 can access Printer1. 

What should you do? 

A. Assign the Deny access to this computer from the network user right to User1. 

B. Remove the MarketingUsers group from the Remote Desktop Users group. 

C. Assign the Deny log on through Remote Desktop Services user right to User1. 

D. Remove User1 from the MarketingUsers group. 

Answer: C 


Q311. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

You need to ensure that when Windows runs applications with elevated privileges, it enforces the Public Key Infrastructure (PKI) certification path validation for a given executable file. 

What should you use to accomplish this goal? 

A. the User Account Control Settings Control Panel window 

B. the Services management console 

C. Device Manager 

D. Local Users and Groups 

E. the icacls command 

F. the Group Policy management console 

G. the folder Properties window 

H. share permissions 

I. the netsh command 

Answer: F 

Explanation: 

Besides changing the notification behavior of UAC, you can also control the behavior of the UAC by using local or group policies. Local policies are managed from each local computer while group policies are managed as part of Active Directory. 

Follow these steps to change UAC settings: Click Start, type secpol.msc in the Search programs and files box, and press Enter. From the Local Security Policy tree, click Local Policies and then double-click Security Options The UAC policies are at the bottom of the list. To modify a setting, simply double-click on it and make the necessary changes. 


Q312. HOTSPOT - (Topic 4) 

A company's security policy prohibits employees from running any software from Fabrikam on computers running Windows 7 Enterprise. The applications are digitally signed by the publisher. 

You need to configure a single deny rule in AppLocker by applying a condition to restrict all of the applications from running, without affecting other programs. 

You have selected one of Fabrikam's applications as a reference. 

Which property should you choose? (To answer, select the appropriate setting or settings in the work area.) 


Answer: 



Q313. - (Topic 1) 

In Windows 7 you can control when users such as kids can login to Windows 7. 

Which of the following best describes where to configure this option? 

A. You cannot choose this feature unless you are connected to a domain. 

B. Go to the Start, Control Panel, User Accounts and Family Safety, Setup Parental Controls, and then choose Time Restrictions. 

C. Go to Start, Control Panel. User Profiles, and then Time Restriction Settings. 

D. Go to the Homegroup settings and choose Offline Time Settings. 

Answer: B 


Q314. - (Topic 5) 

You have a computer that runs Windows 7. 

The computer's hard disks are configured as shown in the following table. 


You need to ensure that you can recover the operating system and all the files on the computer if hard disk 0 experiences hardware failure. 

What should you do? 

A. Create an Easy Transfer file on a network location. 

B. Use the Backup and Restore tool to create a system image on a network location. 

C. Create a system repair disk. 

D. Create an Easy Transfer file on an external hard disk. 

Answer: B 

Explanation: System Image in Windows 7 The new backup utilities in Windows 7 are actually pretty impressive and creating an image will be possible in all versions. Today we take a look at creating a backup image of your machine without the need for a third party utility like Ghost or True Image. 

You are just finished installing a fresh copy of Windows 7 on your computer and have it set up to your liking. One of the first things you should do now is create an image of the disc so in the event of a crash you will be able to restore it to its current state. An image is an exact copy of everything on the drive and will restore it back to its current state. It's probably best to create an image when everything is clean and organized on your system. This will make the image file smaller and allows you to restore the system with a smooth running set up. 


Q315. - (Topic 3) 

You have a computer that runs Windows 7. You generate a System Diagnostic Report and receive the following warning message: The Graphics rating for the system is poor and may be the cause of performance problems. 

You need to increase the graphics performance of the computer without modifying the current hardware or drivers. 

What should you do? 

A. From Personalization, modify the screen saver. 

B. From Indexing Options, modify the Advanced options. 

C. From Performance Options, modify the visual effects. 

D. From Performance Options, modify the processor scheduling. 

Answer: C 

Explanation: Configuring Performance Options The Performance Options tool is a Windows 7 Performance And Analysis tool that you can access by clicking Advanced Tools on the Performance Information And Tools dialog box and then clicking Adjust The Appearance And Performance Of Windows. You can let Windows decide what is best for your computer, adjust for best appearance, adjust for best performance, or select Custom and specify the appearance settings for your computer manually. If you select Custom, you can choose which visual effects to turn off, one by one. There are 18 visual effects that you can control, such as whether shadows are displayed under screen icons or under the mouse pointer. On the Advanced tab, you can adjust for the best performance of programs or background services. If your computer is running applications (as a typical workstation does), you would specify Adjust For Best Performance Of Programs. On a server that is functioning as a Web server (for example), you would specify Adjust For Best Performance Of Background Services. 




see more 70-680 dumps