Apr 2016 updated: Actualtests Microsoft 70-680 download 16-30

Simulation of 70-680 pdf exam materials and dumps for Microsoft certification for examinee, Real Success Guaranteed with Updated 70-680 pdf dumps vce Materials. 100% PASS TS:Windows 7,Configuring exam Today!

2016 Apr 70-680 Study Guide Questions:

Q16. - (Topic 1) 

Which of the following is not a rating for games in Windows 7? 

A. General Audience (G) 

B. Everyone (E) 

C. Teen (T) 

D. Adults Only (AO) 

Answer: A 


Q17. - (Topic 5) 

You have a computer that runs a 32-bit version of Windows 7 Home Premium. The computer has a single partition on a single hard disk drive. 

You want to test a 64-bit version of Windows 7 Ultimate. You configure the computer for a dual boot with previously installed Windows 7 Home Premium. 

You need to configure the computer to support the dual boot. 

What should you do? 

A. Start Windows 7 Home Premium. Create a Virtual Hard Disk (VHD) file to start Windows 7 Ultimate. 

B. Start Windows 7 Home Premium. Add a new entry to the boot menu. 

C. Attach Windows 7 Ultimate media as an ISO image into Windows 7 Home Premium. 

D. Install Virtual PC into Windows 7 Home Premium. 

Answer: A 


Q18. - (Topic 1) 

You have a computer named Computer1 that runs Windows Vista and a computer named Computer2 that runs Windows 7. You plan to migrate all profiles and user files from Computer1 to Computer2. 

You need to identify how much space is required to complete the migration. 

What should you do? 

A. On Computer1 run Loadstate c:\store /nocompress 

B. On Computer1 run Scanstate c:\store /nocompress /p 

C. On Computer2 run Loadstate \\computer1\store /nocompress 

D. On Computer2 run Scanstate \\computer1\store /nocompress /p 

Answer: B 

Explanation: 

ScanState You run ScanState on the source computer during the migration. You must run ScanState.exe on computers running Windows Vista and Windows 7 from an administrative command prompt. When running ScanState on a source computer that has Windows XP installed, you need to run it as a user that is a member of the local administrators group. The following command creates an encrypted store named Mystore on the file share named Migration on the file server named Fileserver that uses the encryption key Mykey: scanstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /o /config:config.xml /encrypt /key:"mykey" Space Estimations for the Migration StoreWhen the ScanState command runs, it will create an .xml file in the path specified. This .xml file includes improved space estimations for the migration store. The following example shows how to create this .xml file: Scanstate.exe C:\MigrationLocation [additional parameters] /p:"C:\MigrationStoreSize.xml" To preserve the functionality of existing applications or scripts that require the previous behavior of USMT, you can use the /p option, without specifying "pathtoafile", in USMT 4.0. If you specify only the /p option, the storage space estimations are created in the same manner as with USMT 3.x releases. User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState. 


Q19. - (Topic 6) 

You have a computer that runs Windows 7. The computer is a member of a workgroup. 

You use Encrypting File System (EFS) to protect your local files. 

You need to ensure that you can decrypt EFS files on the computer if you forget your password. 

What should you do? 

A. From User Accounts, select Manage your file encryption certificates. 

B. From Credential Manager, select Back up vault. 

C. From BitLocker Drive Encryption, select Manage BitLocker and Turn On BitLocker. 

D. From Authorization Manager, modify the Authorization Manager options. 

Answer: A 

Explanation: Make sure you have a backup of the appropriate encryption certificates 


Q20. - (Topic 3) 

You have a computer that runs Windows 7. 

You have an application control policy on the computer. 

You discover that the policy is not enforced on the computer. 

You open the Services snap-in as shown in the exhibit. (Click the Exhibit button.) 


You need to enforce the application control policy on the computer. 

What should you do? 

A. Set the Application Identity service Startup Type to Automatic and start the service. 

B. Set the Application Information service Startup Type to Automatic and start the service. 

C. Set the Application Management service Startup Type to Automatic and start the service. 

D. Set the Application Experience service Startup Type to Automatic and start the service. 

Answer: A 

Explanation: 

Application Identity service AppLocker relies upon the Application Identity Service being active. When you install Windows 7, the startup type of this service is set to Manual. When testing AppLocker, you should keep the startup type as Manual in case you configure rules incorrectly. In that event, you can just reboot the computer and the AppLocker rules will no longer be in effect. Only when you are sure that your policies are applied correctly should you set the startup type of the Application Identity Service to Automatic. You should take great care in testing AppLocker rules because it is possible to lock down a computer running Windows 7 to such an extent that the computer becomes unusable. AppLocker policies are sometimes called application control policies 


70-680  pdf exam

Leading 70-680 exam fees:

Q21. - (Topic 3) 

A user named User1 uses a shared computer that runs Windows 7. 

User1 is a standard user. User1 attempts to connect a USB device to the computer and is prompted to enter administrative credentials. 

You need to ensure that User1 can use the USB device without requiring administrative credentials. 

What should you do first? 

A. Add User1 to the Power Users group. 

B. Run Pnputil.exe and specify the - i- a parameters. 

C. Run Driverquery.exe and specify the /SI parameter. 

D. Copy the driver files to the C:\windows\system32 folder. 

Answer: B 

Explanation: 

When a driver is staged, it is placed in the device driver store and non-administrators can install the device, provided they have permission to install devices in the appropriate device setup class. Pnputil.exe is a command line utility that you can use to manage the driver store. You can use Pnputil to add driver packages, remove driver packages, and list driver packages that are in the store. -i Specifies to install the identified INF file. Cannot be used in conjunction with the -f parameter. 

Example pnputil.exe -i -a a:\usbcam\USBCAM.INF Adds and installs the specified driver 


Q22. - (Topic 1) 

You have a Virtual Hard Disk (VHD) and a computer that runs Windows 7. The VHD has Windows 7 installed. 

You need to start the computer from the VHD. 

What should you do? 

A. From Diskpart.exe, run Select vdisk. 

B. From Disk Management, modify the active partition. 

C. Run Bootcfg.exe and specify the /default parameter. 

D. Run Bcdedit.exe and modify the Windows Boot Manager settings. 

Answer: D 

Explanation: 

When you have created a VHD and installed a system image on it, you can use the BCDEdit tool Bcdedit.exe to add a boot entry for the VHD file in your computer running Windows 7. 


Q23. - (Topic 4) 

A virtual hard disk (VHD) contains a Windows 7 Enterprise installation. 

You need to mount the VHD on a client computer. 

What should you do? 

A. Run the Dism command with the /Mount-Wimoption. 

B. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes. 

C. Run the Dism command with the /Add-Package option. 

D. Run the PEImg/Prepcommand. 

E. Add a boot image in WDS. 

F. Run the Dism command with the /Add-Driver option. 

G. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to True. 

H. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to No. 

I. Run the BCDEdit command. 

J. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to False. 

K. Run the Start/w ocsetup command. 

L. Run the imageX command with the /Mount parameter. 

M. Create a capture image in WDS. 

N. Run the DiskPart command and the Attach command option. 

Answer: N 


Q24. - (Topic 1) 

The Aero Shake feature will work if which of the following conditions are met? Choose Two. 

A. A display adapter compatible with WDDM is installed. 

B. Aero features are downloaded from Microsoft. 

C. The windows experience index is at least 2. 

D. The Windows Experience Index is 3 or greater. 

Answer: A,D 


Q25. HOTSPOT - (Topic 4) 

You use a computer that has Windows 7 installed. You install a legacy application named LegApp. 

LegApp is designed for Windows 98 and does not support the 16-bit or 32-bit color quality setting. 

You need to configure application compatibility settings for LegApp to meet the following requirements: 

. Compatible with Windows 98 

. The 8-bit color quality setting must be used 

What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.) 



Answer: 



70-680  pdf exam

Refined 70-680 testing bible:

Q26. - (Topic 2) 

You have a computer that runs Windows 7. The computer contains one hard disk. The hard disk is configured as shown in the following table. 


You install a new 250-GB hard disk in the computer. 

You need to ensure that all the files on the computer are available if a single disk fails. 

What should you do? 

A. Create a mount point on C and D and then create a striped volume. 

B. Create a mount point on C and D and then create two striped volumes. 

C. Convert both disks to dynamic disks and then create a mirrored volume. 

D. Convert both disks to dynamic disks and then create two mirrored volumes. 

Answer: D 

Explanation: 

Creating a Mirrored Volume (RAID-1)A mirrored or RAID-1 volume provides availability and fault tolerance but does not improve performance. It uses two disks (or two portions on separate disks) that are the same size. Any changes made to the first disk of a mirror set are also made to its mirror disk. If the first disk fails, the mirror is broken and the second disk is used until the first is repaired or replaced. The mirror is then re-created, and the information on the working disk is mirrored on the repaired disk. The disadvantage of RAID-1 is that you need (for example) two 200-GB disks to hold 200 GB of data. The advantage is that you can mirror a system disk containing your operating system.You create a mirrored volume using a very similar procedure to the one that creates a striped volume, except that you right-click the first disk of your mirror and click New Mirrored Volume to start the appropriate wizard. You then select the second disk. The second disk needs to have a portion of unallocated space that is at least as large as the disk you want to mirror. The drive letter for a mirrored volume is the same as the drive letter of the first disk. You can also use the Diskpart tool to create a mirrored volume. At the DISKPART> prompt you first use the select disk command to select the first disk. You then enter a command with the syntax add disk=<n>to specify the mirror disk. 


Q27. - (Topic 1) 

You have a computer that runs Windows 7. 

Multiple users log on to your computer. 

You enable auditing on a folder stored on your computer. 

You need to ensure that each access to the folder is logged. 

What should you do? 

A. Start the Problem Steps Recorder. 

B. From Event Viewer, modify the properties of the Security log. 

C. From the local Group Policy, configure the Audit object access setting. 

D. From the local Group Policy, configure the Audit directory service Access setting. 

Answer: C 

Explanation: 

Audit object access Determines whether to audit the event of a user accessing an object (for example, file, folder, registry key, printer, and so forth) which has its own system access control list (SACL) specified. By default, this value is set to No auditing in the Default Domain Controller Group Policy object (GPO) and in the local policies of workstations and servers. If you define this policy setting, you can specify whether to audit successes, audit failures, or not to audit the event type at all. Success audits generate an audit entry when a user successfully accesses an object that has a SACL specified. Failure audits generate an audit entry when a user unsuccessfully attempts to access an object that has a SACL specified. You can select No auditing by defining the policy setting and unchecking Success and Failure. 


Q28. - (Topic 5) 

Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers are members of an Active Directory domain. You use a computer named Client1. 

You plan to collect events from Client1 on Server1 by using HTTPS. On Server1, you start and configure the Windows Event Collector service. On Client1, you start the Windows Remote Management service. 

You discover that no events are being collected. 

You need to ensure that events are forwarded from Client1 to Server1. 

What should you do? 

A. on Client1, create an outbound Rule to allow port 5986 for the Domain connection type. 

B. on Client1, create an inbound Rule to allow port 5986 for the Public connection type. 

C. on Server1, create a Windows Event Collector firewall exception for the Domain connection type. 

D. on Client1, create a Windows Remote Management firewall exception for the Domain connection type. 

Answer: D 


Q29. - (Topic 2) 

You have a computer that runs Windows 7. The network connection details are shown in the exhibit. (Click the Exhibit button.) 


You need to manually assign an IP address of 192.168.1.50 to the computer. 

What should you do first? 

A. Enable TCP/IPv4. 

B. Disable TCP/IPv6. 

C. Run Ipconfig and specify the /renew parameter. 

D. Run Netsh and specify the Interface ipv4 add address command. 

Answer: A 

Explanation: 

IPv4 is not currently enabled and 192.168.1.50 is an IPv4 address.Therefore IPv4 is required so ENABLE it. 


Q30. - (Topic 2) 

You install a local printer on a computer. You share the printer. 

You need to ensure that only members of a local group named Group1 can print documents on the printer. 

Which settings should you modify on the printer? 

A. Printing preferences 

B. Priority 

C. Security 

D. Share 

Answer: C 

Explanation: 

Restricting printer access to selected users by using security groups If you need to restrict the access of certain shared printers to a certain group of network users, do the following: 

-Create a security group and then add members to the security group. - Assign printer access permissions. 

To create a security group and add member to the group 

1. Open the Windows SBS Console.2. On the navigation bar, click the Users and Groups tab, and then click Groups.3. In the task pane, click Add a new group. The Add a New Group Wizard appears. In the Add a New Group Wizard, do the following:1. On the Add a new group page, for Group type, select Security group.2. On the Select groups members for <groupname> page, from the Users and groups list, add the network users who you want to include for the restricted printer access.3. Follow the instructions to complete the wizard. To assign printer access permissions1. Open the Windows SBS Console.2. On the navigation bar, click the Network tab, and then click Devices.3. From the list of printers displayed in the Printers section, click the printer that you want to view the properties for. Then in the task pane, click Printer Properties.4. In the Printer Properties dialog box, click the Security tab, and then remove all entries in the Groups or user names list box except Administrators and Creator Owner.5. To grant access to the printer, click Add, and then enter the names of the group or users that you want to grant access to this printer. 



see more 70-680 dumps