Tips to Pass 70-680 Exam (286 to 300)

Exam Code: 70-680 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: TS:Windows 7,Configuring
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-680 Exam.

2016 May 70-680 Study Guide Questions:

Q286. - (Topic 4) 

You have a computer that runs Windows 7. Windows Update settings are configured as shown in the exhibit. (Click the Exhibit button.) 


You discover that standard users are never notified when updates are available. 

You need to ensure that standard users are notified when updates are available. 

What should you do? 

A. Select Allow all users to install updates on this computer. 

B. Specify an intranet Microsoft update service location in Group Policy. 

C. Change the Startup Type for the Windows Update service to Automatic. 

D. Select Give me recommended updates the same way I receive important updates. 

Answer: A 

Explanation: 

Change how Windows installs or notifies you about updates You can set Windows to automatically install important and recommended updates or to install important updates only. Important updates provide significant benefits, such as improved security and reliability. Recommended updates can address noncritical problems and help enhance your computing experience. Optional updates are not downloaded or installed automatically. If you don't want updates to be installed automatically, you can choose to be notified when updates apply to your computer instead. Then, you can download and install them yourself, or you can set Windows to automatically download updates, and then notify you so you can install them yourself. Here's how to change how Windows installs or notifies you about updates: 

1. Click to open Windows Update. 

2. In the left pane, click Change settings. 

3. Under Important updates, click one of the following: 

4. To schedule your automatic updates, next to Install new updates, select the day and time you want updates to occur. - Install updates automatically (recommended) 

-Download updates but let me choose whether to install them 

-Check for updates but let me choose whether to download and install them 

-Never check for updates (not recommended) 

5. To get recommended updates for your computer, under Recommended updates, select the Give me recommended updates the same way I receive important updates check box. 

6. To allow anyone using the computer to make updates, select the Allow all users to install updates on this computer check box. This applies only to updates and software that are installed manually; automatic updates will be installed regardless of the user. 

7. Click OK. If you're prompted for an administrator password or confirmation, type the password or provide confirmation. 


Q287. - (Topic 3) 

You have a custom image of Windows 7. 

You discover that the boot configuration data store in the custom image is corrupted. 

You need to create a new configuration data store within the custom image. 

What should you do? 

A. Run Imagex.exe and specify the /append parameter. Run Bcdedit.exe. 

B. Run Imagex.exe and specify the /mountrw parameter. Run Bcdedit.exe. 

C. From Windows System Image Manager (Windows SIM), select the image and then create a configuration set. 

D. From Windows System Image Manager (Windows SIM), select the image and then create a catalog. 

Answer: B 

Explanation: 

ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice/mountrwMounts a .wim file from Windows XP with Service Pack 2 (SP2), Windows Server 2003 with Service Pack 1 (SP1), or Windows Vista with read/write permission to a specified directory. Once the file is mounted, you can view and modify all the information contained in the directory.BcdeditBCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe, and BCDEdit has improved scripting support.NOT Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets. NOTE: question specifies configuration data store, not configuration set. 


Q288. - (Topic 1) 

Your company has a main office and a branch office. The relevant portion of the network is configured as shown in the exhibit. (Click the Exhibit button.) 


In the branch office, you deploy a new computer named Computer1 that runs Windows 7. 

You need to assign an IP address to Computer1. 

Which IP address should you use? 

A. 192.168.2.30 

B. 192.168.2.40 

C. 192.168.2.63 

D. 192.168.2.65 

Answer: B 

Explanation: 

Internal IP Adress of router is 192.168.2.62/27Leaves 5 bits for range = 32 addresses (including the 2 reserved addresses)Subnet Mask = 255.255.255.224 



Q289. - (Topic 5) 

You use a computer that has Windows 7 SP1 installed to access your company's internal website. The website requires a secure connection. The certificate is a self-signed Secure Socket Layer (SSL). 

You attempt to connect to the internal website. You receive the following error message: 

"There is a problem with this website's security certificate." 

You need to be able to connect to the internal website successfully. 

What should you do? 

A. From Internet Explorer, add the website to the Local Intranet zone. 

B. From Certificate Manager, import the website's certificate into your Intermediate Certification Authorities store. 

C. From Certificate Manager, import the website's certificate into your computer's Personal store. 

D. From Internet Explorer, add the website to the Trusted Sites zone. 

Answer: C 


Q290. - (Topic 3) 

You have a computer that runs Windows 7. 

You install Windows XP in a new partition on the computer and discover that you can no longer start Windows 7. 

You need to start Windows 7 in the minimum amount of time. 

What should you do? 

A. From Windows XP, modify the default path in the boot.ini file. 

B. From Windows XP Recovery Console, run the Fixboot command. 

C. Start the computer from the Windows 7 installation media and select Install now. 

D. Start the computer from the Windows 7 installation media and run Startup Repair. 

Answer: D 

Explanation: When configuring a new computer to boot between multiple operating systems, it is also necessary to install operating systems in the order that they were released. For example, if you want to boot between Windows XP and Windows 7 on a new computer, you need to install Windows XP before you install Windows 7. If you install Windows XP after Windows 7, the Windows XP installation routine cannot recognize the Windows 7 operating system installation and the computer only boots into Windows XP. It is possible to repair the computer from this point using Windows 7 startup repair so that it dual-boots, but the simplest course of action is just to install the operating systems in the order in which they were released 


70-680  torrent

Avant-garde 70-680 real exam:

Q291. - (Topic 5) 

You administer computers that have Windows 7 and Internet Explorer 8 installed. 

You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. 

You need to ensure that any data about your browser session is not saved on the computer. 

What should you do? 

A. Start the Microsoft Network Access Protection service. 

B. From the Safety drop-down menu, open an InPrivate Browsing session. 

C. From Internet Options, on the Advanced tab, clear Enable DOM Storage. 

D. From Internet Options, modify the security settings for the Internet zone. 

Answer: A 


Q292. - (Topic 2) 

You have an answer file for a Windows 7 installation. 

You need to perform an unattended installation of Windows 7 by using the answer file. 

You must achieve this goal by using the minimum amount of administrative effort. 

What should you do? 

A. Name the answer file autounattend.ini and save it to a USB disk. Start the computer from the Windows 7 DVD. 

B. Name the answer file unattend.txt and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE). 

C. Name the answer file autounattend.xml and save it to a USB disk. Start the computer from the Windows 7 DVD. 

D. Name the answer file unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE). 

Answer: C 

Explanation: 

Unattended installation You can perform an unattended installation of Windows 7 by using an installation file called Unattend.xml. These installation files store answers to the questions asked by the Setup Wizard. When the Windows 7 installation process starts, Windows checks for attached USB storage devices that have this file in their root directory. Unattended installations are suitable when you need to deploy Windows 7 to a large number of computers because you do not have to interact with them manually, responding to prompts, as the installation progresses.Building a Reference Installation You configure your reference computer with a customized installation of Windows 7 that you then duplicate onto one or more destination computers. You can create a reference installation by using the Windows product DVD and (optionally) the answer file you created in the previous section. To install your reference computer using an answer file, perform the following procedure: 

1. Turn on the reference computer. Insert the Windows 7 product DVD and the UFD containing the answer file (Autounattend.xml) that you created in the previous section. Note that the use of an answer file is optional, although it is the method Microsoft recommends. If you prefer, you can install Windows 7 manually from the installation DVD-ROM. 

2. Restart the computer by pressing CTRL+ALT+DEL. You may have to override the boot order to boot from the CD/DVD-ROM disk. If so, select the appropriate function key to override the boot order during initial boot. Windows Setup (Setup.exe) starts automatically and searches the root directory of all removable media for an answer file called Autounattend.xml. 

3. After Setup finishes, you can validate that all customizations were applied. For example, if you included the optional Microsoft-Windows-IE-InternetExplorer feature and set the Home_Page setting in your answer file, you can verify these settings by opening Internet Explorer. 

4. To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart. 


Q293. - (Topic 3) 

You have an offline virtual hard disk (VHD) that contains a generalized installation of Windows 7 Ultimate. 

You need to disable the built-in games in the VHD. You must achieve this goal by using the minimum amount of administrative effort. 

What should you do? 

A. Start a computer from the VHD. Run Ocsetup.exe and specify the /uninstall parameter. Recapture the VHD. 

B. Start a computer from the VHD. From Programs and Features, turn off the Games feature and then recapture the VHD. 

C. Create an answer file that has InboxGames disabled. On a computer that runs Windows 7, attach the VHD. Run Pkgmgr.exe and specify the /uu parameter. 

D. Create an answer file that has InboxGames disabled. On a computer that runs Windows 7, attach the VHD. Run Dism.exe and specify the /apply-unattend parameter. 

Answer: D 

Explanation: 

Dism Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows. images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. /Apply-Unattend (Applies an unattend.xml file to an image.) If you are updating device drivers using an unattended answer file, you must apply the answer file to an offline image and specify the settings in the offlineServicing configuration pass. If you are updating packages or other settings using an unattended answer file, you can apply the answer file to an offline or online image. Specify the settings in the offlineServicing configuration pass. 


Q294. - (Topic 1) 

You have a computer that runs Windows 7. 

You need to configure the computer to download updates from a local Windows Server Update Services (WSUS) server. What should you do? 

A. From Windows Update, modify the Windows Update settings. 

B. From the local Group Policy, modify the Windows Update settings. 

C. From the System settings, modify the System Protection settings. 

D. From the local Group Policy, modify the Location and Sensors settings. 

Answer: B 


Q295. - (Topic 1) 

You have a computer that runs Windows 7. 

You update the driver for the computer's video card and the computer becomes unresponsive. 

You need recover the computer in the minimum amount of time. 

What should you do? 

A. Restart in safe mode and then roll back the video card driver. 

B. Restart in safe mode and then revert the computer to a previous restore point. 

C. Start the computer from the Windows 7 installation media. Select Repair your computer and then select System Restore. 

D. Start the computer from the Windows 7 installation media. Select Repair your computer and then select System Image Recovery. 

Answer: A 

Explanation: 

If you install a driver that causes your computer to become unstable, you should first attempt to roll back the driver. If this does not solve the problem, you can restore system files and settings by performing a system restore to restore the computer to its last system restore point. A system restore returns a computer system to a selected restore point. System restores do not alter user files. Note that a system restore is not the same as a System Image restore. 


70-680  torrent

Breathing 70-680 testing material:

Q296. - (Topic 2) 

You have a customized image of Windows 7 Professional. 

You need to create a new unattended file to automate the deployment of the image. You must achieve this goal by using the minimum amount of administrative effort. 

What should you do first? 

A. Run Imagex.exe and specify the /mount parameter. 

B. Run Dism.exe and specify the /mount-WIM parameter. 

C. From Microsoft Deployment Toolkit (MDT), add the custom Windows image (WIM). 

D. From Windows System Image Manager (Windows SIM), open the custom Windows image (WIM). 

Answer: D 

Explanation: 

Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets.NOT DismDeployment Image Servicing and Management (DISM) is a command-line tool used to service Windows. images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system.NOT ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./mountMounts a .wim file from Windows XP with Service Pack 2 (SP2), Windows Server 2003 with Service Pack 1 (SP1), or Windows Vista with read-only permission to a specified directory. Once the file is mounted, you may view, but not modify, all the information contained in the directory.NOT MDT MDT 2010 is the Microsoft solution accelerator for operating system and application deployment and offers flexible driver management, optimized transaction processing, and access to distribution shares from any location. You can use the MDT on imaging and deployment servers to implement the automatic deployment of Windows 7 (for example) on client computers. It is possible to run MDT 2010 on a client running Windows 7, but in practice it would typically run from a distribution server running Windows Server 2008. The MDT provides detailed guidance and job aids and offers a common deployment console that contains unified tools and processes that you can use for client and server deployment. The toolkit offers standardized desktop and server images, along with improved security and ongoing configuration management. 


Q297. - (Topic 6) 

Your company network has a single-domain Active Directory forest. The forest functional level is set to Windows Server 2008 R2. All computers are members of the domain. 

You plan to deploy Windows BitLocker Drive Encryption (BitLocker) on portable computers that have Windows 7 Enterprise installed. 

You need to be able to automatically back up recovery passwords for BitLocker-protected disk volumes on the portable computers. 

What should you do before you start encrypting the disk volumes with BitLocker? 

A. Run the cscript Get-BitLockerRecoverylnfo.vbs script on the portable computers. 

B. Select the Turn on BitLocker backup to Active Directory option in local policy on the portable computers. 

C. Run the cscript List-ACEs.vbs script on the portable computers. 

D. Run the Idifde -i -v -f BitLockerTPMSchemaExtension.Idf -c script on a domain controller. 

Answer: B 


Q298. HOTSPOT - (Topic 4) 

A company has client computers that run Windows 7. You set up a virtual private network (VPN) infrastructure that uses a preshared key for authentication. 

You need to create the VPN connection on the client computers. 

Which setting should you choose? (To answer, select the appropriate setting in the work area.) 


Answer: 



Q299. - (Topic 2) 

You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of an Active Directory domain. 

Windows Remote Management (WinRM) is enabled on both computers. 

You need to remotely create additional disk volumes on Computer1 from Computer2. 

What should you do? 

A. On Computer2, run Winrs and then run Diskpart. 

B. On Computer2, run Winrs and then run Diskmgmt.msc. 

C. On Computer1, install the Telnet Client and then run Diskpart from Computer2. 

D. On Computer1, install the Telnet Client and then use Disk Management from Computer2. 

Answer: A 

Explanation: 

Winrs You can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS –r: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS –r:Aberdeen ipconfig The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt. 

Diskpart: Microsoft command-line tool Diskpart is used to create and format volumes on the target computer. 


Q300. - (Topic 3) 

You are the administrator of a computer named Computer1 that runs Windows 7. Several users share Computer1. The users plan to encrypt files on the computer. 

You need to ensure that you can access all encrypted files on the computer. 

What should you do first? 

A. At a command prompt, run Cipher.exe. 

B. At a command prompt, run Certutil.exe. 

C. From the local computer policy, modify the User Rights Assignment. 

D. From User Accounts, run the Manage your file encryption certificates wizard. 

Answer: A 

Explanation: 

Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed. When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software. 

If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. 

/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521. 



see more 70-680 dumps