[Latest] windows 7 certification 70-680

Exam Code: 70-680 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: TS:Windows 7,Configuring
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-680 Exam.

2016 May 70-680 Study Guide Questions:

Q226. - (Topic 3) 

You have two computers named Computer1 and Computer2. 

You migrate user state data from Computer1 to Computer2. The migrated data contains several Microsoft Office Excel files. 

You need to ensure that you can open the Excel files by using Excel on Computer2. 

What should you do? 

A. Install Office. 

B. Disable User Account Control (UAC). 

C. Modify the default program settings. 

D. Run Loadstate.exe /i:migapp.xml. 

Answer: A 

Explanation: 

The applications are required to be installed in order to use the migrated data. In this case Microsoft Office is required to open Excel files. 

LoadStateLoadState is run on the destination computer. You should install all applications that were on the source computer on the destination before you run LoadState. You must run Loadstate. exe on computers running Windows Vista and Windows 7 from an administrative command prompt. To load profile data from an encrypted store named Mystore that is stored on a share named Migration on a file server named Fileserver and which is encrypted with the encryption key Mykey, use this command: loadstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /decrypt /key:"mykey" 


Q227. - (Topic 3) 

You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two local user accounts named User1 and User2. On Computer1, you run Scanstate.exe /all \\server1\data\computer1. On Computer2, you run Loadstate.exe /lac:Pa$$w0rd \\server1\data\computer1. 

You need to ensure that User1 and User2 can log on to Computer2. 

What should you do on Computer2? 

A. Enable all user accounts 

B. Modify the default password policy 

C. Modify the Allow log on locally user right 

D. Add User1 and User2 to the local Administrators group 

Answer: A 

Explanation: 

LoadState is run on the destination computer. You should install all applications that were on the source computer on the destination before you run LoadState. You must run Loadstate. exe on computers running Windows Vista and Windows 7 from an administrative command prompt. To load profile data from an encrypted store named Mystore that is stored on a share named Migration on a file server named Fileserver and which is encrypted with the encryption key Mykey, use this command: loadstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /decrypt /key:"mykey" 

(local account create) /lac:[Password] Specifies that if a user account is a local (non-domain) account, and it does not exist on the destination computer, USMT will create the account on the destination computer but it will be disabled. To enable the account, you must also use the /lae option. If the /lac option is not specified, any local user accounts that do not already exist on the destination computer will not be migrated. Password is the password for the newly created account. An empty password is used by default. 


Q228. - (Topic 1) 

To which of the following versions and editions of Windows 7 can you directly upgrade a computer running Windows Vista Enterprise (x86)? 

A. Windows 7 Home Professional (x86). 

B. Windows 7 Ultimate (x86) 

C. Windows 7 Ultimate (x64) 

D. Windows 7 Enterprise (x64) 

Answer: B 

Explanation: 

1048 4079 

Windows 7 Upgrade paths: 

http://technet.microsoft.com/en-us/library/dd772579%28v=ws.10%29.aspx 

The only applicable solution is Windows 7 Enterprise (64-bit) as for the following reasons: 

All versions are support Hardware wise. 

Requirements: 

Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements: 

1 GHz 32-bit (x86) or 64-bit (x64) processor 

1 GB of system memory a 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available space a graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver, Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics memory XP Mode Windows XP Mode is a downloadable compatibility option that is available for the 

Professional, Enterprise, and Ultimate editions of Windows 7. Windows XP Mode uses the latest version of Microsoft Virtual PC to allow you to run an installation of Windows XP virtually under Windows 7. 

Use all of the installed memory 

The x86 version supports a maximum of 4 GB of RAM, whereas the x64 version supports a maximum of 8 GB of RAM. 

Windows 7 Professional 

Windows 7 Professional is available from retailers and on new computers installed by manufacturers. It supports all the features available in Windows Home Premium, but you can join computers with this operating system installed to a domain. It supports EFS and Remote Desktop Host but does not support enterprise features such as AppLocker, DirectAccess, BitLocker, and BranchCache. 

Windows 7 Enterprise and Ultimate Editions 

The Windows 7 Enterprise and Ultimate editions are identical except for the fact that Windows 7 Enterprise is available only to Microsoft's volume licensing customers, and Windows 7 Ultimate is available from retailers and on new computers installed by manufacturers. The Enterprise and Ultimate editions support all the features available in other Windows 7 editions but also support all the enterprise features such as EFS, Remote Desktop Host, AppLocker, DirectAccess, BitLocker, BranchCache, and Boot from VHD. 


Q229. - (Topic 1) 

You have a computer that runs Windows 7. 

Your network contains a VPN server that runs Windows Server 2008. 

You need to authenticate to the VPN server by using a smart card. 

Which authentication setting should you choose? 

A. CHAP 

B. EAP 

C. MS-CHAP v2 

D. PAP 

Answer: B 

Explanation: 

VPN Server Software Requirements VPN server software requirements for smart card access are relatively straightforward. The remote access servers must run Windows 2000 Server or later, have Routing and Remote Access enabled, and must support Extensible Authentication Protocol-Transport Layer Security (EAP-TLS). EAP-TLS is a mutual authentication mechanism developed for use in conjunction with security devices, such as smart cards and hardware tokens. EAP-TLS supports Point-to-Point Protocol (PPP) and VPN connections, and enables exchange of shared secret keys for MPPE, in addition to Ipsec. The main benefits of EAP-TLS are its resistance to brute-force attacks and its support for mutual authentication. With mutual authentication, both client and server must prove their identities to each other. If either client or server does not send a certificate to validate its identity, the connection terminates.Microsoft Windows Server. 2003 supports EAP-TLS for dial-up and VPN connections, which enables the use of smart cards for remote users. For more information about EAP-TLS, see the Extensible Authentication Protocol (EAP) topic at www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/auth_eap. mspx. For more information about EAP certificate requirements, see the Microsoft Knowledge Base article "Certificate Requirements when you use EAP-TLS or PEAP with EAP-TLS" at http://support.microsoft.com/default.aspx? scid=814394. 


Q230. - (Topic 4) 

You have a computer that runs Windows 7. You need to prevent users from copying unencrypted files to removable drives. What should you do? 

A. From the Trusted Platform Module (TPM) snap-in, initialize TPM. 

B. From Control Panel, modify the BitLocker Drive Encryption settings. 

C. From a local Group Policy, modify the BitLocker Drive Encryption settings. 

D. From a local Group Policy, modify the Trusted Platform Module (TPM) settings 

Answer: C 

Explanation: 

How can I prevent users on a network from storing data on an unencrypted drive? In Windows 7, you can enable Group Policy settings to require that data drives be BitLockerprotected before a BitLocker-protected computer can write data to them. The policy settings you use for this are: Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionFixed Data DrivesDeny write access to fixed drives not protected by BitLocker Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionRemovable Data DrivesDeny write access to removable drives not protected by BitLocker 

When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only. If you are concerned that your users might inadvertently store data in an unencrypted drives while using a computer that does not have BitLocker enabled, use access control lists (ACLs) and Group Policy to configure access control for the drives or hide the drive letter. 


70-680  test

Down to date practice test microsoft 70-680:

Q231. - (Topic 2) 

You have a virtual hard disk (VHD) file. You need to view the files in the VHD. The solution must prevent users that log on to your computer from modifying files in the VHD. 

What should you do? 

A. From Disk Management, attach the VHD as read-only. 

B. From Disk Management, convert the VHD to a GPT disk. 

C. From Windows Explorer, modify the permissions of the VHD file. 

D. From Windows Explorer, modify the read-only attribute of the VHD file. 

Answer: A 


Q232. - (Topic 4) 

You have a computer that runs Windows 7. Your computer s disk configuration is shown in the exhibit. (Click the Exhibit button.) 


You need to ensure that you can create a striped volume on the computer. 

What should you do? 

A. Add an additional hard disk. 

B. Convert all disks to dynamic disks. 

C. Install a digitally-signed disk driver. 

D. Set the Startup Type of the Virtual Disk Service (VDS) to Automatic. 

Answer: B 

Explanation: 

A striped volume is a dynamic volume that stores data in stripes on two or more physical disks. Data in a striped volume is allocated alternately and evenly (in stripes) across the disks. Striped volumes offer the best performance of all the volumes that are available in Windows, but they do not provide fault tolerance. If a disk in a striped volume fails, the data in the entire volume is lost. 

You can create striped volumes only on dynamic disks. Striped volumes cannot be extended. 

You can create a striped volume onto a maximum of 32 dynamic disks. 

Backup Operator or Administrator is the minimum membership required to complete the actions below. 

Creating a striped volume 

Using the Windows interface 

Using a command line 

To create a striped volume using the Windows interface 

In Disk Management, right-click the unallocated space on one of the dynamic disks where you want to create the striped volume, and then click New Striped Volume…. 

Follow the instructions on your screen. 

To create a striped volume using a command line 

Open a command prompt and type diskpart. 

At the DISKPART prompt, type list disk. Make note of the number of the disk where you want to create a striped volume. 

At the DISKPART prompt, type create volume stripe [size=<size>] 

[disk=<disknumber>[,[<seconddisknumber>, 

…]]. 


Q233. - (Topic 5) 

You have a computer that runs Windows 7. 

The computer's hard disks are configured as shown in the following table. 


You need to ensure that you can recover the operating system and all the files on the computer if hard disk 0 experiences hardware failure. 

What should you do? 

A. Shrink drive C and then create a new partition. 

B. Use the Backup and Restore tool to back up data files for all users. 

C. Use the Backup and Restore tool to create a system image on a network location. 

D. Create a restore point for both hard disks. 

Answer: C 

Explanation: System Image in Windows 7 The new backup utilities in Windows 7 are actually pretty impressive and creating an image will be possible in all versions. Today we take a look at creating a backup image of your machine without the need for a third party utility like Ghost or True Image. 

You are just finished installing a fresh copy of Windows 7 on your computer and have it set up to your liking. One of the first things you should do now is create an image of the disc so in the event of a crash you will be able to restore it to its current state. An image is an exact copy of everything on the drive and will restore it back to its current state. It's probably best to create an image when everything is clean and organized on your system. This will make the image file smaller and allows you to restore the system with a smooth running set up. 


Q234. - (Topic 3) 

You have a computer that runs Windows 7. Four users share the computer. You create a folder named C:\data. 

The Users group has Full control permission to the folder. 

You need to configure security on the folder to meet the following requirements: 

Allow users to create files 

Allow users to delete files that they create 

Prevent users from deleting files created by other users 

What should you do? 

A. Remove all NTFS permissions from the Users group and assign the CREATOR OWNER group the Full control NTFS permission. 

B. Remove the Modify NTFS permission from the Users group and assign the CREATOR OWNER group the Modify NTFS permission. 

C. Deny the Users group the Modify NTFS permission and assign the Authenticated Users group the Read and Write NTFS permissions. 

D. Deny the Users group the Full control NTFS permission and assign the Authenticated Users group the Read & execute NTFS permission. 

Answer: B 

Explanation: 

The Creator Owner GroupThe person who created the file or directory is a member of this group. This group is used by Windows NT to automatically grant access permissions to the creator of a file or directory. 

File and Folder Permissions ReadFolders: Permits viewing and listing of files and subfoldersFiles: Permits viewing or accessing of the file's contentsWriteFolders: Permits adding of files and subfoldersFiles: Permits writing to a fileRead & Execute Folders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by files and foldersFiles: Permits viewing and accessing of the file's contents as well as executing of the fileList Folder ContentsFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by folders onlyFiles: N/AModifyFolders: Permits reading and writing of files and subfolders; allows deletion of the folderFiles: Permits reading and writing of the file; allows deletion of the fileFull ControlFolders: Permits reading, writing, changing, and deleting of files and subfoldersFiles: Permits reading, writing, changing and deleting of the file 


Q235. - (Topic 4) 

You have a computer that runs Windows 7. 

You need to record when an incoming connection is allowed through Windows firewall. 

What should you do? 

A. In Local Group Policy, modify the audit policy. 

B. In Local Group Policy, modify the system audit policy. 

C. From the Windows Firewall with Advanced Security properties, set the logging settings to Log successful connections. 

D. From the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode) IPSec settings to Advanced. 

Answer: C 

Explanation: 

Customize Logging Settings for a Firewall Profile Windows Firewall with Advanced Security can be configured to log events that indicate the successes and failures of its processes. The logging settings involve two groups of settings: settings for the log file itself and settings that determine which events the file will record. The settings can be configured separately for each of the firewall profiles. You can specify where the log file will be created, how big the file can grow, and whether you want the log file to record information about dropped packets, successful connections, or both. Log successful connectionsUse this option to log when Windows Firewall with Advanced Security allows an inbound connection. The log records why and when the connection was formed. Look for entries with the word ALLOW in the action column of the log. 


70-680  test

100% Guarantee windows 7 configuration exam 70-680 knowledge assessment answers:

Q236. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

Users complain that Windows displays too many notifications when they try to install software or make changes to their computer. 

You need to decrease the number of notifications that Windows displays when users try to install software or make changes to their computer. 

Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. Local Users and Groups 

B. the Services management console 

C. the netsh command 

D. the Group Policy management console 

E. share permissions 

F. the folder Properties window 

G. Device Manager 

H. the icacls command 

I. the User Account Control Settings Control Panel window 

Answer: D,I 


Q237. - (Topic 3) 

You install Windows 7 on a new computer. 

Every time you start the computer, you receive a STOP error message. 

You suspect that the RAM on the computer has a problem. 

You need verify the RAM on the computer. 

What should you do first? 

A. Start the computer, press F8, and then select Repair Your Computer. 

B. Start the computer, press F8, and then select Last Known Good Configuration. 

C. From a computer that runs Windows 7, copy the %systemroot%\system32\recover.exe to a bootable USB disk. Start the computer from the USB disk. 

D. From a computer that runs Windows 7, copy the %systemroot%\system32\repair-bde.exe to a bootable USB disk. Start the computer from the USB disk. 

Answer: A 

Explanation: 

Using Recovery Tools If Windows RE is included in your installation DVD-ROM, you can boot from the Windows 7 installation media, select Repair Your Computer, and then select the option to use recovery tools to access the System Recovery Options. However, you 

can use the method described previously (pressing F8) whether the Windows RE files are present on your DVD-ROM or not and whether you boot from your installation DVD-ROM or from hard disk. 

Then use the following System Recovery Option: 

Windows Memory Diagnostic Analyzes the computer memory (RAM) for hardware problems. 


Q238. - (Topic 3) 

You have a computer that runs Windows 7. 

You need to connect to a network projector from the computer. 

What should you use? 

A. Run Netproj.exe and provide the path to the projector. 

B. From Network and Sharing Center, create an ad hoc network and run the DisplaySwitch.exe. 

C. Run DisplaySwitch.exe and select Projector only. 

D. From Device Manager, click Add Legacy hardware. 

Answer: A 


Q239. - (Topic 3) 

You have a computer that runs Windows 7 Home Premium. 

You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time. 

What should you do? 

A. Perform a Windows Anytime Upgrade. 

B. Download and run the Windows 7 Upgrade Advisor. 

C. Insert the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option. 

D. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option. 

Answer: A 

Explanation: 

Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small businesses where a small number of intra-edition upgrades is required. 


Windows Anytime Upgrade 


Q240. - (Topic 5) 

You are evaluating the purchase a netbook computer that has the following hardware: 

1.6-gigahertz (GHz) 32-bit processor 

1024-MB RAM 

1 video card that uses shared memory 

. 4-G8 solid state drive 

You need to ensure that you can install Windows 7 Enterprise on the netbook computer. Which hardware component should you change or add? 

A. storage device 

B. video card 

C. processor 

D. ram 

Answer: A 



see more 70-680 dumps