Abreast of the times 70-680: Exambible real discount pack from 11 to 20


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-680 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-680-exam-dumps.html

Q11. - (Topic 2) 

You are deciding on which storage devices you want to configure system protection. System protection is enabled by default on your C: drive, which holds your system files. No other storage device on your computer has system protection enabled. 

On which of the following storage devices can you enable system protection? (Choose all that apply.) 

A. Your second internal hard disk, formatted with NTFS 

B. An external USB hard disk formatted with FAT 

C. A USB flash drive 

D. Your optical drive 

E. A mounted VHD created on your second internal hard disk 

Answer: A,E 


Q12. - (Topic 3) 

You need to reduce the amount of space currently being used to store system restore points. 

What should you do? 

A. Run Disk Cleanup. 

B. Run Msconfig.exe. 

C. Configure disk quotas. 

D. Configure Windows Backup. 

Answer:

Explanation: 

Shadow info: 

Shadow copies are automatically saved as part of a restore point. If system protection is enabled, Windows 7 automatically creates shadow copies of files that have been modified since the last restore point was created. By default, new restore points are created every seven days or whenever a significant system change (such as a driver or application installation) occurs. 

NOT Disk Quota:Does not directly affect size of System Restore Points. 


Q13. - (Topic 5) 

You have a computer that runs Windows 7. 

The computer's hard disks are configured as shown in the following table. 

You need to ensure that you can recover the operating system and ail the files on the computer if hard disk 0 experiences hardware failure. 

What should you do? 

A. Create an Easy Transfer file on a network location. 

B. Use the Backup and Restore tool to back up data files for all users. 

C. Use the Backup and Restore tool to create a system image on a network location. 

D. Create a system repair disk. 

Answer:


Q14. HOTSPOT - (Topic 4) 

A company's security policy prohibits employees from running any software from Fabrikam on computers running Windows 7 Enterprise. The applications are digitally signed by the publisher. 

You need to configure a single deny rule in AppLocker by applying a condition to restrict all of the applications from running, without affecting other programs. 

You have selected one of Fabrikam's applications as a reference. 

Which property should you choose? (To answer, select the appropriate setting or settings in the work area.) 

Answer: 


Q15. - (Topic 1) 

You want to prohibit read, write, and execute access to all types of external storage devices. 

What computer policy setting do you enable? 

A. All Removable Storage: Allow Direct Access In Remote Sessions 

B. All Removable Storage Classes: Deny All Access 

C. Removable Disks: Deny Read Access 

D. Removable Disks: Deny Write Access 

Answer:


Q16. - (Topic 3) 

You have a computer that runs Windows 7. 

The Encrypting File System (EFS) key is compromised. 

You need to create a new EFS key. 

Which command should you run? 

A. Certutil -getkey 

B. Cipher.exe /k 

C. Icacls.exe /r 

D. Syskey.exe 

Answer:

Explanation: 

Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains.Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed.When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. /K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521. 


Q17. - (Topic 3) 

You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. 

You attempt to migrate the user profiles and data from Computer1 to Computer2 by using User State Migration Tool (USMT) 4.0. 

During the migration, you receive the following error message: "Gather was aborted because of an EFS file." 

You need to ensure that you can successfully migrate the user state from Computer 1 to Computer 2. 

What should you do? 

A. Add the /efs:copyraw switch to the Loadstate command. 

B. Add the /efs:copyraw switch to the Scanstate command. 

C. Generate a new Encrypting File System (EFS) certificate on Computer2. 

D. Export the Encrypting File System (EFS) certificate from Computer1 and import the certificate to Computer2. 

Answer:

Explanation: 

You run ScanState on the source computer during the migration. You must run ScanState.exe on computers running Windows Vista and Windows 7 from an administrative command prompt. When running ScanState on a source computer that has Windows XP installed, you need to run it as a user that is a member of the local administrators group. The following command creates an encrypted store named Mystore on the file share named Migration on the file server named Fileserver that uses the encryption key Mykey: scanstate \fileservermigrationmystore /i:migapp.xml /i:miguser.xml /o /config:config.xml /encrypt /key:"mykey"Encrypted File OptionsYou can use the following options to migrate encrypted files. In all cases, by default, USMT 4.0 fails if an encrypted file is found unless you specify an /efs option. To migrate encrypted files, you must change the default behavior. EFS certificates will be migrated automatically when migrating to Windows Vista or Windows 7. Therefore, you should specify the /efs:copyraw option with the ScanState command to migrate the encrypted files 


Q18. - (Topic 1) 

You have a computer that runs Windows 7. 

You update the driver for the computer's video card and the computer becomes unresponsive. 

You need recover the computer in the minimum amount of time. 

What should you do? 

A. Restart in safe mode and then roll back the video card driver. 

B. Restart in safe mode and then revert the computer to a previous restore point. 

C. Start the computer from the Windows 7 installation media. Select Repair your computer and then select System Restore. 

D. Start the computer from the Windows 7 installation media. Select Repair your computer and then select System Image Recovery. 

Answer:

Explanation: 

If you install a driver that causes your computer to become unstable, you should first attempt to roll back the driver. If this does not solve the problem, you can restore system files and settings by performing a system restore to restore the computer to its last system restore point. A system restore returns a computer system to a selected restore point. System restores do not alter user files. Note that a system restore is not the same as a System Image restore. 


Q19. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

A user has saved files in a C:Users folder that coworkers must be able to read and edit. 

However, when coworkers try to edit those files, they get an "Access Denied" error. 

You need to configure new NTFS permissions for the user's C:Users folder to ensure that the coworkers have access to write to that folder. 

Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. share permissions 

B. the folder Properties window 

C. the User Account Control Settings Control Panel window 

D. the Group Policy management console 

E. the Services management console 

F. Local Users and Groups 

G. the netsh command 

H. Device Manager 

I. the icacls command 

Answer: B,I 


Q20. - (Topic 1) 

You have a Virtual Hard Disk (VHD) and a computer that runs Windows 7. The VHD has Windows 7 installed. 

You need to start the computer from the VHD. 

What should you do? 

A. From Diskpart.exe, run Select vdisk. 

B. From Disk Management, modify the active partition. 

C. Run Bootcfg.exe and specify the /default parameter. 

D. Run Bcdedit.exe and modify the Windows Boot Manager settings. 

Answer:

Explanation: 

When you have created a VHD and installed a system image on it, you can use the BCDEdit tool Bcdedit.exe to add a boot entry for the VHD file in your computer running Windows 7.