70-680 interactive bootcamp(256 to 270) for client: Apr 2021 Edition

Realistic of 70-680 exam price materials and bundle for Microsoft certification for IT examinee, Real Success Guaranteed with Updated 70-680 pdf dumps vce Materials. 100% PASS TS:Windows 7,Configuring exam Today!

2021 Apr 70-680 Study Guide Questions:

Q256. - (Topic 3) 

You have a computer that runs Windows 7. 

You add a new hard disk drive to the computer and create a new NTFS partition. 

You need to ensure that you can use the Previous Versions feature on the new drive. 

What should you do? 

A. From Disk Management, convert the new disk to a dynamic disk. 

B. From System Properties, configure the System Protection settings. 

C. From System and Security, enable BitLocker Drive Encryption (BitLocker). 

D. From the properties of the new drive, create a share and modify the caching settings. 

Answer: B 


System protection might not be turned on for the drive. If system protection is not turned on, Windows can't create previous versions.To turn on system protection: 

1. Click to open System.2. In the left pane, click System protection. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.3. Click the drive, and then click Configure.4. Click Restore system settings and previous versions of files, and then click OK. 

Q257. - (Topic 3) 

You have a computer named Computer1 that runs Windows 7. You have a server named Server1 that runs Windows Server 2008. 

Computer1 and Server1 have IPv4 and IPv6 installed. 

You need to identify whether you can connect to Server1 by using IPv6. 

What should you do? 

A. Run Ping Server1 -6. 

B. Run Ping Server1- n 6. 

C. Run Net view \Server1. 

D. Open \server1 from the Run dialog box. 

Answer: A 


Ping The Ping tool is still widely used, although more firewalls block Internet Control Message Protocol (ICMP) echo requests than used to be the case. However, even if you cannot get past a firewall on your organization's network, Ping is still useful. You can check that the IPv4 protocol is working on a computer by entering ping You can then ping the IPv4 address of the computer. You can find out what this is by using the Ipconfig tool. If your computer has more than one interface combined in a network bridge, you can ping the Ipv4 address of the network bridge. When you have established that you can ping your computer using an Ipv4 address, you can test that DNS is working internally on your network (assuming you are connected to a DNS server, a WAP, or have ICS configured on your network) by pinging your computer name—for example, entering ping canberra. Note that if DNS is not implemented on your system, ping canberra still works because the IPv6 link-local address resolves automatically. -6 Force using IPv6. 

Q258. - (Topic 4) 

You have a portable computer that runs Windows 7. Windows Backup is configured to run every day at 15:00. 

You need to prevent backups from automatically running when the computer is running on the battery. 

What should you do? 

A. From Backup and Restore, click Change settings. 

B. From Task Scheduler, modify the Automatic Backup task. 

C. From Power Options, modify the settings of the current power plan. 

D. From the local computer policy, modify the power management settings. 

Answer: B 

Explanation: To set power management options for a scheduled task 

-Open Task Scheduler. 

-Right-click the task for which you want to set power management options, and then click Properties. 

-On the Settings tab, under Power Management, do one or more of the following: 

-To conserve the battery power of your computer, select the Don't start the task if the computer is running on batteries check box. 

-To stop the task if the computer starts running on battery power, select the Stop the task if battery mode begins check box. 

-To wake your computer from hibernation or standby to run a task, select the Wake the computer to run this task check box. 

Task Scheduler 

With Scheduled Tasks, you can schedule any script, program, or document to run at a time that is most convenient for you. Scheduled Tasks starts every time that you start Windows and runs in the background, and it starts each task that you schedule at the time that you specify when you create the task. 

Q259. - (Topic 3) 

You have a computer that runs Windows 7. Multiple users share the computer. The computer contains a folder named C:folder1. 

You need to identify all of the encrypted files in C:folder1. 

Which command should you run? 

A. Cipher C:folder1 

B. Dir C:folder1 /OE 

C. Fsutil C:folder1 

D. Wfs C:folder1 

Answer: A 


CipherDisplays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. 

Q260. - (Topic 1) 

You have a portable computer named Computer1 that runs Windows 7. 

You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1. 

You need to configure Computer1 to meet the following requirements: 

. Ensure that cached files from Share1 are encrypted. 

. Ensure that files located in Share1 are available when Server1 is disconnected from the network. 

What should you do? 

A. On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline. 

B. On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available offline. 

C. On Computer1, make Share1 available offline and enable encryption of offline files. 

D. On Computer1, copy the files from Share1 to the Documents library and configure BitLocker Drive Encryption. 

Answer: C 


Offline FilesThe Offline Files feature of Windows 7 allows a client to locally cache files 

hosted in shared folders so that they are accessible when the computer is unable to connect directly to the network resource. The Offline Files feature is available to users of the Professional, Enterprise, and Ultimate editions of Windows 7. You can use the Offline Files feature to ensure access when a client computer is out of the office or when a temporary disruption, such as a wide area network (WAN) link failing between a branch office and a head office, blocks access to specially configured shared folders. 

Using Sync CenterYou can use Sync Center to synchronize files, manage offline files, and resolve synchronization conflicts manually. Sync Center is located within the Control Panel or by typing Sync Center into the Search Programs and Files text box on the Start menu. Clicking Manage Offline Files opens the Offline Files. This dialog box is also available using the Offline Files control panel. Using this dialog box, you can disable offline files, view offline files, configure disk usage for offline files, configure encryption for offline files, and configure how often Windows 7 should check for slow network conditions. 

70-680 exams

Latest 70-680 practice question:

Q261. - (Topic 1) 

You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You manage a stand-alone computer which has only one partition. Windows 7 is run by this computer. The computer is shared by two users that are respectively named User1 and User2. User01 uses Encrypting File System (EFS) to encrypt a file. User01 tries to grant User2 access to the file as shown in the exhibit. You have to make sure that User1 are able to grant User2 access to the file. So what action should you perform to make sure of this? 

A. User02 should be instructed to log on to the computer and take ownership of the file. 

B. User02 should be instructed to log on to the computer and encrypt a file. 

C. User1 should be instructed to export his certificate to a certificate (.cer) file. 

D. User01 should be instructed to move the file to a shared folder on the computer. 

Answer: B 

Q262. - (Topic 1) 

Your network contains a wireless access point. You have a computer that runs Windows 7. The computer connects to the wireless access point. 

You disable Service Set Identifier (SSID) broadcasts on the wireless access point. 

You discover that you are now unable to connect to the wireless access point from the Windows 7 computer. 

You need to ensure that the computer can connect to the wireless access point. 

What should you do? 

A. From Credential Manager, modify the generic credentials. 

B. From Credential Manager, modify the Windows credentials. 

C. From Network and Sharing Center, turn on Network discovery. 

D. From Network and Sharing Center, modify the wireless network connection settings. 

Answer: D 


Wireless Network Connection settingsTo connect to a wireless network that does not broadcast its SSID, you need to know details such as the network name and security type. In Network And Sharing Center, you click Set Up A Connection Or Network, click Manually Connect To A Wireless Network, and click Next. You are prompted for the network name and security type and (if appropriate) encryption type and security key. Alternatively, you can open an elevated command prompt and enter a command with the following syntax: netsh wlan connect name=<profile_name> ssid-<network_ssid> [interface=<interface_name>] (Since the computer has previously been connected, just modify the settings.)NOT Network DiscoveryNetwork Discovery allows the client running Windows 7 to locate other computers and devices on the network. It also makes the client visible to other computers on the network. Disabling Network Discovery does not turn off other forms of sharing.NOT Credential ManagerCredential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson. 

Q263. - (Topic 4) 

You plan to deploy Windows 7 images. 

You need to ensure that you can deploy images using the WindowsPreinstallation Environment (Windows PE). 

What would you add to the Window PE Image? 

A. ImageX 

B. Usmtutils.exe 

C. Mighost.exe 

D. Loadstate.exe 

Answer: A 

Q264. - (Topic 3) 

You work as a desktop support technician at Abc.com. The Abc.com network consists of a single Active Directory domain named Abc.com. You are responsible for maintaining Abc.com's Windows 7 workstations. 

You want to configure all Windows 7 workstations to produce a new Security ID (SID) as well as a Welcome screen when the workstation is booted. 

What should you do? 

A. You should consider running Msconfig.exe /oobe /generalize startup on all Windows 7 workstations. 

B. You should consider running Sysprep.exe /audit /generalize on all Windows 7 workstations. 

C. You should consider running bootcfg.exe on all Windows 7 workstations. 

D. You should consider running Sysprep.exe /oobe /generalize on all Windows 7 workstations. 

Answer: D 

Q265. - (Topic 2) 

You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1 attempts to access a Web page. 

User1 fails to access the Web page and receives an error message stating that the page does not have a rating. 

You need to configure Internet Explorer to allow User1 to access Web pages that do not have a rating. 

Which settings should you modify? 

A. Content Advisor 

B. InPrivate Filtering 

C. Parental Controls 

D. Restricted Sites 

Answer: A 


Using Content Advisor to help block inappropriate web content The Internet is a great resource for children, offering a wealth of information and experiences. However, it can also expose children to information that might not be appropriate for them. Content Advisor allows you to control the types of Internet content that can be viewed on your computer. Depending on how you configure it, Content Advisor uses ratings that websites voluntarily provide to block or allow certain content. Because not all websites are rated, unrated websites are automatically blocked (but you can choose to allow them). Once you've adjusted the settings and turn Content Advisor on, it checks websites as you visit them. To use Content Advisor, you first need to create the supervisor password, and then you can specify the filters and rules you want applied to your children's web use. To change settings, you'll need to log in with the supervisor password before you can make changes. The following procedures describe how to create or change your supervisor password, and how to make specific changes to control Internet use. To allow unrated sites By default, content advisor will block unrated websites. To allow unrated sites to be viewed, follow the steps below. 

9. Click to open Internet Explorer. 

10. Click the Tools button, and then click Internet Options. 

11. Click the Content tab, and then, under Content Advisor, click Settings. If you are prompted for an administrator password or confirmation, type the password or provide confirmation. 

12. In the Supervisor Password Required dialog box, type your password, and then click OK. 

13. In the Content Advisor dialog box, click the General tab. 

14. Under User options 

70-680 exam guide

100% Guarantee 70-680 vce:

Q266. - (Topic 4) 

Your company has a server named Server1 that runs Windows Server 2008. Server1 is a Windows Server Update Services (WSUS) server. 

You have a computer named Computer1 that runs Windows 7. 

Computer1 is configured to obtain updates from Server1. 

You open the WSUS snap-in on Server1 and discover that Computer1 does not appear. 

You need to ensure that Computer1 appears in the WSUS snap-in. 

What should you do? 

A. On Server1, open Windows Update then select Check for updates. 

B. On Server1, run Wsusutil.exe and specify the /import parameter. 

C. On Computer1, open Windows Update and then select Change settings. 

D. On Computer1, run Wuauclt.exe and specify the /detectnow parameter. 

Answer: D 


wuauclt.exeThe wuauclt utility allows you some control over the functioning of the Windows Update Agent. It is updated as part of Windows Update.Detectnow OptionBecause waiting for detection to start can be a time-consuming process, an option has been added to allow you to initiate detection right away. On one of the computers with the new Automatic Update client installed, run the following command at the command prompt: wuauclt.exe /detectnow 

Q267. - (Topic 2) 

You have a computer that runs Windows 7 and Windows Internet Explorer 8. You discover that your browsing history is sent to a third-party advertising content provider. You need to prevent the browsing history from being sent only to that specific content provider. What should you do? 

A. Enable InPrivate Filtering and click Automatically block. 

B. Add the Web site for the content provider to the Restricted sites zone. 

C. Enable InPrivate Filtering and select the Choose content to block or allow option. 

D. View the privacy policy for the Web site and enable the Never allow this site to use cookies option. 

Answer: C 

Q268. - (Topic 2) 

You have a computer that runs Windows 7. The computer's disk is configured as shown in the exhibit. (Click the Exhibit button.) 

You need to extend volume C. 

What should you do first? 

A. Back up and delete volume D. 

B. Convert disk 0 to a dynamic disk. 

C. Remove the crash dump from volume C. 

D. Move the paging file from volume C to volume E. 

Answer: A 


Extend a Basic Volume You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume, it must be raw or formatted with the NTFS file system. You can extend a logical drive within contiguous free space in the extended partition that contains it. If you extend a logical drive beyond the free space available in the extended partition, the extended partition grows to contain the logical drive. For logical drives, boot, or system volumes, you can extend the volume only into contiguous space and only if the disk can be upgraded to a dynamic disk. For other volumes, you can extend the volume into noncontiguous space, but you will be prompted to convert the disk to dynamic. 

Q269. - (Topic 3) 

A standard user named User1 has a computer that runs Windows 7. 

You need to ensure that User1 can run Windows Easy Transfer. 

What should you do? 

A. Disable User Account Control (UAC). 

B. Add User1 to the Administrators group. 

C. Configure User1 to have a complex password. 

D. Copy the support folder from the Windows 7 installation media to the local hard disk drive. 

Answer: B 


Windows Easy Transfer Migration After you have set up Windows Easy Transfer on the source computer, you are ready to perform migration. If you want to migrate only a single user account, you can log on with that account to perform the transfer. If you want to migrate all accounts on the computer, you need to log on with a user account that has Local administrator privileges. 

To do this, start Windows Easy Transfer, select the transfer method, and then, on the Which Computer Are You Using Now? page, select This Is My Old Computer. If you are using the External Hard Disk or USB storage device method, Windows Easy Transfer will then perform a migration check and provide an estimate of the size of the data you can transfer to the new computer on the source computer. If you are using the Network or Easy Transfer Cable method, you will select items for migration on the destination computer. 

NOT User Account Control (UAC) UAC is a security feature of Windows 7 that informs you when the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks. 

Q270. - (Topic 2) 

You are investigating instability and boot problems on a computer running Windows 7 Enterprise. You boot using the Last Known Good Configuration (Advanced) option and perform a system restore. This does not solve your problems, and you want to undo the system restore. Can you do this, and what is the reason for your answer? 

A. No. You can undo a system restore only if you initiate it from the System Recovery tools. 

B. No. You can undo a system restore only if you carry it out after booting normally. 

C. Yes. You can always undo a system restore, no matter how you booted the computer or how you initiated the restore. 

D. Yes. You can undo a system restore that you perform after either booting normally or booting using Last Known Good Configuration (Advanced). 

Answer: D