Your success in Microsoft microsoft 70 680 is our sole target and we develop all our mcts 70 680 braindumps in a way that facilitates the attainment of this target. Not only is our 70 680 pdf study material the best you can find, it is also the most detailed and the most updated. 70 680 practice test Practice Exams for Microsoft Windows mcts 70 680 are written to the highest standards of technical accuracy.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 70-680 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/70-680-exam-dumps.html
Q221. - (Topic 2)
You have a computer that runs windows 7.
You configure the computer to automatically install all updates.
You need to verify whether a specific update is installed.
What should you do?
A. In event viewer, examine the application log.
B. In windows update, examine the update history.
C. At the command prompt, run Wusa.exe and specify the /kb parameter.
D. At the command prompt, run Verifier.exe and specify the /query parameter.
Answer: B
Q222. - (Topic 5)
You have a computer that runs Windows 7.
The computer's hard disks are configured as shown in the following table.
You need to ensure that you can recover the operating system and all the files on the computer if hard disk 0 experiences hardware failure.
What should you do?
A. Create a restore point for both hard disks.
B. Use the Backup and Restore tool to back up data files for all users.
C. Create a system repair disk.
D. Use the Backup and Restore tool to create a system image on an external hard disk.
Answer: D
Explanation: System Image in Windows 7 The new backup utilities in Windows 7 are actually pretty impressive and creating an image will be possible in all versions. Today we take a look at creating a backup image of your machine without the need for a third party utility like Ghost or True Image.
You are just finished installing a fresh copy of Windows 7 on your computer and have it set up to your liking. One of the first things you should do now is create an image of the disc so in the event of a crash you will be able to restore it to its current state. An image is an exact copy of everything on the drive and will restore it back to its current state. It's probably best to create an image when everything is clean and organized on your system. This will make the image file smaller and allows you to restore the system with a smooth running set up.
Q223. - (Topic 1)
You have a computer named Computer1 that runs Windows 7. The computer is a member of an Active Directory domain. The network contains a file server named Server1 that runs Windows Server 2008.
You log on to the computer by using an account named User1.
You need to ensure that when you connect to Server1, you authenticate by using an account named Admin1.
What should you do on Computer1?
A. From User Accounts, select Link online IDs.
B. From Windows CardSpace, select Add a card.
C. From Credential Manager, select Add a Windows credential.
D. From Local Security Policy, modify the Access this computer from the network user right.
Answer: C
Explanation:
Credential Manager Credential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson.
Q224. - (Topic 2)
You have a computer that runs Windows 7.
You perform regular data backups and system image backups. The computer experiences a hard disk failure. You replace the failed hard disk.
You need to recover the computer to the previous Windows 7 environment.
You start the computer from the Windows 7 installation media.
Which recover option should you select?
A. Command Prompt
B. Startup Repair
C. System Image Recovery
D. System Restore
Answer: C
Explanation:
System Image Recovery Enables you to implement a System Image restore. You would choose this option if your hard disk failed or needed to be wiped. If system changes are causing problems, you would choose the System Restore option.NOT Startup Repair Automatically fixes problems that prevent Windows from starting. If Windows 7 had boot problems during a previous restart, a normal boot (without accessing the Advanced Boot dialog box) gives you the option of selecting Startup Repair.NOT System Restore Gives you another method of starting a system restore to a previous restore point. Because you can access this menu when you boot from a DVD-ROM, this lets you repair your system when recent changes to system settings prevent your computer from booting normally.NOT Command Prompt Gives access to the file system, volumes, and files through a command-line interface.
Q225. DRAG DROP - (Topic 6)
You capture a Windows Image (.wim) file from a reference computer.
You place the image file into a shared folder.
You need to deploy the image to a computer without an operating system.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q226. - (Topic 4)
You have a computer that runs Windows 7. Windows Update settings are configured as shown in the exhibit. (Click the Exhibit button.)
You discover that standard users are never notified when updates are available.
You need to ensure that standard users are notified when updates are available.
What should you do?
A. Select Allow all users to install updates on this computer.
B. Specify an intranet Microsoft update service location in Group Policy.
C. Change the Startup Type for the Windows Update service to Automatic.
D. Select Give me recommended updates the same way I receive important updates.
Answer: A
Explanation:
Change how Windows installs or notifies you about updates You can set Windows to automatically install important and recommended updates or to install important updates only. Important updates provide significant benefits, such as improved security and reliability. Recommended updates can address noncritical problems and help enhance your computing experience. Optional updates are not downloaded or installed automatically. If you don't want updates to be installed automatically, you can choose to be notified when updates apply to your computer instead. Then, you can download and install them yourself, or you can set Windows to automatically download updates, and then notify you so you can install them yourself. Here's how to change how Windows installs or notifies you about updates:
1. Click to open Windows Update.
2. In the left pane, click Change settings.
3. Under Important updates, click one of the following:
4. To schedule your automatic updates, next to Install new updates, select the day and time you want updates to occur. - Install updates automatically (recommended)
-Download updates but let me choose whether to install them
-Check for updates but let me choose whether to download and install them
-Never check for updates (not recommended)
5. To get recommended updates for your computer, under Recommended updates, select the Give me recommended updates the same way I receive important updates check box.
6. To allow anyone using the computer to make updates, select the Allow all users to install updates on this computer check box. This applies only to updates and software that are installed manually; automatic updates will be installed regardless of the user.
7. Click OK. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
Q227. - (Topic 1)
If you have a router in the network your connected to and the Default Gateway is set to
192.168.1.1 and the subnet mask is 255.255.255.0, which of the following are useable IP addresses on that network?
A. 192.168.1.1
B. 192.168.1.300
C. 192.168.1.30
D. 192.168.2.10
Answer: C
Q228. - (Topic 2)
You have 15 computers that run Windows 7.
You need to implement a monitoring solution that meets the following requirements:
. Sends an e-mail notification when an application error is logged in the event log . Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 . Minimizes the administrative effort required to monitor applications
What should you do?
A. On all the computers, configure a custom view. Configure a custom task for the application error events.
B. On a computer, configure a custom view to display the application errors. Configure a custom task for the application error events.
C. On a central computer, configure an event subscription. On all of the computers, configure a custom task in the Forwarded Events log.
D. On all the computers, configure an event subscription to a central computer. On the central computer, configure a custom task in the Forwarded Events log.
Answer: D
Explanation:
Event ForwardingEvent forwarding enables you to transfer events that match specific criteria to an administrative (or collector) computer. This enables you to manage events centrally. A single event log on the collector computer holds important events from computers anywhere in your organization. You do not need to connect to the local event logs on individual computers. SubscriptionsIn a source-initiated subscription (sometimes termed a source computer–initiated subscription), the computer on which an event is generated (the source computer) sends the event to the collector computer. You would use a source-initiated subscription when you have a large number of source computers and you configure these computers through Group Policy.
Q229. - (Topic 5)
You use a desktop computer that has Windows 7 SP1 Ultimate installed. As part of a disaster recovery plan, you perform regular data backups and system image backups of the desktop computer.
The hard disk drive in the computer fails after a power outage. You replace the hard disk drive and restart the desktop computer by using the Windows 7 SP1 installation media.
You need to recover the computer to its previous state.
What should you do?
A. Use Startup Repair.
B. Use the command prompt.
C. Use System Image Recovery.
D. Perform a system restore.
Answer: C
Explanation:
System Image Recovery
Enables you to implement a System Image restore. You would choose this option if your hard disk failed or needed to be wiped. If system changes are causing problems, you would choose the System Restore option.
NOT Startup Repair
Automatically fixes problems that prevent Windows from starting. If Windows 7 had boot problems during a previous restart, a normal boot (without accessing the Advanced Boot dialog box) gives you the option of selecting Startup Repair.
NOT System Restore
Gives you another method of starting a system restore to a previous restore point. Because you can access this menu when you boot from a DVD-ROM, this lets you repair your system when recent changes to system settings prevent your computer from booting normally.
NOT Command Prompt
Gives access to the file system, volumes, and files through a command-line interface.
Q230. - (Topic 4)
Your company has a server that runs Windows Server 2008 R2. The server is configured as a remote access server.
The external firewall has TCP port 80 and TCP port 443 open for remote access connections.
You have a home computer that runs Windows 7.
You need to establish secure remote access connection from the home computer to the remote access server.
Which type of connection should you configure?
A. IPSEC
B. L2TP
C. PPTP
D. SSTP
Answer: D
Explanation:
Secure Socket Tunneling Protocol Secure Socket Tunneling Protocol (SSTP) is a new form of VPN tunnel with features that allow traffic to pass through firewalls that block PPTP and L2TP/IPsec traffic. SSTP provides a mechanism to encapsulate PPP traffic over the SSL channel of the HTTPS protocol. The use of PPP allows support for strong authentication methods such as EAP-TLS. The use of HTTPS means traffic will flow through TCP port 443, a port commonly used for Web access. Secure Sockets Layer (SSL) provides transport-level security with enhanced key negotiation, encryption, and integrity checking.