It is more faster and easier to pass the Microsoft 70 680 practice test exam by using Validated Microsoft TS:Windows 7,Configuring questuins and answers. Immediate access to the Improved microsoft 70 680 Exam and find the same core area exam 70 680 questions with professionally verified answers, then PASS your exam with a high score now.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 70-680 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/70-680-exam-dumps.html
Q91. - (Topic 3)
You have a computer that runs Windows 7.
Windows Backup is configured to store backups on an external drive.
You create a new NTFS volume on the computer.
You need to configure Windows Backup to include the files on the new volume as part of regularly scheduled backups.
What should you do?
A. From Backup and Restore, select Change settings.
B. From Backup and Restore, select Create a system image.
C. From the System Protection tab, create a restore point.
D. From the System Protection tab, enable system protection for the new volume.
Answer: A
Explanation:
Backups are configured and scheduled by using the Backup And Restore console under
System And Security in Control Panel.
The Change Settings option is not available unless you have configured a backup schedule
and performed a backup.
Q92. - (Topic 4)
You have a netbook computer that runs Windows 7. The computer has a single 30-GB partition that has 10 GB of free space. You need to create a system image of the computer by using Windows Backup.
You must achieve this goal by using the minimum amount of time. What should you do first?
A. Attach an external hard disk.
B. Attach an external DVD burner.
C. Convert the local hard disk to a GPT disk.
D. Create and attach a virtual hard drive (VHD).
Answer: A
Explanation:
Scheduling Backups with the Backup And Restore Console Windows 7 Backup uses shadow copies to take a snapshot of your files, allowing the backup to completely back up files even if they are open. Backups are configured and scheduled by using the Backup And Restore console under System And Security in Control Panel. You can select the following types of backup destination: An external hard driveExternal hard drives are more expensive to purchase than internal hard drives, although you need to balance this against the cost of fitting the internal drive. They can be removed and stored in a secure location. However, they are typically slower than internal hard drives and tend to be less reliable, mainly because they are by default formatted using FAT rather than NTFS. You cannot use an external hard drive for a System Image backup unless you convert its filing system to NTFS. Because it is easily removable, it is more likely that an external hard drive will be missing when a scheduled backup is required.
Q93. - (Topic 4)
You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU.
You need to analyze the performance of the computer to meet the following requirements:
. Include the CPU, Memory, and Disk subsystems.
. Send events to another computer for predefined Event IDs.
What should you do?
A. Run powercfg.exe.
B. Run the Windows Experience Index.
C. Configure Event Viewer subscriptions.
D. Open Task Manager.
E. Open System Properties, and configure performance settings.
F. Open System Properties, and configure environment variables.
G. Open System Properties, and configure user profiles settings.
H. Open System Properties, and configure the page file settings.
I. Open Performance Monitor, and configure a Data Collector Set.
J. Open Performance Monitor, and customize the System Monitor view.
Answer: C
Q94. - (Topic 1)
A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named Group1.
The computer contains a folder named Folder1.
You need to configure the permissions on Folder1 to meet the following requirements:
User1 must be allowed to delete all files in Folder1
Members of Group1 must be able to create files in Folder1
All other members of Group1 must be prevented from deleting files they did not create in Folder1
All users must be prevented from modifying the permissions on Folder1
What should you do?
A. Assign Group1 the Write permission. Assign User1 the Modify permission.
B. Assign Group1 the Modify permission. Assign User1 the Write permission.
C. Deny Group1 the Write permission. Assign User1 the Modify permission.
D. Deny Group1 the Modify permission. Assign User1 the Write permission.
Answer: A
Explanation:
File and Folder Permissions ReadFolders: Permits viewing and listing of files and subfoldersFiles: Permits viewing or accessing of the file's contentsWriteFolders: Permits adding of files and subfoldersFiles: Permits writing to a fileRead & ExecuteFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by files and folders Files: Permits viewing and accessing of the file's contents as well as executing of the fileList Folder ContentsFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by folders onlyFiles: N/AModifyFolders: Permits reading and writing of files and subfolders; allows deletion of the folderFiles: Permits reading and writing of the file; allows deletion of the fileFull ControlFolders: Permits reading, writing, changing, and deleting of files and subfoldersFiles: Permits reading, writing, changing and deleting of the file
Q95. - (Topic 3)
You have a Windows 7 computer that is a member of a workgroup.
You need to prevent members of a local group from starting a specific application.
You must achieve this goal by using the minimum amount of administrative effort.
What should you create?
A. administrative template
B. application control policy
C. IPSec policy
D. software restriction policy
Answer: B
Explanation:
AppLocker Application Control Policies AppLocker is a feature new to Windows 7 that is available only in the Enterprise and Ultimate editions of the product. AppLocker policies are conceptually similar to Software Restriction Policies, though AppLocker policies have several advantages, such as the ability to be applied to specific user or group accounts and the ability to apply to all future versions of a product. Hash rules apply only to a specific version of an application and must be recalculated whenever you apply software updates to that application. AppLocker policies are located in the Computer ConfigurationWindows Settings Security SettingsApplication Control Policies node of a standard Windows 7 or Windows Server 2008 R2 GPO.
AppLocker relies upon the Application Identity Service being active. When you install Windows 7, the startup type of this service is set to Manual. When testing AppLocker, you should keep the startup type as Manual in case you configure rules incorrectly. In that event, you can just reboot the computer and the AppLocker rules will no longer be in effect. Only when you are sure that your policies are applied correctly should you set the startup type of the Application Identity Service to Automatic. You should take great care in testing AppLocker rules because it is possible to lock down a computer running Windows 7 to such an extent that the computer becomes unusable. AppLocker policies are sometimes called application control policies.
Q96. - (Topic 5)
You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU.
You need to analyze the performance of the computer to meet the following requirements:
. Include the CPU, Memory, and Disk subsystems.
. Collect information in a report.
What should you do?
A. Run powercfg.exe.
B. Run the Windows Experience Index.
C. Configure Event Viewer subscriptions.
D. Open Task Manager.
E. Open System Properties, and configure performance settings.
F. Open System Properties, and configure environment variables.
G. Open System Properties, and configure user profiles settings.
H. Open System Properties, and configure the page file settings.
I. Open Performance Monitor, and configure a Data Collector Set.
J. Open Performance Monitor, and customize the System Monitor view.
Answer: I
Q97. DRAG DROP - (Topic 5)
Your company network includes a Windows Server 2008 R2 server named Server 1. You use a client computer named Client1 that has Windows 7 Enterprise installed. Both computers are members of an Active Directory domain.
You want to automatically collect events from Client1 to Server1. Bandwidth delivery optimization will not be used along with the subscription.
You need to configure the required collector-initiated subscription.
What should you do? (To answer, drag the appropriate configuration step or configuration steps to the correct target computer or target computers in the answer area. An answer choice can be used once, more than once, or not at all.)
Answer:
Q98. - (Topic 4)
You administer client computers that have Windows 7 Enterprise installed.
A server names Server1 has an IP address of 10.10.4.46. The server accepts Remote Desktop connections at a custom port 10876.
You need to connect to the server from a client computer by using Remote Desktop.
What should you do?
A. From an elevated command prompt, run mstsc.exe /v:server1:10876
B. From an elevated command prompt, run msts.exe 10.10.4.56 port:10876
C. From an elevated command prompt, run msts.exe Server1 port:10876
D. From the Advanced tab of your remote Desktop connection, configure the IP address and port of Server1 as the RD Gateway Server
Answer: A
Explanation:
http://windows.microsoft.com/en-us/windows-vista/Use-command-line-parameters-with-Remote-Desktop-Connection
Use command line parameters with Remote Desktop Connection
Instead of starting Remote Desktop Connection from the Start menu, you can start it from the search box in this version of Windows, from the Run dialog box, or from a command line. With these methods, you can use additional command line parameters to control how
Remote Desktop Connection looks or behaves.
To start Remote Desktop from the Run dialog box, follow these steps:
Click the Start button , click All Programs, click Accessories, and then click Run.
In the Open box, type mstsc.
Type a space, followed by any additional parameters that you want to use.
The following table lists the parameters you can use.
Command line syntax for Remote Desktop Connection
Syntax
mstsc [<connection file>] [/v:<server[:port]>] [/admin] [/f[ullscreen]] [/w:<width>]
[/h:<height>] [/public] | [/span] [/edit "connection file"] [/migrate] [/?]
Command line parameters for Remote Desktop Connection ParameterDescription
Q99. DRAG DROP - (Topic 5)
You use a computer that has Windows 7 Enterprise installed.
You install two new hard disk drives and verify that the disks have been detected by Disk Management.
You need to configure the two new disks for maximum read and write performance.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q100. - (Topic 6)
You are deploying a number of Windows 7 laptops.
You create a custom power plan on one of the laptops that you want to replicate to the other laptops by using an unattended setup.
You need to capture the power plan from the configured laptop for use in the deployment of the other laptops, save it to the removable drive F:, and name it MobileScheme.
What should you do?
A. Run the command powercfg duplicatescheme <GUID> F:MobileScheme.pow from an elevated command prompt.
B. Run the command powercfg -EXPORT F:MobileScheme.pow {GUID} from an elevated command prompt.
C. Run the command powercfg -S F:MobileScheme.pow from an elevated command prompt.
D. Create a power plan from the Power Options control panel and save it to the F: drive as MobileScheme.
Answer: B
