It is more faster and easier to pass the Microsoft exam 70 680 exam by using Pinpoint Microsoft TS:Windows 7,Configuring questuins and answers. Immediate access to the Up to the immediate present mcts 70 680 Exam and find the same core area exam 70 680 questions with professionally verified answers, then PASS your exam with a high score now.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 70-680 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/70-680-exam-dumps.html
Q201. - (Topic 3)
You have a computer that is certified for Windows 7.
You need to install Windows 7 on the computer. The installation method must prevent you from being prompted for information during the installation.
What should you do?
A. Create an unattend.txt file on a removable drive. Start the computer from the Windows 7 installation media.
B. Create an autounattend.xml file on a removable drive. Start the computer from the Windows 7 installation media.
C. Start the computer from the Windows 7 installation media. At the command prompt, run Setup.exe and specify the /m parameter.
D. Start the computer from the Windows 7 installation media. At the command prompt, run Setup.exe and specify the /tempdrive.
Answer: B
Explanation: Copy the Autounattend.xml file to the root directory of a removable storage device (such as a UFD). You now have a basic answer file that automates Windows Setup. Turn on the reference computer. Insert the Windows 7 product DVD and the UFD containing the answer file (Autounattend.xml) that you created. Windows Setup (Setup.exe) starts automatically and searches the root directory of all removable media for an answer file called Autounattend.xml Note: that the use of an answer file is optional, although it is the method Microsoft recommends. (And it was specified in the question).
Q202. - (Topic 1)
Your network contains a wireless access point. You have a computer that runs Windows 7. The computer connects to the wireless access point.
You disable Service Set Identifier (SSID) broadcasts on the wireless access point.
You discover that you are now unable to connect to the wireless access point from the Windows 7 computer.
You need to ensure that the computer can connect to the wireless access point.
What should you do?
A. From Credential Manager, modify the generic credentials.
B. From Credential Manager, modify the Windows credentials.
C. From Network and Sharing Center, turn on Network discovery.
D. From Network and Sharing Center, modify the wireless network connection settings.
Answer: D
Explanation:
Wireless Network Connection settingsTo connect to a wireless network that does not broadcast its SSID, you need to know details such as the network name and security type. In Network And Sharing Center, you click Set Up A Connection Or Network, click Manually Connect To A Wireless Network, and click Next. You are prompted for the network name and security type and (if appropriate) encryption type and security key. Alternatively, you can open an elevated command prompt and enter a command with the following syntax: netsh wlan connect name=<profile_name> ssid-<network_ssid> [interface=<interface_name>] (Since the computer has previously been connected, just modify the settings.)NOT Network DiscoveryNetwork Discovery allows the client running Windows 7 to locate other computers and devices on the network. It also makes the client visible to other computers on the network. Disabling Network Discovery does not turn off other forms of sharing.NOT Credential ManagerCredential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson.
Q203. - (Topic 3)
Your network contains an Intrasite Automatic Tunnel Addressing Protocol (ISATAP) router. You run Ipconfig as shown in the exhibit. (Click the Exhibit button.)
Other users on the network receive an IPv6 address for ISATAP.
You need to ensure that your computer receives an IPv6 address for ISATAP.
What should you do?
A. Run Ipconfig /renew6.
B. Run Ipconfig /setclassid6.
C. Start the Net.TCP Port Sharing service.
D. Start the Internet Protocol Helper (IP Helper) service.
Answer: D
Explanation: Internet Protocol Helper (IP Helper) service Provides tunnel connectivity using IPv6 transition technologies (6to4, ISATAP, Port Proxy, and Teredo), and IPHTTPS. If this service is stopped, the computer will not have the enhanced connectivity benefits that these technologies offer. Internet Protocol Helper (IP Helper) assists network administration of the local computer by enabling applications to retrieve information about the network configuration of the local computer, and to modify that configuration. IP Helper also provides notification mechanisms to ensure that an application is notified when certain aspects of the local computer network configuration change.
Q204. - (Topic 5)
You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU.
You need to analyze the performance of the computer to meet the following requirements:
Include the CPU, Memory, and Disk subsystems.
Display real-time performance.
Obtain a list of users who have logged on by using the same tool.
What should you do?
A. Run powercfg.exe.
B. Run the Windows Experience Index.
C. Configure Event Viewer subscriptions.
D. Open Task Manager.
E. Open System Properties, and configure performance settings.
F. Open System Properties, and configure environment variables.
G. Open System Properties, and configure user profiles settings.
H. Open System Properties, and configure the page file settings.
I. Open Performance Monitor, and configure a Data Collector Set.
J. Open Performance Monitor, and customize the System Monitor view.
Answer: D
Q205. - (Topic 2)
You have a computer that runs Windows 7 and Windows Internet Explorer 8. You discover that your browsing history is sent to a third-party advertising content provider. You need to prevent the browsing history from being sent only to that specific content provider. What should you do?
A. Enable InPrivate Filtering and click Automatically block.
B. Add the Web site for the content provider to the Restricted sites zone.
C. Enable InPrivate Filtering and select the Choose content to block or allow option.
D. View the privacy policy for the Web site and enable the Never allow this site to use cookies option.
Answer: C
Q206. - (Topic 2)
Which of the following steps will keep a Microsoft Word shortcut icon on the Taskbar after the next reboot?
A. Copy and paste a Microsoft Word icon to the Taskbar.
B. Right click on the Microsoft Word icon and choose, "Staple to Superbar".
C. Right click on the Microsoft Word icon and choose, "Pin this programm to taskbar".
D. Open Microsoft Word. While the Icon is on the Taskbar, right click the icon and choose, "Pin this program to taskbar".
Answer: D
Q207. - (Topic 5)
You administer computers that have Windows 7 and Internet Explorer 8 installed.
You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer.
You need to ensure that any data about your browser session is not saved on the computer.
What should you do?
A. Disable Internet Connection Sharing.
B. From Internet Options, select Delete browsing history on exit.
C. Start the Microsoft Network Access Protection service.
D. From the Safety drop-down menu, configure InPrivate Filtering.
Answer: B
Q208. DRAG DROP - (Topic 6)
You capture a Windows Image (.wim) file from a reference computer.
You want to use Windows Deployment Services (WDS) in an unattended mode to deploy the image f\e to target desktops.
You need to encrypt an administrator account password in the answer file used for the image deployment.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q209. - (Topic 2)
Your network consists of a single Active Directory domain named contoso.com.
You have a server named Server1 that runs a custom network application.
Server1 has the following IP addresses:
. 192.168.15.10
. 192.168.15.11
You need to ensure that a client computer resolves server1.contoso.com to only the 192.168.15.11 IP address.
What should you do from the computer?
A. Edit the hosts file
B. Edit the lmhosts file
C. Run Ipconfig.exe /flushdns
D. Run Netsh interface ipv4 reset
Answer: A
Explanation:
Differences Between the HOSTS and LMHOSTS Files in Windows NT In Windows NT, the HOSTS file is for TCP/IP utilities, and the LMHOSTS file is for LAN Manager NET utilities. If you cannot PING another computer (using a friendly name), check the HOSTS file. If you cannot NET VIEW a server using only the TCP/IP protocol, check the LMHOSTS file.
Hosts fileThe Hosts file is a common way to resolve a host name to an IP address through a locally stored text file that contains IP-address-to-host-name mappings. On most UNIX-based computers, this file is /etc/hosts. On Windows-based computers, this file is the Hosts file in the systemrootSystem32DriversEtc folder. The following describes the attributes of the Hosts file for Windows: A single entry consists of an IP (IPv4 or IPv6) address and one or more host names. The Hosts file is dynamically loaded into the DNS client resolver cache, which Windows Sockets applications use to resolve a host name to an IP address on both local and remote subnets. When you create entries in the Hosts file and save it, its contents are automatically loaded into the DNS client resolver cache. The Hosts file contains a default entry for the host name localhost. The Hosts file can be edited with any text editor. Each host name is limited to 255 characters. Entries in the Hosts file for Windows–based computers are not case sensitive. The advantage of using a Hosts file is that users can customize it for themselves. Each user can create whatever entries they want, including easy-to-remember nicknames for frequently accessed resources. However, the individual maintenance required for the Hosts file does not scale well to storing large numbers of FQDN mappings or reflecting changes to IP addresses for servers and network resources. The solution for the large-scale storage and maintenance of FQDN mappings is DNS. The solution for the maintenance of FQDN mappings for changing IP addresses is DNS dynamic update.NOT LMHOSTS FileThe LMHOSTS file is a local text file that maps IP addresses to NetBIOS names of remote servers with which you want to communicate over the TCP/IP protocol. Windows recognizes names instead of IP addresses for network requests and a name discovery process is used to correctly route network requests with TCP/IP. Because the name discovery process is generally not routed by an IP router, the LMHOSTS file allows Windows machines to communicate using TCP/IP across a subnet.
-LMHOSTS contains IP address to "NetBIOS over TCP/IP" name translations.
-LMHOSTS is only used by the NBT (NetBIOS over TCP/IP) interface.
-LMHOSTS file contains some valuable additions to the LAN Manager and Windows for Workgroups
-LMHOSTS file, such as the ability to support routed domain logon validation.
-LMHOSTS contains static information about TCP/IP addresses, but using logon scripts and/or the replicator service, the "master" file can be distributed transparently across all stations.
-By default, the LMHOSTS file should be located in the directory %SYSTEMROOT%SYSTEM32DRIVERS ETC (usually C:WINNTSYSTEM32DRIVERSETC).
Other info http://support.microsoft.com/kb/105997
Q210. - (Topic 6)
You have an answer file named Unattend.xml for a Windows 7 automated installation.
You need to perform an unattended installation of Windows 7 by using the answer file.
What should you do?
A. Name the answer file as unattend.xml and save it to a floppy disk. Start the computer from the Windows Preinstallation Environment (WinPE).
B. Name the answer file as unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (WinPE).
C. Name the answer file as autounattend.xml and save it to a floppy disk. Start the computer from the Windows 7 DVD.
D. Name the answer file as autounattend.ini and save it to a floppy disk. Start the computer from the Windows 7 DVD.
Answer: C
Explanation: Unattended installation You can perform an unattended installation of Windows 7 by using an installation file called Unattend.xml. These installation files store answers to the questions asked by the Setup Wizard. When the Windows 7 installation process starts, Windows checks for attached USB storage devices that have this file in their root directory. Unattended installations are suitable when you need to deploy Windows 7 to a large number of computers because you do not have to interact with them manually, responding to prompts, as the installation progresses.Building a Reference Installation You configure your reference computer with a customized installation of Windows 7 that you then duplicate onto one or more destination computers. You can create a reference installation by using the Windows product DVD and (optionally) the answer file you created in the previous section. To install your reference computer using an answer file, perform the following procedure:
1. Turn on the reference computer. Insert the Windows 7 product DVD and the UFD containing the answer file (Autounattend.xml) that you created in the previous section. Note that the use of an answer file is optional, although it is the method Microsoft recommends. If you prefer, you can install Windows 7 manually from the installation DVD-ROM.
2. Restart the computer by pressing CTRL+ALT+DEL. You may have to override the boot order to boot from the CD/DVD-ROM disk. If so, select the appropriate function key to override the boot order during initial boot. Windows Setup (Setup.exe) starts automatically and searches the root directory of all removable media for an answer file called
Autounattend.xml.
3. After Setup finishes, you can validate that all customizations were applied. For example, if you included the optional Microsoft-Windows-IE-InternetExplorer feature and set the Home_Page setting in your answer file, you can verify these settings by opening Internet Explorer.
4. To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart.