Testking offers free demo for mcts 70 680 exam. "TS:Windows 7,Configuring", also known as microsoft 70 680 exam, is a Microsoft Certification. This set of posts, Passing the Microsoft 70 680 pdf exam, will help you answer those questions. The 70 680 exam Questions & Answers covers all the knowledge points of the real exam. 100% real Microsoft exam 70 680 exams and revised by experts!
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 70-680 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/70-680-exam-dumps.html
Q111. - (Topic 1)
Your network consists of an Active Directory domain named contoso.com. You have a computer named computer1.contoso.com.
Your network is configured to use only IPv6.
You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com.
Which type of record should you request?
A. A
B. AAAA
C. HINFO
D. NAPTR
Answer: B
Explanation:
The resolution of host names to IPv6 addresses is accomplished through DNS (apart from link-local addresses that are not stored by DNS and resolve automatically). The procedure is the same as for IPv4 address resolution with the computer name and IPv6 address pair being stored in a AAAA (quad-A) DNS resource record, which is equivalent to an A or host record for IPv4. Reverse DNS lookup that returns a computer name for an IPv6 address is implemented by a pointer (PTR) DNS resource record that is referred to the IPv6 reverse lookup zone (or tree) ipv6.arpa, which is the equivalent of the in-addr.arpa reverse lookup zone in Ipv4. AAAAAn AAAA (quad-A) resource record resolves a host name to an IPv6 address.AAn A (address) resource record resolves a host name to an IPv4 address.HINFOHost information (HINFO) resource record. Specifies the type of CPU and operating system in the cpu_type and os_type fields, respectively, for the host DNS domain name in the owner field. Well-known CPU and operating system types that are most often used are noted in RFC 1700. This information can be used by application protocols such as FTP, which use special procedures when communicating with computers of a known CPU and operating system type. NAPTR The NAPTR represents a Naming Authority Pointer. NAPTR records map between sets of URNs, URLs and plain domain names and suggest to clients what protocol should be used to talk to the mapped resource. Each NAPTR record contains a service name, a set of flags, a regexp rule, an order value, a preference and a replacement. Multiple records can be chained together in a cascade to rewrite URIs in fairly sophisticated, but deterministic
ways. These cascading rules have been standardized in RFC2915 and RFC3403.
Q112. - (Topic 3)
You have a computer that runs Windows 7 Home Premium.
You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time.
What should you do?
A. Perform a Windows Anytime Upgrade.
B. Download and run the Windows 7 Upgrade Advisor.
C. Insert the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option.
D. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option.
Answer: A
Explanation:
Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small businesses where a small number of intra-edition upgrades is required.
Windows Anytime Upgrade
Q113. - (Topic 3)
You have a computer that runs Windows 7.
You need to prevent ActiveX controls from running in Windows Internet Explorer.
Which Internet Explorer settings should you modify?
A. Content
B. Encoding
C. Safety
D. Security
Answer: D
Explanation:
Security You can use the slider to adjust the security level assigned to a zone. You can also configure whether a zone uses Protected Mode and Configure Custom Zone settings. Protected Mode is a technology that forces Internet Explorer to run as a low-integrity process. The security architecture of Windows 7 means that processes that are assigned lower integrities are unable to interact directly with objects that are assigned higher integrities. This means that any malware that might compromise the browser is blocked from causing damage to Windows 7 because it is unable to cause problems as a low-integrity process. The design of Windows 7 allows the processes that run in each tab to be separate from each other. This means that a tab that has a Web site in Protected Mode can run alongside a tab that has a site that is not running in Protected Mode. Sites that you do not trust, such as those on the Internet or within the Restricted Sites zone, are run in Protected Mode.
The three default security levels are Medium, Medium-High, and High. Each level is more restrictive, with High being the most restrictive. You can use the Custom Level button to configure a custom level of security for a zone. Items that can be configured include ActiveX control behavior, scripting, and user authentication settings. Unless your organization has unusual security requirements, the default security levels are usually sufficient.
Q114. - (Topic 1)
Which of the following best describes how the user is alerted with information system and configuration alerts?
A. A popup occurs and the Windows 7 desktop contrast is dimmed. Until you acknowledge the alert the screen will not move.
B. If Aero is installed the shaking alert flag appears in the index bar of every open window.
C. A flag in the taskbar with a red "x" indicates there is a problem needing attention.
D. All of the above
Answer: C
Q115. - (Topic 1)
You start a computer by using Windows Preinstallation Environment (Windows PE).
You need to dynamically load a network adapter device driver in Windows PE.
What should you do?
A. Run Peimg.exe and specify the device driver path.
B. Run Drvload.exe and specify the device driver path.
C. Run Winpeshl.exe and specify a custom Winpeshl.ini file.
D. Run Wpeutil.exe and specify the InitializeNetwork command.
Answer: B
Explanation:
Drvload The Drvload tool adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs. To add a driver to an offline Windows PE image, use the peimg tool.NOT WinpeshlWinpeshl.ini controls whether a customized shell is loaded in Windows PE instead of the default Command Prompt window. To load a customized shell, create a file named Winpeshl.ini and place it in %SYSTEMROOT% System32 of your customized Windows PE image. The .ini file must have the following section and entry.NOT WpeutilThe Windows PE utility (Wpeutil) is a command-line tool that enables you to run various commands in a Windows PE session. For example, you can shut down or restart Windows PE, enable or disable a firewall, set language settings, and initialize a network.
Q116. - (Topic 4)
YOU need to identify the hardware failures have occurred on your computer in the past six months.
What should you do?
A. From the Control Panel, open Troubleshooting.
B. From the Control Panel, open Performance Information and Tools.
C. From the Action Center, open Recovery.
D. From the Action Center, under Maintenance, click View reliability history.
Answer: D
Q117. - (Topic 2)
You are deploying a custom Windows 7 system image to a new computer.
You perform the following tasks:
. Start the new computer by using the Windows Preinstallation Environment (Windows PE)
. Connect to a shared network location that contains the Windows 7 image file
You need to apply the Windows 7 image to the computer.
What should you do before you apply the image?
A. Mount the image.
B. Configure Windows Firewall.
C. Configure and format the hard disk drive.
D. Initialize the Boot Configuration Data (BCD) store.
Answer: C
Explanation:
Deploying from a Network Share After you have imaged your reference installation, you can deploy the image onto new hardware (one or more destination computers). To access a network share as an installation source from the client computer, you need to boot the client computer into the Windows Preintallation Environment (Windows PE) environment. The Windows PE environment is a minimally featured operating system that allows you to access diagnostic and maintenance tools as well as access network drives. To deploy an image from a network share, you use the Diskpart tool to format the hard drive of a destination computer . Then you copy the image from the network share and begin the installation by running Setup.exe.
Q118. - (Topic 2)
You have a computer that runs Windows 7.
You perform regular data backups and system image backups. The computer experiences a hard disk failure. You replace the failed hard disk.
You need to recover the computer to the previous Windows 7 environment.
You start the computer from the Windows 7 installation media.
Which recover option should you select?
A. Command Prompt
B. Startup Repair
C. System Image Recovery
D. System Restore
Answer: C
Explanation:
System Image Recovery Enables you to implement a System Image restore. You would choose this option if your hard disk failed or needed to be wiped. If system changes are causing problems, you would choose the System Restore option.NOT Startup Repair Automatically fixes problems that prevent Windows from starting. If Windows 7 had boot problems during a previous restart, a normal boot (without accessing the Advanced Boot dialog box) gives you the option of selecting Startup Repair.NOT System Restore Gives you another method of starting a system restore to a previous restore point. Because you can access this menu when you boot from a DVD-ROM, this lets you repair your system when recent changes to system settings prevent your computer from booting normally.NOT Command Prompt Gives access to the file system, volumes, and files through a command-line interface.
Q119. - (Topic 6)
Your laptop has a 400 GB drive and currently reserves, by default, 2% (8 GB) for shadow copies.
You need to reserve more space for previous versions of files.
What should you do?
A. From System Properties, System Protection, expand the Max usage to 20 GB.
B. From System Properties, System Protection, turn off system protection.
C. From Disk Properties, change the Quota Settings from 8 GB to 20 GB.
D. From System Properties, System Protection, set it to only restore previous versions of files.
Answer: A
Explanation: Control Panel->System and Security. >System [Properties]->System Protection->Configure
Q120. - (Topic 4)
A company has client computers that run Windows 7 Enterprise.
Users complain that Windows displays too many notifications when they try to install software or make changes to their computer.
You need to decrease the number of notifications that Windows displays when users try to install software or make changes to their computer.
Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Local Users and Groups
B. the Services management console
C. the netsh command
D. the Group Policy management console
E. share permissions
F. the folder Properties window
G. Device Manager
H. the icacls command
I. the User Account Control Settings Control Panel window
Answer: D,I
