Quick Guide: exam 70 680

Ucertify exam 70 680 Questions are updated and all 70 680 exam answers are verified by experts. Once you have completely prepared with our microsoft 70 680 exam prep kits you will be ready for the real microsoft 70 680 exam without a problem. We have Rebirth Microsoft 70 680 exam dumps study guide. PASSED microsoft 70 680 First attempt! Here What I Did.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-680 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-680-exam-dumps.html

Q131. - (Topic 1) 

You plan to install Windows 7 on a computer that contains a single hard disk drive. The hard disk drive is connected to a RAID controller. 

During the installation, you discover that the Windows 7 installation media does not include the files required to install the RAID controller. 

You need ensure that you can install Windows 7 on the hard disk drive. 

What should you do? 

A. Insert the Windows installation media and press F8 during the computer's power-on self test (POST). 

B. Insert the Windows installation media and press F6 during the computer's power-on self test (POST). 

C. Start the computer from the Windows installation media. From the Install Windows dialog box, click Load Driver. 

D. Start the computer from the Windows installation media. From the Install Windows dialog box, click Drive options (advanced). 

Answer:

Explanation: 

If your computer has special disk drive hardware, such as a redundant array of independent disks (RAID) array, it may be necessary to use the Load Driver option. It is necessary to use this option only if the disk that you want to install Windows on is not shown as a possible install location. If your disk is shown as an available option, Windows 7 has already loaded the appropriate drivers. Once you select the location where you want to install Windows 7, the Windows 7 installation process begins. 


Q132. - (Topic 4) 

Your company has a server named Server1 that runs Windows Server 2008. Server1 is a Windows Server Update Services (WSUS) server. 

You have a computer named Computer1 that runs Windows 7. 

Computer1 is configured to obtain updates from Server1. 

You open the WSUS snap-in on Server1 and discover that Computer1 does not appear. 

You need to ensure that Computer1 appears in the WSUS snap-in. 

What should you do? 

A. On Server1, open Windows Update then select Check for updates. 

B. On Server1, run Wsusutil.exe and specify the /import parameter. 

C. On Computer1, open Windows Update and then select Change settings. 

D. On Computer1, run Wuauclt.exe and specify the /detectnow parameter. 

Answer:

Explanation: 

wuauclt.exeThe wuauclt utility allows you some control over the functioning of the Windows Update Agent. It is updated as part of Windows Update.Detectnow OptionBecause waiting for detection to start can be a time-consuming process, an option has been added to allow you to initiate detection right away. On one of the computers with the new Automatic Update client installed, run the following command at the command prompt: wuauclt.exe /detectnow 


Q133. - (Topic 1) 

Which of the following is not a Windows PE tool? 

A. Diskpart 

B. Oscdimg 

C. Winpeshl 

D. None of the above. 

Answer:


Q134. - (Topic 4) 

You have a computer that runs Windows 7. You need to prevent users from copying unencrypted files to removable drives. What should you do? 

A. From the Trusted Platform Module (TPM) snap-in, initialize TPM. 

B. From Control Panel, modify the BitLocker Drive Encryption settings. 

C. From a local Group Policy, modify the BitLocker Drive Encryption settings. 

D. From a local Group Policy, modify the Trusted Platform Module (TPM) settings 

Answer:

Explanation: 

How can I prevent users on a network from storing data on an unencrypted drive? In Windows 7, you can enable Group Policy settings to require that data drives be BitLockerprotected before a BitLocker-protected computer can write data to them. The policy settings you use for this are: Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionFixed Data DrivesDeny write access to fixed drives not protected by BitLocker Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionRemovable Data DrivesDeny write access to removable drives not protected by BitLocker 

When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only. If you are concerned that your users might inadvertently store data in an unencrypted drives while using a computer that does not have BitLocker enabled, use access control lists (ACLs) and Group Policy to configure access control for the drives or hide the drive letter. 


Q135. DRAG DROP - (Topic 5) 

Windows 7 client computers in your company network are assigned IP addresses manually or by using DHCP. 

Recent changes have been made to a DHCP Server scope. Desktops that have manually assigned IP addresses are reporting that they can no longer connect to the Internet. 

You need to ensure that all client computers receive IP address and DNS servers' addresses from the DHCP server. 

Which commands should you run? (To answer, move the appropriate commands from the list of commands to the answer area and arrange them in the correct order.) 

Answer: 


Q136. - (Topic 5) 

You administer a computer that has Windows 7 Enterprise installed. 

The computer reboots unexpectedly. You suspect that an unsigned driver causes the reboots. 

You need to view a list of all installed device drivers that contain information about the digital signature of the device driver. 

Which should you do? 

A. Run the driverquery.exe /SI command. 

B. Open the System Protection configuration for drive C. 

C. Open Device Manager, show hidden devices, and sort all devices by type. 

D. Run sigverif.exe and start the verification process of the device drivers. Then, review the generated log file. 

Answer:


Q137. - (Topic 4) 

You have two computers named Computer1 and Computer2 that run Windows 7. 

Computer1 has a dynamic disk. 

You remove the disk from Computer1 and connect the disk to Computer2. 

You need to ensure that you can open files on all hard disk drives connected to Computer2. 

What should you do from the Disk Management snap-in? 

A. Convert a disk. 

B. Rescan the disks. 

C. Import a foreign disk. 

D. Attach a virtual hard disk (VHD). 

Answer:

Explanation: 

10199 2074 20229 Moving Disks to Another Computer Before you move disks to another computer, you should use Disk Management to make sure the status of the volumes on the disks is Healthy. If the status is not Healthy, you should repair the volumes before you move the disks. To verify the volume status, check the Status column in the Disk Management console. Your next step is to uninstall the disks you want to move. In the Computer Management Navigation pane (the left pane), open Device Manager. In the device list, double-click Disk Drives. Right-click each of the disks you want to uninstall in turn and then click Uninstall. In the Confirm Device Removal dialog box, click OK. If the disks that you want to move are dynamic disks, right-click the disks that you want to move in Disk Management, and then click Remove Disk. After you have removed dynamic disks, or if you are moving basic disks, you can disconnect the disk drives physically. If the disks are external, you can now unplug them from the computer. If they are internal, turn off the computer and then remove the disks. If the disks are external, plug them into the destination computer. If the disks are internal, make sure the computer is turned off and then install the disks in that computer. Start the destination computer and follow the instructions on the Found New Hardware dialog box. On the destination computer, open Disk Management, click Action, and then click Rescan Disks. Right-click any disk marked Foreign, click Import Foreign Disks, and then follow the on- screen instructions. 

http://technet.microsoft.com/en-us/library/cc753750.aspx 


Q138. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

You need to ensure that only signed and validated executable files are run with elevated privileges. 

What should you use to achieve this goal? 

A. the folder properties window 

B. the icacls command 

C. Device Manager 

D. share permissions 

E. the Group Policy management console 

F. Local Users and Groups 

G. the netsh command 

H. the Services management console 

I. the User Account Control Settings Controal Panel window 

Answer:

Explanation: 

http://www.mcmcse.com/microsoft/guides/70-680/configure_uac.shtml Accessed through secpol.msc too 


Q139. - (Topic 4) 

Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BrachCache features installed. 

You add new client computers the network. The computers have Windows 7 installed and are members of a workgroup. 

You need to ensure that the new client computers are configured to cache and share files. 

What should you do? 

A. Run the Netsh branchcache set service mode=HOSTEDSERVER client authentication=NONE command 

B. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound trafficfor local TCP port 80. 

C. Create a Group Policy that sets Hash Publication for BranchCache as disabled. 

D. Run the netsh branchcache set service mode=DISTRIBUTED command. 

E. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option. 

F. Check permisions. 

G. Run the netsh branchcache set service mode=HOSTEDCLIENT command. 

H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy. 

I. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443. 

Answer:


Q140. - (Topic 3) 

You have two computers named Computer1 and Computer2 that run Windows 7. Computer2 is configured for remote management. 

From Computer1, you need to remotely execute a third-party command line tool named disk.exe on Computer2. 

Which command should you run? 

A. Start disk.exe /d \\computer2 

B. Tscon disk.exe /DEST:computer2 

C. Winrm e disk.exe Cr:computer2 

D. Winrs r:computer2 disk.exe 

Answer:

Explanation: 

WinrsYou can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS –r: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS –r:Aberdeen ipconfig. 

The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt.