Microsoft Official Exam Center Latest Added Questions and Answers Free Download from Braindump2go!
Vendor: Microsoft
Exam Code: 70-680
Exam Name: TS: Windows 7, Configuring
QUESTION 181
A company has client computers that run Windows Vista.
You need to install Windows 7 on a client computer in a dual-boot configuration with the existing Windows Vista installation, without reducing the size of the partition that contains Windows Vista.
Which actions should you perform in sequence?
(To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
QUESTION 182
You have 15 computers that run Windows 7.
You need to implement a monitoring solution that meets the following requirements:
– Sends an e-mail notification when an application error is logged in the event log.
– Runs a script to restart the computer if an application error occurs between 17:00 and 07:00.
– Minimizes the administrative effort required to monitor applications.
What should you do?
A. On all the computers, configure a custom view.
Configure a custom task for the application error events.
B. On a computer, configure a custom view to display the application errors.
Configure a custom task for the application error events.
C. On a central computer, configure an event subscription.
On all of the computers, configure a custom task in the Forwarded Events log.
D. On all the computers, configure an event forwarding to a central computer.
On the central computer, configure a custom task in the Forwarded Events log.
Answer: D
Explanation:
Event ForwardingEvent forwarding enables you to transfer events that match specific criteria to an administrative (or collector) computer. This enables you to manage events centrally. A single event log on the collector computer holds important events from computers anywhere in your organization. You do not need to connect to the local event logs on individual computers.
SubscriptionsIn a source-initiated subscription (sometimes termed a source computer-initiated subscription), the computer on which an event is generated (the source computer) sends the event to the collector computer. You would use a source-initiated subscription when you have a large number of source computers and you configure these computers through Group Policy.
QUESTION 183
You have a computer that runs Windows 7.
You have a system image of the computer.
You need to restore a single file from the system image.
You must achieve the goal using minimum administrative effort.
What should you do?
A. From Disk Management, select Attach VHD.
B. From the Backup and Restore, select Restore my files.
C. Restart the computer and run system restore.
D. Restart the computer and run system image recovery.
Answer: A
Explanation:
Attach VHD:
Attaching a VHD activates the VHD so that it appears on the host computer as a local hard disk drive. This is sometimes called “surfacing a VHD” because the VHD is now visible to users. If the VHD already has a disk partition and file system volume when you attach it, the volume inside the VHD is assigned a drive letter. The assigned drive letter is then available for use, similar to when you insert a USB flash drive into a USB connector. All users (not just the current user) can use the attached VHD in the same way they use other volumes on local physical hard disk drives (depending on security permissions). Furthermore, because you can attach a VHD that is located on a remote server message block (SMB), you can manage your images remotely. Once attached the single file can be restored. The other answers are overkill or replace all files not just the one required.
http://technet.microsoft.com/en-us/library/dd440865%28WS.10%29.aspx
What is system protection?
System protection is a feature that regularly creates and saves information about your computer’s system files and settings. System protection also saves previous versions of files that you’ve modified. It saves these files in restore points, which are created just before significant system events, such as the installation of a program or device driver. They’re also created automatically once every seven days if no other restore points were created in the previous seven days, but you can create restore points manually at any time.
System protection is automatically on for the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
There are two ways that you can take advantage of system protection:
* If your computer is running slowly or isn’t working properly, you can use System Restore to return your computer’s system files and settings to an earlier point in time using a restore point.
* If you accidentally modify or delete a file or folder, you can restore it to a previous version that’s saved as part of a restore point.
QUESTION 184
You administer desktops that have 32-bit and 64-bit versions of Windows 7 Enterprise SP1 installed. All desktops have a single CD-RW drive. The local hard disk drives on all computers are partitioned with a recovery partition and a single logical drive C.
You need to be able to restore Windows boot files on any of The desktops if the boot files become corrupted.
Which two actions should you perform?
(Each correct answer presents a part of the solution. Choose two.)
A. A. Create a system image of a Windows 7 Enterprise 64-bit desktop
B. Create a system repair disk on a Windows 7 Enterprise 64-bit desktop.
C. Restart Windows 7 Enterprise 64-bit desktops. Select the Disable Driver Signature Enforcement option
from the Advanced Boot Options menu.
D. Enable system protection on the recovery partition on 64-bit desktops.
E. Create a system repair disk on a Windows 7 Enterprise 32-bit desktop.
F. Create a system image of a Windows 7 Enterprise 32-bit desktop.
G. Enable system protection on the recovery partition on 32-bit desktops.
Answer: BE
Explanation:
http://windows.microsoft.com/en-US/windows7/Create-a-system-repair-disc
QUESTION 185
You administer a computer that has Windows 7 and Internet Explorer 8 installed.
You discover that two users have installed a new toolbar into their browsers.
The toolbar is using an unapproved search engine.
You need to prevent the users from using the unapproved search engine.
What should you do?
A. From programs and features in the control panel, uninstall the toolbar.
B. From Internet Explorer, delete the browsing history and locally stored files.
C. Start Internet Explorer in an InPrivate Browsing session.
D. From an elevated command prompt, run %systemdrive%\program files\Internet explorer\iecleanup.exe.
Answer: A
QUESTION 186
You have a computer that runs Windows 7.
You need to provide standard users the ability to update the drivers for display adapters.
What should you modify from the Local Group Policy?
A. Driver installation settings for the user
B. Device installation settings for the computer
C. Driver installation settings for the computer
D. Display settings for the user
Answer: C
Explanation:
To Update the Drivers you need permissions to install drivers. Apply this to the computer for all local users, as opposed to only one user.
QUESTION 187
You administer a computer that has Windows 7 Enterprise installed. The computer has an application that must run by using administrative permissions. A user who has a standard user account connect to the computer by using a Remote Desktop Connection.
The user right-clicks the application shortcut, but the Run as administrator option is unavailable. You need to ensure that the user is able to run the application by using administrative permissions. What service should you configure? (To answer, select the appropriate option or options in the answer area.)
Answer:
QUESTION 188
You administer client computers that have Windows 7 Professional SP1 64-bit installed. All the computers are members of a single Active Directory domain.
You need to prevent users from installing non-trusted device drivers.
What should you do?
A. Enable the Code signing for device drivers in a domain Group Policy.
B. Disable the Code signing for device drivers in a domain Group Policy.
C. Add each user to a Domain Admins group.
D. Run the sigverif.exe command on each computer.
Answer: A
Explanation:
Can’t see any of the rest PREVENTING users from installing non trusted devices – but Sigverig does highlight them.
QUESTION 189
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
A company has client computers that run Windows 7 Enterprise.
A user is asked to remove encryption from a locally saved folder so that other users can read and write to that folder.
You need to verify that the folder is not encrypted with the Encrypting File System (EFS).
What should you use to accomplish this goal?
A. Device Manager
B. Local Users and Groups
C. The User Account Control Settings Control Panel window
D. The Icacls command
E. The Group Policy Management console
F. Share permissions
G. The Netsh command
H. The Services Management console
I. The Folder Properties window
Answer: I
Explanation:
http://technet.microsoft.com/en-us/windows/how-do-i-get-started-with-the-encrypting-file- system-in-windows-7.aspx
QUESTION 190
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
A company has client computers that run Windows 7 Enterprise.
You need to ensure that only signed and validated executable files are run with elevated privileges.
What should you use to accomplish this goal?
A. The Group Policy Management console
B. The Netsh command
C. The Service Management console
D. The Folder Properties window
E. Share permissions
F. The Icacls command
G. Device Manager
H. The User Account Control Settings Control Panel windows
I. Local Users and Groups
Answer: A
QUESTION 191
You support Windows 7 client computers used by Marketing department employees. The computers have dual-core CPUs for generating rich media advertisements. The Marketing department employees are reporting CPU performance issues while rendering the rich media advertisements.
You need to configure the wmplayer.exe process to use only a single CPU core.
What should you do?
(To answer, select the appropriate option or options in the answer area.)
Answer:
QUESTION 192
You use a computer that has Windows 7 Enterprise installed. The computer has a single 500-GB hard disk. You install two new 1-TB hard disks.
You need to configure the new disks in a fault-tolerant configuration.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
QUESTION 193
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file sender has the BranchCache feature installed.
You create a shared folder on the server and enable BranchCache on the shared folder.
You discover that the users of the client computers are unable to access files in the shared folder. You need to provide access for the users to the shared folder.
What should you do?
A. Run the Netsh branchcache set service mode= HOSTEDSERVER clientauthentication=NONE command.
B. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702,
and inbound and outbound traffic for local TCP port 80.
C. Create a Group Policy that sets Hash Publication for BranchCache as disabled.
D. Run the Netsh branchcache set service mode=DISTRIBUTED command.
E. Create a Group Policy object and configure the Set percentage of disk space used for client computer
cache option.
F. Check permissions.
G. Run the Netsh branchcache set service mode=HOSTEDCLIENT command.
H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy.
I. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound
and outbound traffic for local TCP port 8441.
Answer: F
Explanation:
Have the users been given access to the files (what does BranchCache have to do with accessing files locally etc).
QUESTION 194
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BranchCache feature installed.
You add new client computers the network. The computers have Windows 7 installed and are members of a workgroup.
You need to ensure that the new client computers are configured to cache and share files.
What should you configure on the new client computers?
A. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound
and outbcund traffic for local TCP port 8443.
B. Check permissions.
C. Create a Group Policy that sets Hash Publication for BranchCache as disabled.
D. Run the Netsh branchcache set service mode=HOSTEDCLIENT command.
E. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy.
F. Create a Group Policy object and configure the Set percentage of disk space used for client computer
cache option.
G. Run the Netsh branchcache set service mode=HOSTEDSERVER clientauthentication=NONE command.
H. Run the Netsh branchcache set service mode=DISTRIBUTED command.
I. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702,
and inbound and outbound traffic for local TCP port 80.
Answer: H
QUESTION 195
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The File server has the BranchCache feature installed.
All client computers have Windows Firewall along with Advanced Security enabled for all network profiles.
You need to ensure that client computers, can access cached files stored on the file server.
What should you do?
A. Run the Netsh branchcache set service mode=HOSTEDSERVER clientauthentication=NONE command.
B. Create a Group Policy that sets Hash Publication for BranchCache as disabled.
C. Run the Netsh branchcache set service mode=DISTRIBUTED command.
D. Check permissions.
E. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port
3702, and inbound and outbound traffic for local TCP port 80.
F. Run the Netsh branchcache set service mode=HOSTEDCLIENT command.
G. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound
and outbound traffic for local TCP port 8443.
H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy.
I. Create a Group Policy object and configure the Set percentage of disk space used for client computer
cache option.
Answer: F
Guaranteed 100% Microsoft 70-680 Exam Pass OR Full Money Back! Braindump2go Provides you the latest 70-680 Dumps PDF & VCE for Instant Download!