Proper study guides for Abreast of the times Microsoft TS:Windows 7,Configuring certified begins with Microsoft 70-680 preparation products which designed to deliver the 100% Guarantee 70-680 questions by making you pass the 70-680 test at your first time. Try the free 70-680 demo right now.

2021 Mar 70-680 exam cram

Q21. - (Topic 2) 

You are testing unsigned device drivers on a computer on an isolated test network. 

You install a display driver and find that the computer boots to a blank screen. 

You restart the computer and press F8. 

What Advanced Boot Options could you choose to help remedy the situation? (Choose all that apply.) 

A. Safe Mode 

B. Enable Boot Logging 

C. Enable Low Resolution Video 

D. Last Known Good Configuration (Advanced) 

E. Disable Driver Signal Enforcement 

Answer: A,C,D 


Q22. - (Topic 6) 

You administer computers that have Windows 7 and Internet Explorer 8 installed. 

You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. 

You need to ensure that any data about your browser session is not saved on the computer. What should you do? 

A. From Internet Options, modify the security settings for the Internet zone. 

B. Start the Microsoft Network Access Protection service. 

C. From the Safety drop-down menu, configure InPrivate Filtering. 

D. From Internet Options, select Delete browsing history on exit. 

Answer:


Q23. - (Topic 1) 

You have a computer that runs Windows 7. 

You need to prevent Internet Explorer from saving any data during a browsing session. 

What should you do? 

A. Disable the BranchCache service. 

B. Modify the InPrivate Blocking list. 

C. Open an InPrivate Browsing session. 

D. Modify the security settings for the Internet zone. 

Answer:

Explanation: 

InPrivate Mode consists of two technologies: InPrivate Filtering and InPrivate Browsing. 

Both InPrivate Filtering and InPrivate Browsing are privacy technologies that restrict the amount of information available about a user's browsing session. InPrivate Browsing restricts what data is recorded by the browser, and InPrivate Filtering is used to restrict what information about a browsing session can be tracked by external third parties. 


Q24. - (Topic 2) 

You have a computer that runs windows 7. 

You need to configure the monitor on the computer to turn off after 30 minutes of inactive. 

What should you do? 

A. From personalization, change the theme. 

B. From display, change display settings. 

C. From action center, change the Action Center settings. 

D. From power options, change the current power plan settings. 

Answer:


Q25. - (Topic 3) 

You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. 

You attempt to migrate the user profiles and data from Computer1 to Computer2 by using User State Migration Tool (USMT) 4.0. 

During the migration, you receive the following error message: "Gather was aborted because of an EFS file." 

You need to ensure that you can successfully migrate the user state from Computer 1 to Computer 2. 

What should you do? 

A. Add the /efs:copyraw switch to the Loadstate command. 

B. Add the /efs:copyraw switch to the Scanstate command. 

C. Generate a new Encrypting File System (EFS) certificate on Computer2. 

D. Export the Encrypting File System (EFS) certificate from Computer1 and import the certificate to Computer2. 

Answer:

Explanation: 

You run ScanState on the source computer during the migration. You must run ScanState.exe on computers running Windows Vista and Windows 7 from an administrative command prompt. When running ScanState on a source computer that has Windows XP installed, you need to run it as a user that is a member of the local administrators group. The following command creates an encrypted store named Mystore on the file share named Migration on the file server named Fileserver that uses the encryption key Mykey: scanstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /o /config:config.xml /encrypt /key:"mykey"Encrypted File OptionsYou can use the following options to migrate encrypted files. In all cases, by default, USMT 4.0 fails if an encrypted file is found unless you specify an /efs option. To migrate encrypted files, you must change the default behavior. EFS certificates will be migrated automatically when migrating to Windows Vista or Windows 7. Therefore, you should specify the /efs:copyraw option with the ScanState command to migrate the encrypted files 


Most up-to-date 70-680 exam cram:

Q26. HOTSPOT - (Topic 6) 

A law firm's wireless network does not use IPv6 and provides IP addresses automatically to connected clients. 

A visiting attorney arrives to perform a deposition. The attorney's computer has never connected to the firm's wireless network. The attorney needs general access to several websites but is unable to connect to the Internet. 

You collect information from the computer's Device Manager, Network Connections, and Wireless Network Connections. 

Device information is shown in the Device Manager exhibit. (Click the Exhibit button.) 

Network information is shown in the Network Connections exhibit. (Click the Exhibit button.) 

Wireless network information is shown in the Wireless Network Connections exhibit. (Click the Exhibit button.) 

You need to configure this attorney's laptop so it can access the Internet through the firm's wireless network. 

Consider each of the following statements. Does the information in the three screenshots support the inference as stated? (This question is worth three points.) 

Answer: 


Q27. DRAG DROP - (Topic 6) 

You work for Contoso. Ltd. as part of a Windows 7 deployment team. 

You create a new Windows Preinstallation Environment image. The image file is located at N:\images\winpe_x86 and is named WinPE.wim. An unsigned driver is located at 

N:\Drivers\Driverl.inf. 

You need to include the driver in the WinPE.wim image. 

Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q28. - (Topic 5) 

Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers are members of an Active Directory domain. You use a computer named Client1. 

You plan to collect events from Client1 on Server1 by using HTTPS. On Server1, you start and configure the Windows Event Collector service. On Client1, you start the Windows Remote Management service. 

You discover that no events are being collected. 

You need to ensure that events are forwarded from Client1 to Server1. 

What should you do? 

A. on Client1, create an outbound Rule to allow port 5986 for the Domain connection type. 

B. on Client1, create an inbound Rule to allow port 5986 for the Public connection type. 

C. on Server1, create a Windows Event Collector firewall exception for the Domain connection type. 

D. on Client1, create a Windows Remote Management firewall exception for the Domain connection type. 

Answer:


Q29. - (Topic 3) 

Your network has a main office and a branch office. 

The branch office has five client computers that run Windows 7 and a server that runs Windows Server 2008 R2. The branch office server is enabled for BranchCache. 

You need to configure Windows Firewall on each client computer so that cached content can be retrieved from the branch office server. 

Which firewall rule should you enable on the client computers? 

A. BranchCache - Content Retrieval (Uses HTTP) 

B. BranchCache - Hosted Cache Server (Uses HTTPS) 

C. BranchCache - Peer Discovery (Uses WSD) 

D. File and Printer Sharing 

Answer:

Explanation: 

Configure domain member client distributed cache mode firewall rules When you configure BranchCache in distributed cache mode, BranchCache client computers use the Hypertext Transfer Protocol (HTTP) for data transfer with other client computers. BranchCache client computers also use the Web Services Dynamic Discovery (WS-Discovery) protocol when they attempt to discover content on client cache servers. You can use this procedure to configure client firewall exceptions to allow incoming HTTP and WS-Discovery traffic on client computers that are configured for distributed cache mode. The BranchCache – Content Retrieval (Uses HTTP) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on TCP port 80. This rule is required for both Hosted Cache and Distributed Cache mode. The BranchCache – Peer-Discovery (Uses WSD) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on UDP port 3702. This rule is only required when using Distributed Cache mode. The BranchCache – Hosted Cache Client (HTTPS-Out) predefined rule. It this rule is not available, configure a rule that allows outbound traffic on TCP port 443. This rule is required only when using Hosted Cache mode. 


Q30. - (Topic 4) 

You have a computer that runs Windows 7. Your computer s disk configuration is shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can create a striped volume on the computer. 

What should you do? 

A. Add an additional hard disk. 

B. Convert all disks to dynamic disks. 

C. Install a digitally-signed disk driver. 

D. Set the Startup Type of the Virtual Disk Service (VDS) to Automatic. 

Answer:

Explanation: 

A striped volume is a dynamic volume that stores data in stripes on two or more physical disks. Data in a striped volume is allocated alternately and evenly (in stripes) across the disks. Striped volumes offer the best performance of all the volumes that are available in Windows, but they do not provide fault tolerance. If a disk in a striped volume fails, the data in the entire volume is lost. 

You can create striped volumes only on dynamic disks. Striped volumes cannot be extended. 

You can create a striped volume onto a maximum of 32 dynamic disks. 

Backup Operator or Administrator is the minimum membership required to complete the actions below. 

Creating a striped volume 

Using the Windows interface 

Using a command line 

To create a striped volume using the Windows interface 

In Disk Management, right-click the unallocated space on one of the dynamic disks where you want to create the striped volume, and then click New Striped Volume…. 

Follow the instructions on your screen. 

To create a striped volume using a command line 

Open a command prompt and type diskpart. 

At the DISKPART prompt, type list disk. Make note of the number of the disk where you want to create a striped volume. 

At the DISKPART prompt, type create volume stripe [size=<size>] 

[disk=<disknumber>[,[<seconddisknumber>, 

…]].