Supported to learn your details important Exambible 70-680 Pdf file download and install. (Rapidly be documented within 70-680 examination serps form.) You will certainly have great results along with Progression 70-680 ( TS:Windows 7,Configuring ) analysis stuff - to get rid of other pricey gear, never proof, which include TS:Windows 7,Configuring oblivious audio examination TS:Windows 7,Configuring tutorial. Youd better have just one session for class. Authorized now along with download and install TS:Windows 7,Configuring review answers along with Exambible 70-680 on your laptop or computer currently!
Q141. DRAG DROP - (Topic 6)
A company has client computers that run Windows Vista.
You need to install Windows 7 on a client computer in a dual-boot configuration with the existing Windows Vista installation, without reducing the size of the partition that contains Windows Vista.
Which actions should you perform in sequence?
(To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q142. - (Topic 5)
You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits:
. The Disk Management console (Click the Exhibit button.)
. The System Properties window (Click the Exhibit button.)
. The System protection for Local Disk C window (Click the Exhibit button.)
You share your Documents library over a network.
You discover that one of the files was deleted from the library by a network user.
You need to restore the most recent version of the deleted file.
What should you do?
A. Delete restore points.
B. Create a restore point.
C. Perform a system restore.
D. Search for the file in the Recycle Bin.
E. Increase disk space used for system protection.
F. Copy the file from a previous version of a folder.
G. Set restore settings to only restore previous versions of files.
H. Run the cipher /x command from the elevated command prompt,
I. Run the vssadmin list volumes command from the elevated command prompt.
J. Run the vssadmin list shadows command from the elevated command prompt,
K. Run the compact /U <file_name> command from the elevated command prompt.
Answer: F
Explanation: Note: To restore a previous version of a file or folder that's included in a library, right-click the file or folder in the location where it's saved, rather than in the library. For example, to restore a previous version of a picture that's included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions.
Q143. - (Topic 5)
You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits:
. The Disk Management console (Click the Exhibit button.)
. The System Properties window (Click the Exhibit button.)
. The System protection for Local Disk C window (Click the Exhibit button.)
You encrypt several files on an external USB hard disk drive by using the Encrypting File System (EFS).
You need to ensure that you can access the files from another computer.
What should you do?
A. Delete restore points.
B. Create a restore point.
C. Perform a system restore.
D. Search for the file in the Recycle Bin.
E. Increase disk space used for system protection.
F. Copy the file from a previous version of a folder.
G. Set restore settings to Only restore previous versions of files.
H. Run the cipher /x command from the elevated command prompt,
I. Run the vssadmin list volumes command from the elevated command prompt.
J. Run the vssadmin list shadows command from the elevated command prompt,
K. Run the compact /U <file_name> command from the elevated command prompt.
Answer: H
Explanation: * cipher /x[:efsfile] [<FileName>]
Backs up the EFS certificate and keys to the specified file name. If used with :efsfile, /x backs up the user's certificate(s) that were used to encrypt the file. Otherwise, the user's current EFS certificate and keys are backed up.
* Back Up Your EFS Key The first time that you use EFS to encrypt something, your system generates a random 256-bit number; that's the key that EFS uses whenever you encrypt something. To back up your EFS key, simply use the Cipher /x command. Cipher will reply with a message asking if you truly want to back up your EFS key—sadly, I haven't found a way to suppress this message. Press OK. The tool will then prompt you for the name of the file in which to store the backup. Don't specify a file extension; Cipher insists on the .pfx extension. For example, if you picked a file named mybackup, you now have a small file called mybackup.pfx. Next, the tool will prompt you to create a password with which to protect that file.
Once you've got that file created, copy it from your computer's hard disk to some offline location (e.g., a USB stick, a CD-ROM) and make a note of the password you've chosen. Now, in the event of unfortunate circumstances— for example, you lose your profile, you forget your password and a systems administrator has to reset it, the system's OS fails and you need to recover files directly from the nowdead system's hard disk—you can simply restore your EFS key by double-clicking the .pfx file and running the resulting wizard. As soon as the wizard is finished, you'll be able to get to your files again.
Q144. - (Topic 3)
You have a computer that runs Windows 7 Professional.
You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time.
What should you do?
A. Run Windows Update.
B. Run Windows Anytime Upgrade.
C. From the Windows 7 installation media, run Setup.exe.
D. From the Windows 7 installation media, run Migwiz.exe.
Answer: B
Explanation:
Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small
businesses where a small number of intra-edition upgrades is required.
Windows Anytime Upgrade
Q145. - (Topic 2)
You have a computer that runs Windows 7.
You run Runas and specify the /savecred parameter to start an application.
You need to delete the stored password.
What should you do?
A. Run Del and specify the /p parameter.
B. Run Runas and specify the /noprofile parameter.
C. From Credential Manager, modify the Windows credentials.
D. From Authorization Manager, modify the Authorization Manager options.
Answer: C
Explanation:
Credential Manager Credential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson.
Q146. - (Topic 3)
You have a computer that runs Windows 7 and Windows Internet Explorer 8. You have a third-party Internet Explorer toolbar installed on the computer.
You need to temporarily disable the toolbar. The solution must not affect any other installed toolbars.
What should you do?
A. Start an Inprivate Browsing session.
B. Run Msconfig.exe and enable Selective Startup.
C. From the Tools menu, select Compatibility View Settings.
D. From the Tools menu, open Manage Add-ons and modify the add-on settings.
Answer: D
Explanation:
Add-Ons and Search Providers Add-ons extend the functionality of Internet Explorer. Add-ons are usually downloaded and installed separately rather than being included with Internet Explorer. You manage add-ons through the Manage Add-Ons dialog box.
Toolbars and Extensions This area lists browser toolbars and extensions. Toolbars are additions to browsersthat add extra functionality to the browser interface. Extensions allow the browser to perform additional functions, such as playing media or opening some types of document file within the browser that the browser does not support natively.
Q147. - (Topic 6)
You maintain Windows 7 virtual hard disks (VHDs) at Contoso, Ltd.
You are applying a series of updates to one of the company's VHDs by using the Windows Deployment Image Servicing and Management (DISM) system. The VHD contains a Windows 7 64-bit operating system. The image is stored in N:\Images\Win7img. vhd.Additionally, there are three updates required, which are stored in subfolders of N:\updates.
You need to mount and apply Windows updates to the offline VHD.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two. )
A. Use diskpart to mount the VHD.
B. Use Dism with /Add-Driver and /recurse options.
C. Use Dism to mount the VHD.
D. Use Dism with /Add-Package /recurse.
Answer: A,D
Explanation: A: To Attach a. VHD Diskpart Select vdisk file=c:\wims\W7Ultimate.vhd attach vdisk assign letter=F exit
D: Example:
Dism /image:C:\WIM\offline /Add-Package /PackagePath:C:\Updates\
Incorrect:
not B: we are not adding drivers.
Q148. - (Topic 3)
You have a computer named Computer1 that runs Windows 7. You have a server named Server1 that runs Windows Server 2008.
Computer1 and Server1 have IPv4 and IPv6 installed.
You need to identify whether you can connect to Server1 by using IPv6.
What should you do?
A. Run Ping Server1 -6.
B. Run Ping Server1- n 6.
C. Run Net view \\Server1.
D. Open \\server1 from the Run dialog box.
Answer: A
Explanation:
Ping The Ping tool is still widely used, although more firewalls block Internet Control Message Protocol (ICMP) echo requests than used to be the case. However, even if you cannot get past a firewall on your organization's network, Ping is still useful. You can check that the IPv4 protocol is working on a computer by entering ping 127.0.0.1. You can then ping the IPv4 address of the computer. You can find out what this is by using the Ipconfig tool. If your computer has more than one interface combined in a network bridge, you can ping the Ipv4 address of the network bridge. When you have established that you can ping your computer using an Ipv4 address, you can test that DNS is working internally on your network (assuming you are connected to a DNS server, a WAP, or have ICS configured on your network) by pinging your computer name—for example, entering ping canberra. Note that if DNS is not implemented on your system, ping canberra still works because the IPv6 link-local address resolves automatically. -6 Force using IPv6.
Q149. - (Topic 6)
You administer client computers that have Windows 7 Professional SP1 64-bit installed. All desktops are members of a single Active Directory domain.
You plan to install a driver manufactured by an unknown provider.
You need to prepare the client computers for the driver installation.
What should you do?
A. Disable the Code signing for device drivers Domain Group Policy setting.
B. Add each user to the Domain Administrators group.
C. Run the SigVerif.exe command.
D. Enable the Code signing for device drivers Domain Group Policy setting.
Answer: A
Q150. - (Topic 3)
You have a computer that runs Windows 7.
Your network has a SSTP VPN server that uses a self-signed certificate.
When you connect to the VPN server, you receive the following error message: "Your computer does not trust the issuing certification authority (CA) of the SSTP VPN servers certificate".
You need to prevent the error message from appearing when you connect to the VPN server.
What should you do?
A. From the properties of the VPN connection, modify the dialing options.
B. From the properties of the VPN connection, modify the data encryption settings.
C. From Certificate Manager, import the servers certificate into the Personal store.
D. From Certificate Manager, import the server's certificate into the Trusted Root Certification Authorities store.
Answer: D
Explanation:
Certificate Manager A certificate manager can approve certificate enrollment and revocation requests, issue certificates, and manage certificates. This role can be configured by assigning a user or group the Issue and Manage Certificatespermission. When you assign this permission to a user or group, you can further refine their ability to manage certificates by group and by certificate template. For example, you might want to implement a restriction that they can only approve requests or revoke smart card logon certificates for users in a certain office or organizational unit that is the basis for a security group.Importing CertificatesYou may restore certificates and the corresponding private keys from a file.
4. Right-click the certificate store you want to import, and click Install PFX on the context menu.
5. The Certificate Import Wizard launches. Click Next.
6.
In the File name text box, type the name of the certificate file that you want to import. Alternatively, you can find the file by clicking Browse.
7. Click Next. If the file specified is a Personal Information Exchange–PKCS #12 (*.pfx), you will be prompted for the password. Enter the password to import the file. Click Next.
8. On the next page, select where you'd like to store the certificate. Click Next.
9. The next wizard page contains summary information about the file that you are importing. Click Finish to import the file. The certificate(s) are now ready for use by the system.