[Pass Ensure VCE Dumps] Download PassLeader Free 580q 70-680 Braindump in VCE and PDF (301-320)
Posted on September 7, 2015 | By admin
What’s the secret of easily passing new 70-680 exam? PassLeader have been updated the 70-680 exam dumps with the newest exam questions. We offer the latest 580q 70-680 PDF dumps and VCE dumps with New Version VCE Player for free download to ensure your 70-680 exam pass. Now visit www.passleader.com and get the 100 percent pass ensure 70-680 braindumps!
keywords: 70-680 exam,580q 70-680 exam dumps,580q 70-680 exam questions,70-680 pdf dumps,70-680 vce dumps,70-680 braindumps,70-680 practice tests,70-680 study guide,TS: Windows 7, Configuring Exam
You need to create a VPN connection. What should you do?
A. From Windows Explorer, right-click Computer and then click Map network drive.
B. From Windows Explorer, right-click Computer and then click Add a network location.
C. From Network and Sharing Center, click Set up a new connection or network and then click Set up a new network.
D. From Network and Sharing Center, click Set up a new connection or network and then click Connect to a workplace.
Virtual Private Networks. When you create a VPN connection, you need to specify the address of the VPN server that you are connecting to and your authentication credentials. You can create a new VPN connection in the Network And Sharing Center by clicking Set Up A New Connection Or Network and then Connect to a Workplace. When you create a new VPN connection, Windows 7 sets the VPN type to Automatic. You can configure a connection to use a specific VPN protocol, but if you do this, Windows 7 does not try to use other VPN protocols if the protocol you select is not available.
You have two computers named Computer1 and Computer2 that run Windows 7. Computer2 is configured for remote management. From Computer1, you need to remotely execute a third-party command line tool named disk.exe on Computer2. Which command should you run?
A. Start disk.exe /d \\computer2
B. Tscon disk.exe /dest:computer2
C. Winrm e disk.exe r:computer2
D. Winrs r:computer2 disk.exe
You have two computers named Computer1 and Computer2. You migrate user state data from Computer1 to Computer2. The migrated data contains several Microsoft Office Excel files. You need to ensure that you can open the Excel files by using Excel on Computer2. What should you do?
A. Install Office.
B. Disable User Account Control (UAC).
C. Modify the default program settings.
D. Run Loadstate.exe /i:migapp.xml.
The applications are required to be installed in order to use the migrated data. In this case Microsoft Office is required to open Excel files. LoadStateLoadState is run on the destination computer. You should install all applications that were on the source computer on the destination before you run LoadState. You must run Loadstate. exe on computers running Windows Vista and Windows 7 from an administrative command prompt. To load profile data from an encrypted store named Mystore that is stored on a share named Migration on a file server named Fileserver and which is encrypted with the encryption key Mykey, use this command: loadstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /decrypt /key:”mykey”
You have a computer that has the following hardware configuration:
– 1.6 GHz processor (64-bit)
– 8 GB RAM
– 500-GB hard disk
– Graphics card that has 128 MB RAM
You need to select an edition of Window 7 to meet the following requirements:
– Support Direct Access.
– Support Windows XP Mode.
– Use all of the installed memory.
– Support joining an Active Directory domain.
Which edition should you choose?
A. Windows 7 Enterprise (64-bit)
B. Windows 7 Enterprise (x86)
C. Windows 7 Professional (64-bit)
D. Windows 7 Ultimate (x86)
The only applicable solution is Windows 7 Enterprise (64-bit) as for the following reasons:All versions are support Hardware wise.Requirements:Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements:
– 1 GHz 32-bit (x86) or 64-bit (x64) processor
– 1 GB of system memory
– A 40-GB hard disk
drive (traditional or SSD) with at least 15 GB of available space- A graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver,- Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics memory
XP Mode. Windows XP Mode is a downloadable compatibility option that is available for the Professional, Enterprise, and Ultimate editions of Windows 7. Windows XP Mode uses the latest version of Microsoft Virtual PC to allow you to run an installation of Windows XP virtually under Windows 7.
Use all of the installed memory The x86 version supports a maximum of 4 GB of RAM, whereas the x64 version supports a maximum of 8 GB of RAM.
Windows 7 ProfessionalWindows 7 Professional is available from retailers and on new computers installed by manufacturers. It supports all the features available in Windows Home Premium, but you can join computers with this operating system installed to a domain. It supports EFS and Remote Desktop Host but does not support enterprise features such as AppLocker, DirectAccess, BitLocker, and BranchCache.Windows 7 Enterprise and Ultimate Editions The Windows 7 Enterprise and Ultimate editions are identical except for the fact that Windows 7 Enterprise is available only to Microsoft’s volume licensing customers, and Windows 7 Ultimate is available from retailers and on new computers installed by manufacturers. The Enterprise and Ultimate editions support all the features available in other Windows 7 editions but also support all the enterprise features such as EFS, Remote Desktop Host, AppLocker, DirectAccess, BitLocker, BranchCache, and Boot from VHD.
You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. Computer1 has a custom application installed. You create a custom XML file named app1.xml that contains the migration settings for the application. You need to migrate the configuration and application data for the custom application from Computer1 to Computer2. What should you do?
A. On Computer1, run Loadstate.exe /l:app1.
On Computer2, run Scanstate.exe /l:app1.xml.
B. On Computer1, run Scanstate.exe /i:app1.xml.
On Computer2, run Loadstate.exe /i:app1.xml.
C. On Computer1, run Loadstate.exe /keyfile:app1.xml.
On Computer2, run Loadstate.exe /keyfile:app1. xml.
D. On Computer1, run Scanstate.exe /genconfig:app1.xml.
On Computer2, run Loadstate.exe /config: app1.xml.
User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState. (include) /i:[Path\]FileName Specifies an .xml file that contains rules that define what user, application or system state to migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml, MigUser.xml and any custom .xml files that you create). Path can be either a relative or full path. If you do not specify the Path variable, then FileName must be located in the current directory.
You have a computer that runs Windows 7. Windows Backup is configured to store backups on an external drive. You create a new NTFS volume on the computer. You need to configure Windows Backup to include the files on the new volume as part of regularly scheduled backups. What should you do?
A. From Backup and Restore, select Change settings.
B. From Backup and Restore, select Create a system image.
C. From the System Protection tab, create a restore point.
D. From the System Protection tab, enable system protection for the new volume.
Backups are configured and scheduled by using the Backup And Restore console under System And Security in Control Panel. The Change Settings option is not available unless you have configured a backup schedule and performed a backup.
You need to reduce the amount of space currently being used to store system restore points. What should you do?
A. Run Disk Cleanup.
B. Run Msconfig.exe.
C. Configure disk quotas.
D. Configure Windows Backup.
Shadow info: Shadow copies are automatically saved as part of a restore point. If system protection is enabled, Windows 7 automatically creates shadow copies of files that have been modified since the last restore point was created. By default, new restore points are created every seven days or whenever a significant system change (such as a driver or application installation) occurs.
NOT Disk Quota:Does not directly affect size of System Restore Points.
You deploy a Windows 7 Enterprise image to a computer on the network. You need to display the detailed activation and license status of the computer. What should you run?
C. Slmgr.vbs and specify the dli parameter
D. Winrm.vbs and specify the id parameter
/dli [Activation ID | All]Display license information. By default, /dli displays the license information for the installed active Windows edition. Specifying the [Activation ID] parameter displays the license information for the specified edition associated with that Activation ID. Specifying the [All] as the parameter will display all applicable installed products’ license information. This operation does not require elevated privileges.
You have a Windows image (WIM) file that contains an image of Windows 7. The WIM file is 2 GB. You need to ensure that you can copy the image to CD. What should you do?
A. Run Imagex.exe and specify the /split parameter.
B. From the properties of the WIM file, enable compression.
C. Run Dism.exe and specify the /Cleanup-Wim parameter.
D. Right-click the WIM file, point to Send To and then click Compressed (zipped) Folder.
ImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack.
Splits an existing .wim file into multiple read-only split .wim files (.swm).
Specifies the name and location of the .wim file to split.
Specifies the file path of the split files.
SizeSpecifies the maximum size in megabytes (MB) for each created file. This option generates the .swm files into the specified directory, naming each file the same as the specified image_file, but with an appended number and the .swm file-name extension. For example, if you choose to split a file named Data.wim, this option creates a Data.swm file, a Data2.swm file, a Data3.swm file, and so on, defining each portion of the split .wim file.
You plan to deploy Windows 7 by using a virtual hard disk (VHD). You need to ensure that when a computer starts from the VHD, the Windows 7 installation programs will run the out-of-box-experience (OOBE) portion of the setup. What should you do?
A. Copy install.wim from the Windows 7 installation media to the VHD.
B. Use ImageX to apply install.wim from the Windows 7 installation media to the VHD.
C. Start the computer by using the Windows 7 installation media and then select Install now.
D. Start the computer by using the Windows Preinstallation Environment (Windows PE) and then run Diskprep.exe.
WIM images are file-based and can be installed on a VHD or placed on a network share for distribution. You can store several images in the same WIM file. Talks about Capturing the Installation onto a Network Share, but still applies. You can capture an image of your reference computer by using Windows PE and the ImageX tool. Then you store that image on a network share. Alternatively, on a computer running Windows 7 Enterprise or Ultimate edition, you can store the image on a VHD and make that VHD bootable. To capture the installation image you have created on your reference computer to a network share, perform the following procedure:
1. Insert your Windows PE media into your reference computer and restart the computer. As before, you may have to override the boot order to boot from the CD/DVD-ROM drive. If so, select the appropriate function key to override the boot order during initial boot.
2. Windows PE starts and opens a command-prompt window. Use the ImageX tool located on your Windows PE media to capture an image of your reference computer installation. For example, if your optical drive is drive E:, your installation is on drive C:, and you want to capture the image on drive D:, you would enter: e:\imagex.exe /capture C:d:\installationimage.wim “my Win7 Install” /compress fast /verify
3. Copy the image to a network location. For example, enter: net use y:\\network_share\images copy d:\myimage.wim y:
4. If necessary, provide network credentials for appropriate network access. Your image is now on volume Y:
You have a Windows 7 computer that is a member of a workgroup. You need to prevent members of a local group from starting a specific application. You must achieve this goal by using the minimum amount of administrative effort. What should you create?
A. Administrative template
B. Application control policy
C. IPSec policy
D. Software restriction policy
AppLocker Application Control Policies. AppLocker is a feature new to Windows 7 that is available only in the Enterprise and Ultimate editions of the product. AppLocker policies are conceptually similar to Software Restriction Policies, though AppLocker policies have several advantages, such as the ability to be applied to specific user or group accounts and the ability to apply to all future versions of a product. Hash rules apply only to a specific version of an application and must be recalculated whenever you apply software updates to that application. AppLocker policies are located in the Computer Configuration\Windows Settings\ Security Settings\Application Control Policies node of a standard Windows 7 or Windows Server 2008 R2 GPO. AppLocker relies upon the Application Identity Service being active. When you install Windows 7, the startup type of this service is set to Manual. When testing AppLocker, you should keep the startup type as Manual in case you configure rules incorrectly. In that event, you can just reboot the computer and the AppLocker rules will no longer be in effect. Only when you are sure that your policies are applied correctly should you set the startup type of the Application Identity Service to Automatic. You should take great care in testing AppLocker rules because it is possible to lock down a computer running Windows 7 to such an extent that the computer becomes unusable. AppLocker policies are sometimes called application control policies.
Your network contains computers that run either Windows Vista (x86) or Windows 7 (x86). All computers are joined to a domain. You install a computer named Computer1 that runs Windows 7 (64-bit). You share a printer named Printer1 on Computer1. You need to ensure that any user can automatically download and install the drivers for Printer1. What should you do from Printer Properties?
A. Install a new driver.
B. Enable bidirectional support.
C. Modify the Additional Drivers settings.
D. Assign the Manage this printer permission to the Domain Users group.
If you are going to be sharing a printer with computers running previous versions of Microsoft Windows, you can add the drivers for the printer using Additional Drivers. When you add additional drivers, other computers on the network that do not have the printer drivers installed are able to download them from the computer that is sharing the printer.
You have a computer that runs Windows 7. Multiple users share the computer. The computer contains a folder named C:\folder1. You need to identify all of the encrypted files in C:\folder1. Which command should you run?
A. Cipher C:\folder1
B. Dir C:\folder1 /OE
C. Fsutil C:\folder1
D. Wfs C:\folder1
CipherDisplays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains.
You have a computer that runs Windows 7. Four users share the computer. You create a folder named C:\data. The Users group has Full control permission to the folder. You need to configure security on the folder to meet the following requirements:
– Allow users to create files.
– Allow users to delete files that they create.
– Prevent users from deleting files created by other users.
What should you do?
A. Remove all NTFS permissions from the Users group and assign the CREATOR OWNER group the Full control NTFS permission.
B. Remove the Modify NTFS permission from the Users group and assign the CREATOR OWNER group the Modify NTFS permission.
C. Deny the Users group the Modify NTFS permission and assign the Authenticated Users group the Read and Write NTFS permissions.
D. Deny the Users group the Full control NTFS permission and assign the Authenticated Users group the Read & execute NTFS permission.
The Creator Owner GroupThe person who created the file or directory is a member of this group. This group is used by Windows NT to automatically grant access permissions to the creator of a file or directory.
File and Folder Permissions
ReadFolders: Permits viewing and listing of files and subfoldersFiles: Permits viewing or accessing of the file’s contentsWriteFolders: Permits adding of files and subfoldersFiles:
Permits writing to a fileRead & Execute
Folders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by files and foldersFiles: Permits viewing and accessing of the file’s contents as well as executing of the fileList Folder ContentsFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by folders onlyFiles:
N/AModifyFolders: Permits reading and writing of files and subfolders; allows deletion of the folderFiles: Permits reading and writing of the file; allows deletion of the fileFull ControlFolders: Permits reading, writing, changing, and deleting of files and subfoldersFiles: Permits reading, writing, changing and deleting of the file
You have a computer that runs Windows 7. Your network has a SSTP VPN server that uses a self-signed certificate. When you connect to the VPN server, you receive the following error message:
“Your computer does not trust the issuing certification authority (CA) of the SSTP VPN servers certificate”.
You need to prevent the error message from appearing when you connect to the VPN server. What should you do?
A. From the properties of the VPN connection, modify the dialing options.
B. From the properties of the VPN connection, modify the data encryption settings.
C. From Certificate Manager, import the servers certificate into the Personal store.
D. From Certificate Manager, import the server’s certificate into the Trusted Root Certification Authorities store.
Certificate Manager. A certificate manager can approve certificate enrollment and revocation requests, issue certificates, and manage certificates. This role can be configured by assigning a user or group the Issue and Manage Certificatespermission. When you assign this permission to a user or group, you can further refine their ability to manage certificates by group and by certificate template. For example, you might want to implement a restriction that they can only approve requests or revoke smart card logon certificates for users in a certain office or organizational unit that is the basis for a security group.Importing CertificatesYou may restore certificates and the corresponding private keys from a file.
*. Right-click the certificate store you want to import, and click Install PFX on the context menu.
*. The Certificate Import Wizard launches. Click Next.
*. In the File name text box, type the name of the certificate file that you want to import. Alternatively, you can find the file by clicking Browse.
*. Click Next. If the file specified is a Personal Information Exchange-KCS #12 (*.pfx), you will be prompted for the password. Enter the password to import the file. Click Next.
*. On the next page, select where you’d like to store the certificate. Click Next.
*. The next wizard page contains summary information about the file that you are importing. Click Finish to import the file. The certificate(s) are now ready for use by the system.
You perform a clean installation of Windows 7 on a computer. You need to ensure that you can run Windows XP Mode in Windows 7. What should you do?
A. Enable hardware-assisted virtualization.
B. Create a Data Execution Prevention (DEP) exception.
C. Install Windows XP in the same partition as Windows 7.
D. Install Windows XP in a different partition than Windows 7.
Windows XP Mode requires a processor that supports hardware virtualization using either the AMD-V or Intel VT options. Most processors have this option disabled by default; to enable it, you must do so from the computer’s BIOS. After the setting has been configured, it is necessary to turn the computer off completely. The setting is not enabled if you perform a warm reboot after configuring BIOS. As 256 MB of RAM must be mallocated to the Windows XP Mode client, the computer running Windows 7 on which you deploy Windows XP Mode requires a minimum of 2 GB of RAM, which is more than the 1 GB of RAM Windows 7 hardware requirement.
You have a computer that runs Windows 7 Home Premium. You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time. What should you do?
A. Perform a Windows Anytime Upgrade.
B. Download and run the Windows 7 Upgrade Advisor.
C. Insert the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option.
D. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option.
Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small businesses where a small number of intra-edition upgrades is required.
You have a custom image of Windows 7. You discover that the boot configuration data store in the custom image is corrupted. You need to create a new configuration data store within the custom image. What should you do?
A. Run Imagex.exe and specify the /append parameter. Run Bcdedit.exe.
B. Run Imagex.exe and specify the /mountrw parameter. Run Bcdedit.exe.
C. From Windows System Image Manager (Windows SIM), select the image and then create a configuration set.
D. From Windows System Image Manager (Windows SIM), select the image and then create a catalog.
ImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice/mountrwMounts a .wim file from Windows XP with Service Pack 2 (SP2), Windows Server 2003 with Service Pack 1 (SP1), or Windows Vista with read/write permission to a specified directory. Once the file is mounted, you can view and modify all the information contained in the directory.BcdeditBCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe, and BCDEdit has improved scripting support.NOT Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets. NOTE: question specifies configuration data store, not configuration set.
You need to back up your Encrypting File System (EFS) certificate. You must achieve this goal in the minimum amount of time. What should you do?
A. Run Cipher.exe /x.
B. Run Ntbackup.exe /p.
C. From Backup and Restore, click Back up now.
D. From Backup and Restore, click Create a system image.
Cipher is used to manage certificates. NOT Backup and Restore:Only the EFS certificate needs to be backed up and time is a factor.
You download a Windows PowerShell snap-in. You need to ensure that the snap-in is automatically imported when you open a new PowerShell session. What should you do?
A. Modify the PowerShell execution policy.
B. Create a new PowerShell manifest file.
Update the PowerShell shortcut and specify the file option.
C. Create a new PowerShell console file.
Update the PowerShell shortcut and specify the psconsolefile option.
D. Create a new PowerShell formatting and type file.
Copy the file to the %SystemRoot%\system32 \Windows PowerShell\v1.0 folder.
Loads the specified Windows PowerShell console file. To create a console file, use the Export-Console cmdlet in Windows PowerShell.
The Export-Console cmdlet exports the names of the Windows PowerShell snap-ins in the current session to a Windows PowerShell console file (.psc1). You can use this cmdlet to save the snap-ins for use in future sessions. To add the snap-ins in the .psc1 console file to a session, start Windows PowerShell (Powershell.exe) at the command line by using Cmd.exe or another Windows PowerShell session, and then use the PSConsoleFile parameter of Powershell.exe to specify the console file.