Braindump2go Free Exam Dumps with PDF and VCE Collection
https://www.mcitpdump.com/2015-new-daily-updation-microsoft-official-exam-center-new-released-exam-70-680-practice-tests-questions-free-download-from-braindump2go-pass-70-680-successfully-now-431-445.html
Export date: Thu Mar 28 17:38:27 2024 / +0000 GMT

[2015 NEW DAILY UPDATION] Microsoft Official Exam Center New Released Exam 70-680 Practice Tests Questions Free Download From Braindump2go Pass 70-680 Successfully Now! (431-445)


Microsoft Official Exam Center Latest Added Questions and Answers For 70-680 Exam Free Download from Braindump2go!

Vendor: Microsoft
Exam Code: 70-680
Exam Name: TS: Windows 7, Configuring

120[2][2]

QUESTION 431
Hotspot Question
You need to uninstall a Windows update from a computer that runs Windows 7.
Which Control Panel item should you use?
(To answer, select the appropriate item in the Control Panel in the answer area.)

wps8812.tmp_thumb

Answer:


QUESTION 432
You manage several client computers in an organization.
You need to ensure that all users, including administrators, are required to enter a username and password when uninstalling applications from any computer in the
organization.
What should you do?

A.    Create a custom GPO to modify the User Account Control: Behavior of the elevation prompt for
administrators in Admin Approval Mode setting.

B.    Configure an AppLocker Windows Installer rule.

C.    Configure the User Account Control (UAC) settings on all client computers to always notify.

D.    Create a custom GPO to configure a software restriction policy.


Answer: A

QUESTION 433
You are a network administrator for a global company that has Windows Server 2008 R2 servers and Windows 7 Enterprise computers.
Management wants to decrease VPN costs by implementing DirectAccess for remote network access.
They assign you to evaluate the current network infrastructure, which includes the following elements:
- Active Directory
- IPv6 network and applications
- Server for DirectAccess service
You need to ensure that all critical infrastructure components are present.
What should you add to the infrastructure?

A.    Windows Internet Name Service (WINS) server
B.    Public key infrastructure
C.    NAT-PT devices
D.    Windows Software Update Services (WSUS) server

Answer: B
Explanation:
DirectAccess With Windows Server 2008 R2 requires:
* Public key infrastructure (PKI) to issue computer certificates.
* One or more DirectAccess servers running Windows Server 2008 R2 with two network
adapters: one that is connected directly to the Internet, and a second that is connected to the intranet.
* On the DirectAccess server, at least two consecutive, public IPv4 addresses assigned to the network adapter that is connected to the Internet.
* DirectAccess clients running Windows 7 or Windows 8 "Enterprise" edition clients
* At least one domain controller and Domain Name System (DNS) server running Windows Server 2008 SP2 or Windows Server 2008 R2.

QUESTION 434
A company has Windows 7 Enterprise computers that use BitLocker drive encryption on
operating system drives.
You need to configure multi-factor authentication before client computers are booted into Windows.
On each client computer, what should you do?

A.    Configure a TPM PIN.
B.    Implement fingerprint authentication.
C.    Implement a Dynamic Access Control policy.
D.    Install a standalone certification authority server.

Answer: A
Explanation:
BitLocker supports multifactor authentication for operating system drives. If you enable BitLocker on a computer that has a TPM version 1.2, you can use additional forms of authentication with the TPM protection. BitLocker offers the option to lock the normal boot process until the user supplies a personal identification number (PIN) or inserts a USB device (such as a flash drive) that contains a BitLocker startup key, or both the PIN and the USB device can be required. These additional security measures provide multifactor authentication and help ensure that the computer will not start or resume from hibernation until the correct authentication method is presented.

QUESTION 435
Drag and Drop Question
An employee has a Windows Vista SP1 32-bit computer that uses legacy devices.
You need to upgrade the computer to Windows 7 32-bit based on the following requirements:
- Ensure application and third-party hardware compatibility.
- Preserve existing applications, settings, and documents.
Which three actions should you perform in sequence?
(To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order. )

Answer:


QUESTION 436
Drag and Drop Question
You deploy Windows 7 on client computers by using a default Windows 7 DVD.
You discover that the client computers use the most recently released critical updates.
You download the updates' package files from the Microsoft site to your desktop.
You need to prepare a new installation DVD that includes the updates.
What should you do?
(To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:


QUESTION 437
Drag and Drop Question
A company has client computers that run Windows XP. The company plans to deploy Windows 7 to all client computers. Each employee will keep the same computer.
You need to migrate the client computers from Windows XP to Windows 7 while maintaining each user's files and settings.
Which actions would you perform in sequence?
(To answer, move the appropriate actions from the list of actions to the answer area and arrange them into the correct order).

Answer:


QUESTION 438
You administer a computer that has Windows 7 Enterprise installed.
The computer reboots unexpectedly.
You suspect that an unsigned driver causes the reboots.
You need to view a list of all installed device drivers that contain information about the digital signature of the device driver.
Which should you do?

A.    Run the driverquery.exe /SI command.
B.    Open the System Protection configuration for drive
C.    Open Device Manager, show hidden devices, and sort all devices by type.
D.    Run sigverif.exe and start the verification process of the device drivers.
Then, review the generated log file.


Answer: A

QUESTION 439
You have a computer joined to a domain that runs Windows 7.
Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point.
You set the startup type of the NAP Agent service to Automatic on the computer.
You need to complete the configuration of the computer as a NAP client.
What should you do?

A.    From the command line of the computer, enable the DHCP Quarantine Enforcement Client by
using the netsh command.

B.    From the command line of the computer, enable the DHCP Quarantine Enforcement Client by
using the ipconfig command.

C.    From the NAP Client Configuration console, configure the user interface settings.

D.    From the NAP Client Configuration console, configure the Health Registration settings.


Answer: A

QUESTION 440
You have 20 client computers. The computers run Windows XP. The computers are joined to a domain.
You plan to perform installation of Windows 7 on the computers.
You need to transfer all users' documents and settings.
You must exclude music and video files.
You need to use the minimum amount of administration effort.
What should you do first?

A.    Create a config.xml file.
Configure a logon script for windows XP computers to launch Windows 7 installations.

B.    Modify the migapp.xml file.
Configure a logon script for the Windows XP computer to launch Windows 7 installation.

C.    Modify the miguser.xml file.
Configure a logon script for the Windows XP computer to launch Windows 7 installation.

D.    Modify the migdocs.xml file.
Configure a logon script for the Windows XP computer to launch Windows 7 installation.


Answer: D

QUESTION 441
Drag and Drop Question
You have a Windows XP computer.
You need to migrate to Windows 7 and determine that all third-party applications installed on the computer continue to operate with the new operating system.
Which four actions should you perform in sequence?
(To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. )

Answer:


QUESTION 442
Hotspot Question
A company is in the process of upgrading its client computers from Windows XP to Windows 7. You add an application to the Windows 7 base image.
When users move the application window, the application is displayed improperly.
You need to ensure that the application is displayed properly by disabling the Aero theme.
Which setting should you choose?
(To answer, select the appropriate check box in the dialog box.)

Answer:


QUESTION 443
You maintain Windows 7 virtual hard disks (VHDs) at Contoso, Ltd.
You are applying a series of updates to one of the company's VHDs by using the Windows
Deployment Image Servicing and Management (DISM) system. The VHD contains a Windows 7 64-bit operating system. The image is stored in N:ImagesWin7img. vhd.Additionally, there are three updates required, which are stored in subfolders of N:updates.
You need to mount and apply Windows updates to the offline VHD.
Which two actions should you perform?
(Each correct answer presents part of the solution. Choose two. )

A.    Use diskpart to mount the VHD.
B.    Use Dism with /Add-Driver and /recurse options.
C.    Use Dism to mount the VHD.
D.    Use Dism with /Add-Package /recurse.

Answer: AD
Explanation:
A: To Attach a. VHD
Diskpart
Select vdisk file=c:wimsW7Ultimate.vhd
attach vdisk
assign letter=F
exit
D: Example:
Dism /image:C:WIMoffline /Add-Package /PackagePath:C:Updates
Incorrect:
not B: we are not adding drivers.

QUESTION 444
You are the system administrator for a large manufacturing company.
You and your team are responsible for managing over 1,000 Windows 7 Professional desktop and laptop computers. All computers are members of a Windows 2008 R2 Active Directory domain.
You want to utilize the Windows Remote Management Service available in Windows 7
Professional.
You plan to configure all desktop and laptop computers so that the Windows Remote Management Service can manage them remotely.
You need to run a command on each Windows 7 computer so that you can configure the service.
Which two commands can you use to achieve this goal?
(Each correct answer presents a complete solution. Choose two. )

A.    Mstsc /v:computername configure
B.    Enable-PSRemoting -force
C.    Psexec Wcomputername -enable
D.    Winrm quickconfig

Answer: BD
Explanation:
B: To configure Windows PowerShell for remoting, type the following command:
Enable-PSRemoting -force
D:
*When you are working with computers in workgroups or homegroups, you must either use HTTPS as the transport or add the remote machine to the TrustedHosts configuration settings. If you cannot connect to a remote host, verify that the service on the remote host is running and is accepting requests by running the following command on the remote host:
winrm quickconfig
This command analyzes and configures the WinRM service.
* The Windows PowerShell remoting features are supported by the WS-Management protocol and the Windows Remote Management (WinRM) service that implements WS- Management in Windows.
Incorrect:
Not C:
* PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems.
* psexec [\computer[,computer2[,. . . ] | @file]][-u user [-p psswd][-n s][-r servicename][-h][- l][-s|-e][-x][-i session]
][-c [-f|-v]][-w directory][-d][-][-a n,n,. . . ] cmd [arguments]

QUESTION 445
Hotspot Question
A company has client computers that run Windows 7.
You need to secure a virtual private network (VPN) connection on the client computers.
The remote access server must verify the identity of the client computers without requiring user credentials.
Which authentication protocol should you use?
(To answer, select the appropriate setting or settings in the work area.)

Answer:


Guaranteed 100% Microsoft 70-680 Exam Pass OR Full Money Back! Braindump2go Provides you the latest 70-680 Dumps PDF & VCE for Instant Download!

120[2][2]

http://www.braindump2go.com/70-680.html

Post date: 2015-01-04 02:35:13
Post date GMT: 2015-01-04 02:35:13

Post modified date: 2015-01-04 02:35:13
Post modified date GMT: 2015-01-04 02:35:13

Export date: Thu Mar 28 17:38:27 2024 / +0000 GMT
This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ]
Export of Post and Page has been powered by [ Universal Post Manager ] plugin from www.ProfProjects.com