[FREE UPDATED] New Released Microsoft 70-680 Dumps PDF Free Download From Braindump2go (411-420)

Microsoft Official Exam Center Latest Added Questions and Answers For 70-680 Exam Free Download from Braindump2go!

Vendor: Microsoft
Exam Code: 70-680
Exam Name: TS: Windows 7, Configuring

120[2][2] 

QUESTION 411
You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits:
The Disk Management console (Click the Exhibit button.)

wps7669.tmp_thumb

The System Properties window (Click the Exhibit button.)

wps94C3.tmp_thumb

The System protection for Local Disk C window (Click the Exhibit button.)

wpsB435.tmp_thumb

You encrypt several files on an external USB hard disk drive by using the Encrypting File System (EFS).
You need to ensure that you can access the files from another computer.
What should you do?

A.    Delete restore points.
B.    Create a restore point.
C.    Perform a system restore.
D.    Search for the file in the Recycle Bin.
E.    Increase disk space used for system protection.
F.    Copy the file from a previous version of a folder.
G.    Set restore settings to Only restore previous versions of files.
H.    Run the cipher /x command from the elevated command prompt,
I.    Run the vssadmin list volumes command from the elevated command prompt.
J.    Run the vssadmin list shadows command from the elevated command prompt,
K.    Run the compact /U <file_name> command from the elevated command prompt.

Answer: H
Explanation:
* cipher /x[:efsfile] [<FileName>]
Backs up the EFS certificate and keys to the specified file name. If used with :efsfile, /x backs up the user’s certificate(s) that were used to encrypt the file. Otherwise, the user’s current EFS certificate and keys are backed up.
* Back Up Your EFS Key
The first time that you use EFS to encrypt something, your system generates a random 256-bit number; that’s the key that EFS uses whenever you encrypt something. To back up your EFS key, simply use the Cipher /x command. Cipher will reply with a message asking if you truly want to back up your EFS key–sadly, I haven’t found a way to suppress this message. Press OK. The tool will then prompt you for the name of the file in which to store the backup. Don’t specify a file extension; Cipher insists on the .pfx extension. For example, if you picked a file named mybackup, you now have a small file called mybackup.pfx. Next, the tool will prompt you to create a password with which to protect that file.
Once you’ve got that file created, copy it from your computer’s hard disk to some offline location (e.g., a USB stick, a CD-ROM) and make a note of the password you’ve chosen. Now, in the event of unfortunate circumstances– for example, you lose your profile, you forget your password and a systems administrator has to reset it, the system’s OS fails and you need to recover files directly from the nowdead system’s hard disk–you can simply restore your EFS key by double-clicking the .pfx file and running the resulting wizard. As soon as the wizard is finished, you’ll be able to get to your files again.

QUESTION 412
Hotspot Question
All sales employees use portable computers that have Windows 7 installed. All help desk employees use desktop computers that have Windows 7 installed.
You need to ensure that the sales employees are able to request a remote support from a help desk employee when they are in the office.
You also need to ensure that sales employees are prevented from receiving remote support during their travel.
What should you do?
(To answer, configure the appropriate option or options in the dialog box in the answer area.)

wpsE5C1.tmp_thumb

Answer:

wps73.tmp_thumb

QUESTION 413
Drag and Drop Question
Your organization needs to perform a Windows Vista to Windows 7 migration for a department with 150 computers.
You want to use User State Migration Tool (USMT) to automate the migration.
You need to move user data and custom settings from the source computers to the destination computers by using USMT with minimal downtime or impact to the end users. The transfer must include files in several custom directories located in the root directory of the boot volume.
Which four actions should you perform in sequence?
(To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. )

wps1EDC.tmp_thumb

Answer:

wps798A.tmp_thumb

QUESTION 414
You use a computer that has Windows SP1 installed. The computer has a shared folder named c:\Software.
User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folders.
You need to verify whether User1 can save files to C:\Software.
What should you do?

A.    Download the Sysinternals Suite bundle from the Microsoft site.
Run the AccessEnum tool against the C: \Software folder.

B.    Run the Net Share command.

C.    Run the Net View command.

D.    View the Share permissions on C:\Software.

Answer: D

QUESTION 415
Your company Research department includes client computers that have Windows 7 and Windows Vista installed on separate partitions in a dual-boot configuration. The computers boot into Windows 7 by default or users can choose to boot into Windows Vista during startup.
The company management has decided that the Windows Vista partition must be deleted from all the computers.
You need to ensure that the staff of the Research department are not prompted to select a boot option during startup and that Windows 7 is chosen automatically.
What should you do?

A.    In Windows Vista, from an elevated command prompt, run bcdedit /delete {current}.
B.    Select the Selective startup option button by using msconfig.exe.
C.    In Windows Vista, from an elevated command prompt, run bcdedit /delete {default}.
D.    In Windows 7, from an elevated command prompt, run bcdedit /delete {default}.

Answer: A

QUESTION 416
Your laptop has a 400 GB drive and currently reserves, by default, 2% (8 GB) for shadow copies.
You need to reserve more space for previous versions of files.
What should you do?

A.    From System Properties, System Protection, expand the Max usage to 20 GB.
B.    From System Properties, System Protection, turn off system protection.
C.    From Disk Properties, change the Quota Settings from 8 GB to 20 GB.
D.    From System Properties, System Protection, set it to only restore previous versions of files.

Answer: A
Explanation:
Control Panel->System and Security. >System [Properties]->System Protection->Configure

wpsA378.tmp_thumb

wpsC117.tmp_thumb

QUESTION 417
Drag and Drop Question
You manage the Windows 7 Professional computers for a small architecture firm. All computers operate in workgroup mode.
The lead engineer asks you to enable employees to share CAD files located on their desktop computers with all of the other members of the firm.
You create a HomeGroup on the lead engineer’s computer.
You need to configure the rest of the computers in the firm to join this HomeGroup.
Which four actions should you perform in sequence?
(To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. 1)

wpsE200.tmp_thumb

Answer:

wps375.tmp_thumb

QUESTION 418
You administer client computers that have Windows 7 Enterprise installed.
A server names Server1 has an IP address of 10.10.4.46. The server accepts Remote Desktop connections at a custom port 10876.
You need to connect to the server from a client computer by using Remote Desktop.
What should you do?

A.    From an elevated command prompt, run mstsc.exe /v:server1:10876
B.    From an elevated command prompt, run msts.exe 10.10.4.56 port:10876
C.    From an elevated command prompt, run msts.exe Server1 port:10876
D.    From the Advanced tab of your remote Desktop connection, configure the IP address and port of
Server1 as the RD Gateway Server

Answer: A
Explanation:
http://windows.microsoft.com/en-us/windows-vista/Use-command-line-parameters-with- Remote-Desktop-Connection

QUESTION 419
You administer computers that have Windows 7 and Internet Explorer 8 installed.
You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer.
You need to ensure that any data about your browser session is not saved on the computer.
What should you do?

A.    From Internet Options, modify the security settings for the Internet zone.
B.    From the Local Group Policy, enable the InPrivate Filtering Threshold setting.
C.    From Internet Options, select Delete browsing history on exit.
D.    From Internet Options, on the Advanced tab, clear Enable DOM Storage.

Answer: C

QUESTION 420
Drag and Drop Question
You use a computer that has Windows 7 Enterprise installed.
You install two new hard disk drives and verify that the disks have been detected by Disk Management.
You need to configure the two new disks as a software fault-tolerant disk array.
What should you do?
(To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

wps3762.tmp_thumb

Answer:

wps58D7.tmp_thumb


Guaranteed 100% Microsoft 70-680 Exam Pass OR Full Money Back! Braindump2go Provides you the latest 70-680 Dumps PDF & VCE for Instant Download!

120[2][2]

http://www.braindump2go.com/70-680.html