Master the microsoft 70 680 TS:Windows 7,Configuring content and be ready for exam day success quickly with this Examcollection microsoft 70 680 exam price. We guarantee it!We make it a reality and give you real 70 680 exam questions in our Microsoft 70 680 pdf braindumps.Latest 100% VALID Microsoft mcts 70 680 Exam Questions Dumps at below page. You can use our Microsoft mcts 70 680 braindumps and pass your exam.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 70-680 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/70-680-exam-dumps.html
Q161. - (Topic 1)
Your network contains 100 computers that run Windows XP.
You need to identify which applications installed on all of the computers can run on
Windows 7.
You must achieve this goal by using the minimum amount of administrative effort.
What should you install?
A. Microsoft Application Compatibility Toolkit (ACT)
B. Microsoft Assessment and Planning (MAP) Toolkit
C. Microsoft Deployment Toolkit (MDT)
D. Windows Automated Installation Kit (AIK)
Answer: A
Explanation:
The Microsoft. Application Compatibility Toolkit (ACT) 5.6 enables software developers, independent software vendors (ISVs), and IT professionals who work in a corporate environment to determine, before deployment within the organization, whether their applications are compatible with a new version of the Windows. operating system. ACT also enables such individuals to determine how an update to the new version will affect their applications.
You can use the ACT features to:
-Verify your application's, device's, and computer's compatibility with a new version of the Windows operating system, including determining your risk assessment.
-Verify a Windows update's compatibility, including determining your risk assessment.
-Become involved in the ACT Community, including sharing your application assessment with other ACT users.
-Test your applications for issues related to User Account Control (UAC) by using the Standard User Analyzer (SUA) tool.
-Test your Web applications and Web sites for compatibility with new releases and security updates to Internet Explorer., by using the Internet Explorer Compatibility Test Tool.
Q162. - (Topic 2)
You have a computer that runs windows 7.
The computer is configured as shown in the following table.
You plan to install a new application that requires 40 GB of space. The application will be installed to C:app1.
You need to provide 40 GB of free space for the application.
What should you do?
A. Create a shortcut.
B. Create hard link.
C. Create a mount point.
D. Change the quota settings.
Answer: C
Explanation:
Assign a mount point folder path to a driveYou can use Disk Management to assign a mount-point folder path (rather than a drive letter) to the drive. Mount-point folder paths are available only on empty folders on basic or dynamic NTFS volumes.Volume Mount PointsVolume mount points are new system objects in the internal namespace of Windows 2000 that represent storage volumes in a persistent, robust manner. This feature allows multiple disk volumes to be linked into a single tree, similar to the way Dfs links remote network shares. You can have many disk volumes linked together, with only a single drive letter pointing to the root volume. The combination of an NTFS junction and a Windows 2000 volume mount point can be used to graft multiple volumes into the namespace of a host NTFS volume. Windows 2000 offers this new mounting feature as an alternative to drive letters so system administrators can transcend the 26-drive letter limit that exists in Windows NT. Volume mount points are robust against system changes that occur when devices are added or removed from a computer. Important-icon Important A volume is a self-contained unit of storage administered by a file system. The file system that administers the storage in a volume defines a namespace for the volume. A volume mount point is a directory name in an NTFS file system that denotes the root of an arbitrary volume. A volume mount point can be placed in any empty directory of the namespace of the containing NTFS volume. Because volumes can be denoted by arbitrary directory names, they are not required to have a traditional drive letter. Placing a volume mount point on an NTFS directory causes the storage subsystem to resolve the directory to a specified local volume. This "mounting" is done transparently and does not require a drive letter to represent the volume. A Windows 2000 mount point always resolves to the root directory of the desired volume. Volume mount points require that the version of NTFS included with Windows 2000 be used because they are based on NTFS reparse points.
Q163. HOTSPOT - (Topic 6)
You work with Windows 7 computers.
Your company has a policy of not allowing software to be upgraded without proper authorization from the managers.
You set a Software Restriction Policy to allow only a certain version of Microsoft Word 2010 to run. The policy of the Local Group Policy Editor is shown in the Policy Editor exhibit. (Click the Exhibit button.)
Additionally, the hash policy for WmWord. exe is shown in the Hash Policy exhibit. (Click the Exhibit button. )
Any upgrades or change to the WinWord.exe will result in the program not operating.
When you attempt to run MS Word, the program does not execute. The error is shown in the Hashblock exhibit. (Click the Exhibit button.)
Consider each of the following statements. Does the information in the three statements support the inference as stated? (This question is worth three points. )
Answer:
Q164. - (Topic 4)
Your company has a server that runs Windows Server 2008 R2. The server is configured as a remote access server.
The external firewall has TCP port 80 and TCP port 443 open for remote access connections.
You have a home computer that runs Windows 7.
You need to establish secure remote access connection from the home computer to the remote access server.
Which type of connection should you configure?
A. IPSEC
B. L2TP
C. PPTP
D. SSTP
Answer: D
Explanation:
Secure Socket Tunneling Protocol Secure Socket Tunneling Protocol (SSTP) is a new form of VPN tunnel with features that allow traffic to pass through firewalls that block PPTP and L2TP/IPsec traffic. SSTP provides a mechanism to encapsulate PPP traffic over the SSL channel of the HTTPS protocol. The use of PPP allows support for strong authentication methods such as EAP-TLS. The use of HTTPS means traffic will flow through TCP port 443, a port commonly used for Web access. Secure Sockets Layer (SSL) provides transport-level security with enhanced key negotiation, encryption, and integrity checking.
Q165. - (Topic 3)
You have a computer that is certified for Windows 7.
You need to install Windows 7 on the computer. The installation method must prevent you from being prompted for information during the installation.
What should you do?
A. Create an unattend.txt file on a removable drive. Start the computer from the Windows 7 installation media.
B. Create an autounattend.xml file on a removable drive. Start the computer from the Windows 7 installation media.
C. Start the computer from the Windows 7 installation media. At the command prompt, run Setup.exe and specify the /m parameter.
D. Start the computer from the Windows 7 installation media. At the command prompt, run Setup.exe and specify the /tempdrive.
Answer: B
Explanation: Copy the Autounattend.xml file to the root directory of a removable storage device (such as a UFD). You now have a basic answer file that automates Windows Setup. Turn on the reference computer. Insert the Windows 7 product DVD and the UFD containing the answer file (Autounattend.xml) that you created. Windows Setup (Setup.exe) starts automatically and searches the root directory of all removable media for an answer file called Autounattend.xml Note: that the use of an answer file is optional, although it is the method Microsoft recommends. (And it was specified in the question).
Q166. - (Topic 5)
Your company network has a single-domain Active Directory forest. The forest functional level is set to Windows Server 2008 R2. All computers are members of the domain.
You plan to deploy Windows BitLocker Drive Encryption (BitLocker) on portable computers that have Windows 7 Enterprise installed.
You need to be able to automatically back up recovery passwords for BitLocker-protected disk volumes on the portable computers.
What should you do before you start encrypting the disk volumes with BitLocker?
A. Run the cscript Get-TPMOwnerlnfo.vbs script on the client computers.
B. Select the Turn on BitLocker backup to Active Directory option in local policy on the portable computers.
C. Run the cscript Get-BitLockerRecoverylnfo.vbs script on the portable computers.
D. Run the Idifde -i -v -f BitLockerTPMSchemaExtension.ldf -c script on a domain controller.
Answer: B
Q167. - (Topic 3)
A user named User1 uses a shared computer that runs Windows 7.
User1 is a standard user. User1 attempts to connect a USB device to the computer and is prompted to enter administrative credentials.
You need to ensure that User1 can use the USB device without requiring administrative credentials.
What should you do first?
A. Add User1 to the Power Users group.
B. Run Pnputil.exe and specify the - i- a parameters.
C. Run Driverquery.exe and specify the /SI parameter.
D. Copy the driver files to the C:windowssystem32 folder.
Answer: B
Explanation:
When a driver is staged, it is placed in the device driver store and non-administrators can install the device, provided they have permission to install devices in the appropriate device setup class. Pnputil.exe is a command line utility that you can use to manage the driver store. You can use Pnputil to add driver packages, remove driver packages, and list driver packages that are in the store. -i Specifies to install the identified INF file. Cannot be used in conjunction with the -f parameter.
Example pnputil.exe -i -a a:usbcamUSBCAM.INF Adds and installs the specified driver
Q168. - (Topic 2)
You have a dual boot PC running both Vista and Windows 7 on partitions on the computer. Which file would you edit to force the PC to book Vista by default?
A. boot.ini
B. ntfsboot.cfg
C. bcdedit.exe
D. system.cfg
Answer: C
Q169. HOTSPOT - (Topic 4)
You have upgraded a Windows XP system to Windows 7. One of the applications is not showing menus when you launch it under Windows 7. How do you fix this issue?
Answer:
Q170. HOTSPOT - (Topic 4)
You administer portable computers that have Windows 7 installed. The computers connect to a wireless network that uses WPA2-Enterprise Security.
The company's security policy requires multifactor authentication for the portable computers.
You need to manually configure each portable computer to meet the following requirements:
. Users must provide multifactor authentication.
. The Server certificate held on the portable computers must mach the certificate held on the server.
What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.)
Answer: