★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-680-dumps.html
Testking.com presents the actual up-to-date exam training materials which will make for your exam together with guaranteed result. You can trust the actual Microsoft Microsoft exam on our Microsoft exam braindumps. We offer you will get yourself a high passing score. You will discover the Microsoft 70-680 exam questions along with answers are presented in a couple of formats. A single is printable Pdf kind, and the some other is downloadable Test Engine kind.
2021 Sep mcsa 70-680:
Q221. - (Topic 4)
You need to identify the hardware failures have occurred on your computer in the past six months.
What should you do?
A. Open Device Manager.
B. Open Reliability Monitor.
C. Create a User Defined Data Collector Set.
D. Create a new Event Trace Sessions Data Collector Set.
Answer: B
Explanation:
Reliability Monitor is an advanced tool that measures hardware and software problems and other changes to your computer. It provides a stability index that ranges from 1 (the least stable) to 10 (the most stable). You can use the index to help evaluate the reliability of your computer. Any change you make to your computer or problem that occurs on your computer affects the stability index.
The Reliability Monitor is intended for advanced computer users, such as software developers and network administrators.
Click to open Action Center.
Click Maintenance. Then, under Check for solutions to problem reports, click View reliability history.
In Reliability Monitor, you can:
Click any event on the graph to view its details.
Click Days or Weeks to view the stability index over a specific period of time.
Click items in the Action column to view more information about each event.
Click View all problem reports to view only the problems that have occurred on your
computer. This view doesn't include the other computer events that show up in Reliability
Monitor, such as events about software installation.
Q222. - (Topic 1)
You have a computer that runs Windows 7. The computer has System Protection enabled.
You need to retain only the last System Protection snapshot of the computer. All other snapshots must be deleted.
What should you do?
A. Run Disk Cleanup for Programs and features.
B. Run Disk Cleanup for System Restore and Shadow Copies.
C. From the System Protection Restore settings, select Turn off System Restore.
D. From the System Protection Restore settings, select Only restore previous versions of files.
Answer: B
Explanation:
Shadow info: Shadow copies are automatically saved as part of a restore point. If system protection is enabled, Windows 7 automatically creates shadow copies of files that have been modified since the last restore point was created. By default, new restore points are created every seven days or whenever a significant system change (such as a driver or application installation) occurs.
Q223. - (Topic 4)
You have a computer that runs Windows 7. Your computer s disk configuration is shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can create a striped volume on the computer.
What should you do?
A. Add an additional hard disk.
B. Convert all disks to dynamic disks.
C. Install a digitally-signed disk driver.
D. Set the Startup Type of the Virtual Disk Service (VDS) to Automatic.
Answer: B
Explanation:
A striped volume is a dynamic volume that stores data in stripes on two or more physical disks. Data in a striped volume is allocated alternately and evenly (in stripes) across the disks. Striped volumes offer the best performance of all the volumes that are available in Windows, but they do not provide fault tolerance. If a disk in a striped volume fails, the data in the entire volume is lost.
You can create striped volumes only on dynamic disks. Striped volumes cannot be extended.
You can create a striped volume onto a maximum of 32 dynamic disks.
Backup Operator or Administrator is the minimum membership required to complete the actions below.
Creating a striped volume
Using the Windows interface
Using a command line
To create a striped volume using the Windows interface
In Disk Management, right-click the unallocated space on one of the dynamic disks where you want to create the striped volume, and then click New Striped Volume….
Follow the instructions on your screen.
To create a striped volume using a command line
Open a command prompt and type diskpart.
At the DISKPART prompt, type list disk. Make note of the number of the disk where you want to create a striped volume.
At the DISKPART prompt, type create volume stripe [size=<size>]
[disk=<disknumber>[,[<seconddisknumber>,
…]].
Q224. - (Topic 6)
You use a computer that has Windows 7 SP1 installed and has a folder named C:\Data.
The active network connection for the computer is configured as Public.
You assign User1 to a local group called DataUsers. The group has been granted Read NTFS permissions for the folder.
User1 browses to the shared folder across the network and receives the following error message:
"Access is Denied."
You need to ensure that the user can download files from the shared folder.
What should you do?
A. Allow file and printer sharing through Windows Firewall.
B. Change the network location of the computer from a Public network to a Home or Work network.
C. From the Security settings of the C:\Data folder, assign the Full Control NTFS permissions to User1.
D. From the Advanced Sharing settings of the folder, assign the Read share permission to User1.
E. From the Advanced Sharing permissions, enable caching.
Answer: D
Q225. - (Topic 2)
You have a computer that runs Windows 7. The computer contains one hard disk. The hard disk is configured as shown in the following table.
You install a new 250-GB hard disk in the computer.
You need to ensure that all the files on the computer are available if a single disk fails.
What should you do?
A. Create a mount point on C and D and then create a striped volume.
B. Create a mount point on C and D and then create two striped volumes.
C. Convert both disks to dynamic disks and then create a mirrored volume.
D. Convert both disks to dynamic disks and then create two mirrored volumes.
Answer: D
Explanation:
Creating a Mirrored Volume (RAID-1)A mirrored or RAID-1 volume provides availability and fault tolerance but does not improve performance. It uses two disks (or two portions on separate disks) that are the same size. Any changes made to the first disk of a mirror set are also made to its mirror disk. If the first disk fails, the mirror is broken and the second disk is used until the first is repaired or replaced. The mirror is then re-created, and the information on the working disk is mirrored on the repaired disk. The disadvantage of RAID-1 is that you need (for example) two 200-GB disks to hold 200 GB of data. The advantage is that you can mirror a system disk containing your operating system.You create a mirrored volume using a very similar procedure to the one that creates a striped volume, except that you right-click the first disk of your mirror and click New Mirrored Volume to start the appropriate wizard. You then select the second disk. The second disk needs to have a portion of unallocated space that is at least as large as the disk you want to mirror. The drive letter for a mirrored volume is the same as the drive letter of the first disk. You can also use the Diskpart tool to create a mirrored volume. At the DISKPART> prompt you first use the select disk command to select the first disk. You then enter a command with the syntax add disk=<n>to specify the mirror disk.
Down to date windows 7 exam 70-680:
Q226. - (Topic 6)
You maintain Windows 7 virtual hard disks (VHDs) at Contoso, Ltd.
You are applying a series of updates to one of the company's VHDs by using the Windows Deployment Image Servicing and Management (DISM) system. The VHD contains a Windows 7 64-bit operating system. The image is stored in N:\Images\Win7img. vhd.Additionally, there are three updates required, which are stored in subfolders of N:\updates.
You need to mount and apply Windows updates to the offline VHD.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two. )
A. Use diskpart to mount the VHD.
B. Use Dism with /Add-Driver and /recurse options.
C. Use Dism to mount the VHD.
D. Use Dism with /Add-Package /recurse.
Answer: A,D
Explanation: A: To Attach a. VHD Diskpart Select vdisk file=c:\wims\W7Ultimate.vhd attach vdisk assign letter=F exit
D: Example:
Dism /image:C:\WIM\offline /Add-Package /PackagePath:C:\Updates\
Incorrect:
not B: we are not adding drivers.
Q227. - (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You manage a computer that runs Windows 7. You have to identify which applications were installed during the last week. So what action should you perform?
A. The System Performance Data Collector Set should be run from Performance Monitor.
B. The informational events should be reviewed from Reliability Monitor.
C. The Software Environment should be reviewed from System Information.
D. The System Diagnostics Report should be reviewed from Performance Monitor.
Answer: B
Q228. - (Topic 2)
You have a workgroup that contains five computers. The computers run Windows 7.
A computer named Computer1 has video and audio files.
You need to share Computer1's video and audio files on the network.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a HomeGroup.
B. Move the files to a Media Library.
C. Enable all BranchCache rules in Windows Firewall.
D. Connect a removable drive and enable BitLocker To Go.
Answer: A,B
Explanation:
HomeGroup ConnectionsThis option decides how authentication works for connections to HomeGroup resources. If all computers in the HomeGroup have the same user name and passwords configured, you can set this option to allow Windows to manage HomeGroup connections. If different user accounts and passwords are present, you should configure the option to use user accounts and passwords to connect to other computers. This option is available only in the Home/Work network profile.Media Library SharingBefore you turn on Media Library Sharing for a shared folder, you should know that Media Library Sharing bypasses any type of user-account access that you set for the shared folder. For example, let's say that you turn on Media Library Sharing for the Photos shared folder, and you set the Photos shared folder to No Access for a user account named Bobby. Bobby can still stream any digital media from the Photos shared folder to any supported digital media player or DMR. If you have digital media that you do not want to stream in this manner, store the files in a folder that does not have Media Library Sharing turned on. If you turn on Media Library Sharing for a shared folder, any supported digital media player or DMR that can access your home network can also access your digital media in that shared folder. For example, if you have a wireless network and you have not secured it, anybody within range of your wireless network can potentially access your digital media in that folder. Before you turn on Media Library Sharing, make sure that you secure your wireless network. For more information, see the documentation for your wireless access point.
Q229. - (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You use a computer that runs Windows 7.
Now your company assigns a task to you. You are asked to prevent users from copying unencrypted files to removable drives. What action should you perform?
A. The Trusted Platform Module (TPM) settings should be modified from a local Group Policy.
B. TPM should be initialized from the Trusted Platform Module (TPM) snap-in.
C. The BitLocker Drive Encryption settings should be modified from Control Panel.
D. The BitLocker Drive Encryption settings should be modified from a local Group Policy.
Answer: D
Q230. - (Topic 2)
You have 15 computers that run Windows 7.
You need to implement a monitoring solution that meets the following requirements:
. Sends an e-mail notification when an application error is logged in the event log . Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 . Minimizes the administrative effort required to monitor applications
What should you do?
A. On all the computers, configure a custom view. Configure a custom task for the application error events.
B. On a computer, configure a custom view to display the application errors. Configure a custom task for the application error events.
C. On a central computer, configure an event subscription. On all of the computers, configure a custom task in the Forwarded Events log.
D. On all the computers, configure an event subscription to a central computer. On the central computer, configure a custom task in the Forwarded Events log.
Answer: D
Explanation:
Event ForwardingEvent forwarding enables you to transfer events that match specific criteria to an administrative (or collector) computer. This enables you to manage events centrally. A single event log on the collector computer holds important events from computers anywhere in your organization. You do not need to connect to the local event logs on individual computers. SubscriptionsIn a source-initiated subscription (sometimes termed a source computer–initiated subscription), the computer on which an event is generated (the source computer) sends the event to the collector computer. You would use a source-initiated subscription when you have a large number of source computers and you configure these computers through Group Policy.