★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-680-dumps.html
Proper study guides for Replace Microsoft TS:Windows 7,Configuring certified begins with Microsoft 70-680 preparation products which designed to deliver the Tested 70-680 questions by making you pass the 70-680 test at your first time. Try the free 70-680 demo right now.
2021 Sep windows 7 70-680:
Q191. - (Topic 5)
You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:\Software.
User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folder.
You need to verify whether User1 can save files to C:\Software.
What should you do?
A. Run the Net Share command.
B. Run the Wfs C:\Software command.
C. In the Advanced Security Settings for the Documents folder, select the Effective Permissions tab.
D. Run the Fsutil C:\Software command.
Answer: C
Explanation: To view effective permissions on files and folders . Open Windows Explorer, and then locate the file or folder for which you want to view effective permissions.
Right-click the file or folder, click Properties, and then click the Security tab.
Click Advanced, click the Effective Permissions tab, and then click Select.
In Enter the object name to select (examples), enter the name of a user or group, and then click OK. The selected check boxes indicate the effective permissions of the user or group for that file or folder.
Q192. - (Topic 1)
You have a computer that runs Windows 7. The computer has two volumes named volume
C and volume D.
You create a document on volume D.
You manually create a restore point and modify the document.
You view the properties of the document as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can restore the current version of the document if the document is modified.
What should you do first?
A. Run Disk Cleanup on volume D.
B. Enable auditing on the document.
C. Turn on System Protection for volume D.
D. Start the Volume Shadow Copy Service (VSS).
Answer: C
Explanation:
System Protection System protection regularly creates and saves information about your computer's system files and settings. It also saves previous versions of files that you have modified. It saves these files in restore points, which are created just before significant system events, such as the installation of a program or device driver. Restore points are also created automatically every seven days if no other restore points were created in the previous seven days. You can create restore points manually at any time. System protection is automatically on for the drive that holds the operating system and can be enabled only for drives that are formatted using the NTFS file system. It enables you to use system restore and to restore files to previous versions. You will configure system protection, create a restore point, and perform a system restore in the practice later in this lesson.
Q193. HOTSPOT - (Topic 6)
You are the network administrator at a scientific research firm. You have a network of Windows Server 2008 R2 servers and Windows 7 Enterprise computers in a domain configuration.
Management needs to support a new, remote laboratory that is connected by a very slow network link. The primary work of the five scientists is to carry out experiments by following documentation that is stored on the corporate network. The only equipment at the remote site includes five computers and network connectivity devices.
You receive the following three email messages:
Message 1
All,
Due to business constraints, we are unable to support the purchase of a server at the new remote location to service such a small number of users. The minimum number of users to support a server purchase is 10.
Bart Cushing
Purchasing Department
Message 2
Dear all,
The new lab is up and running. By far the biggest problem is the exceptionally slow speed downloading the experiment descriptions from corporate headquarters. Is there a way to fix
the problem? Thanks! Dana Wright
Remote Lab Manager
Message 3
To all employees of A Datum Corp:
This is a friendly reminder that corporate security policy prohibits users from creating file
shares computers.
Thank you for your attention to this matter
Gwen Francis
You need to determine if BranchCache can support the environment.
Consider each of the following statements. Does the information in the three messages support the interference as stated? Each correct selection is worth one point.
Answer:
Q194. - (Topic 5)
You manage several client computers in an organization.
You need to ensure that all users, including administrators, are required to enter a username and password when uninstalling applications from any computer in the organization.
What should you do?
A. Create a custom GPO to modify the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting.
B. Configure an AppLocker Windows Installer rule.
C. Configure the User Account Control (UAC) settings on all client computers to always notify.
D. Create a custom GPO to configure a software restriction policy.
Answer: A
Q195. - (Topic 2)
You have a computer that runs Windows 7. The network connection details are shown in the exhibit. (Click the Exhibit button.)
You need to manually assign an IP address of 192.168.1.50 to the computer.
What should you do first?
A. Enable TCP/IPv4.
B. Disable TCP/IPv6.
C. Run Ipconfig and specify the /renew parameter.
D. Run Netsh and specify the Interface ipv4 add address command.
Answer: A
Explanation:
IPv4 is not currently enabled and 192.168.1.50 is an IPv4 address.Therefore IPv4 is required so ENABLE it.
Up to date windows 7 70-680 exam questions:
Q196. - (Topic 3)
You have a computer that runs Windows 7.
A user installs a third-party media player on the computer.
You discover that all media files automatically open by using the third-party media player.
You need to ensure that all media files open automatically by using Windows Media Player.
You must achieve this goal by using the minimum amount of administrative effort.
What should you do?
A. Select a media file. Right-click the file and select open with.
B. Select a media file. Right-click the file and select Restore previous versions.
C. From Control Panel, modify the Set your default programs settings.
D. From Control Panel, modify the Set program access and computer defaults settings.
Answer: C
Q197. - (Topic 2)
You have a computer that runs Windows 7.
You need to provide standard users the ability to update the drivers for display adapters.
What should you modify from the Local Group Policy?
A. driver installation settings for the user
B. device installation settings for the computer
C. driver installation settings for the computer
D. display settings for the user
Answer: C
Explanation:
To Update the Drivers you need permissions to install drivers. Apply this to the computer for all local users, as opposed to only one user.
Q198. HOTSPOT - (Topic 5)
You use a computer that has Windows 7 and a legacy application named App1 installed.
App1 is designed for Windows 2000 and implements large-scale font sizes.
You need to configure application compatibility settings for App1 according to the following
requirements:
. Compatible with Windows 2000
. Large-scale fonts must not be resized
What should you do? (To answer, select the appropriate check boxes in the Application "App1" Compatibility Properties tab in the answer area.)
Answer:
Q199. - (Topic 2)
You have a computer that runs Windows 7.
You run Runas and specify the /savecred parameter to start an application.
You need to delete the stored password.
What should you do?
A. Run Del and specify the /p parameter.
B. Run Runas and specify the /noprofile parameter.
C. From Credential Manager, modify the Windows credentials.
D. From Authorization Manager, modify the Authorization Manager options.
Answer: C
Explanation:
Credential Manager Credential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson.
Q200. - (Topic 4)
Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BranchCache feature installed.
The client computers have a third-party firewall application installed.
You configure BranchCache on all computers to run in Distributed Cache mode.
You need to ensure that the client computers can access all cached files.
What should you do?
A. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80.
B. Check permissions.
C. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443
D. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy.
E. Run the Netsh branchcache set service mode=HOSTEDSERVER clientauthentication=NONE command.
F. Run the netsh branchcache set service mode=HOSTEDCLIENT command.
G. Run the netsh branchcache set service mode=DISTRIBUTED command
H. Create a Group policy object and configure the Set percetage of disk space used for client computer cache option.
I. Create a Group policy that sets Hash Publication for Branchcache as disabled.
Answer: A
Explanation:
Configuring Windows 7 as a BranchCache client involves enabling BranchCache, selecting either Hosted Cache mode or Distributed Cache mode, and then configuring the client firewall to allow BranchCache traffic.
You can configure BranchCache either using Group Policy or by using the Netsh command-line utility. The firewall rules that you configure depend on whether you are using Hosted Cache or Distributed Cache mode.
You can use predefined firewall rules or manually create them based on protocol and port. The required firewall rules are as follows: . The BranchCache - Content Retrieval (Uses HTTP) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on TCP port 80. This rule is required for both Hosted Cache and Distributed Cache mode. You can create this rule using Windows Firewall With Advanced Security. . The BranchCache - Peer-Discovery (Uses WSD) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on UDP port 3702. This rule is only required when using Distributed Cache mode. . The BranchCache - Hosted Cache Client (HTTPS-Out) predefined rule. It this rule is not available, configure a rule that allows outbound traffic on TCP port 443. This rule is required only when using Hosted Cache mode.
You need to configure the firewall rules only when you configure BranchCache using Group Policy. When you configure BranchCache using Netsh, the appropriate firewall rules are set up automatically.