★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-680-dumps.html
Actualtests 70-680 braindumps includes 70-680 examination concerns, 70-680 analyze manual, 70-680 process test,free 70-680 test, 70-680 and even more that wont exclusively transform your expertise to get over the difficulties but the truth is are likewise qualified to regulate on the internet real time problems. Inside your realize 70-680 test manual is to become 70-680 braindumps exclusively in Actualtests. Furthermore our own Microsoft 70-680 braindumps test is always modified to present you the the majority of genuine info obtainable this also is carried out by making use of our own Actualtests professionals team connected with official certifications authorities, specialised workforce, as well as in depth words pros who definitely are continually in-touch while using the changes in the 70-680 test.
2021 Dec ms 70-680:
Q381. - (Topic 4)
A company has client computers that run Windows 7 Enterprise. The company also has a file server running Windows Server 2008 R2 that is configured to use BranchCache. The branch office with the client computers has a slow network connection to the office with the file server.
Users complain of poor performance when connecting to the file server from their client computers.
You need to verify that the client computers are configured to be BranchCache clients.
Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Device Manager
B. Local Users and Groups
C. share permissions
D. the folder Properties window
E. the netsh command
F. the icacls command
G. the Services management console
H. the Group Policy management console
I. the User Account Control Settings Control Panel window
Answer: E,H
Explanation:
To enable BranchCache on Windows 7 client computers using Group Policy, you must first create a Group Policy object (GPO) that will carry the BranchCache configuration. After creating the GPO, you configure the setting that enables BranchCache and choose whether BranchCache will operate in Distributed Cache mode or Hosted Cache mode.
To create a GPO, enable BranchCache, and select the cache mode Click Start, point to Administrative Tools, and click Group Policy Management Console.
Client configuration using netsh
When configuring client computers, you can enable BranchCache and choose between Distributed Cache mode and Hosted Cache mode with a single netsh command.
Q382. - (Topic 5)
You have 100 computers that run Windows XP. Each computer has the following features:
Contains a single hard disk drive.
Contains a single partition.
Supports USB devices during startup.
You are planning a clean installation of Windows 7 Ultimate.
You need to ensure that the installation of Windows 7 Ultimate will support BitLocker Drive Encryption on the system partition.
What should you do?
A. Verify that the computers have a Trusted Platform Module (TPM) version 1.2 security devices.
B. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Use bcdedit.exe to create a new empty boot configuration data store.
C. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Verify the status of the partition by using manage bde.exe.
D. Start the computer from Windows 7 media. Delete the existing partition and install Windows 7 Ultimate on the unpartitioned space.
Answer: B
Q383. - (Topic 2)
You have a computer that runs windows 7.
You log on to the computer by using a user account that is a member of Administrator Group.
From Windows Explorer you open C:\windows\system32\drivers\etc\hosts in notepad.
You attempt to save the file and receive the save as dialog box.
You need to ensure that you can save changes to c:\windows\system32\drivers\
What should you do?
A. Stop the windows search service
B. Remove the inherited permissions from the file.
C. Start Windows Notepad by using elevated privileges.
D. Change the user account control (UAS) settings to Notify Me Only when programs try to make changes to my computer.
Answer: C
Explanation:
Windows 7 does not allow applications to write data to these secure locations.
User Account Control (UAC)UAC is a security feature of Windows 7 that informs you when
the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks.Privilege elevationAll users of clients running Windows 7 run with the rights of a standard user. When a user attempts an act that requires administrative privileges, such as creating a new user account, her rights need to be raised from those of a standard user to those of an administrative user. This increase in rights is termed privilege elevation. UAC is a gateway to privilege elevation. It allows users who are members of the local Administrators group to access administrative rights, but ensures that the person accessing the Administrative rights is aware that they are doing so. This privilege elevation occurs only for a specific task. Another task executed at the same time that also requires privilege elevation generates its own UAC
Q384. - (Topic 2)
You have a computer that runs windows 7.
The network contains a monitoring server named server1 Computer runs a monitoring service named service1.
Service 1 uses remote procedure. You need to ensure that service1 can receive requests from server1.
What should you do?
A. From windows Firewall with Advanced Security, create a predefined rule.
B. From windows Firewall with Advanced Security, create custom rule.
C. From the Network and Sharing Center, modify the network location settings.
D. From the Network and Sharing Center, modify the advanced sharing settings.
Answer: B
Explanation:
Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.
Q385. - (Topic 6)
You have an answer file named Unattend.xml for a Windows 7 automated installation. You need to perform an unattended installation of Windows 7 by using the answer file. What should you do?
A. Name the answer file as unattend.xml and save it to a floppy disk. Start the computer from the Windows Preinstallation Environment (WinPE).
B. Name the answer file as unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (WinPE).
C. Name the answer file as autounattend.xml and save it to a floppy disk. Start the computer from the Windows 7 DVD.
D. Name the answer file as unattend.txt and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (WinPE).
Answer: C
Leading microsoft 70-680:
Q386. - (Topic 3)
You have a computer that runs Windows 7.
Your network has a SSTP VPN server that uses a self-signed certificate.
When you connect to the VPN server, you receive the following error message: "Your computer does not trust the issuing certification authority (CA) of the SSTP VPN servers certificate".
You need to prevent the error message from appearing when you connect to the VPN server.
What should you do?
A. From the properties of the VPN connection, modify the dialing options.
B. From the properties of the VPN connection, modify the data encryption settings.
C. From Certificate Manager, import the servers certificate into the Personal store.
D. From Certificate Manager, import the server's certificate into the Trusted Root Certification Authorities store.
Answer: D
Explanation:
Certificate Manager A certificate manager can approve certificate enrollment and revocation requests, issue certificates, and manage certificates. This role can be configured by assigning a user or group the Issue and Manage Certificatespermission. When you assign this permission to a user or group, you can further refine their ability to manage certificates by group and by certificate template. For example, you might want to implement a restriction that they can only approve requests or revoke smart card logon certificates for users in a certain office or organizational unit that is the basis for a security group.Importing CertificatesYou may restore certificates and the corresponding private keys from a file.
4. Right-click the certificate store you want to import, and click Install PFX on the context menu.
5. The Certificate Import Wizard launches. Click Next.
6.
In the File name text box, type the name of the certificate file that you want to import. Alternatively, you can find the file by clicking Browse.
7. Click Next. If the file specified is a Personal Information Exchange–PKCS #12 (*.pfx), you will be prompted for the password. Enter the password to import the file. Click Next.
8. On the next page, select where you'd like to store the certificate. Click Next.
9. The next wizard page contains summary information about the file that you are importing. Click Finish to import the file. The certificate(s) are now ready for use by the system.
Q387. - (Topic 1)
You have a computer that runs Windows 7.
You run the Configure Backup wizard as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can back up the computer to a local disk drive. What should
you do before you run the Configure Backup wizard?
A. Connect a removable disk.
B. Log on as an administrator.
C. Start the Volume Shadow Copy Service (VSS).
D. Add your user account to the Backup Operators group.
Answer: A
Explanation:
An external hard drive External hard drives can be removed and stored in a secure location. However, they are typically slower than internal hard drives and tend to be less reliable, mainly because they are by default formatted using FAT rather than NTFS. You cannot use an external hard drive for a System Image backup unless you convert its filing system to NTFS. Because it is easily removable, it is more likely that an external hard drive will be missing when a scheduled backup is required. (Local disk drive was specified, not internal)NOT AdministratorYou need administrator credentials to configure scheduled backups or to manually initiate a backup. However, restoring files does not require administrator privileges unless a user attempts to restore another user's file. (NOTE: The issue was a lack of location to store the Backup, not being about to run the Configure Backup, thus it was assumed that the user in this scenario had administrator credentials)NOT Backup OperatorsMembers of this group are able to override file and folder access restrictions for the purpose of backing up data. You can allow a user to back up files and directories by assigning them to the Backup Operators group rather than by modifying the Back Up Files and Directories policy.NOT VSSVSS is installed on computers running Windows 7. Its startup type is Manual. The service starts as needed. If the service does not start when required, shadow copies are unavailable for backup and Windows Backup does not succeed. Nor can you create restore points and previous versions. In this case, check the service and ensure that it has not been disabled.
Q388. DRAG DROP - (Topic 6)
Your organization has a Windows Server 2008 R2 server and Windows 7 Professional computers.
Two groups require access to new applications. Each group uses a different application. You are adding 100 new computers to each group.
You need to configure Windows Firewall to allow each group to access its application.
Which four steps should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. )
Answer:
Q389. - (Topic 2)
Your network consists of a single Active Directory domain named contoso.com.
You have a server named Server1 that runs a custom network application.
Server1 has the following IP addresses:
. 192.168.15.10
. 192.168.15.11
You need to ensure that a client computer resolves server1.contoso.com to only the 192.168.15.11 IP address.
What should you do from the computer?
A. Edit the hosts file
B. Edit the lmhosts file
C. Run Ipconfig.exe /flushdns
D. Run Netsh interface ipv4 reset
Answer: A
Explanation:
Differences Between the HOSTS and LMHOSTS Files in Windows NT In Windows NT, the HOSTS file is for TCP/IP utilities, and the LMHOSTS file is for LAN Manager NET utilities. If you cannot PING another computer (using a friendly name), check the HOSTS file. If you cannot NET VIEW a server using only the TCP/IP protocol, check the LMHOSTS file.
Hosts fileThe Hosts file is a common way to resolve a host name to an IP address through a locally stored text file that contains IP-address-to-host-name mappings. On most UNIX-based computers, this file is /etc/hosts. On Windows-based computers, this file is the Hosts file in the systemroot\System32\Drivers\Etc folder. The following describes the attributes of the Hosts file for Windows: A single entry consists of an IP (IPv4 or IPv6) address and one or more host names. The Hosts file is dynamically loaded into the DNS client resolver cache, which Windows Sockets applications use to resolve a host name to an IP address on both local and remote subnets. When you create entries in the Hosts file and save it, its contents are automatically loaded into the DNS client resolver cache. The Hosts file contains a default entry for the host name localhost. The Hosts file can be edited with any text editor. Each host name is limited to 255 characters. Entries in the Hosts file for Windows–based computers are not case sensitive. The advantage of using a Hosts file is that users can customize it for themselves. Each user can create whatever entries they want, including easy-to-remember nicknames for frequently accessed resources. However, the individual maintenance required for the Hosts file does not scale well to storing large numbers of FQDN mappings or reflecting changes to IP addresses for servers and network resources. The solution for the large-scale storage and maintenance of FQDN mappings is DNS. The solution for the maintenance of FQDN mappings for changing IP addresses is DNS dynamic update.NOT LMHOSTS FileThe LMHOSTS file is a local text file that maps IP addresses to NetBIOS names of remote servers with which you want to communicate over the TCP/IP protocol. Windows recognizes names instead of IP addresses for network requests and a name discovery process is used to correctly route network requests with TCP/IP. Because the name discovery process is generally not routed by an IP router, the LMHOSTS file allows Windows machines to communicate using TCP/IP across a subnet.
-LMHOSTS contains IP address to "NetBIOS over TCP/IP" name translations.
-LMHOSTS is only used by the NBT (NetBIOS over TCP/IP) interface.
-LMHOSTS file contains some valuable additions to the LAN Manager and Windows for Workgroups
-LMHOSTS file, such as the ability to support routed domain logon validation.
-LMHOSTS contains static information about TCP/IP addresses, but using logon scripts and/or the replicator service, the "master" file can be distributed transparently across all stations.
-By default, the LMHOSTS file should be located in the directory %SYSTEMROOT%\SYSTEM32\DRIVERS \ETC (usually C:\WINNT\SYSTEM32\DRIVERS\ETC).
Other info http://support.microsoft.com/kb/105997
Q390. - (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You are in charge of a computer that runs Windows Vista. You have Windows 7 installed on a new partition on the computer. You have to make sure that the computer always starts Windows Vista by default. So what action should you perform to make sure of this?
A. In order to make sure that the computer always starts Windows Vista by default, a boot.ini file should be created in the root of the Windows 7 partition.
B. In order to make sure that the computer always starts Windows Vista by default, a boot.ini file should be created in the root of the Windows Vista partition.
C. In order to make sure that the computer always starts Windows Vista by default, Bcdedit.exe should be run and the /default parameter should be specified.
D. In order to make sure that the computer always starts Windows Vista by default, Bcdedit.exe should be run and the /bootems parameter should be specified.
Answer: C