★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-680-dumps.html
Testking is often a boss during the cause of individuals with present-day education substances for the Microsoft official certifications exam preparing. The perfect education is often a all natural Microsoft 70-680 CBT during Testking - faraway from a heartbreaking neural Microsoft 70-680 are like a magnet, Microsoft 70-680 value of any niece, the need for an investment amount of profit Microsoft 70-680 together with 70-680 records are perfect , the total assurance Microsoft 70-680 tested the main try out.
2021 Dec exam 70-680 windows 7 configuration pdf:
Q81. - (Topic 5)
Your company network includes client computers that have Windows 7 installed. All client computers have NetBIOS disabled.
You need to view the status of all TCP/UDP ports.
Which command should you run?
A. nbtstat -n
B. ipconfig /all
C. netstat -an
D. ipconfig /displaydns
Answer: C
Q82. - (Topic 1)
You have a standalone computer that runs Windows 7. You need to prevent non-administrative users from using Device Manager. Users must be able to access Event Viewer.
What should you do?
A. From Control Panel, modify the default settings for media and devices.
B. From Control Panel, modify the default settings for device installation.
C. From the local computer policy, modify the application control policies.
D. From the local computer policy, modify the Microsoft Management Console (MMC) settings.
Answer: D
Explanation:
Controlling MMC usage by using local Group Policy To control MMC usage by using local Group Policy
11. Open MMC 3.0.
12. On the File menu, click Add/Remove Snap-in.
13. In the Available snap-ins list, click the Group Policy editor, and then click Add.
14. In the Select Group Policy Object wizard, use the default setting, Local Computer, in the Group Policy Object field.
15. Click Finish to close the Select Group Policy Object wizard.
16. By default, all available snap-in extensions are enabled. If you want to enable only certain extensions, highlight the snap-in in the Selected snap-ins list, and then click Edit Extensions.
17. By default, snap-ins load as child objects of the Console Root node. Click Advanced to modify this behavior and allow you to choose a different parent snap-in.
18. In the Add or Remove Snap-ins dialog box, click OK.
19. Before closing the new console, perform any of these procedures:
-To restrict access to author mode in MMC
-To restrict access to a permitted list of snap-ins
-To permit or restrict access to a snap-in
Q83. - (Topic 2)
You have a computer that runs Windows 7. You connect to your company's network by using a VPN connection.
You discover that when you establish the VPN connection, you are unable to access Internet Web sites.
When you disconnect the VPN connection, you can access Internet Web sites.
You need to access Internet Web sites while you are connected to the VPN.
What should you do?
A. Configure the VPN connection to use only PPTP.
B. Configure the VPN connection to use only L2TP/IPSec.
C. From the Internet Protocol Version 4 (TCP/IPv4) properties of the local area connection, disable the Automatic metric setting.
D. From the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection, disable the Use default gateway on remote network setting.
Answer: D
Explanation:
To prevent the default route from being created In the properties of the TCP/IP protocol of the dial-up connection object, in the Advanced TCP/IP Settings dialog box, click the General tab, and then clear the Use default gateway on remote network check box.
Q84. - (Topic 3)
You administer 80 computers that run Windows 7. The computers have static IP addresses.
You need to change the static IP addresses on all the computers by using a startup script.
Which command should you include in the startup script?
A. Ipconfig.exe
B. Nbtstat.exe
C. Netstat.exe
D. Netsh.exe
Answer: D
Explanation:
Netsh.exe Netsh.exe is a tool an administrator can use to configure and monitor Windows-based computers at a command prompt. With the Netsh.exe tool, you can direct the context commands you enter to the appropriate helper, and the helper then carries out the command. A helper is a Dynamic Link Library (.dll) file that extends the functionality of the Netsh.exe tool by providing configuration, monitoring, and support for one or more services, utilities, or protocols. The helper may also be used to extend other helpers. You can use the Netsh.exe tool to perform the following tasks:
-Configure interfaces.
-Configure routing protocols.
-Configure filters.
-Configure routes.
-Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service.
-Display the configuration of a currently running router on any computer.
-Use the scripting feature to run a collection of commands in batch mode against a specified router.
The syntax for the Netsh.exe tool is: netsh [-r router name] [-a AliasFile] [-c Context] [Command | -f ScriptFile] To display a list of subcontexts and commands that can be used in a context, type the context name followed by a space and a ? at the netsh> command prompt. For example, to display a list of subcontext and commands that can be used in the /routing context, type routing ? at the netsh> command prompt, and then press ENTER.
Q85. - (Topic 5)
You administer a computer that has Windows 7 Enterprise installed.
The computer reboots unexpectedly. You suspect that an unsigned driver causes the reboots.
You need to view a list of all installed device drivers that contain information about the digital signature of the device driver.
Which should you do?
A. Run the driverquery.exe /SI command.
B. Open the System Protection configuration for drive C.
C. Open Device Manager, show hidden devices, and sort all devices by type.
D. Run sigverif.exe and start the verification process of the device drivers. Then, review the generated log file.
Answer: A
Update vce 70-680:
Q86. - (Topic 3)
You need to back up your Encrypting File System (EFS) certificate. You must achieve this goal in the minimum amount of time.
What should you do?
A. Run Cipher.exe /x.
B. Run Ntbackup.exe /p.
C. From Backup and Restore, click Back up now.
D. From Backup and Restore, click Create a system image.
Answer: A
Explanation:
Cipher is used to manage certificates.
NOT Backup and Restore:Only the EFS certificate needs to be backed up and time is a factor.
Q87. DRAG DROP - (Topic 5)
You use a computer that has Windows 7 Enterprise installed.
You install two new hard disk drives and verify that the disks have been detected by Disk Management.
You need to configure the two new disks as a software fault-tolerant disk array.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q88. - (Topic 1)
Which of the following operating systems support an offline migration using USMT? Choose three.
A. Windows 2000 Professional
B. Windows XP Professional
C. Windows Vista
D. Windows 7
Answer: B,C,D
Q89. - (Topic 2)
You have a computer that runs Windows 7.
You view the properties of a file on the computer as show in the exhibit. (Click the Exhibit button.)
You need to ensure that you can configure permissions on the file.
What should you do?
A. From Folder Options, modify the View settings.
B. Move the file to a disk that has the NTFS file system.
C. Open Windows Explorer by using elevated privileges.
D. Hold the SHIFT key, right-click the file, and click Properties.
Answer: B
Explanation:
Missing options hints not on NTFS. On NTFS volumes, you can set security permissions on files and folders. These permissions grant or deny access to the files and folders. You can view security permissions for files and folders by completing the following steps: 1. In Windows Explorer, right-click the file or folder you want to work with. 2. From the pop-up menu, select Properties, and then in the Properties dialog box click the Security tab.3. In the Name list box, select the user, contact, computer, or group whose permissions you want to view. If the permissions are dimmed, it means the permissions are inherited from a parent object.
Q90. - (Topic 3)
You have a computer named Computer1 that runs Windows 7.
You plan to migrate the user state on Computer1 by using User State Migration Tool (USMT) 4.0.
You need to identify which user documents will be included in the migration.
What should you do?
A. Run Usmtutils.exe and use the /ec option.
B. Run Sysprep.exe and use the /audit option.
C. Run Loadstate.exe and use the /v:12 option.
D. Run Scanstate.exe and use the /genmigxml option.
Answer: D
Explanation:
ScanState You run ScanState on the source computer during the migration. You must run ScanState.exe on computers running Windows Vista and Windows 7 from an administrative command prompt. When running ScanState on a source computer that has Windows XP installed, you need to run it as a user that is a member of the local administrators group. The following command creates an encrypted store named Mystore on the file share named Migration on the file server named Fileserver that uses the encryption key Mykey: scanstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /o /config:config.xml /encrypt /key:"mykey"
/genmigxml: path to a file This option specifies that the ScanState command should use the document finder to create and export an .xml file that defines how to migrate all of the files on the computer on which the ScanState command is running.