★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-680-dumps.html


Q71. - (Topic 4) 

Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers are members of an Active Directory domain. You use a computer named Client1. 

You plan to collect events from Client1 on Server1 by using HTTPS. On Server1, you start and configure the Windows Event Collector service. ON Client1, you start the Windows Remote Management Service. 

You discover that no events are being collected. 

You need to ensure that events are forwarded from Client1 to Server1. 

What should you do? 

A. On Client1, create an inbound rule to allow port 5986 for the Public connection type. 

B. On Server1, create a Windows Event Collector firewall exception for the connection type. 

C. On Client1, create an outbound Rule to allow port 443 for the Domain connection type. 

D. ON Client1, create an inbound rule to allow port 5986 for the Domain connection type. 

Answer:


Q72. - (Topic 2) 

You have a computer that runs Windows 7 and Windows Internet Explorer 8. You discover that your browsing history is sent to a third-party advertising content provider. You need to prevent the browsing history from being sent only to that specific content provider. What should you do? 

A. Enable InPrivate Filtering and click Automatically block. 

B. Add the Web site for the content provider to the Restricted sites zone. 

C. Enable InPrivate Filtering and select the Choose content to block or allow option. 

D. View the privacy policy for the Web site and enable the Never allow this site to use cookies option. 

Answer:


Q73. - (Topic 3) 

You are the administrator of a computer named Computer1 that runs Windows 7. Several users share Computer1. The users plan to encrypt files on the computer. 

You need to ensure that you can access all encrypted files on the computer. 

What should you do first? 

A. At a command prompt, run Cipher.exe. 

B. At a command prompt, run Certutil.exe. 

C. From the local computer policy, modify the User Rights Assignment. 

D. From User Accounts, run the Manage your file encryption certificates wizard. 

Answer:

Explanation: 

Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed. When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software. 

If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. 

/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521. 


Q74. - (Topic 4) 

A virtual hard disk (VHD) contains a Windows 7 Enterprise installation. 

You need to mount the VHD on a client computer. 

What should you do? 

A. Run the Dism command with the /Mount-Wimoption. 

B. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes. 

C. Run the Dism command with the /Add-Package option. 

D. Run the PEImg/Prepcommand. 

E. Add a boot image in WDS. 

F. Run the Dism command with the /Add-Driver option. 

G. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to True. 

H. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to No. 

I. Run the BCDEdit command. 

J. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to False. 

K. Run the Start/w ocsetup command. 

L. Run the imageX command with the /Mount parameter. 

M. Create a capture image in WDS. 

N. Run the DiskPart command and the Attach command option. 

Answer:


Q75. - (Topic 5) 

You have a computer that runs Windows 7. 

Your company has a corporate intranet Web site. 

You open Windows Internet Explorer as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can access Web pages on both the Internet and the intranet. 

From the Tools menu, what should you do? 

A. Click ActiveX Filtering. 

B. Click Work Offline. 

C. Click Compatibility View. 

D. Point to SmartScreen Filter and then click Turn off SmartScreen Filter. 

Answer:


Q76. DRAG DROP - (Topic 5) 

You administer portable computers that have Windows 7 Professional installed. All computers have wireless network interface cards (Wi-Fi). You plug a new wireless wide area network (WWAN) device to your computer. The WWAN device that connects to a 3G network provides Internet access. 

Other portable computers equipped only with Wi-Fi cannot access Internet resources. 

You need to configure Internet access for the portable computers by using a wireless ad-hoc network configured on your computer. 

What should you do? (To answer, drag the appropriate target computer or computers to the correct configuration step or steps in the answer area. An answer choice can be used once, more than once, or not at all.) 

Answer: 


Q77. - (Topic 6) 

Your company has Windows 7 Enterprise computers that do not have a Trusted Platform Module (TPM) installed. 

You need to enable BitLocker drive encryption on the operating system drives. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Create a USB startup key. 

B. Configure the Require additional authentication at startup group policy setting. 

C. Create a network key location. 

D. Configure the Allow enhanced PINs for startup group policy setting. 

Answer: A,D 

Explanation: Ref: http://technet.microsoft.com/en-us/library/ee424319(v=WS.10).aspx 


Q78. - (Topic 3) 

Your network contains a Network Policy and Access Services server named Server1. 

All certificates in the organization are issued by an enterprise certification authority (CA) named Server2. 

You have a standalone computer named Computer1 that runs Windows 7. Computer1 has a VPN connection that connects to Server1 by using SSTP. 

You attempt to establish the VPN connection to Server1 and receive the following error message: "A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider." 

You need to ensure that you can successfully establish the VPN connection to Server1. 

What should you do on Computer1? 

A. Import the root certificate to the user's Trusted Publishers store. 

B. Import the root certificate to the computer's Trusted Root Certification Authorities store. 

C. Import the server certificate of Server1 to the user s Trusted Root Certification Authorities store. 

D. Import the server certificate of Server1 to the computer s Trusted Root Certification Authorities store. 

Answer:

Explanation: A certificate chain establishes a "chain of trust" from a certification authority (CA) to an individual certificate. Trust occurs if a valid certificate from that CA can be found in your root certificate directory. As long as you trust the CA, you will automatically trust any other certificates signed by that CA. 


Q79. - (Topic 2) 

You need to increase the size of a paging file. 

What should you do? 

A. From Disk Management, shrink the boot partition. 

B. From Disk Management, shrink the system partition. 

C. From System, modify the Advanced system settings. 

D. From System, modify the System protection settings. 

Answer:

Explanation: 

1. Click Start, right-click My Computer, and then click Properties. 

2. In the System Properties dialog box, click the Advanced tab. 

3. In the Performance pane, click Settings. 

4. In the Performance Options dialog box, click the Advanced tab. 

5. In the Virtual memory pane, click Change. 

6. Change the Initial size value and the Maximum size value to a higher value, click Set, and then click OK. 

7. Click OK to close the Performance Options dialog box, and then click OK to close the System Properties dialog box. 

Adjusting Paging File SizeFor virtual-memory support, Windows 2000 creates one paging file called Pagefile.sys on the disk or volume on which the operating system is installed. The default size is equal to 1.5 times the amount of physical memory. A small paging file limits what can be stored and might exhaust your virtual memory for applications. If you are short on RAM, more paging occurs, which generates extra activity for your disks and slows response times for the system.Expand the Default SizeExpanding the default size of the paging file can increase performance if applications are consuming virtual memory and the full capacity of the existing file is being used. To determine how large your paging file should be based on your system workload, monitor the Process (_Total)\Page File Bytes counter. This indicates, in bytes, how much of the paging file is being used. A large paging file uses disk storage space, so do not create a large paging file on a disk that is very active (for example, one that services heavy application or network activity) or one that has limited space. Change the file size gradually and test performance until you find the optimal balance between paging file and disk space usage. The operating system requires a minimum of 5 MB of free space on a disk. For more information, see "Examining and Tuning Disk Performance" in this book. Before increasing the file size, make sure you have adequate disk space, particularly on your servers. 


Q80. DRAG DROP - (Topic 6) 

You capture a Windows Image (.wim) file from a reference computer. 

You want to use Windows Deployment Services (WDS) in an unattended mode to deploy the image f\\e to target desktops. 

You need to encrypt an administrator account password in the answer file used for the image deployment. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: