★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-680-dumps.html
Q141. DRAG DROP - (Topic 6)
You install Windows 7 Enterprise 64-bit on a client computer and create a reference image.
The image file is stored on your computer and is named C:\Images\StandardDesktop.wim. You discover that a target computer deployed from the reference image is unable to automatically install drivers for some scanners and printers.
The required drivers are located in the C:\Drivers folder on your computer.
You need to include third-party signed drivers into the reference image.
What should you do? (To answer, move the appropriate commands from the list of commands to the answer area and arrange them in the correct order.)
Answer:
Q142. - (Topic 5)
You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU.
You need to analyze the performance of the computer to meet the following requirements:
. Include the CPU, Memory, and Disk subsystems.
. Collect information in a report.
What should you do?
A. Run powercfg.exe.
B. Run the Windows Experience Index.
C. Configure Event Viewer subscriptions.
D. Open Task Manager.
E. Open System Properties, and configure performance settings.
F. Open System Properties, and configure environment variables.
G. Open System Properties, and configure user profiles settings.
H. Open System Properties, and configure the page file settings.
I. Open Performance Monitor, and configure a Data Collector Set.
J. Open Performance Monitor, and customize the System Monitor view.
Answer: I
Q143. - (Topic 5)
Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers are members of an Active Directory domain. You use a computer named Client1.
You plan to collect events from Client1 on Server1 by using HTTPS. On Server1, you start and configure the Windows Event Collector service. On Client1, you start the Windows Remote Management service.
You discover that no events are being collected.
You need to ensure that events are forwarded from Client1 to Server1.
What should you do?
A. on Client1, create an outbound Rule to allow port 5986 for the Domain connection type.
B. on Client1, create an inbound Rule to allow port 5986 for the Public connection type.
C. on Server1, create a Windows Event Collector firewall exception for the Domain connection type.
D. on Client1, create a Windows Remote Management firewall exception for the Domain connection type.
Answer: D
Q144. - (Topic 5)
You administer a computer that has Windows 7 Enterprise installed.
The computer reboots unexpectedly. You suspect that an unsigned driver causes the reboots.
You need to view a list of all installed device drivers that contain information about the digital signature of the device driver.
Which should you do?
A. Run the driverquery.exe /SI command.
B. Open the System Protection configuration for drive C.
C. Open Device Manager, show hidden devices, and sort all devices by type.
D. Run sigverif.exe and start the verification process of the device drivers. Then, review the generated log file.
Answer: A
Q145. - (Topic 1)
You have a computer that runs Windows 7.
Multiple users log on to the computer.
You need to deny one user access to removable devices on the computer. All other users must have access to the removable drives.
What should you do?
A. From the local Group Policy, modify an application control policy.
B. From Control Panel, modify the BitLocker Drive Encryption settings.
C. From Device Manager, modify the settings of all removable devices.
D. From the local Group Policy, modify a removable storage access policy.
Answer: D
Q146. HOTSPOT - (Topic 4)
You are running windows 7 on a portable computer. A custom power plan named "On The Move" is optimized for battery life.
The computer enters sleep mode when the portable computer is closed.
You need to change a setting so that when you close the portable computer, nothing happens.
Which setting should you change? (To answer, select the appropriate setting in the work area.)
Answer:
Q147. HOTSPOT - (Topic 4)
You are performing an audit of the installed updates on a computer running Windows 7 Enterprise.
You need to find a list of the installed updates on the computer.
Which settings categories should you choose? (To answer, select the appropriate settings in the work area.)
Answer:
Q148. - (Topic 2)
You have two computers on the same subnet. The computers have the IPv6 addresses shown in the following table.
You need to test the connection to the IPv6 address from Computer1 to Computer2.
Which command should you run?
A. Ping -6 fe80::44df:1b68%12
B. Ping -6 fe80::44df:1b68%10
C. Ping -R fe80::44df:1b68%12
D. Ping -R fe80::44df:1b68%10
Answer: B
Explanation:
1073 40112
If you are pinging from one host to another using link-local addresses, you also need to include your interface ID, for example ping fe80::39cd:4c93%10.
The % character followed by a number after each IPv6 address is the interface ID.
If you want to display the configuration of the IPv6 interfaces on the local computer, you can enter netsh interface ipv6 show address.
Ping -6
Force using IPv6.
Q149. - (Topic 6)
Your laptop has a 400 GB drive and currently reserves, by default, 2% (8 GB) for shadow copies.
You need to reserve more space for previous versions of files.
What should you do?
A. From System Properties, System Protection, expand the Max usage to 20 GB.
B. From System Properties, System Protection, turn off system protection.
C. From Disk Properties, change the Quota Settings from 8 GB to 20 GB.
D. From System Properties, System Protection, set it to only restore previous versions of files.
Answer: A
Explanation: Control Panel->System and Security. >System [Properties]->System Protection->Configure
Q150. - (Topic 2)
You have a computer that runs Windows 7. The computer is in a workgroup.
You need to ensure that you can decrypt Encrypting File System (EFS) files on the computer if you forget your password.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. From Credential Manager, select Back up vault.
B. From User Accounts, select Create a password reset disk.
C. From User Accounts, select Manage your file encryption certificates.
D. From Authorization Manager, modify the Authorization Manager options.
Answer: B,C
Explanation:
Password reset disks It is not unusual for users to forget their passwords to local user accounts from time to time, especially when they use strong passwords. Before the advent of password reset disks, the only way for administrators to restore a forgotten local user account password was to manually reset the user's password. In the process, the following information was lost: E-mail that was encrypted with the user's public key Internet passwords that were saved on the computer Files that the user had encrypted Password reset disks offer another solution to the problem of a forgotten password for a local user account. If users create password reset disks for their local accounts before they forget their passwords, they can reset the passwords without losing valuable data that was lost previously with administrative password resets. When you create a password reset disk, a public key and private key pair are created. The private key is stored on a disk: the password reset disk. The public key encrypts the local user account password. If users forget their passwords, they can insert the password reset disk, which contains the private key, and decrypt the current password. The Forgotten Password Wizard prompts the user for a new password, which is then encrypted with the public key. Data is not lost because, basically, the user is simply changing a password. It is essential that password reset disks be stored in secured locations.Back up your Encryption Certificate
1. Open User Accounts by clicking the Start button, clicking Control Panel, clicking User Accounts and Family Safety (or clicking User Accounts, if you are connected to a network domain), and then clicking User Accounts.
2. In the left pane, click Manage your file encryption certificates.
3. In the Encrypting File System wizard, click Next.
4. Click Use this certificate, and then click Next. If you need more details to identify the certificate that is listed, click View certificate. If you want to choose a different certificate, click Select certificate, and then click the certificate
you want to back up.
5. Click Back up the certificate and key now.
6. Type or navigate to the location where you want to store the backup. We recommend that you store the backup on removable media such as a disc or USB flash drive.
7. Type and then confirm a password for the backup file, and then click Next. We recommend that you protect the backup file with a strong password.
8. Select the I'll update my encrypted files later check box, and then click Next.