Free Providing CertBus Microsoft 70-680 VCE Exam Study Guides With New Update Exam Questions
There is no need to worry when you are suffering the difficult time in the Windows 7 70-680 exam preparation, CertBus will assist you to pass the Windows 7 70-680 exam with latest update Windows 7 70-680 TS:Windows 7,Configuring PDF and VCE dumps. CertBus has the most comprehensive Microsoft exam preparation materials, covering each and every aspect of Windows 7 70-680 TS:Windows 7,Configuring exam curriculum. We ensure you 100% success in Windows 7 70-680 exam.
We CertBus has our own expert team. They selected and published the latest 70-680 preparation materials from Microsoft Official Exam-Center: http://www.certgod.com/70-680.html
QUESTION NO:27
You have a reference computer that runs Windows 7.
You plan to deploy an image of the computer. You create an answer file named answer.xml.
You need to ensure that the installation applies the answer file after you deploy the image.
Which command should you run before you capture the image?
A. Imagex.exe /append answer.xml /check
B. Imagex.exe /mount answer.xml /verify
C. Sysprep.exe /reboot /audit /unattend:answer.xml
D. Sysprep.exe /generalize /oobe /unattend:answer.xml
Answer: D
Explanation:
To prepare the reference computer for the user, you use the Sysprep utility with the /generalize
option to remove hardware-specific information from the Windows installation and the /oobe
option to configure the computer to boot to Windows Welcome upon the next restart. Open an
elevated command prompt on the reference computer and run the following command:
c:windowssystem32sysprepsysprep.exe /oobe /generalize /shutdown Sysprep prepares the
image for capture by cleaning up various user-specific and computer-specific settings, as well as log
files. The reference installation now is complete and ready to be imaged.
QUESTION NO:4
You work in an international company which is named Wiikigo. Before entering this company, you
have two years of experience in the IT field, as well as experience implementing and administering
any Windows client operating system in a networked environment.
You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and
configuring Hardware and Applications and son on.
You have a workgroup which contains five computers. Windows 7 is run by the computers. A
computer named C01 has video and audio files.
You have to share C01s video and audio files on the network.
What should you do? (Choose more than one)
A. Connect a removable drive and enable BitLocker To Go.
B. A HomeGroup should be created.
C. The files should be moved to a Media Library.
D. All BranchCache rules should be enabled in Windows Firewall.
Answer: B, C
QUESTION NO:29
You have a computer that runs Windows 7. Your company has a corporate intranet Web site. You
open Windows Internet Explorer as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can access Web pages on both the Internet and the intranet.
What should you do?
A. From the Files menu, click Work Offline.
B. From the Safety menu, click InPrivate Filtering.
C. From the Security tab, add the intranet Web site to the Trusted sites zone.
D. From the Safety menu, click InPrivate Browsing.
Answer: A
Explanation:
Working Offline is activated
On Internet Explorer
QUESTION NO:11
Your company has a main office and a branch office. The relevant portion of the network is
configured as shown in the exhibit. (Click the Exhibit button.)
In the branch office, you deploy a new computer named Computer1 that runs Windows 7.
You need to assign an IP address to Computer1.
Which IP address should you use?
A. 192.168.2.30
B. 192.168.2.40
C. 192.168.2.63
D. 192.168.2.65
Answer: B
Explanation:
Internal IP Adress of router is 192.168.2.62/27
Leaves 5 bits for range = 32 addresses (including the 2 reserved addresses)
Subnet Mask = 255.255.255.224
QUESTION NO:14
You have a computer that runs Windows Vista. The computer contains a custom application.
You need to export the user state and the settings of the custom application.
What should you do?
A. Run Loadstate.exe and specify the /config parameter.
B. Run Scanstate.exe and specify the /genconfig parameter.
C. Modify the miguser.xml file. Run Loadstate.exe and specify the /ui parameter.
D. Modify the migapp.xml file. Run Scanstate.exe and specify the /i parameter.
Answer: D
Explanation:
MigApp.xml This file contains rules about migrating application settings. These include Accessibility
settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database
Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard
settings, phone and modem options, Remote Access Service (RAS) connection phone book files,
regional options, remote access, screensaver settings, taskbar settings, and wallpaper settings.
(Include) /i:[Path]FileName
Specifies an .xml file that contains rules that define what user, application or system state to
migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml,
MigUser.xml and any custom .xml files that you create). Path can be either a relative or full path. If
you do not specify the Path variable, then FileName must be located in the current directory.
NOT MigUser.xml
MigUser.xml This file contains rules about user profiles and user data. The default settings for this
file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu,
Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop
files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that
ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc,
.dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*,
.pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, .accdb, .mdb, .pub, .xla, .xlb
and .xls. The asterisk ( *) represents zero or more characters.
QUESTION NO:12
You work in an international company which is named Wiikigo. Before entering this company, you
have two years of experience in the IT field, as well as experience implementing and administering
any Windows client operating system in a networked environment. You are professional in installing,
upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and
Applications and son on. You are in charge of a computer that runs Windows Vista. You have
Windows 7 installed on a new partition on the computer. You have to make sure that the computer
always starts Windows Vista by default. So what action should you perform to make sure of this?
A. In order to make sure that the computer always starts Windows Vista by default, a boot.ini file
should be created in the root of the Windows 7 partition.
B. In order to make sure that the computer always starts Windows Vista by default, a boot.ini file
should be created in the root of the Windows Vista partition.
C. In order to make sure that the computer always starts Windows Vista by default, Bcdedit.exe
should be run and the /default parameter should be specified.
D. In order to make sure that the computer always starts Windows Vista by default, Bcdedit.exe
should be run and the /bootems parameter should be specified.
Answer: C
QUESTION NO:7
Your network consists of one Active Directory domain. You have two computers named Computer1
and Computer2 that run Windows 7. Both computers are members of the domain.
From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the
domain.
You need to ensure that you can recover all EFS encrypted files from Computer2.
What should you do?
A. On Computer1, back up %systemroot%DigitalLocker. On Computer2, restore
%systemroot%DigitalLocker.
B. On Computer1, export the data recovery agent certificate. On Computer2, import the data
recovery agent certificate.
C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run
Secedit.exe and specify the /import parameter.
D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run
Cipher.exe and specify the /adduser parameter.
Answer: B
Explanation:
You can import the recovery agent to another computer running Windows 7 if you want to recover
files encrypted on the first computer. You can also recover files on another computer running
Windows 7 if you have exported the EFS keys from the original computer and imported them on the
new computer. You can use the Certificates console to import and export EFS keys.
NOT Secedit.exe:
You can use both the Local Group Policy Editor and the Local Security Policy console to import and
export security-related Group Policy settings. You can use this import and export functionality to
apply the same security settings to stand-alone computers that are not part of a domain
environment. Exported security files are written in Security Template .inf format. As well as using
Local Group Policy Editor and the Local Security Policy console to import policies that are stored in
.inf format, you can apply them using the Secedit.exe command-line utility.
NOT Cipher.exe /removeuser /adduser.
NOT DigitalLocker.
QUESTION NO:22
You work in an international company which is named Wiikigo. Before entering this company, you
have two years of experience in the IT field, as well as experience implementing and administering
any Windows client operating system in a networked environment. You are professional in installing,
upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and
Applications and son on. You use a computer that runs Windows 7.
Now your company assigns a task to you. You are asked to prevent users from copying unencrypted
files to removable drives. What action should you perform?
A. The Trusted Platform Module (TPM) settings should be modified from a local Group Policy.
B. TPM should be initialized from the Trusted Platform Module (TPM) snap-in.
C. The BitLocker Drive Encryption settings should be modified from Control Panel.
D. The BitLocker Drive Encryption settings should be modified from a local Group Policy.
Answer: D
QUESTION NO:23
Your network has a main office and a branch office. The branch office has computers that run
Windows 7. A network administrator enables BranchCache in the main office. You run Netsh on your
computer as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that other computers in the branch office can access the cached content on your
computer.
What should you do?
A. Turn on Internet Information Services (IIS).
B. Configure the computer as a hosted cache client.
C. Configure the BranchCache service to start automatically.
D. Modify the Windows Firewall with Advanced Security rules.
Answer: D
Explanation:
Distributed Cache Mode
Distributed Cache mode uses peer caching to host the branch office cache among clients running
Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts
part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves
content over the WAN, it places that content into its own cache. If another BranchCache client
running Windows 7 attempts to access the same content, it is able to access that content directly
from the first client rather than having to retrieve it over the WAN link. When it accesses the file
from its peer, it also copies that file into its own cache.
When you configure BranchCache in distributed cache mode, BranchCache client computers use the
Hypertext Transfer Protocol (HTTP) for data transfer with other client computers. BranchCache client
computers also use the Web Services Dynamic Discovery (WS-Discovery) protocol when they
attempt to discover content on client cache servers. You can use this procedure to configure client
firewall exceptions to allow incoming HTTP and WS-Discovery traffic on client computers that are
configured for distributed cache mode.
You must select Allow the connection for the BranchCache client to be able to send traffic on this
port.
QUESTION NO:6
You have a computer that runs Windows 7. You open the Disk Management snap-in as shown in the
exhibit. (Click the Exhibit button.)?
You need to ensure that you can create a new partition on Disk 0.
What should you do?
A. Shrink volume C
B. Compress volume C
C. Convert Disk 0 into a dynamic disk.
D. Create and initialize a Virtual Hard Disk (VHD).
Answer: A
Explanation:
Needs to have sufficient space in order to create a new partition. Hence shrinking the C: partition
will create additional space that can be used for a new partition.
CertBus exam braindumps are pass guaranteed. We guarantee your pass for the 70-680 exam successfully with our Microsoft materials. CertBus TS:Windows 7,Configuring exam PDF and VCE are the latest and most accurate. We have the best Microsoft in our team to make sure CertBus TS:Windows 7,Configuring exam questions and answers are the most valid. CertBus exam TS:Windows 7,Configuring exam dumps will help you to be the Microsoft specialist, clear your 70-680 exam and get the final success.
70-680 Latest questions and answers on Google Drive(100% Free Download): https://drive.google.com/file/d/0B_3QX8HGRR1mdmMyRGpXb1JaYlE/view?usp=sharing
70-680 Microsoft exam dumps (100% Pass Guaranteed) from CertBus: http://www.certgod.com/70-680.html [100% Exam Pass Guaranteed]
Why select/choose CertBus?
Millions of interested professionals can touch the destination of success in exams by certgod.com. products which would be available, affordable, updated and of really best quality to overcome the difficulties of any course outlines. Questions and Answers material is updated in highly outclass manner on regular basis and material is released periodically and is available in testing centers with whom we are maintaining our relationship to get latest material.