aiotestking uk

70-680 Exam Questions - Online Test


70-680 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 5) 

You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point. 

You set the startup type of the NAP Agent service to Automatic on the computer. 

You need to complete the configuration of the computer as a NAP client. 

What should you do? 

A. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command. 

B. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the ipconfig command. 

C. From the NAP Client Configuration console, configure the user interface settings. 

D. From the NAP Client Configuration console, configure the Health Registration settings. 

Answer:

Q2. - (Topic 2) 

You have 15 computers that run Windows 7. 

You need to implement a monitoring solution that meets the following requirements: 

. Sends an e-mail notification when an application error is logged in the event log . Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 . Minimizes the administrative effort required to monitor applications 

What should you do? 

A. On all the computers, configure a custom view. Configure a custom task for the application error events. 

B. On a computer, configure a custom view to display the application errors. Configure a custom task for the application error events. 

C. On a central computer, configure an event subscription. On all of the computers, configure a custom task in the Forwarded Events log. 

D. On all the computers, configure an event subscription to a central computer. On the central computer, configure a custom task in the Forwarded Events log. 

Answer:

Explanation: 

Event ForwardingEvent forwarding enables you to transfer events that match specific criteria to an administrative (or collector) computer. This enables you to manage events centrally. A single event log on the collector computer holds important events from computers anywhere in your organization. You do not need to connect to the local event logs on individual computers. SubscriptionsIn a source-initiated subscription (sometimes termed a source computer–initiated subscription), the computer on which an event is generated (the source computer) sends the event to the collector computer. You would use a source-initiated subscription when you have a large number of source computers and you configure these computers through Group Policy. 

Q3. - (Topic 2) 

You have two computers on the same subnet. The computers have the IPv6 addresses shown in the following table. 

You need to test the connection to the IPv6 address from Computer1 to Computer2. 

Which command should you run? 

A. Ping -6 fe80::44df:1b68%12 

B. Ping -6 fe80::44df:1b68%10 

C. Ping -R fe80::44df:1b68%12 

D. Ping -R fe80::44df:1b68%10 

Answer:

Explanation: 

1073 40112 

If you are pinging from one host to another using link-local addresses, you also need to include your interface ID, for example ping fe80::39cd:4c93%10. 

The % character followed by a number after each IPv6 address is the interface ID. 

If you want to display the configuration of the IPv6 interfaces on the local computer, you can enter netsh interface ipv6 show address. 

Ping -6 

Force using IPv6. 

Q4. - (Topic 6) 

You administer computers that have Windows 7 and Internet Explorer 8 installed. 

You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. 

You need to ensure that any data about your browser session is not saved on the computer. 

What should you do? 

A. Disable Internet Connection Sharing. 

B. From the Local Group Policy, enable the InPrivate Filtering Threshold setting. 

C. From the Safety drop-down menu, open an InPrivate Browsing session. 

D. From Internet Options, on the Advanced tab, clear Enable DOM Storage. 

Answer:

Q5. - (Topic 3) 

You have a computer that runs Windows 7. The computer contains a folder named C:\data. 

You use Advanced Sharing to share C:\data by using the default share permissions. 

When a user tries to access the share over the network, he gets an "Access is Denied" error message. 

You need to ensure that the user can access the share. 

What should you do? 

A. Allow file and printer sharing through Windows Firewall. 

B. Change the network location from a Public network to a Home or Work network. 

C. From the Security settings of the folder, assign the user the Read NTFS permission. 

D. From the Advanced Sharing settings of the folder, assign the user the Read share permission. 

Answer:

Explanation: 

Advanced Security Settings Properties Page - Permissions Tab You can add additional resources, groups or users to have explicit NTFS permissions to access this object, or you can edit or remove the NTFS permissions granted to a resource, group, or user on the object. Inherited permissions are those that are propagated to an object from a parent object. Inherited permissions ease the task of managing permissions and ensure consistency of permissions among all objects within a given container. 

Q6. - (Topic 1) 

You plan to deploy Windows 7 to 100 computers on your corporate network. 

You install Windows 7 on a computer. 

You and need to prepare the computer to be imaged. 

What should you do before you create the image of the computer? 

A. At the command prompt, run the Dism command. 

B. At the command prompt, run the Sysprep command. 

C. Start the computer from the Windows Preinstallation Environment (Windows PE) and then run the Imagex command. 

D. Start the computer from the Windows Preinstallation Environment (Windows PE) and then run the Wpeutil command. 

Answer:

Explanation: 

Sysprep 

Sysprep is a tool designed for corporate system administrators, OEMs, and others who need to deploy the Windows. XP operating system on multiple computers. After performing the initial setup steps on a single system, you can run Sysprep to prepare the sample computer for cloning. Sysprep prepares the image for capture by cleaning up various user-specific and computer-specific settings, as well as log files. The reference installation now is complete and ready to be imaged.NOT ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack.NOT DismDeployment Image Servicing and Management (DISM) is a command-line tool used to service Windows. images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating systemNOT WpeutilThe Windows PE utility (Wpeutil) is a command-line tool that enables you to run various commands in a Windows PE session. For example, you can shut down or restart Windows PE, enable or disable a firewall, set language settings, and initialize a network. 

Q7. - (Topic 6) 

You are a network administrator for a global company that has Windows Server 2008 R2 servers and Windows 7 Enterprise computers. 

Management wants to decrease VPN costs by implementing DirectAccess for remote network access. 

They assign you to evaluate the current network infrastructure, which includes the following elements: 

Active Directory 

IPv6 network and applications 

Server for DirectAccess service 

You need to ensure that all critical infrastructure components are present. 

What should you add to the infrastructure? 

A. Windows Internet Name Service (WINS) server 

B. Public key infrastructure 

C. NAT-PT devices 

D. Windows Server 2012 

Answer:

Explanation: DirectAccess With Windows Server 2008 R2 requires: 

* Public key infrastructure (PKI) to issue computer certificates. 

* One or more DirectAccess servers running Windows Server 2008 R2 with two network adapters: one that is connected directly to the Internet, and a second that is connected to the intranet. 

* On the DirectAccess server, at least two consecutive, public IPv4 addresses assigned to the network adapter that is connected to the Internet. 

* DirectAccess clients running Windows 7 or Windows 8 "Enterprise" edition clients 

* At least one domain controller and Domain Name System (DNS) server running Windows Server 2008 SP2 or Windows Server 2008 R2. 

Note: DirectAccess, also known as Unified Remote Access, is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet. Unlike many traditional VPN connections, which must be initiated and terminated by explicit user action, DirectAccess connections are designed to connect automatically as soon as the computer connects to the Internet. DirectAccess was introduced in Windows Server 2008 R2, providing this service to Windows 7 and Windows 8 "Enterprise" edition clients. 

Q8. - (Topic 1) 

You have a reference computer that runs Windows 7. 

You plan to create an image of the computer and then deploy the image to 100 computers. 

You need to prepare the reference computer for imaging. 

What should you do before you create the image? 

A. Run Package Manager. 

B. Run the System Preparation tool. 

C. Install the User State Migration Tool. 

D. Install Windows Automated Installation Kit. 

Answer:

Explanation: 

Sysprep Sysprep is a tool designed for corporate system administrators, OEMs, and others who need to deploy the Windows. XP operating system on multiple computers. After performing the initial setup steps on a single system, you can run Sysprep to prepare the sample computer for cloning. Sysprep prepares the image for capture by cleaning up various user-specific and computer-specific settings, as well as log files. The reference installation now is complete and ready to be imaged. 

Q9. - (Topic 4) 

You attach a mobile device that runs Windows Mobile Professional 6.1 to a computer. 

You discover that Windows is unable to install the necessary device drivers for the mobile device. 

You need to ensure that you can synchronize files to the mobile device. 

What should you do? 

A. From WindowsMobilityCenter, click Sync settings. 

B. From Devices and Printers, right-click the device and click Troubleshoot. 

C. From SyncCenter, click Set up new sync partnerships. 

D. From Device Manager, click Scan for hardware changes. 

Answer:

Q10. - (Topic 2) 

You have a computer that runs Windows XP Service Pack 2 (SP2). 

You need to upgrade the operating system to Windows 7. 

You must achieve this goal in the minimum amount of time. 

What should you do? 

A. Upgrade to Windows Vista SP2. From the Windows 7 installation media, run Setup.exe and select the Upgrade option. 

B. Upgrade to Windows Vista SP2. From the Windows 7 installation media, run Setup.exe and select the Custom (advanced) option. 

C. Install Windows XP Service Pack 3 (SP3). Run Setup.exe from the Windows 7 installation media and select the Upgrade option. 

D. Install Windows XP Service Pack 3 (SP3). Run Setup.exe from the Windows 7 installation media and select the Custom (advanced) option. 

Answer: