aiotestking uk

70-680 Exam Questions - Online Test


70-680 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 5) 

You have a computer that runs a 32-bit version of Windows 7 Home Premium. The computer has a single partition on a single hard disk drive. 

You want to test a 64-bit version of Windows 7 Ultimate. You configure the computer for a dual boot with previously installed Windows 7 Home Premium. 

You need to configure the computer to support the dual boot. 

What should you do? 

A. Start Windows 7 Home Premium. Create a Virtual Hard Disk (VHD) file to start Windows 7 Ultimate. 

B. Attach Windows 7 Ultimate media as an ISO image into Windows 7 Home Premium. 

C. Start Windows 7 Home Premium. Create and mount a new Windows Imaging Format (WIM) file with Windows 7 Ultimate files. 

D. Install Virtual PC into Windows 7 Home Premium. 

Answer:

Explanation: The Virtual Hard Disk (VHD) format is a publicly-available image format specification that allows encapsulation of the hard disk into an individual file for use by the operating system as a virtual disk in all the same ways physical hard disks are used. These virtual disks are capable of hosting native file systems (NTFS, FAT, exFAT, and UDFS) while supporting standard disk and file operations. VHD API support allows management of the virtual disks. Virtual disks created with the VHD API can function as boot disks. 

Q2. - (Topic 3) 

You have three computers that run Windows 7. 

You use Windows PowerShell to perform remote administration tasks on all three computers. 

You need to remotely administer all three computers by using PowerShell. 

Which PowerShell cmdlet should you use? 

A. Enable-PSRemoting 

B. Enable-PSSessionConfiguration 

C. New-PSDrive 

D. New-PSSession 

Answer:

Explanation: 

New-PSSessionCreates a persistent connection to a local or remote computer. The New-PSSession cmdlet creates a Windows PowerShell session (PSSession) on a local or remote computer. When you create a PSSession, Windows PowerShell establishes a persistent connection to the remote computer. Use a PSSession to run multiple commands that share data, such as a function or the value of a variable. To run commands in a PSSession, use the Invoke-Command cmdlet. To use the PSSession to interact directly with a remote computer, use the Enter-PSSession cmdlet. You can run commands on a remote computer without creating a PSSession by using the ComputerName parameters of Enter-PSSession or Invoke-Command. When you use the ComputerName parameter, Windows PowerShell creates a temporary connection that is used for the interactive session or for a single command and is then closed. 

Q3. - (Topic 3) 

You need to provide an administrator the ability to view and interact with your current logon session. 

What should you do? 

A. At the command prompt, run Psr.exe. 

B. At the command prompt, run Winrm.exe quickconfig. 

C. From the Start menu, open Remote Desktop Connection. 

D. From the Start menu, open Windows Remote Assistance. 

Answer:

Explanation: 

Remote Assistance Both Remote Assistance and Remote Desktop allow the user at the management computer to see the desktop and applications that are present on the remote computer. The difference between Windows Remote Assistance and Remote Desktop is that a user is logged on to the remote computer and initiates the remote assistance session, whereas a Remote Desktop session is initiated on the management computer. Remote Assistance is a support tool used by help-desk staff to allow them to view the screen of the person to whom they are providing assistance. Remote Assistance reduces the need for nontechnical users to accurately describe the problem that they are having with their computers because support personnel can see the desktop directly. Unlike the version of Remote Assistance that shipped with Windows XP, the version of Remote Assistance that is included with Windows 7 does not include a voice client. If you are going to talk to the person whom you are helping using Remote Assistance, you are going to have to use another method, such as the telephone. 

Q4. DRAG DROP - (Topic 6) 

A company has an Active Directory forest which is shown in the following graphic. 

The company's client computers run Windows 7. You deploy BitLocker Drive Encryption on all the client computers. 

You need to configure BitLocker Drive Encryption to back up recovery information to Active Directory for BitLocker protected drives and the Trusted Platform Module (TPM). 

Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer:  

Q5. - (Topic 1) 

You have a stand-alone computer that runs Windows 7. 

You open Windows Update as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can manually change the Windows Update settings on the computer. 

What should you do? 

A. Log on to Windows 7 as member of the Administrators group. 

B. From the local Group Policy, modify the Windows Update settings. 

C. Right-click Windows Update and select Run as administrator. 

D. Right-click the command prompt, select Run as administrator, and then run Wuapp.exe. 

Answer:

Explanation: 

Configuring Automatic Updates by using local Group Policy 

1. Click Start, and then click Run. 

2. Type gpedit.msc, and then click OK. 

3. Expand Computer Configuration. 

4. Right-click Administrative Templates, and then click Add/Remove Templates. 

5. Click Add, click Wuau.adm in the Windows\Inf folder, and then click Open. 

6. Click Close. 

7. Under Computer Configuration, expand Administrative Templates, expand Windows Components, and then expand Windows Update. 

Q6. - (Topic 3) 

Your network contains a Network Policy and Access Services server named Server1. 

All certificates in the organization are issued by an enterprise certification authority (CA) named Server2. 

You have a standalone computer named Computer1 that runs Windows 7. Computer1 has a VPN connection that connects to Server1 by using SSTP. 

You attempt to establish the VPN connection to Server1 and receive the following error message: "A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider." 

You need to ensure that you can successfully establish the VPN connection to Server1. 

What should you do on Computer1? 

A. Import the root certificate to the user's Trusted Publishers store. 

B. Import the root certificate to the computer's Trusted Root Certification Authorities store. 

C. Import the server certificate of Server1 to the user s Trusted Root Certification Authorities store. 

D. Import the server certificate of Server1 to the computer s Trusted Root Certification Authorities store. 

Answer:

Explanation: A certificate chain establishes a "chain of trust" from a certification authority (CA) to an individual certificate. Trust occurs if a valid certificate from that CA can be found in your root certificate directory. As long as you trust the CA, you will automatically trust any other certificates signed by that CA. 

Q7. - (Topic 3) 

You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. 

You plan to use User State Migration Tool (USMT) 4.0 to migrate user profiles and data from Computer1 to Computer2. 

You need to prevent some system settings from being migrated. You must achieve this goal by using the minimum amount of administrative effort. 

Which file should you modify? 

A. config.xml 

B. migapp.xml 

C. migdocs.xml 

D. miguser.xml 

Answer:

Explanation: 

Config.xml This file is different from the other migration files as it is used to exclude features from the migration. You can create and modify the Config.xml file using ScanState.exe with the /genconfig option.NOT MigDocs.xmlThis file contains information on the location of user documents.NOT MigUser.xmlMigUser.xml This file contains rules about user profiles and user data. The default settings for this file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu, Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc, .dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*, .pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, .accdb, .mdb, .pub, .xla, .xlb and .xls. The asterisk ( *) represents zero or more characters.NOT MigApp.xmlThis file contains rules about migrating application settings. These include Accessibility settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service (RAS) connection phone book files, regional options, remote access, screen-saver settings, taskbar settings, and wallpaper settings.User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState. 

Q8. - (Topic 1) 

Which of the following is true of Windows 7? 

A. MailCentral is included as the new default mail client with Windows 7. 

B. Outlook Express is included with Windows 7. 

C. Microsoft Outlook is included with Windows 7. 

D. There is no preinstalled mail client included with Windows 7. 

Answer:

Q9. - (Topic 3) 

You have a computer that runs Windows 7. 

You need to prevent ActiveX controls from running in Windows Internet Explorer. 

Which Internet Explorer settings should you modify? 

A. Content 

B. Encoding 

C. Safety 

D. Security 

Answer:

Explanation: 

Security You can use the slider to adjust the security level assigned to a zone. You can also configure whether a zone uses Protected Mode and Configure Custom Zone settings. Protected Mode is a technology that forces Internet Explorer to run as a low-integrity process. The security architecture of Windows 7 means that processes that are assigned lower integrities are unable to interact directly with objects that are assigned higher integrities. This means that any malware that might compromise the browser is blocked from causing damage to Windows 7 because it is unable to cause problems as a low-integrity process. The design of Windows 7 allows the processes that run in each tab to be separate from each other. This means that a tab that has a Web site in Protected Mode can run alongside a tab that has a site that is not running in Protected Mode. Sites that you do not trust, such as those on the Internet or within the Restricted Sites zone, are run in Protected Mode. 

The three default security levels are Medium, Medium-High, and High. Each level is more restrictive, with High being the most restrictive. You can use the Custom Level button to configure a custom level of security for a zone. Items that can be configured include ActiveX control behavior, scripting, and user authentication settings. Unless your organization has unusual security requirements, the default security levels are usually sufficient. 

Q10. - (Topic 5) 

You have a computer that runs Windows 7. The computer is a member of a workgroup. 

You use Encrypting File System (EFS) to protect your local files. 

You need to ensure that you can decrypt EFS files on the computer if you forget your password. 

What should you do? 

A. From Authorization Manager, modify the Authorization Manager options. 

B. Run the cipher.exe /adduser /user:administrator command. 

C. From User Accounts, select Manage your file encryption certificates. 

D. From Credential Manager, select Back up vault. 

Answer:

Explanation: Make sure you have a backup of the appropriate encryption certificates