aiotestking uk

70-680 Exam Questions - Online Test


70-680 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 6) 

You are a network administrator for a law firm that has Windows 7 computers as part of a domain. Users are not administrators of their own computers. 

A lawyer is working on a critical case and wants to use a Windows 7 laptop to access a computer in the office. The lawyer connects to the corporate VPN and receives a message that states that the lawyer does not have permission to use Remote Desktop to connect to the computer. 

You need to allow the lawyer to access the computer in the office. 

What should you do? 

A. Upgrade the Remote Desktop Client application on the users laptop. 

B. Add the user to the Remote Desktop Users group of the target computer. 

C. Select Allow connections from computers running any version of Remote Desktop on the Remote tab of the computer. 

D. Allow Remote Desktop through Windows Firewall. 

Answer:

Q2. - (Topic 3) 

You have a computer that runs Windows 7. 

Your network has a SSTP VPN server that uses a self-signed certificate. 

When you connect to the VPN server, you receive the following error message: "Your computer does not trust the issuing certification authority (CA) of the SSTP VPN servers certificate". 

You need to prevent the error message from appearing when you connect to the VPN server. 

What should you do? 

A. From the properties of the VPN connection, modify the dialing options. 

B. From the properties of the VPN connection, modify the data encryption settings. 

C. From Certificate Manager, import the servers certificate into the Personal store. 

D. From Certificate Manager, import the server's certificate into the Trusted Root Certification Authorities store. 

Answer:

Explanation: 

Certificate Manager A certificate manager can approve certificate enrollment and revocation requests, issue certificates, and manage certificates. This role can be configured by assigning a user or group the Issue and Manage Certificatespermission. When you assign this permission to a user or group, you can further refine their ability to manage certificates by group and by certificate template. For example, you might want to implement a restriction that they can only approve requests or revoke smart card logon certificates for users in a certain office or organizational unit that is the basis for a security group.Importing CertificatesYou may restore certificates and the corresponding private keys from a file. 

4. Right-click the certificate store you want to import, and click Install PFX on the context menu. 

5. The Certificate Import Wizard launches. Click Next. 

6. 

In the File name text box, type the name of the certificate file that you want to import. Alternatively, you can find the file by clicking Browse. 

7. Click Next. If the file specified is a Personal Information Exchange–PKCS #12 (*.pfx), you will be prompted for the password. Enter the password to import the file. Click Next. 

8. On the next page, select where you'd like to store the certificate. Click Next. 

9. The next wizard page contains summary information about the file that you are importing. Click Finish to import the file. The certificate(s) are now ready for use by the system. 

Q3. - (Topic 3) 

You administer 80 computers that run Windows 7. The computers have static IP addresses. 

You need to change the static IP addresses on all the computers by using a startup script. 

Which command should you include in the startup script? 

A. Ipconfig.exe 

B. Nbtstat.exe 

C. Netstat.exe 

D. Netsh.exe 

Answer:

Explanation: 

Netsh.exe Netsh.exe is a tool an administrator can use to configure and monitor Windows-based computers at a command prompt. With the Netsh.exe tool, you can direct the context commands you enter to the appropriate helper, and the helper then carries out the command. A helper is a Dynamic Link Library (.dll) file that extends the functionality of the Netsh.exe tool by providing configuration, monitoring, and support for one or more services, utilities, or protocols. The helper may also be used to extend other helpers. You can use the Netsh.exe tool to perform the following tasks: 

-Configure interfaces. 

-Configure routing protocols. 

-Configure filters. 

-Configure routes. 

-Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service. 

-Display the configuration of a currently running router on any computer. 

-Use the scripting feature to run a collection of commands in batch mode against a specified router. 

The syntax for the Netsh.exe tool is: netsh [-r router name] [-a AliasFile] [-c Context] [Command | -f ScriptFile] To display a list of subcontexts and commands that can be used in a context, type the context name followed by a space and a ? at the netsh> command prompt. For example, to display a list of subcontext and commands that can be used in the /routing context, type routing ? at the netsh> command prompt, and then press ENTER. 

Q4. - (Topic 1) 

You have a computer that runs Windows 7. Your company has a corporate intranet Web site. You open Windows Internet Explorer as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can access Web pages on both the Internet and the intranet. 

What should you do? 

A. From the Files menu, click Work Offline. 

B. From the Safety menu, click InPrivate Filtering. 

C. From the Security tab, add the intranet Web site to the Trusted sites zone. 

D. From the Safety menu, click InPrivate Browsing. 

Answer:

Explanation: 

Working Offline is activated On Internet Explorer's File menu is a "Work Offline" item that toggles Internet Explorer between online and offline modes of operation. 

(The question originally stated the Tools menu, maybe in a different version of IE this is the case, but for me and in the TechNet documentation it was under Files, so I'm choosing to believe Tools was a mistake and it should be Files, this has been amended in the question). InPrivate is turned on (does not prevent browsing the internet) InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, temporary Internet files, history, and other data. Toolbars and extensions are disabled by default. 

Q5. HOTSPOT - (Topic 4) 

A company's security policy prohibits employees from running any software from Fabrikam on computers running Windows 7 Enterprise. The applications are digitally signed by the publisher. 

You need to configure a single deny rule in AppLocker by applying a condition to restrict all of the applications from running, without affecting other programs. 

You have selected one of Fabrikam's applications as a reference. 

Which property should you choose? (To answer, select the appropriate setting or settings in the work area.) 

Answer:  

Q6. - (Topic 1) 

Your network contains 100 computers that run Windows XP. 

You need to identify which applications installed on all of the computers can run on 

Windows 7. 

You must achieve this goal by using the minimum amount of administrative effort. 

What should you install? 

A. Microsoft Application Compatibility Toolkit (ACT) 

B. Microsoft Assessment and Planning (MAP) Toolkit 

C. Microsoft Deployment Toolkit (MDT) 

D. Windows Automated Installation Kit (AIK) 

Answer:

Explanation: 

The Microsoft. Application Compatibility Toolkit (ACT) 5.6 enables software developers, independent software vendors (ISVs), and IT professionals who work in a corporate environment to determine, before deployment within the organization, whether their applications are compatible with a new version of the Windows. operating system. ACT also enables such individuals to determine how an update to the new version will affect their applications. 

You can use the ACT features to: 

-Verify your application's, device's, and computer's compatibility with a new version of the Windows operating system, including determining your risk assessment. 

-Verify a Windows update's compatibility, including determining your risk assessment. 

-Become involved in the ACT Community, including sharing your application assessment with other ACT users. 

-Test your applications for issues related to User Account Control (UAC) by using the Standard User Analyzer (SUA) tool. 

-Test your Web applications and Web sites for compatibility with new releases and security updates to Internet Explorer., by using the Internet Explorer Compatibility Test Tool. 

Q7. - (Topic 3) 

You have a computer that contains the folders shows in the following table. 

You accidentally delete the Data1 folder. 

You need to restore the contents of the Data1 folder. The solution must not overwrite any changes to the Data2 folder. 

What should you do? 

A. From Recovery, restore a system restore point. 

B. From the Previous Versions tab of the User1 folder, click Copy. 

C. From the Sharing tab of the User1 folder, modify the Caching settings. 

D. Start the computer and then press F8. Restore the Last Known Good Configuration. 

Answer:

Explanation: Copy from Previous Versions allows the data to be returned to a user detailed location. 

The Previous Versions tab, showing some previous versions of files 

NOT Recovery:Would affect Data2NOT Sharing:Modifying Caching settings wont help.NOT Last Known Good Configuration:Extreme overkill and would affect Data2 

Q8. - (Topic 3) 

You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. 

Computer1 has a custom application installed. You create a custom XML file named app1.xml that contains the migration settings for the application. 

You need to migrate the configuration and application data for the custom application from Computer1 to Computer2. 

What should you do? 

A. On Computer1, run Loadstate.exe /l:app1. On Computer2, run Scanstate.exe /l:app1.xml. 

B. On Computer1, run Scanstate.exe /i:app1.xml. On Computer2, run Loadstate.exe /i:app1.xml. 

C. On Computer1, run Loadstate.exe /keyfile:app1.xml. On Computer2, run Loadstate.exe /keyfile:app1.xml. 

D. On Computer1, run Scanstate.exe /genconfig:app1.xml. On Computer2, run Loadstate.exe /config:app1.xml. 

Answer:

Explanation: 

User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState. (include) /i:[Path\]FileName Specifies an .xml file that contains rules that define what user, application or system state to migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml, MigUser.xml and any custom .xml files that you create). Path can be either a relative or full path. If you do not specify the Path variable, then FileName must be located in the current directory. 

Q9. - (Topic 5) 

You have a computer that runs Windows 7. 

The computer's hard disks are configured as shown in the following table. 

You need to ensure that you can recover the operating system and all the files on the computer if hard disk 0 experiences hardware failure. 

What should you do? 

A. Create an Easy Transfer file on a network location. 

B. Use the Backup and Restore tool to create a system image on a network location. 

C. Create a system repair disk. 

D. Create an Easy Transfer file on an external hard disk. 

Answer:

Explanation: System Image in Windows 7 The new backup utilities in Windows 7 are actually pretty impressive and creating an image will be possible in all versions. Today we take a look at creating a backup image of your machine without the need for a third party utility like Ghost or True Image. 

You are just finished installing a fresh copy of Windows 7 on your computer and have it set up to your liking. One of the first things you should do now is create an image of the disc so in the event of a crash you will be able to restore it to its current state. An image is an exact copy of everything on the drive and will restore it back to its current state. It's probably best to create an image when everything is clean and organized on your system. This will make the image file smaller and allows you to restore the system with a smooth running set up. 

Q10. - (Topic 2) 

You have a computer that runs Windows Vista. 

You install Windows 7 on a new partition on the computer. 

You need to ensure that the computer always starts Windows Vista by default. 

What should you do? 

A. Run Bcdedit.exe and specify the /default parameter. 

B. Run Bcdedit.exe and specify the /bootems parameter. 

C. Create a boot.ini file in the root of the Windows 7 partition. 

D. Create a boot.ini file in the root of the Windows Vista partition. 

Answer:

Explanation: 

The Bcdedit.exe utility allows you to manage boot configuration./default - Sets the default entry that the boot manager willl use./bootems - Enable or disables Emergency Management Services for a boot application.NOT boot.ini:Windows (specifically Ntldr) uses