aiotestking uk

70-680 Exam Questions - Online Test


70-680 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 4) 

You have a portable computer that runs Windows 7. Windows Backup is configured to run every day at 15:00. 

You need to prevent backups from automatically running when the computer is running on the battery. 

What should you do? 

A. From Backup and Restore, click Change settings. 

B. From Task Scheduler, modify the Automatic Backup task. 

C. From Power Options, modify the settings of the current power plan. 

D. From the local computer policy, modify the power management settings. 

Answer:

Explanation: To set power management options for a scheduled task 

-Open Task Scheduler. 

-Right-click the task for which you want to set power management options, and then click Properties. 

-On the Settings tab, under Power Management, do one or more of the following: 

-To conserve the battery power of your computer, select the Don't start the task if the computer is running on batteries check box. 

-To stop the task if the computer starts running on battery power, select the Stop the task if battery mode begins check box. 

-To wake your computer from hibernation or standby to run a task, select the Wake the computer to run this task check box. 

Task Scheduler 

With Scheduled Tasks, you can schedule any script, program, or document to run at a time that is most convenient for you. Scheduled Tasks starts every time that you start Windows and runs in the background, and it starts each task that you schedule at the time that you specify when you create the task. 

Q2. - (Topic 4) 

You plan to deploy Windows 7 images. 

You need to ensure that you can deploy images using the WindowsPreinstallation Environment (Windows PE). 

What would you add to the Window PE Image? 

A. ImageX 

B. Usmtutils.exe 

C. Mighost.exe 

D. Loadstate.exe 

Answer:

Q3. - (Topic 1) 

Which of the following utilities can you use to transfer user encryption certificates from a computer running Windows XP Professional to Windows 7 Professional? Choose two. 

A. File Settings and Transfer Wizard 

B. USMT 

C. Windows Easy Transfer 

D. Robocopy.exe 

Answer: B,C 

Q4. - (Topic 3) 

You have a computer named Computer1 that runs Windows 7. You have a server named Server1 that runs Windows Server 2008. 

Computer1 and Server1 have IPv4 and IPv6 installed. 

You need to identify whether you can connect to Server1 by using IPv6. 

What should you do? 

A. Run Ping Server1 -6. 

B. Run Ping Server1- n 6. 

C. Run Net view \\Server1. 

D. Open \\server1 from the Run dialog box. 

Answer:

Explanation: 

Ping The Ping tool is still widely used, although more firewalls block Internet Control Message Protocol (ICMP) echo requests than used to be the case. However, even if you cannot get past a firewall on your organization's network, Ping is still useful. You can check that the IPv4 protocol is working on a computer by entering ping 127.0.0.1. You can then ping the IPv4 address of the computer. You can find out what this is by using the Ipconfig tool. If your computer has more than one interface combined in a network bridge, you can ping the Ipv4 address of the network bridge. When you have established that you can ping your computer using an Ipv4 address, you can test that DNS is working internally on your network (assuming you are connected to a DNS server, a WAP, or have ICS configured on your network) by pinging your computer name—for example, entering ping canberra. Note that if DNS is not implemented on your system, ping canberra still works because the IPv6 link-local address resolves automatically. -6 Force using IPv6. 

Q5. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

A user is asked to remove encryption from a locally saved folder so that other users can read and write to that folder. 

You need to verify that the folder is not encrypted with the Encrypting File System (EFS). 

What should you use to accomplish this goal? 

A. Device Manager 

B. Local Users and Groups 

C. the User Account Control Settings Control Panel window 

D. the icacls command 

E. the Group Policy management console 

F. share permissions 

G. the netsh command 

H. the Services management console 

I. the folder Properties window 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/windows/how-do-i-get-started-with-the-encrypting-file-system-in-windows-7.aspx 

Q6. - (Topic 3) 

You have a computer that runs Windows 7. 

The Encrypting File System (EFS) key is compromised. 

You need to create a new EFS key. 

Which command should you run? 

A. Certutil -getkey 

B. Cipher.exe /k 

C. Icacls.exe /r 

D. Syskey.exe 

Answer:

Explanation: 

Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains.Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed.When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. /K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521. 

Q7. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

You need to ensure that when Windows runs applications with elevated privileges, it enforces the Public Key Infrastructure (PKI) certification path validation for a given executable file. 

What should you use to accomplish this goal? 

A. the User Account Control Settings Control Panel window 

B. the Services management console 

C. Device Manager 

D. Local Users and Groups 

E. the icacls command 

F. the Group Policy management console 

G. the folder Properties window 

H. share permissions 

I. the netsh command 

Answer:

Explanation: 

Besides changing the notification behavior of UAC, you can also control the behavior of the UAC by using local or group policies. Local policies are managed from each local computer while group policies are managed as part of Active Directory. 

Follow these steps to change UAC settings: Click Start, type secpol.msc in the Search programs and files box, and press Enter. From the Local Security Policy tree, click Local Policies and then double-click Security Options The UAC policies are at the bottom of the list. To modify a setting, simply double-click on it and make the necessary changes. 

Q8. - (Topic 5) 

A network has a main office and a branch office. 

The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled. 

Users at the branch office report that it takes several minutes to open large files located in the main office. 

You need to minimize the amount of time it takes for branch office users to open files located in the main office. 

What should you do? 

A. At the main office, configure the servers to use Distributed File System Replication (DFSR). 

B. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers. 

C. At the branch office, configure the client computers to use BranchCache Hosted Cache mode. 

D. At the branch office, configure the client computers to use BranchCache Distributed Cache mode. 

Answer:

Q9. - (Topic 2) 

An employee who works from home telephones your help desk. A virus attack has deleted his computer's single internal hard disk. He carried out a System Image backup on his computer three months ago and automatically backs up his personal files every night. He uses an external USB hard drive formatted with the NTFS file system to hold his backups. 

All his personal files are in his Documents library. What do you advise? (Choose all that apply; the answers form a complete solution.) 

A. Carry out a System Image restore. 

B. Carry out a system restore. 

C. Use Restore Previous Versions to restore his Documents library from a shadow copy. 

D. Use Restore My Files in the Backup And Restore console to restore his Documents library folder. 

Answer: A,D 

Q10. - (Topic 5) 

You use a portable computer that has Windows 7 installed. The Computer has a single hard disk drive and a dual-core CPU. 

You need to analyze the performance of the computer to meet the following requirements: 

. Include the CPU, Memory, and Disk subsystems 

. Send events to another computer for predefined Events IDS. 

What should you do? 

A. Run powercfg.exe. 

B. Run the windows Experience Index 

C. Configure Event Viewer subscriptions 

D. Open Task Manager 

E. Open System Properties, and configure performance settings 

F. Open System Properties, and configure environment variables 

G. Open System Properties, and configure user profiles settings 

H. Open System Properties, and configure the page file settings 

I. Open Performance Monitor, and configure a Data Collector Set. 

J. Open Performance Monitor, and customize the System Monitor view. 

Answer: