aiotestking uk

70-680 Exam Questions - Online Test


70-680 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 5) 

You have a computer that runs Windows 7. 

The computer's hard disks are configured as shown in the following table. 

You need to ensure that you can recover the operating system and ail the files on the computer if hard disk 0 experiences hardware failure. 

What should you do? 

A. Create an Easy Transfer file on a network location. 

B. Use the Backup and Restore tool to back up data files for all users. 

C. Use the Backup and Restore tool to create a system image on a network location. 

D. Create a system repair disk. 

Answer:

Q2. - (Topic 1) 

You have a reference computer that runs Windows 7. 

You plan to deploy an image of the computer. 

You create an answer file named answer.xml. 

You need to ensure that the installation applies the answer file after you deploy the image. 

Which command should you run before you capture the image? 

A. Imagex.exe /append answer.xml /check 

B. Imagex.exe /mount answer.xml /verify 

C. Sysprep.exe /reboot /audit /unattend:answer.xml 

D. Sysprep.exe /generalize /oobe /unattend:answer.xml 

Answer:

Explanation: 

To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart. Open an elevated command prompt on the reference computer and run the following command: c:\windows\system32\sysprep\sysprep.exe /oobe /generalize /shutdown Sysprep prepares the image for capture by cleaning up various user-specific and computer-specific settings, as well as log files. The reference installation now is complete and ready to be imaged. 

Q3. - (Topic 6) 

Your organization uses Windows 7 computers. 

You remotely administer a computer. You attempt to ping the computer to verify that it is on the network, but you do not receive a response. The user is able to connect to network resources. 

You need to verify that the firewall on the computer is configured to allow pings. 

What should you do? 

A. Verify that the rule name Network Discovery (NB-Name-In) for inbound connections is enabled. 

B. Verify that the rule name File and Printer Sharing (Echo Request -ICMPv4-IN) for outbound connections is enabled. 

C. Verify that the rule name File and Printer Sharing (Echo Request -JCMPv4-IN) for inbound connections is enabled. 

D. Verify that the rule name Network Discovery (NB-Name-In) for outbound connections is enabled. 

Answer:

Explanation: Ref: http://technet.microsoft.com/en-us/library/cc732509(v=WS.10).aspx 

Q4. - (Topic 6) 

A user in your company wants to upgrade a Windows Vista Business computer to Windows 

7. 

You need to upgrade the computer to the minimum Windows 7 edition that meets the following requirements: 

BitLockerTo Go 

DirectAccess 

Which Windows 7 edition should you choose? 

A. Windows 7 Home Premium 

B. Windows 7 Professional 

C. Windows 7 Home Basic 

D. Windows 7 Ultimate 

Answer:

Q5. - (Topic 5) 

You manage several client computers in an organization. 

You need to ensure that all users, including administrators, are required to enter a username and password when uninstalling applications from any computer in the organization. 

What should you do? 

A. Create a custom GPO to modify the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting. 

B. Configure an AppLocker Windows Installer rule. 

C. Configure the User Account Control (UAC) settings on all client computers to always notify. 

D. Create a custom GPO to configure a software restriction policy. 

Answer:

Q6. - (Topic 3) 

You have a computer that runs Windows 7. The computer has two drives named C and D. Windows Backup is scheduled to run every day. The scheduled backup backs up a system image, all user, files, and drive D. Drive D fails. You replace the drive with a new drive. You need to recover the data on drive D by using the minimum amount of administrative effort. The solution must minimize downtime. 

What should you do? 

A. From Backup and Restore, click Restore all users files. 

B. From the properties of drive D, restore all previous versions. 

C. Open System Restore and apply the latest restore point. 

D. Start the computer from a system repair disc and restore a system image. 

Answer:

Q7. HOTSPOT - (Topic 4) 

A company's security policy prohibits employees from running any software from Fabrikam on computers running Windows 7 Enterprise. The applications are digitally signed by the publisher. 

You need to configure a single deny rule in AppLocker by applying a condition to restrict all of the applications from running, without affecting other programs. 

You have selected one of Fabrikam's applications as a reference. 

Which property should you choose? (To answer, select the appropriate setting or settings in the work area.) 

Answer:  

Q8. - (Topic 2) 

You are installing a 64bit edition of Windows 7. During the installation, you receive an error message when you attempt to add mass storage driver. You need to complete the installation of Windows 7. You start the computer from the Windows 7 installation media. What should you do next? 

A. From the Install Windows dialog box, click RESCAN. 

B. From the Install Windows dialog box, click DRIVE OPTIONS (ADVANCED) 

C. From the Advanced Boot options menu, select SAFE MODE. 

D. From the Advanced Boot options menu, select DISABLE DRIVER SIGNATURE ENFORCEMENT. 

Answer:

Q9. - (Topic 1) 

Your company has an Active Directory domain. All computers are members of the domain. 

Your network contains an internal Web site that uses Integrated Windows Authentication. 

From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication. 

You verify that your user account has permission to access the Web site. 

You need to ensure that you are automatically authenticated when you connect to the Web site. 

What should you do? 

A. Create a complex password for your user account. 

B. Open Credential Manager and modify your credentials. 

C. Add the URL of the Web site to the Trusted sites zone. 

D. Add the URL of the Web site to the Local intranet zone. 

Answer:

Explanation: 

Local Intranet Sites in the Local Intranet zone are computers on your organizational intranet. Internet Explorer can be configured to detect intranet sites automatically. It is also possible to add Web sites to this zone by clicking the Advanced button on the Local Intranet sites dialog box, as shown in the figure. The default security level of this zone is Medium-Low. Protected Mode is not enabled by default for sites in this zone. 

Security settings are configured primarily by assigning sites to zones. Sites that require elevated privileges should be assigned to the Trusted Sites zone. Sites that are on the intranet are automatically assigned to the Local Intranet zone, though this may require manual configuration in some circumstances. All other sites are assigned to the Internet zone. The Restricted Sites zone is used only for Web sites that may present security risks but must be visited. 

Q10. - (Topic 3) 

You have a Windows image (WIM) file that contains an image of Windows 7. The WIM file is 2 GB. 

You need to ensure that you can copy the image to CD. 

What should you do? 

A. Run Imagex.exe and specify the /split parameter. 

B. From the properties of the WIM file, enable compression. 

C. Run Dism.exe and specify the /cleanup-wim parameter. 

D. Right-click the WIM file, point to Send To and then click Compressed (zipped) Folder. 

Answer:

Explanation: 

Imagex ImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack. 

/split image_filedest_filesize 

Splits an existing .wim file into multiple read-only split .wim files (.swm). 

image_file 

Specifies the name and location of the .wim file to split. 

dest_file 

Specifies the file path of the split files. 

SizeSpecifies the maximum size in megabytes (MB) for each created file. This option generates the .swm files into the specified directory, naming each file the same as the specified image_file, but with an appended number and the .swm file-name extension. For example, if you choose to split a file named Data.wim, this option creates a Data.swm file, a Data2.swm file, a Data3.swm file, and so on, defining each portion of the split .wim file.