aiotestking uk

70-680 Exam Questions - Online Test


70-680 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 2) 

You have a computer that runs Windows 7. You connect to your company's network by using a VPN connection. 

You discover that when you establish the VPN connection, you are unable to access Internet Web sites. 

When you disconnect the VPN connection, you can access Internet Web sites. 

You need to access Internet Web sites while you are connected to the VPN. 

What should you do? 

A. Configure the VPN connection to use only PPTP. 

B. Configure the VPN connection to use only L2TP/IPSec. 

C. From the Internet Protocol Version 4 (TCP/IPv4) properties of the local area connection, disable the Automatic metric setting. 

D. From the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection, disable the Use default gateway on remote network setting. 

Answer:

Explanation: 

To prevent the default route from being created In the properties of the TCP/IP protocol of the dial-up connection object, in the Advanced TCP/IP Settings dialog box, click the General tab, and then clear the Use default gateway on remote network check box. 

Q2. - (Topic 1) 

You have a computer that runs Windows 7. 

Your network contains a DHCP server that runs Windows Server 2008 R2. 

The server is configured as a Network Access Protection (NAP) enforcement point. 

You need to configure the computer as a NAP client. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From Services, set the Netlogon service Startup Type to Automatic. 

B. From Services, set the Network Access Protection Agent service Startup Type to Automatic. 

C. From the NAP Client Configuration console, configure the user interface settings. 

D. From the NAP Client Configuration console, enable the DHCP Quarantine Enforcement Client. 

Answer: B,D 

Explanation: 

Network Access Protection Network Access Protection (NAP) is a feature in Windows Server 2008 that controls access to network resources based on a client computer's identity and compliance with corporate governance policy. NAP allows network administrators to define granular levels of network access based on who a client is, the groups to which the client belongs, and the degree to which that client is compliant with corporate governance policy. If a client is not compliant, NAP provides a mechanism to automatically bring the client back into compliance and then dynamically increase its level of network access.NAP Client ConfigurationNetwork Access Protection (NAP), a new feature in Windows Vista. and Windows Server. 2008, allows you to control the access of client computers to network resources based on computer identity and compliance with corporate governance policy. To implement NAP, you must configure NAP settings on both servers and client computers. There are three tools that you can use to configure NAP client settings: The NAP Client Configuration console provides a graphical user interface with which you can configure NAP client settings on the local computer or in a configuration file that you can save and apply to other computers. The Netsh commands for NAP client provide a command-line tool that you can use to configure client computers or to create a configuration file that you can save and apply to other computers. If you want to manage NAP client settings on domain member client computers, you can use the Group Policy Management Console and the Group Policy Management Editor. When you configure NAP client settings in Group Policy, these settings are applied on NAP-capable domain member client computers when Group Policy is refreshed.To enable and disable the DHCP enforcement client by using the Windows interface 

1. To open the NAP Client Configuration console, click Start, click All Programs, click Accessories, click Run, type NAPCLCFG.MSC, and then click OK. 

2. Click Enforcement Clients. 

3. Right-click DHCP Enforcement Client, and then click Enable or Disable.Network Access Protection Agent 

The Network Access Protection (NAP) agent service collects and manages health information for client computers on a network. Information collected by NAP agent is used to make sure that the client computer has the required software and settings. If a client computer is not compliant with health policy, it can be provided with restricted network access until its configuration is updated. Depending on the configuration of health policy, client computers might be automatically updated so that users quickly regain full network access without having to manually update their computer. 

Q3. - (Topic 5) 

You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:\Software. 

User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folder. 

You need to verify whether User1 can save files to C:\Software. 

What should you do? 

A. Run the Net Share command. 

B. Run the Wfs C:\Software command. 

C. In the Advanced Security Settings for the Documents folder, select the Effective Permissions tab. 

D. Run the Fsutil C:\Software command. 

Answer:

Explanation: To view effective permissions on files and folders . Open Windows Explorer, and then locate the file or folder for which you want to view effective permissions. 

Right-click the file or folder, click Properties, and then click the Security tab. 

Click Advanced, click the Effective Permissions tab, and then click Select. 

In Enter the object name to select (examples), enter the name of a user or group, and then click OK. The selected check boxes indicate the effective permissions of the user or group for that file or folder. 

Q4. - (Topic 3) 

You have a computer that runs Windows 7. 

You need to capture the operating system and all the computer configurations to a Windows image (WIM) file. 

What should you do before you capture the image? 

A. Run Oscdimg.exe. 

B. Run Windows System Image Manager (Windows SIM). 

C. Open a command prompt that has elevated privileges. 

D. Start the computer by using Windows Preinstallation Environment (Windows PE). 

Answer:

Explanation: 

Windows PE To access a network share as an installation source from the client computer, you need to boot the client computer into the Windows Preintallation Environment 

(Windows PE) environment. The Windows PE environment is a minimally featured operating system that allows you to access diagnostic and maintenance tools as well as access network drives. Once you have successfully booted into the Windows PE environment, you can connect to the network share and begin the installation by running Setup.exe.NOT Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets.NOT OscdimgOscdimg is a command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660, Joliet, and Universal Disk Format (UDF) file systems. 

Q5. - (Topic 5) 

You have a computer that has the following hardware configuration: 

1.6-gigahertz (GHz) processor (64-bit) 

8-GB RAM 

500-GB hard disk 

Graphics card that has 128-MB RAM 

You need to select an edition of Windows 7 to meet the following requirements: 

Support DirectAccess 

Support Windows XP Mode 

Use all of the installed memory 

Support joining an Active Directory domain 

Which edition should you choose? 

A. Windows 7 Enterprise (x86) 

B. Windows 7 Professional (64-bit) 

C. Windows 7 Enterprise (64-bit) 

D. Windows 7 Ultimate (x86) 

Answer:

Q6. HOTSPOT - (Topic 4) 

You have upgraded a Windows XP system to Windows 7. One of the applications is not showing menus when you launch it under Windows 7. How do you fix this issue? 

Answer:  

Q7. - (Topic 2) 

You have a computer that runs Windows 7. 

You view the properties of a file on the computer as show in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can configure permissions on the file. 

What should you do? 

A. From Folder Options, modify the View settings. 

B. Move the file to a disk that has the NTFS file system. 

C. Open Windows Explorer by using elevated privileges. 

D. Hold the SHIFT key, right-click the file, and click Properties. 

Answer:

Explanation: 

Missing options hints not on NTFS. On NTFS volumes, you can set security permissions on files and folders. These permissions grant or deny access to the files and folders. You can view security permissions for files and folders by completing the following steps: 1. In Windows Explorer, right-click the file or folder you want to work with. 2. From the pop-up menu, select Properties, and then in the Properties dialog box click the Security tab.3. In the Name list box, select the user, contact, computer, or group whose permissions you want to view. If the permissions are dimmed, it means the permissions are inherited from a parent object. 

Q8. - (Topic 1) 

You have a computer that runs Windows 7. Your company has a corporate intranet Web site. You open Windows Internet Explorer as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can access Web pages on both the Internet and the intranet. 

What should you do? 

A. From the Files menu, click Work Offline. 

B. From the Safety menu, click InPrivate Filtering. 

C. From the Security tab, add the intranet Web site to the Trusted sites zone. 

D. From the Safety menu, click InPrivate Browsing. 

Answer:

Explanation: 

Working Offline is activated On Internet Explorer's File menu is a "Work Offline" item that toggles Internet Explorer between online and offline modes of operation. 

(The question originally stated the Tools menu, maybe in a different version of IE this is the case, but for me and in the TechNet documentation it was under Files, so I'm choosing to believe Tools was a mistake and it should be Files, this has been amended in the question). InPrivate is turned on (does not prevent browsing the internet) InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, temporary Internet files, history, and other data. Toolbars and extensions are disabled by default. 

Q9. - (Topic 6) 

You use a computer that has Windows 7 SP1 installed and has a folder named C:\Data. 

The active network connection for the computer is configured as Public. 

You assign User1 to a local group called DataUsers. The group has been granted Read NTFS permissions for the folder. 

User1 browses to the shared folder across the network and receives the following error message: 

"Access is Denied." 

You need to ensure that the user can download files from the shared folder. 

What should you do? 

A. Allow file and printer sharing through Windows Firewall. 

B. Change the network location of the computer from a Public network to a Home or Work network. 

C. From the Security settings of the C:\Data folder, assign the Full Control NTFS permissions to User1. 

D. From the Advanced Sharing settings of the folder, assign the Read share permission to User1. 

E. From the Advanced Sharing permissions, enable caching. 

Answer:

Q10. HOTSPOT - (Topic 4) 

A company has client computers that run Windows 7. You set up a virtual private network (VPN) infrastructure that encapsulates Point-to-Point Protocol (PPP) traffic over the Secure Sockets Layer (SSL) channel of the HTTPS protocol. 

You need to create the VPN connection on the company's client computers. 

Which type of VPN should you use? (To answer, select the appropriate setting or settings in the work area.)

 

Answer: