★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-680-dumps.html


It is impossible to pass Microsoft 70-680 exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed Microsoft 70-680 practice questions. You will get a surprising result by our Up to the minute TS:Windows 7,Configuring practice guides.

2021 Oct microsoft 70-680:

Q1. - (Topic 6) 

You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at your company has a network projector installed on a server within the company network. 

You need to connect to the projector from your computer. What should you do? 

A. From Display, click Connect to a projector. 

B. From Network and Sharing Center, create a temporary network and run Displayswitch.exe. 

C. From Device Manager, click Add legacy hardware. 

D. From the command prompt, run the NetProj command. 

Answer:


Q2. - (Topic 3) 

You have two computers named Computer1 and Computer2 that run Windows 7. 

You connect from Computer1 to Computer2 by using Remote Desktop. 

You discover that you cannot copy any files between the computers during the Remote Desktop session. 

You need to ensure that you can copy files between the computers during the Remote Desktop session. 

What should you do? 

A. On Computer1, open Windows Firewall and allow file and printer sharing. 

B. On Computer2, open Windows Firewall and allow file and printer sharing. 

C. On Computer1, open Remote Desktop Connection and configure the Local devices and resources setting. 

D. On Computer2, open Remote Desktop Connection and configure the Local devices and resources setting. 

Answer:

Explanation: 

How can I use my devices and resources in a Remote Desktop session? Redirecting a device on your computer makes it available for use in a Remote Desktop session. If you have a recent version of Remote Desktop, you can redirect most devices, including printers, smart cards, serial ports, drives, Plug and Play devices, media players based on the Media Transfer Protocol (MTP), and digital cameras based on the Picture Transfer Protocol (PTP). Some USB devices can be redirected, and you can also redirect your Clipboard. 


Q3. HOTSPOT - (Topic 6) 

You administer portable computers in your company network. All the computers have Windows 7 Enterprise installed. 

You need to configure Windows Firewall on computers used by engineer employees to meet the following requirements: 

. Engineer employees must receive remote support from desktop support employees while they are at the corporate main office. 

. Engineer employees' remote support is prevented when they are working from home. 

What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.) 

Answer: 


Q4. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. The company also has a file server running Windows Server 2008 R2 that is configured to use BranchCache. 

You need to configure the client computers to be BranchCache clients. 

Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. Device Manager 

B. Local Users and Groups 

C. the User Account Control Settings Control Panel window 

D. the Group Policy management console 

E. the Services management console 

F. the folder Properties window 

G. the netsh command 

H. the icacls command 

I. share permissions 

Answer: D,G 

Explanation: 

To enable BranchCache on Windows 7 client computers using Group Policy, you must first create a Group Policy object (GPO) that will carry the BranchCache configuration. After creating the GPO, you configure the setting that enables BranchCache and choose whether BranchCache will operate in Distributed Cache mode or Hosted Cache mode. 

To create a GPO, enable BranchCache, and select the cache mode 

Click Start, point to Administrative Tools, and click Group Policy Management Console. 

Client configuration using netsh 

When configuring client computers, you can enable BranchCache and choose between Distributed Cache mode and Hosted Cache mode with a single netsh command. 


Q5. - (Topic 4) 

A network contains computers that run Windows 7 and Windows Vista. A computer named Computer1 runs Windows 7. 

You need to ensure that only users running Windows 7 and Windows Vista can connect to Computer1 using remote desktop. 

In the System Properties window, on the Remote tab, what should you do? 

A. Click the Advanced button. Select the Allow this computer to be controlled remotely check box on Computer1. 

B. Select the Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) check box on Computer1. 

C. Select the Allow connections from computers running any version of Remote Desktop (less secure) check box on Computer1. 

D. Select Allow Remote Assistance connections to this computer check box on Computer1. 

Answer:


Improved applocker 70-680:

Q6. - (Topic 2) 

You have a portable computer named Computer1 and a desktop computer named Computer2. Both computers run windows 7. 

On computer2, you create a share named Share1 by using Advanced Sharing feature. 

You need to ensure that when you connect to Share1 from Computer1, the files that you open are automatically cached. 

What should you do? 

A. On Computer1, modify the Offline Files settings. 

B. On Computer1, modify the User Profile settings. 

C. On Computer2, modify the properties of Share1. 

D. On Computer2, modify the file sharing connection settings for the HomeGroup 

Answer:

Explanation: 

The caching feature of Shared Folders ensures that users have access to shared files even when they are working offline without access to the network. You can also use Shared Folders or Share and Storage Management to enable BranchCache on shared resources. The BranchCache feature in Windows. 7 or Windows Server 2008 R2 enables computers in a branch office to cache files downloaded from this shared folder, and then securely serve the files to other computers in the branch. To set caching options for a shared folder by using the Windows interface 1. Open Computer Management.2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Yes.3. In the console tree, click System Tools, click Shared Folders, and then click Shares.4. In the results pane, right-click the shared folder, and then click Properties.5. On the General tab, click Offline Settings, configure the offline availability options as appropriate and then click OK. Offline availability optionsSelect the following offline availability option for each shared folder: All files and programs that users open from the share are automatically available offlineWhenever a user accesses the shared folder or volume and opens a file or program in it, that file or program will be automatically made available offline to that user. Files and programs that are automatically made available offline will remain in the Offline Files cache and synchronize with the version on the server until the cache is full or the user deletes the files. Files and programs that are not opened are not available offline. 


Q7. - (Topic 3) 

You have a computer that runs Windows 7. 

The Encrypting File System (EFS) key is compromised. 

You need to create a new EFS key. 

Which command should you run? 

A. Certutil -getkey 

B. Cipher.exe /k 

C. Icacls.exe /r 

D. Syskey.exe 

Answer:

Explanation: 

Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains.Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed.When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. /K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521. 


Q8. - (Topic 5) 

You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. 

You need to analyze the performance of the computer to meet the following requirements: 

Include the CPU, Memory, and Disk subsystems. 

Display real-time performance. 

Obtain a list of users who have logged on by using the same tool. 

What should you do? 

A. Run powercfg.exe. 

B. Run the Windows Experience Index. 

C. Configure Event Viewer subscriptions. 

D. Open Task Manager. 

E. Open System Properties, and configure performance settings. 

F. Open System Properties, and configure environment variables. 

G. Open System Properties, and configure user profiles settings. 

H. Open System Properties, and configure the page file settings. 

I. Open Performance Monitor, and configure a Data Collector Set. 

J. Open Performance Monitor, and customize the System Monitor view. 

Answer:


Q9. - (Topic 2) 

A user telephones your help desk. She has just accidentally deleted a file she was working on earlier that day. 

You have configured her computer to carry out backups every evening, and you installed a new graphics driver two days ago. 

How should you advise the user to retrieve her file? 

A. Open the Backup And Restore console and restore the file from backup. 

B. Use the Restore Previous Versions feature to restore the file. 

C. Open her Recycle Bin, right-click the file, and choose Restore. 

D. Perform a system restore. 

Answer:


Q10. - (Topic 4) 

Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BrachCache features installed. 

You add new client computers the network. The computers have Windows 7 installed and are members of a workgroup. 

You need to ensure that the new client computers are configured to cache and share files. 

What should you do? 

A. Run the Netsh branchcache set service mode=HOSTEDSERVER client authentication=NONE command 

B. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound trafficfor local TCP port 80. 

C. Create a Group Policy that sets Hash Publication for BranchCache as disabled. 

D. Run the netsh branchcache set service mode=DISTRIBUTED command. 

E. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option. 

F. Check permisions. 

G. Run the netsh branchcache set service mode=HOSTEDCLIENT command. 

H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy. 

I. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443. 

Answer: