★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-680-dumps.html


Want to know Examcollection 70-680 Exam practice test features? Want to lear more about Microsoft TS:Windows 7,Configuring certification experience? Study High quality Microsoft 70-680 answers to Up to date 70-680 questions at Examcollection. Gat a success with an absolute guarantee to pass Microsoft 70-680 (TS:Windows 7,Configuring) test on your first attempt.

2021 Dec windows 7 70-680 pdf:

Q241. - (Topic 3) 

You have a computer that runs Windows 7. Your network contains a VPN server that runs Windows Server 2008 R2. The server requires the use of a pre-shared key. 

You need to create a VPN connection to connect to the network. 

Which type of VPN connection should you create? 

A. IKEv2 

B. L2TP 

C. PPTP 

D. SSTP 

Answer:


Q242. - (Topic 5) 

You have three computers that run Windows 7 SP1. All computers are connected to the same network subnet of 10.0.10.0/24. The computers' network location is set to the Work network. 

You need to join all the computers to a HomeGroup. 

What should you do first? 

A. Set the network location to the Home network. 

B. Enter the HomeGroup password. 

C. Enable Network Discovery. 

D. Configure Windows Firewall to allow the Netlogon service. 

Answer:


Q243. - (Topic 4) 

Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BrachCache features installed. 

You create a shared folder on the server and enable BranchCache on the shared folder. 

You discover that the users of the client computers are unable to access files in the shared folder. 

You need to provide access for the users to the shared folder. 

What should you do? 

A. Run the Netsh branchcache set service mode=HOSTEDSERVER client authentication=NONE command 

B. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80. 

C. Create a Group Policy that sets Hash Publication for BranchCache as disabled. 

D. Run the netsh branchcache set service mode=DISTRIBUTED command. 

E. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option. 

F. Check permissions. 

G. Run the netsh branchcache set service mode=HOSTEDCLIENT command. 

H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy. 

I. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443. 

Answer:

Explanation: 

Have the users been given access to the files (what does BranchCache have to do with accessing files locally etc). 


Q244. - (Topic 5) 

You have a computer that runs Windows 7. The computer is a member of a workgroup. 

You use Encrypting File System (EFS) to protect your local files. 

You need to ensure that you can decrypt EFS files on the computer if you forget your password. 

What should you do? 

A. From Authorization Manager, modify the Authorization Manager options. 

B. Run the cipher.exe /adduser /user:administrator command. 

C. From User Accounts, select Manage your file encryption certificates. 

D. From Credential Manager, select Back up vault. 

Answer:

Explanation: Make sure you have a backup of the appropriate encryption certificates 


Q245. DRAG DROP - (Topic 6) 

Your organization needs to perform a Windows Vista to Windows 7 migration for a department with 150 computers. 

You want to use User State Migration Tool (USMT) to automate the migration. 

You need to move user data and custom settings from the source computers to the destination computers by using USMT with minimal downtime or impact to the end users. The transfer must include files in several custom directories located in the root directory of the boot volume. 

Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. ) 

Answer: 


Regenerate mcts exam 70-680:

Q246. - (Topic 4) 

Your company network includes computers that have Windows 7 Enterprise installed. The computers use IP addresses of DNS and WINS servers assigned statically. 

The DNS and WINS servers on the company network have been taken offline for upgrades. 

Users report that they can no longer access the Internet. 

You need to provide access to the Internet for the computers during the maintenance. 

What should you do? 

A. Change the IP address of the primary WINS to a public name server. 

B. Change the IP address of the default gateway. 

C. Change the IP address of the primary DNS to a public DNS. 

D. Change the client IP address and subnet mask. 

Answer:


Q247. DRAG DROP - (Topic 4) 

A company has client computers that run windows vista. 

You need to install Windows 7 on a client computer in a dual-boot configuration with the existing Windows Vista installation, without reducing the size of the partition that contains Windows Vista. 

Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q248. DRAG DROP - (Topic 5) 

You use a computer that has Windows 7 Professional SP1 installed. The computer has a single network interface. 

You need to prevent the computer from using NetBIOS applications. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q249. - (Topic 3) 

You need to configure a computer to encrypt all inbound connections by using IPSec. 

What should you do? 

A. From Network and Sharing Center, click Connect to a network. 

B. From Network and Sharing Center, click Set up a new connection or network. 

C. From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule. 

D. From Windows Firewall with Advanced Security, click Connection Security Rules and then click New Rule. 

Answer:

Explanation: 

Connection Security Rules Connection security rules are a special type of rule that deal with authenticated and encrypted traffic. You can use connection security rules to manage how communication occurs between different hosts on the network. You use the New Connection Security Rule Wizard, to create connection security rules. Connections can be authenticated using the Kerberos V5 protocol requiring a domain computer and user account or a domain computer account. If you select advanced properties, connections can be authenticated using NTLMv2, computer certificates from a particular certificate authority (CA) or using a pre-shared key.Connection Security Rules and IPSec policies The relationship between connection security rules and IPSec policies is similar to the relationship between AppLocker and Software Restriction Policies. Both sets of rules do similar things, but the ones that you use depend on the operating systems used by the client computers in your organization. All editions of Windows 7 and Windows Vista support connection security rules, but Windows XP does not. 


Q250. - (Topic 2) 

You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has five removable devices. 

You need to ensure that users can only access removable devices that have been previously installed on the computer. 

What should you modify in the Local Group Policy? 

A. Enable the Prevent redirection of USB devices setting. 

B. Enable the Prevent installation of removable devices setting. 

C. Disable the WPD Devices: Deny read access setting. 

D. Disable the Allow administrators to override Device Installation Restriction policies setting. 

Answer:

Explanation: 

Prevent installation of removable devices This policy setting allows you to prevent Windows from installing removable devices. A device is considered removable when the driver for the device to which it is connected indicates that the device is removable. For example, a Universal Serial Bus (USB) device is reported to be removable by the drivers for the USB hub to which the device is connected. This policy setting takes precedence over any other policy setting that allows Windows to install a device. If you enable this policy setting, Windows is prevented from installing removable devices and existing removable devices cannot have their drivers updated. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of removable devices from a remote desktop client to the remote desktop server. If you disable or do not configure this policy setting, Windows can install and update device drivers for removable devices as allowed or prevented by other policy settings. NOT Prevent redirection of USB devicesThis policy setting prevents redirection of USB devices. If you enable this setting, an alternate driver for USB devices cannot be loaded. If you disable or do not configure this setting, an alternate driver for USB devices can be loaded.