★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-680-dumps.html


Want to know Ucertify 70-680 Exam practice test features? Want to lear more about Microsoft TS:Windows 7,Configuring certification experience? Study High quality Microsoft 70-680 answers to Leading 70-680 questions at Ucertify. Gat a success with an absolute guarantee to pass Microsoft 70-680 (TS:Windows 7,Configuring) test on your first attempt.

2021 Mar 70-680 real exam

Q41. - (Topic 1) 

Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain. 

From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain. 

You need to ensure that you can recover all EFS encrypted files from Computer2. 

What should you do? 

A. On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker. 

B. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate. 

C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter. 

D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter. 

Answer:

Explanation: 

You can import the recovery agent to another computer running Windows 7 if you want to recover files encrypted on the first computer. You can also recover files on another computer running Windows 7 if you have exported the EFS keys from the original computer and imported them on the new computer. You can use the Certificates console to import and export EFS keys. 

NOT Secedit.exe: 

You can use both the Local Group Policy Editor and the Local Security Policy console to import and export security-related Group Policy settings. You can use this import and export functionality to apply the same security settings to stand-alone computers that are not part of a domain environment. Exported security files are written in Security Template .inf format. As well as using Local Group Policy Editor and the Local Security Policy console to import policies that are stored in .inf format, you can apply them using the Secedit.exe command-line utility. 

NOT Cipher.exe /removeuser /adduser. NOT DigitalLocker. 


Q42. - (Topic 4) 

Your company has a server named Server1 that runs Windows Server 2008. Server1 is a Windows Server Update Services (WSUS) server. 

You have a computer named Computer1 that runs Windows 7. 

Computer1 is configured to obtain updates from Server1. 

You open the WSUS snap-in on Server1 and discover that Computer1 does not appear. 

You need to ensure that Computer1 appears in the WSUS snap-in. 

What should you do? 

A. On Server1, open Windows Update then select Check for updates. 

B. On Server1, run Wsusutil.exe and specify the /import parameter. 

C. On Computer1, open Windows Update and then select Change settings. 

D. On Computer1, run Wuauclt.exe and specify the /detectnow parameter. 

Answer:

Explanation: 

wuauclt.exeThe wuauclt utility allows you some control over the functioning of the Windows Update Agent. It is updated as part of Windows Update.Detectnow OptionBecause waiting for detection to start can be a time-consuming process, an option has been added to allow you to initiate detection right away. On one of the computers with the new Automatic Update client installed, run the following command at the command prompt: wuauclt.exe /detectnow 


Q43. HOTSPOT - (Topic 4) 

A company has client computers that run Windows 7. You create an AppLocker policy for the client computers. 

You need to ensure that the AppLocker policy is enforced after the computers restart. 

Which service startup type should you use? (To answer, select the appropriate setting or settings in the work area.) 

Answer: 


Q44. HOTSPOT - (Topic 6) 

You are a system administrator for a regional accounting firm. The existing computers have either Windows Vista Enterprise or Windows Vista Home Premium installed. 

Your manager wants you to upgrade all computers to Windows 7. 

You need to determine which editions of Windows 7 support an in-place upgrade from the two editions of Windows Vista. 

In the table below, identify which editions of Windows 7 will support an in-place upgrade from Windows Vista Enterprise and Home Premium. (Make only one selection in each column. This question is worth two points. ) 

Answer: 


Q45. - (Topic 3) 

You need to prevent a custom application from connecting to the Internet. 

What should you do? 

A. From Windows Firewall, add a program. 

B. From Windows Defender, modify the Allowed items list. 

C. From Windows Firewall with Advanced Security, create an inbound rule. 

D. From Windows Firewall with Advanced Security, create an outbound rule. 

Answer:

Explanation: 

Outbound Rule Outbound rules allow you to block and allow traffic that originates on the computer from traveling out to the network.Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.QUESTION NO: 290 You have a computer that runs Windows 7. The network contains a monitoring server named Server1. The computer runs a monitoring service named Service1. Service1 uses Remote Procedure Calls (RPCs). You need to ensure that Service1 can receive requests from Server1. 

What should you do? 

A. From Windows Firewall with Advanced Security, create a predefined rule. 

B. From Windows Firewall with Advanced Security, create a custom rule. 

C. From Network and Sharing Center, modify the network location settings. 

D. From Network and Sharing Center, modify the advanced sharing settings. 

Answer:

Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule. 


Most recent 70-680 practice question:

Q46. - (Topic 3) 

You have a computer that runs Windows 7. 

You add a new hard disk drive to the computer and create a new NTFS partition. 

You need to ensure that you can use the Previous Versions feature on the new drive. 

What should you do? 

A. From Disk Management, convert the new disk to a dynamic disk. 

B. From System Properties, configure the System Protection settings. 

C. From System and Security, enable BitLocker Drive Encryption (BitLocker). 

D. From the properties of the new drive, create a share and modify the caching settings. 

Answer:

Explanation: 

System protection might not be turned on for the drive. If system protection is not turned on, Windows can't create previous versions.To turn on system protection: 

1. Click to open System.2. In the left pane, click System protection. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.3. Click the drive, and then click Configure.4. Click Restore system settings and previous versions of files, and then click OK. 


Q47. - (Topic 2) 

You have a computer that runs Windows 7. 

You perform regular data backups and system image backups. The computer experiences a hard disk failure. You replace the failed hard disk. 

You need to recover the computer to the previous Windows 7 environment. 

You start the computer from the Windows 7 installation media. 

Which recover option should you select? 

A. Command Prompt 

B. Startup Repair 

C. System Image Recovery 

D. System Restore 

Answer:

Explanation: 

System Image Recovery Enables you to implement a System Image restore. You would choose this option if your hard disk failed or needed to be wiped. If system changes are causing problems, you would choose the System Restore option.NOT Startup Repair Automatically fixes problems that prevent Windows from starting. If Windows 7 had boot problems during a previous restart, a normal boot (without accessing the Advanced Boot dialog box) gives you the option of selecting Startup Repair.NOT System Restore Gives you another method of starting a system restore to a previous restore point. Because you can access this menu when you boot from a DVD-ROM, this lets you repair your system when recent changes to system settings prevent your computer from booting normally.NOT Command Prompt Gives access to the file system, volumes, and files through a command-line interface. 


Q48. - (Topic 1) 

Your network has a main office and a branch office. The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled. 

Users at the branch office report that it takes several minutes to open large files located in the main office. 

You need to minimize the amount of time it takes for branch office users to open files located in the main office. 

The solution must also reduce the amount of bandwidth used between the two offices. 

What should you do? 

A. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers. 

B. At the main office, configure the servers to use Background Intelligent Transfer Service (BITS). 

C. At the branch office, configure the client computers to use BranchCache Hosted Cache mode. 

D. At the branch office, configure the client computers to use BranchCache Distributed Cache mode. 

Answer:

Explanation: 

Distributed Cache ModeDistributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link. When it accesses the file from its peer, it also copies that file into its own cache. The advantage of distributed cache mode is that you can deploy it without having to deploy a server running Windows Server 2008 R2 locally in each branch office. The drawback of Distributed Cache mode is that the contents of the cache available on the branch office LAN depend on which clients are currently online. If a client needs a file that is held in the cache of a computer that is shut down, the client needs to retrieve the file from the host server across the WAN.Hosted Cache ModeHosted Cache mode uses a centralized local cache that hosted on a branch office server running Windows Server 2008 R2. You can enable the hosted cache server functionality on a server running Windows Server 2008 R2 that you use for other functions without a significant impact on performance. This is because if you found that files hosted at another location across the WAN were being accessed so frequently that there was a performance impact, you would use a solution like Distributed File System (DFS) to replicate them to the branch office instead of using BranchCache. The advantage of Hosted Cache mode over Distributed Cache mode is that the cache is centralized and always available. Parts of the distributed cache become unavailable when the clients hosting them shut down.Background Intelligent Transfer Service (BITS)The Background Intelligent Transfer Service (BITS) has two role services: the Compact Server and the IIS Server Extension. The Compact Server is a stand-alone HTTP or HTTPS file server, whereas the IIS Server Extension is an Internet Information Services (IIS) plug-in that requires a server running IIS. IIS Server ExtensionThe BITS IIS Server Extension lets you configure a server that is running IIS to allow BITS clients to perform background, resumable file uploads to IIS virtual directories. On completion of a file upload, the BITS Server can notify a Web application of the newly uploaded file. This allows the application to process the uploaded file. The Web application can then optionally reply to the client responsible for the upload.Compact ServerThe BITS Compact Server is a stand-alone HTTP or HTTPS file server, which allows applications to host files for BITS clients to download, and allows the asynchronous transfer of a limited number of large files between computers.QoS Packet SchedulerThe Quality of Service Packet Scheduler is a Windows platform component that is enabled by default on Windows Vista. and Windows XP computers. It is, however, not enabled by default on Windows 2003 computers. This scheduler is designed to control the IP traffic for various network services, including Real Time Communications traffic. This component must be installed and enabled if the QoS markings described earlier for audio and video traffic are to be implemented by the IP stack. 


Q49. - (Topic 1) 

Your network contains an Active Directory domain. All servers run Windows Server 2008 R2 and are members of the domain. All servers are located in the main office. 

You have a portable computer named Computer1 that runs Windows 7. Computer1 is joined to the domain and is located in a branch office. 

A file server named Server1 contains a shared folder named Share1. 

You need to configure Computer1 to meet the following requirements: 

. Minimize network traffic between the main office and the branch office 

. Ensure that Computer1 can only access resources in Share1 while it is connected to the network. 

What should you do? 

A. On Computer1, enable offline files. 

B. On Computer1, enable transparent caching. 

C. On Server1, configure DirectAccess. 

D. On Server1, configure Share1 to be available offline. 

Answer:

Explanation: 

Transparent Caching When you enable transparent caching, Windows 7 keeps a cached copy of all files that a user opens from shared folders on the local volume. The first time a user opens the file, the file is stored in the local cache. When the user opens the file again, Windows 7 checks the file to ensure that the cached copy is up to date and if it is, opens that instead. If the copy is not up to date, the client opens the copy hosted on the shared folder, also placing it in the local cache. Using a locally cached copy speeds up access to files stored on file servers on remote networks from the client. When a user changes a file, the client writes the changes to the copy of the file stored on the shared folder. When the shared folder is unavailable, the transparently cached copy is also unavailable. Transparent caching does not attempt to keep the local copy synced with the copy of the file on the remote file server as the Offline Files feature does. Transparent caching works on all files in a shared folder, not just those that you have configured to be available offline. 


Q50. - (Topic 1) 

You have a computer that runs Windows 7. Your company has three custom applications named app1.exe, app2.exe, and app3.exe. The applications have been digitally signed by the company. 

You need to create a policy that allows only applications that have been digitally signed by the company to run. 

What should you create? 

A. an AppLocker executable rule 

B. an AppLocker Windows Installer rule 

C. a software restriction policy and a certificate rule 

D. a software restriction policy and a hash rule 

Answer: