Your success in Microsoft exam 70 680 is our sole target and we develop all our 70 680 practice test braindumps in a way that facilitates the attainment of this target. Not only is our 70 680 exam study material the best you can find, it is also the most detailed and the most updated. 70 680 practice test Practice Exams for Microsoft Windows 70 680 pdf are written to the highest standards of technical accuracy.
Q131. - (Topic 1)
You have a computer that runs Windows 7.
Multiple users log on to your computer.
You enable auditing on a folder stored on your computer.
You need to ensure that each access to the folder is logged.
What should you do?
A. Start the Problem Steps Recorder.
B. From Event Viewer, modify the properties of the Security log.
C. From the local Group Policy, configure the Audit object access setting.
D. From the local Group Policy, configure the Audit directory service Access setting.
Answer: C
Explanation:
Audit object access Determines whether to audit the event of a user accessing an object (for example, file, folder, registry key, printer, and so forth) which has its own system access control list (SACL) specified. By default, this value is set to No auditing in the Default Domain Controller Group Policy object (GPO) and in the local policies of workstations and servers. If you define this policy setting, you can specify whether to audit successes, audit failures, or not to audit the event type at all. Success audits generate an audit entry when a user successfully accesses an object that has a SACL specified. Failure audits generate an audit entry when a user unsuccessfully attempts to access an object that has a SACL specified. You can select No auditing by defining the policy setting and unchecking Success and Failure.
Q132. HOTSPOT - (Topic 6)
You are the network administrator at a scientific research firm. You have a network of Windows Server 2008 R2 servers and Windows 7 Enterprise computers in a domain configuration.
Management needs to support a new, remote laboratory that is connected by a very slow network link. The primary work of the five scientists is to carry out experiments by following documentation that is stored on the corporate network. The only equipment at the remote site includes five computers and network connectivity devices.
You receive the following three email messages:
Message 1
All,
Due to business constraints, we are unable to support the purchase of a server at the new remote location to service such a small number of users. The minimum number of users to support a server purchase is 10.
Bart Cushing
Purchasing Department
Message 2
Dear all,
The new lab is up and running. By far the biggest problem is the exceptionally slow speed downloading the experiment descriptions from corporate headquarters. Is there a way to fix
the problem? Thanks! Dana Wright
Remote Lab Manager
Message 3
To all employees of A Datum Corp:
This is a friendly reminder that corporate security policy prohibits users from creating file
shares computers.
Thank you for your attention to this matter
Gwen Francis
You need to determine if BranchCache can support the environment.
Consider each of the following statements. Does the information in the three messages support the interference as stated? Each correct selection is worth one point.
Answer:
Q133. - (Topic 1)
Your company has an Active Directory domain. All computers are members of the domain.
Your network contains an internal Web site that uses Integrated Windows Authentication.
From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication.
You verify that your user account has permission to access the Web site.
You need to ensure that you are automatically authenticated when you connect to the Web site.
What should you do?
A. Create a complex password for your user account.
B. Open Credential Manager and modify your credentials.
C. Add the URL of the Web site to the Trusted sites zone.
D. Add the URL of the Web site to the Local intranet zone.
Answer: D
Explanation:
Local Intranet Sites in the Local Intranet zone are computers on your organizational intranet. Internet Explorer can be configured to detect intranet sites automatically. It is also possible to add Web sites to this zone by clicking the Advanced button on the Local Intranet sites dialog box, as shown in the figure. The default security level of this zone is Medium-Low. Protected Mode is not enabled by default for sites in this zone.
Security settings are configured primarily by assigning sites to zones. Sites that require elevated privileges should be assigned to the Trusted Sites zone. Sites that are on the intranet are automatically assigned to the Local Intranet zone, though this may require manual configuration in some circumstances. All other sites are assigned to the Internet zone. The Restricted Sites zone is used only for Web sites that may present security risks but must be visited.
Q134. - (Topic 1)
In which of the following scenarios must you perform a migration rather than an upgrade? Choose three.
A. Windows XP Professional (x64) to Windows 7 Professional (x64)
B. Windows Vista Business (x86) to Windows 7 Professional (x64)
C. Windows Vista Enterprise (x64) to Windows 7 Enterprise (x64)
D. Windows Vista Home Premium (x64) to Windows 7 Home Premium (x86)
Answer: A,B,D
Q135. HOTSPOT - (Topic 5)
A company has client computers that run Windows 7.
You need to secure a virtual private network (VPN) connection on the client computers. The remote access server must verify the identity of the client computers without requiring user credentials.
Which authentication protocol should you use? (To answer, select the appropriate setting or settings in the work area.)
Answer:
Q136. - (Topic 2)
You are testing unsigned device drivers on a computer on an isolated test network.
You install a display driver and find that the computer boots to a blank screen.
You restart the computer and press F8.
What Advanced Boot Options could you choose to help remedy the situation? (Choose all that apply.)
A. Safe Mode
B. Enable Boot Logging
C. Enable Low Resolution Video
D. Last Known Good Configuration (Advanced)
E. Disable Driver Signal Enforcement
Answer: A,C,D
Q137. - (Topic 6)
Your laptop has a 400 GB drive and currently reserves, by default, 2% (8 GB) for shadow copies.
You need to reserve more space for previous versions of files.
What should you do?
A. From System Properties, System Protection, expand the Max Usage to 20 GB.
B. From System Properties, System Protection, turn off system protection.
C. From Disk Properties, change the Quota Settings from 8 GB to 20 GB.
D. From an elevated command prompt, run vssadmin add shadowstorage /for=c: /on = c: /maxsize = 20gb.
Answer: A
Explanation: Control Panel->System and Security. >System [Properties]->System Protection->Configure
Q138. HOTSPOT - (Topic 4)
You administer portable computers that have Windows 7 installed. The computers connect to a wireless network that uses WPA2-Enterprise Security.
The company's security policy requires multifactor authentication for the portable computers.
You need to manually configure each portable computer to meet the following requirements:
. Users must provide multifactor authentication.
. The Server certificate held on the portable computers must mach the certificate held on the server.
What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.)
Answer:
Q139. - (Topic 5)
Your company network includes portable computers that have Windows 7 Ultimate and Windows 7 Professional installed.
You want to standardize all portable computers to Windows 7 Professional for Key Management Server (KMS) licensing purposes.
You need to install Windows 7 Professional on all Windows 7 Ultimate portable computers.
What should you do?
A. Supply the Windows 7 Professional KMS key.
B. Launch Windows Anytime Upgrade.
C. Launch Windows Update.
D. Perform a clean installation over the existing system partition.
E. Perform a clean installation on a non-system partition.
Answer: D
Q140. - (Topic 3)
You have two computers named Computer1 and Computer2 that run Windows 7.
You use Remote Desktop to connect from Computer1 to Computer2.
You need to prevent the desktop background of Computer2 from being displayed when you use Remote Desktop to connect to Computer2.
What should you do on Computer1?
A. From the Personalization options, change the theme.
B. From the System properties, modify the Remote settings.
C. From the Remote Desktop Connection options, modify the Performance setting.
D. From the Remote Desktop Connection options, modify the Display configuration settings.
Answer: C
Explanation:
Configuring the Desktop ExperienceYou can configure the connection speed and fine-tune the desktop environment for optimal performance by using the settings located on the Experience tab of the Remote Desktop Connection tool. Most of these settings relate to the graphical nature of the desktop. Because the processing for graphics happens on the server and must be transmitted to the desktop over the network connection, you can increase performance by allowing only the minimal settings that are necessary for your users. When you choose a connection speed, the check boxes are automatically selected to indicate the recommended settings for the richest visual experience possible at that speed.ExperienceConfigure the connection speed and adjust the desktop environment for optimal performance.Desktop background Allows user to choose a custom background or wallpaper for their desktop. Because these can be very graphicintensive, disable this setting unless it is necessary for your users.