Act now and download your Microsoft 70-680 test today! Do not waste time for the worthless Microsoft 70-680 tutorials. Download Rebirth Microsoft TS:Windows 7,Configuring exam with real questions and answers and begin to learn Microsoft 70-680 with a classic professional.

2021 Apr 70-680 latest exam

Q281. - (Topic 1) 

You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate. 

You need to ensure that your user account can decrypt all EFS files on the computer. 

What should you do? 

A. From Credential Manager, add a Windows credential. 

B. From Credential Manager, add a certificate-based credential. 

C. From the local computer policy, add a data recovery agent. 

D. From the local computer policy, modify the Restore files and directories setting. 

Answer:

Explanation: 

EFS Recovery Recovery Agents are certificates that allow the restoration of EFS encrypted files. When a recovery agent has been specified using local policies, all EFS encrypted files can be recovered using the recovery agent private key. You should specify a recovery agent before you allow users to encrypt files on a client running Windows 7. You can recover all files that users encrypt after the creation of a recovery agent using the recovery agent's private key. You are not able to decrypt files that were encrypted before a recovery agent certificate was specified. You create an EFS recovery agent by performing the following steps: 

1. Log on to the client running Windows 7 using the first account created, which is the default administrator account. 

2. Open a command prompt and issue the command Cipher.exe /r:recoveryagent 

3. This creates two files: Recoveryagent.cer and Recoveryagent.pfx. Cipher.exe prompts you to specify a password when creating Recoveryagent.pfx. 

4. Open the Local Group Policy Editor and navigate to the \Computer Configuration\Windows Settings\Security Settings\Public Key Policies\Encrypting File System node. Right-click this node and then click Add Data Recovery Agent. Specify the location of Recoveryagent.cer to specify this certificate as the recovery agent. 

5. To recover files, use the certificates console to import Recoveryagent.pfx. This is the recovery agent's private key. Keep it safe because it can be used to open any encrypted file on the client running Windows 7. 


Q282. - (Topic 5) 

You have a computer that runs Windows 7. The computer is a member of a workgroup. 

You use Encrypting File System (EFS) to protect your local files. 

You need to ensure that you can decrypt EFS files on the computer if you forget your password. 

What should you do? 

A. From Authorization Manager, modify the Authorization Manager options. 

B. From Credential Manager, select Back up vault. 

C. Create an EFS Data Recovery Agent by using Group Policy. 

D. From User Accounts, select Manage your file encryption certificates. 

Answer:

Explanation: Data Recovery Agent (DRA) is a user account that has been granted permissions to access all encrypted files even if the files have been encrypted using encryption key of another user account of the computer. Administrators must create and configure Data Recovery Agents before allowing users to encrypt their files. This serves as a proactive step taken by the administrators as once user account that has encrypted the file has been deleted from the computer, in the absence of DRA the files cannot be recovered whatsoever. 


Q283. - (Topic 4) 

Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers are members of an Active Directory domain. You use a computer named Client1. 

You plan to collect events from Client1 on Server1 by using HTTPS. On Server1, you start and configure the Windows Event Collector service. ON Client1, you start the Windows Remote Management Service. 

You discover that no events are being collected. 

You need to ensure that events are forwarded from Client1 to Server1. 

What should you do? 

A. On Client1, create an inbound rule to allow port 5986 for the Public connection type. 

B. On Server1, create a Windows Event Collector firewall exception for the connection type. 

C. On Client1, create an outbound Rule to allow port 443 for the Domain connection type. 

D. ON Client1, create an inbound rule to allow port 5986 for the Domain connection type. 

Answer:


Q284. - (Topic 2) 

You have a computer that runs Windows 7. 

You need to identify how much disk space is occupied by previous versions. 

What should you do? 

A. At a command prompt, run Diskpart. 

B. At a command prompt, run Vaultcmd. 

C. From System, view the System Protection settings. 

D. From the properties of drive C, view the previous versions settings. 

Answer:

Explanation: 

NOT Diskpart: 

Microsoft command-line tool Diskpart is used to create and format volumes on the target computer.NOT Vaultcmd:Creates, displays and deletes stored credentials.NOT Properties of drive C:Allows you to view contents, but does not show size. 


Q285. - (Topic 1) 

A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named Group1. 

The computer contains a folder named Folder1. 

You need to configure the permissions on Folder1 to meet the following requirements: 

User1 must be allowed to delete all files in Folder1 

Members of Group1 must be able to create files in Folder1 

All other members of Group1 must be prevented from deleting files they did not create in Folder1 

All users must be prevented from modifying the permissions on Folder1 

What should you do? 

A. Assign Group1 the Write permission. Assign User1 the Modify permission. 

B. Assign Group1 the Modify permission. Assign User1 the Write permission. 

C. Deny Group1 the Write permission. Assign User1 the Modify permission. 

D. Deny Group1 the Modify permission. Assign User1 the Write permission. 

Answer:

Explanation: 

File and Folder Permissions ReadFolders: Permits viewing and listing of files and subfoldersFiles: Permits viewing or accessing of the file's contentsWriteFolders: Permits adding of files and subfoldersFiles: Permits writing to a fileRead & ExecuteFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by files and folders Files: Permits viewing and accessing of the file's contents as well as executing of the fileList Folder ContentsFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by folders onlyFiles: N/AModifyFolders: Permits reading and writing of files and subfolders; allows deletion of the folderFiles: Permits reading and writing of the file; allows deletion of the fileFull ControlFolders: Permits reading, writing, changing, and deleting of files and subfoldersFiles: Permits reading, writing, changing and deleting of the file 


Update 70-680 testing engine:

Q286. - (Topic 1) 

You have a portable computer that runs Windows 7. You configure the computer to enter sleep mode after 10 minutes of inactivity. You do not use the computer for 15 minutes and discover that the computer has not entered sleep mode. 

You need to identify what is preventing the computer from entering sleep mode. 

What should you do? 

A. At a command prompt, run Powercfg energy. 

B. At a command prompt, run Systeminfo /s localhost. 

C. From Performance Monitor, review the System Summary. 

D. From Performance Information and Tools, review the detailed performance and system information. 

Answer:

Explanation: 

Command-line Power Configuration Powercfg.exe is a command-line utility that you can use from an administrative command prompt to manage Windows 7 power settings. It is possible to use Powercfg.exe to configure a number of Windows 7 powerrelated settings that you cannot configure through Group Policy or the Advanced Plan Settings dialog box. You can use Powercfg.exe to configure specific devices so that they are able to wake the computer from the Sleep state. You can also use Powercfg.exe to migrate power policies from one computer running Windows 7 to another by using the import and export functionality. -energy Check the computer for common energy-efficiency and battery life problems. Provides report in Hypertext Markup Language (HTML) format.For more information on Powercfg.exe, consult the following Microsoft TechNet document: http://technet.microsoft.com/en-us/library/cc748940.aspx. 


Q287. - (Topic 1) 

You have a reference computer that runs Windows 7. 

You plan to create an image of the computer and then deploy the image to 100 computers. 

You need to prepare the reference computer for imaging. 

What should you do before you create the image? 

A. Run Package Manager. 

B. Run the System Preparation tool. 

C. Install the User State Migration Tool. 

D. Install Windows Automated Installation Kit. 

Answer:

Explanation: 

Sysprep Sysprep is a tool designed for corporate system administrators, OEMs, and others who need to deploy the Windows. XP operating system on multiple computers. After performing the initial setup steps on a single system, you can run Sysprep to prepare the sample computer for cloning. Sysprep prepares the image for capture by cleaning up various user-specific and computer-specific settings, as well as log files. The reference installation now is complete and ready to be imaged. 


Q288. - (Topic 3) 

You manage several computers that run Windows 7. 

A user wants to roll back a driver. 

The user opens the device properties in Device Manager and discovers that the Roll Back Driver option is unavailable. 

You connect to the computer by using Windows Remote Assistance. 

You need to roll back the driver to its previous version. 

What should you do first? 

A. Add the user to the Power Users group. 

B. Right-click Device Manager and select Run as administrator. 

C. From System Properties, modify Device Installation Settings. 

D. From the Local Group Policy, modify Device Installation Restrictions. 

Answer:

Explanation: 

You can open Device Manager on a computer running Windows 7 while logged on with any account. However, by default, only administrators can make changes to devices and install, uninstall, and roll back drivers. You can open Device Manager in the following ways: - In Control Panel, click Hardware And Sound. Click Device Manager under Devices And Printers. 

-Click Start, right-click Computer, and choose Manage. Click Device Manager in the Computer Management tree pane. 

-Open an elevated command prompt and enter mmc devmgmt.msc. Note that if you do not run the command prompt as administrator, Device Manager opens as read-only. 


Q289. - (Topic 3) 

You have a computer that runs Windows 7 Professional. 

You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time. 

What should you do? 

A. Run Windows Update. 

B. Run Windows Anytime Upgrade. 

C. From the Windows 7 installation media, run Setup.exe. 

D. From the Windows 7 installation media, run Migwiz.exe. 

Answer:

Explanation: 

Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small 

businesses where a small number of intra-edition upgrades is required. 

Windows Anytime Upgrade 


Q290. HOTSPOT - (Topic 4) 

A company has client computers that run Windows 7. You create an AppLocker policy for the client computers. 

You need to ensure that the AppLocker policy is enforced after the computer restarts. 

Which service should you modify? (To answer, select the appropriate setting or settings in the work area.) 

Answer: