Exam Code: microsoft 70 680 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: TS:Windows 7,Configuring
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70 680 exam Exam.
Q141. - (Topic 1)
You have a computer named Computer1 that runs Windows 7.
You need to ensure that Computer1 can connect to File Transfer Protocol (FTP) servers only while it is connected to a private network.
What should you do?
A. From Windows Firewall with Advanced Security, create a new rule.
B. From the local Group Policy, modify the application control policies.
C. From Windows Firewall, modify the Allowed Programs and Features list.
D. From Network and Sharing Center, modify the Advanced Sharing settings.
Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, shown in Figure 7-7, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.
Q142. - (Topic 1)
You have a stand-alone computer named Computer1 that runs Windows 7. Several users share Computer1.
You need to prevent all users who are members of a group named Group1 from running Windows Media Player. All other users must be allowed to run Windows Media Player.
You must achieve this goal by using the least amount of administrative effort. What should you do?
A. From Software Restriction Policies, create a path rule.
B. From Software Restriction Policies, create a hash rule.
C. From Application Control Policies, create the default rules.
D. From Application Control Policies, create an executable rule.
Executable Rules Executable rules apply to files that have .exe and .com file extensions. AppLocker policies are primarily about executable files, and it is likely that the majority of the AppLocker policies that you work with in your organizational environment will involve executable rules. The default executable rules are path rules that allow everyone to execute all applications in the Program Files folder and the Windows folder. The default rules also allow members of the administrators group to execute applications in any location on the computer. It is necessary to use the default executable rules, or rules that mirror their functionality, because Windows does not function properly unless certain applications, covered by these default rules, are allowed to execute. When you create a rule, the scope of the rule is set to Everyone, even though there is not a local group named Everyone. If you choose to modify the rule, you can select a specific security group or user account. NOT Default rulesDefault rules are a set of rules that can be created automatically and which allow access to default Windows and program files. Default rules are necessary because AppLocker has a built-in fallback block rule that restricts the execution of any application that is not subject to an Allow rule. This means that when you enable AppLocker, you cannot execute any application, script, or installer that does not fall under an Allow rule. There are different default rules for each rule type. The default rules for each rule type are general and can be tailored by administrators specifically for their environments. For example, the default executable rules are path rules. Security-minded administrators might replace the default rules with publisher or hash rules because these are more secure.NOT Path RulesPath rules, allow you to specify a file, folder, or registry key as the target of a Software Restriction Policy. The more specific a path rule is, the higher its precedence. For example, if you have a path rule that sets the file C: \Program files\Application\App.exe to Unrestricted and one that sets the folder C:\Program files\Application to Disallowed, the more specific rule takes precedence and the application can execute. Wildcards can be used in path rules, so it is possible to have a path rule that specifies C:\Program files\Application\*.exe. Wildcard rules are less specific than rules that use a file's full path. The drawback of path rules is that they rely on files and folders remaining in place. For example, if you created a path rule to block the application C:\Apps\Filesharing.exe, an attacker could execute the same application by moving it to another directory or renaming it something other than Filesharing.exe. Path rules work only when the file and folder permissions of the underlying operating system do not allow files to be moved and renamed.NOT Hash RulesHash rules, work through the generation of a digital fingerprint that identifies a file based on its binary characteristics. This means that a file that you create a hash rule for will be identifiable regardless of the name assigned to it or the location from which you access it. Hash rules work on any file and do not require the file to have a digital signature. The drawback of hash rules is that you need to create them on a per-file basis. You cannot create hash rules automatically for Software Restriction Policies; you must generate each rule manually. You must also modify hash rules each time that you apply a software update to an application that is the subject of a hash rule. Software updates modify the binary properties of the file, which means that the modified file does not match the original digital fingerprint.
Q143. - (Topic 2)
You have a computer that runs Windows XP Service Pack 2 (SP2).
You need to upgrade the operating system to Windows 7.
You must achieve this goal in the minimum amount of time.
What should you do?
A. Upgrade to Windows Vista SP2. From the Windows 7 installation media, run Setup.exe and select the Upgrade option.
B. Upgrade to Windows Vista SP2. From the Windows 7 installation media, run Setup.exe and select the Custom (advanced) option.
C. Install Windows XP Service Pack 3 (SP3). Run Setup.exe from the Windows 7 installation media and select the Upgrade option.
D. Install Windows XP Service Pack 3 (SP3). Run Setup.exe from the Windows 7 installation media and select the Custom (advanced) option.
Q144. - (Topic 2)
You have 20 client computers. The computers run Windows XP. They are joined in a domain.
You plan to perform a clean installation of Windows 7 on the computers.
You need to transfer all users documents and settings. You must exclude music and video files.
You must achieve this goal by using the minimum amount of administrative effort.
What should you do first?
A. Create a config.xml file. Configure a logon script for the Windows XP computers to launch Loadstate.exe
B. Modify the migapp.xml file. Configure a logon script for the Windows XP computers to launch Scanstate.exe
C. Modify the miguser.xml file. Configure a logon script for the Windows XP computers to launch Migwiz.exe
D. Modify the migdocs.xml file. Configure a logon script for the Windows XP computers to launch Scanstate.exe
MigDocs.xmlThis file contains information on the location of user documents. NOT Config.xmlThis file is different from the other migration files as it is used to exclude features from the migration. You can create and modify the Config.xml file using ScanState.exe with the /genconfig option.NOT MigUser.xmlMigUser.xml This file contains rules about user profiles and user data. The default settings for this file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu, Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc, .dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*, .pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, accdb, .mdb, .pub, .xla, .xlb and .xls. The asterisk ( *) represents zero or more characters.NOT MigApp.xml This file contains rules about migrating application settings. These include Accessibility settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service (RAS) connection phone book files, regional options, remote access, screen-saver settings, taskbar settings, and wallpaper settings.
Q145. - (Topic 4)
A company has client computers that run Windows 7 Enterprise.
You need to ensure that only signed and validated executable files are run with elevated privileges.
What should you use to achieve this goal?
A. the folder properties window
B. the icacls command
C. Device Manager
D. share permissions
E. the Group Policy management console
F. Local Users and Groups
G. the netsh command
H. the Services management console
I. the User Account Control Settings Controal Panel window
http://www.mcmcse.com/microsoft/guides/70-680/configure_uac.shtml Accessed through secpol.msc too
Q146. - (Topic 1)
You are creating an unattend answer file for automatic Windows 7 installation. What can you use to do this? Choose two.
A. The Windows SIM tool in Windows AIK
B. Microsoft Notepad
C. The Deployment Workbench MDT tool
Q147. HOTSPOT - (Topic 4)
You are running windows 7 on a portable computer. A custom power plan named "On The Move" is optimized for battery life.
The computer enters sleep mode when the portable computer is closed.
You need to change a setting so that when you close the portable computer, nothing happens.
Which setting should you change? (To answer, select the appropriate setting in the work area.)
Q148. - (Topic 1)
In Windows 7 you can control when users such as kids can login to Windows 7.
Which of the following best describes where to configure this option?
A. You cannot choose this feature unless you are connected to a domain.
B. Go to the Start, Control Panel, User Accounts and Family Safety, Setup Parental Controls, and then choose Time Restrictions.
C. Go to Start, Control Panel. User Profiles, and then Time Restriction Settings.
D. Go to the Homegroup settings and choose Offline Time Settings.
Q149. - (Topic 3)
You have a computer that runs Windows 7.
You install a third-party Web browser.
You discover that HTML files are no longer associated with Windows Internet Explorer.
You need to ensure that Internet Explorer starts whenever a HTML file is opened.
What should you do from Internet Options?
A. Open the Connections tab and click Setup.
B. Open the General tab and click Use default.
C. Open the Programs tab and click Make default.
D. Open the Programs tab and click Manage add-ons.
Change your default web browser
This information applies to Internet Explorer 8 or Internet Explorer 7 running on Windows 7,
Windows Vista, Windows Server 2008, Windows XP Service Pack 2 and Service Pack 3, and Windows Server 2003.
To make Internet Explorer your default web browser
1. Click to open Internet Options.
2. Click the Programs tab, and then click Make default.
Q150. - (Topic 2)
You have a computer that runs Windows 7. The computer's disk is configured as shown in the exhibit. (Click the Exhibit button.)
You need to extend volume C.
What should you do first?
A. Back up and delete volume D.
B. Convert disk 0 to a dynamic disk.
C. Remove the crash dump from volume C.
D. Move the paging file from volume C to volume E.
Extend a Basic Volume You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume, it must be raw or formatted with the NTFS file system. You can extend a logical drive within contiguous free space in the extended partition that contains it. If you extend a logical drive beyond the free space available in the extended partition, the extended partition grows to contain the logical drive. For logical drives, boot, or system volumes, you can extend the volume only into contiguous space and only if the disk can be upgraded to a dynamic disk. For other volumes, you can extend the volume into noncontiguous space, but you will be prompted to convert the disk to dynamic.