Printable of 70 680 exam test question materials and software for Microsoft certification for examinee, Real Success Guaranteed with Updated 70 680 pdf pdf dumps vce Materials. 100% PASS TS:Windows 7,Configuring exam Today!

Q41. - (Topic 2) 

You have a computer that runs Windows 7. 

You view the properties of a file on the computer as show in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can configure permissions on the file. 

What should you do? 

A. From Folder Options, modify the View settings. 

B. Move the file to a disk that has the NTFS file system. 

C. Open Windows Explorer by using elevated privileges. 

D. Hold the SHIFT key, right-click the file, and click Properties. 

Answer:

Explanation: 

Missing options hints not on NTFS. On NTFS volumes, you can set security permissions on files and folders. These permissions grant or deny access to the files and folders. You can view security permissions for files and folders by completing the following steps: 1. In Windows Explorer, right-click the file or folder you want to work with. 2. From the pop-up menu, select Properties, and then in the Properties dialog box click the Security tab.3. In the Name list box, select the user, contact, computer, or group whose permissions you want to view. If the permissions are dimmed, it means the permissions are inherited from a parent object. 


Q42. - (Topic 3) 

You have a computer that runs Windows 7. The computer has a single volume. You install 15 applications and customize the environment. 

You complete the following actions: 

Create an export by using Windows Easy Transfer 

Create a system image by using Backup and Restore 

Install the User State Migration Tool (USMT) and run Scanstate 

The disk on the computer fails. You replace the disk. 

You need to restore the environment to the previous state. 

What should you do? 

A. Install Windows 7, install USMT, and then run Loadstate. 

B. Install Windows 7 and then import the Windows Easy Transfer package. 

C. Start the computer from a Windows Recovery Environment (Windows RE) disk and then run Bcdboot.exe. 

D. Start the computer from a Windows Recovery Environment (Windows RE) disk and then restore the system image. 

Answer:

Explanation: 

Restoring from a System Image Backup 

A System Image restore rewrites the entire contents of a system volume. Therefore, you restore from a System Image backup by booting from the Windows 7 Installation DVD-ROM and loading System Recovery tools or by pressing F8 during the boot process. Restoring from a System Image backup enables you to quickly get a computer running after you replace a failed hard disk, or if the operating system installation has been corrupted (for example, by malware that cannot be removed except 0 by wiping the disk). It is sometimes known as complete recovery or complete PC Restore. This procedure assumes that the System Recovery Options (otherwise known as the Windows Recovery Environment, or Windows RE) files are present on the DVD-ROM. If not, you can boot from the installation DVD-ROM and press F8 during the boot to access the Advanced Boot Options, as described in the next section of this lesson. To restore a System Image backup, perform the following steps: 

1. Ensure the backup medium is connected to your computer.2. Insert the Windows 7 DVD-ROM. Ensure that the computer BIOS is configured to boot from the DVD-ROM.3. Restart your computer. When prompted to boot from DVD-ROM, press any key.4. Windows 7 Setup loads. When prompted, select your regional preferences and then click Next.5. Click Repair Your Computer.6. In the System Recovery Options dialog box, click Restore Your Computer Using System Image. If thebackup was saved to a DVD-ROM, insert the DVD-ROM now. Click Next. The Windows System Image Restore Wizard starts.7. On the Select A System Image Backup page, the most recent backup is automatically selected. If this is the backup you want to restore, click Next. Otherwise, click Select A System Image, click Next, and then select the desired backup.8. On the Choose Additional Restore Options page, select the Format And Repartition Disks check box if you want to reformat the disk and overwrite all data, or if the disk is not formatted. If you do not want to overwrite all the data on your current disk, do not select this check box. Click Next.9. Click Finish. When prompted, click Yes to confirm. Windows System Image Restore reads the data from the backup and overwrites existing files. You can restore to a different-sized hard disk, provided that the hard disk is large enough to store the backup. After the restore is complete, the computer restarts using the restored system volume. 


Q43. - (Topic 2) 

A remote user has a computer that runs Windows 7. The user reports that he receives several error messages while using an application. You do not have remote access to the user's computer. 

You need to tell the user how to create screenshots of the actions he performs on the computer. 

The solution must track the mouse actions that the user performs. What should you instruct the user to do? 

A. Press ALT+PrintScreen 

B. Run Psr.exe and then click Start Record 

C. From Mouse Properties, select Display pointer trails 

D. Run Snippingtool.exe, click New, and then click Window Snip 

Answer:

Explanation: 

How do I use Problem Steps Recorder?You can use Problem Steps Recorder to automatically capture the steps you take on a computer, including a text description of where you clicked and a picture of the screen during each click (called a screen shot). Once you capture these steps, you can save them to a file that can be used by a support professional or someone else helping you with a computer problem.NotesWhen you record steps on your computer, anything you type will not be recorded. If what you type is an important part of recreating the problem you're trying to solve, use the comment feature described below to highlight where the problem is occurring. 


Q44. - (Topic 2) 

You have a workgroup that contains five computers. The computers run Windows 7. 

A computer named Computer1 has video and audio files. 

You need to share Computer1's video and audio files on the network. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Create a HomeGroup. 

B. Move the files to a Media Library. 

C. Enable all BranchCache rules in Windows Firewall. 

D. Connect a removable drive and enable BitLocker To Go. 

Answer: A,B 

Explanation: 

HomeGroup ConnectionsThis option decides how authentication works for connections to HomeGroup resources. If all computers in the HomeGroup have the same user name and passwords configured, you can set this option to allow Windows to manage HomeGroup connections. If different user accounts and passwords are present, you should configure the option to use user accounts and passwords to connect to other computers. This option is available only in the Home/Work network profile.Media Library SharingBefore you turn on Media Library Sharing for a shared folder, you should know that Media Library Sharing bypasses any type of user-account access that you set for the shared folder. For example, let's say that you turn on Media Library Sharing for the Photos shared folder, and you set the Photos shared folder to No Access for a user account named Bobby. Bobby can still stream any digital media from the Photos shared folder to any supported digital media player or DMR. If you have digital media that you do not want to stream in this manner, store the files in a folder that does not have Media Library Sharing turned on. If you turn on Media Library Sharing for a shared folder, any supported digital media player or DMR that can access your home network can also access your digital media in that shared folder. For example, if you have a wireless network and you have not secured it, anybody within range of your wireless network can potentially access your digital media in that folder. Before you turn on Media Library Sharing, make sure that you secure your wireless network. For more information, see the documentation for your wireless access point. 


Q45. - (Topic 5) 

You administer computers that have Windows 7 and Internet Explorer 8 installed. 

You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. 

You need to ensure that any data about your browser session is not saved on the computer. 

What should you do? 

A. From the Safety drop-down menu, configure InPrivate Filtering. 

B. Start the Microsoft Network Access Protection service. 

C. From Internet Options, select Delete browsing history on exit. 

D. From Internet Options, on the Advanced tab, clear Enable DOM Storage. 

Answer:


Q46. - (Topic 2) 

You have a computer that runs windows 7. 

You log on to the computer by using a user account that is a member of Administrator Group. 

From Windows Explorer you open C:\windows\system32\drivers\etc\hosts in notepad. 

You attempt to save the file and receive the save as dialog box. 

You need to ensure that you can save changes to c:\windows\system32\drivers\ 

What should you do? 

A. Stop the windows search service 

B. Remove the inherited permissions from the file. 

C. Start Windows Notepad by using elevated privileges. 

D. Change the user account control (UAS) settings to Notify Me Only when programs try to make changes to my computer. 

Answer:

Explanation: 

Windows 7 does not allow applications to write data to these secure locations. 

User Account Control (UAC)UAC is a security feature of Windows 7 that informs you when 

the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks.Privilege elevationAll users of clients running Windows 7 run with the rights of a standard user. When a user attempts an act that requires administrative privileges, such as creating a new user account, her rights need to be raised from those of a standard user to those of an administrative user. This increase in rights is termed privilege elevation. UAC is a gateway to privilege elevation. It allows users who are members of the local Administrators group to access administrative rights, but ensures that the person accessing the Administrative rights is aware that they are doing so. This privilege elevation occurs only for a specific task. Another task executed at the same time that also requires privilege elevation generates its own UAC 


Q47. - (Topic 4) 

You use a desktop computer that has Windows 7 SP1 Ultimate installed. 

You update the driver for the computer's sound card and the computer becomes unresponsive. 

You need to be able to roll back the sound card driver. 

What should you do? 

A. Boot from the computer from a Windows Recovery Environment (Windows RE) disk, and then restore the system image. 

B. Start the computer, press F8, and then select Repair Your Computer. 

C. Start the computer, press F8, and then select Debugging Mode. 

D. Restart the computer in safe mode. 

Answer:


Q48. - (Topic 1) 

A user wants to install the games included with Windows 7 on his PC. They were not installed by default. 

Windows components can be added or removed using which of the following in Windows 7. 

A. Click the Start Bar, Control Panel, Add/Remove Programs, and click Windows Components. 

B. Click the Start Bar, Control Panel, Programs, then click Turn Windows features on or off. 

C. Click the Start Bar, Settings, Windows Control Center. 

D. Right click the "My Computer" icon, Choose Properties, Choose Computer Management, on the left pane choose Add Remove Windows Components. 

Answer:


Q49. - (Topic 2) 

You have a computer that runs Windows 7. The computer contains one hard disk. The hard disk is configured as shown in the following table. 

You install a new 250-GB hard disk in the computer. 

You need to ensure that all the files on the computer are available if a single disk fails. 

What should you do? 

A. Create a mount point on C and D and then create a striped volume. 

B. Create a mount point on C and D and then create two striped volumes. 

C. Convert both disks to dynamic disks and then create a mirrored volume. 

D. Convert both disks to dynamic disks and then create two mirrored volumes. 

Answer:

Explanation: 

Creating a Mirrored Volume (RAID-1)A mirrored or RAID-1 volume provides availability and fault tolerance but does not improve performance. It uses two disks (or two portions on separate disks) that are the same size. Any changes made to the first disk of a mirror set are also made to its mirror disk. If the first disk fails, the mirror is broken and the second disk is used until the first is repaired or replaced. The mirror is then re-created, and the information on the working disk is mirrored on the repaired disk. The disadvantage of RAID-1 is that you need (for example) two 200-GB disks to hold 200 GB of data. The advantage is that you can mirror a system disk containing your operating system.You create a mirrored volume using a very similar procedure to the one that creates a striped volume, except that you right-click the first disk of your mirror and click New Mirrored Volume to start the appropriate wizard. You then select the second disk. The second disk needs to have a portion of unallocated space that is at least as large as the disk you want to mirror. The drive letter for a mirrored volume is the same as the drive letter of the first disk. You can also use the Diskpart tool to create a mirrored volume. At the DISKPART> prompt you first use the select disk command to select the first disk. You then enter a command with the syntax add disk=<n>to specify the mirror disk. 


Q50. - (Topic 3) 

Your company uses Windows Deployment Services (WDS) to deploy Windows 7. 

You create a new image of Windows 7. 

You need to ensure that you can deploy the image by using WDS. 

What should you do? 

A. From the Windows Deployment Services snap-in, add a new install image. 

B. From the Windows Deployment Services snap-in, add a new boot image. 

C. Run Oscdimg.exe and specify the -boot parameter. Copy the image to C:\remoteinstall\boot. 

D. Run Imagex.exe and specify the /append parameter. Copy the image to C:\remoteinstall\images. 

Answer:

Explanation: 

Windows Deployment ServicesWDS provides a PXE-booted version of Windows PE. A WDS image is contained in a WIM file and is booted over the network into a RAMDisk. The installation then proceeds under Windows PE. The process of capturing a WIM image into a WDS server is similar to the use of ImageX and Sysprep except that the last step involves booting into the WDS capture image. This is a Windows PE image that helps you capture a client system to the WDS server. WDS is relatively lightweight compared to other image deployment methods such as MDT and provides a method that can be faster than an optical media-based installation of Windows. You use WDS images to deploy system files to client computers. A number of image files exist; for example, you use a capture image to create an install image. Install ImageAn install image is an operating system image that you deploy to the client computer. Typically, this is a WIM file.Boot ImageA boot image is a Windows PE image into which you boot a client before you install the WIM image file. To install Windows 7, you first boot the computer into the boot image, and then you select the install image to install. Unless you are using a reference computer and adding applications to the image, you should use the standard boot image that is included on the Windows 7 installation media (Install.wim). Capture and discover images are types of boot images. (need install image not boot)NOT OscdimgOscdimg is a command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660, Joliet, and Universal Disk Format (UDF) file systems. (-boot : need install image not boot)NOT ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice.