Proper study guides for Refresh Microsoft TS:Windows 7,Configuring certified begins with Microsoft exam 70 680 preparation products which designed to deliver the 100% Guarantee 70 680 pdf questions by making you pass the 70 680 exam test at your first time. Try the free 70 680 practice test demo right now.

Q151. HOTSPOT - (Topic 4) 

You are performing an audit of the installed updates on a computer running Windows 7 Enterprise. 

You need to find a list of the installed updates on the computer. 

Which settings categories should you choose? (To answer, select the appropriate settings in the work area.) 


Q152. - (Topic 3) 

You need to create a VPN connection. 

What should you do? 

A. From Windows Explorer, right-click Computer and then click Map network drive. 

B. From Windows Explorer, right-click Computer and then click Add a network location. 

C. From Network and Sharing Center, click Set up a new connection or network and then click Set up a new network. 

D. From Network and Sharing Center, click Set up a new connection or network and then click Connect to a workplace. 



Virtual Private Networks When you create a VPN connection, you need to specify the address of the VPN server that you are connecting to and your authentication credentials. You can create a new VPN connection in the Network And Sharing Center by clicking Set Up A New Connection Or Network and then Connect to a Workplace. When you create a new VPN connection, Windows 7 sets the VPN type to Automatic. You can configure a connection to use a specific VPN protocol, but if you do this, Windows 7 does not try to use other VPN protocols if the protocol you select is not available. 

Q153. - (Topic 2) 

You have a computer named Computer1 that runs Windows 7. Computer1 is a member of an Active Directory domain. Remote Desktop is enabled on the computer. 

You share a folder on Computer1. 

You need to configure Computer1 to meet the following requirements: 

Allow computers in the local subnet to access the shared folder 

Prevent computers in remote subnets from accessing the shared folder 

Allow all computers to connect to Computer1 by using Remote Desktop 

What should you do? 

A. Modify the subnet mask. 

B. Modify the Public folder sharing settings. 

C. Disable network discovery on all computers located in remote subnets. 

D. Modify the properties of the File and Printer Sharing firewall exceptions. 



Network ProfilesNetwork profiles are important because you can use them to apply different collections of firewall rules based on which network profile is active. A significant difference between Windows Vista and Windows 7 is that in Windows 7, profiles apply on a per-network interface basis. This means that if you have one network adapter connected to the Internet and another connected to your office LAN, different sets of rules apply for each connection. The firewall in Windows Vista chooses the most restrictive network profile when a computer has connections to different network types and applies the most restrictive set of rules to all interfaces.Allowing Programs Through Windows FirewallWindows Firewall allows you to configure exceptions based on programs. This differs from Windows Vista where Windows Firewall would allow you to configure exceptions based on port address. You can still create rules based on port address; you just have to do it using WFAS, covered later in this lesson. You can also allow specific Windows 7 features, such as Windows Virtual PC, through Windows Firewall. Feature rules become available when you enable the feature using the Programs And Features item in Control Panel. To add a rule for a feature or program, click Allow A Program Or Feature Through Windows Firewall item in the Windows Firewall section of Control Panel. The figure shows a list of currently installed features and any programs for which rules have been created as well as the profiles for which rules concerning those programs and features are enabled.File and Printer Sharing This feature is used for sharing local files and printers with other users on the network. (Uses NetBIOS, LLMNR, SMB and RPC) 

Q154. - (Topic 5) 

You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits: 

. The Disk Management console (Click the Exhibit button.) 

. The System Properties window (Click the Exhibit button.) 

. The System protection for Local Disk C window (Click the Exhibit button.) 

You share the Pictures library over a network. 

You discover that a JPEG image file located in the library was moved by a network user into a ZIP archive and is protected by using a password. 

You need to open the image file. 

What should you do? 

A. Delete restore points. 

B. Create a restore point. 

C. Perform a system restore. 

D. Search for the file in the Recycle Bin. 

E. Increase disk space used for system protection. 

F. Copy the file from a previous version of a folder. 

G. Set restore settings to only restore previous versions of files. 

H. Run the cipher /x command from the elevated command prompt, 

I. Run the vssadmin list volumes command from the elevated command prompt. 

J. Run the vssadmin list shadows command from the elevated command prompt, 

K. Run the compact /U <file_name> command from the elevated command prompt. 



Note: To restore a previous version of a file or folder that's included in a library, right-click the file or folder in the location where it's saved, rather than in the library. For example, to restore a previous version of a picture that's included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions. 

Q155. DRAG DROP - (Topic 4) 

A company has client computers that run Windows XP. The company plans to upgrade all the client computers to Windows 7. Each employee will keep the same computer. 

You need to upgrade the client computers from Windows XP to Windows 7 while maintaining each user's files and settings. 

Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 


Q156. DRAG DROP - (Topic 6) 

You are a systems administrator for a company that uses Windows 7 computers. 

The company plans on upgrading all the computers. You have configured one computer, named SOURCE, with a power plan that meets a criteria for reduced power consumption. You want to test this power plan on another computer named DEST. 

You need to transfer the power plan from SOURCE to DEST. 

Which three actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. ) 


Q157. - (Topic 5) 

You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point. You set the startup type of the NAP Agent service to Automatic on the computer. 

You need to complete the configuration of the computer as a NAP client. 

What should you do? 

A. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the ipconfig command. 

B. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the net command. 

C. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command. 

D. From the NAP Client Configuration console, configure the Health Registration settings. 


Q158. - (Topic 3) 

You have a computer that runs Windows 7. 

You need to prevent ActiveX controls from running in Windows Internet Explorer. 

Which Internet Explorer settings should you modify? 

A. Content 

B. Encoding 

C. Safety 

D. Security 



Security You can use the slider to adjust the security level assigned to a zone. You can also configure whether a zone uses Protected Mode and Configure Custom Zone settings. Protected Mode is a technology that forces Internet Explorer to run as a low-integrity process. The security architecture of Windows 7 means that processes that are assigned lower integrities are unable to interact directly with objects that are assigned higher integrities. This means that any malware that might compromise the browser is blocked from causing damage to Windows 7 because it is unable to cause problems as a low-integrity process. The design of Windows 7 allows the processes that run in each tab to be separate from each other. This means that a tab that has a Web site in Protected Mode can run alongside a tab that has a site that is not running in Protected Mode. Sites that you do not trust, such as those on the Internet or within the Restricted Sites zone, are run in Protected Mode. 

The three default security levels are Medium, Medium-High, and High. Each level is more restrictive, with High being the most restrictive. You can use the Custom Level button to configure a custom level of security for a zone. Items that can be configured include ActiveX control behavior, scripting, and user authentication settings. Unless your organization has unusual security requirements, the default security levels are usually sufficient. 

Q159. - (Topic 3) 

You have a computer named Computer1 that runs Windows 7 and Windows Internet Explorer 8. 

A user reports that Computer1 has a number of Internet Explorer configuration issues that cause instability when browsing the Internet. 

You need to configure Internet Explorer to use all default settings. 

What should you do from Internet Options? 

A. From the Advanced tab, click Reset. 

B. From the Programs tab, click Set programs. 

C. From the Advanced tab, click Restore advanced settings. 

D. From the Security tab, click Reset all zones to default level. 



Reset Internet Explorer settings By resetting Internet Explorer settings, you return Internet Explorer to the state it was in when it was first installed on your computer. This is useful for troubleshooting problems that might be caused by settings that were changed after installation. When you delete personal settings, some webpages that rely on previously stored cookies, form data, passwords, or previously installed browser add-ons might not work correctly. Resetting Internet Explorer to its default settings does not delete your favorites, feeds, Web Slices, and a few other personalized settings. See the table below for a complete list of all settings and information about whether they are reset or maintained. Resetting Internet Explorer's settings is not reversible. After a reset, all previous settings are lost and cannot be recovered. Rather than resetting everything, you might want to reset specific settings or delete your webpage history. For more information, see the links at the bottom of this topic. 

To reset Internet Explorer settings 

1. Close any Internet Explorer or Windows Explorer windows that are currently open. 

2. Click to open Internet Explorer. 

3. Click the Tools button, and then click Internet Options. 

4. Click the Advanced tab, and then click Reset. 

5. Select the Delete personal settings check box if you would like to remove browsing history, search providers, Accelerators, home pages, and InPrivate Filtering data. 

6. In the Reset Internet Explorer Settings dialog box, click Reset. 

7. When Internet Explorer finishes restoring the settings, click Close, and then click OK. 

8. Close Internet Explorer. 

Your changes will take effect the next time you open Internet Explorer. 

Q160. - (Topic 1) 

Which of the following operating systems support an offline migration using USMT? Choose three. 

A. Windows 2000 Professional 

B. Windows XP Professional 

C. Windows Vista 

D. Windows 7 

Answer: B,C,D