Braindump2go 70-680 Dumps 2015 Free Download (321-335)

We never believe in second chances and Braindump2go brings you the best 70-680 Exam Preparation Materials which will make you pass in the first attempt.We guarantee all questions and answers in our 70-680 Dumps are the latest released, we check all exam dumps questions from  time to time according to Microsoft Official Center, in order to guarantee you can read the latest questions!

Vendor: Microsoft
Exam Code: 70-680
Exam Name: TS: Windows 7, Configuring

Keywords: 70-680 Exam Dumps,70-680 Practice Tests,70-680 Practice Exams,70-680 Exam Questions,70-680 PDF,70-680 VCE Free,70-680 Book,70-680 E-Book,70-680 Study Guide,70-680 Braindump,70-680 Prep Guide

 

QUESTION 321
You have a computer that runs Windows XP.
The computer has one basic disk that contains a single partition. The partition has 30 GB of free space. The hard disk has 5 GB of unallocated space.
You need to install Windows 7 in a dual-boot configuration. Windows 7 must not be installed in a virtual hard disk (VHD).
What should you do first?

A.    Create a second partition.
B.    Shrink the primary partition.
C.    Convert the hard disk to a GPT disk.
D.    Convert the hard disk to a dynamic disk.

Answer: B
Explanation:
Given the system requirements more space is required. There is not enough unallocated
space so the XP partition will need to be shrunk first, in order for a sufficient sized partition to be created.Requirements: Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements: – 1 GHz 32-bit (x86) or 64-bit (x64) processor – 1 GB of system memory – A 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available space – A graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver, Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics memory

QUESTION 322
You have a computer that runs Windows 7. The computer is a member of a domain.
You share D:\data as Data.
You assign Everyone Full control share permissions to the folder.
No other share permissions are assigned to the folder. From another computer, you attempt to create a file in the Data share by using a domain account named User1.
You receive the following error message:
“Destination Folder Access Denied.”
You need to ensure that you can create files in the Data share by using the User1 account. What should you do?

A.    Create a local user named User1.
B.    Add User1 to the local Power Users group.
C.    Assign User1 Write NTFS permission on the D:\data folder.
D.    Assign User1 Full control share permissions to the Data share.

Answer: C
Explanation:
Share permissions apply to users who connect to a shared folder over the network. Share permissions do not affect users who log on locally, or log on using Remote Desktop. To set permissions for users who log on locally or using Remote Desktop, use the options on the Security tab instead of the Share Permissions tab. This sets permissions at the NTFS file system level. If both share permissions and file system permissions are set for a shared folder, the more restrictive permissions apply when connecting to the shared folder. For example, to give Read access on a shared folder to users in your domain, on the Share Permissions tab, set permissions for the Everyone group to Full Control. On the Security tab, specify more restrictive access by setting the permissions for the Domain Users group to Read access. The result is that a user who is a member of the Domain Users group has read-only access to the shared folder whether the user is connected through a network share, through Remote Desktop, or is logged on locally. Permissions The Read permission allows a user or group to access a file or folder but does not allow modification or deletion. The Change permission includes the read permission but also allows you to add files, delete files, and modify files in the shared folder. This permission is equivalent to the Read/Write permission in the basic File Sharing dialog box. The Full Control permission includes all the rights conferred by the Change and Read permissions. It also allows the user assigned that permission to modify the permissions of other users. Full Control is equivalent to the basic sharing Owner permission, though unlike basic sharing, where there can only be one user assigned the Owner permission, you can assign the Full Control permission to users and groups.
NTFS permissionsYou can configure the local NTFS permissions for a shared folder or volume using Share and Storage Management in the following ways: New shared resources. In the Provision a Shared Folder Wizard, before you select a network sharing protocol, you can change the NTFS permissions for the folder or volume you will be sharing. These NTFS permissions will apply both locally and when accessing the resource over the network. To change the NTFS permissions, on the NTFS Permissions page, select Yes, change NTFS permissions, and then click Edit Permissions. Existing shared resources. You can change the NTFS permissions of a shared folder or volume listed on the Shares tab. To change the NTFS permissions, select the folder or volume, in the Actions pane click Properties, and on the Permissions tab, click NTFS Permissions.

QUESTION 323
Your network contains a Network Policy and Access Services server named Server1. All certificates in the organization are issued by an enterprise certification authority (CA) named Server2.
You have a standalone computer named Computer1 that runs Windows 7. Computer1 has a VPN connection that connects to Server1 by using SSTP.
You attempt to establish the VPN connection to Server1 and receive the following error message:
“A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.”
You need to ensure that you can successfully establish the VPN connection to Server1.
What should you do on Computer1?

A.    Import the root certificate of Server2 to the user’s Trusted Publishers store.
B.    Import the root certificate of Server2 to the computer’s Trusted Root Certification Authorities store.
C.    Import the server certificate of Server1 to the user’s Trusted Root Certification Authorities store.
D.    Import the server certificate of Server1 to the computer#s Trusted Root Certification Authorities store.

Answer: B
Explanation:
A certificate chain establishes a “chain of trust” from a certification authority (CA) to an individual certificate. Trust occurs if a valid certificate from that CA can be found in your root certificate directory. As long as you trust the CA, you will automatically trust any other certificates signed by that CA.

QUESTION 324
You have a computer that runs Windows 7. The computer contains a folder named C:\data.
You use Advanced Sharing to share C:\data by using the default share permissions. When a user tries to access the share over the network, he gets an Access is Denied error message.
You need to ensure that the user can access the share.
What should you do?

A.    Allow file and printer sharing through Windows Firewall.
B.    Change the network location from a Public network to a Home or Work network.
C.    From the Security settings of the folder, assign the user the Read NTFS permission.
D.    From the Advanced Sharing settings of the folder, assign the user the Read share permission.

Answer: C
Explanation:
Advanced Security Settings Properties Page – Permissions Tab You can add additional resources, groups or users to have explicit NTFS permissions to access this object, or you can edit or remove the NTFS permissions granted to a resource, group, or user on the object. Inherited permissions are those that are propagated to an object from a parent object. Inherited permissions ease the task of managing permissions and ensure consistency of permissions among all objects within a given container.

QUESTION 325
You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users log on to the computer.
You need to prevent the computer from displaying the username of the last user who logged on. What should you do?

A.    From Control Panel, modify the User Profiles settings.
B.    From Control Panel, modify the Personalization settings.
C.    From the local computer policy, add a policy template.
D.    From the local computer policy, modify the local security policy.

Answer: D
Explanation:
How to Prevent the Last Logged-On User Name from Being Displayed
1. Click Start and type secpol.msc in the search box.
2. Press Enter.
3. Within the Local Security Policy, navigate to Security Settings | Local Policies | Security Options.
4. In the details pane, scroll through the options and locate Interactive logon: Do not display last user name.
5. Double click this security option and click Enabled.
6. Click OK.
 

QUESTION 326
You have a computer named Computer1 that runs Windows 7.
You have a server named Server1 that runs Windows Server 2008. Computer1 and Server1 have IPv4 and IPv6 installed.
You need to identify whether you can connect to Server1 by using IPv6. What should you do?

A.    Run Ping Server1 -6.
B.    Run Ping Server1 -n 6.
C.    Run Net view \\Server1.
D.    Open \\server1 from the Run dialog box.

Answer: A
Explanation:
Ping
The Ping tool is still widely used, although more firewalls block Internet Control Message Protocol (ICMP) echo requests than used to be the case. However, even if you cannot get past a firewall on your organization’s network, Ping is still useful. You can check that the IPv4 protocol is working on a computer by entering ping 127.0.0.1. You can then ping the IPv4 address of the computer. You can find out what this is by using the Ipconfig tool. If your computer has more than one interface combined in a network bridge, you can ping the Ipv4 address of the network bridge. When you have established that you can ping your computer using an Ipv4 address, you can test that DNS is working internally on your network (assuming you are connected to a DNS server, a WAP, or have ICS configured on your network) by pinging your computer name–for example, entering ping canberra. Note that if DNS is not implemented on your system, ping canberra still works because the IPv6 link-local address resolves automatically.
-6 Force using IPv6.

QUESTION 327
You have a computer that contains a DVD drive and a single 350-GB hard disk drive.
You attempt to install Windows 7 on the computer by using the DVD installation media and receive the following error message:
“Reboot and Select proper Boot device or Insert Boot Media in selected Boot device.”
You need to ensure that you can install Windows 7 on the computer by using the DVD installation media.
What should you do?

A.    From the BIOS, modify the startup order.
B.    From the BIOS, enable Pre-Boot Execution Environment (PXE).
C.    Create an answer file named oobe.xml and place the file on the hard disk drive.
D.    Create an answer file named autounattend.xml and place the file on the hard disk drive.

Answer: A
Explanation:
To install Windows 7 from a DVD-ROM, boot from the DVD-ROM drive and follow the prompts. You may need to configure the computer’s BIOS to support booting from DVD-ROM. If a computer does not have a DVD-ROM drive attached, you can still install from DVD-ROM–you just need to acquire a USB DVD-ROM drive. In this case, it will be necessary to configure the computer’s BIOS to boot from the USB device.

QUESTION 328
You have a computer that runs Windows 7. A user installs a third-party media player on the computer.
You discover that all media files automatically open by using the third-party media player.
You need to ensure that all media files open automatically by using Windows Media Player.
You must achieve this goal by using the minimum amount of administrative effort.
What should you do?

A.    Select a media file.
Right-click the file and select Open with.
B.    Select a media file.
Right-click the file and select Restore previous versions.
C.    From Control Panel, modify the Set your default programs settings.
D.    From Control Panel, modify the Set program access and computer defaults settings.

Answer: C

QUESTION 329
You deploy a custom image to a computer and discover that the Telnet Client feature is disabled. You need to ensure that the Telnet Client feature is enabled when you deploy the image.
You must achieve this goal in the minimum amount of time.
What should you do?

A.    Enable the Telnet Client feature on the computer.
Generalize the computer and capture the image.
B.    Create an unattended file that enables Telnet Client.
Generalize the computer and specify the unattended
file. Capture the image.
C.    Mount the image.
Run Ocsetup.exe TelnetClient.
Commit the changes and unmount the image.
D.    Mount the image.
Run Dism.exe and specify /image and /enable-feature:TelnetClient switches.
Commit the changes and unmount the image.

Answer: D
Explanation:
NOTE: “when you deploy the image.” Implies for future installations, not the current one.
Therefore the imagefile must be updated.
Dism Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows?images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing. You can use DISM to perform the following actions:
– Prepare a Windows PE image.
– Enable or disable Windows features within an image.
– Upgrade a Windows image to a different edition.
– Add, remove, and enumerate packages.
– Add, remove, and enumerate drivers.
– Apply changes based on the offline servicing section of an unattended answer file.
– Configure international settings.
– Implement powerful logging features.
– Service operating systems such as Windows Vista with SP1 and Windows Server 2008.
– Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.
– Service all platforms (32-bit, 64-bit, and Itanium).
– Use existing Package Manager scripts.

QUESTION 330
You have a computer that runs Windows 7.
You install Internet Information Services (IIS) to test a web based application.
You create a local group named Group1.
You need to ensure that only the members of Group1 can access the default Web site.
Which two configuration changes should you perform?
(Each correct answer presents a part of the solution, Choose two.)

A.    Modify the properties of Group1.
B.    Assign an SSL certificate to the default Web site.
C.    Modify the authentication methods of the default Web site.
D.    Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder.

Answer: CD
Explanation:
Modifying the Default Authentication Method
You can use the Directory Security tab of the Web Site Properties dialog box to change the authentication method. The authentication method determines whether users are identified, and how users must be identified to access your site. The authentication method you select varies, depending on the kind of site you are creating and the purpose of the site. Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder
See article:
How to set required NTFS permissions and user rights for an IIS 5.0, IIS 5.1, or IIS 6.0 Web server http://support.microsoft.com/kb/271071

QUESTION 331
You have a computer that runs Windows 7. A user reports that he is unable to access network resources.
You run Ipconfig.exe as shown in the IPConfig exhibit. (Click the Exhibit button.)
 
You open Device Manager as shown in the Device Manager exhibit. (Click the Exhibit button.)  

You need to ensure that the user can connect to the network.
What should you do?

A.    From Device Manager, enable the network adapter.
B.    From Device Manager, update the driver for the network adapter.
C.    At a command prompt, run Ipconfig /renew.
D.    At a command prompt, run Netsh ip set address “local area connection” dhcp.

Answer: A
Explanation:
IP Configuration should look something like this, if network adapter is enabled.


The icon displayed in Device Manager indicates that network adapter is disabled.
Therefore, enable the network adapter.

QUESTION 332
You have a computer that runs Windows 7.
You install a third-party Web browser.
You discover that HTML files are no longer associated with Windows Internet Explorer.
You need to ensure that Internet Explorer starts whenever a HTML file is opened.
What should you do from Internet Options?

A.    Open the Connections tab and click Setup.
B.    Open the General tab and click Use default.
C.    Open the Programs tab and click Make default.
D.    Open the Programs tab and click Manage add-ons.

Answer: C
Explanation:
Change your default web browser
This information applies to Internet Explorer 8 or Internet Explorer 7 running on Windows 7, Windows Vista, Windows Server 2008, Windows XP Service Pack 2 and Service Pack 3, and Windows Server 2003.
To make Internet Explorer your default web browser
1. Click to open Internet Options.
2. Click the Programs tab, and then click Make default.
3. Click OK, and then close Internet Explorer.
 

QUESTION 333
You have a computer that runs Windows 7.
You need to configure system image backups to meet the following requirements:
– Automatically create a system image every day without user intervention.
– Retain multiple copies of the system image.
Which type of backup destination should you use?

A.    External hard disk drive
B.    Network location
C.    USB flash drive
D.    Writeable DVD

Answer: A
Explanation:
Backup And Restore in Windows 7 supports backing up data files to CD-ROM, DVD-ROM, hard disk (including VHD files), or a network location.
You can use Backup And Restore to write a System Image backup to an internal hard disk drive, an external hard disk drive (if formatted with the NTFS file system) and a network location.
You cannot use Backup And Restore to write a System Image backup to a USB flash drive, a writable DVD, or a tape drive. You need to schedule client computers that store important data for automatic backup. After you first configure automatic file backup using the Backup And Restore console, Windows 7 regularly backs up your files. The first time a backup is performed, a full backup is done, including all important user documents. Subsequent backups are incremental, backing up only changed files. Older backups are discarded if the disk begins to run out of space.Scheduling Backups with the Backup And Restore Console Windows 7 Backup uses shadow copies to take a snapshot of your files, allowing the backup to completely back up files even if they are open. Backups are configured and scheduled by using the Backup And Restore console under System And Security in Control Panel.
You can select the following types of backup destination: An external hard drive External hard drives are more expensive to purchase than internal hard drives, although you need to balance this against the cost of fitting the internal drive. They can be removed and stored in a secure location. However, they are typically slower than internal hard drives and tend to be less reliable, mainly because they are by default formatted using FAT rather than NTFS. You cannot use an external hard drive for a System Image backup unless you convert its filing system to NTFS. Because it is easily removable, it is more likely that an external hard drive will be missing when a scheduled backup is required.
Network locationIf your computer is short of disk space, you can back it up to a network location on another computer or network storage. Note that this is not the same as the situation in a production environment, where users’ Documents libraries are stored on a file server and an administrator backs up the file server.
You can save your backups on a network location only on computers running Windows 7 Professional, Windows 7 Ultimate, and Windows 7 Enterprise, and you need to provide credentials so that Windows Backup can access the network. Bear in mind that you can save your backups on a network location only on computers running Windows 7 Professional, Windows 7 Ultimate, and Windows 7 Enterprise.USB flash drivesFlash drive memory is considerably less expensive and flash drive devices support much more memory than they did three or even two years ago. Nevertheless, they typically support a lot less memory than hard drives and quickly fill up if you needed to keep copies of older backups.
You cannot save System Image backups to flash memory. A flash drive must be able to hold more than 1 GB if you want to save a backup on it. Flash drives can be stored offsite and are small and easy to carry. They are also easy to lose.

QUESTION 334
You have a computer that runs Windows 7 and Windows Internet Explorer 8.
You open Internet Explorer and access a Web site. The Web site displays a page that has misaligned text and graphic image.
You verify that the Web page displays correctly in previous versions of Internet Explorer.
You need to view the Web page correctly.
What should you do?

A.    Modify the text size.
B.    Enable Caret Browsing.
C.    Enable Compatibility View.
D.    Disable the SmartScreen Filter.

Answer: C
Explanation:
Internet Explorer Compatibility View
Internet Explorer Compatibility View allows sites designed for previous versions of Internet Explorer to display correctly for users of Internet Explorer 8.
You can enable Compatibility View for a page by clicking the broken page icon at the end of the address bar. You can configure Compatibility View settings through the Compatibility View Settings dialog box.
You can access this dialog box by clicking Compatibility View Settings on the Tools menu of Internet Explorer.

QUESTION 335
You have a computer that is certified for Windows 7.
You need to install Windows 7 on the computer. The installation method must prevent you from being prompted for information during the installation.
What should you do?

A.    Create an unattend.txt file on a removable drive.
Start the computer from the Windows 7 installation media.
B.    Create an autounattend.xml file on a removable drive.
Start the computer from the Windows 7 installation media.
C.    Start the computer from the Windows 7 installation media.
At the command prompt, run Setup.exe and specify the /m parameter.
D.    Start the computer from the Windows 7 installation media.
At the command prompt, run Setup.exe and specify the /tempdrive.

Answer: B
Explanation:
Copy the Autounattend.xml file to the root directory of a removable storage device (such as a UFD).
You now have a basic answer file that automates Windows Setup. Turn on the reference computer. Insert the Windows 7 product DVD and the UFD containing the answer file (Autounattend.xml) that you created. Windows Setup (Setup.exe) starts automatically and searches the root directory of all removable media for an answer file called Autounattend.xml
Note: that the use of an answer file is optional, although it is the method Microsoft recommends. (And it was specified in the question).


Latest 70-680 Questions and Answers from Microsoft Exam Center Offered by Braindump2go for Free Share Now! Read and remember all Real Questions Answers, Guaranteed Pass 70-680 Real Test 100% Or Full Money Back!

http://www.braindump2go.com/70-680.html

Releated

[December-2023]Real Exam Questions-Braindump2go PL-400 Exam PDF and PL-400 VCE PL-400 367Q Download[Q349-Q357]

December/2023 Latest Braindump2go PL-400 Exam Dumps with PDF and VCE Free Updated Today! Following are some new Braindump2go PL-400 Real Exam Questions! QUESTION 349A company designs a Microsoft Dataverse Custom API to encapsulate business logic in it.The Custom API business logic must be encapsulated in a way that does not allow the business logic behavior […]