What will you get following purchase: One particular. A Microsoft 70-680 review guide 2. Printable Pdf files and Analyze Engine software 3. Truly online Microsoft 70-680 test 4. Interactive space along with other candidates 5. Produce and acquire notes around the 70-680 practice questions
2021 Mar 70-680 practice
Q281. - (Topic 5)
You plan to install Windows 7 on a new portable computer.
The computer will be shared by users who speak English, French, and German.
You need to select an edition of Windows 7 that enables users to change languages as required.
Which edition should you choose?
A. Starter
B. Ultimate
C. Home Premium
D. Professional
Answer: B
Q282. - (Topic 4)
A company has a server running Windows Server2008 R2, with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) set up. The company also has client computers running Windows 7 Enterprise.
You need to remove a virtual hard disk boot option from the Windows startup menu on a client computer.
What should you do?
A. Run the Start /w ocsetup command.
B. Run thePEImg/Prep command.
C. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes.
D. Run the ImageX command with the /Mount parameter.
E. Run the DiskPart command and the Attach command option.
F. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to False.
G. Run the Dism command with the /Mount-Wimoption.
H. Run the Dism command with the /Add-Driver option.
I. Run the BCDEdit/delete command.
J. Add a boot image and create a capture image in WDS.
K. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to No.
L. Run the Dism command with the /Add-Package option.
M. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to True.
Answer: I
Q283. - (Topic 4)
You have a computer that runs Windows 7. The computer is configured to automatically download and install updates.
You install Microsoft Office 2007.
You need to ensure that service packs for Office are automatically installed.
What should you do?
A. From Windows Update, select Restore hidden updates.
B. From Windows Update, select Get updates for other Microsoft products.
C. Create a folder named Updates in C:\Program Files\Microsoft Office. Install the Office Update Inventory Tool into the Updates folder.
D. Download and install the Office 2007 administrative template and disable the Block updates from the Office Update Site from applying policy.
Answer: B
Explanation:
Use Windows Update to Check for Updates to other Microsoft Products By default, Windows Update can download and install updates for Windows 7 and features that are part of the operating system (such as Internet Explorer). You can also merge the functionality of Microsoft Update—a service for managing updates to Microsoft Office and several other Microsoft products—into Windows Update so that you no longer need to visit Office Online to get updates.If you do not already have Windows Update integrated with Microsoft Update, you will see the message "Get updates for other Microsoft products" on the Windows Update home page. To enable checking for other products, click the Find Out More option shown beside this message. This will take you to the Microsoft Update site for some quick installation steps. You only need to do this once. Thereafter, the Windows Update home page will indicate that you receive updates "For Windows and other products from Microsoft Update."
Q284. - (Topic 3)
You have a computer that runs Windows 7.
You need to configure an application to connect to the computer by using the IPV6 loopback address.
Which address should you specify?
A. ::1
B. 12::1
C. 127.0.0.1
D. fe80::f56f:56cb:a136:4184
Answer: A
Explanation:
Loopback address The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface, enabling a node to send packets to itself. It is equivalent to the IPv4 loopback address of
127.0.0.1. Packets addressed to the loopback address must never be sent on a link or forwarded by a router.Link-LocalLink-local addresses always begin with FE80. With the 64-bit interface identifier, the prefix for link-local addresses is always FE80::/64. An IPv6 router never forwards link-local traffic beyond the link. Nodes use link-local addresses when communicating with neighboring nodes on the same link. For example, on a single-link IPv6 network with no router, hosts use link-local addresses to communicate with other hosts on the link. Link-local addresses are equivalent to Automatic Private IP Addressing (APIPA) IPv4 addresses autoconfigured on computers that are running Windows. APIPA addresses use the 169.254.0.0/16 prefix. The scope of a link-local address is the local link. A link-local address is required for Neighbor Discovery processes and is always automatically configured, even in the absence of all other unicast addresses.
Q285. - (Topic 2)
You have a computer that runs Windows 7. IPv6 is disabled on the computer.
The computer has the following IPv4 settings:
IP address: 10.1.1.193
Subnet mask: 25S.255.0.0
Default gateway: 10.1.1.194
. Preferred DNS server: 10.1.1.195
You need to ensure that the computer can only communicate with computers on the local subnet.
What should you do?
A. Delete the default gateway address.
B. Delete the preferred DNS server IP address
C. Configure the subnet mask to use 255.255.255.0
D. Configure the subnet mask to use 255.255.255.192
Answer: A
Explanation:
Why gateways work Default gateways are important to make IP routing work efficiently. In most cases, the router that acts as the default gateway for TCP/IP hosts--either a dedicated router or a computer that connects two or more network segments--maintains knowledge of other networks in the larger network and how to reach them. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain extensive and continuously updated knowledge about individual remote IP network segments. Only the router that acts as the default gateway needs to maintain this level of routing knowledge to reach other remote network segments in the larger internetwork. If the default gateway fails, communication beyond the local network segment may be impaired. To prevent this, you can use the Advanced TCP/IP Settings dialog box (in Network Connections) for each connection to specify multiple default gateways. You can also use the route command to manually add routes to the routing table for heavily used hosts or networks.
Leading 70-680 practice exam:
Q286. - (Topic 6)
You have a computer that runs Windows 7 Enterprise. The operating system is installed on drive C.
You have customized the Windows environment and prepared it to generate deployment source media. You attach a USB flash drive as drive D to the computer.
You need to create a Windows image file that has the operating system partition.
What should you do?
A. Run imagex.exe /capture d: c:\image.wim.
B. Run imagex.exe /capture c: d:\image.wim.
C. From Backup and Restore, create a system image and save it to drive D.
D. Run xcopy.exe c: d: /p /c.
Answer: C
Q287. HOTSPOT - (Topic 4)
A company has client computers that run Windows 7. You create an AppLocker policy for the client computers.
You need to ensure that the AppLocker policy is enforced after the computer restarts.
Which service should you modify? (To answer, select the appropriate setting or settings in the work area.)
Answer:
Q288. - (Topic 5)
You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:\Software.
User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folder.
You need to verify whether User1 can save files to C:\Software.
What should you do?
A. Run the Net Share command.
B. Run the Wfs C:\Software command.
C. In the Advanced Security Settings for the Documents folder, select the Effective Permissions tab.
D. Run the Fsutil C:\Software command.
Answer: C
Explanation: To view effective permissions on files and folders . Open Windows Explorer, and then locate the file or folder for which you want to view effective permissions.
Right-click the file or folder, click Properties, and then click the Security tab.
Click Advanced, click the Effective Permissions tab, and then click Select.
In Enter the object name to select (examples), enter the name of a user or group, and then click OK. The selected check boxes indicate the effective permissions of the user or group for that file or folder.
Q289. - (Topic 1)
You have a stand-alone computer named Computer1 that runs Windows 7. Several users share Computer1.
You need to prevent all users who are members of a group named Group1 from running Windows Media Player. All other users must be allowed to run Windows Media Player.
You must achieve this goal by using the least amount of administrative effort. What should you do?
A. From Software Restriction Policies, create a path rule.
B. From Software Restriction Policies, create a hash rule.
C. From Application Control Policies, create the default rules.
D. From Application Control Policies, create an executable rule.
Answer: D
Explanation:
Executable Rules Executable rules apply to files that have .exe and .com file extensions. AppLocker policies are primarily about executable files, and it is likely that the majority of the AppLocker policies that you work with in your organizational environment will involve executable rules. The default executable rules are path rules that allow everyone to execute all applications in the Program Files folder and the Windows folder. The default rules also allow members of the administrators group to execute applications in any location on the computer. It is necessary to use the default executable rules, or rules that mirror their functionality, because Windows does not function properly unless certain applications, covered by these default rules, are allowed to execute. When you create a rule, the scope of the rule is set to Everyone, even though there is not a local group named Everyone. If you choose to modify the rule, you can select a specific security group or user account. NOT Default rulesDefault rules are a set of rules that can be created automatically and which allow access to default Windows and program files. Default rules are necessary because AppLocker has a built-in fallback block rule that restricts the execution of any application that is not subject to an Allow rule. This means that when you enable AppLocker, you cannot execute any application, script, or installer that does not fall under an Allow rule. There are different default rules for each rule type. The default rules for each rule type are general and can be tailored by administrators specifically for their environments. For example, the default executable rules are path rules. Security-minded administrators might replace the default rules with publisher or hash rules because these are more secure.NOT Path RulesPath rules, allow you to specify a file, folder, or registry key as the target of a Software Restriction Policy. The more specific a path rule is, the higher its precedence. For example, if you have a path rule that sets the file C: \Program files\Application\App.exe to Unrestricted and one that sets the folder C:\Program files\Application to Disallowed, the more specific rule takes precedence and the application can execute. Wildcards can be used in path rules, so it is possible to have a path rule that specifies C:\Program files\Application\*.exe. Wildcard rules are less specific than rules that use a file's full path. The drawback of path rules is that they rely on files and folders remaining in place. For example, if you created a path rule to block the application C:\Apps\Filesharing.exe, an attacker could execute the same application by moving it to another directory or renaming it something other than Filesharing.exe. Path rules work only when the file and folder permissions of the underlying operating system do not allow files to be moved and renamed.NOT Hash RulesHash rules, work through the generation of a digital fingerprint that identifies a file based on its binary characteristics. This means that a file that you create a hash rule for will be identifiable regardless of the name assigned to it or the location from which you access it. Hash rules work on any file and do not require the file to have a digital signature. The drawback of hash rules is that you need to create them on a per-file basis. You cannot create hash rules automatically for Software Restriction Policies; you must generate each rule manually. You must also modify hash rules each time that you apply a software update to an application that is the subject of a hash rule. Software updates modify the binary properties of the file, which means that the modified file does not match the original digital fingerprint.
Q290. - (Topic 2)
You have a computer that runs Windows 7.
You run Runas and specify the /savecred parameter to start an application.
You need to delete the stored password.
What should you do?
A. Run Del and specify the /p parameter.
B. Run Runas and specify the /noprofile parameter.
C. From Credential Manager, modify the Windows credentials.
D. From Authorization Manager, modify the Authorization Manager options.
Answer: C
Explanation:
Credential Manager Credential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson.