It is impossible to pass Microsoft 70-680 exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed Microsoft 70-680 practice questions. You will get a surprising result by our Latest TS:Windows 7,Configuring practice guides.
2021 Mar 70-680 free exam
Q211. - (Topic 5)
You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU.
You need to analyze the performance of the computer to meet the following requirements:
Include the CPU, Memory, and Disk subsystems.
Display real-time performance.
Obtain a list of users who have logged on by using the same tool.
What should you do?
A. Run powercfg.exe.
B. Run the Windows Experience Index.
C. Configure Event Viewer subscriptions.
D. Open Task Manager.
E. Open System Properties, and configure performance settings.
F. Open System Properties, and configure environment variables.
G. Open System Properties, and configure user profiles settings.
H. Open System Properties, and configure the page file settings.
I. Open Performance Monitor, and configure a Data Collector Set.
J. Open Performance Monitor, and customize the System Monitor view.
Answer: D
Q212. - (Topic 2)
You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1 attempts to access a Web page.
User1 fails to access the Web page and receives an error message stating that the page does not have a rating.
You need to configure Internet Explorer to allow User1 to access Web pages that do not have a rating.
Which settings should you modify?
A. Content Advisor
B. InPrivate Filtering
C. Parental Controls
D. Restricted Sites
Answer: A
Explanation:
Using Content Advisor to help block inappropriate web content The Internet is a great resource for children, offering a wealth of information and experiences. However, it can also expose children to information that might not be appropriate for them. Content Advisor allows you to control the types of Internet content that can be viewed on your computer. Depending on how you configure it, Content Advisor uses ratings that websites voluntarily provide to block or allow certain content. Because not all websites are rated, unrated websites are automatically blocked (but you can choose to allow them). Once you've adjusted the settings and turn Content Advisor on, it checks websites as you visit them. To use Content Advisor, you first need to create the supervisor password, and then you can specify the filters and rules you want applied to your children's web use. To change settings, you'll need to log in with the supervisor password before you can make changes. The following procedures describe how to create or change your supervisor password, and how to make specific changes to control Internet use. To allow unrated sites By default, content advisor will block unrated websites. To allow unrated sites to be viewed, follow the steps below.
9. Click to open Internet Explorer.
10. Click the Tools button, and then click Internet Options.
11. Click the Content tab, and then, under Content Advisor, click Settings. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
12. In the Supervisor Password Required dialog box, type your password, and then click OK.
13. In the Content Advisor dialog box, click the General tab.
14. Under User options
Q213. - (Topic 6)
Your organization uses Windows 7 computers.
You remotely administer a computer. You attempt to ping the computer to verify that it is on the network, but you do not receive a response. The user is able to connect to network resources.
You need to verify that the firewall on the computer is configured to allow pings.
What should you do?
A. Verify that the rule name Network Discovery (NB-Name-In) for inbound connections is enabled.
B. Verify that the rule name File and Printer Sharing (Echo Request -ICMPv4-IN) for outbound connections is enabled.
C. Verify that the rule name File and Printer Sharing (Echo Request -JCMPv4-IN) for inbound connections is enabled.
D. Verify that the rule name Network Discovery (NB-Name-In) for outbound connections is enabled.
Answer: C
Explanation: Ref: http://technet.microsoft.com/en-us/library/cc732509(v=WS.10).aspx
Q214. - (Topic 3)
You are the administrator of a computer named Computer1 that runs Windows 7. Several users share Computer1. The users plan to encrypt files on the computer.
You need to ensure that you can access all encrypted files on the computer.
What should you do first?
A. At a command prompt, run Cipher.exe.
B. At a command prompt, run Certutil.exe.
C. From the local computer policy, modify the User Rights Assignment.
D. From User Accounts, run the Manage your file encryption certificates wizard.
Answer: A
Explanation:
Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed. When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.
If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data.
/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521.
Q215. - (Topic 3)
You need to ensure that when you insert a blank DVD into the DVD drive, Windows Explorer opens automatically and enables you to select files to burn to DVD.
What should you do?
A. From Default Programs, modify the AutoPlay settings.
B. From Default Programs, modify the default program settings.
C. From Device Manager, modify the properties of the DVD drive.
D. From System Configuration Utility, modify the Startup settings.
Answer: A
Avant-garde 70-680 actual test:
Q216. - (Topic 3)
You have a computer named Computer1 that runs Windows 7 and Windows Internet Explorer 8.
A user reports that Computer1 has a number of Internet Explorer configuration issues that cause instability when browsing the Internet.
You need to configure Internet Explorer to use all default settings.
What should you do from Internet Options?
A. From the Advanced tab, click Reset.
B. From the Programs tab, click Set programs.
C. From the Advanced tab, click Restore advanced settings.
D. From the Security tab, click Reset all zones to default level.
Answer: A
Explanation:
Reset Internet Explorer settings By resetting Internet Explorer settings, you return Internet Explorer to the state it was in when it was first installed on your computer. This is useful for troubleshooting problems that might be caused by settings that were changed after installation. When you delete personal settings, some webpages that rely on previously stored cookies, form data, passwords, or previously installed browser add-ons might not work correctly. Resetting Internet Explorer to its default settings does not delete your favorites, feeds, Web Slices, and a few other personalized settings. See the table below for a complete list of all settings and information about whether they are reset or maintained. Resetting Internet Explorer's settings is not reversible. After a reset, all previous settings are lost and cannot be recovered. Rather than resetting everything, you might want to reset specific settings or delete your webpage history. For more information, see the links at the bottom of this topic.
To reset Internet Explorer settings
1. Close any Internet Explorer or Windows Explorer windows that are currently open.
2. Click to open Internet Explorer.
3. Click the Tools button, and then click Internet Options.
4. Click the Advanced tab, and then click Reset.
5. Select the Delete personal settings check box if you would like to remove browsing history, search providers, Accelerators, home pages, and InPrivate Filtering data.
6. In the Reset Internet Explorer Settings dialog box, click Reset.
7. When Internet Explorer finishes restoring the settings, click Close, and then click OK.
8. Close Internet Explorer.
Your changes will take effect the next time you open Internet Explorer.
Q217. - (Topic 6)
You are the system administrator for a large manufacturing company. You and your team are responsible for managing over 1,000 Windows 7 Professional desktop and laptop computers. All computers are members of a Windows 2008 R2 Active Directory domain.
You want to utilize the Windows Remote Management Service available in Windows 7 Professional. You plan to configure all desktop and laptop computers so that the Windows Remote Management Service can manage them remotely.
You need to run a command on each Windows 7 computer so that you can configure the service.
Which two commands can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two. )
A. Mstsc /v:computername configure
B. Enable-PSRemoting -force
C. Psexec Wcomputername -enable
D. Winrm quickconfig
Answer: B,D
Explanation: B: To configure Windows PowerShell for remoting, type the following command: Enable-PSRemoting –force
D: *When you are working with computers in workgroups or homegroups, you must either use HTTPS as the transport or add the remote machine to the TrustedHosts configuration settings. If you cannot connect to a remote host, verify that the service on the remote host is running and is accepting requests by running the following command on the remote host:.winrm quickconfig This command analyzes and configures the WinRM service.
* The Windows PowerShell remoting features are supported by the WS-Management protocol and the Windows Remote Management (WinRM) service that implements WS-Management in Windows.
Incorrect: Not C:
* PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems.
* psexec [\\computer[,computer2[,. . . ] | @file]][-u user [-p psswd][-n s][-r servicename][-h][-l][-s|-e][-x][-i session]
][-c [-f|-v]][-w directory][-d][-][-a n,n,. . . ] cmd [arguments]
Q218. - (Topic 1)
Your network contains a wireless access point. You have a computer that runs Windows 7. The computer connects to the wireless access point.
You disable Service Set Identifier (SSID) broadcasts on the wireless access point.
You discover that you are now unable to connect to the wireless access point from the Windows 7 computer.
You need to ensure that the computer can connect to the wireless access point.
What should you do?
A. From Credential Manager, modify the generic credentials.
B. From Credential Manager, modify the Windows credentials.
C. From Network and Sharing Center, turn on Network discovery.
D. From Network and Sharing Center, modify the wireless network connection settings.
Answer: D
Explanation:
Wireless Network Connection settingsTo connect to a wireless network that does not broadcast its SSID, you need to know details such as the network name and security type. In Network And Sharing Center, you click Set Up A Connection Or Network, click Manually Connect To A Wireless Network, and click Next. You are prompted for the network name and security type and (if appropriate) encryption type and security key. Alternatively, you can open an elevated command prompt and enter a command with the following syntax: netsh wlan connect name=<profile_name> ssid-<network_ssid> [interface=<interface_name>] (Since the computer has previously been connected, just modify the settings.)NOT Network DiscoveryNetwork Discovery allows the client running Windows 7 to locate other computers and devices on the network. It also makes the client visible to other computers on the network. Disabling Network Discovery does not turn off other forms of sharing.NOT Credential ManagerCredential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson.
Q219. - (Topic 5)
You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits:
. The Disk Management console (Click the Exhibit button.)
. The System Properties window (Click the Exhibit button.)
. The System protection for Local Disk C window (Click the Exhibit button.)
You encrypt several files on an external USB hard disk drive by using the Encrypting File System (EFS).
You need to ensure that you can access the files from another computer.
What should you do?
A. Delete restore points.
B. Create a restore point.
C. Perform a system restore.
D. Search for the file in the Recycle Bin.
E. Increase disk space used for system protection.
F. Copy the file from a previous version of a folder.
G. Set restore settings to Only restore previous versions of files.
H. Run the cipher /x command from the elevated command prompt,
I. Run the vssadmin list volumes command from the elevated command prompt.
J. Run the vssadmin list shadows command from the elevated command prompt,
K. Run the compact /U <file_name> command from the elevated command prompt.
Answer: H
Explanation: * cipher /x[:efsfile] [<FileName>]
Backs up the EFS certificate and keys to the specified file name. If used with :efsfile, /x backs up the user's certificate(s) that were used to encrypt the file. Otherwise, the user's current EFS certificate and keys are backed up.
* Back Up Your EFS Key The first time that you use EFS to encrypt something, your system generates a random 256-bit number; that's the key that EFS uses whenever you encrypt something. To back up your EFS key, simply use the Cipher /x command. Cipher will reply with a message asking if you truly want to back up your EFS key—sadly, I haven't found a way to suppress this message. Press OK. The tool will then prompt you for the name of the file in which to store the backup. Don't specify a file extension; Cipher insists on the .pfx extension. For example, if you picked a file named mybackup, you now have a small file called mybackup.pfx. Next, the tool will prompt you to create a password with which to protect that file.
Once you've got that file created, copy it from your computer's hard disk to some offline location (e.g., a USB stick, a CD-ROM) and make a note of the password you've chosen. Now, in the event of unfortunate circumstances— for example, you lose your profile, you forget your password and a systems administrator has to reset it, the system's OS fails and you need to recover files directly from the nowdead system's hard disk—you can simply restore your EFS key by double-clicking the .pfx file and running the resulting wizard. As soon as the wizard is finished, you'll be able to get to your files again.
Q220. - (Topic 2)
You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of an Active Directory domain.
Windows Remote Management (WinRM) is enabled on both computers.
You need to remotely create additional disk volumes on Computer1 from Computer2.
What should you do?
A. On Computer2, run Winrs and then run Diskpart.
B. On Computer2, run Winrs and then run Diskmgmt.msc.
C. On Computer1, install the Telnet Client and then run Diskpart from Computer2.
D. On Computer1, install the Telnet Client and then use Disk Management from Computer2.
Answer: A
Explanation:
Winrs You can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS –r: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS –r:Aberdeen ipconfig The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt.
Diskpart: Microsoft command-line tool Diskpart is used to create and format volumes on the target computer.