It is more faster and easier to pass the Microsoft 70-680 exam by using Vivid Microsoft TS:Windows 7,Configuring questuins and answers. Immediate access to the Regenerate 70-680 Exam and find the same core area 70-680 questions with professionally verified answers, then PASS your exam with a high score now.
2021 Mar 70-680 question
Q121. - (Topic 1)
You have a computer that runs Windows 7.
Multiple users log on to your computer.
You enable auditing on a folder stored on your computer.
You need to ensure that each access to the folder is logged.
What should you do?
A. Start the Problem Steps Recorder.
B. From Event Viewer, modify the properties of the Security log.
C. From the local Group Policy, configure the Audit object access setting.
D. From the local Group Policy, configure the Audit directory service Access setting.
Answer: C
Explanation:
Audit object access Determines whether to audit the event of a user accessing an object (for example, file, folder, registry key, printer, and so forth) which has its own system access control list (SACL) specified. By default, this value is set to No auditing in the Default Domain Controller Group Policy object (GPO) and in the local policies of workstations and servers. If you define this policy setting, you can specify whether to audit successes, audit failures, or not to audit the event type at all. Success audits generate an audit entry when a user successfully accesses an object that has a SACL specified. Failure audits generate an audit entry when a user unsuccessfully attempts to access an object that has a SACL specified. You can select No auditing by defining the policy setting and unchecking Success and Failure.
Q122. - (Topic 4)
Your company network has a single-domain Active Directory forest. The forest functionality level is set to Windows Server 2008 R2. All computers are members of the domain.
You plan to deploy Windows Bitlocker Encryption (BitLocker) on the portable computers that have Window 7 Enterprise installed.
You need to be able to automatically back up recovery passwords for BitLocker-protected disk volumes on the portable computers.
What should you do before you start encrypting the disk on volumes with BitLocker?
A. Run the cscript Add-TPMSelfWriteACE.vbs script on the portable computers
B. Run the cscript List-ACEs.vbs script on the portable computers.
C. Run the cscript Get-TPMOwnerInfo.vbs script on the client computers.
D. Select the Turn on BitLocker backup to Active Directory option in local policy on the portable computers.
Answer: D
Q123. - (Topic 1)
You have a computer that runs Windows 7. The computer contains two volumes, C and D.
You create a new folder called D:\Reports.
You need to ensure that all files stored in the Reports folder are indexed by Windows Search.
What should you do?
A. Enable the archive attribute on the folder.
B. Modify the Folder Options from Control Panel.
C. Modify the properties of the Windows Search service.
D. Create a new library and add the Reports folder to the library.
Answer: D
Explanation:
Libraries enable you to organize files by using metadata about the file, such as author, date, type, tags, and so on-instantly. You're not limited to just browsing files by folder hierarchy. When you save files in a Library, Windows. 7 indexes the files. You can use Library features like the Arrange By control to instantly browse the files in the Library by metadata or use the Search Builder, which is built into the Search box in Windows Explorer, to instantly search the files in the Library by metadata.
Q124. - (Topic 3)
You are evaluating the purchase a notebook computer that has the following hardware:
1.6-gigahertz (GHz) 32-bit processor
1024-MB RAM
1 video card that uses shared memory
4-GB solid state drive
You need to ensure that you can install Windows 7 Enterprise on the notebook computer.
Which hardware component should you change?
A. hard disk
B. processor
C. RAM
D. video card
Answer: A
Explanation:
Hard Disk does not meet the minimum requirements.4-GB solid state drive!= 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available spaceRequirements:Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements:
-1 GHz 32-bit (x86) or 64-bit (x64) processor- 1 GB of system memory- A 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available space- A graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver,- Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics
Q125. - (Topic 4)
A company has a new deployment of Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK).
You need to capture an image of a Windows 7 reference computer.
Which two actions should you perform on the server before performing actions on the reference computer? (Each correct answer presents a complete solution. Choose two.)
A. Run the Dism command with the /Mount-Wim option.
B. Create a capture image in WDS.
C. Run the BCDEdit command.
D. Run the Dism command with the /Add-Driver option.
E. Run the imageX command with the /Mount parameter.
F. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No.
G. Add a boot image in WDS.
H. Run the Start/w ocsetupcommand.
I. Run the PEImg /Prep command.
J. Run the DiskPart command and the Attach command option.
K. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes.
L. Use Sysprep with an answer file and set the PersistAHDeviceInstalls option in the answer file to True,
M. Run the Dism command with the /Add-Package option.
N. Use Sysprep with an answer file and set the PersistAHDeviceInstalls option in the answer file to False.
Answer: B,G
Explanation:
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx MDT relies on boot images created in WDS, WAIK is a collection of tools that you use to help automate deployment. To capture an image created on a reference computer you need to add a boot.wim files to WDS, then using the boot.wim, create a capture wim file (usually called capture.wim). This allows you to capture a a reference computer.
Leading 70-680 vce:
Q126. - (Topic 5)
You administer computers that have Windows 7 and Internet Explorer 8 installed.
You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer.
You need to ensure that any data about your browser session is not saved on the computer.
What should you do?
A. From the Safety drop-down menu, open an InPrivate Browsing session.
B. Start the Microsoft Network Access Protection service.
C. From the Local Group Policy, enable the InPrivate Filtering Threshold setting.
D. From Internet Options, on the Advanced tab, clear Enable DOM Storage.
Answer: C
Q127. DRAG DROP - (Topic 5)
You deploy Windows 7 on client computers by using a default Windows 7 DVD.
You discover that the client computers use the most recently released critical updates.
You download the updates' package files from the Microsoft site to your desktop.
You need to prepare a new installation DVD that includes the updates.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q128. - (Topic 3)
You have a computer that runs Windows 7.
You need to prevent users from installing a specific removable drive on the computer.
You connect the removable drive to the computer.
What should you do before you create a Group Policy?
A. From Device Manager, identify the device class GUID.
B. From Device Manager, identify the device location information.
C. From System Information, identify the device INF file.
D. From System Information, identify the device driver file name.
Answer: A
Explanation:
The device class GUID is used to identify the device. Prevent Windows 7 from installing or updating device drivers whose device setup class GUIDs you specify. This policy overrides any other policy that permits update or installation.
Q129. - (Topic 2)
You install a local printer on a computer. You share the printer.
You need to ensure that only members of a local group named Group1 can print documents on the printer.
Which settings should you modify on the printer?
A. Printing preferences
B. Priority
C. Security
D. Share
Answer: C
Explanation:
Restricting printer access to selected users by using security groups If you need to restrict the access of certain shared printers to a certain group of network users, do the following:
-Create a security group and then add members to the security group. - Assign printer access permissions.
To create a security group and add member to the group
1. Open the Windows SBS Console.2. On the navigation bar, click the Users and Groups tab, and then click Groups.3. In the task pane, click Add a new group. The Add a New Group Wizard appears. In the Add a New Group Wizard, do the following:1. On the Add a new group page, for Group type, select Security group.2. On the Select groups members for <groupname> page, from the Users and groups list, add the network users who you want to include for the restricted printer access.3. Follow the instructions to complete the wizard. To assign printer access permissions1. Open the Windows SBS Console.2. On the navigation bar, click the Network tab, and then click Devices.3. From the list of printers displayed in the Printers section, click the printer that you want to view the properties for. Then in the task pane, click Printer Properties.4. In the Printer Properties dialog box, click the Security tab, and then remove all entries in the Groups or user names list box except Administrators and Creator Owner.5. To grant access to the printer, click Add, and then enter the names of the group or users that you want to grant access to this printer.
Q130. - (Topic 3)
You have a computer named Computer1 that runs Windows 7.
You plan to migrate the user state on Computer1 by using User State Migration Tool (USMT) 4.0.
You need to identify which user documents will be included in the migration.
What should you do?
A. Run Usmtutils.exe and use the /ec option.
B. Run Sysprep.exe and use the /audit option.
C. Run Loadstate.exe and use the /v:12 option.
D. Run Scanstate.exe and use the /genmigxml option.
Answer: D
Explanation:
ScanState You run ScanState on the source computer during the migration. You must run ScanState.exe on computers running Windows Vista and Windows 7 from an administrative command prompt. When running ScanState on a source computer that has Windows XP installed, you need to run it as a user that is a member of the local administrators group. The following command creates an encrypted store named Mystore on the file share named Migration on the file server named Fileserver that uses the encryption key Mykey: scanstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /o /config:config.xml /encrypt /key:"mykey"
/genmigxml: path to a file This option specifies that the ScanState command should use the document finder to create and export an .xml file that defines how to migrate all of the files on the computer on which the ScanState command is running.