Exambible mcts 70 680 Questions are updated and all 70 680 practice test answers are verified by experts. Once you have completely prepared with our 70 680 practice test exam prep kits you will be ready for the real 70 680 pdf exam without a problem. We have Down to date Microsoft exam 70 680 dumps study guide. PASSED 70 680 exam First attempt! Here What I Did.

Q311. - (Topic 3) 

You have a computer that runs Windows 7. 

The Encrypting File System (EFS) key is compromised. 

You need to create a new EFS key. 

Which command should you run? 

A. Certutil -getkey 

B. Cipher.exe /k 

C. Icacls.exe /r 

D. Syskey.exe 

Answer:

Explanation: 

Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains.Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed.When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. /K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521. 


Q312. - (Topic 2) 

You have a computer that runs WindowsXP. The computer has one partition. 

You install Windows 7 on the computer. 

You need to migrate a user profile from the Windows XP installation to Windows 7 installation. 

What should you do first? 

A. From Windows 7, run Scanstate.exe /offlineWinOld:c:\windows. 

B. From Windows 7, run Scanstate.exe /offlineWinOld:c:\windows.old. 

C. At the command prompt, run Xcopy /s /e c:\windows\users\*.* c:\users\. 

D. At the command prompt, run Xcopy /s /e c:\windows.old\documents and settings\*.* c:\users\. 

Answer:

Explanation: 

/offlinewinold: "Windows.old diredctory" 

This command-line option enables the offline migration mode and starts the migration from the location specified. It is only intended to be used in Windows.old migration scenarios, where the migration is occurring from a Windows.old directory. 

NOT Xcopy 

Copies files and directories, including subdirectories. 

/s Copies directories and subdirectories, unless they are empty. If you omit /s, xcopy works within a single directory. 


Q313. - (Topic 2) 

You have a virtual hard disk (VHD) file. You need to view the files in the VHD. The solution must prevent users that log on to your computer from modifying files in the VHD. 

What should you do? 

A. From Disk Management, attach the VHD as read-only. 

B. From Disk Management, convert the VHD to a GPT disk. 

C. From Windows Explorer, modify the permissions of the VHD file. 

D. From Windows Explorer, modify the read-only attribute of the VHD file. 

Answer:


Q314. - (Topic 1) 

You have a computer that runs Windows 7. 

You discover that an application named App1 runs during the startup process. 

You need to prevent only App1 from running during startup. Users must be allowed to run App1 manually. 

What should you do? 

A. From the local Group Policy, modify the application control policy. 

B. From the local Group Policy, modify the software restriction policy. 

C. From the System Configuration tool, select Diagnostic Startup. 

D. From the System Configuration tool, modify the Startup applications. 

Answer:


Q315. - (Topic 3) 

You plan to install Windows 7 on a new notebook computer. 

The computer will be used by users who speak English, French, and German. 

You need to select an edition of Windows 7 that enables the users to switch between different graphical user interface (GUI) languages. The solution must minimize costs. 

Which edition should you choose? 

A. Home Premium 

B. Professional 

C. Starter 

D. Ultimate 

Answer:


Q316. - (Topic 1) 

Which of the following can be used to increase the physical memory on your Windows 7 PC and increase the speed? 

A. PhysiRAM 

B. Aero Glass 

C. DirectAccess 

D. ReadyBoost 

Answer:


Q317. - (Topic 4) 

You administer desktops that have 32-bit and 64-bit versions of Windows 7 Enterprise SP1 installed. All desktops have a single CD-RW drive. The local hard disk drives on all computers are partitioned with a recovery partition and a single logical drive C. 

You need to be able to restore Windows boot files on any of the desktops if the boot files become corrupted. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Create a system image of a Windows 7 Enterprise 64-bit desktop 

B. Create a system repair disk on a Windows 7 Enterprise 64-bit desktop. 

C. Restart Windows 7 Enterprise 64-bit desktops. Select the Disable Drive Signature Enforcement option from the Advanced Boot options menu. 

D. Enable system protection on the recovery partition on 64-bit desktops. 

E. Create system repair disk on a Windows 7 Enterprise 32-bit desktop. 

F. Create a system image of a Windows 7 Enterprise 32-bit desktop. 

G. Enable system protection on the recovery partition on 32-bit desktops. 

Answer: B,E 

Explanation: 

http://windows.microsoft.com/en-US/windows7/Create-a-system-repair-disc 


Q318. - (Topic 3) 

You need to provide an administrator the ability to view and interact with your current logon session. 

What should you do? 

A. At the command prompt, run Psr.exe. 

B. At the command prompt, run Winrm.exe quickconfig. 

C. From the Start menu, open Remote Desktop Connection. 

D. From the Start menu, open Windows Remote Assistance. 

Answer:

Explanation: 

Remote Assistance Both Remote Assistance and Remote Desktop allow the user at the management computer to see the desktop and applications that are present on the remote computer. The difference between Windows Remote Assistance and Remote Desktop is that a user is logged on to the remote computer and initiates the remote assistance session, whereas a Remote Desktop session is initiated on the management computer. Remote Assistance is a support tool used by help-desk staff to allow them to view the screen of the person to whom they are providing assistance. Remote Assistance reduces the need for nontechnical users to accurately describe the problem that they are having with their computers because support personnel can see the desktop directly. Unlike the version of Remote Assistance that shipped with Windows XP, the version of Remote Assistance that is included with Windows 7 does not include a voice client. If you are going to talk to the person whom you are helping using Remote Assistance, you are going to have to use another method, such as the telephone. 


Q319. - (Topic 5) 

You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:\Software. 

User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folder. 

You need to verify whether User1 can save files to C:\Software. 

What should you do? 

A. View the User Account Control Settings Control Panel window. 

B. Run the Net Share command. 

C. View the Share permissions on C:\Software. 

D. In the Advanced Security Settings for the Documents folder, select the Effective Permissions tab. 

Answer:

Explanation: To view effective permissions on files and folders 

Open Windows Explorer, and then locate the file or folder for which you want to view effective permissions. 

Right-click the file or folder, click Properties, and then click the Security tab. 

Click Advanced, click the Effective Permissions tab, and then click Select. 

In Enter the object name to select (examples), enter the name of a user or group, and then click OK. The selected check boxes indicate the effective permissions of the user or group for that file or folder. 


Q320. - (Topic 3) 

You have a computer that runs Windows 7. You need to ensure that all users are required to enter a username and password when uninstalling applications from the computer. What should you do from Local Group Policy Editor? 

A. Configure a software restriction policy. 

B. Modify the Add or Remove Programs settings. 

C. Configure an AppLocker Windows Installer rule. 

D. Modify the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting. 

Answer: