Act now and download your Microsoft 70 680 practice test test today! Do not waste time for the worthless Microsoft 70 680 exam tutorials. Download Avant-garde Microsoft TS:Windows 7,Configuring exam with real questions and answers and begin to learn Microsoft 70 680 exam with a classic professional.

Q1. - (Topic 3) 

You have a computer that runs Windows 7. 

You need to configure an application to connect to the computer by using the IPV6 loopback address. 

Which address should you specify? 

A. ::1 

B. 12::1 

C. 127.0.0.1 

D. fe80::f56f:56cb:a136:4184 

Answer:

Explanation: 

Loopback address The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface, enabling a node to send packets to itself. It is equivalent to the IPv4 loopback address of 

127.0.0.1. Packets addressed to the loopback address must never be sent on a link or forwarded by a router.Link-LocalLink-local addresses always begin with FE80. With the 64-bit interface identifier, the prefix for link-local addresses is always FE80::/64. An IPv6 router never forwards link-local traffic beyond the link. Nodes use link-local addresses when communicating with neighboring nodes on the same link. For example, on a single-link IPv6 network with no router, hosts use link-local addresses to communicate with other hosts on the link. Link-local addresses are equivalent to Automatic Private IP Addressing (APIPA) IPv4 addresses autoconfigured on computers that are running Windows. APIPA addresses use the 169.254.0.0/16 prefix. The scope of a link-local address is the local link. A link-local address is required for Neighbor Discovery processes and is always automatically configured, even in the absence of all other unicast addresses. 


Q2. - (Topic 1) 

You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate. 

You need to ensure that your user account can decrypt all EFS files on the computer. 

What should you do? 

A. From Credential Manager, add a Windows credential. 

B. From Credential Manager, add a certificate-based credential. 

C. From the local computer policy, add a data recovery agent. 

D. From the local computer policy, modify the Restore files and directories setting. 

Answer:

Explanation: 

EFS Recovery Recovery Agents are certificates that allow the restoration of EFS encrypted files. When a recovery agent has been specified using local policies, all EFS encrypted files can be recovered using the recovery agent private key. You should specify a recovery agent before you allow users to encrypt files on a client running Windows 7. You can recover all files that users encrypt after the creation of a recovery agent using the recovery agent's private key. You are not able to decrypt files that were encrypted before a recovery agent certificate was specified. You create an EFS recovery agent by performing the following steps: 

1. Log on to the client running Windows 7 using the first account created, which is the default administrator account. 

2. Open a command prompt and issue the command Cipher.exe /r:recoveryagent 

3. This creates two files: Recoveryagent.cer and Recoveryagent.pfx. Cipher.exe prompts you to specify a password when creating Recoveryagent.pfx. 

4. Open the Local Group Policy Editor and navigate to the \Computer Configuration\Windows Settings\Security Settings\Public Key Policies\Encrypting File System node. Right-click this node and then click Add Data Recovery Agent. Specify the location of Recoveryagent.cer to specify this certificate as the recovery agent. 

5. To recover files, use the certificates console to import Recoveryagent.pfx. This is the recovery agent's private key. Keep it safe because it can be used to open any encrypted file on the client running Windows 7. 


Q3. - (Topic 1) 

You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. A pre-shared key is not configured on the wireless access point. 

You need to connect a computer that runs Windows 7 to the wireless access point. 

Which security setting should you select for the wireless connection? 

A. 802.1x 

B. WPA-Personal 

C. WPA2-Enterprise 

D. WPA2-Personal 

Answer:

Explanation: 

WPA and WPA2 indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks. WPA2 enhances WPA, which in turn addresses weaknesses in the previous system, WEP. WPA was intended as an intermediate measure to take the place of WEP while an IEEE 802.11i standard was prepared. 802.1X provides port-based authentication, which involves communications between a supplicant (a client computer), an authenticator (a wired Ethernet switch or WAP), and an authentication server (typically a Remote Authentication Dial In User Service, or RADIUS, server). WPA2-Enterprise WPA-Enterprise and WPA2-Enterprise authenticate through the Extensible Authentication Protocol (EAP) and require computer security certificates rather than PSKs. The following EAP types are included in the certification program: 

-EAP-TLS 

-EAP-TTLS/MSCHAPv2 

-PEAPv0/EAP-MSCHAPv2 

-PEAPv1/EAP-GTC 

-EAP-SIM 

If you want to use AES and to use computer certificates rather than a PSK, you would choose WPA2- Enterprise.WPA2-PersonalIf you have a small network that is not in a domain and cannot access a CA server, but you install a modernWAP that supports AES, you would use WPA2-Personal (with a PSK).WPA-Personal If you have a small network that is not in a domain and cannot access a CA server and your WAP does not support AES, you would use WPA-Personal.802.1x If you have a RADIUS server on your network to act as an authentication server and you want the highest possible level of security, you would choose 802.1X. 


Q4. - (Topic 1) 

Your network contains an Active Directory domain. All servers run Windows Server 2008 R2 and are members of the domain. All servers are located in the main office. 

You have a portable computer named Computer1 that runs Windows 7. Computer1 is joined to the domain and is located in a branch office. 

A file server named Server1 contains a shared folder named Share1. 

You need to configure Computer1 to meet the following requirements: 

. Minimize network traffic between the main office and the branch office 

. Ensure that Computer1 can only access resources in Share1 while it is connected to the network. 

What should you do? 

A. On Computer1, enable offline files. 

B. On Computer1, enable transparent caching. 

C. On Server1, configure DirectAccess. 

D. On Server1, configure Share1 to be available offline. 

Answer:

Explanation: 

Transparent Caching When you enable transparent caching, Windows 7 keeps a cached copy of all files that a user opens from shared folders on the local volume. The first time a user opens the file, the file is stored in the local cache. When the user opens the file again, Windows 7 checks the file to ensure that the cached copy is up to date and if it is, opens that instead. If the copy is not up to date, the client opens the copy hosted on the shared folder, also placing it in the local cache. Using a locally cached copy speeds up access to files stored on file servers on remote networks from the client. When a user changes a file, the client writes the changes to the copy of the file stored on the shared folder. When the shared folder is unavailable, the transparently cached copy is also unavailable. Transparent caching does not attempt to keep the local copy synced with the copy of the file on the remote file server as the Offline Files feature does. Transparent caching works on all files in a shared folder, not just those that you have configured to be available offline. 


Q5. - (Topic 4) 

Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers arm members of an Active Directory domain. You use a computer named Client1. 

You plan to collect events from Client1 on Server1 by using HTTPS. On Server 1, you start and configure the Windows Event Collector service. On Client1, you start the Windows Remote Management service. 

You discover that no events are being collected. 

You need to ensure that events are forwarded from Client1 to Server1. 

What should you do? 

A. On Client1, create an outbound Rule to allow port 443 for the Domain connection type. 

B. On Server1, create a Windows Event Collector firewall exception for the Domain connection type. 

C. On Client1, create an inbound Rule to allow port 5986 for the Domain connection type. 

D. On Client1, create a Windows Remote Management firewall exception for the Public connection type. 

Answer:


Q6. - (Topic 2) 

You work as the Desktop support technician at Abc.com. The Abc.com network consists of a single Active Directory domain named Abc.com. 

The Abc.com management has instructed you to install Microsoft Windows 7 on all the client computers at Abc.com. You need to create a Windows 7 image that includes the Office 2007 

Microsoft Installer Package (MSI) package for the installation. 

What should you do? 

A. You should consider installing the MSI package by using the update command with the /slipstream switch. 

B. You should consider installing the MSI package by using the Msiexec command with the /package /uninstall switches. 

C. You should consider installing the MSI package by using the Msiexec command with the /package switch. 

D. You should consider installing the MSI package by using the Install command with the /package switch. 

Answer:


Q7. - (Topic 1) 

You have a reference computer that runs Windows 7. 

You plan to deploy an image of the computer. 

You create an answer file named answer.xml. 

You need to ensure that the installation applies the answer file after you deploy the image. 

Which command should you run before you capture the image? 

A. Imagex.exe /append answer.xml /check 

B. Imagex.exe /mount answer.xml /verify 

C. Sysprep.exe /reboot /audit /unattend:answer.xml 

D. Sysprep.exe /generalize /oobe /unattend:answer.xml 

Answer:

Explanation: 

To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart. Open an elevated command prompt on the reference computer and run the following command: c:\windows\system32\sysprep\sysprep.exe /oobe /generalize /shutdown Sysprep prepares the image for capture by cleaning up various user-specific and computer-specific settings, as well as log files. The reference installation now is complete and ready to be imaged. 


Q8. - (Topic 2) 

You have a customized image of Windows 7 Professional. 

You mount the image and modify the contents of the image. 

You need to restore the image to its original state. 

Which tool should you use? 

A. Dism.exe 

B. Ocsetup.exe 

C. Pkgmgr.exe 

D. Sysprep.exe 

Answer:

Explanation: 

Dism Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing. You can use DISM to perform the following actions: 

* Prepare a Windows PE image. 

* Enable or disable Windows features within an image. 

* Upgrade a Windows image to a different edition. 

* Add, remove, and enumerate packages. 

* Add, remove, and enumerate drivers. 

* Apply changes based on the offline servicing section of an unattended answer file. 

* Configure international settings. 

* Implement powerful logging features. 

* Service operating systems such as Windows Vista with SP1 and Windows Server 2008. 

* Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host. 

* Service all platforms (32-bit, 64-bit, and Itanium). 

* Use existing Package Manager scripts. 

DISM Command-Line Options 

To service a Windows image offline, you must apply or mount it. WIM images can be mounted using the WIM commands within DISM, or applied and then recaptured using ImageX. You can also use the WIM commands to list the indexes or verify the architecture for the image you are mounting. After you update the image, you must dismount it and then either commit or discard the changes you have made. 

NOT Sysprep 

Sysprep is a tool designed for corporate system administrators, OEMs, and others who need to deploy the Windows XP operating system on multiple computers. After performing the initial setup steps on a single system, you can run Sysprep to prepare the sample computer for cloning. Sysprep prepares the image for capture by cleaning up various user-specific and omputerspecific settings, as well as log files. The reference installation now is complete and ready to be imaged.