OFFER Free Microsoft 70-680 PDF and VCE Exam Dumps 221-230

15 Nov

Vendor: Microsoft
Exam Code: 70-680
Exam Name: TS: Windows 7, Configuring
Version: 14.79

QUESTION 221
You support desktop computers that have Windows 7 Enterprise installed. All computers are configured with system protection on drive C and with a backup task that runs daily at midnight.
One of the users reports that in the morning she has installed a new version of a browser.
After the installation, a folder that has favorite shortcuts was replaced with new content.
You need to restore the most recent version of the folder that contains the user data.
What should you do?

(To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

wpsAB68.tmp

Answer:

wpsBB22.tmp

QUESTION 222
You use a computer that has Windows 7 SP1 installed and has a folder named C:\Data. The active network connection for the computer is configured as Public.
You assign User1 to a local group called DataUsers. The group has been granted Read NTFS permissions for the folder. User1 browses to the shared folder across the network and receives the following error message:

“Access is Denied.”

You need to ensure that the user can download files from the shared folder.
What should you do?

A.    Allow file and printer sharing through Windows Firewall.
B.    Change the network location of the computer from a Public network to a Home or Work network.
C.    From the Security settings of the C:\Data folder, assign the Full Control NTFS permissions to User1.
D.    From the Advanced Sharing settings of the folder, assign the Read share permission to User1.
E.    From the Advanced Sharing permissions, enable caching.

Answer: D

QUESTION 223
You have a public computer that runs Windows 7. On the computer, you create two user accounts named Admin1 and User1. Admin1 is a member of the Administrators group and User1 is a member of the Users group. You need to configure the computer to meet the following requirements:

– Allow Admin1 full access to Control Panel.
– Prevent User1 from accessing Control Panel.

What should you do?

A.    Create a new local Group Policy object (GPO) linked to the Admin1 account.
From User Configuration set Prohibit Access to Control Panel to Disabled.
B.    Create a new local Group Policy object (GPO) linked to the User1 account.
From User Configuration, set Prohibit Access to Control Panel to Enabled.
C.    From Local Security Policy, set System objects:
Strengthen default permissions of internal system objects (e.g., Symbolic Links) to Enabled and set
User Account Control: Admin Approval Mode for the Built-in Administrator account to Disabled.
D.    From Local Security Policy, set System objects:
Strengthen default permissions of internal system objects (e.g., Symbolic Links) to Disabled and set
User Account Control: Admin Approval Mode for the Builtin Administrator account to Enabled.

Answer: B
Explanation:
Group Policy Settings for Control Panel
There are several Group Policy settings that control the behavior of Control Panel in Windows 7. The full path of this node in the Group Policy Management Console is: User Configuration\Administrative Templates\Control PanelProhibit access to the Control PanelThis policy setting allows you to disable all Control Panel programs.If you enable this policy setting, you prevent Control.exe from starting. As a result, users cannot start Control Panel or run any Control Panel items. It also removes Control Panel from the Start menu, and it removes the Control Panel folder from Windows Explorer. If users try to select a Control Panel item from the Properties menu, a message appears that explains a policy setting prevents the action.

QUESTION 224
Your network has a main office and a branch office. The branch office has five client computers that run Windows 7 and a server that runs Windows Server 2008 R2. The branch office server is enabled for BranchCache.
You need to configure Windows Firewall on each client computer so that cached content can be retrieved from the branch office server.
Which firewall rule should you enable on the client computers?

A.    BranchCache – Content Retrieval (Uses HTTP)
B.    BranchCache – Hosted Cache Server (Uses HTTPS)
C.    BranchCache – Peer Discovery (Uses WSD)
D.    File and Printer Sharing

Answer: A
Explanation:
Configure domain member client distributed cache mode firewall rules When you configure BranchCache in distributed cache mode, BranchCache client computers use the Hypertext Transfer Protocol (HTTP) for data transfer with other client computers. BranchCache client computers also use the Web Services Dynamic Discovery (WS-Discovery) protocol when they attempt to discover content on client cache servers. You can use this procedure to configure client firewall exceptions to allow incoming HTTP and WS-Discovery traffic on client computers that are configured for distributed cache mode. The BranchCache ?Content Retrieval (Uses HTTP) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on TCP port 80. This rule is required for both Hosted Cache and Distributed Cache mode. The BranchCache ?Peer- Discovery (Uses WSD) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on UDP port 3702. This rule is only required when using Distributed Cache mode. The BranchCache Hosted Cache Client (HTTPS-Out) predefined rule. It this rule is not available, configure a rule that allows outbound traffic on TCP port 443. This rule is required only when using Hosted Cache mode.

QUESTION 225
You have an answer file for a Windows 7 installation.
You need to perform an unattended installation of Windows 7 by using the answer file.
What should you do?

A.    Name the answer file autounattend.ini and save it to a USB disk. Start the computer from the Windows
7 DVD.
B.    Name the answer file unattend.txt and save it to a USB disk. Start the computer from the Windows
Preinstallation Environment (Windows PE).
C.    Name the answer file autounattend.xml and save it to a USB disk. Start the computer from the Windows
7 DVD.
D.    Name the answer file unattend.xml and save it to a USB disk. Start the computer from the Windows
Preinstallation Environment (Windows PE).

Answer: C
Explanation:
Unattended installation
You can perform an unattended installation of Windows 7 by using an installation file called Unattend.xml. These installation files store answers to the questions asked by the Setup Wizard. When the Windows 7 installation process starts, Windows checks for attached
USB storage devices that have this file in their root directory.
Unattended installations are suitable when you need to deploy Windows 7 to a large number of computers because you do not have to interact with them manually, responding to prompts, as the installation progresses.Building a Reference Installation You configure your reference computer with a customized installation of Windows 7 that you then duplicate onto one or more destination computers. You can create a reference installation by using the Windows product DVD and (optionally) the answer file you created in the previous section. To install your reference computer using an answer file, perform the following procedure:
1. Turn on the reference computer. Insert the Windows 7 product DVD and the UFD containing the answer file (Autounattend.xml) that you created in the previous section. Note that the use of an answer file is optional, although it is the method Microsoft recommends. If you prefer, you can install Windows 7 manually from the installation DVD-ROM.
2. Restart the computer by pressing CTRL+ALT+DEL.
You may have to override the boot order to boot from the CD/DVD-ROM disk. If so, select the appropriate function key to override the boot order during initial boot. Windows Setup (Setup.exe) starts automatically and searches the root directory of all removable media for an answer file called Autounattend.xml.
3. After Setup finishes, you can validate that all customizations were applied. For example, if you included the optional Microsoft-Windows-IE-InternetExplorer feature and set the Home_Page setting in your answer file, you can verify these settings by opening Internet Explorer.
4. To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart.

QUESTION 226
You have a Windows 7 Windows image (WIM) that is mounted.
You need to view the list of third-party drivers installed in the image.
What should you do?

A.    Run Dism.exe and specify /get drivers parameter.
B.    Run Driverquery.exe and specify the /si parameter.
C.    From Device Manager, view all hidden devices.
D.    From Windows Explorer, open the \Windows\System32\Drivers folder from the mount folder.

Answer: A
Explanation:
DismDeployment Image Servicing and Management (DISM) is a command-line tool used to service Windows images offline before deployment.
You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system.
Windows 7 introduces the DISM command-line tool.
You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing. You can use DISM to perform the following actions: – Prepare a Windows PE image.
– Enable or disable Windows features within an image.
– Upgrade a Windows image to a different edition.
– Add, remove, and enumerate packages.
– Add, remove, and enumerate drivers.
– Apply changes based on the offline servicing section of an unattended answer file.
– Configure international settings.
– Implement powerful logging features.
– Service operating systems such as Windows Vista with SP1 and Windows Server 2008.
– Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.
– Service all platforms (32-bit, 64-bit, and Itanium).
– Use existing Package Manager scripts.
NOT DriverqueryEnables an administrator to display a list of installed device drivers and their properties. If used without parameters, driverquery runs on the local computer. (Could not see documention of images, only computers, therefore assumed this command does not support images) /si : Displays digital signature information for both signed and unsigned device drivers.

QUESTION 227
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. AnAnswer choice may be correct for more than one QUESTION in the series.

You use a desktop computer that has Windows 7 Ultimate SP1. This relevant portions of the computer configuration are shown in the following below.

– The Disk Management Console (Click the Exhibit button.)

wps145A.tmp

– The System Properties window (Click the Exhibit button.)

wps29DE.tmp

– The System protection for Local Disk C window (Click the Exhibit button.)

wps3E49.tmp

You create a password for several Microsoft Office files from your Documents library.
You share the Documents library over a network.
You need to ensure that network users are unable to access the unprotected version of the files. What should you do?

A.    Delete restore points.
B.    Create a restore point.
C.    Perform a system restore.
D.    Search for the file in the Recycle Bin.
E.    Increase disk space used for system protection.
F.    Copy the file from a previous version of a folder
G.    Set restore settings Only restore previous version of files.
H.    Run the cipher /x command from the elevated command prompt.
I.    Run the vssadmin list volumes command from the elevated command prompt.
J.    Run the vssadmin list shadows command form the elevated command prompt.
K.    Run the compact /U <file_name> command form the elevated command prompt.

Answer: A

QUESTION 228
Note: This question is part of a series of questions that use the same set of answer choices. An Answer choice may be correct for more than one question in the series.

You use a desktop computer that has Windows 7 Ultimate SP1. This relevant portions of the computer configuration are shown in the following below.

– The Disk Management Console (Click the Exhibit button.)

wps5C35.tmp

– The System Properties window (Click the Exhibit button.)

wps71E8.tmp

– The System protection for Local Disk C window (Click the Exhibit button.)

wps854A.tmp

You share your Documents library over a network.
You discover that one of the files in the library was replaced with a previous version and then renamed.
You need to restore the most recent version of the original file.
What should you do?

A.    Delete restore points.
B.    Create a restore point.
C.    Perform a system restore.
D.    Search for the file in the Recycle Bin.
E.    Increase disk space used for system protection.
F.    Copy the file from a previous version of a folder.
G.    Set restore settings Only restore previous version of files.
H.    Run the cipher /x command from the elevated command prompt.
I.    Run the vssadmin list volumes command from the elevated command prompt.
J.    Run the vssadmin list shadows command form the elevated command prompt.
K.    Run the compact /U <file_name> command form the elevated command prompt.

Answer: F
Explanation:
Note: To restore a previous version of a file or folder that’s included in a library, right-click the file or folder in the location where it’s saved, rather than in the library. For example, to restore a previous version of a picture that’s included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions.

QUESTION 229
Note: This question is part of a series of questions that use the same set of answer choices. An Answer choice may be correct for more than one question in the series.

You use a desktop computer that has Windows 7 Ultimate SP1. This relevant portions of the computer configuration are shown in the following below.

– The Disk Management Console (Click the Exhibit button.)

wpsA22D.tmp

– The System Properties window (Click the Exhibit button.)

wpsB503.tmp

– The System protection for Local Disk C window (Click the Exhibit button.)

wpsC98D.tmp

You share the Pictures library over a network.
You discover that a JPEG image file located in the library was moved by a network user into a ZIP archive and is protected by using a password.
You need to open the image file.
What should you do?

A.    Delete restore points.
B.    Create a restore point.
C.    Perform a system restore.
D.    Search for the file in the Recycle Bin.
E.    Increase disk space used for system protection.
F.    Copy the file from a previous version of a folder.
G.    Set restore settings Only restore previous version of files.
H.    Run the cipher /x command from the elevated command prompt.
I.    Run the vssadmin list volumes command from the elevated command prompt.
J.    Run the vssadmin list shadows command form the elevated command prompt.
K.    Run the compact /U <file_name> command form the elevated command prompt.

Answer: F
Explanation:
Note: To restore a previous version of a file or folder that’s included in a library, right-click the file or folder in the location where it’s saved, rather than in the library. For example, to restore a previous version of a picture that’s included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions.

QUESTION 230
You have a computer that runs Windows 7.
You have a system image backup of the computer.
You install a new application that is configured to run as a service.
You restart the computer and receive a STOP error message.
You need to successfully start Windows 7 in the minimum amount of time.
What should you do?

A.    Start the computer from the Windows 7 installation media and select Startup Repair.
B.    Start the computer and select Last Known Good Configuration from the advanced startup options.
C.    Start the computer and select Safe Mode from the advanced startup options. Restore a restore point.
D.    Start the computer and select Safe Mode from the advanced startup options.
Restore the system image.

Answer: B
Explanation:
Last Known Good Configuration (Advanced) ) feature in Advanced Boot Options is a recovery option that you use to start your computer with the most recent settings that worked. Last Known Good Configuration (Advanced) restores registry information and driver settings that were in effect the last time the computer started successfully. You should use the Last Known Good Configuration (Advanced) feature when you cannot start Windows 7 after you make a change to your computer, or when you suspect that a change that you just made is causing a problem, for example, if you cannot start Windows after you install a new video driver. When you start your computer by using the Last Known Good Configuration (Advanced) feature, Windows 7 uses the configuration stored in the following registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSetXX (where by XX are numbers starting with 01 and rising in number to 02, 03, 04 and so on). This is the registry key that is used to store the configuration settings for the Drivers and Services on the system. Each time you boot the system, Windows will be assisted booting by using the registry key “HKEY_LOCAL_MACHINE\System\CurrentControlSet” which will point to another control set key, normally
HKEY_LOCAL_MACHINE\System\CurrentControlSet01, (depending on how the system is configured) which contains the setting for the current boot process. Each time Windows boots there will also be a values created under the “HKEY_LOCAL_MACHINE\System\CurrentControlSet\Select” key. These contain REG_DWORD data that enable the Control Keys to operate the way they are designed to. These values tell the CurrentControlSet key which numbered CurrentControlSet to point to enable Windows to boot successfully. The data that tells Last Good Known Configuration which numbered CurrentControlSet to load is also stored under these values. They also contain the data that tells Windows which CurrentContolSet not to use, as there is information stored that lets Windows know what CurrentControlSet has failed to load when Windows was unable to boot.
The Last Known Good Configuration CurrentControlSet will change each time the system configuration for the control set changes. This means that each time you install or uninstall a driver or service, a new numbered CurrentControlSet will be created and stored. If you alter the system, and it is then unable to boot, the Last Known Good Configuration will point to the CurrentControlSet that was last used in a successful boot.
This happens each time that Windows boots and there should typically be only four control sets, although it is not uncommon to have five or six of these Control Sets contained in the registry. Windows will keep track of how many Control Sets are stored and should clear old ones once a certain amount is reached.
If installing a new program or device should render the system unbootable, you may be able to use “Last Known Good Configuration” to restore the damaged Control Set registry key with an earlier key that enabled the system to boot. This will remove the registry key(s) that relates to the problem driver or service. It will not remove the actual driver or service but will render it unusable. This could result in any program or device the was installed after the last boot having to be re-installed as their configuration setting will have been over written.
When you perform a system restore following a normal boot or following a boot that uses the Last Known Good Configuration (Advanced) option, a restore point is created that enables you to undo the changes if they do not fix your problem. However, if you perform a system restore when the computer is in Safe Mode or by using the System Recovery options, you cannot undo the restore operation. In this case, if your problem is not resolved, you can run another system restore and choose a different restore point.

If you want to pass Microsoft 70-680 exam successfully, donot missing to read latest lead2pass Microsoft 70-680 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

http://www.lead2pass.com/70-680.html