Exam Code: 70-680
Exam Name: TS: Windows 7, Configuring
Your office contains the wireless networks shown the following table:
You have a portable computer that runs Windows 7. The computer successfully connects to all of the wireless networks.
You discover that when you start the computer, it connects to Network2.
You need to ensure that the computer connects to Network3 by default.
What should you do?
A. From Network and Sharing Center, modify the Advanced sharing settings.
B. From Network and Sharing Center, modify the Manage Wireless Networks settings.
C. From Network Connections, modify the properties of the wireless network adapter.
D. From Network Connections, modify the bindings of the wireless network adapter.
Managing Preferred Wireless Networks
If you have a wireless-enabled mobile computer such as a laptop, you can take it to various locations and connect to whatever wireless networks are available at any location.
You can see the available networks by opening Network And Sharing Center and clicking Connect To A Network.
You can also click the Wireless icon on the Toolbar at the bottom right section of your screen.
You can then right-click a network and click Connect. Available networks are listed in the Manage Wireless Networks dialog box. If you have previously connected to various wireless networks, the list of these networks is referred to as your preferred list. The wireless networks on your preferred list are your preferred wireless networks.
You can click Manage Wireless Networks in the Network And Sharing Center and view saved wireless networks.
You can change the order in which your computer attempts to connect to preferred networks by dragging the networks up or down in the list.
You can also change preferences for the network by right-clicking the network and selecting Properties.
You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?
A. From Network and Sharing Center, click Connect to a network.
B. From Network and Sharing Center, click Set up a new connection or network.
C. From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.
D. From Windows Firewall with Advanced Security, click Connection Security Rules and then click New Rule.
Connection Security Rules
Connection security rules are a special type of rule that deal with authenticated and encrypted traffic. You can use connection security rules to manage how communication occurs between different hosts on the network. You use the New Connection Security Rule Wizard, to create connection security rules. Connections can be authenticated using the Kerberos V5 protocol requiring a domain computer and user account or a domain computer account. If you select advanced properties, connections can be authenticated using NTLMv2, computer certificates from a particular certificate authority (CA) or using a pre- shared key.Connection Security Rules and IPSec policies The relationship between connection security rules and IPSec policies is similar to the relationship between AppLocker and Software Restriction Policies. Both sets of rules do similar things, but the ones that you use depend on the operating systems used by the client computers in your organization. All editions of Windows 7 and Windows Vista support connection security rules, but Windows XP does not.
You have a computer named Computer1 that runs Windows 7.
You have a server named Server1 that runs Windows Server 2008. Server1 has a file share named Share1. The network configuration for Computer1 is shown in the exhibit. (Click the Exhibit button.)
You attempt to connect to \\Server1\Share1 and receive the following error message:
“Windows cannot access \\Server1\Share1.” From Computer1, you successfully ping Server1.
You need to connect to \\Server1\Share1.
What should you enable on Computer1?
A. Client for Microsoft Networks
B. File and Printer Sharing for Microsoft Networks
C. Link-Layer Topology Discovery Mapper I/O Driver
D. Link-Layer Topology Discovery Responder
Client for Microsoft Networks Allows the computer to access resources on a Microsoft network.File and Printer Sharing for Microsoft NetworksEnables other computers to access resources on your computer in a Microsoft network (and other networks).Link-layer Topology Discovery Mapper I/O DriverDiscovers and locates other computers, devices, and network infrastructure features on the network, and determines network bandwidth.
Link-layer Topology Discovery ResponderAllows a computer to be discovered and located on the network.
You have three computers that run Windows 7.
You use Windows PowerShell to perform remote administration tasks on all three computers.
You need to remotely administer all three computers by using PowerShell.
Which PowerShell cmdlet should you use?
Creates a persistent connection to a local or remote computer. The New- PSSession cmdlet creates a Windows PowerShell session (PSSession) on a local or remote computer. When you create a PSSession, Windows PowerShell establishes a persistent connection to the remote computer. Use a PSSession to run multiple commands that share data, such as a function or the value of a variable. To run commands in a PSSession, use the Invoke-Command cmdlet. To use the PSSession to interact directly with a remote computer, use the Enter-PSSession cmdlet. You can run commands on a remote computer without creating a PSSession by using the ComputerName parameters of Enter-PSSession or Invoke-Command. When you use the ComputerName parameter, Windows PowerShell creates a temporary connection that is used for the interactive session or for a single command and is then closed.
You have a computer named Computer1 that runs Windows 7. Computer1 has a shared printer. You need to configure Computer1 so that only Administrators are authorized to shut down the computer.
What should you do?
A. From User Accounts, modify the user profiles settings.
B. From User Accounts, modify the User Account Control (UAC) settings.
C. From the local comput er policy, modify the Security Options.
D. From the local computer policy, modify the User Rights Assignment.
Shut down the system
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment Description Determines which users logged on locally to the computer can shut down the operating system using the Shut Down command. This user right is defined in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.
Your company has a main office and a branch office. The relevant portion of the network is configured as shown in the exhibit. (Click the Exhibit button.)
In the branch office, you deploy a new computer named Computer1 that runs Windows 7.
You need to assign an IP address to Computer1.
Which IP address should you use?
Internal IP Adress of router is 192.168.2.62/27Leaves 5 bits for range = 32 addresses (including the 2 reserved addresses)Subnet Mask = 255.255.255.224
You have a computer that runs Windows Vista.
You install Windows 7 on a new partition on the computer.
You need to ensure that the computer always starts Windows Vista by default.
What should you do?
A. Create a boot.ini file in the root of the Windows 7 partition.
B. Create a boot.ini file in the root of the Windows Vista partition.
C. Run Bcdedit.exe and specify the /default parameter.
D. Run Bcdedit.exe and specify the /bootems parameter.
You have a computer that runs Windows Vista. The computer contains a custom application.
You need to export the user state and the settings of the custom application.
What should you do?
A. Run Loadstate.exe and specify the /config parameter.
B. Run Scanstate.exe and specify the /genconfig parameter.
C. Modify the miguser.xml file. Run Loadstate.exe and specify the /ui parameter.
D. Modify the migapp.xml file. Run Scanstate.exe and specify the /i parameter.
MigApp.xml This file contains rules about migrating application settings. These include Accessibility settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service (RAS) connection phone book files, regional options, remote access, screensaver settings, taskbar settings, and wallpaper settings.(Include) /i:[Path\]FileName Specifies an .xml file that contains rules that define what user, application or system state to migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml, MigUser.xml and any custom .xml files that you create). Path can be either a relative or full path. If you do not specify the Path variable, then FileName must be located in the current directory.NOT MigUser.xmlMigUser.xml This file contains rules about user profiles and user data. The default settings for this file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu, Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc, .dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*, .pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, .accdb, .mdb, .pub, .xla, .xlb and .xls. The asterisk ( *) represents zero or more characters.
You have a computer that runs Windows 7. Multiple users log on to your computer.
You enable auditing on a folder stored on your computer.
You need to ensure that each access to the folder is logged.
What should you do?
A. Start the Problem Steps Recorder.
B. From Event Viewer, modify the properties of the Security log.
C. From the local Group Policy, configure the Audit object access setting.
D. From the local Group Policy, configure the Audit directory service Access setting.
Audit object access
Determines whether to audit the event of a user accessing an object (for example, file, folder, registry key, printer, and so forth) which has its own system access control list (SACL) specified. By default, this value is set to No auditing in the Default Domain Controller Group Policy object (GPO) and in the local policies of workstations and servers. If you define this policy setting, you can specify whether to audit successes, audit failures, or not to audit the event type at all. Success audits generate an audit entry when a user successfully accesses an object that has a SACL specified. Failure audits generate an audit entry when a user unsuccessfully attempts to access an object that has a SACL specified. You can select No auditing by defining the policy setting and unchecking Success and Failure.
You have a computer that runs Windows 7. The computer has two volumes named volume C and volume D. You create a document on volume D.
You manually create a restore point and modify the document.
You view the properties of the document as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can restore the current version of the document if the document is modified. What should you do first?
A. Run Disk Cleanup on volume D.
B. Enable auditing on the document.
C. Turn on System Protection for volume D.
D. Start the Volume Shadow Copy Service (VSS).
System protection regularly creates and saves information about your computer’s system files and settings. It also saves previous versions of files that you have modified. It saves these files in restore points, which are created just before significant system events, such as the installation of a program or device driver. Restore points are also created automatically every seven days if no other restore points were created in the previous seven days. You can create restore points manually at any time. System protection is automatically on for the drive that holds the operating system and can be enabled only for drives that are formatted using the NTFS file system. It enables you to use system restore and to restore files to previous versions. You will configure system protection, create a restore point, and perform a system restore in the practice later in this lesson.
If you want to pass Microsoft 70-680 exam successfully, donot missing to read latest lead2pass Microsoft 70-680 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.