♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-680 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-680 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-680-exam-dumps.html

Q281. - (Topic 2) 

You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 is used to remotely manage Computer2. From Computer1, you need to verify that the Windows Remote Management (WinRM) service started on Computer2. 

What should you do? 

A. At the command prompt, run Winrs -r:computer2 query. 

B. At the command prompt, run Winrm id -remote:computer2 

C. From Windows Powershell, run Get -PSSession Computer2 

D. From Windows Powershell, run Get -PSSessionConfiguration Computer2 

Answer:


Q282. - (Topic 3) 

You need to modify the contents of an image that is contained in a Windows image (WIM) file. 

What should you do first? 

A. Run Diskpart /s. 

B. Run Peimg.exe /import. 

C. Create an empty folder on a NTFS partition. 

D. Create and attach a virtual hard disk (VHD). 

Answer:


Q283. - (Topic 2) 

You have a computer that runs Windows 7. The computer's disk is configured as shown in the exhibit. (Click the Exhibit button.) 

You need to extend volume C. 

What should you do first? 

A. Back up and delete volume D. 

B. Convert disk 0 to a dynamic disk. 

C. Remove the crash dump from volume C. 

D. Move the paging file from volume C to volume E. 

Answer:

Explanation: 

Extend a Basic Volume You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume, it must be raw or formatted with the NTFS file system. You can extend a logical drive within contiguous free space in the extended partition that contains it. If you extend a logical drive beyond the free space available in the extended partition, the extended partition grows to contain the logical drive. For logical drives, boot, or system volumes, you can extend the volume only into contiguous space and only if the disk can be upgraded to a dynamic disk. For other volumes, you can extend the volume into noncontiguous space, but you will be prompted to convert the disk to dynamic. 


Q284. - (Topic 4) 

A virtual hard disk (VHD) contains a Windows 7 Enterprise installation. 

You need to mount the VHD on a client computer. 

What should you do? 

A. Run the Dism command with the /Mount-Wimoption. 

B. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes. 

C. Run the Dism command with the /Add-Package option. 

D. Run the PEImg/Prepcommand. 

E. Add a boot image in WDS. 

F. Run the Dism command with the /Add-Driver option. 

G. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to True. 

H. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to No. 

I. Run the BCDEdit command. 

J. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to False. 

K. Run the Start/w ocsetup command. 

L. Run the imageX command with the /Mount parameter. 

M. Create a capture image in WDS. 

N. Run the DiskPart command and the Attach command option. 

Answer:


Q285. - (Topic 5) 

You have a computer that runs Windows 7. The computer is a member of a workgroup. 

You use Encrypting File System (EFS) to protect your local files. 

You need to ensure that you can decrypt EFS files on the computer if you forget your password. 

What should you do? 

A. Create an EFS Data Recovery Agent by using Group Policy. 

B. From User Accounts, select Manage your file encryption certificates. 

C. Run the cipher.exe /adduser /user:administrator command. 

D. Run the manage-bde -on C: -RecoveryPassword password command. 

Answer:

Explanation: Data Recovery Agent (DRA) is a user account that has been granted permissions to access all encrypted files even if the files have been encrypted using encryption key of another user account of the computer. Administrators must create and configure Data Recovery Agents before allowing users to encrypt their files. This serves as a proactive step taken by the administrators as once user account that has encrypted the file has been deleted from the computer, in the absence of DRA the files cannot be recovered whatsoever. 


Q286. - (Topic 1) 

You have a portable computer that runs Windows 7. You configure the computer to enter sleep mode after 10 minutes of inactivity. You do not use the computer for 15 minutes and discover that the computer has not entered sleep mode. 

You need to identify what is preventing the computer from entering sleep mode. 

What should you do? 

A. At a command prompt, run Powercfg energy. 

B. At a command prompt, run Systeminfo /s localhost. 

C. From Performance Monitor, review the System Summary. 

D. From Performance Information and Tools, review the detailed performance and system information. 

Answer:

Explanation: 

Command-line Power Configuration Powercfg.exe is a command-line utility that you can use from an administrative command prompt to manage Windows 7 power settings. It is possible to use Powercfg.exe to configure a number of Windows 7 powerrelated settings that you cannot configure through Group Policy or the Advanced Plan Settings dialog box. You can use Powercfg.exe to configure specific devices so that they are able to wake the computer from the Sleep state. You can also use Powercfg.exe to migrate power policies from one computer running Windows 7 to another by using the import and export functionality. -energy Check the computer for common energy-efficiency and battery life problems. Provides report in Hypertext Markup Language (HTML) format.For more information on Powercfg.exe, consult the following Microsoft TechNet document: http://technet.microsoft.com/en-us/library/cc748940.aspx. 


Q287. - (Topic 2) 

You have a public computer that runs Windows 7. 

On the computer, you create two user accounts named Admin1 and User1. Admin1 is a member of the Administration group, User1 is a member of the Users group. 

You need to configure the computer to meet the following requirements: 

. Allow Admin1 full access to Control Panel. 

. Prevent User1 from accessing the Control Panel. 

What should you do? 

A. Create a new local Group Policy object (GPO) linked to the Admin1 account. From User Configuration set Prohibit Access to Control Panel. 

B. Create a new local Group Policy object (GPO) linked to the User1 account. From User Configuration, set Prohibit Access to Control Panel. 

C. From Local Security Policy, set System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links) to Enabled and set User Account Control: Admin Approval Mode for the Built-in Administrator account to Disabled. 

D. From Local Security Policy, set System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links) to Disabled and set User Account Control: Admin Approval Mode for the Builtin Administrator account to Enabled. 

Answer:

Explanation: 

Group Policy Settings for Control Panel There are several Group Policy settings that control the behavior of Control Panel in Windows 7. The full path of this node in the Group Policy Management Console is: User ConfigurationAdministrative TemplatesControl PanelProhibit access to the Control PanelThis policy setting allows you to disable all Control Panel programs.If you enable this policy setting, you prevent Control.exe from starting. As a result, users cannot start Control Panel or run any Control Panel items. It also removes Control Panel from the Start menu, and it removes the Control Panel folder from Windows Explorer. If users try to select a Control Panel item from the Properties menu, a message appears that explains a policy setting prevents the action. 


Q288. - (Topic 3) 

You need to create a VPN connection. 

What should you do? 

A. From Windows Explorer, right-click Computer and then click Map network drive. 

B. From Windows Explorer, right-click Computer and then click Add a network location. 

C. From Network and Sharing Center, click Set up a new connection or network and then click Set up a new network. 

D. From Network and Sharing Center, click Set up a new connection or network and then click Connect to a workplace. 

Answer:

Explanation: 

Virtual Private Networks When you create a VPN connection, you need to specify the address of the VPN server that you are connecting to and your authentication credentials. You can create a new VPN connection in the Network And Sharing Center by clicking Set Up A New Connection Or Network and then Connect to a Workplace. When you create a new VPN connection, Windows 7 sets the VPN type to Automatic. You can configure a connection to use a specific VPN protocol, but if you do this, Windows 7 does not try to use other VPN protocols if the protocol you select is not available. 


Q289. - (Topic 3) 

You have a custom image of Windows 7. 

You discover that the boot configuration data store in the custom image is corrupted. 

You need to create a new configuration data store within the custom image. 

What should you do? 

A. Run Imagex.exe and specify the /append parameter. Run Bcdedit.exe. 

B. Run Imagex.exe and specify the /mountrw parameter. Run Bcdedit.exe. 

C. From Windows System Image Manager (Windows SIM), select the image and then create a configuration set. 

D. From Windows System Image Manager (Windows SIM), select the image and then create a catalog. 

Answer:

Explanation: 

ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice/mountrwMounts a .wim file from Windows XP with Service Pack 2 (SP2), Windows Server 2003 with Service Pack 1 (SP1), or Windows Vista with read/write permission to a specified directory. Once the file is mounted, you can view and modify all the information contained in the directory.BcdeditBCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe, and BCDEdit has improved scripting support.NOT Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets. NOTE: question specifies configuration data store, not configuration set. 


Q290. - (Topic 1) 

Your network consists of a single IPv4 subnet. The subnet contains 20 computers that run Windows 7. 

You add a new computer named Computer1 to the subnet. 

You discover that Computer1 has an IP address of 169.254.34.12. 

You cannot connect to other computers on the network. Other computers on the network can connect to each other. 

You need to ensure that you can connect to all computers on the network. What should you do? 

A. Turn off Windows Firewall. 

B. Run Ipconfig.exe /renew. 

C. Configure a static TCP/IP address. 

D. Run Netsh.exe interface ipv4 install. 

Answer:

Explanation: 

[Need better justification] Configuring static IP addresses When you assign a static IP address, you need to tell the computer the IP address you want to use, the subnet mask for this IP address, and, if necessary, the default gateway to use for internetwork communications. An IP address is a numeric identifier for a computer. Ip addressing schemes vary according to how your network is configured, but they're normally assigned based on a particular network segment.