70-680 Exam - TS:Windows 7,Configuring

certleader.com

Q1. DRAG DROP - (Topic 5) 

A computer that runs Windows XP has one partition. You install Windows 7 on the computer. 

You need to migrate a user profile from the Windows XP installation to the Windows 7 installation. 

What should you do? (To answer, drag the appropriate command from the list of commands to the correct location or locations in the work area.) 

Answer:  

Q2. - (Topic 2) 

You have two computers on the same subnet. The computers have the IPv6 addresses shown in the following table. 

You need to test the connection to the IPv6 address from Computer1 to Computer2. 

Which command should you run? 

A. Ping -6 fe80::44df:1b68%12 

B. Ping -6 fe80::44df:1b68%10 

C. Ping -R fe80::44df:1b68%12 

D. Ping -R fe80::44df:1b68%10 

Answer:

Explanation: 

1073 40112 

If you are pinging from one host to another using link-local addresses, you also need to include your interface ID, for example ping fe80::39cd:4c93%10. 

The % character followed by a number after each IPv6 address is the interface ID. 

If you want to display the configuration of the IPv6 interfaces on the local computer, you can enter netsh interface ipv6 show address. 

Ping -6 

Force using IPv6. 

Q3. - (Topic 6) 

Your organization uses Windows 7 computers. 

You remotely administer a computer. You attempt to ping the computer to verify that it is on the network, but you do not receive a response. The user is able to connect to network resources. 

You need to verify that the firewall on the computer is configured to allow pings. 

What should you do? 

A. Verify that the rule name Network Discovery (NB-Name-In) for inbound connections is enabled. 

B. Verify that the rule name File and Printer Sharing (Echo Request -ICMPv4-IN) for outbound connections is enabled. 

C. Verify that the rule name File and Printer Sharing (Echo Request -JCMPv4-IN) for inbound connections is enabled. 

D. Verify that the rule name Network Discovery (NB-Name-In) for outbound connections is enabled. 

Answer:

Explanation: Ref: http://technet.microsoft.com/en-us/library/cc732509(v=WS.10).aspx 

Q4. - (Topic 5) 

You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at your company has a network projector installed on a server within the company network. 

You need to connect to the projector from your computer. 

What should you do? 

A. From Accessories, click Connect to a Network Projector. 

B. From PowerShell, run the Net Config command. 

C. From Display, click Connect to a projector. 

D. Run the Displayswitch.exe command and select Projector only. 

Answer:

Q5. - (Topic 1) 

You have a computer that runs Windows 7. The computer has two volumes named volume 

C and volume D. 

You create a document on volume D. 

You manually create a restore point and modify the document. 

You view the properties of the document as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can restore the current version of the document if the document is modified. 

What should you do first? 

A. Run Disk Cleanup on volume D. 

B. Enable auditing on the document. 

C. Turn on System Protection for volume D. 

D. Start the Volume Shadow Copy Service (VSS). 

Answer:

Explanation: 

System Protection System protection regularly creates and saves information about your computer's system files and settings. It also saves previous versions of files that you have modified. It saves these files in restore points, which are created just before significant system events, such as the installation of a program or device driver. Restore points are also created automatically every seven days if no other restore points were created in the previous seven days. You can create restore points manually at any time. System protection is automatically on for the drive that holds the operating system and can be enabled only for drives that are formatted using the NTFS file system. It enables you to use system restore and to restore files to previous versions. You will configure system protection, create a restore point, and perform a system restore in the practice later in this lesson. 

Q6. DRAG DROP - (Topic 4) 

A company has client computers that run windows vista. 

You need to install Windows 7 on a client computer in a dual-boot configuration with the existing Windows Vista installation, without reducing the size of the partition that contains Windows Vista. 

Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer:  

Q7. - (Topic 1) 

You have a computer that runs Windows 7. 

You need to configure the computer to download updates from a local Windows Server Update Services (WSUS) server. What should you do? 

A. From Windows Update, modify the Windows Update settings. 

B. From the local Group Policy, modify the Windows Update settings. 

C. From the System settings, modify the System Protection settings. 

D. From the local Group Policy, modify the Location and Sensors settings. 

Answer:

Q8. - (Topic 5) 

You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point. You set the startup type of the NAP Agent service to Automatic on the computer. 

You need to complete the configuration of the computer as a NAP client. 

What should you do? 

A. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the ipconfig command. 

B. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the net command. 

C. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command. 

D. From the NAP Client Configuration console, configure the Health Registration settings. 

Answer:

Q9. - (Topic 1) 

You are creating an unattend answer file for automatic Windows 7 installation. What can you use to do this? Choose two. 

A. The Windows SIM tool in Windows AIK 

B. Microsoft Notepad 

C. The Deployment Workbench MDT tool 

D. Sysprep.exe 

Answer: A,B 

Q10. - (Topic 3) 

Your network has a main office and a branch office. 

The branch office has five client computers that run Windows 7 and a server that runs Windows Server 2008 R2. The branch office server is enabled for BranchCache. 

You need to configure Windows Firewall on each client computer so that cached content can be retrieved from the branch office server. 

Which firewall rule should you enable on the client computers? 

A. BranchCache - Content Retrieval (Uses HTTP) 

B. BranchCache - Hosted Cache Server (Uses HTTPS) 

C. BranchCache - Peer Discovery (Uses WSD) 

D. File and Printer Sharing 

Answer:

Explanation: 

Configure domain member client distributed cache mode firewall rules When you configure BranchCache in distributed cache mode, BranchCache client computers use the Hypertext Transfer Protocol (HTTP) for data transfer with other client computers. BranchCache client computers also use the Web Services Dynamic Discovery (WS-Discovery) protocol when they attempt to discover content on client cache servers. You can use this procedure to configure client firewall exceptions to allow incoming HTTP and WS-Discovery traffic on client computers that are configured for distributed cache mode. The BranchCache – Content Retrieval (Uses HTTP) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on TCP port 80. This rule is required for both Hosted Cache and Distributed Cache mode. The BranchCache – Peer-Discovery (Uses WSD) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on UDP port 3702. This rule is only required when using Distributed Cache mode. The BranchCache – Hosted Cache Client (HTTPS-Out) predefined rule. It this rule is not available, configure a rule that allows outbound traffic on TCP port 443. This rule is required only when using Hosted Cache mode.