70-680 Exam - TS:Windows 7,Configuring

certleader.com

Q1. - (Topic 5) 

You have a computer that runs Windows 7. The computer is a member of a workgroup. 

You use Encrypting File System (EFS) to protect your local files. 

You need to ensure that you can decrypt EFS files on the computer if you forget your password. 

What should you do? 

A. Create an EFS Data Recovery Agent by using Group Policy. 

B. From User Accounts, select Manage your file encryption certificates. 

C. Run the cipher.exe /adduser /user:administrator command. 

D. Run the manage-bde -on C: -RecoveryPassword password command. 

Answer:

Explanation: Data Recovery Agent (DRA) is a user account that has been granted permissions to access all encrypted files even if the files have been encrypted using encryption key of another user account of the computer. Administrators must create and configure Data Recovery Agents before allowing users to encrypt their files. This serves as a proactive step taken by the administrators as once user account that has encrypted the file has been deleted from the computer, in the absence of DRA the files cannot be recovered whatsoever. 

Q2. - (Topic 5) 

You manage several client computers in an organization. 

You need to ensure that all users, including administrators, are required to enter a username and password when uninstalling applications from any computer in the organization. 

What should you do? 

A. Create a custom GPO to modify the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting. 

B. Configure an AppLocker Windows Installer rule. 

C. Configure the User Account Control (UAC) settings on all client computers to always notify. 

D. Create a custom GPO to configure a software restriction policy. 

Answer:

Q3. - (Topic 5) 

You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:\Software. 

User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folder. 

You need to verify whether User1 can save files to C:\Software. 

What should you do? 

A. Run the Net View command. 

B. view the Share permissions on C:\Software. 

C. in the Advanced Security Settings for the Documents folder, select the Effective Permissions tab. 

D. Run the Wfs C:\Software command. 

Answer:

Q4. - (Topic 6) 

You are deploying a number of Windows 7 laptops. 

You create a custom power plan on one of the laptops that you want to replicate to the other laptops by using an unattended setup. 

You need to capture the power plan from the configured laptop for use in the deployment of the other laptops, save it to the removable drive F:, and name it MobileScheme. 

What should you do? 

A. Run the command powercfg duplicatescheme <GUID> F:\MobileScheme.pow from an elevated command prompt. 

B. Run the command powercfg -EXPORT F:\MobileScheme.pow {GUID} from an elevated command prompt. 

C. Run the command powercfg -S F:\MobileScheme.pow from an elevated command prompt. 

D. Create a power plan from the Power Options control panel and save it to the F: drive as MobileScheme. 

Answer:

Q5. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

You need to ensure that when Windows runs applications with elevated privileges, it enforces the Public Key Infrastructure (PKI) certification path validation for a given executable file. 

What should you use to accomplish this goal? 

A. the User Account Control Settings Control Panel window 

B. the Services management console 

C. Device Manager 

D. Local Users and Groups 

E. the icacls command 

F. the Group Policy management console 

G. the folder Properties window 

H. share permissions 

I. the netsh command 

Answer:

Explanation: 

Besides changing the notification behavior of UAC, you can also control the behavior of the UAC by using local or group policies. Local policies are managed from each local computer while group policies are managed as part of Active Directory. 

Follow these steps to change UAC settings: Click Start, type secpol.msc in the Search programs and files box, and press Enter. From the Local Security Policy tree, click Local Policies and then double-click Security Options The UAC policies are at the bottom of the list. To modify a setting, simply double-click on it and make the necessary changes. 

Q6. - (Topic 1) 

In Windows 7 you can control when users such as kids can login to Windows 7. 

Which of the following best describes where to configure this option? 

A. You cannot choose this feature unless you are connected to a domain. 

B. Go to the Start, Control Panel, User Accounts and Family Safety, Setup Parental Controls, and then choose Time Restrictions. 

C. Go to Start, Control Panel. User Profiles, and then Time Restriction Settings. 

D. Go to the Homegroup settings and choose Offline Time Settings. 

Answer:

Q7. DRAG DROP - (Topic 4) 

Your company network includes a Windows Server 2008 R2 server named Server1. You use a client computer named Client1 that has Windows 7 Enterprise installed. Both Computers are members of an Active Directory domain. 

You want to automatically forward events from Client1 to Server1. 

You need to configure the required source-initiated subscription. 

What should you do? (To answer, drop the appropriate configuration step or configurations steps to the correct target or target computers in the answer area. An answer choice can be used once, more than once, or not at all.) 

Answer:  

Q8. - (Topic 5) 

You administer an Active Directory domain that includes portable computers that have Windows 7 SP1 installed. You tog on to one of the portable computers by using a domain user account and install a new device driver for a bar-code scanner. 

You restart the portable computer after installing the new device driver. You successfully log on to the computer by using a domain user account. . 

After logging on, you discover that the bar-code scanner is not working due to a driver error. You try to remove the installed driver, but the Roll Back Driver option is unavailable. 

You need to be able to roll back the driver to its previous version. 

What should you do? 

A. From the Local Group Policy, modify Device Installation Restrictions. 

B. Run the Device Manager by using elevated permissions. 

C. Start the portable computer from the Windows 7 installation media and select Startup Repair. 

D. Start the computer and select Last Known Good Configuration from the advanced startup options. 

Answer:

Q9. - (Topic 6) 

A company has Windows 7 Enterprise computers that use BitLocker drive encryption on operating system drives. 

You need to configure multi-factor authentication before client computers are booted into Windows. 

On each client computer, what should you do? 

A. Configure a TPM PIN. 

B. Implement fingerprint authentication. 

C. Implement a Dynamic Access Control policy. 

D. Install a standalone certification authority server. 

Answer:

Explanation: BitLocker supports multifactor authentication for operating system drives. If you enable BitLocker on a computer that has a TPM version 1.2, you can use additional forms of authentication with the TPM protection. BitLocker offers the option to lock the normal boot process until the user supplies a personal identification number (PIN) or inserts a USB device (such as a flash drive) that contains a BitLocker startup key, or both the PIN and the USB device can be required. These additional security measures provide multifactor authentication and help ensure that the computer will not start or resume from hibernation until the correct authentication method is presented. 

Q10. DRAG DROP - (Topic 5) 

Twenty client computers run Windows XP. The computers are joined to a domain. You plan to perform a clean installation of Windows 7 on all the computers. 

You need to transfer all users' documents and settings. You must exclude music and video files. You must achieve this goal by using the minimum amount of administrative effort. 

Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: