70-680 Exam - TS:Windows 7,Configuring

certleader.com

Q1. - (Topic 4) 

You have a computer that runs Windows 7. Windows Update settings are configured as shown in the exhibit. (Click the Exhibit button.) 

You discover that standard users are never notified when updates are available. 

You need to ensure that standard users are notified when updates are available. 

What should you do? 

A. Select Allow all users to install updates on this computer. 

B. Specify an intranet Microsoft update service location in Group Policy. 

C. Change the Startup Type for the Windows Update service to Automatic. 

D. Select Give me recommended updates the same way I receive important updates. 

Answer:

Explanation: 

Change how Windows installs or notifies you about updates You can set Windows to automatically install important and recommended updates or to install important updates only. Important updates provide significant benefits, such as improved security and reliability. Recommended updates can address noncritical problems and help enhance your computing experience. Optional updates are not downloaded or installed automatically. If you don't want updates to be installed automatically, you can choose to be notified when updates apply to your computer instead. Then, you can download and install them yourself, or you can set Windows to automatically download updates, and then notify you so you can install them yourself. Here's how to change how Windows installs or notifies you about updates: 

1. Click to open Windows Update. 

2. In the left pane, click Change settings. 

3. Under Important updates, click one of the following: 

4. To schedule your automatic updates, next to Install new updates, select the day and time you want updates to occur. - Install updates automatically (recommended) 

-Download updates but let me choose whether to install them 

-Check for updates but let me choose whether to download and install them 

-Never check for updates (not recommended) 

5. To get recommended updates for your computer, under Recommended updates, select the Give me recommended updates the same way I receive important updates check box. 

6. To allow anyone using the computer to make updates, select the Allow all users to install updates on this computer check box. This applies only to updates and software that are installed manually; automatic updates will be installed regardless of the user. 

7. Click OK. If you're prompted for an administrator password or confirmation, type the password or provide confirmation. 

Q2. - (Topic 6) 

You have a Windows 7 Professional computer that is a member of an Active Directory domain. The domain group policy redirects documents to save to the network-attached storage device mapped to the F: drive. 

You want to implement a disaster recovery solution that restores only the local drives to a previous state. You attach an external drive to the computer locally and assign it to the X: drive. 

You need to configure the solution to perform the backup on a weekly basis. 

What should you do? 

A. Configure a Windows Backup to include a system image file to back up to the X: drive. Run the X: drive weekly. 

B. Create a batch file that runs the command "ntbackup backup systemstate /J "SystemStateBackup" /F "X: \Backup. bkf". Configure a Scheduled Task to run the command weekly. 

C. Create a batch file that runs the command "wbadmin start backup -backuptarget:x: -included: -quiet". Configure a Scheduled Task to run the command weekly. 

D. Configure a Windows Backup to include a system image file and select the F: drive to back up to the X: drive. Run the F: drive weekly. 

Answer:

Q3. - (Topic 1) 

You require fault tolerance for your operating system so that your computer running Windows 7 Home Premium can still boot up if a disk fails. 

You have two disks and unallocated space on your second disk. 

What do you do? 

A. Create a VHD and install an image of your computer on the VHD. Use BCDEdit to make the VHD bootable.256 

B. Create a RAID-0 volume. 

C. Create a RAID-1 volume. 

D. Create a RAID-5 volume. 

Answer:

Q4. - (Topic 3) 

You have a computer that runs Windows 7. 

You need to prevent users from installing a specific removable drive on the computer. 

You connect the removable drive to the computer. 

What should you do before you create a Group Policy? 

A. From Device Manager, identify the device class GUID. 

B. From Device Manager, identify the device location information. 

C. From System Information, identify the device INF file. 

D. From System Information, identify the device driver file name. 

Answer:

Explanation: 

The device class GUID is used to identify the device. Prevent Windows 7 from installing or updating device drivers whose device setup class GUIDs you specify. This policy overrides any other policy that permits update or installation. 

Q5. - (Topic 1) 

You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. A pre-shared key is not configured on the wireless access point. 

You need to connect a computer that runs Windows 7 to the wireless access point. 

Which security setting should you select for the wireless connection? 

A. 802.1x 

B. WPA-Personal 

C. WPA2-Enterprise 

D. WPA2-Personal 

Answer:

Explanation: 

WPA and WPA2 indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks. WPA2 enhances WPA, which in turn addresses weaknesses in the previous system, WEP. WPA was intended as an intermediate measure to take the place of WEP while an IEEE 802.11i standard was prepared. 802.1X provides port-based authentication, which involves communications between a supplicant (a client computer), an authenticator (a wired Ethernet switch or WAP), and an authentication server (typically a Remote Authentication Dial In User Service, or RADIUS, server). WPA2-Enterprise WPA-Enterprise and WPA2-Enterprise authenticate through the Extensible Authentication Protocol (EAP) and require computer security certificates rather than PSKs. The following EAP types are included in the certification program: 

-EAP-TLS 

-EAP-TTLS/MSCHAPv2 

-PEAPv0/EAP-MSCHAPv2 

-PEAPv1/EAP-GTC 

-EAP-SIM 

If you want to use AES and to use computer certificates rather than a PSK, you would choose WPA2- Enterprise.WPA2-PersonalIf you have a small network that is not in a domain and cannot access a CA server, but you install a modernWAP that supports AES, you would use WPA2-Personal (with a PSK).WPA-Personal If you have a small network that is not in a domain and cannot access a CA server and your WAP does not support AES, you would use WPA-Personal.802.1x If you have a RADIUS server on your network to act as an authentication server and you want the highest possible level of security, you would choose 802.1X. 

Q6. DRAG DROP - (Topic 6) 

You install Windows 7 Enterprise 64-bit on a client computer and create a reference image. 

The image file is stored on your computer and is named C:\Images\StandardDesktop.wim. You discover that a target computer deployed from the reference image is unable to automatically install drivers for some scanners and printers. 

The required drivers are located in the C:\Drivers folder on your computer. 

You need to include third-party signed drivers into the reference image. 

What should you do? (To answer, move the appropriate commands from the list of commands to the answer area and arrange them in the correct order.) 

Answer:  

Q7. - (Topic 1) 

Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain. 

From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain. 

You need to ensure that you can recover all EFS encrypted files from Computer2. 

What should you do? 

A. On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker. 

B. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate. 

C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter. 

D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter. 

Answer:

Explanation: 

You can import the recovery agent to another computer running Windows 7 if you want to recover files encrypted on the first computer. You can also recover files on another computer running Windows 7 if you have exported the EFS keys from the original computer and imported them on the new computer. You can use the Certificates console to import and export EFS keys. 

NOT Secedit.exe: 

You can use both the Local Group Policy Editor and the Local Security Policy console to import and export security-related Group Policy settings. You can use this import and export functionality to apply the same security settings to stand-alone computers that are not part of a domain environment. Exported security files are written in Security Template .inf format. As well as using Local Group Policy Editor and the Local Security Policy console to import policies that are stored in .inf format, you can apply them using the Secedit.exe command-line utility. 

NOT Cipher.exe /removeuser /adduser. NOT DigitalLocker. 

Q8. - (Topic 3) 

You have a computer that runs Windows 7. The computer contains a folder named C:\data. 

You use Advanced Sharing to share C:\data by using the default share permissions. 

When a user tries to access the share over the network, he gets an "Access is Denied" error message. 

You need to ensure that the user can access the share. 

What should you do? 

A. Allow file and printer sharing through Windows Firewall. 

B. Change the network location from a Public network to a Home or Work network. 

C. From the Security settings of the folder, assign the user the Read NTFS permission. 

D. From the Advanced Sharing settings of the folder, assign the user the Read share permission. 

Answer:

Explanation: 

Advanced Security Settings Properties Page - Permissions Tab You can add additional resources, groups or users to have explicit NTFS permissions to access this object, or you can edit or remove the NTFS permissions granted to a resource, group, or user on the object. Inherited permissions are those that are propagated to an object from a parent object. Inherited permissions ease the task of managing permissions and ensure consistency of permissions among all objects within a given container. 

Q9. - (Topic 5) 

You have a computer that runs Windows 7. Windows XP Mode and Windows Virtual PC are installed on the computer. 

When running Windows XP Mode with Windows Virtual PC, you install a 16-bit application named App1.exe. 

You need to ensure that you can start Appl.exe by using a shortcut on the Windows 7 Start menu. 

What should you do? 

A. From Windows 7, add a shortcut to the Start menu. 

B. From the virtual PC, add a shortcut to the Start menu. 

C. From Windows 7, run Start appl.exe /separate. 

D. From the virtual PC, run Start appl.exe /separate. 

Answer:

Q10. - (Topic 5) 

You have a computer that runs Windows 7. The computer is a member of a workgroup. 

You use Encrypting File System (EFS) to protect your local files. 

You need to ensure that you can decrypt EFS files on the computer if you forget your password. 

What should you do? 

A. From Authorization Manager, modify the Authorization Manager options. 

B. From Credential Manager, select Back up vault. 

C. Create an EFS Data Recovery Agent by using Group Policy. 

D. From User Accounts, select Manage your file encryption certificates. 

Answer:

Explanation: Data Recovery Agent (DRA) is a user account that has been granted permissions to access all encrypted files even if the files have been encrypted using encryption key of another user account of the computer. Administrators must create and configure Data Recovery Agents before allowing users to encrypt their files. This serves as a proactive step taken by the administrators as once user account that has encrypted the file has been deleted from the computer, in the absence of DRA the files cannot be recovered whatsoever.