70-680 Exam - TS:Windows 7,Configuring

certleader.com

Q1. - (Topic 2) 

You have a computer named Computer1 that runs Windows 7. Computer1 is a member of an Active Directory domain. Remote Desktop is enabled on the computer. 

You share a folder on Computer1. 

You need to configure Computer1 to meet the following requirements: 

Allow computers in the local subnet to access the shared folder 

Prevent computers in remote subnets from accessing the shared folder 

Allow all computers to connect to Computer1 by using Remote Desktop 

What should you do? 

A. Modify the subnet mask. 

B. Modify the Public folder sharing settings. 

C. Disable network discovery on all computers located in remote subnets. 

D. Modify the properties of the File and Printer Sharing firewall exceptions. 

Answer:

Explanation: 

Network ProfilesNetwork profiles are important because you can use them to apply different collections of firewall rules based on which network profile is active. A significant difference between Windows Vista and Windows 7 is that in Windows 7, profiles apply on a per-network interface basis. This means that if you have one network adapter connected to the Internet and another connected to your office LAN, different sets of rules apply for each connection. The firewall in Windows Vista chooses the most restrictive network profile when a computer has connections to different network types and applies the most restrictive set of rules to all interfaces.Allowing Programs Through Windows FirewallWindows Firewall allows you to configure exceptions based on programs. This differs from Windows Vista where Windows Firewall would allow you to configure exceptions based on port address. You can still create rules based on port address; you just have to do it using WFAS, covered later in this lesson. You can also allow specific Windows 7 features, such as Windows Virtual PC, through Windows Firewall. Feature rules become available when you enable the feature using the Programs And Features item in Control Panel. To add a rule for a feature or program, click Allow A Program Or Feature Through Windows Firewall item in the Windows Firewall section of Control Panel. The figure shows a list of currently installed features and any programs for which rules have been created as well as the profiles for which rules concerning those programs and features are enabled.File and Printer Sharing This feature is used for sharing local files and printers with other users on the network. (Uses NetBIOS, LLMNR, SMB and RPC) 

Q2. - (Topic 1) 

You are installing Windows 7 on from the desktop of a Windows XP Professional PC. Which of the following can be performed from the Windows 7 DVD? Choose three. 

A. Run setup.exe from the DVD to start the Windows 7 installation. 

B. Use the autorun feature on the DVD to start the installation. 

C. Perform a full installation of Windows 7. 

D. Perform and upgrade of Windows 7 keeping all the Windows XP settings. 

Answer: A,B,C 

Q3. - (Topic 2) 

You have a computer that runs Windows Vista (x86). 

You need to perform a clean installation of Windows 7 (64-bit). 

What should you do? 

A. From the Windows 7 installation media, run Rollback.exe. 

B. From the Windows 7 installation media, run Migsetup.exe. 

C. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option. 

D. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Custom (advanced) option. 

Answer:

Explanation: 

When you are performing a clean installation, you should select Custom (Advanced). Almost all installations ofm Windows 7 that you will perform will be of the Custom (Advanced) type rather than upgrades. You can initiate upgrade installations only from within Windows Vista or Windows 7.NOT Rollback, Migsetup, or Upgrade:Specified clean installation not migration, update or rollback. 

Q4. DRAG DROP - (Topic 6) 

An employee has a Windows Vista SP1 32-bit computer that uses legacy devices. You need to upgrade the computer to Windows 7 32-bit based on the following 

requirements: 

. Ensure application and third-party hardware compatibility. 

. Preserve existing applications, settings, and documents. 

Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order. ) 

Answer:  

Q5. - (Topic 6) 

You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point. You set the startup type of the NAP Agent service to Automatic on the computer. 

You need to complete the configuration of the computer as a NAP client. 

What should you do? 

A. From the NAP Client Configuration console, configure the user interface settings. 

B. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command. 

C. From the NAP Client Configuration console, enable the DHCP Quarantine Enforcement Client. 

D. From the NAP Client Configuration console, configure the Health Registration settings. 

Answer:

Q6. - (Topic 2) 

You have a computer that runs Windows 7. 

You run Runas and specify the /savecred parameter to start an application. 

You need to delete the stored password. 

What should you do? 

A. Run Del and specify the /p parameter. 

B. Run Runas and specify the /noprofile parameter. 

C. From Credential Manager, modify the Windows credentials. 

D. From Authorization Manager, modify the Authorization Manager options. 

Answer:

Explanation: 

Credential Manager Credential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson. 

Q7. - (Topic 2) 

Your company's chief accountant consults you with a question about a financial spreadsheet. She needs to recover the version of this particular spreadsheet that existed six months ago because it is needed for a financial audit. Using Restore Previous Versions, you find that the oldest version stored is dated three months ago. How can you recover the required file? 

A. Edit the System Protection properties for the volume that hosts the file. Use the Max Usage slider to increase the maximum proportion of the hard disk capacity used for system protection to 70 percent. 

B. Perform a system restore. Select a system restore point that was created six months ago. 

C. Edit the System Protection properties for the volume that hosts the file. Select the Only Restore Previous Versions Of Files setting. 

D. Use the Backup And Restore console to recover the file from a backup set generated six months ago. 

Answer:

Q8. HOTSPOT - (Topic 4) 

A company is upgrading its client computers from Windows XP to Windows 7. You add an application to the Windows 7 base image. 

The menu on the title bar of the application is not displayed properly, although other graphical elements are displayed correctly. 

You need to ensure that the application's menu is displayed correctly on client computers that run Windows 7. 

Which option should you choose to achieve this goal? (To answer, select the appropriate check box in the dialog box.) 

Answer:  

Q9. - (Topic 4) 

You administer desktop computers that have Windows XP professional SP3 64-bit installed. The computers have the Volume Shadow Copy Service (VSS) enabled on all drives. 

You want to migrate existing user profiles to Windows 7 by using the User State Migration Tool (USMT) 4.0. 

You also plan to migrate files from the user profiles even if the files are locked by applications. 

You need to capture user profiles and all locked files. 

What should you do on the Windows XP computers? 

A. Stop the VSS before running ScanState.exe 

B. Stop the VSS before running LoadState.exe 

C. Run ScanState /vsc/ 

D. Run ScanState /hardlink 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/magazine/dd443646.aspx 

Q10. - (Topic 1) 

You have a reference computer that runs Windows 7. 

You plan to deploy an image of the computer. 

You create an answer file named answer.xml. 

You need to ensure that the installation applies the answer file after you deploy the image. 

Which command should you run before you capture the image? 

A. Imagex.exe /append answer.xml /check 

B. Imagex.exe /mount answer.xml /verify 

C. Sysprep.exe /reboot /audit /unattend:answer.xml 

D. Sysprep.exe /generalize /oobe /unattend:answer.xml 

Answer:

Explanation: 

To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart. Open an elevated command prompt on the reference computer and run the following command: c:\windows\system32\sysprep\sysprep.exe /oobe /generalize /shutdown Sysprep prepares the image for capture by cleaning up various user-specific and computer-specific settings, as well as log files. The reference installation now is complete and ready to be imaged.