70-680 Exam - TS:Windows 7,Configuring

certleader.com

Q1. - (Topic 3) 

You administer 80 computers that run Windows 7. The computers have static IP addresses. 

You need to change the static IP addresses on all the computers by using a startup script. 

Which command should you include in the startup script? 

A. Ipconfig.exe 

B. Nbtstat.exe 

C. Netstat.exe 

D. Netsh.exe 

Answer:

Explanation: 

Netsh.exe Netsh.exe is a tool an administrator can use to configure and monitor Windows-based computers at a command prompt. With the Netsh.exe tool, you can direct the context commands you enter to the appropriate helper, and the helper then carries out the command. A helper is a Dynamic Link Library (.dll) file that extends the functionality of the Netsh.exe tool by providing configuration, monitoring, and support for one or more services, utilities, or protocols. The helper may also be used to extend other helpers. You can use the Netsh.exe tool to perform the following tasks: 

-Configure interfaces. 

-Configure routing protocols. 

-Configure filters. 

-Configure routes. 

-Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service. 

-Display the configuration of a currently running router on any computer. 

-Use the scripting feature to run a collection of commands in batch mode against a specified router. 

The syntax for the Netsh.exe tool is: netsh [-r router name] [-a AliasFile] [-c Context] [Command | -f ScriptFile] To display a list of subcontexts and commands that can be used in a context, type the context name followed by a space and a ? at the netsh> command prompt. For example, to display a list of subcontext and commands that can be used in the /routing context, type routing ? at the netsh> command prompt, and then press ENTER. 

Q2. DRAG DROP - (Topic 6) 

A company has an Active Directory forest which is shown in the following graphic. 

The company's client computers run Windows 7. You deploy BitLocker Drive Encryption on all the client computers. 

You need to configure BitLocker Drive Encryption to back up recovery information to Active Directory for BitLocker protected drives and the Trusted Platform Module (TPM). 

Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer:  

Q3. - (Topic 1) 

You have a computer that runs Windows 7. Your company has three custom applications named app1.exe, app2.exe, and app3.exe. The applications have been digitally signed by the company. 

You need to create a policy that allows only applications that have been digitally signed by the company to run. 

What should you create? 

A. an AppLocker executable rule 

B. an AppLocker Windows Installer rule 

C. a software restriction policy and a certificate rule 

D. a software restriction policy and a hash rule 

Answer:

Q4. - (Topic 2) 

You have a computer that runs Windows 7. The computer's disk is configured as shown in the exhibit. (Click the Exhibit button.) 

You need to extend volume C. 

What should you do first? 

A. Back up and delete volume D. 

B. Convert disk 0 to a dynamic disk. 

C. Remove the crash dump from volume C. 

D. Move the paging file from volume C to volume E. 

Answer:

Explanation: 

Extend a Basic Volume You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume, it must be raw or formatted with the NTFS file system. You can extend a logical drive within contiguous free space in the extended partition that contains it. If you extend a logical drive beyond the free space available in the extended partition, the extended partition grows to contain the logical drive. For logical drives, boot, or system volumes, you can extend the volume only into contiguous space and only if the disk can be upgraded to a dynamic disk. For other volumes, you can extend the volume into noncontiguous space, but you will be prompted to convert the disk to dynamic. 

Q5. - (Topic 5) 

You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits: 

The Disk Management console (Click the Exhibit button.) 

The System Properties window (Click the Exhibit button.) 

The System protection for Local Disk C window (Click the Exhibit button.) 

You need to create a backup copy of a 40-GB Virtual Hard Disk (VHD) file in a local folder on drive C. 

What should you do? 

A. Delete restore points. 

B. Create a restore point. 

C. Perform a system restore. 

D. Search for the file in the Recycle Bin. 

E. Increase disk space used for system protection. 

F. Copy the file from a previous version of a folder. 

G. Set restore settings to Only restore previous versions of files. 

H. Run the cipher /x command from the elevated command prompt. 

I. Run the vssadmin list volumes command from the elevated command prompt. 

J. Run the vssadmin list shadows command from the elevated command prompt. 

K. Run the compact /U <file_name> command from the elevated command prompt. 

Answer:

Q6. - (Topic 4) 

You have a computer that runs Windows 7. 

You need to record when an incoming connection is allowed through Windows firewall. 

What should you do? 

A. In Local Group Policy, modify the audit policy. 

B. In Local Group Policy, modify the system audit policy. 

C. From the Windows Firewall with Advanced Security properties, set the logging settings to Log successful connections. 

D. From the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode) IPSec settings to Advanced. 

Answer:

Explanation: 

Customize Logging Settings for a Firewall Profile Windows Firewall with Advanced Security can be configured to log events that indicate the successes and failures of its processes. The logging settings involve two groups of settings: settings for the log file itself and settings that determine which events the file will record. The settings can be configured separately for each of the firewall profiles. You can specify where the log file will be created, how big the file can grow, and whether you want the log file to record information about dropped packets, successful connections, or both. Log successful connectionsUse this option to log when Windows Firewall with Advanced Security allows an inbound connection. The log records why and when the connection was formed. Look for entries with the word ALLOW in the action column of the log. 

Q7. HOTSPOT - (Topic 5) 

You use a computer that has Windows 7 and a legacy application named App1 installed. 

App1 is designed for Windows 2000 and implements large-scale font sizes. 

You need to configure application compatibility settings for App1 according to the following 

requirements: 

. Compatible with Windows 2000 

. Large-scale fonts must not be resized 

What should you do? (To answer, select the appropriate check boxes in the Application "App1" Compatibility Properties tab in the answer area.) 

Answer:  

Q8. - (Topic 1) 

You have a computer that runs Windows 7. 

You need to confirm that all device drivers installed on the computer are digitally signed. 

What should you do? 

A. At a command prompt, run Verify. 

B. At a command prompt, run Sigverif.exe. 

C. From Device Manager, click Scan for hardware changes. 

D. From Device Manager, select the Devices by connection view. 

Answer:

Explanation: 

Checking Digital Signatures with the File Signature Verification Tool The Dxdiag tool identifies problems with DirectX hardware and tells you whether that hardware has passed the WHQL testing regimen and has been signed digitally. However, it does not test the device drivers that are not associated with DirectX devices. To scan your computer and identify any unsigned drivers, you should use the File Signature Verification (Sigverif) tool. 

Q9. HOTSPOT - (Topic 5) 

A device driver for a laser printer connected through the LPT port in a computer running Windows 7 does not function correctly. You uninstall the driver without issue and this process does not prompt a restart. 

The device does not appear in Device Manager. 

You need to ensure that Device Manager can detect the device, and then reinstall the device driver. 

Which Action option should you choose? (To answer, select the appropriate setting in the work area.) 

Answer:  

Q10. HOTSPOT - (Topic 6) 

You are a system administrator for a regional accounting firm. The existing computers have either Windows Vista Enterprise or Windows Vista Home Premium installed. 

Your manager wants you to upgrade all computers to Windows 7. 

You need to determine which editions of Windows 7 support an in-place upgrade from the two editions of Windows Vista. 

In the table below, identify which editions of Windows 7 will support an in-place upgrade from Windows Vista Enterprise and Home Premium. (Make only one selection in each column. This question is worth two points. ) 

Answer: