70-680 Exam - TS:Windows 7,Configuring

certleader.com

Q1. - (Topic 1) 

Which of the following must you download from Microsoft's Web site to obtain USMT 4.0? 

A. Windows Anytime Upgrade 

B. Windows Upgrade Advisor 

C. WAIK 

D. Microsoft Application Compatibility Toolkit 

Answer:

Explanation: 

User State Migration Tool USMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState. 

Q2. DRAG DROP - (Topic 5) 

You use a portable computer that has Windows 7 Home Premium installed. The portable computer has a scheduled backup of all libraries to run every day at midnight. Drive C is also configured with system protection. 

You use an instant messaging application that saves chat data to a log file. The log file is stored in My Documents. 

You install a new version of the application. You discover that the log file has been replaced with an empty file. 

You need to restore the most recent version of the file that contains data. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer:  

Q3. - (Topic 6) 

You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer that runs Windows 7. 

You want to deploy a Windows image (WIM) file to other computers in the domain. 

You need to capture the operating system, computer configuration, and applications installed on the computer to a WIM file. 

What should you do before you capture the image? 

A. Start the computer by using the Windows Preinstallation Environment (WinPE) ram disk. 

B. Run ScanState.exe. 

C. Run Defrag.exe. 

D. Run Diskpart.exe. 

Answer:

Explanation: You use ScanState to save user state data. By default, this program places user state data into the data store location as defined by the three migration .xml files. 

Q4. - (Topic 3) 

You have a custom image of Windows 7. You plan to deploy the image to computers that are not connected to the corporate network. You need to ensure that a custom application is automatically installed after the image is deployed. What should you do? 

A. From Microsoft Deployment Toolkit (MDT), create a custom task sequence and run the New Media Wizard. 

B. From Windows System Image Manager (Windows SIM), open the image and add the applications to Pass 1 windowsPE. 

C. Create a Group Policy object (GPO) and add a new software installation package. 

D. Run Dism.exe and specify the /mount-WIM parameter. Add the application installation files to the image. Modify the winrm.cmd file. 

Answer:

Q5. - (Topic 1) 

You have a stand-alone computer that runs Windows 7. 

You open Windows Update as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can manually change the Windows Update settings on the computer. 

What should you do? 

A. Log on to Windows 7 as member of the Administrators group. 

B. From the local Group Policy, modify the Windows Update settings. 

C. Right-click Windows Update and select Run as administrator. 

D. Right-click the command prompt, select Run as administrator, and then run Wuapp.exe. 

Answer:

Explanation: 

Configuring Automatic Updates by using local Group Policy 

1. Click Start, and then click Run. 

2. Type gpedit.msc, and then click OK. 

3. Expand Computer Configuration. 

4. Right-click Administrative Templates, and then click Add/Remove Templates. 

5. Click Add, click Wuau.adm in the Windows\Inf folder, and then click Open. 

6. Click Close. 

7. Under Computer Configuration, expand Administrative Templates, expand Windows Components, and then expand Windows Update. 

Q6. HOTSPOT - (Topic 6) 

You administer portable computers in your company network. All the computers have Windows 7 Enterprise installed. 

You need to configure Windows Firewall on computers used by engineer employees to meet the following requirements: 

. Engineer employees must receive remote support from desktop support employees while they are at the corporate main office. 

. Engineer employees' remote support is prevented when they are working from home. 

What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.) 

Answer:  

Q7. - (Topic 6) 

You are a network administrator for a law firm that has Windows 7 computers as part of a domain. Users are not administrators of their own computers. 

A lawyer is working on a critical case and wants to use a Windows 7 laptop to access a computer in the office. The lawyer connects to the corporate VPN and receives a message that states that the lawyer does not have permission to use Remote Desktop to connect to the computer. 

You need to allow the lawyer to access the computer in the office. 

What should you do? 

A. Upgrade the Remote Desktop Client application on the users laptop. 

B. Add the user to the Remote Desktop Users group of the target computer. 

C. Select Allow connections from computers running any version of Remote Desktop on the Remote tab of the computer. 

D. Allow Remote Desktop through Windows Firewall. 

Answer:

Q8. - (Topic 1) 

You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You use a computer that runs Windows 7. 

Now your company assigns a task to you. You are asked to prevent users from copying unencrypted files to removable drives. What action should you perform? 

A. The Trusted Platform Module (TPM) settings should be modified from a local Group Policy. 

B. TPM should be initialized from the Trusted Platform Module (TPM) snap-in. 

C. The BitLocker Drive Encryption settings should be modified from Control Panel. 

D. The BitLocker Drive Encryption settings should be modified from a local Group Policy. 

Answer:

Q9. - (Topic 3) 

You have two computers named Computer1 and Computer2 that run Windows 7. 

You connect from Computer1 to Computer2 by using Remote Desktop. 

You discover that you cannot copy any files between the computers during the Remote Desktop session. 

You need to ensure that you can copy files between the computers during the Remote Desktop session. 

What should you do? 

A. On Computer1, open Windows Firewall and allow file and printer sharing. 

B. On Computer2, open Windows Firewall and allow file and printer sharing. 

C. On Computer1, open Remote Desktop Connection and configure the Local devices and resources setting. 

D. On Computer2, open Remote Desktop Connection and configure the Local devices and resources setting. 

Answer:

Explanation: 

How can I use my devices and resources in a Remote Desktop session? Redirecting a device on your computer makes it available for use in a Remote Desktop session. If you have a recent version of Remote Desktop, you can redirect most devices, including printers, smart cards, serial ports, drives, Plug and Play devices, media players based on the Media Transfer Protocol (MTP), and digital cameras based on the Picture Transfer Protocol (PTP). Some USB devices can be redirected, and you can also redirect your Clipboard. 

Q10. - (Topic 2) 

Which of the following Windows 7 utilities was used to create the output in the above figure? 

Not the real exhibit (exhibit): 

German Output (exhibit): 

A. MemManager.exe 

B. SysPrep.exe 

C. Cipher.exe 

D. Performance Monitor 

Answer: