70-680 Exam - TS:Windows 7,Configuring

certleader.com

Q1. - (Topic 3) 

You have a computer that runs Windows 7. 

You need to connect to a network projector from the computer. 

What should you use? 

A. Run Netproj.exe and provide the path to the projector. 

B. From Network and Sharing Center, create an ad hoc network and run the DisplaySwitch.exe. 

C. Run DisplaySwitch.exe and select Projector only. 

D. From Device Manager, click Add Legacy hardware. 

Answer:

Q2. - (Topic 2) 

You work as the Desktop support technician at Abc.com. The Abc.com network consists of a single Active Directory domain named Abc.com. 

The Abc.com management has instructed you to install Microsoft Windows 7 on all the client computers at Abc.com. You need to create a Windows 7 image that includes the Office 2007 

Microsoft Installer Package (MSI) package for the installation. 

What should you do? 

A. You should consider installing the MSI package by using the update command with the /slipstream switch. 

B. You should consider installing the MSI package by using the Msiexec command with the /package /uninstall switches. 

C. You should consider installing the MSI package by using the Msiexec command with the /package switch. 

D. You should consider installing the MSI package by using the Install command with the /package switch. 

Answer:

Q3. - (Topic 1) 

You start a computer by using Windows Preinstallation Environment (Windows PE). 

You need to dynamically load a network adapter device driver in Windows PE. 

What should you do? 

A. Run Peimg.exe and specify the device driver path. 

B. Run Drvload.exe and specify the device driver path. 

C. Run Winpeshl.exe and specify a custom Winpeshl.ini file. 

D. Run Wpeutil.exe and specify the InitializeNetwork command. 

Answer:

Explanation: 

Drvload The Drvload tool adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs. To add a driver to an offline Windows PE image, use the peimg tool.NOT WinpeshlWinpeshl.ini controls whether a customized shell is loaded in Windows PE instead of the default Command Prompt window. To load a customized shell, create a file named Winpeshl.ini and place it in %SYSTEMROOT% \System32 of your customized Windows PE image. The .ini file must have the following section and entry.NOT WpeutilThe Windows PE utility (Wpeutil) is a command-line tool that enables you to run various commands in a Windows PE session. For example, you can shut down or restart Windows PE, enable or disable a firewall, set language settings, and initialize a network. 

Q4. - (Topic 2) 

You have a computer that runs windows 7. 

The computer is configured as shown in the following table. 

You plan to install a new application that requires 40 GB of space. The application will be installed to C:\app1. 

You need to provide 40 GB of free space for the application. 

What should you do? 

A. Create a shortcut. 

B. Create hard link. 

C. Create a mount point. 

D. Change the quota settings. 

Answer:

Explanation: 

Assign a mount point folder path to a driveYou can use Disk Management to assign a mount-point folder path (rather than a drive letter) to the drive. Mount-point folder paths are available only on empty folders on basic or dynamic NTFS volumes.Volume Mount PointsVolume mount points are new system objects in the internal namespace of Windows 2000 that represent storage volumes in a persistent, robust manner. This feature allows multiple disk volumes to be linked into a single tree, similar to the way Dfs links remote network shares. You can have many disk volumes linked together, with only a single drive letter pointing to the root volume. The combination of an NTFS junction and a Windows 2000 volume mount point can be used to graft multiple volumes into the namespace of a host NTFS volume. Windows 2000 offers this new mounting feature as an alternative to drive letters so system administrators can transcend the 26-drive letter limit that exists in Windows NT. Volume mount points are robust against system changes that occur when devices are added or removed from a computer. Important-icon Important A volume is a self-contained unit of storage administered by a file system. The file system that administers the storage in a volume defines a namespace for the volume. A volume mount point is a directory name in an NTFS file system that denotes the root of an arbitrary volume. A volume mount point can be placed in any empty directory of the namespace of the containing NTFS volume. Because volumes can be denoted by arbitrary directory names, they are not required to have a traditional drive letter. Placing a volume mount point on an NTFS directory causes the storage subsystem to resolve the directory to a specified local volume. This "mounting" is done transparently and does not require a drive letter to represent the volume. A Windows 2000 mount point always resolves to the root directory of the desired volume. Volume mount points require that the version of NTFS included with Windows 2000 be used because they are based on NTFS reparse points. 

Q5. - (Topic 3) 

You have a computer that runs Windows 7. 

Your network has a SSTP VPN server that uses a self-signed certificate. 

When you connect to the VPN server, you receive the following error message: "Your computer does not trust the issuing certification authority (CA) of the SSTP VPN servers certificate". 

You need to prevent the error message from appearing when you connect to the VPN server. 

What should you do? 

A. From the properties of the VPN connection, modify the dialing options. 

B. From the properties of the VPN connection, modify the data encryption settings. 

C. From Certificate Manager, import the servers certificate into the Personal store. 

D. From Certificate Manager, import the server's certificate into the Trusted Root Certification Authorities store. 

Answer:

Explanation: 

Certificate Manager A certificate manager can approve certificate enrollment and revocation requests, issue certificates, and manage certificates. This role can be configured by assigning a user or group the Issue and Manage Certificatespermission. When you assign this permission to a user or group, you can further refine their ability to manage certificates by group and by certificate template. For example, you might want to implement a restriction that they can only approve requests or revoke smart card logon certificates for users in a certain office or organizational unit that is the basis for a security group.Importing CertificatesYou may restore certificates and the corresponding private keys from a file. 

4. Right-click the certificate store you want to import, and click Install PFX on the context menu. 

5. The Certificate Import Wizard launches. Click Next. 

6. 

In the File name text box, type the name of the certificate file that you want to import. Alternatively, you can find the file by clicking Browse. 

7. Click Next. If the file specified is a Personal Information Exchange–PKCS #12 (*.pfx), you will be prompted for the password. Enter the password to import the file. Click Next. 

8. On the next page, select where you'd like to store the certificate. Click Next. 

9. The next wizard page contains summary information about the file that you are importing. Click Finish to import the file. The certificate(s) are now ready for use by the system. 

Q6. - (Topic 2) 

You have a computer that runs Windows 7. The computer is in a workgroup. 

You need to ensure that you can decrypt Encrypting File System (EFS) files on the computer if you forget your password. 

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. From Credential Manager, select Back up vault. 

B. From User Accounts, select Create a password reset disk. 

C. From User Accounts, select Manage your file encryption certificates. 

D. From Authorization Manager, modify the Authorization Manager options. 

Answer: B,C 

Explanation: 

Password reset disks It is not unusual for users to forget their passwords to local user accounts from time to time, especially when they use strong passwords. Before the advent of password reset disks, the only way for administrators to restore a forgotten local user account password was to manually reset the user's password. In the process, the following information was lost: E-mail that was encrypted with the user's public key Internet passwords that were saved on the computer Files that the user had encrypted Password reset disks offer another solution to the problem of a forgotten password for a local user account. If users create password reset disks for their local accounts before they forget their passwords, they can reset the passwords without losing valuable data that was lost previously with administrative password resets. When you create a password reset disk, a public key and private key pair are created. The private key is stored on a disk: the password reset disk. The public key encrypts the local user account password. If users forget their passwords, they can insert the password reset disk, which contains the private key, and decrypt the current password. The Forgotten Password Wizard prompts the user for a new password, which is then encrypted with the public key. Data is not lost because, basically, the user is simply changing a password. It is essential that password reset disks be stored in secured locations.Back up your Encryption Certificate 

1. Open User Accounts by clicking the Start button, clicking Control Panel, clicking User Accounts and Family Safety (or clicking User Accounts, if you are connected to a network domain), and then clicking User Accounts. 

2. In the left pane, click Manage your file encryption certificates. 

3. In the Encrypting File System wizard, click Next. 

4. Click Use this certificate, and then click Next. If you need more details to identify the certificate that is listed, click View certificate. If you want to choose a different certificate, click Select certificate, and then click the certificate 

you want to back up. 

5. Click Back up the certificate and key now. 

6. Type or navigate to the location where you want to store the backup. We recommend that you store the backup on removable media such as a disc or USB flash drive. 

7. Type and then confirm a password for the backup file, and then click Next. We recommend that you protect the backup file with a strong password. 

8. Select the I'll update my encrypted files later check box, and then click Next. 

Q7. - (Topic 2) 

You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to a domain. 

You need to prevent the users from using more than 2 GB of disk space on drive C. 

What should you do? 

A. From a Group Policy object (GPO), enable the Limit profile size setting. 

B. Enable System Protection for Local Disk (C) and set the disk space usage. 

C. Enable disk quota management on Computer1 and configure a default quota limit. 

D. From a Group Policy object (GPO), enable the Limit the size of the entire roaming user profile cache setting. 

Answer:

Explanation: 

Disk quotas provide administrators with a way to limit each user's utilization of disk space on a volume. In order to set quotas, you must have Administrator rights, and the volume must be formatted with the NTFS file system. Disk quotas are based on file ownership and are independent of the folder location of the user's files within the volume. For example, if users move their files from one folder to another on the same volume, their volume space usage does not change. However, if users copy their files to a different folder on the same volume, their volume space usage doubles. If one user creates a 200 kilobyte (KB) file, and another user takes ownership of that file, the first user's disk use decreases by 200 KB and the second user's disk use increases by 200 KB. 

Q8. - (Topic 2) 

You are deploying a custom Windows 7 system image to a new computer. 

You perform the following tasks: 

. Start the new computer by using the Windows Preinstallation Environment (Windows PE) 

. Connect to a shared network location that contains the Windows 7 image file 

You need to apply the Windows 7 image to the computer. 

What should you do before you apply the image? 

A. Mount the image. 

B. Configure Windows Firewall. 

C. Configure and format the hard disk drive. 

D. Initialize the Boot Configuration Data (BCD) store. 

Answer:

Explanation: 

Deploying from a Network Share After you have imaged your reference installation, you can deploy the image onto new hardware (one or more destination computers). To access a network share as an installation source from the client computer, you need to boot the client computer into the Windows Preintallation Environment (Windows PE) environment. The Windows PE environment is a minimally featured operating system that allows you to access diagnostic and maintenance tools as well as access network drives. To deploy an image from a network share, you use the Diskpart tool to format the hard drive of a destination computer . Then you copy the image from the network share and begin the installation by running Setup.exe. 

Q9. - (Topic 3) 

You have two computers named Computer1 and Computer2. 

You migrate user state data from Computer1 to Computer2. The migrated data contains several Microsoft Office Excel files. 

You need to ensure that you can open the Excel files by using Excel on Computer2. 

What should you do? 

A. Install Office. 

B. Disable User Account Control (UAC). 

C. Modify the default program settings. 

D. Run Loadstate.exe /i:migapp.xml. 

Answer:

Explanation: 

The applications are required to be installed in order to use the migrated data. In this case Microsoft Office is required to open Excel files. 

LoadStateLoadState is run on the destination computer. You should install all applications that were on the source computer on the destination before you run LoadState. You must run Loadstate. exe on computers running Windows Vista and Windows 7 from an administrative command prompt. To load profile data from an encrypted store named Mystore that is stored on a share named Migration on a file server named Fileserver and which is encrypted with the encryption key Mykey, use this command: loadstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /decrypt /key:"mykey" 

Q10. - (Topic 3) 

You need to create a VPN connection. 

What should you do? 

A. From Windows Explorer, right-click Computer and then click Map network drive. 

B. From Windows Explorer, right-click Computer and then click Add a network location. 

C. From Network and Sharing Center, click Set up a new connection or network and then click Set up a new network. 

D. From Network and Sharing Center, click Set up a new connection or network and then click Connect to a workplace. 

Answer:

Explanation: 

Virtual Private Networks When you create a VPN connection, you need to specify the address of the VPN server that you are connecting to and your authentication credentials. You can create a new VPN connection in the Network And Sharing Center by clicking Set Up A New Connection Or Network and then Connect to a Workplace. When you create a new VPN connection, Windows 7 sets the VPN type to Automatic. You can configure a connection to use a specific VPN protocol, but if you do this, Windows 7 does not try to use other VPN protocols if the protocol you select is not available.