70-680 Exam - TS:Windows 7,Configuring

certleader.com

Q1. - (Topic 3) 

You have a computer that runs Windows 7. 

You have an application control policy on the computer. 

You discover that the policy is not enforced on the computer. 

You open the Services snap-in as shown in the exhibit. (Click the Exhibit button.) 

You need to enforce the application control policy on the computer. 

What should you do? 

A. Set the Application Identity service Startup Type to Automatic and start the service. 

B. Set the Application Information service Startup Type to Automatic and start the service. 

C. Set the Application Management service Startup Type to Automatic and start the service. 

D. Set the Application Experience service Startup Type to Automatic and start the service. 

Answer:

Explanation: 

Application Identity service AppLocker relies upon the Application Identity Service being active. When you install Windows 7, the startup type of this service is set to Manual. When testing AppLocker, you should keep the startup type as Manual in case you configure rules incorrectly. In that event, you can just reboot the computer and the AppLocker rules will no longer be in effect. Only when you are sure that your policies are applied correctly should you set the startup type of the Application Identity Service to Automatic. You should take great care in testing AppLocker rules because it is possible to lock down a computer running Windows 7 to such an extent that the computer becomes unusable. AppLocker policies are sometimes called application control policies 

Q2. - (Topic 1) 

You have a portable computer named Computer1 that runs Windows 7. 

You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1. 

You need to configure Computer1 to meet the following requirements: 

. Ensure that cached files from Share1 are encrypted. 

. Ensure that files located in Share1 are available when Server1 is disconnected from the network. 

What should you do? 

A. On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline. 

B. On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available offline. 

C. On Computer1, make Share1 available offline and enable encryption of offline files. 

D. On Computer1, copy the files from Share1 to the Documents library and configure BitLocker Drive Encryption. 

Answer:

Explanation: 

Offline FilesThe Offline Files feature of Windows 7 allows a client to locally cache files 

hosted in shared folders so that they are accessible when the computer is unable to connect directly to the network resource. The Offline Files feature is available to users of the Professional, Enterprise, and Ultimate editions of Windows 7. You can use the Offline Files feature to ensure access when a client computer is out of the office or when a temporary disruption, such as a wide area network (WAN) link failing between a branch office and a head office, blocks access to specially configured shared folders. 

Using Sync CenterYou can use Sync Center to synchronize files, manage offline files, and resolve synchronization conflicts manually. Sync Center is located within the Control Panel or by typing Sync Center into the Search Programs and Files text box on the Start menu. Clicking Manage Offline Files opens the Offline Files. This dialog box is also available using the Offline Files control panel. Using this dialog box, you can disable offline files, view offline files, configure disk usage for offline files, configure encryption for offline files, and configure how often Windows 7 should check for slow network conditions. 

Q3. HOTSPOT - (Topic 5) 

A company has client computers that run Windows 7. 

You need to secure a virtual private network (VPN) connection on the client computers. The remote access server must verify the identity of the client computers without requiring user credentials. 

Which authentication protocol should you use? (To answer, select the appropriate setting or settings in the work area.) 

Answer:  

Q4. - (Topic 1) 

Your network contains a wireless access point. You have a computer that runs Windows 7. The computer connects to the wireless access point. 

You disable Service Set Identifier (SSID) broadcasts on the wireless access point. 

You discover that you are now unable to connect to the wireless access point from the Windows 7 computer. 

You need to ensure that the computer can connect to the wireless access point. 

What should you do? 

A. From Credential Manager, modify the generic credentials. 

B. From Credential Manager, modify the Windows credentials. 

C. From Network and Sharing Center, turn on Network discovery. 

D. From Network and Sharing Center, modify the wireless network connection settings. 

Answer:

Explanation: 

Wireless Network Connection settingsTo connect to a wireless network that does not broadcast its SSID, you need to know details such as the network name and security type. In Network And Sharing Center, you click Set Up A Connection Or Network, click Manually Connect To A Wireless Network, and click Next. You are prompted for the network name and security type and (if appropriate) encryption type and security key. Alternatively, you can open an elevated command prompt and enter a command with the following syntax: netsh wlan connect name=<profile_name> ssid-<network_ssid> [interface=<interface_name>] (Since the computer has previously been connected, just modify the settings.)NOT Network DiscoveryNetwork Discovery allows the client running Windows 7 to locate other computers and devices on the network. It also makes the client visible to other computers on the network. Disabling Network Discovery does not turn off other forms of sharing.NOT Credential ManagerCredential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson. 

Q5. - (Topic 1) 

Which of the following will cause the Online Compatibility Check to fail during a Window 7 installation? Choose two. 

A. 512MB of RAM 

B. A display adapter with WDDM Support 

C. A display adapter without WDDM Support but with SVIDEO 

D. An 80 GB Hard Disk 

Answer: A,C 

Q6. - (Topic 3) 

You have a computer that runs Windows 7. You need to ensure that all users are required to enter a username and password when uninstalling applications from the computer. What should you do from Local Group Policy Editor? 

A. Configure a software restriction policy. 

B. Modify the Add or Remove Programs settings. 

C. Configure an AppLocker Windows Installer rule. 

D. Modify the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting. 

Answer:

Q7. - (Topic 2) 

You have a computer that runs Windows Vista. The hard disk is configured as shown in the exhibit. (Click the Exhibit button.) 

You need to install Windows 7 in a dual-boot configuration. 

What should you do? 

A. From Windows Vista, extend Disk 0 Partition 1. Install Windows 7 in Disk 0 Partition 1. 

B. From Windows Vista, create a new partition. Install Windows 7 in Disk 0 Partition 1. 

C. Start the computer from the Windows 7 installation media. Install Windows 7 in Disk 0 Partition 1. 

D. Start the computer from the Windows 7 installation media. Install Windows 7 in the unallocated space on Disk 0. 

Answer:

Explanation: 

The key to configuring dual-booting is ensuring that each operating system has its own partition or hard disk drive. 

To dual-boot with Windows 7, you need to be able to create a new volume of at least 15 GB. Even if you have more free space available on the volume you want to shrink, you may not be able to create a volume of the appropriate size because Windows Vista may not be able to move some special types of data to a different place on the hard disk drive. 

When configuring a new computer to boot between multiple operating systems, it is also necessary to install operating systems in the order that they were released. For example, if you want to boot between Windows XP and Windows 7 on a new computer, you need to install Windows XP before you install Windows 7. If you install Windows XP after Windows 7, the Windows XP installation routine cannot recognize the Windows 7 operating system installation, and the computer only boots into Windows XP. It is possible to repair the computer from this point using Windows 7 startup repair so that it dual-boots, but the simplest course of action is just to install the operating systems in the order in which they were released by Microsoft. 

Q8. - (Topic 4) 

Your company has a server named Server1 that runs Windows Server 2008. Server1 is a Windows Server Update Services (WSUS) server. 

You have a computer named Computer1 that runs Windows 7. 

Computer1 is configured to obtain updates from Server1. 

You open the WSUS snap-in on Server1 and discover that Computer1 does not appear. 

You need to ensure that Computer1 appears in the WSUS snap-in. 

What should you do? 

A. On Server1, open Windows Update then select Check for updates. 

B. On Server1, run Wsusutil.exe and specify the /import parameter. 

C. On Computer1, open Windows Update and then select Change settings. 

D. On Computer1, run Wuauclt.exe and specify the /detectnow parameter. 

Answer:

Explanation: 

wuauclt.exeThe wuauclt utility allows you some control over the functioning of the Windows Update Agent. It is updated as part of Windows Update.Detectnow OptionBecause waiting for detection to start can be a time-consuming process, an option has been added to allow you to initiate detection right away. On one of the computers with the new Automatic Update client installed, run the following command at the command prompt: wuauclt.exe /detectnow 

Q9. - (Topic 1) 

Which of the following is not a rating for games in Windows 7? 

A. General Audience (G) 

B. Everyone (E) 

C. Teen (T) 

D. Adults Only (AO) 

Answer:

Q10. HOTSPOT - (Topic 6) 

You work with Windows 7 computers. 

Your company has a policy of not allowing software to be upgraded without proper authorization from the managers. 

You set a Software Restriction Policy to allow only a certain version of Microsoft Word 2010 to run. The policy of the Local Group Policy Editor is shown in the Policy Editor exhibit. (Click the Exhibit button.) 

Additionally, the hash policy for WmWord. exe is shown in the Hash Policy exhibit. (Click the Exhibit button. ) 

Any upgrades or change to the WinWord.exe will result in the program not operating. 

When you attempt to run MS Word, the program does not execute. The error is shown in the Hashblock exhibit. (Click the Exhibit button.) 

Consider each of the following statements. Does the information in the three statements support the inference as stated? (This question is worth three points. ) 

Answer: