70-680 Exam - TS:Windows 7,Configuring

certleader.com

Q1. - (Topic 1) 

Your network consists of an Active Directory domain named contoso.com. You have a computer named computer1.contoso.com. 

Your network is configured to use only IPv6. 

You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com. 

Which type of record should you request? 

A. A 

B. AAAA 

C. HINFO 

D. NAPTR 

Answer:

Explanation: 

The resolution of host names to IPv6 addresses is accomplished through DNS (apart from link-local addresses that are not stored by DNS and resolve automatically). The procedure is the same as for IPv4 address resolution with the computer name and IPv6 address pair being stored in a AAAA (quad-A) DNS resource record, which is equivalent to an A or host record for IPv4. Reverse DNS lookup that returns a computer name for an IPv6 address is implemented by a pointer (PTR) DNS resource record that is referred to the IPv6 reverse lookup zone (or tree) ipv6.arpa, which is the equivalent of the in-addr.arpa reverse lookup zone in Ipv4. AAAAAn AAAA (quad-A) resource record resolves a host name to an IPv6 address.AAn A (address) resource record resolves a host name to an IPv4 address.HINFOHost information (HINFO) resource record. Specifies the type of CPU and operating system in the cpu_type and os_type fields, respectively, for the host DNS domain name in the owner field. Well-known CPU and operating system types that are most often used are noted in RFC 1700. This information can be used by application protocols such as FTP, which use special procedures when communicating with computers of a known CPU and operating system type. NAPTR The NAPTR represents a Naming Authority Pointer. NAPTR records map between sets of URNs, URLs and plain domain names and suggest to clients what protocol should be used to talk to the mapped resource. Each NAPTR record contains a service name, a set of flags, a regexp rule, an order value, a preference and a replacement. Multiple records can be chained together in a cascade to rewrite URIs in fairly sophisticated, but deterministic 

ways. These cascading rules have been standardized in RFC2915 and RFC3403. 

Q2. - (Topic 3) 

You have a computer that runs Windows 7. 

You need to configure an application to connect to the computer by using the IPV6 loopback address. 

Which address should you specify? 

A. ::1 

B. 12::1 

C. 127.0.0.1 

D. fe80::f56f:56cb:a136:4184 

Answer:

Explanation: 

Loopback address The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface, enabling a node to send packets to itself. It is equivalent to the IPv4 loopback address of 

127.0.0.1. Packets addressed to the loopback address must never be sent on a link or forwarded by a router.Link-LocalLink-local addresses always begin with FE80. With the 64-bit interface identifier, the prefix for link-local addresses is always FE80::/64. An IPv6 router never forwards link-local traffic beyond the link. Nodes use link-local addresses when communicating with neighboring nodes on the same link. For example, on a single-link IPv6 network with no router, hosts use link-local addresses to communicate with other hosts on the link. Link-local addresses are equivalent to Automatic Private IP Addressing (APIPA) IPv4 addresses autoconfigured on computers that are running Windows. APIPA addresses use the 169.254.0.0/16 prefix. The scope of a link-local address is the local link. A link-local address is required for Neighbor Discovery processes and is always automatically configured, even in the absence of all other unicast addresses. 

Q3. - (Topic 5) 

You use a desktop computer that has Windows 7 SP1 Ultimate installed. As part of a disaster recovery plan, you perform regular data backups and system image backups of the desktop computer. 

The hard disk drive in the computer fails after a power outage. You replace the hard disk drive and restart the desktop computer by using the Windows 7 SP1 installation media. 

You need to recover the computer to its previous state. 

What should you do? 

A. Use Startup Repair. 

B. Use the command prompt. 

C. Use System Image Recovery. 

D. Perform a system restore. 

Answer:

Explanation: 

System Image Recovery 

Enables you to implement a System Image restore. You would choose this option if your hard disk failed or needed to be wiped. If system changes are causing problems, you would choose the System Restore option. 

NOT Startup Repair 

Automatically fixes problems that prevent Windows from starting. If Windows 7 had boot problems during a previous restart, a normal boot (without accessing the Advanced Boot dialog box) gives you the option of selecting Startup Repair. 

NOT System Restore 

Gives you another method of starting a system restore to a previous restore point. Because you can access this menu when you boot from a DVD-ROM, this lets you repair your system when recent changes to system settings prevent your computer from booting normally. 

NOT Command Prompt 

Gives access to the file system, volumes, and files through a command-line interface. 

Q4. - (Topic 3) 

You have a computer named Computer1 that runs Windows 7. 

Computer1 has a shared printer. 

You need to configure Computer1 so that only Administrators are authorized to shut down the computer. 

What should you do? 

A. From User Accounts, modify the user profiles settings. 

B. From User Accounts, modify the User Account Control (UAC) settings. 

C. From the local computer policy, modify the Security Options. 

D. From the local computer policy, modify the User Rights Assignment. 

Answer:

Explanation: 

Shut down the system Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment Description Determines which users logged on locally to the computer can shut down the operating system using the Shut Down command. This user right is defined in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers. 

Q5. - (Topic 2) 

You have a computer that runs Windows XP Service Pack 2 (SP2). 

You need to upgrade the operating system to Windows 7. 

You must achieve this goal in the minimum amount of time. 

What should you do? 

A. Upgrade to Windows Vista SP2. From the Windows 7 installation media, run Setup.exe and select the Upgrade option. 

B. Upgrade to Windows Vista SP2. From the Windows 7 installation media, run Setup.exe and select the Custom (advanced) option. 

C. Install Windows XP Service Pack 3 (SP3). Run Setup.exe from the Windows 7 installation media and select the Upgrade option. 

D. Install Windows XP Service Pack 3 (SP3). Run Setup.exe from the Windows 7 installation media and select the Custom (advanced) option. 

Answer:

Q6. - (Topic 3) 

You need to back up your Encrypting File System (EFS) certificate. You must achieve this goal in the minimum amount of time. 

What should you do? 

A. Run Cipher.exe /x. 

B. Run Ntbackup.exe /p. 

C. From Backup and Restore, click Back up now. 

D. From Backup and Restore, click Create a system image. 

Answer:

Explanation: 

Cipher is used to manage certificates. 

NOT Backup and Restore:Only the EFS certificate needs to be backed up and time is a factor. 

Q7. - (Topic 4) 

Your company network includes portable computers that have Windows 7 Ultimate and Windows 7 Professional installed. 

You want to standardize all portable computers to Windows 7 Professional for Key Manager Server (KMS) licensing purposes. 

You need to install Windows 7 Professional on all Windows 7 Ultimate portable computers. 

What should you do? 

A. Launch Windows Update 

B. Perform a clean installation over the existing system partitions. 

C. Perform a clean installation on non-system partitions. 

D. Supply the Windows 7 Professional KMS key. 

E. Launch Windows Anytime Upgrade. 

Answer:

Explanation: 

Think that this is right don't think it can be done 

Q8. - (Topic 4) 

You need to identify the hardware failures that have occurred on your computer in the past six months. 

What should you do? 

A. From the Control Panel, open Performance Information and Tools. 

B. From the Control Panel, open Troubleshooting. 

C. From the Action Center, under Maintenance, click the View reliability history. 

D. From the Action Center, open Recovery. 

Answer:

Q9. - (Topic 5) 

You administer computers that have Windows 7 and Internet Explorer 8 installed. 

You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. 

You need to ensure that any data about your browser session is not saved on the computer. 

What should you do? 

A. From the Safety drop-down menu, configure InPrivate Filtering. 

B. Start the Microsoft Network Access Protection service. 

C. From Internet Options, select Delete browsing history on exit. 

D. From Internet Options, on the Advanced tab, clear Enable DOM Storage. 

Answer:

Q10. - (Topic 6) 

You have an answer file named Unattend.xml for a Windows 7 automated installation. You need to perform an unattended installation of Windows 7 by using the answer file. What should you do? 

A. Name the answer file as unattend.xml and save it to a floppy disk. Start the computer from the Windows Preinstallation Environment (WinPE). 

B. Name the answer file as unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (WinPE). 

C. Name the answer file as autounattend.xml and save it to a floppy disk. Start the computer from the Windows 7 DVD. 

D. Name the answer file as unattend.txt and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (WinPE). 

Answer: