70-680 Exam - TS:Windows 7,Configuring

certleader.com

Q1. - (Topic 4) 

Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers are members of an Active Directory domain. You use a computer named Client1. 

You plan to collect events from Client1 on Server1 by using HTTPS. On Server1, you start and configure the Windows Event Collector service. ON Client1, you start the Windows Remote Management Service. 

You discover that no events are being collected. 

You need to ensure that events are forwarded from Client1 to Server1. 

What should you do? 

A. On Client1, create an inbound rule to allow port 5986 for the Public connection type. 

B. On Server1, create a Windows Event Collector firewall exception for the connection type. 

C. On Client1, create an outbound Rule to allow port 443 for the Domain connection type. 

D. ON Client1, create an inbound rule to allow port 5986 for the Domain connection type. 

Answer:

Q2. - (Topic 3) 

You have a computer that runs Windows 7. 

You install Windows XP in a new partition on the computer and discover that you can no longer start Windows 7. 

You need to start Windows 7 in the minimum amount of time. 

What should you do? 

A. From Windows XP, modify the default path in the boot.ini file. 

B. From Windows XP Recovery Console, run the Fixboot command. 

C. Start the computer from the Windows 7 installation media and select Install now. 

D. Start the computer from the Windows 7 installation media and run Startup Repair. 

Answer:

Explanation: When configuring a new computer to boot between multiple operating systems, it is also necessary to install operating systems in the order that they were released. For example, if you want to boot between Windows XP and Windows 7 on a new computer, you need to install Windows XP before you install Windows 7. If you install Windows XP after Windows 7, the Windows XP installation routine cannot recognize the Windows 7 operating system installation and the computer only boots into Windows XP. It is possible to repair the computer from this point using Windows 7 startup repair so that it dual-boots, but the simplest course of action is just to install the operating systems in the order in which they were released 

Q3. - (Topic 3) 

You have a computer that runs Windows 7. You generate a System Diagnostic Report and receive the following warning message: The Graphics rating for the system is poor and may be the cause of performance problems. 

You need to increase the graphics performance of the computer without modifying the current hardware or drivers. 

What should you do? 

A. From Personalization, modify the screen saver. 

B. From Indexing Options, modify the Advanced options. 

C. From Performance Options, modify the visual effects. 

D. From Performance Options, modify the processor scheduling. 

Answer:

Explanation: Configuring Performance Options The Performance Options tool is a Windows 7 Performance And Analysis tool that you can access by clicking Advanced Tools on the Performance Information And Tools dialog box and then clicking Adjust The Appearance And Performance Of Windows. You can let Windows decide what is best for your computer, adjust for best appearance, adjust for best performance, or select Custom and specify the appearance settings for your computer manually. If you select Custom, you can choose which visual effects to turn off, one by one. There are 18 visual effects that you can control, such as whether shadows are displayed under screen icons or under the mouse pointer. On the Advanced tab, you can adjust for the best performance of programs or background services. If your computer is running applications (as a typical workstation does), you would specify Adjust For Best Performance Of Programs. On a server that is functioning as a Web server (for example), you would specify Adjust For Best Performance Of Background Services. 

Q4. - (Topic 3) 

You have a computer that runs Windows 7. Four users share the computer. You create a folder named C:\data. 

The Users group has Full control permission to the folder. 

You need to configure security on the folder to meet the following requirements: 

Allow users to create files 

Allow users to delete files that they create 

Prevent users from deleting files created by other users 

What should you do? 

A. Remove all NTFS permissions from the Users group and assign the CREATOR OWNER group the Full control NTFS permission. 

B. Remove the Modify NTFS permission from the Users group and assign the CREATOR OWNER group the Modify NTFS permission. 

C. Deny the Users group the Modify NTFS permission and assign the Authenticated Users group the Read and Write NTFS permissions. 

D. Deny the Users group the Full control NTFS permission and assign the Authenticated Users group the Read & execute NTFS permission. 

Answer:

Explanation: 

The Creator Owner GroupThe person who created the file or directory is a member of this group. This group is used by Windows NT to automatically grant access permissions to the creator of a file or directory. 

File and Folder Permissions ReadFolders: Permits viewing and listing of files and subfoldersFiles: Permits viewing or accessing of the file's contentsWriteFolders: Permits adding of files and subfoldersFiles: Permits writing to a fileRead & Execute Folders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by files and foldersFiles: Permits viewing and accessing of the file's contents as well as executing of the fileList Folder ContentsFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by folders onlyFiles: N/AModifyFolders: Permits reading and writing of files and subfolders; allows deletion of the folderFiles: Permits reading and writing of the file; allows deletion of the fileFull ControlFolders: Permits reading, writing, changing, and deleting of files and subfoldersFiles: Permits reading, writing, changing and deleting of the file 

Q5. - (Topic 1) 

You have a computer named Computer1 that runs Windows 7. The computer is a member of an Active Directory domain. The network contains a file server named Server1 that runs Windows Server 2008. 

You log on to the computer by using an account named User1. 

You need to ensure that when you connect to Server1, you authenticate by using an account named Admin1. 

What should you do on Computer1? 

A. From User Accounts, select Link online IDs. 

B. From Windows CardSpace, select Add a card. 

C. From Credential Manager, select Add a Windows credential. 

D. From Local Security Policy, modify the Access this computer from the network user right. 

Answer:

Explanation: 

Credential Manager Credential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson. 

Q6. - (Topic 3) 

You have a computer that runs Windows 7. 

You install Internet Information Services (IIS) to test a web based application. You create a local group named Group1. You need to ensure that only the members of Group1 can access the default Web site. 

Which two configuration changes should you perform? (Each correct answer presents part of the solution, Choose two.) 

A. Modify the properties of Group1. 

B. Assign an SSL certificate to the default Web site. 

C. Modify the authentication methods of the default Web site. 

D. Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder 

Answer: C,D 

Explanation: 

Modifying the Default Authentication Method 

You can use the Directory Security tab of the Web Site Properties dialog box to change the authentication method. The authentication method determines whether users are identified, and how users must be identified to access your site. The authentication method you select varies, depending on the kind of site you are creating and the purpose of the site. 

Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder 

See article: 

How to set required NTFS permissions and user rights for an IIS 5.0, IIS 5.1, or IIS 6.0 

Web server http://support.microsoft.com/kb/271071 

Q7. - (Topic 1) 

You have a computer that runs Windows 7. 

You run Ipconfig as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can establish a DirectAccess connection to the network. 

What should you do first? 

A. Create a new VPN connection. 

B. Configure a static IPv4 address. 

C. Enable IPv6 on the network adapter. 

D. Add an additional default gateway address. 

Answer:

Q8. - (Topic 2) 

You have a computer that runs Windows 7. The computer contains one hard disk. The hard disk is configured as shown in the following table. 

You install a new 250-GB hard disk in the computer. 

You need to ensure that all the files on the computer are available if a single disk fails. 

What should you do? 

A. Create a mount point on C and D and then create a striped volume. 

B. Create a mount point on C and D and then create two striped volumes. 

C. Convert both disks to dynamic disks and then create a mirrored volume. 

D. Convert both disks to dynamic disks and then create two mirrored volumes. 

Answer:

Explanation: 

Creating a Mirrored Volume (RAID-1)A mirrored or RAID-1 volume provides availability and fault tolerance but does not improve performance. It uses two disks (or two portions on separate disks) that are the same size. Any changes made to the first disk of a mirror set are also made to its mirror disk. If the first disk fails, the mirror is broken and the second disk is used until the first is repaired or replaced. The mirror is then re-created, and the information on the working disk is mirrored on the repaired disk. The disadvantage of RAID-1 is that you need (for example) two 200-GB disks to hold 200 GB of data. The advantage is that you can mirror a system disk containing your operating system.You create a mirrored volume using a very similar procedure to the one that creates a striped volume, except that you right-click the first disk of your mirror and click New Mirrored Volume to start the appropriate wizard. You then select the second disk. The second disk needs to have a portion of unallocated space that is at least as large as the disk you want to mirror. The drive letter for a mirrored volume is the same as the drive letter of the first disk. You can also use the Diskpart tool to create a mirrored volume. At the DISKPART> prompt you first use the select disk command to select the first disk. You then enter a command with the syntax add disk=<n>to specify the mirror disk. 

Q9. - (Topic 2) 

You have a computer that runs windows 7. 

The computer has corporate intranet web site. 

Your Windows Internet Explorer as shown in the exhibit. 

You need to ensure that you can access web pages on both Internet and Intranet. 

What should you do? 

A. From the tools menu, click Work Offline. 

B. From the Safety menu, click InPrivate Blocking. 

C. From the Safety menu, click Inprivate Browsing. 

D. From the Security tab, add the intranet web site to the Trusted sites zone. 

Answer:

Explanation: 

Working Offline is activated On Internet Explorer's File menu is a "Work Offline" item that toggles Internet Explorer between online and offline modes of operation. (The question originally stated the Tools menu, maybe in a different version of IE this is the case, but for me and in the TechNet documentation it was under Files, so I'm choosing to believe Tools was a mistake and it should be Files, this has been amended in the question). InPrivate is turned on (does not prevent browsing the internet)InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, temporary Internet files, history, and other data. Toolbars and extensions are disabled by default. 

Q10. DRAG DROP - (Topic 4) 

You administer Windows 7 Enterprise computers in your company network. All computers are deployed from a single Windows image (.wim) file. 

You want to deploy the .wim file to newly purchased computers by Windows Deployment Services (WDS). 

You need to protect an administrator account password used for deployment in an answer file. 

What should you do (To answer, move the appropriate actions from the list of actions to the answer area and arrange then in the correct order). 

Answer: