practice test - gattnergattner.name/simon/public/microsoft/windows 7/70-680 windows 7... ·...
TRANSCRIPT
Microsoft 70-680
70-680 TS: Windows 7, Configuring
Practice TestVersion 6.1
Actu
alTe
sts.
com
QUESTION NO: 1
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains
both desktop and laptop workstations.
You are responsible for managing a desktop workstation named CERTKILLER-WS620.
CERTKILLER-WS620 is configured to run Windows Vista. You install Windows 7 on a new
partition on CERTKILLER-WS620 but you want Windows Vista to be booted by default on
CERTKILLER-WS620 and not Windows 7.
What should you do?
A. You should consider running Bcdedit.exe and specifying the /default parameter.
B. You should consider creating a boot.ini file in the root of the Windows 7 partition.
C. You should consider running Bcdedit.exe and specifying the /bootems parameter.
D. You should consider creating a boot.ini file in the root of the Windows Vista partition.
Answer: A
Explanation:
To modify the boot parameters in Vista and Windows 7, use the command line tool Bcdedit.exe.
Using the /default switch will allow you to set the default system to boot. BCD = Boot Configuration
Data You can also change the default boot settings in Control Panel -> System & Security ->
System -> Advanced System Settings (on the left hand side), -> Startup & Recovery -> Settings
Incorrect answers B, D: The Boot.ini file is no longer used by Vista or Windows 7.
C: The switch / bootems cause Windows 7 to boot into the "Emergency Management System"
which is not required in this scenario.
Note that since the boot.ini file is no longer used, the command bootcfg.exe is not applicable.
QUESTION NO: 2
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. You are responsible for maintaining
CertKiller.com's Windows 7 workstations.
You want to configure all Windows 7 workstations to produce a new Security ID (SID) as well as a
Welcome screen every time the workstation is booted.
What should you do?
A. You should consider running Msconfig.exe and select Diagnostic startup on all Windows 7
workstations.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 2
Actu
alTe
sts.
com
B. You should consider running Sysprep.exe /audit /generalize on all Windows 7 workstations.
C. You should consider running Msconfig.exe and select Selective startup on all Windows 7
workstations.
D. You should consider running Sysprep.exe /oobe /generalize on all Windows 7 workstations.
Answer: D
Explanation:
The utility Sysprep is used to prepare systems before imaging and deployment. the switch/ oobe
means "Out Of the Box Experience" which will cause the new image to start up fresh just as if in
came out of the shrink-wrap. The /generalize command is required in order for the install to create
a new SID.
Incorrect Answers:
A: Msconfig is a utility that is used to change the behavoir of the boot sequence for diagnostic
purposes. This utility is not used in the Windows 7 deployment process. (See attached image)
B: Audit mode enables OEMs and corporations to customize a Windows installation before
shipping the computer to an end-user. In audit mode, you can install applications, add device
drivers, run scripts, and test the validity of a Windows installation. Audit mode is a networked-
enabled environment that does not require settings in Windows Welcome to be applied.
C: Msconfig is a utility that is used to change the behavoir of the boot sequence for diagnostic
purposes. This utility is not used in the Windows 7 deployment process. (See attached image)
QUESTION NO: 3
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 3
Actu
alTe
sts.
com
CertKiller.com purchases a new client computer named CERTKILLER-WS680. You have been
instructed to perform an automated installation of Microsoft Windows 7 on CERTKILLER-WS680
using the Microsoft Windows 7 DVD.
What should you do?
A. You should consider creating an answer file named oobe.xml and copying it to a network share.
B. You should consider creating an answer file named winnt.sif and copying it to a removable
drive.
C. You should consider creating an answer file named sysprep.inf and copying it to a network
share.
D. You should consider creating an answer file named autounattend.xml and copying it to a
removable drive.
Answer: D
Explanation:
When Windows 7 is booted from the DVD, it automatically searches for an answer file called
autounattend.xml. If it finds such a file, it will use that to answer all of the configuration questions.
Incorrect Answers:
A: The OOBE.XML file is not an installation answer file. Oobe.xml is a content file used to collect
text and images for customizing Windows Welcome, Welcome Center, and ISP Signup.
B: Winnt.sif is the Windows XP autoanswer file name.
C: The Sysprep.inf answer file is a text file that scripts the answers for a series of graphical user
interface (GUI) dialog boxes in Windows XP
QUESTION NO: 4
You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You need to perform a clean installation of Microsoft Windows 7 Professional on the workstations
in the Research department. All workstations in the Research department have identical hardware
as listed below:
1.2 GHz Dual-Core processor.1024 MB of RAM.20 GB hard drive.DirectX 10 video display
card.Integrated sound card.10/100 integrated network adapter.
You need to ensure that the workstations able to support Windows 7 and are able to support
Windows XP mode.
What should you do? (Each correct answer presents part of the solution. Choose two.)
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 4
Actu
alTe
sts.
com
A. You should upgrade the processor.
B. You should upgrade the RAM.
C. You should upgrade the video card.
D. You should upgrade the hard drive.
E. You should upgrade the network adapter.
Answer: B,D
Explanation:
Although the workstations meet the system requirements for Windows 7, and additional 1 GB of
RAM and an additional 15 GB hard drive space is required to support Windows XP Mode.
QUESTION NO: 5
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com.
The CertKiller.com management has instructed you to install Microsoft Windows 7 on all the client
computers at CertKiller.com. You need to create a Windows 7 image that includes the Office 2007
Microsoft Installer Package (MSI) package for the installation.
What should you do?
A. You should consider installing the MSI package by using the Msiexec command with the
/passive switch.
B. You should consider installing the MSI package by using the Msiexec command with the
/package /uninstall switches.
C. You should consider installing the MSI package by using the Msiexec command with the
/package switch.
D. You should consider installing the MSI package by using the Msiexec command with the
/update switch.
Answer: C
Explanation:
When deploying Windows 7, you first build a reference computer with all settings, configurations
and application required. This includes installing applications. To install Office using an MSI file,
you run the windows installer program MSIEXEC.EXE . The /package switch directs the installer
to run and install the msi file listed. e.g . msiexec /package Office64MUI.msi. The switch /package
can be abbreviated to / i as in " msiexec / i Office64MUI.msi". (Yes, / i not /p)
Incorrect Answers:
A: The /passive switch is an optional parameter which shows the progress of the install but does
not allow user interaction
B: You would not run the /uninstall switch with the install command /package. The /uninstall switch
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 5
Actu
alTe
sts.
com
uninstalls applications.
D: The /update command is used when updating applications with an MSP update file.
QUESTION NO: 6
CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. You are in the process of planning the
installation of Windows 7 on a client computer named CERTKILLER-WS06. CERTKILLER-WS06
contains a single hard disk drive that is connected to a RAID controller.
Whilst doing the installation you notice that the installation media of Windows 7 does not include
the necessary files to install the RAID controller. You have to make sure that you are able to install
Windows 7 on the hard disk drive.
What should you do?
A. You should consider having CERTKILLER-WS04 started from the Windows installation media.
Then the Load Driver should be clicked from the Install Windows dialog box.
B. You should consider inserting the Windows installation media.
Thereafter F8 should be pressed during the power-on self test (POST) of CERTKILLER-WS04.
C. You should consider having CERTKILLER-WS04 started from the Windows installation media.
Then Drive options (advanced) should be clicked from the Install Windows dialog box.
D. You should consider inserting the Windows installation media.
Thereafter F6 should be pressed during the power-on self test (POST) of CERTKILLER-WS04.
Answer: A
QUESTION NO: 7
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The CertKiller.com network client computers
currently make use of Microsoft Windows XP Professional. You receive an instruction from
Management to upgrade a client computer named CERTKILLER-WS25 to Windows 7. You decide
to do the installation using the Windows 7 DVD.
What should you do? (Choose all that apply.)
A. Your best option would be to execute an upgrade of Windows 7 by keeping all the Windows XP
settings.
B. Your best option would be to execute a full installation of Windows 7.
C. Your best option would be to run setup.exe from the DVD in order to start the Windows 7
installation.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 6
Actu
alTe
sts.
com
D. Your best option would be to make use of the autorun feature on the DVD in order to start the
installation.
Answer: B,C,D
QUESTION NO: 8
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network
client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has
recently decided to have the client computers upgraded to Microsoft Windows 7 with all the
installed applications. You receive an instruction from management to identify the volume types
that is not used by Windows 7.
A. In Windows 7 exFAT is not a volume type.
B. In Windows 7 NTFS is not a volume type.
C. In Windows 7 FAT is not a volume type.
D. All of the above a volume types in Windows 7.
Answer: D
QUESTION NO: 9
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network
client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has
recently decided to have the client computers upgraded to Microsoft Windows 7 with all the
installed applications. You are in the process of informing the newly appointed users in your
department when the Aero Shake feature will work.
What should you inform them? (Choose all that apply.)
A. The Aero Shake feature will work if the Windows Experience Index is 3 or greater.
B. The Aero Shake feature will work if the windows experience index is at least 2.
C. The Aero Shake feature will work if the display adapter is compatible with the installed WDDM.
D. The Aero Shake feature will work if the Aero features are downloaded from Microsoft.
Answer: A,C
QUESTION NO: 10
CertKiller.com has hired you as a network Administrator for their network. The CertKiller.com
network client computers currently make use of Microsoft Windows XP Professional. You receive
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 7
Actu
alTe
sts.
com
an instruction from one of the senior managers to upgrade his workstation to Windows 7. The
senior manager also informs you that the wants the Windows 7 games as well as Titan Chess is
installed on his workstation. You thus need to identify the Windows 7 versions that will comply with
the senior mangers request.
What should you do? (Choose all that apply.)
All the games including Titan Chess come with which versions of Windows 7? Choose two.
A. Your best option would be to install Windows Ultimate Edition.
B. Your best option would be to install Windows Professional Edition.
C. Your best option would be to install Windows Home Edition.
D. Your best option would be to install Windows Enterprise Edition.
Answer: A,D
QUESTION NO: 11
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The CertKiller.com network client computers
currently make use of Microsoft Windows XP Professional. CertKiller.com has recently decided to
have the client computers upgraded to Microsoft Windows 7. You receive an instruction from the
CIO to ensure that the Active Directory domain can be joined to the Windows 7 Edition.
What should you do?
A. Your best option would be to install the Windows Professional Edition.
B. Your best option would be to install the Windows Ultimate Edition.
C. Your best option would be to install the Windows Home Edition.
D. Your best option would be to install the Windows Enterprise Edition.
Answer: A,B,D
QUESTION NO: 12
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network
client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has
recently decided to have the client computers upgraded to Microsoft Windows 7. You thus decide
to check whether the current workstations comply with the requirements. You thus need to
determine the minimum requirement necessary to install Windows 7.
What should you identify?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 8
Actu
alTe
sts.
com
A. You will require a 16 GB available disk space (32-bit)/20 GB (64-bit).
B. You will require a 1 GHz or faster 32-bit (x86) or a 64-bit (x64) processor.
C. You will require a DirectX 9 graphics processor with WDDM 1.0 or higher driver.
D. You will require a 4GB RAM (32-bit)/2 GB RAM (64-bit).
Answer: D
QUESTION NO: 13
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network
client computers are configured to either use Windows XP Professional or Windows Vista. You
receive an instruction from management to identify the statement that is regarding Windows 7.
What should you do?
A. You should inform management that Outlook Express comes with Windows 7.
B. You should inform management that Microsoft Outlook is comes with Windows 7.
C. You should inform management that Windows 7 does not come with a preinstalled mail client.
D. You should inform management that the MailCentral is the new default mail client with Windows
7.
Answer: C
QUESTION NO: 14
CertKiller.com has hired you as a network Administrator for their network. All servers on the
CertKiller.com network run Windows 7. Half the client computers run Windows Vista and the rest
Windows XP Professional. You are in the process of identifying the utilities cannot be identified as
a Windows PE tool.
What should you do?
A. You should consider identifying Winpeshl.
B. You should consider identifying Oscdimg.
C. You should consider identifying Diskpart.
D. None of the above.
Answer: D
QUESTION NO: 15
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 9
Actu
alTe
sts.
com
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network
client computers currently make use of Microsoft Windows XP Professional. You receive an
instruction from the CIO to install Windows 7 on a computer named CERTKILLER-SR01. During
routine monitoring you discover that the Online Compatibility Check has failed during your
installation. You thus need to determine the reason this occurred.
What should you identify? (Choose all that apply.)
A. The error occurred due to a display adapter with WDDM Support.
B. The error occurred due to a display adapter without WDDM Support but with SVIDEO Support.
C. The error occurred due to 512MB of RAM.
D. The error occurred due to an 80 GB Hard Disk.
Answer: B,C
QUESTION NO: 16
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7.
During the course of the day you receive instruction from CertKiller.com to create an unattended
answer file which will be used to have Microsoft Windows 7 installed automatically. CertKiller.com
additionally requested that you select the appropriate utilities that can be used to create the
unattended answer file.
What should you do? (Choose two)
A. You should consider making use of the Deployment Workbench MDT utility can be used.
B. You should consider making use of the Sysprep.exe utility can be used.
C. You should consider making use of the Windows SIM tool in Windows AIK utility can be used.
D. You should consider making use of the Microsoft Notepad utility can be used.
Answer: C,D
QUESTION NO: 17
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows Vista (x86). During the
course of the day you receive instruction from CertKiller.com to perform a clean installation of
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 10
Actu
alTe
sts.
com
Microsoft Windows 7 (64-bit) on a user named Rory Allen's computer.
What should you do?
A. You should consider having the computer started using the Windows 7 installation media.
You should then have the Upgrade option selected from the Install Windows dialog box.
B. You should consider having the computer started using the Windows 7 installation media.
You should then select the Custom (advanced) option from the Install Windows dialog box.
C. You should consider having the Rollback.exe command used from the Windows 7 installation
media.
D. You should consider having the Migsetup.exe command run from the Windows 7 installation
media.
Answer: B
Explanation:
Part 2: Upgrade to Windows 7 from previous versions of Windows (10 Questions)
QUESTION NO: 18
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
A CertKiller.com user named Rory Allen uses of a Microsoft Windows 7 Professional client
computer named CERTKILLER-WS680. During the course of the day Rory Allen attaches a USB
disk to CERTKILLER-WS680. However, Rory Allen is cannot enable BitLocker To Go on the USB
disk. You need to ensure that Rory Allen can enable BitLocker To Go on the USB disk.
What should you do?
A. You should consider upgrading CERTKILLER-WS680 to Microsoft Windows 7 Ultimate.
B. You should consider initializing the Trusted Platform Module (TPM) hardware on CERTKILLER-
WS680.
C. You should consider obtaining a client certificate for CERTKILLER-WS680 from an enterprise
certification authority (CA).
D. You should consider enabling Encrypting File System (EFS) on CERTKILLER-WS680.
Answer: A
Explanation:
BitLocker To Go is a feature ONLY available on Windows 7 Ulimate and Windows 7 Enterprise.
Incorrect Answers:
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 11
Actu
alTe
sts.
com
B: A Trusted Platform Module is required for BitLocker but won't help in this scenario.
C: BitLocker uses a single encrpytion key that is either stored locally in the TLM or on a separate
removable drive. Certificates are neither used nor required since Bitlocker does not use Public Key
encryption.
D: TheEncrypting File System is a certificate based system for encrypting files, not drives.
QUESTION NO: 19
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network run Windows XP Professional with Service Pack 1 (SP1).
You have been assigned a client computer named CERTKILLER-WS270. You want to upgrade
CERTKILLER-WS270 to Windows 7 Professional without needing to install any of your
applications. You verify that CERTKILLER-WS270 meets the system requirements for Windows 7
by installing and running the Windows 7 Upgrade Advisor.
What should you do next?
A. You should consider upgrading CERTKILLER-WS270 to Microsoft Windows Vista Business,
and then upgrade it to Windows 7 Professional.
B. You should consider installing Service Pack 3 (SP3) on CERTKILLER-WS270, and then
upgrade it to Windows 7 Professional.
C. You should consider installing and running Windows Easy Transfer on CERTKILLER-WS270,
and then perform a clean installation of Windows 7 Professional.
D. You should consider installing and running Windows Easy Transfer on CERTKILLER-WS270,
and then upgrade it to Windows 7 Professional.
Answer: A
Explanation:
To upgrade from Windows XP Professional to Windows 7 Professional without having to reinstall
applications, you would need to upgrade to Windows Vista first.
QUESTION NO: 20
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The client computers on the
CertKiller.com network run a mix of Windows 2000 Professional with Service Pack 5 (SP5),
Windows XP Professional with Service Pack 3 (SP3), Windows Vista Business and Windows
Ultimate.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 12
Actu
alTe
sts.
com
You have received instructions to upgrade some of the client computers to Windows 7
Professional.
What should you do?
A. You should consider upgrading the Microsoft Windows 2000 Professional computers to
Windows 7 Professional.
B. You should consider upgrading the Microsoft Windows XP Professional computers to Windows
7 Professional.
C. You should consider upgrading the Microsoft Windows Vista Business computers to Windows 7
Professional.
D. You should consider upgrading the Microsoft Windows Vista Ultimate computers to Windows 7
Professional.
E. You should consider upgrading the Microsoft Windows Vista Business and Microsoft Windows
Vista Ultimate computers to Windows 7 Professional.
Answer: C
Explanation:
Only Windows Vista Business can be upgraded to Windows 7 Professional.
QUESTION NO: 21
You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network run Windows Vista Business.
You have been instructed to upgrade a client computer named CERTKILLER-WS620 to Microsoft
Windows 7 Professional. CERTKILLER-WS620 has the following specifications:
Drive C (system drive) has 12 gigabytes (GB) of free space.Drive D (data drive) has 40 GB of free
space.Four memory slots with two occupied by a 512 megabyte (MB) memory stick.One 2.0
gigahertz (GHz) 32-bit processor.
You need to ensure that Windows 7 Professional can be installed on CERTKILLER-WS620.
What should you do?
A. You should consider installing Windows 7 on Drive D.
B. You should consider creating more free space on Drive C.
C. You should consider upgrading the memory.
D. You should consider upgrading the processor.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 13
Actu
alTe
sts.
com
Answer: B
Explanation:
: During an upgrade, the Operating Systems must be installed on the system drive. However, the
system drive on CERTKILLER-WS620 has only 12 GB of free space. Thus you should free up
space on Drive C because Windows 7 requires 16 GB of free space for installation purposes.
QUESTION NO: 22
You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network run Windows XP Professional.
You have been instructed to upgrade the Windows XP Professional client computers to Windows
7. However, before you proceed you need to determine if the current applications on the Windows
XP Professional computers will run on Windows 7. You want to accomplish this task using the
least amount of administrative effort.
What should you do?
A. You should run the Application Compatibility Toolkit (ACT) 5.5.
B. You should run Windows Update.
C. You should run the Windows 7 Upgrade Advisor.
D. All of above
Answer: A
Explanation:
Application Compatibility Toolkit (ACT) 5.5 collects information about the applications that are
installed on the network computers and provides information about the applications that are
incompatible with Windows Vista. Windows Vista Upgrade Adviser can also be used for the same
purpose but it requires a massive amount of administrative effort because it needs to be run
separately on each computer.
QUESTION NO: 23
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network
client computers currently make use of Windows Vista Enterprise (x86). You are responsible for
managing a client computer named CERTKILLER-WS20. During the course of the day you
receive instructions from CertKiller.com to identify the Windows 7 version and edition
CERTKILLER-WS20 can directly upgrade to.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 14
Actu
alTe
sts.
com
What should you do?
A. Your best option would be to make use of Windows 7 Enterprise (x64).
B. Your best option would be to make use of Windows 7 Home Professional (x86).
C. Your best option would be to make use of Windows 7 Ultimate (x86).
D. Your best option would be to make use of Windows 7 Ultimate (x64).
Answer: C
QUESTION NO: 24
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. You are in the process of determining when
you need to execute a migration rather that an upgrade.
What should you do? (Choose all that apply.)
A. Your best option would be to migrate Windows Vista Business (x86) to Windows 7 Professional
(x64).
B. Your best option would be to migrate Windows Vista Enterprise (x64) to Windows 7 Enterprise
(x64).
C. Your best option would be to migrate Windows Vista Home Premium (x64) to Windows 7 Home
Premium (x86).
D. Your best option would be to migrate Windows XP Professional (x64) to Windows 7
Professional (x64).
Answer: A,C,D
QUESTION NO: 25
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. You are responsible for a
computer named CERTKILLER-WS04. CERTKILLER-WS04 is configured to run Windows Vista
Service Pack 2 (SP2). During the course of the week you receive an instruction from the CIO to
have CERTKILLER-WS04 upgraded to Windows 7.
What should you do?
A. This can be accomplished from Windows Vista by running Setup.exe from the Windows 7
installation media.
Thereafter the Custom (advanced) option should be selected.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 15
Actu
alTe
sts.
com
B. This can be accomplished by starting CERTKILLER-WS04 from the Windows installation
media.
Thereafter the Upgrade option should be selected.
C. This can be accomplished by starting CERTKILLER-WS04 from the Windows 7 installation
media.
Thereafter the Custom (advanced) option should be selected.
D. This can be accomplished from Windows Vista by running Setup.exe from the Windows 7
installation media.
Thereafter the Upgrade option should be selected.
Answer: D
QUESTION NO: 26
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7.
A CertKiller.com employee named Rory Allen has a computer at home with a cable modem
connection. Rory Allen has recently requested that you guide him by selecting the appropriate
method to upgrade from Microsoft Windows 7 Home Premium to Microsoft Windows 7 Ultimate.
What should you do?
A. You should consider instructing Rory Allen that WDS can be used.
B. You should consider instructing Rory Allen that Windows Anytime Upgrade can be used.
C. You should consider instructing Rory Allen that Sysprep can be used.
D. You should consider instructing Rory Allen that Windows PE can be used.
Answer: B
QUESTION NO: 27
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows Vista. During the course of
the day a network user named Mia Hamm asked you which of the Microsoft tools can be used to
determine if your installed applications have known problems with Microsoft Windows 7.
What should you do?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 16
Actu
alTe
sts.
com
A. You should consider instructing Mia Hamm that the USMT Microsoft tool can be used.
B. You should consider instructing Mia Hamm that the Windows PE Microsoft tool can be used.
C. You should consider instructing Mia Hamm that the Windows 7 Upgrade Advisor Microsoft tool
can be used.
D. You should consider instructing Mia Hamm that the Sysprep Microsoft tool can be used.
Answer: C
Explanation:
Part 3: Migrate user profiles (5 Questions)
QUESTION NO: 28
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You are responsible for managing a workstation named CERTKILLER-WS624. CERTKILLER-
WS624 is configured to run Windows Vista and contains an accounting application named
accapp.exe. CertKiller.com purchases a new Windows 7 workstation that will replace
CERTKILLER-624. You need to export the user state as well as the settings of the accapp.exe
application so that it can be migrated to the Windows 7 workstation.
What should you do?
A. You should consider modifying the migapp.xml file on CERTKILLER-WS624 and then run
Scanstate.exe with the /i parameter.
B. You should consider modifying the miguser.xml file on CERTKILLER-WS624 and then running
Loadstate.exe with the /ui parameter.
C. You should consider running Scanstate.exe with the /genconfig parameter on CERTKILLER-
WS624.
D. You should consider running Loadstate.exe with the /config parameter on CERTKILLER-
WS624.
Answer: A
Explanation:
In order to migrate a user from Vista to Windows 7run the User State Migration toolkit (USMT).
ScanState collects the files and settings from the source computer. Run LoadState to restore the
user state onto the destination computer.
Incorrect Answers:
B: are incorrect because you would not export (save) the system or application settings with
LOADSTATE. You would use SCANSTATE.
C: Is incorrect because using the parameter /gencofig with SCANSTATE allows you to modify the
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 17
Actu
alTe
sts.
com
configuration file, not collect (save) user settings.Reference: http://technet.microsoft.com/en-
us/library/cc721992(
D: are incorrect because you would not export (save) the system or application settings with
LOADSTATE. You would use SCANSTATE.
QUESTION NO: 29
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. You are assigned two workstations
named CERTKILLER-WS625 and CERTKILLER-WS680. CERTKILLER-WS625 is configured to
run Windows Vista and CERTKILLER-WS680 is configured to run Windows 7.
You receive an instruction to migrate the user files and profiles from CERTKILLER-WS625 to
CERTKILLER-WS680. To accomplish this you decide to determine the amount space needed to
accomplish the migration.
What should you do?
A. You should consider running Scanstate \\computer1\store /nocompress /p on CERTKILLER-
WS680.
B. You should consider running Scanstate c:\store /nocompress /p on CERTKILLER-WS625.
C. You should consider running Loadstate \\computer1\store /nocompress on CERTKILLER-
WS680.
D. You should consider running Loadstate c:\store /nocompress on CERTKILLER-WS625.
Answer: B
Explanation:
/p Generates a space-estimate file called Usmtsize.txt that is saved to StorePath . This option
does not collect the user state. You must also specify / nocompress . The command must be run
locally on CERTKILLER625 (The source computer). The storage location may be on the network
or local.
Incorrect Answers:
A: This is the wrong computer. The command must be run locally on CERTKILLER625 (The
source computer). The storage location may be on the network or local.
C: You use SCANSTATE not LOADSTATE to store information from the source computer.
D: You use SCANSTATE not LOADSTATE to store information from the source computer.
QUESTION NO: 30
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 18
Actu
alTe
sts.
com
contains 300 Windows XP Professional workstations and 200 Windows Vista Ultimate
workstations.
You have been instructed to migrate all Windows XP Professional workstations to Windows 7
Ultimate. You need to ensure that user files and setting are retained. However, several
CertKiller.com users have used Encrypting File System (EFS) to encrypt their user files. You thus
need to migrate the Encrypting File System (EFS) encrypted files and certificates. In addition you
need to ensure that you are able to encrypt the migration store during the migration.
What should you do?
A. On Windows XP make use of the User State Migration Tool (USMT) 3.0.
B. On Windows XP make use of the User State Migration Tool (USMT) 2.6.
C. On Windows 7 make use of the User State Migration Tool (USMT) 4.0.
D. On Windows 7 make use of the User State Migration Tool (USMT) 3.0.
Answer: A
Explanation:
: USMT 3.0 or higher should be used on Windows XP to migrate EFS files and certificates and
also encrypt the migration store. With USMT 3.0 you can specify the / efs :copyraw switch to
automatically migrate the EFS files and certificates to the destination computer that is running
Windows Vista. To encrypt the store, you should use the /encrypt switch.
QUESTION NO: 31
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. You have been instructed to
perform a clean installation of Microsoft Windows 7 on the CertKiller.com client computers that are
currently running Microsoft Windows Vista.
You need to be able to migrate user data and settings to Windows 7. The computers running
Windows Vista currently have a single partition of 80 GB with 60 GB of free disk space. You need
to use the User State Migration Tool (USMT) to migrate user state data while keeping network
traffic to a minimum.
What should you do?
A. You should create a network share and store the user data in the shared folder.
B. You should format the hard disks on the Windows Vista computers and create a primary and a
secondary partition.
C. You should use third-party tools to resize the 80 GB partition and create a seconds partition to
store the user data.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 19
Actu
alTe
sts.
com
D. You should use the Windows Easy Transfer tool to store the user data on the system partition.
Answer: C
Explanation:
: Resizing the 80 GB partition with a third-party tool and creating a second partition to store the
user state data will keep the network traffic to a minimum. If you want to store user state data on a
network share and the computer does not have a secondary partition, you should resize the
partition.
QUESTION NO: 32
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the
day a network user named Dean Austin asked you which of the Microsoft operating systems
supports offline migration using USMT.
What should you do? (Choose all that apply)
A. You should consider instructing Dean Austin that Microsoft Windows Vista supports offline
migration using USMT.
B. You should consider instructing Dean Austin that Microsoft Windows XP Professional supports
offline migration using USMT.
C. You should consider instructing Dean Austin that Microsoft Windows 7 supports offline
migration using USMT.
D. You should consider instructing Dean Austin that Microsoft Windows 2000 Professional
supports offline migration using USMT.
Answer: A,B,C
QUESTION NO: 33
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You are busy with a deployment of an image of a computer. You have created an answer file
named answer.xml. You want to ensure that the installation applies the answer file after the
deployment of the image.
What should you do?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 20
Actu
alTe
sts.
com
A. You should consider running the Imagex.exe /append answer.xml /check before you capture
the image.
B. You should consider running the Sysprep.exe /generalize /oobe /unattend:answer.xml before
you capture the image.
C. You should consider running the Imagex.exe /mount answer.xml /verify before you capture the
image.
D. You should consider running the Sysprep.exe /reboot /audit /unattend:answer.xml before you
capture the image.
Answer: B
Explanation:
The System Preparation ( Sysprep ) tool prepares an installation of Windows 7 for duplication,
auditing, and customer delivery. You can use an answer file with Sysprep to configure unattended
Setup settings.
The /generalize command removes any machine specific attributes such as the Seurity ID (SID).
The / oobe command tells the image to start with the normal "Out-Of-The-Box" experience. Just as
if you bought a retail new copy.
The / unattend : command tells the image to use the answer file
Incorrect Answers:
D: The reboot and audit commands are not valid together. Reboot restarts the computer. Use this
option to audit the computer and to verify that the first-run experience operates correctly. Audit
restarts the computer into audit mode. Audit mode enables you to add additional drivers or
applications to Windows. You can also test an installation of Windows before it is sent to an end
user. If an unattended Windows setup file is specified, the audit mode of WindowsSetup runs the
auditSystem and auditUser configuration passes.
QUESTION NO: 34
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains
120 workstations.
CertKiller.com is currently in the process of migrating all of its workstations to Windows 7. In
preparation if the migration, you have installed Windows 7 on a computer named CERTKILLER-
WS680. You now need to create an image of CERTKILLER-WS680, which will be deployed to all
workstations on the CertKiller.com network.
What should you do before creating the image on CERTKILLER-WS680?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 21
Actu
alTe
sts.
com
A. You should consider running the System Preparation.
B. You should consider installing the User State Migration Tool.
C. You should consider installing the Windows Automated Installation Kit.
D. You should consider running the Package Manager.
Answer: A
Explanation:
Sysprep is used to prepare the image to be installed on other machines. Sysprep will remove the
SID, Reset the Activation to 30 days, add an answer file if desired and reset the install to an "Out-
Of-The-Box" experience.
Any method of moving a Windows image to a new computer, either through imaging, hard disk
duplication, or other method, must be prepared with the sysprep /generalize command. Moving or
copying a Windows image to a different computer without running the Sysprep /generalize
command is not supported.
The following command-line options are available for Sysprep :
sysprep.exe [ / oobe | /audit ] [ /generalize ] [ /reboot | /shutdown | /quit ] [ /quiet ] [ / unattend :
answerfile ]
Incorrect Answers:
B: The User State Migration Tool (USMT) is used to copy system and user information from one
computer to another regardless of Windows Operating system.
C: The Windows Automated Installation Kit (WAIK) is a whole suite of tools including Sysprep,
used for Windows 7 deployment.
D: The Package Manager (Pkgmgr.exe) is a command-line tool that you can use offline to install,
remove, or update Windows packages.
QUESTION NO: 35
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. You have been instructed to
deploy Microsoft Windows 7 on all of the CertKiller.com client computers.
You have installed Windows Automated Installation Kit (Windows AIK) on a reference computer.
You then created an answer file for a Windows 7 unattended installation. You now need to validate
the answer file before deploying Windows 7 to the CertKiller.com client computers.
What should you do?
A. You should consider using the Setup Manager.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 22
Actu
alTe
sts.
com
B. You should consider using the Sysprep.exe utility.
C. You should consider using the Office Customization Tool (OCT).
D. You should consider using the Windows System Image Manager (Windows SIM) tool.
Answer: D
Explanation:
: The Windows SIM tool is used to create an answer file, as well as to validate the answer file to
ensure that the file is working.
QUESTION NO: 36
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com.
You have been instructed to deploy Microsoft Windows 7 on all the CertKiller.com client
computers. You want to deploy Windows 7 on the client computers in unattended mode. You
install Windows 7 on reference computer named CERTKILLER-WS680 that will be used to build a
master image. You then manually create the answer file that will be required for the unattended
installation.
What should you do next?
A. You should use Sysprep.exe to capture an image of CERTKILLER-WS680.
B. You should use the ImageX command-line utility to capture an image of CERTKILLER-WS680.
C. You should use Windows System Image Manager (Windows SIM) to validate the answer file.
D. You should use the Setup Manager Tool to validate the answer file.
Answer: C
Explanation:
: When manually creating an answer file, you should always validate the answer file using SIM.
Validating will ensure that the values in the answer file are correct. If you neglect to validate after
manually creating the answer file, you will encounter errors when deploying Windows 7 and will
then have to validate the answer file.
Incorrect answers :
A : Sysprep.exe is used to prepare CERTKILLER-WS680 after validating the answer file.
B : ImageX is used to capture the image after preparing CERTKILLER-WS680. It is not used
after manually creating the answer file.
D : Setup Manager Tool or Setupmgr.exe is used in earlier versions of Windows operating
systems.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 23
Actu
alTe
sts.
com
QUESTION NO: 37
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. You have received instructions
to deploy Windows 7 on all the CertKiller.com client computers that have CD-ROM drives.
You decide to create a custom Windows 7 image on spanned media using the
Createspannedshares.cmd script. However, you are unable run the Crespannedshares.cmd script.
What should you do?
A. You should consider installing the Package Manager prior to creating the spanned media.
B. You should consider installing Windows Automated Installation Kit (Windows AIK) prior to
creating the spanned media.
C. You should consider installing the Deployment Image Servicing and Management (DISM) tool
prior to creating the spanned media.
D. You should consider installing the Windows System Image Manager (Windows SIM) prior to
creating the spanned media.
Answer: B
Explanation:
: To be able to create the spanned media to install Windows 7 on the CD-ROM client computers
you need to install Windows AIK on a computer from where you plan to create the spanned media.
Only after the installation of Windows AIK will you be able to run the Createspannedshares.cdm
script to create the spanned media.
QUESTION NO: 38
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com.
The CertKiller.com management has instructed you to install Microsoft Windows 7 on all the client
computers at CertKiller.com. You have installed Windows Deployment Service (WDS) on a server
named CERTKILLER-SR05. You want to use a client computer named CERTKILLER-WS680 as a
reference computer from which you want to create the image for the deployment. You now need to
remove hardware-specific information from the Windows installation on CERTKILLER-WS680.
What should you do?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 24
Actu
alTe
sts.
com
A. You should consider running the Sysprep.exe utility with the /oobe and /generalize switches on
CERTKILLER-WS680.
B. You should consider running the Pkgmgr.exe utility with the /oobe and /generalize switches on
CERTKILLER-WS680.
C. You should consider running the Setupmgr utility with the /oobe and /generalize switches on
CERTKILLER-WS680.
D. You should consider running the ImageX command-line utility with the /oobe and /generalize
switches on CERTKILLER-WS680.
Answer: A
Explanation:
Part 2: Prepare a system image for deployment (4 Questions)
QUESTION NO: 39
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network
contains 5 Windows Server 2008 servers, 200 Windows Vista Business client computers and 300
Windows 7 Professional client computers.
You have been instructed to deploy Microsoft Windows 7 on the 200 Windows Vista Business
client computers. There is an existing offline Windows 7 image on a client computer named
CERTKILLER-WS680. However, you need to add updated device drivers to this image.
What should you do?
A. You should consider using the ImageX command line utility.
B. You should consider using the Pkgmgr.exe utility.
C. You should consider using the Windows System Image Manager (Windows SIM).
D. You should consider using the Deployment Image Servicing and Management (DISM) tool.
Answer: D
Explanation:
: The Deployment Image Servicing and Management (DISM) tool replaces the Pkgmgr.exe utility
and is used to update images by adding or removing device drivers and language packs, enabling
or disabling Windows features, and adding and configuring Windows updates.
QUESTION NO: 40
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 25
Actu
alTe
sts.
com
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. CertKiller.com has its
headquarters in London and a regional office in New York. All client computers on the
CertKiller.com network run Windows 7 Ultimate. You are responsible for managing
CertKiller.com's operating system deployment images.
CertKiller.com is in the process of opening a European regional office in Rome. You are required
to ensure that a Windows 7 image with support for Italian is available for deployment in the Rome
office.
What should you do?
A. You should consider using the ImageX command-line tool to mount the Windows 7 image and
make the appropriate changes using an answer file.
B. You should consider using the ImageX command-line tool to mount the Windows 7 image and
use a script to commit changes to the image.
C. You should consider using the International Settings and Configuration (Intlcfg.exe) tool to
make the appropriate changes to the Windows 7 image.
D. You should consider using the Windows System Image Manager(Windows SIM) to create an
answer file and then use the Deployment Image Servicing and Management (DISM) tool to apply it
to the Windows 7 image.
Answer: D
Explanation:
: The Deployment Image Servicing and Management (DISM) tool allows you to add or remove
packages to or from an offline image or an image that is currently running on a computer. You can
also add or remove Windows features, apply unattended installation answer file settings, and
perform the offline installation of language packs and out-of-box driver packages specified in an
answer file.
QUESTION NO: 41
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. CertKiller.com has its
headquarters in London and a regional office in New York. All client computers on the
CertKiller.com network run Windows 7 Ultimate. You are responsible for managing
CertKiller.com's operating system deployment images.
CertKiller.com is in the process of opening a European regional office in Rome. You are required
to ensure that support for Italian is available for the Windows 7 deployment in the Rome office.
However, you need to install the Italian language pack without editing the Windows 7 image.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 26
Actu
alTe
sts.
com
What should you do?
A. You should consider installing the Italian language pack by using the Language Pack Setup
Tool.
B. You should consider copying the Windows distribution folder to the Italian language pack.
C. You should consider installing the Italian language pack by using the Package Manager utility.
D. You should consider installing the Italian language pack by using the Intlcfg.exe tool.
Answer: B
QUESTION NO: 42
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network
contains 150 client computers currently make use of Microsoft Windows XP Professional.
CertKiller.com has recently decided to deploy Windows 7 to 80 client computers on the
CertKiller.com network. You thus decide to install Windows 7 on a computer named
CERTKILLER-WS06 and prepare it to be imaged. You thus need to determine what you should be
doing prior to creating the image of CERTKILLER-WS06.
What should you do?
A. You should consider starting CERTKILLER-WS06 from the Windows Preinstallation
Environment (Windows PE).
Thereafter the Wpeutil command should be run.
B. You should consider running the Dism command at the command prompt.
C. You should consider running the Sysprep command at the command prompt.
D. You should consider starting CERTKILLER-WS06 from the Windows Preinstallation
Environment (Windows PE).
Thereafter the Imagex command should be run.
Answer: C
QUESTION NO: 43
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory forest containing a single domain named CertKiller.com. The servers on the
network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.
The CertKiller.com network currently has 25 desktop computers and 25 portable computer
configured with 32-bit hardware.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 27
Actu
alTe
sts.
com
During the course of the day you planned the deployment of Windows 7 along with several
corporate applications to client computers using a custom image. CertKiller.com wants you to
prepare for the deployment whilst ensuring the least amount of administrative effort is used.
What should you do?
A. You should consider having the Microsoft Assessment and Planning (MAP) toolkit installed and
run on a server.
B. You should consider having the Windows Automated Installation Kit (AIK) installed and run the
Windows System Image Manager (Windows SIM) on a server.
C. You should consider having Microsoft Windows 7 and the corporate applications installed on
one computer.
D. You should consider having Microsoft Windows 7 and the corporate applications installed on
one portable computer and one desktop computer.
Answer: C
Explanation:
Part 3: Deploy a system image (4 Questions)
QUESTION NO: 44
You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains
two Windows Server 2008 computers named CERTKILLER-SR01 and CERTKILLER-SR02 and
500 Windows Vista Ultimate client computers. CERTKILLER-SR01 functions as a Domain
Controller (DC) while CERTKILLER-SR02 functions as a Domain Name System (DNS) server.
CertKiller.com purchases 200 new client computers that have the following resources:
2.33 GHz Dual-Core processor.2 GB of RAM.80 GB hard drive.DirectX 10 video display
card.Integrated sound card.10/100/1000 integrated network adapter.
You need to perform a clean installation of Microsoft Windows 7 Ultimate on the new client
computers. You use one of the new client computers as a reference computer from which you
build a custom image and an answer file. You want to deploy the image to the new client
computers over the network using Windows Deployment Services (WDS).
What should you do?
A. You should install a Remote Installation Services (RIS) server on the network.
B. You should install a Dynamic Host Configuration Protocol (DHCP) server on the network.
C. You should upgrade the Domain Controller to Windows Server 2008 R2.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 28
Actu
alTe
sts.
com
D. You should install a Windows Internet Name Service (WINS) server on the network.
Answer: B
Explanation:
The network must have a DHCP server with an active scope as Windows Deployment Services
uses PXE, which relies on DHCP for IP addressing.
QUESTION NO: 45
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. You have been instructed to
deploy Microsoft Windows 7 on all the CertKiller.com client computers.
You use a client computer named CERTKILLER-WS680 as a reference computer to create
custom image and an answer file that will be used to automate the deployment of Windows 7 on
the client computers. You want to complete the task with the least amount of administrative effort.
What should you do?
A. You should consider installing Systems Management Server (SMS) operating system
deployment (OSD) feature pack on CERTKILLER-WS680.
B. You should consider installing the Windows Automated Installation Kit (Windows AIK) on
CERTKILLER-WS680.
C. You should consider installing Windows System Image Manager (Windows SIM) on
CERTKILLER-WS680.
D. You should consider installing the ImageX command-line utility on CERTKILLER-WS680.
Answer: B
Explanation:
: WAIK is a set of tools that will aid you in deploying Windows 7 on target computers. You can
create an answer file and capture an image of a reference computer by making use of Windows
AIK.
Incorrect answers :
A : Installing SMS OSD feature pack on CERTKILLER-WS680 will help to prepare the reference
computer to capture an image to be deployed on all computers, but this approach will require more
administrative time and effort than making use of Windows AIK.
C : Windows SIM is used to create answer file to automate Windows 7 deployment and is a part
of Windows AIK. Windows SIM does not create a custom image.
D : The ImageX command-line utility is used to capture volume images to the Windows Imaging
Format (WIM) file and is a part of Windows AIK. ImageX does not create an answer file.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 29
Actu
alTe
sts.
com
QUESTION NO: 46
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. You have been instructed to
deploy Microsoft Windows 7 on CertKiller.com client computers that do not support PXE.
You install Windows Deployment Service (WDS) on a server named CERTKILLER-SR05 and
create a discover image for the deployment. You now need to identify the best method for creating
bootable media that will be used to deploy Windows 7 on the non-PXE supporting client
computers.
What should you do?
A. You should consider installing Windows System Image Manager (Windows SIM) on
CERTKILLER-SR05.
B. You should consider installing the Windows Automated Installation Kit (Windows AIK) on
CERTKILLER-SR05.
C. You should consider installing the Business Desktop Deployment (BDD) workbench on
CERTKILLER-SR05.
D. You should consider installing System Management Server (SMS) on CERTKILLER-SR05 and
create an Image Capture CD using the SMS console.
Answer: B
Explanation:
: Bootable media that will be used to deploy Windows 7 to client computers must be created after
a discover image is created. WAIK will provide the tools that are required to create the bootable
media.
QUESTION NO: 47
You work as a Desktop support technician at CertKiller.com. You have been assigned the task of
installing Windows 7 on 10 network computers using custom WIM image.
You have Windows Automated Installation Kit (Windows AIK) installed on one of the computers.
You now want to create a WinPE CD to capture or apply the custom WIM image of Windows 7
from the master computer.
What should you do? (Each correct answer presents part of the solution. Choose three.)
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 30
Actu
alTe
sts.
com
A. You should copy the WinPE.wim and boot files to WinPE_x86 and Burn this data on a CD.
B. You should run Copype.cmd to install Windows PE to a directory and then copy the imagex.exe
file to ISO folder under WinPE_x86 directory
C. You should create wimscript.ini configuration file in notepad. Save the file in the same directory
as imagex.exe.
D. You should copy the Oscdimg.exe file and create a configuration file named wimscript.ini. Save
the file in the same directory as Oscdimg.exe.
E. You should run Oscdimg.exe to create an ISO image of WinPE. Burn the image on a CD.
Answer: B,C,E
Explanation:
To create a WinPE CD and to initiate Windows Vista installation using a custom WIM image of
Windows Vista, you need to first run Copype.cmd to install Windows PE to a directory and then
copy the imagex.exe file to ISO folder under WinPE_x86 directory, then create wimscript.ini
configuration file in notepad and save the file in the same directory as imagex.exe, and then finally
run Oscdimg.exe to create an ISO image of WinPE and then burn the image on a CD.
Part 4: Configure a VHD (6 Questions)
QUESTION NO: 48
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
The CertKiller.com network contains a client computer named CERTKILLER-WS679 with a Virtual
Hard Disk (VHD). You have installed Windows 7 on the Virtual Hard Disk (VHD). You now want to
boot CERTKILLER-WS679 from the Virtual Hard Disk (VHD).
What should you do?
A. You should consider running the Select vdisk from the Diskpart.exe command.
B. You should consider changing the active partition in Disk Management.
C. You should consider running the Bcdedit.exe command and modifying the Windows Boot
Manager settings.
D. You should consider running the Bootcfg.exe command with the /default parameter.
Answer: C
Explanation:
If you are deploying the VHD to a computer with an existing Windows7 or Windows
Server®2008R2 installation, you can use the BCDedit tool to make the new VHD bootable and
add it to the boot menu. Using BCDedit , you obtain the GUID from the VHD boot disk and then
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 31
Actu
alTe
sts.
com
using BCDedit , set that GUID to be the default boot device.
Incorrect Answers:
A: Diskpart partitions the hard drive. It does not set the boot order.
B: The Active Partition does not change.
QUESTION NO: 49
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You have created a Virtual Hard Disk (VHD) with a disk image that you want to add to a client
computer named CERTKILLER-WS680. You have copied the VHD to CERTKILLER-WS680 and
attached it using the attach vdisk command. You now want to add the Virtual Hard Disk (VHD) to
the Windows 7 boot menu.
What should you do?
A. You should consider using the Bcdedit.exe utility to modify the Windows Boot Manager settings.
B. You should consider using Disk Management to change the active partition.
C. You should consider using the BCDboot utility to copy the boot environment files and Boot
Configuration Data (BCD) configuration from the \Windows directory in the VHD to CERTKILLER-
WS680.
D. You should consider sing the Bootcfg.exe utility with the /default parameter to set the VHD as
the default boot device.
Answer: C
Explanation:
To deploy a VHD image:
1. On the source computer, use the Diskpart tool to create, attach, partition, and format a new
virtual hard disk.
2. Use Use ImageX to apply the . wim file to the primary partition of the VHD.
3. Use the DiskPart tool to detach the virtual disk after applying the image. Copy the VHD file to a
network share or USB hard drive
4. Boot the target computer with Boot PE and prepare the hard drive using Diskpart
5. Copy the VHD to the drive and attach using Diskpart
6. Use the BCDboot tool, located in the \System32 directory of the Windows7 VHD or in a
Windows®7 WindowsPE media, to copy the boot-environment files from the \Windows directory in
the VHD to the system partition. The BCDboot tool will create the BCD configuration to boot from
the VHD.
7. Use Diskpart to detach the VHD and then restart the computer.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 32
Actu
alTe
sts.
com
Incorrect Answers:
A: Windows Boot manager is part of Vista and earlier boot systems.
B: Disk Manager is used to allocate space and partition drives.
QUESTION NO: 50
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. CertKiller.com has acquired a new computer
named CERTKILLER-WS25 that has no operating system (OS) installed.
There is a virtual hard disk (VHD) in your department that contains an installation of Windows 7.
You thus decide to start CERTKILLER-WS25 from the Windows Preinstallation Environment
(Windows PE). You then create a partition on CERTKILLER-WS25 and copy the VHD to it. Your
subsequent step is to configure CERTKILLER-WS25 to start from the virtual hard disk.
What should you do?
A. Your best options would be to make use of Wpeutil.exe and Dism.exe.
B. Your best options would be to make use of Scanstate.exe and Loadstate.exe.
C. Your best options would be to make use of Imagex.exe and Bcdedit.exe.
D. Your best options would be to make use of Diskpart.exe and Bcdboot.exe.
Answer: D
QUESTION NO: 51
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7.
During the course of the day you receive instruction from CertKiller.com to create a 20-GB native
VHD which will be named KingSystem located in a folder KingWindows which resides on an
external hard disk assigned the H: drive designation.
What should you do?
A. You should consider making use of the create vdisk file=h:\kingwindows\kingsystem.vhd
maximum=20 command.
B. You should consider making use of the create vdisk file=h:\kingwindows\kingsystem
maximum=20 command.
C. You should consider making use of the create vdisk file=h:\kingwindows\kingsystem
maximum=20000 command.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 33
Actu
alTe
sts.
com
D. You should consider making use of the create vdisk file=h:\kingwindows\kingsystem.vhd
maximum=20000 command.
Answer: D
QUESTION NO: 52
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7.
During the course of the day you receive instruction from CertKiller.com to configure fault
tolerance for an operating system on a computer running Microsoft Windows 7 Home Premium to
boot in the event of a hard disk failure. CertKiller.com additionally informed you that the computer
has two disks with unallocated space on the second disk drive.
What should you do?
A. You should consider having a RAID-1 volume created.
B. You should consider having a RAID-5 volume created.
C. You should consider having a VHD created and install an image of your computer on the VHD.
You should then make use of BCDEdit to make the VHD bootable.256 created.
D. You should consider having a RAID-0 volume created.
Answer: A
QUESTION NO: 53
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. A network user named
Rory Allen has recently requested that you copy files to a virtual hard disk (VHD) file on the client
computer.
What should you do?
A. You should consider having the Diskpart.exe command run.
You should then have the Select and Attach commands run.
B. You should consider having Imagex.exe command run with specifying the /mountrw and /
append parameters.
C. You should consider having the Dism.exe command run with specifying the /image and /online
parameters.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 34
Actu
alTe
sts.
com
D. You should consider having the VHD file right-clicked and select open from within Windows
Explorer.
Answer: A
QUESTION NO: 54
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You are currently working on a workstation named CERTKILLER-WS680. You use the Windows
Preinstallation Environment (Windows PE) to boot CERTKILLER-WS680. You now need to load a
network adapter device driver on the Windows PE.
What should you do?
A. You should consider running Drvload.exe and then specify the device driver path.
B. You should consider running the Winpeshl.exe and then specify a custom Winpeshl.ini file.
C. You should consider using the InitializeNetwork command after you run Wpeutil.exe.
D. You should consider running Peimg.exe and then specify the device driver path.
Answer: A
Explanation:
Drvload.exe is the tool used to load drivers in the PE environment. Manually load the network
driver, and then verify that it is the correct driver.
Incorrect Answers:
B: Winpeshl controls whether a custome shell (GUI) is loaded in WinPE
C: WinPEutil /Initializenetwork Initializes network components and drivers, and sets the computer
name to a randomly-chosen value. However, it does not load or configure drivers.
D: PEimg.exe is a command-line tool for creating and modifying WindowsPE 2.0 images offline.
QUESTION NO: 55
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. You are responsible for a workstation
named CERTKILLER-WS680 that runs Windows 7.
You have just upgraded the driver for the network adapter on CERTKILLER-WS680. After the
upgrade you detect that you are unable to access the network resources. In Device Manager you
notice a warning symbol next to the network adapter. You have to make sure that you are able to
access the network resources as soon as possible.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 35
Actu
alTe
sts.
com
What should you do?
A. You need to uninstall the network adapter and scan for any hardware changes.
B. You need to roll back the network adapter driver.
C. You need to disable the network adapter and scan for any hardware changes.
D. You need to assign a static IP address to the network adapter.
Answer: B
Explanation:
The easiest way to fix the problem is to roll back the newly installed driver. Click on the device in
device manager, select the "Driver" tab and then click on "Roll Back Driver"
Incorrect Answers:
A: Uninstalling the network adapter might work but it is a lot of effort.
C: If you disable the adapter, the hardware scan won't find it.
D: A static IP address won't help.
QUESTION NO: 56
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network run Windows 7 Professional.
You are working on a client computer named CERTKILLER-WS680 that has been assigned to a
CertKiller.com user named Amy Walsh. You have been instructed toupdate the printer connected
to CERTKILLER-WS680 so that Amy Walsh can print graphics at a higher resolution. You
download a new printer driver from the Internet. Before you install the new printer driver you want
to ensure that the driver is compatible with Windows 7.
What should you do?
A. You should view the Advanced Attributes dialog box for the printer driver file and install the
driver if the contents have been secured.
B. You should run File Signature Verification to verify that the new driver has a Microsoft digital
signature and install the driver if it does have the signature.
C. You should install the driver and logon to the computer. If the computer fails after installing the
driver, reboot the computer and select the last known good configuration to recover the original
driver.
D. You should install the driver and logon to the computer. If the computer fails after installing the
driver, reboot the computer and use the Recovery Console to recover the original driver.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 36
Actu
alTe
sts.
com
Answer: B
Explanation:
When installing new software on your computer, system files and device driver files are sometimes
overwritten by unsigned or incompatible versions, causing system instability. The system files and
device driver files provided with Windows 7 have a Microsoft digital signature, which indicates that
the files are original, unaltered system files or that they have been approved by Microsoft for use
with Windows. Using File Signature Verification, you can identify unsigned files on your computer.
You should not install the driver if it does not have the signature if you want to prevent the loss of
production time due to incompatible driver installation that you are unsure of.
Incorrect Answers:
A: The advanced attributes of the driver file do not tell you if the driver is compatible with Windows
7.
C: The Last Known Good Configuration boot option and the Recovery Console will not allow you
to recover the original driver. You would need to boot to Safe Mode and use Driver Rollback to
recover the original driver.
D: The Last Known Good Configuration boot option and the Recovery Console will not allow you
to recover the original driver. You would need to boot to Safe Mode and use Driver Rollback to
recover the original driver.
QUESTION NO: 57
CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network client
computers currently make use of Microsoft Windows 7. You are assigned a client computer named
CERTKILLER-WS25. To ensure your productivity you need to make sure that the physical
memory as well as the speed is increased on CERTKILLER-WS25.
What should you do?
A. You should consider making use of ReadyBoost.
B. You should consider making use of PhysiRAM.
C. You should consider making use of DirectAccess.
D. You should consider making use of Aero Glass.
Answer: A
QUESTION NO: 58
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 37
Actu
alTe
sts.
com
CertKiller.com has recently deployed a client computer that is used by multiple users who log on to
the computer. The client computer currently has five removable devices attached. During the
course of the day you receive instruction from CertKiller.com to ensure that the network users are
only able to access remove able devices which were previously installed in the computer by
modifying the Local Group Policy.
What should you do?
A. You should consider having the WPD Devices: Deny read access setting disabled.
B. You should consider having the Allow administrators to override Device Installation Restriction
policies setting disabled.
C. You should consider having the Prevent redirection of USB device settings enabled.
D. You should consider having the Prevent installation of removable devices setting enabled.
Answer: D
Explanation:
Part 2: Configure application compatibility (9 Questions)
QUESTION NO: 59
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
The CertKiller.com network contains a Windows 7 client computer named CERTKILLER-WS680.
CERTKILLER-WS680 also runs a third party accounting application named accapp.exe. However,
accapp.exe is started during the boot process. You have received instructions to ensure that
accapp.exe is only started manually and not started during the boot process.
What should you do?
A. You should consider using the local Group Policy and set the application control policy.
B. You should consider using the System Configuration tool and use the Diagnostic Startup.
C. You should consider using the local Group Policy and set the software restriction policy.
D. You should consider using the System Configuration tool and set the Startup applications.
Answer: D
Explanation:
Using the System Configuration tool (MSConfig.exe), you can select diagnostic booting or
configurate starting services or applications.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 38
Actu
alTe
sts.
comIncorrect answers:
A: Group policy and Application control will prevent applications from starting, manually or
otherwise.
B: Diagnostic startup will make all sorts of changes to the start up and should be used just for
diagnostics.
C: Group policy and Software restriction policies can restrict applications from starting, manually or
otherwise.
QUESTION NO: 60
You work as a Desktop Technician at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. All client computers and mobile computers
on the CertKiller.com network run Windows 7 Professional.
A CertKiller.com user named Kara Lang has been assigned a mobile computer named
CERTKILLER-WS680. Kara Lang is preparing a multimedia presentation on CERTKILLER-
WS680. However, Kara Lang informs you that when she plays the multimedia presentation there
is no sound.
You need to enable Kara Lang to do her presentation with audio and video playback.
What should you do?
A. You should clear the 'Allow applications to take exclusive control of this device' check box from
the Line In Properties dialog box.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 39
Actu
alTe
sts.
com
B. You should select the 'I always give a presentation when I use this display configuration' check
box from the Presentation settings dialog box.
C. You should configure CERTKILLER-WS680 to use the default sound scheme.
D. You should enable the 'Presentation Settings' option and adjust the volume settings
appropriatly.
Answer: D
Explanation:
Using " Windows Mobility Center " you can endure that you laptop stays awake, notifications are
turned off and the screen saver is turned off. You can also adjust the sound. The " Windows
Mobility Center " is only available on Laptops.
Incorrect Answers:
A: Allowing exclusive control of you sound device might prevent you application from playing
correctly.
B: Selecting "Always give a presentation ..." will not help sound or presentation interruptions
C: The default sound scheme may prevent your presentation from running correctly.Reference:
Search on "Presentation Settings" in "Help and Support"
QUESTION NO: 61
You work as a Desktop Technician at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The CertKiller.com network contains a
workstation named CERTKILLER-WS680.
You have upgraded CERTKILLER-WS680 from Windows XP Professional Service Pack 2 (SP2)
to Windows 7 Professional. However, when you attempt to run a custom application named
CKapp.exe you receive an error message stating: "This application is only designed to run on
Windows XP or later." You need to configure the application to run on Windows 7.
What should you do?
A. You should consider installing Windows XP Mode on CERTKILLER-WS680.
B. You should consider having the CKapp.exe application configured to run with elevated
privileges.
C. You should consider connecting to Microsoft Updates and download any available updates.
D. You should consider modifying the CKapp.exe application properties to run in VGA Mode.
Answer: A
QUESTION NO: 62
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 40
Actu
alTe
sts.
com
You work as a Desktop Technician at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. All client computers and mobile computers
on the CertKiller.com network run Windows 7 Professional.
CertKiller.com has an Accounts department that needs to run an accounting application named
accapp.exe. However, accapp.exe is not Windows 7 compatible and can run only on Windows XP
Professional computers. You need to ensure that the Accounts department can run accapp.exe on
their client computers.
What should you do?
A. You should install Microsoft Virtual PC 2007 on each client computer in the Accounts
department.
B. You should install Windows XP Mode on each client computer in the Accounts department.
C. You should disable the 'User Account Control: Virtualizes file and registry write failures to per-
user locations' policy setting on the client computers in the Accounts department.
D. You should disable User Account Control on the client computers in the Accounts department.
Answer: B
QUESTION NO: 63
CertKiller.com has hired you as a network Administrator for their network. The CertKiller.com
network contains 50 client computers that are configured to run Microsoft Windows XP
Professional. During the course of the day you receive an instruction from the CIO to determine
which current applications installed on the client computers is compatible with Windows 7. You
need to accomplish this task with the least amount of administrative effort.
What should you do?
A. You should consider installing Microsoft Deployment Toolkit (MDT).
B. You should consider installing Microsoft Assessment and Planning (MAP) Toolkit.
C. You should consider installing Windows Automated Installation Kit (AIK).
D. You should consider installing Microsoft Application Compatibility Toolkit (ACT).
Answer: D
QUESTION NO: 64
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. All computers on the
CertKiller.com network are configured to run Windows 7. You are in the process of identifying the
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 41
Actu
alTe
sts.
com
various ratings for games in Windows 7.
What should you do?
A. You will find the Teen (T) rating setting in Windows 7.
B. You will find the Teen Everyone (E) rating setting in Windows 7.
C. You will find the Teen General Audience (G) rating setting in Windows 7.
D. You will find the Teen Adults Only (AO) rating setting in Windows 7.
Answer: A,B,D
QUESTION NO: 65
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7 or Microsoft Windows
XP Professional.
During the course of the day a network user named Dean Austin asked you which of the Microsoft
utilities can be used when transferring user encryption certificates from a computer that is
configured to run Microsoft Windows XP Professional to a computer configured to run Microsoft
Windows 7.
What should you do? (Choose two)
A. You should consider instructing Dean Austin that the Windows Easy Transfer utility can be used
for transferring the user encryption certificates.
B. You should consider instructing Dean Austin that the Robocopy.exe utility can be used for
transferring the user encryption certificates.
C. You should consider instructing Dean Austin that the File Settings and Transfer Wizard utility
can be used for transferring the user encryption certificates.
D. You should consider instructing Dean Austin that the USMT utility can be used for transferring
the user encryption certificates.
Answer: A,D
QUESTION NO: 66
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the
day a network user named Rory Allen asked you what he should download from the Microsoft
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 42
Actu
alTe
sts.
com
Corporation Web site to obtain USMT 4.0.
What should you do?
A. You should consider instructing Rory Allen that WAIK should be downloaded from Microsoft
Corporation to obtain USMT 4.0.
B. You should consider instructing Rory Allen that Microsoft Application Compatibility Toolkit
should be downloaded from Microsoft Corporation to obtain USMT 4.0.
C. You should consider instructing Rory Allen that Windows Anytime Upgrade should be
downloaded from Microsoft Corporation to obtain USMT 4.0.
D. You should consider instructing Rory Allen that Windows Upgrade Advisor should be
downloaded from Microsoft Corporation to obtain USMT 4.0.
Answer: A
QUESTION NO: 67
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7.
During the course of the day you create an application shim of the accounting software for a third-
party application using Microsoft Application Compatibility Toolkit (ACT). CertKiller.com has
recently requested that you make sure the application shim is applied the following time the
application is run.
What should you do?
A. You should consider having the application executable file right-clicked and modify the
compatibility settings.
B. You should consider having the application executable file right-clicked and modify the
advanced security settings.
C. You should consider having the Sdbinst.exe command run.
D. You should consider having the Msiexec.exe command run.
Answer: C
Explanation:
Part 3: Configure application restrictions (9 Questions)
QUESTION NO: 68
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 43
Actu
alTe
sts.
com
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You are responsible for managing a desktop workstation named CERTKILLER-WS680.
CERTKILLER-WS680 is configured to run Windows 7. You receive an instruction to ensure that all
device drivers installed on CERTKILLER-WS680 is digitally signed.
What should you do?
A. You should consider running Sigverif.exe at a command prompt on CERTKILLER-WS680.
B. You should consider running Verify at a command prompt on CERTKILLER-WS680.
C. You should consider selecting the Devices by connection view from the Device Manager on
CERTKILLER-WS680.
D. You should consider clicking Scan to determine any hardware changes from the Device
Manager on CERTKILLER-WS680.
Answer: A
QUESTION NO: 69
You work as a desktop support technician at a small company named CertKiller.com. All
CertKiller.com users are divided into groups named CK_ADMIN, CK_SUPRT and CK_STAFF.
The CertKiller.com network contains a stand-alone Windows 7 computer named CERTKILLER-
WS680. Several CertKiller.com users make use of CERTKILLER-WS680. You need to prevent the
CertKiller.com users of the CK_STAFF group from running Windows Media Player on
CERTKILLER-WS680. However, all other members must still be able to run Windows Media
Player. You want to accomplish this task by using the least amount of administrative effort.
What should you do?
A. You should consider creating an executable rule from Application Control Policies on
CERTKILLER-WS680.
B. You should consider creating the default rules from Application Control Policies on
CERTKILLER-WS680.
C. You should consider creating a hash rule from Software Restriction Policies on CERTKILLER-
WS680.
D. You should consider creating a path rule from Software Restriction Policies on CERTKILLER-
WS680.
Answer: A
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 44
Actu
alTe
sts.
com
QUESTION NO: 70
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. CertKiller.com currently makes use of a
computer named CERTKILLER-WS680 which runs Microsoft Windows 7. CERTKILLER-WS680 is
currently used by multiple CertKiller.com network users who log on to the computer. You have
received instruction to deny a CertKiller.com user named Mia Hamm user access to removable
devices on CERTKILLER-WS680. However, all other users who log on to CERTKILLER-WS680
must retain access to removable devices.
What should you do?
A. You should consider altering an application control policy from the local Group Policy on
CERTKILLER-WS680.
B. You should consider altering the BitLocker Drive Encryption settings from Control Panel on
CERTKILLER-WS680.
C. You should consider altering the settings of all removable devices from Device Manager on
CERTKILLER-WS680.
D. You should consider altering a removable storage access policy from the local Group Policy on
CERTKILLER-WS680.
Answer: D
QUESTION NO: 71
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
CertKiller.com issues a new usage policy that states that no CertKiller.com user should be allowed
to play video clips using Windows Media Player. You need ensure that this policy is applied.
What should you do? (Each correct answer presents part of the solution. Choose TWO.)
A. You should create a software restriction policy.
B. You should enable auditing on the use of wmplayer.exe for all users.
C. You should create a logon script that uninstalls Windows Media Player.
D. You should create a path rule to restrict the use of wmplayer.exe
Answer: A,D
Explanation:
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 45
Actu
alTe
sts.
com
To prevent users from running Windows Media Player, you need to first create a software
restriction policy and then create a path rule to restrict the use of wmplayer.exe. Software
Restriction Policies can be used to protect computers against unauthorized software.
Incorrect Answers:
B: Auditing will not allow you to stop the use of software.
C: Uninstalling media player through logon script leaves the scope of reinstalling the software and
using it.
QUESTION NO: 72
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
A software restriction policy has been implemented for the Finance department and the default
security level for the policy has been set to Disallow. The Finance department now needs to run a
custom application named FinApp.exe.
You now need to configure the software restriction policy to allow CertKiller.com users in the
Finance department to run FinApp.exe. However, they should not be allowed to run any other
unauthorized applications.
What should you do?
A. You should set the default security level of the software restriction policy to Unrestricted.
B. You should add FinApp.exe to the Designated File Types.
C. You should create a new path rule for FinApp.exe.
D. You should set the default security level of the software restriction policy to Basic User.
Answer: C
Explanation:
To configure the software restriction policy to allow Finance department users to run FinApp.exe
and make sure that they are not allowed to run any other unauthorized applications, you need to
create a new path rule for FinApp.exe and then set the rule to Unrestricted.
Incorrect Answers:
A: Setting the default security level of the software restriction policy to Unrestricted will remove all
the restrictions from the Finance department and they will be allowed to run any application.
B: Adding FinApp.exe to the Designated File Types will not help because FinApp.exe is not a file
type but a file itself.
D: Setting the default security level of the software restriction policy to Basic User will allow all
basic users to use all the applications and the restrictions will be removed.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 46
Actu
alTe
sts.
com
QUESTION NO: 73
CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All servers on the CertKiller.com
network run Windows Server 2008 and all client computers run Windows 7. CertKiller.com has
three custom financial applications that are digitally signed. For security purposes CertKiller wants
you to devise a security policy that will only enable company approved digital signed applications
to run.
What should you do?
A. Your best option would be to have a software restriction policy as well as a hash rule created.
B. Your best option would be to have an AppLocker Windows Installer rule created.
C. Your best option would be to have an AppLocker executable rule created.
D. Your best option would be to have a software restriction policy as well as a certificate rule
created.
Answer: C
QUESTION NO: 74
CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network client
computers are configured to run Windows 7. You are assigned a computer named CERTKILLER-
SR05. During the course of the day you receive an instruction from the CIO to identify the
applications that was installed on CERTKILLER-SR05 the previous week. You need to gather this
information as soon as possible.
What should you do? (Choose all that apply.)
A. You should be able to locate this information by checking the Windows System Change Log in
the Control Panel.
B. You should be able to locate this information by reviewing the informational events from the
Reliability Monitor.
C. You should be able to locate this information by checking the Windows System Diagnostics
Report under the Performance Monitor MMC.
D. You should be able to locate this information by viewing all events in the Applications Log that
is under the Windows Logs in the System and Security component section of the Control Panel.
Answer: B,D
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 47
Actu
alTe
sts.
com
QUESTION NO: 75
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the
day you receive instruction from CertKiller.com to deny the network users execute, write and read
access to all types of external storage devices for security reasons.
What should you do?
A. You should consider making use of the Removable Disks: Deny Read Access computer policy
setting.
B. You should consider making use of the Removable Disks: Deny Write Access computer policy
setting.
C. You should consider making use of the All Removable Storage: Allow Direct Access In Remote
Sessions computer policy setting.
D. You should consider making use of the All Removable Storage Classes: Deny All Access
computer policy setting.
Answer: D
QUESTION NO: 76
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7.
During the course of the day you receive instruction from CertKiller.com to have a standalone
computer configured to prevent the non-administrative network users from using the Device
Manager whilst ensuring that the network users are able to access the Event Viewer.
What should you do?
A. You should consider having the application control policies from the local computer policy
modified.
B. You should consider having the Microsoft Management Console (MMC) settings modified from
the local computer policy.
C. You should consider having the default settings for media and devices from Control Panel
modified.
D. You should consider having the default settings for device installation from Control Panel
modified.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 48
Actu
alTe
sts.
com
Answer: B
Explanation:
Part 4: Configure Internet Explorer (6 Questions)
QUESTION NO: 77
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers run Microsoft
Windows 7.
You are assigned a client computer named CERTKILLER-WS680. You want to modify the file
extensions on CERTKILLER-WS680 that are linked to Internet Explorer.
What should you do?
A. You should consider opening Default Programs and selecting Set Associations from the Control
Panel.
B. You should consider right-clicking %programfiles%\Internet Explorer\iexplore.exe and selecting
Properties from Window Explorer.
C. You should consider expanding Computer Configuration and selecting Software Settings from
the local Group Policy.
D. You should consider selecting Tools and then Manage Add-ons from Internet Explorer.
Answer: A
QUESTION NO: 78
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains
internal Web site that uses Integrated Windows Authentication.
A CertKiller.com user named Amy Walsh has been assigned a workstation named CERTKILLER-
WS680 that is running Windows 7. Amy Walsh reports that she is prompted for authentication
when she attempts to access the internal Web site. You verify that Amy Walsh's user account has
permission to access the internal Web site. You need to make sure that authentication occurs
automatically when Amy Walsh attempts to connect the Web site.
What should you do?
A. You should consider adding the Web site's URL to the Local zone on CERTKILLER-WS680.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 49
Actu
alTe
sts.
com
B. You should consider creating a difficult password for Amy Walsh's user account.
C. You should consider changing the credentials for Amy Walsh in the Credential Manager.
D. You should consider adding the Web site's URL to the Trusted sites zone on CERTKILLER-
WS680.
Answer: A
QUESTION NO: 79
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains an
intranet Web site.
A CertKiller.com user named Robbie Blake has been assigned a workstation named
CERTKILLER-WS680 that is running Windows 7. Robbie Blake reports that he can access the
internal web site but he cannot access web sites on the internet when he starts Internet Explorer.
You open Internet Explorer on CERTKILLER-WS680 as shown in the exhibit:
You need to ensure that Robbie Blake can access websites on both the Internet and the intranet.
What should you do?
A. You should consider selecting Work Offline from the Tools menu on CERTKILLER-WS680.
B. You should consider selecting InPrivate Blocking from the Safety menu on CERTKILLER-
WS680.
C. You should consider selecting InPrivate Browsing from the Safety menu on CERTKILLER-
WS680.
D. You should consider adding the intranet Web site to the Trusted sites zone from the Security
tab on CERTKILLER-WS680.
Answer: A
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 50
Actu
alTe
sts.
com
QUESTION NO: 80
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
A CertKiller.com user named Mia Hamm currently makes use of a computer named
CERTKILLER-WS680 which runs Microsoft Windows 7. You want to configure CERTKILLER-
WS680 to prevent Microsoft Internet Explorer from saving any data when Mia Hamm browses the
Internet.
What should you do?
A. You should consider disabling the InPrivate Blocking list on CERTKILLER-WS680.
B. You should consider disabling the BranchCache service on CERTKILLER-WS680.
C. You should consider opening an InPrivate Browsing session on CERTKILLER-WS680.
D. You should consider disabling the security settings for the Internet zone on CERTKILLER-
WS680.
Answer: C
QUESTION NO: 81
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network run Windows 7 Professional.
A CertKiller.com user named Andy Reid currently makes use of a computer named CERTKILLER-
WS680. You want to configure CERTKILLER-WS680 to make sure that the temporary Internet
files are deleted immediately whenever Andy Reid closes Internet Explorer.
What should you do?
A. You should consider modifying the properties of the Recycle Bin on CERTKILLER-WS680.
B. You should consider modifying the advanced settings from the Internet Options on
CERTKILLER-WS680
C. You should consider modifying the security level for the Internet zone from the Internet Options
on CERTKILLER-WS680.
D. You should consider modifying the permissions of the %systemroot%\temp\history folder on
CERTKILLER-WS680.
Answer: B
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 51
Actu
alTe
sts.
com
QUESTION NO: 82
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com currently
has an internal Web site that uses HTTPs and has a self-signed certificate.
A network user named Rory Allen makes use of Internet Explorer 8 to browse the internal Web
site. During the course of the day you receive complaints from Rory Allen that he receives the
error message when attempting to browse the internal Web site:
"There is a problem with the website's security certificate"
CertKiller.com wants you to prevent the warning message from appearing when Rory Allen or
other users access the internal Web site.
What should you do?
A. You should consider having the Web sites certificate imported into the Trusted Root
Certification Authorities store from Certificate Manager.
B. You should consider having the Web sites certificate imported into Rory Allen's personal store
from Certificate Manager.
C. You should consider having InPrivate Browsung enabled from Internet Explorer.
D. You should consider having Web site added to the Trusted sites zone from Internet Explorer.
Answer: B
QUESTION NO: 83
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. CertKiller.com has itsheadquarters in
London and a branch office in Paris.
The relevant portion of the CertKiller.com network is shown in the following exhibit:
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 52
Actu
alTe
sts.
com
You have just deploy a Windows 7 workstation named CERTKILLER-WS680 at the Paris office.
You now need to assign an IP address to the worksation.
What should you do?
A. You should consider assigning the IP address 192.168.5.193 to CERTKILLER-WS680.
B. You should consider assigning the IP address 192.168.5.126 to CERTKILLER-WS680.
C. You should consider assigning the IP address 192.168.5.40 to CERTKILLER-WS680.
D. You should consider assigning the IP address 192.168.5.94 to CERTKILLER-WS680.
Answer: C
Explanation:
Correct Answer 192.168.5.40. Using an IP address like 192.168.5.52/27 is a shorthand way of
indentifying the subnet mask. The /27 means that the first 27 bits of the IP address is the net
mask. In this case 255.255.255.224. So the range of the available IP addresses for computers is
limited to 192.168.5.33-62. The only IP address listed in that range is 198.158.5.40
The range starts at 33 because in the IP address given (192.168.5.40) the last octet number is 40.
40 includes the number 32 which is 27th bit in the subnet mask. This means that the subnet ends
at 32 and so workstations must begin at 33. Or in other words, the address of the the subnet is
192.168.5.32. This answer is the same regardless of the first three octet values. Even if the IP
address was 192.168.2.62, the results are the same.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 53
Actu
alTe
sts.
com
QUESTION NO: 84
You work as the network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. All servers on the CertKiller.com network
run Windows Server 2008 and all client computers run Windows 7. All client computers are
configured as Dynamic Host Configuration Protocol (DHCP) clients.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 54
Actu
alTe
sts.
com
CertKiller.com users connect to a file server named CERTKILLER-SR01 that hosts several shared
folders. A fellow network administrator relocates CERTKILLER-SR01 to another network segment.
However, after the CERTKILLER-SR01 is relocated, numerous CertKiller.com users complain that
they are unable to access the shared folders on TESTING-SR01. You need to make sure that
CertKiller.com users can connect to CERTKILLER-SR01 and access the shared folders on
CERTKILLER-SR01.
What should do?
A. You should instruct all CertKiller.com users to run ipconfig /displaydns from a command prompt
window on their client computers.
B. You should instruct all CertKiller.com users to run netsh interface ip set dns from a command
prompt window on their client computers.
C. You should instruct all CertKiller.com users to run ipconfig /release and ipconfig /renew from a
command prompt window on their client computers.
D. You should instruct all CertKiller.com users to run ipconfig /flushdns and then ipconfig
/registerdns from a command prompt window on their client computers.
Answer: D
Explanation:
: The ipconfig / flushdns command is used to flush and reset the contents of the DNS client
resolver cache. The workstations that communicated with CERTKILLER-SR01 prior to the move
cached the server's IP address in their DNS cache. It is therefore a possibility that those
workstations are retrieving their IP address from the cache. It does not query the DNS server for
the IP address. This type of situation will continue until the cached records expire. The ipconfig /
registerdns command is used for manual dynamic registration for the DNS names and IP
addresses that are configured at a workstation.
QUESTION NO: 85
You are employed as a network administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network run Microsoft Windows 7.
A CertKiller.com user named Dean Austin has been assigned a client computer named
CERTKILLER-WS623. CERTKILLER-WS623 has been configured to use the 192.168.16.35 IP
address and the 255.255.255.0 Subnet mask. CERTKILLER-WS623 has also been configured to
use 192.168.18.3 as the DNS Server address. The following exhibit shows the CERTKILLER-
WS623 IP configuration.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 55
Actu
alTe
sts.
com
You need to ensure that Dean Austin can make use of CERTKILLER-WS623 to connect to
resources on other subnets.
What should you do?
A. You need to configure the default gateway as 192.168.16.1.
B. You need to configure the default gateway as 192.168.16.35.
C. You need to configure the default gateway as 192.168.18.1.
D. You need to configure the preferred DNS server as 192.168.16.35.
Answer: A
Explanation:
To connect to other subnets, you need to configure CERTKILLER-WS623 with a default gateway.
The default gateway is usually the address of the internal interface of the network router. The
question doesn't tell us what address of the internal interface of the network router is but we know
that it needs to be an address in the same subnet as CERTKILLER-WS623. From the answers
given, the only address that would apply is 192.168.16.1.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 56
Actu
alTe
sts.
com
Incorrect Answers:
B: 192.168.16.35 is the address of CERTKILLER-WS623. Therefore, it cannot the default gateway
address.
C: 192.168.18.1 is not on the same subnet as CERTKILLER-WS623. Therefore, it cannot the
default gateway address.
D: You need to configure the default gateway address, not the preferred DNS server address.
QUESTION NO: 86
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
The CertKiller.com network is connected to the Internet through ha router with an internal IP
address of 192.168.16.12 and an external IP address of 198.207.16.19. You add a new Windows
7 client computer named CERTKILLER-WS680 to the network. You configure CERTKILLER-
WS680 with the IP address of 192.168.16.35 and a subnet mask of 255.255.255.0. You need to
ensure that CERTKILLER-WS680 is able to access the Internet.
What should you do?
A. You should set the IP address for CERTKILLER-WS680 to 198.164.16.35.
B. You should set the subnet mask for CERTKILLER-WS680 to 255.255.0.0.
C. You should set the default gateway on CERTKILLER-WS680 to 198.164.16.19.
D. You should set the default gateway on CERTKILLER-WS680 to 192.168.16.12.
Answer: D
QUESTION NO: 87
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
You are working on a client computer named CERTKILLER-WS680. You want to release the
DHCP assigned IP configuration of CERTKILLER-WS680. However, when you run the ipconfig
/release command you receive the error message stating that elevated permissions are required.
What should you do?
A. You should consider right-clicking the command prompt and select Run as administrator and
user the ipconfig /release command.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 57
Actu
alTe
sts.
com
B. You should consider logging on as an administrator and open the command prompt to run the
ipconfig /all command.
C. You should consider opening the Command Prompt and run the ipconfig /release /high
command.
D. You should consider having Parental Controls disabled and open the Command Prompt to run
ipconfig /all command.
Answer: A
QUESTION NO: 88
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The CertKiller.com network currently
consists of two office named Detroit and Miami which are on an isolated private wired subnet. The
servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft
Windows 7.
During the course of the day you configure Detroit with an IPv4 address 172.28.34.140 with a
subnet mask of 255.255.255.0. CertKiller.com additionally requested you configure the Miami
office with an IPv4 address 172.28.34.210 with a subnet mask 255.255.255.0. During your routine
maintenance you ping Detroit entering 172.28.34.140 and the command times out. You later try
pinging Miami entering 172.28.34.210 and discover that you fail to locate the Miami computer IPv4
address. CertKiller.com wants you to determine what could be causing the problem.
What should you do?
A. You should inform CertKiller.com that the problem could be caused by not specifying a default
gateway.
B. You should inform CertKiller.com that the problem could be caused by not permitting ICMPv4
traffic through firewalls on both computers.
C. You should inform CertKiller.com that the problem could be caused by the DNS service not
being available on the subnet.
D. You should inform CertKiller.com that the problem could be caused by the computer being on
different subnets.
Answer: B
Explanation:
Part 2: Configure IPv6 network settings (5 Questions)
QUESTION NO: 89
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 58
Actu
alTe
sts.
com
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network is
configured to use IPv6 addressing.
You have installed Windows 7 on a client computer named CERTKILLER-WS680 and have used
automatic IPv6 addressing on CERTKILLER-WS680. You want to verify the IPv6 address of
CERTKILLER-WS680.
What should you do?
A. You should consider running the Net config command from the command prompt on
CERTKILLER-WS680.
B. You should consider selecting Details from the network connection status on CERTKILLER-
WS680.
C. You should consider selecting Internet Protocol Version 6 (TCP/IPv6) and then Properties from
network connection properties on CERTKILLER-WS680.
D. You should consider running the Netstat command from the command prompt on
CERTKILLER-WS680.
Answer: B
QUESTION NO: 90
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
A CertKiller.com user named Amy Wilson has been assigned a client computer named
CERTKILLER-WS680. CERTKILLER-WS680 is connected directly to the Internet. You have
received instruction to configure CERTKILLER-WS680 with an Internet Protocol version 6 (IPv6)
address similar to a public IPv4 address. You need to determine the unicast address that needs to
be configured on CERTKILLER-WS680.
What should you do?
A. You should consider using a unique local address as the appropriate IPv6 address type.
B. You should consider using a link-local address as the appropriate IPv6 address type.
C. You should consider making use of a site-local address as the appropriate IPv6 address type.
D. You should consider using a global unicast address as the appropriate IPv6 address type.
Answer: D
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 59
Actu
alTe
sts.
com
Explanation:
: Global Unicast IPv6 addresses are globally routable and reachable on the IPv6 portion of the
Internet. Global addresses are equivalent to public IPv4 addresses and are used on the IPv6
Internet.
QUESTION NO: 91
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
You are working on a client computer named CERTKILLER-WS680. You have been instructed to
configure CERTKILLER-WS620 with 2001::e45d:691a:f:4ac2.
What should you do?
A. You should manually assign 2001::e45d:691a:f:4ac2 as the MAC address.
B. You should manually assign 2001::e45d:691a:f:4ac2 as a DNS suffix search item.
C. You should manually assign 2001::e45d:691a:f:4ac2 as a WEP key for a wireless network.
D. You should manually assign 2001::e45d:691a:f:4ac2 as the IPv6 address.
Answer: D
Explanation:
The format of the address 2001: :e45d:691a:f:4ac2 tells us that this is an IPv6 address and
therefore Kara Lang needs to configure her network connection by entering
2001::e45d:691a:f:4ac2 in the IPv6 address properties.
Incorrect Answers:
A: This is not a MAC address. Furthermore, a MAC address is hard coded into the network card
and as such is not something you would manually configure.
B: A DNS suffix search item would be a domain name such as CertKiller.com or Microsoft.com.
C: A WEP key is similar to a password and as such is usually just a string of random letters and
numbers.
QUESTION NO: 92
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network is
configured to make use of IPv6. You are responsible for managing a computer named
CERTKILLER-SR04. You receive a request from the CIO to create a DNS record that will allow
users to connect to CERTKILLER-SR04 using dec.CertKiller.com. You thus need to identify the
appropriate record you should request.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 60
Actu
alTe
sts.
com
What should you do?
A. Your best option would be to request a NAPTR record.
B. Your best option would be to request HINFO record.
C. Your best option would be to request AAAA record.
D. Your best option would be to request an A record.
Answer: C
QUESTION NO: 93
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com has
recently deployed two client computers to the network configured with the IPv6 addresses shown
in the table below:
During the course of the day you receive instruction from CertKiller.com to test the IPv6 address
connection from CERTKILLER-WS01 to CERTKILLER-WS02.
What should you do?
A. You should consider having the ping -r fe80::34df:1a54%11 command run.
B. You should consider having the ping -r fe80::34df:1a54%13 command run.
C. You should consider having the ping -6 fe80::34df:1a54%11 command run.
D. You should consider having the ping -6 fe80::34df:1a54%13 command run.
Answer: D
Explanation:
Part 3: Configure networking settings (10 Questions)
QUESTION NO: 94
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains
several mobile computers that connect to the network via a wireless access point (WAP).
You are working on a mobile computer named CERTKILLER-WS680 that is running Windows 7.
The network administrator has disabled the Service Set Identifier (SSID) broadcasts on the
wireless access point (WAP). However, when you attempt to connect CERTKILLER-WS680 to the
network you discover that you cannot access the WAP. You need to enable CERTKILLER-WS680
to access the wireless access point (WAP).
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 61
Actu
alTe
sts.
com
What should you do?
A. You should consider changing the wireless network connection setting on CERTKILLER-
WS680.
B. You should consider changing the Windows credentials on CERTKILLER-WS680.
C. You should consider enabling Network discovery on CERTKILLER-WS680.
D. You should consider changing the generic credentials on CERTKILLER-WS680.
Answer: A
QUESTION NO: 95
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
You have received instructions to install a new hardware router that provides wireless network
connectivity between a mobile computer named CERTKILLER-WS680 and the Internet. You
connect CERTKILLER-WS680 to the router by using a wireless network adapter and verify that
CERTKILLER-WS680 can connect successfully to the Internet. However, CERTKILLER-WS680 is
unable to discover other computers in the local wireless network. You need to ensure that
CERTKILLER-WS680 can discover other computers on the local wireless network.
What should you do?
A. You should configure the wired and wireless network adapters as a network bridge.
B. You should change the Network Category setting of the wireless connection to Public.
C. You should turn off the Windows Firewall feature on CERTKILLER-WS680.
D. You should configure the network category of your wireless network connection to Private.
Answer: D
Explanation:
If the network category of the wireless connection is set to public, the network discovery feature is
disabled. As the wireless connection is 'inside' the network (behind the router), you can safely
configure the wireless connection network category to private. This will enable the network
discovery feature.
Incorrect Answers:
A: Configuring the wired and wireless network adapters as a network bridge would enable
communications between the wired network and the wireless network through your computer. This
is not what is required in this question and would not enable the network discovery feature.
B: The Network Category setting of the wireless connection should not be set to Public. The
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 62
Actu
alTe
sts.
com
Network Category setting of the wireless connection is likely already set to Public which is the
cause of the problem.
C: It is not necessary to turn off the Windows Firewall feature. This would not enable the network
discovery feature.
QUESTION NO: 96
You are employed as a network administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. All mobile computers on the
CertKiller.com network run Microsoft Windows 7. The CertKiller.com network has a wireless
access point (WAP) that all mobile computers use to access the network. Service Set Identifier
(SSID) broadcasts on the wireless access point (WAP) have been disabled.
You add a new Windows 7 mobile computer named CERTKILLER-WS680 to the network. You
need to configure CERTKILLER-WS680 to connect to the wireless network.
What should you do?
A. You should click the 'Set up a connection or network' link and select the 'Set up a wireless Ad
hoc network' option.
B. You need to click the 'Connect to a network' link, then right-click the appropriate network and
select the 'Connect' option.
C. You should click the 'View computers and devices' link, then right-click the wireless access
point (WAP) and select the 'Enable' option.
D. You should click the 'Set up a connection or network' link and select the 'Manually connect to a
wireless network' option.
Answer: D
Explanation:
A wireless access point can be configured to broadcast its SSID ( it's name) or not to broadcast it.
If the wireless access point is configured to not broadcast, it won't show up in the list of available
networks in your wireless networks box. You can however still connect to the network if you know
it's SSID. To do this, you need to click the Manually connect to a wireless network option in the
Set up a connection or network window and enter the SSID (name) of the wireless network you
wish you connect to.
Incorrect Answers:
A: If you have a wireless router installed, the Ad Hoc network option is the wrong option.
B: The wireless router is configured to not broadcast its SSID. Therefore, it won't show up in the
list of available networks to connect to. You have to manually specify the SSID of the wireless
network to connect to it.
C: The problem isn't that the wireless router isn't enabled. Therefore, enabling it isn't the solution.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 63
Actu
alTe
sts.
com
QUESTION NO: 97
You are employed as a network administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network run Microsoft Windows 7.
You have just installed a wireless network adapter on a client computer named CERTKILLER-
WS680. However, CERTKILLER-WS680 is unable to connect to the local wireless network. You
need to ensure that CERTKILLER-WS680 is able to connect to the local wireless network.
What should you do?
A. You should change the 'Network Category' setting of the wireless connection to 'Public'.
B. You should configure the wireless network adapter to connect to the appropriate wireless
network from the 'Connect to a network' list.
C. You should rename the wireless network adapter to match the Service Set Identifier (SSID) of
the wireless network.
D. You should enable the 'Internet Connection Sharing' feature on the wireless network adapter.
Answer: B
Explanation:
To connect to a wireless network, you need to configure a connection to the wireless network.
You can do this by configuring the wireless network adapter to connect to the appropriate wireless
network from the Connect to a network list. The Connect to a network list will list the available
networks you can connect to. Select the network and click Connect.
Incorrect Answers:
A: The network category setting determines the security settings of your network connection.
Setting it to public disables network features such as network discovery thus making the
connection more secure. It is not the solution to this question.
C: You don't need to rename the wireless network adapter to match the Service Set Identifier
(SSID) of the wireless network. This is not how you connect to a wireless network.
D: You don't need to enable the Internet Connection Sharing feature on the wireless network
adapter. This is not how you connect to a wireless network.
QUESTION NO: 98
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network run Windows 7.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 64
Actu
alTe
sts.
com
The CertKiller.com network contains a wireless access point (WAP) that is configured to use
Advanced Encryption Standard (AES) security. However, you do not have a pre-shared key
configured on the wireless access point. You have received instructions to connect a mobile
computer named CERTKILLER-WS680 to the wireless access point.
What should you do?
A. You should consider using the 802.1x for the wireless connection.
B. You should consider using the WPA2-Enterprise for the wireless connection.
C. You should consider using the WPA2-Personal for the wireless connection.
D. You should consider using the WPA-Personal for the wireless connection.
Answer: B
QUESTION NO: 99
CertKiller.com has hired you as a network Administrator for their network. All servers on the
CertKiller.com network run Windows Server 2008 and all mobile computers run Windows 7. You
are assigned a computer named CERTKILLER-WS20. You create an Encrypting File System
(EFS) recovery key and certificate shown in the exhibit below:
To ensure productivity you need to make sure that your user account is able to decrypt the EFS
files on CERTKILLER-WS20.
What should you do?
A. This can be accomplished by modifying the Restore files and directories setting from the local
computer policy.
B. This can be accomplished by adding a Windows credential from the Credential Manager.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 65
Actu
alTe
sts.
com
C. This can be accomplished by adding a certificate-based credential from the Credential
Manager.
D. This can be accomplished by adding a data recovery agent from the local computer policy.
Answer: D
QUESTION NO: 100
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com recently
deployed a server named CERTKILLER-SR01 which runs a custom network application. The IP
configuration of CERTKILLER-SR01 is shown in the table below:
During the course of the day you receive instruction from CertKiller.com to ensure that the client
computer resolves CERTKILLER-SR01.CertKiller.com to only the 192.168.45.23 IP address.
What should you do?
A. You should consider having the Ipconfig.exe /flushdns command run.
B. You should consider having the Netsh interface ipv4 reset command run.
C. You should consider having the Hosts file edited.
D. You should consider having the Lmhosts file edited.
Answer: C
QUESTION NO: 101
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com has
recently deployed a client computer named CERTKILLER-WS01 and shared a folder on the disk
drive. During the course of the day you receive instruction from CertKiller.com to configure
CERTKILLER-WS01 to ensure the requirements below are met:
CERTKILLER-WS01 should be configured to allow computers in the local subnet to access the
shared folder.CERTKILLER-WS01 should be configured to stop computers in remote subnets
from accessing the shared folder.CERTKILLER-WS01 should be configured to allow all client
computers to connect to CERTKILLER-WS01 using Remote Desktop.
What should you do?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 66
Actu
alTe
sts.
com
A. You should consider having the network discovery disables on all computers located in remote
subnets.
B. You should consider having the properties of the File and Printer Sharing firewall exceptions
modified.
C. You should consider having the subnet mask modified.
D. You should consider having the Public folder sharing settings modified.
Answer: B
QUESTION NO: 102
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
consists of a single IPv4 subnet that contains 15 computers. The computers are all configured to
run Windows 7.
You are in the process of adding a new computer named CERTKILLER-WS16 with an IP address
of 192.168.34.42 to the IPv4 subnet. After the installation you discover that you are unable to
connect to the other computers on the network, however, the other computers are able to make a
connection to each other. To ensure productivity you need to make sure that you are able to
connect to the other computers on the network.
What should you do?
A. This can be accomplished by having a static TCP/IP address configured.
B. This can be accomplished by running Netsh.exe interface ipv4 install.
C. This can be accomplished by turning off the Windows Firewall.
D. This can be accomplished by running Ipconfig.exe /renew.
Answer: A
QUESTION NO: 103
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network are configured to run Windows 7. All users currently make use of a router
that the company is connected to. The Default Gateway is set to 192.168.67.1 with a subnet mask
of 255.255.255.0. You need to determine the correct IP Address for the network.
What should you do?
A. You should consider identifying 169.172.1.254 as the IP Address.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 67
Actu
alTe
sts.
com
B. You should consider identifying 192.168.67.30 as the IP Address.
C. You should consider identifying 169.254.2.10 as the IP Address.
D. You should consider identifying 173.16.10.1 as the IP Address.
Answer: B
Explanation:
Part 4: Configure Windows Firewall (6 Questions)
QUESTION NO: 104
You work as a desktop support technician at CertKiller.com. The CertKiller.com network contains
several File Transfer Protocol (FTP) servers. You are working on a Windows 7 client computer
named CERTKILLER-WS680.
You have received instruction to ensure that CERTKILLER-WS680 can only connect to the File
Transfer Protocol (FTP) servers when it is connected to a private network.
What should you do?
A. You should consider changing the application control policies from the local Group Policy on
CERTKILLER-WS680.
B. You should consider changing the Advanced Sharing settings from the Network and Sharing
Center Policy on CERTKILLER-WS680.
C. You should consider changing the Allowed Programs and Features list from the Windows
Firewall Policy on CERTKILLER-WS680.
D. You should consider creating a new rule from the Windows Firewall with Advanced Security
Policy on CERTKILLER-WS680.
Answer: D
QUESTION NO: 105
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in
London and a branch office in Manchester. All the client computers on the CertKiller.com network
run Windows 7. The network administrator at the London office has enabled BranchCache.
You work on a client computer named CERTKILLER-WS680. When you run the Netsh command
on CERTKILLER-WS680 you received the output as shown in the following exhibit:
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 68
Actu
alTe
sts.
com
You need to make sure that the client computers at the Manchester office can access the cached
content on CERTKILLER-WS680.
What should you do?
A. You should consider configuring the BranchCache service to start automatically.
B. You should consider enabling Internet Information Services (IIS).
C. You should consider changing the Windows Firewall with Advanced Security rules.
D. You should consider configuring the computer as a hosted cache client.
Answer: C
QUESTION NO: 106
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com
network run Microsoft Windows 7.
The CertKiller.com network contains a client computer named CERTKILLER-WS680.
CERTKILLER-WS680 is configured to use both wired and wireless network connections. The
networks are not connected to each other. All incoming connections on the wireless connection
are disallowed in Microsoft Windows Firewall on CERTKILLER-WS680.
You create a shared folder name CKDocs on CERTKILLER-WS680. However, the CertKiller.com
users on the wireless network cannot access the shared folder. You need to ensure that all
CertKiller.com users are able access to the shared folder from the wireless network while
maintaining the security of the wired network
What should you do?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 69
Actu
alTe
sts.
com
A. You should turn off the Spyware and other malware protection option.
B. You should enable the File and Printer Sharing exception in the firewall settings of the wireless
network adapter.
C. You should turn off the Windows Firewall feature.
D. You should disable the Block all incoming connections option.
Answer: B
Explanation:
You need to enable connections to a shared folder. Therefore, we need to enable inbound
connections on the ports used for accessing shared folders. Windows Firewall makes this easy in
that you can simply enable the File and Printer Sharing exception in the firewall settings. This will
allow inbound connections on the necessary ports.
Incorrect Answers:
A: Turning off the Spyware and other malware protection option is a security risk. This solution
does not enable access to shared folders.
C: It is not necessary to turn off the Windows Firewall feature. This would allow inbound access on
all ports. We just need to allow inbound access on the ports required to access shared folders.
D: This is similar to turning off the Windows Firewall feature. This would allow inbound access on
all ports. We just need to allow inbound access on the ports required to access shared folders.
QUESTION NO: 107
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
A new 32-bit third-party accounting application named accapp.exe has just been installed on a
computer named CERTKILLER-WS680. The 32-bit third-party accounting application uses port 80
to negotiate a listening port. After establishing the listening port, the application uses dynamic
ports above port 6000. You need to configure Microsoft Windows Firewall to allow traffic for the
accapp.exe application.
What should you do?
A. You should restore the Windows Firewall defaults on CERTKILLER-WS680.
B. You should add a program exception for the accapp.exe application.
C. You should add a port exception for port 80 on CERTKILLER-WS680.
D. You should disable the Core Networking exception on CERTKILLER-WS680.
Answer: B
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 70
Actu
alTe
sts.
com
QUESTION NO: 108
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. CertKiller.com wants prevent all inbound
traffic to the Windows 7 computers without the end user being notified.
What should you do?
A. You should enable the Windows Firewall and deselect all entries in the exception list.
B. You should set the network location to Public from the Network and Sharing Center.
C. You should set the network location to Private from the Network and Sharing Center.
D. You should enable the Windows Firewall and select the 'Block all incoming connections' check
box.
Answer: D
Explanation:
Block all incoming connections, including those in the list of allowed programs
This setting blocks all unsolicited attempts to connect to your computer. Use this setting when you
need maximum protection for your computer, such as when you connect to a public network in a
hotel or airport, or when a computer worm is spreading over the Internet. With this setting, you are
not notified when Windows Firewall blocks programs, and programs in the list of allowed programs
are ignored. When you block all incoming connections, you can still view most webpages , send
and receive e-mail, and send and receive instant messages.
QUESTION NO: 109
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7.
During the course of the day you created a HomeGroup on the computer of a network user named
Mia Hamm. CertKiller.com has recently requested that you secure the Home group whilst ensuring
the security requirements set below are met:
You should have access to the HomeGroup allowed when connected to private networks.You
should have access to the HomeGroup blocked when connected to public networks.
What should you do?
A. You should consider having the HomeGroup exception in Windows Firewall configured to
include Home or work (private) networks whilst blocking Public networks.
B. You should consider having the File and Printer Sharing exception in Windows Firewall
configured to include Home or work (private) networks whilst blocking Public networks.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 71
Actu
alTe
sts.
com
C. You should consider having the advanced sharing settings from Network and Sharing Center
modified.
D. You should consider having the advanced sharing settings from HomeGroup setting in Control
Panel modified.
Answer: A
Explanation:
Part 5: Configure remote management (4 Questions)
QUESTION NO: 110
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains
two client computers named CERTKILLER-WS680 and CERTKILLER-WS682. Both
CERTKILLER-WS680 and CERTKILLER-WS682 run Microsoft Windows 7.
You want to ensure that you can use CERTKILLER-WS680 to remotely execute commands on
CERTKILLER-WS682.
What should you do?
A. You should consider enabling Windows Remote Management (WinRM) through Windows
Firewall on CERTKILLER-WS682.
B. You should consider enabling Windows Remote Management (WinRM) through Windows
Firewall on CERTKILLER-WS680.
C. You should consider running the Winrm quickconfig command on CERTKILLER-WS682.
D. You should consider running the Winrm quickconfig command on CERTKILLER-WS680.
Answer: C
QUESTION NO: 111
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
You have been assigned a client computer named CERTKILLER-WS680. To manage the
computers on the corporate network effectively, you want to view the security events logged on all
client computers on the network. You decided to collect the copies of events from multiple remote
computers and store them on CERTKILLER-WS680. You also want to ensure that the events are
encrypted when they are forwarded to CERTKILLER-WS680.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 72
Actu
alTe
sts.
com
What should you so? (Each correct answer presents part of the solution. Choose THREE.)
A. You should ensure that Windows Remote Management (WinRM) service and the Windows
Event Collector service are running on computers participating in the forwarding and collecting
process
B. You should ensure that a Windows Firewall exception for Remote Event Log Management is
configured on each source computer.
C. You should ensure that the computer account of CERTKILLER-WS680 is added to the local
Administrators group on each of the source computers.
D. You should ensure that all users have a user certificate and Certificate Propagation service
startup type is set to automatic.
E. You should ensure that all computers have a computers certificate and port 443 is open on the
Windows firewall.
Answer: A,C,E
Explanation:
To enable forwarding of events from the client computers and collecting them to your computer,
you need to ensure that Windows Remote Management ( WinRM ) service and the Windows
Event Collector service are running on computers participating in the forwarding and collecting
process and ensure that the computer account of the collector computer is added to the local
Administrators group on each of the source computers.
To ensure that the events must be encrypted when they are forwarded, you need to use the
HTTPS protocol by using the HTTPS option in Advanced Subscription Settings and ensure that all
computers have a computers certificate and port 443 is open on the Windows firewall
QUESTION NO: 112
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7.
CertKiller.com has two client computers named CERTKILLER-WS01 and CERTKILLER-WS02
which have Windows Remote Management (WinRM) enabled. During the course of the day you
receive instruction from CertKiller.com to have an additional disk volume created remotely on
CERTKILLER-WS01 using CERTKILLER-WS02.
What should you do?
A. You should consider having the Telnet Client installed.
You should then run the Diskpart command from CERTKILLER-WS02.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 73
Actu
alTe
sts.
com
B. You should consider having the Telnet Client installed.
You should then make use of Disk Management from CERTKILLER-WS02.
C. You should consider having the Winrs command run and then running the Diskpart command
on CERTKILLER-WS02.
D. You should consider having the Winrs command run and then running the Diskmgmt.msc
command on CERTKILLER-WS02.
Answer: C
Explanation:
Windows Remote Management (known as WinRM ) is a handy new remote management service
for Windows Server 2003 R2, Windows Vista, and Windows Server 2008. WinRM is the "server"
component of this remote management application and WinRS (Windows Remote Shell) is the
"client" for WinRM , which runs on the remote computer attempting to remotely manage the
WinRM server. However, I should note that BOTH computers must have WinRM installed and
enabled on them for WinRS to work and retrieve information from the remote system.
QUESTION NO: 113
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7.
A network user named Rory Allen recently complained about receiving error messages whilst
using an application. CertKiller.com is aware you do not have remote access to Rory Allen's
computer. CertKiller.com recently requested that you instruct Rory Allen how to create
screenshots of the actions performed on the computer whilst ensuring the mouse actions
performed are tracked to.
What should you do?
A. You should consider instructing Rory Allen to select Display pointer trails from Mouse
Properties.
B. You should consider instructing Rory Allen to run the Snippingtool.exe command then you
should click New and select Windows Snip.
C. You should consider instructing Rory Allen to press ALT and PrintScreen.
D. You should consider instructing Rory Allen to run the Psr.exe command and click Start Record.
Answer: D
Explanation:
The Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to
record their interactions with an application and provide a detailed screen-by-screen view with
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 74
Actu
alTe
sts.
com
accompanying information. Learn how the recording can be used to quickly identify problems and
help reduce time spent with the help desk.
QUESTION NO: 114
You are employed as the desktop support technician at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. You are responsible for a
workgroup name CK_GROUP that contains seven workstations. All the workstations run Windows
7.
The CK_GROUP contains workstation named CERTKILLER-WS680 that host video and audio
files. You want to share these files.
What should you do? (Each correct answer presents part on the solution. Choose TWO.)
A. You should consider moving the files to the Media Library on CERTKILLER-WS680.
B. You should consider enabling BitLocker To Go on CERTKILLER-WS680 and moving the files to
a removable drive.
C. You should consider enabling all BranchCache rules in Windows Firewall on CERTKILLER-
WS680.
D. You should consider creating a HomeGroup on CERTKILLER-WS680.
Answer: A,D
QUESTION NO: 115
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The network contains a file server
named CERTKILLER-SR03 that runs Windows Server 2008. CERTKILLER-SR03 contains a
shared folder named CK_Data.
You have been assigned a client computer named CERTKILLER-WS680 that runs Windows 7.
You receive an instruction to ensure that CERTKILLER-WS680 is configured to encrypt any
cached files from CK_Data. You also need to ensure that when CERTKILLER-SR03 is
disconnected the files in CK_Data are still available.
What should you do? (Each correct answer presents part on the solution. Choose TWO.)
A. You should consider copying the files from CK_Data to the Documents library on
CERTKILLER-WS680.
B. You should consider encrypting the files in the CK_Data share on CERTKILLER-SR03.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 75
Actu
alTe
sts.
com
C. You should consider enabling encryption of offline files on CERTKILLER-WS680.
D. You should consider enabling BitLocker Drive Encryption on CERTKILLER-WS680.
E. You should consider making CK_Data available offline on CERTKILLER-WS680.
F. You should consider enabling BitLocker Drive Encryption on CERTKILLER-SR03.
Answer: C,E
Explanation:
The two requirements are "to ensure that CertKiller-ws680 is configured to encrypt any cached
files from CK_Data " and that the files are available offline. E . Making the CK_Data files available
office on CertKiller-ws680 is required and C. Enabling encryption of the offline files. It is true that if
the files on the server are encrypted, they will also be encrypted in the workstation offline cache.
But therequirement is "to ensure that CERTKILLER-WS680is configured to cache any files from
CK_Data ." Encrypting on the server is also more work than configuring the workstation. Offline
files can be set to be encrypted via GPO or manually on the workstation. Incorrect answers. A:
Copying files from CK_Data to the workstation does not ensure encryption or availability offline.
B: Encrypting files on the server. It is true that if the files on the server are encrypted, they will also
be encrypted in the workstation offline cache. But therequirement is "to ensure that CERTKILLER-
WS680is configured to cache any files from CK_Data ."
D: Use of Bitlocker on the workstation would encrypt the entire disk and not just the offline files.
F: Use of Bitlocker on the server would encrypt the entire serverand protect the files on the server
but would do nothing for encryption of the workstation.
QUESTION NO: 116
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains a
client computer named CERTKILLER-WS680 that is running Windows 7.
You attach a printer named PRINTER01 to CERTKILLER-WS680 and install the printer drivers.
You then remove the Everyone group from the access control list (ACL) for the PRINTER01 and
share the printer. You need to ensure that member of a group named CK_STAFF can only make
changes to the print jobs that they submit. Members of the CK_STAFF group must not be able to
change the print jobs of other users.
What should you do?
A. You should consider assigning the Manage Documents permission to the CK_STAFF group in
the printer properties.
B. You should consider assigning the Take ownership of files or other objects user right to the
CK_STAFF group.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 76
Actu
alTe
sts.
com
C. You should consider assigning the Increase scheduling priority user right to the CK_STAFF
group.
D. You should consider assigning the Print permission to the CK_STAFF group in the printer
properties.
Answer: D
QUESTION NO: 117
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
You install a new printer named PRINTER1on a client computer named CERTKILLER-WS680.
You share PRINTER1 with several users in the Sales department. However, when members of the
Sales department attempt to print to PRINTER1, the output is unreadable. You need to ensure
that members of the Sales department can successfully print to PRINTER1.
What should you do?
A. You should configure CERTKILLER-WS680 to print directly to the print device.
B. You should configure PRINTER1 to use the WinPrint print processor and to use RAW as the
default data type.
C. You should configure PRINTER1 to hold mismatched documents and disable the advanced
printing features.
D. You should run the 'AddPrinter Driver Wizard' to install the correct printer driver on
CERTKILLER-WS680.
Answer: D
Explanation:
Unreadable text usually indicates an incorrect printer driver. We need to install the correct driver.
The users will need to disconnect and reconnect to download the new driver.
QUESTION NO: 118
You work as a network administrator at CertKiller.com. CertKiller.com has its headquarters located
in Miami and branch office located in Toronto. The CertKiller.com network consists of a single
Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows
Server 2008 R2 and the client computers run Microsoft Windows 7.
A network user named Dean Austin uses a portable computer named CERTKILLER-WS01 which
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 77
Actu
alTe
sts.
com
is joined to the domain in the Toronto office. CertKiller.com has recently deployed a file server
named CERTKILLER-SR01 in the Miami office with a shared folder named KingShares. During
the course of the day you receive additional instruction from CertKiller.com to configure
CERTKILLER-WS01 to meet the requirements set below:
CERTKILLER_WS01 should be configured to minimize network traffic between the Miami and
Toronto office ensuring that Dean Austin can only use CERTKILLER-WS01 to access resources
while connected to the network.
What should you do?
A. You should consider having DirectAccess configured on CERTKILLER-SR01.
B. You should consider having KingShares configured to be available offline on CERTKILLER-
SR01
C. You should consider having offline files enabled on CERTKILLER-WS01.
D. You should consider having transparent caching enabled on CERTKILLER-WS01.
Answer: D
Explanation:
Part 2: Configure file and folder access (7 Questions)
QUESTION NO: 119
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. CertKiller.com currently makes use of a
stand-alone computer named CERTKILLER-WS680 that runs Microsoft Windows 7.
CERTKILLER-WS680 contains a single partition and is used by two CertKiller.com users named
Rory Allen and Kara Lang.
Rory Allen makes use of Encrypting File System (EFS) to encrypt files. During the course of the
day Rory Allen grants Kara Lang access to the encrypted files. However, Kara Lang is unable to
access the encrypted files. You need to ensure that Kara Lang is able to access the encrypted
files of Rory Allen.
What should you do?
A. You should consider having Rory Allen export his certificate to a certificate (.cer) file.
B. You should consider having Rory Allen move the file to a shared folder on CERTKILLER-
WS680.
C. You should consider having Kara Lang log on to CERTKILLER-WS680 and take ownership of
the file.
D. You should consider having Kara Lang log on to CERTKILLER-WS680 and encrypt a file.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 78
Actu
alTe
sts.
com
Answer: D
Explanation:
This is a standalone computer. When Kara logs on and encrypts a file, the system will
automatically generate an encryption certificate for her. The owner (Rory) of the encrypted file will
also need to add Lara's certificate to the file.
To add the EFS certificate to the shared file
Right-click the file you want to share, and then click Properties.
Click the General tab, and then click Advanced.
In the Advanced Attributes dialog box, click Details.
In the dialog box that appears, click Add.
In the Select User dialog box, click the certificate, and then click OK.
You can also use the "chiper.exe" command from the command line. You would use the adduser
command along with the cert command.
If Kara already has a certificate and you want to use that certificate, you have to perform two
additional steps:
1. Export Kara's Certificate &
2. Import Kara's certificate to Rory's machine.
Incorrect Answers:
A: Exporting Rory's certificate will not help Kara decrypt the file.
B: Moving the files to a share does not help with decryption. You might need to move the file to a
shared location to allow Kara to access the file, but it is not required for decryption.
C: Having Kara take ownership of the file is an NTFS permissions issue. This may be required but
will not affect encryption.Reference: http://windows.microsoft.com/en-US/windows-vista/Share-
encrypted-files
QUESTION NO: 120
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 79
Actu
alTe
sts.
com
A CertKiller.com user named Mia Hamm has been assigned a client computer named
CERTKILLER-WS680. Mia Hamm needs to share an existing folder on CERTKILLER-WS680 with
other members in her group. However, Mia Hamm receives and "Access is denied" error
whenever she tries to change the permissions on the folder. You need to ensure that Mia Hamm
can change the permissions on the folder.
What should you do?
A. You should add Mia Hamm to the Network Configuration Operators group.
B. You should add Mia Hamm to the Power Users group on CERTKILLER-WS680.
C. You should grant the 'Allow-Modify' permission on the folder to Mia Hamm.
D. You should grant the 'Allow-Full control' permission on the folder to Mia Hamm.
Answer: D
Explanation:
To share a folder on her computer, Anna only needs full control on the folder. Therefore, you need
to Grant Allow-Full control permission to Anna in the properties of the folder.
Incorrect Answers:
A: Members of Network Configuration Operators group have a subset of the Administrator-level
rights that enables them to install and configure networking features but does not allow users to
have control on folders.
B: The Power Users group does not exist in Windows 7. Providing only Modify permissions will not
allow Anna to change permissions on the folders.
C: The Allow-Modify permission allows a user to make changes to files and folders. It does not
allow them to change the permissions on a file or folder.
QUESTION NO: 121
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7. The user accounts in the CertKiller.com network is
divided into four groups named ADMIN, SALES, MARKETING and OTHER.
A CertKiller.com user named Mia Hamm has been assigned a client computer named
CERTKILLER-WS680. Mia Hamm is a member of the SALES group. Mia Hamm shares a folder
on CERTKILLER-WS680 named CertKillerFiles1. Mia Hamm wants members of the MARKETING
group to be able to add files to the CertKillerFiles1 shared folder. Currently members of the
SALES group have Allow - Read permission for the CertKillerFiles1 shared folder while members
of the MARKETING group have Allow - Modify permissions.
You need to ensure that members of both the SALES group and the MARKETING group can add
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 80
Actu
alTe
sts.
com
files to the CertKillerFiles1 shared folder.
What should you do? (Each correct answer presents part of the solution. Choose TWO.)
A. You should grant the EVERYONE group 'Allow - Full Control' permission on the CertKillerFiles1
shared folder.
B. You should grant the MARKETING group 'Allow - Read' permission on the CertKillerFiles1
shared folder.
C. You should grant the SALES group 'Allow - Change' permission on the CertKillerFiles1 shared
folder.
D. You should grant the MARKETING group 'Allow - Read' permission on the CertKillerFiles1
shared folder.
E. You should grant the SALES group 'Allow - Modify' permission on the CertKillerFiles1 shared
folder.
F. You should grant the MARKETING group 'Allow - Write' permission on the CertKillerFiles1
shared folder.
Answer: C,E
Explanation:
In order for a group to be able to create files in a shared folder, the group must have the NTFS
permissions of "Allow - Modify" on the folder and the sharing permission of "Allow - Change" on
the share. Since the SALES group has neither, these two permissions must be added.
The Marketing group would also need to have "Change" permissions on the share but this is not
one of the possible answers.
Incorrect Answers:
A: EVERYONE Full Control permissions would grant the Groups ADMIN and OTHERS
permissions. The question requires only SALES and Marketing to have access.
B: Marketing Group "Allow Read". The Marketing group would need permissions greater than
"Read" to be able to add files. (With either the NTFS permissions on the folder or the shared
access permission of "Read")
D: Marketing Group "Allow Read". The Marketing group would need permissions greater than
"Read" to be able to add files. (With either the NTFS permissions on the folder or the shared
access permission of "Read")
F: Marketing group "Allow - Write" permissions. This is only applicable to folders' NTFS
permissions. The Marketing group already has "Modify" Permissions which include "Write"
permissions.See http://technet.microsoft.com/en-us/library/bb457104.aspx#EDAA
QUESTION NO: 122
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 81
Actu
alTe
sts.
com
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. A network user Rory
Allen uses a shared computer containing a folder named KingShares. Rory Allen is a member of
the group named KingGroup. Rory Allen's permission is shown in the exhibit below:
The Group permission of the KingGroup members are shown in the exhibit below:
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 82
Actu
alTe
sts.
com
CertKiller.com wants you to ensure that Rory Allen is able to create files in the KingShares folder
whist ensuring that all other members of KingGroup are stopped from creating files in the
KingShares folder.
What should you do?
A. You should consider having the Read and Change share permission assigned to Rory Allen on
the KingShares folder.
B. You should consider having the Read and Change share permission assigned to KingGroup on
the KingShares folder.
C. You should consider having the Full control permission assigned to Rory Allen on the
KingShares folder.
D. You should consider having the Deny - Write permission removed for KingGroup on the
KingShares folder.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 83
Actu
alTe
sts.
com
Answer: D
QUESTION NO: 123
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7.
During the course of the day you attempt adding files to the %programfiles%\KingApps and
receive a prompt to elevate your privileges. CertKiller.com wants you to ensure that you are able
to add files to %programfiles%\KingApps without receiving the prompts whilst ensuring the
solution prevents harmful application making unwanted changes to the system.
What should you do?
A. You should consider having your user account added to the local Power Users group.
B. You should consider having the permission of the %programfiles%\KingApps folder modified.
C. You should consider having the built-in administrator account enabled.
D. You should consider having the User Account Control (UAC) settings modified.
Answer: B
QUESTION NO: 124
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. A network user named
Rory Allen a member of the group named KingAccess currently uses a shared computer.
Rory Allen recently informs you that the computer has a folder named RAllen. Rory Allen
requested that you configure the permissions on the RAllen folder to meet the requirements below:
The permission should be modified to allow Rory Allen to delete all files in the RAllen folder.The
permission should have the members of the KingAccess group able to create files in the RAllen
folder.
Rory Allen has additionally stated that you should configure the permissions to prevent the
members of the KingAccess group from deleting the files they did not create in the folder RAllen
whilst preventing all users from modifying the permission on RAllen.
What should you do?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 84
Actu
alTe
sts.
com
A. You should consider having Rory Allen assigned the Modify permission whilst having the
KingAccess group denied Write permission assigned.
B. You should consider having Rory Allen assigned the Write permission whilst having the Modify
permission denied to the KingAccess group.
C. You should consider having Rory Allen assigned the Modify permission whilst assigning the
Write permission to KingAccess group.
D. You should consider having Rory Allen assigned the Write permission whilst assigning the
Modify permission to the KingAccess group.
Answer: C
QUESTION NO: 125
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. The CertKiller.com
network users currently make use of a standalone computer for storing encrypted files.
CertKiller.com recently requested that you ensure you are able to read the content of the
encrypted files of all users on the standalone computer.
What should you do?
A. You should consider having the Cipher.exe /r command run and have a data recovery agent
added from the local security policy.
B. You should consider having the Cipher.exe /rekey command run and import a security template
from the local security policy.
C. You should consider having the Certificate Enrolment wizard run before running the Certutil.exe
"Cimportpfx command.
D. You should consider having the Certificate Enrolment wizard run before running the Certutil.exe
"Cinstallcert command run.
Answer: A
Explanation:
Part 3: Configure user account (UAC) (5 Questions)
QUESTION NO: 126
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 85
Actu
alTe
sts.
com
You currently make use of a workstation named CERTKILLER-WS680. When installing new
applications on CERTKILLER-WS680 you are prompted for user account control permissions. You
want to configure CERTKILLER-WS680 to allow you to interact with the Desktop when prompted
for user account control permissions.
What should you do?
A. You should consider setting the User Account Control: Switch to secure desktop when
prompting for credentials to Disabled.
B. You should consider setting the User Account Control: Run all administrators in Admin Approval
Mode to Enabled.
C. You should consider setting the User Account Control: Run all administrators in Admin
Approval Mode to Disabled.
D. You should consider setting the User Account Control: Switch to secure desktop when
prompting for credentials to Enabled.
Answer: A
QUESTION NO: 127
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single workgroup named CERTKILLER. All client computers on CERTKILLER workgroup run
Windows 7.
You need to allow CertKiller.com users to install software on their client computers without having
access to any other administrative functions. You also need to ensure that CertKiller.com users
are able to install software in the most secure manner.
What should you do?
A. You should make all CertKiller.com users members of the local administrators group.
B. You should disable 'User Account Control' from the 'User Accounts Control Panel' tool.
C. You should configure 'Parental Controls' to prevent CertKiller.com users from downloading
unapproved software.
D. You should configure the user account control to not prompt during software installation from
the Security Options section of the Local Security Policy.
Answer: D
Explanation:
: You need to edit the Local Security Policy to not prompt during installs by disabling the Detect
application installations and prompt for elevation setting. This will allow applications to be installed
without prompting for the administrative credentials.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 86
Actu
alTe
sts.
com
QUESTION NO: 128
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
CertKiller.com has a written security policy that states that only administrator approved
applications should be installed on the CertKiller.com network. A CertKiller.com user named Amy
Wilson has been assigned a client computer named CERTKILLER-WS680. Amy Wilson reports
that every time she attempts to make configuration changes to CERTKILLER-WS680, she
receives the prompt shown in the following exhibit:
You need to ensure that Amy Wilson can make configuration changes to CERTKILLER-WS680.
You verify that Amy Wilson is a member of the local administrators group. You now want to
prevent this prompt from appearing when Amy Wilson attempts to make configuration changes to
CERTKILLER-WS680.
What should you do?
A. You should add Amy Wilson to the local Power Users group.
B. You should add Amy Wilson to the local Users group.
C. You should change 'The behavior of the elevation prompt for administrators' from 'User Account
Control (UAC) Admin Approval Mode'.
D. You should turn off the Windows Firewall.
E. You should disable running all administrators in 'User Account Control (UAC) Admin Approval
Mode'.
Answer: C
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 87
Actu
alTe
sts.
com
Explanation:
: UAC prevents unauthorized configuration changes and silent installations. The message that is
displayed confirms a user's decision to make configuration changes. This helps prevent viruses
from making changes to a user's computer in the security context of the user but without the user's
permission. You should change the behavior of the elevation prompt for administrators in UAC
Admin Approval Mode. Change the policy setting from Prompt for consent to No prompt. With
this setting, the UAC message will not be displayed whenever Amy Wilson attempts to make
configuration changes that require administrative privileges.
QUESTION NO: 129
CertKiller.com has hired you as a network Administrator for their network. A CertKiller.com user
named Rory Allen is a senior manager in the Marketing department. You receive a request from
Rory Allen to ensure that his children are only able to login to Windows 7 at certain times.
What should you do?
A. Your best option would be to go to the Homegroup settings and select the Offline Time
Settings.
B. Your best option would be to go to Start then Control Panel.
Thereafter User Profiles should be selected and the Time Restriction Settings configured.
C. Your best option would be to prohibit the children from using the workstation when you are at
work.
D. Your best option would be to go to the Start then Control Panel.
Then you should go to User Accounts and Family Safety and select Setup Parental Controls.
Thereafter Time Restrictions can be set.
Answer: D
QUESTION NO: 130
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. All servers on the CertKiller.com network
run Windows 7. Half the client computers run Windows Vista and the rest Windows XP
Professional. A CertKiller.com employee named Kara Lang works in the Research and
Development department. She informs you that the security pop-up notifications appear constantly
on her monitor whilst she is working. You thus decide implement a solution that will control when
the notifications pop-up.
What should you do?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 88
Actu
alTe
sts.
com
A. You can accomplish this using the User Access Control Panel.
B. You can accomplish this using the Security Control Manager.
C. You can accomplish this using the Notification Control Settings Manager.
D. You can accomplish this using the User Account Control.
Answer: D
Explanation:
Part 4: Configure authentication and authorization (4 Questions)
QUESTION NO: 131
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains a
Windows 7 computer named CERTKILLER-WS680 that runs a finance application named
finapp.exe. You use RunAs with the /savecred parameter to start finapp.exe. You now want to
delete the stored passwords.
What should you do?
A. You should consider changing the Authorization Manager options from Authorization Manager.
B. You should consider changing the Windows credentials from Credential Manager.
C. You should consider running the RunAs and specify the /noprofile parameter.
D. You should consider running the Del and specify the /p parameter.
Answer: B
QUESTION NO: 132
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network
contains a VPN server named CERTKILLER-SR01 that is configured to run Windows Server
2008. You are responsible for a computer named CERTKILLER-WS10 that is configured to run
Windows 7. During the course of the day you receive an instruction from the CIO to make use of a
smart card in order to authenticate CERTKILLER-SR01.
What should you do?
A. Your best option would be to make use of PAP.
B. Your best option would be to make use of PMS-CHAP v2.
C. Your best option would be to make use of P EAP.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 89
Actu
alTe
sts.
com
D. Your best option would be to make use of PCHAP.
Answer: C
QUESTION NO: 133
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 R2 and the client computers run Microsoft Windows 7.
CertKiller.com has recently deployed a server named CERTKILLER-SR01 configured as a DHCP
server that has Network Access Protection (NAP) enforcement point configured. During the course
of the day you receive instruction from CertKiller.com to configure a network user named Rory
Allen's client computer as a NAP client.
What should you do? (Choose two)
A. You should consider having the Network Access Protection Agent service Startup Type set to
Automatic from the services snap-in.
B. You should consider having the user interface settings configured from the NAP Client
Configuration console.
C. You should consider having the DHCP Quarantine Enforcement Client enabled from the NAP
Client Configuration console.
D. You should consider having the Netlogon service Startup Type set to Automatic from the
services snap-in.
Answer: A,C
QUESTION NO: 134
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com has
recently installed and configured a file server named CERTKILLER-SR01 to the network.
A network user named Rory Allen makes use of a computer named CERTKILLER-WS01 and tried
logging on to CERTKILLER-SR01 using an account named RAllen unsuccessfully. CertKiller.com
wants you to ensure that Rory Allen authenticates using the account named KingAdmin when
connecting to CERTKILLER-SR01.
What should you do?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 90
Actu
alTe
sts.
com
A. You should consider having the Add a Windows credential from Credential Manager selected
on CERTKILLER-WS01.
B. You should consider having the Access this computer from the network user right modified from
Local Security Policy on CERTKILLER-WS01.
C. You should consider having the Link online IDs from User Accounts selected on CERTKILLER-
WS01.
D. You should consider having the Add a card selected from Windows CardSpace selected on
CERTKILLER-WS01.
Answer: A
Explanation:
Part 5: Configure BranchCache (4 Questions)
QUESTION NO: 135
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in
London and a branch office in Paris. All servers on the CertKiller.com network run Windows
Server 2008 R2 and all client computers run Windows 7. The London office contains a file server
named CERTKILLER-SR04 that hosts shared folders that are accessed from both offices. The
Paris office contains a DNS server named CERTKILLER-SR12.
You want to reduce network traffic between the Paris office and the London office. You decide to
enable BranchCache in Hosted Cache mode on CERTKILLER-SR12. You now need to enable
BranchCache on the client computers.
What should you do?
Explanation:
Step #1
Click START and select Computer Management
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 91
Actu
alTe
sts.
com
Step #2
Click on 'Services and Applications' and select 'Services'.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 92
Actu
alTe
sts.
com
Step #3
Locate the ' BranchCache ' service, start the service and set it to start automatically.
QUESTION NO: 136
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in
London and a branch office in Paris. All servers on the CertKiller.com network run Windows
Server 2008 and all client computers run Windows 7.
The London office contains a file server named CERTKILLER-SR04 that hosts shared folders that
are accessed from both offices. The Paris office also contains a file server named CERTKILLER-
SR12 that is only accessed from the Paris office. You want to reduce network traffic between the
Paris office and the London office.
What should you do?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 93
Actu
alTe
sts.
com
A. You should enable BranchCache in Host mode on CERTKILLER-SR04 in the London Office.
B. You should enable BranchCache in Host mode on CERTKILLER-SR12 in the Paris Office.
C. You should enable BranchCache in Distributed mode on the client computers in the London
Office.
D. You should enable BranchCache in Distributed mode on the client computers in the Paris
Office.
E. You should configure a Virtual Private Network (VPN) connection between CERTKILLER-SR12
and CERTKILLER-SR04.
Answer: D
Explanation:
BranchCache in Distributed mode on the client computers in the Paris Office will cache files from
CERTKILLER-SR04 on the local computers and will reduce network traffic between the two
offices.
Incorrect Answers:
A: Configuring BranchCache at the London office will not help as users at the London office do not
access files on the file server in the Paris office. In addition, CERTKILLER-SR04 must be
upgraded to Windows Server 2008 R2 before it can support BranchCache in Hosted mode.
B: CERTKILLER-SR12 must be upgraded to Windows Server 2008 R2 before it can support
BranchCache in Hosted mode.
C: Configuring BranchCache at the London office will not help as users at the London office do not
access files on the file server in the Paris office. In addition, CERTKILLER-SR04 must be
upgraded to Windows Server 2008 R2 before it can support BranchCache in Hosted mode.
E: A VPN will provide a secure connection between the two offices but will not reduce network
traffic.
QUESTION NO: 137
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in
London and branch office in Athens. All servers on the CertKiller.com network run Windows
Server 2008 and all client computers run Windows 7.
The servers are located at the London office and the four client computers at the Athens office.
The servers located at London office have BranchCache enabled. You receive numerous
complaints from users at the Athens office stating that it takes a long time to open big files in the
London office. You receive an instruction from the CIO to minimize the time it takes for users in the
Athens office to open files in the London office. You are also instructed to minimize the total
bandwidth used between the London and Athens offices.
What should you do?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 94
Actu
alTe
sts.
com
A. Your best option would be to configure the client computers to make use of the BranchCache
Hosted Cache mode at the Athens office.
B. Your best option would be to configure the client computers to make use of the BranchCache
Distributed Cache mode at the Athens office.
C. Your best option would be to configure the servers to use Background Intelligent Transfer
Service (BITS) at the London office.
D. Your best option would be to configure the Quality of Service (QoS) Packet Scheduler on all
servers at the London office.
Answer: B
QUESTION NO: 138
You work as a network administrator at CertKiller.com. CertKiller.com currently has its
headquarters located in Miami and branch office located in Detroit. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. The servers on the network run
Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.
CertKiller.com has the Detroit office configured to use BranchCache. During the course of the day
a network user in the Detroit office using a computer named CERTKILLER-WS01 complains from
experiencing performance issues. CertKiller.com wants you to temporarily have all the computers
prevented from retrieving cached content from CERTKILLER-WS01.
What should you do?
A. You should consider having the Configure BranchCache for network files Group Policy setting
modified.
B. You should consider having the Set percentage of disk space used for client computer cache
Group Policy setting modified.
C. You should consider having the Netsh branchcache flush command run at the command
prompt of CERTKILLER-WS01.
D. You should consider having the Netsh branchcache dump command run at the command
prompt of CERTKILLER-WS01.
Answer: C
QUESTION NO: 139
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. You are responsible for two
workstations named CERTKILLER-WS680 and CERTKILLER-WS682. Both CERTKILLER-
WS680 and CERTKILLER-WS682 run Windows 7 and are members of the CertKiller.com domain.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 95
Actu
alTe
sts.
com
You are able to recover the Encryption File System (EFS) encrypted files for all domain users from
CERTKILLER-WS680. CERTKILLER-WS680 is scheduled for routine maintenance. While
CERTKILLER-WS680 you need to be sure that you can use CERTKILLER-WS682 to recover the
Encryption File System (EFS) encrypted files for all domain users.
What should you do?
A. You should consider backing up %systemroot%\DigitalLocker on CERTKILLER-WS680 and
restoring it on CERTKILLER-WS682.
B. You should consider running Secedit.exe with the /export parameter on CERTKILLER-WS680.
Then you should consider running Secedit.exe with the /import parameter on CERTKILLER-
WS682.
C. You should consider running Cipher.exe with the /removeuser parameter on CERTKILLER-
WS680. Then you should consider running Cipher.exe with the /adduser parameter on
CERTKILLER-WS682.
D. You should consider exporting the data recovery agent certificate on CERTKILLER-WS680 and
importing it on CERTKILLER-WS682.
Answer: D
QUESTION NO: 140
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network run Windows 7.
You have received instructions to ensure that no CertKiller.com user can copy unencrypted files to
removable drives.
What should you do?
A. You should consider changing the BitLocker Drive Encryption settings from the local Group
Policy.
B. You should consider initializing the TPM from the Trusted Platform Module (TPM) snap-in.
C. You should consider changing the Trusted Platform Module (TPM) settings in the local Group
Policy.
D. You should consider changing the BitLocker Drive Encryption settings from the Control Panel.
Answer: A
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 96
Actu
alTe
sts.
com
QUESTION NO: 141
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
The Research and Development department is working on a confidential project. To protect their
computers from data theft they encrypted the hard disk of their client computers with BitLocker.
The USB drive is used to store the BitLocker password. All the computers that were encrypted
were using Trusted Platform Model (TPM) chip on their motherboards.
A member of the Research and Development department named Amy Wilson has been assigned
a client computer named CERTKILLER-WS680. Amy Wilson reports that she was not able to start
CERTKILLER-WS680 because the TPM chip on CERTKILLER-WS680 was faulty. You need to
recover the encrypted data from CERTKILLER-WS680.
What should you do?
A. You should replace the motherboard on CERTKILLER-WS680 with the same brand of
motherboard having the same brand of TPM chip.
B. You should update the BIOS on CERTKILLER-WS680.
C. You should enter the BitLocker Drive Encryption Recovery console on CERTKILLER-WS680 by
using the password stored on the USB drive and recover the data.
D. You should run WinRE on CERTKILLER-WS680 and recover the data.
Answer: C
Explanation:
When the BitLocker is used in TPM only mode, it uses TPM hardware to validate the integrity of
the computer and the Operating System. If the TPM is missing or changed, then to recover data,
you need to enter the BitLocker Drive Encryption Recovery console on the computer by using the
40 digit recovery key or password stored on the USB drive to recover the data.
Part 2: Configure Direct Access (2 Questions)
QUESTION NO: 142
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com as well as a Direct Access infrastructure.
CertKiller.com has purchased a new mobile computer named CERTKILLER-WS680. You install
Windows 7 on CERTKILLER-WS680 and join it to the domain. You now need to make sure that
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 97
Actu
alTe
sts.
com
CERTKILLER-WS680 is able to establish Direct Access connections.
What should you do?
A. You should consider installing a computer certificate on CERTKILLER-WS680.
B. You should consider enabling the Network Discovery firewall exception on CERTKILLER-
WS680.
C. You should consider creating a new network connection on CERTKILLER-WS680.
D. You should consider adding the computer account for CERTKILLER-WS680 to the Network
Configuration Operators group.
Answer: A
QUESTION NO: 143
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. There are both desktop and laptop
workstations in operation at CertKiller.com.
You are assigned a workstation named CERTKILLER-WS680 that runs Windows 7. You run
Ipconfig on CERTKILLER-WS680 and receive the output as shown in the following exhibit:
You want to establish a DirectAccess connection to the network.
What should you do?
A. You should first consider configuring a static IPv4 address on CERTKILLER-WS680.
B. You should first consider enabling IPv6 on CERTKILLER-WS680.
C. You should first consider adding the DNS server address on CERTKILLER-WS680.
D. You should first consider creating a new VPN connection on CERTKILLER-WS680.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 98
Actu
alTe
sts.
com
Answer: B
Explanation:
Part 3: Configure mobility options (3 Questions)
QUESTION NO: 144
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. You are assigned a mobile computer
named CERTKILLER-WS680 that runs Windows 7.
You are currently using Windows Internet Explorer 8 to browse a Web site that displays Really
Simple Syndication (RSS) feeds. You want to be able to view the headlines of the site when
CERTKILLER-WS680 is offline.
What should you do?
A. You should add the home page of the site to the favorites list from Internet Explorer 8.
B. You should open the Offline Files from the Control Panel and select the 'Enable Offline Files'.
C. You should synchronize the information from the Sync Center prior to disconnecting from the
Internet.
D. You should add the RSS page of the site to the feeds list from Internet Explorer 8.
Answer: D
QUESTION NO: 145
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7. The CertKiller.com network contains a file server
named CERTKILLER-SR24 that hosts a shared folder named CKDocs.
A CertKiller.com user Amy Walsh has been assigned a mobile computer named CERTKILLER-
WS680. Amy Walsh uses CERTKILLER-WS680 to work on a file named MarketingPlan.doc,
which is located in a folder named CKDocs folder on CERTKILLER-SR04.
Amy Walsh needs to make the MarketingPlan.doc file available on CERTKILLER-WS680 so that
she can continue working on the document when she is out of the office. You verify that Amy
Walsh has permission to make the file available offline. However, when Amy Walsh right-clicks the
file, the menu option labeled Make available offline is not visible. You need to ensure that Anne
can make the file available offline.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 99
Actu
alTe
sts.
com
What should you do?
A. You should instruct Amy Walsh to map a network drive to the \\CertKiller-sr24\CKdocs folder.
B. You should instruct Amy Walsh to move the MarketingPlan.doc file from the \\CertKiller-
sr24\CKdocs folder to a shared folder on CERTKILLER-WS680.
C. You should ask a network administrator to modify the permissions on the MarketingPlan.doc file
to grant Amy Walsh Allow-Read & Execute permission.
D. You should ask a network administrator to open the properties of the CKDocs shared folder and
ensure that the Allow caching of files in this shared folder check box is selected.
Answer: D
Explanation:
Enabling offline files is a two step process. First, it must be enabled on the shared files by
allowing the caching of the files. Only when this is done will Anne be able to make the files
available to her offline.
QUESTION NO: 146
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7. All CertKiller.com users store their data on a file server
named CERTKILLER-SR04. No company or user data is stored locally on client computers.
CertKiller.com users from the Sales department have been issued with portable computers. When
these users travel, they must be able to use company data files even when they are not connected
to the network. You enable caching of offline files on all shared folders on CERTKILLER-SR04.
You also configure offline files on all portable computers in the Sales department. Before they
leave the office users in the Sales department users select several folders from CERTKILLER-
SR04 to be made available offline.
However, when the users return to the office they report that the offline files are no available to
them when they were out of the office. You need to ensure that the offline files are available to the
CertKiller.com users in the Sales department even when they are not connected to the network.
What should you do?
A. You should grant the 'Allow-Full Control' permission on the shared folders on CERTKILLER-
SR04 to the users in the Sales department.
B. You should change the caching options for the shared folders on CERTKILLER-SR04 to allow
automatic caching of documents.
C. You should add CERTKILLER-SR04 to the Exception list on the offline files configuration of
each portable computer in the Sales department.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 100
Actu
alTe
sts.
com
D. You should select the 'Notify me and begin working offline' check box from the Advanced
properties for Offline Files on each portable computer in the Sales department.
Answer: D
Explanation:
The portable clients must be configured to begin to work offline when they are disconnected from
the network. To configure this we must open Control Panel on the client computers and then o pen
Folder Options. On the Offline Files tab, click Advanced and under When a network connection is
lost, select Notify me and begin working offline. This is the preferred option for portable notebook
systems and it specifies that you can continue working offline if you lose your connection to a
computer or the network. Any network files will continue to be available to you.
Part 4: Configure remote connections (4 Questions)
QUESTION NO: 147
You are the newly appointed desktop support technician at CertKiller.com. The CertKiller.com
network consists of a single Active Directory domain named CertKiller.com.
You are responsible for managing a workstation named CERTKILLER-WS680 that is configured to
run Windows 7. Several CertKiller.com users log onto CERTKILLER-WS680. CERTKILLER-
WS680 contains a folder named CK_Data. You enable auditing on CK_Data. You need to ensure
all access to CK_Data is logged.
What should you do?
A. You should consider starting the Problem Steps Recorder.
B. You should consider configuring the Audit object access setting from the local Group Policy.
C. You should consider configuring the Audit directory service Access setting from the local Group
Policy.
D. You should consider modifying the properties of the Security log from the Event Viewer.
Answer: B
QUESTION NO: 148
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains
two computers named CERTKILLER-WS680 and CERTKILLER-WS622. CERTKILLER-WS680
currently runs Microsoft Windows 7 and CERTKILLER-WS622 runs Microsoft Windows XP
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 101
Actu
alTe
sts.
com
Professional.
During the course of the day you enable remote desktop on CERTKILLER-WS680 as shown in the
exhibit below:
Later, a CertKiller.com user named Rory Allen logs on to CERTKILLER-WS622 and attempts to
remotely access CERTKILLER-WS680. However, Rory Allen receives the error as shown in the
exhibit below:
You need to ensure that Rory Allen can use CERTKILLER-WS622 to remotely connect to
CERTKILLER-WS680.
What should you do?
A. You should consider adding Rory Allen's user account to the Remote Desktop Users group on
CERTKILLER-WS680.
B. You should consider creating a firewall exception for the Remote Desktop Protocol (RDP)
protocol and assigned to CERTKILLER-WS622.
C. You should consider enabling the Allow connections from computers running any version of
Remote Desktop setting on CERTKILLER-WS680.
D. You should consider assigning the Client (Respond Only) IPSec policy to CERTKILLER-
WS622.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 102
Actu
alTe
sts.
com
Answer: C
QUESTION NO: 149
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You are working on a computer named CERTKILLER-WS680 that runs Microsoft Windows 7.
During the course of the day you created a VPN connection on CERTKILLER-WS680 for
connecting to the CertKiller.com network. You want to ensure that you are still able to use the
Internet while being connected to the CertKiller.com network via the VPN connection. You also
want to ensure that Internet traffic is not routed through the CertKiller.com network.
What should you do?
A. You should consider assigning a static IP address and default gateway on CERTKILLER-
WS680.
B. You should consider configuring the security settings of the VPN connection on CERTKILLER-
WS680.
C. You should consider configuring the advanced TCP/IP settings of the VPN connection on
CERTKILLER-WS680.
D. You should consider configuring a static DNS server address on CERTKILLER-WS680.
Answer: C
QUESTION NO: 150
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
A CertKiller.com user named Kara Lang has been assigned a portable client computer named
CERTKILLER-WS680. Kara Lang is aware that CERTKILLER-WS680 has a Virtual Private
Network (VPN) connection configured to connect to the CertKiller.com network from remote
locations. However, Kara Lang reports that she cannot locate the VPN connection on
CERTKILLER-WS680.
What should you do?
A. You should inform Kara Lang to check in Ease of Access.
B. You should inform Kara Lang to check in System and Maintenance.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 103
Actu
alTe
sts.
com
C. You should inform Kara Lang to check in Network and Sharing Center.
D. You should inform Kara Lang to check in Mobile PC.
Answer: C
Explanation:
The Network and Sharing Center program is where you would go to view all your network
connections including VPN connections. From within the Network and Sharing Center program,
you can select the VPN connection and connect to it.
QUESTION NO: 151
You are the newly employed desktop support technician at CertKiller.com. The CertKiller.com
network consists of a single Active Directory domain named CertKiller.com.
You are assigned a workstation named CERTKILLER-WS680. CERTKILLER-WS680 is
configured to run Windows 7. You need to determine the applications that were installed by
another desktop support technician the previous week.
What should you do?
A. You should consider reviewing the Software Environment from System Information.
B. You should consider running the System Performance Data Collector Set from Performance
Monitor.
C. You should consider reviewing the System Diagnostics Report from Performance Monitor.
D. You should consider reviewing the informational events from Reliability Monitor.
Answer: D
Explanation:
Use Reliability Monitor to Troubleshoot
Reliability Monitor shows you your system stability history at a glance and lets you see details on a
day-by-day basis about events that impact reliability. This topic helps you understand the results
and take steps to improve reliability based on what you learn.
System Stability Chart
Reliability Monitor maintains up to a year of history for system stability and reliability events. The
System Stability Chart displays a rolling graph organized by date.
The top half of the System Stability Chart displays a graph of the Stability Index. In the lower half
of the chart, five rows track Reliability Events that either contribute to the stability measurement for
the system or provide related information about software installation and removal. When one or
more Reliability Events of each type are detected, an icon appears in the column for that date.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 104
Actu
alTe
sts.
com
For Software Installs and Uninstalls, an Information icon indicates a successful event of that type
occurred, or a Warning icon indicates a failure of that type occurred.
For all other Reliability Event types, an Error icon indicates a failure of that type occurred.
QUESTION NO: 152
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You working on a Windows 7 workstation named CERTKILLER-WS680. You have received
instruction to configure Windows Update on CERTKILLER-WS680. You open Windows Update as
shown in the following exhibit:
You need to ensure that the Windows Update settings on CERTKILLER-WS680 can be changed
manually.
What should you do?
A. You should consider changing the Windows Update settings from the local Group Policy on
CERTKILLER-WS680.
B. You should consider right-clicking Windows Update and choosing Run as administrator on
CERTKILLER-WS680.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 105
Actu
alTe
sts.
com
C. You should consider right-clicking the command prompt and choosing Run as administrator to
run Wuapp.exe on CERTKILLER-WS680.
D. You should consider logging on to CERTKILLER-WS680 as member of the Administrators
group.
Answer: A
QUESTION NO: 153
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You working on a workstation named CERTKILLER-WS680 that runs Microsoft Windows 7. You
have received instruction to have CERTKILLER-WS680 configured to download updates from a
local Windows Server Update Services (WSUS) server.
What should you do?
A. You should consider changing the Windows Update settings from Windows Update on
CERTKILLER-WS680.
B. You should consider changing the Windows Update settings from the local Group Policy on
CERTKILLER-WS680.
C. You should consider changing the System Protection settings from the System settings on
CERTKILLER-WS680.
D. You should consider changing the Location and Sensors settings from the local Group Policy
on CERTKILLER-WS680
Answer: B
QUESTION NO: 154
You are employed as a network administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network run Microsoft Windows 7. All client computers are configured for automatic
updates.
The CertKiller.com network contains a client computer named CERTKILLER-WS680. After a
recent update you notice that some of the applications on CERTKILLER-WS680 do not work. You
reboot CERTKILLER-WS680 but the applications still do not work. You need to remove the latest
update.
What should you do?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 106
Actu
alTe
sts.
com
A. You should use Add or Remove Programs from the Control Panel.
B. You should restore hidden updates.
C. You should use Software Explorer.
D. You should use the Installed updates list from Windows Update.
Answer: D
Explanation:
To uninstall a Windows Update, you can use the Installed updates list on the Windows Update
window. When you display the list of updates, you'll see an 'Uninstall' button in the toolbar.
Simply select the update you wish to uninstall, then click the Uninstall button.
Incorrect Answers:
A: In previous versions of Windows, you would use the Add or Remove Programs utility to
uninstall Windows Updates. However, this was changed with Windows Vista. You should now use
the Installed updates list on the Windows Update window.
B: Restoring hidden updates will not uninstall an update.
C: The Software Explorer utility is used to view detailed information about the programs that are
currently running on your system. It is not used to uninstall updates.
QUESTION NO: 155
You are employed as a desktop technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You are working on a client computer named CERTKILLER-WS680 that runs Windows 7. You
want to determine whether recent Windows Updates have been applied to CERTKILLER-WS680.
What should you do? (Each correct answer presents a complete solution. Choose TWO.)
A. You should check the Security event log.
B. You should check ReportingEvents.log file.
C. You should check the update history in the Windows Update applet.
D. You should check the Setup event log.
Answer: B,C
Explanation:
To find out whether the updates have been installed on your computer or not, you need to Check
ReportingEvents.log file because the WSUS client records update activities and results in this file.
You need to check the update history in the Windows Update applet to see which updates
Windows has installed, click the View Update History link in the left panel in the Windows Update
window to view the updates.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 107
Actu
alTe
sts.
com
QUESTION NO: 156
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You are working on a client computer named CERTKILLER-WS680 that runs Windows 7.
CERTKILLER-WS680 has a Wake-on-LAN compliant network card. You configure Windows
Update to run at night when the computer is shut down. You enable the Wake-on-LAN feature and
configured the Enabling Windows Update Power Management settings on CERTKILLER-WS680.
You need to ensure that Windows Update occurs at night.
What should you do?
A. You should leave CERTKILLER-WS680 in hibernate mode at night.
B. You should leave CERTKILLER-WS680 in sleep mode at night.
C. You should shutdown CERTKILLER-WS680 at night.
D. You should leave CERTKILLER-WS680 switched on at night.
Answer: A
Explanation:
To perform Windows Update installations to run at night, when computers are shut down, you
need to Leave computers in hibernate mode at night. The computers in hibernate mode saves the
contents of memory to a file called hiberfil.sys, thus you would not lose unsaved data in case of
total power failure and thus can download the Windows updates and perform installations.
QUESTION NO: 157
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The CertKiller.com network client computers
currently make use of Microsoft Windows XP Professional. CertKiller.com has recently decided to
have the client computers upgraded to Microsoft Windows 7 with all the installed applications.
During the course of the day you receive an instruction from the CIO to install Federated Search
connectors.
What should you do?
A. This can be accomplished by downloading the Shared Resource Kit for Federated Searches via
Amazon.com.
B. This can be accomplished having the Federated Search Installation Tool Pack bought online.
Thereafter individual search connectors bought from various websites.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 108
Actu
alTe
sts.
com
C. This can be accomplished by having an .osdx file downloaded from a valid source.
Thereafter the downloaded file should be double clicked and Add selected in order to install the
file.
D. This can be accomplished by going to the website of Microsoft if your company is signed up to
the Microsoft Federated Search Tool Writers Guild.
Answer: C
Explanation:
Part 2: Manage disks (4 Questions)
QUESTION NO: 158
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You are assigned a workstation named CERTKILLER-WS680. CERTKILLER-WS680 is
configured to run Windows 7. You open the Disk Management snap-in on CERTKILLER-WS680
as shown in the following exhibit:
You want to create a new partition on Disk 0.
What should you do?
A. You should consider compressing volume C.
B. You should consider converting Disk 0 into a dynamic disk.
C. You should consider creating as well as initializing a Virtual Hard Disk (VHD).
D. You should consider shrinking volume C.
Answer: D
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 109
Actu
alTe
sts.
com
QUESTION NO: 159
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network run Microsoft Windows 7.
CertKiller.com issues a new usage policy that prevents CertKiller.com users from installing
removable disk devices on their computers. You need to ensure that the policy is implemented.
What should you do?
A. You should enable the 'WPD Devices: Deny Read Access' group policy setting.
B. You should enable the 'Removable Disk: Deny Read Access' group policy setting.
C. You should enable the 'Allow installation of devices that match any of these device IDs' group
policy setting.
D. You should enable the 'Prevent installation of removable devices' group policy setting.
Answer: D
Explanation:
: To prevent users from installing removable device drivers on their computers, you need to
enable group policy setting Prevent installation of removable devices Device Installation
Restriction.
QUESTION NO: 160
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. You are responsible for managing a
computer named CERTKILLER-SR05 that is configured to run Windows 7. CERTKILLER-SR05 is
configured to host two volumes named C and D. You are in the process of creating a new folder
named D:\TESTDATA. During the course of the day you receive notification from management to
make sure that files stored in TESTDATA are indexed by Windows search.
What should you do?
A. You should consider changing the Folder Options from the Control Panel.
B. You should consider enabling the archive attribute on the folder.
C. You should consider creating a new library and adding TESTDATA to it.
D. You should consider changing the properties of the Windows Search service.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 110
Actu
alTe
sts.
com
Answer: C
QUESTION NO: 161
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com recently
deployed a new workstation named CERTKILLER-WS01 to the network. The Disk configuration of
CERTKILLER-WS01 is shown in the exhibit below:
During the course of the day you receive instruction from CertKiller.com to extend the C: volume
on CERTKILLER-WS01 by selecting what to do first.
What should you do?
A. You should consider the crash dump removed from volume C:.
B. You should consider having the paging file moved from volume C: to volume E:.
C. You should consider having volume D: backed up and deleted.
D. You should consider having disk 0 converted to a dynamic disk.
Answer: C
Explanation:
Part 3: Monitor systems (8 Questions)
QUESTION NO: 162
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 111
Actu
alTe
sts.
com
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7. You are working on a client computer named
CERTKILLER-WS680. You want to identify the hardware and software failures which have
occurred on CERTKILLER-WS680 over the past six months.
What should you do?
A. You should review the results from the System Performance Data Collector Set.
B. You should create a User Defined Data Collector Set and review the results.
C. You should review the results from the System Stability Chart.
D. You should create an Event Trace Sessions Data Collector Set and review the results.
Answer: C
QUESTION NO: 163
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. Several months ago CertKiller.com had
deployed Microsoft Windows 7 client computers for all users in the Sales department.
You received a report from a CertKiller.com user in the Sales Department user named Rory Allen.
Rory Allen has been assigned a client computer named CERTKILLER-WS680 and reports that he
experiences an unusually large amount of system failures. You log on to CERTKILLER-WS680 in
an attempt to identify the cause of the failures and also to analyze a historical view of workstation
performance and see when the failures first started appearing on CERTKILLER-WS680.
What should you do?
A. You should make use of Performance Monitor.
B. You should make use of the Reliability Monitor.
C. You should make use of a System Diagnostics Data Collector Set.
D. You should make use of the Resource Overview tool.
Answer: B
Explanation:
: The Reliability Monitor will allow you to see a graphical history of software installs and uninstalls,
application failures, hardware failures, Windows failures, and miscellaneous failures.
QUESTION NO: 164
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 112
Actu
alTe
sts.
com
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. You have been assigned a workstation
named CERTKILLER-WS680 that is configured to run Windows 7.
You want to compile the performance data for a period of three weeks on CERTKILLER-WS680.
The performance data should encompass CPU usage, memory usage as well as disk usage.
What should you do?
A. You should create an Event Trace Sessions Data Collector Set.
B. You should create a Startup Event Trace Sessions Data Collector Set.
C. You should create a User Defined Data Collector Set.
D. You should add counters to the Performance Monitor.
Answer: C
QUESTION NO: 165
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. You are responsible for
managing a computer named CERTKILLER-WS25 that is configured to run Windows 7. During the
course of the day you receive an instruction from the CIO to view the processes that produce
network activity at present.
What should you do?
A. You should consider opening Windows Task Manager and clicking the Networking tab.
B. You should consider opening Resource Monitor and clicking the Network tab.
C. You should consider opening Performance Monitor and adding all counters for the network
interface.
D. You should consider opening Event Viewer and examining the NetworkProfile Operational log.
Answer: B
QUESTION NO: 166
CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All servers on the CertKiller.com
network run Windows Server 2008 and all mobile computers run Windows 7. You are assigned a
mobile computer named CERTKILLER-WS20.
CERTKILLER-WS20 is configured to enter sleep mode if no activity takes place in 15 minutes.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 113
Actu
alTe
sts.
com
You leave your office for 20 minutes and discover that CERTKILLER-WS20 has not entered into
sleep mode. You are puzzled by the fact that CERTKILLER-WS20 has not entered into sleep
mode and thus decide to identify what could have caused this from happening.
What should you do?
A. You should consider reviewing the detailed performance and system information from
Performance Information and Tools.
B. You should consider running Powercfg energy at a command prompt.
C. You should consider running Systeminfo /s localhost at a command prompt.
D. You should consider reviewing the System Summary from Performance Monitor.
Answer: B
QUESTION NO: 167
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network
client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has
recently decided to have the client computers upgraded to Microsoft Windows 7. You receive a
complaint from a CertKiller.com user named Mia Hamm stating that the gamed included with
Windows 7 were not installed by default on her computer. You thus decide to install the games on
her computer.
What should you do?
A. You are able to add or remove components in Windows 7 by right clicking the "My Computer"
icon and selecting Choose Properties.
Then Computer Management should be selected.
Thereafter Add Remove Windows Components should be selected from left pane.
B. You are able to add or remove components in Windows 7 by clicking the Start Bar and
selecting Control Panel.
Thereafter Add/Remove Programs should be selected and Windows Components clicked.
C. You are able to add or remove components in Windows 7 by clicking the Start Bar and
selecting Control Panel.
Thereafter Programs should be selected and the Turn Windows features should be clicked on or
off.
D. You are able to add or remove components in Windows 7 by clicking the Start Bar.
Then Settings should be selected.
Thereafter you should select Windows Control Center.
Answer: C
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 114
Actu
alTe
sts.
com
QUESTION NO: 168
CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network client
computers currently make use of Microsoft Windows XP Professional. CertKiller.com has recently
decided to have the client computers upgraded to Microsoft Windows 7 with all the installed
applications. You are in the process of notifying all CertKiller.com users how they will be made
aware with information systems and configuration alerts.
What should you do?
A. You should inform all users that a shaking alert flag will appear in the index bar of the opened
windows when Aero is installed.
B. You should inform all users that once a flag appear in the taskbar with a red "x" it will signify a
problem that needs attention.
C. You should inform all users that a pop-up will occur and the contrast of Windows 7 will be faded
until you acknowledge.
D. All of the above
Answer: B
QUESTION NO: 169
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the
day a network user named Rory Allen asked you which of the Microsoft Windows Setup
configuration pass applies settings to Microsoft Windows 7 before the Windows Welcome is
started.
A. You should consider instructing Rory Allen that specialize Microsoft Windows Setup
configuration pass applies the settings.
B. You should consider instructing Rory Allen that the offlineServicing Microsoft Windows Setup
configuration pass applies the settings.
C. You should consider instructing Rory Allen that the oobeSystem Microsoft Windows Setup
configuration pass applies the settings.
D. You should consider instructing Rory Allen that the auditSystem Microsoft Windows Setup
configuration pass applies the settings.
Answer: C
Explanation:
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 115
Actu
alTe
sts.
com
Part 4: Configure performance settings (5 Questions)
QUESTION NO: 170
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
A CertKiller.com user named Clive Wilson is the company's sales representative. When Clive
Wilson is out in the field, he takes a mobile computer named CERTKILLER-WS680 with him. Clive
Wilson wants you to configure the power settings on CERTKILLER-WS680 so that the display
turns off when the computer is inactive and running on battery power. However, the power settings
of the hard disk remain unaffected.
What should you do?
A. You should configure CERTKILLER-WS680 to use the 'Power saver' power plan.
B. You should configure CERTKILLER-WS680 to use the 'High performance' power plan.
C. You should restore the 'Power Saver' power plan to the default settings.
D. You should change the advanced power settings of the 'Balanced' power plan.
Answer: D
QUESTION NO: 171
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
You have installed Microsoft Windows 7 on a new computer named CERTKILLER-WS680.
CERTKILLER-WS680 has the following hardware configuration:
2.4-GHz processor2 GB of RAM512-MB video adapter250-GB hard disk
After the installation you are unable to view the Thumbnails, Previews on folders, Transparent
glass of Windows Vista. You need to ensure that the advanced visual features of Windows Vista
are displayed so you can view it.
What should you do?
A. You should press the WINDOWS key and the TAB key simultaneously.
B. You should configure the system properties to optimize for best appearance.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 116
Actu
alTe
sts.
com
C. You should configure the system properties to optimize for applications.
D. You should press the ALT key and the TAB key simultaneously.
Answer: B
QUESTION NO: 172
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
A CertKiller.com user named Clive Wilson has been assigned a Windows 7 Professional client
computer named CERTKILLER-WS680. Clive Wilson reports that applications on CERTKILLER-
WS680 are running slowly. You notice that CERTKILLER-WS680 has 2 GB of RAM and 250 MB
free disk space. You need to improve performance on CERTKILLER-WS680.
What should you do? (Choose TWO.)
A. You should set the total paging file to 75 percent of physical memory.
B. You should perform a disk analysis, and use the disk defragmenter, if recommended.
C. You should use disk cleanup to delete temporary files and unnecessary program files.
D. You should ensure that the performance options setting is optimized for background services.
Answer: B,C
Explanation:
The system in this scenario is showing symptoms that Dr. King is running out of disk space. The
Disk Cleanup utility can be used to free some disk space. It's also a good idea to defragment the
hard drive as a hard drive which is close to its maximum capacity can become fragmented fast.
Incorrect Answers:
A: The minimum recommended setting of the page file is 1.5 times the physical memory, not 75%.
D: On a Windows XP Professional computer the performance options should be optimized for
Applications, not Background services.
QUESTION NO: 173
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
A CertKiller.com user named Amy Walsh has been assigned a mobile computer named
CERTKILLER-WS680. Amy Walsh needs to travel extensively in the execution of her duties and
has configured CERTKILLER-WS621 to use the Power saver power plan. However, Amy Walsh
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 117
Actu
alTe
sts.
com
reports that CERTKILLER-WS680 does not shut down completely when she clicks the Power
button icon on the Start menu as the same programs that were opened when she tried to shut
down the computer are still open when she restarts the computer.
You now need to configure CERTKILLER-WS680 to have it turn off completely without saving
Amy Wilson's desktop session when she clicks the Power button icon on the Start menu.
What should you do?
A. You should click the 'Choose what power buttons do' link from 'Power Options' and choose the
option to shut the computer down when the power button is pressed.
B. You should click the 'Change when computer sleeps' link from 'Power Options' and choose the
option to never put the computer to sleep when it is running on battery.
C. You should open 'Advanced Settings' for the current power plan from 'Power Options' and
change the 'On battery' setting in the 'Sleep after' category to 'Never'.
D. You should open 'Advanced Settings' for the current power plan from 'Power Options' and
change the 'Start menu power button' setting to 'Shut down'.
Answer: D
Explanation:
: You should change the Start menu power button setting to Shut down in Advanced Settings. To
open Advanced Settings, first open Power Options and click the Change plan settings link
associated with the Power saver power plan. Then click the Change advanced power settings link
to open the Advanced Settings dialog box. Expand Power buttons and lid, and then expand Start
menu power button. Change the On battery setting to Shut down. This causes Windows to
completely shut down when the Power button icon on the Start menu is clicked.
QUESTION NO: 174
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the
day you receive instruction from CertKiller.com to increase the size of the paging file for a server
named CERTKILLER-SR01.
What should you do?
A. You should consider having the Advanced system settings modified from System.
B. You should consider having the System protection setting modified from System.
C. You should consider having the boot partition shrunk from Disk Management.
D. You should consider having the system partition shrunk from Disk Management.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 118
Actu
alTe
sts.
com
Answer: A
QUESTION NO: 175
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network run Windows 7 Professional.
You install a new application named CKapp.exe on a client computer named CERTKILLER-
WS680 and run the application. You now want to apply various application patches to
CERTKILLER-WS-680, but you decide to perform a backup of CERTKILLER-WS680. You want all
user files, application data and application settings, as well as the operating system and system
state to be included in the backup so that you can perform a complete restore in the event of a
hard disk failure.
What should you?
A. You should use Windows Backup and Restore Center to create Complete File Backup.
B. You should configure automatic restore points for all disks on CERTKILLER-WS680.
C. You should use Windows Backup and Restore Center to create Complete PC Backup.
D. You should enable the Indexing Service feature on CERTKILLER-WS680.
Answer: C
Explanation:
To backup Windows 7 computers that will enable a restore in the event of a hard disk failure, you
need to create a Complete PC Backup using Windows Backup and Restore Center . The
Complete PC Backup and Restore will ensure a comprehensive, image-based backup that will
allow you to recover your entire system.
QUESTION NO: 176
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You are working a Windows 7 workstation named CERTKILLER-WS680. You want to backup data
on CERTKILLER-WS680. You open the Configure Backup wizard as shown in the exhibit below:
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 119
Actu
alTe
sts.
com
You to be able to backup the data to a local disk drive.
What should you do?
A. You should consider adding your user account to the Backup Operators group before running
the Configure Backup wizard.
B. You should consider starting the Volume Shadow Copy Service (VSS) before running the
Configure Backup wizard.
C. You should consider logging on to CERTKILLER-WS680 as an administrator before running the
Configure Backup wizard.
D. You should consider disconnecting all removable disks from CERTKILLER-WS680 before
running the Configure Backup wizard.
Answer: D
QUESTION NO: 177
You work as the desktop technician at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The CertKiller.com network contains 10
Windows 2000 Server computers, 50 Windows XP Professional client computers, 100 Windows
Vista Business computers and 150 Windows 7 Professional client computers.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 120
Actu
alTe
sts.
com
A CertKiller.com user named Mia Hamm uses a Windows 7 Professional client computer named
CERTKILLER-WS680. Important business planning documents and files are stored on
CERTKILLER-WS680. You have been instructed to ensure that data on CERTKILLER-WS680
can be recovered in the event of a disk failure. You install a robotic tape library that contains two
Digital Audio Tape (DAT) cartridges in CERTKILLER-WS680.
You want to perform a full backup every Saturday afternoon and incremental backups every
Tuesday and Thursday evening. You plan to perform the full backup manually but you want the
incremental backups to take place as a scheduled task. You also want the incremental backups
made on the Tuesday evening to be written to one tape and the incremental backups made on the
Thursday evening to be written to the other tape.
What should you do to accomplish these goals?
A. For Tuesday evening, create a scheduled backup job that runs once using a tape from the free
media pool. For Thursday evening, create another scheduled backup job that runs once using a
tape from the free media pool. Then create a scheduled backup job that runs every Tuesday
evening and another that runs every Thursday evening.
B. On Tuesday evening, run a manual incremental backup job and assign a name to the tape used
for that day. On Thursday evening, run another manual incremental backup job and assign a
different name to the tape used for Thursdays. Then create scheduled incremental backup jobs for
Tuesday and Thursday evenings and specify the name of the tape to be used in each incremental
backup job.
C. Use the rsm command-line utility to run the incremental backup jobs for Tuesday and Thursday
evenings.
D. Use the Removable Storage console to assign a different name to each tape. Then create
scheduled incremental backup jobs for Tuesday and Thursday evenings and specify the name of
the tape to be used in each incremental backup job.
Answer: B
Explanation:
To ensure that the same tape gets used for the Tuesday backup and a different one on
Thursdays, you must assign the tape a name. This can be done during a manual backup job
during which you can assign a name to the tape. This name is stored in the tape's header and
can be specified in subsequent scheduled backup jobs. This will ensure that one tape is used for
the Tuesday backup and the other is used for the Thursday backup.
Incorrect answers:
A: You need to assign a name to the tape so that it can be specified for the scheduled backup job.
However, when you create a scheduled backup job that uses a tape from the free media pool, all
data on the tape, including any name stored in the tape header will be deleted.
C: You can use the rsm command-line utility to create, delete, and manage media pools, to
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 121
Actu
alTe
sts.
com
mount, dismount, and eject media, and to display information about removable storage resources.
It cannot be used to run backup jobs.
D: You can use the Removable Storage console to manage removable storage libraries and to
display information about the media in each pool, but you cannot use the Removable Storage
console to assign a name to a tape. You need to assign a name to each tape so that you can
specify which tape should be used during the scheduled backup.
Part 2: Configure system recovery options (6 Questions)
QUESTION NO: 178
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. You are working on a Microsoft
Windows 7 workstation named CERTKILLER-WS680 that has been infected by a virus. You have
previously performed an image backup of CERTKILLER-WS680 that you now want to restore.
What should you do? (Each correct answer presents part of the solution. Choose TWO.)
A. You should consider selecting the Last Known Good Configuration boot option on
CERTKILLER-WS680.
B. You should consider booting CERTKILLER-WS680 from the Windows 7 DVD.
C. You should consider running the Startup Repair tool.
D. You should consider running the System Image Recovery tool.
E. You should consider booting CERTKILLER-WS680 from Windows Preinstallation Environment
(Windows PE).
F. You should consider running the Imagex.exe utility.
Answer: B,D
QUESTION NO: 179
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains a
client computer named CERTKILLER-WS680 that is running Windows 7. CERTKILLER-WS680
contains two volumes named Volume C and Volume D.
You have created a document named CKdoc.docx on Volume D and you have manually created a
restore point for the document before editing document. You want to be able to restore the
document to its current version if and document is edited any further.
What should you do?
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 122
Actu
alTe
sts.
com
A. You should consider starting the Volume Shadow Copy Service (VSS).
B. You should consider using the System Protection on volume D.
C. You should consider enabling Auditing on the document.
D. You should consider running the Disk Cleanup on volume D.
Answer: B
QUESTION NO: 180
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com.
You are working on a client computer named CERTKILLER-WS680 that is running Windows 7.
System Protection is enabled on CERTKILLER-WS680. You have received instructions to delete
all System Protection snapshot on CERTKILLER-WS680 except the most recent snapshot.
What should you do?
A. You should consider running the Disk Cleanup for Programs and Features.
B. You should consider restoring the previous versions of files from the System Protection Restore
settings.
C. You should consider disabling the System Restore from the System Protection Restore
settings.
D. You should consider running Disk Cleanup for System Restore and Shadow Copies.
Answer: D
QUESTION NO: 181
You are employed as a network administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. All client computers on the
CertKiller.com network run Microsoft Windows 7.
The CertKiller.com network contains a client computer named CERTKILLER-WS680. After a
recent critical update you notice that CERTKILLER-WS680 is unstable. You now want to use
system restore to restore CERTKILLER-WS680 to an earlier point.
What should you do?
A. D
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 123
Actu
alTe
sts.
com
Answer: A
Explanation:
Step #1:
Click on the Start button, open the Control Panel and select 'System and Security'
Step #2:
Select ' Action Center '
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 124
Actu
alTe
sts.
com
Step #3:
Select 'Recovery'
Step #4:
Click on the 'Open System Restore' button
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 125
Actu
alTe
sts.
com
Step #5:
Click 'Next' on the 'Restore System Files and Settings' dialog box
Step #6:
Select the 'Show more restore points' check box, select the restore point you to use and click
'Next'.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 126
Actu
alTe
sts.
com
Step #7:
Select 'Finish' on the Confirm your restore point' page.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 127
Actu
alTe
sts.
com
QUESTION NO: 182
CertKiller.com has hired you as a network Administrator for their network. The CertKiller.com
network client computers currently make use of Microsoft Windows XP Professional. You are
responsible for managing a computer named CERTKILLER-SR01 that is configured to run
Windows 7. Whilst updating the driver on the video card of CERTKILLER-SR01 you discover that
CERTKILLER-SR01 is not responding. You receive an instruction from the CIO to recover
CERTKILLER-SR01 as soon as possible.
What should you do?
A. This can be accomplished by starting CERTKILLER-SR01 from the Windows 7 installation
media.
Then Repair your computer should be selected.
Thereafter System Restore should be selected.
B. This can be accomplished by restarting CERTKILLER-SR01 in safe mode.
Thereafter the video card driver should be rolled back.
C. This can be accomplished by starting CERTKILLER-SR01 from the Windows 7 installation
media.
Then Repair your computer should be selected.
Thereafter System Image Recovery should be selected.
D. This can be accomplished by restarting CERTKILLER-SR01 in safe mode.
Thereafter CERTKILLER-SR01 should be slip back to an earlier restore point.
Answer: B
QUESTION NO: 183
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7.
A network user named Mia Hamm has a client computer which she regularly backups. Mia Hamm
additionally creates system image backups. During the course of the day Mia Hamm's computers
disk fails and she replaces he failed disk drive. CertKiller.com wants you to recover Mia Hamm's
computer to the previous Windows environment. You started the computer using the Windows 7
installation media.
What should you do?
A. You should consider having the System Image Recovery option selected.
B. You should consider having the System Restore option selected.
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 128
Actu
alTe
sts.
com
C. You should consider having the Command Prompt option selected.
D. You should consider having the Startup Repair option selected
Answer: A
Explanation:
Part 3: Configure file recovery options (1 Question)
QUESTION NO: 184
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7. You are working on a client computer named
CERTKILLER-WS680. CERTKILLER-WS680 is configured with two hard disk drives named Drive
C and Drive D. Both hard disks drives are formatted with the NTFS file system. You need to
disable previous versions on the Drive D.
What should you do?
A. You should use the Disk Management snap-in to convert Drive D to a Dynamic volume.
B. You should modify the Quota settings on Drive D.
C. You should consider modify the Sharing settings on Drive D.
D. You should modify the System protection setting from System Properties.
Answer: D
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 129