New Updated 70-680 Exam Questions 70-680 PDF dumps! Welcome to download the newest 70-680 VCE dumps: https://www.dumpsschool.com/70-680-exam-dumps.html

Keywords: 70-680 exam dumps,MCP exam questions, 70-680 exam questions, 70-680 VCE dumps, 70-680 PDF dumps, 70-680 practice tests, 70-680 study guide, 70-680 braindumps, MCP

Microsoft Certified Professional certification exam as a profession has an extraordinary evolution over the last few years. Microsoft 70-680 MCP exam is the forerunner in validating credentials against. Here are updated Microsoft 70-680 exam questions, which will help you to test the quality features of DumpsSchool exam preparation material completely free. You can purchase the full product once you are satisfied with the product.

Question: 1

Your network consists of an Active Directory domain and a DirectAccess infrastructure.
You install Windows 7 on a new portable computer and join the computer to the domain.
You need to ensure that the computer can establish DirectAccess connections.
What should you do?

A. Install a computer certificate.
B. Create a new network connection.
C. Enable the Network Discovery firewall exception.
D. Add the computer account to the Network Configuration Operators group.

Answer: A

Explanation:
Certificates
The DirectAccess IPsec session is established when the client running Windows 7 and the DirectAccess server authenticate with each other using computer certificates. DirectAccess supports only certificate-based authentication.
DirectAccess Client Configuration
Clients receive their DirectAccess configuration through Group Policy. This differs from traditional VPN configuration where connections are configured manually or distributed through the connection manager administration kit. Once you have added the computer’s client account to the designated security group, you need to install a computer certificate on the client for the purpose of DirectAccess authentication. An organization needs to deploy Active Directory Certificate Services so that clients can automatically enroll with the appropriate certificates.

Question: 2

You have a portable computer named Computer1 that runs Windows 7.
You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1.
You need to configure Computer1 to meet the following requirements:
• Ensure that cached files from Share1 are encrypted.
• Ensure that files located in Share1 are available when Server1 is disconnected from the network.
What should you do?

A. On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline.
B. On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available offline.
C. On Computer1, make Share1 available offline and enable encryption of offline files.
D. On Computer1, copy the files from Share1 to the Documents library and configure BitLocker Drive Encryption.

Answer: C

Explanation:
Offline Files
The Offline Files feature of Windows 7 allows a client to locally cache files hosted in shared folders so that they are accessible when the computer is unable to connect directly to the network resource. The Offline Files feature is available to users of the Professional, Enterprise, and Ultimate editions of Windows 7. You can use the Offline Files feature to ensure access when a client computer is out of the office or when a temporary disruption, such as a wide area network (WAN) link failing between a branch office and a head office, blocks access to specially configured shared folders.
Using Sync Center
You can use Sync Center to synchronize files, manage offline files, and resolve synchronization conflicts manually. Sync Center is located within the Control Panel or by typing Sync Center into the Search Programs and Files text box on the Start menu. Clicking Manage Offline Files opens the Offline Files. This dialog box is also available using the Offline Files control panel. Using this dialog box, you can disable offline files, view offline files, configure disk usage for offline files, configure encryption for offline files, and configure how often Windows 7 should check for slow network conditions.

Question: 3

You have a computer named Computer1 that runs Windows Vista and a computer named Computer2 that runs Windows 7. You plan to migrate all profiles and user files from Computer1 to Computer2.
You need to identify how much space is required to complete the migration.
What should you do?

A. On Computer1 run Loadstate c:\store /nocompress
B. On Computer1 run Scanstate c:\store /nocompress /p
C. On Computer2 run Loadstate \\computer1\store /nocompress
D. On Computer2 run Scanstate \\computer1\store /nocompress /p

Answer: B

Explanation:
ScanState
You run ScanState on the source computer during the migration. You must run ScanState.exe on computers running Windows Vista and Windows 7 from an administrative command prompt. When running ScanState on a source computer that has Windows XP installed, you need to run it as a user that is a member of the local administrators group. The following command creates an encrypted store named Mystore on the file share named Migration on the file server named Fileserver that uses the encryption key Mykey: scanstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /o /config:config.xml /encrypt /key:”mykey”
Space Estimations for the Migration Store
When the ScanState command runs, it will create an .xml file in the path specified. This .xml file includes improved space estimations for the migration store. The following example shows how to create this .xml file: Scanstate.exe C:\MigrationLocation [additional parameters] /p:”C:\MigrationStoreSize.xml” To preserve the functionality of existing applications or scripts that require the previous behavior of USMT, you can use the /p option, without specifying “pathtoafile”, in USMT 4.0. If you specify only the /p option, the storage space estimations are created in the same manner as with USMT 3.x releases.
User State Migration Tool
USMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState.

Question: 4

You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment.
You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on.
You have a workgroup which contains five computers. Windows 7 is run by the computers. A computer named C01 has video and audio files.
You have to share C01s video and audio files on the network.
What should you do? (Choose more than one)

A. Connect a removable drive and enable BitLocker To Go.
B. A HomeGroup should be created.
C. The files should be moved to a Media Library.
D. All BranchCache rules should be enabled in Windows Firewall.

Answer: B, C

Question: 5

You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You manage a computer that runs Windows 7. You have to identify which applications were installed during the last week. So what action should you perform?

A. The System Performance Data Collector Set should be run from Performance Monitor.
B. The informational events should be reviewed from Reliability Monitor.
C. The Software Environment should be reviewed from System Information.
D. The System Diagnostics Report should be reviewed from Performance Monitor.

Answer: B

Question: 6

You have a computer that runs Windows 7. You open the Disk Management snap-in as shown in the exhibit. (Click the Exhibit button.)?

You need to ensure that you can create a new partition on Disk 0.
What should you do?

A. Shrink volume C
B. Compress volume C
C. Convert Disk 0 into a dynamic disk.
D. Create and initialize a Virtual Hard Disk (VHD).

Answer: A

Explanation:
Needs to have sufficient space in order to create a new partition. Hence shrinking the C: partition will create additional space that can be used for a new partition.

Question: 7

Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain.
From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain.
You need to ensure that you can recover all EFS encrypted files from Computer2.
What should you do?

A. On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker.
B. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.
C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter.
D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter.

Answer: B

Explanation:
You can import the recovery agent to another computer running Windows 7 if you want to recover files encrypted on the first computer. You can also recover files on another computer running Windows 7 if you have exported the EFS keys from the original computer and imported them on the new computer. You can use the Certificates console to import and export EFS keys.
NOT Secedit.exe:
You can use both the Local Group Policy Editor and the Local Security Policy console to import and export security-related Group Policy settings. You can use this import and export functionality to apply the same security settings to stand-alone computers that are not part of a domain environment. Exported security files are written in Security Template .inf format. As well as using Local Group Policy Editor and the Local Security Policy console to import policies that are stored in .inf format, you can apply them using the Secedit.exe command-line utility.
NOT Cipher.exe /removeuser /adduser.
NOT DigitalLocker.

         

Facebook Comments