[Free] Get all latest Microsoft 70-680 Actual Tests 441-450

Ensurepass

QUESTION 441

You plan to deploy a custom Windows 7 image to computers that are not connected to a corporate network. You need to ensure that a custom application installs automatically after the image is deployed. What should you do?

 

A.

Use the Microsoft Deployment Toolkit (MDT) to create a custom task sequence and run the New Media Wizard.

B.

Run Dism.exe and specify the /mount-WIM parameter. Add the application installation files to the image and then modify the winrm.cmd file.

C.

Create a Group Policy object (GPO) that includes a software installation package.

D.

Use the Windows System Image Manager (Windows SIM) to open the image and add the applications to the windowsPE configuration pass.

 

Correct Answer: A

 

 

QUESTION 442

You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits:

 

The Disk Management console (Click the Exhibit button.)

 

clip_image002

 

The System Properties window (Click the Exhibit button.)

 

clip_image003

 

The System protection for Local Disk C window (Click the Exhibit button.)

 

clip_image004

 

You encrypt several files on an external USB hard disk drive by using the Encrypting File System (EFS). You need to ensure that you can access the files from another computer. What should you do?

 

A.

Delete restore points.

B.

Create a restore point.

C.

Perform a system restore.

D.

Search for the file in the Recycle Bin.

E.

Increase disk space used for system protection.

F.

Copy the file from a previous version of a folder.

G.

Set restore settings to Only restore previous versions of files.

H.

Run the cipher /x command from the elevated command prompt,

I.

Run the vssadmin list volumes command from the elevated command prompt.

J.

Run the vssadmin list shadows command from the elevated command prompt,

K.

Run the compact /U <file_name> command from the elevated command prompt.

 

Correct Answer: H

Explanation:

* cipher /x[:efsfile] [<FileName>]

 

Backs up the EFS certificate and keys to the specified file name. If used with :efsfile, /x backs up the user’s certificate(s) that were used to encrypt the file. Otherwise, the user’s current EFS certificate and keys are backed up.

 

* Back Up Your EFS Key

The first time that you use EFS to encrypt something, your system generates a random 256-bit number; that’s the key that EFS uses whenever you encrypt something. To back up your EFS key, simply use the Cipher /x command. Cipher will reply with a message asking if you truly want to back up your EFS key–sadly, I haven’t found a way to suppress this message. Press OK. The tool will then prompt you for the name of the file in which to store the backup. Don’t specify a file extension; Cipher insists on the .pfx extension. For example, if you picked a file named mybackup, you now have a small file called mybackup.pfx. Next, the tool will prompt you to create a password with which to protect that file.

 

Once you’ve got that file created, copy it from your computer’s hard disk to some offline location (e.g., a USB stick, a CD-ROM) and make a note of the password you’ve chosen. Now, in the event of unfortunate circumstances– for example, you lose your profile, you forget your password and a systems administrator has to reset it, the system’s OS fails and you need to recover files directly from the nowdead system’s hard disk–you can simply restore your EFS key by double-clicking the .pfx file and running the resulting wizard. As soon as the wizard is finished, you’ll be able to get to your files again.

 

 

QUESTION 443

You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits:

 

The Disk Management console (Click the Exhibit button.)

clip_image005

 

The System Properties window (Click the Exhibit button.)

clip_image003[1]

 

The System protection for Local Disk C window (Click the Exhibit button.)

 

clip_image004[1]

 

You share your Documents library over a network. You discover that one of the files was deleted from the library by a network user. You need to restore the most recent version of the deleted file.

What should you do?

 

A.

Delete restore points.

B.

Create a restore point.

C.

Perform a system restore.

D.

Search for the file in the Recycle Bin.

E.

Increase disk space used for system protection.

F.

Copy the file from a previous version of a folder.

G.

Set restore settings to only restore previous versions of files.

H.

Run the cipher /x command from the elevated command prompt,

I.

Run the vssadmin list volumes command from the elevated command prompt.

J.

Run the vssadmin list shadows command from the elevated command prompt,

K.

Run the compact /U <file_name> command from the elevated command prompt.

 

Correct Answer: F

Explanation:

Note: To restore a previous version of a file or folder that’s included in a library, right-click the file or folder in the location where it’s saved, rather than in the library. For example, to restore a previous version of a picture that’s included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions.

 

 

QUESTION 444

You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits:

 

The Disk Management console (Click the Exhibit button.)

clip_image006

 

The System Properties window (Click the Exhibit button.)

 

clip_image003[2]

 

The System protection for Local Disk C window (Click the Exhibit button.)

 

clip_image004[2]

 

You share your Documents library over a network. You discover that one of the files in the library was replaced with a previous version and then renamed. You need to restore the most recent version of the original file. What should you do?

 

A.

Delete restore points.

B.

Create a restore point.

C.

Perform a system restore.

D.

Search for the file in the Recycle Bin.

E.

Increase disk space used for system protection.

F.

Copy the file from a previous version of a folder.

G.

Set restore settings to only restore previous versions of files.

H.

Run the cipher /x command from the elevated command prompt,

I.

Run the vssadmin list volumes command from the elevated command prompt.

J.

Run the vssadmin list shadows command from the elevated command prompt,

K.

Run the compact /U <file_name> command from the elevated command prompt.

 

Correct Answer: F

Explanation:

Note: To restore a previous version of a file or folder that’s included in a library, right-click the file or folder in the location where it’s saved, rather than in the library. For example, to restore a previous version of a picture that’s included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions.

 

 

QUESTION 445

You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits:

 

The Disk Management console (Click the Exhibit button.)

clip_image007

 

The System Properties window (Click the Exhibit button.)

 

clip_image003[3]

 

The System protection for Local Disk C window (Click the Exhibit button.)

 

clip_image004[3]

 

You share the Pictures library over a network. You discover that a JPEG image file located in the library was moved by a network user into a ZIP archive and is protected by using a password.

You need to open the image file. What should you do?

 

A.

Delete restore points.

B.

Create a restore point.

C.

Perform a system restore.

D.

Search for the file in the Recycle Bin.

E.

Increase disk space used for system protection.

F.

Copy the file from a previous version of a folder.

G.

Set restore settings to only restore previous versions of files.

H.

Run the cipher /x command from the elevated command prompt,

I.

Run the vssadmin list volumes command from the elevated command prompt.

J.

Run the vssadmin list shadows command from the elevated command prompt,

K.

Run the compact /U <file_name> command from the elevated command prompt.

 

Correct Answer: F

Explanation:

Note: To restore a previous version of a file or folder that’s included in a library, right-click the file or folder in the location where it’s saved, rather than in the library. For example, to restore a previous version of a picture that’s included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions.

 

 

QUESTION 446

DRAG DROP

Windows 7 client computers in your company network are assigned IP addresses manually or by using DHCP. Recent changes have been made to a DHCP Server scope. Desktops that have manually assigned IP addresses are reporting that they can no longer connect to the Internet.

You need to ensure that all client computers receive IP address and DNS servers’ addresses from the DHCP server. Which commands should you run? (To answer, move the appropriate commands from the list of commands to the answer area and arrange them in the correct order.)

 

clip_image009

 

Correct Answer:

clip_image011

 

 

QUESTION 447

You administer client computers that have Windows 7 Enterprise installed. A server named Server1 has an IP address of 10.10.4.56. The server accepts Remote Desktop connections at a custom port 10876. You need to connect to the server from a client computer by using Remote Desktop. What should you do?

 

A.

From an elevated command prompt, run mstsc.exe 10.10.4.56 port: 10876.

B.

From the Advanced tab of your Remote Desktop connection, configure the port of Server1 in the Connect from anywhere option.

C.

From the General tab of your Remote Desktop connection, type 10.10.4.56:10876 in the Computer field.

D.

From the Advanced tab of your Remote Desktop connection, configure the IP address and port of Server1 as the RD Gateway Server.

 

Correct Answer: C

Explanation:

clip_image012

 

Note:

* mstsc.exe allows you to initiate terminal services commands via the command line, and forms an important part of this additional Windows service.

Incorrect:

Not A: Incorrect syntax.

 

 

QUESTION 448

You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:Software. User1 is a local user account on the computer. The account is a member of several groups that have access to the C:Software folder. You need to verify whether User1 can save files to C:Software. What should you do?

 

A.

Run the Net Share command.

B.

Run the Wfs C:Software command.

C.

In the Advanced Security Settings for the Documents folder, select the Effective Permissions tab.

D.

Run the Fsutil C:Software command.

 

Correct Answer: C

Explanation:

To view effective permissions on files and folders

Open Windows Explorer, and then locate the file or folder for which you want to view effective permissions.

Right-click the file or folder, click Properties, and then click the Security tab.

Click Advanced, click the Effective Permissions tab, and then click Select.

In Enter the object name to select (examples), enter the name of a user or group, and then click OK. The selected check boxes indicate the effective permissions of the user or group for that file or folder.

 

 

QUESTION 449

You have a computer that runs Windows 7. The computer is a member of a workgroup. You use Encrypting File System (EFS) to protect your local files. You need to ensure that you can decrypt EFS files on the computer if you forget your password. What should you do?

 

A.

Create an EFS Data Recovery Agent by using Group Policy.

B.

From User Accounts, select Manage your file encryption certificates.

C.

Run the cipher.exe /adduser /user:administrator command.

D.

Run the manage-bde -on C: -RecoveryPassword password command.

 

Correct Answer: A

Explanation:

Data Recovery Agent (DRA) is a user account that has been granted permissions to access all encrypted files even if the files have been encrypted using encryption key of another user account of the computer. Administrators must create and configure Data Recovery Agents before allowing users to encrypt their files. This serves as a proactive step taken by the administrators as once user account that has encrypted the file has been deleted from the computer, in the absence of DRA the files cannot be recovered whatsoever.

 

 

QUESTION 450

You administer computers that have Windows 7 and Internet Explorer 8 installed. You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. You need to ensure that any data about your browser session is not saved on the computer. What should you do?

 

A.

Disable Internet Connection Sharing.

B.

From Internet Options, select Delete browsing history on exit.

C.

Start the Microsoft Network Access Protection service.

D.

From the Safety drop-down menu, configure InPrivate Filtering.

 

Correct Answer: B

 

Instant Access to Download Testing Software & PDF File for Microsoft 70-680 Real Exam

Instant Access to Try Microsoft 70-680 Free Demo