Certshared
2017 Microsoft Official New Released 70-680 ♥♥
100% Free Download! 100% Pass Guaranteed!
http://www.certshared.com/exam/70-680/


It is more faster and easier to pass the Microsoft exam 70 680 exam by using Realistic Microsoft TS:Windows 7,Configuring questuins and answers. Immediate access to the Replace 70 680 exam Exam and find the same core area 70 680 pdf questions with professionally verified answers, then PASS your exam with a high score now.

Q286. - (Topic 5) 

You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. 

You need to analyze the performance of the computer to meet the following requirements: 

Include the CPU, Memory, and Disk subsystems. 

Display real-time performance. 

Obtain a list of users who have logged on by using the same tool. 

What should you do? 

A. Run powercfg.exe. 

B. Run the Windows Experience Index. 

C. Configure Event Viewer subscriptions. 

D. Open Task Manager. 

E. Open System Properties, and configure performance settings. 

F. Open System Properties, and configure environment variables. 

G. Open System Properties, and configure user profiles settings. 

H. Open System Properties, and configure the page file settings. 

I. Open Performance Monitor, and configure a Data Collector Set. 

J. Open Performance Monitor, and customize the System Monitor view. 

Answer:


Q287. - (Topic 5) 

You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. 

You need to analyze the performance of the computer to meet the following requirements: 

. Include the CPU, Memory, and Disk subsystems. 

. Collect information in a report. 

What should you do? 

A. Run powercfg.exe. 

B. Run the Windows Experience Index. 

C. Configure Event Viewer subscriptions. 

D. Open Task Manager. 

E. Open System Properties, and configure performance settings. 

F. Open System Properties, and configure environment variables. 

G. Open System Properties, and configure user profiles settings. 

H. Open System Properties, and configure the page file settings. 

I. Open Performance Monitor, and configure a Data Collector Set. 

J. Open Performance Monitor, and customize the System Monitor view. 

Answer:


Q288. - (Topic 3) 

You have a computer that runs Windows 7. 

You enable Advanced Audit Policy Configuration in the Local Computer Policy and discover that the policy is not applied. 

You need to ensure that Advanced Audit Policy Configuration is applied on the computer. 

What should you do? 

A. Restart the computer. 

B. Run Gpupdate /force. 

C. Enable the Security Settings policy option. 

D. Run Secedit /refreshpolicy machine_policy. 

Answer:


Q289. - (Topic 3) 

You have a computer that runs Windows 7. The computer is a member of an Active Directory domain and has a shared printer. Users report that they can print to the shared printer, but they cannot delete their print jobs. 

You need to ensure that users can delete their own print jobs. 

What should you do? 

A. Restart the Print Spooler service. 

B. Stop sharing the local printer and then share it again. 

C. Assign the Manage Documents permission to SYSTEM. 

D. Assign the Manage Documents permission to CREATOR OWNER. 

Answer:

Explanation: 

Manage Documents The user can pause, resume, restart, cancel, and rearrange the order of documents submitted by all other users. The user cannot, however, send documents to the printer or control the status of the printer. By default, the Manage Documents permission is assigned to members of the Creator Owner group. When a user is assigned the Manage Documents permission, the user cannot access existing documents currently waiting to print. The permission will only apply to documents sent to the printer after the permission is assigned to the user. 


Q290. - (Topic 6) 

A user has a new 3TB External USB hard disk. The user plugs it into a Windows 7 desktop and sets it up, but it only shows 2TB of space. Additionally, disk management shows 2TB of space on the disk. 

You need to make the full 3TB of space usable to the user. 

What should you do? 

A. Reformat the disk as an MBR disk. 

B. Reformat the disk as a GPT disk. 

C. Create a second partition and set it up to use the missing 1TB. 

D. Convert the disk to a dynamic disk and expand the partition to 3TB. 

Answer:

Explanation: Ref: http://technet.microsoft.com/en-us/library/dd183729(v=WS.10).aspx 


Q291. - (Topic 5) 

You administer a computer that has Windows 7 Enterprise installed. 

The computer reboots unexpectedly. You suspect that an unsigned driver causes the reboots. 

You need to view a list of all installed device drivers that contain information about the digital signature of the device driver. 

Which should you do? 

A. Run the driverquery.exe /SI command. 

B. Open the System Protection configuration for drive C. 

C. Open Device Manager, show hidden devices, and sort all devices by type. 

D. Run sigverif.exe and start the verification process of the device drivers. Then, review the generated log file. 

Answer:


Q292. - (Topic 2) 

You install an application named app1.exe on a computer 

After the installation the computer becomes unresponsive. 

You restart the computer and attempt to uninstall App1.exe. The uninstallation of App1.exe fails. 

You need to restore the computer to its previous functional state. You must achieve the goal by using the minimum amount of administration. 

What should you do? 

A. From Recovery, restore a system restore point. 

B. From the Previous Versions tab of App1.exe, click Restore button. 

C. Start the computer, press F8 and then use the Last Known Good Configuration. 

D. Create a system repair disc and then start the computer from the system repair disc. 

Answer:

Explanation: 

If you install an application that causes your computer to become unstable, you should first attempt to uninstall the application. If this does not solve the problem, you can restore system files and settings by performing a system restore to restore the computer to its last system restore point. A system restore returns a computer system to a selected restore point. System restores do not alter user files. Note that a system restore is not the same as a System Image restore. 

Windows 7 creates system restore points on a regular schedule and prior to events such as the installation of applications and drivers. A restore point contains information about registry settings and other system information. Windows 7 generates restore points automatically before implementing significant system changes. You can manually create restore points and restore a computer system to a selected restore point. If you install an application or driver that causes your computer to become unstable, you should first attempt to uninstall the application or roll back the driver. If this does not solve the problem, you can restore system files and settings by performing a system restore to restore the computer to its last system restore point. A system restore returns a computer system to a selected restore point. System restores do not alter user files. Note that a system restore is not the same as a System Image restore. 


Q293. - (Topic 2) 

You are investigating instability and boot problems on a computer running Windows 7 Enterprise. You boot using the Last Known Good Configuration (Advanced) option and perform a system restore. This does not solve your problems, and you want to undo the system restore. Can you do this, and what is the reason for your answer? 

A. No. You can undo a system restore only if you initiate it from the System Recovery tools. 

B. No. You can undo a system restore only if you carry it out after booting normally. 

C. Yes. You can always undo a system restore, no matter how you booted the computer or how you initiated the restore. 

D. Yes. You can undo a system restore that you perform after either booting normally or booting using Last Known Good Configuration (Advanced). 

Answer:


Q294. - (Topic 2) 

A remote user has a computer that runs Windows 7. The user reports that he receives several error messages while using an application. You do not have remote access to the user's computer. 

You need to tell the user how to create screenshots of the actions he performs on the computer. 

The solution must track the mouse actions that the user performs. What should you instruct the user to do? 

A. Press ALT+PrintScreen 

B. Run Psr.exe and then click Start Record 

C. From Mouse Properties, select Display pointer trails 

D. Run Snippingtool.exe, click New, and then click Window Snip 

Answer:

Explanation: 

How do I use Problem Steps Recorder?You can use Problem Steps Recorder to automatically capture the steps you take on a computer, including a text description of where you clicked and a picture of the screen during each click (called a screen shot). Once you capture these steps, you can save them to a file that can be used by a support professional or someone else helping you with a computer problem.NotesWhen you record steps on your computer, anything you type will not be recorded. If what you type is an important part of recreating the problem you're trying to solve, use the comment feature described below to highlight where the problem is occurring. 


Q295. - (Topic 5) 

A network has a main office and a branch office. 

The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled. 

Users at the branch office report that it takes several minutes to open large files located in the main office. 

You need to minimize the amount of time it takes for branch office users to open files located in the main office. 

What should you do? 

A. At the main office, configure the servers to use Distributed File System Replication (DFSR). 

B. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers. 

C. At the branch office, configure the client computers to use BranchCache Hosted Cache mode. 

D. At the branch office, configure the client computers to use BranchCache Distributed Cache mode. 

Answer:


Q296. - (Topic 5) 

You are performing a native VHD boot from Windows Vista to Windows 7 Professional. Windows 7 Professional is installed on F: \\Windows7Pro.vhd. 

You run the bcdedit /copy {current} /d "Windows 7 VHD" command. The boot configuration data is enumerated as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that the following requirements are met: 

. Both operating systems are bootable after the Power On Self-Test (POST). 

. Windows 7 VHD is selected as the default boot entry. 

Which three commands should you run? (Each correct answer presents part of the solution. Choose three.) 

A. Bcdedit /default {ded5a252-7077-11e0-8ac8-a2d217dce703} 

B. Bcdedit /set {ded5a24e-7077-11e0-8ac8-a2d217dce703} osdevice vhd=[f:]\\Windows7Pro.vhd 

C. Bcdboot C:\\windows /s E: 

D. Bcdedit /set {ded5a24e-7077-11e0-8ac8-a2d217dce703} device vhd=[f:]\\Windows7Pro.vhd 

E. Bcdedit /set {ded5a252-7077-11e0-8ac8-a2d217dce703} device vhd=[f:]\\Windows7Pro.vhd 

F. Bcdedit /default {current} 

G. Bcdedit /set {ded5a252-7077-11e0-8ac8-a2d217dce703} osdevice vhd=[f:]\\Windows7Pro.vhd 

Answer: A,E,G 


Q297. - (Topic 5) 

You administer client computers that have Windows 7 Enterprise installed. 

A server named Server1 has an IP address of 10.10.4.56. The server accepts Remote Desktop connections at a custom port 10876. 

You need to connect to the server from a client computer by using Remote Desktop. 

What should you do? 

A. From an elevated command prompt, run mstsc.exe 10.10.4.56 port: 10876. 

B. From the Advanced tab of your Remote Desktop connection, configure the port of Server1 in the Connect from anywhere option. 

C. From the General tab of your Remote Desktop connection, type 10.10.4.56:10876 in the Computer field. 

D. From the Advanced tab of your Remote Desktop connection, configure the IP address and port of Server1 as the RD Gateway Server. 

Answer:

Explanation: 

Note: 

* mstsc.exe allows you to initiate terminal services commands via the command line, and forms an important part of this additional Windows service. 

Incorrect: 

Not A: Incorrect syntax. 


Q298. - (Topic 5) 

You use a portable computer that has Windows 7 Enterprise SP1 installed. 

A conference room at your company has a network projector installed on a server within the company network. 

You need to connect to the projector from your computer. 

What should you do? 

A. From Screen Resolution, click Connect to a projector. 

B. From Accessories, click Connect to a Network Projector. 

C. From Network and Sharing Center, create a temporary network and run Displayswitch.exe. 

D. From Device Manager, click Add legacy hardware. 

Answer:


Q299. - (Topic 5) 

You administer client computers that have Windows 7 Enterprise installed for the marketing department of your company. The client computers are members of a single Active Directory domain. All regular client computer user accounts are members of the domain security group named Marketing. 

You install a new printer on one of the client computers. You remove the Everyone group from the access control list (ACL) for the printer, and then share the printer. 

You need to achieve the following goals: 

. Prevent members of the Marketing group from modifying the print jobs of other users. 

. Ensure that members of the Marketing group can modify the print jobs that they submit. 

What should you do? 

A. Modify local Group Policy on the desktops and disable the Point and Print Restrictions user right to the Marketing group. 

B. From the printer's properties, assign the Print permission to the Marketing group. 

C. From the printer's properties, assign the Manage Documents permission to the Marketing group. 

D. Modify local Group Policy on the desktops and assign the Take ownership of files or other objects user right to the Marketing group. 

Answer:


Q300. - (Topic 1) 

You have a computer that runs Windows 7. 

Your network contains a DHCP server that runs Windows Server 2008 R2. 

The server is configured as a Network Access Protection (NAP) enforcement point. 

You need to configure the computer as a NAP client. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From Services, set the Netlogon service Startup Type to Automatic. 

B. From Services, set the Network Access Protection Agent service Startup Type to Automatic. 

C. From the NAP Client Configuration console, configure the user interface settings. 

D. From the NAP Client Configuration console, enable the DHCP Quarantine Enforcement Client. 

Answer: B,D 

Explanation: 

Network Access Protection Network Access Protection (NAP) is a feature in Windows Server 2008 that controls access to network resources based on a client computer's identity and compliance with corporate governance policy. NAP allows network administrators to define granular levels of network access based on who a client is, the groups to which the client belongs, and the degree to which that client is compliant with corporate governance policy. If a client is not compliant, NAP provides a mechanism to automatically bring the client back into compliance and then dynamically increase its level of network access.NAP Client ConfigurationNetwork Access Protection (NAP), a new feature in Windows Vista. and Windows Server. 2008, allows you to control the access of client computers to network resources based on computer identity and compliance with corporate governance policy. To implement NAP, you must configure NAP settings on both servers and client computers. There are three tools that you can use to configure NAP client settings: The NAP Client Configuration console provides a graphical user interface with which you can configure NAP client settings on the local computer or in a configuration file that you can save and apply to other computers. The Netsh commands for NAP client provide a command-line tool that you can use to configure client computers or to create a configuration file that you can save and apply to other computers. If you want to manage NAP client settings on domain member client computers, you can use the Group Policy Management Console and the Group Policy Management Editor. When you configure NAP client settings in Group Policy, these settings are applied on NAP-capable domain member client computers when Group Policy is refreshed.To enable and disable the DHCP enforcement client by using the Windows interface 

1. To open the NAP Client Configuration console, click Start, click All Programs, click Accessories, click Run, type NAPCLCFG.MSC, and then click OK. 

2. Click Enforcement Clients. 

3. Right-click DHCP Enforcement Client, and then click Enable or Disable.Network Access Protection Agent 

The Network Access Protection (NAP) agent service collects and manages health information for client computers on a network. Information collected by NAP agent is used to make sure that the client computer has the required software and settings. If a client computer is not compliant with health policy, it can be provided with restricted network access until its configuration is updated. Depending on the configuration of health policy, client computers might be automatically updated so that users quickly regain full network access without having to manually update their computer.