70-680 Guide

Questions Ask for 70 680 exam

Q221. - (Topic 2) 

You have a computer that runs Windows Vista. 

You install Windows 7 on a new partition on the computer. 

You need to ensure that the computer always starts Windows Vista by default. 

What should you do? 

A. Run Bcdedit.exe and specify the /default parameter. 

B. Run Bcdedit.exe and specify the /bootems parameter. 

C. Create a boot.ini file in the root of the Windows 7 partition. 

D. Create a boot.ini file in the root of the Windows Vista partition. 

Answer:

Explanation: 

The Bcdedit.exe utility allows you to manage boot configuration./default - Sets the default entry that the boot manager willl use./bootems - Enable or disables Emergency Management Services for a boot application.NOT boot.ini:Windows (specifically Ntldr) uses 


Q222. - (Topic 3) 

You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. 

Computer1 has a custom application installed. You create a custom XML file named app1.xml that contains the migration settings for the application. 

You need to migrate the configuration and application data for the custom application from Computer1 to Computer2. 

What should you do? 

A. On Computer1, run Loadstate.exe /l:app1. On Computer2, run Scanstate.exe /l:app1.xml. 

B. On Computer1, run Scanstate.exe /i:app1.xml. On Computer2, run Loadstate.exe /i:app1.xml. 

C. On Computer1, run Loadstate.exe /keyfile:app1.xml. On Computer2, run Loadstate.exe /keyfile:app1.xml. 

D. On Computer1, run Scanstate.exe /genconfig:app1.xml. On Computer2, run Loadstate.exe /config:app1.xml. 

Answer:

Explanation: 

User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState. (include) /i:[Path\]FileName Specifies an .xml file that contains rules that define what user, application or system state to migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml, MigUser.xml and any custom .xml files that you create). Path can be either a relative or full path. If you do not specify the Path variable, then FileName must be located in the current directory. 


Q223. - (Topic 2) 

You have a computer that runs Windows Vista (x86). 

You need to perform a clean installation of Windows 7 (64-bit). 

What should you do? 

A. From the Windows 7 installation media, run Rollback.exe. 

B. From the Windows 7 installation media, run Migsetup.exe. 

C. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option. 

D. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Custom (advanced) option. 

Answer:

Explanation: 

When you are performing a clean installation, you should select Custom (Advanced). Almost all installations ofm Windows 7 that you will perform will be of the Custom (Advanced) type rather than upgrades. You can initiate upgrade installations only from within Windows Vista or Windows 7.NOT Rollback, Migsetup, or Upgrade:Specified clean installation not migration, update or rollback. 


Q224. - (Topic 4) 

Your company network includes client computers that have Windows 7 installed. The computers are members of an Active Directory domain and receive Windows Firewall configuration through Group policy. 

A user indicates that he is unable to connect to a remote FTP server. 

You need to view the status of TCP/UDP ports at the user's computer. 

Which command should you run? 

A. netstat -o 

B. netstat -a 

C. ipconfig /all 

D. netstat –an 

Answer:


Q225. - (Topic 5) 

You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:\Software. 

User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folder. 

You need to verify whether User1 can save files to C:\Software. 

What should you do? 

A. View the User Account Control Settings Control Panel window. 

B. Run the Net Share command. 

C. View the Share permissions on C:\Software. 

D. In the Advanced Security Settings for the Documents folder, select the Effective Permissions tab. 

Answer:

Explanation: To view effective permissions on files and folders 

Open Windows Explorer, and then locate the file or folder for which you want to view effective permissions. 

Right-click the file or folder, click Properties, and then click the Security tab. 

Click Advanced, click the Effective Permissions tab, and then click Select. 

In Enter the object name to select (examples), enter the name of a user or group, and then click OK. The selected check boxes indicate the effective permissions of the user or group for that file or folder. 


Q226. - (Topic 3) 

You are the administrator of a computer named Computer1 that runs Windows 7. Several users share Computer1. The users plan to encrypt files on the computer. 

You need to ensure that you can access all encrypted files on the computer. 

What should you do first? 

A. At a command prompt, run Cipher.exe. 

B. At a command prompt, run Certutil.exe. 

C. From the local computer policy, modify the User Rights Assignment. 

D. From User Accounts, run the Manage your file encryption certificates wizard. 

Answer:

Explanation: 

Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed. When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software. 

If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. 

/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521. 


Q227. - (Topic 2) 

You have a computer that runs Windows 7. The computers hard disks are configured as shown in the following table. 

You need to ensure that you can recover the operating system and all the files on the computer if both hard disks fail. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Create a system image. 

B. Create a system repair disc. 

C. Shrink C and then create a new partition. 

D. Connect an external hard disk to the computer. 

Answer: A,D 

Explanation: 

A System Image is a copy of all the files and folders on the system disk (and other specified hard disks) on a computer. You can use a System Image backup to restore the computer to exactly what its configuration was when the System Image backup was created. 

External hard drives can be removed and stored in a secure location.NOT System Repair Disc:A system repair disc can be used to boot your computer. It also contains Windows system recovery tools that can help you recover Windows from a serious error or restore your computer from a system image. It does not actually save the data and will only help if a system image exists elsewhere.NOT Shrink: All partitions are inaccessible is a hard disk fails. 


Q228. - (Topic 6) 

Your company network has a single-domain Active Directory forest. The forest functional level is set to Windows Server 2008 R2. All computers are members of the domain. 

You plan to deploy Windows BitLocker Drive Encryption (BitLocker) on portable computers that have Windows 7 Enterprise installed. 

You need to be able to automatically back up recovery passwords for BitLocker-protected disk volumes on the portable computers. 

What should you do before you start encrypting the disk volumes with BitLocker? 

A. Run the cscript Get-BitLockerRecoverylnfo.vbs script on the portable computers. 

B. Select the Turn on BitLocker backup to Active Directory option in local policy on the portable computers. 

C. Run the cscript List-ACEs.vbs script on the portable computers. 

D. Run the Idifde -i -v -f BitLockerTPMSchemaExtension.Idf -c script on a domain controller. 

Answer:


Q229. - (Topic 2) 

You have a computer that runs Windows 7. 

The computer is configured to use an intranet Microsoft update service location. 

You need to view the name of the intranet service location. 

What should you do? 

A. At a command prompt, run Wusa.exe. 

B. Open Event Viewer and examine the Application log. 

C. Open Windows Update and click View update history. 

D. Review the contents of the C:\windows\windowsupdate.log file. 

Answer:

Explanation: 

WindowsUpdate.log Provides information about when the Windows Update Agent connects to the WSUS server and retrieves the software updates for compliance assessment and whether there are updates to the agent components. 


Q230. - (Topic 1) 

You have a computer named Computer1 that runs Windows Vista and a computer named Computer2 that runs Windows 7. You plan to migrate all profiles and user files from Computer1 to Computer2. 

You need to identify how much space is required to complete the migration. 

What should you do? 

A. On Computer1 run Loadstate c:\store /nocompress 

B. On Computer1 run Scanstate c:\store /nocompress /p 

C. On Computer2 run Loadstate \\computer1\store /nocompress 

D. On Computer2 run Scanstate \\computer1\store /nocompress /p 

Answer:

Explanation: 

ScanState You run ScanState on the source computer during the migration. You must run ScanState.exe on computers running Windows Vista and Windows 7 from an administrative command prompt. When running ScanState on a source computer that has Windows XP installed, you need to run it as a user that is a member of the local administrators group. The following command creates an encrypted store named Mystore on the file share named Migration on the file server named Fileserver that uses the encryption key Mykey: scanstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /o /config:config.xml /encrypt /key:"mykey" Space Estimations for the Migration StoreWhen the ScanState command runs, it will create an .xml file in the path specified. This .xml file includes improved space estimations for the migration store. The following example shows how to create this .xml file: Scanstate.exe C:\MigrationLocation [additional parameters] /p:"C:\MigrationStoreSize.xml" To preserve the functionality of existing applications or scripts that require the previous behavior of USMT, you can use the /p option, without specifying "pathtoafile", in USMT 4.0. If you specify only the /p option, the storage space estimations are created in the same manner as with USMT 3.x releases. User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState. 


To know more about the 70-680, click here.

Tagged as : Microsoft 70-680 Dumps, Download 70-680 pdf, 70-680 VCE, 70-680 pass4sure, examcollection 70-680