Free Braindump2go Microsoft 70-680 Certification Exam Practice Tests Download (181-190)

100% Pass 70-680 Real Test is not a dream! Braindump2go Latest Released 70-680 Exam Practice Exam Dumps will help you pass 70-680 Exam one time easiluy! Free Sample Exam Questions and Answers are offered for free download now! Quickly having a try today! Never loose this valuable chance!

Vendor: Microsoft
Exam Code: 70-680
Exam Name: TS: Windows 7, Configuring

Keywords: 70-680 Exam Dumps,70-680 Practice Tests,70-680 Practice Exams,70-680 Exam Questions,70-680 PDF,70-680 VCE Free,70-680 Book,70-680 E-Book,70-680 Study Guide,70-680 Braindump,70-680 Prep Guide

QUESTION 181
A company has client computers that run Windows Vista.
You need to install Windows 7 on a client computer in a dual-boot configuration with the existing Windows Vista installation, without reducing the size of the partition that contains Windows Vista.
Which actions should you perform in sequence?
(To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
 
Answer:
 

QUESTION 182
You have 15 computers that run Windows 7.
You need to implement a monitoring solution that meets the following requirements:
– Sends an e-mail notification when an application error is logged in the event log.
– Runs a script to restart the computer if an application error occurs between 17:00 and 07:00.
– Minimizes the administrative effort required to monitor applications.
What should you do?

A.    On all the computers, configure a custom view.
Configure a custom task for the application error events.
B.    On a computer, configure a custom view to display the application errors.
Configure a custom task for the application error events.
C.    On a central computer, configure an event subscription.
On all of the computers, configure a custom task in the Forwarded Events log.
D.    On all the computers, configure an event forwarding to a central computer.
On the central computer, configure a custom task in the Forwarded Events log.

Answer: D
Explanation:
Event ForwardingEvent forwarding enables you to transfer events that match specific criteria to an administrative (or collector) computer. This enables you to manage events centrally. A single event log on the collector computer holds important events from computers anywhere in your organization. You do not need to connect to the local event logs on individual computers.
SubscriptionsIn a source-initiated subscription (sometimes termed a source computer-initiated subscription), the computer on which an event is generated (the source computer) sends the event to the collector computer. You would use a source-initiated subscription when you have a large number of source computers and you configure these computers through Group Policy.

QUESTION 183
You have a computer that runs Windows 7.
You have a system image of the computer.
You need to restore a single file from the system image.
You must achieve the goal using minimum administrative effort.
What should you do?

A.    From Disk Management, select Attach VHD.
B.    From the Backup and Restore, select Restore my files.
C.    Restart the computer and run system restore.
D.    Restart the computer and run system image recovery.

Answer: A
Explanation:
Attach VHD:
Attaching a VHD activates the VHD so that it appears on the host computer as a local hard disk drive. This is sometimes called “surfacing a VHD” because the VHD is now visible to users. If the VHD already has a disk partition and file system volume when you attach it, the volume inside the VHD is assigned a drive letter. The assigned drive letter is then available for use, similar to when you insert a USB flash drive into a USB connector. All users (not just the current user) can use the attached VHD in the same way they use other volumes on local physical hard disk drives (depending on security permissions). Furthermore, because you can attach a VHD that is located on a remote server message block (SMB), you can manage your images remotely. Once attached the single file can be restored. The other answers are overkill or replace all files not just the one required.
http://technet.microsoft.com/en-us/library/dd440865%28WS.10%29.aspx
What is system protection?
System protection is a feature that regularly creates and saves information about your computer’s system files and settings. System protection also saves previous versions of files that you’ve modified. It saves these files in restore points, which are created just before significant system events, such as the installation of a program or device driver. They’re also created automatically once every seven days if no other restore points were created in the previous seven days, but you can create restore points manually at any time.
System protection is automatically on for the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
There are two ways that you can take advantage of system protection:
* If your computer is running slowly or isn’t working properly, you can use System Restore to return your computer’s system files and settings to an earlier point in time using a restore point.
* If you accidentally modify or delete a file or folder, you can restore it to a previous version that’s saved as part of a restore point.

QUESTION 184
You administer desktops that have 32-bit and 64-bit versions of Windows 7 Enterprise SP1 installed. All desktops have a single CD-RW drive. The local hard disk drives on all computers are partitioned with a recovery partition and a single logical drive C.
You need to be able to restore Windows boot files on any of The desktops if the boot files become corrupted.
Which two actions should you perform?
(Each correct answer presents a part of the solution. Choose two.)

A.    A. Create a system image of a Windows 7 Enterprise 64-bit desktop
B.    Create a system repair disk on a Windows 7 Enterprise 64-bit desktop.
C.    Restart Windows 7 Enterprise 64-bit desktops. Select the Disable Driver Signature Enforcement option
from the Advanced Boot Options menu.
D.    Enable system protection on the recovery partition on 64-bit desktops.
E.    Create a system repair disk on a Windows 7 Enterprise 32-bit desktop.
F.    Create a system image of a Windows 7 Enterprise 32-bit desktop.
G.    Enable system protection on the recovery partition on 32-bit desktops.

Answer: BE
Explanation:
http://windows.microsoft.com/en-US/windows7/Create-a-system-repair-disc

QUESTION 185
You administer a computer that has Windows 7 and Internet Explorer 8 installed.
You discover that two users have installed a new toolbar into their browsers.
The toolbar is using an unapproved search engine.
You need to prevent the users from using the unapproved search engine.
What should you do?

A.    From programs and features in the control panel, uninstall the toolbar.
B.    From Internet Explorer, delete the browsing history and locally stored files.
C.    Start Internet Explorer in an InPrivate Browsing session.
D.    From an elevated command prompt, run %systemdrive%\program files\Internet explorer\iecleanup.exe.

Answer: A

QUESTION 186
You have a computer that runs Windows 7.
You need to provide standard users the ability to update the drivers for display adapters.
What should you modify from the Local Group Policy?

A.    Driver installation settings for the user
B.    Device installation settings for the computer
C.    Driver installation settings for the computer
D.    Display settings for the user

Answer: C
Explanation:
To Update the Drivers you need permissions to install drivers. Apply this to the computer for all local users, as opposed to only one user.

QUESTION 187
You administer a computer that has Windows 7 Enterprise installed. The computer has an application that must run by using administrative permissions. A user who has a standard user account connect to the computer by using a Remote Desktop Connection.
The user right-clicks the application shortcut, but the Run as administrator option is unavailable. You need to ensure that the user is able to run the application by using administrative permissions. What service should you configure? (To answer, select the appropriate option or options in the answer area.)
 
Answer:
 

QUESTION 188
You administer client computers that have Windows 7 Professional SP1 64-bit installed. All the computers are members of a single Active Directory domain.
You need to prevent users from installing non-trusted device drivers.
What should you do?

A.    Enable the Code signing for device drivers in a domain Group Policy.
B.    Disable the Code signing for device drivers in a domain Group Policy.
C.    Add each user to a Domain Admins group.
D.    Run the sigverif.exe command on each computer.

Answer: A
Explanation:
Can’t see any of the rest PREVENTING users from installing non trusted devices – but Sigverig does highlight them.

QUESTION 189
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
A company has client computers that run Windows 7 Enterprise.
A user is asked to remove encryption from a locally saved folder so that other users can read and write to that folder.
You need to verify that the folder is not encrypted with the Encrypting File System (EFS).
What should you use to accomplish this goal?

A.    Device Manager
B.    Local Users and Groups
C.    The User Account Control Settings Control Panel window
D.    The Icacls command
E.    The Group Policy Management console
F.    Share permissions
G.    The Netsh command
H.    The Services Management console
I.    The Folder Properties window

Answer: I
Explanation:
http://technet.microsoft.com/en-us/windows/how-do-i-get-started-with-the-encrypting-file- system-in-windows-7.aspx

QUESTION 190
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
A company has client computers that run Windows 7 Enterprise.
You need to ensure that only signed and validated executable files are run with elevated privileges.
What should you use to accomplish this goal?

A.    The Group Policy Management console
B.    The Netsh command
C.    The Service Management console
D.    The Folder Properties window
E.    Share permissions
F.    The Icacls command
G.    Device Manager
H.    The User Account Control Settings Control Panel windows
I.    Local Users and Groups

Answer: A


Braindump2go New Updated 70-680 Exam Dumps are Complete Microsoft 70-680 Course Coverage! 100% Real Questions and Correct Answers Guaranteed! Updated 70-680 Preparation Material with Questions and Answers PDF Instant Download:

http://www.braindump2go.com/70-680.html