You are on page 1of 18

Microsoft

70-680
Windows 7, Configuring

http://killexams.com/pass4sure/exam-detail/70-680
DEMO
Find some pages taken from full version

Following pages are for demo purpose only. Demo pages are randomly taken from full version.
Full version can be different from the demo version.
You can request the updated Demo by contacting support@killexams.com.

For Details about Full version Click http://killexams.com/pass4sure/exam-detail/70-680


QUESTION: 151
You are deploying a number of Windows 7 laptops. You create a custom power plan on one
of the laptops that you want to replicate to the other laptops by using an unattended setup.
You need to capture the power plan from the configured laptop for use in the deployment of
the other laptops, save it to the removable drive F:, and name it MobileScheme. What should
you do?

A. Run the command powercfg duplicatescheme <GUID> F:\MobileScheme.pow from an


elevated command prompt.
B. Run the command powercfg -EXPORT F:\MobileScheme.pow {GUID} from an elevated
command prompt.
C. Run the command powercfg -S F:\MobileScheme.pow from an elevated command
prompt.
D. Create a power plan from the Power Options control panel and save it to the F: drive as
MobileScheme.

Answer: B

QUESTION: 152
You have an answer file named Unattend.xml for a Windows 7 automated installation. You
need to perform an unattended installation of Windows 7 by using the answer file. What
should you do?

A. Name the answer file as unattend.xml and save it to a floppy disk. Start the computer from
the Windows Preinstallation Environment (WinPE).
B. Name the answer file as unattend.xml and save it to a USB disk. Start the computer from
the Windows Preinstallation Environment (WinPE).
C. Name the answer file as autounattend.xml and save it to a floppy disk. Start the computer
from the Windows 7 DVD.
D. Name the answer file as autounattend.ini and save it to a floppy disk. Start the computer
from the Windows 7 DVD.

Answer: C

Explanation:
Unattended installation You can perform an unattended installation of Windows 7 by using
an installation file called Unattend.xml. These installation files store answers to the questions
asked by the Setup Wizard. When the Windows 7 installation process starts, Windows
checks for attached USB storage devices that have this file in their root directory. Unattended
installations are suitable when you need to deploy Windows 7 to a large number of
computers because you do not have to interact with them manually, responding to prompts,
as the installation progresses.Building a Reference Installation You configure your reference
computer with a customized installation of Windows 7 that you then duplicate onto one or
more destination computers. You can create a reference installation by using the Windows
product DVD and (optionally) the answer file you created in the previous section. To install
your reference computer using an answer file, perform the following procedure: 1. Turn on
the reference computer. Insert the Windows 7 product DVD and the UFD containing the
answer file (Autounattend.xml) that you created in the previous section. Note that the use of
an answer file is optional, although it is the method Microsoft recommends. If you prefer,
you can install Windows 7 manually from the installation DVD-ROM. 2. Restart the
computer by pressing CTRL+ALT+DEL. You may have to override the boot order to boot
from the CD/DVD-ROM disk. If so, select the appropriate function key to override the boot
order during initial boot. Windows Setup (Setup.exe) starts automatically and searches the
root directory of all removable media for an answer file called Autounattend.xml. 3. After
Setup finishes, you can validate that all customizations were applied. For example, if you
included the optional Microsoft-Windows-IE-InternetExplorer feature and set the
Home_Page setting in your answer file, you can verify these settings by opening Internet
Explorer. 4. To prepare the reference computer for the user, you use the Sysprep utility with
the /generalize option to remove hardware-specific information from the Windows
installation and the /oobe option to configure the computer to boot to Windows Welcome
upon the next restart.

QUESTION: 153
You are the system administrator for a large manufacturing company. You and your team are
responsible for managing over 1,000 Windows 7 Professional desktop and laptop computers.
All computers are members of a Windows 2008 R2 Active Directory domain. You want to
utilize the Windows Remote Management Service available in Windows 7 Professional. You
plan to configure all desktop and laptop computers so that the Windows Remote
Management Service can manage them remotely. You need to run a command on each
Windows 7 computer so that you can configure the service. Which two commands can you
use to achieve this goal? (Each correct answer presents a complete solution. Choose two. )

A. Mstsc /v:computername configure


B. Enable-PSRemoting -force
C. Psexec Wcomputername -enable
D. Winrm quickconfig

Answer: B, D

Explanation:
B: To configure Windows PowerShell for remoting, type the following command:
Enable-PSRemoting force D:
*When you are working with computers in workgroups or homegroups, you must either use
HTTPS as the transport or add the remote machine to the TrustedHosts configuration
settings. If you cannot connect to a remote host, verify that the service on the remote host is
running and is accepting requests by running the following command on the remote host:
winrm quickconfig
This command analyzes and configures the WinRM service.
* The Windows PowerShell remoting features are supported by the WS-Management
rotocol and the Windows Remote Management (WinRM) service that implements WS-
Management in Windows.
Incorrect: Not C:
* PsExec is a light-weight telnet-replacement that lets you execute processes on other
systems, complete with full interactivity for console applications, without having to manually
install client software. PsExec's most powerful uses include launching interactive command-
prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not
have the ability to show information about remote systems.
* psexec [\\computer[,computer2[,. . . ] | @file]][-u user [-p psswd][-n s][-r servicename][-
h][- l][-s|-e][-x][-i session]
][-c [-f|-v]][-w directory][-d][-][-a n,n,. . . ] cmd [arguments]

QUESTION: 154
DRAG DROP
An employee has a Windows Vista SP1 32-bit computer that uses legacy devices. You need
to upgrade the computer to Windows 7 32-bit based on the following requirements:
Ensure application and third-party hardware compatibility.
Preserve existing applications, settings, and documents.
Which three actions should you perform in sequence? (To answer, move the appropriate
three actions from the list of actions to the answer area and arrange them in the correct order.
)
Answer:

QUESTION: 155
DRAG DROP
You capture a Windows Image (.wim) file from a reference computer. You want to use
Windows Deployment Services (WDS) in an unattended mode to deploy the image f\\e to
target desktops. You need to encrypt an administrator account password in the answer file
used for the image deployment. What should you do? (To answer, move the appropriate
actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:

QUESTION: 156
DRAG DROP
You work for Contoso. Ltd. as part of a Windows 7 deployment team You create a new
Windows Preinstallation Environment image. The image file is located at
N:\images\winpe_x86 and is named WinPE.wim. An unsigned driver is located at
N:\Drivers\Driverl.inf. You need to include the driver in the WinPE.wim image. Which four
actions should you perform in sequence? (To answer, move the appropriate four actions from
the list of actions to the answer area and arrange them in the correct order.)
Answer:

QUESTION: 157
HOTSPOT
A law firm's wireless network does not use IPv6 and provides IP addresses automatically to
connected clients. A visiting attorney arrives to perform a deposition. The attorney's
computer has never connected to the firm's wireless network. The attorney needs general
access to several websites but is unable to connect to the Internet. You collect information
from the computer's Device Manager, Network Connections, and Wireless Network
Connections. Device information is shown in the Device Manager exhibit. (Click the Exhibit
button.)
Network information is shown in the Network Connections exhibit. (Click the Exhibit
button.)
Wireless network information is shown in the Wireless Network Connections exhibit. (Click
the Exhibit button.)

You need to configure this attorney's laptop so it can access the Internet through the firms
wireless network. Consider each of the following statements. Does the information in the
three screenshots support the inference as stated? (This question is worth three points.)
Answer:

QUESTION: 158
A user in your company wants to upgrade a Windows Vista Business computer to Windows
7. You need to upgrade the computer to the minimum Windows 7 edition that meets the
following requirements:
BitLockerTo Go
DirectAccess
Which Windows 7 edition should you choose?

A. Windows 7 Home Premium


B. Windows 7 Professional
C. Windows 7 Home Basic
D. Windows 7 Ultimate

Answer: D

QUESTION: 159
A user has a new 3TB External USB hard disk. The user plugs it into a Windows 7 desktop
and sets it up, but it only shows 2TB of space. Additionally, disk management shows 2TB of
space on the disk. You need to make the full 3TB of space usable to the user. What should
you do?

A. Reformat the disk as an MBR disk.


B. Reformat the disk as a GPT disk.
C. Create a second partition and set it up to use the missing 1TB.
D. Convert the disk to a dynamic disk and expand the partition to 3TB.

Answer: C

Explanation:
http://technet.microsoft.com/en-us/library/dd183729(v=WS.10).aspx

QUESTION: 160
You are a network administrator for a law firm that has Windows 7 computers as part of a
domain. Users are not administrators of their own computers. A lawyer is working on a
critical case and wants to use a Windows 7 laptop to access a computer in the office. The
lawyer connects to the corporate VPN and receives a message that states that the lawyer does
not have permission to use Remote Desktop to connect to the computer. You need to allow
the lawyer to access the computer in the office. What should you do?

A. Upgrade the Remote Desktop Client application on the users laptop.


B. Add the user to the Remote Desktop Users group of the target computer.
C. Select Allow connections from computers running any version of Remote Desktop on the
Remote tab of the computer.
D. Allow Remote Desktop through Windows Firewall.

Answer: B

QUESTION: 161
HOTSPOT
A manufacturing company has Windows Vista and Windows XP computers. You are
responsible for upgrading all computers to Windows 7. You test the Windows 7 installation
on a Windows Vista computer. Early in the installation process, you are prompted to choose
the "Upgrade" option or the "Custom (Advanced)" installation option. You need to determine
which installation option is appropriate for the different computers in your company. In the
table below, identify the characteristics of the Upgrade and Custom installation options.
(Make only one selection in each column. This question is worth two points. )

Answer:
QUESTION: 162
DRAG DROP
You manage the Windows 7 Professional computers for a small architecture firm. All
computers operate in workgroup mode. The lead engineer asks you to enable employees to
share CAD files located on their desktop computers with all of the other members of the
firm. You create a HomeGroup on the lead engineer's computer. You need to configure the
rest of the computers in the firm to join this HomeGroup. Which four actions should you
perform in sequence? (To answer, move the appropriate four actions from the list of actions
to the answer area and arrange them in the correct order. 1)

Answer:
QUESTION: 163
DRAG DROP
Your organization has a Windows Server 2008 R2 server and Windows 7 Professional
computers. Two groups require access to new applications. Each group uses a different
application. You are adding 100 new computers to each group. You need to configure
Windows Firewall to allow each group to access its application. Which four steps should you
perform in sequence? (To answer, move the appropriate four actions from the list of actions
to the answer area and arrange them in the correct order. )

Answer:
QUESTION: 164
You have a computer that runs Windows 7. The computer is a member of a workgroup. You
use Encrypting File System (EFS) to protect your local files. You need to ensure that you can
decrypt EFS files on the computer if you forget your password. What should you do?

A. From User Accounts, select Manage your file encryption certificates.


B. From Credential Manager, select Back up vault.
C. From BitLocker Drive Encryption, select Manage BitLocker and Turn On BitLocker.
D. From Authorization Manager, modify the Authorization Manager options.

Answer: A

Explanation:
Make sure you have a backup of the appropriate encryption certificates

QUESTION: 165
You have a computer that runs Windows 7. The network contains a monitoring server named
Server1. The computer runs a monitoring service named Service1. Service1 uses Remote
Procedure Calls (RPCs). You need to ensure that Service1 can receive requests from Server1.
What should you do?

A. From Windows Firewall with Advanced Security, create a predefined rule.


B. From Windows Firewall with Advanced Security, create a custom rule.
C. From Network and Sharing Center, modify the network location settings.
D. From Network and Sharing Center, modify the advanced sharing settings.

Answer: B

Explanation:
Creating WFAS Rules The process for configuring inbound rules and outbound rules is
essentially the same: In the WFAS console, select the node that represents the type of rule
that you want to create and then click New Rule. This opens the New Inbound (or Outbound)
Rule Wizard. The first page, allows you to specify the type of rule that you are going to
create. You can select between a program, port, predefined, or custom rule. The program and
predefined rules are similar to what you can create using Windows Firewall. A custom rule
allows you to configure a rule based on criteria not covered by any of the other options. You
would create a custom rule if you wanted a rule that applied to a particular service rather than
a program or port. You can also use a custom rule if you want to create a rule that involves
both a specific program and a set of ports. For example, if you wanted to allow
communication to a specific program on a certain port but not other ports, you would create a
custom rule.
For More exams visit http://killexams.com

Kill your exam at First Attempt....Guaranteed!

You might also like