The Only Tip You Need: 70 680 exam

Act now and download your Microsoft mcts 70 680 test today! Do not waste time for the worthless Microsoft 70 680 practice test tutorials. Download Rebirth Microsoft TS:Windows 7,Configuring exam with real questions and answers and begin to learn Microsoft mcts 70 680 with a classic professional.

Q211. - (Topic 3) 

You have a computer that runs Windows 7. The computer has two drives named C and D. Windows Backup is scheduled to run every day. The scheduled backup backs up a system image, all user, files, and drive D. Drive D fails. You replace the drive with a new drive. You need to recover the data on drive D by using the minimum amount of administrative effort. The solution must minimize downtime. 

What should you do? 

A. From Backup and Restore, click Restore all users files. 

B. From the properties of drive D, restore all previous versions. 

C. Open System Restore and apply the latest restore point. 

D. Start the computer from a system repair disc and restore a system image. 


Q212. DRAG DROP - (Topic 5) 

You deploy Windows 7 on client computers by using a default Windows 7 DVD. 

You discover that the client computers use the most recently released critical updates. 

You download the updates' package files from the Microsoft site to your desktop. 

You need to prepare a new installation DVD that includes the updates. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 


Q213. - (Topic 5) 

You manage several client computers in an organization. 

You need to ensure that all users, including administrators, are required to enter a username and password when uninstalling applications from any computer in the organization. 

What should you do? 

A. Create a custom GPO to modify the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting. 

B. Configure an AppLocker Windows Installer rule. 

C. Configure the User Account Control (UAC) settings on all client computers to always notify. 

D. Create a custom GPO to configure a software restriction policy. 


Q214. HOTSPOT - (Topic 6) 

A manufacturing company has Windows Vista and Windows XP computers. 

You are responsible for upgrading all computers to Windows 7. 

You test the Windows 7 installation on a Windows Vista computer. Early in the installation 

process, you are prompted to choose the "Upgrade" option or the "Custom (Advanced)" installation option. 

You need to determine which installation option is appropriate for the different computers in your company. 

In the table below, identify the characteristics of the Upgrade and Custom installation options. (Make only one selection in each column. This question is worth two points. ) 


Q215. - (Topic 1) 

You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You are in charge of two computers that are respectively named C01 and C02. C01 runs Windows 7 and C02 runs Windows XP Professional. 

On C01, you enable Remote Desktop as shown in the Remote Desktop exhibit. What action should you perform? 

A. You should enable the Allow connections from computers running any version of Remote Desktop setting on C01. 

B. The Client (Respond Only) IPSec policy should be assigned on C02. 

C. Your user account should be added to the Remote Desktop Users group on C01. 

D. A firewall exception should be created for the Remote Desktop Protocol (RDP) should be assigned on C02. 


Q216. DRAG DROP - (Topic 5) 

You use a computer that has Windows 7 Enterprise installed. 

You install two new hard disk drives and verify that the disks have been detected by Disk Management. 

You need to configure the two new disks for maximum read and write performance. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 


Q217. - (Topic 3) 

You have two computers named Computer1 and Computer2. 

You migrate user state data from Computer1 to Computer2. The migrated data contains several Microsoft Office Excel files. 

You need to ensure that you can open the Excel files by using Excel on Computer2. 

What should you do? 

A. Install Office. 

B. Disable User Account Control (UAC). 

C. Modify the default program settings. 

D. Run Loadstate.exe /i:migapp.xml. 



The applications are required to be installed in order to use the migrated data. In this case Microsoft Office is required to open Excel files. 

LoadStateLoadState is run on the destination computer. You should install all applications that were on the source computer on the destination before you run LoadState. You must run Loadstate. exe on computers running Windows Vista and Windows 7 from an administrative command prompt. To load profile data from an encrypted store named Mystore that is stored on a share named Migration on a file server named Fileserver and which is encrypted with the encryption key Mykey, use this command: loadstate \\\\fileserver\\migration\\mystore /i:migapp.xml /i:miguser.xml /decrypt /key:"mykey" 

Q218. - (Topic 3) 

You have a computer that contains the folders shows in the following table. 

You accidentally delete the Data1 folder. 

You need to restore the contents of the Data1 folder. The solution must not overwrite any changes to the Data2 folder. 

What should you do? 

A. From Recovery, restore a system restore point. 

B. From the Previous Versions tab of the User1 folder, click Copy. 

C. From the Sharing tab of the User1 folder, modify the Caching settings. 

D. Start the computer and then press F8. Restore the Last Known Good Configuration. 


Explanation: Copy from Previous Versions allows the data to be returned to a user detailed location. 

The Previous Versions tab, showing some previous versions of files 

NOT Recovery:Would affect Data2NOT Sharing:Modifying Caching settings wont help.NOT Last Known Good Configuration:Extreme overkill and would affect Data2 

Q219. - (Topic 2) 

You have a computer that runs Windows Vista. 

You need to identify whether the computer can be upgraded to Windows 7. 

Which tool should you use? 

A. Windows Anytime Upgrade for Windows 7 

B. Windows Anytime Upgrade for Windows Vista 

C. Windows 7 Upgrade Advisor 

D. Windows Vista Upgrade Advisor 



Windows 7 Upgrade Advisor Prior to attempting to perform the upgrade from Windows Vista to Windows 7, you should run the Windows 7 Upgrade Advisor. The Windows 7 Upgrade Advisor is an application that you can download from Microsoft's\\ Web site that will inform you if Windows 7 supports a computer running the current hardware and software configuration of Windows Vista. Prior to running the Windows 7 Upgrade Advisor, you should ensure that all hardware that you want to use with Windows 7, such as printers, scanners, and cameras, are connected to the computer. The Upgrade Advisor generates a report that informs you of which applications and devices are known to have problems with Windows 7. NOT Windows Anytime Upgrade A similar compatability report is generated during the upgrade process, but the version created by the Windows 7 Upgrade Advisor is more likely to be up to date.NOT VistaQuestion specifies upgrading to Windows 7 from Windows Vista, not upgrading to Windows Vista. 

Q220. - (Topic 1) 

You have a stand-alone computer named Computer1 that runs Windows 7. Several users share Computer1. 

You need to prevent all users who are members of a group named Group1 from running Windows Media Player. All other users must be allowed to run Windows Media Player. 

You must achieve this goal by using the least amount of administrative effort. What should you do? 

A. From Software Restriction Policies, create a path rule. 

B. From Software Restriction Policies, create a hash rule. 

C. From Application Control Policies, create the default rules. 

D. From Application Control Policies, create an executable rule. 



Executable Rules Executable rules apply to files that have .exe and .com file extensions. AppLocker policies are primarily about executable files, and it is likely that the majority of the AppLocker policies that you work with in your organizational environment will involve executable rules. The default executable rules are path rules that allow everyone to execute all applications in the Program Files folder and the Windows folder. The default rules also allow members of the administrators group to execute applications in any location on the computer. It is necessary to use the default executable rules, or rules that mirror their functionality, because Windows does not function properly unless certain applications, covered by these default rules, are allowed to execute. When you create a rule, the scope of the rule is set to Everyone, even though there is not a local group named Everyone. If you choose to modify the rule, you can select a specific security group or user account. NOT Default rulesDefault rules are a set of rules that can be created automatically and which allow access to default Windows and program files. Default rules are necessary because AppLocker has a built-in fallback block rule that restricts the execution of any application that is not subject to an Allow rule. This means that when you enable AppLocker, you cannot execute any application, script, or installer that does not fall under an Allow rule. There are different default rules for each rule type. The default rules for each rule type are general and can be tailored by administrators specifically for their environments. For example, the default executable rules are path rules. Security-minded administrators might replace the default rules with publisher or hash rules because these are more secure.NOT Path RulesPath rules, allow you to specify a file, folder, or registry key as the target of a Software Restriction Policy. The more specific a path rule is, the higher its precedence. For example, if you have a path rule that sets the file C: \\Program files\\Application\\App.exe to Unrestricted and one that sets the folder C:\\Program files\\Application to Disallowed, the more specific rule takes precedence and the application can execute. Wildcards can be used in path rules, so it is possible to have a path rule that specifies C:\\Program files\\Application\\*.exe. Wildcard rules are less specific than rules that use a file's full path. The drawback of path rules is that they rely on files and folders remaining in place. For example, if you created a path rule to block the application C:\\Apps\\Filesharing.exe, an attacker could execute the same application by moving it to another directory or renaming it something other than Filesharing.exe. Path rules work only when the file and folder permissions of the underlying operating system do not allow files to be moved and renamed.NOT Hash RulesHash rules, work through the generation of a digital fingerprint that identifies a file based on its binary characteristics. This means that a file that you create a hash rule for will be identifiable regardless of the name assigned to it or the location from which you access it. Hash rules work on any file and do not require the file to have a digital signature. The drawback of hash rules is that you need to create them on a per-file basis. You cannot create hash rules automatically for Software Restriction Policies; you must generate each rule manually. You must also modify hash rules each time that you apply a software update to an application that is the subject of a hash rule. Software updates modify the binary properties of the file, which means that the modified file does not match the original digital fingerprint. 

Microsoft 70-680 Certification Sample Questions and Answers:

P.S. New 70-680 dumps PDF: