Key benefits of 70 680 practice test

Precise of 70 680 practice test actual exam materials and resource for Microsoft certification for customers, Real Success Guaranteed with Updated mcts 70 680 pdf dumps vce Materials. 100% PASS TS:Windows 7,Configuring exam Today!

Q181. - (Topic 2) 

You have a computer that runs Windows 7. IPv6 is disabled on the computer. 

The computer has the following IPv4 settings: 

IP address: 

Subnet mask: 25S.255.0.0 

Default gateway: 

. Preferred DNS server: 

You need to ensure that the computer can only communicate with computers on the local subnet. 

What should you do? 

A. Delete the default gateway address. 

B. Delete the preferred DNS server IP address 

C. Configure the subnet mask to use 

D. Configure the subnet mask to use 



Why gateways work Default gateways are important to make IP routing work efficiently. In most cases, the router that acts as the default gateway for TCP/IP hosts--either a dedicated router or a computer that connects two or more network segments--maintains knowledge of other networks in the larger network and how to reach them. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain extensive and continuously updated knowledge about individual remote IP network segments. Only the router that acts as the default gateway needs to maintain this level of routing knowledge to reach other remote network segments in the larger internetwork. If the default gateway fails, communication beyond the local network segment may be impaired. To prevent this, you can use the Advanced TCP/IP Settings dialog box (in Network Connections) for each connection to specify multiple default gateways. You can also use the route command to manually add routes to the routing table for heavily used hosts or networks. 

Q182. - (Topic 5) 

A network has a main office and a branch office. 

The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled. 

Users at the branch office report that it takes several minutes to open large files located in the main office. 

You need to minimize the amount of time it takes for branch office users to open files located in the main office. 

What should you do? 

A. At the branch office, configure the client computers to use BranchCache Hosted Cache mode. 

B. At the branch office, configure the client computers to use BranchCache Distributed Cache mode. 

C. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers. 

D. At the main office, configure the servers to use Distributed File System Replication (DFSR). 


Q183. - (Topic 1) 

You have a computer that runs Windows 7. 

You need to prevent Internet Explorer from saving any data during a browsing session. 

What should you do? 

A. Disable the BranchCache service. 

B. Modify the InPrivate Blocking list. 

C. Open an InPrivate Browsing session. 

D. Modify the security settings for the Internet zone. 



InPrivate Mode consists of two technologies: InPrivate Filtering and InPrivate Browsing. 

Both InPrivate Filtering and InPrivate Browsing are privacy technologies that restrict the amount of information available about a user's browsing session. InPrivate Browsing restricts what data is recorded by the browser, and InPrivate Filtering is used to restrict what information about a browsing session can be tracked by external third parties. 

Q184. - (Topic 6) 

Your organization uses Windows 7 computers. 

You remotely administer a computer. You attempt to ping the computer to verify that it is on the network, but you do not receive a response. The user is able to connect to network resources. 

You need to verify that the firewall on the computer is configured to allow pings. 

What should you do? 

A. Verify that the rule name Network Discovery (NB-Name-In) for inbound connections is enabled. 

B. Verify that the rule name File and Printer Sharing (Echo Request -ICMPv4-IN) for outbound connections is enabled. 

C. Verify that the rule name File and Printer Sharing (Echo Request -JCMPv4-IN) for inbound connections is enabled. 

D. Verify that the rule name Network Discovery (NB-Name-In) for outbound connections is enabled. 


Explanation: Ref: 

Q185. - (Topic 2) 

Your network consists of a single Active Directory domain named 

You have a server named Server1 that runs a custom network application. 

Server1 has the following IP addresses: 



You need to ensure that a client computer resolves to only the IP address. 

What should you do from the computer? 

A. Edit the hosts file 

B. Edit the lmhosts file 

C. Run Ipconfig.exe /flushdns 

D. Run Netsh interface ipv4 reset 



Differences Between the HOSTS and LMHOSTS Files in Windows NT In Windows NT, the HOSTS file is for TCP/IP utilities, and the LMHOSTS file is for LAN Manager NET utilities. If you cannot PING another computer (using a friendly name), check the HOSTS file. If you cannot NET VIEW a server using only the TCP/IP protocol, check the LMHOSTS file. 

Hosts fileThe Hosts file is a common way to resolve a host name to an IP address through a locally stored text file that contains IP-address-to-host-name mappings. On most UNIX-based computers, this file is /etc/hosts. On Windows-based computers, this file is the Hosts file in the systemroot\\System32\\Drivers\\Etc folder. The following describes the attributes of the Hosts file for Windows: A single entry consists of an IP (IPv4 or IPv6) address and one or more host names. The Hosts file is dynamically loaded into the DNS client resolver cache, which Windows Sockets applications use to resolve a host name to an IP address on both local and remote subnets. When you create entries in the Hosts file and save it, its contents are automatically loaded into the DNS client resolver cache. The Hosts file contains a default entry for the host name localhost. The Hosts file can be edited with any text editor. Each host name is limited to 255 characters. Entries in the Hosts file for Windows–based computers are not case sensitive. The advantage of using a Hosts file is that users can customize it for themselves. Each user can create whatever entries they want, including easy-to-remember nicknames for frequently accessed resources. However, the individual maintenance required for the Hosts file does not scale well to storing large numbers of FQDN mappings or reflecting changes to IP addresses for servers and network resources. The solution for the large-scale storage and maintenance of FQDN mappings is DNS. The solution for the maintenance of FQDN mappings for changing IP addresses is DNS dynamic update.NOT LMHOSTS FileThe LMHOSTS file is a local text file that maps IP addresses to NetBIOS names of remote servers with which you want to communicate over the TCP/IP protocol. Windows recognizes names instead of IP addresses for network requests and a name discovery process is used to correctly route network requests with TCP/IP. Because the name discovery process is generally not routed by an IP router, the LMHOSTS file allows Windows machines to communicate using TCP/IP across a subnet. 

-LMHOSTS contains IP address to "NetBIOS over TCP/IP" name translations. 

-LMHOSTS is only used by the NBT (NetBIOS over TCP/IP) interface. 

-LMHOSTS file contains some valuable additions to the LAN Manager and Windows for Workgroups 

-LMHOSTS file, such as the ability to support routed domain logon validation. 

-LMHOSTS contains static information about TCP/IP addresses, but using logon scripts and/or the replicator service, the "master" file can be distributed transparently across all stations. 

-By default, the LMHOSTS file should be located in the directory %SYSTEMROOT%\\SYSTEM32\\DRIVERS \\ETC (usually C:\\WINNT\\SYSTEM32\\DRIVERS\\ETC). 

Other info 

Q186. - (Topic 1) 

You have a computer that runs Windows 7. Your company has a corporate intranet Web site. You open Windows Internet Explorer as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can access Web pages on both the Internet and the intranet. 

What should you do? 

A. From the Files menu, click Work Offline. 

B. From the Safety menu, click InPrivate Filtering. 

C. From the Security tab, add the intranet Web site to the Trusted sites zone. 

D. From the Safety menu, click InPrivate Browsing. 



Working Offline is activated On Internet Explorer's File menu is a "Work Offline" item that toggles Internet Explorer between online and offline modes of operation. 

(The question originally stated the Tools menu, maybe in a different version of IE this is the case, but for me and in the TechNet documentation it was under Files, so I'm choosing to believe Tools was a mistake and it should be Files, this has been amended in the question). InPrivate is turned on (does not prevent browsing the internet) InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, temporary Internet files, history, and other data. Toolbars and extensions are disabled by default. 

Q187. - (Topic 2) 

An employee who works from home telephones your help desk. A virus attack has deleted his computer's single internal hard disk. He carried out a System Image backup on his computer three months ago and automatically backs up his personal files every night. He uses an external USB hard drive formatted with the NTFS file system to hold his backups. 

All his personal files are in his Documents library. What do you advise? (Choose all that apply; the answers form a complete solution.) 

A. Carry out a System Image restore. 

B. Carry out a system restore. 

C. Use Restore Previous Versions to restore his Documents library from a shadow copy. 

D. Use Restore My Files in the Backup And Restore console to restore his Documents library folder. 

Answer: A,D 

Q188. - (Topic 5) 

You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer that runs Windows 7. 

You want to deploy a Windows image (WIM) file to other computers in the domain. 

You need to capture the operating system, computer configuration, and applications installed on the computer to a WIM file. 

What should you do before you capture the image? 

A. Run Defrag.exe. 

B. Run Oscdimg.exe. 

C. Start the computer by using the Windows Preinstallation Environment (WinPE) ram disk. 

D. Run Diskpart.exe. 


Explanation: Oscdimg is a command-line tool that you can use to create an image (.iso) 

file of a customized 32-bit or 64-bit version of Windows Preinstallation Environment (Windows.PE). You can then burn the .iso file to a CD or DVD. Oscdimg supports ISO.9660, Joliet, and Universal Disk Format (UDF) file systems. Note: … You just created your Windows PE Boot Flash Drive. Now you need to capture a generalized image for deployment. If you would like to burn WindowsPE to a CD instead of a USB thumb drive. The following command will copy all of the files necessary to create a WindowsPE boot disc into an ISO image file. Then you can burn the image file to a CD to create a bootable WindowsPE CD. In the command below the ISO image file that you will want to burn is winpex86.iso Oscdimg -n -bC:\\winpe_x86\\ C:\\winpe_x86\\ISO C:\\winpe_x86\\winpex86.iso Now burn the ISO image file winpex86.iso to a CD as a bootable image disc and you are finished! 

Q189. - (Topic 6) 

You have a computer that runs Windows 7. 

The computer's hard disks are configured as shown in the following table. 

You need to ensure that you can recover the operating system and all the files on the computer if hard disk 0 experiences hardware failure. 

What should you do? 

A. Create a system repair disk. 

B. Use the Backup and Restore tool to back up data files for all users. 

C. Use the Backup and Restore tool to create a system image on an external hard disk. 

D. Create an Easy Transfer file on an external hard disk. 


Q190. HOTSPOT - (Topic 4) 

You administer portable computers that have Windows 7 installed. The computers connect to a wireless network that uses WPA2-Enterprise Security. 

The company's security policy requires multifactor authentication for the portable computers. 

You need to manually configure each portable computer to meet the following requirements: 

. Users must provide multifactor authentication. 

. The Server certificate held on the portable computers must mach the certificate held on the server. 

What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.) 


Microsoft 70-680 Certification Sample Questions and Answers:

P.S. New 70-680 dumps PDF: