Renewal 70-680: Pass4sure real prep from 31 to 45

Question No. 31

- (Topic 3) 

You have a computer that runs Windows 7 and Windows Internet Explorer 8. You have a third-party Internet Explorer toolbar installed on the computer. 

You need to temporarily disable the toolbar. The solution must not affect any other installed toolbars. 

What should you do? 

A. Start an Inprivate Browsing session. 

B. Run Msconfig.exe and enable Selective Startup. 

C. From the Tools menu, select Compatibility View Settings. 

D. From the Tools menu, open Manage Add-ons and modify the add-on settings. 



Add-Ons and Search Providers Add-ons extend the functionality of Internet Explorer. Add-ons are usually downloaded and installed separately rather than being included with Internet Explorer. You manage add-ons through the Manage Add-Ons dialog box. 

Toolbars and Extensions This area lists browser toolbars and extensions. Toolbars are additions to browsersthat add extra functionality to the browser interface. Extensions allow the browser to perform additional functions, such as playing media or opening some types of document file within the browser that the browser does not support natively. 

Question No. 32

- (Topic 3) 

You have a custom image of Windows 7. 

You discover that the boot configuration data store in the custom image is corrupted. 

You need to create a new configuration data store within the custom image. 

What should you do? 

A. Run Imagex.exe and specify the /append parameter. Run Bcdedit.exe. 

B. Run Imagex.exe and specify the /mountrw parameter. Run Bcdedit.exe. 

C. From Windows System Image Manager (Windows SIM), select the image and then create a configuration set. 

D. From Windows System Image Manager (Windows SIM), select the image and then create a catalog. 



ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice/mountrwMounts a .wim file from Windows XP with Service Pack 2 (SP2), Windows Server 2003 with Service Pack 1 (SP1), or Windows Vista with read/write permission to a specified directory. Once the file is mounted, you can view and modify all the information contained in the directory.BcdeditBCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe, and BCDEdit has improved scripting support.NOT Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets. NOTE: question specifies configuration data store, not configuration set. 

Question No. 33

- (Topic 1) 

In which of the following scenarios must you perform a migration rather than an upgrade? Choose three. 

A. Windows XP Professional (x64) to Windows 7 Professional (x64) 

B. Windows Vista Business (x86) to Windows 7 Professional (x64) 

C. Windows Vista Enterprise (x64) to Windows 7 Enterprise (x64) 

D. Windows Vista Home Premium (x64) to Windows 7 Home Premium (x86) 

Answer: A,B,D 

Question No. 34

- (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

A user is asked to remove encryption from a locally saved folder so that other users can read and write to that folder. 

You need to verify that the folder is not encrypted with the Encrypting File System (EFS). 

What should you use to accomplish this goal? 

A. Device Manager 

B. Local Users and Groups 

C. the User Account Control Settings Control Panel window 

D. the icacls command 

E. the Group Policy management console 

F. share permissions 

G. the netsh command 

H. the Services management console 

I. the folder Properties window 



Question No. 35

HOTSPOT - (Topic 4) 

A company's security policy prohibits employees from running any software from Fabrikam on computers running Windows 7 Enterprise. The applications are digitally signed by the publisher. 

You need to configure a single deny rule in AppLocker by applying a condition to restrict all of the applications from running, without affecting other programs. 

You have selected one of Fabrikam's applications as a reference. 

Which property should you choose? (To answer, select the appropriate setting or settings in the work area.) 


70-680 practice exam

Question No. 36

- (Topic 3) 

You have a computer that runs Windows 7. 

Windows Backup is configured to store backups on an external drive. 

You create a new NTFS volume on the computer. 

You need to configure Windows Backup to include the files on the new volume as part of regularly scheduled backups. 

What should you do? 

A. From Backup and Restore, select Change settings. 

B. From Backup and Restore, select Create a system image. 

C. From the System Protection tab, create a restore point. 

D. From the System Protection tab, enable system protection for the new volume. 



Backups are configured and scheduled by using the Backup And Restore console under 

System And Security in Control Panel. 

The Change Settings option is not available unless you have configured a backup schedule 

and performed a backup. 

Question No. 37

- (Topic 5) 

You have a computer that runs a 32-bit version of Windows 7 Home Premium. The computer has a single partition on a single hard disk drive. 

You want to test a 64-bit version of Windows 7 Ultimate. You configure the computer for a dual boot with previously installed Windows 7 Home Premium. 

You need to configure the computer to support the dual boot. 

What should you do? 

A. Start Windows 7 Home Premium. Create a Virtual Hard Disk (VHD) file to start Windows 7 Ultimate. 

B. Attach Windows 7 Ultimate media as an ISO image into Windows 7 Home Premium. 

C. Start Windows 7 Home Premium. Create and mount a new Windows Imaging Format (WIM) file with Windows 7 Ultimate files. 

D. Install Virtual PC into Windows 7 Home Premium. 


Explanation: The Virtual Hard Disk (VHD) format is a publicly-available image format specification that allows encapsulation of the hard disk into an individual file for use by the operating system as a virtual disk in all the same ways physical hard disks are used. These virtual disks are capable of hosting native file systems (NTFS, FAT, exFAT, and UDFS) while supporting standard disk and file operations. VHD API support allows management of the virtual disks. Virtual disks created with the VHD API can function as boot disks. 

Question No. 38

- (Topic 5) 

You have a computer that runs Windows 7. 

The computer's hard disks are configured as shown in the following table. 

You need to ensure that you can recover the operating system and all the files on the computer if hard disk 0 experiences hardware failure. 

What should you do? 

A. Shrink drive C and then create a new partition. 

B. Use the Backup and Restore tool to back up data files for all users. 

C. Use the Backup and Restore tool to create a system image on a network location. 

D. Create a restore point for both hard disks. 


Explanation: System Image in Windows 7 The new backup utilities in Windows 7 are actually pretty impressive and creating an image will be possible in all versions. Today we take a look at creating a backup image of your machine without the need for a third party utility like Ghost or True Image. 

You are just finished installing a fresh copy of Windows 7 on your computer and have it set up to your liking. One of the first things you should do now is create an image of the disc so in the event of a crash you will be able to restore it to its current state. An image is an exact copy of everything on the drive and will restore it back to its current state. It's probably best to create an image when everything is clean and organized on your system. This will make the image file smaller and allows you to restore the system with a smooth running set up. 

Question No. 39

- (Topic 4) 

You use a client computer named accounting that has Windows 7 SP1 installed. The computer allows connections from other computers that have any version of Remote Desktop installed. The computer has a locally attached printer shared as printer1. 

An accounting user group is a member of the local Remote Desktop Users group on the computer. Only the Accounting Users group has access to printer1. A user named User1 is a member of the accounting users. 

You need to configure the computer to meet the following requirements: 

. Prevent User1 from establishing Remote Desktop sessions to the Accounting computer. . Allow other members of the Accounting Users to connect to the accounting computer by using remote desktop. . Ensure that User1 can access printer1. 

What should you do? 

A. Remove the Accounting Users group from the Remote Desktop Users group. 

B. Remove User1 from the Accounting Users group. 

C. Assign the Deny access to this computer from the network user right to User1 

D. Assign the Deny log on through Remote Desktop Services user right to User1. 



D is the only method that can achieve this without affecting other groups. 

A and B could be equally valid by adding an additional step (adding individual users to resources). 

Question No. 40

- (Topic 3) 

A standard user named User1 has a computer that runs Windows 7. 

You need to ensure that User1 can run Windows Easy Transfer. 

What should you do? 

A. Disable User Account Control (UAC). 

B. Add User1 to the Administrators group. 

C. Configure User1 to have a complex password. 

D. Copy the support folder from the Windows 7 installation media to the local hard disk drive. 



Windows Easy Transfer Migration After you have set up Windows Easy Transfer on the source computer, you are ready to perform migration. If you want to migrate only a single user account, you can log on with that account to perform the transfer. If you want to migrate all accounts on the computer, you need to log on with a user account that has Local administrator privileges. 

To do this, start Windows Easy Transfer, select the transfer method, and then, on the Which Computer Are You Using Now? page, select This Is My Old Computer. If you are using the External Hard Disk or USB storage device method, Windows Easy Transfer will then perform a migration check and provide an estimate of the size of the data you can transfer to the new computer on the source computer. If you are using the Network or Easy Transfer Cable method, you will select items for migration on the destination computer. 

NOT User Account Control (UAC) UAC is a security feature of Windows 7 that informs you when the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks. 

70-680 exam fees

Question No. 41

- (Topic 4) 

You have a computer that runs Windows 7. 

You need to identify the disk, memory, CPU, and network resources that an application is currently using. 

Which tool should you use? 

A. Component Services 

B. Performance Information and Tools 

C. Reliability Monitor 

D. Resource Monitor 



Resource Monitor Windows 7 offers an enhanced version of the Resource Monitor tool. Windows 7 Resource Monitor allows you to view information about hardware and software resource use in real time. You can filter the results according to the processes or services that you want to monitor. You can also use Resource Monitor to start, stop, suspend, and resume processes and services, and to troubleshoot unresponsive applications. You can start Resource Monitor from the Processes tab of Task Manager or by entering resmon in the Search box on the Start menu. Resource Monitor includes five tabs: Overview, CPU, Memory, Disk, and Network. The Overview tab, displays basic system resource usage information. The other tabs display information about each specific resource. If you have filtered results on one tab, only resources used by the selected processes or services are displayed on the other tabs. Filtered results are denoted by an orange bar below the title bar of each table. 

Question No. 42

HOTSPOT - (Topic 4) 

You administer a computer that has Windows 7 Enterprise installed. 

The computer has an application that must run by using administrative permission. 

A user who has a standard user account connects to the computer by using a Remote Desktop connection. The user right-clicks the application shortcut, but the run as administrator option is unavailable. 

You need to ensure that the user is able to run the application by using administrative permissions. 

Which services should you configure? (To answer, select the appropriate option or options in the answer area). 


Question No. 43

- (Topic 2) 

You have a customized image of Windows 7 Professional. 

You mount the image and modify the contents of the image. 

You need to restore the image to its original state. 

Which tool should you use? 

A. Dism.exe 

B. Ocsetup.exe 

C. Pkgmgr.exe 

D. Sysprep.exe 



Dism Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing. You can use DISM to perform the following actions: 

* Prepare a Windows PE image. 

* Enable or disable Windows features within an image. 

* Upgrade a Windows image to a different edition. 

* Add, remove, and enumerate packages. 

* Add, remove, and enumerate drivers. 

* Apply changes based on the offline servicing section of an unattended answer file. 

* Configure international settings. 

* Implement powerful logging features. 

* Service operating systems such as Windows Vista with SP1 and Windows Server 2008. 

* Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host. 

* Service all platforms (32-bit, 64-bit, and Itanium). 

* Use existing Package Manager scripts. 

DISM Command-Line Options 

To service a Windows image offline, you must apply or mount it. WIM images can be mounted using the WIM commands within DISM, or applied and then recaptured using ImageX. You can also use the WIM commands to list the indexes or verify the architecture for the image you are mounting. After you update the image, you must dismount it and then either commit or discard the changes you have made. 

NOT Sysprep 

Sysprep is a tool designed for corporate system administrators, OEMs, and others who need to deploy the Windows XP operating system on multiple computers. After performing the initial setup steps on a single system, you can run Sysprep to prepare the sample computer for cloning. Sysprep prepares the image for capture by cleaning up various user-specific and omputerspecific settings, as well as log files. The reference installation now is complete and ready to be imaged. 

Question No. 44

- (Topic 1) 

You want to prohibit read, write, and execute access to all types of external storage devices. 

What computer policy setting do you enable? 

A. All Removable Storage: Allow Direct Access In Remote Sessions 

B. All Removable Storage Classes: Deny All Access 

C. Removable Disks: Deny Read Access 

D. Removable Disks: Deny Write Access 


Question No. 45

- (Topic 4) 

A virtual hard disk (VHD) contains a Windows 7 Enterprise installation. 

You need to mount the VHD on a client computer. 

What should you do? 

A. Run the Dism command with the /Mount-Wimoption. 

B. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes. 

C. Run the Dism command with the /Add-Package option. 

D. Run the PEImg/Prepcommand. 

E. Add a boot image in WDS. 

F. Run the Dism command with the /Add-Driver option. 

G. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to True. 

H. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to No. 

I. Run the BCDEdit command. 

J. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to False. 

K. Run the Start/w ocsetup command. 

L. Run the imageX command with the /Mount parameter. 

M. Create a capture image in WDS. 

N. Run the DiskPart command and the Attach command option. 


Microsoft 70-680 Certification Sample Questions and Answers:

P.S. New 70-680 dumps PDF: