[Free] 2018(Aug) Ensurepass Microsoft 70-680 Dumps with VCE and PDF 151-160

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Microsoft Official New Released 70-680
100% Free Download! 100% Pass Guaranteed!

TS: Windows 7, Configuring

Question No: 151 – (Topic 2)

You have a computer that runs windows 7.

You log on to the computer by using a user account that is a member of Administrator Group.

From Windows Explorer you open C:\windows\system32\drivers\etc\hosts in notepad. You attempt to save the file and receive the save as dialog box.

You need to ensure that you can save changes to c:\windows\system32\drivers\ What should you do?

  1. Stop the windows search service

  2. Remove the inherited permissions from the file.

  3. Start Windows Notepad by using elevated privileges.

  4. Change the user account control (UAS) settings to Notify Me Only when programs try to make changes to my computer.

Answer: C Explanation:

Windows 7 does not allow applications to write data to these secure locations.

User Account Control (UAC)UAC is a security feature of Windows 7 that informs you when the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-

level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration.

Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks.Privilege elevationAll users of clients running Windows 7 run with the rights of a standard user. When a user attempts an act that requires administrative privileges, such as creating a new user account, her rights need to be raised from those of a standard user to those of an administrative user. This increase in rights is termed privilege elevation. UAC is a gateway to privilege elevation. It allows users who are members of the local Administrators group to access administrative rights, but ensures that the person accessing the Administrative rights is aware that they are doing so. This privilege elevation occurs only for a specific task. Another task executed at the same time that also requires privilege elevation generates its own UAC

Question No: 152 – (Topic 2)

You have a computer that runs windows 7.

The computer is configured as shown in the following table.

Ensurepass 2018 PDF and VCE

You plan to install a new application that requires 40 GB of space. The application will be installed to C:\app1.

You need to provide 40 GB of free space for the application.

What should you do?

  1. Create a shortcut.

  2. Create hard link.

  3. Create a mount point.

  4. Change the quota settings.

Answer: C Explanation:

Assign a mount point folder path to a driveYou can use Disk Management to assign a mount-point folder path (rather than a drive letter) to the drive. Mount-point folder paths are available only on empty folders on basic or dynamic NTFS volumes.Volume Mount PointsVolume mount points are new system objects in the internal namespace of Windows 2000 that represent storage volumes in a persistent, robust manner. This feature allows multiple disk volumes to be linked into a single tree, similar to the way Dfs links remote network shares. You can have many disk volumes linked together, with only a single drive letter pointing to the root volume. The combination of an NTFS junction and a Windows 2000 volume mount point can be used to graft multiple volumes into the namespace of a host NTFS volume. Windows 2000 offers this new mounting feature as an alternative to drive letters so system administrators can transcend the 26-drive letter limit that exists in Windows NT. Volume mount points are robust against system changes that occur when devices are added or removed from a computer. Important-icon Important A volume is a self-contained unit of storage administered by a file system. The file system that administers the storage in a volume defines a namespace for the volume. A volume mount point is a directory name in an NTFS file system that denotes the root of an arbitrary volume. A volume mount point can be placed in any empty directory of the namespace of the containing NTFS volume. Because volumes can be denoted by arbitrary directory names, they are not required to have a traditional drive letter. Placing a volume mount point on an NTFS directory causes the storage subsystem to resolve the directory to a specified local volume. This quot;mountingquot; is done transparently and does not require a drive letter to represent the volume. A Windows 2000 mount point always resolves to the root directory of the desired volume. Volume mount points require that the version of NTFS included with Windows 2000 be used because they are based on NTFS reparse points.

Question No: 153 – (Topic 2)

You have a customized image of Windows 7 Professional.

You mount the image and modify the contents of the image. You need to restore the image to its original state.

Which tool should you use?

  1. Dism.exe

  2. Ocsetup.exe

  3. Pkgmgr.exe

  4. Sysprep.exe

Answer: A Explanation: Dism

Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system.

Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing.

You can use DISM to perform the following actions:

  • Prepare a Windows PE image.

  • Enable or disable Windows features within an image.

  • Upgrade a Windows image to a different edition.

  • Add, remove, and enumerate packages.

  • Add, remove, and enumerate drivers.

  • Apply changes based on the offline servicing section of an unattended answer file.

  • Configure international settings.

  • Implement powerful logging features.

  • Service operating systems such as Windows Vista with SP1 and Windows Server 2008.

  • Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.

  • Service all platforms (32-bit, 64-bit, and Itanium).

  • Use existing Package Manager scripts.

DISM Command-Line Options

To service a Windows image offline, you must apply or mount it. WIM images can be mounted using the WIM commands within DISM, or applied and then recaptured using

ImageX. You can also use the WIM commands to list the indexes or verify the architecture for the image you are mounting. After you update the image, you must dismount it and then either commit or discard the changes you have made.

NOT Sysprep

Sysprep is a tool designed for corporate system administrators, OEMs, and others who need to deploy the Windows XP operating system on multiple computers. After performing the initial setup steps on a single system, you can run Sysprep to prepare the sample computer for cloning.

Sysprep prepares the image for capture by cleaning up various user-specific and omputerspecific settings, as well as log files. The reference installation now is complete and ready to be imaged.

Question No: 154 – (Topic 2)

You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of an Active Directory domain.

Windows Remote Management (WinRM) is enabled on both computers.

You need to remotely create additional disk volumes on Computer1 from Computer2. What should you do?

  1. On Computer2, run Winrs and then run Diskpart.

  2. On Computer2, run Winrs and then run Diskmgmt.msc.

  3. On Computer1, install the Telnet Client and then run Diskpart from Computer2.

  4. On Computer1, install the Telnet Client and then use Disk Management from Computer2.

Answer: A Explanation:

Winrs You can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS -r: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS -r:Aberdeen ipconfig The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using

WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt.

Diskpart: Microsoft command-line tool Diskpart is used to create and format volumes on the target computer.

Question No: 155 – (Topic 2)

A user telephones your help desk. Her Favorites list is corrupt and she is having problems accessing the Web sites she visits regularly. All the computers in your organization are backed up every night with a file and folder backup that uses default settings. A restore point was created on all the company#39;s client computers 24 hours ago because a new device driver was installed. You performed a System Image backup on all the computers in your organization three weeks ago. The user is not computer-literate and you need to fix the problem for her.

What is the most efficient way to do so?

  1. Perform a system restore.

  2. Perform a System Image restore.

  3. Use the Restore Files Wizard to restore the Favorites folder in the user#39;s backed-up profile.

  4. Access the History tab under Favorites on the user#39;s browser. Browse to recently visited sites and add them to Favorites.

Answer: C

Question No: 156 – (Topic 2)

You have two portable computers that run Windows 7. The computers are not connected to a network.

The computers are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

You need to transfer a 1-gigabit file from Computer1 to Computer2. What should you do first?

  1. On Computer1, create a wireless ad hoc network.

  2. On Computer2, configure the Bluetooth File Transfer Wizard to send files.

  3. On Computer2, create a network profile to connect to a network named Homegroup.

  4. On Computer1, configure the computer to be a member of a workgroup named Homegroup.

Answer: A

Explanation: Wireless Ad Hoc network

You can set up a temporary wireless network, or ad hoc network, between two or more computers running Windows 7 (or between computers running Windows 7 and Windows Vista) provided they are all within 30 feet (9 meters) of each other. A WAP is not required to set up an ad hoc network. This enables users to share folders and other resources without needing to connect to an organizational network. On the first computer on the network, you open Network And Sharing Center and click Set Up A New Connection Or Network. You then choose the option Set Up A Wireless Ad Hoc (Computer To Computer) Network. You give the network a name and (if you want) set up a security key so that users joining the network need to supply a password. For WEP, this can be 5 case-sensitive characters, 13 case-sensitive characters, 10 hexadecimal caseinsensitive characters, or 26 hexadecimal case-insensitive characters, depending on security considerations. (If you choose WPA-2 Personal, you can insist on a 64-character password, but by the time everyone has typed it in correctly, the meeting would probably be over.)BluetoothWindows supports Bluetooth version 1.1 and later versions. Windows does not support Bluetooth version 1.0 because that specification lacks several critical updates that Windows requires to support Bluetooth wireless technology well.

Question No: 157 – (Topic 2)

A user on your company network creates a new file and works on it during the day. He saves the file but decides he no longer needs it and deletes it just before the office closes.

Overnight, a file and folder backup takes place. The next morning, the user decides he needs the file after all. He calls you for help.

What action can you take?

  1. Restore the file from the previous night#39;s backup.

  2. Restore the Recycle Bin from the previous night#39;s backup. The file will be in the restored Recycle Bin.

  3. Restore the file from an older backup.

  4. Ask the user to open his Recycle Bin.

Answer: D

Question No: 158 – (Topic 2)

Your network consists of an Active Directory domain and 100 computers that run Windows 7.

The domain contains a logon script named logon.cmd.

You plan to deploy a new application named app1.msi by using the logon script. App1.msi is stored in \\server1\share1.

You need to modify the logon script to deploy the application. What should you include in the logon script?

  1. Sbdinst.exe -u \\server1\share1\app1.msi -q

  2. Msinfo32.exe \\server1\share1\app1.msi

  3. Pkgmgr.exe /ip /m:\\server1\share1\app1.msi

  4. Msiexec.exe /i \\server1\share1\app1.msi /quiet

Answer: D Explanation: Msiexec

Provides the means to install, modify, and perform operations on Windows Installer from the command line.

To install or configure a product Syntax msiexec /i {package|ProductCode}

/i : Installs or configures a product.

NOT Msinfo32

Displays a comprehensive view of your hardware, system components, and software environment.

Question No: 159 – (Topic 2)

A user telephones your help desk. She has just accidentally deleted a file she was working on earlier that day.

You have configured her computer to carry out backups every evening, and you installed a new graphics driver two days ago.

How should you advise the user to retrieve her file?

  1. Open the Backup And Restore console and restore the file from backup.

  2. Use the Restore Previous Versions feature to restore the file.

  3. Open her Recycle Bin, right-click the file, and choose Restore.

  4. Perform a system restore.

Answer: C

Question No: 160 – (Topic 2)

You have a computer that runs Windows 7 and Windows Internet Explorer 8. You discover that your browsing history is sent to a third-party advertising content provider. You need to prevent the browsing history from being sent only to that specific content provider. What should you do?

  1. Enable InPrivate Filtering and click Automatically block.

  2. Add the Web site for the content provider to the Restricted sites zone.

  3. Enable InPrivate Filtering and select the Choose content to block or allow option.

  4. View the privacy policy for the Web site and enable the Never allow this site to use cookies option.

Answer: C

100% Ensurepass Free Download!
70-680 PDF
100% Ensurepass Free Guaranteed!
70-680 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.