[Newest Version] Easily Pass 070-680 Exam with CertBus Updated Real Microsoft 070-680 Exam Materials
Attention please! Here is the shortcut to pass your 070-680 exam! Get yourself well prepared for the Microsoft 070-680 TS:Windows 7,Configuring exam is really a hard job. But don’t worry! We, CertBus, provides the most update exam PDF and VCEs. With CertBus latest exam questions and answerss, you’ll pass the 070-680 TS:Windows 7,Configuring exam in an easy way.
We CertBus has our own expert team. They selected and published the latest 070-680 preparation materials from Microsoft Official Exam-Center: http://www.certgod.com/070-680.html
QUESTION NO: 3
3
You have a computer named Computer1 that runs Windows Vista and a computer named
Computer2 that runs Windows 7. You plan to migrate all profiles and user files from Computer1 to
Computer2.
You need to identify how much space is required to complete the migration.
What should you do?
A. On Computer1 run Loadstate c:store /nocompress
B. On Computer1 run Scanstate c:store /nocompress /p
C. On Computer2 run Loadstate \computer1store /nocompress
D. On Computer2 run Scanstate \computer1store /nocompress /p
Answer: B
Explanation:
ScanState
You run ScanState on the source computer during the migration. You must run ScanState.exe on
computers running Windows Vista and Windows 7 from an administrative command prompt. When
running ScanState on a source computer that has Windows XP installed, you need to run it as a user
that is a member of the local administrators group. The following command creates an encrypted
store named Mystore on the file share named Migration on the file server named Fileserver that
uses the encryption key Mykey: scanstate \fileservermigrationmystore /i:migapp.xml
/i:miguser.xml /o /config:config.xml /encrypt /key:”mykey”
Space Estimations for the Migration Store
When the ScanState command runs, it will create an .xml file in the path specified. This .xml file
includes improved space estimations for the migration store. The following example shows how to
create this .xml file: Scanstate.exe C:MigrationLocation [additional parameters]
/p:”C:MigrationStoreSize.xml” To preserve the functionality of existing applications or scripts that
require the previous behavior of USMT, you can use the /p option, without specifying “pathtoafile”,
in USMT 4.0. If you specify only the /p option, the storage space estimations are created in the same
manner as with USMT 3.x releases.
User State Migration Tool
USMT 4.0 is a command-line utility that allows you to automate the process of user profile
migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool
for performing a large number of profile migrations than Windows Easy Transfer. The USMT can
write data to a removable USB storage device or a network share but cannot perform a direct side-
by-side migration over the network from the source to the destination computer. The USMT does
not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in
two phases, exporting profile data from the source computer using ScanState and importing profile
data on the destination computer using LoadState.
QUESTION NO: 13
You have a computer that runs Windows 7.
You run Ipconfig as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can establish a DirectAccess connection to the network.
What should you do first?
A. Create a new VPN connection.
B. Configure a static IPv4 address.
C. Enable IPv6 on the network adapter.
D. Add an additional default gateway address.
Answer: C
QUESTION NO: 1
Your network consists of an Active Directory domain and a DirectAccess infrastructure.
You install Windows 7 on a new portable computer and join the computer to the domain.
You need to ensure that the computer can establish DirectAccess connections.
What should you do?
A. Install a computer certificate.
B. Create a new network connection.
C. Enable the Network Discovery firewall exception.
D. Add the computer account to the Network Configuration Operators group.
Answer: A
Explanation:
Certificates
The DirectAccess IPsec session is established when the client running Windows 7 and the
DirectAccess server authenticate with each other using computer certificates. DirectAccess supports
only certificate-based authentication.
DirectAccess Client Configuration
Clients receive their DirectAccess configuration through Group Policy. This differs from traditional
VPN configuration where connections are configured manually or distributed through the
connection manager administration kit. Once you have added the computer’s client account to the
designated security group, you need to install a computer certificate on the client for the purpose of
DirectAccess authentication. An organization needs to deploy Active Directory Certificate Services so
that clients can automatically enroll with the appropriate certificates.
QUESTION NO: 14
11
You have a computer that runs Windows Vista. The computer contains a custom application.
You need to export the user state and the settings of the custom application.
What should you do?
A. Run Loadstate.exe and specify the /config parameter.
B. Run Scanstate.exe and specify the /genconfig parameter.
C. Modify the miguser.xml file. Run Loadstate.exe and specify the /ui parameter.
D. Modify the migapp.xml file. Run Scanstate.exe and specify the /i parameter.
Answer: D
Explanation:
MigApp.xml This file contains rules about migrating application settings. These include Accessibility
settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database
Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard
settings, phone and modem options, Remote Access Service (RAS) connection phone book files,
regional options, remote access, screensaver settings, taskbar settings, and wallpaper settings.
(Include) /i:[Path]FileName
Specifies an .xml file that contains rules that define what user, application or system state to
migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml,
MigUser.xml and any custom .xml files that you create). Path can be either a relative or full path. If
you do not specify the Path variable, then FileName must be located in the current directory.
NOT MigUser.xml
MigUser.xml This file contains rules about user profiles and user data. The default settings for this
file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu,
Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop
files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that
ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc,
.dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*,
.pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, .accdb, .mdb, .pub, .xla, .xlb
and .xls. The asterisk ( *) represents zero or more characters.
QUESTION NO: 5
You work in an international company which is named Wiikigo. Before entering this company, you
have two years of experience in the IT field, as well as experience implementing and administering
any Windows client operating system in a networked environment. You are professional in installing,
upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and
Applications and son on. You manage a computer that runs Windows 7. You have to identify which
applications were installed during the last week. So what action should you perform?
A. The System Performance Data Collector Set should be run from Performance Monitor.
B. The informational events should be reviewed from Reliability Monitor.
C. The Software Environment should be reviewed from System Information.
D. The System Diagnostics Report should be reviewed from Performance Monitor.
Answer: B
QUESTION NO: 7
Your network consists of one Active Directory domain. You have two computers named Computer1
and Computer2 that run Windows 7. Both computers are members of the domain.
From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the
domain.
You need to ensure that you can recover all EFS encrypted files from Computer2.
What should you do?
A. On Computer1, back up %systemroot%DigitalLocker. On Computer2, restore
%systemroot%DigitalLocker.
B. On Computer1, export the data recovery agent certificate. On Computer2, import the data
recovery agent certificate.
C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run
Secedit.exe and specify the /import parameter.
6
D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run
Cipher.exe and specify the /adduser parameter.
Answer: B
Explanation:
You can import the recovery agent to another computer running Windows 7 if you want to recover
files encrypted on the first computer. You can also recover files on another computer running
Windows 7 if you have exported the EFS keys from the original computer and imported them on the
new computer. You can use the Certificates console to import and export EFS keys.
NOT Secedit.exe:
You can use both the Local Group Policy Editor and the Local Security Policy console to import and
export security-related Group Policy settings. You can use this import and export functionality to
apply the same security settings to stand-alone computers that are not part of a domain
environment. Exported security files are written in Security Template .inf format. As well as using
Local Group Policy Editor and the Local Security Policy console to import policies that are stored in
.inf format, you can apply them using the Secedit.exe command-line utility.
NOT Cipher.exe /removeuser /adduser.
NOT DigitalLocker.
QUESTION NO: 15
You have a computer that runs Windows 7.
Multiple users log on to your computer.
You enable auditing on a folder stored on your computer.
You need to ensure that each access to the folder is logged.
What should you do?
A. Start the Problem Steps Recorder.
B. From Event Viewer, modify the properties of the Security log.
C. From the local Group Policy, configure the Audit object access setting.
D. From the local Group Policy, configure the Audit directory service Access setting.
Answer: C
12
Explanation:
Audit object access
Determines whether to audit the event of a user accessing an object (for example, file, folder,
registry key, printer, and so forth) which has its own system access control list (SACL) specified. By
default, this value is set to No auditing in the Default Domain Controller Group Policy object (GPO)
and in the local policies of workstations and servers. If you define this policy setting, you can specify
whether to audit successes, audit failures, or not to audit the event type at all. Success audits
generate an audit entry when a user successfully accesses an object that has a SACL specified.
Failure audits generate an audit entry when a user unsuccessfully attempts to access an object that
has a SACL specified. You can select No auditing by defining the policy setting and unchecking
Success and Failure.
QUESTION NO: 10
You have a computer that runs Windows 7.
You need to modify the file extensions that are associated to Internet Explorer.
What should you do?
A. From Internet Explorer, click Tools and then click Manage Add-ons.
B. From Control Panel, open Default Programs and then click Set Associations.
C. From the local Group Policy, expand Computer Configuration and then click Software Settings.
D. From Window Explorer, right-click %programfiles%Internet Exploreriexplore.exe and then click
Properties.
Answer: B
8
QUESTION NO: 2
You have a portable computer named Computer1 that runs Windows 7.
You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared
folder named Share1.
You need to configure Computer1 to meet the following requirements:
• Ensure that cached files from Share1 are encrypted.
• Ensure that files located in Share1 are available when Server1 is disconnected from the
network.
What should you do?
A. On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline.
B. On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available offline.
C. On Computer1, make Share1 available offline and enable encryption of offline files.
D. On Computer1, copy the files from Share1 to the Documents library and configure BitLocker Drive
Encryption.
2
Answer: C
Explanation:
Offline Files
The Offline Files feature of Windows 7 allows a client to locally cache files hosted in shared folders
so that they are accessible when the computer is unable to connect directly to the network resource.
The Offline Files feature is available to users of the Professional, Enterprise, and Ultimate editions of
Windows 7. You can use the Offline Files feature to ensure access when a client computer is out of
the office or when a temporary disruption, such as a wide area network (WAN) link failing between a
branch office and a head office, blocks access to specially configured shared folders.
Using Sync Center
You can use Sync Center to synchronize files, manage offline files, and resolve synchronization
conflicts manually. Sync Center is located within the Control Panel or by typing Sync Center into the
Search Programs and Files text box on the Start menu. Clicking Manage Offline Files opens the
Offline Files. This dialog box is also available using the Offline Files control panel. Using this dialog
box, you can disable offline files, view offline files, configure disk usage for offline files, configure
encryption for offline files, and configure how often Windows 7 should check for slow network
conditions.
QUESTION NO: 11
Your company has a main office and a branch office. The relevant portion of the network is
configured as shown in the exhibit. (Click the Exhibit button.)
In the branch office, you deploy a new computer named Computer1 that runs Windows 7.
You need to assign an IP address to Computer1.
Which IP address should you use?
A. 192.168.2.30
B. 192.168.2.40
C. 192.168.2.63
D. 192.168.2.65
Answer: B
Explanation:
Internal IP Adress of router is 192.168.2.62/27
Leaves 5 bits for range = 32 addresses (including the 2 reserved addresses)
Subnet Mask = 255.255.255.224
9
CertBus exam braindumps are pass guaranteed. We guarantee your pass for the 070-680 exam successfully with our Microsoft materials. CertBus TS:Windows 7,Configuring exam PDF and VCE are the latest and most accurate. We have the best Microsoft in our team to make sure CertBus TS:Windows 7,Configuring exam questions and answers are the most valid. CertBus exam TS:Windows 7,Configuring exam dumps will help you to be the Microsoft specialist, clear your 070-680 exam and get the final success.
070-680 Latest questions and answers on Google Drive(100% Free Download): https://drive.google.com/file/d/0B_3QX8HGRR1mWTdaaThHY0J2Q1k/view?usp=sharing
070-680 Microsoft exam dumps (100% Pass Guaranteed) from CertBus: http://www.certgod.com/070-680.html [100% Exam Pass Guaranteed]
Why select/choose CertBus?
Millions of interested professionals can touch the destination of success in exams by certgod.com. products which would be available, affordable, updated and of really best quality to overcome the difficulties of any course outlines. Questions and Answers material is updated in highly outclass manner on regular basis and material is released periodically and is available in testing centers with whom we are maintaining our relationship to get latest material.