Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Microsoft Official New Released 70-680
100% Free Download! 100% Pass Guaranteed!

TS: Windows 7, Configuring

Question No: 271 – (Topic 3)

You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7.

Computer1 has a custom application installed. You create a custom XML file named app1.xml that contains the migration settings for the application.

You need to migrate the configuration and application data for the custom application from Computer1 to Computer2.

What should you do?

  1. On Computer1, run Loadstate.exe /l:app1. On Computer2, run Scanstate.exe

    /l:app1.xml.

  2. On Computer1, run Scanstate.exe /i:app1.xml. On Computer2, run Loadstate.exe

    /i:app1.xml.

  3. On Computer1, run Loadstate.exe /keyfile:app1.xml. On Computer2, run Loadstate.exe

    /keyfile:app1.xml.

  4. On Computer1, run Scanstate.exe /genconfig:app1.xml. On Computer2, run Loadstate.exe /config:app1.xml.

Answer: B Explanation:

User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState. (include) /i:[Path\]FileName Specifies an .xml file that contains rules that define what user, application or system state to migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml, MigUser.xml and any custom .xml files that you create). Path can be either a relative or full path. If you do not specify the Path variable, then FileName must be located in the current directory.

Question No: 272 – (Topic 3)

You need to provide an administrator the ability to view and interact with your current logon session.

What should you do?

  1. At the command prompt, run Psr.exe.

  2. At the command prompt, run Winrm.exe quickconfig.

  3. From the Start menu, open Remote Desktop Connection.

  4. From the Start menu, open Windows Remote Assistance.

Answer: D Explanation: Remote Assistance

Both Remote Assistance and Remote Desktop allow the user at the management computer to see the desktop and applications that are present on the remote computer. The difference between Windows Remote Assistance and Remote Desktop is that a user is logged on to the remote computer and initiates the remote assistance session, whereas a Remote Desktop session is initiated on the management computer. Remote Assistance is a support tool used by help-desk staff to allow them to view the screen of the person to whom they are providing assistance. Remote Assistance reduces the need for nontechnical users to accurately describe the problem that they are having with their computers because support personnel can see the desktop directly. Unlike the version of Remote Assistance that shipped with Windows XP, the version of Remote Assistance that is included with Windows 7 does not include a voice client. If you are going to talk to the person whom you are helping using Remote Assistance, you are going to have to use another method, such as the telephone.

Question No: 273 – (Topic 3)

You have a computer that has the following configurations:

->Operating system: Windows 7 Professional

->Processor: 2.2 gigahertz (GHz) (x86)

->RAM: 2 GB

->Hardware virtualization: Disabled

->TPM chip: Disabled

You need to ensure that you can run Windows XP Mode on the computer.

What should you do?

  1. Upgrade to a 64-bit processor.

  2. Enable hardware virtualization.

  3. Enable the Trusted Platform Module (TPM) chip.

  4. Upgrade the operating system to Windows 7 Ultimate.

Answer: B Explanation:

Windows XP Mode requires a processor that supports hardware virtualization using either the AMD-V or Intel VT options. Most processors have this option disabled by default; to enable it, you must do so from the computer’s BIOS.

Other info Requirements:

Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements:

  • 1 GHz 32-bit (x86) or 64-bit (x64) processor

  • 1 GB of system memory

  • A 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available space

  • A graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver,

  • Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics memory

    XP Mode

    Windows XP Mode is a downloadable compatibility option that is available for the Professional, Enterprise, and Ultimate editions of Windows 7. Windows XP Mode uses the latest version

    Question No: 274 – (Topic 3)

    You have a custom image of Windows 7.

    You discover that the boot configuration data store in the custom image is corrupted. You need to create a new configuration data store within the custom image.

    What should you do?

    1. Run Imagex.exe and specify the /append parameter. Run Bcdedit.exe.

    2. Run Imagex.exe and specify the /mountrw parameter. Run Bcdedit.exe.

    3. From Windows System Image Manager (Windows SIM), select the image and then create a configuration set.

    4. From Windows System Image Manager (Windows SIM), select the image and then create a catalog.

    Answer: B Explanation:

    ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice/mountrwMounts a .wim file from Windows XP with Service Pack 2 (SP2), Windows Server 2003 with Service Pack 1 (SP1), or Windows Vista with read/write permission to a specified directory. Once the file is mounted, you can view and modify all the information contained in the directory.BcdeditBCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe, and BCDEdit has improved scripting support.NOT Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets.

    NOTE: question specifies configuration data store, not configuration set.

    Question No: 275 – (Topic 3)

    You have a computer named Computer1 that runs Windows 7. You have a server named Server1 that runs Windows Server 2008.

    Computer1 and Server1 have IPv4 and IPv6 installed.

    You need to identify whether you can connect to Server1 by using IPv6. What should you do?

    1. Run Ping Server1 -6.

    2. Run Ping Server1- n 6.

    3. Run Net view \\Server1.

    4. Open \\server1 from the Run dialog box.

    Answer: A Explanation: Ping

    The Ping tool is still widely used, although more firewalls block Internet Control Message Protocol (ICMP) echo requests than used to be the case. However, even if you cannot get past a firewall on your organization’s network, Ping is still useful. You can check that the IPv4 protocol is working on a computer by entering ping 127.0.0.1. You can then ping the IPv4 address of the computer. You can find out what this is by using the Ipconfig tool. If your computer has more than one interface combined in a network bridge, you can ping the Ipv4 address of the network bridge. When you have established that you can ping your computer using an Ipv4 address, you can test that DNS is working internally on your network (assuming you are connected to a DNS server, a WAP, or have ICS configured on your network) by pinging your computer name-for example, entering ping canberra. Note that if DNS is not implemented on your system, ping canberra still works because the IPv6 link-local address resolves automatically.

    -6 Force using IPv6.

    Question No: 276 – (Topic 3)

    You have two computers named Computer1 and Computer2 that run Windows 7. Computer2 is configured for remote management.

    From Computer1, you need to remotely execute a third-party command line tool named disk.exe on Computer2.

    Which command should you run?

    1. Start disk.exe /d \\computer2

    2. Tscon disk.exe /DEST:computer2

    3. Winrm e disk.exe Cr:computer2

    4. Winrs r:computer2 disk.exe

    Answer: D Explanation:

    WinrsYou can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS -r: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS -r:Aberdeen ipconfig.

    The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell.

    Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt.

    Question No: 277 – (Topic 3)

    A standard user named User1 has a computer that runs Windows 7. You need to ensure that User1 can run Windows Easy Transfer.

    What should you do?

    1. Disable User Account Control (UAC).

    2. Add User1 to the Administrators group.

    3. Configure User1 to have a complex password.

    4. Copy the support folder from the Windows 7 installation media to the local hard disk drive.

    Answer: B Explanation:

    Windows Easy Transfer Migration

    After you have set up Windows Easy Transfer on the source computer, you are ready to

    perform migration. If you want to migrate only a single user account, you can log on with that account to perform the transfer. If you want to migrate all accounts on the computer, you need to log on with a user account that has Local administrator privileges.

    To do this, start Windows Easy Transfer, select the transfer method, and then, on the Which Computer Are You Using Now? page, select This Is My Old Computer. If you are using the External Hard Disk or USB storage device method, Windows Easy Transfer will then perform a migration check and provide an estimate of the size of the data you can transfer to the new computer on the source computer. If you are using the Network or Easy Transfer Cable method, you will select items for migration on the destination computer.

    NOT User Account Control (UAC)

    UAC is a security feature of Windows 7 that informs you when the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks.

    Question No: 278 – (Topic 3)

    You have a computer that runs Windows 7.

    You have a system image backup of the computer.

    You install a new application that is configured to run as a service.

    You restart the computer and receive a STOP error message.

    You need to successfully start Windows 7 in the minimum amount of time. What should you do?

    1. Start the computer from the Windows 7 installation media and select Startup Repair.

    2. Start the computer and select Last Known Good Configuration from the advanced startup options.

    3. Start the computer and select Safe Mode from the advanced startup options. Restore a restore point.

    4. Start the computer and select Safe Mode from the advanced startup options. Restore the system image.

    Answer: B Explanation:

    Last Known Good Configuration (Advanced) ) feature in Advanced Boot Options is a recovery option that you use to start your computer with the most recent settings that worked. Last Known Good Configuration (Advanced) restores registry information and driver settings that were in effect the last time the computer started successfully. You should use the Last Known Good Configuration (Advanced) feature when you cannot start Windows 7 after you make a change to your computer, or when you suspect that a change that you just made is causing a problem, for example, if you cannot start Windows after you install a new video driver. When you start your computer by using the Last Known Good Configuration (Advanced) feature, Windows 7 uses the configuration stored in the following registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSetXX (where by XX are numbers starting with 01 and rising in number to 02, 03, 04 and so on).

    This is the registry key that is used to store the configuration settings for the Drivers and Services on the system. Each time you boot the system, Windows will be assisted booting by using the registry key quot;HKEY_LOCAL_MACHINE\System\CurrentControlSetquot; which will point to another control set key, normally HKEY_LOCAL_MACHINE\System\CurrentControlSet01, (depending on how the system is configured) which contains the setting for the current boot process.

    Each time Windows boots there will also be a values created under the quot;HKEY_LOCAL_MACHINE\System\CurrentControlSet\Selectquot; key. These contain REG_DWORD data that enable the Control Keys to operate the way they are designed to. These values tell the CurrentControlSet key which numbered CurrentControlSet to point to enable Windows to boot successfully. The data that tells Last Good Known Configuration which numbered CurrentControlSet to load is also stored under these values. They also contain the data that tells Windows which CurrentContolSet not to use, as there is information stored that lets Windows know what CurrentControlSet has failed to load when

    Windows was unable to boot.

    The Last Known Good Configuration CurrentControlSet will change each time the system configuration for the control set changes. This means that each time you install or uninstall a driver or service, a new numbered CurrentControlSet will be created and stored. If you alter the system, and it is then unable to boot, the Last Known Good Configuration will point to the CurrentControlSet that was last used in a successful boot.

    This happens each time that Windows boots and there should typically be only four control sets, although it is not uncommon to have five or six of these Control Sets contained in the registry. Windows will keep track of how many Control Sets are stored and should clear old ones once a certain amount is reached.

    If installing a new program or device should render the system unbootable, you may be able to use quot;Last Known Good Configurationquot; to restore the damaged Control Set registry key with an earlier key that enabled the system to boot. This will remove the registry key(s) that relates to the problem driver or service. It will not remove the actual driver or service but will render it unusable. This could result in any program or device the was installed after the last boot having to be re-installed as their configuration setting will have been over written.

    When you perform a system restore following a normal boot or following a boot that uses the Last Known Good Configuration (Advanced) option, a restore point is created that enables you to undo the changes if they do not fix your problem. However, if you perform a system restore when the computer is in Safe Mode or by using the System Recovery options, you cannot undo the restore operation. In this case, if your problem is not resolved, you can run another system restore and choose a different restore point.

    Question No: 279 – (Topic 3)

    You manage several computers that run Windows 7. A user wants to roll back a driver.

    The user opens the device properties in Device Manager and discovers that the Roll Back Driver option is unavailable.

    You connect to the computer by using Windows Remote Assistance.

    You need to roll back the driver to its previous version. What should you do first?

    1. Add the user to the Power Users group.

    2. Right-click Device Manager and select Run as administrator.

    3. From System Properties, modify Device Installation Settings.

    4. From the Local Group Policy, modify Device Installation Restrictions.

    Answer: B Explanation:

    You can open Device Manager on a computer running Windows 7 while logged on with any account. However, by default, only administrators can make changes to devices and install, uninstall, and roll back drivers. You can open Device Manager in the following ways: – In Control Panel, click Hardware And Sound. Click Device Manager under Devices And Printers.

  • Click Start, right-click Computer, and choose Manage. Click Device Manager in the Computer Management tree pane.

  • Open an elevated command prompt and enter mmc devmgmt.msc. Note that if you do not run the command prompt as administrator, Device Manager opens as read-only.

    Question No: 280 – (Topic 3)

    Your network contains computers that run Windows 7 and Windows Vista. All computers are members of the same domain. You have a computer named Computer1 that runs Windows 7.

    You need to ensure that users can remotely log on to Computer1 from any computer on the network.

    What should you do on Computer1?

    1. Select the Allow Remote Assistance connections to this computer check box. Add the Domain Users group to the Power Users group.

    2. Select the Allow Remote Assistance connections to this computer check box. Add the Domain Users group to the Administrators group.

    3. Select the Allow connections from computers running any version of Remote Desktop

      (less secure) check box. Add the Domain Computers group to the Remote Desktop Users group.

    4. Select the Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) check box. Add the Domain Users group to the Remote Desktop Users group.

    Answer: D

    100% Ensurepass Free Download!
    Download Free Demo:70-680 Demo PDF
    100% Ensurepass Free Guaranteed!
    70-680 Dumps

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.