Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Microsoft Official New Released 70-680
100% Free Download! 100% Pass Guaranteed!

TS: Windows 7, Configuring

Question No: 91 – (Topic 1)

Federated Search connectors are installed using what method?

  1. Purchase the Federated Search Installation Tool Pack online and buying individual search connectors from websites.

  2. Download an .osdx file from a valid source. Double click on the downloaded file and choose Add to install.

  3. Go to Microsoft#39;s website. Only vendors who have signed up with the Microsoft Federated Search Tool

    Writers Guild can participate.

  4. Go to Amazon.com and download the Shared Resource Kit for Federated Searches.

Answer: B

Question No: 92 – (Topic 1)

You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate.

You need to ensure that your user account can decrypt all EFS files on the computer. What should you do?

  1. From Credential Manager, add a Windows credential.

  2. From Credential Manager, add a certificate-based credential.

  3. From the local computer policy, add a data recovery agent.

  4. From the local computer policy, modify the Restore files and directories setting.

    Answer: C Explanation: EFS Recovery

    Recovery Agents are certificates that allow the restoration of EFS encrypted files. When a recovery agent has been specified using local policies, all EFS encrypted files can be recovered using the recovery agent private key. You should specify a recovery agent before you allow users to encrypt files on a client running Windows 7. You can recover all files that users encrypt after the creation of a recovery agent using the recovery agent’s private key. You are not able to decrypt files that were encrypted before a recovery agent certificate was specified. You create an EFS recovery agent by performing the following steps:

    1. Log on to the client running Windows 7 using the first account created, which is the default administrator account.

    2. Open a command prompt and issue the command Cipher.exe /r:recoveryagent

    3. This creates two files: Recoveryagent.cer and Recoveryagent.pfx. Cipher.exe prompts you to specify a password when creating Recoveryagent.pfx.

    4. Open the Local Group Policy Editor and navigate to the \Computer Configuration\Windows Settings\Security Settings\Public Key Policies\Encrypting File System node. Right-click this node and then click Add Data Recovery Agent. Specify the location of Recoveryagent.cer to specify this certificate as the recovery agent.

    5. To recover files, use the certificates console to import Recoveryagent.pfx. This is the recovery agent’s private key. Keep it safe because it can be used to open any encrypted file on the client running Windows 7.

      Question No: 93 – (Topic 1)

      You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You have a computer that runs Windows 7.

      You run Runas and specify the /savecred parameter to start an application. The stored password needs to be deleted.

      What action should you perform?

      1. The Windows credentials should be modified from Credential Manager.

      2. The Authorization Manager options should be modified from Authorization Manager.

      3. Del should be run and the /p parameter should be specified.

      4. Runas should be run and the /noprofile parameter should be specified.

Answer: A

Question No: 94 – (Topic 1)

Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain.

From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain.

You need to ensure that you can recover all EFS encrypted files from Computer2. What should you do?

  1. On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore

    %systemroot%\DigitalLocker.

  2. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.

  3. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter.

  4. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2,

run Cipher.exe and specify the /adduser parameter.

Answer: B Explanation:

You can import the recovery agent to another computer running Windows 7 if you want to recover files encrypted on the first computer. You can also recover files on another computer running Windows 7 if you have exported the EFS keys from the original computer and imported them on the new computer. You can use the Certificates console to import and export EFS keys.

NOT Secedit.exe:

You can use both the Local Group Policy Editor and the Local Security Policy console to import and export security-related Group Policy settings. You can use this import and export functionality to apply the same security settings to stand-alone computers that are not part of a domain environment. Exported security files are written in Security Template

.inf format. As well as using Local Group Policy Editor and the Local Security Policy console to import policies that are stored in .inf format, you can apply them using the Secedit.exe command-line utility.

NOT Cipher.exe /removeuser /adduser. NOT DigitalLocker.

Question No: 95 – (Topic 1)

You have a computer named Computer1 that runs Windows 7.

You need to ensure that Computer1 can connect to File Transfer Protocol (FTP) servers only while it is connected to a private network.

What should you do?

  1. From Windows Firewall with Advanced Security, create a new rule.

  2. From the local Group Policy, modify the application control policies.

  3. From Windows Firewall, modify the Allowed Programs and Features list.

  4. From Network and Sharing Center, modify the Advanced Sharing settings.

Answer: A

Explanation:

Creating WFAS Rules

The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, shown in Figure 7-7, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.

Question No: 96 – (Topic 1)

You are creating an unattend answer file for automatic Windows 7 installation. What can you use to do this? Choose two.

  1. The Windows SIM tool in Windows AIK

  2. Microsoft Notepad

  3. The Deployment Workbench MDT tool

  4. Sysprep.exe

Answer: A,B

Question No: 97 – (Topic 1)

The Aero Shake feature will work if which of the following conditions are met? Choose Two.

  1. A display adapter compatible with WDDM is installed.

  2. Aero features are downloaded from Microsoft.

  3. The windows experience index is at least 2.

  4. The Windows Experience Index is 3 or greater.

Answer: A,D

Question No: 98 – (Topic 1)

You have a standalone computer that runs Windows 7. You need to prevent non- administrative users from using Device Manager. Users must be able to access Event Viewer.

What should you do?

  1. From Control Panel, modify the default settings for media and devices.

  2. From Control Panel, modify the default settings for device installation.

  3. From the local computer policy, modify the application control policies.

  4. From the local computer policy, modify the Microsoft Management Console (MMC) settings.

Answer: D Explanation:

Controlling MMC usage by using local Group Policy To control MMC usage by using local Group Policy

  1. Open MMC 3.0.

  2. On the File menu, click Add/Remove Snap-in.

  3. In the Available snap-ins list, click the Group Policy editor, and then click Add.

  4. In the Select Group Policy Object wizard, use the default setting, Local Computer, in the Group Policy Object field.

  5. Click Finish to close the Select Group Policy Object wizard.

  6. By default, all available snap-in extensions are enabled. If you want to enable only certain extensions, highlight the snap-in in the Selected snap-ins list, and then click Edit Extensions.

  7. By default, snap-ins load as child objects of the Console Root node. Click Advanced to modify this behavior and allow you to choose a different parent snap-in.

  8. In the Add or Remove Snap-ins dialog box, click OK.

  9. Before closing the new console, perform any of these procedures:

  • To restrict access to author mode in MMC

  • To restrict access to a permitted list of snap-ins

  • To permit or restrict access to a snap-in

  • Question No: 99 – (Topic 1)

    Your company has a main office and a branch office. The relevant portion of the network is configured as shown in the exhibit. (Click the Exhibit button.)

    Ensurepass 2018 PDF and VCE

    In the branch office, you deploy a new computer named Computer1 that runs Windows 7. You need to assign an IP address to Computer1.

    Which IP address should you use?

    A. 192.168.2.30

    B. 192.168.2.40

    C. 192.168.2.63

    D. 192.168.2.65

    Answer: B Explanation:

    Internal IP Adress of router is 192.168.2.62/27Leaves 5 bits for range = 32 addresses (including the 2 reserved addresses)Subnet Mask = 255.255.255.224

    Ensurepass 2018 PDF and VCE

    Question No: 100 – (Topic 1)

    Your network has a main office and a branch office. The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled.

    Users at the branch office report that it takes several minutes to open large files located in the main office.

    You need to minimize the amount of time it takes for branch office users to open files located in the main office.

    The solution must also reduce the amount of bandwidth used between the two offices. What should you do?

    1. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers.

    2. At the main office, configure the servers to use Background Intelligent Transfer Service (BITS).

    3. At the branch office, configure the client computers to use BranchCache Hosted Cache mode.

    4. At the branch office, configure the client computers to use BranchCache Distributed Cache mode.

    Answer: D Explanation:

    Distributed Cache ModeDistributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link. When it accesses the file from its peer, it also copies that file into its own cache. The advantage of distributed cache mode is that you can deploy it without having to deploy a server running Windows Server 2008 R2 locally in each branch office. The drawback of Distributed Cache mode is that the contents of the cache available on the branch office LAN depend on which clients are currently online. If a client needs a file that is held in the cache of a computer that is shut down, the client needs to retrieve the file from the host server across the WAN.Hosted Cache ModeHosted Cache mode uses a centralized local cache that hosted on a branch office server running Windows Server 2008 R2. You can enable the hosted cache server functionality on a server running Windows Server 2008 R2 that you use for other functions without a significant impact on performance. This is because if you found that files hosted at another location across the WAN were being accessed so frequently that there was a performance impact, you would use a solution like Distributed File System (DFS) to replicate them to the branch office instead of using BranchCache. The advantage of Hosted Cache mode over Distributed Cache mode is that the cache is centralized and always available. Parts of the distributed cache become unavailable when the clients hosting them shut down.Background Intelligent Transfer Service (BITS)The Background Intelligent Transfer Service (BITS) has two role services: the Compact Server and the IIS Server Extension. The Compact Server is a stand-alone HTTP or HTTPS file server, whereas the IIS Server Extension is an Internet Information Services (IIS) plug-in that requires a server running IIS. IIS Server ExtensionThe BITS IIS Server Extension lets you

    configure a server that is running IIS to allow BITS clients to perform

    background, resumable file uploads to IIS virtual directories. On completion of a file upload, the BITS Server can notify a Web application of the newly uploaded file. This allows the application to process the uploaded file. The Web application can then optionally reply to the client responsible for the upload.Compact ServerThe BITS Compact Server is a stand- alone HTTP or HTTPS file server, which allows applications to host files for BITS clients to download, and allows the asynchronous transfer of a limited number of large files between computers.QoS Packet SchedulerThe Quality of Service Packet Scheduler is a Windows platform component that is enabled by default on Windows VistaŚļź and Windows XP computers. It is, however, not enabled by default on Windows 2003 computers. This scheduler is designed to control the IP traffic for various network services, including Real Time Communications traffic. This component must be installed and enabled if the QoS markings described earlier for audio and video traffic are to be implemented by the IP stack.

    Topic 2, Volume B

    100% Ensurepass Free Download!
    Download Free Demo:70-680 Demo PDF
    100% Ensurepass Free Guaranteed!
    70-680 Dumps

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    This site uses Akismet to reduce spam. Learn how your comment data is processed.