[Free] 2018(Mar) EnsurePass Testinsides Microsoft 70-680 Dumps with VCE and PDF 61-70

Ensurepass.com : Ensure you pass the IT Exams
2018 Mar Microsoft Official New Released 70-680
100% Free Download! 100% Pass Guaranteed!

TS: Windows 7, Configuring

Question No: 61 – (Topic 1)

Your network contains an Active Directory domain. All servers run Windows Server 2008 R2 and are members of the domain. All servers are located in the main office.

You have a portable computer named Computer1 that runs Windows 7. Computer1 is joined to the domain and is located in a branch office.

A file server named Server1 contains a shared folder named Share1. You need to configure Computer1 to meet the following requirements:

->Minimize network traffic between the main office and the branch office

->Ensure that Computer1 can only access resources in Share1 while it is connected to the network.

What should you do?

  1. On Computer1, enable offline files.

  2. On Computer1, enable transparent caching.

  3. On Server1, configure DirectAccess.

  4. On Server1, configure Share1 to be available offline.

Answer: B Explanation: Transparent Caching

When you enable transparent caching, Windows 7 keeps a cached copy of all files that a user opens from shared folders on the local volume. The first time a user opens the file, the file is stored in the local cache. When the user opens the file again, Windows 7 checks the file to ensure that the cached copy is up to date and if it is, opens that instead. If the copy is not up to date, the client opens the copy hosted on the shared folder, also placing it in the local cache. Using a locally cached copy speeds up access to files stored on file servers on remote networks from the client. When a user changes a file, the client writes the changes to the copy of the file stored on the shared folder. When the shared folder is unavailable, the transparently cached copy is also unavailable. Transparent caching does not attempt to keep the local copy synced with the copy of the file on the remote file server as the Offline Files feature does. Transparent caching works on all files in a shared folder, not just those that you have configured to be available offline.

Question No: 62 – (Topic 1)

Which of the following is not a rating for games in Windows 7?

  1. General Audience (G)

  2. Everyone (E)

  3. Teen (T)

  4. Adults Only (AO)

Answer: A

Question No: 63 – (Topic 1)

You start a computer by using Windows Preinstallation Environment (Windows PE). You need to dynamically load a network adapter device driver in Windows PE. What should you do?

  1. Run Peimg.exe and specify the device driver path.

  2. Run Drvload.exe and specify the device driver path.

  3. Run Winpeshl.exe and specify a custom Winpeshl.ini file.

  4. Run Wpeutil.exe and specify the InitializeNetwork command.

Answer: B Explanation: Drvload

The Drvload tool adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs. To add a driver to an offline Windows PE image, use the peimg tool.NOT WinpeshlWinpeshl.ini controls whether a customized shell is loaded in Windows PE instead of the default Command Prompt window. To load a customized shell, create a file named Winpeshl.ini and place it in %SYSTEMROOT% \System32 of your customized Windows PE image. The .ini file must have the following section and entry.NOT WpeutilThe Windows PE utility (Wpeutil) is a command-line tool that enables you to run various commands in a Windows PE session. For example, you can shut down or restart Windows PE, enable or disable a firewall, set language settings, and initialize a network.

Question No: 64 – (Topic 1)

You have a computer that runs Windows 7.

You need to configure the computer to download updates from a local Windows Server Update Services (WSUS) server. What should you do?

  1. From Windows Update, modify the Windows Update settings.

  2. From the local Group Policy, modify the Windows Update settings.

  3. From the System settings, modify the System Protection settings.

  4. From the local Group Policy, modify the Location and Sensors settings.

Answer: B

Question No: 65 – (Topic 1)

Which of the following is not a volume type usable by Windows 7?

  1. FAT

  2. exFAT

  3. NTFS

  4. All of the above a volume types in Windows 7.

Answer: D

Question No: 66 – (Topic 1)

You have a computer that runs Windows 7.

You need to view the processes that currently generate network activity. What should you do?

  1. Open Resource Monitor and click the Network tab.

  2. Open Windows Task Manager and click the Networking tab.

  3. Open Event Viewer and examine the NetworkProfile Operational log.

  4. Open Performance Monitor and add all the counters for network interface.

Answer: A Explanation: Resource Monitor

Windows 7 offers an enhanced version of the Resource Monitor tool. Windows 7 Resource Monitor allows you to view information about hardware and software resource use in real time. You can filter the results according to the processes or services that you want to monitor. You can also use Resource Monitor to start, stop, suspend, and resume processes and services, and to troubleshoot unresponsive applications. You can start Resource Monitor from the Processes tab of Task Manager or by entering resmon in the Search box on the Start menu. To identify the network address that a process is connected to, click the Network tab and then click the title bar of TCP Connections to expand the

table. Locate the process whose network connection you want to identify. You can then determine the Remote Address and Remote Port columns to see which network address and port the process is connected to.

Ensurepass 2018 PDF and VCE

Question No: 67 – (Topic 1)

You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. A pre-shared key is not configured on the wireless access point.

You need to connect a computer that runs Windows 7 to the wireless access point. Which security setting should you select for the wireless connection?

A. 802.1x

  1. WPA-Personal

  2. WPA2-Enterprise

  3. WPA2-Personal

Answer: C Explanation:

WPA and WPA2 indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks. WPA2 enhances WPA, which in turn addresses weaknesses in the previous system, WEP. WPA was intended as an intermediate measure to take the place of WEP while an IEEE 802.11i standard was prepared. 802.1X provides port-based authentication, which involves communications between a supplicant (a client computer), an authenticator (a wired Ethernet switch or WAP), and an authentication server (typically a Remote Authentication Dial In User Service, or RADIUS, server).


WPA-Enterprise and WPA2-Enterprise authenticate through the Extensible Authentication Protocol (EAP) and require computer security certificates rather than PSKs. The following EAP types are included in the certification program:






If you want to use AES and to use computer certificates rather than a PSK, you would choose WPA2- Enterprise.WPA2-PersonalIf you have a small network that is not in a domain and cannot access a CA server, but you install a modernWAP that supports AES, you would use WPA2-Personal (with a PSK).WPA-Personal

If you have a small network that is not in a domain and cannot access a CA server and your WAP does not support AES, you would use WPA-Personal.802.1x

If you have a RADIUS server on your network to act as an authentication server and you want the highest possible level of security, you would choose 802.1X.

Question No: 68 – (Topic 1)

Which of the following is true of Windows 7?

  1. MailCentral is included as the new default mail client with Windows 7.

  2. Outlook Express is included with Windows 7.

  3. Microsoft Outlook is included with Windows 7.

  4. There is no preinstalled mail client included with Windows 7.

Answer: D

Question No: 69 – (Topic 1)

You have a computer that runs Windows 7.

You run the Configure Backup wizard as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can back up the computer to a local disk drive. What should you do before you run the Configure Backup wizard?

Ensurepass 2018 PDF and VCE

  1. Connect a removable disk.

  2. Log on as an administrator.

  3. Start the Volume Shadow Copy Service (VSS).

  4. Add your user account to the Backup Operators group.

Answer: A Explanation:

An external hard drive External hard drives can be removed and stored in a secure location. However, they are typically slower than internal hard drives and tend to be less reliable, mainly because they are by default formatted using FAT rather than NTFS. You cannot use an external hard drive for a System Image backup unless you convert its filing system to NTFS. Because it is easily removable, it is more likely that an external hard drive will be missing when a scheduled backup is required. (Local disk drive was specified, not internal)NOT AdministratorYou need administrator credentials to configure scheduled backups or to manually initiate a backup. However, restoring files does not require administrator privileges unless a user attempts to restore another user’s file. (NOTE: The issue was a lack of location to store the Backup, not being about to run the Configure Backup, thus it was assumed that the user in this scenario had administrator credentials)NOT Backup OperatorsMembers of this group are able to override file and folder access restrictions for the purpose of backing up data. You can allow a user to back up files and directories by assigning them to the Backup Operators group rather than by modifying the Back Up Files and Directories policy.NOT VSSVSS is installed on computers running Windows 7. Its startup type is Manual. The service starts as needed. If the service does not start when required, shadow copies are unavailable for backup and Windows Backup does not succeed. Nor can you create restore points and previous versions. In this case, check the service and ensure that it has not been disabled.

Question No: 70 – (Topic 1)

You manage a computer that runs Windows 7.

You are tasked to identify which applications were installed during the last week. What Windows component would you use to find this information? Choose two.

  1. Check the Windows System Change Log in the Control Panel.

  2. View the events in the Applications Log under Windows Logs in the System and Security component section of the Control Panel.

  3. The informational events should be reviewed from Reliability Monitor.

  4. Check the Windows System Diagnostics Report under the Performance Monitor MMC.

Answer: B,C

100% Ensurepass Free Download!
Download Free Demo:70-680 Demo PDF
100% Ensurepass Free Guaranteed!
70-680 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.