IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

MCTS 70-680 (TS:Windows 7,Configuring)인증덤프

IT업계에서 자신만의 위치를 찾으려면 자격증을 많이 취득하는것이 큰 도움이 될것입니다.  MCTS 70-680 (TS:Windows 7,Configuring)시험은 아주 유용한 시험입니다.  MCTS 70-680 (TS:Windows 7,Configuring)시험출제경향을 퍼펙트하게 연구하여 Pass4Test에서는   MCTS 70-680 (TS:Windows 7,Configuring)시험대비덤프를 출시하였습니다. Pass4Test에서 제공해드리는   MCTS 70-680 (TS:Windows 7,Configuring)시험덤프는 시장에서 판매하고 있는   MCTS 70-680 (TS:Windows 7,Configuring)덤프중 가장 최신버전덤프로서 덤프에 있는 문제만 공부하시면 시험통과가 쉬워집니다.

 

Test 70-680 Objectives:
Installing, upgrading, and migrating to Windows 7 (14%)
Deploying Windows 7 (13%)
Configuring hardware and applications (14%)
Configuring network connectivity (14%)
Configuring access to resources (13%)
Configuring mobile computing (10%)
Monitoring and maintaining systems that run Windows 7 (11%)
Configuring backup and recovery options (11%)

 

NO.1 You have a computer that runs windows 7.
You need to configure the monitor on the computer to turn off after 30 minutes of inactive.
What should you do?
A. From personalization, change the theme.
B. From display, change display settings.
C. From action center, change the Action Center settings.
D. From power options, change the current power plan settings.
Answer: D

NO.2 You have a computer that runs windows 7.
The windows experience index displays the subscores in the following.
Component Subscore
Processor 6.9
Memory (RAM) 5.3
Graphics 3.2
Gaming graphics 4.1
Primary hard disk 4.5
You need to increase the Windows Experience Index base score.
What should you do?
A. Add more RAM.
B. Add a second hard disk.
C. Upgrade the video adapter.
D. Upgrade to a faster processor.
Answer: C

NO.3 You have a customized image of Windows 7 Professional.
You need to create a new unattended file to automate the deployment of the image. You must
achieve this goal by using the minimum amount of administrative effort. What should you do first?
A. Run Imagex.exe and specify the /mount parameter.
B. Run Dism.exe and specify the /mount-WIM parameter.
C. From Microsoft Deployment Toolkit (MDT), add the custom Windows image (WIM).
D. From Windows System Image Manager (Windows SIM), open the custom Windows image (WIM).
Answer: D
Explanation:
Windows SIMOpens Windows images, creates answer files, and manages distribution shares and
configuration sets.NOT DismDeployment Image Servicing and Management (DISM) is a command-line
tool used to service Windows@ images offline before deployment. You can use it to install, uninstall,
configure, and update Windows features, packages, drivers, and international settings. Subsets of the
DISM servicing commands are also available for servicing a running operating system.NOT
ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and
corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX
works with Windows image (.wim) files for copying to a network, or it can work with other
technologies that use .wim images, such as Windows Setup, Windows Deployment Services
(Windows DS), and the System Management Server (SMS) Operating System Feature Deployment
Pack./mountMounts a .wim file from Windows XP with Service Pack 2 (SP2), Windows Server 2003
with Service Pack 1 (SP1), or Windows Vista with read-only permission to a specified directory. Once
the file is mounted, you may view, but not modify, all the information contained in the directory.NOT
MDT MDT 2010 is the Microsoft solution accelerator for operating system and application
deployment and offers flexible driver management, optimized transaction processing, and access to
distribution shares from any location. You can use the MDT on imaging and deployment servers to
implement the automatic deployment of Windows 7 (for example) on client computers. It is possible
to run MDT 2010 on a client running Windows 7, but in practice it would typically run from a
distribution server running Windows Server 2008. The MDT provides detailed guidance and job aids
and offers a common deployment console that contains unified tools and processes that you can use
for client and server deployment. The toolkit offers standardized desktop and server images, along
with improved security and ongoing configuration management.

NO.4 A company has client computers that run Windows 7 Enterprise.
A user is asked to remove encryption from a locally saved folder so that other users can
read and write to that folder.
You need to verify that the folder is not encrypted with the Encrypting File System (EFS).
What should you use to accomplish this goal?
A. Device Manager
B. Local Users and Groups
C. the User Account Control Settings Control Panel window
D. the icacls command
E. the Group Policy management console
F. share permissions
G. the netsh command
H. the Services management console
I. the folder Properties window
Answer: I

NO.5 You are a network administrator for a law firm that has Windows 7 computers as part of a
domain. Users are not administrators of their own computers.
A lawyer is working on a critical case and wants to use a Windows 7 laptop to access a computer in
the office. The lawyer connects to the corporate VPN and receives a message that states that the
lawyer does not have permission to use Remote Desktop to connect to the computer.
You need to allow the lawyer to access the computer in the office.
What should you do?
A. Upgrade the Remote Desktop Client application on the users laptop.
B. Add the user to the Remote Desktop Users group of the target computer.
C. Select Allow connections from computers running any version of Remote Desktop on the Remote
tab of the computer.
D. Allow Remote Desktop through Windows Firewall.
Answer: B

NO.6 You have a computer that runs Windows 7.
You enable Advanced Audit Policy Configuration in the Local Computer Policy and discover that the
policy is not applied.
You need to ensure that Advanced Audit Policy Configuration is applied on the computer.
What should you do?
A. Restart the computer.
B. Run Gpupdate /force.
C. Enable the Security Settings policy option.
D. Run Secedit /refreshpolicy machine_policy.
Answer: B

NO.7 You manage Windows 7 computers in your company.
The company uses a file share to store files. A group currently has permissions to access the share,
but not the files in it They need permissions to update and delete files in the share but not to modify
the permissions on the files.
You need to grant NTFS permissions to the group by using the standard permissions dialog.
Which permission(s) should you grant the group on the folder?
A. Read and Execute
B. Modify
C. Full Control
D. Write
Answer: B

NO.8 You have a computer that runs Windows 7.
You need to record when an incoming connection is allowed through Windows firewall.
What should you do?
A. In Local Group Policy, modify the audit policy.
B. In Local Group Policy, modify the system audit policy.
C. From the Windows Firewall with Advanced Security properties, set the logging settings to Log
successful connections.
D. From the Windows Firewall with Advanced Security properties, set the Data Protection (Quick
Mode) IPSec settings to Advanced.
Answer: C
Explanation:
Customize Logging Settings for a Firewall Profile Windows Firewall with Advanced Security can be
configured to log events that indicate the successes and failures of its processes. The logging settings
involve two groups of settings: settings for the log file itself and settings that determine which events
the file will record. The settings can be configured separately for each of the firewall profiles. You can
specify where the log file will be created, how big the file can grow, and whether you want the log file
to record information about dropped packets, successful connections, or both. Log successful
connectionsUse this option to log when Windows Firewall with Advanced Security allows an inbound
connection. The log records why and when the connection was formed. Look for entries with the
word ALLOW in the action column of the log.

Posted 2014/12/30 10:13:55  |  Category: Microsoft  |  Tag: 70-680인증덤프