Top 10 guidance 70-680 for IT candidates (241 to 250)
Q241. - (Topic 5)
Your company network has a single-domain Active Directory forest. The forest functional level is set to Windows Server 2008 R2. All computers are members of the domain.
You plan to deploy Windows BitLocker Drive Encryption (BitLocker) on portable computers that have Windows 7 Enterprise installed.
You need to be able to automatically back up recovery passwords for BitLocker-protected disk volumes on the portable computers.
What should you do before you start encrypting the disk volumes with BitLocker?
A. Run the cscript Get-TPMOwnerlnfo.vbs script on the client computers.
B. Select the Turn on BitLocker backup to Active Directory option in local policy on the portable computers.
C. Run the cscript Get-BitLockerRecoverylnfo.vbs script on the portable computers.
D. Run the Idifde -i -v -f BitLockerTPMSchemaExtension.ldf -c script on a domain controller.
Q242. - (Topic 2)
You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of an Active Directory domain.
Windows Remote Management (WinRM) is enabled on both computers.
You need to remotely create additional disk volumes on Computer1 from Computer2.
What should you do?
A. On Computer2, run Winrs and then run Diskpart.
B. On Computer2, run Winrs and then run Diskmgmt.msc.
C. On Computer1, install the Telnet Client and then run Diskpart from Computer2.
D. On Computer1, install the Telnet Client and then use Disk Management from Computer2.
Winrs You can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS –r: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS –r:Aberdeen ipconfig The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt.
Diskpart: Microsoft command-line tool Diskpart is used to create and format volumes on the target computer.
Q243. - (Topic 4)
You have two computers named Workstation! and Workstation2 that have Windows 7 SP1 installed.
You connect to Workstation2 from Workstation1 by using Remote Desktop.
You need to be able to copy files between the computers during the Remote Desktop session.
What should you do?
A. On Workstation2, open Remote Desktop Connection and configure the Local devices and resources settings.
B. On Workstation1, open Remote Desktop Connection and configure the Local devices and resources settings.
C. On Workstation2, type MSTSC /v:Computer1 /f /console.
D. On Workstation1, open Remote Desktop Connection and configure the Connect from Anywhere settings.
How can I use my devices and resources in a Remote Desktop session? Redirecting a device on your computer makes it available for use in a Remote Desktop session. If you have a recent version of Remote Desktop, you can redirect most devices, including printers, smart cards, serial ports, drives, Plug and Play devices, media players based on the Media Transfer Protocol (MTP), and digital cameras based on the Picture Transfer Protocol (PTP). Some USB devices can be redirected, and you can also redirect your Clipboard.
Q244. - (Topic 4)
You have a netbook computer that runs Windows 7. The computer has a single 30-GB partition that has 10 GB of free space. You need to create a system image of the computer by using Windows Backup.
You must achieve this goal by using the minimum amount of time. What should you do first?
A. Attach an external hard disk.
B. Attach an external DVD burner.
C. Convert the local hard disk to a GPT disk.
D. Create and attach a virtual hard drive (VHD).
Scheduling Backups with the Backup And Restore Console Windows 7 Backup uses shadow copies to take a snapshot of your files, allowing the backup to completely back up files even if they are open. Backups are configured and scheduled by using the Backup And Restore console under System And Security in Control Panel. You can select the following types of backup destination: An external hard driveExternal hard drives are more expensive to purchase than internal hard drives, although you need to balance this against the cost of fitting the internal drive. They can be removed and stored in a secure location. However, they are typically slower than internal hard drives and tend to be less reliable, mainly because they are by default formatted using FAT rather than NTFS. You cannot use an external hard drive for a System Image backup unless you convert its filing system to NTFS. Because it is easily removable, it is more likely that an external hard drive will be missing when a scheduled backup is required.
Q245. - (Topic 2)
You have a computer that runs Windows 7.
You perform regular data backups and system image backups. The computer experiences a hard disk failure. You replace the failed hard disk.
You need to recover the computer to the previous Windows 7 environment.
You start the computer from the Windows 7 installation media.
Which recover option should you select?
A. Command Prompt
B. Startup Repair
C. System Image Recovery
D. System Restore
System Image Recovery Enables you to implement a System Image restore. You would choose this option if your hard disk failed or needed to be wiped. If system changes are causing problems, you would choose the System Restore option.NOT Startup Repair Automatically fixes problems that prevent Windows from starting. If Windows 7 had boot problems during a previous restart, a normal boot (without accessing the Advanced Boot dialog box) gives you the option of selecting Startup Repair.NOT System Restore Gives you another method of starting a system restore to a previous restore point. Because you can access this menu when you boot from a DVD-ROM, this lets you repair your system when recent changes to system settings prevent your computer from booting normally.NOT Command Prompt Gives access to the file system, volumes, and files through a command-line interface.
Q246. - (Topic 2)
You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1 attempts to access a Web page.
User1 fails to access the Web page and receives an error message stating that the page does not have a rating.
You need to configure Internet Explorer to allow User1 to access Web pages that do not have a rating.
Which settings should you modify?
A. Content Advisor
B. InPrivate Filtering
C. Parental Controls
D. Restricted Sites
Using Content Advisor to help block inappropriate web content The Internet is a great resource for children, offering a wealth of information and experiences. However, it can also expose children to information that might not be appropriate for them. Content Advisor allows you to control the types of Internet content that can be viewed on your computer. Depending on how you configure it, Content Advisor uses ratings that websites voluntarily provide to block or allow certain content. Because not all websites are rated, unrated websites are automatically blocked (but you can choose to allow them). Once you've adjusted the settings and turn Content Advisor on, it checks websites as you visit them. To use Content Advisor, you first need to create the supervisor password, and then you can specify the filters and rules you want applied to your children's web use. To change settings, you'll need to log in with the supervisor password before you can make changes. The following procedures describe how to create or change your supervisor password, and how to make specific changes to control Internet use. To allow unrated sites By default, content advisor will block unrated websites. To allow unrated sites to be viewed, follow the steps below.
9. Click to open Internet Explorer.
10. Click the Tools button, and then click Internet Options.
11. Click the Content tab, and then, under Content Advisor, click Settings. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
12. In the Supervisor Password Required dialog box, type your password, and then click OK.
13. In the Content Advisor dialog box, click the General tab.
14. Under User options
Q247. HOTSPOT - (Topic 4)
You use a computer that has Windows 7 installed. You install a legacy application named LegApp.
LegApp is designed for Windows 98 and does not support the 16-bit or 32-bit color quality setting.
You need to configure application compatibility settings for LegApp to meet the following requirements:
. Compatible with Windows 98
. The 8-bit color quality setting must be used
What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.)
Q248. - (Topic 1)
Which of the following must you download from Microsoft's Web site to obtain USMT 4.0?
A. Windows Anytime Upgrade
B. Windows Upgrade Advisor
D. Microsoft Application Compatibility Toolkit
User State Migration Tool USMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState.
Q249. - (Topic 1)
Your network has a main office and a branch office. The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled.
Users at the branch office report that it takes several minutes to open large files located in the main office.
You need to minimize the amount of time it takes for branch office users to open files located in the main office.
The solution must also reduce the amount of bandwidth used between the two offices.
What should you do?
A. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers.
B. At the main office, configure the servers to use Background Intelligent Transfer Service (BITS).
C. At the branch office, configure the client computers to use BranchCache Hosted Cache mode.
D. At the branch office, configure the client computers to use BranchCache Distributed Cache mode.
Distributed Cache ModeDistributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link. When it accesses the file from its peer, it also copies that file into its own cache. The advantage of distributed cache mode is that you can deploy it without having to deploy a server running Windows Server 2008 R2 locally in each branch office. The drawback of Distributed Cache mode is that the contents of the cache available on the branch office LAN depend on which clients are currently online. If a client needs a file that is held in the cache of a computer that is shut down, the client needs to retrieve the file from the host server across the WAN.Hosted Cache ModeHosted Cache mode uses a centralized local cache that hosted on a branch office server running Windows Server 2008 R2. You can enable the hosted cache server functionality on a server running Windows Server 2008 R2 that you use for other functions without a significant impact on performance. This is because if you found that files hosted at another location across the WAN were being accessed so frequently that there was a performance impact, you would use a solution like Distributed File System (DFS) to replicate them to the branch office instead of using BranchCache. The advantage of Hosted Cache mode over Distributed Cache mode is that the cache is centralized and always available. Parts of the distributed cache become unavailable when the clients hosting them shut down.Background Intelligent Transfer Service (BITS)The Background Intelligent Transfer Service (BITS) has two role services: the Compact Server and the IIS Server Extension. The Compact Server is a stand-alone HTTP or HTTPS file server, whereas the IIS Server Extension is an Internet Information Services (IIS) plug-in that requires a server running IIS. IIS Server ExtensionThe BITS IIS Server Extension lets you configure a server that is running IIS to allow BITS clients to perform background, resumable file uploads to IIS virtual directories. On completion of a file upload, the BITS Server can notify a Web application of the newly uploaded file. This allows the application to process the uploaded file. The Web application can then optionally reply to the client responsible for the upload.Compact ServerThe BITS Compact Server is a stand-alone HTTP or HTTPS file server, which allows applications to host files for BITS clients to download, and allows the asynchronous transfer of a limited number of large files between computers.QoS Packet SchedulerThe Quality of Service Packet Scheduler is a Windows platform component that is enabled by default on Windows Vista. and Windows XP computers. It is, however, not enabled by default on Windows 2003 computers. This scheduler is designed to control the IP traffic for various network services, including Real Time Communications traffic. This component must be installed and enabled if the QoS markings described earlier for audio and video traffic are to be implemented by the IP stack.
Q250. DRAG DROP - (Topic 5)
You administer portable computers that have Windows 7 Professional installed. All computers have wireless network interface cards (Wi-Fi). You plug a new wireless wide area network (WWAN) device to your computer. The WWAN device that connects to a 3G network provides Internet access.
Other portable computers equipped only with Wi-Fi cannot access Internet resources.
You need to configure Internet access for the portable computers by using a wireless ad-hoc network configured on your computer.
What should you do? (To answer, drag the appropriate target computer or computers to the correct configuration step or steps in the answer area. An answer choice can be used once, more than once, or not at all.)