Proper study guides for Regenerate Microsoft TS:Windows 7,Configuring certified begins with Microsoft 70 680 exam preparation products which designed to deliver the Best Quality 70 680 practice test questions by making you pass the 70 680 practice test test at your first time. Try the free mcts 70 680 demo right now.
Q11. - (Topic 3)
You are the administrator of a computer named Computer1 that runs Windows 7. Several users share Computer1. The users plan to encrypt files on the computer.
You need to ensure that you can access all encrypted files on the computer.
What should you do first?
A. At a command prompt, run Cipher.exe.
B. At a command prompt, run Certutil.exe.
C. From the local computer policy, modify the User Rights Assignment.
D. From User Accounts, run the Manage your file encryption certificates wizard.
Answer: A
Explanation:
Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed. When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.
If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data.
/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521.
Q12. - (Topic 4)
A company has client computers that run Windows 7 Enterprise.
You need to configure new NTFS permissions to ensure that only the specified user has access to write to a given folder.
What should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. the icacls command
B. the User Account Control Settings Control Panel window
C. share permissions
D. Local Users and Groups
E. the folder Properties window
F. the Services management console
G. the netsh command
H. Device Manager
I. the Group Policy management console
Answer: A,E
Q13. - (Topic 4)
A company has client computers that run Windows 7 Enterprise.
A user is asked to remove encryption from a locally saved folder so that other users can read and write to that folder.
You need to verify that the folder is not encrypted with the Encrypting File System (EFS).
What should you use to accomplish this goal?
A. Device Manager
B. Local Users and Groups
C. the User Account Control Settings Control Panel window
D. the icacls command
E. the Group Policy management console
F. share permissions
G. the netsh command
H. the Services management console
I. the folder Properties window
Answer: I
Explanation:
http://technet.microsoft.com/en-us/windows/how-do-i-get-started-with-the-encrypting-file-system-in-windows-7.aspx
Q14. - (Topic 3)
You have a computer named Computer1 that runs Windows 7 and Windows Internet Explorer 8.
A user reports that Computer1 has a number of Internet Explorer configuration issues that cause instability when browsing the Internet.
You need to configure Internet Explorer to use all default settings.
What should you do from Internet Options?
A. From the Advanced tab, click Reset.
B. From the Programs tab, click Set programs.
C. From the Advanced tab, click Restore advanced settings.
D. From the Security tab, click Reset all zones to default level.
Answer: A
Explanation:
Reset Internet Explorer settings By resetting Internet Explorer settings, you return Internet Explorer to the state it was in when it was first installed on your computer. This is useful for troubleshooting problems that might be caused by settings that were changed after installation. When you delete personal settings, some webpages that rely on previously stored cookies, form data, passwords, or previously installed browser add-ons might not work correctly. Resetting Internet Explorer to its default settings does not delete your favorites, feeds, Web Slices, and a few other personalized settings. See the table below for a complete list of all settings and information about whether they are reset or maintained. Resetting Internet Explorer's settings is not reversible. After a reset, all previous settings are lost and cannot be recovered. Rather than resetting everything, you might want to reset specific settings or delete your webpage history. For more information, see the links at the bottom of this topic.
To reset Internet Explorer settings
1. Close any Internet Explorer or Windows Explorer windows that are currently open.
2. Click to open Internet Explorer.
3. Click the Tools button, and then click Internet Options.
4. Click the Advanced tab, and then click Reset.
5. Select the Delete personal settings check box if you would like to remove browsing history, search providers, Accelerators, home pages, and InPrivate Filtering data.
6. In the Reset Internet Explorer Settings dialog box, click Reset.
7. When Internet Explorer finishes restoring the settings, click Close, and then click OK.
8. Close Internet Explorer.
Your changes will take effect the next time you open Internet Explorer.
Q15. - (Topic 3)
You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users log on to the computer.
You need to prevent the computer from displaying the username of the last user who logged on.
What should you do?
A. From Control Panel, modify the User Profiles settings.
B. From Control Panel, modify the Personalization settings.
C. From the local computer policy, add a policy template.
D. From the local computer policy, modify the local security policy.
Answer: D
Explanation:
How to Prevent the Last Logged-On User Name from Being Displayed
1. Click Start and type secpol.msc in the search box.
2. Press Enter.
3. Within the Local Security Policy, navigate to Security Settings | Local Policies | Security Options.
4. In the details pane, scroll through the options and locate Interactive logon: Do not display last user name.
5. Double click this security option and click Enabled.
6. Click OK.
Q16. - (Topic 2)
You are investigating instability and boot problems on a computer running Windows 7 Enterprise. You boot using the Last Known Good Configuration (Advanced) option and perform a system restore. This does not solve your problems, and you want to undo the system restore. Can you do this, and what is the reason for your answer?
A. No. You can undo a system restore only if you initiate it from the System Recovery tools.
B. No. You can undo a system restore only if you carry it out after booting normally.
C. Yes. You can always undo a system restore, no matter how you booted the computer or how you initiated the restore.
D. Yes. You can undo a system restore that you perform after either booting normally or booting using Last Known Good Configuration (Advanced).
Answer: D
Q17. - (Topic 5)
You have 100 computers that run Windows XP. Each computer has the following features:
Contains a single hard disk drive.
Contains a single partition.
Supports USB devices during startup.
You are planning a clean installation of Windows 7 Ultimate.
You need to ensure that the installation of Windows 7 Ultimate will support BitLocker Drive Encryption on the system partition.
What should you do?
A. Verify that the computers have a Trusted Platform Module (TPM) version 1.2 security devices.
B. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Use bcdedit.exe to create a new empty boot configuration data store.
C. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Verify the status of the partition by using manage bde.exe.
D. Start the computer from Windows 7 media. Delete the existing partition and install Windows 7 Ultimate on the unpartitioned space.
Answer: B
Q18. - (Topic 2)
A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named
Group1. The computer contains a folder named Folder1. The permissions for User1 are shown in the User1 Permissions exhibit. (Click the Exhibit button.)
The permissions for Group1 are shown in the Group1 Permissions exhibit. (Click the Exhibit button.)
You need to ensure that User1 can create files in Folder1. All other members of Group1 must be prevented from creating files in Folder1. What should you do?
A. On Folder1, assign the Full control permission to User1.
B. On Folder1, remove the Deny - Write permission for Group1.
C. Share Folder1. Assign User1 the Read and Change share permission.
D. Share Folder1. Assign Group1 the Read and Change share permission.
Answer: B
Q19. - (Topic 2)
You have two computers that run Windows 7. Both computers are connected to a network and have IP addresses within the 172.16.10.0/24 subnet.
You need to ensure that both computers can join a HomeGroup.
What should you do?
A. Enable network discovery.
B. Set the network location to Home network.
C. Configure Windows Firewall to allow the Netlogon service.
D. Change the IP addresses to be within the 192.168.1.0/24 subnet.
Answer: B
Explanation:
Windows Firewall does not allow you to create firewall rules for specific network locations on the basis of port address. Windows Firewall does not allow you to create rules that differentiate between the home and work network locations. You can only create rules that differentiate on the basis of home and work or public network locations.HomeGroup ConnectionsThis option decides how authentication works for connections to HomeGroup resources. If all computers in the HomeGroup have the same user name and passwords configured, you can set this option to allow Windows to manage HomeGroup connections. If different user accounts and passwords are present, you should configure the option to use user accounts and passwords to connect to other computers. This option is available only in the Home/Work network profile.
Q20. - (Topic 4)
You have a computer that runs Windows 7. The computer is configured to automatically download and install updates.
You install Microsoft Office 2007.
You need to ensure that service packs for Office are automatically installed.
What should you do?
A. From Windows Update, select Restore hidden updates.
B. From Windows Update, select Get updates for other Microsoft products.
C. Create a folder named Updates in C:\Program Files\Microsoft Office. Install the Office Update Inventory Tool into the Updates folder.
D. Download and install the Office 2007 administrative template and disable the Block updates from the Office Update Site from applying policy.
Answer: B
Explanation:
Use Windows Update to Check for Updates to other Microsoft Products By default, Windows Update can download and install updates for Windows 7 and features that are part of the operating system (such as Internet Explorer). You can also merge the functionality of Microsoft Update—a service for managing updates to Microsoft Office and several other Microsoft products—into Windows Update so that you no longer need to visit Office Online to get updates.If you do not already have Windows Update integrated with Microsoft Update, you will see the message "Get updates for other Microsoft products" on the Windows Update home page. To enable checking for other products, click the Find Out More option shown beside this message. This will take you to the Microsoft Update site for some quick installation steps. You only need to do this once. Thereafter, the Windows Update home page will indicate that you receive updates "For Windows and other products from Microsoft Update."