Month: June 2014

Passed Microsoft 70-680 Exam with Pass4sure and Lead2pass PDF & VCE (91-100)

QUESTION 91
You are deploying a number of Windows 7 laptops.
You create a custom power plan on one of the laptops that you want to replicate to the other laptops by using an unattended setup.
You need to capture the power plan from the configured laptop for use in the deployment of the other laptops, save it to the removable drive F:, and name it MobileScheme.
What should you do?

A.    Run the command powercfg duplicatescheme <GUID> F:\MobileScheme.pow from an elevated
command prompt.
B.    Run the command powercfg -EXPORT F:\MobileScheme.pow {GUID} from an elevated command prompt.
C.    Run the command powercfg -S F:\MobileScheme.pow from an elevated command prompt.
D.    Create a power plan from the Power Options control panel and save it to the F: drive as MobileScheme.

Answer: B

Continue reading

Passed Microsoft 70-680 Exam with Pass4sure and Lead2pass PDF & VCE (91-100)

QUESTION 91
You are deploying a number of Windows 7 laptops.
You create a custom power plan on one of the laptops that you want to replicate to the other laptops by using an unattended setup.
You need to capture the power plan from the configured laptop for use in the deployment of the other laptops, save it to the removable drive F:, and name it MobileScheme.
What should you do?

A.    Run the command powercfg duplicatescheme <GUID> F:\MobileScheme.pow from an elevated
command prompt.
B.    Run the command powercfg -EXPORT F:\MobileScheme.pow {GUID} from an elevated command prompt.
C.    Run the command powercfg -S F:\MobileScheme.pow from an elevated command prompt.
D.    Create a power plan from the Power Options control panel and save it to the F: drive as MobileScheme.

Answer: B

Continue reading

Passed Microsoft 70-680 Exam with Pass4sure and Lead2pass PDF & VCE (81-90)

QUESTION 81
Your company has a main office and a branch office. A portable computer runs Windows 7. On the computer, you configure a printer for each office.
You need to configure printing on the computer to meet the following requirements:
– When you are located in the main office, all documents must automatically print to the main office printer.
– When you are located in the branch office, all documents must automatically print to the branch office printer.
What should you do?

A.    From Location and Other Sensors, configure a default location.
B.    From Devices and Printer, configure the Manage Default Printers settings.
C.    From Region and Language, modify the Location settings.
D.    From Network and sharing Center, configure the network location.

Answer: B

Continue reading

Passed Microsoft 70-680 Exam with Pass4sure and Lead2pass PDF & VCE (71-80)

QUESTION 71
A company has client computers that run Windows 7. You create an AppLocker policy for the client computers.
You need to ensure that the AppLocker policy is enforced after the computers restart.
Which service startup type should you use? (To answer, select the appropriate setting or settings in the work area.)

image
Answer:

 

image

Continue reading

Passed Microsoft 70-680 Exam with Pass4sure and Lead2pass PDF & VCE (71-80)

QUESTION 71
A company has client computers that run Windows 7. You create an AppLocker policy for the client computers.
You need to ensure that the AppLocker policy is enforced after the computers restart.
Which service startup type should you use? (To answer, select the appropriate setting or settings in the work area.)

image
Answer:

 

image

Continue reading

Passed Microsoft 70-680 Exam with Pass4sure and Lead2pass PDF & VCE (61-70)

QUESTION 61
You have a computer that runs Windows 7. The Encrypting File System (EFS) key is compromised. You need to create a new EFS key. Which command should you run?

A.    Certutil -GetKey
B.    Cipher.exe /k
C.    Lcacls.exe /r
D.    Syskey.exe

Answer: B
Explanation:
Cipher
Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains.Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed.When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data.
/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521.

Continue reading

Passed Microsoft 70-680 Exam with Pass4sure and Lead2pass PDF & VCE (51-60)

QUESTION 51
You have a computer that runs Windows 7. The computer contains one hard disk. The hard disk is configured as shown in the following table:

image
You install a new 250-GB hard disk in the computer. You need to ensure that all the files on the computer are available if a single disk fails. What should you do?

A.    Create a mount point on C and D and then create a striped volume.
B.    Create a mount point on C and D and then create two striped volumes.
C.    Convert both disks to dynamic disks and then create a mirrored volume.
D.    Convert both disks to dynamic disks and then create two mirrored volumes.

Answer: D
Explanation:
Creating a Mirrored Volume (RAID-1)A mirrored or RAID-1 volume provides availability and fault tolerance but does not improve performance. It uses two disks (or two portions on separate disks) that are the same size. Any changes made to the first disk of a mirror set are also made to its mirror disk. If the first disk fails, the mirror is broken and the second disk is used until the first is repaired or replaced. The mirror is then re-created, and the information on the working disk is mirrored on the repaired disk. The disadvantage of RAID-1 is that you need (for example) two 200-GB disks to hold 200 GB of data. The advantage is that you can mirror a system disk containing your operating system.You create a mirrored volume using a very similar procedure to the one that creates a striped volume, except that you right-click the first disk of your mirror and click New Mirrored Volume to start the appropriate wizard. You then select the second disk. The second disk needs to have a portion of unallocated space that is at least as large as the disk you want to mirror. The drive letter for a mirrored volume is the same as the drive letter of the first disk.
You can also use the Diskpart tool to create a mirrored volume. At the DISKPART> prompt you first use the select disk command to select the first disk. You then enter a command with the syntax add disk=<n>to specify the mirror disk.

Continue reading

Free Download Latest 2014 Pass4sure&Lead2pass Oracle 1Z0-062 Exam Questions

QUESTION 1
Which three statements are true about a job chain?

A.    It can contain a nested chain of jobs.
B.    It can be used to implement dependency-based scheduling.
C.    It cannot invoke the same program or nested chain in multiple steps in the chain.
D.    It cannot have more than one dependency.
E.    It can be executed using event-based or time-based schedules.

Answer: ABE
Explanation:
http://docs.oracle.com/cd/B28359_01/server.111/b28310/scheduse009.htm#ADMIN12459

Continue reading

OFFER Oracle 1Z0-100 PDF and 1Z0-100 VCE Full Version

QUESTION 1
This MDADM output:

image
Which two aspects can be determined from this output?

A.    A device failed and has been removed from this RAID set.
B.    It is no longer possible to write to this RAID set.
C.    Read and write performance is no longer optimal on this RAID set.
D.    This RAID set was built without a spare device.
E.    Only Write performance is no longer optimal on this RAID set.

Answer: AD

Continue reading

Passed Microsoft 70-680 Exam with Pass4sure and Lead2pass PDF & VCE (41-50)

QUESTION 41
You have a customized image of Windows 7 Professional. You need to create a new unattended file to automate the deployment of the image. You must achieve this goal by using the minimum amount of administrative effort. What should you do first?

A.    Run Imagex.exe and specify the /mount parameter.
B.    Run Dism.exe and specify the /Mount-WIM parameter.
C.    From Microsoft Deployment Toolkit (MDT), add the custom Windows image (WIM).
D.    From Windows System Image Manager (Windows SIM), open the custom Windows image (WIM).

Answer: D
Explanation:
Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets.NOT DismDeployment Image Servicing and Management (DISM) is a command-line tool used to service Windows?images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system.NOT ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./mountMounts a .wim file from Windows XP with Service Pack 2 (SP2), Windows Server 2003 with Service Pack 1 (SP1), or Windows Vista with read-only permission to a specified directory. Once the file is mounted, you may view, but not modify, all the information contained in the directory.NOT MDT MDT 2010 is the Microsoft solution accelerator for operating system and application deployment and offers flexible driver management, optimized transaction processing, and access to distribution shares from any location. You can use the MDT on imaging and deployment servers to implement the automatic deployment of Windows 7 (for example) on client computers. It is possible to run MDT 2010 on a client running Windows 7, but in practice it would typically run from a distribution server running Windows Server 2008. The MDT provides detailed guidance and job aids and offers a common deployment console that contains unified tools and processes that you can use for client and server deployment. The toolkit offers standardized desktop and server images, along with improved security and ongoing configuration management.

Continue reading

Pages: 1 2 3 4