You use a client computer that has Windows 7 Enterprise installed. You need to configure an event subscription that meets the following requirements:
– Forwards events securely across the network on port 9999.
– Forwards events every 6 hours.
What should you do? (To answer, drag and drop the appropriate answer to correct area section.)
You have a computer that runs WindowsXP. The computer has one partition.
You install Windows 7 on the computer. You need to migrate a user profile from the Windows XP installation to Windows 7 installation. What should you do first? (To answer, drag the appropriate command from the list of command to the correct location or locations in the work area.)
You install Windows 7 on a new computer. Every time you start the computer, you receive a "STOP" error message. You suspect that the RAM on the computer has a problem. You need to verify the RAM on the computer.
What should you do first?
A. Start the computer, press F8, and then select Repair Your Computer.
B. Start the computer, press F8, and then select Debugging Mode.
C. Start the computer by using Windows PE and then run the bootsect.exe /all command.
D. Start the computer by using Windows PE and then run the bcdedit /bootsequence command.
Using Recovery Tools If Windows RE is included in your installation DVD-ROM, you can boot from the Windows 7 installation media, select Repair Your Computer, and then select the option to use recovery tools to access the System Recovery Options. However, you can use the method described previously (pressing F8) whether the Windows RE files are present on your DVD-ROM or not and whether you boot from your installation DVD-ROM or from hard disk.
Then use the following System Recovery Option:
Windows Memory Diagnostic Analyzes the computer memory (RAM) for hardware problems.
You have 100 computers that run Windows XP. Each computer has the following features:
– Contains a single hard disk drive.
– Contains a single partition.
– Supports USB devices during startup.
You are planning a clean installation of Windows 7 Ultimate. You need to ensure that the installation of Windows 7 Ultimate will support BitLocker Drive Encryption on the system partition. What should you do?
A. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Verify the status of the
partition by using manage-bde.exe.
B. Verify that the computers have Trusted Platform Modules (TPM) version 1.2 security devices.
C. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Encrypt a USB drive by
using the BitLocker-to-Go-Feature.
D. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Use bdehdcfg.exe to
configure the partition.
A company has client computers that run Windows XP. The company plans to upgrade all the client computers to Windows 7. Each employee will keep the same computer.
You need to upgrade the client computers from Windows XP to Windows 7 while maintaining each user’s files and settings.
Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Twenty client computers run Windows XP. The computers are joined to a domain. You plan to perform a clean installation of Windows 7 on all the computers. You need to transfer all users’ documents and settings. You must exclude music and video files. You must achieve this goal by using the minimum amount of administrative effort. Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
A company has client computers that run Windows 7 Enterprise.
You need to ensure that when Windows runs applications with elevated privileges, it enforces the Public Key Infrastructure (PKI) certification path validation for a given executable file. What should you use to accomplish this goal?
A. The User Account Control Settings Control Panel window
B. The Services Management console
C. Device Manager
D. Local Users and Groups
E. The Icacls command
F. The Group Policy Management console
G. The Folder Properties window
H. Share permissions
I. The Netsh command
Besides changing the notification behavior of UAC, you can also control the behavior of the UAC by using local or group policies. Local policies are managed from each local computer while group policies are managed as part of Active Directory.
Follow these steps to change UAC settings:
Click Start, type secpol.msc in the Search programs and files box, and press Enter. From the Local Security Policy tree, click Local Policies and then double-click Security Options
The UAC policies are at the bottom of the list. To modify a setting, simply double-click on it and make the necessary changes.
Your company network contains 20 client computers that run Windows 7 Enterprise. The network does not have a DNS server and is using IPv6 only.
Users are complaining they are unable to see others’s computers on the network. You notice that the settings of the network are configurated as shown in the exhibit. (Click the exhibit button.)
You need to ensure that users can see all computers on the network in Windows Explorer. What should you do on each computer?
A. Turn on Public Folder Sharing.
B. Run Windows Network Diagnostics.
C. From a command promt, run the Net view command.
D. From a command promt, run the Net config command.
E. Turn on Network discovery.
You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:\Software. User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folder.
You need to verify wether User1 can save files to C:\Software. What should you do?
A. Download the Sysinternals Suite bundle from the Microsoft site. Run the AccessEnum tool against the
B. Run the Net Share command.
C. Run the Net View command.
D. Use Fsutil.exe.
A computer that runs Windows 7 becomes infected with malware. You scan the computer, remove all detected malware components, and restart the computer. When you attempt to connect to a financial institution’s Web site, Internet Explorer redirects to another Web site and displays an alert that the Web site may be a phishing site. You need to prevent the computer from being redirected to the potential phishing site. What should you do?
A. Run Ipconfig /flushdns.
B. Configure InPrivate Browsing.
C. Configure the SmartScreen Filter.
D. Modify the hosts file.
If you want to pass Microsoft 70-680 successfully, donot missing to read latest lead2pass Microsoft 70-680 exam questions.
If you can master all lead2pass questions you will able to pass 100% guaranteed.