It is more faster and easier to pass the Microsoft 70-680 exam by using Breathing Microsoft TS:Windows 7,Configuring questuins and answers. Immediate access to the Refresh 70-680 Exam and find the same core area 70-680 questions with professionally verified answers, then PASS your exam with a high score now.
2021 Jun windows 7 configuration exam 70-680:
Q31. - (Topic 3)
You need to prevent a custom application from connecting to the Internet.
What should you do?
A. From Windows Firewall, add a program.
B. From Windows Defender, modify the Allowed items list.
C. From Windows Firewall with Advanced Security, create an inbound rule.
D. From Windows Firewall with Advanced Security, create an outbound rule.
Outbound Rule Outbound rules allow you to block and allow traffic that originates on the computer from traveling out to the network.Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.QUESTION NO: 290 You have a computer that runs Windows 7. The network contains a monitoring server named Server1. The computer runs a monitoring service named Service1. Service1 uses Remote Procedure Calls (RPCs). You need to ensure that Service1 can receive requests from Server1.
What should you do?
A. From Windows Firewall with Advanced Security, create a predefined rule.
B. From Windows Firewall with Advanced Security, create a custom rule.
C. From Network and Sharing Center, modify the network location settings.
D. From Network and Sharing Center, modify the advanced sharing settings.
Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.
Q32. - (Topic 3)
You have a computer that runs Windows 7.
You need to configure an application to connect to the computer by using the IPV6 loopback address.
Which address should you specify?
Loopback address The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface, enabling a node to send packets to itself. It is equivalent to the IPv4 loopback address of
127.0.0.1. Packets addressed to the loopback address must never be sent on a link or forwarded by a router.Link-LocalLink-local addresses always begin with FE80. With the 64-bit interface identifier, the prefix for link-local addresses is always FE80::/64. An IPv6 router never forwards link-local traffic beyond the link. Nodes use link-local addresses when communicating with neighboring nodes on the same link. For example, on a single-link IPv6 network with no router, hosts use link-local addresses to communicate with other hosts on the link. Link-local addresses are equivalent to Automatic Private IP Addressing (APIPA) IPv4 addresses autoconfigured on computers that are running Windows. APIPA addresses use the 169.254.0.0/16 prefix. The scope of a link-local address is the local link. A link-local address is required for Neighbor Discovery processes and is always automatically configured, even in the absence of all other unicast addresses.
Q33. - (Topic 4)
Your company has a server named Server1 that runs Windows Server 2008. Server1 is a Windows Server Update Services (WSUS) server.
You have a computer named Computer1 that runs Windows 7.
Computer1 is configured to obtain updates from Server1.
You open the WSUS snap-in on Server1 and discover that Computer1 does not appear.
You need to ensure that Computer1 appears in the WSUS snap-in.
What should you do?
A. On Server1, open Windows Update then select Check for updates.
B. On Server1, run Wsusutil.exe and specify the /import parameter.
C. On Computer1, open Windows Update and then select Change settings.
D. On Computer1, run Wuauclt.exe and specify the /detectnow parameter.
wuauclt.exeThe wuauclt utility allows you some control over the functioning of the Windows Update Agent. It is updated as part of Windows Update.Detectnow OptionBecause waiting for detection to start can be a time-consuming process, an option has been added to allow you to initiate detection right away. On one of the computers with the new Automatic Update client installed, run the following command at the command prompt: wuauclt.exe /detectnow
Q34. DRAG DROP - (Topic 4)
A company has client computers that run Windows XP. The company plans to upgrade all the client computers to Windows 7. Each employee will keep the same computer.
You need to upgrade the client computers from Windows XP to Windows 7 while maintaining each user's files and settings.
Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Q35. - (Topic 5)
You use a computer that has Windows 7 SP1 installed to access your company's internal website. The website requires a secure connection. The certificate is a self-signed Secure Socket Layer (SSL).
You attempt to connect to the internal website. You receive the following error message:
"There is a problem with this website's security certificate."
You need to be able to connect to the internal website successfully.
What should you do?
A. From Internet Explorer, add the website to the Local Intranet zone.
B. From Certificate Manager, import the website's certificate into your Intermediate Certification Authorities store.
C. From Certificate Manager, import the website's certificate into your computer's Personal store.
D. From Internet Explorer, add the website to the Trusted Sites zone.
Renovate windows 7 70-680:
Q36. DRAG DROP - (Topic 5)
You use a portable computer that has Windows 7 Home Premium installed. The portable computer has a scheduled backup of all libraries to run every day at midnight. Drive C is also configured with system protection.
You use an instant messaging application that saves chat data to a log file. The log file is stored in My Documents.
You install a new version of the application. You discover that the log file has been replaced with an empty file.
You need to restore the most recent version of the file that contains data.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Q37. - (Topic 4)
Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BrachCache features installed.
All sales user in the office must download a daily updated 5-GB file that is stored on a file server located in a remote office.
You configure the client computers to run BranchCache in Distributed Host mode. You discover that all users still access the file directly from the file server.
You need to reduce the utilization of a WAN link between the offices because of downloading the file to the client computers.
What should you do?
A. Run the Netsh branchcache set service mode=HOSTEDSERVER client authentication=NONE command
B. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80.
C. Create a Group Policy that sets Hash Publication for BranchCache as disabled.
D. Run the netsh branchcache set service mode=DISTRIBUTED command.
E. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option.
F. Check permisions.
G. Run the netsh branchcache set service mode=HOSTEDCLIENT command.
H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy.
I. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443.
Original wording: You configure the client computers to run BranchCache in 'Distributed Host Mode'. Changed to 'Distributed Cache mode".
Q38. - (Topic 2)
You have two computers on the same subnet. The computers have the IPv6 addresses shown in the following table.
You need to test the connection to the IPv6 address from Computer1 to Computer2.
Which command should you run?
A. Ping -6 fe80::44df:1b68%12
B. Ping -6 fe80::44df:1b68%10
C. Ping -R fe80::44df:1b68%12
D. Ping -R fe80::44df:1b68%10
If you are pinging from one host to another using link-local addresses, you also need to include your interface ID, for example ping fe80::39cd:4c93%10.
The % character followed by a number after each IPv6 address is the interface ID.
If you want to display the configuration of the IPv6 interfaces on the local computer, you can enter netsh interface ipv6 show address.
Force using IPv6.
Q39. - (Topic 2)
You have 20 client computers. The computers run Windows XP. They are joined in a domain.
You plan to perform a clean installation of Windows 7 on the computers.
You need to transfer all users documents and settings. You must exclude music and video files.
You must achieve this goal by using the minimum amount of administrative effort.
What should you do first?
A. Create a config.xml file. Configure a logon script for the Windows XP computers to launch Loadstate.exe
B. Modify the migapp.xml file. Configure a logon script for the Windows XP computers to launch Scanstate.exe
C. Modify the miguser.xml file. Configure a logon script for the Windows XP computers to launch Migwiz.exe
D. Modify the migdocs.xml file. Configure a logon script for the Windows XP computers to launch Scanstate.exe
MigDocs.xmlThis file contains information on the location of user documents. NOT Config.xmlThis file is different from the other migration files as it is used to exclude features from the migration. You can create and modify the Config.xml file using ScanState.exe with the /genconfig option.NOT MigUser.xmlMigUser.xml This file contains rules about user profiles and user data. The default settings for this file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu, Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc, .dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*, .pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, accdb, .mdb, .pub, .xla, .xlb and .xls. The asterisk ( *) represents zero or more characters.NOT MigApp.xml This file contains rules about migrating application settings. These include Accessibility settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service (RAS) connection phone book files, regional options, remote access, screen-saver settings, taskbar settings, and wallpaper settings.
Q40. - (Topic 4)
You administer desktops that have 32-bit and 64-bit versions of Windows 7 Enterprise SP1 installed. All desktops have a single CD-RW drive. The local hard disk drives on all computers are partitioned with a recovery partition and a single logical drive C.
You need to be able to restore Windows boot files on any of the desktops if the boot files become corrupted.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a system image of a Windows 7 Enterprise 64-bit desktop
B. Create a system repair disk on a Windows 7 Enterprise 64-bit desktop.
C. Restart Windows 7 Enterprise 64-bit desktops. Select the Disable Drive Signature Enforcement option from the Advanced Boot options menu.
D. Enable system protection on the recovery partition on 64-bit desktops.
E. Create system repair disk on a Windows 7 Enterprise 32-bit desktop.
F. Create a system image of a Windows 7 Enterprise 32-bit desktop.
G. Enable system protection on the recovery partition on 32-bit desktops.