Here are some sample 70-680 exam questions. 70-680 dumps is really great to pass exam. It contains 70-680 practice test braindumps Q&A.

An effective 70-680 exam questions preparation and grip over the entire course contents are definitely required to pass out your Microsoft Certification exam. 70-680 dumps here are reliable, comprehensive and up to the standards having 70-680 exam questions verified by Professional Experts. Our 70-680 dumps compose of 70-680 exam questions and 70-680 practice test, come in two formats i.e. in PDF file format and Online practice test software.

By using this online test engine mode you can practice 70-680 questions answers easily for the actual Microsoft 70-680 exam. You can download and try the free 70-680 dumps demo before buying exam 70-680 PDF file from Testmayor. Our excellent 70-680 exam questions dumps is a guarantee to your success in Microsoft certification exam.

Get 70-680 exam questions dumps and pass exam in first attempt.


70-680 | You plan to deploy Windows 7 images…

Question: 11

You plan to deploy Windows 7 images.
You need to ensure that you can deploy images by using the Windowspreinstallation Environment (Windows PE).
What should you add to the Windows PE image?

A. Loadstate.exe
B. Mighost.exe
C. Usmtutils.exe
D. Imagex.exe

Answer: D

70-680 | You have a Computer that runs Windows 7…

Question: 10

You have a Computer that runs Windows 7. Your company has a corporate intranet Web site. You open windows Internet Explorer as shown in the exhibit. (Click the Exhibit button.) You need to ensure that you can access Web pages on both the Internet and the intranet. From the Tools rnenu, what should you do?

A. Click Wort Offline.
B. Click ActiveX Filtering.
C. Point to SmartScreen Filter and then click Turn off SrnartScreen Filter.
D. Click Connpatibility View.

Answer: A

70-680 | You plan to deploy Windows 7 images…..

Question: 9

You plan to deploy Windows 7 images. You need to ensure that you can deploy images by using the Windowspreinstallation Environment (Windows PE). What should you add to the Windows PE image?

A. Loadstate.exe
B. Mighost.exe
C. Usmtutils.exe
D. Imagex.exe

Answer: D

70-680|Your network consists of one Active

Question: 8

Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain.
From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain.
You need to ensure that you can recover all EFS encrypted files from Computer2.
What should you do?

A. On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker.
B. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.
C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter.
D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter.

Answer: B

70-680|You use a portable computer that has Windows 7 installed

Question: 7

You use a portable computer that has Windows 7 installed. The Computer has a single hard disk drive and a dual-core CPU.
You need to analyze the performance of the computer to meet the following requirements:
* Include the CPU, Memory, and Disk subsystems
* Send notfications to an administrator for predefined thresholds.
What should you do?

A. Run powercfg.exe.
B. Run the windows Experience Index
C. Configure Event Viewer subscriptions
D. Open Task Manager
E. Open System Properties, and configure performance settings
F. Open System Properties, and configure environment variables
G. Open System Properties, and configure user profiles settings
H. Open System Properties, and configure the page file settings
I. Open Performance Monitor, and configure a Data Collector Set.
J. Open Performance Monitor, and customize the System Monitor view.

Answer: I

70-680|A company has client computers that run Windows 7 Enterprise.

Question: 6

A company has client computers that run Windows 7 Enterprise.
You need to ensure that when Windows runs applications with elevated privileges, it enforces the Public Key Infrastructure (PKI) certification path validation for a given executable file.
What should you use to accomplish this goal?

A. the icacls command
B. the netsh command
C. share permissions
D. Device Manager
E. Local Users and Groups
F. the folder Properties windows
G. the Services management console
H. the Group Policy management console
I. the User Account Control Settings Control Panel Window

Answer: H

70-680|You have a computer that runs Windows Vista.

Question: 5

You have a computer that runs Windows Vista. The computer contains a custom application. You need to export the user state and the settings of the custom application. What should you do?

A. Run Loadstate.exe and specify the /config parameter.
B. Run Scanstate.exe and specify the /genconfig parameter.
C. Modify the miguser.xml file. Run Loadstate.exe and specify the /ui parameter.
D. Modify the migapp.xml file. Run Scanstate.exe and specify the /i parameter.

Answer: D

Explanation:

MigApp.xml This file contains rules about migrating application settings. These include Accessibility settings, dial-up connections, favorites, folder options, fonts,group membership, Open Database Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service (RAS) connection phone book files, regional options, remote access, screensaver settings, taskbar settings, and wallpaper settings.(Include) /i:[Path\]FileName Specifies an .xml file that contains rules that define what user, application or system state to migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml, MigUser.xml and any custom .xml files that you create). Path can be either a relative or full path. If you do not specify the Path variable, then FileName must be located in the current directory.NOT MigUser.xmlMigUser.xml This file contains rules about user profiles and user data. The default settings for this file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu, Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc, .dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, .dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*, .pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, .accdb, .mdb, .pub, .xla, .xlb and .xls. The asterisk ( *) represents zero or more characters.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

Question: 4

You administer desktops that have 32-bit and 64-bit versions of Windows 7 Enterprise SP1 installed. All desktops have a single CD-RW drive. The local hard disk drives on all computers are partitioned with a recovery partition and a single logical drive C.
You need to be able to restore Windows boot files on any of the desktops if the boot files become corrupted.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Create a system repair disk on a Windows 7 Enterprise 64-bit desktop.
B. Enable system protection on the recovery partition on 64-bit desktops.
C. Enable system protection on the recovery partition on 32-bit desktops.
D. Create a system repair disk on a Windows 7 Enterprise 32-bit desktop.
E. Create a system image of a Windows 7 Enterprise 64-bit desktop.
F. Create a system image of a Windows 7 Enterprise 32-bit desktop.
G. Restart Windows 7 Enterprise 64- bit desktops. Select the Disable Driver Signature Enforcement option from the Advanced Boot
Options menu.

Answer: AD

You need to prevent users from installing non- trusted device drivers. What should you do?

Free 70-680 Questions Answers

QUESTION 3

You administer client computers that have Windows 7 Professional SP1 64-bit installed. All the computers are
members of a single Active Directory
domain.
You need to prevent users from installing non- trusted device drivers.
What should you do?

A. Run the SigVerif.exe command on each computer
B. Enable the Code signing for device drivers in a domain Group Policy.
C. Disable the Code signing for device drivers in a domain Group Policy.
D. Add each user to the Domain Admins group.

Answer: B

You need to confirm that all device drivers installed on the computer are digitally signed.What should you do?

Free 70-680 Questions Answers

Question 2

You have a computer that runs Windows 7.
You need to confirm that all device drivers installed on the computer are digitally signed.What should you do?

A. At a command prompt, run Verify.
B. At a command prompt, run Sigverif.exe.
C. From Device Manager, click Scan for hardware changes.
D. From Device Manager, select the Devices by connection view.

Answer: B

Explanation:

Checking Digital Signatures with the File Signature Verification Tool
The Dxdiag tool identifies problems with DirectX hardware and tells you whether that
hardware has passed the WHQL testing regimen and has been signed digitally. However, it does not test the device drivers that are not associated with DirectX devices. To scan your computer and identify any unsigned drivers, you should use the File Signature Verification (Sigverif) tool.