[Free] 2018(June) Dumps4cert Microsoft 70-680 Dumps with VCE and PDF Download 251-260

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May Microsoft Official New Released 70-680
100% Free Download! 100% Pass Guaranteed!

TS: Windows 7, Configuring

Question No: 251 – (Topic 3)

You have two computers named Computer1 and Computer2 that run Windows 7. You connect from Computer1 to Computer2 by using Remote Desktop.

You discover that you cannot copy any files between the computers during the Remote Desktop session.

You need to ensure that you can copy files between the computers during the Remote Desktop session.

What should you do?

  1. On Computer1, open Windows Firewall and allow file and printer sharing.

  2. On Computer2, open Windows Firewall and allow file and printer sharing.

  3. On Computer1, open Remote Desktop Connection and configure the Local devices and resources setting.

  4. On Computer2, open Remote Desktop Connection and configure the Local devices and resources setting.

Answer: C Explanation:

How can I use my devices and resources in a Remote Desktop session? Redirecting a device on your computer makes it available for use in a Remote Desktop session. If you have a recent version of Remote Desktop, you can redirect most devices, including printers, smart cards, serial ports, drives, Plug and Play devices, media players based on the Media Transfer Protocol (MTP), and digital cameras based on the Picture Transfer Protocol (PTP). Some USB devices can be redirected, and you can also redirect your Clipboard.

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Question No: 252 – (Topic 3)

You have a computer that runs Windows 7. The computer is a member of a domain.

You share D:\data as Data. You assign Everyone Full control share permissions to the folder. No other share permissions are assigned to the folder.

From another computer, you attempt to create a file in the Data share by using a domain account named User1. You receive the following error message: “Destination Folder Access Denied”.

You need to ensure that you can create files in the Data share by using the User1 account. What should you do?

  1. Create a local user named User1.

  2. Add User1 to the local Power Users group.

  3. Assign User1 Write NTFS permission on the D:\data folder.

  4. Assign User1 Full control share permissions to the Data share.

Answer: C Explanation:

Share permissions apply to users who connect to a shared folder over the network. Share permissions do not affect users who log on locally, or log on using Remote Desktop. To set permissions for users who log on locally or using Remote Desktop, use the options on the Security tab instead of the Share Permissions tab. This sets permissions at the NTFS file system level. If both share permissions and file system permissions are set for a shared folder, the more restrictive permissions apply when connecting to the shared folder. For example, to give Read access on a shared folder to users in your domain, on the Share Permissions tab, set permissions for the Everyone group to Full Control. On the Security tab, specify more restrictive access by setting the permissions for the Domain Users group to Read access. The result is that a user who is a member of the Domain Users group has read-only access to the shared folder whether the user is connected through a network share, through Remote Desktop, or is logged on locally. Permissions The Read permission allows a user or group to access a file or folder but does not allow modification or deletion. The Change permission includes the read permission but also allows you to add files, delete files, and modify files in the shared folder. This permission is equivalent to the Read/Write permission in the basic File Sharing dialog box. The Full Control permission includes all the rights conferred by the Change and Read permissions. It also allows the user assigned that permission to modify the permissions of other users. Full Control is equivalent to the basic sharing Owner permission, though unlike basic sharing, where there can only be one user assigned the Owner permission, you can assign the Full Control permission to users and groups.

NTFS permissionsYou can configure the local NTFS permissions for a shared folder or volume using Share and Storage Management in the following ways: New shared resources. In the Provision a Shared Folder Wizard, before you select a network sharing protocol, you can change the NTFS permissions for the folder or volume you will be sharing. These NTFS permissions will apply both locally and when accessing the resource over the network. To change the NTFS permissions, on the NTFS Permissions page, select Yes, change NTFS permissions, and then click Edit Permissions. Existing shared resources. You can change the NTFS permissions of a shared folder or volume listed on the Shares tab. To change the NTFS permissions, select the folder or volume, in the

Actions pane click Properties, and on the Permissions tab, click NTFS Permissions.

Question No: 253 – (Topic 3)

You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users log on to the computer.

You need to prevent the computer from displaying the username of the last user who logged on.

What should you do?

  1. From Control Panel, modify the User Profiles settings.

  2. From Control Panel, modify the Personalization settings.

  3. From the local computer policy, add a policy template.

  4. From the local computer policy, modify the local security policy.

    Answer: D Explanation:

    How to Prevent the Last Logged-On User Name from Being Displayed

    1. Click Start and type secpol.msc in the search box.

    2. Press Enter.

    3. Within the Local Security Policy, navigate to Security Settings | Local Policies | Security Options.

    4. In the details pane, scroll through the options and locate Interactive logon: Do not display last user name.

    5. Double click this security option and click Enabled.

    6. Click OK.

      Dumps4Cert 2018 PDF and VCE

      Question No: 254 – (Topic 3)

      You have a computer that runs Windows 7. Four users share the computer. You create a folder named C:\data.

      The Users group has Full control permission to the folder.

      You need to configure security on the folder to meet the following requirements:

      ->Allow users to create files

      ->Allow users to delete files that they create

      ->Prevent users from deleting files created by other users

      What should you do?

      1. Remove all NTFS permissions from the Users group and assign the CREATOR OWNER group the Full control NTFS permission.

      2. Remove the Modify NTFS permission from the Users group and assign the CREATOR OWNER group the Modify NTFS permission.

      3. Deny the Users group the Modify NTFS permission and assign the Authenticated Users group the Read and Write NTFS permissions.

      4. Deny the Users group the Full control NTFS permission and assign the Authenticated Users group the Read amp; execute NTFS permission.

Answer: B Explanation:

The Creator Owner GroupThe person who created the file or directory is a member of this group. This group is used by Windows NT to automatically grant access permissions to the creator of a file or directory.

File and Folder Permissions

ReadFolders: Permits viewing and listing of files and subfoldersFiles: Permits viewing or accessing of the file#39;s contentsWriteFolders: Permits adding of files and subfoldersFiles: Permits writing to a fileRead amp; Execute

Folders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by files and foldersFiles: Permits viewing and accessing of the file#39;s contents as well as executing of the fileList Folder ContentsFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by folders onlyFiles: N/AModifyFolders: Permits reading and writing of files and subfolders; allows deletion of the folderFiles: Permits reading and writing of the file; allows deletion of the fileFull ControlFolders: Permits reading, writing, changing, and deleting of files and subfoldersFiles: Permits reading, writing, changing and deleting of the file

Question No: 255 – (Topic 3)

You deploy a Windows 7 Enterprise image to a computer on the network.

You need to display the detailed activation and license status of the computer. What should you run?

  1. Msconfig.exe

  2. Slui.exe

  3. Slmgr.vbs and specify the dli parameter

  4. Winrm.vbs and specify the id parameter

Answer: C Explanation:

Slmgr.vbs

/dli [Activation ID | All]Display license information. By default, /dli displays the license information for the installed active Windows edition. Specifying the [Activation ID] parameter displays the license information for the specified edition associated with that Activation ID. Specifying the [All] as the parameter will display all applicable installed products’ license information. This operation does not require elevated privileges.

Question No: 256 – (Topic 3)

You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7.

You attempt to migrate the user profiles and data from Computer1 to Computer2 by using User State Migration Tool (USMT) 4.0.

During the migration, you receive the following error message: “Gather was aborted because of an EFS file.”

You need to ensure that you can successfully migrate the user state from Computer 1 to Computer 2.

What should you do?

  1. Add the /efs:copyraw switch to the Loadstate command.

  2. Add the /efs:copyraw switch to the Scanstate command.

  3. Generate a new Encrypting File System (EFS) certificate on Computer2.

  4. Export the Encrypting File System (EFS) certificate from Computer1 and import the certificate to Computer2.

Answer: B Explanation:

You run ScanState on the source computer during the migration. You must run ScanState.exe on computers running Windows Vista and Windows 7 from an administrative command prompt. When running ScanState on a source computer that has Windows XP installed, you need to run it as a user that is a member of the local administrators group. The following command creates an encrypted store named Mystore on the file share named Migration on the file server named Fileserver that uses the encryption key Mykey: scanstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml

/o /config:config.xml /encrypt /key:quot;mykeyquot;Encrypted File OptionsYou can use the following options to migrate encrypted files. In all cases, by default, USMT 4.0 fails if an encrypted file is found unless you specify an /efs option. To migrate encrypted files, you must change the default behavior. EFS certificates will be migrated automatically when migrating to Windows Vista or Windows 7. Therefore, you should specify the /efs:copyraw option with the ScanState command to migrate the encrypted files

Question No: 257 – (Topic 3)

You have an offline virtual hard disk (VHD) that contains a generalized installation of Windows 7 Ultimate.

You need to disable the built-in games in the VHD. You must achieve this goal by using the minimum amount of administrative effort.

What should you do?

  1. Start a computer from the VHD. Run Ocsetup.exe and specify the /uninstall parameter. Recapture the VHD.

  2. Start a computer from the VHD. From Programs and Features, turn off the Games feature and then recapture the VHD.

  3. Create an answer file that has InboxGames disabled. On a computer that runs Windows 7, attach the VHD. Run Pkgmgr.exe and specify the /uu parameter.

  4. Create an answer file that has InboxGames disabled. On a computer that runs Windows 7, attach the VHD. Run Dism.exe and specify the /apply-unattend parameter.

Answer: D Explanation: Dism

Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows庐 images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. /Apply-Unattend (Applies an unattend.xml file to an image.) If you are updating device drivers using an unattended answer file, you must apply the answer file to an offline image and specify the settings in the offlineServicing configuration pass. If you are updating packages or other settings using an unattended answer file, you can apply the

answer file to an offline or online image. Specify the settings in the offlineServicing configuration pass.

Question No: 258 – (Topic 3)

You have a computer that runs Windows 7.

A user reports that he is unable to access network resources. You run Ipconfig.exe as shown in the IPConfig exhibit. (Click the Exhibit button.)

Dumps4Cert 2018 PDF and VCE

You open Device Manager as shown in the Device Manager exhibit. (Click the Exhibit button.)

Dumps4Cert 2018 PDF and VCE

You need to ensure that the user can connect to the network. What should you do?

  1. From Device Manager, enable the network adapter.

  2. From Device Manager, update the driver for the network adapter.

  3. At a command prompt, run Ipconfig /renew.

  4. At a command prompt, run Netsh ip set address quot;local area connectionquot; dhcp.

Answer: A Explanation:

IP Configuration should look something like this, if network adapter is enabled.

Dumps4Cert 2018 PDF and VCE

The icon displayed in Device Manager indicates that network adapter is disabled. Therefore, enable the network adapter.

Question No: 259 – (Topic 3)

You need to reduce the amount of space currently being used to store system restore points.

What should you do?

  1. Run Disk Cleanup.

  2. Run Msconfig.exe.

  3. Configure disk quotas.

  4. Configure Windows Backup.

Answer: A Explanation:

Dumps4Cert 2018 PDF and VCE

Shadow info:

Shadow copies are automatically saved as part of a restore point. If system protection is enabled, Windows 7 automatically creates shadow copies of files that have been modified since the last restore point was created. By default, new restore points are created every seven days or whenever a significant system change (such as a driver or application installation) occurs.

NOT Disk Quota:Does not directly affect size of System Restore Points.

Question No: 260 – (Topic 3)

You plan to capture a Windows 7 image by using the Windows Preinstallation Environment (Windows PE).

You need to ensure that Windows PE supports the Windows Scripting Host (WSH). Which tool should you use?

  1. Bcdedit.exe

  2. Dism.exe

  3. Imagex.exe

  4. Oscdimg.exe

Answer: B Explanation:

DismDeployment Image Servicing and Management (DISM) is a command-line tool used to service Windows庐 images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings.

Subsets of the DISM servicing commands are also available for servicing a running operating system. Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing. You can use DISM to perform the following actions:

  • Prepare a Windows PE image.- Enable or disable Windows features within an image.- Upgrade a Windows image to a different edition.- Add, remove, and enumerate packages.- Add, remove, and enumerate drivers.- Apply changes based on the offline servicing section of an unattended answer file.- Configure international settings.- Implement powerful logging features.- Service operating systems such as Windows Vista with SP1 and Windows Server 2008.- Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.- Service all platforms (32-bit, 64-bit, and Itanium).- Use existing Package Manager scripts.

    DISM Command-Line Options To service a Windows image offline, you must apply or mount it. WIM images can be mounted using the WIM commands within DISM, or applied and then recaptured using ImageX. You can also use the WIM commands to list the indexes or verify the architecture for the image you are mounting. After you update the image, you must dismount it and then either commit or discard the changes you have made.NOT BcdeditBCDEdit is a command-line tool for managing BCD stores. It can be

    used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe, and BCDEdit has improved scripting support.NOT ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file- based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack.NOT OscdimgOscdimg is a command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660, Joliet, and Universal Disk Format (UDF) file systems.

    100% Dumps4cert Free Download!
    Download Free Demo:70-680 Demo PDF
    100% Dumps4cert Pass Guaranteed!
    70-680 Dumps

    Dumps4cert ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *