[Free] 2018(July) Dumps4cert Microsoft 70-680 Dumps with VCE and PDF Download 31-40

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July Microsoft Official New Released 70-680
100% Free Download! 100% Pass Guaranteed!

TS: Windows 7, Configuring

Question No: 31 – (Topic 1)

Your company has an internal Web site that requires HTTPS. The Web site#39;s certificate is self-signed. You have a computer that runs Windows 7 and Windows Internet Explorer 8.

You use HTTPS to browse to the Web site and receive the following warning message. “There is a problem with this website#39;s security certificate.”

You need to prevent the warning message from appearing when you access the Web site. What should you do?

  1. From Internet Explorer, enable InPrivate Browsing.

  2. From Internet Explorer, add the Web site to the Trusted sites zone.

  3. From Certificate Manager, import the Web sites certificate into your Personal store.

  4. From Certificate Manager, import the Web sites certificate into your Trusted Root Certification Authorities store.

Answer: D Explanation: Certificate Manager

A certificate manager can approve certificate enrollment and revocation requests, issue certificates, and manage certificates. This role can be configured by assigning a user or group the Issue and Manage Certificatespermission. When you assign this permission to a user or group, you can further refine their ability to manage certificates by group and by certificate template. For example, you might want to implement a restriction that they can only approve requests or revoke smart card logon certificates for users in a certain office or organizational unit that is the basis for a security group.Importing CertificatesYou may restore certificates and the corresponding private keys from a file.

  1. Right-click the certificate store you want to import, and click Install PFX on the context menu.

  2. The Certificate Import Wizard launches. Click Next.

  3. In the File name text box, type the name of the certificate file that you want to import. Alternatively, you can find the file by clicking Browse.

  4. Click Next. If the file specified is a Personal Information Exchange-PKCS #12 (*.pfx), you will be prompted for the password. Enter the password to import the file. Click Next.

  5. On the next page, select where you#39;d like to store the certificate. Click Next.

  6. The next wizard page contains summary information about the file that you are importing. Click Finish to import the file. The certificate(s) are now ready for use by the system.

Question No: 32 – (Topic 1)

You are installing Windows 7 on from the desktop of a Windows XP Professional PC. Which of the following can be performed from the Windows 7 DVD? Choose three.

  1. Run setup.exe from the DVD to start the Windows 7 installation.

  2. Use the autorun feature on the DVD to start the installation.

  3. Perform a full installation of Windows 7.

  4. Perform and upgrade of Windows 7 keeping all the Windows XP settings.

Answer: A,B,C

Question No: 33 – (Topic 1)

In Windows 7 you can control when users such as kids can login to Windows 7. Which of the following best describes where to configure this option?

  1. You cannot choose this feature unless you are connected to a domain.

  2. Go to the Start, Control Panel, User Accounts and Family Safety, Setup Parental Controls, and then choose Time Restrictions.

  3. Go to Start, Control Panel. User Profiles, and then Time Restriction Settings.

  4. Go to the Homegroup settings and choose Offline Time Settings.

Answer: B

Question No: 34 – (Topic 1)

You have a computer that runs Windows Vista. The computer contains a custom application.

You need to export the user state and the settings of the custom application. What should you do?

  1. Run Loadstate.exe and specify the /config parameter.

  2. Run Scanstate.exe and specify the /genconfig parameter.

  3. Modify the miguser.xml file. Run Loadstate.exe and specify the /ui parameter.

  4. Modify the migapp.xml file. Run Scanstate.exe and specify the /i parameter.

Answer: D Explanation:

MigApp.xml This file contains rules about migrating application settings. These include Accessibility settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service (RAS) connection phone book files, regional options, remote access, screensaver settings, taskbar settings, and wallpaper settings.(Include) /i:[Path\]FileName

Specifies an .xml file that contains rules that define what user, application or system state to migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml, MigUser.xml and any custom .xml files that you create). Path can be either a relative or full path. If you do not specify the Path variable, then FileName must be located in the current directory.NOT MigUser.xmlMigUser.xml This file contains rules about user profiles and user data. The default settings for this file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu, Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel,

.qph, .doc, .dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1,

.slk, .dif, .ppt*, .pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6,

.accdb, .mdb, .pub, .xla, .xlb and .xls. The asterisk ( *) represents zero or more characters.

Question No: 35 – (Topic 1)

Your network has a main office and a branch office.

The branch office has five client computers that run Windows 7. All client computers are configured to use BranchCache.

At the branch office, a computer named Computer1 is experiencing performance issues.

You need to temporarily prevent all computers from retrieving cached content from Computer1.

What should you do on Computer1?

  1. At the command prompt, run Netsh branchcache flush.

  2. At the command prompt, run Netsh branchcache dump.

  3. Modify the Configure BranchCache for network files Group Policy setting.

  4. Modify the Set percentage of disk space used for client computer cache Group Policy setting.

Answer: A Explanation: Flush

Deletes the contents of the local BranchCache cache.

Question No: 36 – (Topic 1)

You plan to install Windows 7 by using a Windows 7 DVD. You need to perform an automated installation of Windows 7. What should you do?

  1. Create an answer file named oobe.xml. Copy the file to a network share.

  2. Create an answer file named winnt.sif. Place the file on a removable drive.

  3. Create an answer file named sysprep.inf. Copy the file to a network share.

  4. Create an answer file named autounattend.xml. Place the file on a removable drive.

Answer: D

Question No: 37 – (Topic 1)

Which of the following operating systems support an offline migration using USMT? Choose three.

  1. Windows 2000 Professional

  2. Windows XP Professional

  3. Windows Vista

  4. Windows 7

Answer: B,C,D

Question No: 38 – (Topic 1)

Your network consists of a single IPv4 subnet. The subnet contains 20 computers that run Windows 7.

You add a new computer named Computer1 to the subnet.

You discover that Computer1 has an IP address of 169.254.34.12.

You cannot connect to other computers on the network. Other computers on the network can connect to each other.

You need to ensure that you can connect to all computers on the network. What should you do?

  1. Turn off Windows Firewall.

  2. Run Ipconfig.exe /renew.

  3. Configure a static TCP/IP address.

  4. Run Netsh.exe interface ipv4 install.

Answer: C Explanation:

[Need better justification] Configuring static IP addresses

When you assign a static IP address, you need to tell the computer the IP address you want to use, the subnet mask for this IP address, and, if necessary, the default gateway to use for internetwork communications. An IP address is a numeric identifier for a computer. Ip addressing schemes vary according to how your network is configured, but they#39;re normally assigned based on a particular network segment.

Question No: 39 – (Topic 1)

You have a computer that runs Windows 7. The computer connects to the corporate network by using a VPN connection.

You need to ensure that you can access the Internet when the VPN connection is active. The solution must prevent Internet traffic from being routed through the VPN connection.

What should you do?

  1. Configure a static DNS server address.

  2. Configure a static IP address and default gateway.

  3. Configure the security settings of the VPN connection.

  4. Configure the advanced TCP/IP settings of the VPN connection.

Answer: D Explanation:

To prevent the default route from being created

In the properties of the TCP/IP protocol of the dial-up connection object, in the Advanced TCP/IP Settings dialog box, click the General tab, and then clear the Use default gateway on remote network check box.

Question No: 40 – (Topic 1)

You have a computer that runs Windows 7. Your company has a corporate intranet Web site. You open Windows Internet Explorer as shown in the exhibit. (Click the Exhibit button.)

Dumps4Cert 2018 PDF and VCE

You need to ensure that you can access Web pages on both the Internet and the intranet. What should you do?

  1. From the Files menu, click Work Offline.

  2. From the Safety menu, click InPrivate Filtering.

  3. From the Security tab, add the intranet Web site to the Trusted sites zone.

  4. From the Safety menu, click InPrivate Browsing.

Answer: A Explanation:

Working Offline is activated

On Internet Explorer’s File menu is a “Work Offline” item that toggles Internet Explorer between online and offline modes of operation.

(The question originally stated the Tools menu, maybe in a different version of IE this is the case, but for me and in the TechNet documentation it was under Files, so I’m choosing to believe Tools was a mistake and it should be Files, this has been amended in the question).

InPrivate is turned on (does not prevent browsing the internet)

InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, temporary Internet files, history, and other data. Toolbars and extensions are disabled by default.

100% Dumps4cert Free Download!
Download Free Demo:70-680 Demo PDF
100% Dumps4cert Pass Guaranteed!
70-680 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.