[Free] 2018(Jan) EnsurePass Dumpsleader Microsoft 70-680 Dumps with VCE and PDF Download 351-360

Ensurepass.com : Ensure you pass the IT Exams 2018 Jan Microsoft Official New Released 70-680
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-680.html

TS: Windows 7, Configuring

Question No: 351 HOTSPOT – (Topic 4)

A user is attempting to connect to a secure remote Microsoft SQL database on a computer running Windows 7 Professional. The computer communicates on port 1433.

A rule in Windows Firewall with Advanced Security allows communication. The user cannot connect to the database on the currently defined protocol due to an error in protocol type.

You need to ensure that users can connect to the database.

Which setting should you choose? (To answer, select the appropriate setting in the work area.)

Ensurepass 2018 PDF and VCE

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Click on Protocol Type. It should be set to TCP.

Question No: 352 HOTSPOT – (Topic 4)

A company has client computers that run Windows 7. You set up a virtual private network (VPN) infrastructure that uses a preshared key for authentication.

You need to create the VPN connection on the client computers.

Which setting should you choose? (To answer, select the appropriate setting in the work area.)

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Ensurepass 2018 PDF and VCE

You can enter the preshared key under the Advanced Settings button.

Ensurepass 2018 PDF and VCE

Question No: 353 – (Topic 4)

You administer client computers that have Windows 7 Enterprise installed.

A server named Server1 has an IP address of 10.10.4.56. The server accepts Remote Desktop connections at a custom port 10876.

You need to connect to the server from a client computer by using Remote Desktop. What should you do?

  1. From the General tab of your Remote Desktop connection, type 10.10.4.56 port: 10876 in the Computer field.

  2. From the Advanced tab of your Remote Desktop connection, configure the port of Server1 in the Connect from anywhere option.

  3. From the General tab of your Remote Desktop connection, type 10.10.4.56:10876 in the Computer field.

  4. From an elevated command prompt, run mstsc.exe 10.10.4.56 port: 10876.

Answer: A

Question No: 354 – (Topic 4)

Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BrachCache features installed.

You add new client computers the network. The computers have Windows 7 installed and are members of a workgroup.

You need to ensure that the new client computers are configured to cache and share files. What should you do?

  1. Run the Netsh branchcache set service mode=HOSTEDSERVER client authentication=NONE command

  2. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound trafficfor local TCP port 80.

  3. Create a Group Policy that sets Hash Publication for BranchCache as disabled.

  4. Run the netsh branchcache set service mode=DISTRIBUTED command.

  5. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option.

  6. Check permisions.

  7. Run the netsh branchcache set service mode=HOSTEDCLIENT command.

  8. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy.

  9. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443.

Answer: D

Question No: 355 – (Topic 4)

Your company has a server that runs Windows Server 2008 R2. The server is configured as a remote access server.

The external firewall has TCP port 80 and TCP port 443 open for remote access connections.

You have a home computer that runs Windows 7.

You need to establish secure remote access connection from the home computer to the remote access server.

Which type of connection should you configure?

  1. IPSEC

  2. L2TP

  3. PPTP

  4. SSTP

Answer: D Explanation:

Secure Socket Tunneling Protocol

Secure Socket Tunneling Protocol (SSTP) is a new form of VPN tunnel with features that allow traffic to pass through firewalls that block PPTP and L2TP/IPsec traffic. SSTP provides a mechanism to encapsulate PPP traffic over the SSL channel of the HTTPS protocol. The use of PPP allows support for strong authentication methods such as EAP- TLS. The use of HTTPS means traffic will flow through TCP port 443, a port commonly used for Web access. Secure Sockets Layer (SSL) provides transport-level security with enhanced key negotiation, encryption, and integrity checking.

Question No: 356 – (Topic 4)

You have a computer that runs Windows 7. You need to prevent users from copying unencrypted files to removable drives. What should you do?

  1. From the Trusted Platform Module (TPM) snap-in, initialize TPM.

  2. From Control Panel, modify the BitLocker Drive Encryption settings.

  3. From a local Group Policy, modify the BitLocker Drive Encryption settings.

  4. From a local Group Policy, modify the Trusted Platform Module (TPM) settings

Answer: C

Explanation:

How can I prevent users on a network from storing data on an unencrypted drive? In Windows 7, you can enable Group Policy settings to require that data drives be

BitLockerprotected before a BitLocker-protected computer can write data to them. The policy settings you use for this are:

Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionFixed Data DrivesDeny write access to fixed drives not protected by BitLocker Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionRemovable Data DrivesDeny write access to removable drives not protected by BitLocker

When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only.

If you are concerned that your users might inadvertently store data in an unencrypted drives while using a computer that does not have BitLocker enabled, use access control lists (ACLs) and Group Policy to configure access control for the drives or hide the drive letter.

Question No: 357 – (Topic 4)

A company has a server running Windows Server 2008 R2, with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) set up. The company also has client computers running Windows 7 Enterprise.

You need to remove some files from a virtual hard disk on a client computer. What should you do first?

  1. use Sysprep with an answer file and set the PersistAHDeviceinstalls option in the answer file to True.

  2. Run the BCDEdit /delete command.

  3. Run the Start/w ocsetup command.

  4. Use Sysprep with an answer file and set the UpdateinstalledDriversoption in the answer file to Yes.

  5. Run the Dism command with the /Add-Driver option.

  6. Add a boot image and create a capture image in WDS.

  7. Run the PEImg /Prepcommand.

  8. Run the ImageX command with the /Mount parameter.

  9. Run the Dism command with the /Mount-Wim option.

  10. Use Sysprep with an answer file and set the UpdateInstalledDriversoption in the answer file to No.

  11. Run the Dism command with the /Add-Package option.

  12. Run the DiskPart command and the Attach command option.

  13. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False.

Answer: L Explanation:

DiskPart.exe and managing Virtual Hard Disks (VHDs) in Windows 7

In Windows 7, new commands have been added in DiskPart to allow for the creation and management of Virtual Hard Disks (.vhd files). The DiskPart VHD management commands have been provided below in 2 sections – commonly used commands with examples and other commands. It is assumed in each of the examples that DiskPart.exe has already been launched in an elevated command prompt.

Creating a VHD

The example below creates a 20GB dynamically expanding VHD called quot;test.vhdquot; and places it in the root of the C: drive. Note that the type parameter is optional and the default type is fixed. create vdisk file=c:\test.vhd maximum=20000 type=expandable

Attaching a VHD

The following example shows how to select and attach the VHD. It also provides steps for partitioning, formatting and assigning a drive letter to the attached VHD.

select vdisk file=c:\test.vhd attach vdisk

create partition primary

format fs=ntfs label=quot;Test VHDquot; quick assign letter=v

Detaching the VHD

To detach (i.e. unmount) the VHD, use the following example: select vdisk file=c:\test.vhd

detach vdisk

Question No: 358 – (Topic 4)

Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers arm members of an Active Directory domain. You use a computer named Client1.

You plan to collect events from Client1 on Server1 by using HTTPS. On Server 1, you start and configure the Windows Event Collector service. On Client1, you start the Windows Remote Management service.

You discover that no events are being collected.

You need to ensure that events are forwarded from Client1 to Server1. What should you do?

  1. On Client1, create an outbound Rule to allow port 443 for the Domain connection type.

  2. On Server1, create a Windows Event Collector firewall exception for the Domain connection type.

  3. On Client1, create an inbound Rule to allow port 5986 for the Domain connection type.

  4. On Client1, create a Windows Remote Management firewall exception for the Public connection type.

Answer: C

Question No: 359 – (Topic 4)

You need to uninstall a Windows update from a computer that runs Windows 7. Which Control Panel item should you use?

  1. Administrative Tools

  2. Programs and Features

  3. Sync Center

  4. Troubleshooting

Answer: B

Question No: 360 – (Topic 4)

You administer desktops that have 32-bit and 64-bit versions of Windows 7 Enterprise SP1 installed. All desktops have a single CD-RW drive. The local hard disk drives on all computers are partitioned with a recovery partition and a single logical drive C.

You need to be able to restore Windows boot files on any of the desktops if the boot files become corrupted.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. Create a system image of a Windows 7 Enterprise 64-bit desktop

  2. Create a system repair disk on a Windows 7 Enterprise 64-bit desktop.

  3. Restart Windows 7 Enterprise 64-bit desktops. Select the Disable Drive Signature Enforcement option from the Advanced Boot options menu.

  4. Enable system protection on the recovery partition on 64-bit desktops.

  5. Create system repair disk on a Windows 7 Enterprise 32-bit desktop.

  6. Create a system image of a Windows 7 Enterprise 32-bit desktop.

  7. Enable system protection on the recovery partition on 32-bit desktops.

Answer: B,E Explanation:

http://windows.microsoft.com/en-US/windows7/Create-a-system-repair-disc

100% Ensurepass Free Download!
Download Free Demo:70-680 Demo PDF
100% Ensurepass Free Guaranteed!
70-680 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No