[Free] 2018(June) Ensurepass Microsoft 70-680 Dumps with VCE and PDF 261-270

Ensurepass.com : Ensure you pass the IT Exams
2018 May Microsoft Official New Released 70-680
100% Free Download! 100% Pass Guaranteed!

TS: Windows 7, Configuring

Question No: 261 – (Topic 3)

Your company uses Windows Deployment Services (WDS) to deploy Windows 7. You create a new image of Windows 7.

You need to ensure that you can deploy the image by using WDS. What should you do?

  1. From the Windows Deployment Services snap-in, add a new install image.

  2. From the Windows Deployment Services snap-in, add a new boot image.

  3. Run Oscdimg.exe and specify the -boot parameter. Copy the image to C:\remoteinstall\boot.

  4. Run Imagex.exe and specify the /append parameter. Copy the image to C:\remoteinstall\images.

Answer: A Explanation:

Windows Deployment ServicesWDS provides a PXE-booted version of Windows PE. A WDS image is contained in a WIM file and is booted over the network into a RAMDisk. The installation then proceeds under Windows PE. The process of capturing a WIM image into a WDS server is similar to the use of ImageX and Sysprep except that the last step

involves booting into the WDS capture image. This is a Windows PE image that helps you capture a client system to the WDS server. WDS is relatively lightweight compared to other image deployment methods such as MDT and provides a method that can be faster than an optical media-based installation of Windows. You use WDS images to deploy system files to client computers. A number of image files exist; for example, you use a capture image to create an install image.

Install ImageAn install image is an operating system image that you deploy to the client computer. Typically, this is a WIM file.Boot ImageA boot image is a Windows PE image into which you boot a client before you install the WIM image file. To install Windows 7, you first boot the computer into the boot image, and then you select the install image to install. Unless you are using a reference computer and adding applications to the image, you should use the standard boot image that is included on the Windows 7 installation media (Install.wim). Capture and discover images are types of boot images. (need install image not boot)NOT OscdimgOscdimg is a command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660, Joliet, and Universal Disk Format (UDF) file systems. (-boot : need install image not boot)NOT ImagexImageX is a

command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice.

Question No: 262 – (Topic 3)

You have a computer named Computer1 that runs Windows 7. You have a server named Server1 that runs Windows Server 2008. Server1 has a file share named Share1.

The network configuration for Computer1 is shown in the exhibit. (Click the Exhibit button.)

Ensurepass 2018 PDF and VCE

You attempt to connect to \\Server1\Share1 and receive the following error message: Windows cannot access \\Server1\Share1. From Computer1, you successfully ping Server1.

You need to connect to \\Server1\Share1. What should you enable on Computer1?

  1. Client for Microsoft Networks

  2. File and Printer Sharing for Microsoft Networks

  3. Link-Layer Topology Discovery Mapper I/O Driver

  4. Link-Layer Topology Discovery Responder

Answer: A Explanation:

Client for Microsoft Networks Allows the computer to access resources on a Microsoft network.File and Printer Sharing for Microsoft NetworksEnables other computers to access resources on your computer in a Microsoft network (and other networks).Link-layer Topology Discovery Mapper I/O DriverDiscovers and locates other computers, devices, and network infrastructure features on the network, and determines network bandwidth.

Link-layer Topology Discovery ResponderAllows a computer to be discovered and located on the network.

Question No: 263 – (Topic 3)

You have a computer that runs Windows 7. You install a third-party Web browser.

You discover that HTML files are no longer associated with Windows Internet Explorer. You need to ensure that Internet Explorer starts whenever a HTML file is opened.

What should you do from Internet Options?

  1. Open the Connections tab and click Setup.

  2. Open the General tab and click Use default.

  3. Open the Programs tab and click Make default.

  4. Open the Programs tab and click Manage add-ons.

    Answer: C Explanation:

    Change your default web browser

    This information applies to Internet Explorer 8 or Internet Explorer 7 running on Windows 7, Windows Vista, Windows Server 2008, Windows XP Service Pack 2 and Service Pack 3, and Windows Server 2003.

    To make Internet Explorer your default web browser

    1. Click to open Internet Options.

    2. Click the Programs tab, and then click Make default.

    3. Click OK, and then close Internet Explorer.

      Ensurepass 2018 PDF and VCE

      Question No: 264 – (Topic 3)

      You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two local user accounts named User1 and User2. On Computer1, you run Scanstate.exe /all \\server1\data\computer1. On Computer2, you run Loadstate.exe

      /lac:Pa$$w0rd \\server1\data\computer1.

      You need to ensure that User1 and User2 can log on to Computer2. What should you do on Computer2?

      1. Enable all user accounts

      2. Modify the default password policy

      3. Modify the Allow log on locally user right

      4. Add User1 and User2 to the local Administrators group

        Answer: A Explanation:

        LoadState is run on the destination computer. You should install all applications that were on the source computer on the destination before you run LoadState. You must run Loadstate. exe on computers running Windows Vista and Windows 7 from an administrative command prompt. To load profile data from an encrypted store named Mystore that is stored on a share named Migration on a file server named Fileserver and which is encrypted with the encryption key Mykey, use this command: loadstate

        \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /decrypt /key:quot;mykeyquot;

        (local account create) /lac:[Password] Specifies that if a user account is a local (non- domain) account, and it does not exist on the destination computer, USMT will create the account on the destination computer but it will be disabled. To enable the account, you must also use the /lae option. If the /lac option is not specified, any local user accounts that do not already exist on the destination computer will not be migrated. Password is the password for the newly created account. An empty password is used by default.

        Question No: 265 – (Topic 3)

        A user named User1 uses a shared computer that runs Windows 7.

        User1 is a standard user. User1 attempts to connect a USB device to the computer and is prompted to enter administrative credentials.

        You need to ensure that User1 can use the USB device without requiring administrative credentials.

        What should you do first?

        1. Add User1 to the Power Users group.

        2. Run Pnputil.exe and specify the – i- a parameters.

        3. Run Driverquery.exe and specify the /SI parameter.

        4. Copy the driver files to the C:\windows\system32 folder.

        Answer: B Explanation:

        When a driver is staged, it is placed in the device driver store and non-administrators can install the device, provided they have permission to install devices in the appropriate device setup class. Pnputil.exe is a command line utility that you can use to manage the driver store. You can use Pnputil to add driver packages, remove driver packages, and list driver packages that are in the store. -i Specifies to install the identified INF file. Cannot be used in conjunction with the -f parameter.


        pnputil.exe -i -a a:\usbcam\USBCAM.INF Adds and installs the specified driver

        Question No: 266 – (Topic 3)

        You install Windows 7 on a new computer.

        Every time you start the computer, you receive a STOP error message. You suspect that the RAM on the computer has a problem.

        You need verify the RAM on the computer. What should you do first?

        1. Start the computer, press F8, and then select Repair Your Computer.

        2. Start the computer, press F8, and then select Last Known Good Configuration.

        3. From a computer that runs Windows 7, copy the %systemroot%\system32\recover.exe to a bootable USB disk. Start the computer from the USB disk.

        4. From a computer that runs Windows 7, copy the %systemroot%\system32\repair- bde.exe to a bootable USB disk. Start the computer from the USB disk.

        Answer: A Explanation:

        Using Recovery Tools If Windows RE is included in your installation DVD-ROM, you can boot from the Windows 7 installation media, select Repair Your Computer, and then select

        the option to use recovery tools to access the System Recovery Options. However, you can use the method described previously (pressing F8) whether the Windows RE files are present on your DVD-ROM or not and whether you boot from your installation DVD-ROM or from hard disk.

        Then use the following System Recovery Option:

        Windows Memory Diagnostic Analyzes the computer memory (RAM) for hardware problems.

        Question No: 267 – (Topic 3)

        You have a computer that runs Windows 7. You plan to create an image of the computer. You need to prevent files with the ISO file extension from being included in the image.

        What should you do?

        1. Run Dism.exe and use the /image parameter

        2. Run Dism.exe and use the /scratchdir parameter

        3. Run Imagex.exe and use the /config parameter

        4. Run Imagex.exe and use the /norpfix parameter

        Answer: C Explanation:

        ImageX is a command-line tool that enables the creation of image files for deployment in a manufacturing or corporate IT environment. You can create a configuration file (configuration_list.ini) to determine:

        ->Which files and folders must be excluded from the capture process when using the

        /capture option.

        ->Which folders, files, and file types must be excluded from the compression process when using the /compress option.

        ->Whether the .wim file aligns on a 64K boundary or the default 32K boundary.

        Question No: 268 – (Topic 3)

        Your network contains a Network Policy and Access Services server named Server1.

        All certificates in the organization are issued by an enterprise certification authority (CA) named Server2.

        You have a standalone computer named Computer1 that runs Windows 7. Computer1 has a VPN connection that connects to Server1 by using SSTP.

        You attempt to establish the VPN connection to Server1 and receive the following error message: “A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.”

        You need to ensure that you can successfully establish the VPN connection to Server1. What should you do on Computer1?

        1. Import the root certificate to the user’s Trusted Publishers store.

        2. Import the root certificate to the computer’s Trusted Root Certification Authorities store.

        3. Import the server certificate of Server1 to the user s Trusted Root Certification Authorities store.

        4. Import the server certificate of Server1 to the computer s Trusted Root Certification Authorities store.

        Answer: B

        Explanation: A certificate chain establishes a quot;chain of trustquot; from a certification authority (CA) to an individual certificate. Trust occurs if a valid certificate from that CA can be found in your root certificate directory. As long as you trust the CA, you will automatically trust any other certificates signed by that CA.

        Question No: 269 – (Topic 3)

        You administer 80 computers that run Windows 7. The computers have static IP addresses.

        You need to change the static IP addresses on all the computers by using a startup script. Which command should you include in the startup script?

        1. Ipconfig.exe

        2. Nbtstat.exe

        3. Netstat.exe

        4. Netsh.exe

        Answer: D Explanation: Netsh.exe

        Netsh.exe is a tool an administrator can use to configure and monitor Windows-based computers at a command prompt. With the Netsh.exe tool, you can direct the context commands you enter to the appropriate helper, and the helper then carries out the command. A helper is a Dynamic Link Library (.dll) file that extends the functionality of the Netsh.exe tool by providing configuration, monitoring, and support for one or more services, utilities, or protocols. The helper may also be used to extend other helpers. You can use the Netsh.exe tool to perform the following tasks:

  • Configure interfaces.

  • Configure routing protocols.

  • Configure filters.

  • Configure routes.

  • Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service.

  • Display the configuration of a currently running router on any computer.

  • Use the scripting feature to run a collection of commands in batch mode against a specified router.

  • The syntax for the Netsh.exe tool is:

    netsh [-r router name] [-a AliasFile] [-c Context] [Command | -f ScriptFile] To display a list of subcontexts and commands that can be used in a context, type the context name followed by a space and a ? at the netshgt; command prompt. For example, to display a list of subcontext and commands that can be used in the /routing context, type routing ? at the netshgt; command prompt, and then press ENTER.

    Question No: 270 – (Topic 3)

    You have a computer that runs Windows 7.

    Your network has a SSTP VPN server that uses a self-signed certificate.

    When you connect to the VPN server, you receive the following error message: “Your computer does not trust the issuing certification authority (CA) of the SSTP VPN servers


    You need to prevent the error message from appearing when you connect to the VPN server.

    What should you do?

    1. From the properties of the VPN connection, modify the dialing options.

    2. From the properties of the VPN connection, modify the data encryption settings.

    3. From Certificate Manager, import the servers certificate into the Personal store.

    4. From Certificate Manager, import the server’s certificate into the Trusted Root Certification

    Authorities store.

    Answer: D Explanation: Certificate Manager

    A certificate manager can approve certificate enrollment and revocation requests, issue certificates, and manage certificates. This role can be configured by assigning a user or group the Issue and Manage Certificatespermission. When you assign this permission to a user or group, you can further refine their ability to manage certificates by group and by certificate template. For example, you might want to implement a restriction that they can only approve requests or revoke smart card logon certificates for users in a certain office or organizational unit that is the basis for a security group.Importing CertificatesYou may restore certificates and the corresponding private keys from a file.

      1. Right-click the certificate store you want to import, and click Install PFX on the context menu.

      2. The Certificate Import Wizard launches. Click Next.

      3. In the File name text box, type the name of the certificate file that you want to import. Alternatively, you can find the file by clicking Browse.

      4. Click Next. If the file specified is a Personal Information Exchange-PKCS #12 (*.pfx), you will be prompted for the password. Enter the password to import the file. Click Next.

      5. On the next page, select where you#39;d like to store the certificate. Click Next.

      6. The next wizard page contains summary information about the file that you are importing. Click Finish to import the file. The certificate(s) are now ready for use by the system.

        100% Ensurepass Free Download!
        Download Free Demo:70-680 Demo PDF
        100% Ensurepass Free Guaranteed!
        Download 2018 EnsurePass 70-680 Full Exam PDF and VCE

        EnsurePass ExamCollection Testking
        Lowest Price Guarantee Yes No No
        Up-to-Dated Yes No No
        Real Questions Yes No No
        Explanation Yes No No
        PDF VCE Yes No No
        Free VCE Simulator Yes No No
        Instant Download Yes No No

    Leave a Reply

    Your email address will not be published. Required fields are marked *

  • Categories

  • Tags

  • Hot Exams

  • Hot Exams

  • Hot Catageories

  • microsoft dumps

    62-193 Dumps
    70-243 Dumps
    70-246 Dumps
    70-247 Dumps
    70-331 Dumps
    70-332 Dumps
    70-333 Dumps
    70-334 Dumps
    70-339 Dumps
    70-341 Dumps
    70-342 Dumps
    70-345 Dumps
    70-346 Dumps
    70-347 Dumps
    70-348 Dumps
    70-354 Dumps
    70-355 Dumps
    70-357 Dumps
    70-383 Dumps
    70-384 Dumps
    70-385 Dumps
    70-398 Dumps
    70-410 Dumps
    70-411 Dumps
    70-412 Dumps
    70-413 Dumps
    70-414 Dumps
    70-417 Dumps
    70-461 Dumps
    70-462 Dumps
    70-463 Dumps
    70-464 Dumps
    70-465 Dumps
    70-466 Dumps
    70-467 Dumps
    70-469 Dumps
    70-470 Dumps
    70-473 Dumps
    70-475 Dumps
    70-480 Dumps
    70-481 Dumps
    70-482 Dumps
    70-483 Dumps
    70-484 Dumps
    70-485 Dumps
    70-486 Dumps
    70-487 Dumps
    70-488 Dumps
    70-489 Dumps
    70-490 Dumps
    70-491 Dumps
    70-492 Dumps
    70-494 Dumps
    70-496 Dumps
    70-497 Dumps
    70-498 Dumps
    70-499 Dumps
    70-517 Dumps
    70-532 Dumps
    70-533 Dumps
    70-534 Dumps
    70-535 Dumps
    70-537 Dumps
    70-640 Dumps
    70-642 Dumps
    70-646 Dumps
    70-673 Dumps
    70-680 Dumps
    70-681 Dumps
    70-682 Dumps
    70-684 Dumps
    70-685 Dumps
    70-686 Dumps
    70-687 Dumps
    70-688 Dumps
    70-689 Dumps
    70-692 Dumps
    70-694 Dumps
    70-695 Dumps
    70-696 Dumps
    70-697 Dumps
    70-698 Dumps
    70-703 Dumps
    70-705 Dumps
    70-713 Dumps
    70-734 Dumps
    70-735 Dumps
    70-740 Dumps
    70-741 Dumps
    70-742 Dumps
    70-743 Dumps
    70-744 Dumps
    70-745 Dumps
    70-761 Dumps
    70-762 Dumps
    70-764 Dumps
    70-765 Dumps
    70-767 Dumps
    70-768 Dumps
    70-773 Dumps
    70-774 Dumps
    70-775 Dumps
    70-776 Dumps
    70-778 Dumps
    70-779 Dumps
    70-980 Dumps
    70-981 Dumps
    70-982 Dumps
    74-343 Dumps
    74-344 Dumps
    74-409 Dumps
    74-678 Dumps
    74-697 Dumps
    77-418 Dumps
    77-419 Dumps
    77-420 Dumps
    77-421 Dumps
    77-422 Dumps
    77-423 Dumps
    77-424 Dumps
    77-425 Dumps
    77-426 Dumps
    77-427 Dumps
    77-428 Dumps
    77-600 Dumps
    77-601 Dumps
    77-602 Dumps
    77-603 Dumps
    77-604 Dumps
    77-605 Dumps
    77-725 Dumps
    77-726 Dumps
    77-727 Dumps
    77-728 Dumps
    77-729 Dumps
    77-730 Dumps
    77-731 Dumps
    77-853 Dumps
    77-881 Dumps
    77-882 Dumps
    77-883 Dumps
    77-884 Dumps
    77-885 Dumps
    77-886 Dumps
    77-887 Dumps
    77-888 Dumps
    77-891 Dumps
    98-349 Dumps
    98-361 Dumps
    98-362 Dumps
    98-363 Dumps
    98-364 Dumps
    98-365 Dumps
    98-366 Dumps
    98-367 Dumps
    98-368 Dumps
    98-369 Dumps
    98-372 Dumps
    98-373 Dumps
    98-374 Dumps
    98-375 Dumps
    98-379 Dumps
    98-380 Dumps
    98-381 Dumps
    98-382 Dumps
    98-383 Dumps
    98-388 Dumps
    AZ-100 Dumps
    AZ-101 Dumps
    AZ-102 Dumps
    INF-203x Dumps
    INF-204x Dumps
    INF-205x Dumps
    INF-206x Dumps
    MB2-700 Dumps
    MB2-701 Dumps
    MB2-702 Dumps
    MB2-703 Dumps
    MB2-704 Dumps
    MB2-706 Dumps
    MB2-707 Dumps
    MB2-708 Dumps
    MB2-709 Dumps
    MB2-710 Dumps
    MB2-711 Dumps
    MB2-712 Dumps
    MB2-713 Dumps
    MB2-714 Dumps
    MB2-715 Dumps
    MB2-716 Dumps
    MB2-717 Dumps
    MB2-718 Dumps
    MB2-719 Dumps
    MB2-877 Dumps
    MB5-705 Dumps
    MB6-700 Dumps
    MB6-701 Dumps
    MB6-702 Dumps
    MB6-703 Dumps
    MB6-704 Dumps
    MB6-705 Dumps
    MB6-884 Dumps
    MB6-885 Dumps
    MB6-886 Dumps
    MB6-889 Dumps
    MB6-890 Dumps
    MB6-892 Dumps
    MB6-893 Dumps
    MB6-894 Dumps
    MB6-895 Dumps
    MB6-896 Dumps
    MB6-897 Dumps
    MB6-898 Dumps