Updating Braindump2go Exam Dumps
Hi, this is the official Braindump2go Blog! We Share the Latest Certification News Here, such as Microsoft, Cisco, CompTIA, Amazon, Juniper, VMware, etc.

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(51-60)!

Home  /   Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(51-60)!

You have a computer that runs Windows 7. The computer contains one hard disk. The hard disk is configured as shown in the following table:
You install a new 250-GB hard disk in the computer. You need to ensure that all the files on the computer are available if a single disk fails. What should you do?

A.    Create a mount point on C and D and then create a striped volume.
B.    Create a mount point on C and D and then create two striped volumes.
C.    Convert both disks to dynamic disks and then create a mirrored volume.
D.    Convert both disks to dynamic disks and then create two mirrored volumes.

Answer: D
Creating a Mirrored Volume (RAID-1)A mirrored or RAID-1 volume provides availability and fault tolerance but does not improve performance. It uses two disks (or two portions on separate disks) that are the same size. Any changes made to the first disk of a mirror set are also made to its mirror disk. If the first disk fails, the mirror is broken and the second disk is used until the first is repaired or replaced. The mirror is then re-created, and the information on the working disk is mirrored on the repaired disk. The disadvantage of RAID-1 is that you need (for example) two 200-GB disks to hold 200 GB of data. The advantage is that you can mirror a system disk containing your operating system.You create a mirrored volume using a very similar procedure to the one that creates a striped volume, except that you right-click the first disk of your mirror and click New Mirrored Volume to start the appropriate wizard. You then select the second disk. The second disk needs to have a portion of unallocated space that is at least as large as the disk you want to mirror. The drive letter for a mirrored volume is the same as the drive letter of the first disk.
You can also use the Diskpart tool to create a mirrored volume. At the DISKPART> prompt you first use the select disk command to select the first disk. You then enter a command with the syntax add disk=<n>to specify the mirror disk.

You have two portable computers that run Windows 7. The computers are not connected to a network. The computers are configured as shown in the following table:
You need to transfer a 1 GB file from Computer1 to Computer2. What should you do first?

A.    On Computer1, create a wireless ad hoc network.
B.    On Computer2, configure the Bluetooth File Transfer Wizard to send files.
C.    On Computer2, create a network profile to connect to a network named Homegroup.
D.    On Computer1, configure the computer to be a member of a workgroup named Homegroup.

Answer: A
Wireless Ad Hoc network
You can set up a temporary wireless network, or ad hoc network, between two or more computers running Windows 7 (or between computers running Windows 7 and Windows Vista) provided they are all within 30 feet (9 meters) of each other. A WAP is not required to set up an ad hoc network. This enables users to share folders and other resources without needing to connect to an organizational network. On the first computer on the network, you open Network And Sharing Center and click Set Up A New Connection Or Network. You then choose the option Set Up A Wireless Ad Hoc (Computer To Computer) Network. You give the network a name and (if you want) set up a security key so that users joining the network need to supply a password. For WEP, this can be 5 case-sensitive characters, 13 case-sensitive characters, 10 hexadecimal caseinsensitive characters, or 26 hexadecimal case-insensitive characters, depending on security considerations. (If you choose WPA-2 Personal, you can insist on a 64-character password, but by the time everyone has typed it in correctly, the meeting would probably be over.)BluetoothWindows supports Bluetooth version 1.1 and later versions. Windows does not support Bluetooth version 1.0 because that specification lacks several critical updates that Windows requires to support Bluetooth wireless technology well.

You have a computer that runs Windows Vista. The hard disk is configured as shown in the exhibit. (Click the Exhibit button.) You need to install Windows 7 in a dual-boot configuration. What should you do?


A.    From Windows Vista, extend Disk 0 Partition 1. Install Windows 7 in Disk 0 Partition 1.
B.    From Windows Vista, create a new partition. Install Windows 7 in Disk 0 Partition 1.
C.    Start the computer from the Windows 7 installation media. Install Windows 7 in Disk 0 Partition 1.
D.    Start the computer from the Windows 7 installation media. Install Windows 7 in the unallocated space on Disk 0.

Answer: D
The key to configuring dual-booting is ensuring that each operating system has its own partition or hard disk drive.
To dual-boot with Windows 7, you need to be able to create a new volume of at least 15 GB.
Even if you have more free space available on the volume you want to shrink, you may not be able to create a volume of the appropriate size because Windows Vista may not be able to move some special types of data to a different place on the hard disk drive.
When configuring a new computer to boot between multiple operating systems, it is also necessary to install operating systems in the order that they were released. For example, if you want to boot between Windows XP and Windows 7 on a new computer, you need to install Windows XP before you install Windows 7. If you install Windows XP after Windows
7, the Windows XP installation routine cannot recognize the Windows 7 operating system installation, and the computer only boots into Windows XP. It is possible to repair the computer from this point using Windows 7 startup repair so that it dual-boots, but the simplest course of action is just to install the operating systems in the order in which they were released by Microsoft.

You have a computer that runs Windows 7. The computer is in a workgroup.
You need to ensure that you can decrypt Encrypting File System (EFS) files on the computer if you forget your password.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A.    From Credential Manager, select Back up vault.
B.    From User Accounts, select Create a password reset disk.
C.    From User Accounts, select Manage your file encryption certificates.
D.    From Authorization Manager, modify the Authorization Manager options.

Answer: BC
Password reset disks
It is not unusual for users to forget their passwords to local user accounts from time to time, especially when they use strong passwords. Before the advent of password reset disks, the only way for administrators to restore a forgotten local user account password was to manually reset the user’s password. In the process, the following information was lost: E- mail that was encrypted with the user’s public key Internet passwords that were saved on the computer Files that the user had encrypted Password reset disks offer another solution to the problem of a forgotten password for a local user account. If users create password reset disks for their local accounts before they forget their passwords, they can reset the passwords without losing valuable data that was lost previously with administrative password resets. When you create a password reset disk, a public key and private key pair are created. The private key is stored on a disk: the password reset disk. The public key encrypts the local user account password. If users forget their passwords, they can insert the password reset disk, which contains the private key, and decrypt the current password. The Forgotten Password Wizard prompts the user for a new password, which is then encrypted with the public key. Data is not lost because, basically, the user is simply changing a password. It is essential that password reset disks be stored in secured locations.Back up your Encryption Certificate
1. Open User Accounts by clicking the Start button, clicking Control Panel, clicking User Accounts and Family Safety (or clicking User Accounts, if you are connected to a network domain), and then clicking User Accounts.
2. In the left pane, click Manage your file encryption certificates.
3. In the Encrypting File System wizard, click Next.
4. Click Use this certificate, and then click Next. If you need more details to identify the certificate that is listed, click View certificate. If you want to choose a different certificate, click Select certificate, and then click the certificate you want to back up.
5. Click Back up the certificate and key now.
6. Type or navigate to the location where you want to store the backup. We recommend that you store the backup on removable media such as a disc or USB flash drive.
7. Type and then confirm a password for the backup file, and then click Next. We recommend that you protect the backup file with a strong password.
8. Select the I’ll update my encrypted files later check box, and then click Next.

You have a computer that runs Windows 7. You generate a System Diagnostic Report and receive the following warning message:
"The Graphics rating for the system is poor and may be the cause of performance problems."
You need to increase the graphics performance of the computer without modifying the current hardware or drivers.
What should you do?

A.    From Personalization, modify the screen saver.
B.    From Indexing Options, modify the Advanced options.
C.    From Performance Options, modify the visual effects.
D.    From Performance Options, modify the processor scheduling.

Answer: C
Configuring Performance Options
The Performance Options tool is a Windows 7 Performance And Analysis tool that you can access by clicking Advanced Tools on the Performance Information And Tools dialog box and then clicking Adjust The Appearance And Performance Of Windows. You can let Windows decide what is best for your computer, adjust for best appearance, adjust for best performance, or select Custom and specify the appearance settings for your computer manually. If you select Custom, you can choose which visual effects to turn off, one by one. There are 18 visual effects that you can control, such as whether shadows are displayed under screen icons or under the mouse pointer. On the Advanced tab, you can adjust for the best performance of programs or background services. If your computer is running applications (as a typical workstation does), you would specify Adjust For Best Performance Of Programs. On a server that is functioning as a Web server (for example), you would specify Adjust For Best Performance Of Background Services.

You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. You plan to use User State Migration Tool (USMT) 4.0 to migrate user profiles and data from Computer1 to Computer2. You need to prevent some system settings from being migrated.
You must achieve this goal by using the minimum amount of administrative effort. Which file should you modify?

A.    config.xml
B.    migapp.xml
C.    migdocs.xml
D.    miguser.xml

Answer: A
This file is different from the other migration files as it is used to exclude features from the migration. You can create and modify the Config.xml file using ScanState.exe with the /genconfig option.NOT MigDocs.xmlThis file contains information on the location of user documents.NOT MigUser.xmlMigUser.xml This file contains rules about user profiles and user data. The default settings for this file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu, Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc, .dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*, .pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, .accdb, .mdb, .pub, .xla, .xlb and .xls. The asterisk ( *) represents zero or more characters.NOT MigApp.xmlThis file contains rules about migrating application settings. These include Accessibility settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service (RAS) connection phone book files, regional options, remote access, screen-saver settings, taskbar settings, and wallpaper settings.User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState.

You have a computer that runs Windows 7.
You install a second internal hard disk drive in the computer.
You attempt to create a system image and discover that the new disk is not listed as a backup destination.
You need to ensure that you can use the new disk as a backup destination for system images. What should you do?

A.    Create a NTFS partition.
B.    Create a mirrored volume.
C.    Create a system repair disc.
D.    Log on to the computer by using a different account.

Answer: A
If the drive you are saving your backup on is formatted using the NTFS file system and has enough disk space, a System Image of your programs, your operating system, and all drivers and registry settings is also included in the backup.An external hard drive: (Note that the question actually asks about internal) You cannot use an external hard drive for a System Image backup unless you convert its filing system to NTFS. By default external hard drives are formatted using FAT.NOT Accout:The backup account requires administrative privileges to the computer being backed up, but it implys that this was not the issue, since it got to the point were it could see that this disk wasNOT System repair disc:A system repair disc can be used to boot your computer. It also contains Windows system recovery tools that can help you recover Windows from a serious error or restore your computer from a system image. It is not a system image itself.

A standard user named User1 has a computer that runs Windows 7.
You need to ensure that User1 can run Windows Easy Transfer. What should you do?

A.    Disable User Account Control (UAC).
B.    Add User1 to the Administrators group.
C.    Configure User1 to have a complex password.
D.    Copy the support folder from the Windows 7 installation media to the local hard disk drive.

Answer: B
Windows Easy Transfer Migration
After you have set up Windows Easy Transfer on the source computer, you are ready to perform migration. If you want to migrate only a single user account, you can log on with that account to perform the transfer. If you want to migrate all accounts on the computer, you need to log on with a user account that has Local administrator privileges.
To do this, start Windows Easy Transfer, select the transfer method, and then, on the Which Computer Are You Using Now? page, select This Is My Old Computer. If you are using the External Hard Disk or USB storage device method, Windows Easy Transfer will then perform a migration check and provide an estimate of the size of the data you can transfer to the new computer on the source computer. If you are using the Network or Easy Transfer Cable method, you will select items for migration on the destination computer.
NOT User Account Control (UAC)
UAC is a security feature of Windows 7 that informs you when the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks.

You have a computer named Computer1 that runs Windows 7. You plan to migrate the user state on Computer1 by using User State Migration Tool (USMT) 4.0. You need to identify which user documents will be included in the migration. What should you do?

A.    Run Usmtutils.exe and use the /ec option.
B.    Run Sysprep.exe and use the /audit option.
C.    Run Loadstate.exe and use the /v:12 option.
D.    Run Scanstate.exe and use the /genmigxml option.

Answer: D
You run ScanState on the source computer during the migration. You must run ScanState.exe on computers running Windows Vista and Windows 7 from an administrative command prompt. When running ScanState on a source computer that has Windows XP installed, you need to run it as a user that is a member of the local administrators group. The following command creates an encrypted store named Mystore on the file share named Migration on the file server named Fileserver that uses the encryption key Mykey: scanstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /o /config:config.xml /encrypt /key:"mykey"
/genmigxml: path to a file This option specifies that the ScanState command should use the document finder to create and export an .xml file that defines how to migrate all of the files on the computer on which the ScanState command is running.

You are the administrator of a computer named Computer1 that runs Windows 7. Several users share Computer1. The users plan to encrypt files on the computer. You need to ensure that you can access all encrypted files on the computer. What should you do first?

A.    At a command prompt, run Cipher.exe.
B.    At a command prompt, run Certutil.exe.
C.    From the local comput er policy, modify the User Rights Assignment.
D.    From User Accounts, run the Manage your file encryption certificates wizard.

Answer: A
Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed. When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.
If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data.
/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size.
/R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521.

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump: