Which of the following is used to control when the security pop-up notifications are used?
A. Security Control Manager
B. User Account Control
C. User Access Control Panel
D. Notification Control Settings Manager
Which of the following is not a Windows PE tool?
D. None of the above.
Which of the following will cause the Online Compatibility Check to fail during a Window 7 installation? Choose two.
A. 512 MB of RAM
B. A display adapter with WDDM Support
C. A display adapter without WDDM Support but with SVIDEO
D. An 80-GB Hard Disk
In which of the following scenarios must you perform a migration rather than an upgrade? Choose three.
A. Windows XP Professional (x64) to Windows 7 Professional (x64)
B. Windows Vista Business (x86) to Windows 7 Professional (x64)
C. Windows Vista Enterprise (x64) to Windows 7 Enterprise (x64)
D. Windows Vista Home Premium (x64) to Windows 7 Home Premium (x86)
Which of the following utilities can you use to transfer user encryption certificates from a computer running Windows XP Professional to Windows 7 Professional? Choose two.
A. File Settings and Transfer Wizard
C. Windows Easy Transfer
You are creating an unattend answer file for automatic Windows 7 installation. What can you use to do this? Choose two.
A. The Windows SIM tool in Windows AIK
B. Microsoft Notepad
C. The Deployment Workbench MDT tool
You want to create a 20-GB native VHD called SystemVHD in a folder called Windows7 on an external hard disk with the drive designation G:. Which command do you use?
A. Create vdisk file=g:\Windows7\SystemVHD maximum=20000
B. Create vdisk file=g:\Windows7\SystemVHD.vhd maximum=20000
C. Create vdisk file=g:\Windows7\SystemVHD.vhd maximum=20
D. Create vdisk file=g:\Windows7\SystemVHD maximum=20
You are configuring static IPv4 addresses for two computers, Perth and Brisbane, on an isolated private wired subnet.
You configure Perth with the IPv4 address 172.16.10. 140 and the subnet mask 255.255.255.0. You configure Brisbane with the IPv4 address 172.16.10. 210 and the subnet mask 255.255.255.0.
You enter ping 172.16.10.140 on Brisbane, but the command times out. Similarly, entering ping 172.16.10.210 on Perth fails to locate the Brisbane computer’s IPv4 address.
What is the likely reason for this lack of connectivity?
A. DNS service is not available on the subnet.
B. The computers should have different subnet masks.
C. You have not specified a default gateway.
D. You need to permit ICMPv4 traffic through the firewalls of both computers.
You want to prohibit read, write, and execute access to all types of external storage devices. What computer policy setting do you enable?
A. All Removable Storage: Allow Direct Access In Remote Sessions
B. All Removable Storage Classes: Deny All Access
C. Removable Disks: Deny Read Access
D. Removable Disks: Deny Write Access
A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named Group1. The computer contains a folder named Folder1. The permissions for User1 are shown in the User1 Permissions exhibit. (Click the Exhibit button.)
The permissions for Group1 are shown in the Group1 Permissions exhibit. (Click the Exhibit button.)
You need to ensure that User1 can create files in Folder1. All other members of Group1 must be prevented from creating files in Folder1. What should you do?
User Permissions (exhibit):
Group Permissions (exhibit):
A. On Folder1, assign the Full control permission to User1.
B. On Folder1, remove the Deny – Write permission for Group1.
C. Share Folder1. Assign User1 the Read and Change share permission.
D. Share Folder1. Assign Group1 the Read and Change share permission.
Pass Microsoft 70-680 Exam In First Try