web analytics

Microsoft 70-680 Exam Questions – Access to resource

QUESTION 1
You have a portable computer named Computer1 that runs Windows 7.

You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1.

You need to configure Computer1 to meet the following requirements:

Ensure that cached files from Share1 are encrypted.
Ensure that files located in Share1 are available when Server1 is disconnected from the network.

What should you do?

A. On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline.
B. On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available offline. C. On Computer1, make Share1 available offline and enable encryption of offline files.
D. On Computer1, copy the files from Share1 to the Documents library and configure BitLocker Drive
Encryption.

Correct Answer: C
Section: Access to resource
Explanation

Explanation/Reference:
102 20202

Offline Files
The Offline Files feature of Windows 7 allows a client to locally cache files hosted in shared folders so that they are accessible when the computer is unable to connect directly to the network resource. The Offline Files feature is available to users of the Professional, Enterprise, and Ultimate editions of Windows 7. You can use the Offline Files feature to ensure access when a client computer is out of the office or when a temporary disruption, such as a wide area network (WAN) link failing between a branch office and a head office, blocks access to specially configured shared folders.

Using Sync Center
You can use Sync Center to synchronize files, manage offline files, and resolve synchronization conflicts manually. Sync Center is located within the Control Panel or by typing Sync Center into the Search Programs and Files text box on the Start menu. Clicking Manage Offline Files opens the Offline Files. This dialog box is also available using the Offline Files control panel. Using this dialog box, you can disable offline files, view offline files, configure disk usage for offline files, configure encryption for offline files,
and configure how often Windows 7 should check for slow network conditions.

QUESTION 2
Your network consists of one Active Directory domain.

You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain.

From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain.

You need to ensure that you can recover all EFS encrypted files from Computer2. What should you do?
A. On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%
\DigitalLocker.
B. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.
C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter.
D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run
Cipher.exe and specify the /adduser parameter.

Correct Answer: B
Section: Access to resource
Explanation

Explanation/Reference:
107 202

You can import the recovery agent to another computer running Windows 7 if you want to recover files

encrypted on the first computer. You can also recover files on another computer running Windows 7 if you have exported the EFS keys from the original computer and imported them on the new computer. You can use the Certificates console to import and export EFS keys.

NOT Secedit.exe
You can use both the Local Group Policy Editor and the Local Security Policy console to import and export security-related Group Policy settings. You can use this import and export functionality to apply the same security settings to stand-alone computers that are not part. As well as using Local Group Policy Editor
and the Local Security Policy console to import
policies that are stored in .inf format, you can apply them using the Secedit.exe command-line utility.

NOT Cipher.exe /removeuser /adduser

NOT DigitalLocker

QUESTION 3
Your network has a main office and a branch office. The branch office has computers that run Windows 7. A network administrator enables BranchCache in the main office.
You run Netsh on your computer as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that other computers in the branch office can access the cached content on your computer

What should you do?

Netsh (exhibit):

Netsh german (exhibit):

A. Turn on Internet Information Services (IIS).
B. Configure the computer as a hosted cache client.
C. Configure the BranchCache service to start automatically. D. Modify the Windows Firewall with Advanced Security rules.

Correct Answer: D
Section: Access to resource
Explanation

Explanation/Reference:
1019 20184

Distributed Cache Mode
Distributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content
over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link. When it accesses the file from its peer, it also copies that file into its own cache.

When you configure BranchCache in distributed cache mode, BranchCache client computers use the
Hypertext Transfer Protocol (HTTP) for data transfer with other client computers. BranchCache client

computers also use the Web Services Dynamic Discovery (WS-Discovery) protocol when they attempt to discover content on client cache servers. You can use this procedure to configure client firewall exceptions to allow incoming HTTP and WS-Discovery traffic on client computers that are configured for distributed cache mode.

You must select Allow the connection for the BranchCache client to be able to send traffic on this port.

QUESTION 4
You have a computer that runs Windows 7. A printer is installed on the computer.
You remove the Everyone group from the access control list (ACL) for the printer, and then you share the printer.

You need to ensure that members of the Sales group can modify all the print jobs that they submit. You must prevent Sales group members from modifying the print jobs of other users.
What should you do?

A. From the printer’s properties, assign the Print permission to the Sales group.
B. From the printer’s properties, assign the Manage Documents permission to the Sales group.
C. From the local Group Policy, assign the Increase scheduling priority user right to the Sales group.
D. From the local Group Policy, assign the Take ownership of files or other objects user right to the Sales group.

Correct Answer: A
Section: Access to resource
Explanation

Explanation/Reference:
1020 20156

The available permissions are:

Print
This permission allows a user to print to the printer and rearrange the documents that they have submitted to the printer.
Manage This Printer
Users assigned the Manage This Printer permission can pause and restart the printer, change spooler settings, adjust printer permissions, change printer properties, and share a printer.
Manage Documents
This permission allows users or groups to pause, resume, restart, cancel, or reorder the documents submitted by users that are in the current print queue.

QUESTION 5
You have a computer that runs Windows 7.

You run Runas and specify the /savecred parameter to start an application. You need to delete the stored password.
What should you do?

A. From Credential Manager, modify the Windows credentials.
B. From Authorization Manager, modify the Authorization Manager options. C. Run Del and specify the /p parameter.
D. Run Runas and specify the /noprofile parameter.

Correct Answer: A

Section: Access to resource
Explanation

Explanation/Reference:
1021 20176

Credential Manager
Credential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the
self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools.

QUESTION 6
You have a computer that runs Windows 7. The computer contains two volumes, C and D. You create a new folder called D:\Reports.
You need to ensure that all files stored in the Reports folder are indexed by Windows Search.

What should you do?

A. Enable the archive attribute on the folder.
B. Modify the Folder Options from Control Panel.
C. Modify the properties of the Windows Search service.
D. Create a new library and add the Reports folder to the library.

Correct Answer: D
Section: Access to resource
Explanation

Explanation/Reference:
1034 2072

Libraries enable you to organize files by using metadata about the file, such as author, date, type, tags, and so on—instantly. You’re not limited to just browsing files by folder hierarchy. When you save files in a Library, Windows 7 indexes the files. You can use Library features like the Arrange By control to instantly browse the files in the Library by metadata or use the Search Builder, which is built into the Search box in Windows Explorer, to instantly search the files in the Library by metadata.

QUESTION 7
Your network has a main office and a branch office. The branch office has five client computers that run
Windows 7.

All servers are located in the main office. All servers have BranchCache enabled.

Users at the branch office report that it takes several minutes to open large files located in the main office.

You need to minimize the amount of time it takes for branch office users to open files located in the main office.

The solution must also reduce the amount of bandwidth used between the two offices. What should you do?
A. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers.
B. At the main office, configure the servers to use Background Intelligent Transfer Service (BITS). C. At the branch office, configure the client computers to use BranchCache Hosted Cache mode.
D. At the branch office, configure the client computers to use BranchCache Distributed Cache mode.

Correct Answer: D
Section: Access to resource
Explanation

Explanation/Reference:
1043 20173

Distributed Cache Mode
Distributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content
over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link. When it accesses the file from its peer, it also copies that file into its own cache.

The advantage of distributed cache mode is that you can deploy it without having to deploy a server running Windows Server 2008 R2 locally in each branch office. The drawback of Distributed Cache mode is that the contents of the cache available on the branch office LAN depend on which clients are currently online. If a client needs a file that is held in the cache of a computer that is shut down, the client needs to

retrieve the file from the host server across the WAN.

Hosted Cache Mode
Hosted Cache mode uses a centralized local cache that hosted on a branch office server running Windows
Server 2008 R2. You can enable the hosted cache server functionality on a server running Windows Server 2008 R2 that you use for other functions without a significant impact on performance. This is because if you found that files hosted at another location across the WAN were being accessed so frequently that there was a performance impact, you would use a solution like Distributed File System (DFS) to replicate them to the branch office instead of using BranchCache. The advantage of Hosted Cache mode over Distributed Cache mode is that the cache is centralized and always available. Parts of the distributed cache become unavailable when the clients hosting them shut down.

Background Intelligent Transfer Service (BITS)
The Background Intelligent Transfer Service (BITS) has two role services: the Compact Server and the IIS Server Extension. The Compact Server is a stand-alone HTTP or HTTPS file server, whereas the IIS Server Extension is an Internet Information Services (IIS) plug-in that requires a server running IIS.

IIS Server Extension
The BITS IIS Server Extension lets you configure a server that is running IIS to allow BITS clients to perform background, resumable file uploads to IIS virtual directories. On completion of a file upload, the BITS Server can notify a Web application of the newly uploaded file. This allows the application to process the uploaded file. The Web application can then optionally reply to the client responsible for the upload.

Compact Server
The BITS Compact Server is a stand-alone HTTP or HTTPS file server, which allows applications to host files for BITS clients to download, and allows the asynchronous transfer of a limited number of large files between computers.

QoS Packet Scheduler
The Quality of Service Packet Scheduler is a Windows platform component that is enabled by default on Windows Vista and Windows XP computers. It is, however, not enabled by default on Windows 2003 computers. This scheduler is designed to control the IP traffic for various network services, including Real Time Communications traffic. This component must be installed and enabled if the QoS markings described earlier for audio and video traffic are to be implemented by the IP stack.

QUESTION 8
You have a computer that runs Windows 7.

You create an Encrypting File System (EFS) recovery key and certificate.

You need to ensure that your user account can decrypt all EFS files on the computer. What should you do?
A. From Credential Manager, add a Windows credential.
B. From Credential Manager, add a certificate-based credential. C. From the local computer policy, add a data recovery agent.
D. From the local computer policy, modify the Restore files and directories setting.

Correct Answer: C
Section: Access to resource
Explanation

Explanation/Reference:
1044 20187

EFS Recovery
Recovery Agents are certificates that allow the restoration of EFS encrypted files. When a recovery
agent has been specified using local policies, all EFS encrypted files can be recovered using the recovery agent private key. You should specify a recovery agent before you allow users to encrypt files on a client running Windows 7. You can recover all files that users encrypt after the creation of a recovery agent using the recovery agent’s private key. You are not able to decrypt files that were encrypted before a

recovery agent certificate was specified.

QUESTION 9
You have a computer named Computer1 that runs Windows 7.

The computer is a member of an Active Directory domain. The network contains a file server named
Server1 that runs Windows Server 2008.

You log on to the computer by using an account named User1.

You need to ensure that when you connect to Server1, you authenticate by using an account named
Admin1.

What should you do on Computer1?

A. From User Accounts, select Link online IDs.
B. From Windows CardSpace, select Add a card.
C. From Credential Manager, select Add a Windows credential.
D. From Local Security Policy, modify the Access this computer from the network user right.

Correct Answer: C
Section: Access to resource
Explanation

Explanation/Reference:
1055 20177

Credential Manager
Credential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the
self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson.

QUESTION 10
A user named User1 uses a shared computer that runs Windows 7.
User1 is a member of group named Group1. The computer contains a folder named Folder1. You need to configure the permissions on Folder1 to meet the following requirements:

User1 must be allowed to delete all files in Folder1. Members of Group1 must be able to create files in Folder1.
All other members of Group1 must be prevented from deleting files they did not create in Folder1. All users must be prevented from modifying the permissions on Folder1.

What should you do?

A. Assign Group1 the Write permission. Assign User1 the Modify permission. B. Assign Group1 the Modify permission. Assign User1 the Write permission. C. Deny Group1 the Write permission. Assign User1 the Modify permission. D. Deny Group1 the Modify permission. Assign User1 the Write permission.

Correct Answer: A
Section: Access to resource
Explanation

Explanation/Reference:
1057 20162

File and Folder Permissions
Read
Folders: Permits viewing and listing of files and subfolders
Files: Permits viewing or accessing of the file’s contents

Write
Folders: Permits adding of files and subfolders
Files: Permits writing to a file

Read & Execute
Folders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by files and folders
Files: Permits viewing and accessing of the file’s contents as well as executing of the file

List Folder Contents
Folders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by folders only
Files: N/A

Modify
Folders: Permits reading and writing of files and subfolders; allows deletion of the folder
Files: Permits reading and writing of the file; allows deletion of the file

Full Control
Folders: Permits reading, writing, changing, and deleting of files and subfolders
Files: Permits reading, writing, changing and deleting of the file