Windows 7 configuration exam 70-680 knowledge assessment answers




















It is equivalent to the IPv4 loopback address of. Packets addressed to the loopback address must never be sent on a link or forwarded by a router.

Link-LocalLink-local addresses always begin with FE An IPv6 router never forwards link-local traffic beyond the link. Nodes use link-local addresses when communicating with neighboring nodes on the same link. For example, on a single-link IPv6 network with no router, hosts use link-local addresses to communicate with other hosts on the link. APIPA addresses use the The scope of a link-local address is the local link. A link-local address is required for Neighbor Discovery processes and is always automatically configured, even in the absence of all other unicast addresses.

Your network has a main office and a branch office. The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled.

Users at the branch office report that it takes several minutes to open large files located in the main office. You need to minimize the amount of time it takes for branch office users to open files located in the main office. At the branch office, configure the client computers to use BranchCache Distributed Cache mode. Distributed Cache ModeDistributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network.

This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link.

When it accesses the file from its peer, it also copies that file into its own cache. The advantage of distributed cache mode is that you can deploy it without having to deploy a server running Windows Server R2 locally in each branch office.

The drawback of Distributed Cache mode is that the contents of the cache available on the branch office LAN depend on which clients are currently online. If a client needs a file that is held in the cache of a computer that is shut down, the client needs to retrieve the file from the host server across the WAN. Hosted Cache ModeHosted Cache mode uses a centralized local cache that hosted on a branch office server running Windows Server R2.

You can enable the hosted cache server functionality on a server running Windows Server R2 that you use for other functions without a significant impact on performance. This is because if you found that files hosted at another location across the WAN were being accessed so frequently that there was a performance impact, you would use a solution like Distributed File System DFS to replicate them to the branch office instead of using BranchCache.

The advantage of Hosted Cache mode over Distributed Cache mode is that the cache is centralized and always available. Parts of the distributed cache become unavailable when the clients hosting them shut down. This allows the application to process the uploaded file. The Web application can then optionally reply to the client responsible for the upload.

It is, however, not enabled by default on Windows computers. This scheduler is designed to control the IP traffic for various network services, including Real Time Communications traffic. This component must be installed and enabled if the QoS markings described earlier for audio and video traffic are to be implemented by the IP stack. A conference room at your company has a network projector installed on a server within the company network. Start the computer from the Windows 7 installation media.

From the Install Windows dialog box, select the Upgrade option. From the Install Windows dialog box, select the Custom advanced option. When you are performing a clean installation, you should select Custom Advanced.

Almost all installations ofm Windows 7 that you will perform will be of the Custom Advanced type rather than upgrades. You can initiate upgrade installations only from within Windows Vista or Windows 7. The company uses a file share to store files.

A group currently has permissions to access the share, but not the files in it They need permissions to update and delete files in the share but not to modify the permissions on the files. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState.

The network contains a monitoring server named server1 Computer runs a monitoring service named service1. Service 1 uses remote procedure. You need to ensure that service1 can receive requests from server1. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule.

The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port.

If you are short on RAM, more paging occurs, which generates extra activity for your disks and slows response times for the system. Expand the Default SizeExpanding the default size of the paging file can increase performance if applications are consuming virtual memory and the full capacity of the existing file is being used. This indicates, in bytes, how much of the paging file is being used. A large paging file uses disk storage space, so do not create a large paging file on a disk that is very active for example, one that services heavy application or network activity or one that has limited space.

Change the file size gradually and test performance until you find the optimal balance between paging file and disk space usage. The operating system requires a minimum of 5 MB of free space on a disk. For more information, see "Examining and Tuning Disk Performance" in this book. Before increasing the file size, make sure you have adequate disk space, particularly on your servers. Shadow copies are automatically saved as part of a restore point. If system protection is enabled, Windows 7 automatically creates shadow copies of files that have been modified since the last restore point was created.

By default, new restore points are created every seven days or whenever a significant system change such as a driver or application installation occurs.

You need to prevent only App1 from running during startup. Users must be allowed to run App1 manually. You have a computer that runs Windows 7. You generate a System Diagnostic Report and receive the following warning message: The Graphics rating for the system is poor and may be the cause of performance problems. You need to increase the graphics performance of the computer without modifying the current hardware or drivers. You can let Windows decide what is best for your computer, adjust for best appearance, adjust for best performance, or select Custom and specify the appearance settings for your computer manually.

If you select Custom, you can choose which visual effects to turn off, one by one. There are 18 visual effects that you can control, such as whether shadows are displayed under screen icons or under the mouse pointer. On the Advanced tab, you can adjust for the best performance of programs or background services. If your computer is running applications as a typical workstation does , you would specify Adjust For Best Performance Of Programs.

You use a portable computer that has Windows 7 Ultimate installed. The computer has a single 1-terabyte local drive C. You configure a backup task by using default settings to back up data to an empty GB external USB drive. After two hours, the backup task stops, indicating that no free space is available on the USB drive. Your network contains computers that run Windows 7 and Windows Vista. All computers are members of the same domain.

You have a computer named Computer1 that runs Windows 7. Select the Allow Remote Assistance connections to this computer check box. Add the Domain Users group to the Power Users group. Add the Domain Users group to the Administrators group. Select the Allow connections from computers running any version of Remote Desktop less secure check box. Select the Allow connections only from computers running Remote Desktop with Network Level Authentication more secure check box.

You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server R2 remote access server. Which actions should you perform in sequence? Answer: Q You perform the following tasks:. Connect to a shared network location that contains the Windows 7 image file You need to apply the Windows 7 image to the computer.

What should you do before you apply the image? Mount the image. Configure Windows Firewall. Configure and format the hard disk drive. Answer: C Explanation: Deploying from a Network Share After you have imaged your reference installation, you can deploy the image onto new hardware one or more destination computers. You need to prevent the computer from displaying the username of the last user who logged on. What should you do?

From Control Panel, modify the User Profiles settings. You should install all applications that were on the source computer on the destination before you run LoadState. You must run Loadstate. You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time. Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically.

This upgrade method is more suitable for home users and users in small. You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. You need to prevent some system settings from being migrated. You must achieve this goal by using the minimum amount of administrative effort.

You can create and modify the Config. NOT MigDocs. NOT MigUser. This file also contains rules that ensure that all the following file types are migrated from fixed volumes:.

NOT MigApp. These include Accessibility settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database Connectivity ODBC settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service RAS connection phone book files, regional options, remote access, screen-saver settings, taskbar settings, and wallpaper settings.

The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState.

You need to capture the operating system, computer configuration, and applications installed on the computer to a WIM file. Explanation: You use ScanState to save user state data. By default, this program places user state data into the data store location as defined by the three migration.

Which two actions should you perform? Each correct answer presents part of the solution. HomeGroup ConnectionsThis option decides how authentication works for connections to HomeGroup resources. If all computers in the HomeGroup have the same user name and passwords configured, you can set this option to allow Windows to manage HomeGroup connections. If different user accounts and passwords are present, you should configure the option to use user accounts and passwords to connect to other computers.

Media Library SharingBefore you turn on Media Library Sharing for a shared folder, you should know that Media Library Sharing bypasses any type of user-account access that you set for the shared folder. For example, let's say that you turn on Media Library Sharing for the Photos shared folder, and you set the Photos shared folder to No Access for a user account named Bobby.

Bobby can still stream any digital media from the Photos shared folder to any supported digital media player or DMR. If you have digital media that you do not want to stream in this manner, store the files in a folder that does not have Media Library Sharing turned on. If you turn on Media Library Sharing for a shared folder, any supported digital media player or DMR that can access your home network can also access your digital media in that shared folder.

For example, if you have a wireless network and you have not secured it, anybody within range of your wireless network can potentially access your digital media in that folder. Before you turn on Media Library Sharing, make sure that you secure your wireless network. For more information, see the documentation for your wireless access point.

You need to ensure that only members of a local group named Group1 can print documents on the printer. Restricting printer access to selected users by using security groups If you need to restrict the access of certain shared printers to a certain group of network users, do the following:. On the navigation bar, click the Users and Groups tab, and then click Groups.

In the task pane, click Add a new group. The Add a New Group Wizard appears. In the Add a New Group Wizard, do the following On the Add a new group page, for Group type, select Security group. Follow the instructions to complete the wizard.



0コメント

  • 1000 / 1000