Microsoft 70-680 MSCA Exam Prep - Question List

Select how would you like to study

46. You performed a Windows 7 installation on your computer. However, IIS is not active on the computer. Which of the following should you do to enable IIS on the computer?
  1. Click the Start Bar > Control Panel > Add/Remove Programs > and click Windows Components.
  2. Click the Start Bar > Settings > Windows Control Center.
  3. Click the Start Bar > Control Panel > Programs > and click Turn Windows features on or off.
  4. Right My Computer icon, Choose Properties > Computer Management. In the left pane choose Add/Remove Windows Components.
47. John has just added his Windows 7 computer to an Active Directory domain and a Direct Access infrastructure that is already configured in your network. He needs to make sure that his computer can establish DirectAccess connections. Which of the following should he do to accomplish this?
  1. Enable the Create Network Discovery firewall exception.
  2. Install a valid computer certificate.
  3. Add his profile to the Remote Operators group.
  4. Create a new VPN connection.
48. You are trying to install Windows 7 on a computer that has Windows XP Professional installed. Which of the following will not complete the Windows 7 installation successfully?
  1. Running setup.exe from the DVD to start the Windows 7 installation
  2. Using the Autorun feature on the DVD to start the installation
  3. Performing a clean installation of Windows 7
  4. Upgrading the computer with Windows 7 keeping all the Windows XP settings
49. Which of the following tools can be used to verify that device drivers installed on a Windows 7 computer are digitally signed?
  1. Cipher
  2. Scandisk
  3. Sigverif
  4. Digital Verification Tool
50. Which of the following should you do to enable auditing on a shared folder on Windows 7?
  1. Right click on the shared folder and choose the Audit directory service Access setting.
  2. Right click on the System Log, in the Event Viewer. Choose Properties and select all options for logging including folder access.
  3. Configure the Audit object access setting in the local Group Policy.
  4. Modify the properties of the Security log from the Event Viewer.

Select how would you like to study