Microsoft 70-680 MSCA Exam Prep - Question List

Select how would you like to study

21. You have executed a command that reads netsh advfirewall firewall add rule name=“NewRule” profile=domain protocol=TCP dir=in localport=110 action=deny. Which of the following does this rule do?
  1. Creates an inbound rule that applies only in the Domain profile that blocks traffic on port 110.
  2. Creates an outbound rule that applies only in the Domain profile that blocks traffic on port 110.
  3. Creates an inbound rule that applies only in the Domain profile that allows traffic on port 110.
  4. Creates an outbound rule that applies only in the Domain profile that allows traffic on port 110.
22. John wants to assist a user who is running Windows 7. John is using Windows XP Professional with Service Pack 2 installed. Which of the following settings should he configure in the Remote Desktop settings in the user’s computer?
  1. Allow Remote Assistance Connections To This Computer.
  2. Allow Connections From Computers Running Any Version Of Remote Desktop.
  3. Don’t Allow Connections To This Computer.
  4. Allow Connections Only From Computers Running Remote Desktop with Network Level Authentication.
23. You are using a Windows 7 client named Officepro. Which of the following Windows PowerShell commands should you use to view a list of processes, CPU, and memory usage on a Windows 7 client named Officebackup?
  1. icm officebackup {Get-Process}
  2. winrs -r: officepro Get-Process
  3. icm officepro {Get-Process}
  4. winrs -r: officebackup Get-Process
24. You want to ensure that all shared resources on a client running Windows 7 are visible to all other computers in the HomeGroup. Which of the following Advanced Sharing Settings options should you configure?
  1. Public Folder Sharing
  2. Network Discovery
  3. HomeGroup Sharing
  4. Password Protected Sharing
25. Your user account is a member of three separate security groups. All three groups are assigned different permissions to a folder on a client running Windows 7. Which of the following tools should you use to check the permissions that you are granted for the folder?
  1. Total Permissions
  2. Icacls
  3. Effective Permissions
  4. Cipher

Select how would you like to study