Section 1.2: Windows 7 Installation

advertisement
Lesson Plans
Configuring Windows 7
(Exam 70-680)
Version 2.0
Table of Contents
Course Overview ................................................................................................................ 3
Section 1.1: Windows 7 Versions ....................................................................................... 5
Section 1.2: Windows 7 Installation ................................................................................... 6
Section 1.3: Upgrade ........................................................................................................... 8
Section 1.4: User Profile and Data Migration ................................................................... 10
Section 1.5: Domain Networking ..................................................................................... 12
Section 2.1: System Images Overview ............................................................................. 13
Section 2.2: Image Preparation ......................................................................................... 14
Section 2.3: Image Capture ............................................................................................... 16
Section 2.4: Manual Image Deployment .......................................................................... 18
Section 2.5: Image Servicing ............................................................................................ 19
Section 2.6: Virtual Hard Disk (VHD) ............................................................................. 21
Section 2.7: Domain Image Deployment .......................................................................... 23
Section 3.1: Devices and Drivers ...................................................................................... 25
Section 3.2: Disk Partitions and Volumes ........................................................................ 27
Section 3.3: Disk Optimization ......................................................................................... 29
Section 3.4: Removable Storage ....................................................................................... 30
Section 3.5: Application Compatibility ............................................................................ 31
Section 3.6: User Account Control (UAC) ....................................................................... 32
Section 3.7: Internet Options ............................................................................................ 34
Section 3.8: Internet Explorer (IE) 8................................................................................. 36
Section 3.9: Application Restriction ................................................................................. 38
Section 4.1: IPv4 ............................................................................................................... 40
Section 4.2: IPv6 ............................................................................................................... 42
Section 4.3: IP Address Configuration ............................................................................. 44
Section 4.4: Internet Connection Sharing (ICS) ............................................................... 46
Section 4.5: Wireless Networking .................................................................................... 47
Section 4.6: Windows Firewall ......................................................................................... 49
Section 5.1: Authentication and Authorization ................................................................. 51
Section 5.2: NTFS Permissions ........................................................................................ 53
Section 5.3: Resource Sharing .......................................................................................... 55
Section 5.4: Printer Sharing and Management ................................................................. 57
Section 5.5: Auditing ........................................................................................................ 59
Section 5.6: Encryption ..................................................................................................... 61
Section 5.7: BranchCache ................................................................................................. 63
Section 6.1: Network Access Protection (NAP) ............................................................... 64
Section 6.2: Virtual Private Network (VPN) .................................................................... 65
Section 6.3: DirectAccess ................................................................................................. 67
Section 6.4: BitLocker and BitLocker To Go ................................................................... 69
Section 6.5: Mobility Options ........................................................................................... 71
Section 7.1: Troubleshooting Tools .................................................................................. 73
Section 7.2: System Events ............................................................................................... 75
Section 7.3: Performance Monitoring ............................................................................... 77
Section 7.4: Resource Monitoring .................................................................................... 79
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
1
Section 7.5: Reliability and Performance Maintenance .................................................... 80
Section 7.6: Optimization ................................................................................................. 81
Section 7.7: System Updates............................................................................................. 83
Section 7.8: Remote Management .................................................................................... 85
Section 7.9: Remote Assistance ........................................................................................ 87
Section 8.1: System Backup ............................................................................................. 88
Section 8.2: File Recovery ................................................................................................ 89
Section 8.3: System Recovery .......................................................................................... 90
Practice Exams .................................................................................................................. 92
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
2
Course Overview
This course prepares students for Microsoft’s Exam 70-680: Configuring Windows 7. It
focuses on installing, deploying configuring, monitoring, and maintaining systems that
run Windows 7.
Module 1 – Windows Installation
This module examines elements that are involved in installing Windows. These elements
include the editions and features available with Windows 7, installation and upgrade
methods, and preserving user profiles and data using migration tools. Also discussed are
the basics of domain networking: Active Directory, and Group Policies.
Module 2 – System Images
In this module students will learn concepts about capturing a system image. Details
discussed include; preparing a system to capture a system image, capturing a system
image, manually deploying an image from a network share, and methods for deploying a
system image. The students will also learn about creating a Virtual Hard Disk and
applying a Windows image to the file.
Module 3 – Hardware and Applications
This module teaches the students about hardware issues such as configuring devices and
drivers, managing disk partitions and volumes, and methods for optimizing a disk drive.
The students will also examine application issues such as solving application
compatibility problems with Windows 7, protecting the system configuration using the
User Account Control, configuring Internet Explorer 8, and configuring access and
compatibility for applications.
Module 4 – Networking
This module discusses the following networking concerns; configuring IPv4 and IPv6
network addresses, Internet Connection Sharing (ICS), wireless networking, Windows
Firewall, and Windows Firewall with Advanced Security (WFAS).
Module 5 – Resource Access
This module examines the fundamentals of accessing resources. Topics discussed include
configuring authentication and authorization, NTFS permissions, and resource sharing.
Students will learn basics of managing printer sharing, auditing, encrypting files and
folders, and configuring BranchCache.
Module 6 – Mobile Computing
In this module students will learn concepts about configuring remote connections;
Network Access Protection (NAP) and Virtual Private Network (VPN). They will also
learn about configuring DirectAccess, BitLocker and BitLocker To Go, and configuring
and managing options for mobile devices.
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
3
Module 7 – Monitoring and Maintenance
This module discusses configuring tools for troubleshooting, monitoring system events,
monitoring performance and resource, ensuring the reliability and performance of a
system, optimizing system performance, managing system updates, and remote
management of computers.
Module 8 – Backup and Recovery
In this module students will learn about the basic elements of backup and recovery;
system backup, file recovery, and system recovery.
Practice Exams
In Practice Exams students will have the opportunity to test themselves and verify that
they understand the concepts and are ready to take the certification exam.
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
4
Section 1.1: Windows 7 Versions
Summary
This section discusses the six different editions of Windows 7 and the features available
in the different editions. Concepts covered include:





Windows 7 editions
Windows 7 features
Features included in each Windows 7 edition
Minimal requirements for Windows 7 editions
Windows 7 N-editions
Configuring Windows 7 Objectives:

101. Perform a clean installation. This objective may include but is not limited to:
o Identifying hardware requirements
Lecture Focus Questions:




What are the different editions of Windows 7?
Which editions would allow you to create a HomeGroup or join a HomeGroup?
What is the difference between the Ultimate edition and the Enterprise edition?
What is the difference between a Professional edition and a Professional N
edition?
Time
About 15 minutes
Number of Exam Questions
3 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
5
Section 1.2: Windows 7 Installation
Summary
In this section students will learn about Windows 7 installation methods and sources.
Concepts covered include:


Windows 7 installation methods:
o Clean (Custom)
o Upgrade (In-place)
o Migration
Windows 7 installation sources:
o DVD
o USB
o Network
o Windows Deployment Services (WDS)
After finishing this section, students should be able to complete the following tasks:


Copy Windows 7 installation files to a USB flash device.
Perform a Windows 7 installation using a USB flash device.
Configuring Windows 7 Objectives:

101. Perform a clean installation. This objective may include but is not limited to:
o Identifying hardware requirements
o Setting up as the sole operating system
o Setting up as dual boot; installation methods
o Boot from the source of installation, preparing the installation source:
USB, CD, network share, WDS
Lecture Focus Questions:





Under which circumstances should you choose a clean installation of Windows 7?
What is the advantage of a dual-boot system?
When would you choose an upgrade rather than a clean installation of Windows
7?
What are the requirements of a USB flash storage device before it can be an
installation source?
In which environment would you use Windows Deployment Services (WDS)?
Time
About 25 minutes
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
6
Number of Exam Questions
9 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
7
Section 1.3: Upgrade
Summary
This section examines details about upgrading to Windows 7. Concepts covered include:


Types of upgrades
o Intra-edition Upgrade
o Previous Windows Version Upgrade
Upgrade considerations:
o License key is required
o Cross-architecture upgrades are not supported
o Use the Upgrade Advisor to evaluate a computer’s readiness
After finishing this section, students should be able to complete the following tasks:


Run the Windows 7 Upgrade Advisor tool to determine the computer's hardware
readiness for Windows 7.
Perform an upgrade from Windows Vista to Windows 7.
Configuring Windows 7 Objectives:

102. Upgrade to Windows 7 from previous versions of Windows. This objective
may include but is not limited to:
o Upgrading from Windows Vista
o Migrating from Windows XP
o Upgrading from one edition of Windows 7 to another edition of Windows
7
Lecture Focus Questions:





You have Windows 7 Professional installed. Which editions of Windows 7
support an upgrade from your current system?
You have Windows 7 Home Premium installed. You would like the system to run
the Home Basic edition. How would you make the change?
When upgrading to Windows 7, what are the tasks you should complete prior to
running the setup program?
How does the Windows 7 Upgrade Advisor tool simplify the process of upgrading
Windows 7 to a different edition?
Under what circumstances must you perform an clean installation instead of an
upgrade installation?
Time
About 20 minutes
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
8
Number of Exam Questions
9 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
9
Section 1.4: User Profile and Data Migration
Summary
This section provides information about the role of migration to preserve user profile data
and settings. Concepts covered include:



Types of migration:
o Side-by-side
o Wipe-and-load
Migration tools:
o Windows Easy Transfer (WET)
o User State Migration Tool (USMT)
Location of files when you install over Windows XP and Vista:
o Shared files and folders
o Profile-specific files and folders
o Installed programs
o Windows settings and preference
After finishing this section, students should be able to complete the following tasks:



Use USMT to migrate user settings and profile information from a Windows XP
computer to a Windows 7 installation.
On the source computer run Scanstate to save the migration user accounts to a
network share.
On the destination computer run Loadstate to import user migration information
from a network share.
Configuring Windows 7 Objectives:

103. Migrate user profiles. This objective may include but is not limited to:
o Migrating from one machine to another
o Migrating from previous versions of Windows
o Side-by-side vs. wipe and load
Lecture Focus Questions:





What are the main differences between a side-by-side migration and a wipe-andload migration?
What types of files and data are moved during a migration?
How can you save user data during a migration?
When would you choose to perform a migration using the Windows Easy
Transfer (WET) over the User State Migration Tool (USMT)?
What are the transfer methods available when using WET to save user files?
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
10


What are the different kinds of migration stores supported by USMT?
What scanstate.exe command moves Windows XP user data files during a hardlink migration?
Time
About 35 minutes
Number of Exam Questions
11 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
11
Section 1.5: Domain Networking
Summary
This section discusses the basics about using domains. Concepts covered include:




The Active Directory structure:
o Domains
o Objects
o Attributes
o Organizational units
o Generic container objects
Applying Group Policy settings
Group Policy object categories:
o Computer Configuration
o User Configuration
Common GPOs settings:
o Account Policies
o Local Policies/Audit Policy
o Local Policies/User Rights Assignments
o Local Policies/Security Options
o Registry
o File System
o Software Restriction Policies
o Administrative Templates
Lecture Focus Questions:



How would you configure security settings for all the users in a domain?
Which editions of Windows 7 can join a domain?
When there is a conflict between the local and domain configuration settings,
which setting takes precedence?
Time
About 10 minutes
Number of Exam Questions
2 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
12
Section 2.1: System Images Overview
Summary
This section provides an overview of capturing a system image. Concepts covered
include:



The role of the system images.
Windows Automated Installation Kit (Windows AIK) tools:
o Windows Preinstallation Environment (Windows PE)
o Windows System Image Manager (Windows SIM)
o System Preparation Tool (Sysprep)
o ImageX
o Oscdimg
Types of computers required for preparing a system image:
o Reference computer
o Technician computer
Configuring Windows 7 Objectives:

201. Capture a system image.
Lecture Focus Questions:




What are the advantages of using a system image to install Windows 7 to
computers?
What is the file extension of a Windows 7 system image file?
How do you create an answer file for an automated installation?
Which tools does the Windows Automated Installation Kit include to prepare or
create a system image?
Time
About 10 minutes
Number of Exam Questions
1 question
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
13
Section 2.2: Image Preparation
Summary
This section examines details about preparing a system to capture a system image.
Concepts covered include:










Windows installation configuration passes:
o windowsPE
o offlineServicing
o specialize
o oobeSystem
Additional configuration passes:
o generalize
o auditSystem
o auditUser
Methods to run Windows Setup:
o Interactive (attended)
o Automated (unattended)
The role of Windows SIM
Steps to create an answer file
Considerations when using an answer file for automated installation
Using the System Preparation Tool (Sysprep) to configure new installations of
Windows.
Sysprep switches to manage system images and Windows installation process:
o /audit
o /generalize
o /oobe
o /shutdown
o /reboot
o /quiet
o /quit
o /unattend
Considerations when using Sysprep
The process to create, prepare, and deploy a Windows installation image
After finishing this section, students should be able to complete the following tasks:



Use Windows SIM to create an answer file.
Configure properties and components of the answer file to increase the
automation of the installation and setup.
Use Sysprep to prepare an installation before it is captured.
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
14
Configuring Windows 7 Objectives:

201. Capture a system image. This objective may include but is not limited to:
o Preparing system for capture
Lecture Focus Questions:





What role does the Windows System Image Manager (Windows SIM) perform in
image preparation?
What is the purpose of the Sysprep?
What privileges are required to execute Sysprep?
Which Sysprep switch allows a user to remove all machine-specific information
from an installation?
What is the out-of-box experience mode?
Time
About 40 minutes
Number of Exam Questions
9 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
15
Section 2.3: Image Capture
Summary
This section discusses tools and steps to capture a system image. Concepts covered
include:




Windows PE
o The role of Windows PE
o Steps to create a bootable Windows PE disc for capturing system images
ImageX
o The role of ImageX
o Using a Wimscript.ini configuration file to exclude specific files during
the ImageX capture operation
ImageX options:
o /capture
o /config
o /compress
o /split
o /apply
o /apply /ref
o /verify
Steps to capture the reference computer’s Windows 7 installation onto a network
share
After finishing this section, students should be able to complete the following tasks:


Create a Windows 7 PE boot disk.
Use ImageX to capture a Windows 7 installation.
Configuring Windows 7 Objectives:

201. Capture a system image. This objective may include but is not limited to:
o Preparing system for capture
o Creating a WIM file
o Automated capture
o Manual capture
Lecture Focus Questions:




Which tool would you use to create a bootable Windows PE disc?
What are the boot sources for Windows PE?
Which tool is used to create an image from a reference computer?
What is the purpose of the exclusion exception section of the Wimscript.ini file?
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
16

Which imagex.exe switch checks for errors and file duplication after capturing
the installation?
Time
About 25 minutes
Number of Exam Questions
4 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
17
Section 2.4: Manual Image Deployment
Summary
In this section students will explore the process to manually deploy an image from a
network share. Details about the following concepts will be covered:


Tools to manually deploy an image from a network share:
o Diskpart
o ImageX
Steps to deploying a system image from a network share.
After finishing this section, students should be able to complete the following tasks:

Manually deploy an image onto a local computer?
Configuring Windows 7 Objectives:

203. Deploy a system image. This objective may include but is not limited to:
o Manually deploying a customized image
Lecture Focus Questions:




What tools would you use to manually deploy an image from a network share?
Why should you create two partitions on a hard drive prior to installing the
image?
What command at the command prompt connects a network share and maps the
drive with a letter?
What is the purpose of BCDBoot when deploying an image to the local hard
drive?
Time
About 10 minutes
Number of Exam Questions
3 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
18
Section 2.5: Image Servicing
Summary
This section examines the basics of deploying a system image. Concepts covered include:



The role of image servicing
Tools to service an image:
o Deployment Image Servicing and Management (DISM)
o ImageX
Components of the system image:
o Drivers
o Windows applications and application patches
o Windows security updates and features
o International settings
o Windows editions
After finishing this section, students should be able to complete the following tasks:


Use ImageX to mount an image, make and save changes to the image, and
dismount the image.
Use DISM to mount an image, make changes to the image, gather information
about the image, and dismount the image.
Configuring Windows 7 Objectives:

202. Prepare a system image for deployment. This objective may include but is
not limited to:
o Inserting an application into a system image
o Inserting a driver into a system image
o Inserting an update into a system image
o Configuring tasks to run after deployment
Lecture Focus Questions:




When would you choose to use ImageX over DISM to mount an image?
When using DISM, how do you save changes before dismounting an image?
How do you mount a read-write image with ImageX?
What is the difference between an online image and an offline image?
Time
About 45 minutes
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
19
Number of Exam Questions
9 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
20
Section 2.6: Virtual Hard Disk (VHD)
Summary
In this section students will learn about creating and configuring a Virtual Hard Disk
(VHD). Concepts covered include:




The role of a Virtual Hard Drive (VHD)
Actions to perform with a VHD file:
o Create a new VHD
o Attach (mount) the VHD
o Detach (dismount) the VHD
o Compact (reduce) the size of a VHD
o Expand (increase) the maximum size available in a VHD
Tools to create and manage VHD files:
o Disk Management MMC
o DiskPart
o WIM2VHD
o BCDEdit
VHD considerations:
o Native-boot VHD
o Applying a WIM file to a VHD
o Installing Windows 7 to a VHD
o Using Offline servicing to make changes to a Windows image
After finishing this section, students should be able to complete the following tasks:



Create a VHD file and apply a Windows image to the file.
Install Windows 7 to a VHD file.
Configure a computer to boot from the VHD file.
Configuring Windows 7 Objectives:

204. Configure a VHD. This objective may include but is not limited to:
o Creating, deploying, booting, mounting, and updating VHDs
o Offline updates
o Offline servicing
Lecture Focus Questions:




What is the difference between a Virtual Hard Drive (VHD) and a standard Hard
Disk Drive (HDD)?
What are the advantages of using a VHD for Windows 7 installations?
What is the difference between a fixed disk VHD file and a dynamically
expanding VHD file?
Which utilities would you use to create, manage and mount VHD files?
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
21


What is a native-boot VHD?
Which editions of Windows 7 support a native-boot VHD?
Time
About 40 minutes
Lab/Activity

Create a VHD
Number of Exam Questions
15 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
22
Section 2.7: Domain Image Deployment
Summary
This section discusses methods for deploying a system image. Concepts covered include:


The role of Microsoft Deployment Toolkit (MDT 2010)
o Distribution methods:
 Lite Touch Installation (LTI)
 Zero Touch Installation (ZTI)
o MDT 2010 Deployment Workbench areas to manage and distribute
Windows 7 images:
 Distribution share
 Task sequences
 Deployment point
The role of Windows Deployment Services (WDS):
o Types of WDS images
 Install image
 Boot image
 Capture boot image
 Discover boot image
o WDS unattend files:
 Windows Deployment Services client unattend file
 Image unattend file
o Transmission methods to deploy images:
 Unicast
 Multicast
o Scheduled casting
o Managing and maintaining WDS from the command line.
After finishing this section, students should be able to complete the following tasks:


Use WDS to create an installation and boot image.
Image a computer with a Windows 7 Enterprise image.
Configuring Windows 7 Objectives:

203. Deploy a system image. This objective may include but is not limited to:
o Automated deployment methods
Lecture Focus Questions:


What is the role of the Microsoft Deployment Toolkit (MDT)?
What is the difference between the Lite Touch Installation and Zero Touch
Installation MDT distribution methods?
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
23



What are the main areas of the MDT 2010 Deployment Workbench that are used
to manage and distribute Windows 7 images?
What are the differences between the MDT and Windows Deployment Services
(WDS)?
What are the four different types of WDS images that are used during
installation?
Time
About 30 minutes
Number of Exam Questions
10 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
24
Section 3.1: Devices and Drivers
Summary
This section provides an overview of configuring devices and drivers. Details about the
following are presented:


Device drivers
o Automatic driver updates
o Windows 7 driver store
o Driver staging
o Digital signatures
Device driver configuration and troubleshooting details
o Guidelines to install new hardware following a Windows 7 installation
o 32-bit drivers vs. 64-bit operating systems
o Tools to configure and troubleshoot device drivers:
 Device Manager
 Devices and Printer
 PnPUtil
 Group Policy settings
 System Information (Msinfo32)
 Reliability Monitor
 Driver Verifier Monitor
 Driver Query
 Signature Verification
 DirectX Diagnostic
After finishing this section, students should be able to complete the following tasks:



Use the PnPUtil tool to stage a driver or remove a driver in the driver store.
Use Device Manager to enable and disable devices, and roll back or install device
drivers.
Use Group Policy to manage and maintain drivers.
Configuring Windows 7 Objectives:

301. Configure devices. This objective may include but is not limited to:
o Updating, disabling, and uninstalling drivers
o Signed drivers
o Conflicts between drivers
o Configuring driver settings
o Resolving problem device driver
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
25

704. Configure performance settings. This objective may include but is not
limited to:
o Updated drivers
Lecture Focus Questions:






What does it mean to stage a driver?
What are the advantages of placing drivers in the driver store?
What does Windows do when it cannot find a driver in the driver store?
How can you be assured that a driver is stable and reliable?
What tool lists drivers on the computer which do not have a digital signature?
Which tool will troubleshoot problems with printers?
Time
About 40 minutes
Lab/Activity


Manage Devices 1
Manage Devices 2
Number of Exam Questions
16 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
26
Section 3.2: Disk Partitions and Volumes
Summary
This section discusses managing disk partitions and volumes. Details about the following
are covered:



The role of a partition
o Partitioning schemes:
 Master Boot Record (MBR)
 Globally unique identifier (GUID) Partition Table (GPT)
The role of a volume
o Disk types
 Basic
 Dynamic
Considerations when managing partitions and volumes
o Partitioning a hard disk
o Formatting
o Converting a basic disk to a dynamic disk
o Resizing a volume
o Managing disks using diskpart
o Using a mount point
After finishing this section, students should be able to complete the following tasks:


Use Diskpart to create and resize a volume.
Use Disk Management to create simple, spanned, striped, and mirrored volumes.
Configuring Windows 7 Objectives:

702. Manage disks. This objective may include but is not limited to:
o Managing disk volumes
o RAID
Lecture Focus Questions:





In which circumstances do you need multiple partitions on a single disk?
What is the difference between the Globally Unique Identifier (GUID) Partition
Table (GPT) and the Master Boot Record (MBR) partitioning schemes?
What is the difference between a partition and a volume?
When working with volumes, when would you choose a basic disk over a
dynamic disk?
Which details should you consider when converting from a dynamic disk to a
basic disk?
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
27
Time
About 45 minutes
Lab/Activity



Create Volumes
Add Space to an Existing Volume
Resize Existing Volumes
Number of Exam Questions
11 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
28
Section 3.3: Disk Optimization
Summary
This section discusses methods for optimizing a disk drive. Methods covered include:




Disk Cleanup
Disk Defragmenter
Check Disk
Quotas
After finishing this section, students should be able to complete the following tasks:


Defragment the files on a disk to optimize the performance of the disk.
Create a soft quota to warn the administrator when a user exceeds a specified
amount of disk space.
Configuring Windows 7 Objectives:

702. Manage Disks. This objective may include but is not limited to:
o Managing disk volumes
o Managing file system fragmentation
Lecture Focus Questions:






How does the Disk Defragmenter optimize the performance of a hard drive?
What kind of functions does the Disk Cleanup utility perform?
How can you delete restore points with the Disk Cleanup utility?
What does Check Disk attempt to do with orphaned files?
How can you monitor and restrict disk usage by users?
What is the difference between a hard quota and a soft quota?
Time
About 25 minutes
Lab/Activity


Perform Disk Maintenance
Enable Disk Quotas
Number of Exam Questions
3 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
29
Section 3.4: Removable Storage
Summary
This section discusses policies to manage removable storage. Concepts covered include:

Categories and policies available in Removable Storage Access policies in Group
Policy:
o Policies to control access for CDs and DVDs, floppy drives, and
removable disks
o Custom Classes policies
o Windows Portable Devices (WPD) policies
o All Removable Storage Classes: Deny all access
o All Removable Storage Classes: Allow direct access in remote sessions
o Time (in seconds) to force reboot
After finishing this section, students should be able to complete the following tasks:

Use Group Policy to manage removable media permissions.
Configuring Windows 7 Objectives:

702. Manage disks. This objective may include but is not limited to:
o Removable device policies
Lecture Focus Questions:



How can you prohibit the removal of sensitive data from the network?
When would you use a Custom Classes policy?
How can you immediately enforce removable media settings in Group Policy?
Time
About 5 minutes
Number of Exam Questions
1 question
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
30
Section 3.5: Application Compatibility
Summary
This section explores tools to solve application compatibility problems with Windows 7.
Details covered include:



Program Compatibility
Application Compatibility Toolkit (ACT)
Windows XP mode
After finishing this section, students should be able to complete the following tasks:


Use the Program Compatibility Troubleshooter utility to handle application
compatibility issues.
Manually configure the compatibility mode in the properties of an application.
Configuring Windows 7 Objectives:

302. Configure application compatibility. This objective may include but is not
limited to:
o Setting compatibility mode
o Implementing shims
Lecture Focus Questions:




What are the requirements for Windows XP Mode? What must you do to use
Windows XP Mode?
What tools are available to solve application compatibility problems with
Windows 7?
What is the best long-term application compatibility solution?
Which program compatibility feature should you use for incompatible programs
known by Windows 7?
Time
About 30 minutes
Lab/Activity

Configure Application Compatibility
Number of Exam Questions
5 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
31
Section 3.6: User Account Control (UAC)
Summary
This section explores protecting the system configuration using the User Account Control
(UAC). Details covered include:




The role of User Account Control (UAC)
The default behavior of UAC
UAC notification level settings:
o Always notify
o Notify me only when programs try to make changes to my computer
o Notify me only when programs try to make changes to my computer (do
not dim the desktop)
o Never notify
UAC settings that can be controlled through Group Policy:
o Run all administrators in Admin Approval Mode
o Behavior of the elevation prompt for Standard Users
o Behavior of the elevation prompt for administrators in Admin Approval
Mode
o Admin Approval Mode for the Built-in Administrator account
o Switch to the secure desktop when prompting for elevation
o Detect application installations and prompt for elevation
o Only elevate executables that are signed and validated
o Only elevate UIAccess applications that are installed in secure locations
o Allow UIAccess applications to prompt for elevation without using secure
desktop
o Virtualizes file and registry write failures to per-user locations
After finishing this section, students should be able to complete the following tasks:

Manage Secure Desktop and UAC notification levels.
Configuring Windows 7 Objectives:

503. Configure user account control (UAC). This objective may include but is not
limited to:
o Configuring local security policy
o Configuring admin vs. standard UAC prompt behaviors
o Configuring Secure Desktop
Lecture Focus Questions:


What is the recommended UAC notification level setting?
How does the UAC control the type of actions that a user can perform on the
system?
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
32




How does privilege elevation work?
What is purpose of Secure Desktop?
How would you identify when Secure Desktop is activated?
Under which circumstances would you use Group Policy to configure UAC
settings?
Time
About 35 minutes
Lab/Activity


Configure UAC Settings 1
Configure UAC Settings 2
Number of Exam Questions
6 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
33
Section 3.7: Internet Options
Summary
This section explores facts about using Internet options to configure settings for Internet
Explorer. Details covered include:








Internet Explorer 8 (IE 8) tools
IE 8 tabs
IE 8 security zones default settings:
o Security level
o Protected mode
IE security zones:
o Local intranet
o Trusted
o Restricted
o Internet
Modifying zone membership
The role of certificates
Certificate Authority (CA)
o Root CA
o Subordinate CA
o Standalone CA
Certificates that Internet Explorer tracks
After finishing this section, students should be able to complete the following tasks:

Configure advanced security settings, zone membership, and privacy settings for
IE.
Configuring Windows 7 Objectives:

304. Configure Internet Explorer. This objective may include but is not limited to:
o Configuring security settings
o Certificates for secure Web sites
Lecture Focus Questions:



What are the different kinds of security zones?
What is the difference between the default security level and the default protected
mode assigned to security zones?
What is the difference between a root CA and a subordinate CA?
Time
About 40 minutes
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
34
Lab/Activity



Modify Zone Memberships
Configure Privacy Settings
Configure Advanced Security Settings
Number of Exam Questions
6 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
35
Section 3.8: Internet Explorer (IE) 8
Summary
This section explores facts about enhancing security, access, and compatibility with IE 8
features. Details covered include:






InPrivate Mode features:
o InPrivate Browsing
o InPrivate Filtering
Features which enhance Internet Explorer security:
o Delete Browsing History
o AutoComplete
o SmartScreen Filter
o Cross-Site Scripting Filter
o Data Execution Prevention
o Content Advisor
o Advanced Settings
The role of Compatibility View
Components to configure the Compatibility View:
o Compatibility View button
o Compatibility View Settings
o Group Policy
Managing Internet Explorer Add-ons:
o Toolbars and extension
o Search providers
o Accelerators
o InPrivate Filtering
Considerations when configuring the Manage Add-on console:
o Storage of add-on functionality
o Disabling an add-on
o Deleting an add-on
After finishing this section, students should be able to complete the following tasks:




Use InPrivate Mode to protect privacy.
Use accelerators to quickly access, share, search, translate or obtain additional
information about a topic.
Add additional accelerators to provide additional functionality.
Configure Compatibility View.
Configuring Windows 7 Objectives:

302. Configure application compatibility. This objective may include but is not
limited to:
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
36

o Compatibility issues with Internet Explorer
304. Configure Internet Explorer. This objective may include but is not limited to:
o Configuring compatibility view
o Configuring security settings
o Configuring providers
o Managing add-ons
o Controlling InPrivate mode
Lecture Focus Questions:





How does the SmartScreen Filter detect phishing Web sites and Web sites that
dispense malware?
What is the difference between how the InPrivate Mode features protect a user's
privacy?
When would you choose to disable an add-on?
What function does the Compatibility View provide for users?
How can you clear previously-saved passwords saved in Internet Explorer?
Time
About 45 minutes
Number of Exam Questions
10 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
37
Section 3.9: Application Restriction
Summary
This section discusses methods to configure application restriction policies to limit and
restrict the applications that users can run. Details covered include:





The role of software restriction policies
o Application restriction rules:
 Hash
 Certificate
 Path
 Network Zone
 Default
o Conflicting rules
o Enforcement policies options
o Enabling certificate rules
o Extensions
Advantages of AppLocker policies
AppLocker rule types:
o Executable
o Windows Installer
o Script
o DLL
Conditions for AppLocker rules:
o Publisher
o Path
o Hash
AppLocker considerations:
o AppLocker rules vs software restriction policies
o Soft-enforcement mode
o AppLocker event log contents
After finishing this section, students should be able to complete the following tasks:



Configure a local software restriction policy for a specific user.
Create a path rule for an application.
Create a hash rule to create software restrictions.
Configuring Windows 7 Objectives:

303. Configure application restrictions. This objective may include but is not
limited to:
o Setting software restriction policies
o Setting application control policies
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
38
o Setting through group policy or local security policy
Lecture Focus Questions:




How are software restriction policies managed, and in what order are they
applied?
How does a hash rule identify one application from another? Does the same hash
value always apply after the application receives a software update?
What are the advantages of using AppLocker over software restriction policies?
If software restriction policies and AppLocker policies are configured on the same
object, which rules take precedence?
Time
About 50 minutes
Number of Exam Questions
8 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
39
Section 4.1: IPv4
Summary
This section provides an overview of IPv4 addresses. Concepts covered include:


IPv4 addresses:
o 32-bit binary number
o Converting from binary to decimal
o Subnet mask
o Default class for IPv4 address ranges
 A
 B
 C
 D
 E
o Networking services:
 Dynamic Host Configuration Protocol (DHCP)
 Domain Name System (DNS)
 Network Address Translation (NAT)
o IPv4 address considerations
Subnetting
o The role of subnetting
o Custom subnet masks
o Classless addressing
o Classless Inter-Domain Routing (CIDR)
o Calculating if workstations are on the same subnetworks
Configuring Windows 7 Objectives:

401. Configure IPv4 network settings. This objective may include but is not
limited to:
o Connecting to a network
o Configuring name resolution
o Setting up a connection for a network
o Network locations
o Resolving connectivity issues
o APIPA
Lecture Focus Questions:




What is the function of the subnet mask?
How can you divide a large network into smaller networks?
What does the Classless Inter-Domain Routing (CIDR) notation represent?
What does it mean if a Windows client has an IP address of 169.254.0.3 with the
subnet mask of 255.255.0.0?
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
40



What is the advantage of using NAT?
How can you determine if individual computers are on the same network?
How do Windows 7 clients resolve host names to IP addresses?
Time
About 30 minutes
Number of Exam Questions
3 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
41
Section 4.2: IPv6
Summary
This section provides an overview of IPv6 addresses. Concepts covered include:


IPv6 features:
o Address space
o Header improvements
o Route aggregation
o Built-in security features
o Built-in Quality of Service (QoS)
o Neighbor Discovery (ND)
o Geographic assignment of addresses
IPv6 address
o 128-bit binary number (32 hexadecimal numbers, organized into 8
quartets)
 Prefix
 Interface ID
o Types of addresses:
 Reserved
 Unicast
 Multicast
 Anycast
 Loopback
 Unspecified
o Addressing methods for implementingIPv6:
 IPv4-mapped address
 Tunneling
 IPv4-compatible address
 Intra-site Automatic Tunnel Addressing Protocol
(ISATAP)
 6-to-4
 Teredo tunneling
Configuring Windows 7 Objectives:

402. Configure IPv6 network settings. This objective may include but is not
limited to:
o Configuring name resolution
o Connecting to a network
o Setting up a connection for a network
o Network locations
o Resolving connectivity issues
o Link local multicast name resolution
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
42
Lecture Focus Questions:





Why does IPv6 not require the NAT and PAT networking services?
What portion of an IPv6 address represents the prefix, and which portion
represents the interface ID?
What is the difference between a link-local and a unique local unicast address?
What is the difference between a unicast address and an anycast address?
When implementing IPv6, which transition methods incorporate an IPv4 address?
Time
About 25 minutes
Number of Exam Questions
4 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
43
Section 4.3: IP Address Configuration
Summary
This section provides information about configuring IPv4 and IPv6 addresses. Concepts
covered include:



Methods to assign IPv4 addresses and other IPv4 configuration values:
o Dynamic Host Configuration Protocol (DHCP)
o Static (manual) assignment
o Automatic Private IPv4 Addressing (APIPA)
o Alternate IPv4 configuration
Methods to configure an IPv6 address:
o Static full assignment
o Static partial assignment
o Stateless autoconfiguration
o DHCPv6
Tools to troubleshoot network problems:
o Event Viewer
o Windows Network Diagnostics
o ipconfig
o ping
o tracert
o pathping
o Unified tracing
o nslookup
o netstat
o netsh
o Network and Sharing Center
After finishing this section, students should be able to complete the following tasks:




Use netsh to create a firewall rule to allow inbound and outbound ICMP traffic.
Configure a computer with a static address.
Use ipconfig and ping to gather information and test the TCP/IP connection of a
computer.
Configure an IPv4-compatible address while transitioning to IPv6.
Configuring Windows 7 Objectives:

401. Configure IPv4 network settings. This objective may include but is not
limited to:
o Connecting to a network
o Configuring name resolution
o Setting up a connection for a network
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
44

o Network locations
o Resolving connectivity issues
o APIPA
402. Configure IPv6 network settings. This objective may include but is not
limited to:
o Configuring name resolution
o Connecting to a network
o Setting up a connection for a network
o Network locations
o Resolving connectivity issues
Lecture Focus Questions:





When would you choose to manually assign IPv4 configuration values for a
network adapter?
How is IP addressing different for APIPA versus DHCP?
When would you choose to use DHCP to assign IP addresses?
When using IPv6 stateless autoconfiguration, how do the clients learn the
addresses of other clients on the network?
What is the difference between the two modes of DHCPv6?
Time
About 50 minutes
Lab/Activity


Configure IPv4 Settings
Configure IPv6 Settings.
Number of Exam Questions
14 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
45
Section 4.4: Internet Connection Sharing (ICS)
Summary
This section provides information about configuring Internet Connection Sharing (ICS) to
share network access with other network users through a computer’s Internet connection.
Concepts covered include:


Tasks to configure ICS
o Configuring the ICS host
o Configuring the ICS clients
Considerations when using ICS
After finishing this section, students should be able to complete the following tasks:

Configure an ICS host.
Configuring Windows 7 Objectives:

403. Configure networking settings. This objective may include but is not limited
to:
o Configuring network adapters
Lecture Focus Questions:




What are the advantages of using ICS in a small network?
What are the differences between an ICS host and an ICS client?
How many network adapters are required before you can implement ICS?
Which network adapter on the ICS host will have 192.168.137.1 as the IP
address?
Time
About 10 minutes
Lab/Activity

Configure ICS
Number of Exam Questions
1 question
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
46
Section 4.5: Wireless Networking
Summary
This section provides the following information about configuring wireless networking:









Wireless networking architecture:
o Devices
o Connection Method
 Ad hoc
 Infrastructure
o SSID (Service Set Identifier)
Wireless networking standards
Technologies to improve speed or the distance of wireless transmissions:
o Multiple Input Multiple Output (MIMO)
o Channel bonding
Considerations for wireless networks
Methods to authenticate wireless networks:
o Open
o Shared key
o 802.1x
Standards to provide security for wireless networking:
o Wired Equivalent Privacy (WEP)
o Wi-Fi Protected Access (WPA)
o Wi-Fi Protected Access 2 (WPA2) or 802.11i
Practices to provide a level of security:
o Change the administrator account name and password
o Change SSID from defaults
o Update the firmware
o Enable the firewall on the access point
o Disable DHCP
o Enable MAC address filtering
Connecting to a wireless network:
o SSID
o Wireless network icon in the System Tray
o Profiles
o Manually creating a network profile
o Ad-hoc connections
o Using netsh wlan to configure wireless connections at the command
prompt
Considerations for wireless connections
o Incorrect configuration
o Range and obstructions
o Access point placement
o Channel interference
o Automatic switching (roaming)
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
47
After finishing this section, students should be able to complete the following tasks:



Create and connect to an ad-hoc wireless network.
Manually connect to a network whose SSID is not being broadcast.
Create and save a wireless profile.
Configuring Windows 7 Objectives:

403. Configure networking settings. This objective may include but is not limited
to:
o Adding a physically connected (wired) or wireless device
o Connecting to a wireless network
o Configuring security settings on the client
o Set preferred wireless networks
o Configuring network adapters
Lecture Focus Questions:






What type of devices are used in a wireless network?
When should you use an ad-hoc wireless network?
How does channel bonding increase the performance of wireless transmissions?
How does 802.1x provide greater authentication security than other authentication
methods?
What types of settings does a wireless profile contain?
What is the primary reason not to use WPA2 to secure a wireless network?
Time
About 55 minutes
Lab/Activity


Connect to a Wireless Network
Configure a Wireless Profile
Number of Exam Questions
8 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
48
Section 4.6: Windows Firewall
Summary
In this section students will learn details about configuring Windows Firewall and
Windows Firewall with Advanced Security (WFAS) to protect a system by controlling all
traffic through a computer’s network interfaces.


Windows Firewall
o The role of Windows Firewall
o Configure basic settings using the Windows Firewall utility
o Network Location Awareness
 Profile types
 Domain
 Home or Work
 Public
o Default responses to outbound and inbound traffic
o Firewall exceptions
Windows Firewall with Advanced Security (WFAS)
o Rule Types:
 Program
 Port
 Predefined
 Custom
o Connection security rules types:
 Isolation
 Authentication exemption
 Server-to-server
 Tunnel
 Custom
o Action options for rules:
 Allow the connection
 Block the connection
 Allow the connection if it is secure
o Options for network profiles:
 Firewall state
 Inbound connections
 Outbound connections
o Configure exceptions based on the port, protocol, or application
o Manage firewall settings with the netsh advfirewall command
o Edge traversal
After finishing this section, students should be able to complete the following tasks:

Configure the Windows Firewall to protect the computer from outside sources.
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
49

Create inbound and outbound rules using the Windows Firewall with Advanced
Security (WFAS).
Configuring Windows 7 Objectives:

404. Configure Windows Firewall. This objective may include but is not limited
to:
o Configuring rules for multiple profiles
o Allowing or denying an application
o Network-profile-specific rules
o Configuring notifications
o Configuring authenticated exceptions
Lecture Focus Questions:




How does Windows Firewall protect users from hackers, viruses, and worms?
Why does Windows Firewall provide a list of predefined firewall exceptions?
When would you choose to use Windows Firewall with Advanced Security
(WFAS) over Windows Firewall?
What type of connection security rule protects traffic based on IP addresses?
Time
About 45 minutes
Lab/Activity

Configure the Windows Firewall
Number of Exam Questions
10 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
50
Section 5.1: Authentication and Authorization
Summary
This section examines configuring Authentication and Authorization to control access to
resources. Concepts discussed include:



Authentication
o The role of authentication
o Authentication features:
 Kerberos v5
 Windows NT LAN Manager (NTLM)
 Certificates
 Smart cards
 Biometrics
 Online identity integration
o Multifactor authentication
Authorization
o Permission
o Policy
o Right
o Built-in groups:
 Administrators
 Backup Operators
 Event Log Readers
 Network Configuration Operators
 Users
 Power Users
 Remote Desktop Users
Tools to manage authentication:
o Credential Manager
o runas command
o Account policies
After finishing this section, students should be able to complete the following tasks:


Use Credential Manager to save and manage usernames and passwords.
Use Run As to run applications as an administrator or a secondary user.
Configuring Windows 7 Objectives:

504. Configure authentication and authorization. This objective may include but is
not limited to:
o Resolving authentication issues
o Configuring rights
o Managing credentials
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
51
o
o
o
o
Managing certificates
Smart cards with PIV
Elevating user privileges
Multifactor authentication
Lecture Focus Questions:






What is the difference between authentication and authorization?
Why does the Power Users group exist as a built-in group for Windows 7?
When considering authorization, what is the difference between a permission and
a right?
Under which circumstance is Credential Manager unnecessary?
What is the difference between the account lockout duration and the account
lockout threshold?
How can you force users to create and use unique passwords?
Time
About 55 minutes
Lab/Activity

Manage Account Policies
Number of Exam Questions
8 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
52
Section 5.2: NTFS Permissions
Summary
This section provides an overview of using NTFS permissions to control access to files
and folders. Concepts covered include:







NTFS permissions for folders and files
o Full control
o Modify
o Read & execute
o List folder contents
o Read
o Write
Access Control Entries (ACE)
o Explicit permissions
o Allow permission
o Deny permission
Applying permissions
How permissions can be affected by copying or moving files with NTFS
permissions
Managing NTFS permissions from a command prompt
Comparing special permissions to NTFS permissions
Configuring special permissions
After finishing this section, students should be able to complete the following tasks:


Restrict access to files and folders using NTFS permissions.
Apply Special Permissions to provide specific control over files and folders.
Configuring Windows 7 Objectives:

502. Configure file and folder access. This objective may include but is not
limited to:
o Configuring NTFS permissions
o Resolving effective permissions issues
o Copying files vs. moving files.
Lecture Focus Questions:




What are the six standard NTFS permissions?
How does an object receive explicit permissions versus inherited permissions?
How are effective permissions determined?
Which permissions take precedence when both share and NTFS permissions
apply to a folder?
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
53

How does copying or moving files with NTFS permissions affect the permissions
on the file or folder?
Time
About 45 minutes
Lab/Activity

Configure NTFS Permissions
Number of Exam Questions
10 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
54
Section 5.3: Resource Sharing
Summary
This section explores sharing resources. Details discussed include:






Location types identifying the type of network, settings and services:
o Domain
o Public
o Home
o Work
Networking services for location types:
o Network discovery
o File and printer sharing
o Public folder sharing
o Media streaming
o File sharing connections
o Password protected sharing
o HomeGroup connections
Methods to control access to shared content:
o Basic sharing
o Advanced sharing
o Public folder sharing
Managing shared folders
Managing libraries
Sharing resources using HomeGroups
After finishing this section, students should be able to complete the following tasks:



Create a HomeGroup to share specific types of files with other computers running
Windows 7.
Join a HomeGroup to share a library of files.
Create and secure a shared folder.
Configuring Windows 7 Objectives:

501. Configure shared resources. This objective may include but is not limited to:
o Folder virtualization
o Shared folder permissions
o Configuring HomeGroup settings
Lecture Focus Questions:

Under what circumstances would you choose to enable the Public Folder Sharing
networking service?
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
55





What are the differences between a domain, public, work and home network
profile?
When using public folder sharing, where are the public files located?
How would you share individual files and folders within the HomeGroup?
How can you create an administrative share?
What is a library, and where are files physical located when displayed in a
library?
Time
About 55 minutes
Lab/Activity

Share and Secure Folders
Number of Exam Questions
17 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
56
Section 5.4: Printer Sharing and Management
Summary
In this section students will learn the basics of managing printer sharing. Concepts
covered include:




Sharing a printer
Setting permissions on a printer:
o Print
o Manage printer
o Manage documents
Using the Print Management MMC snap-in
Printer management features:
o Client-Side Rendering (CSR)
o Driver isolation
o XML Paper Specification (XPS)
o Windows Color System (WCS)
o Location-aware printing
After finishing this section, students should be able to complete the following tasks:



Create and share a printer.
Manage the default printer based on the location.
Manage printer permissions.
Configuring Windows 7 Objectives:


403. Configure networking settings. This objective may include but is not limited
to:
o Configuring location-aware printing
501. Configure shared resources. This objective may include but is not limited to:
o Printers and queues
Lecture Focus Questions:





What is the difference between the manage printer and the manage document
printer permissions?
What are the functions of the Print Management MMC snap-in?
When would you choose to isolate the print driver?
How does Client-Side Rendering (CSR) reduce print processing times?
What is the advantage of location-aware printing?
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
57
Time
About 30 minutes
Lab/Activity


Share a printer
Configure Default Printer
Number of Exam Questions
7 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
58
Section 5.5: Auditing
Summary
This section provides an overview of using auditing to monitoring system events.
Concepts covered include:



The role of auditing
Common audit policies:
o Account logon events
o Logon events
o Account management
o Object access
o Policy change
o Privilege use
o System events
o Process tracking
o Directory service access
Considerations when configuring auditing
After finishing this section, students should be able to complete the following tasks:


Configure auditing to track the success and failure of specified actions of a user.
Create a custom view to filter tasks and manage the audit results?
Configuring Windows 7 Objectives:


604. Configure remote connections. This objective may include but is not limited
to:
o Advanced security auditing
703. Monitor systems. This objective may include but is not limited to:
o Configuring event logging
o Filtering event logs
Lecture Focus Questions:



What is the difference between account logon and logon audit policies?
As the Administrator you have requested that all users change their passwords.
What audit policy would verify that all the users have complied with the request?
What policy would you use to audit failed attempts to view or modify registry
settings?
Time
About 20 minutes
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
59
Number of Exam Questions
7 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
60
Section 5.6: Encryption
Summary
This section provides an overview of encrypting folders and files to protect data.
Concepts covered include:

Encrypting File System (EFS)
o Requirements for EFS
o Encryption and compression cannot be used at the same time
o Managing encrypted files
o Tools to restore, import, and export EFS keys to and from a Personal
Information Exchange (PFX) file:
 Certificate Manager Console
 Manage File Encryption Certificates
 Cipher command-line tool
After finishing this section, students should be able to complete the following tasks:



Encrypt files and folders to protect data from unauthorized users.
Back up the file encryption key.
Create a Designated Recovery Agent (DRA).
Configuring Windows 7 Objectives:

502. Configure file and folder access. This objective may include but is not
limited to:
o Encrypting files and folders by using EFS
Lecture Focus Questions:





Which Windows 7 editions support Encrypting File System (EFS)?
Once a folder is encrypted, which users can access the data inside the folder?
Which types of files cannot be encrypted?
What NTFS permission must you have to encrypt a file?
What is the purpose of a PFX file?
Time
About 35 minutes
Lab/Activity

Encrypt Files
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
61
Number of Exam Questions
10 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
62
Section 5.7: BranchCache
Summary
This section discusses configuring BranchCache to allow users in branch offices to
quickly access information. Concepts covered include:





The role of BranchCache
BranchCache modes:
o Hosted Cache
o Distributed Cache
Considerations when configuring auditing
Elements to configure for BranchCache
Tools to configure BranchCache:
o netsh
o Group Policy
o Windows Firewall with Advance Security
Configuring Windows 7 Objectives:

505. Configure BranchCache. This objective may include but is not limited to:
o Distributed cache mode vs. hosted mode
o Network infrastructure requirements
o Configuring settings
o Certificate management
Lecture Focus Questions:




Under which circumstances should you enable distributed cache mode versus
hosted cache mode?
How does BranchCache treat traffic while in transit?
When would you choose to configure BranchCache using Group Policy rather
than netsh?
When BranchCache settings have been configured using both the netsh command
and Group Policy, which settings take precedence?
Time
About 30 minutes
Number of Exam Questions
9 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
63
Section 6.1: Network Access Protection (NAP)
Summary
This section discusses using Network Access Protection (NAP) to regulate network
access based on a computer’s compliance with health requirement policies. Details
covered include:



Components NAP uses:
o NAP client
o NAP server
o Enforcement Server (ES)
o Remediation server
Configuring NAP
Remediation
Configuring Windows 7 Objectives:

604. Configure remote connections. This objective may include but is not limited
to:
o NAP quarantine remediation
Lecture Focus Questions:



How does NAP determine if a client is non-compliant with specific requirements?
How does a remediation server help non-compliant clients become compliant?
What is the difference between the role of the enforcement server and the NAP
server?
Time
About 10 minutes
Number of Exam Questions
2 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
64
Section 6.2: Virtual Private Network (VPN)
Summary
This section explores configuring and managing a Virtual Private Network (VPN) to
secure IP traffic as it travels across a TCP/IP network. Concepts covered include:





The role of a Virtual Private Network (VPN)
The benefits of VPNs
VPN security technologies:
o Point-to-Point Tunneling Protocol (PPTP)
o Layer Two Tunneling Protocol (L2TP)
o Internet Protocol Security (IPSec)
o Secure Socket Tunneling Protocol (SSTP)
o Internet Key Exchange version 2 (IKEv2)
Considerations when managing VPN connections
Remote Access Authentication Protocols:
o Password Authentication Protocol (PAP)
o Challenge Handshake Authentication Protocol (CHAP)
o Microsoft Challenge Handshake authentication Protocol version2 (MSCHAPv2)
o Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)
After finishing this section, students should be able to complete the following tasks:

Use the Network and Sharing Center to create a VPN connection.
Configuring Windows 7 Objectives:

604. Configure remote connections. This objective may include but is not limited
to:
o Establishing VPN connections and authentication
o Enabling a VPN reconnect
Lecture Focus Questions:






Under which circumstances would you use a VPN connection?
What process does a VPN use to secure IP traffic over a TCP/IP network?
What types of communications can be secured using IPSec?
Which protocol is the default protocol used for new VPN connections in
Windows 7?
What benefits does VPN Reconnect provide over traditional VPN connections?
Which Windows 7 editions support VPN Reconnect?
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
65
Time
About 30 minutes
Lab/Activity

Configure a VPN Connection
Number of Exam Questions
7 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
66
Section 6.3: DirectAccess
Summary
This section provides students with details about using DirectAccess to allow Windows 7
clients to automatically connect to the corporate intranet through an Internet connection.
Concepts covered include:

The role of DirectAccess:
o A typical VPN solution
o Simultaneous access to both Internet and intranet resources
o Details about DirectAccess
o DirectAccess connection methods:
 Full enterprise network access (end-to-edge)
 Selected server access (modified end-to-edge)
 End-to-end
o DirectAccess clients connecting to intranet resources
o DirectAccess requirements:
 Infrastructure
 Server
 Client
o Configuration details for DirectAccess components:
 Server
 Client side
Configuring Windows 7 Objectives:

602. Configure DirectAccess. This objective may include but is not limited to:
o Configuring client side
o Configuring authentication
o Network infrastructure requirements
Lecture Focus Questions:




What are the advantages of using DirectAccess to access corporate file servers?
What is the difference between full enterprise network access and selected server
access?
What are the requirements for a DirectAccess client?
How does the client's IP address configuration affect how the client sends traffic
to the DirectAccess server?
Time
About 25 minutes
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
67
Number of Exam Questions
7 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
68
Section 6.4: BitLocker and BitLocker To Go
Summary
This section examines configuring and managing BitLocker and BitLocker To Go to
protect against unauthorized data access. Concepts covered include:










The role of BitLocker
Components BitLocker uses:
o BitLocker partition
o Trusted Platform Module (TPM)
o USB device
o BIOS support
Comparison of BitLocker and Encrypting File System (EFS)
BitLocker configuration:
o TPM owner password
o Recovery key
o PIN
o Startup key
o Data volume key
o Data Recovery Agent
BitLocker modes to determine the security level:
o TPM-only
o TPM with startup key
o TPM with PIN
o TPM with PIN and startup key
o Without a TPM
Configuring and managing BitLocker
The role of BitLocker To Go
Requirements for BitLocker To Go
Policies that control BitLocker To Go:
o Control use of BitLocker on removable dries
o Configure use of smart cards on removable drives
o Deny write access to removable drives not protected by BitLocker
o Allow access to BitLocker-protected removable data drives from earlier
version of Windows
o Configure use of password for removable data drives
o Choose how BitLocker-protected removable drives can be recovered
Manage BitLocker and BitLocker To Go from the command line
After finishing this section, students should be able to complete the following tasks:


Generate recovery keys and create a BitLocker DRA.
Configure BitLocker to implement BitLocker without a TPM.
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
69

Configure BitLocker To Go to deny write access to unauthorized USB flash
devices.
Configuring Windows 7 Objectives:

601. Configure BitLocker and BitLocker To Go. This objective may include but is
not limited to:
o Configuring BitLocker and BitLocker To Go policies
o Managing Trusted Platform Module (TPM) PINs
o Configuring startup key storage
o Data recovery agent support
Lecture Focus Questions:






What is the difference between suspending protection and decrypting the drive?
When implementing BitLocker, why is it a good idea to run a system check
before encrypting the drive?
What is the difference in function between BitLocker and BitLocker To Go?
When using BitLocker what are the requirements of the Trusted Platform
Module? How can you implement BitLocker without a TPM?
What will happen when BitLocker is enabled but then you lose the USB flash
device which holds the key?
Which editions of Windows 7 allow read access to BitLocker To Go devices?
Time
About 45 minutes
Number of Exam Questions
13 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
70
Section 6.5: Mobility Options
Summary
This section provides information about configuring and managing options for mobile
devices. Concepts covered include:






Tools to manage and maintain Windows 7 mobile devices:
o Power options
o Mobility Center
o Windows Mobile Device Center
o Sync Center
o Presentation settings
Power Plans
o Power saver plan
o High performance plan
o Balanced plan
o Custom plans
Components to configure Power Plans:
o Require password on wakeup
o Power buttons and lid
o Hard disk
o Wireless adapter settings
o USB settings
o Peripheral Component Interconnect (PCI) Express
o Multimedia settings
o Processor power management
o Battery
Power saving states:
o Shut down
o Sleep
o Hibernation
o Hybrid sleep
Additional tools to configure power options:
o Group Policy
o powercfg
Offline files
o Offline file operating modes:
 Online
 Auto offline
 Manual offline
 Slow-link
o Group Policy settings to configure offline file settings
o Transparent caching
o Controlling caching on a network share
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
71
o Managing Offline Files
After finishing this section, students should be able to complete the following tasks:



Configure Offline Files to allow users to access files and folders when they are
disconnected from the network
Use the Sync Center on a mobile device to resolve a conflict of an offline file?
Use Power Plans to manage the power consumption of a mobile computer.
Configuring Windows 7 Objectives:


603. Configure mobility options. This objective may include but is not limited to:
o Configuring offline file policies
o Transparent caching
o Creating and migrating power policy
704. Configure performance settings. This objective may include but is not
limited to:
o Configuring power plans
o Mobile computing performance issues
Lecture Focus Questions:





How does a power plan help to optimize the performance and conserve energy on
a laptop?
What types of settings can you configure using the Mobility Center for mobile
devices?
What is the process of transparent caching?
What are the options for resolving a synchronization conflict?
What are the differences between the sleep and the hybrid sleep power saving
states?
Time
About 70 minutes
Lab/Activity


Edit Power Options
Create a Power Plan
Number of Exam Questions
18 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
72
Section 7.1: Troubleshooting Tools
Summary
This section examines facts about the following Windows troubleshooting tools and
utilities:






Windows Memory Diagnostic Tool (WMDT)
Windows Network Diagnostics
Startup and Recovery options
Startup Repair
System Configuration Utility (Msconfig.exe)
Services console (Services MMC snap-in)
After finishing this section, students should be able to complete the following tasks:





Use the Services Console to view and manage services, such as starting, stopping,
pausing, and resuming.
Use the Services Console to select the computer's response if the service fails or
stops.
Start and stop services from the command line.
Use Misconfig to view all the items that are processed during the computer
startup, and disable an item if needed.
Use Msconfig to launch support tools for manage and maintain a system.
Configuring Windows 7 Objectives:


703. Monitor systems. This objective may include but is not limited to:
o Generating a system diagnostics report
704. Configure performance settings. This objective may include but is not
limited to:
o Configuring networking performance
o Configuring services and programs to resolve performance issues
Lecture Focus Questions:




How would you disable a service without rebooting?
Which tool would you use to scan and manage memory?
Which types of network problems does the Windows Network Diagnostics
troubleshoot?
Which troubleshooting tools run automatically when they detect a problem?
Time
About 25 minutes
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
73
Number of Exam Questions
3 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
74
Section 7.2: System Events
Summary
This section examines using Event Viewer and Event Subscriptions to monitor system
events. Concepts covered include:


Event Viewer
o Common eventlogs:
 Application
 Security
 Setup
 System
 ForwardedEvents
o Features available with event logs:
 Filter events
 Custom views
 Attach a task
 Event Log online help
Event Subscriptions
o Subscription types:
 Collector initiated
 Source computer initiated
o Elements that a subscription identifies
o Delivery optimization options:
 Normal
 Minimize bandwidth
 Minimize latency
 Custom
After finishing this section, students should be able to complete the following tasks:


Use custom views and the properties of events to troubleshoot and diagnose
issues on the system.
Configure collector initiated and source initiated subscriptions.
Configuring Windows 7 Objectives:

703. Monitor systems. This objective may include but is not limited to:
o Configuring event logging
o Filtering event logs
o Event subscriptions
Lecture Focus Questions:
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
75





What common event logs does Event Viewer display?
Why would you choose to filter events in Event Viewer?
What is the difference between filtering events versus using a custom view?
What type of tasks can you attach to an event when a specific event occurs?
When would you choose to use a collector-initiated subscription over a sourceinitiated subscription?
Time
About 45 minutes
Number of Exam Questions
10 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
76
Section 7.3: Performance Monitoring
Summary
In this section students will learn about monitoring and configuring performance settings.
Concepts covered include:







The role of Windows Aero
The Windows Experience Index measures the hardware and software response to
Windows Aero
Tools available in the Performance Information and Tools console:
o Performance Monitor
o Data Collector Set (DCS)
o Reports
Using perfmon.exe
Configuring data collector sets
Using the logman command
Windows Performance Toolkit (WPT)
o Performance Analyzer tool suite:
 Xperf.exe
 Xperfview.exe
 Xbootmgr.exe
After finishing this section, students should be able to complete the following tasks:



Use the Windows Experience Index to establish the base score of a machine.
Use Performance Monitor to gather information about the performance of a
computer.
Create a Data Collector Set to capture information and monitor the performance
of a computer.
Configuring Windows 7 Objectives:


703. Monitor systems. This objective may include but is not limited to:
o Data collector sets
o Generating a system diagnostics report
704. Configure performance settings. This objective may include but is not
limited to:
o Configuring desktop environment
Lecture Focus Questions:


Which components does the Windows Experience Index test to determine the
base score?
How is the base score of the Windows Experience Index calculated?
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
77


What is the main difference between Performance Monitor and Data Collector
Sets?
What types of performance analysis can the three tools in the Windows
Performance Toolkit (WPT) perform?
Time
About 45 minutes
Lab/Activity

Update the Windows Experience Index
Number of Exam Questions
8 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
78
Section 7.4: Resource Monitoring
Summary
This section provides information about tools that can be used to gather information
about the system and troubleshoot problems. Concepts covered include:

Tools to monitor the system resources include:
o Task Manager
o Resource Monitor
o Process Explorer
After finishing this section, students should be able to complete the following tasks:

Use Task Manager and Resource Monitor to view and manage processes and
services on a computer.
Configuring Windows 7 Objectives:

703. Monitor systems.
Lecture Focus Questions:




Under which circumstances should you use Resource Monitor versus Task
Manager?
What type of information is provided in a wait chain?
How does processor affinity affect the use of system resources?
How can you use Resource Monitor to identify which application is writing to a
disk?
Time
About 25 minutes
Number of Exam Questions
3 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
79
Section 7.5: Reliability and Performance Maintenance
Summary
This section discusses tools that are used to ensure the reliability and performance of the
system. Concepts covered include:





The role of Reliability Monitor
The role of Windows Action Center
The role of Windows Defender
Components that Windows Defender uses to protect computers:
o Automatic Scanning
o Real-time protection
o Alert actions
o SpyNet Community
Working with Windows Defender
After finishing this section, students should be able to complete the following tasks:


Use the Reliability Monitor to view the historical data of the operating system.
Use the data in the Action Center to troubleshoot a computer.
Configuring Windows 7 Objectives:

403. Configure networking settings. This objective may include but is not limited
to:
o Configuring security settings on the client
Lecture Focus Questions:






How is the stability index value calculated?
What kind of warnings does the Action Center provide?
Which service is required for Action Center to run properly?
What are the differences between the three types of Windows Defender automatic
scans?
What is the difference between the remove and quarantine action in Windows
Defender?
What is a heuristic and how can it help identify possible threats to your computer?
Time
About 25 minutes
Number of Exam Questions
1 question
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
80
Section 7.6: Optimization
Summary
This section discusses using the following features to increase the system performance:






Visual effects
Processor scheduling
Paging file
Data Execution Protection (DEP)
Write caching
ReadyBoost
After finishing this section, students should be able to complete the following tasks:


Edit the Advanced System Settings to increase the performance of a machine.
Configure the virtual memory settings to optimize the computer's performance.
Configuring Windows 7 Objectives:

704. Configure performance settings. This objective may include but is not
limited to:
o Configuring page files
o Configuring hard drive cache
o Configuring processor scheduling
o Configuring desktop environment
Lecture Focus Questions:





If you have a machine that is responding rather slowly, what settings could you
change to increase the performance of this machine?
What type of processor scheduling would you use on a desktop machine running
Windows 7?
What is a temporary solution to resolve the problem when the paging file usage is
near 100%? What is a more permanent solution?
How does Data Execution Protection (DEP) help prevent damage from viruses
and other security threats?
What type of write caching option increases performance for internal hard disk
drives?
Time
About 25 minutes
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
81
Lab/Activity

Configure Virtual Memory
Number of Exam Questions
9 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
82
Section 7.7: System Updates
Summary
In this section students will learn about configuring Windows Updates to manage system
updates.




Windows Update
Tools to deploy and manage updates
o Windows Server Update Services (WSUS)
o System Center Essentials
o System Center Configuration Manager (SCCM)
o Microsoft Baseline Security Analyzer (MBSA)
Automatic Update policies available in the Windows Update node:
o Configure Automatic Updates
o Specify intranet Microsoft Update server location
o Enable client-side targeting
o Reschedule Automatic Updates Scheduled Installations
o No auto-Restart for Scheduled Automatic Updates and Installations
o Automatic Updates detection frequency
o Allow Automatic Updates immediate installation
o Delay restart of schedule installations
o Re-prompt for restart with scheduled installations
o Allow non-administrators to receive update notifications
o Do not display ‘Install Updates and Shut Down’ option in Shut Down
Windows dialog box
Settings available in Configure Automatic Updates policy to download and
install updates:
After finishing this section, students should be able to complete the following tasks:


Use Windows Update to manage and maintain updates.
Configure Windows 7 clients to connect to and download updates from a
Windows Server Update Server (WSUS).
Configuring Windows 7 Objectives:

701. Configure updates to Windows 7. This objective may include but is not
limited to:
o Configuring update settings
o Determining source of updates
o Configuring Windows Update policies
o Reviewing update history
o Checking for new updates
o Rolling back updates
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
83
Lecture Focus Questions:






How can you manually check for updates, but not install the updates?
How do you install optional updates?
Under which circumstances would you choose a WSUS solution rather than a
standard Windows Update solution?
What types of operating system vulnerabilities are identified by the Microsoft
Baseline Security Analyzer (MBSA)?
What is the difference between Microsoft Update and Windows Update?
When would you use the wusa.exe utility?
Time
About 50 minutes
Lab/Activity

Configure Windows Update
Number of Exam Questions
9 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
84
Section 7.8: Remote Management
Summary
This section discusses remote management of computers. Details about the following are
presented:






Enabling WinRm
Remote management tools
o Windows Remote Shell (WinRS)
o PsExec
o PowerShell
The role of Remote Desktop
Details of Remote Desktop
Problems you may encounter when using Remote Desktop:
o Cannot connect
o Cannot log on
o Cannot copy txt
o Screen goes blank
o Blank screen saver
Remote Desktop Services features:
o Remote Desktop (RD) Gateway
o RemoteApp
After finishing this section, students should be able to complete the following tasks:




Enable remote management and configure trusts between clients.
Execute and run commands locally and remotely on different computers using
PowerShell and WinRS.
Use filtering and pipelining with PowerShell to display only specific data.
Configure Remote Desktop to allow a connection to a remote computer.
Configuring Windows 7 Objectives:


405. Configure remote management. This objective may include but is not limited
to:
o Remote management methods
o Configuring remote management tools
o Executing PowerShell commands
604. Configure remote connections. This objective may include but is not limited
to:
o Remote desktop
Lecture Focus Questions:
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
85





What is the difference between authenticating for remote management in a
domain versus in a workgroup?
How can you run PowerShell commands on a remote computer?
Which Windows 7 editions support accepting incoming Remote Desktop
connection requests?
If you cannot connect to the remote computer when using Remote Desktop, what
items should you consider and verify?
What are the advantages of using RemoteApp?
Time
About 50 minutes
Lab/Activity

Configure Remote Desktop
Number of Exam Questions
14 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
86
Section 7.9: Remote Assistance
Summary
This section discusses the following basics of using Remote Assistance:


The role of Remote Assistance
Details about using Remote Assistance
After finishing this section, students should be able to complete the following tasks:


Use Remote Assistance to provide help and support to users.
Configure a Remote Assistance invitation.
Configuring Windows 7 Objectives:

405. Configure remote management. This objective may include but is not limited
to:
o Remote management methods
o Configuring remote management tools
Lecture Focus Questions:



What are the required steps to initiate a Remote Assistance session?
What is the difference between Remote Assistance and Remote Desktop?
How can the novice take back control of his computer?
Time
About 15 minutes
Number of Exam Questions
1 question
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
87
Section 8.1: System Backup
Summary
This section discusses configuring a backup to protect the system. Concepts covered
include:


Types of backups that the Backup and Restore console supports:
o System image backup
o File backup
Managing backups
After finishing this section, students should be able to complete the following tasks:


Create a complete system image of a machine.
Configure and schedule backups of user files and folders on the computer.
Configuring Windows 7 Objectives:

801. Configure backup. This objective may include but is not limited to:
o Creating a system recovery disk
o Backing up files, folders, or full system
o Scheduling backups
Lecture Focus Questions:




What is the difference between the two types of Backup and Restore backups?
Which type of file system is supported when backing up a system image?
When is a BackupSet folder created and what is saved to the folder?
Which feature allows open files to be backed up?
Time
About 35 minutes
Lab/Activity

Back Up the Computer
Number of Exam Questions
11 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
88
Section 8.2: File Recovery
Summary
This section discusses using file recovery to restore changed, damaged, or deleted files.
Concepts covered include:


Locations where previous versions of files exist:
o Backup
o Shadow copies
Details about file recovery
After finishing this section, students should be able to complete the following tasks:


Restore and recover files from a backup.
Manually create a restore point and configure a schedule to create future restore
points.
Configuring Windows 7 Objectives:

803. Configure file recovery options. This objective may include but is not limited
to:
o Configuring file restore points
o Restoring previous versions of files and folders
o Restoring damaged or deleted files by using shadow copies
o Restore user profiles
Lecture Focus Questions:





When would you configure the System Protection settings to automatically save
files but not system settings?
What is the difference between a shadow copy and a file which is in the
BackupSet folder?
Which tools allow you to restore individual files?
What options are given when attempting to restore a file to a location where a file
with the same name already exists?
What must you do to restore files from a Complete PC Backup VHD file?
Time
About 25 minutes
Number of Exam Questions
10 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
89
Section 8.3: System Recovery
Summary
This section explores tools to assist in system recovery. Tools covered include:




System Restore (restore point)
System Image Recovery
System Recovery Options
Boot Configuration Data (BCD)
After finishing this section, students should be able to complete the following tasks:



Boot a system into a variety of modes for troubleshooting purposes.
Perform a system restore using restore points.
Use a system image to restore system settings after a volume failure.
Configuring Windows 7 Objectives:

802. Configure system recovery options. This objective may include but is not
limited to:
o Configuring system restore points
o Restoring system settings
o Last known good configuration
o Complete restore; driver rollback
Lecture Focus Questions:






When your system is having significant problems, what are your alternate boot
mode options?
What types of drivers and services are loaded when you boot in Safe Mode?
When would you choose to use the Last Known Good Configuration?
What types of events trigger automatic restore points to be created?
Which tool can delete all restore points except for the last restore point?
How can you get a system running again as quickly as possible after a disk
holding the operating system fails?
Time
About 40 minutes
Lab/Activity

Create a Restore Point
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
90
Number of Exam Questions
12 questions
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
91
Practice Exams
Summary
This section provides information to help prepare students to take the exam and to
register for the exam.
Students will also have the opportunity of testing their mastery of the concepts presented
in this course to reaffirm that they are ready for the certification exam. For example, all
questions that apply to Objective 100. Installing, Upgrading, and Migrating Windows
7 are grouped together and presented in practice exam Objective 100. Installing,
Upgrading, and Migrating Windows 7, All Questions. There is no time limit on the
amount of time a student can take to complete the following Domain practice exams, but
students will typically take about 60-120 minutes to complete each practice exam.
Objective 100: Installing, Upgrading, and Migrating Windows 7, All Questions (34
questions)
Objective 200: Deploying Windows 7, All Questions (49 questions)
Objective 300: Configuring Hardware and Applications, All Questions (44 questions)
Objective 400: Configuring Network Connectivity, All Questions (54 questions)
Objective 500: Configuring Access to Resources, All Questions (64 questions)
Objective 600: Configuring Mobile Computing, All Questions (53 questions)
Objective 700: Monitoring and Maintaining Systems that Run Windows 7, All Questions
(72 questions)
Objective 800: Configuring Backup and Recovery Options, All Questions (34 questions)
The Certification Practice Exam consists of 65 questions that are randomly selected from
the above practice exams. Each time the Certification Practice Exam is accessed different
questions may be presented. The Certification Practice Exam has a time limit of 120
minutes -- just like the real certification exam. A passing score of 95% should verify that
the student has mastered the concepts and is ready to take the real certification exam.
©2010 TestOut Corporation (Rev 6/10)
Configuring Windows 7 Exam 70-680 Ver. 2.0
92
Download