Lesson Plans Configuring Windows 7 (Exam 70-680) Version 2.0 Table of Contents Course Overview ................................................................................................................ 3 Section 1.1: Windows 7 Versions ....................................................................................... 5 Section 1.2: Windows 7 Installation ................................................................................... 6 Section 1.3: Upgrade ........................................................................................................... 8 Section 1.4: User Profile and Data Migration ................................................................... 10 Section 1.5: Domain Networking ..................................................................................... 12 Section 2.1: System Images Overview ............................................................................. 13 Section 2.2: Image Preparation ......................................................................................... 14 Section 2.3: Image Capture ............................................................................................... 16 Section 2.4: Manual Image Deployment .......................................................................... 18 Section 2.5: Image Servicing ............................................................................................ 19 Section 2.6: Virtual Hard Disk (VHD) ............................................................................. 21 Section 2.7: Domain Image Deployment .......................................................................... 23 Section 3.1: Devices and Drivers ...................................................................................... 25 Section 3.2: Disk Partitions and Volumes ........................................................................ 27 Section 3.3: Disk Optimization ......................................................................................... 29 Section 3.4: Removable Storage ....................................................................................... 31 Section 3.5: Application Compatibility ............................................................................ 32 Section 3.6: User Account Control (UAC) ....................................................................... 34 Section 3.7: Internet Options ............................................................................................ 36 Section 3.8: Internet Explorer (IE) 8................................................................................. 38 Section 3.9: Application Restriction ................................................................................. 40 Section 4.1: IPv4 ............................................................................................................... 42 Section 4.2: IPv6 ............................................................................................................... 44 Section 4.3: IP Address Configuration ............................................................................. 46 Section 4.4: Internet Connection Sharing (ICS) ............................................................... 48 Section 4.5: Wireless Networking .................................................................................... 49 Section 4.6: Windows Firewall ......................................................................................... 51 Section 5.1: Authentication and Authorization ................................................................. 53 Section 5.2: NTFS Permissions ........................................................................................ 55 Section 5.3: Resource Sharing .......................................................................................... 57 Section 5.4: Printer Sharing and Management ................................................................. 59 Section 5.5: Auditing ........................................................................................................ 61 Section 5.6: Encryption ..................................................................................................... 63 Section 5.7: BranchCache ................................................................................................. 65 Section 6.1: Network Access Protection (NAP) ............................................................... 67 Section 6.2: Virtual Private Network (VPN) .................................................................... 68 Section 6.3: DirectAccess ................................................................................................. 70 Section 6.4: BitLocker and BitLocker To Go ................................................................... 72 Section 6.5: Mobility Options ........................................................................................... 74 Section 7.1: Troubleshooting Tools .................................................................................. 77 Section 7.2: System Events ............................................................................................... 79 Section 7.3: Performance Monitoring ............................................................................... 81 Section 7.4: Resource Monitoring .................................................................................... 83 ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 1 Section 7.5: Reliability and Performance Maintenance .................................................... 84 Section 7.6: Optimization ................................................................................................. 86 Section 7.7: System Updates............................................................................................. 88 Section 7.8: Remote Management .................................................................................... 90 Section 7.9: Remote Assistance ........................................................................................ 92 Section 8.1: System Backup ............................................................................................. 93 Section 8.2: File Recovery ................................................................................................ 95 Section 8.3: System Recovery .......................................................................................... 97 Practice Exams .................................................................................................................. 99 ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 2 Course Overview This course prepares students for Microsoft’s Exam 70-680: Configuring Windows 7. It focuses on installing, deploying configuring, monitoring, and maintaining systems that run Windows 7. Module 1 – Windows Installation This module examines elements that are involved in installing Windows. These elements include the editions and features available with Windows 7, installation and upgrade methods, and preserving user profiles and data using migration tools. Also discussed are the basics of domain networking: Active Directory, and Group Policies. Module 2 – System Images In this module students will learn concepts about capturing a system image. Details discussed include; preparing a system to capture a system image, capturing a system image, manually deploying an image from a network share, and methods for deploying a system image. The students will also learn about creating a Virtual Hard Disk and applying a Windows image to the file. Module 3 – Hardware and Applications This module teaches the students about hardware issues such as configuring devices and drivers, managing disk partitions and volumes, and methods for optimizing a disk drive. The students will also examine application issues such as solving application compatibility problems with Windows 7, protecting the system configuration using the User Account Control, configuring Internet Explorer 8, and configuring access and compatibility for applications. Module 4 – Networking This module discusses the following networking concerns; configuring IPv4 and IPv6 network addresses, Internet Connection Sharing (ICS), wireless networking, Windows Firewall, and Windows Firewall with Advanced Security (WFAS). Module 5 – Resource Access This module examines the fundamentals of accessing resources. Topics discussed include configuring authentication and authorization, NTFS permissions, and resource sharing. Students will learn basics of managing printer sharing, auditing, encrypting files and folders, and configuring BranchCache. Module 6 – Mobile Computing In this module students will learn concepts about configuring remote connections; Network Access Protection (NAP) and Virtual Private Network (VPN). They will also learn about configuring DirectAccess, BitLocker and BitLocker To Go, and configuring and managing options for mobile devices. ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 3 Module 7 – Monitoring and Maintenance This module discusses configuring tools for troubleshooting, monitoring system events, monitoring performance and resource, ensuring the reliability and performance of a system, optimizing system performance, managing system updates, and remote management of computers. Module 8 – Backup and Recovery In this module students will learn about the basic elements of backup and recovery; system backup, file recovery, and system recovery. Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the certification exam. ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 4 Section 1.1: Windows 7 Versions Summary This section discusses the six different editions of Windows 7 and the features available in the different editions. Concepts covered include: Windows 7 editions Windows 7 features Features included in each Windows 7 edition Minimal requirements for Windows 7 editions Windows 7 N-editions Configuring Windows 7 Objectives: 101. Perform a clean installation. This objective may include but is not limited to: o Identifying hardware requirements Lecture Focus Questions: What are the different editions of Windows 7? Which editions would allow you to create a HomeGroup or join a HomeGroup? What is the difference between the Ultimate edition and the Enterprise edition? What is the difference between a Professional edition and a Professional N edition? Video/Demo 1.1.1 Windows 7 Versions Time 5:13 Number of Exam Questions 3 questions Time About 15 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 5 Section 1.2: Windows 7 Installation Summary In this section students will learn about Windows 7 installation methods and sources. Concepts covered include: Windows 7 installation methods: o Clean (Custom) o Upgrade (In-place) o Migration Windows 7 installation sources: o DVD o USB o Network o Windows Deployment Services (WDS) After finishing this section, students should be able to complete the following tasks: Copy Windows 7 installation files to a USB flash device. Perform a Windows 7 installation using a USB flash device. Configuring Windows 7 Objectives: 101. Perform a clean installation. This objective may include but is not limited to: o Identifying hardware requirements o Setting up as the sole operating system o Setting up as dual boot; installation methods o Boot from the source of installation, preparing the installation source: USB, CD, network share, WDS Lecture Focus Questions: Under which circumstances should you choose a clean installation of Windows 7? What is the advantage of a dual-boot system? When would you choose an upgrade rather than a clean installation of Windows 7? What are the requirements of a USB flash storage device before it can be an installation source? In which environment would you use Windows Deployment Services (WDS)? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 6 Video/Demo Time 1.2.1 Installation Types and Sources 6:25 1.2.2 Creating a USB Installation Source 4:03 Total 10:28 Number of Exam Questions 9 questions Time About 25 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 7 Section 1.3: Upgrade Summary This section examines details about upgrading to Windows 7. Concepts covered include: Types of upgrades o Intra-edition Upgrade o Previous Windows Version Upgrade Upgrade considerations: o License key is required o Cross-architecture upgrades are not supported o Use the Upgrade Advisor to evaluate a computer’s readiness After finishing this section, students should be able to complete the following tasks: Run the Windows 7 Upgrade Advisor tool to determine the computer's hardware readiness for Windows 7. Perform an upgrade from Windows Vista to Windows 7. Configuring Windows 7 Objectives: 102. Upgrade to Windows 7 from previous versions of Windows. This objective may include but is not limited to: o Upgrading from Windows Vista o Migrating from Windows XP o Upgrading from one edition of Windows 7 to another edition of Windows 7 Lecture Focus Questions: You have Windows 7 Professional installed. Which editions of Windows 7 support an upgrade from your current system? You have Windows 7 Home Premium installed. You would like the system to run the Home Basic edition. How would you make the change? When upgrading to Windows 7, what are the tasks you should complete prior to running the setup program? How does the Windows 7 Upgrade Advisor tool simplify the process of upgrading Windows 7 to a different edition? Under what circumstances must you perform an clean installation instead of an upgrade installation? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 8 Video/Demo Time 1.3.1 Upgrade Overview 4:10 1.3.2 Upgrading from Vista 4:56 Total 9:06 Number of Exam Questions 9 questions Time About 20 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 9 Section 1.4: User Profile and Data Migration Summary This section provides information about the role of migration to preserve user profile data and settings. Concepts covered include: Types of migration: o Side-by-side o Wipe-and-load Migration tools: o Windows Easy Transfer (WET) o User State Migration Tool (USMT) Location of files when you install over Windows XP and Vista: o Shared files and folders o Profile-specific files and folders o Installed programs o Windows settings and preference After finishing this section, students should be able to complete the following tasks: Use USMT to migrate user settings and profile information from a Windows XP computer to a Windows 7 installation. On the source computer run Scanstate to save the migration user accounts to a network share. On the destination computer run Loadstate to import user migration information from a network share. Configuring Windows 7 Objectives: 103. Migrate user profiles. This objective may include but is not limited to: o Migrating from one machine to another o Migrating from previous versions of Windows o Side-by-side vs. wipe and load Lecture Focus Questions: What are the main differences between a side-by-side migration and a wipe-andload migration? What types of files and data are moved during a migration? How can you save user data during a migration? When would you choose to perform a migration using the Windows Easy Transfer (WET) over the User State Migration Tool (USMT)? What are the transfer methods available when using WET to save user files? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 10 What are the different kinds of migration stores supported by USMT? What scanstate.exe command moves Windows XP user data files during a hardlink migration? Video/Demo Time 1.4.1 User Profile and Data Migration 10:57 1.4.2 Using WET 8:59 1.4.3 Using USMT 6:17 Total 26:13 Number of Exam Questions 11 questions Time About 35 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 11 Section 1.5: Domain Networking Summary This section discusses the basics about using domains. Concepts covered include: The Active Directory structure: o Domains o Objects o Attributes o Organizational units o Generic container objects Applying Group Policy settings Group Policy object categories: o Computer Configuration o User Configuration Common GPOs settings: o Account Policies o Local Policies/Audit Policy o Local Policies/User Rights Assignments o Local Policies/Security Options o Registry o File System o Software Restriction Policies o Administrative Templates Lecture Focus Questions: How would you configure security settings for all the users in a domain? Which editions of Windows 7 can join a domain? When there is a conflict between the local and domain configuration settings, which setting takes precedence? Number of Exam Questions 2 questions Time About 10 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 12 Section 2.1: System Images Overview Summary This section provides an overview of capturing a system image. Concepts covered include: The role of the system images. Windows Automated Installation Kit (Windows AIK) tools: o Windows Preinstallation Environment (Windows PE) o Windows System Image Manager (Windows SIM) o System Preparation Tool (Sysprep) o ImageX o Oscdimg Types of computers required for preparing a system image: o Reference computer o Technician computer Configuring Windows 7 Objectives: 201. Capture a system image. Lecture Focus Questions: What are the advantages of using a system image to install Windows 7 to computers? What is the file extension of a Windows 7 system image file? How do you create an answer file for an automated installation? Which tools does the Windows Automated Installation Kit include to prepare or create a system image? Video/Demo 2.1.1 System Images Overview Time 3:50 Number of Exam Questions 1 question Time About 10 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 13 Section 2.2: Image Preparation Summary This section examines details about preparing a system to capture a system image. Concepts covered include: Windows installation configuration passes: o windowsPE o offlineServicing o specialize o oobeSystem Additional configuration passes: o generalize o auditSystem o auditUser Methods to run Windows Setup: o Interactive (attended) o Automated (unattended) The role of Windows SIM Steps to create an answer file Considerations when using an answer file for automated installation Using the System Preparation Tool (Sysprep) to configure new installations of Windows. Sysprep switches to manage system images and Windows installation process: o /audit o /generalize o /oobe o /shutdown o /reboot o /quiet o /quit o /unattend Considerations when using Sysprep The process to create, prepare, and deploy a Windows installation image After finishing this section, students should be able to complete the following tasks: Use Windows SIM to create an answer file. Configure properties and components of the answer file to increase the automation of the installation and setup. Use Sysprep to prepare an installation before it is captured. ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 14 Configuring Windows 7 Objectives: 201. Capture a system image. This objective may include but is not limited to: o Preparing system for capture Lecture Focus Questions: What role does the Windows System Image Manager (Windows SIM) perform in image preparation? What is the purpose of the Sysprep? What privileges are required to execute Sysprep? Which Sysprep switch allows a user to remove all machine-specific information from an installation? What is the out-of-box experience mode? Video/Demo Time 2.2.1 Automated Installations 3:22 2.2.4 Creating an Answer File 6:08 2.2.5 Image Preparation 2:46 Total 12:16 Number of Exam Questions 9 questions Time About 40 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 15 Section 2.3: Image Capture Summary This section discusses tools and steps to capture a system image. Concepts covered include: Windows PE o The role of Windows PE o Steps to create a bootable Windows PE disc for capturing system images ImageX o The role of ImageX o Using a Wimscript.ini configuration file to exclude specific files during the ImageX capture operation ImageX options: o /capture o /config o /compress o /split o /apply o /apply /ref o /verify Steps to capture the reference computer’s Windows 7 installation onto a network share After finishing this section, students should be able to complete the following tasks: Create a Windows 7 PE boot disk. Use ImageX to capture a Windows 7 installation. Configuring Windows 7 Objectives: 201. Capture a system image. This objective may include but is not limited to: o Preparing system for capture o Creating a WIM file o Automated capture o Manual capture Lecture Focus Questions: Which tool would you use to create a bootable Windows PE disc? What are the boot sources for Windows PE? Which tool is used to create an image from a reference computer? What is the purpose of the exclusion exception section of the Wimscript.ini file? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 16 Which imagex.exe switch checks for errors and file duplication after capturing the installation? Video/Demo Time 2.3.1 Image Capture 3:10 2.3.2 Capturing System Images 10:25 Total 13:35 Number of Exam Questions 4 questions Time About 25 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 17 Section 2.4: Manual Image Deployment Summary In this section students will explore the process to manually deploy an image from a network share. Details about the following concepts will be covered: Tools to manually deploy an image from a network share: o Diskpart o ImageX Steps to deploying a system image from a network share. After finishing this section, students should be able to complete the following tasks: Manually deploy an image onto a local computer? Configuring Windows 7 Objectives: 203. Deploy a system image. This objective may include but is not limited to: o Manually deploying a customized image Lecture Focus Questions: What tools would you use to manually deploy an image from a network share? Why should you create two partitions on a hard drive prior to installing the image? What command at the command prompt connects a network share and maps the drive with a letter? What is the purpose of BCDBoot when deploying an image to the local hard drive? Video/Demo 2.4.1 Deploying Images with ImageX Time 2:40 Number of Exam Questions 3 questions Time About 10 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 18 Section 2.5: Image Servicing Summary This section examines the basics of deploying a system image. Concepts covered include: The role of image servicing Tools to service an image: o Deployment Image Servicing and Management (DISM) o ImageX Components of the system image: o Drivers o Windows applications and application patches o Windows security updates and features o International settings o Windows editions After finishing this section, students should be able to complete the following tasks: Use ImageX to mount an image, make and save changes to the image, and dismount the image. Use DISM to mount an image, make changes to the image, gather information about the image, and dismount the image. Configuring Windows 7 Objectives: 202. Prepare a system image for deployment. This objective may include but is not limited to: o Inserting an application into a system image o Inserting a driver into a system image o Inserting an update into a system image o Configuring tasks to run after deployment Lecture Focus Questions: When would you choose to use ImageX over DISM to mount an image? When using DISM, how do you save changes before dismounting an image? How do you mount a read-write image with ImageX? What is the difference between an online image and an offline image? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 19 Video/Demo Time 2.5.1 Image Servicing 4:01 2.5.2 Mounting and Unmounting Images 9:45 2.5.4 Image Servicing with DISM 8:08 2.5.5 Changing Image Settings and Drivers 6:04 2.5.6 Applying Updates to Images 3:33 Total 31:31 Number of Exam Questions 9 questions Time About 45 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 20 Section 2.6: Virtual Hard Disk (VHD) Summary In this section students will learn about creating and configuring a Virtual Hard Disk (VHD). Concepts covered include: The role of a Virtual Hard Drive (VHD) Actions to perform with a VHD file: o Create a new VHD o Attach (mount) the VHD o Detach (dismount) the VHD o Compact (reduce) the size of a VHD o Expand (increase) the maximum size available in a VHD Tools to create and manage VHD files: o Disk Management MMC o DiskPart o WIM2VHD o BCDEdit VHD considerations: o Native-boot VHD o Applying a WIM file to a VHD o Installing Windows 7 to a VHD o Using Offline servicing to make changes to a Windows image After finishing this section, students should be able to complete the following tasks: Create a VHD file and apply a Windows image to the file. Install Windows 7 to a VHD file. Configure a computer to boot from the VHD file. Configuring Windows 7 Objectives: 204. Configure a VHD. This objective may include but is not limited to: o Creating, deploying, booting, mounting, and updating VHDs o Offline updates o Offline servicing Lecture Focus Questions: What is the difference between a Virtual Hard Drive (VHD) and a standard Hard Disk Drive (HDD)? What are the advantages of using a VHD for Windows 7 installations? What is the difference between a fixed disk VHD file and a dynamically expanding VHD file? Which utilities would you use to create, manage and mount VHD files? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 21 What is a native-boot VHD? Which editions of Windows 7 support a native-boot VHD? Video/Demo Time 2.6.1 Virtual Hard Disk (VHD) 5:47 2.6.2 Creating VHD Image Installations 12:43 2.6.3 Installations Windows 7 on a VHD 4:16 Total 22:46 Lab/Activity Create a VHD Number of Exam Questions 15 questions Time About 40 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 22 Section 2.7: Domain Image Deployment Summary This section discusses methods for deploying a system image. Concepts covered include: The role of Microsoft Deployment Toolkit (MDT 2010) o Distribution methods: Lite Touch Installation (LTI) Zero Touch Installation (ZTI) o MDT 2010 Deployment Workbench areas to manage and distribute Windows 7 images: Distribution share Task sequences Deployment point The role of Windows Deployment Services (WDS): o Types of WDS images Install image Boot image Capture boot image Discover boot image o WDS unattend files: Windows Deployment Services client unattend file Image unattend file o Transmission methods to deploy images: Unicast Multicast o Scheduled casting o Managing and maintaining WDS from the command line. After finishing this section, students should be able to complete the following tasks: Use WDS to create an installation and boot image. Image a computer with a Windows 7 Enterprise image. Configuring Windows 7 Objectives: 203. Deploy a system image. This objective may include but is not limited to: o Automated deployment methods Lecture Focus Questions: What is the role of the Microsoft Deployment Toolkit (MDT)? What is the difference between the Lite Touch Installation and Zero Touch Installation MDT distribution methods? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 23 What are the main areas of the MDT 2010 Deployment Workbench that are used to manage and distribute Windows 7 images? What are the differences between the MDT and Windows Deployment Services (WDS)? What are the four different types of WDS images that are used during installation? Video/Demo Time 2.7.1 Microsoft Deployment Toolkit (MDT) 4:07 2.7.3 Windows Deployment Services (WDS) 4:46 2.7.4 Deploying Images with WDS 4:40 Total 13:33 Number of Exam Questions 10 questions Time About 30 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 24 Section 3.1: Devices and Drivers Summary This section provides an overview of configuring devices and drivers. Details about the following are presented: Device drivers o Automatic driver updates o Windows 7 driver store o Driver staging o Digital signatures Device driver configuration and troubleshooting details o Guidelines to install new hardware following a Windows 7 installation o 32-bit drivers vs. 64-bit operating systems o Tools to configure and troubleshoot device drivers: Device Manager Devices and Printer PnPUtil Group Policy settings System Information (Msinfo32) Reliability Monitor Driver Verifier Monitor Driver Query Signature Verification DirectX Diagnostic After finishing this section, students should be able to complete the following tasks: Use the PnPUtil tool to stage a driver or remove a driver in the driver store. Use Device Manager to enable and disable devices, and roll back or install device drivers. Use Group Policy to manage and maintain drivers. Configuring Windows 7 Objectives: 301. Configure devices. This objective may include but is not limited to: o Updating, disabling, and uninstalling drivers o Signed drivers o Conflicts between drivers o Configuring driver settings o Resolving problem device driver ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 25 704. Configure performance settings. This objective may include but is not limited to: o Updated drivers Lecture Focus Questions: What does it mean to stage a driver? What are the advantages of placing drivers in the driver store? What does Windows do when it cannot find a driver in the driver store? How can you be assured that a driver is stable and reliable? What tool lists drivers on the computer which do not have a digital signature? Which tool will troubleshoot problems with printers? Video/Demo Time 3.1.1 Device and Driver Configuration 7:01 3.1.3 Managing Devices 8:15 3.1.4 Staging a Driver 5:08 Total 20:24 Lab/Activity Manage Devices 1 Manage Devices 2 Number of Exam Questions 16 questions Time About 40 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 26 Section 3.2: Disk Partitions and Volumes Summary This section discusses managing disk partitions and volumes. Details about the following are covered: The role of a partition o Partitioning schemes: Master Boot Record (MBR) Globally unique identifier (GUID) Partition Table (GPT) The role of a volume o Disk types Basic Dynamic Considerations when managing partitions and volumes o Partitioning a hard disk o Formatting o Converting a basic disk to a dynamic disk o Resizing a volume o Managing disks using diskpart o Using a mount point After finishing this section, students should be able to complete the following tasks: Use Diskpart to create and resize a volume. Use Disk Management to create simple, spanned, striped, and mirrored volumes. Configuring Windows 7 Objectives: 702. Manage disks. This objective may include but is not limited to: o Managing disk volumes o RAID Lecture Focus Questions: In which circumstances do you need multiple partitions on a single disk? What is the difference between the Globally Unique Identifier (GUID) Partition Table (GPT) and the Master Boot Record (MBR) partitioning schemes? What is the difference between a partition and a volume? When working with volumes, when would you choose a basic disk over a dynamic disk? Which details should you consider when converting from a dynamic disk to a basic disk? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 27 Video/Demo Time 3.2.1 Disk Partitions and Volumes 9:16 3.2.2 Creating and Resizing Volumes 8:56 Total 18:12 Lab/Activity Create Volumes Add Space to an Existing Volume Resize Existing Volumes Number of Exam Questions 11 questions Time About 45 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 28 Section 3.3: Disk Optimization Summary This section discusses methods for optimizing a disk drive. Methods covered include: Disk Cleanup Disk Defragmenter Check Disk Quotas After finishing this section, students should be able to complete the following tasks: Defragment the files on a disk to optimize the performance of the disk. Create a soft quota to warn the administrator when a user exceeds a specified amount of disk space. Configuring Windows 7 Objectives: 702. Manage Disks. This objective may include but is not limited to: o Managing disk volumes o Managing file system fragmentation Lecture Focus Questions: How does the Disk Defragmenter optimize the performance of a hard drive? What kind of functions does the Disk Cleanup utility perform? How can you delete restore points with the Disk Cleanup utility? What does Check Disk attempt to do with orphaned files? How can you monitor and restrict disk usage by users? What is the difference between a hard quota and a soft quota? Video/Demo Time 3.3.1 Disk Optimization 5:12 3.3.2 Configuring Defragmentation and Disk Quotas 3:48 Total 9:00 Lab/Activity Perform Disk Maintenance Enable Disk Quotas ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 29 Number of Exam Questions 3 questions Time About 25 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 30 Section 3.4: Removable Storage Summary This section discusses policies to manage removable storage. Concepts covered include: Categories and policies available in Removable Storage Access policies in Group Policy: o Policies to control access for CDs and DVDs, floppy drives, and removable disks o Custom Classes policies o Windows Portable Devices (WPD) policies o All Removable Storage Classes: Deny all access o All Removable Storage Classes: Allow direct access in remote sessions o Time (in seconds) to force reboot After finishing this section, students should be able to complete the following tasks: Use Group Policy to manage removable media permissions. Configuring Windows 7 Objectives: 702. Manage disks. This objective may include but is not limited to: o Removable device policies Lecture Focus Questions: How can you prohibit the removal of sensitive data from the network? When would you use a Custom Classes policy? How can you immediately enforce removable media settings in Group Policy? Video/Demo 3.4.1 Removable Storage Policies Time 1:11 Number of Exam Questions 1 question Time About 5 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 31 Section 3.5: Application Compatibility Summary This section explores tools to solve application compatibility problems with Windows 7. Details covered include: Program Compatibility Application Compatibility Toolkit (ACT) Windows XP mode After finishing this section, students should be able to complete the following tasks: Use the Program Compatibility Troubleshooter utility to handle application compatibility issues. Manually configure the compatibility mode in the properties of an application. Configuring Windows 7 Objectives: 302. Configure application compatibility. This objective may include but is not limited to: o Setting compatibility mode o Implementing shims Lecture Focus Questions: What are the requirements for Windows XP Mode? What must you do to use Windows XP Mode? What tools are available to solve application compatibility problems with Windows 7? What is the best long-term application compatibility solution? Which program compatibility feature should you use for incompatible programs known by Windows 7? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 32 Video/Demo 3.5.1 Application Compatibility Time 11:12 3.5.2 Using the Program Compatibility Troubleshooter 3:33 Total 14:45 Lab/Activity Configure Application Compatibility Number of Exam Questions 5 questions Time About 30 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 33 Section 3.6: User Account Control (UAC) Summary This section explores protecting the system configuration using the User Account Control (UAC). Details covered include: The role of User Account Control (UAC) The default behavior of UAC UAC notification level settings: o Always notify o Notify me only when programs try to make changes to my computer o Notify me only when programs try to make changes to my computer (do not dim the desktop) o Never notify UAC settings that can be controlled through Group Policy: o Run all administrators in Admin Approval Mode o Behavior of the elevation prompt for Standard Users o Behavior of the elevation prompt for administrators in Admin Approval Mode o Admin Approval Mode for the Built-in Administrator account o Switch to the secure desktop when prompting for elevation o Detect application installations and prompt for elevation o Only elevate executables that are signed and validated o Only elevate UIAccess applications that are installed in secure locations o Allow UIAccess applications to prompt for elevation without using secure desktop o Virtualizes file and registry write failures to per-user locations After finishing this section, students should be able to complete the following tasks: Manage Secure Desktop and UAC notification levels. Configuring Windows 7 Objectives: 503. Configure user account control (UAC). This objective may include but is not limited to: o Configuring local security policy o Configuring admin vs. standard UAC prompt behaviors o Configuring Secure Desktop Lecture Focus Questions: What is the recommended UAC notification level setting? How does the UAC control the type of actions that a user can perform on the system? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 34 How does privilege elevation work? What is purpose of Secure Desktop? How would you identify when Secure Desktop is activated? Under which circumstances would you use Group Policy to configure UAC settings? Video/Demo Time 3.6.1 User Account Control (UAC) 5:36 3.6.2 Configuring UAC Settings 3:36 Total 9:12 Lab/Activity Configure UAC Settings 1 Configure UAC Settings 2 Number of Exam Questions 6 questions Time About 35 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 35 Section 3.7: Internet Options Summary This section explores facts about using Internet options to configure settings for Internet Explorer. Details covered include: Internet Explorer 8 (IE 8) tools IE 8 tabs IE 8 security zones default settings: o Security level o Protected mode IE security zones: o Local intranet o Trusted o Restricted o Internet Modifying zone membership The role of certificates Certificate Authority (CA) o Root CA o Subordinate CA o Standalone CA Certificates that Internet Explorer tracks After finishing this section, students should be able to complete the following tasks: Configure advanced security settings, zone membership, and privacy settings for IE. Configuring Windows 7 Objectives: 304. Configure Internet Explorer. This objective may include but is not limited to: o Configuring security settings o Certificates for secure Web sites Lecture Focus Questions: What are the different kinds of security zones? What is the difference between the default security level and the default protected mode assigned to security zones? What is the difference between a root CA and a subordinate CA? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 36 Video/Demo Time 3.7.1 Internet Options 4:40 3.7.2 Configuring Internet Options 4:06 Total 8:46 Lab/Activity Modify Zone Memberships Configure Privacy Settings Configure Advanced Security Settings Number of Exam Questions 6 questions Time About 40 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 37 Section 3.8: Internet Explorer (IE) 8 Summary This section explores facts about enhancing security, access, and compatibility with IE 8 features. Details covered include: InPrivate Mode features: o InPrivate Browsing o InPrivate Filtering Features which enhance Internet Explorer security: o Delete Browsing History o AutoComplete o SmartScreen Filter o Cross-Site Scripting Filter o Data Execution Prevention o Content Advisor o Advanced Settings The role of Compatibility View Components to configure the Compatibility View: o Compatibility View button o Compatibility View Settings o Group Policy Managing Internet Explorer Add-ons: o Toolbars and extension o Search providers o Accelerators o InPrivate Filtering Considerations when configuring the Manage Add-on console: o Storage of add-on functionality o Disabling an add-on o Deleting an add-on After finishing this section, students should be able to complete the following tasks: Use InPrivate Mode to protect privacy. Use accelerators to quickly access, share, search, translate or obtain additional information about a topic. Add additional accelerators to provide additional functionality. Configure Compatibility View. Configuring Windows 7 Objectives: 302. Configure application compatibility. This objective may include but is not limited to: ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 38 o Compatibility issues with Internet Explorer 304. Configure Internet Explorer. This objective may include but is not limited to: o Configuring compatibility view o Configuring security settings o Configuring providers o Managing add-ons o Controlling InPrivate mode Lecture Focus Questions: How does the SmartScreen Filter detect phishing Web sites and Web sites that dispense malware? What is the difference between how the InPrivate Mode features protect a user's privacy? When would you choose to disable an add-on? What function does the Compatibility View provide for users? How can you clear previously-saved passwords saved in Internet Explorer? Video/Demo Time 3.8.1 Internet Explorer Security 7:09 3.8.4 Compatibility View and Add-ons 4:46 3.8.7 Using IE 8 Features 9:38 Total 21:33 Number of Exam Questions 10 questions Time About 45 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 39 Section 3.9: Application Restriction Summary This section discusses methods to configure application restriction policies to limit and restrict the applications that users can run. Details covered include: The role of software restriction policies o Application restriction rules: Hash Certificate Path Network Zone Default o Conflicting rules o Enforcement policies options o Enabling certificate rules o Extensions Advantages of AppLocker policies AppLocker rule types: o Executable o Windows Installer o Script o DLL Conditions for AppLocker rules: o Publisher o Path o Hash AppLocker considerations: o AppLocker rules vs software restriction policies o Soft-enforcement mode o AppLocker event log contents After finishing this section, students should be able to complete the following tasks: Configure a local software restriction policy for a specific user. Create a path rule for an application. Create a hash rule to create software restrictions. Configuring Windows 7 Objectives: 303. Configure application restrictions. This objective may include but is not limited to: o Setting software restriction policies o Setting application control policies ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 40 o Setting through group policy or local security policy Lecture Focus Questions: How are software restriction policies managed, and in what order are they applied? How does a hash rule identify one application from another? Does the same hash value always apply after the application receives a software update? What are the advantages of using AppLocker over software restriction policies? If software restriction policies and AppLocker policies are configured on the same object, which rules take precedence? Video/Demo Time 3.9.1 Application Restriction Overview 1:38 3.9.2 Software Restriction Policies 7:06 3.9.3 Implementing Software Restriction Policies 12:08 3.9.5 AppLocker 7:19 3.9.6 Implementing AppLocker 5:33 Total 33:44 Number of Exam Questions 8 questions Time About 50 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 41 Section 4.1: IPv4 Summary This section provides an overview of IPv4 addresses. Concepts covered include: IPv4 addresses: o 32-bit binary number o Converting from binary to decimal o Subnet mask o Default class for IPv4 address ranges A B C D E o Networking services: Dynamic Host Configuration Protocol (DHCP) Domain Name System (DNS) Network Address Translation (NAT) o IPv4 address considerations Subnetting o The role of subnetting o Custom subnet masks o Classless addressing o Classless Inter-Domain Routing (CIDR) o Calculating if workstations are on the same subnetworks Configuring Windows 7 Objectives: 401. Configure IPv4 network settings. This objective may include but is not limited to: o Connecting to a network o Configuring name resolution o Setting up a connection for a network o Network locations o Resolving connectivity issues o APIPA Lecture Focus Questions: What is the function of the subnet mask? How can you divide a large network into smaller networks? What does the Classless Inter-Domain Routing (CIDR) notation represent? What does it mean if a Windows client has an IP address of 169.254.0.3 with the subnet mask of 255.255.0.0? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 42 What is the advantage of using NAT? How can you determine if individual computers are on the same network? How do Windows 7 clients resolve host names to IP addresses? Video/Demo Time 4.1.1 IPv4 Addresses 10:58 4.1.3 IPv4 Subnetting 6:35 Total 17:33 Time About 30 minutes Number of Exam Questions 3 questions ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 43 Section 4.2: IPv6 Summary This section provides an overview of IPv6 addresses. Concepts covered include: IPv6 features: o Address space o Header improvements o Route aggregation o Built-in security features o Built-in Quality of Service (QoS) o Neighbor Discovery (ND) o Geographic assignment of addresses IPv6 address o 128-bit binary number (32 hexadecimal numbers, organized into 8 quartets) Prefix Interface ID o Types of addresses: Reserved Unicast Multicast Anycast Loopback Unspecified o Addressing methods for implementingIPv6: IPv4-mapped address Tunneling IPv4-compatible address Intra-site Automatic Tunnel Addressing Protocol (ISATAP) 6-to-4 Teredo tunneling Configuring Windows 7 Objectives: 402. Configure IPv6 network settings. This objective may include but is not limited to: o Configuring name resolution o Connecting to a network o Setting up a connection for a network o Network locations o Resolving connectivity issues o Link local multicast name resolution ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 44 Lecture Focus Questions: Why does IPv6 not require the NAT and PAT networking services? What portion of an IPv6 address represents the prefix, and which portion represents the interface ID? What is the difference between a link-local and a unique local unicast address? What is the difference between a unicast address and an anycast address? When implementing IPv6, which transition methods incorporate an IPv4 address? Video/Demo Time 4.2.1 IPv6 Features 3:19 4.2.3 IPv6 Addresses 4:29 4.2.5 IPv6 Implementations 2:59 Total 10:47 Number of Exam Questions 4 questions Time About 25 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 45 Section 4.3: IP Address Configuration Summary This section provides information about configuring IPv4 and IPv6 addresses. Concepts covered include: Methods to assign IPv4 addresses and other IPv4 configuration values: o Dynamic Host Configuration Protocol (DHCP) o Static (manual) assignment o Automatic Private IPv4 Addressing (APIPA) o Alternate IPv4 configuration Methods to configure an IPv6 address: o Static full assignment o Static partial assignment o Stateless autoconfiguration o DHCPv6 Tools to troubleshoot network problems: o Event Viewer o Windows Network Diagnostics o ipconfig o ping o tracert o pathping o Unified tracing o nslookup o netstat o netsh o Network and Sharing Center After finishing this section, students should be able to complete the following tasks: Use netsh to create a firewall rule to allow inbound and outbound ICMP traffic. Configure a computer with a static address. Use ipconfig and ping to gather information and test the TCP/IP connection of a computer. Configure an IPv4-compatible address while transitioning to IPv6. Configuring Windows 7 Objectives: 401. Configure IPv4 network settings. This objective may include but is not limited to: o Connecting to a network o Configuring name resolution o Setting up a connection for a network ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 46 o Network locations o Resolving connectivity issues o APIPA 402. Configure IPv6 network settings. This objective may include but is not limited to: o Configuring name resolution o Connecting to a network o Setting up a connection for a network o Network locations o Resolving connectivity issues Lecture Focus Questions: When would you choose to manually assign IPv4 configuration values for a network adapter? How is IP addressing different for APIPA versus DHCP? When would you choose to use DHCP to assign IP addresses? When using IPv6 stateless autoconfiguration, how do the clients learn the addresses of other clients on the network? What is the difference between the two modes of DHCPv6? Video/Demo Time 4.3.1 IP Address Configuration 2:14 4.3.4 TCP/IP Troubleshooting Tools 4:05 4.3.5 Configuring and Troubleshooting IPv4 6:43 4.3.7 Configuring and Troubleshooting IPv6 6:48 Total 19:60 Lab/Activity Configure IPv4 Settings Configure IPv6 Settings. Number of Exam Questions 14 questions Time About 50 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 47 Section 4.4: Internet Connection Sharing (ICS) Summary This section provides information about configuring Internet Connection Sharing (ICS) to share network access with other network users through a computer’s Internet connection. Concepts covered include: Tasks to configure ICS o Configuring the ICS host o Configuring the ICS clients Considerations when using ICS After finishing this section, students should be able to complete the following tasks: Configure an ICS host. Configuring Windows 7 Objectives: 403. Configure networking settings. This objective may include but is not limited to: o Configuring network adapters Lecture Focus Questions: What are the advantages of using ICS in a small network? What are the differences between an ICS host and an ICS client? How many network adapters are required before you can implement ICS? Which network adapter on the ICS host will have 192.168.137.1 as the IP address? Video/Demo 4.4.1 Configuring ICS Time 5:18 Lab/Activity Configure ICS Number of Exam Questions 1 question Time About 10 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 48 Section 4.5: Wireless Networking Summary This section provides the following information about configuring wireless networking: Wireless networking architecture: o Devices o Connection Method Ad hoc Infrastructure o SSID (Service Set Identifier) Wireless networking standards Technologies to improve speed or the distance of wireless transmissions: o Multiple Input Multiple Output (MIMO) o Channel bonding Considerations for wireless networks Methods to authenticate wireless networks: o Open o Shared key o 802.1x Standards to provide security for wireless networking: o Wired Equivalent Privacy (WEP) o Wi-Fi Protected Access (WPA) o Wi-Fi Protected Access 2 (WPA2) or 802.11i Practices to provide a level of security: o Change the administrator account name and password o Change SSID from defaults o Update the firmware o Enable the firewall on the access point o Disable DHCP o Enable MAC address filtering Connecting to a wireless network: o SSID o Wireless network icon in the System Tray o Profiles o Manually creating a network profile o Ad-hoc connections o Using netsh wlan to configure wireless connections at the command prompt Considerations for wireless connections o Incorrect configuration o Range and obstructions o Access point placement o Channel interference o Automatic switching (roaming) ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 49 After finishing this section, students should be able to complete the following tasks: Create and connect to an ad-hoc wireless network. Manually connect to a network whose SSID is not being broadcast. Create and save a wireless profile. Configuring Windows 7 Objectives: 403. Configure networking settings. This objective may include but is not limited to: o Adding a physically connected (wired) or wireless device o Connecting to a wireless network o Configuring security settings on the client o Set preferred wireless networks o Configuring network adapters Lecture Focus Questions: What type of devices are used in a wireless network? When should you use an ad-hoc wireless network? How does channel bonding increase the performance of wireless transmissions? How does 802.1x provide greater authentication security than other authentication methods? What types of settings does a wireless profile contain? What is the primary reason not to use WPA2 to secure a wireless network? Video/Demo Time 4.5.1 Wireless Networking 8:54 4.5.4 Managing Wireless Connections 9:59 4.5.8 Wireless Network Troubleshooting 2:52 Total 19:60 Lab/Activity Connect to a Wireless Network Configure a Wireless Profile Number of Exam Questions 8 questions Time About 55 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 50 Section 4.6: Windows Firewall Summary In this section students will learn details about configuring Windows Firewall and Windows Firewall with Advanced Security (WFAS) to protect a system by controlling all traffic through a computer’s network interfaces. Windows Firewall o The role of Windows Firewall o Configure basic settings using the Windows Firewall utility o Network Location Awareness Profile types Domain Home or Work Public o Default responses to outbound and inbound traffic o Firewall exceptions Windows Firewall with Advanced Security (WFAS) o Rule Types: Program Port Predefined Custom o Connection security rules types: Isolation Authentication exemption Server-to-server Tunnel Custom o Action options for rules: Allow the connection Block the connection Allow the connection if it is secure o Options for network profiles: Firewall state Inbound connections Outbound connections o Configure exceptions based on the port, protocol, or application o Manage firewall settings with the netsh advfirewall command o Edge traversal After finishing this section, students should be able to complete the following tasks: Configure the Windows Firewall to protect the computer from outside sources. ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 51 Create inbound and outbound rules using the Windows Firewall with Advanced Security (WFAS). Configuring Windows 7 Objectives: 404. Configure Windows Firewall. This objective may include but is not limited to: o Configuring rules for multiple profiles o Allowing or denying an application o Network-profile-specific rules o Configuring notifications o Configuring authenticated exceptions Lecture Focus Questions: How does Windows Firewall protect users from hackers, viruses, and worms? Why does Windows Firewall provide a list of predefined firewall exceptions? When would you choose to use Windows Firewall with Advanced Security (WFAS) over Windows Firewall? What type of connection security rule protects traffic based on IP addresses? Video/Demo Time 4.6.1 Windows Firewall 7:23 4.6.2 Configuring Windows Firewall 4:46 4.5.8 Windows Firewall with Advanced Security (WFAS) 6:42 4.6.6 Configuring WFAS 7:26 Total 26:17 Lab/Activity Configure the Windows Firewall Number of Exam Questions 10 questions Time About 45 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 52 Section 5.1: Authentication and Authorization Summary This section examines configuring Authentication and Authorization to control access to resources. Concepts discussed include: Authentication o The role of authentication o Authentication features: Kerberos v5 Windows NT LAN Manager (NTLM) Certificates Smart cards Biometrics Online identity integration o Multifactor authentication Authorization o Permission o Policy o Right o Built-in groups: Administrators Backup Operators Event Log Readers Network Configuration Operators Users Power Users Remote Desktop Users Tools to manage authentication: o Credential Manager o runas command o Account policies After finishing this section, students should be able to complete the following tasks: Use Credential Manager to save and manage usernames and passwords. Use Run As to run applications as an administrator or a secondary user. Configuring Windows 7 Objectives: 504. Configure authentication and authorization. This objective may include but is not limited to: o Resolving authentication issues o Configuring rights o Managing credentials ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 53 o o o o Managing certificates Smart cards with PIV Elevating user privileges Multifactor authentication Lecture Focus Questions: What is the difference between authentication and authorization? Why does the Power Users group exist as a built-in group for Windows 7? When considering authorization, what is the difference between a permission and a right? Under which circumstance is Credential Manager unnecessary? What is the difference between the account lockout duration and the account lockout threshold? How can you force users to create and use unique passwords? Video/Demo Time 5.1.1 Authentication and Authorization 5:50 5.1.4 Authentication Management 8:44 5.1.5 Using Credential Manager 4:56 5.1.6 Using Run As 7:12 5.1.7 Managing User Rights and Account Policies 5:42 Total 32:24 Lab/Activity Manage Account Policies Number of Exam Questions 8 questions Time About 55 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 54 Section 5.2: NTFS Permissions Summary This section provides an overview of using NTFS permissions to control access to files and folders. Concepts covered include: NTFS permissions for folders and files o Full control o Modify o Read & execute o List folder contents o Read o Write Access Control Entries (ACE) o Explicit permissions o Allow permission o Deny permission Applying permissions How permissions can be affected by copying or moving files with NTFS permissions Managing NTFS permissions from a command prompt Comparing special permissions to NTFS permissions Configuring special permissions After finishing this section, students should be able to complete the following tasks: Restrict access to files and folders using NTFS permissions. Apply Special Permissions to provide specific control over files and folders. Configuring Windows 7 Objectives: 502. Configure file and folder access. This objective may include but is not limited to: o Configuring NTFS permissions o Resolving effective permissions issues o Copying files vs. moving files. Lecture Focus Questions: What are the six standard NTFS permissions? How does an object receive explicit permissions versus inherited permissions? How are effective permissions determined? Which permissions take precedence when both share and NTFS permissions apply to a folder? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 55 How does copying or moving files with NTFS permissions affect the permissions on the file or folder? Video/Demo Time 5.2.1 Standard NTFS Permissions 9:31 5.2.2 Configuring Standard NTFS Permissions 7:34 5.2.5 Special Permissions 4:00 5.2.6 Configuring Special Permissions 5:03 Total 26:08 Lab/Activity Configure NTFS Permissions Number of Exam Questions 10 questions Time About 45 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 56 Section 5.3: Resource Sharing Summary This section explores sharing resources. Details discussed include: Location types identifying the type of network, settings and services: o Domain o Public o Home o Work Networking services for location types: o Network discovery o File and printer sharing o Public folder sharing o Media streaming o File sharing connections o Password protected sharing o HomeGroup connections Methods to control access to shared content: o Basic sharing o Advanced sharing o Public folder sharing Managing shared folders Managing libraries Sharing resources using HomeGroups After finishing this section, students should be able to complete the following tasks: Create a HomeGroup to share specific types of files with other computers running Windows 7. Join a HomeGroup to share a library of files. Create and secure a shared folder. Configuring Windows 7 Objectives: 501. Configure shared resources. This objective may include but is not limited to: o Folder virtualization o Shared folder permissions o Configuring HomeGroup settings Lecture Focus Questions: Under what circumstances would you choose to enable the Public Folder Sharing networking service? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 57 What are the differences between a domain, public, work and home network profile? When using public folder sharing, where are the public files located? How would you share individual files and folders within the HomeGroup? How can you create an administrative share? What is a library, and where are files physical located when displayed in a library? Video/Demo Time 5.3.1 Setting Advanced Sharing Options 2:57 5.3.3 Resource Sharing 6:42 5.3.4 Implementing Shared Folders 5:26 5.3.5 Implementing Libraries 6:32 5.3.7 Implementing HomeGroups 8:32 Total 30:09 Lab/Activity Share and Secure Folders Number of Exam Questions 17 questions Time About 55 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 58 Section 5.4: Printer Sharing and Management Summary In this section students will learn the basics of managing printer sharing. Concepts covered include: Sharing a printer Setting permissions on a printer: o Print o Manage printer o Manage documents Using the Print Management MMC snap-in Printer management features: o Client-Side Rendering (CSR) o Driver isolation o XML Paper Specification (XPS) o Windows Color System (WCS) o Location-aware printing After finishing this section, students should be able to complete the following tasks: Create and share a printer. Manage the default printer based on the location. Manage printer permissions. Configuring Windows 7 Objectives: 403. Configure networking settings. This objective may include but is not limited to: o Configuring location-aware printing 501. Configure shared resources. This objective may include but is not limited to: o Printers and queues Lecture Focus Questions: What is the difference between the manage printer and the manage document printer permissions? What are the functions of the Print Management MMC snap-in? When would you choose to isolate the print driver? How does Client-Side Rendering (CSR) reduce print processing times? What is the advantage of location-aware printing? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 59 Video/Demo Time 5.4.1 Printer Sharing and Management 6:47 5.4.2 Sharing and Managing Printers 4:52 Total 11:39 Lab/Activity Share a printer Configure Default Printer Number of Exam Questions 7 questions Time About 30 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 60 Section 5.5: Auditing Summary This section provides an overview of using auditing to monitoring system events. Concepts covered include: The role of auditing Common audit policies: o Account logon events o Logon events o Account management o Object access o Policy change o Privilege use o System events o Process tracking o Directory service access Considerations when configuring auditing After finishing this section, students should be able to complete the following tasks: Configure auditing to track the success and failure of specified actions of a user. Create a custom view to filter tasks and manage the audit results? Configuring Windows 7 Objectives: 604. Configure remote connections. This objective may include but is not limited to: o Advanced security auditing 703. Monitor systems. This objective may include but is not limited to: o Configuring event logging o Filtering event logs Lecture Focus Questions: What is the difference between account logon and logon audit policies? As the Administrator you have requested that all users change their passwords. What audit policy would verify that all the users have complied with the request? What policy would you use to audit failed attempts to view or modify registry settings? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 61 Video/Demo Time 5.5.1 Auditing 4:23 5.5.2 Configuring Auditing 7:36 Total 11:59 Number of Exam Questions 7 questions Time About 20 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 62 Section 5.6: Encryption Summary This section provides an overview of encrypting folders and files to protect data. Concepts covered include: Encrypting File System (EFS) o Requirements for EFS o Encryption and compression cannot be used at the same time o Managing encrypted files o Tools to restore, import, and export EFS keys to and from a Personal Information Exchange (PFX) file: Certificate Manager Console Manage File Encryption Certificates Cipher command-line tool After finishing this section, students should be able to complete the following tasks: Encrypt files and folders to protect data from unauthorized users. Back up the file encryption key. Create a Designated Recovery Agent (DRA). Configuring Windows 7 Objectives: 502. Configure file and folder access. This objective may include but is not limited to: o Encrypting files and folders by using EFS Lecture Focus Questions: Which Windows 7 editions support Encrypting File System (EFS)? Once a folder is encrypted, which users can access the data inside the folder? Which types of files cannot be encrypted? What NTFS permission must you have to encrypt a file? What is the purpose of a PFX file? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 63 Video/Demo Time 5.6.1 Encrypting Files System (EFS) 7:00 5.6.2 Implementing EFS 12:23 Total 19:23 Lab/Activity Encrypt Files Number of Exam Questions 10 questions Time About 35 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 64 Section 5.7: BranchCache Summary This section discusses configuring BranchCache to allow users in branch offices to quickly access information. Concepts covered include: The role of BranchCache BranchCache modes: o Hosted Cache o Distributed Cache Considerations when configuring auditing Elements to configure for BranchCache Tools to configure BranchCache: o netsh o Group Policy o Windows Firewall with Advance Security Configuring Windows 7 Objectives: 505. Configure BranchCache. This objective may include but is not limited to: o Distributed cache mode vs. hosted mode o Network infrastructure requirements o Configuring settings o Certificate management Lecture Focus Questions: Under which circumstances should you enable distributed cache mode versus hosted cache mode? How does BranchCache treat traffic while in transit? When would you choose to configure BranchCache using Group Policy rather than netsh? When BranchCache settings have been configured using both the netsh command and Group Policy, which settings take precedence? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 65 Video/Demo Time 5.7.1 BranchCache 4:56 5.7.3 BranchCache Configuration 6:48 5.7.4 Configuring BranchCache 2:25 Total 14:09 Number of Exam Questions 9 questions Time About 30 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 66 Section 6.1: Network Access Protection (NAP) Summary This section discusses using Network Access Protection (NAP) to regulate network access based on a computer’s compliance with health requirement policies. Details covered include: Components NAP uses: o NAP client o NAP server o Enforcement Server (ES) o Remediation server Configuring NAP Remediation Configuring Windows 7 Objectives: 604. Configure remote connections. This objective may include but is not limited to: o NAP quarantine remediation Lecture Focus Questions: How does NAP determine if a client is non-compliant with specific requirements? How does a remediation server help non-compliant clients become compliant? What is the difference between the role of the enforcement server and the NAP server? Video/Demo 6.1.1 Network Access Protection (NAP) Time 2:54 Number of Exam Questions 2 questions Time About 10 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 67 Section 6.2: Virtual Private Network (VPN) Summary This section explores configuring and managing a Virtual Private Network (VPN) to secure IP traffic as it travels across a TCP/IP network. Concepts covered include: The role of a Virtual Private Network (VPN) The benefits of VPNs VPN security technologies: o Point-to-Point Tunneling Protocol (PPTP) o Layer Two Tunneling Protocol (L2TP) o Internet Protocol Security (IPSec) o Secure Socket Tunneling Protocol (SSTP) o Internet Key Exchange version 2 (IKEv2) Considerations when managing VPN connections Remote Access Authentication Protocols: o Password Authentication Protocol (PAP) o Challenge Handshake Authentication Protocol (CHAP) o Microsoft Challenge Handshake authentication Protocol version2 (MSCHAPv2) o Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) After finishing this section, students should be able to complete the following tasks: Use the Network and Sharing Center to create a VPN connection. Configuring Windows 7 Objectives: 604. Configure remote connections. This objective may include but is not limited to: o Establishing VPN connections and authentication o Enabling a VPN reconnect Lecture Focus Questions: Under which circumstances would you use a VPN connection? What process does a VPN use to secure IP traffic over a TCP/IP network? What types of communications can be secured using IPSec? Which protocol is the default protocol used for new VPN connections in Windows 7? What benefits does VPN Reconnect provide over traditional VPN connections? Which Windows 7 editions support VPN Reconnect? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 68 Video/Demo Time 6.2.1 Virtual Private Network (VPN) 9:57 6.2.2 Creating a VPN Connection 2:09 Total 12:06 Lab/Activity Configure a VPN Connection Number of Exam Questions 7 questions Time About 30 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 69 Section 6.3: DirectAccess Summary This section provides students with details about using DirectAccess to allow Windows 7 clients to automatically connect to the corporate intranet through an Internet connection. Concepts covered include: The role of DirectAccess: o A typical VPN solution o Simultaneous access to both Internet and intranet resources o Details about DirectAccess o DirectAccess connection methods: Full enterprise network access (end-to-edge) Selected server access (modified end-to-edge) End-to-end o DirectAccess clients connecting to intranet resources o DirectAccess requirements: Infrastructure Server Client o Configuration details for DirectAccess components: Server Client side Configuring Windows 7 Objectives: 602. Configure DirectAccess. This objective may include but is not limited to: o Configuring client side o Configuring authentication o Network infrastructure requirements Lecture Focus Questions: What are the advantages of using DirectAccess to access corporate file servers? What is the difference between full enterprise network access and selected server access? What are the requirements for a DirectAccess client? How does the client's IP address configuration affect how the client sends traffic to the DirectAccess server? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 70 Video/Demo 6.3.1 DirectAccess Time 9:00 Time About 25 minutes Number of Exam Questions 7 questions ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 71 Section 6.4: BitLocker and BitLocker To Go Summary This section examines configuring and managing BitLocker and BitLocker To Go to protect against unauthorized data access. Concepts covered include: The role of BitLocker Components BitLocker uses: o BitLocker partition o Trusted Platform Module (TPM) o USB device o BIOS support Comparison of BitLocker and Encrypting File System (EFS) BitLocker configuration: o TPM owner password o Recovery key o PIN o Startup key o Data volume key o Data Recovery Agent BitLocker modes to determine the security level: o TPM-only o TPM with startup key o TPM with PIN o TPM with PIN and startup key o Without a TPM Configuring and managing BitLocker The role of BitLocker To Go Requirements for BitLocker To Go Policies that control BitLocker To Go: o Control use of BitLocker on removable dries o Configure use of smart cards on removable drives o Deny write access to removable drives not protected by BitLocker o Allow access to BitLocker-protected removable data drives from earlier version of Windows o Configure use of password for removable data drives o Choose how BitLocker-protected removable drives can be recovered Manage BitLocker and BitLocker To Go from the command line After finishing this section, students should be able to complete the following tasks: Generate recovery keys and create a BitLocker DRA. Configure BitLocker to implement BitLocker without a TPM. ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 72 Configure BitLocker To Go to deny write access to unauthorized USB flash devices. Configuring Windows 7 Objectives: 601. Configure BitLocker and BitLocker To Go. This objective may include but is not limited to: o Configuring BitLocker and BitLocker To Go policies o Managing Trusted Platform Module (TPM) PINs o Configuring startup key storage o Data recovery agent support Lecture Focus Questions: What is the difference between suspending protection and decrypting the drive? When implementing BitLocker, why is it a good idea to run a system check before encrypting the drive? What is the difference in function between BitLocker and BitLocker To Go? When using BitLocker what are the requirements of the Trusted Platform Module? How can you implement BitLocker without a TPM? What will happen when BitLocker is enabled but then you lose the USB flash device which holds the key? Which editions of Windows 7 allow read access to BitLocker To Go devices? Video/Demo Time 6.4.1 BitLocker 3:21 6.4.3 BitLocker Configuration 4:47 6.4.4 Configuring BitLocker Recovery Agents 4:08 6.4.5 Implementing BitLocker without a TPM 4:25 6.4.7 BitLocker To Go 4:05 6.4.8 Implementing BitLocker to Go 4:07 Total 24:53 Number of Exam Questions 13 questions Time About 45 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 73 Section 6.5: Mobility Options Summary This section provides information about configuring and managing options for mobile devices. Concepts covered include: Tools to manage and maintain Windows 7 mobile devices: o Power options o Mobility Center o Windows Mobile Device Center o Sync Center o Presentation settings Power Plans o Power saver plan o High performance plan o Balanced plan o Custom plans Components to configure Power Plans: o Require password on wakeup o Power buttons and lid o Hard disk o Wireless adapter settings o USB settings o Peripheral Component Interconnect (PCI) Express o Multimedia settings o Processor power management o Battery Power saving states: o Shut down o Sleep o Hibernation o Hybrid sleep Additional tools to configure power options: o Group Policy o powercfg Offline files o Offline file operating modes: Online Auto offline Manual offline Slow-link o Group Policy settings to configure offline file settings o Transparent caching o Controlling caching on a network share ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 74 o Managing Offline Files After finishing this section, students should be able to complete the following tasks: Configure Offline Files to allow users to access files and folders when they are disconnected from the network Use the Sync Center on a mobile device to resolve a conflict of an offline file? Use Power Plans to manage the power consumption of a mobile computer. Configuring Windows 7 Objectives: 603. Configure mobility options. This objective may include but is not limited to: o Configuring offline file policies o Transparent caching o Creating and migrating power policy 704. Configure performance settings. This objective may include but is not limited to: o Configuring power plans o Mobile computing performance issues Lecture Focus Questions: How does a power plan help to optimize the performance and conserve energy on a laptop? What types of settings can you configure using the Mobility Center for mobile devices? What is the process of transparent caching? What are the options for resolving a synchronization conflict? What are the differences between the sleep and the hybrid sleep power saving states? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 75 Video/Demo Time 6.5.1 Mobility Tools 2:30 6.5.3 Power Plans 6:56 6.5.4 Configuring Power Plans 6:20 6.5.8 Offline Files 8:10 6.5.9 Configuring Offline Files 6:57 Total 30:53 Lab/Activity Edit Power Options Create a Power Plan Number of Exam Questions 18 questions Time About 70 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 76 Section 7.1: Troubleshooting Tools Summary This section examines facts about the following Windows troubleshooting tools and utilities: Windows Memory Diagnostic Tool (WMDT) Windows Network Diagnostics Startup and Recovery options Startup Repair System Configuration Utility (Msconfig.exe) Services console (Services MMC snap-in) After finishing this section, students should be able to complete the following tasks: Use the Services Console to view and manage services, such as starting, stopping, pausing, and resuming. Use the Services Console to select the computer's response if the service fails or stops. Start and stop services from the command line. Use Misconfig to view all the items that are processed during the computer startup, and disable an item if needed. Use Msconfig to launch support tools for manage and maintain a system. Configuring Windows 7 Objectives: 703. Monitor systems. This objective may include but is not limited to: o Generating a system diagnostics report 704. Configure performance settings. This objective may include but is not limited to: o Configuring networking performance o Configuring services and programs to resolve performance issues Lecture Focus Questions: How would you disable a service without rebooting? Which tool would you use to scan and manage memory? Which types of network problems does the Windows Network Diagnostics troubleshoot? Which troubleshooting tools run automatically when they detect a problem? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 77 Video/Demo Time 7.1.1 Troubleshooting Tools 7:07 7.1.2 Configuring Services and Startup Items 9:09 Total 16:16 Number of Exam Questions 3 questions Time About 25 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 78 Section 7.2: System Events Summary This section examines using Event Viewer and Event Subscriptions to monitor system events. Concepts covered include: Event Viewer o Common eventlogs: Application Security Setup System ForwardedEvents o Features available with event logs: Filter events Custom views Attach a task Event Log online help Event Subscriptions o Subscription types: Collector initiated Source computer initiated o Elements that a subscription identifies o Delivery optimization options: Normal Minimize bandwidth Minimize latency Custom After finishing this section, students should be able to complete the following tasks: Use custom views and the properties of events to troubleshoot and diagnose issues on the system. Configure collector initiated and source initiated subscriptions. Configuring Windows 7 Objectives: 703. Monitor systems. This objective may include but is not limited to: o Configuring event logging o Filtering event logs o Event subscriptions ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 79 Lecture Focus Questions: What common event logs does Event Viewer display? Why would you choose to filter events in Event Viewer? What is the difference between filtering events versus using a custom view? What type of tasks can you attach to an event when a specific event occurs? When would you choose to use a collector-initiated subscription over a sourceinitiated subscription? Video/Demo Time 7.2.1 Event Viewer 6:50 7.2.2 Using Event Viewer 7:55 7.2.4 Event Subscriptions 4:33 7.2.5 Configuring Collector-initiated Subscriptions 2:56 7.2.6 Configuring Source-initiated Subscriptions 4:22 Total 26:36 Number of Exam Questions 10 questions Time About 45 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 80 Section 7.3: Performance Monitoring Summary In this section students will learn about monitoring and configuring performance settings. Concepts covered include: The role of Windows Aero The Windows Experience Index measures the hardware and software response to Windows Aero Tools available in the Performance Information and Tools console: o Performance Monitor o Data Collector Set (DCS) o Reports Using perfmon.exe Configuring data collector sets Using the logman command Windows Performance Toolkit (WPT) o Performance Analyzer tool suite: Xperf.exe Xperfview.exe Xbootmgr.exe After finishing this section, students should be able to complete the following tasks: Use the Windows Experience Index to establish the base score of a machine. Use Performance Monitor to gather information about the performance of a computer. Create a Data Collector Set to capture information and monitor the performance of a computer. Configuring Windows 7 Objectives: 703. Monitor systems. This objective may include but is not limited to: o Data collector sets o Generating a system diagnostics report 704. Configure performance settings. This objective may include but is not limited to: o Configuring desktop environment Lecture Focus Questions: Which components does the Windows Experience Index test to determine the base score? How is the base score of the Windows Experience Index calculated? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 81 What is the main difference between Performance Monitor and Data Collector Sets? What types of performance analysis can the three tools in the Windows Performance Toolkit (WPT) perform? Video/Demo Time 7.3.1 Performance Information and Tools Console 2:48 7.3.2 Viewing the Windows Experience Index 1:24 7.3.5 Performance Monitor Console 9:17 7.3.6 Monitoring Performance 10:03 7.3.8 Windows Performance Toolkit (WPT) 1:58 Total 25:30 Lab/Activity Update the Windows Experience Index Number of Exam Questions 8 questions Time About 45 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 82 Section 7.4: Resource Monitoring Summary This section provides information about tools that can be used to gather information about the system and troubleshoot problems. Concepts covered include: Tools to monitor the system resources include: o Task Manager o Resource Monitor o Process Explorer After finishing this section, students should be able to complete the following tasks: Use Task Manager and Resource Monitor to view and manage processes and services on a computer. Configuring Windows 7 Objectives: 703. Monitor systems. Lecture Focus Questions: Under which circumstances should you use Resource Monitor versus Task Manager? What type of information is provided in a wait chain? How does processor affinity affect the use of system resources? How can you use Resource Monitor to identify which application is writing to a disk? Video/Demo Time 7.4.1 Task Manager 4:32 7.4.2 Resource Monitor and Process Explorer 4:35 7.4.3 Monitoring Resources 7:36 Total 16:43 Number of Exam Questions 3 questions Time About 25 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 83 Section 7.5: Reliability and Performance Maintenance Summary This section discusses tools that are used to ensure the reliability and performance of the system. Concepts covered include: The role of Reliability Monitor The role of Windows Action Center The role of Windows Defender Components that Windows Defender uses to protect computers: o Automatic Scanning o Real-time protection o Alert actions o SpyNet Community Working with Windows Defender After finishing this section, students should be able to complete the following tasks: Use the Reliability Monitor to view the historical data of the operating system. Use the data in the Action Center to troubleshoot a computer. Configuring Windows 7 Objectives: 403. Configure networking settings. This objective may include but is not limited to: o Configuring security settings on the client Lecture Focus Questions: How is the stability index value calculated? What kind of warnings does the Action Center provide? Which service is required for Action Center to run properly? What are the differences between the three types of Windows Defender automatic scans? What is the difference between the remove and quarantine action in Windows Defender? What is a heuristic and how can it help identify possible threats to your computer? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 84 Video/Demo Time 7.5.1 Reliability Monitor and Action Center 5:49 7.5.2 Using Reliability Monitor 5:20 7.5.3 Using the Action Center 1:02 7.5.5 Windows Defender 2:53 7.5.6 Configuring Windows Defender 3:51 Total 18:55 Number of Exam Questions 1 question Time About 25 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 85 Section 7.6: Optimization Summary This section discusses using the following features to increase the system performance: Visual effects Processor scheduling Paging file Data Execution Protection (DEP) Write caching ReadyBoost After finishing this section, students should be able to complete the following tasks: Edit the Advanced System Settings to increase the performance of a machine. Configure the virtual memory settings to optimize the computer's performance. Configuring Windows 7 Objectives: 704. Configure performance settings. This objective may include but is not limited to: o Configuring page files o Configuring hard drive cache o Configuring processor scheduling o Configuring desktop environment Lecture Focus Questions: If you have a machine that is responding rather slowly, what settings could you change to increase the performance of this machine? What type of processor scheduling would you use on a desktop machine running Windows 7? What is a temporary solution to resolve the problem when the paging file usage is near 100%? What is a more permanent solution? How does Data Execution Protection (DEP) help prevent damage from viruses and other security threats? What type of write caching option increases performance for internal hard disk drives? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 86 Video/Demo Time 7.6.1 Optimization 5:48 7.6.2 Optimizing Performance 2:33 Total 8:21 Lab/Activity Configure Virtual Memory Number of Exam Questions 9 questions Time About 25 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 87 Section 7.7: System Updates Summary In this section students will learn about configuring Windows Updates to manage system updates. Windows Update Tools to deploy and manage updates o Windows Server Update Services (WSUS) o System Center Essentials o System Center Configuration Manager (SCCM) o Microsoft Baseline Security Analyzer (MBSA) Automatic Update policies available in the Windows Update node: o Configure Automatic Updates o Specify intranet Microsoft Update server location o Enable client-side targeting o Reschedule Automatic Updates Scheduled Installations o No auto-Restart for Scheduled Automatic Updates and Installations o Automatic Updates detection frequency o Allow Automatic Updates immediate installation o Delay restart of schedule installations o Re-prompt for restart with scheduled installations o Allow non-administrators to receive update notifications o Do not display ‘Install Updates and Shut Down’ option in Shut Down Windows dialog box Settings available in Configure Automatic Updates policy to download and install updates: After finishing this section, students should be able to complete the following tasks: Use Windows Update to manage and maintain updates. Configure Windows 7 clients to connect to and download updates from a Windows Server Update Server (WSUS). Configuring Windows 7 Objectives: 701. Configure updates to Windows 7. This objective may include but is not limited to: o Configuring update settings o Determining source of updates o Configuring Windows Update policies o Reviewing update history o Checking for new updates o Rolling back updates ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 88 Lecture Focus Questions: How can you manually check for updates, but not install the updates? How do you install optional updates? Under which circumstances would you choose a WSUS solution rather than a standard Windows Update solution? What types of operating system vulnerabilities are identified by the Microsoft Baseline Security Analyzer (MBSA)? What is the difference between Microsoft Update and Windows Update? When would you use the wusa.exe utility? Video/Demo Time 7.7.1 Windows Updates 8:03 7.7.2 Configuring Windows Update 7:03 7.7.5 Update Deployment and Management 7:58 7.7.7 Configuring WSUS Clients 5:52 Total 28:56 Lab/Activity Configure Windows Update Number of Exam Questions 9 questions Time About 50 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 89 Section 7.8: Remote Management Summary This section discusses remote management of computers. Details about the following are presented: Enabling WinRm Remote management tools o Windows Remote Shell (WinRS) o PsExec o PowerShell The role of Remote Desktop Details of Remote Desktop Problems you may encounter when using Remote Desktop: o Cannot connect o Cannot log on o Cannot copy txt o Screen goes blank o Blank screen saver Remote Desktop Services features: o Remote Desktop (RD) Gateway o RemoteApp After finishing this section, students should be able to complete the following tasks: Enable remote management and configure trusts between clients. Execute and run commands locally and remotely on different computers using PowerShell and WinRS. Use filtering and pipelining with PowerShell to display only specific data. Configure Remote Desktop to allow a connection to a remote computer. Configuring Windows 7 Objectives: 405. Configure remote management. This objective may include but is not limited to: o Remote management methods o Configuring remote management tools o Executing PowerShell commands 604. Configure remote connections. This objective may include but is not limited to: o Remote desktop ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 90 Lecture Focus Questions: What is the difference between authenticating for remote management in a domain versus in a workgroup? How can you run PowerShell commands on a remote computer? Which Windows 7 editions support accepting incoming Remote Desktop connection requests? If you cannot connect to the remote computer when using Remote Desktop, what items should you consider and verify? What are the advantages of using RemoteApp? Video/Demo Time 7.8.1 Remote Management Tools 4:34 7.8.2 Using Remote Management Tools 6:26 7.8.4 Remote Desktop 6:31 7.8.5 Using Remote Desktop 8:39 Total 26:10 Lab/Activity Configure Remote Desktop Number of Exam Questions 14 questions Time About 50 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 91 Section 7.9: Remote Assistance Summary This section discusses the following basics of using Remote Assistance: The role of Remote Assistance Details about using Remote Assistance After finishing this section, students should be able to complete the following tasks: Use Remote Assistance to provide help and support to users. Configure a Remote Assistance invitation. Configuring Windows 7 Objectives: 405. Configure remote management. This objective may include but is not limited to: o Remote management methods o Configuring remote management tools Lecture Focus Questions: What are the required steps to initiate a Remote Assistance session? What is the difference between Remote Assistance and Remote Desktop? How can the novice take back control of his computer? Video/Demo Time 7.9.1 Remote Assistance 2:35 7.9.2 Using Remote Assistance 8:47 Total 11:22 Number of Exam Questions 1 question Time About 15 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 92 Section 8.1: System Backup Summary This section discusses configuring a backup to protect the system. Concepts covered include: Types of backups that the Backup and Restore console supports: o System image backup o File backup Managing backups After finishing this section, students should be able to complete the following tasks: Create a complete system image of a machine. Configure and schedule backups of user files and folders on the computer. Configuring Windows 7 Objectives: 801. Configure backup. This objective may include but is not limited to: o Creating a system recovery disk o Backing up files, folders, or full system o Scheduling backups Lecture Focus Questions: What is the difference between the two types of Backup and Restore backups? Which type of file system is supported when backing up a system image? When is a BackupSet folder created and what is saved to the folder? Which feature allows open files to be backed up? Video/Demo Time 8.1.1 System Backup 11:23 8.1.2 Implementing System Backups 6:18 Total 17:41 Lab/Activity Back Up the Computer Number of Exam Questions 11 questions ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 93 Time About 35 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 94 Section 8.2: File Recovery Summary This section discusses using file recovery to restore changed, damaged, or deleted files. Concepts covered include: Locations where previous versions of files exist: o Backup o Shadow copies Details about file recovery After finishing this section, students should be able to complete the following tasks: Restore and recover files from a backup. Manually create a restore point and configure a schedule to create future restore points. Configuring Windows 7 Objectives: 803. Configure file recovery options. This objective may include but is not limited to: o Configuring file restore points o Restoring previous versions of files and folders o Restoring damaged or deleted files by using shadow copies o Restore user profiles Lecture Focus Questions: When would you configure the System Protection settings to automatically save files but not system settings? What is the difference between a shadow copy and a file which is in the BackupSet folder? Which tools allow you to restore individual files? What options are given when attempting to restore a file to a location where a file with the same name already exists? What must you do to restore files from a Complete PC Backup VHD file? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 95 Video/Demo Time 8.2.1 File Recovery 4:17 8.2.2 Recovering Files from Backups 2:19 8.2.3 Recovering Files from Shadow Copies 7:00 Total 13:36 Number of Exam Questions 10 questions Time About 25 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 96 Section 8.3: System Recovery Summary This section explores tools to assist in system recovery. Tools covered include: System Restore (restore point) System Image Recovery System Recovery Options Boot Configuration Data (BCD) After finishing this section, students should be able to complete the following tasks: Boot a system into a variety of modes for troubleshooting purposes. Perform a system restore using restore points. Use a system image to restore system settings after a volume failure. Configuring Windows 7 Objectives: 802. Configure system recovery options. This objective may include but is not limited to: o Configuring system restore points o Restoring system settings o Last known good configuration o Complete restore; driver rollback Lecture Focus Questions: When your system is having significant problems, what are your alternate boot mode options? What types of drivers and services are loaded when you boot in Safe Mode? When would you choose to use the Last Known Good Configuration? What types of events trigger automatic restore points to be created? Which tool can delete all restore points except for the last restore point? How can you get a system running again as quickly as possible after a disk holding the operating system fails? ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 97 Video/Demo Time 8.3.1 File Recovery 11:26 8.3.2 Using System Recovery 6:55 Total 18:21 Lab/Activity Create a Restore Point Number of Exam Questions 12 questions Time About 40 minutes ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 98 Practice Exams Summary This section provides information to help prepare students to take the exam and to register for the exam. Students will also have the opportunity of testing their mastery of the concepts presented in this course to reaffirm that they are ready for the certification exam. For example, all questions that apply to Objective 100. Installing, Upgrading, and Migrating Windows 7 are grouped together and presented in practice exam Objective 100. Installing, Upgrading, and Migrating Windows 7, All Questions. There is no time limit on the amount of time a student can take to complete the following Domain practice exams, but students will typically take about 60-120 minutes to complete each practice exam. Objective 100: Installing, Upgrading, and Migrating Windows 7, All Questions (34 questions) Objective 200: Deploying Windows 7, All Questions (49 questions) Objective 300: Configuring Hardware and Applications, All Questions (44 questions) Objective 400: Configuring Network Connectivity, All Questions (54 questions) Objective 500: Configuring Access to Resources, All Questions (64 questions) Objective 600: Configuring Mobile Computing, All Questions (53 questions) Objective 700: Monitoring and Maintaining Systems that Run Windows 7, All Questions (72 questions) Objective 800: Configuring Backup and Recovery Options, All Questions (34 questions) The Certification Practice Exam consists of 65 questions that are randomly selected from the above practice exams. Each time the Certification Practice Exam is accessed different questions may be presented. The Certification Practice Exam has a time limit of 120 minutes -- just like the real certification exam. A passing score of 95% should verify that the student has mastered the concepts and is ready to take the real certification exam. ©2012 TestOut Corporation (Rev 6/10) Configuring Windows 7 Exam 70-680 Ver. 2.0 99