Exam 70-680 TS: Windows 7, Configuring - Skills Being Measured

In my last post I outlined the 70-680 exam overview and which certification you’d earn by taking and passing the exam (MCTS – Microsoft Certified Technical Specialist) as well as the credit you would get towards the cumulative Microsoft Certified IT Professional (MCITP) certifications:

  • MCITP: Enterprise Administrator
  • MCITP: Enterprise Desktop Administrator 7
  • MCITP: Enterprise Desktop Support Technician 7
  • In this post I will be reviewing the skills measured from each of the domains within the 70-680 exam TS: Windows 7, Configuring

    Installing, Upgrading, and Migrating to Windows 7

    • Perform a clean installation.
      • Identifying hardware requirements
      • Setting up Windows 7 as the sole operating system
      • Setting up Windows 7 in a dual or multi boot configuration
      • Leveraging different installation methods
      • Booting the system from the source of installation (DVD, network, image, WDS, etc)
      • Preparing the installation source (DVD, network, image, WDS, etc)
    • Upgrade to Windows 7 from previous versions of Windows.
      • Performing an in-place upgrade from Windows Vista
      • Migrating from Windows XP (custom install)
      • Performing an in-place upgrade from one version of Windows 7 to another edition of Windows 7
    • Migrate user profiles.
      • Migrate user profiles from one machine to another
      • Migrate user profiles from previous versions of Windows
      • Reviewing the differences between side-by-side installations and wipe and load

    Deploying Windows 7

    • Capture a system image.
      • Preparing the host system for image capture
      • Creating a WIM file from the host system
      • Performing an automated image capture
      • Performing a manual image capture
    • Prepare a system image for deployment.
      • Inserting an application into a system image
      • Inserting a driver into a system image
      • Inserting an update into a system image
      • Configuring tasks to run after image deployment
    • Deploy a system image.
      • Reviewing automated deployment methods
      • Performing a manual deployment of a customized image
    • Configure a VHD.
      • Creating, deploying, booting, mounting, and updating VHDs
      • Performing offline updates to images
      • Managing offline servicing of images

    Configuring Hardware and Applications

    • Configure devices.
      • Updating, disabling, and uninstalling drivers
      • Reviewing what signed drivers are
      • Resolving conflicts between drivers
      • Configuring driver settings
      • Resolving problem device driver
    • Configure application compatibility.
      • Setting application compatibility mode
      • Implementing application shims
      • Resolving compatibility issues with Internet Explorer
    • Configure application restrictions.
      • Configuring software restriction policies
      • Configuring application control policies
      • Configure application restrictions through group policy at the domain or though local security policy
    • Configure Internet Explorer.
      • Configuring browser compatibility view
      • Configuring browser security settings
      • Configuring internet service providers
      • Managing browser add-ons
      • Configuring InPrivate Browsing mode
      • Configuring certificates for secure Web sites

    Configuring Network Connectivity

    • Configure IPv4 network settings.
      • Connect systems to a network
      • Configure name resolution
      • Set up a connection for a network
      • Configure network locations
      • Resolve connectivity issues
      • Using APIPA and configuring alternate settings
    • Configure IPv6 network settings.
      • Configure name resolution
      • Connect systems to a network
      • Set up a connection for a network
      • Set up and define network locations
      • Troubleshoot and resolve connectivity issues
      • Configure link local multicast name resolution
    • Configure networking settings.
      • Add a physically connected (wired) or wireless device
      • Connect to a wireless network
      • Configure security settings on the Windows 7 client
      • Set preferred wireless networks
      • Set up and configure network adapters
      • Set up and configure location-aware printing
    • Configure Windows Firewall.
      • Configure and administer rules for multiple profiles
      • Allowing or denying an application access to the network
      • Configure and administer network-profile-specific rules
      • Configure, manage and monitor firewall notifications
      • Configure and administer authenticated exceptions to firewall rules
    • Configure remote management.
      • Understanding remote management methods
      • Configure remote management tools
      • Administer systems with remote management tools
      • Executing PowerShell commands

    Configuring Access to Resources

    • Configure shared resources.
      • Configure and administer folder virtualization
      • Configure and administer shared folder permissions
      • Configure and administer printers and queues
      • Configure and administer HomeGroup settings
    • Configure file and folder access.
      • Encrypting files and folders by using EFS
      • Configure and administer NTFS permissions
      • Troubleshoot and resolve effective permissions issues
      • Understanding NTFS permissions when copying files vs. moving files
    • Configure user account control (UAC).
      • Configure and administer local security policy
      • Understand the differences between the admin vs. standard UAC prompt behaviors
      • Configure and administer Secure Desktop
    • Configure authentication and authorization.
      • Troubleshooting and resolving authentication issues
      • Configure and administer user rights
      • Configure and administer user privileges
      • Configure and administer credentials
      • Configure and administer certificates
      • Configure and administer the use of smart cards with PIV
      • Understanding the details regarding elevating user privileges
      • Understanding the details regarding multifactor authentication
    • Configure BranchCache.
      • Understanding the details regarding distributed cache mode vs. hosted mode
      • Understanding the details regarding network infrastructure requirements
      • Configure and administer settings for BranchCache
      • Configure and administer certificate management BranchCache

    Configuring Mobile Computing

    • Configure BitLocker and BitLocker To Go.
      • Configure and administer BitLocker and BitLocker To Go policies
      • Understanding and managing Trusted Platform Module (TPM) PINs
      • Configure and administer startup key storage
      • Configure and administer data recovery agent support
    • Configure DirectAccess.
      • Configure and administer client side settings for DirectAccess
      • Configure and administer authentication for DirectAccess
      • Understanding network infrastructure requirements for DirectAccess
    • Configure mobility options.
      • Configure and administer offline file policies;
      • Configure and administer transparent caching
      • Creating and migrating power policy
    • Configure remote connections.
      • Configure and administer VPN connections and authentication for remote connections
      • Configure and administer VPN reconnect settings for remote connections
      • Configure and administer advanced security auditing for remote connections
      • Configure and administer NAP quarantine remediation for remote connections
      • Configure and administer dial-up connections for remote connections
      • Configure and administer remote desktop
      • Configure and administer published apps

    Monitoring and Maintaining Systems that Run Windows 7

    • Configure updates to Windows 7.
      • Configure and administer update settings
      • Plan and determine source of updates
      • Configure and administer Windows Update policies
      • Reviewing update history
      • Checking for new updates
      • Understanding the details for rolling back updates
    • Manage disks.
      • Configure and administer disk volumes
      • Configure and administer file system fragmentation
      • Configure and administer RAID configurations
      • Configure and administer removable device policies
    • Monitor systems.
      • Configure and administer event logging
      • Understanding the details and use of filtering event logs
      • Configure and administer event subscriptions
      • Configure and administer data collector sets
      • Configure and generate systems diagnostics reports
    • Configure performance settings.
      • Configure page files
      • Configure hard drive cache
      • Configure settings for updated drivers
      • Configure networking performance
      • Configure and administer power plans
      • Configure and administer processor scheduling
      • Configure the desktop environment
      • Configure and monitor services and programs to resolve performance issues
      • Configure and monitor mobile computing performance issues
      • Configure and administer system power settings

    Configuring Backup and Recovery Options

    • Configure backup.
      • Create a system recovery disk
      • Perform a back up of files, folders, and full system
      • Create and perform scheduled backups
    • Configure system recovery options.
      • Configure and manage system restore points
      • Configure and manage restoring system settings
      • Understanding the details regarding the last known good configuration
      • Understanding the details regarding complete restore
      • Understanding the details regarding driver rollback
    • Configure file recovery options.
      • Configure file restore points
      • Performing a restore of previous versions of files and folders
      • Performing a restore of damaged or deleted files by using shadow copies
      • Perform a restore of user profiles

    Comments