70-646 Pro Windows Server 2008 - Server Administrator Exam Set 5

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network, including domain controllers, have Windows Server 2008 installed and all workstations have Windows XP Service Pack 2 installed. The YYY.com is made up of 15 servers and 600 workstations. One of the servers, named ABCSR07, is configured as a Terminal server. You have received instructions to install a new in-house application and enable desktop themes, which is a prerequisite of the application. Furthermore, the in-house application should only be accessible from any workstation to users that have the necessary permissions. You also need to make sure that the amount of modifications on the workstations, as well as the  costs is kept to a minimum. Which combination of the following actions should you take? (Choose two.) A. You should consider installing the Remote Desktop Connection (RDC) 6.0 software on all workstations. B. You should consider making use of Windows System Resource Manager (WSRM). C. You should consider making use of Windows Deployment Services (WDS). D. On ABC-SR07, select the Desktop Experience feature and install the application.E. You should consider making use of Microsoft System Center Configuration Manager (SCCM).   


Options are :

  • A,B
  • A,D
  • C,D
  • B,E

Answer : A,D

70-642 Windows Server 2008 Network Infrastructure Exam Set 4

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has its headquarters in London and two satellite offices in Paris and Milan. The Paris and Milan offices are linked to each other via a WAN connection. Each satellite office has a file server that hosts data for that office. You have been instructed to make sure that data hosted on the file servers are accessible to both the Paris and Milan offices. You also have to make sure that the files on either file server remains accessible to users, even in the event of the WAN connection failing. You are then informed that your solution should provide for a reduction in the utilization of network bandwidth. Which of the following actions should you take?   


Options are :

  • You should consider making use of Distributed File System Replication (DFSR) on the file servers in the Paris and Milan offices.
  • You should consider installing a Windows Server 2008 Datacenter Edition server in both offices
  • You should consider making use of the ServerManagerCMD tool on both the servers
  • You should consider installing AD RMS.

Answer : You should consider making use of Distributed File System Replication (DFSR) on the file servers in the Paris and Milan offices.

You work as the Enterprise administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have Windows Vista SP1 installed. The YYY.com network of YYY.com is connected to the Internet via a firewall. YYY.com releases a new written security policy that requires the use of encryption on remote connections and remote authentications. The policy also requires ports 80 and 443 to be used for incoming traffic on the firewall. You have been instructed to devise a solution that adheres to the new security policy. Which of the following actions should you take? 


Options are :

  • You should consider making use of Secure Socket Tunneling Protocol (SSTP)
  • You should consider making use of roaming user profiles
  • You should consider making use of Multiple Activation Key (MAK) Independent Activation.
  • You should consider making use of the Hyper-V feature.

Answer : You should consider making use of Secure Socket Tunneling Protocol (SSTP)

You work as an Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has a web server, named ABC-SR13, and a backup server, named ABC-SR17. You have been instructed to design a backup solution that allows for remote server backups of ABC-SR13 to be carried out from ABC-SR17. Which of the following actions should you take? 


Options are :

  • You should consider suggesting the installation of Windows PowerShell, as well as the modification of the Windows Firewall settings on ABC-SR13.
  • You should consider suggesting the installation of Windows Server Backup, and Windows PowerShell on ABC-SR13.
  • You should consider suggesting the installation of Windows Server Backup, as well as the modification of the Windows Firewall settings on ABC-SR13.
  • You should consider suggesting the installation of Windows PowerShell, as well as having the IIS Management Service feature enabled on ABC-SR13.

Answer : You should consider suggesting the installation of Windows Server Backup, as well as the modification of the Windows Firewall settings on ABC-SR13.

70-646 Pro Windows Server 2008,Server Administrator Test Set 4

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2003 installed and all workstations have Windows Vista installed. The YYY.com network contains two servers named ABC-SR10 and ABC-SR11. ABC-SR10 has a 32-bit version of Windows Server 2003 installed, while ABC-SR11 has a 64-bit version installed. Both servers has an application installed, named TestApp1 and TestApp2, respectively. The two applications require their respective operating systems to function properly. You have been instructed move the applications to a server running Windows Server 2008. To keep costs to a minimum, you want to make use of a single server, and make use of Hyper-V feature on the server before installing the applications on separate child virtual machines. Which of the following actions should you take?   


Options are :

  • You should consider installing a 32-bit version of Windows Server 2008 Enterprise Edition on the new server. Answer: A
  • You should consider installing a 64-bit version of Windows Server 2008 Standard on the new server.
  • You should consider installing a 32-bit version of Windows Server 2008 Enterprise Edition on the new server.
  • You should consider installing a 64-bit version of Windows Server 2008 Enterprise Edition on the new server.

Answer : You should consider installing a 64-bit version of Windows Server 2008 Enterprise Edition on the new server.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network run Windows Server 2000 and the domain controllers are running Windows Server 2008. YYY.com has its headquarters in Chicago and quite a few satellite offices in the region. The storage location of the servers in the satellite offices is currently not secured. As a result, you are preparing to make use of Windows BitLocker Drive Encryption (BitLocker) on the servers in the satellite offices. Which of the following is TRUE with regards to Windows BitLocker Drive Encryption? (Choose all that apply.) A. BitLocker uses the TPM to help to protect the Windows operating system and user data, and also helps to ensure that a computer is not tampered with, even if it is left unattended, lost, or stolen. B. BitLocker can only be configured on servers that have a Trusted Platform Module (TPM) microchip installed. C. BitLocker requires a minimum of one NTFS, and one FAT32 drive partitions D. BitLocker encrypts all data stored on the Windows operating system volume.   


Options are :

  • B,C
  • C,D
  • A,B
  • A,D

Answer : A,D

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has its headquarters in Chicago and a satellite office in Dallas. Administrators in the Dallas office are responsible for administering the workstations and servers located in the Dallas office. The user accounts for these administrators reside in a global group named Test_adm. The Dallas office has a Read-only Domain Controller (RODC), which is currently being administered from the Chicago office. In a bid to delegate control of the RODC, you have been instructed to make sure that the Test_adm group only has permissions to manage, replace device drivers, and install updates for the operating system on the RODC. The Test_adm group should not be allowed to make changes to the Active Directory objects. Which of the following actions should you take? 


Options are :

  • You should consider making use of the Hyper-V feature for a new OU.
  • You should consider making use of Credential Roaming on the computer object of the RODC.
  • You should consider making Test_adm a member of the Administrators local group on the RODC.
  • You should consider making use of the Internet Protocol security (IPsec) for the Server Operators domain local group

Answer : You should consider making Test_adm a member of the Administrators local group on the RODC.

70-646 Pro Windows Server 2008,Server Administrator Test Set 2

You work as the Enterprise administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. The functional level of the servers is set to Windows Server 2008 R2. YYY.com has a Marketing, Sales, and Finance department that has a domain controller configured as a DHCP Server, and a file server each. A new YYY.com policy states that administrators in each department should only be allowed to administer the DHCP scope in their respective departments, and that administrative effort should be kept to a minimum. You have to make sure that the new policy is adhered to. Which of the following actions should you take? (Choose all that apply.) A. You should consider migrating the DHCP server role to each of the file servers. B. You should consider assigning the administrators in each department Full Administrative rights across the network. C. You should consider making the administrators in each department to the DHCP Administrators local group on the file servers in their respective departments. D. You should consider creating Multiple Activation Key (MAK) Independent Activation in the AD  domain


Options are :

  • A,B
  • C,D
  • B,D
  • A,C

Answer : A,C

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers, including domain controllers, on the YYY.com network have Windows Server 2008 installed and all workstations have Microsoft Windows Vista installed. You have received instructions to make sure that a report on the status of software updates for the Windows Vista workstations is created on a monthly basis. The report should show the operating system and Microsoft application updates that have been successfully and unsuccessfully installed. You need to devise a suitable solution that is cost effective, and requires as little administrative effort as possible. Which combination of the following actions should you take? (Choose two.) A. You should consider installing Windows Deployment Services (WDS). B. You should consider making use of Windows Software Update Services (WSUS) 3.0. C. You should consider installing the management agents on all workstations. D. You should consider making use of a Group Policy object (GPO) to set up Windows Update. E. You should consider making use of Network Policy Server (NPS) on the workstations. 


Options are :

  • C,D
  • B,D
  • A,B
  • A,E

Answer : B,D

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. The YYY.com network servers run Windows Server 2008 and the workstations run Microsoft Windows Vista. YYY.com has three servers named ABC-SR11, ABC-SR12 and ABC-SR13, which are configured as Network Policy Servers (NPSs) and have Remote Authentication Dial-In User Service (RADIUS) server installed. Furthermore, YYY.com contains 20 wireless access points that are set up as RADIUS clients. You have received instructions to devise a solution for auditing access to the wireless access points. You are informed that your solution should provide for data to be stored centrally, and include all RADIUS attributes and all RADIUS vendor-specific attributes. You have to make sure that your solution does not incur any unnecessary expenses. Which combination of the following actions should you take? (Choose two.) A. You should consider installing Microsoft Windows Reliability and Performance Monitor. B. You should consider auditing for logon events on the one of the servers. C. You should consider setting up RADIUS accounting by using local file logging on each server D. You should consider setting up the Windows System Resource Manager (WSRM). E. You should consider setting up users containers. F. You should consider storing the log files in an Internet Authentication Service (IAS) format on a shared folder on the one of the servers. 


Options are :

  • C,D
  • A,B
  • D,E
  • C,F

Answer : C,F

Microsoft Certified Solutions Developer (MCSD) For 2019 Set 2

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have either Windows XP Professional or Microsoft Windows Vista installed. You have been instructed to design a VPN solution that allows for encrypted text to be used when storing VPN passwords. Furthermore, workstations that are configured as members of a workgroup, and Suite B cryptographic algorithms should be supported. You also have to make sure that certificates can be automatically enrolled. Which combination of the following actions should you take? (Choose all that apply.) A. You should consider upgrading the Windows XP Professional workstations to Windows Vista. B. You should consider making use of the Windows System Resource Manager (WSRM). C. You should consider making use of an enterprise certification authority (CA) that is based on Windows Server 2008. D. You should consider making use of the 64-bit version of Windows Server 2008 Datacenter Edition. E. You should consider making use of Windows Deployment Services (WDS). F. You should consider making use of an IPsec VPN that uses certificate-based authentication.   


Options are :

  • A,B,C
  • B,C,D
  • A,C,F
  • C,D,E

Answer : A,C,F

You work as an Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has a server running HyperV. There are multiple virtual machines (VMs) configured on the server. YYY.com has informed you that you have to devise a solution for backing up the HyperV server. Which combination of the following should form part of your solution? (Choose two.) A. You should consider taking a snapshot of every VM. B. You should consider making use of a full backup for each VM. C. You should consider taking a snapshot of the HyperV server. D. You should consider making use of a full backup for the HyperV server 


Options are :

  • B,D
  • C,D
  • A,B
  • A,C

Answer : B,D

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network has Windows Server 2008 installed and all workstations have Windows XP Professional installed. You have been informed that YYY.com is planning to install 100 new Windows Server 2008 servers, of which a certain number includes 64-bit hardware, and the rest includes 32-bit hardware. You have also been informed that Pre-Boot Execution Environment (PXE) is supported by all of these servers. YYY.com has a version of Windows Server 2008 (64-bit) server, named ABC-SR24, which is configured as a DHCP server and only issues IPv4 addresses. You have received instructions to make sure that the deployment process is automated, whilst ensuring that costs are kept to the minimum. Which of the following actions should you take? 


Options are :

  • You should consider making use of Multiple Activation Key (MAK) Independent Activation on ABC-SR24.
  • You should consider installing Windows Deployment Services (WDS) on ABC-SR24.
  • You should consider making use of Microsoft Multipath I/O supported.
  • You should consider making use of ntdsutil imf on both a 64-bit, and a 32-bit server

Answer : You should consider installing Windows Deployment Services (WDS) on ABC-SR24.

Microsoft 70-647 Windows Enterprise Administrator Exam Set 2

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. You want to group shared folders that are located on different servers into a single logically structured namespace. The namespace should appear to users as a single shared folder with a series of sub folders, and should not require routing over WAN connections. Which of the following actions should you take? 


Options are :

  • You should consider making use of Distributed File System (DFS) Replication.
  • You should consider making use of AD RMS
  • You should consider making use of Distributed File System (DFS) namespaces.
  • You should consider making use of File Server Resource Manager (FSRM).

Answer : You should consider making use of Distributed File System (DFS) namespaces.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. The YYY.com network servers have Windows Server 2008 R2 installed and workstations have Windows 7 installed.  YYY.com contains more than 1,500 workstations, which has been linked to managed switches. You are in the process of devising a network access solution that prevents YYY.com employees from evading the restrictions on the network access. The solution should also only allow network access to workstations with updated service packs and updated anti-malware software installed. Which combination of the following actions should you take? (Choose two.) A. You should make use of Network Access Protection (NAP). B. You should make use of Background Intelligent Transfer Service (BITS) settings. C. You should make use of 802.1x enforcement. D. You should generate event subscriptions. E. You should generate an adml file 


Options are :

  • B,D
  • C,D
  • B,C
  • A,C
  • A,B

Answer : A,C

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 Enterprise Edition installed and all workstations have Windows 7 installed.   YYY.com has two DHCP servers, named ABC-SR10 and ABC-SR11, and a single subnet that hosts 1,500 workstations. YYY.com's intranet and the Internet are connected to a router that has a single IP address on the internal interface. ABC-SR10 is configured to issue IP addresses from 192.168.10.1 to 192.168.17.255 on the 255.255.240.0 subnet mask. You have been instructed to configure a DHCP that is fault-tolerant and supports the workstations on the subnet. You also have to make sure that, in the event of a DHCP server failure, the workstations can still obtain valid IP addresses. Which combination of the following actions should you take? (Choose two.) A. You should consider having a scope configured for the 192.168.10.0/26 subnet. B. You should consider having a scope configured for the 192.168.10.0/20 subnet. C. You should consider having the scope configured to commence at 192.168.10.1 and stop at 192.168.15.254. D. You should consider having a scope configured for the 192.168.8.1 and stop at 192.168.15.254.   


Options are :

  • C,D
  • A,B
  • A,C
  • B,D

Answer : B,D

Microsoft 70-647 Windows Enterprise Administrator Exam Set 9

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory forest that contains two domains named YYY.com and us.YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. You have been informed that a YYY.com domain user, named Mia Hamm, requires access to an organizational unit (OU) named ABC_Data to perform administrative tasks. ABC_Data, however, resides in us.YYY.com domain. Mia Hamm's administrative tasks will include creating and setting up Group Policies (GPOs) in the us.YYY.com, before linking the GPOs to ABC_Data. You have been instructed to assign Mia Hamm the minimum permissions required to complete her tasks. Which two of the following actions should you take? (Choose two.) A. You should consider making use of the ServerManagerCMD tool on us.YYY.com  B. You should consider making use of the Delegation of Control Wizard on ABC_Data. C. You should consider enabling caching in the us.YYY.com. D. You should consider changing the permissions of the Group Policy Objects container in us.YYY.com by using the Group Policy Management Console. E. You should consider deploying AD RMS in YYY.com.F. You should consider including Mia Hamm in the Account Operators group. G. You should consider creating an ADMX file on the ABC_Data. 


Options are :

  • A,B
  • F,G
  • C,E
  • B,D

Answer : B,D

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have either Windows XP Professional or Microsoft Windows Vista installed. YYY.com has informed you of their intention to enter into a working partnership with a company, named Weyland Industries, which has an Active Directory domain named weylandindustries.com. The domain controllers in the weylandindustries.com domain have Windows Server 2008 installed. As a result, YYY.com has released a written security policy that prohibits the printing of classified documents, or forwarding these classified documents to recipients that are not trusted. The new policy also states that Weyland Industries users should not be able to access classified data if they do not have the necessary permissions. Furthermore, the management of the Weyland Industries users should require as little administrative effort as possible. Lastly, the network traffic between the two organizations should be handled by port 443. You need to devise a solution that adheres to the new policy. Which combination of the following actions should you take? (Choose two.) A. You should consider starting a federated trust between YYY.com and Weyland Industries. B. You should consider configuring Credential Roaming. C. You should consider installing a Windows Server 2008 server that runs Microsoft Office SharePoint Server 2007, and has the Active Directory Rights Management Services (AD RMS) role installed. D. You should consider configuring NTFS permissions on the Active Directory database. E. You should consider installing a Windows Server 2008 server with the Windows SharePoint Services role installed. 


Options are :

  • B,E
  • A,C
  • A,B
  • C,D

Answer : A,C

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. The servers on the YYY.com network run Windows Server 2008 and all workstations run Windows XP Professional. YYY.com's Marketing, Sales, and Finance departments are located in different buildings. You have received instruction to add a Read-only Domain Controller (RODC) in each of the departments. You must make sure that log on details are not part of the RODC's installation files, and that bandwidth usage during the first AD-DS synchronization is kept as low as possible. You start by constructing an RODC in each department. You have to make sure that your tasks  are suitably completed. Which of the following actions should you take?   


Options are :

  • You should consider making use of the ntdutil imf command to create an RODC installation media
  • You should consider making use of the dcpromo command to create an RODC installation media.
  • You should consider making use of the adprep /rodcprep command to create an RODC installation media.
  • You should consider making use of the adprep /forestprep command to create an RODC installation media

Answer : You should consider making use of the ntdutil imf command to create an RODC installation media

Microsoft 70-647 Windows Enterprise Administrator Exam Set 7

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. The YYY.com network contains 250 servers that have Windows Server 2003 installed. All of these servers make use of 64-bit hardware. The YYY.com workstations either have Windows XP Professional, or Windows Vista installed. You have received instructions from the CIO to combine the 250 servers into 50 Windows Server 2008 servers. Your configurations should allow for the use of the current hardware and software, and also the use of 64-bit child virtual machines. You have also been informed that you should make the most of the resource utilization and prevent services from being integrated on the 50 Windows Server 2008 servers. Which of the following actions should you take? 


Options are :

  • You should consider installing a two-node failover cluster after consolidating services across to the 50 Windows Server 2008 servers
  • You should consider installing the Windows System Resource Manager (WSRM).
  • You should consider making use of a 64-bit version of Windows Server 2008 Datacenter Edition. You should thereafter change the physical machines into virtual machines.
  • You should consider installing the Hyper-V feature on 50 Windows Server 2008 servers and change the servers into virtual machines.

Answer : You should consider installing the Hyper-V feature on 50 Windows Server 2008 servers and change the servers into virtual machines.

You work as the network administrator at YYY.com. All servers on the YYY.com network have Windows Server 2000 installed.  YYY.com has four servers that each runs a different third party application. When YYY.com informs you of their intention to upgrade the servers to Windows Server 2008, you discover that the applications are not suitable to run on the Windows Server 2008 operating system, or be installed together on the same machine either. You notice that the each application uses up a minimal amount of the processor resources. You are instructed to make sure that the servers have windows server 2008 installed and that the applications are still available for use. You are also informed that your solution should keep expenses to a minimum. Which two of the following actions should you take? (Choose two.) A. You should consider installing Windows Server 2008 Enterprise Edition on a new server. B. You should consider installing Windows Server 2008 Datacenter Edition server on a new server. C. You should consider installing a 64-bit version of Windows Server 2008 Enterprise Edition on a new server. D. You should consider installing a two-node failover cluster on the new server. E. You should consider installing Microsoft Virtual Server 2005 R2 on the new server. F. You should consider installing Hyper-V feature on the new server and setting up four child virtual machines.   


Options are :

  • C,D
  • A,F
  • B,E
  • A,B

Answer : A,F

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. You are in the process of configuring a new MEDV workspace. Which of the following statements are TRUE with regards to the MEDV workspace? (Choose all that apply.) A. You are unable to clone a MED-V workspace from the Policy menu. B. You are able to clone a MED-V workspace from the Policy menu.  C. You are able to delete a MED-V workspace by clicking Remove in the Policy module, while the work space pane is in focus. D. You are able to delete a MED-V workspace by clicking Remove in the Policy menu.


Options are :

  • C,D
  • B,C
  • A,D
  • A,B

Answer : B,C

70-646 Pro Windows Server 2008,Server Administrator Test Set 4

You work as the Enterprise administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 R2. Half the workstations run Windows Vista, and the rest run Windows 7. YYY.com has its headquarters in London and a satellite office in Madrid. The satellite office in Madrid contains a File server, named ABC-SR11. An organizational unit (OU), named Testserv_OU, has been configured to host the computer objects for the servers in the Madrid office. The user accounts of YYY.com's administrators are part of a global group named TestGlobal.  You have received instructions to grant administrators the necessary permissions to create shared folders on ABC-SR11. You want to achieve this with as little administrative effort as possible. Which of the following actions should you take?


Options are :

  • You should consider creating a Group Policy for Testserv_OU.
  • You should consider making use of Credential Roaming.
  • You should consider configuring Read Only permissions on Testserv_OU
  • You should consider making the TestGlobal group a member of the Administrators local group on ABC-SR11.

Answer : You should consider making the TestGlobal group a member of the Administrators local group on ABC-SR11.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have either Windows XP Professional or Windows 7 installed. The YYY.com network has an internal network and a perimeter network which is separated by a firewall. The perimeter network is also connected to the Internet via a firewall. YYY.com makes use of an enterprise certification authority (CA) and a Microsoft Online Responder on the internal network. You have been instructed to make sure that users who connect via the Internet are able to securely detect whether individual certificates are valid, without consuming unnecessary bandwidth. Which of the following actions should you take? (Choose all that apply.) A. You should consider installing a stand-alone CA on a server that resides on the perimeter network B. You should consider installing IIS on a server that resides on the perimeter network C. You should consider installing Network Device Enrollment Service (NDES) on a server on the perimeter network.D. You should consider installing a Network Policy Server (NPS) on a server that resides on the perimeter network. E. You should consider redirecting authentication requests to a server on the internal network. F. You should consider installing a subordinate CA on the perimeter network. G. You should consider setting up IIS to redirect requests to the Online Responder on the internal network. 


Options are :

  • C,D
  • A,B
  • E,F
  • B,G

Answer : B,G

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 R2. Half the workstations run Windows Vista, and the rest run Windows 7. You have previously created separate organizational units (OUs) for the Sales, Products and Marketing departments. You now need to make sure that the Products OU remain unaffected when settings are applied to GPOs linked to the YYY.com domain. You also have to make sure that the amount of GPOs and OUs used are kept to a minimum. Which of the following actions should you take? 


Options are :

  • You should consider creating an ADMX file.
  • You should consider making use of a custom network profile.
  • You should consider making use of block inheritance on the Products OU.
  • You should consider making use of a DFS Namespace.

Answer : You should consider making use of block inheritance on the Products OU.

70-513 WCF Development with Microsoft .NET Framework 4 Exam Set 4

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have Windows Vista installed. YYY.com has three servers named ABC-SR11, ABC-SR12 and ABC-SR13, which are configured as Network Policy Servers (NPSs). ABC-SR11 has Microsoft SQL Server 2005 installed, and all three servers have Remote Authentication Dial-In User Service (RADIUS) server installed. Furthermore, YYY.com contains 20 wireless access points that are set up as RADIUS clients.   You have received instructions to devise a solution for auditing access to the wireless access points. You are informed that your solution should provide for data to be stored centrally, in a format that allows straightforward queries. You are also informed that your solution should allow for the recording of all RADIUS attributes and RADIUS vendor-specific attributes Which combination of the following actions should you take? (Choose two.) A. You should consider installing Microsoft Windows Reliability and Performance Monitor. B. You should consider auditing for logon events on the ABC-SR11. C. You should consider setting up RADIUS accounting by using SQL logging on each server D. You should consider setting up the Windows System Resource Manager (WSRM). E. You should consider setting up users containers. F. You should consider forwarding all security events from ABC-SR12 and ABC-SR13 to ABCSR11. 


Options are :

  • A,E
  • C,D
  • C,F
  • A,B

Answer : C,F

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. The YYY.com network servers run Windows Server 2008 and the workstations run Microsoft Windows Vista. YYY.com has purchased a new server, named ABC-SR15, which includes five internal SCSI hard disks connected to an on-board SCSI controller. ABC-SR15 will have Windows Server 2008 and the File Services server role installed. You have been instructed to make sure that user data and operating system data are stored separately. You are then informed that data storage should be maximized, without incurring added costs. You also have to make sure that the integrity of the data is kept and that the OS starts successfully, even if a disk becomes corrupt. Which two of the following actions should you take? (Choose two.) A. You should consider assigning three disks to a single RAID 5 volume for the user data. B. You should consider configuring a WSUS server to use a RAID 5 array. C. You should consider assigning two disks to a mirrored volume for the operating system data.D. You should consider making use of the Delegation of Control Wizard. E. You should consider assigning three disks to a mirrored volume for the operating system data. F. You should consider making use of a two-node failover cluster 


Options are :

  • A,C
  • E,F
  • C,D
  • A,B

Answer : A,C

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory forest named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com is planning to install a new child domain, named us.YYY.com, which will have two domain controllers configured to host the DNS server role. All the employees at YYY.com and the computers at the child domain will be members of us.YYY.com.  You have been instructed to make sure that fully qualified domain names is used to access resources in YYY.com's root and child domain. You have also been informed that name resolution services should be implemented in the event of a server failure and that new DNS servers should automatically be recognized when added to or removed from the YYY.com domain. You are required to devise a solution that suitably deals with the scenario. Which of the following actions should you take?   


Options are :

  • You should consider making use of Microsoft Virtual Server 2005 R2 on both the domain controllers and only create an Active Directory integrated zone for us.YYY.com on one of them
  • You should consider making use of Public Key Policies at that domain for us.YYY.com on the two domain controllers
  • You should consider creating an Active Directory Integrated zone for us.YYY.com and an Active Directory Integrated stub zone for YYY.com on one of the domain controllers.
  • You should consider making use of Network Access Protection (NAP) on both the domain controllers and only create an Active Directory integrated zone for us.YYY.com on one of them.

Answer : You should consider creating an Active Directory Integrated zone for us.YYY.com and an Active Directory Integrated stub zone for YYY.com on one of the domain controllers.

Microsoft 70-647 Windows Enterprise Administrator Exam Set 4

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have Windows Vista installed.  YYY.com has its headquarters in London and an office in Paris. The English language version of Windows Vista is installed in the London office and the Paris office uses the French version of Windows Vista. You have received instructions to make use of a Group Policy object (GPO) to apply custom application settings that enables administrators to edit the GPO with their respective language. You also have to make sure that the least amount of GPOs is installed. Which of the following actions should you take? 


Options are :

  • You should consider Background Intelligent Transfer Service (BITS) settings site to the Paris office
  • You should consider setting up ADMX and ADML files, prior to the GPO being set up and linked to the YYY.com domain.
  • You should consider setting up roaming user profiles
  • You should consider using an Active Directory-integrated zone.

Answer : You should consider setting up ADMX and ADML files, prior to the GPO being set up and linked to the YYY.com domain.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. YYY.com has its headquarters in New York and a satellite office in Dallas. The Dallas office has numerous servers that are used to store data. You have configured the use of File Server Resource Manager (FSRM) for these servers. Which of the following is TRUE with regards to File Server Resource Manager (FSRM)? (Choose all that apply.) A. It allows you to place storage limits on volumes and folders on the servers. B. It allows users unlimited storage on volumes and folders on the servers. C. It allows you to actively screen files stored by users. D. You cannot generate wide-ranging storage reports using File Server Resource Manager (FSRM).   


Options are :

  • A,B
  • A,C
  • B,D
  • C,D

Answer : A,C

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

div>