70-646 Pro Windows Server 2008 - Server Administrator Exam Set 6

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have Windows Vista installed. The YYY.com network contains 8 servers configured as file servers. You have been given the task of monitoring these files servers. Your monitoring solution should allow for notification e-mails to be sent when the available free space has reached a pre-defined level. Your solution should also include the use of quotas for file storage. Which of the following actions should you take? 


Options are :

  • You should consider setting up Shared Folders permissions.
  • You should consider setting up the File Server Resource Manager (FSRM) role service. You should also set up Quota Management and Storage Reports Management
  • You should consider setting up folder redirection and Event Subscriptions
  • You should consider setting up Windows System Resource Manager (WSRM) feature and Performance Monitor alerts

Answer : You should consider setting up the File Server Resource Manager (FSRM) role service. You should also set up Quota Management and Storage Reports Management

Microsoft Certified Solutions Developer (MCSD) For 2019 Set 2

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has two Web servers, named ABC-SR13 and ABC-SR14. You are preparing to publish a new YYY.com Web site on ABC-SR13 and ABC-SR14. You want to make sure that, in the event of one of the Web servers failing, users can still access the Web site. You are also informed that your strategy should allow for the addition of Web servers in the future, without having any impact on clients connecting to the Web site. Which of the following actions should you take? 


Options are :

  • You should recommend the creation of a Web server farm
  • You should recommend the use of a RAID 5 array for both servers.
  • You should recommend that ABC-SR13 and ABC-SR14 be configured as a failover cluster
  • You should recommend that ABC-SR13 and ABC-SR14 be configured in a Network Load Balancing cluster

Answer : You should recommend that ABC-SR13 and ABC-SR14 be configured in a Network Load Balancing cluster

Microsoft Windows Server 2016 Certification: Exam 70-741 Set 2

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 Enterprise Edition. YYY.com has headquarters in London where you are located and a Marketing division in Ireland that connects to headoffice via a WAN link. You receive an instruction from the CIO to implement a failover cluster solution between the offices that provides service availability to employees at both offices in the event of server failure as well as reducing the amount of servers. Which action should you take? 


Options are :

  • You should implement a failover cluster in the London office
  • You should implement a single node failover cluster in the offices.
  • You should implement a RAID 5 array.
  • You should implement multiple downstream servers

Answer : You should implement a single node failover cluster in the offices.

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has its headquarters in New York and is connected to the internet. YYY.com has informed you of their plans to establish a satellite office in Dallas that must be linked to the New York office via a limited Wan link. The Dallas office will not, however, have access to the Internet. You have been given the responsibility of designing a deployment strategy for 50 Windows Server 2008 R2 computers in the Dallas office. You are informed that the deployment and the activation of the new servers should occur without human intervention. You strategy should also allow for Network traffic between the New York and Dallas offices  Which of the following actions should you take? (Choose all that apply.) A. You should consider employing Key Management Service (KMS) in the Dallas office. B. You should consider employing Key Management Service (KMS) in the New York office. C. You should consider deploying a DHCP server in the Dallas office. D. You should consider deploying a DHCP server in the New York office. E. You should consider making use of Windows Deployment Services (WDS) in the Dallas office. F. You should consider making use of Windows Deployment Services (WDS) in the New York office.   


Options are :

  • A,C,E
  • C,D,E
  • B,C,D
  • A,B,C

Answer : A,C,E

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. You have been instructed to apply Encrypting File System (EFS) for YYY.coms workstations. During the process, you also instructed to enable credential roaming. Which of the following is TRUE with regards to enabling credential roaming? (Choose all that apply.) A. Once credential roaming is enabled, you can specify the length of time a roaming credential will remain in AD DS for a certificate or key that has been deleted locally. B. Once credential roaming is enabled, you are prevented from restricting roaming for credentials that exceed a specified size. C. Once credential roaming is enabled, you can specify whether to include or exclude stored user names and passwords from the credential roaming policy. D. Once credential roaming is enabled, you are prevented from specifying a maximum number of certificates and keys that can be used with credential roaming. 


Options are :

  • A,B
  • A,C
  • C,D
  • B,D

Answer : A,C

Microsoft Windows Server 2016 Certification: Exam 70-741 Set 4

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. YYY.com's domain controllers have Windows Server 2008 R2 installed, their network servers have Windows Server 2003 R2 installed, and the workstations have Windows 7 installed. Eight of the network servers are configured as Terminal Servers. YYY.com also has a server, named ABC-SR20, which has Microsoft Internet Security and Acceleration (ISA) Server 2006 installed and is configured as a firewall server. You have been instructed to configure remote access for servers that have Remote Desktop Services installed. Your configurations should allow for the use of fewer ports on the firewall, as well as the use of encryption on all connections to the Remote Desktop servers. You also have to make sure that the availability of specified Remote Desktop servers is limited. You start by upgrading one of the network servers to Windows Server 2008 R2. You have to make sure that your task is successfully completed. Which of the following actions should you take? (Choose two.) A. You should consider installing the Remote Desktop Gateway (RD Gateway) role service on the upgraded server. B. You should consider installing Windows Server 2008 R2 Datacenter Edition on the upgraded server. C. You should consider making use of use Microsoft System Center Configuration Manager (SCCM). D. You should consider setting up the Remote Desktop resource authorization policy (RD RAP) on the upgraded server. E. You should consider creating an ADMX file on the upgraded server. 


Options are :

  • C,D
  • A,B
  • A,D
  • B,E

Answer : A,D

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory forest named YYY.com. The YYY.com network servers run Windows Server 2008 R2 and the workstations run Windows 7. YYY.com has of a Marketing department that contains 500 servers. You have received instructions from the CIO to monitor the servers in such a way that you are alerted when average CPU utilization is in excess of a specified percentage for a specific length of time. You should also make sure that the CPU monitoring threshold is adjusted to make allowance for temporary workload changes. You should make sure that the adjustment occurs automatically. Which of the following actions should you take? 


Options are :

  • You should consider making use of File Server Resource Manager (FSRM).
  • You should consider having the Microsoft System Center Configuration Manager (SysMgr) deployed.
  • You should consider having the Microsoft System Center Operations Manager (OpsMgr) deployed.
  • You should consider making use of Network Policy Server (NPS) connection request policies.

Answer : You should consider having the Microsoft System Center Operations Manager (OpsMgr) deployed.

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com's Research department stores all their research data in a shared folder hosted by a file server, named ABC-SR13. The staff in the Research department has complained that finding relevant data in the shared folder is taking too long. You have been instructed to make sure that researchers are able to find data faster. Which of the following actions should you take? 


Options are :

  • You should consider installing the Windows System Resource Manager (WSRM).
  • You should consider installing the Windows Search Service
  • You should consider making use of Distributed File System (DFS) namespaces.
  • You should consider configuring Network Policy Server (NPS) connection request policies

Answer : You should consider installing the Windows Search Service

Microsoft 70-243 Administering Deploying System Manager Exam Set 2

All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. The YYY.com network has a server running the File Services server role that hosts a shared folder. A subfolder in the shared folder has been allocated to every YYY.com user for keeping their private data. You have been instructed to make sure that the amount of storage used for each subfolder is   restricted, and that any attempts to store multimedia data results in an administrator being alerted. Furthermore, you are required to make sure that your tasks make use of little or no administrator input. You then install the File Server Resource Manager (FSRM) role service on the file server. Which combination of the following actions should you take? (Choose two.) A. You should consider having hard quotas set up. B. You should consider having automated scripts set up. C. You should consider having Shared Folders permissions set up. D. You should consider having file screening set up. 


Options are :

  • A,B
  • B,C
  • A,D
  • C,D

Answer : A,D

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. The servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has recently acquired 30 new servers that either have one CPU, one dual core CPU, or two quad core CPUs. All of these servers have 64-bit hardware installed. You have been instructed to install Windows Server 2008 R2 on the new servers using Windows Deployment Services (WDS). You also have to make sure that the installation makes use of as little install images as possible. Which of the following is the amount of images required to complete this task? 


Options are :

  • 6
  • 30
  • 1
  • 15

Answer : 1

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network, including domain controllers, have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com's Marketing, Sales, and Finance departments are located in different buildings. You have received instruction to add a Read-only Domain Controller (RODC) in each of the departments. You must make sure that log on details does not form part of the RODC's installation files, and that bandwidth usage during the first AD-DS synchronization is kept as low as possible. You decide to construct an RODC in each department. You then run the ntdsutil ifm command on an existing domain controller. Why would you need to run this command? 


Options are :

  • It allows you to perform a staged RODC installation for the new RODCs.
  • It allows you to create installation media for the new RODCs.
  • It allows you to transfers and seize operations master roles for the new RODCs
  • It allows you to run an unattended installation for the new RODCs.

Answer : It allows you to create installation media for the new RODCs.

70-680 Windows 7 Configuring Certification Practice Exam Set 3

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network, including domain controllers, have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. You have been instructed to design a strategy that allows Certificate Services to issue YYY.com's intranet users certificates automatically. The strategy should also allow resources that employ certificate based authentication to be available to YYY.com's Internet users. Furthermore, you have to make sure that the certificate infrastructure of YYY.com's network has optimum protection. You decide to have an offline standalone root certification authority (CA) and an online enterprise subordinate CA deployed. You have to make sure that your task is completed successfully. Which of the following actions should you take?   


Options are :

  • You should consider having an offline standalone subordinate CA deployed.
  • You should consider having an online enterprise subordinate CA deployed.
  • You should consider having an online standalone subordinate CA deployed.
  • You should consider having an offline enterprise subordinate CA deployed.

Answer : You should consider having an online standalone subordinate CA deployed.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. YYY.com's domain controllers have Windows Server 2008 R2  installed, their network servers have Windows Server 2003 R2 installed, and the workstations have Windows 7 installed. Eight of the network servers are configured as Terminal Servers. YYY.com also has a server, named ABC-SR20, which has Microsoft Internet Security and Acceleration (ISA) Server 2006 installed and is configured as a firewall server. You have been instructed to configure remote access for servers that have Remote Desktop Services installed. Your configurations should allow for the use of fewer ports on the firewall, as well as the use of encryption on all connections to the Remote Desktop servers. You also have to make sure that workstations that do not have Windows Firewall enabled are not allowed access to YYY.com's network. You start by upgrading one of the network servers to Windows Server 2008 R2. You have to make sure that your task is successfully completed. Which of the following actions should you take? (Choose two.) A. You should consider installing the Remote Desktop Gateway (RD Gateway) role service on the upgraded server. B. You should consider installing Windows Server 2008 R2 Datacenter Edition on the upgraded server. C. You should consider making use of use Microsoft System Center Configuration Manager (SCCM). D. You should consider configuring Network Access Protection (NAP) on the upgraded server. E. You should consider creating an ADMX file on the upgraded server.   


Options are :

  • C,D
  • A,D
  • B,E
  • A,B

Answer : A,D

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 Enterprise installed. A router that meets the RFC 1542 standard is used to link two subnets that make up YYY.com's network. You have been instructed to deploy 5 new Windows Server 2008 R2 servers, which are configured to support PreBoot Execution Environment (PXE), via Windows Deployment Services (WDS). You have also been instructed to make sure that the method you use allows for WDS to be installed on the minimum required servers, and for the Windows Server 2008 R2 servers to be deployed on both subnets using WDS. You start by deploying a single server configured to run WDS and DHCP. Which of the following actions should you take to successfully complete your task?   


Options are :

  • You should consider having the Hyper-V feature deployed.
  • You should consider having the Key Management Service (KMS) server role deployed.
  • You should consider having group policy filtering enabled
  • You should consider having the IP Helper tables configured on the router

Answer : You should consider having the IP Helper tables configured on the router

Microsoft 70-243 Administering Deploying System Manager Exam Set 2

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network, including domain controllers have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has its headquarters in New York, and numerous satellite offices located in various countries. You have received instructions to implement Windows Server Update Services (WSUS) in YYY.com's environment. You have to make sure that your solution allows for the distribution of updates from the New York office. Furthermore, you are informed that a server failing should not prevent YYY.com's workstations from receiving updates. You start by setting up a Microsoft SQL Server 2008 failover cluster, and arranging 2 WSUS servers in a Network Load Balancing cluster. Which of the following actions should you take? 


Options are :

  • You should consider having WSUS set up to make use of the local database
  • You should consider configuring the WSUS servers to include mirrored physical disks.
  • You should consider having WSUS set up to make use of the remote SQL Server 2008 database instance.
  • You should consider configuring the WSUS servers to include mirrored virtual disks

Answer : You should consider having WSUS set up to make use of the remote SQL Server 2008 database instance.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network, including domain controllers have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has instructed you to devise a document access management strategy for their employees. You have been instructed to make sure that employees can make use of document versioning, and also collaborate documents while they are online. Which of the following actions should you take?   


Options are :

  • You should consider making use of folder redirection in your strategy.
  • You should consider making use of Encrypting File System (EFS) in your strategy
  • You should consider making use of Windows BitLocker Drive Encryption (BitLocker) in your strategy.
  • You should consider making use of Microsoft SharePoint Foundation 2010 in your strategy.

Answer : You should consider making use of Microsoft SharePoint Foundation 2010 in your strategy.

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. The YYY.com network has a server running Remote Desktop Services. You have been instructed to make sure that a new application is deployed in such a way that the most up to date edition of the application is always accessible to YYY.com employees via YYY.com's portal. The deployment should also allow for the installation of as little applications as possible on YYY.com workstations. You have published the application as a RemoteApp. Which of the following actions should you take NEXT? 


Options are :

  • You should make use of the Remote Desktop resource authorization policy (RD RAP).
  • You should make use of the Remote Desktop connection authorization policy (RD CAP).
  • You should have Remote Desktop Web Access (RD Web Access) enabled.
  • You should make use of the Remote Desktop Connection Broker

Answer : You should have Remote Desktop Web Access (RD Web Access) enabled.

Microsoft 70-642 Windows Server Network Infrastructure Exam Set 5

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has a web server, named ABC-SR15, which hosts an application named ABCWA7. You have been instructed to configure an authentication and encryption solution. The solution should make use of an authentication method that transmits user names and passwords across the network in clear text. The solution should also make use of an encryption method that establish establishes a secure connection. Which of the following actions should you take? 


Options are :

  • You should consider making use of Windows authentication and SSL
  • You should consider making use of Basic authentication and SSL.
  • You should consider making use of Anonymous authentication and SSL.
  • You should consider making use of Client Certificate Mapping authentication and SSL.

Answer : You should consider making use of Anonymous authentication and SSL.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has numerous servers that are configured to run the File Services server role, and have two volumes configured for the operating system and data files respectively. You have received instructions to devise a solution that allows for the recovery of the operating system, as well as the data files. You are also informed that normal operations should not be disrupted by the recovery process, which should take as little time as possible to complete. You have decided to make use of the Windows Server Backup feature. You have to make sure that the task is suitably completed. Which of the following actions should you take?   


Options are :

  • You should consider making use of Folder redirection.
  • You should consider making use of use Windows System Resource Manager (WSRM) on the new server.
  • You should consider creating a System Performance Data Collector Set.
  • You should consider making use of System Image Recovery.

Answer : You should consider making use of System Image Recovery.

You work as an administrator at YYY.com. The YYY.com network has 3 Active Directory forests that have forest trust relationships configured between them. All servers on the YYY.com network, including domain controllers, have Windows Server 2008 R2 installed. Each YYY.com forest and its Group Policy objects (GPOs) are administered by a different administrator. You are preparing to create standard GPOs for each forest. You are then informed that user configuration and computer configuration settings should be included in separate standard GPOs, without creating excessive GPOs.   You, therefore, create a GPO that is configured to make use of the required user configurations, as well as a GPO that is configured to make use of the required computer configurations. Which of the following actions should you take NEXT? 


Options are :

  • You should consider having the new GPOs exported to .exe files
  • You should consider having the new GPOs exported to .inf files
  • You should consider having the new GPOs exported to .cab files
  • You should consider having the new GPOs exported to .config files

Answer : You should consider having the new GPOs exported to .cab files

70-513 WCF Development with Microsoft .NET Framework 4 Exam Set 4

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. The servers are configured to run Windows Server 2008. You have created a web site which requires a very high availability and a high scalability for the success of the company. You therefore publish the Web site on two Web servers named ABCSR20 and ABC-SR21. You have received instructions from the CIO to implement an availability solution for your Web servers. You thus need to ensure when ABC-SR20 and ABC-SR21 are added, the connections to  the websites remain unaffected. Web site needs to remains online in the event of a server failure. How can you accomplish the goals? 


Options are :

  • You should implement a Web farm on ABC-SR20 and ABC-SR21.
  • You should implement Network Load Balancing cluster
  • You should implement Terminal Services Gateway (TS Gateway).
  • You should implement folder redirection.

Answer : You should implement Network Load Balancing cluster

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has expanded their business by establishing a satellite office in Dallas. Dallas office has numerous servers deployed of which one must be promoted to a Read-Only domain controller. Which of the following actions should you take? 


Options are :

  • You should consider making use of Administrator Role Separation
  • You should consider making use of the dcpromo command.
  • You should consider making use of Active Directory snapshots.
  • You should consider making use of IFM sub command.

Answer : You should consider making use of IFM sub command.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 Enterprise installed.  When YYY.com informs you that they are opening a few new branch offices, they request that 800 workstations containing network cards that support Pre-boot Execution Environment (PXE) be installed in these offices. Furthermore, they inform you that the workstations must have Windows 7 Enterprise installed. You have to devise a deployment solution that will allow you to install Windows 7 Enterprise on 100 workstations at the same time, with little effect to the YYY.com network. Your solution should also allow for the installation of Windows 7 Enterprise to be as fast as possible. Which combination of the following should form part of your solution? (Choose all that apply.) A. A Windows Deployment Services (WDS) server role deployment. B. A Key Management Service (KMS) server role deployment. C. The deployment of the Transport Server feature. D. The deployment of the Terminal Server feature. E. The deployment of the Desktop Experience feature. F. The use of a static multicast address range for the Transport Server. G. The use of a static multicast address range for the Terminal Server. 


Options are :

  • D,F,G
  • A,B,C
  • A,C,F
  • B,C,D

Answer : A,C,F

Microsoft 70-642 Windows Server Network Infrastructure Exam Set 2

You work as an administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. You have been instructed to devise a solution for deploying Group policy objects (GPOs) that prevents organizational unit (OU) level GPOs from being replaced by OUlevel GPOs. You are also instructed to make sure that YYY.com's Server Operators group remains unaffected by the OUlevel GPOs. Which two of the following actions should you take? A. You should consider enabling the Enforced setting for all domain level GPOs. B. You should consider enabling the Block Inheritance setting for all domain level GPOs. C. You should consider having the permissions of the GPOs that are linked to OUs altered. D. You should consider enabling the Block Inheritance setting for all OUs. 


Options are :

  • B,D
  • A,B
  • C,D
  • A,C

Answer : A,C

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory forest named YYY.com. All servers are configured to run Windows Server 2008 and the client computers Microsoft Windows Vista. There are over 100 servers on the YYY.com network. You add the subsequent precautions to enhance productivity: In the event of an application failure notification via e-mail should be sent to you. How can you ensure that both goals are achieved with least administration? (Choose TWO. Each answer forms part of the solution.) A. By using Microsoft Windows Reliability and Performance Monitor. B. By setting up event subscriptions for all servers. C. By installing a Network Policy Server (NPS) on a server. D. By using folder redirection. E. By attaching tasks to the application error events on the server. F. By using the Windows Sidebar utility.   


Options are :

  • B,E
  • C,D
  • A,D
  • A,B

Answer : B,E

You work as an administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has its headquarters in London, and a satellite office in New York. You have been instructed to deploy a Read-Only Domain Controller (RODC), named ABC-DC03, in the New York office and also design a management solution for it. You decide to configure Administrator Role Separation on ABC-DC03. Which of the following is TRUE with regards to Administrator Role Separation? 


Options are :

  • Administrator Role Separation allows you to delegate local administrative permissions for ABCDC03 to any domain user in the London office, including user rights to the domain.
  • Administrator Role Separation allows you to delegate administrative permissions for ABC-DC03 to any domain user in the New York office, including user rights to the domain.
  • Administrator Role Separation allows you to delegate local administrative permissions for ABCDC03 to any domain user in the New York office without granting that user any user rights for the domain or other domain controllers
  • Administrator Role Separation allows you to delegate local administrative permissions for ABCDC03 to any domain user in the London office without granting that user any user rights for the domain or other domain controllers.

Answer : Administrator Role Separation allows you to delegate local administrative permissions for ABCDC03 to any domain user in the New York office without granting that user any user rights for the domain or other domain controllers

70-662 Microsoft Exchange Server 2010 Configuring Exam Set 4

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network, including domain controllers have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has acquired two new servers that should be configured in a two-node failover cluster. The nodes should have the best suited edition of the Windows Server 2008 R2 operating system installed, but take up the least amount of space. Which of the following options are TRUE with regards to this scenario?   


Options are :

  • You could make use of a Server Core installation of Windows Server 2008 R2 Datacenter on one server, and a Server Core installation of Windows Server 2008 R2 Datacenter on the other.
  • You could make use of a full installation of Windows Server 2008 R2 Enterprise on the one server, and a Server Core installation of Windows Server 2008 R2 Enterprise on the other
  • You could make use of a Server Core installation of Windows Server 2008 R2 Enterprise on both servers.
  • You could make use of a full installation of Windows Server 2008 R2 Datacenter on the one server, and a Server Core installation of Windows Server 2008 R2 Datacenter on the other

Answer : You could make use of a Server Core installation of Windows Server 2008 R2 Enterprise on both servers.

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. The servers on the YYY.com network run Windows Server 2008 and all client computers either run Windows Vista or Windows XP Professional. A new YYY.com security policy stipulates that no USB devices should be installed on the Vista Computers. Only administrators and senior help desk staff members are exempted from this security policy. Which actions should you take to make allowance for this exemption?


Options are :

  • You should add Internet Protocol security (IPsec) on the domain controllers.
  • You should add a Group Policy object (GPO) on the client computers
  • You should add Key Management Service (KMS) on the client computers
  • You should add folder redirection on the client computers.

Answer : You should add a Group Policy object (GPO) on the client computers

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory forest with two domains named us.YYY.com and uk.YYY.com. All servers on the YYY.com network, including domain controllers have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. An administrator, named Andy Reid, has been given the responsibility of managing backups in the us.YYY.com domain. You have been instructed to make sure that Andy Reid only has these permissions in the us.YYY.com domain. Andy Reid should, however, is prevented from having unnecessary permissions. You have to achieve this with as little administrative effort as possible. Which of the following actions should you take? 


Options are :

  • You should consider making Andy Reid a member of the Backup Operators domain local groupin the us.YYY.com domain.
  • You should consider making Andy Reid a member of the Admins domain local group in the us.YYY.com domain.
  • You should consider making Andy Reid a member of the administrators OU on each server in the us.YYY.com domain
  • You should consider making Andy Reid a member of the Domain Admins global group in the YYY.com forest.

Answer : You should consider making Andy Reid a member of the Backup Operators domain local groupin the us.YYY.com domain.

Microsoft 70-243 Administering Deploying System Manager Exam Set 2

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. You are responsible for managing a Windows Server 2008 server named ABC-SR10. ABC-SR10 is configured to host the Terminal Services role. A new YYY.com policy states that the employees should not use more than 20% of the CPU resources in a day, with the exception of the administrators. Which actions should you take? (Choose TWO. Each answer forms part of the solution.) A. You should use Windows System Resource Manager (WSRM). B. You should create Network Load Balancing cluster. C. You should setup user policies. D. You should create a GPO. E. You should link a GPO that specifies a restrictive policy 


Options are :

  • B,E
  • A,C
  • C,D
  • A,B

Answer : A,C

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions