70-646 Pro Windows Server 2008,Server Administrator Test Set 2

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. YYY.com's domain controllers have Windows Server 2008 R2 installed, their network servers have Windows Server 2003 R2 installed, and the workstations have Windows 7 installed. Eight of the network servers are configured as Terminal Servers. YYY.com also has a server, named ABC-SR20, which has Microsoft Internet Security and Acceleration (ISA) Server 2006 installed and is configured as a firewall server. You have been instructed to configure remote access for servers that have Remote Desktop Services installed. Your configurations should allow for the use of fewer ports on the firewall, as well as the use of encryption on all connections to the Remote Desktop servers. You also have to make sure that workstations that do not have Windows Firewall enabled are not allowed access to YYY.com's network. You start by upgrading one of the network servers to Windows Server 2008 R2. You have to make sure that your task is successfully completed. Which of the following actions should you take?


Options are :

  • You should consider installing the Remote Desktop Gateway (RD Gateway) role service on the upgraded server.
  • You should consider making use of use Microsoft System Center Configuration Manager (SCCM).
  • You should consider installing Windows Server 2008 R2 Datacenter Edition on the upgraded server.
  • You should consider configuring Network Access Protection (NAP) on the upgraded server.
  • You should consider creating an ADMX file on the upgraded server.

Answer : You should consider installing the Remote Desktop Gateway (RD Gateway) role service on the upgraded server. You should consider configuring Network Access Protection (NAP) on the upgraded server.

Microsoft 70-647 Windows Enterprise Administrator Exam Set 9

You work as an administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. You have been instructed to devise a solution for deploying Group policy objects (GPOs) that prevents organizational unit (OU) level GPOs from being replaced by OUlevel GPOs. You are also instructed to make sure that YYY.com's Server Operators group remains unaffected by the OUlevel GPOs. Which two of the following actions should you take?


Options are :

  • You should consider enabling the Block Inheritance setting for all OUs.
  • You should consider having the permissions of the GPOs that are linked to OUs altered.
  • You should consider enabling the Block Inheritance setting for all domain level GPOs.
  • You should consider enabling the Enforced setting for all domain level GPOs.

Answer : You should consider having the permissions of the GPOs that are linked to OUs altered. You should consider enabling the Enforced setting for all domain level GPOs.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. YYY.com's domain controllers have Windows Server 2008 R2 installed, their network servers have Windows Server 2003 R2 installed, and the workstations have Windows 7 installed. Eight of the network servers are configured as Terminal Servers. YYY.com also has a server, named ABC-SR20, which has Microsoft Internet Security and Acceleration (ISA) Server 2006 installed and is configured as a firewall server. You have been instructed to configure remote access for servers that have Remote Desktop Services installed. Your configurations should allow for the use of fewer ports on the firewall, as well as the use of encryption on all connections to the Remote Desktop servers. You also have to make sure that the availability of specified Remote Desktop servers is limited. You start by upgrading one of the network servers to Windows Server 2008 R2. You have to make sure that your task is successfully completed. Which of the following actions should you take?


Options are :

  • You should consider making use of use Microsoft System Center Configuration Manager (SCCM).
  • You should consider installing the Remote Desktop Gateway (RD Gateway) role service on the upgraded server.
  • You should consider creating an ADMX file on the upgraded server.
  • You should consider setting up the Remote Desktop resource authorization policy (RD RAP) on the upgraded server.
  • You should consider installing Windows Server 2008 R2 Datacenter Edition on the upgraded server.

Answer : You should consider installing the Remote Desktop Gateway (RD Gateway) role service on the upgraded server. You should consider setting up the Remote Desktop resource authorization policy (RD RAP) on the upgraded server.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network, including domain controllers, have Windows Server 2008 R2 installed and all workstations have Windows XP SP 3 installed. The YYY.com is made up of 15 servers and 600 workstations. One of the servers, named ABCSR13, is configured as a Remote Desktop Services server. You have received instructions to install a new in-house application and enable desktop themes, which is a prerequisite of the application. Furthermore, the in-house application should only be  accessible from any workstation to users that have the necessary permissions. You also need to make sure that the amounts of modifications made to the workstations, as well as the costs are kept to a minimum. You start by having the Remote Desktop Connection (RDC) 7.0 software deployed to all workstations. You have to make sure that your task is suitably completed. Which combination of the following actions should you take?


Options are :

  • You should consider making use of Windows System Resource Manager (WSRM).
  • You should consider making use of Windows Deployment Services (WDS).
  • You should consider having the Desktop Experience feature enabled on ABC-SR13.
  • You should consider having the application installed on ABC-SR13.
  • You should consider making use of Microsoft System Center Configuration Manager (SCCM).

Answer : You should consider having the Desktop Experience feature enabled on ABC-SR13. You should consider having the application installed on ABC-SR13.

70-647 Pro Windows Server 2008 Enterprise Administrator Exam Set 2

You work as an Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has a server running HyperV. There are multiple virtual machines (VMs) configured on the server. YYY.com has informed you that you have to devise a solution for backing up the HyperV server. Which combination of the following should form part of your solution?


Options are :

  • You should consider making use of a full backup for each VM.
  • You should consider making use of a full backup for the HyperV server.
  • You should consider taking a snapshot of the HyperV server.
  • You should consider taking a snapshot of every VM.

Answer : You should consider making use of a full backup for each VM. You should consider making use of a full backup for the HyperV server.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have either Windows Vista or Windows 7 installed. YYY.com has informed you of their intention to enter into a working partnership with a company, named Weyland Industries, which has an Active Directory domain named weylandindustries.com. The domain controllers in the weylandindustries.com domain have Windows Server 2008 R2 installed. As a result, YYY.com has released a written security policy that prohibits the printing of classified documents, or forwarding these classified documents to recipients that are not trusted. The new policy also states that Weyland Industries users should not be able to access classified data if they do not have the necessary permissions. Furthermore, the management of the Weyland Industries users should require as little administrative effort as possible. Lastly, the network traffic between the two organizations should be handled by port 443. You start by configuring a federated trust between YYY.com and Weyland industries. You then deploy a Windows Server 2008 R2 server, named ABC-SR36. You have to make sure that the written security policy is fully adhered to. Which combination of the following actions should you take?


Options are :

  • You should consider installing the Windows SharePoint Services role on ABC-SR36.
  • You should consider installing the Active Directory Rights Management Services (AD RMS) role on ABC-SR36.
  • You should consider installing Microsoft Office SharePoint Server 2010 on ABC-SR36.
  • You should consider making use of Windows System Resource Manager (WSRM) on ABCSR36.

Answer : You should consider installing the Active Directory Rights Management Services (AD RMS) role on ABC-SR36. You should consider installing Microsoft Office SharePoint Server 2010 on ABC-SR36.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 and all workstations run Windows Vista. The Active Directory domain has a top level OU named ABCStaff that contains three OU's named ABCMan, ABCPerm, and ABCTemp. ABCMan hosts the user accounts of YYY.com's managers, ABCPerm hosts the user accounts of YYY.com's permanent staff, and ABCTemp host the user accounts of YYY.com's temporary staff. ABCStaff has previously been configured in such a way that the Group Policy object (GPO) settings applied to it also affects members of the ABCMan OU. You have been instructed to make sure that ABCMan OU will not be affected when GPO settings are applied to ABCStaff. Which of the following actions should you take?


Options are :

  • You should consider configuring the ABCStaff OU to have the Block Policy Inheritance setting enabled.
  • You should consider making use Netsh tool.
  • You should consider configuring the ABCMan OU to have the Block Policy Inheritance setting enabled.
  • You should consider configuring the ABCPerm OU to make use of the Microsoft Multipath I/O.

Answer : You should consider configuring the ABCMan OU to have the Block Policy Inheritance setting enabled.

Microsoft 70-647 Windows Enterprise Administrator Exam Set 3

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. You have been instructed to apply Encrypting File System (EFS) for YYY.com's workstations. During the process, you also instructed to enable credential roaming. Which of the following is TRUE with regards to enabling credential roaming?


Options are :

  • Once credential roaming is enabled, you are prevented from specifying a maximum number of certificates and keys that can be used with credential roaming.
  • Once credential roaming is enabled, you can specify the length of time a roaming credential will remain in AD DS for a certificate or key that has been deleted locally.
  • Once credential roaming is enabled, you are prevented from restricting roaming for credentials that exceed a specified size.
  • Once credential roaming is enabled, you can specify whether to include or exclude stored user names and passwords from the credential roaming policy.

Answer : Once credential roaming is enabled, you can specify the length of time a roaming credential will remain in AD DS for a certificate or key that has been deleted locally. Once credential roaming is enabled, you can specify whether to include or exclude stored user names and passwords from the credential roaming policy.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. You are in the process of configuring a new MEDV workspace. Which of the following statements are TRUE with regards to the MEDV workspace?


Options are :

  • You are able to clone a MED-V workspace from the Policy menu.
  • You are unable to clone a MED-V workspace from the Policy menu.
  • You are able to delete a MED-V workspace by clicking Remove in the Policy menu.
  • You are able to delete a MED-V workspace by clicking Remove in the Policy module, while the workspace pane is in focus.

Answer : You are able to clone a MED-V workspace from the Policy menu. You are able to delete a MED-V workspace by clicking Remove in the Policy module, while the workspace pane is in focus.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have either Windows XP Professional or Microsoft Windows Vista installed. You have been instructed to design a VPN solution that allows for encrypted text to be used when storing VPN passwords. Furthermore, workstations that are configured as members of a workgroup, and Suite B cryptographic algorithms should be supported. You also have to make sure that certificates can be automatically enrolled. Which combination of the following actions should you take?


Options are :

  • You should consider making use of an IPsec VPN that uses certificate-based authentication.
  • You should consider making use of Windows Deployment Services (WDS).
  • You should consider making use of the Windows System Resource Manager (WSRM).
  • You should consider upgrading the Windows XP Professional workstations to Windows Vista.
  • You should consider making use of an enterprise certification authority (CA) that is based on Windows Server 2008.
  • You should consider making use of the 64-bit version of Windows Server 2008 Datacenter Edition.

Answer : You should consider making use of an IPsec VPN that uses certificate-based authentication. You should consider upgrading the Windows XP Professional workstations to Windows Vista. You should consider making use of an enterprise certification authority (CA) that is based on Windows Server 2008.

Microsoft Certified Solutions Developer (MCSD) For 2019 Set 1

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network has Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has released a security policy requiring all servers and workstations to have the same Windows firewall settings. You have been instructed to make sure that this policy is adhered to using as little administrative effort as possible. Which of the following actions should you take?


Options are :

  • You should consider creating an ADML file.
  • You should consider creating a Windows Management Instrumentation (WMI) filter.
  • You should consider making use of local Group Policy objects (GPOs)
  • You should consider making use of domain-based Group Policy objects (GPOs)

Answer : You should consider making use of domain-based Group Policy objects (GPOs)

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network, including domain controllers have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has instructed you to devise a document access management strategy for their employees. You have been instructed to make sure that employees can make use of document versioning, and also collaborate documents while they are online. Which of the following actions should you take?


Options are :

  • You should consider making use of folder redirection in your strategy.
  • You should consider making use of Encrypting File System (EFS) in your strategy.
  • You should consider making use of Microsoft SharePoint Foundation 2010 in your strategy.
  • You should consider making use of Windows BitLocker Drive Encryption (BitLocker) in your strategy.

Answer : You should consider making use of Microsoft SharePoint Foundation 2010 in your strategy.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2003 installed and all workstations have Windows Vista installed. The YYY.com network contains two servers named ABC-SR10 and ABC-SR11. ABC-SR10 has a 32-bit version of Windows Server 2003 installed, while ABC-SR11 has a 64-bit version installed. Both servers has an application installed, named TestApp1 and TestApp2, respectively. The two applications require their respective operating systems to function properly. You have been instructed move the applications to a server running Windows Server 2008. To keep costs to a minimum, you want to make use of a single server, and make use of Hyper-V feature on the server before installing the applications on separate child virtual machines. Which of the following actions should you take?


Options are :

  • You should consider installing a 32-bit version of Windows Server 2008 Enterprise Edition on the new server.
  • You should consider installing a 32-bit version of Windows Server 2008 Enterprise Edition on the new server.
  • You should consider installing a 64-bit version of Windows Server 2008 Enterprise Edition on the new server.
  • You should consider installing a 64-bit version of Windows Server 2008 Standard on the new server.

Answer : You should consider installing a 64-bit version of Windows Server 2008 Enterprise Edition on the new server.

70-662 Microsoft Exchange Server 2010 Configuring Exam Set 2

You work as an administrator at YYY.com. The YYY.com network has 3 Active Directory forests that have forest trust relationships configured between them. All servers on the YYY.com network, including domain controllers, have Windows Server 2008 R2 installed. Each YYY.com forest and its Group Policy objects (GPOs) are administered by a different administrator. You are preparing to create standard GPOs for each forest. You are then informed that user configuration and computer configuration settings should be included in separate standard GPOs, without creating excessive GPOs. You, therefore, create a GPO that is configured to make use of the required user configurations, as well as a GPO that is configured to make use of the required computer configurations. Which of the following actions should you take NEXT?


Options are :

  • You should consider having the new GPOs exported to .inf files
  • You should consider having the new GPOs exported to .cab files.
  • You should consider having the new GPOs exported to .config files
  • You should consider having the new GPOs exported to .exe files

Answer : You should consider having the new GPOs exported to .cab files.

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has expanded their business by establishing a satellite office in Dallas. Dallas office has numerous servers deployed of which one must be promoted to a Read-Only domain controller. Which of the following actions should you take?


Options are :

  • You should consider making use of the dcpromo command.
  • You should consider making use of IFM subcommand.
  • You should consider making use of Active Directory snapshots.
  • You should consider making use of Administrator Role Separation.

Answer : You should consider making use of IFM subcommand.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has its headquarters in London and two satellite offices in Paris and Milan. The Paris and Milan offices are linked to each other via a WAN connection. Each satellite office has a file server that hosts data for that office. You have been instructed to make sure that data hosted on the file servers are accessible to both the Paris and Milan offices. You also have to make sure that the files on either file server remains accessible to users, even in the event of the WAN connection failing. You are then informed that your solution should provide for a reduction in the utilization of network bandwidth. Which of the following actions should you take?


Options are :

  • You should consider making use of Distributed File System Replication (DFSR) on the file servers in the Paris and Milan offices.
  • You should consider installing AD RMS.
  • You should consider installing a Windows Server 2008 Datacenter Edition server in both offices.
  • You should consider making use of the ServerManagerCMD tool on both the servers

Answer : You should consider making use of Distributed File System Replication (DFSR) on the file servers in the Paris and Milan offices.

Microsoft 70-642 Windows Server Network Infrastructure Exam Set 8

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. The YYY.com network has a server running Remote Desktop Services. You have been instructed to make sure that a new application is deployed in such a way that the most up to date edition of the application is always accessible to YYY.com employees via YYY.com's portal. The deployment should also allow for the installation of as little applications as possible on YYY.com workstations. You have published the application as a RemoteApp. Which of the following actions should you take NEXT?


Options are :

  • You should make use of the Remote Desktop connection authorization policy (RD CAP).
  • You should make use of the Remote Desktop resource authorization policy (RD RAP).
  • You should make use of the Remote Desktop Connection Broker.
  • You should have Remote Desktop Web Access (RD Web Access) enabled.

Answer : You should have Remote Desktop Web Access (RD Web Access) enabled.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have either Windows XP Professional or Microsoft Windows Vista installed. YYY.com has informed you of their intention to enter into a working partnership with a company, named Weyland Industries, which has an Active Directory domain named weylandindustries.com. The domain controllers in the weylandindustries.com domain have Windows Server 2008 installed. As a result, YYY.com has released a written security policy that prohibits the printing of classified documents, or forwarding these classified documents to recipients that are not trusted. The new policy also states that Weyland Industries users should not be able to access classified data if they do not have the necessary permissions. Furthermore, the management of the Weyland Industries users should require as little administrative effort as possible. Lastly, the network traffic between the two organizations should be handled by port 443. You need to devise a solution that adheres to the new policy. Which combination of the following actions should you take?


Options are :

  • You should consider configuring Credential Roaming.
  • You should consider starting a federated trust between YYY.com and Weyland Industries.
  • You should consider configuring NTFS permissions on the Active Directory database.
  • You should consider installing a Windows Server 2008 server with the Windows SharePoint Services role installed.
  • You should consider installing a Windows Server 2008 server that runs Microsoft Office SharePoint Server 2007, and has the Active Directory Rights Management Services (AD RMS) role installed.

Answer : You should consider starting a federated trust between YYY.com and Weyland Industries. You should consider installing a Windows Server 2008 server that runs Microsoft Office SharePoint Server 2007, and has the Active Directory Rights Management Services (AD RMS) role installed.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. You want to group shared folders that are located on different servers into a single logically structured namespace. The namespace should appear to users as a single shared folder with a series of sub folders, and should not require routing over WAN connections. Which of the following actions should you take?


Options are :

  • You should consider making use of Distributed File System (DFS) Replication.
  • You should consider making use of Distributed File System (DFS) namespaces.
  • You should consider making use of AD RMS.
  • You should consider making use of File Server Resource Manager (FSRM).

Answer : You should consider making use of Distributed File System (DFS) namespaces.

70-680 Windows 7 Configuring Certification Practice Exam Set 2

You work as an administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. You have been instructed to make sure that YYY.com's are forced to make use of complex passwords for their user accounts. You have to make sure that your method is executed using as little servers as possible. Which of the following actions should you take?


Options are :

  • You should consider making use of Encrypting File System (EFS).
  • You should consider making use of Microsoft System Center Configuration Manager (SCCM).
  • You should consider making use of File Server Resource Manager (FSRM).
  • You should consider having a new Password Settings Object (PSO) configured for YYY.com's administrators.

Answer : You should consider having a new Password Settings Object (PSO) configured for YYY.com's administrators.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 and all client computers run Windows Vista. The YYY.com network has of a Finance division. You create an OU named FinancialData1 that contains the user and computer accounts of the Finance Division. You want to install a new inhouse Finance application on the client computer in the Finance division. Other YYY.com users must not have access to the application. What actions should you take?


Options are :

  • You should implement the Key Management Service (KMS) on all computers in FinancialData1.
  • You should implement a DFS Namespace.
  • You should implement the Background Intelligent Transfer Service (BITS) settings.
  • You should implement a Group Policy object (GPO) for FinancialData1.

Answer : You should implement a Group Policy object (GPO) for FinancialData1.

70-647 Pro Windows Server 2008 Enterprise Administrator Exam Set 4

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 and all client computers run Windows Vista. The YYY.com network contains a Windows Server 2008 failover cluster that in turn hosts a database application. During routine monitoring you discover that the database application make use of almost half of processor and memory usage allocated for it. You want to make sure that the level of performance is maintained on the cluster. How can this be achieved?


Options are :

  • By establishing a resource-allocation policy for process-based management.
  • The using event subscriptions.
  • By establishing Performance Monitor alerts.
  • By using the Microsoft System Center Configuration Manager (SCCM)
  • By using the Windows System Resource Manager (WSRM)

Answer : By establishing a resource-allocation policy for process-based management. By using the Windows System Resource Manager (WSRM)

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. The servers on the YYY.com network are configured to run Windows Server 2008 and the client computers run Windows Vista. YYY.com has its headquarters in Paris and branch offices in London and Stockholm. You are in the process of devising a file sharing policy to ensure standardization throughout the network. Your policy needs to ensure that the YYY.com offices are able to access the files using the universal Naming Convention (UNC) path. In the event of a server failure files should still be accessible and the minimum bandwidth needs to be utilized. You need to determine the components that need to be added to your policy?


Options are :

  • You should add a DFS namespace that is domain-based and uses replication.
  • You should add the Hyper-V feature to your policy.
  • You should add a DFS namespace that is server-based and uses replication.
  • You should use failover clusters with three servers, one for each office.

Answer : You should add a DFS namespace that is domain-based and uses replication.

You work as the network administrator at YYY.com. The YYY.com network consists of a single Active Directory domain named YYY.com. YYY.com network servers run Microsoft Windows Server 2008 and the client computers run Microsoft Windows Vista or Microsoft Windows XP Professional. You are preparing a server deployment that will host Microsoft SQL Server 2005 for the YYY.com employees. In your deployment strategy you need to make sure that productivity with regard to SQL services will not be interrupted when a server happens to go offline. Which action should you take?


Options are :

  • You should install a full installation of Windows Server 2008 Enterprise Edition.
  • You should configure failover clusters on the two servers.
  • You should use two servers.
  • You should use the Windows System Resource Manager (WSRM).
  • You should use of Network Load Balancing on one servers.

Answer : You should install a full installation of Windows Server 2008 Enterprise Edition. You should configure failover clusters on the two servers. You should use two servers.

Microsoft Windows Server 2016 Certification: Exam 70-741 Set 5

You work as an Enterprise administrator at YYY.com. The YYY.com network consists of a single Active Directory domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 and all client computers run Windows Vista. You have received notification from management that Windows Server Update Services (WSUS) has been approved for YYY.com. YYY.com wants you to ensure that the updates are dispensed from one site and that all client computers are able to acquire the necessary updates even when a server is unavailable. You thus decide to set up a Microsoft SQL Server 2005 failover cluster. Identify your next steps?


Options are :

  • You should use the remote SQL Server 2005 database instance to set up WSUS.
  • You should configure the WSUS server in the one site as an upstream server.
  • You should use a Group Policy object to setup Windows Update.
  • You should copy the metadata to a single WSUS server on the network.
  • You should set up a NLB cluster that contains two WSUS servers.

Answer : You should use the remote SQL Server 2005 database instance to set up WSUS. You should set up a NLB cluster that contains two WSUS servers.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network run Windows Server 2008. Half the client computers run Windows XP Professional, and the rest run Windows Vista. You are responsible for managing a server named ABC-SR05. ABC-SR05 is configured to host the Terminal Services role. You have to make sure that YYY.com employees can run a third-party application from a shortcut on their client computers. Employees should however not be allowed to open the application when they are offline.


Options are :

  • You should implement a GPO on the third-party application to all client computers.
  • You should implement a Data Collector set.
  • You should create roaming user profiles.
  • You should implement device installation restrictions on the client computers.

Answer : You should implement a GPO on the third-party application to all client computers.

You work as the network administrator at YYY.com. The YYY.com network consists of a domain named YYY.com. The network servers run either Windows Server 2003 or Windows Server 2008 and the client computers run Microsoft Windows Vista. Your job function includes managing a Windows Server 2003 server named ABC-SR02. ABCSR02 is configured to host a database application. You want to migrate the application to Windows Server 2008. You need to set up ABC-SR02 so that the application can be accessed even in the event of server failure. Your solution should also allow for the installation of .NET applications and the reduction of the cost of the software. Which options should you select that will support the Web application?


Options are :

  • You should set up a RAID 5 array.
  • You should have a full installation of Windows Server 2008 Web Edition installed on two servers in the network.
  • You should have a failover cluster installed that contains one node.
  • You should have Terminal Services installed on the servers in the network.
  • You should establish a Network Load Balancing cluster.

Answer : You should have a full installation of Windows Server 2008 Web Edition installed on two servers in the network. You should establish a Network Load Balancing cluster.

70-247 Configuring and Deploying a Private Cloud Exam Set 2

You work as the network administrator at YYY.com. The YYY.com network consists of a domain named YYY.com. The network servers run Microsoft Windows Server 2008 and the client computers run Microsoft Windows Vista. Due to company growth, YYY.com installs 6 Server Core servers that can be accessed via HTTP and HTTPS. You have to ensure that the serer roles on the 6 servers are remotely installed and managed by the local administrators. How can this be achieved?


Options are :

  • You should run the key Management Service (KMS) and add the Component Services snap-in on the computers of the local administrators
  • You should select the Windows Remote Management (WinRM) on the computers of the local administrators.
  • You should create a GlobalNames zone and enable the zone on the computer of the local administrator.
  • You should use Credential Roaming on the computers of the local administrators.

Answer : You should select the Windows Remote Management (WinRM) on the computers of the local administrators.

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. The servers on the YYY.com network run Windows Server 2008 and all client computers either run Windows Vista or Windows XP Professional. A new YYY.com security policy stipulates that no USB devices should be installed on the Vista Computers. Only administrators and senior helpdesk staff members are exempted from this security policy. Which actions should you take to make allowance for this exemption?


Options are :

  • You should add Key Management Service (KMS) on the client computers.
  • You should add a Group Policy object (GPO) on the client computers.
  • You should add Internet Protocol security (IPsec) on the domain controllers.
  • You should add folder redirection on the client computers.

Answer : You should add a Group Policy object (GPO) on the client computers.

You work as the Enterprise administrator at YYY.com. The YYY.com network consists of a single Active Directory domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 and all client computers run Windows Vista. YYY.com has its headquarters in Chicago where you are located and a branch office in Dallas that employs a number of helpdesk staff. You have to implement a new server named ABC-SR10 in the Dallas office. The setup policy of YYY.com states that all helpdesk staff have the necessary permissions to manage services. The helpdesk staff should also be able to configure server roles on ABC-SR10. You need to accomplish this ensuring that the helpdesk staff have the least amount of permissions. How can this be achieved?


Options are :

  • You should make the helpdesk staff, members of the global security group.
  • You should make the helpdesk staff, members of the Server Operators group on ABC-SR10.
  • You should make the helpdesk staff, members of the Account Operators group on ABC-SR10.
  • You should make helpdesk staff, members of the Administrators group on ABC-SR10.

Answer : You should make helpdesk staff, members of the Administrators group on ABC-SR10.

Microsoft 70-243 Administering Deploying System Manager Exam Set 2

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions