70-647 Pro Windows Server 2008 Enterprise Administrator Exam Set 3

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. The YYY.com network has two web servers named ABC-SR07 and ABC-SR08. YYY.com wants to hosts the company's e-commerce Web site named sales.YYY.com on the two web servers. You receive instructions from the CEO to ensure that the Web site is available even when one of the Web servers is offline. The CEO also wants the session state of the web site to be available should one of the web servers be offline. Additionally, you must be able to support the Web site on up to six Web servers with each Web server having a dedicated IP address. What action should you take?


Options are :

  • Configure multiple host headers for the sales.YYY.com website.
  • Configure a two-failover cluster on ABC-SR07 and ABC-SR08.
  • NONE
  • Configure multiple ports for the sales.YYY.com web site.
  • . Configure Network Load Balancing on ABC-SR07 and ABC-SR08. .

Answer : . Configure Network Load Balancing on ABC-SR07 and ABC-SR08. .

Microsoft Dynamics Expand and Test Your Skills Practice Test Set 2

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. YYY.com users have the same domain user account name as their e-mail addresses. YYY.com is acquired by another company and the new owners want to have YYY.com rebranded with the name TestLabs, Inc. The domain name, user accounts and email addresses will be changed to testlabs.com to reflect the rebranding. How can you ensure that users can log on to their computers once the rebranding has been implemented?


Options are :

  • By renaming the domain to testlabs.com.
  • . By creating a new forward lookup zone for testlabs.com.
  • By creating an UPN suffix.
  • . By creating a new DNS zone for testlabs.com.

Answer : By creating an UPN suffix.

You work as an enterprise administrator at YYY.com. The YYY.com network has a forest named and YYY.com that runs at the forest functional level of Windows Server 2003. YYY.com has a subsidiary company named TestLabs, Inc. The TestLabs, Inc. network has a forest named and testlabs.com that runs at the forest functional level of Windows Server 2003. All domain controllers on both the YYY.com network and the TestLabs, Inc. network run Windows Server 2008. YYY.com users do not have access to network resources in TestLabs, Inc. TestLabs, Inc. has a file server named TESTLABS-SR07. YYY.com users must be able to access shared folders on TESTLABS-SR07. However, YYY.com users must not be able to access any other network resources in TestLabs, Inc. Which of the following options would you choose to accomplish this task? (Each correct option will form a part of the answer. Select TWO.) A. By raising the forest functional level of YYY.com and testlabs.com to Windows Server 2008. B. By raising the domain functional level of all domains in YYY.com and testlabs.com to Windows Server 2008. C. By creating a forest trust between YYY.com and testlabs.com. D. By setting the Allowed to Authenticate for TESTLABS-SR07. E. By setting the Allowed to Authenticate right on the computer object for the testlabs.com infrastructure operations master object


Options are :

  • A,B
  • A,C
  • B,E
  • C,D

Answer : C,D

You work as an enterprise administrator at YYY.com. The YYY.com network has a UNIX domain named YYY.com. YYY.com has its headquarters in Chicago and branch offices in Boston, Atlanta, Miami and Dallas. The offices are configured as separate sites that are connected by WAN links. YYY.com wants to migrate to a Windows Server 2008 Active Directory environment that consists of a forest with five domains, one for each office. You begin the migration by decommissioning the UNIX servers and having the first Windows Server 2008 domain controller in the forest deployed in the Chicago office. You must now have Windows Server 2008 domain controllers deployed to the Boston, Atlanta, Miami and Dallas offices. To reduce traffic over the WAN links, you want YYY.com users to use the domain controller in their respective offices when they authenticate to the domain, unless the domain controller in their office is offline. How would you accomplish this task? (Each correct option will form a part of the answer. Select TWO.) A. By clearing the Bridge all site links checkbox in Active Directory Sites and Services. B. By creating a subnet object for each office in Active Directory Sites and Services. C. By selecting Universal Group Membership Caching checkbox in the NTDS Site Settings properties window. D. By creating an OU for each office in Active Directory Users and Computers. E. By installing the domain controllers in the branch offices as read-only domain controllers (RODCs). F. By creating a site object for each office in Active Directory Sites and Services. G. By disabling the Global Catalog option on the domain controllers in the branch offices. H. By creating a site link for each office. I. By creating a site link bridge for each office.


Options are :

  • A,D
  • B,F
  • C,D
  • A,C

Answer : B,F

70-646 Pro Windows Server 2008 - Server Administrator Exam Set 3

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008 and all client computers run Windows Vista with Service Pack 1 (SP1) installed. The YYY.com network has four servers named ABC-SR04, ABC-SR05, ABC-SR06 and ABCSR07. ABC-SR04 is configured as a domain controller with the Active Directory Domain Services (AD DS) installed, ABC-SR05 is configured as a VPN server with the Routing and Remote Access services (RASS) installed, ABC-SR06 is configured as a terminal server with the Terminal Services server role installed and ABC-SR07 is configured as a Web server with the Web Server (IIS) server role installed. YYY.com users connect to ABC-SR04 via VPN connections when they work from remote locations. You have been assigned the task of configuring ABC-SR06 to allow remote users to run TS RemoteApp applications. You must also allow remote users to access the RemoteApp applications from Web page which has been customized to provide access to TS RemoteApp applications? Which of the following options would you choose?


Options are :

  • By Installing the TS Web Access role service on ABC-SR07.
  • . By Installing the TS Gateway role service on ABC-SR06. . .
  • By Installing the Web Server (IIS) server role on ABC-SR06.
  • By Installing the TS Session Broker role service On ABC-SR04. .

Answer : By Installing the TS Web Access role service on ABC-SR07.

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com with a single site named SiteA. All servers in the YYY.com network run Windows Server 2008. You reorganize the Active Directory infrastructure to include a second site named SiteB with its own domain controller. How would you configured the firewall to allow replication between SiteA and SiteB?


Options are :

  • Enable RPC traffic to pass through the firewall.
  • . Enable SMTP traffic to pass through the firewall.
  • Enable IPSec traffic to pass through the firewall. .
  • . Enable NNTP traffic to pass through the firewall

Answer : Enable RPC traffic to pass through the firewall.

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. YYY.com has its headquarters in Chicago and a branch office in Boston. The Boston office is connected to the Chicago by a WAN link. You work at the Chicago office. YYY.com acquires a new server named ABC-SR07 that is shipped to the Boston office. YYY.com wants ABC-SR07 to be configured as a read-only domain controller (RODC). A TGesABCing.com user named Rory Allen works at the Boston office. You need to provide Rory Allen with the required permissions to configure ABC-SR07 as a RODC without making him a member of the Domain Administrators group. Which of the following options would you do first to accomplish this task


Options are :

  • Install ABC-SR07 as a domain controller. . .
  • . Create a read-only domain controller (RODC) account for ABC-SR07.
  • . Install the RODC role on an existing member server in the Boston office
  • Enable the RODC roll on an existing domain controller.

Answer : . Create a read-only domain controller (RODC) account for ABC-SR07.

70-647 Pro Windows Server 2008 Enterprise Administrator Exam Set 2

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. The YYY.com network has a file server named ABC-SR07 that hosts a shared folder named ABCDocs. Several Microsoft Word documents are stored in the ABCDocs share. You want to enable document version history on these documents. You also want the documents in the ABCDocs share to be accessed through a Web page. Which of the following roles or services would you install on ABC-SR07 to achieve the desired results cost effectively?


Options are :

  • Microsoft Windows SharePoint Services (WSS) 3.0.
  • Application Server role.
  • FTP Server role. x
  • . File and Print Services role

Answer : Microsoft Windows SharePoint Services (WSS) 3.0.

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. The YYY.com network has a file server named ABC-SR08 that is used by employees to store their documents. You want the documents on ABC-SR08 to be stored in centrally and to be protected automaticall and that documents cannot be printed remotely. Which of the following options would you use to accomplish this task? (Each correct option will form a part of the answer. Select TWO.) A. Microsoft Windows SharePoint Services (WSS) 3.0 B. Encrypting File System (EFS) C. Microsoft Office SharePoint Server (MOSS) 2007 D. Microsoft Baseline Security Analyzer (MBSA) E. Windows BitLocker Drive Encryption (BitLocker) F. Active Directory Rights Management Services (AD RMS)


Options are :

  • C,F
  • C,D
  • A,D
  • A,B

Answer : C,F

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. The YYY.com network has two servers named ABC-SR05 and ABC-SR06. ABC-SR05 is configured as an Enterprise Root Certification Authority (CA) and has the Active Directory Certificate Services (AD CS) installed while ABC-SR06 is a file server. The YYY.com network also has two Web servers named ABC-SR07 and ABC-SR08. ABC-SR07 hosts YYY.com's intranet Web site while ABC-SR08 hosts a replica of the intranet Web site. You want YYY.com users to use any of the Web servers when they connect to the intranet Web site. However, YYY.com users must use secure HTTP and a single URL to connect to the intranet Web site. How would you accomplish the given task? (Each correct option will form a part of the answer. Select THREE.) A. By configuring ABC-SR07 and TRESABCING-SR08 as a Network Load Balancing cluster. B. By configuring ABC-SR07 and TRESABCING-SR08 as a failover cluster. C. By using ABC-SR05 to issue a Web server certificate for the intranet Web site. D. By installing Internet Information Services (IIS) on ABC-SR07 and TRESABCING-SR08. E. By installing the Web server certificate on ABC-SR07 and TRESABCING-SR08. F. By installing the Web server certificate on ABC-SR05


Options are :

  • A,D,B
  • B,E,D
  • A,C,E
  • D,C,A

Answer : A,C,E

70-680 Windows 7 Configuring Certification Practice Exam Set 3

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. You have to implement a Certificate Services solution that is always available even when a server is not available. Your solution must also allow you to control which kinds of certificates are issued as well as the delegation of certificate enrolment for different groups. Which of the following options would you choose to accomplish this task? (Each correct option will form a part of the answer. Select TWO.) A. By installing two servers in a fail over cluster. B. By installing two servers in a Network Load Balancing cluster. C. By configuring an enterprise certification authority (CA). D. By configuring a stand-alone root certification authority (CA). E. Byonfiguring a stand-alone subordinate CA. F. By configuring an enterprise subordinate CA


Options are :

  • C,D
  • A.D
  • A,B
  • B,C

Answer : A.D

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. YYY.com has its headquarters in Miami and branch offices in Atlanta and Dallas. Each office is configured as a separate site that is connected to the Miami office by WAN links. Each office has two file servers. YYY.com users in the Dallas office must access files on a file server named ABC-SR07 that is located in the Miami office. You need to ensure that Dallas users can still access the files even when the WAN link is down. However, you must ensure that any increased in traffic over the WAN link is scheduled to occur after business hours. How can you accomplish the above goals?


Options are :

  • You should create a stile link bridge between the Miami and Dallas offices. .
  • You should replicated data from the Miami office to the Dallas office by using Distributed File Services (DFS) Replication.
  • . You should install a Bridgehead server in the Dallas office.
  • You should replicate data from the Miami office to the Dallas office by using File Replication Service (FRS).

Answer : You should replicated data from the Miami office to the Dallas office by using Distributed File Services (DFS) Replication.

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. YYY.com runs a critical application that accesses data that is stored in a Microsoft SQL Server 2005 database server named ABC-DB02. Which of the following options would you choose to ensure that the database is always available?


Options are :

  • None of the Above
  • . Two Windows Server 2008 servers running MS SQL Server 2005 Enterprise Edition in a failover cluster
  • Two Windows Server 2008 servers running MS SQL Server 2005 Enterprise Edition in a Network Load Balancing (NLB) cluster
  • . Two Windows Server 2008 servers running MS SQL Server 2005 Standard Edition in a failover cluster.
  • Two Windows Server 2008 servers running MS SQL Server 2005 Standard Edition in a Network Load Balancing (NLB) cluster. .

Answer : . Two Windows Server 2008 servers running MS SQL Server 2005 Enterprise Edition in a failover cluster

Microsoft 70-642 Windows Server Network Infrastructure Exam Set 3

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. What would be your first step if you want to maintain the same security configuration for all servers on the network using the least amount of administration?


Options are :

  • Copy the registry hive files from a source server to the other servers on the network.
  • . Back up the System State data on a source server on the network. . .
  • Run the Security Configuration and Analysis utility on a source server on the network.
  • Run the Security Configuration Wizard (SCW) on a source server on the network

Answer : Run the Security Configuration Wizard (SCW) on a source server on the network

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. You want to plan a backup strategy for the domain controllers that allows you to recover Active Directory objects that were accidently deleted. Which of the following options would you choose to accomplish the assigned task?


Options are :

  • . Schedule regular backups of the ntds.dat file on the existing domain controllers
  • Configure the existing domain controllers to be Read Only Domain Controllers (RODCs).
  • Ensure that your backup schedule includes regular backups of the System State data on the domain controllers.
  • . Install Active Directory Lightweight Directory Services (AD LDS).

Answer : Ensure that your backup schedule includes regular backups of the System State data on the domain controllers.

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008 while the client computers run different client operating systems. The YYY.com network has a firewall that separates the internal network from the perimeter network, and another firewall that separates the perimeter network from the Internet. A server named ABC-SR07 that has the Routing and Remote Access Service (RRAS) installed is installed in the perimeter network. ABC-SR07 is used by remote users to connect to the esABCing.com network. YYY.com issues a new remote access policy that states that only Windows Vista client computers that have the latest Windows updates and virus definitions installed and have the Windows Firewall enabled may be allowed to connect to ABC-SR07. How would you implement this policy?


Options are :

  • By creating a Group Policy object (GPO) that enable Windows Firewall and linking the GPO to the domain. .
  • By creating an OU for the client computers with the latest Windows updates and virus definitions installed and the Windows Firewall enabled, and granting the OU dial-in permissions on ABC-SR07.
  • . By implementing Authorization Manager on ABC-SR07.
  • By configuring Network Access Protection (NAP) on the perimeter network

Answer : By configuring Network Access Protection (NAP) on the perimeter network

Microsoft Windows Server 2016 Certification: Exam 70-741 Set 2

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008 and half the client computers run Windows XP with Service Pack 3 (SP3) installed and the other half run Windows Vista. What should you do to ensure that certificate enrollment is automated and support by all client computers? (Each correct option will form a part of the answer. Select TWO.) A. By configuring a stand-alone certification authority (CA). B. By configuring a subordinate certification authority (CA). C. By configuring an enterprise certification authority (CA). D. By installing a certificate from a public certification authority (CA). E. By configuring V2 templates. F. By configuring V1 templates


Options are :

  • A,B
  • C,E
  • A,C
  • C,D

Answer : C,E

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com that runs at the domain functional level of Windows Server 2008. Which of the following options can be used for tracking any modification to Active Directory Objections?


Options are :

  • Configure a Group Policy to run the Security Configuration Wizard on all computers in the ABC network.
  • . Enable auditing of the ntds.dat file in the Default Domain Group Policy.
  • . Configure the Default Domain Group Policy to audit Directory Services.
  • . Configure the Default Domain Controllers Group Policy to audit Directory Services.

Answer : . Configure the Default Domain Controllers Group Policy to audit Directory Services.

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com and a workgroup named ABCGROUP. All servers in the YYY.com network run Windows Server 2008 and all the client computers run Windows Vista. The YYY.com network has unmanaged network switches and has two servers named ABC-SR07 and ABC-SR08. ABC-SR07 is configured with the Active Directory Domain Services (AD DS), the Active Directory Certificate Services (AD CS) and the Dynamic Host Configuration Protocol (DHCP) service while ABC-SR08 is configured with the Routing and Remote Access Service (RRAS), the Network Policy Service (NPS) and Health Registration Authority (HRA). You notice that the latest Microsoft updates have not been applied to all client computers that are part of the ABCGROUP workgroup. You are concerned that YYY.com users are accessing the local area network (LAN) from these client computers. You want to implement Network Access Protection (NAP) to secure the network by preventing client computers that are not members of the YYY.com network or do not have the latest Microsoft updates from accessing any network servers that are members of the YYY.com domain. Which of the following option would you choose?


Options are :

  • IPsec
  • TCP/IP
  • L2TP
  • DHCP

Answer : IPsec

Microsoft Dynamics Expand and Test Your Skills Practice Test Set 2

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. YYY.com has its headquarters in Miami and a branch office in and Dallas. The Dallas office is connected to the Miami office by a WAN link. The two offices are structured as separate sites named Miami and Dallas. The YYY.com network has several Microsoft SQL Server 2005 database servers. You receive instruction from YYY.com to implement failover clustering using the least number of database servers on the network. What action should you take to make sure that the cluster services are available in the event of a cluster node failure?


Options are :

  • Install a single cluster with one cluster node in the Miami site and a single cluster with one cluster node in the Dallas site
  • Install a single cluster with two cluster nodes in the Miami site and a single cluster with two cluster nodes in the Dallas site.
  • Install two Network Load Balancing clusters with one cluster node each in the Miami site and two Network Load Balancing clusters with one cluster node each in the Dallas site.
  • Install a Network Load Balancing cluster with two cluster nodes in the Miami site and a Network Load Balancing cluster with two cluster nodes in the Dallas site. .

Answer : Install a single cluster with one cluster node in the Miami site and a single cluster with one cluster node in the Dallas site

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. YYY.com has its headquarters in Chicago and sub-divisions in Boston, Atlanta, Miami and Dallas. All domain controllers are currently installed in the Chicago. You need to have new domain controllers installed in the Boston, Atlanta, Miami and Dallas subdivisions. YYY.com issues a security policy for the new domain controllers that states the following: ĽUnauthorized user must not be able to access the Active Directory database. ĽUnauthorized user must not be able to boot a domain controller from an alternate boot disk. Which of the following options would you choose to implement the security policy?


Options are :

  • Disable replication of the Sysvol folder on the new domain controllers.
  • . Configure Windows BitLocker Drive Encryption (BitLocker) on the new domain controllers
  • Modify the permissions of the ntds.dat file.
  • . Configure a read-only domain controller (RODC) in the Boston, Atlanta, Miami and Dallas. .

Answer : . Configure Windows BitLocker Drive Encryption (BitLocker) on the new domain controllers

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008 and all client computers run Windows 2000 Professional. YYY.com has its headquarters in Chicago and branch offices in Boston, Atlanta, Miami and Dallas. Each office has a DNS server. How can you perform installation of Active Directory Domain Services (AD DS) with a name resolution strategy that allows for quick response times and uses secure dynamic updates


Options are :

  • . Implement an Active Directory-integrated (ADI) DNS zone.
  • Implement a standard primary zone in each office.
  • . Implement a GlobalNames zone (GNZ).
  • . Implement conditional forwarders on all DNS servers.

Answer : . Implement an Active Directory-integrated (ADI) DNS zone.

70-646 Pro Windows Server 2008,Server Administrator Test Set 3

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2003. You want to install a read-only domain controller (RODC) without upgrading the existing domain controllers Windows Server 2008. What action should you take? (Each correct option will form a part of the answer. Select TWO.) A. Raise the forest functional level to Windows 2000. B. Raise the forest functional level to Windows 2003. C. Raise the forest functional level to Windows 2008. D. Raise the domain functional level to Windows Server 2000 E. Raise the domain functional level to Windows Server 2003 F. Raise the domain functional level to Windows Server 2008


Options are :

  • C,D
  • A,B
  • A,C
  • B,E

Answer : B,E

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. YYY.com has its headquarters in Chicago and branch offices in Boston. The Boston office is connected to the Chicago by a WAN link. The Chicago office has a DNS Sever named ABC-SR04 that is configured as a single DNS zone. The Boston office has two servers named ABC-SR07 and ABC-SR08. ABC-SR08 hosts shared folders that are only accessed by YYY.com users in the Boston office. You work in the Chicago office while a network administrator named Rory Allen works in the Boston office. YYY.com wants you to ensure that users at the Boston office can log on to the YYY.com domain and can connect to the shared folders on ABC-SR08 even when the WAN link is down. You must allow Rory Allen to configure the servers in the Boston office without allowing him to modify the Active Directory configuration. Which actions should you take to accomplish this task? (Each correct option will form a part of the answer. Choose THREE.) A. By promoting ABC-SR07 to a domain controller. B. By promoting ABC-SR07 to a read-only domain controller (RODC). C. By installing USMT role on ABC-SR07. D. By installing ADMT role on ABC-SR07. E. By installing DNS role on ABC-SR07. F. By adding Rory Allen to the Domain Admins group. G. By creating an organizational unit (OU) for the Boston office. H. By assigning administrative rights to Rory Allen


Options are :

  • B,E,H
  • G,F,A
  • D,E,A
  • A,B,C

Answer : B,E,H

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008. The YYY.com network has a domain controller named ABC-DC01 and a Web server named ABC-SR02. ABC-SR02 hosts YYY.com's internal Web site that hosts several documents with sensitive customer information. You want to secure the intranet Web site by implementing a policy that tracks access to the sensitive documents and sets a limit on the time during which the documents can be accessed. Which of the following would you install and configure on ABC-DC01 to accomplish this task?


Options are :

  • Active Directory Rights Management Services (AD RMS).
  • Windows BitLocker Drive Encryption G.
  • Microsoft Security Assessment Tool (MSAT)
  • Microsoft Baseline Security Analyzer (MBSA)

Answer : Active Directory Rights Management Services (AD RMS).

Microsoft 70-647 Windows Enterprise Administrator Exam Set 1

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers in the YYY.com network run Windows Server 2008 R2 and all client computers run Windows 7 Enterprise. Your environment includes servers running Remote Desktop Session Host (RDSH), App-V and Med-V. Users connect to a Windows Server 2008 R2 server named ABC-RDSH1 which runs the Remote Desktop Session Host (RDSH) role. You install a custom application on ABC-RDSH1. The application will be used by multiple users running Remote Desktop Sessions on ABC-RDSH1. You receive reports that the application does not function correctly when multiple users simultaneously run the application on ABC-RDSH1. You discover that the application's configuration files are being overwritten by the Remote Desktop Sessions of the other users. How can you enable multiple users to run the application on ABC-RDSH1?


Options are :

  • By configuring a MED-V package for the application and streaming it to ABC-RDSH1
  • . By running the Change User /Execute command on ABC-RDSH1 and reinstalling the application
  • By configuring an App-V package for the application and streaming it to ABC-RDSH1.
  • By publishing the application as a RemoteApp on ABC-RDSH1.

Answer : By configuring an App-V package for the application and streaming it to ABC-RDSH1.

70-642 Windows Server 2008 Network Infrastructure Exam Set 7

You work as an enterprise administrator at YYY.com. The corporate network of ABC consists of a single Active Directory Domain Services (AD DS) forest. The ABC forest contains a root domain is named YYY.com. All servers in the YYY.com domain run Windows Server 2008 R2. A partner company of ABC named Willow Bridge Ltd also consists of single Active Directory Domain Services (AD DS) forest. The Willow Bridge forest contains a root domain named WillowBridge.com. All servers in the WillowBridge.com domain run Windows Server 2008 R2. The YYY.com domain contains a Windows Server 2008 R2 server named ABC-App1. Members of a global security group named ABCAppUsers in the WillowBridge.com domain need to access ABC-App1. A forest trust exists between the two forests to cater for this need. You discover that all WillowBridge.com users can access all network resources in the YYY.com domain. You need to restrict members of the ABCAppUsers group so that they can access ABC-App1 only. All other WillowBridge.com should not be able to access network resources in the YYY.com domain. You need to configure the required access. What should you do first?


Options are :

  • . You should remove the forest trust and configure an Active Directory Federation Services (AD FS) trust between the two domains
  • You should modify the authentication scope of the forest trust by selecting the "Allow authentication only for selected resources in the local domain" option.
  • You should remove the forest trust and configure a one-way external domain trust between the two domains.
  • You should configure the NTFS permissions on ABC-App1 to permit access to the ABCAppUsers group only.

Answer : You should modify the authentication scope of the forest trust by selecting the "Allow authentication only for selected resources in the local domain" option.

You work as a Network Administrator at YYY.com. The network consists of a single Active Directory Domain Services (AD DS) domain named YYY.com. The company has a main office and a branch office. The two offices are connected by a slow WAN link. All servers run Windows Server 2008 R2 and all client computers run Windows 7 Professional. All domain controllers are located in the main office. The number of users in the branch office has increased over the last year. The company has recently employed an IT Technician named Mia Hamm in the branch office to maintain the branch office computers. One day, the WAN link between the two offices fails. During this time, Mia is unable to add computer accounts to the domain. You plan to deploy a domain controller to the branch office to prevent this happening again. When you deploy the new domain controller, you want to create two Active Directory sites for the two offices. You need to maximize the security of the branch office domain controller. How should you configure the branch office domain controller? (Choose three). A. A server core installation of Windows Server 2008 R2. B. A full installation of Windows Server 2008 R2. C. A writeable domain controller. D. A read-only domain controller (RODC) E. A primary writeable DNS zone. F. A primary read-only DNS zone.


Options are :

  • A,D,F
  • B,E,D
  • D,E,A
  • E,A,B

Answer : A,D,F

You work as a Network Administrator at YYY.com. The network consists of a single Active Directory Domain Services (AD DS) domain named YYY.com. The company has a main office and a branch office. The two offices are connected by a slow WAN link. All servers run Windows Server 2008 R2 and all client computers run Windows 7 Professional. All domain controllers are located in the main office. Two Windows Server 2008 R2 domain member servers named ABC-MainDNS1 and ABCMainDNS2 run the DNS service and host the primary DNS zone for the YYY.com domain. The number of users in the branch office has increased over the last year. The company plans to install a child domain in the branch office. You install a standalone Windows Server 2008 R2 server named ABC-BranchDNS1 in the branch office. On ABC-BranchDNS1, you configure a secondary DNS zone for the YYY.com domain using ABCMainDNS1 as the master. On ABC-MainDNS1, you configure a zone transfer for the YYY.com zone to ABC-BranchDNS1. What else should you do before installing the first domain controller in the branch office? (Choose two) A. You should install a DHCP Relay Agent in the branch office. B. You should create a delegation on ABC-MainDNS1 for the subdomain that lists ABCBranchDNS1 as authoritative for the subdomain. C. You should create a delegation on ABC-BranchDNS1 for the subdomain that lists ABCMainDNS1 as authoritative for the subdomain. D. You should configure a primary DNS zone for the subdomain on ABC-BranchDNS1. E. You should configure a primary DNS zone for the subdomain on ABC-MainDNS1.


Options are :

  • C,D
  • A,C
  • A,B
  • B,D

Answer : B,D

70-646 Pro Windows Server 2008,Server Administrator Test Set 2

You work as a Network Administrator at YYY.com. The network consists of a single Active Directory Domain Services (AD DS) domain named YYY.com. All servers in the network run Windows Server 2008 R2. All client computers now run Windows 7 Professional having recently been migrated from Windows XP Professional. A new company security policy states that all client computers on the network must run Windows 7 Professional, have up-to-date antivirus software installed and have Windows Firewall enabled. Any client computers that do not meet the security requirements must not be able to access the network. How can you enforce the company security policy?


Options are :

  • By implementing a Group Policy object (GPO) with a WMI filter.
  • By implementing Network Access Protection (NAP). .
  • . By implementing a Group Policy object (GPO) with a software restriction policy
  • By implementing a Terminal Services Resource Authorization Policy (TS RAP). .

Answer : By implementing Network Access Protection (NAP). .

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions