Microsoft 70-642 Windows Server Network Infrastructure Exam Set 7

You work as a network administrator in TestKing.com. TestKing.com uses Microsoft Windows Server 2008 R2 domain controllers and client computers are running Microsoft Windows 7 Enterprise. TestKing.com recently launched a computer named Testking-DC01 is configured to perform the role of Filer hosting services shared folders network for all departments. Stocks were set up with NTFS permissions and share permissions. TestKing.com requested that the Access-based Enumeration (ABE) on some public folders are visible only to users who have permission to access the resources. What tools should be used for access-based enumeration (ABE)?


Options are :

  • You should consider the use of Netsh commands.
  • You should consider using the net share command.
  • None
  • You should consider using its stocks and storage management console.
  • You should consider using Console File Server Resource Manager (FSRM).

Answer :You should consider using its stocks and storage management console.

You work as a network administrator in TestKing.com. TestKing.com network consists of a single Active Directory Domain Services domain name Testking.com.The network includes servers running Windows Server 2008 R2, and client computers running Windows 7 Enterprise. Server Windows Server 2008 R2 with the name TK-DC1 plays the role of Active Directory Domain Services and is a domain controller for domain Testking.com. TK-DC1 performs DNS-server role and is the primary DNS server for the client computers. All requests for DNS resolution for Internet websites currently under TC-DC1. You want to request a DNS resolution for Internet Web sites, which will be executed on a server ISPA € YS DNS. You enable call forwarding to your DNS-server ISPA € YS on TK-DC1. What else to do?


Options are :

  • You must remove (Root) zone on the TC-DC1.
  • None
  • You should disable root hints on the TK-DC1.
  • You should disable recursion on the TK-DC1.
  • You must include BIND Secondaries on TK-DC1.

Answer :You should disable root hints on the TK-DC1.

You work as a network administrator for a company called Testking.com. Testking.com uses Microsoft Windows Server 2008 R2 on the two servers named TESTKINGSR01 and Testking-SR02. You need to centralize network administration for collecting event logs on network servers. How to configure ESTKINGSR01 collect events from Testking-SR02?


Options are :

  • You should consider using the command Net Stat.
  • You should consider using in the Net View command.
  • You should consider using Remote Server Administration Tools (RSAT).
  • You should consider using theWevtutil.exe utility.
  • You should consider using Wecutil.exe utility.

Answer :You should consider using Wecutil.exe utility.

Microsoft 70-647 Windows Enterprise Administrator Exam Set 4

You work as a network administrator in TestKing.com. TestKing.com network consists of a single Active Directory domain named Domain Services Testking.com. The network includes servers running Windows Server 2008 R2, and client computers running Windows 7 Enterprise. Testking.com includes development department. Members in the department of develop custom software applications for use Testking.com and their clients. Server Windows Server 2008 R2 with the name TKApps used to host custom applications for use by Testking.com. You get reports, TK-application quits unexpectedly. You suspect that the software can be the cause of the outage was recently installed. How can you determine what caused the downtime and that the software has been installed recently?


Options are :

  • You have to run the monitor reliability.
  • You have to run the diagnostic data collection system for a set.
  • None
  • You have to run the event viewer.
  • You should run the performance monitor.

Answer :You have to run the monitor reliability.

You work as a network administrator TestKing.com. TestKing.com has its headquarters located in Miami and a branch in Perth. TestKing.com uses Microsoft Windows Server 2008 domain controllers and Microsoft Windows 7 Enterprise for client computers. TestKing.com deployed computer named Testking-DC01 configured with Windows Firewall enabled Miami office. TestKing.com plans to deploy 5 servers in an office in Perth that have Testking-DC01 firewall copied to the new server configuration. Which tools should be used to copy the configuration of the firewall?


Options are :

  • You should consider using a GPO.
  • You should consider the use of Netsh commands.
  • You should consider using the Windows Firewall with Advanced Security console.
  • You should consider using the Local Security Policy.
  • You should consider the use of Get-Item and Set-Item command.

Answer :You should consider the use of Netsh commands.

You work as a network administrator TestKing.com. TestKing.com has its headquarters located in Miami and a branch in Yokohama. TestKing.com uses Microsoft Windows Server 2008 R2 domain controllers and Microsoft Windows XP Professional and Microsoft Windows 7 Ultimate for client computers. TestKing.com currently uses a computer named Testking-DC01 is configured as a network DHCP server, responsible for the lease IPv4-addressing. TestKing.com Miami network uses dynamic addressing and Yokohama office uses static addressing. During the day you send Mia Hamm in Yokohama network with a laptop computer with the name Testking-WS01. Mia Hamm recently complained about how to configure a laptop while moving between offices. TestKing.com wants you to ensure Mia Hamm can access both offices without configuration of the portable computer. How would you accomplish this?


Options are :

  • You should consider connecting to the network at Testking-WS01, configured to use IPv6.
  • You should consider using tabs alternative addresses in IPv4 properties and configure a static IP-address for the office Yokohama.
  • You must consider the additional connection to the network that is configured for communication TESTKINGWS01.A should be used for DHCP and a second connection with a static address IPv4.
  • None
  • You should consider using static IP-addresses in the range used in the Miami office.

Answer :You should consider using tabs alternative addresses in IPv4 properties and configure a static IP-address for the office Yokohama.

70-642 Windows Server 2008 Network Infrastructure Exam Set 7

You work as a network administrator TestKing.com. TestKing.com uses Microsoft Windows Server 2008 R2 as a network operating system and Windows 7 Enterprise as a client operating system. TestKing.com recently launched a computer named Testking-DC01, configured IPv4 static addressing. During the week, while performing maintenance you find the DHCP database in the cluster grew outrageously large. TestKing.com wants you to reduce the size of the DHCP database. How would you reduce the size of the database?


Options are :

  • None
  • You should consider the use of the Windows command prompt to run the utility ESEUTIL.EXE.
  • You should consider compressing the contents to save disk space by using the right mouse button on DHCP.mdb file and select Properties.
  • You should consider using the Windows command line utility to ring Jetpack.exe.
  • You should consider the deployment of an additional DHCP server named Testking-DC02 for the separation volume between servers.

Answer :You should consider using the Windows command line utility to ring Jetpack.exe.

You work as a network administrator in TestKing.com. TestKing.com has its headquarters located in Miami, with branches located in Perth and Yokohama. TestKing.com uses Microsoft Windows Server 2008 R2 as a network operating system. Client computers running Microsoft Windows 7 Enterprise. TestKing.com recently launched a computer called Testking-DC01 routing Hosting and Remote Access role in the Perth office to route traffic between branches and Testking-DC02, configured as a DNS server network located in Perth. During the day, the new branch will be deployed to the email that require s Testking-DC02 respond to name resolution requests at the time of connection to the Testking-DC01 for routing. What configuration should be made at Testking-DC02 DNS server?


Options are :

  • You should consider the establishment of rules in Windows Firewall with Advanced Security.
  • None
  • You should consider removing the default gateway settings in the IP properties.
  • You should consider whether the DNS management console to run to turn a mask ordering network in the DNS server properties.
  • You should consider whether the DNS management console to run to set up the Interfaces option in the DNS server properties.

Answer :You should consider the establishment of rules in Windows Firewall with Advanced Security.

You work as a network administrator in TestKing.com. All servers run Windows Server 2008 R2 and all client computers running Windows 7 Professional. Testking.com has a main office and a branch office. Two branches connected connection. You install a new network in the branch office. Windows Server 2008 R2 with TK-DC1 name in the main office working role Active Directory Domain and a domain controller for domain Testking.com services. TK-DC1 acts as a DNS-server is the primary DNS server for the main office of the client computers. Install the Windows Server 2008 R2 with the name TK-DNS1 in the branch. TKDNS1 performs DNS-server role and will be the primary DNS server for the client computers in branch offices. You set up a secondary DNS zone for the domain to Testking.com TC-DNS1. You set up TK-DNS1 use TK-DC1 as the primary server. You check your DNS configuration, but the transfer area from TK-DC1 fails. You need to enable zone transfers from TK to TK-DC1-DNS1. How to configure the DNS infrastructure?


Options are :

  • You must configure forwarders on TK-DC1.
  • You must remove (Root) zone on the TC-DNS1.
  • None
  • You have to add on TK- DC1 Transfer Zone tab on TK- DNS1.
  • You have to add on TK- DNS1 Transfer Zone tab on TK- DC1.

Answer :You have to add on TK- DNS1 Transfer Zone tab on TK- DC1.

Microsoft 98-367 & 98-368 Certification Practical Exam Set 1

You work as a network administrator in TestKing.com. TestKing.com uses Microsoft Windows Server 2008 R2 as a network operating system. Client computers running Microsoft Windows 7 Enterprise. TestKing.com uses two computers named Testking-DC01 and Testking-DC02. Testking-DC01 is a network web server and Testking-DC02 is a network gateway server that is used by network users to access Web sites from the Internet. During the day you will receive instructions on how to configure Network Address Translation (NAT) on TESTKINGDC02, to ensure that the websites are public. What configuration should be made at Testking-DC02?


Options are :

  • You must consider the routing and remote access and routing role installed.
  • You should consider the role of Network Policy Server is installed.
  • You must consider host-Credential Authorization Protocol role installed.
  • You should consider the protocol RIP-enabled routing.
  • None

Answer :You must consider the routing and remote access and routing role installed.

You work as a network administrator TestKing.com. TestKing.com uses Microsoft Windows Server 2008 R2 on a computer named Testking-DC01 configured as Network Policy Server (NPS). During the week, several new employees to work to increase the daily volume of business. TestKing.com wants you to ensure that the NPS files located on Testking-DC01 magazine contains information about client computers in the network. What actions should you take?


Options are :

  • You should consider the DTS log file format compatible configuration.
  • You should consider including RADIUS authentication requests settings on Testking-DC01.
  • You should consider including RADIUS accounting requests settings on TESTKINGDC01
  • You should consider setting the Network Access Protection (NAP).
  • None

Answer :You should consider the DTS log file format compatible configuration.

You work as a network administrator in TestKing.com. TestKing.com network consists of a single Active Directory domain named Domain Services Testking.com. The network includes servers running Windows Server 2008 R2, and client computers running Windows 7 Enterprise. Server Windows Server 2008 R2 with the name TK-DC1 plays the role of Active Directory Domain Services and is a domain controller for domain Testking.com. TK-DC1 performs DNS-server role and is the primary DNS server for the client computers. You are trying to connect to the server with the name of TK-SRV1. You TKSRV1 Ping to test the connection, and you get an answer. Then, open a connection to a remote desktop TK-SRV1. You have successfully connect using Remote Desktop and log on to the server. After that, you will find that you are connected to the server are not TK-SRV1. You are connected to the wrong server. Do you suspect that there are outdated resource records in DNS Testking.com zone. How can you make sure that outdated resource records are removed from the Testking.com DNS zone? Choose two.


Options are :

  • You need to enable debug logging in the DNS-server properties on the TK-DC1.
  • You must enable DNS Scavenging Testking.com DNS-zone on the FC-DC1.
  • You must enable DNS to clean TC-DC1.
  • You should include monitoring of the DNS-server properties on the TK-DC1.

Answer :You must enable DNS Scavenging Testking.com DNS-zone on the FC-DC1. You must enable DNS to clean TC-DC1.

70-680 Windows 7 Configuring Certification Practice Exam Set 3

You work as a network administrator in TestKing.com. TestKing.com uses Microsoft Windows Server 2008 R2 as a network operating system. Client computers running Microsoft Windows 7 Enterprise. TestKing.com recently placed two computers named Testking-DC01 and Testking-DC02. Testking-DC01 is the DNS server network and Testking-DC02 is configured with Microsoft Windows Server 2003 that is hosting the Exchange Server 2003 role. During the week, a computer named Testking-DC03 is deployed, which host Exchange Server 2007. TestKing.com wants to set up Testking-DC03 as a primary e-mail server on the network to process all e-mail traffic from Testking-DC02 becomes the backup e-mail server. You start by creating a mail exchanger (MX) and Host (A) record for Testking-DC03 in DNS. What you need to do to complete the setup?


Options are :

  • You should consider a mail Group (MG) entry is added to DNS.
  • You should consider the priority of MX records for Testking-DC03 is higher than the priority of MX records for Testking-DC02.
  • None
  • You should consider the priority of MX records for Testking-DC03 dipped lower than the priority of MX records for Testking-DC02.
  • You should consider the cyclic turn on the DNS server.

Answer :You should consider the priority of MX records for Testking-DC03 dipped lower than the priority of MX records for Testking-DC02.

You work as a network administrator in TestKing.com. TestKing.com uses Microsoft Windows Server 2008 R2. TestKing.com recently deployed two computers named Testking-DC01 and Testking-DC02. Testking-DC01 is configured as a web server, which is accessible from the Internet and Testking-DC02 is a gateway server, users on the network used to access the Internet. During the day you will receive instructions from TestKing.com to configure Network Address Translation (NAT) on Testking-DC02, to ensure that websites can be accessed publicly. What configuration should be made at Testking-DC02?


Options are :

  • You must consider host-Credential Authorization Protocol role installed.
  • None
  • You should consider the Routing and Remote Access (RRAS Service) and routing role installed.
  • You should consider the protocol RIP-enabled routing.
  • You should consider the role of Network Policy Server is installed.

Answer :You should consider the Routing and Remote Access (RRAS Service) and routing role installed.

You work as a network administrator in TestKing.com. TestKing.com network consists of a single Active Directory domain named Domain Services Testking.com. The network includes servers running Windows Server 2008 R2, and client computers running Windows 7 Enterprise.A Windows Server 2008 R2 server with TK-DC1 name acts as Active Directory Domain Services and is a domain controller for domain Testking.com. TK-DC1 performs DNS-server role and is the primary DNS server for the client computers. Windows Server 2008 R2 with TK-Web1 name acts as a web server (IIS). TK-Web1 receives public corporate website www.testking.com. Windows Server 2008 R2 with TK-DNS1 name performs DNS-server role. TK-DNS1 hosts a public DNS zone for Testking.com. DNS Testking.com area on the TK-DNS1 contains a Host (A) records for www.testking.com and MX records for Testking.com corporate email. How can you make sure that requests for Domain external DNS Testking.com sent [email protected]?


Options are :

  • You must configure the Signature (SIG) records in the zone on Testking.com TC-DNS1.
  • You must configure the service location (SRV) records in the zone on Testking.com TKDNS1.
  • You must change the Responsible Person to starting Authority (SOA) records in the zone on Testking.com KI-DNS1.
  • You must set up TK-DNS1 send to TK-DC1.
  • None

Answer :You must change the Responsible Person to starting Authority (SOA) records in the zone on Testking.com KI-DNS1.

70-646 Pro Windows Server 2008 - Server Administrator Exam Set 2

You work as a network administrator in TestKing.com. TestKing.com develops software applications that are used by their customers. TestKing.com requests for the management of deployed separate subnet routing server named TKD01 to route traffic between subnets. TestKing.com wants router configured to provide access to resources located on a different subnet. As you should consider setting up TKDC01?


Options are :

  • You should consider the use of two network connections, one for each subnet.
  • You should consider deploying Routing and Remote Access Services role with the network access policy server allows.
  • You should consider whether the Local Area Connection that is configured with the IP-addresses for each respective subnet.
  • You should consider deploying the role of the Routing and Remote LAN access with routing services enabled.
  • You should consider the installation of Simple TCP / IP Services feature.

Answer :You should consider the use of two network connections, one for each subnet. You should consider deploying the role of the Routing and Remote LAN access with routing services enabled.

You work as a network administrator in TestKing.com. TestKing.com network consists of a single Active Directory forest named Testking.com TestKing.com uses Microsoft Windows Server 2008 R2 as a network operating system. TestKing.com recently launched a computer named Testking-DC01, configured as a primary DNS-server for client computers. Recently hired a specialist Desktop named Clive will be responsible for maintaining all desktops. TestKing.com instructs you to provide Clive ability to edit and add a new DNS record, without changing the other server parameters. How would you ensure Clive is able to perform the necessary tasks?


Options are :

  • You should consider Clive DNSADMINS added to the group in Active Directory.
  • Testking-DC01 should be right clicked in dnsmgmt.msc, to choose Properties and Clive assign the appropriate permissions on the Security tab.
  • You should consider Clive added to the Power Users group on Testking-DC01.
  • None
  • TestKing.com area should be right clicked dnsmgmt.msc choose Properties, and the appointment of Clive appropriate permissions on the Security tab.

Answer :TestKing.com area should be right clicked dnsmgmt.msc choose Properties, and the appointment of Clive appropriate permissions on the Security tab.

You work as a network administrator in TestKing.com. TestKing.com uses a computer named Testking-DC01, which hosts the role of primary DNS-server. TestKing.com recently asked you to provide the DNS server of the Internet Service Provider (ISP) will be used for queries to resolve Internet names. You started configuration Testking-DC01 to forward requests to an Internet service provider (ISP) DNS-server, but open the possibility to add a forwarder is disabled. What you need to do is to redirect requests to the DNS server provider?


Options are :

  • You should consider the creation of the root zone.
  • None
  • You should consider Netmask order included.
  • You should consider removing the root zone.
  • You should consider the dynamic updates are disabled in Testking.com zone.

Answer :You should consider removing the root zone.

70-646 Pro Windows Server 2008 - Server Administrator Exam Set 2

Mark works as a network administrator for Testking Inc. The company has a Windows Server 2008 domain-based network. The network has a file server that runs on Windows Server 2008. His assistant wants to know about wireless local area network (WLAN) SSID. Which of the following statements is true for the WLAN SSID? Each correct answer presents a complete solution. Choose three.


Options are :

  • It is a sequence of alphanumeric characters
  • It has a maximum length of 24 characters.
  • It has a maximum length of 32 characters.
  • This is the name of a wireless local area network (WLAN).
  • All wireless devices on the wireless network must have a different SSID.

Answer :It is a sequence of alphanumeric characters It has a maximum length of 32 characters. This is the name of a wireless local area network (WLAN).

70-646 Pro Windows Server 2008 - Server Administrator Exam Set 4

Paige is the system administrator who is responsible for performing backup to multiple servers. Recently, it has been proposed to take over the operation of several new servers. Unfortunately, no information about the standard repair and maintenance of these servers is not available. Paige wants to start by making changes in the configuration of the servers, but it wants to first ensure that it has a complete backup of all data on each of these servers. Paige decides to use the utility of Windows Server 2008 Backup to perform a backup. She wants to choose the type of backup that will back up all the files on each of these servers, regardless of when they were last modified, or if they were previously backed up. Which of the following types of backup stores all files are selected without regard to archive bits settings? (Select all that apply.)


Options are :

  • additional
  • None
  • copy
  • differentiated
  • Normal

Answer :Normal

You are a network administrator for your company. The network contains a Windows 2008 Active Directory domain. 2008 server computer for Windows named REMOTE1 is a member server with Routing and Remote Access installed. REMOTE1 allows both dial-up connections and virtual private network (VPN). Smart cards are issued to all the users who will have access to the network from a remote location. Smart cards will be used for remote access and the VPN-connections. All users who will have access to the network remotely available Windows 2000 Professional portable computers with smart card reader. The written security policy for your company says that users should only use a smart card when you connect to the network remotely. When connected to a local network, do not use the smart card. You need to implement a remote access solution that will ensure compliance with the written security policy. What should you do?


Options are :

  • The guide Active Users and Computers console, turn on the smart card is required for interactive logon option for each user account that will access the network remotely.
  • Install a computer certificate on each computer. Setting up remote access policy to accept only REMOTE1 EAP-MD5 authentication. Use a computer certificate for authentication.
  • Install a computer certificate on REMOTE1. Setting up remote access policy to accept only REMOTE1 authentication EAP-TLS. Using REMOTE1 computer certificate for authentication.
  • Install a computer certificate on REMOTE1. Setting up remote access policy to accept only REMOTE1 EAP-MD5 authentication. Using REMOTE1 computer certificate for authentication.
  • Install a computer certificate on each computer. Setting up remote access policy to accept only REMOTE1 authentication EAP-TLS. Use a computer certificate for authentication.

Answer :Install a computer certificate on each computer. Setting up remote access policy to accept only REMOTE1 authentication EAP-TLS. Use a computer certificate for authentication.

Mark works as a network administrator for Testking Inc. The company has a Windows Server 2008 domain-based network. The network has a file server that runs on Windows Server 2008. Mark wants to protect all important data, so that only he can access the data. All data is stored on the server Windows 2008 member. As the volume of data is large, it is stored in compressed form on NTFS partition. He decides to encrypt the data with file encryption system (EFS). When he tries to encrypt the data, it is unable to do so. What is the most likely cause of the problem?


Options are :

  • data files larger than 2MBY.
  • Data is stored in the NTFS file system.
  • None
  • Windows Server 2008 does not support EFS.
  • EFS does not support compression.

Answer :EFS does not support compression.

Microsoft Dynamics Expand and Test Your Skills Practice Test Set 1

You are a system administrator for the company acquired another company. The new company has several computers with UNIX. You install the Server Core Windows Server 2008 and some Windows Vista computers in place of the new company. The patented application works on some UNIX computers. You need to configure the print server on the computer Server Core Windows Server 2008 to enable users to UNIX-based computers to print. What should you do?


Options are :

  • Starting Cscript scregedit.wsf / LDP / 4.
  • Run Start / w OCSetup Printing-LPDPrintService.
  • Running Slmgr.vbs -ato.
  • None
  • Running a clean start LPDSVC.

Answer :Run Start / w OCSetup Printing-LPDPrintService.

Deploying the 2008 Windows Server Infrastructure Public Key (PKI) and Network Access Protection (NAP) on your domain. You will find that NAP policy without affecting wireless client. You should make sure that all of the wireless clients properly shielded health policies in their initial communication with the wireless access point. What are these steps? (Choose two. Each choice represents a part of a unified solution.)


Options are :

  • Make sure that the client network wireless connections are configured for 802.1X authentication.
  • Make sure that the wireless client network connections are configured to use DHCP server.
  • Ensure that 802.1X enforcement is configured on a Windows Server 2008 Network Policy.
  • Make sure that the DHCP enforcement is configured on a Windows Server 2008 Network Policy.

Answer :Make sure that the client network wireless connections are configured for 802.1X authentication. Ensure that 802.1X enforcement is configured on a Windows Server 2008 Network Policy.

Your organization is planning to move from IPv4 infrastructure to IPv6 infrastructure. Your manager is concerned, as the IPv6-packets can be routed through the public Internet, particularly in areas that still use IPv4. What actions should you perform? (Choose two. Each correct answer is an independent decision.)


Options are :

  • 6to4 deployment of technology in the network.
  • Deploying NPS network.
  • Deploying the Teredo transition technology on your network.
  • NAT Network Deployment.

Answer :6to4 deployment of technology in the network. Deploying the Teredo transition technology on your network.

70-513 WCF Development with Microsoft .NET Framework 4 Exam Set 5

You are a network administrator for your company. You recently installed Windows Server 2008 for your company. You want to create a test network of five subnets that will use IPv6. You must create a network so that the client computers in the test network are able to interact with each other, while ensuring that they can not get access to the Internet. In addition, the address used must be unique across all sites in your company. What IP address you could use?


Options are :

  • 0: 0: 0: 0: 0: 0: 0: 0
  • FD00: AB10: 2B5C: B000 :: / 8
  • FE80: AB10: 2B5C: B000 :: / 64
  • None
  • FEC0: AB10: 2B5C: B000 :: / 10

Answer :FD00: AB10: 2B5C: B000 :: / 8

Manager Hannahâ € YS asked her to set up a remote access server in such a way that it limits what times of day people can dial. It creates a network access policy that contains the time-of-day restrictions, but doesnâ € YT work. What is the most likely cause?


Options are :

  • Policy-Day And Time Restrictions do not have a high enough priority.
  • Policy-day time limit, has priority thatâ € YS too high.
  • None
  • Policy-day time-limitations are not associated with an active remote access profile.
  • Policy-day time limit, is not replicated in the domain.

Answer :Policy-Day And Time Restrictions do not have a high enough priority.

Mark works as a network administrator for Testking Inc. The company has a network domainbased Windows 2008. A domain consists of a Windows 2008 client memberservers and Windows Vista computers. The security policy for the company determines that the status of security updates and security guards linked servers in the domain settings should be checked regularly. Mark wants to automate this process so that reports are generated for all servers every night. What it will do to achieve this?


Options are :

  • Scheduling tasks on each server to run Qfecheck.exe command every night.
  • Scheduling tasks on each server to execute MSConfig.exe every night.
  • Scheduling tasks on each server to execute convert.exe every night.
  • None
  • Schedule a task on a central Windows Vista computer to run MBSACLI.EXE commands for each server every night.

Answer :Schedule a task on a central Windows Vista computer to run MBSACLI.EXE commands for each server every night.

70-646 Pro Windows Server 2008 - Server Administrator Exam Set 3

You are a network administrator for your company. The company's network consists of Windows Server 2008, Windows XP and Windows Vista computers. Your company has a partner company with whom you have to share the application via a virtual private network (VPN). You need to deploy VPN server on a Windows 2008 computer. What is the role of the service, you need to install?


Options are :

  • The Application Server role
  • None
  • Terminal Services role
  • Network Policy and Access Service role
  • Web Server (IIS) role

Answer :Network Policy and Access Service role

You are a network administrator for your company. You install Windows Server 2008 on all servers and Windows XP Professional with Service Pack 2 (SP2) or Windows Vista client computers in your company. Your company wants to limit unprotected computers to communicate on the network. Computers must meet the requirements of the system, as indicated in the corporate security statement before they connect to the network. What is the role service, you need to install?


Options are :

  • Terminal Services Licensing
  • TS Gateway
  • Network Policy and Access Services
  • None
  • Routing and Remote Access

Answer :Network Policy and Access Services

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions