Microsoft 70-647 Windows Enterprise Administrator Exam Set 3

You work as a Network Administrator at YYY.com. The network consists of a single Active Directory Domain Services (AD DS) domain named YYY.com. The company has a main office and a branch office. The two offices are connected by a slow WAN link. All servers run Windows Server 2008 R2 and all client computers run Windows 7 Professional. All domain controllers are located in the main office. The number of users in the branch office has increased over the last year. The company has recently employed an IT Technician named Mia Hamm in the branch office to maintain the branch office computers and manage branch office user accounts. The branch office contains a Windows Server 2008 R2 named ABC-File1. ABC-File1 runs the File Services role and hosts shared folders for the branch office users. One day the WAN link between the two offices fails. Branch office users report that they cannot access shared folders on ABC-File1. The WAN link is repaired and the users are able to access shared folders on ABC-File1. How can you ensure that users in the branch office can access ABC-File1 in the event of another WAN link failure?


Options are :

  • By installing the DNS role on ABC-File1 and configuring a secondary zone for the YYY.com domain.
  • By enabling BranchCache in distributed mode on the branch office client computers.
  • By enabling Universal Group Membership Caching in the branch office.
  • By configuring an entry in the Hosts file on ABC-File1

Answer :By installing the DNS role on ABC-File1 and configuring a secondary zone for the YYY.com domain.

70-642 Windows Server 2008 Network Infrastructure Exam Set 3

You work as a Network Administrator at YYY.com. The network consists of a single Active Directory Domain Services (AD DS) domain named YYY.com. The company has a main office and a branch office. The two offices are connected by a slow WAN link. All servers run Windows Server 2008 R2 and all client computers run Windows 7 Professional. All domain controllers are located in the main office. The number of users in the branch office has increased over the last year. The company has recently employed an IT Technician named Mia Hamm in the branch office to maintain the branch office computers and manage branch office user accounts. The branch office contains a Windows Server 2008 R2 named ABC-File1. ABC-File1 runs the File Services role and hosts shared folders for the branch office users. One day the WAN link between the two offices fails. Mia reports that she is unable to create a user account for a new branch office employee. How can you ensure that Mia can create and manage user accounts in the event of another WAN link failure?


Options are :

  • By installing a writeable domain controller in the branch office.
  • By installing a read-only domain controller (RODC) in the branch office.
  • By enabling Universal Group Membership Caching in the branch office.
  • By configuring a separate Active Directory Site for the branch office.

Answer :By installing a writeable domain controller in the branch office.

You work as an enterprise administrator at YYY.com. The corporate network of the company consists of an Active Directory forest that runs at the functional level of Windows Server 2003. The forest root domain is named YYY.com. All the domain controllers in the root domain run Windows Server 2003 and the functional level of the domain is Windows Server 2003. A child domain named Corp.YYY.com contains domain controllers running Windows Server 2008 R2. The functional level of the Corp.YYY.com domain is Windows Server 2003. You want to deploy a Windows Server 2008 R2 domain controller in the YYY.com root domain. What should you do first?


Options are :

  • Raise the functional level of the forest to Windows Server 2008.
  • Run the adprep /domainprep command from the Windows Server 2008 R2 installation DVD on the infrastructure master in the YYY.com domain
  • Install a Windows Server 2008 domain controller in the YYY.com root domain.
  • Run the adprep /forest command from the Windows Server 2008 R2 installation DVD on the schema master in the YYY.com domain

Answer :Run the adprep /domainprep command from the Windows Server 2008 R2 installation DVD on the infrastructure master in the YYY.com domain

You work as an enterprise administrator at YYY.com. The YYY.com network has a domain that runs at the domain functional level of Windows Server 2008. All servers in the domain run Windows Server 2008 R2 and all client computers run Windows 7 Professional. The default Users container currently holds all user accounts. The company contains six departments named Sales, Marketing, Production, Manufacturing, Research and Development. Each department has a junior manager. The junior managers need to be able to reset passwords for users in their department. Three senior managers are each responsible for two departments. One senior manager is responsible for the Sales and Marketing departments. One senior manager is responsible for the Production and Manufacturing departments. The third senior manager is responsible for the Research and Development departments. The senior managers need to be able to manage user accounts in each department that they are responsible for. If users are moved between departments, only their new junior and senior manager should be able to modify their user accounts. You need to design an organizational unit structure to enable you to delegate the required permissions to the managers. You need to minimize the number of OUs. How should you design your OU structure?


Options are :

  • Three OUs, one containing the Sales and Marketing users, one containing the Production and Manufacturing and one containing the Research and Development users.
  • Three top level OUs, each containing two OUs that contain user accounts for a single department.
  • One OU containing all user accounts.
  • Six OUs, each containing user accounts for a single department.

Answer :Six OUs, each containing user accounts for a single department.

PIC Microcontroller Test Your Skills and Get Certified Set 1

You work as an enterprise administrator at YYY.com. The company network consists of a single Active Directory Domain Services (AD DS) domain named YYY.com. The company is in the process of implementing a PKI (Public Key Infrastructure). The company plans to use the PKI to encrypt email messages sent between the company client computers. Company users should be able to send secure emails to other company users. If a company user has an expired certificate, anyone attempting to send a secure email to them should receive a notification. You have installed a Windows Server 2008 R2 server named ABC-RootCA which runs the Active Directory Certificate Services (AD CS) role and is configured as a root certification authority for the domain. You install a second Windows Server 2008 R2 server named ABC-CA1. ABC-CA1 runs the Active Directory Certificate Services (AD CS) role and is configured as a subordinate CA to ABC-RootCA. Both CA servers can only be accessed from the corporate LAN. A Windows Server 2008 R2 server named ABC-Web1 runs the Web Server role. ABC-Web1 is located in a perimeter network. Firewall rules permit only port 80 traffic to ABC-Web1. You want users to be able to request status information for single certificates using ABC-Web1. Which of the following options should you choose to comply with the email security requirements?


Options are :

  • You should install an Exchange Routing Group connector on ABC-Web1.
  • You should configure ABC-Web1 as a subordinate certification authority (CA) to ABCRootCA.
  • You should move ABC-CA1 to the perimeter network.
  • You should move ABC-Web1 to the same subnet as ABC-CA1.
  • You should install and configure the Online Responder service on ABC-Web1.

Answer :You should install and configure the Online Responder service on ABC-Web1.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network run Windows Server 2000 and the domain controllers are running Windows Server 2008.YYY.com has its headquarters in Chicago and quite a few satellite offices in the region. The storage location of the servers in the satellite offices is currently not secured.As a result, you are preparing to make use of Windows BitLocker Drive Encryption (BitLocker) on the servers in the satellite offices. Which of the following is TRUE with regards to Windows BitLocker Drive Encryption? (Choose all that apply.)


Options are :

  • BitLocker requires a minimum of one NTFS, and one FAT32 drive partitions
  • BitLocker encrypts all data stored on the Windows operating system volume.
  • BitLocker can only be configured on servers that have a Trusted Platform Module (TPM) microchip installed.
  • BitLocker uses the TPM to help to protect the Windows operating system and user data, and also helps to ensure that a computer is not tampered with, even if it is left unattended, lost, or stolen.

Answer :BitLocker encrypts all data stored on the Windows operating system volume. BitLocker uses the TPM to help to protect the Windows operating system and user data, and also helps to ensure that a computer is not tampered with, even if it is left unattended, lost, or stolen.

70-647 Pro Windows Server 2008 Enterprise Administrator Exam Set 2

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network, including domain controllers have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has instructed you to devise a document access management strategy for their employees. You have been instructed to make sure that employees can make use of document versioning, and also collaborate documents while they are online. Which of the following actions should you take?


Options are :

  • You should consider making use of Encrypting File System (EFS) in your strategy.
  • You should consider making use of Windows BitLocker Drive Encryption (BitLocker) in your strategy.
  • You should consider making use of Microsoft SharePoint Foundation 2010 in your strategy.
  • You should consider making use of folder redirection in your strategy.

Answer :You should consider making use of Microsoft SharePoint Foundation 2010 in your strategy.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. You are in the process of configuring a new MEDV workspace. Which of the following statements are TRUE with regards to the MEDV workspace? (Choose all that apply.)


Options are :

  • You are able to delete a MED-V workspace by clicking Remove in the Policy module, while the workspace pane is in focus.
  • You are able to delete a MED-V workspace by clicking Remove in the Policy menu.
  • You are able to clone a MED-V workspace from the Policy menu
  • You are unable to clone a MED-V workspace from the Policy menu.

Answer :You are able to delete a MED-V workspace by clicking Remove in the Policy module, while the workspace pane is in focus. You are able to clone a MED-V workspace from the Policy menu

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. YYY.com's domain controllers have Windows Server 2008 R2 installed, their network servers have Windows Server 2003 SP2 installed, and the workstations have Windows 7 installed. Eight of the network servers are configured as Terminal Servers. YYY.com also has a server, named ABCSR20, which has Microsoft Internet Security and Acceleration (ISA) Server 2006 installed and is configured as a firewall server. You have been instructed to configure remote access for servers that have Remote Desktop Services installed. Your configurations should allow for the use of fewer ports on the firewall, as well as the use of encryption on all connections to the Remote Desktop servers. You also have to make sure that specified users are not allowed access. You start by upgrading one of the network servers to Windows Server 2008 R2. You have to make sure that your task is successfully completed. Which of the following actions should you take? (Choose two.)


Options are :

  • You should consider making use of use Microsoft System Center Configuration Manager (SCCM).
  • You should consider installing the Remote Desktop Gateway (RD Gateway) role service on the upgraded server.
  • You should consider installing Windows Server 2008 R2 Datacenter Edition on the upgraded server.
  • You should consider creating an ADMX file on the upgraded server.
  • You should consider setting up the Remote Desktop connection authorization policy (RD CAP) on the upgraded server.

Answer :You should consider installing the Remote Desktop Gateway (RD Gateway) role service on the upgraded server. You should consider setting up the Remote Desktop connection authorization policy (RD CAP) on the upgraded server.

70-513 WCF Development with Microsoft .NET Framework 4 Exam Set 3

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network has Windows Server 2008 installed and all workstations have Windows XP Professional installed. The YYY.com network consists of 500 servers located at their headquarters. When YYY.com decides to expand by setting up a satellite office, you are instructed to relocate 100 of the existing servers to the new office. You have to make sure that the IP addresses of the servers in the new office are suitably adapted with as little administrative effort as possible. Which of the following actions should you take?


Options are :

  • You should consider making use the Netsh utility from the command prompt on your workstation.
  • You should consider making use of a Microsoft Application Compatibility Toolkit (ACT) to do the necessary changes.
  • You should consider installing Remote Server Administration Tools (RSAT) to modify the servers in the new branch.
  • You should consider making use the ServerManagerCMD utility from the command prompt on your workstation.

Answer :You should consider making use the Netsh utility from the command prompt on your workstation.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. You want to group shared folders that are located on different servers into a single logically structured namespace. The namespace should appear to users as a single shared folder with a series of sub folders, and should not require routing over WAN connections. Which of the following actions should you take?


Options are :

  • You should consider making use of File Server Resource Manager (FSRM).
  • You should consider making use of AD RMS.
  • You should consider making use of Distributed File System (DFS) Replication.
  • You should consider making use of Distributed File System (DFS) namespaces.

Answer :You should consider making use of Distributed File System (DFS) namespaces.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have Windows Vista installed. You have received instructions to make sure that YYY.com's users have the ability to work together on files. You have been informed that your solution should allow for YYY.com's remote users to access files via a Web browser, as well as allow for the use of full-text indexing for user content. You solution should also allow for the use of permissions to promote a secure access to files. Furthermore, you have to make sure that, in the event of YYY.com expanding, more Web servers can be in the solution. Which of the following actions should you take?


Options are :

  • You should consider making use of Windows System Resource Manager (WSRM).
  • You should consider making use of OU should consider making use of Microsoft Office SharePoint Server 2007.
  • You should consider making use of folder redirection.
  • You should consider making use of an adml file.

Answer :You should consider making use of OU should consider making use of Microsoft Office SharePoint Server 2007.

Microsoft 70-642 Windows Server Network Infrastructure Exam Set 5

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has numerous Windows Server Update Services (WSUS) servers that are configured to issue updates to all YYY.com's workstations. YYY.com's remote users accesses YYY.com's internal network via a split-tunnel VPN connection from their Windows Vista laptops You have been instructed to make sure that only approved updates are installed on the laptops, and that as little bandwidth as possible is consumed by the VPN connections. Your solution should make use of patch management. Which of the following actions should you take?


Options are :

  • You should consider making use of Windows Deployment Services (WDS) on the laptops.
  • You should consider making use of Internet Protocol security (IPsec) on the internal WSUS server.
  • You should consider installing a Microsoft Internet Information Services (IIS) server.
  • You should consider configuring the laptops to make use of a different WSUS server that has been configured to leave the updates on the Microsoft Update Web site.

Answer :You should consider configuring the laptops to make use of a different WSUS server that has been configured to leave the updates on the Microsoft Update Web site.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has its headquarters in Chicago and a satellite office in Dallas. Administrators in the Dallas office are responsible for administering the workstations and servers located in the Dallas office. The user accounts for these administrators reside in a global group named Test_adm. The Dallas office has a Read-only Domain Controller (RODC), which is currently being administered from the Chicago office. In a bid to delegate control of the RODC, you have been instructed to make sure that the Test_adm group only has permissions to manage, replace device drivers, and install updates for the operating system on the RODC. The Test_adm group should not be allowed to make changes to the Active Directory objects. Which of the following actions should you take?


Options are :

  • You should consider making Test_adm a member of the Administrators local group on the RODC.
  • You should consider making use of the Internet Protocol security (IPsec) for the Server Operators domain local group.
  • You should consider making use of the Hyper-V feature for a new OU.
  • You should consider making use of Credential Roaming on the computer object of the RODC.

Answer :You should consider making Test_adm a member of the Administrators local group on the RODC.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have Windows Vista installed. YYY.com has its headquarters in London and an office in Paris. The English language version of Windows Vista is installed in the London office and the Paris office uses the French version of Windows Vista. You have received instructions to make use of a Group Policy object (GPO) to apply custom application settings that enables administrators to edit the GPO with their respective language. You also have to make sure that the least amount of GPOs is installed. Which of the following actions should you take?


Options are :

  • You should consider Background Intelligent Transfer Service (BITS) settings site to the Paris office.
  • You should consider setting up roaming user profiles.
  • You should consider using an Active Directory-integrated zone.
  • You should consider setting up ADMX and ADML files, prior to the GPO being set up and linked to the YYY.com domain.

Answer :You should consider setting up ADMX and ADML files, prior to the GPO being set up and linked to the YYY.com domain.

Microsoft Certified Solutions Developer (MCSD) For 2019 Set 1

You work as the Enterprise administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. The functional level of the servers is set to Windows Server 2008 R2. YYY.com has a Marketing, Sales, and Finance department that has a domain controller configured as a DHCP Server, and a file server each. A new YYY.com policy states that administrators in each department should only be allowed to administer the DHCP scope in their respective departments, and that administrative effort should be kept to a minimum. You have to make sure that the new policy is adhered to. Which of the following actions should you take? (Choose all that apply.)


Options are :

  • You should consider migrating the DHCP server role to each of the file servers.
  • You should consider creating Multiple Activation Key (MAK) Independent Activation in the AD domain.
  • You should consider making the administrators in each department to the DHCP Administrators local group on the file servers in their respective departments.
  • You should consider assigning the administrators in each department Full Administrative rights across the network.

Answer :You should consider migrating the DHCP server role to each of the file servers. You should consider making the administrators in each department to the DHCP Administrators local group on the file servers in their respective departments.

You work as the Enterprise administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 R2. Half the workstations run Windows Vista, and the rest run Windows 7. YYY.com has its headquarters in London and a satellite office in Madrid. The satellite office in Madrid contains a File server, named ABC-SR11. An organizational unit (OU), named Testserv_OU, has been configured to host the computer objects for the servers in the Madrid office. The user accounts of YYY.com's administrators are part of a global group named TestGlobal. You have received instructions to grant administrators the necessary permissions to create shared folders on ABC-SR11. You want to achieve this with as little administrative effort as possible. Which of the following actions should you take?


Options are :

  • You should consider creating a Group Policy for Testserv_OU.
  • You should consider making the TestGlobal group a member of the Administrators local group on ABC-SR11.
  • You should consider configuring Read Only permissions on Testserv_OU.
  • You should consider making use of Credential Roaming.

Answer :You should consider making the TestGlobal group a member of the Administrators local group on ABC-SR11.

You work as an Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has a web server, named ABC-SR13, and a backup server, named ABC-SR17. You have been instructed to design a backup solution that allows for remote server backups of ABC-SR13 to be carried out from ABC-SR17. Which of the following actions should you take?


Options are :

  • You should consider suggesting the installation of Windows Server Backup, as well as the modification of the Windows Firewall settings on ABC-SR13.
  • You should consider suggesting the installation of Windows PowerShell, as well as the modification of the Windows Firewall settings on ABC-SR13.
  • You should consider suggesting the installation of Windows Server Backup, and Windows PowerShell on ABC-SR13.
  • You should consider suggesting the installation of Windows PowerShell, as well as having the IIS Management Service feature enabled on ABC-SR13.

Answer :You should consider suggesting the installation of Windows Server Backup, as well as the modification of the Windows Firewall settings on ABC-SR13.

Microsoft 70-243 Administering Deploying System Manager Exam Set 3

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has 20 servers that are configured to host their databases. You have previously created an OU, named ABC_Base, and configured it to host the computer accounts of the 20 database servers. You have also created and configured an OU, named ABC_Ad, to host the user accounts of the administrators that manage the databases. YYY.com also contains a global group, named ABC_Global, which all the database administrators are members of. You have been informed that the database administrators should only be able to manage YYY.com's database servers. Which of the following actions should you take?


Options are :

  • You should consider making use of the Domain Controllers organizational unit (OU), on ABC_Global.
  • You should consider having a group policy deployed to ABC_Base.
  • You should consider having AD RMS implemented
  • You should consider having NPAS implemented.

Answer :You should consider having a group policy deployed to ABC_Base.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have Windows Vista installed.YYY.com has three servers named ABC-SR11, ABC-SR12 and ABC-SR13, which are configured as Network Policy Servers (NPSs). ABC-SR11 has Microsoft SQL Server 2005 installed, and all three servers have Remote Authentication Dial-In User Service (RADIUS) server installed. Furthermore, YYY.com contains 20 wireless access points that are set up as RADIUS clients. You have received instructions to devise a solution for auditing access to the wireless access points. You are informed that your solution should provide for data to be stored centrally, in a format that allows straightforward queries. You are also informed that your solution should allow for the recording of all RADIUS attributes and RADIUS vendor-specific attributes Which combination of the following actions should you take? (Choose two.)


Options are :

  • You should consider auditing for logon events on the ABC-SR11.
  • You should consider installing Microsoft Windows Reliability and Performance Monitor.
  • You should consider setting up RADIUS accounting by using SQL logging on each server
  • You should consider forwarding all security events from ABC-SR12 and ABC-SR13 to ABC-SR11.
  • You should consider setting up users containers.
  • You should consider setting up the Windows System Resource Manager (WSRM).

Answer :You should consider setting up RADIUS accounting by using SQL logging on each server You should consider forwarding all security events from ABC-SR12 and ABC-SR13 to ABC-SR11.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have either Windows XP Professional or Microsoft Windows Vista installed. You have been instructed to design a VPN solution that allows for encrypted text to be used when storing VPN passwords.Furthermore, workstations that are configured as members of a workgroup, and Suite B cryptographic algorithms should be supported. You also have to make sure that certificates can be automatically enrolled. Which combination of the following actions should you take? (Choose all that apply.)


Options are :

  • You should consider upgrading the Windows XP Professional workstations to Windows Vista.
  • You should consider making use of Windows Deployment Services (WDS).
  • You should consider making use of the Windows System Resource Manager (WSRM).
  • You should consider making use of an IPsec VPN that uses certificate-based authentication.
  • You should consider making use of an enterprise certification authority (CA) that is based on Windows Server 2008.
  • You should consider making use of the 64-bit version of Windows Server 2008 Datacenter Edition.

Answer :You should consider upgrading the Windows XP Professional workstations to Windows Vista. You should consider making use of an IPsec VPN that uses certificate-based authentication. You should consider making use of an enterprise certification authority (CA) that is based on Windows Server 2008.

70-662 Microsoft Exchange Server 2010 Configuring Exam Set 2

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers, including domain controllers, on the YYY.com network have Windows Server 2008 installed and all workstations have Windows Vista and Microsoft Office Outlook 2007 installed. The YYY.com network has three file servers, of which one is configured as a database server and two are configured as Microsoft Exchange Server 2007 servers. The database server is accessible via TCP port 47182. You have been instructed to make sure that YYY.com's mobile users are able to access the YYY.com network remotely. However, the mobile users only support the use of HTTP and HTTPS for Internet access. Your solution should allow for the database server, as well as e-mail and file resources on the network to be accessible. Your solution should also provide for secure network connections. Which combination of the following actions should you take? (Choose two.)


Options are :

  • You should consider making use of a VPN solution that uses Secure Socket Tunneling Protocol (SSTP).
  • You should consider installing Connection Manager Administration Kit (CMAK) profiles to the workstations
  • You should consider making use of Outlook Anywhere for Exchange Server 2007.
  • You should consider making use of a VPN solution that uses Layer Two Tunneling Protocol (L2TP).
  • You should consider making use of a VPN solution that uses Point-to-Point Tunneling Protocol (PPTP).
  • You should consider upgrading all workstations to Windows Vista Service Pack 1.

Answer :You should consider making use of a VPN solution that uses Secure Socket Tunneling Protocol (SSTP). You should consider upgrading all workstations to Windows Vista Service Pack 1.

You work as an Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has a server running HyperV. There are multiple virtual machines (VMs) configured on the server. YYY.com has informed you that you have to devise a solution for backing up the HyperV server. Which combination of the following should form part of your solution? (Choose two.)


Options are :

  • You should consider taking a snapshot of the HyperV server.
  • You should consider making use of a full backup for each VM.
  • You should consider making use of a full backup for the HyperV server.
  • You should consider taking a snapshot of every VM.

Answer :You should consider making use of a full backup for each VM. You should consider making use of a full backup for the HyperV server.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network, including domain controllers, have Windows Server 2008 R2 installed and all workstations have Windows Vista installed. YYY.com has its headquarters in Chicago and a satellite office in Dallas, which are configured as separate Active Directory sites. You have received instructions to alter YYY.com's DNS to make sure that, in the event of a server failure, the DNS service remains accessible. You should also make sure that synchronization data between the DNS servers are encrypted and that the DNS servers support dynamic updates. Which combination of the following actions should you take? (Choose two.)


Options are :

  • You should consider making use of a RODC installation media using ntdsutil ifm on a domain controller in the Chicago office.
  • You should consider making use of Windows System Resource Manager (WSRM)in the Dallas office.
  • You should consider setting up the DNS to use Active Directory integrated zones.
  • You should consider configuring a domain controller in each office as a DNS server.
  • You should consider deploying 64-bit version of Windows Server 2008 Datacenter Edition on two new servers.
  • You should consider deploying the Network Access Protection (NAP) in the Chicago office.

Answer :You should consider setting up the DNS to use Active Directory integrated zones. You should consider configuring a domain controller in each office as a DNS server.

70-680 Windows 7 Configuring Certification Practice Exam Set 2

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. The YYY.com network servers run Windows Server 2008 and the workstations run Microsoft Windows Vista. YYY.com has three servers named ABC-SR11, ABC-SR12 and ABC-SR13, which are configured as Network Policy Servers (NPSs) and have Remote Authentication Dial-In User Service (RADIUS) server installed. Furthermore, YYY.com contains 20 wireless access points that are set up as RADIUS clients. You have received instructions to devise a solution for auditing access to the wireless access points. You are informed that your solution should provide for data to be stored centrally, and include all RADIUS attributes and all RADIUS vendor-specific attributes. You have to make sure that your solution does not incur any unnecessary expenses. Which combination of the following actions should you take? (Choose two.)


Options are :

  • You should consider setting up users containers.
  • You should consider setting up the Windows System Resource Manager (WSRM).
  • You should consider storing the log files in an Internet Authentication Service (IAS) format on a shared folder on the one of the servers.
  • You should consider setting up RADIUS accounting by using local file logging on each server
  • You should consider auditing for logon events on the one of the servers.
  • You should consider installing Microsoft Windows Reliability and Performance Monitor.

Answer :You should consider storing the log files in an Internet Authentication Service (IAS) format on a shared folder on the one of the servers. You should consider setting up RADIUS accounting by using local file logging on each server

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. Half of YYY.com's workstations have Windows XP SP1 installed, while the rest have Windows 7 installed. You have been instructed to design a VPN solution that allows for encrypted text to be used when storing VPN passwords. Furthermore, workstations that are configured as members of a workgroup, as well as Suite B cryptographic algorithms should be supported. You also have to make sure that certificates can be automatically enrolled. Which combination of the following actions should you take? (Choose all that apply.)


Options are :

  • You should consider making use of the Windows System Resource Manager (WSRM).
  • You should consider making use of the 64-bit version of Windows Server 2008 R2 Datacenter Edition.
  • You should consider making use of an IPsec VPN that uses certificate-based authentication.
  • You should consider making use of Windows Deployment Services (WDS).
  • You should consider making use of an enterprise certification authority (CA) that is based on Windows Server 2008 R2.
  • You should consider upgrading the Windows XP Professional workstations to Windows 7.

Answer :You should consider making use of an IPsec VPN that uses certificate-based authentication. You should consider making use of an enterprise certification authority (CA) that is based on Windows Server 2008 R2. You should consider upgrading the Windows XP Professional workstations to Windows 7.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. The YYY.com network contains 250 servers that have Windows Server 2003 installed. All of these servers make use of 64-bit hardware. The YYY.com workstations either have Windows XP Professional, or Windows Vista installed. You have received instructions from the CIO to combine the 250 servers into 50 Windows Server 2008 servers. Your configurations should allow for the use of the current hardware and software, and also the use of 64-bit child virtual machines. You have also been informed that you should make the most of the resource utilization and prevent services from being integrated on the 50 Windows Server 2008 servers. Which of the following actions should you take?


Options are :

  • You should consider installing a two-node failover cluster after consolidating services across to the 50 Windows Server 2008 servers.
  • You should consider installing the Hyper-V feature on 50 Windows Server 2008 servers and change the servers into virtual machines.
  • You should consider making use of a 64-bit version of Windows Server 2008 Datacenter Edition. You should thereafter change the physical machines into virtual machines.
  • You should consider installing the Windows System Resource Manager (WSRM).

Answer :You should consider installing the Hyper-V feature on 50 Windows Server 2008 servers and change the servers into virtual machines.

70-647 Pro Windows Server 2008 Enterprise Administrator Exam Set 4

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has two Web servers, named ABC-SR13 and ABC-SR14. You are preparing to publish a new YYY.com Web site on ABC-SR13 and ABC-SR14. You want to make sure that, in the event of one of the Web servers failing, users can still access the Web site. You are also informed that your strategy should allow for the addition of Web servers in the future, without having any impact on clients connecting to the Web site. Which of the following actions should you take?


Options are :

  • You should recommend that ABC-SR13 and ABC-SR14 be configured as a failover cluster.
  • You should recommend the creation of a Web server farm
  • You should recommend that ABC-SR13 and ABC-SR14 be configured in a Network Load Balancing cluster.
  • You should recommend the use of a RAID 5 array for both servers.

Answer :You should recommend that ABC-SR13 and ABC-SR14 be configured in a Network Load Balancing cluster.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2003 installed and all workstations have Windows Vista installed. The YYY.com network contains two servers named ABC-SR10 and ABC-SR11. ABCSR10 has a 32-bit version of Windows Server 2003 installed, while ABC-SR11 has a 64 -bit version installed. Both servers has an application installed, named TestApp1 and TestApp2, respectively. The two applications require their respective operating systems to function properly. You have been instructed move the applications to a server running Windows Server 2008. To keep costs to a minimum, you want to make use of a single server, and make use of Hyper-V feature on the server before installing the applications on separate child virtual machines. Which of the following actions should you take?


Options are :

  • You should consider installing a 64-bit version of Windows Server 2008 Standard on the new server.
  • You should consider installing a 64-bit version of Windows Server 2008 Enterprise Edition on the new server.
  • You should consider installing a 32-bit version of Windows Server 2008 Enterprise Edition on the new server.
  • You should consider installing a 32-bit version of Windows Server 2008 Enterprise Edition on the new server.

Answer :You should consider installing a 64-bit version of Windows Server 2008 Enterprise Edition on the new server.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers, including domain controllers, on the YYY.com network have Windows Server 2008 installed and all workstations have Microsoft Windows Vista installed. You have received instructions to make sure that a report on the status of software updates for the Windows Vista workstations is created on a monthly basis. The report should show the operating system and Microsoft application updates that have been successfully and unsuccessfully installed. You need to devise a suitable solution that is cost effective, and requires as little administrative effort as possible. Which combination of the following actions should you take? (Choose two.)


Options are :

  • You should consider installing Windows Deployment Services (WDS)
  • You should consider making use of Network Policy Server (NPS) on the workstations.
  • You should consider making use of a Group Policy object (GPO) to set up Windows Update.
  • You should consider making use of Windows Software Update Services (WSUS) 3.0.
  • You should consider installing the management agents on all workstations.

Answer :You should consider making use of a Group Policy object (GPO) to set up Windows Update. You should consider making use of Windows Software Update Services (WSUS) 3.0.

70-642 Windows Server 2008 Network Infrastructure Exam Set 7

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions