Microsoft 70-647 Windows Enterprise Administrator Exam Set 4

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has expanded their business by establishing a satellite office in Dallas. Dallas office has numerous servers deployed of which one must be promoted to a Read-Only domain controller. Which of the following actions should you take?


Options are :

  • You should consider making use of Administrator Role Separation
  • You should consider making use of IFM subcommand.
  • You should consider making use of the dcpromo command.
  • You should consider making use of Active Directory snapshots.

Answer :You should consider making use of IFM subcommand.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. The YYY.com network servers have Windows Server 2008 R2 installed and workstations have Windows 7 installed. YYY.com contains more than 1,500 workstations, which has been linked to managed switches. You are in the process of devising a network access solution that prevents YYY.com employees from evading the restrictions on the network access. The solution should also only allow network access to workstations with updated service packs and updated antimalware software installed. Which combination of the following actions should you take? (Choose two.)


Options are :

  • You should generate event subscriptions.
  • You should make use of Network Access Protection (NAP).
  • You should generate an adml file.
  • You should make use of 802.1x enforcement
  • You should make use of Background Intelligent Transfer Service (BITS) settings.

Answer :You should make use of Network Access Protection (NAP). You should make use of 802.1x enforcement

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. The YYY.com network has a server running Remote Desktop Services. You have been instructed to make sure that a new application is deployed in such a way that the most up to date edition of the application is always accessible to YYY.com employees via YYY.com's portal. The deployment should also allow for the installation of as little applications as possible on YYY.com workstations. You have published the application as a RemoteApp. Which of the following actions should you take NEXT?


Options are :

  • You should make use of the Remote Desktop resource authorization policy (RD RAP).
  • You should make use of the Remote Desktop connection authorization policy (RD CAP).
  • You should have Remote Desktop Web Access (RD Web Access) enabled.
  • You should make use of the Remote Desktop Connection Broker.

Answer :You should have Remote Desktop Web Access (RD Web Access) enabled.

Microsoft 98-367 & 98-368 Certification Practical Exam Set 2

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has its headquarters in London and two satellite offices in Paris and Milan. The Paris and Milan offices are linked to each other via a WAN connection. Each satellite office has a file server that hosts data for that office. You have been instructed to make sure that data hosted on the file servers are accessible to both the Paris and Milan offices. You also have to make sure that the files on either file server remains accessible to users, even in the event of the WAN connection failing. You are then informed that your solution should provide for a reduction in the utilization of network bandwidth. Which of the following actions should you take?


Options are :

  • You should consider making use of Distributed File System Replication (DFSR) on the file servers in the Paris and Milan offices.
  • You should consider making use of the ServerManagerCMD tool on both the servers
  • You should consider installing AD RMS.
  • You should consider installing a Windows Server 2008 Datacenter Edition server in both offices.

Answer :You should consider making use of Distributed File System Replication (DFSR) on the file servers in the Paris and Milan offices.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have either Windows XP Professional or Windows 7 installed. The YYY.com network has an internal network and a perimeter network which is separated by a firewall. The perimeter network is also connected to the Internet via a firewall. YYY.com makes use of an enterprise ertification authority (CA) and a Microsoft Online Responder on the internal network. You have been instructed to make sure that users who connect via the Internet are able to securely detect whether individual certificates are valid, without consuming unnecessary bandwidth. Which of the following actions should you take? (Choose all that apply.)


Options are :

  • You should consider redirecting authentication requests to a server on the internal network.
  • You should consider setting up IIS to redirect requests to the Online Responder on the internal network.
  • You should consider installing Network Device Enrollment Service (NDES) on a server on the perimeter network.
  • You should consider installing a stand-alone CA on a server that resides on the perimeter network
  • You should consider installing a Network Policy Server (NPS) on a server that resides on the perimeter network.
  • You should consider installing IIS on a server that resides on the perimeter network

Answer :You should consider setting up IIS to redirect requests to the Online Responder on the internal network. You should consider installing IIS on a server that resides on the perimeter network

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network,including domain controllers, have Windows Server 2008 installed and all workstations have Windows XP Service Pack 2 installed. The YYY.com is made up of 15 servers and 600 workstations. One of the servers, named ABC-SR07, is configured as a Terminal server. You have received instructions to install a new in-house application and enable desktop themes, which is a prerequisite of the application. Furthermore, the inhouse application should only be accessible from any workstation to users that have the necessary permissions. You also need to make sure that the amount of modifications on the workstations, as well as the costs is kept to a minimum. Which combination of the following actions should you take? (Choose two.)


Options are :

  • You should consider making use of Windows System Resource Manager (WSRM).
  • You should consider making use of Windows Deployment Services (WDS).
  • On ABC-SR07, select the Desktop Experience feature and install the application.
  • You should consider installing the Remote Desktop Connection (RDC) 6.0 software on all workstations.
  • You should consider making use of Microsoft System Center Configuration Manager (SCCM).

Answer :On ABC-SR07, select the Desktop Experience feature and install the application. You should consider installing the Remote Desktop Connection (RDC) 6.0 software on all workstations.

70-513 WCF Development with Microsoft .NET Framework 4 Exam Set 1

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network, including domain controllers, have Windows Server 2008 R2 installed and all workstations have Windows XP SP 3 installed. The YYY.com is made up of 15 servers and 600 workstations. One of the servers, named ABC-SR13, is configured as a Remote Desktop Services server. You have received instructions to install a new in-house application and enable desktop themes, which is a prerequisite of the application. Furthermore, the in-house application should only be accessible from any workstation to users that have the necessary permissions. You also need to make sure that the amounts of modifications made to the workstations, as well as the costs are kept to a minimum. You start by having the Remote Desktop Connection (RDC) 7.0 software deployed to all workstations. You have to make sure that your task is suitably completed. Which combination of the following actions should you take? (Choose two.)


Options are :

  • You should consider having the application installed on ABC-SR13.
  • You should consider making use of Windows System Resource Manager (WSRM).
  • You should consider making use of Microsoft System Center Configuration Manager (SCCM).
  • You should consider making use of Windows Deployment Services (WDS).
  • You should consider having the Desktop Experience feature enabled on ABC-SR13

Answer :You should consider having the application installed on ABC-SR13. You should consider having the Desktop Experience feature enabled on ABC-SR13

You work as the Enterprise administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have Windows Vista SP1 installed. The YYY.com network of YYY.com is connected to the Internet via a firewall. YYY.com releases a new written security policy that requires the use of encryption on remote connections and remote authentications. The policy also requires ports 80 and 443 to be used for incoming traffic on the firewall. You have been instructed to devise a solution that adheres to the new security policy. Which of the following actions should you take?


Options are :

  • You should consider making use of Secure Socket Tunneling Protocol (SSTP).
  • You should consider making use of roaming user profiles.
  • You should consider making use of the Hyper-V feature.
  • You should consider making use of Multiple Activation Key (MAK) Independent Activation.

Answer :You should consider making use of Secure Socket Tunneling Protocol (SSTP).

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. The YYY.com network servers have Windows Server 2008 R2 installed and workstations have Windows 7 installed. YYY.com contains more than 1,500 workstations, which has been linked to managed switches. You are in the process of devising a network access solution that prevents YYY.com employees from evading the restrictions on the network access. The solution should also only allow network access to workstations with updated service packs and updated antimalware software installed. You then decide to make use of Network Access Protection (NAP) with enforcement. Which of the following is the method you should use?


Options are :

  • NAP Enforcement for Remote Desktop Gateway.
  • NAP Enforcement for 802.1X.
  • NAP Enforcement for DHCP.
  • NAP Enforcement for VPN.
  • NAP Enforcement for IPsec Communications.

Answer :NAP Enforcement for 802.1X.

Microsoft 70-647 Windows Enterprise Administrator Exam Set 4

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory forest with two domains named us.YYY.com and uk.YYY.com. All servers on the YYY.com network, including domain controllers have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. An administrator, named Andy Reid, has been given the responsibility of managing backups in the us.YYY.com domain. You have been instructed to make sure that Andy Reid only has these permissions in the us.YYY.com domain. Andy Reid should, however, is prevented from having unnecessary permissions. You have to achieve this with as little administrative effort as possible. Which of the following actions should you take?


Options are :

  • You should consider making Andy Reid a member of the administrators OU on each server in the us.YYY.com domain.
  • You should consider making Andy Reid a member of the Backup Operators domain local groupin the us.YYY.com domain.
  • You should consider making Andy Reid a member of the Admins domain local group in the us.YYY.com domain.
  • . You should consider making Andy Reid a member of the Domain Admins global group in the YYY.com forest.

Answer :You should consider making Andy Reid a member of the Backup Operators domain local groupin the us.YYY.com domain.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. YYY.com's domain controllers have Windows Server 2008 R2 installed, their network servers have Windows Server 2003 R2 installed, and the workstations have Windows 7 installed. Eight of the network servers are configured as Terminal Servers. YYY.com also has a server, named ABCSR20, which has Microsoft Internet Security and Acceleration (ISA) Server 2006 installed and is configured as a firewall server. You have been instructed to configure remote access for servers that have Remote Desktop Services installed. Your configurations should allow for the use of fewer ports on the firewall, as well as the use of encryption on all connections to the Remote Desktop servers. You also have to make sure that the availability of specified Remote Desktop servers is limited. You start by upgrading one of the network servers to Windows Server 2008 R2. You have to make sure that your task is successfully completed. Which of the following actions should you take? (Choose two.)


Options are :

  • You should consider installing the Remote Desktop Gateway (RD Gateway) role service on the upgraded server.
  • You should consider making use of use Microsoft System Center Configuration Manager (SCCM).
  • You should consider creating an ADMX file on the upgraded server.
  • You should consider installing Windows Server 2008 R2 Datacenter Edition on the upgraded server.
  • You should consider setting up the Remote Desktop resource authorization policy (RD RAP) on the upgraded server.

Answer :You should consider installing the Remote Desktop Gateway (RD Gateway) role service on the upgraded server. You should consider setting up the Remote Desktop resource authorization policy (RD RAP) on the upgraded server.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory forest named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have Windows Vista installed. YYY.com has a server, named ABC-SR13, which is configured as a File server. The Sales representatives at YYY.com making use of their Windows Vista Business Edition laptops from inside and outside the office. You have received instructions to make sure that Sales representatives have the ability to decide which documents are accessible when they are not connected to the office network. You have also been informed that your solution should provide for a reduction in the amount of saved documents on the laptops, while also reduce network logon times for the Sales representatives. Which combination of the following actions should you take? (Choose two.)


Options are :

  • You should consider selecting the automatic caching option.
  • You should consider making use of Network Load Balancing.
  • You should consider selecting the manual caching option.
  • You should consider making use of Credential Roaming.
  • You should consider configuring offline files.

Answer :You should consider selecting the manual caching option. You should consider configuring offline files.

70-646 Pro Windows Server 2008 - Server Administrator Exam Set 2

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory forest named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com is planning to install a new child domain, named us.YYY.com, which will have two domain controllers configured to host the DNS server role. All the employees at YYY.com and the computers at the child domain will be members of us.YYY.com.You have been instructed to make sure that fully qualified domain names is used to access resources in YYY.com's root and child domain. You have also been informed that name resolution services should be implemented in the event of a server failure and that new DNS servers should automatically be recognized when added to or removed from the YYY.com domain. You are required to devise a solution that suitably deals with the scenario. Which of the following actions should you take?


Options are :

  • You should consider making use of Microsoft Virtual Server 2005 R2 on both the domain controllers and only create an Active Directory integrated zone for us.YYY.com on one of them.
  • You should consider creating an Active Directory Integrated zone for us.YYY.com and an Active Directory Integrated stub zone for YYY.com on one of the domain controllers.
  • You should consider making use of Network Access Protection (NAP) on both the domain controllers and only create an Active Directory integrated zone for us.YYY.com on one of them.
  • You should consider making use of Public Key Policies at that domain for us.YYY.com on the two domain controllers.

Answer :You should consider creating an Active Directory Integrated zone for us.YYY.com and an Active Directory Integrated stub zone for YYY.com on one of the domain controllers.

You work as the network administrator at YYY.com. All servers on the YYY.com network have Windows Server 2000 installed. YYY.com has four servers that each runs a different third party application. When YYY.com informs you of their intention to upgrade the servers to Windows Server 2008, you discover that the applications are not suitable to run on the Windows Server 2008 operating system, or be installed together on the same machine either. You notice that the each application uses up a minimal amount of the processor resources. You are instructed to make sure that the servers have windows server 2008 installed and that the applications are still available for use. You are also informed that your solution should keep expenses to a minimum. Which two of the following actions should you take? (Choose two.)


Options are :

  • You should consider installing a 64-bit version of Windows Server 2008 Enterprise Edition on a new server.
  • You should consider installing a two-node failover cluster on the new server.
  • You should consider installing Hyper-V feature on the new server and setting up four child virtual machines.
  • You should consider installing Microsoft Virtual Server 2005 R2 on the new server.
  • You should consider installing Windows Server 2008 Enterprise Edition on a new server.
  • You should consider installing Windows Server 2008 Datacenter Edition server on a new server.

Answer :You should consider installing Hyper-V feature on the new server and setting up four child virtual machines. You should consider installing Windows Server 2008 Enterprise Edition on a new server.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. YYY.com has its headquarters in New York and a satellite office in Dallas. The Dallas office has numerous servers that are used to store data. You have configured the use of File Server Resource Manager (FSRM) for these servers. Which of the following is TRUE with regards to File Server Resource Manager (FSRM)? (Choose all that apply.)


Options are :

  • It allows you to place storage limits on volumes and folders on the servers.
  • It allows you to actively screen files stored by users.
  • It allows users unlimited storage on volumes and folders on the servers.
  • You cannot generate wide-ranging storage reports using File Server Resource Manager (FSRM).

Answer :It allows you to place storage limits on volumes and folders on the servers. It allows you to actively screen files stored by users.

70-646 Pro Windows Server 2008,Server Administrator Test Set 5

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has numerous servers that are configured to run the File Services server role, and have two volumes configured for the operating system and data files respectively. You have received instructions to devise a solution that allows for the recovery of the operating system, as well as the data files. You are also informed that normal operations should not be disrupted by the recovery process, which should take as little time as possible to complete. You have decided to make use of the Windows Server Backup feature. You have to make sure that the task is suitably completed. Which of the following actions should you take?


Options are :

  • You should consider making use of use Windows System Resource Manager (WSRM) on the new server.
  • You should consider making use of System Image Recovery.
  • You should consider making use of Folder redirection.
  • You should consider creating a System Performance Data Collector Set.

Answer :You should consider making use of System Image Recovery.

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com's Research department stores all their research data in a shared folder hosted by a file server, named ABC-SR13. The staff in the Research department has complained that finding relevant data in the shared folder is taking too long. You have been instructed to make sure that researchers are able to find data faster. Which of the following actions should you take?


Options are :

  • You should consider installing the Windows Search Service
  • You should consider installing the Windows System Resource Manager (WSRM).
  • You should consider configuring Network Policy Server (NPS) connection request policies.
  • You should consider making use of Distributed File System (DFS) namespaces.

Answer :You should consider installing the Windows Search Service

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network has Windows Server 2008 installed and all workstations have Windows XP Professional installed. You have been informed that YYY.com is planning to install 100 new Windows Server 2008 servers, of which a certain number includes 64-bit hardware, and the rest includes 32-bit hardware. You have also been informed that Pre-Boot Execution Environment (PXE) is supported by all of these servers. YYY.com has a version of Windows Server 2008 (64-bit) server, named ABC-SR24, which is configured as a DHCP server and only issues IPv4 addresses. You have received instructions to make sure that the deployment process is automated, whilst ensuring that costs are kept to the minimum. Which of the following actions should you take?


Options are :

  • You should consider making use of Multiple Activation Key (MAK) Independent Activation on ABC-SR24.
  • You should consider installing Windows Deployment Services (WDS) on ABC-SR24.
  • You should consider making use of Microsoft Multipath I/O supported.
  • You should consider making use of ntdsutil imf on both a 64-bit, and a 32-bit server.

Answer :You should consider installing Windows Deployment Services (WDS) on ABC-SR24.

Microsoft 70-647 Windows Enterprise Administrator Exam Set 1

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 R2. Half the workstations run Windows Vista, and the rest run Windows 7. You have previously created separate organizational units (OUs) for the Sales, Products and Marketing departments. You now need to make sure that the Products OU remain unaffected when settings are applied to GPOs linked to the YYY.com domain. You also have to make sure that the amount of GPOs and OUs used are kept to a minimum. Which of the following actions should you take?


Options are :

  • You should consider making use of block inheritance on the Products OU.
  • You should consider making use of a DFS Namespace.
  • You should consider making use of a custom network profile.
  • You should consider creating an ADMX file.

Answer :You should consider making use of block inheritance on the Products OU.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network has Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has released a security policy requiring all servers and workstations to have the same Windows firewall settings. You have been instructed to make sure that this policy is adhered to using as little administrative effort as possible. Which of the following actions should you take?


Options are :

  • You should consider making use of local Group Policy objects (GPOs)
  • You should consider creating a Windows Management Instrumentation (WMI) filter.
  • You should consider making use of domain-based Group Policy objects (GPOs)
  • You should consider creating an ADML file.

Answer :You should consider making use of domain-based Group Policy objects (GPOs)

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. YYY.com's domain controllers have Windows Server 2008 installed, their network servers have Windows Server 2003 installed, and the workstations have Microsoft Windows Vista installed. Eight of the network servers are configured as Terminal Servers. YYY.com also has a server, named ABC-SR20, which has Microsoft Internet Security and Acceleration (ISA) Server 2006 installed and is configured as a firewall server. You have been instructed to configure remote access for YYY.com's terminal servers. Your configurations should allow for the use of fewer ports on the firewall, as well as the use of encryption on all connections to the terminal servers. You also have to make sure that specified users are not allowed access. Which of the following actions should you take? (Choose two.)


Options are :

  • You should consider making use of use Microsoft System Center Configuration Manager (SCCM).
  • You should consider creating an ADMX file.
  • You should consider setting up the Terminal Services Gateway (TS Gateway) role and a Terminal Services connection authorization policy (TS CAP) on the upgraded server.
  • You should consider upgrading one of the network servers to Windows Server 2008.
  • You should consider installing Windows Server 2008 Datacenter Edition.

Answer :You should consider setting up the Terminal Services Gateway (TS Gateway) role and a Terminal Services connection authorization policy (TS CAP) on the upgraded server. You should consider upgrading one of the network servers to Windows Server 2008.

Microsoft 98-367 & 98-368 Certification Practical Exam Set 3

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have either Windows Vista or Windows 7 installed. YYY.com has informed you of their intention to enter into a working partnership with a company, named Weyland Industries, which has an Active Directory domain named weylandindustries.com. The domain controllers in the weylandindustries.com domain have Windows Server 2008 R2 installed. As a result, YYY.com has released a written security policy that prohibits the printing of classified documents, or forwarding these classified documents to recipients that are not trusted. The new policy also states that Weyland Industries users should not be able to access classified data if they do not have the necessary permissions. Furthermore, the management of the Weyland Industries users should require as little administrative effort as possible. Lastly, the network traffic between the two organizations should be handled by port 443. You start by configuring a federated trust between YYY.com and Weyland industries. You then deploy a Windows Server 2008 R2 server, named ABC-SR36. You have to make sure that the written security policy is fully adhered to. Which combination of the following actions should you take? (Choose two.)


Options are :

  • You should consider installing the Active Directory Rights Management Services (AD RMS) role on ABC-SR36.
  • You should consider installing the Windows SharePoint Services role on ABC-SR36.
  • You should consider installing Microsoft Office SharePoint Server 2010 on ABC-SR36.
  • You should consider making use of Windows System Resource Manager (WSRM) on ABC-SR36.

Answer :You should consider installing the Active Directory Rights Management Services (AD RMS) role on ABC-SR36. You should consider installing Microsoft Office SharePoint Server 2010 on ABC-SR36.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory forest named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has its headquarters in London and branch offices in Madrid and Paris. The London office contains a Windows Server Update Services (WSUS) server, named ABCSR12, which is configured to distribute updates to the workstations at the London office. The branch offices have a dedicated WAN connection that links them to the London office. You have received instructions to set up a patch management solution that allows for a reduction in WLAN traffic between the branch offices and the Internet, while also allowing branch offices to receive updates from the London office. Which of the following actions should you take? (Choose two.)


Options are :

  • You should consider installing a WSUS server in the Paris and Madrid offices.
  • You should consider making use of Microsoft SQL Server 2005 in the Paris and Madrid offices.
  • You should consider setting up and linking the Group Policy objects (GPOs) to the OUs.
  • You should consider setting up the WSUS servers as a replica of ABC-SR12.
  • You should consider making use of Terminal Services at the London office.

Answer :You should consider installing a WSUS server in the Paris and Madrid offices. You should consider setting up the WSUS servers as a replica of ABC-SR12.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 and all workstations run Windows Vista. The Active Directory domain has a top level OU named ABCStaff that contains three OUís named ABCMan, ABCPerm, and ABCTemp. ABCMan hosts the user accounts of YYY.com's managers, ABCPerm hosts the user accounts of YYY.com's permanent staff, and ABCTemp host the user accounts of YYY.com's temporary staff. ABCStaff has previously been configured in such a way that the Group Policy object (GPO) settings applied to it also affects members of the ABCMan OU. You have been instructed to make sure that ABCMan OU will not be affected when GPO settings are applied to ABCStaff. Which of the following actions should you take?


Options are :

  • You should consider configuring the ABCStaff OU to have the Block Policy Inheritance setting enabled.
  • You should consider making use Netsh tool
  • You should consider configuring the ABCMan OU to have the Block Policy Inheritance setting enabled.
  • You should consider configuring the ABCPerm OU to make use of the Microsoft Multipath I/O.

Answer :You should consider configuring the ABCMan OU to have the Block Policy Inheritance setting enabled.

70-642 Windows Server 2008 Network Infrastructure Exam Set 3

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. The Active Directory domain has a top-level OU named KingEmployees that includes an OU named TestManagers and an OU named TestUsers. TestManagers is configured to host the user accounts of all YYY.com's managers, as well as the Marketing, Sales and Finance global groups. TestUsers is configured to host the user accounts of the rest of YYY.com's staff. After creating a new GPO, named ABCStaff, and linking KingEmployees to it, you received complaints from the members of the Marketing global group stating that they cannot use the run command from the Start menu. You perform an analysis and determine that the settings configured for the ABCStaff GPO is the root of the problem. You have to make sure that problem is suitably resolved Which of the following actions should you take?


Options are :

  • You should consider setting up Group Policy filtering on the ABCStaff GPO for the Marketing global group.
  • You should consider setting up Shared Folders permissions for the Marketing global group.
  • You should consider making use of Credential Roaming on TestManagers.
  • You should consider setting up a new Starter GPO.

Answer :You should consider setting up Group Policy filtering on the ABCStaff GPO for the Marketing global group.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have Windows Vista installed. YYY.com has numerous servers that are configured to run the File Services server role, and have two volumes configured for the operating system and data files respectively. You have received instructions to devise a solution that allows for the recovery of the operating system, as well as the data files. You are also informed that normal operations should not be disrupted by the recovery process, which should take as little time as possible to complete. Which of the following two actions should you take? (Choose two.)


Options are :

  • You should consider making use of use Windows System Resource Manager (WSRM) on the new server.
  • You should consider creating a System Performance Data Collector Set.
  • You should consider making use of Folder redirection.
  • You should consider making use of Windows Server Backup feature.
  • You should consider making use of use Windows Complete PC Restore.

Answer :You should consider making use of Windows Server Backup feature. You should consider making use of use Windows Complete PC Restore.

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. You have been instructed to apply Encrypting File System (EFS) for YYY.comís workstations. During the process, you also instructed to enable credential roaming. Which of the following is TRUE with regards to enabling credential roaming? (Choose all that apply.)


Options are :

  • Once credential roaming is enabled, you can specify whether to include or exclude stored user names and passwords from the credential roaming policy.
  • Once credential roaming is enabled, you are prevented from specifying a maximum number of certificates and keys that can be used with credential roaming.
  • Once credential roaming is enabled, you can specify the length of time a roaming credential will remain in AD DS for a certificate or key that has been deleted locally.
  • Once credential roaming is enabled, you are prevented from restricting roaming for credentials that exceed a specified size.

Answer :Once credential roaming is enabled, you can specify whether to include or exclude stored user names and passwords from the credential roaming policy. Once credential roaming is enabled, you can specify the length of time a roaming credential will remain in AD DS for a certificate or key that has been deleted locally.

70-642 Windows Server 2008 Network Infrastructure Exam Set 5

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has a web server, named ABC-SR15, which hosts an application named ABCWA7. You have been instructed to configure an authentication and encryption solution. The solution should make use of an authentication method that transmits user names and passwords across the network in clear text. The solution should also make use of an encryption method that establish establishes a secure connection. Which of the following actions should you take?


Options are :

  • You should consider making use of Windows authentication and SSL.
  • You should consider making use of Anonymous authentication and SSL.
  • You should consider making use of Basic authentication and SSL.
  • You should consider making use of Client Certificate Mapping authentication and SSL.

Answer :You should consider making use of Anonymous authentication and SSL.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network, including domain controllers have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has acquired two new servers that should be configured in a two-node failover cluster. The nodes should have the best suited edition of the Windows Server 2008 R2 operating system installed, but take up the least amount of space. Which of the following options are TRUE with regards to this scenario?


Options are :

  • You could make use of a Server Core installation of Windows Server 2008 R2 Datacenter on one server, and a Server Core installation of Windows Server 2008 R2 Datacenter on the other.
  • You could make use of a full installation of Windows Server 2008 R2 Datacenter on the one server, and a Server Core installation of Windows Server 2008 R2 Datacenter on the other.
  • You could make use of a Server Core installation of Windows Server 2008 R2 Enterprise on both servers.
  • You could make use of a full installation of Windows Server 2008 R2 Enterprise on the one server, and a Server Core installation of Windows Server 2008 R2 Enterprise on the other.

Answer :You could make use of a Server Core installation of Windows Server 2008 R2 Enterprise on both servers.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have Windows Vista installed. The YYY.com network contains 8 servers configured as file servers. You have been given the task of monitoring these files servers. Your monitoring solution should allow for notification e-mails to be sent when the available free space has reached a pre-defined level. Your solution should also include the use of quotas for file storage. Which of the following actions should you take?


Options are :

  • You should consider setting up the File Server Resource Manager (FSRM) role service. You should also set up Quota Management and Storage Reports Management.
  • You should consider setting up Shared Folders permissions.
  • You should consider setting up folder redirection and Event Subscriptions
  • You should consider setting up Windows System Resource Manager (WSRM) feature and Performance Monitor alerts

Answer :You should consider setting up the File Server Resource Manager (FSRM) role service. You should also set up Quota Management and Storage Reports Management.

Microsoft 70-647 Windows Enterprise Administrator Exam Set 6

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions