Microsoft 70-647 Windows Enterprise Administrator Exam Set 7

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. You are responsible for managing a Windows Server 2008 server named ABC-SR10. ABC-SR10 is configured to host the Terminal Services role. A new YYY.com policy states that the employees should not use more than 20% of the CPU resources in a day, with the exception of the administrators. Which actions should you take? (Choose TWO. Each answer forms part of the solution.)


Options are :

  • You should create Network Load Balancing cluster.
  • You should use Windows System Resource Manager (WSRM).
  • You should setup user policies.
  • You should create a GPO.
  • You should link a GPO that specifies a restrictive policy.

Answer :You should use Windows System Resource Manager (WSRM). You should setup user policies.

You work as the Enterprise administrator at YYY.com. The YYY.com network consists of a single Active Directory domain named YYY.com. All servers on the YYY.com network run Windows Server 2008. Your job entails managing a server named ABC-SR10 that has a Virtual Private Network (VPN) installed. ABC-SR10 is set up as a standalone root certificate authority. YYY.com has entered into a partnership with two other companies. Which actions should you take to permit computers in the partner companies to access the resources on YYY.com?


Options are :

  • You should use allow incoming traffic on TCP Port 443 on the Windows Firewall.
  • You should install a Root CA certificate on the partner companies' computers.
  • You should use the Windows Deployment Services (WDS).
  • You should use an external certificate authority to issue certificates via an e-mail.
  • You should install Terminal Services.

Answer :You should install a Root CA certificate on the partner companies' computers.

Microsoft 70-243 Administering Deploying System Manager Exam Set 1

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 and the client computers run Windows Vista. The domain controllers are scheduled to run a full backup daily. You want to compare the AD objects in the latest backup with the current AD database using the least amount of effort. You decide to restore the backup to an alternate location. Which step should you next perform?


Options are :

  • You should use the Windows Backup Server to backup the data to an external USB drive.
  • You should use the File Server Resource Manager to execute daily backups.
  • You should set up a System Performance Data Collector Set.
  • You should use the Active Directory Database Mounting Tool (Dsamain.exe) to mount the database.

Answer :You should use the Active Directory Database Mounting Tool (Dsamain.exe) to mount the database.

You work as an administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. You have been instructed to make sure that YYY.com's are forced to make use of complex passwords for their user accounts. You have to make sure that your method is executed using as little servers as possible. Which of the following actions should you take?


Options are :

  • You should consider making use of Encrypting File System (EFS).
  • You should consider making use of File Server Resource Manager (FSRM).
  • You should consider having a new Password Settings Object (PSO) configured for YYY.com's administrators.
  • You should consider making use of Microsoft System Center Configuration Manager (SCCM).

Answer :You should consider having a new Password Settings Object (PSO) configured for YYY.com's administrators.

You work as the Enterprise administrator at YYY.com. The YYY.com network consists of a single Active Directory domain named YYY.com. The YYY.com network servers run Windows Server 2008 and the client computers run Microsoft Windows Vista. YYY.com has several servers that are configured to run Terminal Services. You want to have a TS server farm implemented that will give users with the least active sessions priority an automatic connection to the TS server as well as ensuring that users whose sessions are disrupted return to their prior sessions to ensure productivity. How can this be achieved?


Options are :

  • By using event subscriptions.
  • By using Terminal Services Session Broker.
  • By using Event Trace Sessions.
  • By using a custom network profile.

Answer :By using Terminal Services Session Broker.

70-247 Configuring and Deploying a Private Cloud Exam Set 3

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 and the client computers Windows Vista. YYY.com consists of a Sales, Marketing and Finance division. Due to the sensitivity of information in the Finance division you have to establish a higher level of account and password security for users located in that division. How can this be accomplished while considering budgetary constraints?


Options are :

  • You should set up a GPO with the necessary permissions for all users.
  • You should set up a new Password Settings Object (PSO).
  • You should set up an enterprise certification authority (CA).
  • You should set up folder redirection.

Answer :You should set up a new Password Settings Object (PSO).

You work as the network administrator at YYY.com. The YYY.com network consists of a single Active Directory domain named YYY.com. There are currently 30 Microsoft Windows Server 2003 servers that have the DNS service role installed, on the YYY.com network. You are monitoring one of these DNS servers named ABC-SR10 because it is configured with the Adminpak.msi. You use the Remote Desktop Connection (RDC) to make a connection to ABC-SR10 in order to monitor the remaining servers. The YYY.com servers are all destined to be upgraded to Windows Server 2008 servers. The new servers must host the DNS server role on the Server Core installation of Windows Server 2008 How can you proceed to make sure that the above goals are achieved while also allowing for the remote management with Microsoft Management Console (MMC).


Options are :

  • You should provide remote access to that server.
  • You should use the Windows Deployment Services (WDS) server role.
  • You should install Remote Server Administration Tools (RSAT) to a Windows Server 2008 server.
  • You should enable Terminal Services on the entire network.
  • You should use Credential Roaming.
  • You should offer remote access to the Windows Server 2008 Server Core servers.

Answer :You should provide remote access to that server. You should install Remote Server Administration Tools (RSAT) to a Windows Server 2008 server.

You work as the network administrator at YYY.com. The YYY.com network consists of a single Active Directory domain named YYY.com. YYY.com network servers run Microsoft Windows Server 2008 and the client computers run Microsoft Windows Vista or Microsoft Windows XP Professional. You are preparing a server deployment that will host Microsoft SQL Server 2005 for the YYY.com employees. In your deployment strategy you need to make sure that productivity with regard to SQL services will not be interrupted when a server happens to go offline. Which action should you take? (Choose THREE. Each answer forms part of the solution.)


Options are :

  • You should install a full installation of Windows Server 2008 Enterprise Edition.
  • You should use two servers.
  • You should configure failover clusters on the two servers.
  • You should use the Windows System Resource Manager (WSRM)
  • You should use of Network Load Balancing on one servers.

Answer :You should install a full installation of Windows Server 2008 Enterprise Edition. You should use two servers. You should configure failover clusters on the two servers.

70-680 Windows 7 Configuring Certification Practice Exam Set 2

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network are configured to run Windows Server 2008. A number of systems are used to log on to the YYY.com domain. You want to devise a data provisioning plan that ensures that accessibility possible regardless of which client computer YYY.com users use and data should not be stored on local computers. To enhance productivity secede to configure the way in which users log on to the domain with the least amount of administrative effort. Which options should you add to your plan?


Options are :

  • You should enable Caching.
  • You should add Credential Roaming.
  • You should enable Encryption.
  • You should add Folder redirection.

Answer :You should add Folder redirection.

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers are configured to run Windows Server 2008 and all client computers either run Windows XP Professional or Windows Vista. You receive instruction to only allow client computers running the latest service pack to access the network whilst ensuring that other client computers are redirected to the Microsoft Web site. What Windows 2008 feature will assist you in your solution?


Options are :

  • You should use the Event Trace Sessions Data Collector Set.
  • You should use multiple downstream servers
  • You should use Network Access Protection (NAP).
  • You should use the Windows System Resource Manager (WSRM).

Answer :You should use Network Access Protection (NAP).

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network, including domain controllers, have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com's Marketing, Sales, and Finance departments are located in different buildings. You have received instruction to add a Read-only Domain Controller (RODC) in each of the departments. You must make sure that log on details does not form part of the RODC's installation files, and that bandwidth usage during the first AD-DS synchronization is kept as low as possible. You decide to construct an RODC in each department. You then run the ntdsutil ifm command on an existing domain controller. Why would you need to run this command?


Options are :

  • It allows you to run an unattended installation for the new RODCs.
  • It allows you to create installation media for the new RODCs.
  • It allows you to perform a staged RODC installation for the new RODCs.
  • It allows you to transfers and seize operations master roles for the new RODCs.

Answer :It allows you to create installation media for the new RODCs.

70-647 Pro Windows Server 2008 Enterprise Administrator Exam Set 5

You work as a Network Administrator at YYY.com. The network consists of a single Active Directory Domain Services (AD DS) domain named YYY.com. The company has a main office and a branch office. The two offices are connected by a slow WAN link. All servers run Windows Server 2008 R2 and all client computers run Windows 7 Professional. A file server named ABC-File1 hosts shared folders that contain large amounts of data. The number of users in the branch office has increased over the last year. Due to the large number of branch office users accessing files on ABC-File1, you have decided to install a file server in the branch office to host a local copy of the shared folders from ABC-File1. You install a Windows Server 2008 R2 named ABC-File2 in the branch office. You want to configure ABC-File1 to replicate the shared folders to ABC-File2. Due to the limited bandwidth of the WAN connection, the files must not be replicated during office hours. How should you configure the file servers?


Options are :

  • You should install the File Server Resource Manager (FSRM) feature on both file servers.
  • You should configure BranchCache on ABC-File2.
  • You should configure the File Transfer Protocol (FTP) on ABC-File1.
  • You should enable scheduled replication using DFS-R (Distributed File System Replication).

Answer :You should enable scheduled replication using DFS-R (Distributed File System Replication).

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. The servers are configured to run Windows Server 2008. You have created a web site which requires a very high availability and a high scalability for the success of the company. You therefore publish the Web site on two Web servers named ABC-SR20 and ABC-SR21. You have received instructions from the CIO to implement an availability solution for your Web servers. You thus need to ensure when ABC-SR20 and ABC-SR21 are added, the connections to the websites remain unaffected. Web site needs to remains online in the event of a server failure. How can you accomplish the goals?


Options are :

  • You should implement folder redirection.
  • You should implement a Web farm on ABC-SR20 and ABC-SR21.
  • You should implement Terminal Services Gateway (TS Gateway).
  • You should implement Network Load Balancing cluster

Answer :You should implement Network Load Balancing cluster

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. The servers on the YYY.com network are configured to run Windows Server 2008. YYY.com makes use of an enterprise certification authority (CA).You want to automatically install certificates on the client computers as well as deploying the certificates to the employees with a new certificate template with the least amount of administrative effort. To ensure productivity you need to make sure that employees are able to access the certificates from any computer on the network. To accomplish this task you implement the auto enrollment of certificates. What else should be configured to ensure that employees can access the certificates?


Options are :

  • You should set up the Remote Server Administration Tools (RSAT) on all computers on the network.
  • You should set up certificate based authentication on the computers.
  • You should set up folder redirection.
  • You should set up Credential Roaming.

Answer :You should set up Credential Roaming.

70-513 WCF Development with Microsoft .NET Framework 4 Exam Set 2

You work as the network administrator at YYY.com. The YYY.com network consists of a domain named YYY.com. The network servers run either Windows Server 2003 or Windows Server 2008 and the client computers run Microsoft Windows Vista. Your job function includes managing a Windows Server 2003 server named ABC-SR02. ABC-SR02 is configured to host a database application. You want to migrate the application to Windows Server 2008. You need to set up ABC-SR02 so that the application can be accessed even in the event of server failure. Your solution should also allow for the installation of .NET applications and the reduction of the cost of the software. Which options should you select that will support the Web application? (Choose TWO. Each answer forms part of the solution.)


Options are :

  • You should set up a RAID 5 array
  • You should have a failover cluster installed that contains one node.
  • You should have Terminal Services installed on the servers in the network.
  • You should establish a Network Load Balancing cluster.
  • You should have a full installation of Windows Server 2008 Web Edition installed on two servers in the network.

Answer :You should establish a Network Load Balancing cluster. You should have a full installation of Windows Server 2008 Web Edition installed on two servers in the network.

You work as a Network Administrator for ABC Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008. You have configured a DNS server on the network. The network is configured as a single subnet. The internal Web site of the company is hosted on three Web servers for load balancing. Users complain of the slow response of the servers. The images of the Advanced tab of the DNS configuration and the A (Host) record entry are shown below: You monitor the Web servers and find that two servers are idle and only one server is responding to client queries. What is the most likely cause?


Options are :

  • CNAME records of the other two Web servers are not entered
  • A (Host) records of other two Web servers are not entered.
  • DNS is not configured for round robin load balancing.
  • Netmask ordering is preventing other Web servers from responding to client queries.

Answer :A (Host) records of other two Web servers are not entered.

Microsoft 70-642 Windows Server Network Infrastructure Exam Set 1

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 and all workstations have Windows 7 installed. YYY.com contains a server named ABC-SR10 that hosts seven in-house applications. Furthermore, the in-house applications has Terminal Services RemoteApps configured. During routine monitoring, you notice that ABC-SR10 reacts sluggishly when more than one application is accessed. You want to maintain productivity by making sure that active user sessions are given the same access. Which of the following actions should you take?


Options are :

  • You should consider making use of Microsoft System Center Operations Manager (SCOM).
  • You should consider making use of a Remote Desktop resource authorization policy (RD RAP) on ABC-SR10.
  • You should consider making use of Windows System Resource Manager (WSRM).
  • You should consider making use of Remote Desktop Connection Broker.

Answer :You should consider making use of Windows System Resource Manager (WSRM).

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. You are responsible for managing a Windows Server 2008 R2 server named ABC-SR10. ABC-SR10 is configured to host the Terminal Services role. A new YYY.com policy states that the employees should not use more than 20% of the CPU resources in a day, with the exception of the administrators. Which actions should you take? (Choose TWO. Each answer forms part of the solution.)


Options are :

  • You should setup user policies.
  • You should use Windows System Resource Manager (WSRM).
  • You should create a GPO.
  • You should create Network Load Balancing cluster.
  • You should link a GPO that specifies a restrictive policy.

Answer :You should setup user policies. You should use Windows System Resource Manager (WSRM).

Your organization consists of a single Windows Server 2008 Active Directory forest that contains seven domains arranged in a single tree. The root domain is named YYY.com. IT departmental mandate specifies that all domain controllers must have the DNS server role installed. You need to plan the DNS infrastructure for a new child domain named tech.east.YYY.com. The three chief requirements are that (a) DNS services are fault-tolerant in the tech.east.YYY.com domain, (b) the tech.east.YYY.com domain is automatically made aware of any new DNS servers that are brought online in the root domain, and (c) full forest-wide name resolution is supported. Which of the following actions should you perform? (Select two choices. Each correct answer represents a part of a single solution.)


Options are :

  • Create a standard secondary zone for YYY.com.
  • Create an Active Directory-integrated stub zone for YYY.com.
  • Create a standard primary zone on tech.east.YYY.com. Next, configure conditional forwarding on this server for the remaining DNS zones in the forest
  • Create an Active Directory-integrated zone on tech.east.YYY.com.

Answer :Create an Active Directory-integrated stub zone for YYY.com. Create an Active Directory-integrated zone on tech.east.YYY.com.

70-646 Pro Windows Server 2008 - Server Administrator Exam Set 4

You work as the network administrator at YYY.com. The YYY.com network consists of an Active Directory domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 R2. Half the workstations run Windows Vista, and the rest run Windows 7. YYY.com has headquarters in London and branch offices in Paris, Berlin and Milan. An Active Directory domain controller is located in the London office, and also the branch offices. You have received instructions f to make sure that the workstations register DNS names within their respective offices, have the ability to resolve names for hosts in all YYY.com's offices. Which of the following actions should you take?


Options are :

  • You should consider making use of an Active Directory-integrated zone at the London office.
  • You should consider creating a standard primary zone for the London office and a secondary zone for the branch offices.
  • You should consider making use of a stub zone.
  • You should consider making use of a conditional forwarder for all the offices.

Answer :You should consider making use of an Active Directory-integrated zone at the London office.

Users store their data on a file server running Windows Server 2008. Recently, a junior administrator has spent a lot of time retrieving data files for several users from backups. You'd like to reduce the administrator's need to do this. What can you do?


Options are :

  • nstall the WinRE on the users' desktops.
  • Enable Shadow Copies.
  • Install Windows Complete PC Restore on the users' desktops.
  • Install Windows Server Backup on the users' desktops.

Answer :Enable Shadow Copies.

Your company has a single Active Directory domain. All of the domain controllers run Windows Server 2008, and all of the client computers have been recently upgraded to Windows Vista. All user accounts have roaming profiles. Your company wants to allow users to use their certificates on multiple computers. You want to ensure that the current version of any certificate is being used. What must you do?


Options are :

  • Replace the roaming profiles with mandatory roaming profiles, and add a recovery agent for each user on each computer.
  • Replace the roaming profiles with Folder Redirection, and add a recovery agent for each user on each computer.
  • Replace the roaming profiles with mandatory roaming profiles, and enable credential roaming.
  • Replace the roaming profiles with Folder Redirection, and enable credential roaming.

Answer :Replace the roaming profiles with Folder Redirection, and enable credential roaming.

Microsoft 70-647 Windows Enterprise Administrator Exam Set 8

You manage a single Windows Server 2008 domain for a financial institution. You have deployed Network Access Protection (NAP) with 802.1X enforcement. The network contains four Network Policy Server (NPS) servers that are configured as RADIUS servers and 18 managed Cisco switches that are configured as RADIUS clients. You need to develop an auditing/accounting/logging solution that (a) maintains a centralized data store, (b) involves absolutely no additional costs, and (c) minimizes administrative effort. Which of the following actions should you perform in order to accomplish your goal?


Options are :

  • Deploy audit logging for the three NPS servers by using Group Policy.
  • Install SQL Server 2005 Express Edition on each NPS Server. Configure SQL Server logging on each server to write to a single database on a specified NPS server computer
  • Deploy Windows Remote Management and the Event Collector service on the three NPS servers. Configure Event Forwarding on two NPS servers and Event Subscriptions on the third NPS server.
  • Designate one NPS server as a RADIUS server and the other NPS servers as RADIUS clients. Configure RADIUS accounting on the RADIUS server and specify the IAS local log file option.

Answer :Designate one NPS server as a RADIUS server and the other NPS servers as RADIUS clients. Configure RADIUS accounting on the RADIUS server and specify the IAS local log file option.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. Some of YYY.com's network servers have Windows Server 2003 installed, while the rest have Windows Server 2008 installed. Microsoft Windows Vista is installed on all YYY.com's workstations. YYY.com's public key infrastructure (PKI) is made up of an offline root certification authority (CA) and two enterprise subordinate CAs that are all running Windows Server 2003. ubsequent to the certificates being published to YYY.com's user accounts, you also publish YYY.com's computer accounts in Active Directory. When YYY.com establishes a new satellite office, you are informed that workstations for that office will have Windows Vista installed and that servers will have Windows Server 2008 installed. You have received instructions from the CIO to configure a PKI solution for the new office that allows Active Directory to store the private keys. Your solution should also allow for certificates to have Suite B hashing and encryption algorithms support, and as little human interaction as possible for certificate management. Which of the following actions should you take?


Options are :

  • You should consider making use of the Key Management Service (KMS).
  • You should consider making use of the Windows Deployment Services (WDS) server role.
  • You should consider making use of the Windows System Resource Manager (WSRM).
  • You should consider deploying a new Windows Server 2008 enterprise subordinate CA.

Answer :You should consider deploying a new Windows Server 2008 enterprise subordinate CA.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory forest named YYY.com. The YYY.com network servers run Windows Server 2008 and the workstations run Windows Vista. YYY.com has of a Marketing department that contains 500 servers. You have received instructions from the CIO to monitor the servers. You have decided to deploy Microsoft System Center Operations Manager (SCOM). Which of the following is TRUE with regards to Microsoft System Center Operations Manager (SCOM)? (Choose all that apply.)


Options are :

  • You can select the option to modify the processor monitoring threshold automatically to make allowance for temporary changes.
  • Allows you to making use of event subscriptions for alerts.
  • Modifying the processor monitoring threshold to make allowance for temporary changes can only be done manually.
  • It can be used to deploy operating systems.

Answer :You can select the option to modify the processor monitoring threshold automatically to make allowance for temporary changes.

70-642 Windows Server 2008 Network Infrastructure Exam Set 6

You are the administrator for your company's domain. All your servers run Windows Server 2008, and all your clients run Windows Vista. You plan to create a failover cluster with iSCSI disks. You are using third-party software to configure the iSCSI target. What should use to test whether your system, storage, and network configuration is suitable for a cluster?


Options are :

  • Run verclsid.exe.
  • Install the Cluster Validation Tool.
  • Run wlbs.exe
  • Run nlb.exe.

Answer :Install the Cluster Validation Tool.

Which Windows Deployment Services (WDS) image type can be used to deploy an image to a non-PXE client?


Options are :

  • Capture image
  • Discover image
  • Install image
  • Boot image

Answer :Discover image

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 installed and all workstations have Windows Vista installed. YYY.com has two servers, named ABC-SR13 and ABC-SR14, which are configured as file servers. You have been informed that the data stored on these servers must be accessible in the event of one of them failing. You also have to make sure that volumes in excess of 2 TB are supported, and that data redundancy is preserved in the event of disk failure. Furthermore, you should make sure that disk throughput is maximized. You start by configuring ABC-SR13 and ABC-SR14 in a two-node failover cluster. You want to make sure that the task is suitably completed. Which of the following actions should you take?


Options are :

  • You should consider attaching an external storage subsystem and configure it as a RAID 10 array GPT disk.
  • You should consider attaching an external storage subsystem and configure it as a RAID 5 array GPT disk.
  • You should consider attaching an external storage subsystem and configure it as a RAID 1 array GPT disk.
  • You should consider attaching an external storage subsystem and configure it as a RAID 3 array GPT disk.

Answer :You should consider attaching an external storage subsystem and configure it as a RAID 10 array GPT disk.

70-642 Windows Server 2008 Network Infrastructure Exam Set 6

You are deploying a Windows Server 2008 server to a remote office. The server will hold files that you want to protect, but the remote office doesn't have adequate physical security. How should you protect the files?


Options are :

  • Use BitLocker.
  • Use a RODC.
  • Encrypt the data with SSL.
  • Use NTFS permissions.

Answer :Use BitLocker.

You are tasked with recommending a strategy that allows users to retrieve previous versions of files without intervention by an administrator. If a disk fails, you should be able to restore individual files. All servers are running Windows Server 2008. What should you do? (Choose all that apply.)


Options are :

  • Enable Shadow Copies, and store them on a different volume.
  • Perform a daily backup of data.
  • Enable clustering on the server.
  • Enable Shadow Copies, and store them on the same volume.

Answer :Enable Shadow Copies, and store them on a different volume. Perform a daily backup of data.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions