2013 Latest MCTS 70-642 Exam Questions 51-55


Your network contains an Active Directory domain named fabrikam.com. The domain contains five domain controllers named DC1, DC2, DC3, DC4, and DC5. All domain controllers run Windows Server 2008 R2 and have the DNS server role installed.
On DC5, you create a new Active Directory-integrated DNS zone named adatum.com.
You need to ensure that the adatum.com DNS zone is only replicated to DC5 and DC2. The solution must ensure that all zone replication traffic is encrypted.
What should you do first?
A. Create an application directory partition. B. Create a primary zone.
C. Modify the zone transfer settings.
D. Change the zone replication scope.
Correct Answer: A
Correct answer(s): A

Your network contains a server named Server1 that runs Windows Server 2008 R2. On Server1, you run
route add mask metric 10.
You restart Server1, and then run the route command as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that after you restart Server1, Server1 routes all of the traffic for by using the router that has an IP address of
Which command should you run on Server1? A. netstat -p ip
B. netstat -f
C. route add mask metric 10 -p
D. route add mask metric 1 -f
Correct Answer: C
Correct answer(s): C

Your company has 10 servers that run Windows Server 2008 R2. The servers have Remote Desktop
Protocol (RDP) enabled for server administration. RDP is configured to use default security settings.
All administrators’ computers run Windows 7.
You need to ensure the RDP connections are as secure as possible.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Set the security layer for each server to the RDP Security Layer.
B. Configure the firewall on each server to block port 3389.
C. Acquire user certificates from the internal certification authority.
D. Configure each server to allow connections only to Remote Desktop client computers that use Network
Level Authentication.
Correct Answer: CD
Correct answer(s): C, D

Your network contains a server that runs Windows Server 2008 R2 named Server1. You install a new application on Server1. After the installation, you discover that Server1 frequently becomes unavailable.
You need to identify whether the issues on Server1 coincide with the installation of the application. What should you do?
A. From Reliability Monitor, review the reliability details.
B. From Administrative Tools, run Windows Memory Diagnostic.
C. From the System Configuration utility, select Diagnostic startup.
D. From the command prompt, run the Program Compatibility Wizard.
Correct Answer: A
Correct answer(s): A
Reliability Monitor maintains up to a year of history for system stability and reliability events. The System
Stability Chart displays a rolling graph organized by date.
The top half of the System Stability Chart displays a graph of the Stability Index. In the lower half of the chart, five rows track Reliability Events that either contribute to the stability measurement for the system or provide related information about software installation and removal. When one or more Reliability Events of each type are detected, an icon appears in the column for that date.
For Software Installs and Uninstalls, an Information icon indicates a successful event of that type occurred, or a Warning icon indicates a failure of that type occurred.
For all other Reliability Event types, an Error icon indicates a failure of that type occurred. http://technet.microsoft.com/en-us/library/cc749583(v=ws.10).aspx

Your network contains a file server named Server1 that runs Windows Server 2008 R2.
Users report that when they try to open some of the folders in \server1folder1, they receive an Access is
Denied error message.
You need to ensure that when the users connect to \server1folder1, they only see the files and the folders to which they are assigned permissions.
Which tool should you use? A. Local Security Policy
B. Share and Storage Management
C. Windows Explorer
D. Windows Firewall with Advanced Security
Correct Answer: B
Correct answer(s): B
Access-based enumeration displays only the files and folders that a user has permissions to access. Access-based enumeration is now included in the Windows Server 2008 operating system, and you can enable it by using Share and Storage Management.

Download Ensurepass Latest 2013 MCTS 70-642 Real Exam Questions , help you to pass exam 100%.