[Free] 2018(Jan) EnsurePass Examcollection Microsoft 70-642 Dumps with VCE and PDF 181-190
TS: Windows Server 2008 Network Infrastructure, Configuring
Question No: 181 – (Topic 2)
Your network contains a server that runs Windows Server 2008 R2. You need to create a script to identify known configuration issues.
What should you include in the script?
the Get-BPAModel cmdlet
the Invoke-BPAModel cmdlet
the Mrinfo tool
the Systeminfo tool
Answer: B Explanation:
The Invoke-BPAModel cmdlet allows you to start a Best Practices Analyzer (BPA) scan for a specific model that is installed on your computer.
Check the technet here:
Question No: 182 – (Topic 2)
Your network contains a Distributed File System (DFS) target folder named Folder1 that contains 100 GB of data.
You plan to create a new DFS replica of Folder1 on a server named Server2.
You need to prestage the data in Folder1 on Server2. The solution must ensure that the amount of initial DFS replication traffic is minimized.
Which tool should you use to prestage the Folder1 data?
Answer: D Explanation:
Distributed File System (DFS) replication is a new technology that has been included in Microsoft Windows Server starting in Microsoft Windows Server 2003 R2. Some Microsoft TechNet articles discuss the concept of prestaging to reduce network traffic during the initial synchronization of DFS data. Whether data that is located on each replication partner is considered the same depends on the hashing algorithm that is applied to the file, to the file permissions (discretionary access control lists), and to the file audit properties (system access control lists).
The hashes of prestaged data are affected by the following:
The copy tool, such as Robocopy.exe or Xcopy.exe, that is used Because the possible combinations of these factors are so wide and varied, predicting the success of prestaging operations is very difficult. However, the Backup program in Windows Server is a reliable mechanism to prestage data.
How to use the Backup program to prestage DFSR data Back up the data by using the Backup program. You can back up to tape or to a file.
Transfer the backup to the destination server. Restore the backup to the destination server.
The hashes that are computed by DFSR for each server should be identical for files that have not changed.
Question No: 183 – (Topic 2)
Your network contains a server named Server1 that runs Windows Server 2008 R2. You discover that the server unexpectedly shut down several times during the past week.
You need to identify what caused the shutdowns and which software was recently installed. What should you click from Action Center?
Maintenance, and then View reliability history
Troubleshooting, and then Programs
Troubleshooting, and then System and Security
Troubleshooting, and then View history
Question No: 184 – (Topic 2)
Your network contains a server named Server1 that runs Windows Server 2008 R2. You have a user named User1.
You need to ensure that User1 can schedule Data Collector Sets (DCSs) on Server1. The solution must minimize the number of rights assigned to User1.
What should you do?
Add User1 to the Performance Log Users group.
Add User1 to the Performance Monitor Users group.
Assign the Profile single process user right to User1.
Assign the Bypass traverse checking user right to User1.
Answer: A Explanation:
Both A and B are valid users group but:
Performance Log users group : Members of this group may schedule logging of performance counters, enable trace providers, and collect event traces both locally and via remote access to this computer
Performance Monitor users group : Members of this group can access performance counter data locally and remotely.
Hence answer is quot;Aquot;.
Question No: 185 – (Topic 2)
Your network contains two Windows Server Update Services (WSUS) servers named Server1 and Server2.
Server1 is a member of a domain named contoso.com. Server2 is a standalone server. Server2 is configured as an autonomous downstream server.
You need to ensure that all updates approved on Server1 are automatically approved on Server2.
Which options should you modify?
Products and Classifications
Update Source and Proxy Server
Question No: 186 – (Topic 2)
Your network contains an Active Directory domain named contoso.com. The functional level of the domain and the functional level of the forest are Windows Server 2003. All domain controllers run Windows Server 2008.
You have a member server that runs Windows Server 2008 R2 named Server1. You install the Distributed Scan Server role service on Server1. From the Scan Management console, you attempt to add a scan process and you receive the following error.
You need to ensure that you can add a scan process. What should you do?
Install the Fax Server role.
Install the Print Server role service.
Update the Active Directory schema.
Set the functional level of the forest to Windows Server 2008.
Answer: C Explanation:
In order to use DSM its needed to upgrade the AD Schema thats found here – http://www.microsoft.com/en-us/download/details.aspx?id=9494 http://blogs.technet.com/b/askperf/archive/2009/10/11/windows-7-windows-server-2008-r2- distributedscanmanagement.aspx http://blogs.technet.com/b/print/archive/2009/10/22/distributed-scan-management.aspx
Question No: 187 – (Topic 2)
Your network contains an Active Directory domain named contoso.com. The domain contains two sites named Site1 and Site2. The servers for the sites are configured as shown in the following table.
Server1 hosts a standard primary zone for contoso.com. Server2 hosts a secondary zone for contoso.com.
You need to ensure that all DNS replication traffic between Server1 and Server2 is encrypted.
What should you do?
On Server1, configure DNSSEC for the contoso.com zone.
On Server1, convert the contoso.com zone to an Active Directory-integrated zone.
On each server, create connection security rules.
On each server, enable Encrypting File System (EFS) encryption for the contoso.com.dns file.
Question No: 188 – (Topic 2)
Your network contains a Network Policy Server (NPS) named Server1. Server1 is configured to use SQL logging.
You add a second NPS server named Server2.
You need to ensure that Server2 has the same RADIUS authentication and logging settings as Server1. You export the NPS settings from Server1, and then import the settings to Server2.
What should you do next on Server2?
Create a new ODBC data source.
Run netsh.exe nps reset config.
Manually configure the SQL logging settings.
Restart the Network Policy Server (NPS) role service.
Question No: 189 – (Topic 2)
Your network contains an Active Directory domain. The network has DirectAccess deployed.
You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.
You need to ensure that users can view their DirectAccess status by using the DCA.
Which two group policy settings should you configure? (Each correct answer presents part of the solution. Choose two.)
Dynamic Tunnel Endpoints (DTEs)
Corporate Portal Site
Answer: A,C Explanation:
Question No: 190 – (Topic 2)
Your network contains a file server that runs Windows Server 2008 R2. The server has File Server Resource Manager (FSRM) installed.
A file screen is created for a folder named Data. Data is located on the C drive. The file screen is configured to block files contained in the Audio and Video file group.
You need to allow users in the sales department to upload video files to C:\Data\Sales.
What should you do?
Create a file screen exception.
Modify the Audio and Video file group.
Implement an active file screen on C:\Data\Sales.
Implement a passive file screen on C:\Data\Sales.
Answer: A Explanation:
With File screen exceptions, expand the flexibility of the file screening capabilities in File Server Resource Manager by creating an exception to any file screening rules derived from a parent folder (C:\Data).
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|