Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "640-910" Exam

i need dump urgently, please

 i require a dump on 640-910, i intend writing the exam asap. send dumps to nasldgjayahoo.com 


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-511 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-511" Exam

Windows Applications Development with Microsoft .NET Framework 4

 Question 1.
You are employed as an application developer at ABC.com. You make use of Microsoft .NET Framework 4 to develop Windows Presentation Foundation (WPF) applications. You have recenty created an application, and cofigured it to have a composite user control. You also configured the user control to have a TextBox control, named txtEntry. You then configure the user control to be stored in a window, and include the following code in the constructor of the user
control: 
AddHandler(TextBox.TextChangedEvent, new RoutedEventHandler(Audit_TextChanged), true);

Which of the following statements are TRUE? (Choose all that apply.)

A. A text-changed event handler, named Audit_TextChanged, was created for the txtEntry 
    control.
B. Audit_TextChanged will stop running because the event is marked as handled by certain event 
    handlers
C. Even though the event is marked as handled by certain event handlers, Audit_TextChanged 
     will still run.
D. Audit_TextChanged will continue to run until the event is marked as handled.

Answer: A, C

Explanation:

Question 2.
You are employed as an application developer at ABC.com. You make use of Microsoft .NET Framework 4 to develop Windows Presentation Foundation (WPF) applications. After developing an application, named ABCApp22, you configure a Button control and a MenuItem control that will be hosted by a window. The Button control and the MenuItem control have both been named Add. You have configured the exact same RoutedCommand, named AddCommand, as the Command properties of these two controls. You then write the code shown below:
Private void CanAdd (object sender, CanExecuteRoutedEventArgs e) { ... }
You are then informed that the two controls should be disabled when the CanExecute property is set to to false.

Which combination of the following actions should you take? (Choose all that apply.)

A. You should consider having an event handler configured for the CanExecuteChanged event of 
    the AddCommand command.
B. You should consider having a CommandBinding object added to the CommandBindings  
    property of the window.
C. You should consider having a CommandBinding object added to the CommandBinding section  
    of the MenuItem control.
D. You should consider having the CanAdd method called from within the event handler.
E. You should consider having the AddCommand inherited from the RoutedUICommand class.
F. You should consider having the Command property of CommandBinding set to the 
    AddCommand command.
G. You should consider having the CanAdd method called from within the constructor of the  
    AddCommand command.
H. You should consider having the CanExecute property of the CommandBinding object set to 
    The CanAdd method.

Answer: B, F, H

Explanation:

Question 3.
You are employed as an application developer at ABC.com. You make use of Microsoft .NET Framework 4 to develop Windows Presentation Foundation (WPF) applications.
You have created a new application, and written the code shown below:
MediaPlayer player = new MediaPlayer();
player.Open(new URI(AudioFilePath), UriKind.Relative)); player.play();
You then inserted this code into the button onclick event.

Which of the following statements are TRUE with regards to the configuration?

A. The media player will open as soon as a user clicks the button, but no file will be played.
B. The file that is stored in the AudioFilePath variable will be played as soon as the button is 
    clicked by the user.
C. All files stored in the media player will be played in sequence.
D. All files stored in the media player will be played randomly.

Explanation:

Question 4.
You are employed as an application developer at ABC.com. You make use of Microsoft .NET Framework 4 to develop Windows Forms applications. After developing a new application, named ABCApp13, you include a custom class named ABCClient. You have configured a new object data source, and also added a BindingSource component named ABCclientBindingSource to a Windows Form. The ABCclientBindingSource component is configured to be data-bound to the ABCClient data source. You then configure the Windows form to have two TextBox controls for presenting and modifying ABCClient. You have bound the data of these controls to its own ABCclientBindingSource property. The Windows form is also configured to contain an ErrorProvider component, named errorProvider. The data entries for the TextBox controls will be validated by the ErrorProvider component. You want to configure the validation process to occur automatically.

Which of the following actions should you take?

A. You should consider throwing an exception when the value is invalid to apply the validation  
    rules inside the TextChanged event handler of each TextBox control by throwing an exception  
    when the value is invalid. You should also consider inserting the code shown below in the 
    InitializeComponent method of the Windows Form. 
    this.errorProvider.DataSource = this.ABCclientBindingSource;
B. You should consider throwing an exception when the value is invalid to apply the validation  
    rules inside the TextChanged event handler of each TextBox control by throwing an exception  
    when the value is invalid. You should also consider inserting the code shown below in the 
    InitializeComponent method of the Windows Form.
    this.errorProvider.DataSource = this.ABCclientBindingSource.DataSource;
    this.errorProvider.DataMember = this.ABCclientBindingSource.DataMember;
C. You should consider throwing an exception when the value is invalid to apply the validation  
    rules inside the setter of each property of the ABCClient class. You should also consider  
    inserting the code shown below in the InitializeComponent method of the Windows Form.
    this.errorProvider.DataSource = this.ABCclientBindingSource.DataSource;
    this.errorProvider.DataMember = this.ABCclientBindingSource.DataMember;
D. You should consider throwing an exception when the value is invalid to apply the validation 
      rules inside the setter of each property of the ABCClient class. You should also consider 
     inserting the code shown below in the InitializeComponent method of the Windows Form.
     this.errorProvider.DataSource = this.ABCclientBindingSource;

Answer: D

Explanation:

Question 5.
You are employed as an application developer at ABC.com. You make use of Microsoft .NET Framework 4 to develop Windows Forms applications. You have recently created a new application. You then wrote the code shown below:
Thread.CurrentThread.CurrentUICulture = Thread.CurrentThread.CurrentCulture;

Which of the following options are TRUE with regards to the code?

A. The user interface will make use of the culture settings that are configured in the Control Panel  
    at present.
B. The user interface will make use of new culture settings.
C. The user interface will have no culture settings.
D. The user interface will make use of the culture settings that were installed with the operating  
    system.

Answer: A

Explanation:

Question 6.
You are employed as an application developer at ABC.com. You make use of Microsoft .NET Framework 4 to develop Windows Presentation Foundation (WPF) applications. You are in the process of developing a new application, named ABCApp35, which has a server assembly, as well as a partially trusted client assembly configured. After configuring customized sandboxed application domain, you are required to make sure that you are able to run ABCApp35 in a partial-trust setting.

Which of the following actions should you take?

A. You should consider configuring the PartialTrustVisibilityLevel setting for the
    AllowPartiallyTrustedCallers attribute of the server assembly to be VisibleByVefault.
B. You should consider configuring the PartialTrustVisibilityLevel setting for the
    AllowPartiallyTrustedCallers attribute of the server assembly to be NotVisibleByDefault.
C. You should consider configuring the PartialTrustVisibilityLevel setting for the
    AllowPartiallyTrustedCallers attribute of the client assembly to be VisibleByDefault.
D. You should consider configuring the PartialTrustVisibilityLevel setting for the
    AllowPartiallyTrustedCallers attribute of the client assembly to be NotVisibleByDefault.

Answer: B

Explanation:

Question 7.
You are employed as an application developer at ABC.com. You make use of Microsoft .NET Framework 4 to develop Windows Forms applications. After creating a new client application, you configure a default form size in the UserScopedSetting of the the ApplicationSettingsBase class.
Then application makes use of the Form1 type form, which includes a FormSettings object named frmSettings1. You have been instructed to write code that allows for the user’s preferred form size to be used whenever the user opens the application.

Which of the following options should you write?

A. public void Form2_Load(object sender, EventArgs e) { frmSettings2.start();
    } public void Form2_FormClosing(object sender, FormClosingEventArgs e) {
    frmSettings2.FormSize = this.Size;
    frmSettings2.Save(); }
B. private void Form1_Load(object sender, EventArgs e) { frmSettings1.UABCrade();
    } private void Form1_FormClosing(object sender, FormClosingEventArgs e)
    { Form1.FormSize = this.Size;
    Form1.Delete(); }
C. private normal Form1_Load(object sender, EventArgs e) { this.Size = frmSettings2.FormSize;
    } public void Form2_FormClosing(object sender, FormClosingEventArgs e)
    { Form2.FormSize = this.Size;
    Form2.UABCrade(); }
D. private void Form1_Load(object sender, EventArgs e) { this.Size = frmSettings1.FormSize;
    } private void Form1_FormClosing(object sender, FormClosingEventArgs e)
    { frmSettings1.FormSize = this.Size;
    frmSettings1.Save(); }

Answer: D

Explanation:

Question 8.
You are employed as an application developer at ABC.com. You make use of Microsoft .NET Framework 4 to develop Windows Forms applications. You have been instructed to create a new application. The application must present a text message requesting users to update their settings. This should occur whenever a user starts the application.

Which of the following options suitably represents the required code?

A. sealed class FormSettings : ApplicationSettingsBase
    {
    [UserScopedSetting()] [DefaultSettingValue("Please update your settings.")]
    public String Description
    {
    get { return (String)this["Description"]; }
    set { this["Description"] = value;}
    }
    }
B. sealed class FormSettings : ApplicationSettingsBase
    {
    ApplicationScopedSetting()] [DefaultSettingValue("Please update your settings.")]
    public String Description
    {
    get { return (String)this["Description"]; }
    set { this["Description"] = value;}
    }
    }
C. sealed class FormSettings : ApplicationSettingsBase
    {
    [MachineSetting()] [SettingsDescription("Please update your settings.")]
    public String Description
    {
    get { return (String)this["Description"]; }
     set { this["Description"] = value;}
     }
     }
D. sealed class FormSettings : ApplicationSettingsBase
     {
     [UserScopedSetting()] [SettingsDescription("Description: Please update your settings.")]
     public String Description
     {
     get { return (String)this["Description"]; }
     set { this["Description"] = value;}
     }
     }
E. sealed class FormSettings : ApplicationSettingsBase
    {
    [ApplicationScopedSetting()] [SettingsDescription("Description: Please update your settings.")]
    public String Description
    {
    get { return (String)this["Description"]; }
    set { this["Description"] = value;}
    }
    }
F. sealed class FormSettings : ApplicationSettingsBase
    {
    [MachineSetting()] [SettingsDescription("Description: Please update your settings.")]
    public String Description
    {
    get { return (String)this["Description"]; }
    set { this["Description"] = value;}
    }
    }

Answer: A

Explanation:

Question 9.
You are employed as an application developer at ABC.com. You make use of Microsoft .NET Framework 4 to develop Windows Presentation Foundation (WPF) applications. You are in the process of developing a new application named ABCApp13. ABCApp13 must be able to present data to application users two consecutive pages at one time.

Which of the following actions should you take?

A. You should consider having an XMLDocumentReader control configured.
B. You should consider having a FlowDocumentReader control configured.
C. You should consider making use of the Microsoft Word Viewer.
D. You should consider making use of the XPS Reader.

Answer: B

Explanation:

Question 10.
You are employed as an application developer at ABC.com. You make use of Microsoft .NET Framework 4 to develop Windows Presentation Foundation (WPF) applications. You are in the process of developing a new application named ABCApp35. You have been informed that ABCApp35 should have a layout panel configured. The layout panel used should allow for child objects to be organized and displayed vertically. The layout panel should not, however, require the child objects to be resized.

Which of the following actions should you take?

A. You should consider making use of the Grid panel layout.
B. You should consider making use of the Canvas panel layout.
C. You should consider making use of the Lock layout.
D. You should consider making use of a Stack panel layout.

Answer: D

Explanation:


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-640 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-640" Exam

TS: Windows Server 2008 Active Directory, Configuring

 Question 1.
ITCertKeys.com has an Active Directory forest that contains a single domain named ad. ITCertKeys.com. All domain controllers are configures as DNS servers and have Windows Server 2008 installed. The network has two Active directory-integrated zones: ITCertKeyses.com and ITCertKeysws.com. The company has instructed you to make sure that a user is able to modify records in ITCertKeyses.com while preventing the user to modify the SOA record in ITCertKeysws.com zone. 

What should you do to achieve this task?

A. Modify the permissions of ITCertKeyses.com zone by accessing the DNS Manager Console
B. Configure the user permissions on ITCertKeyses.com to include all the users and configure the user permissions on ITCertKeysws.com to allow only the administrators group to modify the records
C. Modify the permission of ITCertKeysws.com zone by accessing the DNS Manager Console
D. Modify the Domain Controllers organizational unit by accessing the Active Directory Users and  Computers console.
E. None of the above.

Answer: A

Explanation:
To allow the user to modify records in ITCertKeyses.com and prevent him/her to modify the SOA record in ITCertKeysws.com zone, you should set the permissions of ITCertKeyses.com through DNS Manager Console. You set the permissions for the users to modify the records in ITCertKeyses.com. Since setting permission on one Active directory-integrated zone, you will be preventing the users to modify anything else on the other zones.

Question 2.
ITCertKeys.com has an Active Directory Domain Controller. All domain controllers nare configured as DNS servers and have Windows Server 2008 installed. Only one Active-Directory integrated DNS zone is configured on the domain. You have to make sure that outdated DNS records are removed from the DNS zone automatically. 

What should you do to achieve this task?

A. Modify the TTL of the SOA record by accessing the zone properties
B. Disable updates from the zone properties
C. Execute netsh/Reset DNS command from the Command prompt
D. Enable Scavenging by accessing the zone properties
E. None of the above

Answer: D

Explanation:
To remove the outdated DNS records from the DNS zone automatically, you should enable Scavenging through Zone properties. Scavenging will help you clean up old unused records in DNS. Since "clean up" really means "delete stuff" a good understanding of what you are doing and a healthy respect for "delete stuff" will keep you out of the hot grease. Because deletion is involved there are quite a few safety valves built into scavenging that take a long time to pop. When enabling scavenging, patience is required.

Reference:
http://www.gilham.org/Blog/Lists/Posts/Post.aspx?List=aab85845-88d2-4091-8088-a6bbce0a4304&ID=211

Question 3.
ITCertKeys.com has a single Active Directory domain. You have configured all domain controllers in the network as DNS servers and they run Windows Server 2008. A domain controller named ITK1 has a standard Primary zone for ITCertKeys.com and a domain controller named ITK2 has a standard secondary zone for ITCertKeys.com. You have to make sure that the replication of the ITCertKeys.com zone is encrypted so you might not loose any zone data. 

What should you do to achieve this task?

A. Create a stub zone and delete the secondary zone
B. Convert the primary zone into an active directory zone and delete the secondary zone
C. Change the interface where DNS server listens on both servers
D. On the standard primary zone, configure zone transfer settings. After that modify the master servers lists on the secondary zone
E. None of the above

Answer: B

Explanation:
To make sure that the replication of the ITCertKeys.com zone is encrypted to prevent data loss. You should convert the primary zone into an active directory zone and delete the secondary zone

Question 4.
ITCertKeys.com has a main office and a branch office. All servers in both offices run Windows Server 2008. The offices are connected through a MAN link. ITCertKeys.com has an Active Directory domain that hosts a single domain called maks.ITCertKeys.com. There is a domain controller in the maks. ITCertKeys.com domain called ITK1. It is located in the main office. You have configured ITK1 as a DNS server for maks. ITCertKeys.com DNS zone. It is configured as a standard primary zone. You are instructed to install a new domain controller called ITK2 in the branch office. After installing the domain controller, you install DNS on ITK2. You want to ensure that the DNS service on ITK2 can update records and resolve DNS queries in the event of a MAN link failure. 

What should you do to achieve this objective?

A. Configure the DNS on ITK1 to forward requests to ITK2
B. Add a secondary zone named raks. ITCertKeys.com on ITK2
C. Convert maks. ITCertKeys.com on ITK1 to an Active Directory-integrated zone
D. Configure a new stub zone on ITK1 and set the forwarding option to ITK2

Answer: C

Explanation:
To make sure that the DNS service on ITK2 can update records and resolve DNS queries in the event of a MAN link failure, you should convert maks. ITCertKeys.com on ITK1 to an Active Directory-integrated zone. Active Directory-integrated DNS, offers two pluses over traditional zones. For one, the fault tolerance built into Active Directory eliminates the need for primary and secondary nameservers. Effectively, all nameservers using Active Directory-integrated zones are primary nameservers. This has a huge advantage for the use of dynamic DNS as well: namely, the wide availability of nameservers that can accept registrations. Recall that domain controllers and workstations register their locations and availability to the DNS zone using dynamic DNS. In a traditional DNS setup, only one type of nameserver can accept these registrations-the primary server, because it has the only read/write copy of a zone. By creating an Active Directory-integrated zone, all Windows Server 2008 nameservers that store their zone data in Active Directory can accept a dynamic registration, and the change will be propagated using Active Directory multimaster replication.

Reference:
http://safari.adobepress.com/9780596514112/active_directory-integrated_zones

Question 5.
ITCertKeys.com has a DNS server with 10 Active Directory Integrated Zones. For auditing purposes, you have to provide copies of the zone files of the DNS server to the security audit group. 

What should you do to achieve this task?

A. Execute ntdsutil > Partition Management > Display commands
B. execute ipconfig/registerdns command
C. execute the dnscmd/ZoneExport command
D. Execute dnscmd/Zoneoutput command

Answer: C

Question 6.
ITCertKeys.com has a domain controller named EDC11 that runs Windows Server 2008. It is configured as a DNS server for ITCertKeys.com. You install the DNS server role on a member server named S1 and after this; you create a standard secondary zone for ITCertKeys.com. You configured EDC11 as the master server for the zone. 

What should you do to make sure that S1 receives zone updates from EDC11?

A. On Server1, add a conditional forwarder.
B. On DC1, modify the zone transfer settings for the contoso.com zone.
C. Add the Server1 computer account to the DNSUpdateProxy group.
D. On DC1, modify the permissions of contoso.com zone.

Answer: B

Question 7.
ITCertKeys.com has a network consisting of an Active Directory forest named ebd.com. All servers have Windows Server 2008. All domain controllers are configured as DNS servers. The ebd.com DNS zone is stored in ForestDnsZones Active directory partition. A member server contains a standard primary DNS zone for eb.ebd.com. You need to make sure that all domain controllers can resolve names for eb.ebd.com. 

What should you do to achieve this task?

A. Create a delegation in the ebd.com zone
B. Change the properties of SOA record in the eb.ebd.com zone
C. Add NS record in the ebd.com zone
D. Create a secondary zone on a Global catalog server

Answer: A

Question 8.
ITCertKeys.com has a main office and single branch office in another state. With a single Active-Directory domain forest, ITCertKeys.com has two domain controllers named ITK1 and ITK2 . Both of the domain controllers run Windows Server 2008. The branch office has a Read-only domain controller (RODC) named ITK3. While all domain controllers have DNS server role installed, they are configured as Active-Directory-integrated zones. All DNS zones are configured to allow secure updates only. You want to enable dynamic DNS updates on ITK3. 

What should you do to achieve this task?

A. On DC1, create an active partition and configure the partition to store Active Directory-integrated zones
B. Un-install the Active Directory Domain services on ITK3 and reinstall it as a writeable domain controller
C. Reconfigure RODC on ITK3 to allow dynamic updates
D. Execute dnscmd/ZoneResetType command on ITK3

Answer: B

Explanation:
To enable the dynamic DNS updates on ITK3, you should uninstall the Active Directory Domain services on ITK3 and reinstall it as a writeable domain controller. A writeable domain controller performs originating updates and outbound replication. 

Reference: 
http://msdn.microsoft.com/en-us/library/cc207937.aspx

Question 9.
ITCertKeys.com has a huge network that consists of an Active Directory Forest containing a single domain. Windows Server 2008 is installed on all domain controllers. They are configured as DNS servers. ITCertKeys.com has an active directory-integrated zone with two Active Directory sites. Each site contains five domain controllers. You added a new NS record to the zone. You have to make sure that all domain controllers immediately receive the new NS record. 

What should you do to achieve this task?

A. Execute repadmin/syncall from the command prompt
B. Reload the zone from the DNS Manager console
C. Create an SOA record from the DNS Manager console
D. Shutdown and then, restart the DNS server service from services snap-in

Answer: A

Explanation:

Question 10
ITCertKeys.com has an Active Directory domain named comm. ITCertKeys.com. The domain contains two domain controllers named ITK1 and ITK2 . Both have the DNS server role installed. You install a new DNS server named ns. ITCertKeys.com on the perimeter network. You configure ITK1 to forward all unresolved name requests to ns. ITCertKeys.com. But you discover that the DNS forward option is unavailable on ITK2. You have to configure DNS forwarding on ITK2 server to forward unresolved name requests to ns. ITCertKeys.com server. 

Which of the following two actions should you perform to achieve this task?

A. Clean the DNS cache on ITK2
B. configure conditional forwarding on ITK2
C. Delete the Root zone on ITK2
D. Add zone forwarding on ITK2

Answer: B, C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-642 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-642" Exam

TS: Windows Server 2008 Network Infrastructure, Configuring

 Question 1.
ITCertKeys.com has an IPv6 network which has 25 segments. As an administrator, you deploy a server on IPv6 network. 

What should you do to make sure that the server can communicate with systems on all segments of the IPv6 network?

A. Configure the IPv6 address on the server as 0000::2c0:d11f:fec8:3124/64
B. Configure the IPv6 address on the server as ff80::2c0:d11f:fec8:3124/64
C. Configure the IPv6 address on the server as fe80::2c0:d11f:fec8:3124/64
D. Configure the IPv6 address on the server as fd00:: 2c0:d11f:fec8:3124/8.

Answer: D

Question 2.
You are a network administrator at ITCertKeys.com. You have upgraded all servers in the company to Windows Server 2008. ITCertKeys.com wants you to configure IPv6 addresses on all computers in the network. A global address prefix is assigned to you. The prefix is 3FFA:FF2B:4D:B000::/41. ITCertKeys.com has four departments. You have to assign a subnet to each department. 

In this way, which subnetted address prefix will you assign to the fourth department?

A. 3FFA:FF2B:4D:C800::/43
B. 3FFA:FF2B:4D:B400::/43
C. 3FFA:FF2B:4D:C000::/43
D. 3FFA:FF2B:4D:F000::/45
E. None of the above

Answer: A

Explanation
The option 3FFA:FF2B:4D: C800::/43 is correct. The subnetting in IPv6 is performed by determining the number of bits used for subnetting and the itemization of the new subnetted address prefixes. Usually the number of bits for subnetting is s, where 2^s = number of subnets to be created. In this scenario 2^s = 4 and therefore s=2. Then the itemizations of the new subnetted address prefixes are done. In this scenario, the correct subnetted address prefix is 3FFA:FF2B:4D:C800::/43. So option A is the correct answer.

Question 3.
Exhibit:
 
ITCertKeys has decided to re-design its public network. The network will employ an IPv4 addressing. The range would be 129.108.10.0/21. The network must be configured in segments as shown in the exhibit. You have to configure the subnets for each segment in the network. You need to ensure that your solution must support all computers in each segment. 

Which network addresses should you assign to achieve this task?

A. Segment A: 129.108.10.109/22, Segment B: 129.108.10.0/23, Segment C: 129.108.10.0/24, 
    Segment D: 129.108.10.109/25
B. Segment A: 129.108.10.0/22, Segment B: 129.108.10.0/23, Segment C: 129.108.10.0/24, 
    Segment D: 129.108.10.128/26
C. Segment A: 129.108.10.0/22, Segment B: 129.108.10.128/23, Segment C: 129.108.10.0/192, 
    Segment D: 129.108.10.224/25
D. Segment A: 129.108.10.128/22, Segment B: 129.108.10.192/23, Segment C: 
    129.108.10.224/24, Segment D: 129.108.10.0/26
E. None of the above

Answer: B

Question 4.
ITCertKeys network is configured to use Internet Protocol version (Ipv6). You installed a Dynamic Host Configuration Protocol (DHCP) server on a server named ITCertKeysDHCP1 running Windows 2008 server. You want to ensure that neither IP address nor other configuration settings are automatically allocated to DHCP clients on a subnet that does not use DHCPv6 from ITCertKeysDHCP1. 

How should you configure the Managed Address Configuration flag, and the other Stateful Configuration flag in the route advertisements?

A. Set both Managed Address Configuration and Other Stateful Configuration flag to 0
B. Set both Managed Address Configuration and Other Stateful Configuration flag to 1
C. Set both Managed Address Configuration to 0 and Other Stateful Configuration flag to 1
D. Set both Managed Address Configuration to 1 and Other Stateful Configuration flag to

Answer: A

Explanation:
This setting will ensure host will receive neither an IP address nor additional configuration information.

Question 5.
You have upgraded hardware of DNS servers in your network. You also added two new domain controllers to the domain. All client computers use DHCP. Users are not able to logon to domain after the upgrade of DNS servers. 

What should you do to ensure that users are able to log on to the domain?

A. Restart the Netlogon service on the new DNS servers
B. Run ipconfig/registerdns at the command prompt of new DNS servers
C. Reconfigure the DHCP scope option 006 DNS name Servers with the new DNS servers IP addresses
D. Configure the network settings for workstations to Disable NetBIOS over TCP/IP
E. None of the above

Answer: C

Explanation:
To ensure that the users are able to log on to the domain, you should reconfigure the DHCP scope option 006 DNS name Server with the new DNS servers IP addresses. 

Question 6.
Exhibit:

ITCertKeys company network consists of Windows 2008 server computers and Windows Vista client computers. You have the following eight Internet Protocol version 6 (Ipv6) sub netted address prefixes. Please refer to the exhibit. 

What would be the original prefix length for the global address prefix 3FFE:FFFF:0:C000:: ?

A. 51
B. 52
C. 53
D. 54
E. None of the above

Answer: A

Explanation:
The original prefix length for the globe address prefix 3FFE:FFFF:0:C000:: is 51. The eight Ipv6 subnetted address prefixes are the result of 3 bit subnetting of the global address prefix 3FFE:FFFF:0:C000::/51. To perform 3-bit subnetting of the global address prefix 3FFE:FFFF:0:C000::/51 we use the following calculations:
Hexadecimal value of the subnet ID being subnetted, F = oxC000
Subnetting bits, s = 3

Question 7.
ITCertKeys Company has IPV6 network. The IPV6 network has 25 segments. You deployed a new Windows 2008 server on the IPV6 network. 

What should you do to ensure that the server could communicate with systems on all segments of the IPV6 network?

A. Configure the IPV6 address as fd00::2b0:d0ff:fee9:4143/8
B. Configure the IPV6 address as fe80::2b0: d0ff:fee9:4143/64
C. Configure the IPV6 address as ff80::2b0: d0ff:fee9:4143/64
D. Configure the IPV6 address as 0000::2b0: d0ff:fee9:4143/64
E. None of the above

Answer: A

Explanation:
To ensure that the server communicates with systems on all segments of the IPV6 network, you need to configure the IPV6 address as fd00::2b0:d0ff:fee9:4143 /8 because this address is the local unicast address type and is not routed on the Internet. It is
generally filtered inbound.


Reference: 
IPv6 Unicast Address Information
http://www.netcraftsmen.net/welcher/papers/ipv6part02.html

Question 8.
You are an administrator at ITCertKeys.com. ITCertKeys.com has opened a new Branch office at a new location. Windows Server 2008 is implemented on the servers. The initial network has 20 computers. You are asked to configure an appropriate IP addressing scheme in the network. 

Which network address should you use to accomplish this task?

A. 192.10.100.0/26
B. 192.10.100.0/30
C. 192.10.100.0/29
D. 192.10.100.0./31
E. None of the above

Answer: A

Explanation
To configure an appropriate IP addressing scheme in the network, you should use 192.10.100.0/57. In this scenario, 50 computers have to be configured in a network. 
Network address is calculated as follows:
1. Class A networks has a default subnet mask of 255.0.0.0 and use 0-127 as their first octet
2. Class B networks has a default subnet mask of 255.255.0.0 and it can use 128-191 as their first octet
3. Class C networks has a default subnet mask of 255.255.255.0 and it can 192-223 as their first octet
You need to configure the network address to accommodate at least 50 hosts per subnet. To calculate the number of host bits, use the formula: 2^n-2 where n=32 bits. To configure 50 hosts, you need 192.10.100/26 network address which has maximum 62 hosts per subnet. 
The formula to calculate the hosts per subnet is:
32-26= 6
2^6-2= 62
So according to this calculation, network address 192.10.100/26 will be able to accommodate 50 hosts per subnet. We have deducted 6 bits from the total of 32 bits.

Question 9.
You are an enterprise administrator for ITCertKeys. The corporate network of the company consists of servers that run Windows Server 2008 and client computers that run Windows XP Service Pack 2 (SP2), Windows 2000 Professional, or Windows Vista. The company has decided to use IPv6 protocol on its network. 

Which of the following options would you choose to ensure that all client computers can use the IPv6 protocol?

A. Run the IPv6.exe tool on all the client computers.
B. Upgrade the Windows 2000 Professional computers to Windows XP SP2.
C. Upgrade all Windows 2000 Professional computers with Service Pack 4.
D. Install the Active Directory Client extension (DSClient.exe) on all the client computers.

Answer: B

Explanation:
To ensure that all computers can use the IPv6 protocol, you need to upgrade the Windows 2000 Professional computers to Windows XP SP2. IPv6 protocol is far superior to IPv4 protocol in terms of security, complexity, and quality of service (QoS). Therefore, all the new operating systems started using IPv6 protocol. The older operating systems such as Windows 2000 professional does not support Ipv6 therefore this needs to be upgraded to either Windows XP or Windows Vista. You can now get versions of Windows that fully support most aspects of IPv6 (namely Windows XP and Windows Server 2003) and you will soon be able to get versions of Windows that not only fully support IPv6 but also provide enhanced performance for IPv6 networking.

Reference: 
IPv6 Support in Microsoft Windows/ Windows 2000
http://www.windowsnetworking.com/articles_tutorials/IPv6-Support-Microsoft-Windows.html

Question 10.
You are an enterprise administrator for ITCertKeys. The company consists of a head office and two Branch offices. The corporate network of ITCertKeys consists of a single Active Directory domain called ITCertKeys.com. The computers in the Branch office locations use IPv4 and IPv6 protocols. Each Branch office is protected by a firewall that performs symmetric NAT. 

Which of the following options would you choose to allow peer-to-peer communication between all Branch offices?

A. Configure the use of Teredo in the firewall.
B. Configure the external interface of the firewall with a global IPv6 address.
C. Configure the internal interface of the firewall with a link local IPv6 address.
D. Configure dynamic NAT on the firewall.

Answer: A

Explanation:
To allow peer-to-peer communication between all Branch offices where each location is protected by a firewall that performs symmetric NAT, you need to configure the firewall to allow the use of Teredo. Teredo is an IPv6 transition technology that provides address assignment and host-to-host automatic tunneling for unicast IPv6 traffic when IPv6/IPv4 hosts are located behind one or multiple IPv4 network address translators (NATs). Teredo in Windows Vista and Windows Server "Longhorn" will work if one of the peers is behind a symmetric NAT and the other is behind a cone or restricted NAT.

Reference: 
Teredo Overview http://technet.microsoft.com/en-us/liBRary/bb457011(TechNet.10).aspx


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-643 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-643" Exam

Windows Server 2008 Applications Infrastructure, Configuring

 Question 1.
ITCertKeys.com has a domain with Active Directory running on it. Windows Server 2008 is installed on all the servers. You plan to deploy an image to 50 computers with no operating system installed. For this you install Microsoft Windows Deployment Services on the network. When you install the image on a test computer, a driver error shows up on the screen. 

What would you do to change the image to include the correct driver?

A. Configure and map the image file to the installation folder which hosts the correct driver
B. Take the image file and mount it. Using the System Image Manager (SIM) utility, change the image file
C. Open WDS server and update the driver through Device Manager
D. Take the image file and mount it. Run the sysprep utility to get the correct driver
E. None of the above

Answer: B

Explanation:
To include the correct driver, you should mount the image file and change it using System Image Manager (SIM). You need to include the correct driver in the image file so it will install with all the correct drivers. You should not configure and map the image file to the installation folder hosting the correct driver because the image file is deployed in full. Windows Server 200 will not consider the contents of the folder where image file resides. It will deploy the image file only with all its content You cannot update the driver through Device Manager on WDS server. It has nothing to do with the image file. You cannot mount the image file and run sysprep utility. Sysprep utility cannot get the correct driver for you and change the image file. Sysprep utility is related to WDS server and the deployment of images to the client computers.

Question 2.
ITCertKeys.com has a server that runs Windows Server 2008. As an administrator at ITCertKeys.com, you install Microsoft Windows Deployment Service (WDS). While testing an image, you find out that the image is outdated. 

What should you do to remove the image from the server?

A. Open the command prompt at WDS server and execute WDSUTIL/Remove-Image and /ImageType:install options
B. Open the command prompt at WDS server and execute theWDSUTIL command with/Export-Image and /ImageType: install options
C. Open the command prompt at WDS server and execute theWDSUTIL with /Export-Image and  /ImageType: boot options
D. Open the command promt at WDS server and execute theWDSUTIL command with /Remove- Image and /ImageType:boot options
E. All of the above

Answer: A

Explanation:
To remove the image from the server, you should execute WDSUTIL/remove-image on the command prompt at WDS server. Then execute WDSUTIL/image-type:install command and install the new image. The WDSUTIL is a command specific to modify and view the images at WDS server. You need to remove the image and then install the updated one using these commands. You cannot use the export-image parameter with WDSUTIL in this scenario. You have to remove the image not to export it to a folder. You should not use the /image-type:boot parameter because you need to install a fresh image. You don't need to boot the service for this.

Question 3.
ITCertKeys.com has four branch offices. To deploy the images, you install Microsoft Windows Deployment Services (WDS) on the network. ITCertKeys.com creates 4 images for each branch office. There are a total of 16 images for ITCertKeys.com. You deploy these images through WDS. A problem occurs in one branch office where the administrator reports that when he boots the WDS client computer, some of the images for his regional office does not show up in the boot menu. 

What should you do to ensure that every administrator can view all the images for his branch office?

A. Create separate image group for each branch office on the WDS server
B. Create unique organizational unit for each branch office and create profiles for each computer in the branch office
C. Organize a global group for each branch office and create profiles of each computer in a branch office
D. Create a Global Unique Identifier for each computer to recognize its branch office and connect it to the WDS server
E. None of the above

Answer: A

Explanation:
To ensure that every administrator can view all the images for his branch office, you should create separate image group for each branch office on WDS server. A separate image will enable all the administrators to view each image from their machine in the branch office. You should not create an OU for each branch office. There is no logic in creating an OU for each branch office and profiles for each computer in the branch office. You should not organize a global group for each branch office. A global group can host all the branch offices of ITCertKeys.com

Question 4.
Microsoft Windows Deployment Services (WDS) is running on a Windows 2008 server. When you try to upload spanned image files onto WDS server, you received an error message.

What should you do to ensure that image files could be uploaded?

A. Combine the spanned image files into a single WIM file
B. Grant the Authenticated Users group Full Control on the \REMINST directory
C. Run the WDSutil/Convert command from command line on the WDS server
D. Run the WDSutil/add-image/imagefile:\\server\share\sources\install.wim/image type: install 
    command for each component file individually at the command line on WDS server
E. None of the above

Answer: A

Explanation:
When you try to upload spanned image files onto WDS server, you received an error message because you can only mount a single WIM file once for read/write access and therefore you need to combine the spanned image files into a single WIM file to correct the problem.

Reference: 
The Desktop Files The Power User's Guide to WIM and ImageX / Using /mount, /mountrw, and /delete http://technet.microsoft.com/en-us/magazine/cc137794.aspx

Question 5.
ITCertKeys.com has upgraded all servers in its network to Windows Server 2008. ITCertKeys.com also directed you to install Windows Vista on all client machines. You install Windows Vista on client machines and Windows Server 2008 on the servers. You use Multiple Activation Key (MAK) to activate the new operating systems on the network. You use proxy activation over the internet using Volume Activation Management Tool (VAMT). The Windows Vista on client computers were successfully activated using this method but the Windows Server 2008 failed to activate using VAMT. 

What should you do to ensure that the Windows Server 2008
is activated on all the servers?

A. Contact Microsoft Support Center and activate the Windows server 2008 over the phone
B. Upgrade VAMT using Windows Server 2008 RTM for VAMT to function with Windows Server 2008 Volume Licensing
C. Upgrade VAMT using Key Management Service (KMS) for Windows Server 2008 RTM to function with Windows Server 2008 Volume Licensing
D. Contact Microsoft Support Center and activate Windows Server 2008 over the internet using MAK only
E. All of the above

Answer: B

Explanation:
To ensure that the Windows Server 2008 is activated on all the servers, you should upgrade VAMT using Windows Server 2008 RTM for VAMT. You have to update VAMT at Windows Server 2008 RTM for VAMT to function with Windows Server 2008 volume licensing. VAMT (Volume Activation Management Tool) is a volume licensing tool for all flavors of Windows Vista. There are various activation methods available for volume licensing. These methods use two types of customer specific keys: Multiple Activation Key (MAK) and Key Management Service (KMS). The VAMT tool is used to activate the license through proxy over internet. VAMT is a tool for Windows Vista and to use it for Windows Server 2008, it needs an update.

Question 6.
ITCertKeys.com has added 5 servers to its network. As an administrator at ITCertKeys.com, you install Windows Server 2008 Enterprise edition on two servers and Windows Server 2008 storage server enterprise on other two servers. You want to automatically activate both editions of Windows Server 2008 without any administrator or Microsoft intervention. You also want the activation to occur every 6months. 

Which volume activation service should you use to automatically activate both editions of Windows Server 2008?

A. Multiple Activation Key(MAK)
B. Volume Activation Management Tool (VAMT)
C. Volume Activation 1.0 (VA 1.0)
D. Key Management Service (KMS)
E. None of the above

Answer: D

Explanation:
You should use KMS to activate both editions of Windows Server 2008. KMS automatically activates Windows Vista and Windows Server 2008. Computers that are been activated by KMS are required to reactivate by connecting to a KMS host at least once every six months. The VL editions of Windows Serve 2008 and Windows Vista are installed as KMS clients by default. The clients can automatically discover the KMS hosts on the network with a properly configured KMS infrastructure. The clients can also activate using KMS infrastructure without administrative or user intervention.

Question 7.
ITCertKeys has main office and a Branch office. Main office is running 20 Windows Server 2008 computers and 125 computers running Microsoft Windows XP Professional. Branch office is running 3 Windows Server 2008 computers and 50 Windows XP Professional computers running on its network. Computers in the main office have access to Internet. All servers are having the same security configuration and there are no plans in near future to add new servers or systems in the network. You installed Volume Activation Management Tool (VAMT) on a server named ITCertKeys_DC1 in the main office and added all servers to VMAT server and configured the servers for Multiple Activation Key (MAK) independent activation. Servers at Branch office are unable to activate Windows Server 2008. 

What should you do to activate Windows server 2008 on all servers?

A. Install a Management Activation Key (MAK) server on the network
B. Configure MAK Proxy activation on all servers in the Branch office
C. Configure Windows Management Instrumentation (WMI) Firewall Exception on all servers in the Branch office
D. Open VAMT on ITCertKeys_DC1 and export the Computer Information List (CIL). Send this file to Microsoft Technical support for activation
E. None of the above

Answer: B

Explanation:
To activate Windows server 2008 on all servers, you need to configure MAK Proxy activation on all servers in the BRanch office. The MAK can be activated by using two methods, MAK Independent Activation and MAK Proxy Activation. MAK Independent Activation is used when each computer is activated individually by connecting to Microsoft servers over the Internet or by telephone and MAK Proxy Activation is used when Volume Activation Management Tool (VAMT) is installed on a server and you need to activate multiple computers at the same time through a single connection to Microsoft servers over the Internet or phone. Therefore, instead of MAK Independent Activation you need to use MAK Proxy activation on all servers in the BRanch office.

Reference: 
Frequently Asked Questions About Volume License Keys for Windows Vista and Windows Server 2008 http://www.microsoft.com/licensing/resources/vol/ActivationFAQ/default.mspx

Question 8.
You are network administrator for ITCertKeys network. You configured a Windows server 2008 server named ITCertKeys_KM1 as Key Management Service (KMS) host. This server is also configured as Windows Sharepoint Services server. This location has currently 18 computers having Windows Vista KMS client and you have added 10 more Windows Vista KMS client systems in the network recently. These 10 additional client computers are installed using Windows Vista image file. The KMS host is unable to activate any of the KMS client computers in the network. 

What should you do?

A. Install KMS on a dedicated Windows Sever 2008
B. Run Sysprep /generalize on the Vista reference computer used to create image
C. Run slmgr.vbs/rearm Vista reference computer used to create image
D. Run slmgr.vbs/dli on the KMS host computer
E. Run slmgr.vbs/cpri on the KMS host computer
F. None of the above

Answer: B

Explanation:
To activate the KMS client computers in the network, you need to run the Sysprep /generalize on the Vista reference computer used to create image. sysprep/generalize is used to reset activation and other system-specific information as the last step before storing or capturing the VM image. If sysprep /generalize is not used, the activation timer will run down while the product is in storage and the KMS host will be unable to activate any of the KMS client computers in the network.

Reference: 
KMS host is unable to activate any of the KMS client computers in the network
http://blog.windowsvirtualization.com/virtualization/faq-virtalization-and-volume-activation-20

Question 9.
ITCertKeys.com has a server with single Active Directory domain. For security, ITCertKeys.com has an ISA 2006 server functioning as a firewall. You configure user access through virtual private network service by deploying the PPTP (Point-to-Point Tunneling Protocol). When a user connects to the VPN service, an error occurs. The error message says "Error 721: The remote computer is not responding." 

What should you do to ensure that the users connect to the VPN service?

A. Open the port 2200 on the firewall
B. Open the port 1423 on the firewall
C. Open the port 1723 on the firewall
D. Open the port 721 on the firewall
E. All of the above

Answer: C

Explanation:
To ensure that users connect to VPN service, you should open the port 1723 on the firewall. The port 1723 is a TCP port for PPTP tunnel maintenance traffic. For VPN connections, you need to open this port for PPTP tunnel maintenance traffic and permit IP Type 47 Generic Routing Encapsulation (GRE) packets for PPTP tunnel data to pass to your RRAS server's IP address. You cannot open port 721. The port 721 on the firewall is a printer port so it is not related to VPN connection

Question 10.
DRAG DROP
ITCertKeys has a server named ITK1 that runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. You want to create eight virtual servers that run Windows Server 2008 and configure the virtual servers as an Active Directory forest for testing purposes in the ITCertKeys Lab. You discover that ITK1 has only 30 GB of hard disk space that is free. You need to install the eight new virtual servers on ITK1 .

From the steps shown, what steps need to be completed in a specific order?
 
Answer:
 
Explanation:
To install the eight new servers on ITK1, you need to create a virtual server with a 10 GB fixed-size virtual hard disk and then install Windows Server 2008. After that, you should create eight differencing virtual hard disks and then create eight virtual servers with a differencing virtual hard disk attached. The virtual hard disk should be created first because you need space for eight virtual servers. The fixed-size virtual hard disk can be created through a virtual server. Then you install Windows Server 2008 on it. After that you have to allocate the space for eight virtual servers. To do that, you create differencing virtual hard disk to solve the space problem. Then you create the eight virtual servers with differencing virtual hard disk attached.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-647 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-647" Exam

PRO: Windows Server 2008, Enterprise Administrator

 Question 1.
You are an enterprise administrator for ITCertKeys. The company has a head office in San Diego and a branch office in New York. The corporate network of ITCertKeys consists of an Active Directory forest having two domains, ITCertKeys.com and Branch. ITCertKeys.com for the head office and the branch office respectively. All the servers on the corporate network run Windows Server 2008 and both the offices hold their respective domain controllers on their physical office locations. 

The two domain controllers at ITCertKeys.com are called ITCertKeysServer1 and ITCertKeysServer2 and the two domain controllers at Branch. ITCertKeys.com are called ITCertKeysServer3 and ITCertKeysServer4. All domain controllers host Active Directory-integrated DNS zones for their respective domains. As an enterprise administrator of the company, you have been assigned the task to ensure that users from each office can resolve computer names for both domains from a local DNS server. 

Which of the following options would you choose to accomplish this task?

A. Add the ITCertKeys.com and the Branch. ITCertKeys.com DNS zones to the ForestDNSZones partition.
B. Create a stub DNS zone for ITCertKeys.com on ITCertKeysServer3 and a stub DNS zone for Branch. ITCertKeys.com on ITCertKeysServer1.
C. Create a standard primary DNS zone named ITCertKeys.com on ITCertKeysServer3 and a standard primary DNS zone named Branch. ITCertKeys.com on ITCertKeysServer1.
D. Configure conditional forwarders on ITCertKeysServer1 to point to ITCertKeysServer3 conditional forwarders on ITCertKeysServer3 to point to ITCertKeysServer1.
E. None of the above.

Answer: A

Explanation:
To ensure that users from each office can resolve computer names for both domains from a local DNS server, you need to add the ITCertKeys.com and the Branch. ITCertKeys.com DNS zones to the ForestDNSZones partition because the ForestDNSZones directory partition can be replicated among all domain controllers (DCs) located in both the domains ITCertKeys.com and Branch. ITCertKeys.com in the forest of the company. This is because all the domain controllers have the DNS service installed. Once the DNS Zones data is replicated the users from each office can resolve computer names for both domains from their local DNS server

A stub zone cannot be used because it is used to resolve names between separate DNS namespaces a Standard Primary DNS zone cannot be used because the DNS Server in this type of zone contains the only writable copy of the DNS zone database files. There can be only one Standard Primary DNS Server for a particular zone. A conditional forwarder cannot be used because it handles name resolution only for a specific domain. 

Reference: 
What causes the error I receive in the event log when I attempt to replicate the ForestDNSZones directory partition? http://windowsitpro.com/article/articleid/43165/q-what-causes-the-error-i-receive-in-the-event-log-when-iattem

Reference: 
Understanding stub zones
http://207.46.196.114/windowsserver/en/library/648f2efd-0ad4-4788-80c8 75f8491f660e1033.mspx?mfr=true

Reference: 
DNS Conditional Forwarding in Windows Server 2003
http://www.windowsnetworking.com/articles_tutorials/DNS_Conditional_Forwarding_in_Windows_Server_200

Question 2.
You are an enterprise administrator for ITCertKeys. The company has a head and a three branch offices. Each office has a Windows Server 2008 server running with a DNS role installed on it. All the branch offices consist of Windows 2000 Professional client computers installed on their networks. As an enterprise administrator of the company, you have been assigned the task to deploy Active Directory Domain Services (AD DS) on the corporate network of the company. You also need to plan the implementation of a name resolution solution for the deployment of AD DS that supports secure dynamic updates and minimize the response times for users connecting to resources anywhere on the network. 

Which of the following options would you include in your plan to accomplish this task?

A. Implement GlobalNames zone (GNZ) for the forest.
B. Implement a single Active Directory-integrated (ADI) DNS zone.
C. Create a stub zone on the DNS server in each branch office.
D. Create a standard primary zone in the head office and the secondary zones in branch offices.
E. None of the above.

Answer: B

Explanation:
To deploy Active Directory Domain Services (AD DS) on the corporate network of the company with given requirements, you need to implement a single Active Directory-integrated (ADI) DNS zone. Active Directory integrated (ADI) primary DNS zone enables built-in recovery, scalability, and performance. An ADI zone is a writeable copy of a forward lookup zone that is hosted on a domain controller. It can therefore reduce the response times for users connecting to resources anywhere on the network and because it uses directory-integrated storage it also simplifies dynamic updates for DNS clients that are running Windows 2000. None of the other options can be used to meet the desired objectives.

Reference: 
From the Windows 2000 Resource Kit
http://windowsitpro.com/article/articleid/76616/jsi-tip-5312-when-you-change-your-dns-active-directoryintegra

Reference: 
ACTIVE DIRECTORY ADMINISTRATION TIPS
http://searchwinit.techtarget.com/tip/0,289483,sid1_gci1115858,00.html

Question 3.
You are an enterprise administrator for ITCertKeys. The company has a head office and a branch office located at different physical locations. The corporate network of the company consists of a single Active Directory domain. Both the offices of the company run Windows Server 2008 servers and have 2,000 client computers configured as DHCP clients without having DHCP relay supported on the network routers. As an enterprise administrator of the company, you have been assigned the task to configure a DHCP addressing solution for both the offices that would minimize the traffic between the offices and is available in case any one of the DHCP server fails.

Which of the following options would you choose to accomplish this task?

A. Install two DHCP servers, one in the head office and the other in branch office and make sure that both the DHCP servers have two scopes.
B. Install a DHCP instance on a two node failover cluster in each office, the head office and the branch office.
C. In the head office, install a DHCP server and in the branch office, install a DHCP Relay Agent.
D. In the head office, install a DHCP instance on a two node failover cluster and in the branch office, install a DHCP Relay Agent.
E. None of the above.

Answer: B

Explanation:
To configure a DHCP addressing solution for both the offices that would minimize the traffic between the offices and is available in case any one of the DHCP server fails, you need to install a DHCP instance on a two node failover cluster in each office, the head office and the branch office. The two node failover cluster in each office will ensure that the DHCP server is always available even if one of the DHCP servers fails. Because DHCP relay is not supported on the network, both the offices need to have a separate DHCP failover clustering solution.

Having two scopes of DHCP servers will not help because DHCP relay is not supported on the network. Installing a DHCP server and DHCP Relay Agent in the branch office and installing a DHCP instance on a two node failover cluster and in the branch office and a DHCP Relay Agent will not help because this solution would increase the traffic between the offices in case any one of the DHCP server fails.

Reference: 
Step-by-Step Guide for Configuring Two-Node File Server Failover Cluster in Windows Server 2008 http://209.85.175.104/search?q=cache:9u-snEWIUtgJ:download.microsoft.com/download/b/1/0/b106fc39-936c- 

Reference: 
DHCP Relay Agent Overview
http://www.tech-faq.com/dhcp-relay-agent.shtml

Question 4.
You are an enterprise administrator for ITCertKeys. The corporate network of the company consists of a single Active Directory forest that contains 25 domains. All the DNS servers on the corporate network run Windows Server 2008. The users on the corporate network use NetBIOS name to connect to the network applications in all the domains. Currently the network is configured with IPv4 addressing. As an enterprise administrator of the company, you have been assigned the task to migrate the network to an IPv6-enabled only network without affecting any client computer. 

Which of the following options would you choose to accomplish this task?

A. Configure GlobalNames zones on the DNS servers running Windows Server 2008.
B. Add all domain zones to the ForestDNSZones partition on the DNS servers running Windows Server 2008.
C. Create a new running Windows Server 2008 server and configure WINS server on it.
D. Create a new running Windows Server 2003 server and configure WINS server on it.
E. None of the above.

Answer: A

Explanation:
To migrate the network from IPv4-enabled to an IPv6-enabled only network without affecting any client computer, you need to configure GlobalNames zones on the DNS servers running Windows Server 2008. To help customers migrate to DNS for all name resolution, the DNS Server role in Windows Server 2008 supports a special GlobalNames Zone (also known as GNZ) feature. The client and server name resolution depends on DNS. A DNS Client is able to resolve single-label names by appending an appropriate list of suffixes to the name. The correct DNS suffix depends on the domain membership of the client but can also be manually configured in the advanced TCP/IP properties for the computer. The problem occurs managing a suffix search list when there are many domains. For environments that require both many domains and single-label name resolution of corporate server resources, GNZ provides a more scalable solution. GNZ is designed to enable the resolution of the single-label, static, global names for servers using DNS. WINS cannot be used because it does not support IPv6 protocols and both are entering legacy mode for Windows Server 2008. ForestDNSZones partition cannot help to migrate a IPv4-enabled network to an IPv6-enabled only network

Reference: 
Understanding GlobalNames Zone in Windows Server 2008
http://www.petri.co.il/windows-DNS-globalnames-zone.htm

Reference: 
Using GlobalNames Zone in Windows Server 2008
http://www.petri.co.il/using-globalnames-zone-window-server-2008.htm

Question 5.
You are an enterprise administrator for ITCertKeys. The company has a head office and two branch offices. The corporate network of ITCertKeys consists of a single Windows Server 2008 Active Directory domain called ITCertKeys.com. The DNS Service is installed on the member servers of the ITCertKeys.com domain and all the domain controllers and DNS servers for the ITCertKeys.com domain are located in the head office.

As an enterprise administrator of the company, you have been assigned the task to deploy two new Active Directory domains named branch1. ITCertKeys.com and branch2. ITCertKeys.com in the branch offices. To accomplish this task, you installed a DNS server in each branch office. 

Which of the following actions would you perform next to prepare the environment for the installation of the new domains? (Select three. Each selected option will form a part of the answer.)

A. Configure a delegation subdomain DNS record on the main office DNS server for each new domain.
B. Create a new standard primary zone on each branch office DNS server for the new domains.
C. Create a new stub zone on each branch office DNS server for the new domains
D. Configure forwarders on the main office DNS servers to point to the branch office servers.
E. Configure conditional forwarders on the main office DNS servers to point to the branch office DNS servers.
F. Configure zone transfer for the ITCertKeys.com zone to the branch office DNS servers.

Answer: A, B, F

Explanation:
To deploy two new Active Directory domains in the branch offices, you need to first configure a delegation subdomain DNS record on the main office DNS server for each new domain then create a new standard primary zone on each branch office DNS server for the new domains and then configure zone transfer for the ITCertKeys.com zone to the branch office DNS servers after installing DNS server in each branch office. In DNS, a subdomain is a portion of a domain that you've delegated to another DNS zone. A subdomain is configured when you need to create domains in existing domain. A company might use subdomains for its various divisions. Because, to migrate your DNS zone data for the ITCertKeys.com zone to the branch office DNS servers, you will need to have a functioning standard primary server, you will need to create a new standard primary zone on each branch office DNS server for the new domains.

Reference: 
Delegate subdomains in DNS in Windows 2000 Server
http://articles.techrepublic.com.com/5100-10878_11-5846057.html

Reference: 
Step-By-Step: How to migrate DNS information to Windows Server 2003
http://www.lockergnome.com/it/2005/01/14/step-by-step-how-to-migrate-dns-information-to-windows-server-20

Reference: 
DNS Stub Zones in Windows Server 2003
http://www.windowsnetworking.com/articles_tutorials/DNS_Stub_Zones.html

Question 6.
You are an enterprise administrator for ITCertKeys. The corporate network of ITCertKeys consists of a single Active Directory forest that is made up of a single root domain and 15 child domains. The Administrators of the child domains need to frequently modify the records for authoritative DNS servers for the child domain DNS zones. The administrators take a long time in modifying these records. As an enterprise administrator of the company, you have been assigned the task to implement a solution that would minimize the effort required to maintain name resolution on the network. 

Which of the following options would you choose to accomplish this task?

A. Create stub zones for the root domain zone on the child domain DNS servers.
B. Configure conditional forwarders for the parent domain on the child domain DNS servers.
C. Create stub zones for the child domain zones on the root domain DNS servers.
D. Configure delegation subdomain records for the child domains on the root domain DNS servers.
E. None of the above.

Answer: C

Explanation:
To implement a solution that would minimize the effort required to maintain name resolution on the network, you need to create stub zones for the child domain zones on the root domain DNS servers. Stub zones can help reduce the amount of DNS traffic on your network by streamlining name resolution and zone replication. The Stub zone should be configured for the child domain zones on the root domain DNS servers and not vice versa because a stub zone is like a secondary zone that obtains its resource records from other name servers (one or more master name servers).

Reference: 
DNS Stub Zones in Windows Server 2003
http://www.windowsnetworking.com/articles_tutorials/DNS_Stub_Zones.html

Question 7.
You are an enterprise administrator for ITCertKeys. The corporate network of ITCertKeys consists of a single Windows Server 2008 Active Directory domain and one IP subnet. All servers in the domain run Windows Server 2008 and all the client computers run Windows Vista. On one of the Windows Server 2008 member servers, ITCertKeysServer1, Active Directory Domain Services (AD DS), Active Directory Certificate Services (AD CS), and DHCP services are configured. On another Windows Server 2008 member server, ITCertKeysServer2, Routing and Remote Access Service (RRAS), Network Policy Service (NPS), Health Registration Authority (HRA) services are configured. Some client computers that do not have the latest Microsoft updates installed connect to the local area network (LAN) from client computers that are joined to a workgroup. Besides all network switches used for client connections are unmanaged.

As an enterprise administrator of the company, you have been assigned the task to implement a Network Access Protection (NAP) solution to protect the network. You need to ensure that only the computers that have the latest Microsoft updates installed must be able to connect to servers in the domain and only the computers that are joined to the domain must be able to connect to servers in the domain. 

Which of the following NAP enforcement method should you use to accomplish this task?

A. 802.1x
B. DHCP
C. IPsec
D. VPN
E. None of the above.

Answer: C

Explanation:
To ensure that only the computers that have the latest Microsoft updates installed must be able to connect to servers in the domain and only the computers that are joined to the domain must be able to connect to servers in the domain, you need to use IPSec NAP enforcement method. IPsec domain and server isolation methods are used to prevent unmanaged computers from accessing network resources. This method enforces health policies when a client computer attempts to communicate with another computer using IPsec.

Reference: 
Protecting a Network from Unmanaged Clients / Solutions
http://www.microsoft.com/technet/security/midsizebusiness/topics/serversecurity/unmanagedclients.mspx

Reference: 
Network Access Protection (NAP) Deployment Planning / Choosing Enforcement Methods
http://blogs.technet.com/nap/archive/2007/07/28/network-access-protection-deployment-planning.aspx

Question 8.
You are an enterprise administrator for ITCertKeys. The corporate network of ITCertKeys consists of a single Windows Server 2008 Active Directory domain and one IP subnet. All servers in the domain run Windows Server 2008 and all the client computers run Windows Vista, Windows XP Professional, and Windows 2000 Professional. On one of the Windows Server 2008 member servers, ITCertKeysServer1, Active Directory Domain Services (AD DS), Active Directory Certificate Services (AD CS), and DHCP services are configured. On another Windows Server 2008 member server, ITCertKeysServer2, Routing and Remote Access Service (RRAS), Network Policy Service (NPS), Health Registration Authority (HRA) services are configured. 

The NAP is configured by using IPsec, DHCP, and 802.1x enforcement methods. Currently the computers that are not joined to the domain can easily connect to the domain and access network resources. As a network administrator, you want to stop this security lapse and want to ensure that only computers that are joined to the domain can access network resources on the domain. 

Which of the following options would you choose to accomplish this task?

A. Configure all DHCP scopes on ITCertKeysServer1 to enable NAP.
B. Configure all network switches to require 802.1x authentication.
C. Create a GPO, link it to the domain. Enable a secure server IPsec policy on all member servers in the domain in the GPO.
D. Create a GPO, link it to the domain. Enable a NAP enforcement client for IPsec 
    communications on all client computers in the domain in the GPO.
E. None of the above.

Answer: C

Explanation:
To ensure that only computers that are joined to the domain can access network resources on the domain, you need to create a GPO, link it to the domain and enable a secure server IPsec policy on all member servers in the domain in the GPO. IPsec domain and server isolation methods are used to prevent unmanaged computers from accessing network resources. This method enforces health policies when a client computer attempts to communicate with another computer using IPsec. Configuring DHCP scope cannot stop unmanaged computers that are not joined to the domain from accessing the network. NAP is not required in this scenario because you just want the member computers to access network resources. Therefore, you need not create a GPO, link it to the domain. Enable a NAP enforcement client for IPsec communications on all client computers in the domain in the GPO.

Reference: 
Protecting a Network from Unmanaged Clients / Solutions
http://www.microsoft.com/technet/security/midsizebusiness/topics/serversecurity/unmanagedclients.mspx

Question 9.
You are an enterprise administrator for ITCertKeys. The corporate network of ITCertKeys consists of a single IP subnet. All servers in the domain run Windows Server 2008 and all the client computers run Windows Vista. The network contains three Windows Server 2008 servers configured as follows:
1. ITCertKeysServer1 - Configured with Active Directory Domain Services (AD DS), Active Directory Certificate Services (AD CS), and DHCP services.
1. ITCertKeysServer2 - Configured with Routing and Remote Access Service (RRAS), Network Policy Service (NPS), Health Registration Authority (HRA), and Microsoft System Center Configuration Manager (SCCM) 2007 services
1. ITCertKeysServer3 - Configured with File Services and Microsoft Windows SharePoint Services (WSS). As an enterprise administrator of the company, you have been assigned the task to configure the NAP environment that would only allow computers that have required Microsoft updates installed to access the internal network resources.

Besides, you need to ensure that when the client computers connect to the network, the network switches would only allow them to communicate with only ITCertKeysServer1 and ITCertKeysServer2 initially.
.

Which of the following NAP enforcement method should you use to accomplish this task?

A. 802.1x
B. DHCP
C. IPsec communications
D. VPN
E. None of the above.

Answer: A

Explanation:
To configure the NAP environment that would only allow computers that have required Microsoft updates installed to access the internal network resources and to ensure that when the client computers connect to the network, the network switches would only allow them to communicate with only ITCertKeysServer1 and ITCertKeysServer2 initially, you need to use 802.1x NAP enforcement method because this method enforces health policies when a client computer attempts to access a network using EAP through an 802.1X wireless connection or an authenticating switch connection. 

Reference: 
Network Access Protection (NAP) Deployment Planning / Choosing Enforcement Methods
http://blogs.technet.com/nap/archive/2007/07/28/network-access-protection-deployment-planning.asp

Question 10.
You are an enterprise administrator for ITCertKeys. The corporate network of ITCertKeys consists of a single Active Directory domain. All the servers in the domain run Windows Server 2008 and all the client computers run Windows Vista with Service Pack 1.
The network contains three Windows Server 2008 servers configured as follows:
1. ITCertKeysServer1- Configured with Network Policy and Access Services (NPAS).
2. ITCertKeysServer2 - Configured with Microsoft Windows SharePoint Services (WSS).
3. ITCertKeysServer3 - Configured with File Services.
The company has many remote users (domain members) that need to access the domain resources from their remote locations. Some of the remote users informed you that they can access ITCertKeysServer2 by using the URL https://portal. ITCertKeys.com from their remote locations through Internet but the firewall used at their remote location site prevents all other outbound connections. As an enterprise administrator of the company, you have been assigned the task to plan a solution that would allow the remote users to access files on ITCertKeysServer3 through a VPN connection

Which of the following types of connections should you enable on ITCertKeysServer1?

A. Configure IPsec tunnel mode connection
B. Configure a L2TP VPN connection
C. Configure a PPTP VPN connection
D. Configure Secure Socket Tunneling Protocol (SSTP) connection
E. None of the above.

Answer: D

Explanation:
To plan a solution that would allow the remote users using firewall on their remote locations to access files on ITCertKeysServer3 through a VPN connection, you need to configure Secure Socket Tunneling Protocol (SSTP) connection. Before Windows Server 2008, all kinds of VPN connections such as PPTP L2TP, and IPSec had problems with firewalls, NATs, and Web proxies. To prevent problems, firewalls must be configured to allow connections. If your VPN client computer is behind a NAT, both the VPN client and the VPN server must support IPsec NAT-Traversal (NAT-T). Besides, VPN server can't be located behind a NAT, and that L2TP/IPsec traffic can't flow through a Web proxy. With the advent of SSTP in Windows Server 2008 all the VPN connectivity problems such as firewalls, NATs, and Web proxies are solved. The SSTP connection allows the use of HTTP over secure sockets layer (SSL). SSTP uses an HTTP-over-SSL session between VPN clients and servers to exchange encapsulated IPv4 or IPv6 packets. 

Reference: 
The Cable Guy: The Secure Socket Tunneling Protocol / The New VPN Solution
http://technet.microsoft.com/en-us/magazine/cc162322.aspx


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-649 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-649" Exam

Upgrading MCSE on Windows Server 2003 to Windows Server 2008, Technology Specialist

 Question 1.
ITCertKeys has opened a new branch office where 10 standalone servers run Windows Server 2008. To keep the servers updated with latest updates, you install WSUS on a server named ITCertKeys 3. 

Which of the following actions would you perform next to configure all of the servers to receive updates from ITCertKeys 3?

A. Use Control Panel to configure the Windows Update Settings on each server.
B. Run the wuauclt.exe /reauthorization command on each server.
C. Use the local group policy to configure the Windows Update Settings on each server.
D. Run the wuauclt.exe /detectnow command on each server.
E. None of the above

Answer: C

Explanation:
To configure all of the servers to receive updates from ITCertKeys 3, you need to configure the Windows Update Settings on each server by using the local group policy. Microsoft suggests the use of Group Policy for setting up computers and WSUS in clients. Configuring the Windows Update Settings on each server would be quite time consuming Configure the Windows Update Settings on each server by using the local group policy. wuauclt.exe /detectnow and wuauclt.exe / reauthorization force the update detection and reauthorization respectively and therefore cannot be used for configuration.

Reference: 
What does wuauclt.exe /detectnow do
http://www.wsus.info/forums/lofiversion/index.php?t6505.html

Reference: 
Adding Computers to WSUS 3.0 SP1 (Windows Server 2008)
http://www.geekzone.co.nz/chakkaradeep/4564

Question 2.
The corporate network of ITCertKeys consists of 100 servers that run Windows Server 2008. A file server ITCertKeys 4 is connected to a SAN and has 12 logical drives. As a system administrator of your company, you have been assigned the task to archive the data when the free space on file server is about to be finished. To accomplish this task, you decided to run a data archiving script automatically when the free space on any of the logical drives goes below 30 percent. To implement the solution, you created a new Data Collector Set and the data archiving script. Now which of the following actions would you perform to automate the execution of the script that you have created.

A. Add the System configuration data collector.
B. Add the Event trace data collector.
C. Add the Performance counter alert.
D. Add the Performance counter data collector.
E. None of the above

Answer: C

Explanation:
To implement the solution, you now need to add the Performance counter alert. The Performance counter alert creates an alert if a performance counter reaches a threshold that you specify

Reference: 
Creating a Snapshot of a Computer's Configuration with Data Collector Sets in Vista / How to Create Custom Data Collector Sets http://www.biztechmagazine.com/article.asp?item_id=241

Question 3.
The corporate network of ITCertKeys consists of two servers, ITCertKeys 2 and ITCertKeys 3 that run Windows Server 2008. You installed WSUS on both servers to create a hierarchy of WSUS servers. You now need to configure WSUS on ITCertKeys 2 so that it can receive updates from ITCertKeys 3. 
Which of the following configuration would you perform on ITCertKeys 2 to accomplish this task?

A. Create a new computer group for the server.
B. Configure it as a proxy server.
C. Configure it as an upstream server.
D. Configure it in replica mode
E. None of the above

Answer: D

Explanation:
To configure WSUS on ITCertKeys 2 so that it can receive updates from ITCertKeys 3, you need to first link the servers by configuring ITCertKeys 2 as downstream server and ITCertKeys 3 as upstream server. When you link WSUS servers together, there is an upstream WSUS server and a downstream WSUS server. Because an upstream WSUS server shares updates, you need to configure and ITCertKeys 3 as upstream server. There are two ways to link WSUS servers together, Autonomous mode and Replica mode. So you can configure ITCertKeys 2 in Replica mode.

Reference: 
Choose a Type of WSUS Deployment/ WSUS server hierarchies 
http://technet2.microsoft.com/windowsserver/en/library/12b665bc-07fa-4a4e-aed8-
f970efe80c4c1033.mspx?mfr

Question 4.
The corporate network of ITCertKeys consists of a Windows Server 2008 single Active Directory domain that contains two domain controllers named ITCertKeys 4 and ITCertKeys 5. All servers in the domain run Windows Server 2008. You wanted to configure Event forwarding and subscription in the domain server. To accomplish this task you created a default subscription on ITCertKeys 4 for ITCertKeys 5.

Which of the following event logs would you select, to review the system events for ITCertKeys 5?

A. Forwarded Events log on ITCertKeys 5.
B. Forwarded Events log on ITCertKeys 4.
C. System log on ITCertKeys 4.
D. Application log on ITCertKeys 5.
E. None of the above

Answer: B

Explanation:
To review the system events for ITCertKeys 5, you need to view theForwarded Events log on ITCertKeys 4, which is configured to centrally manage events. The Event Collector service can automatically forward event logs to other remote systems, running Windows Vista or Windows Server 2008 on a configurable schedule. Event logs can also be remotely viewed from other computers or multiple event logs can be centrally logged and monitored agentlessly and managed from a single computer.

Reference: 
Event Viewer http://en.wikipedia.org/wiki/Event_Viewer

Question 5.
You are an enterprise administrator for ITCertKeys .com. The company runs Windows Server 2008 on all the servers on the network. One of the servers, ITCertKeys Server1 has the Web Server (IIS) role installed on it. A public website has recently been hosted on ITCertKeys Server1. After a few days, you noticed an unusual high traffic volume on the website. 

Which of the following options would you choose to identify the source of the traffic?

A. Run the netstat -an command on ITCertKeys Server1.
B. Using IIS Server Manager, first enable the website logging and then filter the logs for the source IP address.
C. Enable Web scripting on ITCertKeys Server1.
D. Using Event Viewer, filter information from the security log by creating a custom view in it.
E. None of the above

Answer: B

Explanation:
To identify the source of the traffic, you need to first enable the website logging using IIS Server Manager and then filter the logs for the source IP address so that the source of high traffic can be found out. The Internet Services Manager, available within the Administrative Tools folder on your Start menu, is the primary tool you'll use to administer your Web server. It allows you to enable logging on your web site. The IIS log files then can be used to identify performance issues in performance testing. 

The Client IP address filtering allows you to filter the IP address of the machine that accessed your web site. Although IP addresses aren't necessarily unique to any one visitor (as most visitors surf the web via a dynamic IP address provided by their ISP and not their own dedicated static IP and pipe), the IP address can still be useful in partitioning the log file into visitor sessions.

The netstat -an command cannot be used because it is used to check various TCP/IP connections. The web scripting is used to enhance your browsing experience. Event logs are special files that record significant events on your computer, such as when a user logs on to the computer or when a program encounters an error. Therefore all these options cannot be used to detect the source of high traffic.

Reference: 
How To Use IIS Log Files In Performance Testing
http://www.codeplex.com/PerfTesting/Wiki/Print.aspx?title=How%20To%3A%20Use%20IIS%20Log%20Files

Reference: 
Web Wizardry: Putting the Internet to Work on Windows 2000
http://mcpmag.com/features/print.asp?EditorialsID=94

Reference: 
Dissecting Log Files
http://www.clicktracks.com/insidetrack/articles/dissecting_log_files.php

Question 6.
You are an Enterprise administrator for ITCertKeys.com. The company consists of a single Active Directory domain where all the servers on the corporate network run Windows Server 2008. One of the web servers called ITCertKeys Server1 hosts shared documents. You have recently installed a few applications on the server. However, after these installations, users report extremely slow response times when they try to open the shared documents on Server1. To diagnose the problem, you used real time monitoring on the server and found that the processor is operating at 100 percent of capacity. 

Which of the following options would you choose to gather additional data to diagnose the cause of the problem?

A. Create a counter log to track processor usage in the Performance console.
B. Open and review the application log for Performance events in the Event Viewer.
C. Use the Resource View to see the percentage of processor capacity used by each application in Windows Reliability and Performance Monitor.
D. Create an alert that will be triggered when processor usage exceeds 80 percent for more than five minutes on ITCertKeys Server1 in Windows Reliability and Performance Monitor.
E. None of the above

Answer: C

Explanation:
To gather additional data to diagnose the cause of the problem, you need to use the Resource View in Windows Reliability and Performance Monitor to see the percentage of processor capacity used by each application. The Resource View window of Windows Reliability and Performance Monitor provides a real-time graphical overview of CPU, disk, network, and memory usage. By expanding each of these monitored elements, system administrators can identify which processes are using which resources. In previous versions of Windows, this real-time process-specific data was only available in limited form in Task Manager

Reference: 
Windows Reliability and Performance Monitor
http://technet.microsoft.com/en-us/library/cc755081.aspx

Question 7.
You are an Enterprise administrator for ITCertKeys.com. All the 100 servers on the corporate network run Windows Server 2008. A server called ITCertKeys Server1 is configured on the network with following configuration: 
1. Connected to a SAN
2. Consists of 15 logical drives.
3. A new Data Collector Set is recently created

Which of the following option would you choose to automatically run a data archiving script on ITCertKeys Server1 if the free space on any of the logical drives on the server is below 30 percent?

A. Add the Event trace data collector
B. Add the Performance counter alert
C. Add the Performance counter data collector
D. Add the System configuration data collector

Answer: B

Explanation:
To automatically run a data archiving script if the free space on any of the logical drives is below 30 percent and to automate the script execution by creating a new Data Collector Set, you need to add the Performance counter alert. The Performance counter alert creates an alert if a performance counter reaches a threshold that you specify. You can configure your data collector set to automatically run at a scheduled time, to stop running after a number of minutes, or to launch a task after running. You can also configure your data collector set to automatically run on a scheduled basis. This is useful for proactively monitoring computers.

Reference: 
Creating a Snapshot of a Computer's Configuration with Data Collector Sets in Vista / How to Create Custom Data Collector Sets http://www.biztechmagazine.com/article.asp?item_id=241

Question 8.
You are an enterprise administrator for ITCertKeys . The corporate network of the company consists of servers that run Windows Server 2008 in an Active Directory domain. The domain consists of two servers named ITCertKeys Server1 and ITCertKeys Server2. You need to configure event subscription on the servers so that events from ITCertKeys Server2 can be collected and transferred to ITCertKeys Server1. You configure the required subscriptions by selecting the normal option for the event delivery optimization setting and using the HTTP protocol. However, you noticed that none of the subscriptions work. 

Which of the following three options would you choose to ensure that the servers support event collectors? (Each correct answer presents part of the solution)

A. Run the wecutil qc command on ITCertKeys Server1
B. Run the wecutil qc command on ITCertKeys Server2
C. Run the winrm quickconfig command on ITCertKeys Server1
D. Run the winrm quickconfig command on ITCertKeys Server2
E. Add the ITCertKeys Server2account to the administrators group on ITCertKeys Server1
F. Add the ITCertKeys Server1account to the administrators group on ITCertKeys Server2

Answer: A, D, F

Explanation:
To collect events from ITCertKeys Server2 and transfer them to ITCertKeys Server1, you need to first run the wecutil qc command on ITCertKeys Server1. This command enables you to create and manage subscriptions to events that are forwarded from remote computers. Then you need to run the winrm quickconfig command on ITCertKeys Server2. WinRM is required by Windows Event Forwarding as WS-Man is the protocol used by WS-Eventing. Group Policy can be used to enable and configure Windows Remote Management (WinRM or WS-Man) on the Source Computers. With WinRM, Group Policy can be used to configure Source Computers (Clients) to forward events to a collector (or set of collectors).

Finally, you need to add the ITCertKeys Server1 account to the administrators group on ITCertKeys Server2 so that access rights can be granted to the collector system on f the forwarding computer.

Reference: 
Quick and Dirty Large Scale Eventing for Windows
http://blogs.technet.com/otto/archive/2008/07/08/quick-and-dirty-enterprise-eventing-for-windows.aspx

Reference: 
Collect Vista Events http://www.prismmicrosys.com/newsletters_june2007.php

Question 9.
You are an enterprise administrator for ITCertKeys . The corporate network of the company consists of servers that run Windows Server 2008 in an Active Directory domain. To find out the security lapse in the corporate network, you decided to build a list of all DNS requests that are initiated by a network server called CRM ITCertKeys 1. To perform this, you installed the Microsoft Network Monitor 3.0 application on CRM ITCertKeys 1 and configured the server to perform a security audit. You captured all local traffic on CRM ITCertKeys 1 for 24hours and saved the capture file as data.cap. You however realized that the size of data.cap file is more than 1GB, so you decided to create a file named CRM1DNSdata.cap from the existing capture file that contains only DNS -related data. 

Which of the following options would you choose to accomplish this task?

A. Apply the display filter !DNS and save the displayed frames as CRM1DNSdata.cap file
B. Apply the capture filter DNS and save the displayed frames as a CRM1DNSdata.cap file
C. Add a new alias named DNS to the aliases table and save the file as CRM1DNSdata.cap
D. Run the nmcap.exe /inputcapture data.cap /capture DNS /file CRM1DNSdata.cap command.
E. None of the above

Answer: D

Explanation:
NMCap also allows you to accept a capture file as input. This can be useful for cleansing your traces before you use them. Or you could also parse traffic by different ports or by IP addresses. The below given command allows you to create a file named CRM1DNSdata.cap to store only the DNS-related data after filtering it from data.cap file, which is a capture file. The command nmcap.exe /inputcapture data.cap /capture DNS /file CRM1DNSdata.cap file

Reference: 
Network Monitor / Cool NMCap trick, using another capture file as the input source
http://blogs.technet.com/netmon/Default.aspx?p=2

Question 10.
You are an enterprise administrator for ITCertKeys . The corporate network of the company consists of 100 servers that run Windows Server 2008 in an Active Directory domain. You have recently installed Windows Server 2008 on a new server and named it ITCertKeys Server1. You installed Web Server (IIS) role on it. The ITCertKeys Server1 has no Reliability Monitor data currently, and the system stability share has never been updated. 

Which of the following options would you choose to configure the ITCertKeys Server1 to collect the reliability monitor data?

A. On the ITCertKeys Server1, run the perfmon.exe /sys command.
B. On the ITCertKeys Server1Configure the Task scheduler service to start automatically.
C. On the ITCertKeys Server1, configure the Remote Registry service to start automatically.
D. On the ITCertKeys Server1, configure the Secondary Login service to start automatically.

Answer: B

Explanation:
To configure the ITCertKeys Server1 to collect the reliability monitor data, you need to configure the Task scheduler service to start automatically. Reliability Monitor uses data provided by the RACAgent scheduled task, a pre-defined task that runs by default on a new installation of Windows Vista. The seamless integration between the Task Scheduler user interface and the Event Viewer allows an event-triggered task to be created with just five clicks.

In addition to events, the Task Scheduler in Windows Vista / Server 2008 supports a number of other new types of triggers, including triggers that launch tasks at machine idle, startup, or logon. Because you need Task Scheduler to collect reliability monitor data, you need to you need to configure the Task scheduler service to start automatically.

Reference: 
Network Monitor 3.1 OneClick ... now what? / Task Scheduler Changes in Windows Vista and Windows Server 2008 - Part One http://blogs.technet.com/askperf/

Reference: 
What allows the Reliability Monitor to display data?
http://www.petri.co.il/reliability_monitor_windows_vista.htm


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-121 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-121" Exam

Designing and Providing Microsoft Volume License Solutions to Small and Medium Organizations

 Question 1.
You need to propose the most cost-effective licensing solution for Courseware Publishers.

What should you do? (Choose TWO.)

A. Propose that the company obtain user client access licenses (CALs).
B. Propose that the company obtain device client access licenses (CALs).
C. Propose that the company obtain Windows Server 2003 licensed in Per User mode.
D. Propose that the company obtain Windows Server 2003 licensed in Per Server mode.

Answer: B, D

Question 2
You need to propose the best licensing solution for Courseware Publishers. 

What should you do?

A. Propose license acquisition through an Open Business agreement.
B. Propose license acquisition through an Open Volume agreement.
C. Propose license acquisition through a Select License agreement.
D. Propose license acquisition through an Original Equipment Manufacturer (OEM) channel.

Answer: A

Question 3.
You are busy sorting out the licensing for the computers at Courseware Publishers. You need to determine which computers at Courseware Publishers are qualified desktops.

Which of the following would be qualified desktops?

A. All computers and mobile devices.
B. All computers that the company uses for work purposes and are able to run enterprise products.
C. All computers that are bought by the company during the term of its licensing agreement.
D. All computers that are running a Microsoft Windows operating system.
E. Not the computers that are running as a server, computers running line-of-business software only, and systems running an embedded operating system.

Answer: B, E

Question 4.
The owner of Courseware Publishers wants to know which license agreement offers downgrade rights in case the company wants to downgrade CP-SR01.

What would you reply?

A. All agreements on Select License agreements, Open License agreements and Software Assurance agreements.
B. Only Original Equipment Manufacturer (OEM) licenses.
C. Small Business Server Client Access Licenses and Open License agreements.
D. User client access licenses, Open License agreements and Software Assurance agreements.

Answer: A

Question 5.
The Courseware Publishers CEO wants to know what the main factors are that would require the company to change its licensing acquisition process. 

What would you reply?

A. Budget considerations and licensing management concerns.
B. The upgrading to Windows Server 2003.
C. The need to hire two additional full-time employees and licensing management concerns.
D. The upgrading to Windows Server 2003 and Access 2003 and the desktops to Office 2003 Professional.

Answer: A

Question 6.
Should Courseware Publishers acquire license through an Open Business agreement that includes Software Assurance, how much time will the company have to renew only the Software Assurance agreement once the Open Business agreement expires.

A. 10 days after the Open Business agreement expires.
B. 60 days after the Open Business agreement expires.
C. 90 days after the Open Business agreement expires.
D. 2 months after the Open Business agreement expires.
E. 6 months after the Open Business agreement expires.

Answer: C

Topic 2, City Central, Inc., Scenario
You work as a Microsoft licensing specialist at ITCertKeys.com. ITCertKeys.com has a customer named City Central, Inc.

Company Background
City Central, Inc is a 10 year old company provides personnel placement for small businesses. The company currently has 50 employees that are spread across four departments named Sales, Marketing, Recruitment and Finance. The company is currently experiencing an annual growth rate of 10% and expects this to continue over the next five years. Due to the expected growth of the company, City Central, Inc has hired an IT administrator named Clive Wilson. Clive Wilson will evaluate the current network environment and will develop a plan to support the company's expected growth.

Existing Network
The City Central, Inc network contains three Microsoft Windows NT Server 4.0 server computers named CC-SR01, CC-SR02 and CC-SR03 and 60 client computers. CC-SR03 is configured as a Mail server that runs Microsoft Exchange Server. Hardware and software for the client computers have been added as required by each department with no centralized control. The client computer distribution is as follows: 
* The Recruitment department has 20 Windows XP Professional client computers that run Microsoft Office XP Professional. These client computers were purchased a year ago.
* The Sales department has 15 Windows 98 client computers that run Microsoft Office 97.
* The Marketing department has 21 Windows 98 client computers that do not meet the minimum requirements for Windows XP Professional or Microsoft Office 2003 Professional.
* The Finance department has 4 Windows 98 client computers that run third-party finance application. The third-party finance application cannot run on Windows 2000 Professional or Windows XP Professional.

Current Licensing Solution
Clive Wilson cannot identify the ownership of the software that is in use as the purchase records for the current software are incomplete.

Business Goals
City Central, Inc wants greater control over IT costs but also wants to stay up to date with the latest software.
The company wants to replace CC-SR01, CC-SR02 and CC-SR03 with one server named CC-SR04. CC-SR04 will run Microsoft Small Business Server 2003. The company also wants to standardize the client computers, except those in the Finance department, to Windows XP Professional and Office 2003 Professional.

Question 7.
You need to propose a licensing solution for City Central, Inc. 

Which of the following issues would you need to resolve before you can propose a license solution?

A. Are there any remote or mobile users?
B. How much does the company want to spend?
C. What version of Exchange Server is currently in use?
D. For which products does the company have a Software Assurance agreement?
E. What third-part software is the company using?

Answer: A

Question 8.
You want to implement a license agreement that would allow City Central, Inc to standardize the client computers without activating them.

What should you do?

A. Obtain licenses and Software Assurance for the Windows XP Professional and Office 2003 Professional.
B. Obtain licenses and acquire a Software Assurance agreement from an Original Equipment Manufacturer (OEM).
C. Obtain a Software Assurance agreement for the client computers.
D. Obtain a Services Provider Licensing Agreement (SPLA) to run Windows XP Professional and Office 2003 Professional.

Answer: B

Question 9.
Should Clive Wilson replace the client computers in the Marketing department with new client computers from an Original Equipment Manufacturer (OEM) channel with Windows XP Professional and Office 2003 Professional preinstalled, what would be the most suitable licensing solution for all client computers at City Central, Inc?

A. Obtain licenses and Software Assurance agreements for the Windows XP Professional upgrade and Office 2003 Professional for the client computers in the Recruitment and the Sales departments.
B. Obtain licenses and Software Assurance agreements for Office 2003 Professional for the Marketing department's new client computers.
C. Obtain licenses and Software Assurance agreements for the Windows XP Professional and Office 2003 Professional upgrade for the client computers in the Sales department.
D. Obtain Software Assurance agreements only for the Marketing department's new client computers.
E. Obtain Software Assurance agreements only for the client computers in the Recruitment department.

Answer: A, D

Question 10.
Which of the following server solutions would you recommend at the end of three years?

A. Obtain another server running the latest version of Small Business Server.
B. Obtain a suitable Transition Pack and Transition Client Access Licenses (CALs).
C. Obtain additional Small Business Server Client Access Licenses (CALs).
D. Obtain a new Small Business Server license and appropriate client access licenses (CALs).

Answer: B



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-122 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-122" Exam

Designing and Providing Microsoft Volume License Solutions to Large Organizations

 Question 1.
You work as a Microsoft licensing specialist at ITCertKeys.com. ITCertKeys.com consists of a Sales department and a Marketing department. The Sales department has 500 Windows XP Professional client computers while the Marketing department has 200 Windows 2000 Professional client computers. The licenses for the client computers in the Sales department have Software Assurance and were obtained under a Select License agreement. ITCertKeys.com wants to standardize all client computers on the latest version of Windows. However, the Marketing department uses an in-house accounting application that is not compatible with Windows XP Professional.

What should you suggest is a cost-effective license solution for the Marketing department?

A. Use ITCertKeys.com's Select License agreement and obtain a Virtual PC 2004 licenses.
B. Acquire licenses and Software Assurance for Windows 2000 Professional in Sales department.
C. Acquire only Software Assurance for the Sales department, which are licensed for Windows XP Professional.
D. Use the Independent Software Vendor (ISV) Royalty Licensing Program for the custom software solutions and obtain a Services Provider Licensing Agreement (SPLA) for Windows 2000 Professional.

Answer: A

Question 2.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com consists of two department named Research and Finance. ITCertKeys.com has hired a new technician named Mia Hamm. Mia Hamm wants to know which offers downgrade rights.

A. All agreements on Select License, Open License and also Software Assurance.
B. Original Equipment Manufacturer (OEM) licenses.
C. Small Business Server Client Access Licenses.
D. User client access licenses

Answer: A

Question 3.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A ITCertKeys.com customer named Rory Allen as contact you. Their company named AB Motors Software Assurance is expiring today. Currently AB Motors has and an Enterprise 5.x Agreement, a Select 5.x License agreement with Software Assurance. Rory Allen wants to know the time-window in which to renew the Software Assurance.

What should you tell him?

A. 1 month and 30 days.
B. 2 month.
C. 90 days.
D. 1 month.

Answer: C

Question 4.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A ITCertKeys.com customer named Andy Booth as contact you. You need to calculate the cost per year of Software Assurance for Systems, Applications, and Servers licenses.

What should you do?

A. Calculate 29% of the Systems license price and Applications license price, and 25% of the Servers license price.
B. Calculate 14% of the Systems license price, Applications license price, and of the Servers license price.
C. Calculate 20% of the Systems license price, 25% of the Applications license price, and 30% of the Servers license price.
D. Calculate 10% of the Systems license price, 12% of the Applications license price, and 12% of the Servers license price.

Answer: A

Question 5.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows 2000 Professional. ITCertKeys.com wants to replace the client computers and standardize it to run Microsoft Windows XP Professional and Microsoft Office Professional 2003 without activating the client computers.

Which of the following is the best licensing solution?

A. Obtain licenses and Software Assurance for the Windows XP Professional upgrade and Office 2003 Professional.
B. Use Original Equipment Manufacturer (OEM) to obtain licenses and add Software Assurance.
C. Obtain only Software Assurance for the client computers.
D. Obtain a Services Provider Licensing Agreement (SPLA) to run Windows XP Professional upgrade and Office 2003 Professional.

Answer: B

Question 6.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A ITCertKeys.com customer named Dean Austin as contact you. Dean Austin wants to know more about the Enterprise Agreement. 

With regards to Enterprise Agreement, what is the least amount number of qualified desktops to qualify for it? 

A. 25 desktops.
B. 50 desktops.
C. 100 desktops.
D. 250 desktops.

Answer: D

Question 7.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003. ITCertKeys.com consists of a Sales department. The laptop of ITCertKeys.com is used by the sales representatives that has Office XP Professional preinstalled and is running Microsoft Windows 2000 Professional. ITCertKeys.com is using a Select License agreement, which is in use for 24 months. A few weeks ago, ITCertKeys.com acquired 150 desktops with Windows XP Professional and Office 2003 Professional OEM licenses. The CIO of ITCertKeys.com wants to know which are eligible to be enrolled in Software Assurance.

What should you tell him?

A. The laptop computers with the Select License agreement.
B. The Microsoft Windows 2000 Professional laptops.
C. The laptops and the new desktops.
D. The 150 desktops with Windows XP Professional and Office 2003 Professional OEM licenses.

Answer: D

Question 8.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A ITCertKeys.com customer named Clive Wilson as contact you. Clive Wilson has acquired 50 new client computers that have Microsoft Windows XP Professional preinstalled. The licences of Clive Wilson's company needs to be enroll in Software Assurance.

What is the time limit to enroll these licenses in Software Assurance?

A. 2 months.
B. 1 month.
C. 90 days.
D. 3 months.

Answer: C

Question 9.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com contains 20,000 desktop computers that run Microsoft Office Professional 2003. ITCertKeys.com has quite a few branch offices in Columbia, Germany, Japan and USA. The ITCertKeys.com users need to adjust the user interface languages often. You need to  assign an Enterprise Agreement.

Which of the following language licensing solution should you choose?

A. On the Enterprise Agreement enrolment you should use the All Languages option.
B. Choose the Listed Languages option on the Enterprise Agreement enrolment and the Cross Language use rights.
C. Use the Cross Language use rights in the Enterprise Agreement and the All Languages option.
D. Use the Platform Independent use rights in the Enterprise Agreement and the All Languages option.

Answer: A

Question 10.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A year ago, ITCertKeys.com has signed a Select License agreement. Because of the abundance of the license acquisitions, ITCertKeys.com had qualified for Select Level B in the Server pool. Last week ITCertKeys.com only purchased only 780 points in the Server pool.

How will the licensing agreement be affected?

A. ITCertKeys.com need to assign a new enrollment under the name.
B. ITCertKeys.com will be re-leveled to Select Level A.
C. ITCertKeys.com needs to purchase software under its current agreement until the agreement expires.
D. ITCertKeys.com must re-negotiate the Select License agreement and must forecast Select  Level A.

Answer: B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-236 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-236" Exam

Configuring Exchange Server 2007

 Question 1.
You work as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. The Active Directory structure of ITCertKeys.com consists of a root domain and a single child domain. The root domain is in ITCertKeys1 and the child domain in ITCertKeys2. You are in the process of installing Exchange Server 2007 in the child domain. In order to accomplish this task you decide to run the Setup /PrepareADcommand in the root domain. In your solution you need to ensure that Exchange can be installed on the child domain as well.

What should you do? (Each correct answer presents a complete solution. Choose TWO.)

A. You should run the Setup /ForestPrep command in the root domain.
B. You should run the Setup /PrepareAllDomains command in the root domain.
C. You should run the Setup /PrepareDomain command in the root domain.
D. You should run the Setup /PrepareDomain command in the child domain.

Answer: B, D

Question 2.
You work as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. The Active Directory forest of ITCertKeys.com contains a single site named ITCertKeys A. ITCertKeys A consists of a root domain and a single child domain. You have received instruction from the CIO to prepare the Active Directory as well as the domains. This task needs to be accomplished before you install the Exchange Server 2007
server. 

What should you do? (Each correct answer presents part of the solution. Choose TWO.)

A. You should run the Setup /PrepareAllDomains command.
B. You should run the Setup /ForestPrep command.
C. You should run the Setup /PrepareAD command.
D. You should run the Setup /DomainPrep command.

Answer: A, C

Question 3.
You are employed as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange 2007 Organization. ITCertKeys.com has its headquarters in StoITKholm where you are located. Due to company growth ITCertKeys.com opens a branch office in Athens and hires another administrator named Amy Wilson. You have received instruction from the CIO to configure the least amount permissions necessary for Amy Wilson who must be enabled to prepare Active Directory for Exchange Server 2007. 

What should you do?

A. You must add the user account of the administrator to an Enterprise Admins group. You must add the administrator to an Exchange Full Administrator at the organizational level.
B. You must add the user account of the administrator to the Exchange Enterprise Server group.
    You must add the user account of the administrator to the Domain Admins group.
C. You must add the user account of the administrator to an Enterprise Admins group. You must   add the user account of the administrator to a Schema Admins group.
D. You must add the user account of the administrator to the Domain Admins group. You must add the administrator to an Exchange Full Administrator at the organizational level.

Answer: C

Question 4.
You are employed as the exchange administrator at ITCertKeys.com. The ITCertKeys.com Exchange Server network has just been migrated to Exchange Server 2007. You are responsible for managing the Exchange network for ITCertKeys.com. Every mailbox server on the ITCertKeys.com network is configured with two storage groups as well as two databases for each of the storage groups. You have received instruction from the CIO to ensure that the ITCertKeys.com Exchange Server network is fault tolerant. You thus decide to implement local continuous replication (LCR). Now you need to configure the Mailbox server with LCR.

What should you do?

A. First change the ratio to a single database per storage group.
    Then run the Enable-DatabaseCopy cmdlet.
    Then run the Enable-StorageGroupCopy cmdlet.
B. First run the Disable-StorageGroupCopy cmdlet.
    Then change the databases into a single storage group.
    Then run the Enable-StorageGroupCopy cmdlet.
C. First change the database ratio to a single database per storage group.
    Then run the Disable-StorageGroupCopy cmdlet.
    Then run the Enable-DatabaseCopy cmdlet.
D. First run the Disable-StorageGroupCopy cmdlet.
    Then change the databases ratio into a single storage group.
    Then run the Enable-DatabaseCopy cmdlet.

Answer: A

Question 5.
You are employed as the exchange administrator at ITCertKeys.com. You are in the process of installing a new Exchange Server 2007 Organization. The native Exchange Server 2007 environment of ITCertKeys.com has the following server roles installed:
* One Edge Transport server named ITCertKeys-EX01
* One Hub Transport server named ITCertKeys-EX02
You have received instruction from the CIO to configure the e-mail routing. In your solution you need to ensure that ITCertKeys-EX01 is configured is such a way so as to route e-mail between the Exchange organization and the Internet; and that ITCertKeys-EX02 is configured in such a way so as to route Internet e-mail to ITCertKeys-EX01.

What should you do? (Each correct answer presents part of the solution. Choose TWO.)

A. On ITCertKeys-EX02, first open the Exchange Management Console.
    Then import the Edge Subscription file.
B. On ITCertKeys-EX01, first create a new Send connector named ITKEdge - Internet.
    Then add the *domain as an address space and specify to use DNS to route e-mail automatically. Then add ITCertKeys-EX01 as a source server.
C. On ITCertKeys-EX02, first create a new Send connector named ITKHub.
    Then add the *domain as an address space and specify to use DNS to route e-mail automatically. Then add ITCertKeys-EX02 as a source server.
D. On ITCertKeys-EX01, first open the Exchange Management Shell.
    Then export a new Edge Subscription file.

Answer: A, D

Question 6.
You work as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. You are responsible for managing the Exchange network for ITCertKeys.com. You are currently preparing your Exchange 2007 organization in order to install the Mailbox server role on a newly purchased Exchange Server 2007 server named ITCertKeys-EX10. You have received instruction from the CIO to ensure that the ITCertKeys-EX10 read and write performance is optimal. In addition you also need to implement redundancy on ITCertKeys-EX10. You thus have to choose the appropriate type of array on which the mailbox database should be placed. 

What should you do?

A. Make use of a dedicated RAID 10 array.
B. Make use of a dedicated RAID 0 array.
C. Make use of a dedicated RAID 1 array.
D. Make use of a RAID 1 array that contains the operating system partition.

Answer: A

Question 7.
You are employed as the exchange administrator at ITCertKeys.com. You are in the process of converting your Exchange 2000 Server environment to Exchange Server 2007. The ITCertKeys.com network contains a Windows 2000 native mode Active Directory domain as well as an Exchange 2000 organization. The Exchange 2000 organization is configured to run in mixed mode. You have been informed by the CIO that the schema master, the domain naming master as well as the PDC emulator all run on a Microsoft Windows 2000 Server domain controller. You receive instructions to prepare the environment for Exchange 2007.

What should you do? (Each correct answer presents part of the solution. Choose TWO.)

A. You should change the mixed mode Exchange 2000 organization to native mode.
B. You should move the PDC emulator role to a Windows Server 2003 domain controller that has Service PaITK 1 installed.
C. You should move the schema master role to a Windows Server 2003 domain controller that has Service PaITK 1.
D. You should move the domain naming master role to a Windows Server 2003 domain controller that has Service PaITK 1.

Answer: A, C

Question 8.
You are employed as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange 2007 Organization. You are responsible for managing the Exchange network for ITCertKeys.com. You decide to install a two-node Single Copy Cluster (SCC) Mailbox server on the Exchange Server 2007 organization of ITCertKeys.com. You then name the network adapters ITKPublic and ITKPrivate. You have received instruction from the CIO to configure the TCP/IP binding order for the cluster servers.

What should you do?

A. You should move the Public connection to the top of the Adapters and Bindings tab.
B. You should move the Private connection to the top of the Adapters and Bindings tab.
C. You should open the properties of the cluster and move the ITKPrivate network to the top of the Network Priority tab.
D. You should open the properties of the cluster and move the ITKPublic network to the top of the Network Priority tab.

Answer: B

Question 9.
You are employed as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. ITCertKeys.com has its headquarters in Chicago and a branch office in Dallas. You have been assigned to the Dallas site office. Your instructions are to install Exchange Server 2007 on the new server. To ensure that no problems occur that might hinder the users of the Dallas site to perform their duties you decide to install the required components on the new server before you install Exchange Server 2007.

What should you do? (Each correct answer presents part of the solution. Choose THREE.)

A. Install Windows PowerShell 1.0.
B. Install Network News Transfer Protocol (NNTP).
C. Install Simple Mail Transfer Protocol (SMTP).
D. Install Microsoft Management Console (MMC) 3.0.
E. Install Microsoft .NET Framework 1.1.
F. Install Microsoft .NET Framework 2.0

Answer: A, D, F

Question 10.
You work as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. You are responsible for managing the Exchange network for ITCertKeys.com. The ITCertKeys.com network contains a stand-alone server named ITCertKeys-EX01. You have received instruction from the CIO to install the appropriate Exchange Server 2007 server role on ITCertKeys-EX01.

What should you do?

A. The Hub Transport server role should be installed on ITCertKeys-EX01.
B. The Mailbox server role should be installed on ITCertKeys-EX01.
C. The Client Access server role should be installed on ITCertKeys-EX01.
D. The Edge Transport server role should be installed on ITCertKeys-EX01.

Answer: D


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.