Quantcast
Channel: Free Download Updated PassLeader Exam Dumps
Viewing all 1919 articles
Browse latest View live

[Pass Ensure VCE Dumps] PassLeader 70-640 PDF And VCE Dumps For Free Download (261-280)

$
0
0

Where To Get The 100% Valid 70-640 exam dumps? Come to PassLeader! Here you can get the latest version 70-640 PDF dumps or VCE dumps, we guarantee our 651q 70-640 exam questions are the latest and you will get all the new questions and answers, which are not available on other wesites now! Now try our best 70-640 exam dumps with VCE and you will acquire your 70-640 certification exam immediately.

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 261
Your network contains an Active Directory forest. The forest contains an Active Directory site for a remote office. The remote site contains a read-only domain controller (RODC). You need to configure the RODC to store only the passwords of users in the remote site. What should you do?

A.    Create a Password Settings object (PSO).
B.    Modify the Partial-Attribute-Set attribute of the forest.
C.    Add the user accounts of the remote site users to the Allowed RODC Password Replication Group.
D.    Add the user accounts of users who are not in the remote site to the Denied RODC Password Replication Group.

Answer: C

QUESTION 262
Your company has four offices. The network contains a single Active Directory domain. Each office has a domain controller. Each office has an organizational unit (OU) that contains the user accounts for the users in that office. In each office, support technicians perform basic troubleshooting for the users in their respective office. You need to ensure that the support technicians can reset the passwords for the user accounts in their respective office only. The solution must prevent the technicians from creating user accounts. What should you do?

A.    For each OU, run the Delegation of Control Wizard.
B.    For the domain, run the Delegation of Control Wizard.
C.    For each office, create an Active Directory group, and then modify the security settings for each group.
D.    For each office, create an Active Directory group, and then modify the controlAccessRights attribute for each group.

Answer: A

QUESTION 263
Your network contains a single Active Directory domain. Client computers run either Windows XP Service Pack 3 (SP3) or Windows 7. All of the computer accounts for the client computers are located in an organizational unit (OU) named OU1. You link a new Group Policy object (GPO) named GPO10 to OU1. You need to ensure that GPO10 is applied only to client computers that run Windows 7. What should you do?

A.    Create a new OU in OU1. Move the Windows XP computer accounts to the new OU.
B.    Enable block inheritance on OU1.
C.    Create a WMI filter and assign the filter to GPO10.
D.    Modify the permissions of OU1.

Answer: C

QUESTION 264
Your network contains an Active Directory domain named contoso.com. You need to audit changes to a service account. The solution must ensure that the audit logs contain the before and after values of all the changes. Which security policy setting should you configure?

A.    Audit Sensitive Privilege Use
B.    Audit User Account Management
C.    Audit Directory Service Changes
D.    Audit Other Account Management Events

Answer: C

QUESTION 265
Your network contains two Active Directory forests named contoso.com and nwtraders.com. Active Directory Rights Management Services (AD RMS) is deployed in each forest. You need to ensure that users from the nwtraders.com forest can access AD RMS protected content in the contoso.com forest. What should you do?

A.    Add a trusted user domain to the AD RMS cluster in the nwtraders.com domain.
B.    Create an external trust from nwtraders.com to contoso.com.
C.    Add a trusted user domain to the AD RMS cluster in the contoso.com domain.
D.    Create an external trust from contoso.com to nwtraders.com.

Answer: C

QUESTION 266
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 is configured as an Active Directory Federation Services (AD FS) 2.0 standalone server. You plan to add a new token-signing certificate to Server1. You import the certificate to the server as shown in the exhibit. (Click the Exhibit button.)

When you run the Add Token-Signing Certificate wizard, you discover that the new certificate is unavailable. You need to ensure that you can use the new certificate for AD FS. What should you do?

A.    From the properties of the certificate, modify the Certificate Policy OIDs setting.
B.    Import the certificate to the AD FS 2.0 Windows Service personal certificate store.
C.    From the properties of the certificate, modify the Certificate purposes setting.
D.    Import the certificate to the local computer personal certificate store.

Answer: D

QUESTION 267
You need to purge the list of user accounts that were authenticated on a read-only domain controller (RODC). What should you do?

A.    Run the repadmin.exe command and specify the /prp parameter.
B.    From Active Directory Sites and Services, modify the properties of the RODC computer object.
C.    From Active Directory Users and Computers, modify the properties of the RODC computer object.
D.    Run the dsrm.exe command and specify the -u parameter.

Answer: A

QUESTION 268
Your company has a main office and four branch offices. An Active Directory site exists for each office. Each site contains one domain controller. Each branch office site has a site link to the main office site. You discover that the domain controllers in the branch offices sometimes replicate directly to each other. You need to ensure that the domain controllers in the branch offices only replicate to the domain controller in the main office. What should you do?

A.    Modify the firewall settings for the main office site.
B.    Disable the Knowledge Consistency Checker (KCC) for each branch office site.
C.    Disable site link bridging.
D.    Modify the security settings for the main office site.

Answer: C

QUESTION 269
Your network contains an Active Directory forest. The forest contains one domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2008 R2. DC1 was installed before DC2. DC1 fails. You need to ensure that you can add 1,000 new user accounts to the domain. What should you do?

A.    Modify the permissions of the DC2 computer account.
B.    Seize the schema master FSMO role.
C.    Configure DC2 as a global catalog server.
D.    Seize the RID master FSMO role.

Answer: D

QUESTION 270
Your network contains an Active Directory domain named contoso.com. You need to identify whether the Active Directory Recycle Bin is enabled. What should you do?

A.    From Ldp, search for the Reanimate-Tombstones object.
B.    From Ldp, search for the LostAndFound container.
C.    From Windows PowerShell, run the Get-ADObject cmdlet.
D.    From Windows PowerShell, run the Get-ADOptionalFeature cmdlet.

Answer: D


http://www.passleader.com/70-640.html

QUESTION 271
Your network contains an Active Directory domain. You create and mount an Active Directory snapshot. You run dsamain.exe as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can browse the contents of the Active Directory snapshot. What should you?

A.    Stop Active Directory Domain Services (AD DS), and then rerun dsamain.exe.
B.    Change the value of the dbpath parameter, and then rerun dsamain.exe.
C.    Change the value of the ldapport parameter, and then rerun dsamain.exe.
D.    Restart the Volume Shadow Copy Service (VSS), and then rerun dsamain.exe.

Answer: B

QUESTION 272
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 and a domain controller named DC1. On Server1, you configure a collector-initiated subscription for the Application log of DC1. The subscription is configured to collect all events. After several days, you discover that Server1 failed to collect any events from DC1, although there are more than 100 new events in the Application log of DC1. You need to ensure that Server1 collects events from DC1. What should you do?

A.    On Server1, run wecutil quick-config.
B.    On Server1, run winrm quickconfig.
C.    On DC1, run wecutil quick-config.
D.    On DC1, run winrm quickconfig.

Answer: D

QUESTION 273
A network contains an Active Directory Domain Services (AD DS) domain. Active Directory is configured as shown in the following table.

The functional level of the domain is Windows Server 2008 R2. The functional level of the forest is Windows Server 2003. Active Directory replication between the Seattle site and the Chicago site occurs from 8:00 P.M. to 1:00 A.M. every day. At 7:00 A.M. an administrator deletes a user account while he is logged on to DC001. You need to restore the deleted user account. You must achieve this goal by using the minimum administrative effort. What should you do?

A.    On DC006, stop AD DS, perform an authoritative restore, and then start AD DS.
B.    On DC001, run the Restore-ADObject cmdlet.
C.    On DC006, run the Restore-ADObject cmdlet.
D.    On DC001, stop AD DS, restore the system state, and then start AD DS.

Answer: A

QUESTION 274
Your network contains an Active Directory domain. The domain is configured as shown in the exhibit.

You have a Group Policy Object (GPO) linked to the domain. You need to ensure that the settings in the GPO are not processed by user accounts or computer accounts in the Finance organizational unit (OU). You must achieve this goal by using the minimum amount of administrative effort. What should you do?

A.    Modify the Group Policy permissions.
B.    Configure WMI filtering.
C.    Enable block inheritance.
D.    Enable loopback processing in replace mode.
E.    Configure the link order.
F.    Configure Group Policy Preferences.
G.    Link the GPO to the Human Resources OU.
H.    Configure Restricted Groups.
I.    Enable loopback processing in merge mode.
J.    Link the GPO to the Finance OU.

Answer: C

QUESTION 275
Your network contains an Active Directory domain named contoso.com. You have an organizational unit (OU) named Sales and an OU named Engineering. You have two Group Policy Objects (GPOs) named GPO1 and GPO2. GPO1 and GPO2 are linked to the Sales OU and contain multiple settings. You discover that GPO2 has a setting that conflicts with a setting in GPO1. When the policies are applied, the setting in GPO2 takes effect. You need to ensure that the settings in GPO1 supersede the settings in GPO2. The solution must ensure that all non-conflicting settings in both GPOs are applied. What should you do?

A.    Configure Restricted Groups.
B.    Configure the link order.
C.    Link the GPO to the Sales OU.
D.    Link the GPO to the Engineer OU.
E.    Enable loopback processing in merge mode.
F.    Modify the Group Policy permissions.
G.    Configure WMI filtering.
H.    Configure Group Policy Permissions.
I.    Enable loopback processing in replace mode.
J.    Enable block inheritance.

Answer: B

QUESTION 276
All vendors belong to a global group named vendors. You place three file servers in a new organizational unit (OU) named ConfidentialFileServers. The three file servers contain confidential data located in shared folders. You need to record any failed attempts made by the vendors to access the confidential data. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Create a new Group Policy Object (GPO) and link it to the CONFIDENTIALFILESERVERS OU.
Configure the Audit object access failure audit policy setting.
B.    Create a new Group Policy Object (GPO) and link it to the CONFIDENTIALFILESERVERS OU.
Configure the Audit privilege use Failure audit policy setting.
C.    On each shared folder on the three file servers, add the Vendors global group to the Auditing tab.
Configure Failed Full control setting in the AuditingEntry dialog box.
D.    On each shared folder on the three file servers, add the three servers to the Auditing tab.
Configure Failed Full control setting in the AuditingEntry dialog box.
E.    Create a new Group Policy Object (GPO) and link it to the CONFIDENTIALFILESERVERS OU.
Configure the Deny access to this computer from the network user rights setting for the Vendors global group.

Answer: AC

QUESTION 277
A corporate network includes a single Active Directory Domain Services (AD DS) domain. The HR department has a dedicated organizational unit (OU) named HR. The HR OU has two sub-OUs: HR Users and HR Computers. User accounts for the HR department reside in the HR Users OU. Computer accounts for the HR department reside in the HR Computers OU. All HR department employees belong to a security group named HR Employees. All HR department computers belong to a security group named HR PCs. Company policy requires that passwords are a minimum of 6 characters. You need to ensure that, the next time HR department employees change their passwords, the passwords are required to have at least 8 characters. The password length requirement should not change for employees of any other department. What should you do?

A.    Modify the password policy in the GPO that is applied to the domain.
B.    Create a new GPO, with the necessary password policy, and link it to the HR Users OU.
C.    Create a fine-grained password policy and apply it to the HR Users OU.
D.    Modify the password policy in the GPO that is applied to the domain controllers OU.

Answer: C

QUESTION 278
A corporate network includes a single Active Directory Domain Services (AD DS) domain. All regular user accounts reside in an organisational unit (OU) named Employees. All administrator accounts reside in an OU named Admins. You need to ensure that any time an administrator modifies an employee’s name in AD DS, the change is audited. What should you do first?

A.    Create a Group Policy Object with the Audit directory service access setting enabled and link it to the Employees OU.
B.    Modify the searchFlags property for the Name attribute in the Schema.
C.    Create a Group Policy Object with the Audit directory service access setting enabled and link it to the Admins OU.
D.    Use the Auditpol.exe command-line tool to enable the directoryservicechanges auditing subcategory.

Answer: D

QUESTION 279
Your network contains an Active Directory forest named contoso.com. You need to provide a user named User1 with the ability to create and manage subnet objects. The solution must minimize the number of permissions assigned to User1. What should you do?

A.    From Active Directory Users and Computers, run the Delegation of Control wizard.
B.    From Active Directory Administrative Centre, add User1 to the Schema Admins group.
C.    From Active Directory Sites and Services, run the Delegation of Control wizard.
D.    From Active Directory Administrative Centre, add User1 to the Network Configuration Operators group.

Answer: C

QUESTION 280
A corporate network contains a Windows Server 2008 R2 Active Directory forest. You need to add a User Principle Name (UPN) suffix to the forest. What tool should you use?

A.    Dsmgmt.
B.    Active Directory Domains and Trusts console.
C.    Active Directory Users and Computers console.
D.    Active Directory Sites and Services console.

Answer: B


http://www.passleader.com/70-640.html


[Pass Ensure VCE Dumps] Learning PassLeader Free 651q 70-640 Exam Questions To Pass Exam with Great Ease (281-300)

$
0
0

Where To Get The 100% Valid 70-640 exam dumps? Come to PassLeader! Here you can get the latest version 70-640 PDF dumps or VCE dumps, we guarantee our 651q 70-640 exam questions are the latest and you will get all the new questions and answers, which are not available on other wesites now! Now try our best 70-640 exam dumps with VCE and you will acquire your 70-640 certification exam immediately.

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 281
Your network contains a single Active Directory domain that has two sites named Site1 and Site2. Site1 has two domain controllers named DC1 and DC2. Site2 has two domain controllers named DC3 and DC4. DC3 fails. You discover that replication no longer occurs between the sites. You verify the connectivity between DC4 and the domain controllers in Site1. On DC4, you run repadmin.exe /kcc. Replication between the sites continues to fail. You need to ensure that Active Directory data replicates between the sites. What should you do?

A.    From Active Directory Sites and Services, configure the NTDS Site Settings of Site2.
B.    From Active Directory Sites and Services, configure DC3 so it is not a preferred bridgehead server.
C.    From Active Directory Users and Computers, configure the NTDS settings of DC4.
D.    From Active Directory Users and Computers, configure the location settings of DC4.

Answer: B

QUESTION 282
Your network contains an Active Directory domain named contoso.com. All domain controllers were upgraded from Windows Server 2003 to Windows Server 2008 R2 Service Pack 1 (SP1). The functional level of the domain is Windows Server 2003. You need to configure SYSVOL to use DFS Replication. Which tools should you use? (Each correct answer presents part of the solution. Choose two.)

A.    Dfsrmig
B.    Frsdiag
C.    Ntdsutil
D.    Set-ADForest
E.    Repadmin
F.    Set-ADDomainMode
G.    DFS Management

Answer: AF

QUESTION 283
You manage an Active Directory forest named contoso.com. The forest contains an empty root domain named contoso.com and a child domain named child.contoso.com. All domain controllers run Windows Server 2008. The functional level of the forest is Windows Server 2008. You need to raise the functional level of the forest to Windows Server 2008 R2. You must achieve this goal by using the minimum amount of administrative effort. What should you do? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:

QUESTION 284
Your network contains an Active Directory forest. The forest contains one domain named contoso.com. You attempt to run adprep /domainprep and the operation fails. You discover that the first domain controller deployed to the forest failed. You need to run adprep /domainprep successfully. What should you do?

A.    Move the domain naming master role.
B.    Install a read-only domain controller (RODC).
C.    Move the PDC emulator role.
D.    Move the RID master role.
E.    Move the infrastructure master role.
F.    Deploy an additional global catalog server.
G.    Move the bridgehead server.
H.    Move the schema master role.
I.    Restart the Active Directory Domain Services (AD DS) service.
J.    Move the global catalog server.

Answer: E

QUESTION 285
Your network contains an Active Directory forest. The forest contains one domain named contoso.com. You discover the following event in the Event log of client computers: “The time provider NtpClient was unable to find a domain controller to use as a time source. NtpClient will try again in %1 minutes.” You need to ensure that the client computers can synchronize their clocks properly. What should you do?

A.    Move the domain naming master role.
B.    Restart Active Directory Domain Services (AD DS) service.
C.    Move the PDC emulator role.
D.    Move the infrastructure master role.
E.    Move the global catalog server.
F.    Move the RID master role.
G.    Move the bridgehead server.
H.    Move the schema master role.
I.    Deploy an additional global catalog server.
J.    Install a read-only domain controller (RODC).

Answer: C

QUESTION 286
Your network contains an Active Directory forest named contoso.com. The functional level of the forest is Windows Server 2008 R2. The DNS zone for contoso.com is Active Directory-integrated. You deploy a read-only domain controller (RODC) named RODC1. You install the DNS Server server role on RODC1. You discover that RODC1 does not have any application directory partitions. You need to ensure that RODC1 has a copy of the DNS application directory partition of contoso.com. What should you do?

A.    From DNS Manager, create secondary zones.
B.    Run Dnscmd.exe, and specify the /enlistdirectorypartition parameter.
C.    From DNS Manager, right-click RODC1 and click Update Server Data Files.
D.    Run Dnscmd.exe and specify the /createbuiltindirectorypartitions parameter.

Answer: B

QUESTION 287
Your network contains an Active Directory forest named contoso.com. You need to identify whether a fine-grained password policy is applied to a specific group. Which tool should you use?

A.    Credential Manager
B.    Group Policy Management Editor
C.    Active Directory Users and Computers
D.    Active Directory Sites and Services

Answer: C

QUESTION 288
Your network contains an Active Directory domain named contoso.com. You need to create one password policy for administrators and another password policy for all other users. Which tool should you use?

A.    Group Policy Management Editor
B.    Group Policy Management Console (GPMC)
C.    Authorization Manager
D.    Ldifde

Answer: D

QUESTION 289
Your network contains two Active Directory forests named contoso.com and fabrikam.com. Each forest contains one domain. A two-way forest trust exists between the forests. You plan to add users from fabrikam.com to groups in contoso.com. You need to identify which group you must use to assign users in fabrikam.com access to the shared folders in contoso.com. To which group should you add the users?

A.    Group 1: Security Group – Domain Local.
B.    Group 2: Distribution Group – Domain Local.
C.    Group 3: Security Group – Global.
D.    Group 4: Distribution Group – Global.
E.    Group 5: Security Group – Universal.
F.    Group 6: Distribution Group – Univeral.

Answer: E

QUESTION 290
Your network contains an Active Directory domain. The domain contains 5,000 user accounts. You need to disable all of the user accounts that have a description of Temp. You must achieve this goal by using the minimum amount of administrative effort. Which tools should you use? (Each correct answer presents part of the solution. Choose two.)

A.    Find
B.    Dsget
C.    Dsmod
D.    Dsadd
E.    Net accounts
F.    Dsquery

Answer: CF


http://www.passleader.com/70-640.html

QUESTION 291
Your network contains an Active Directory domain. The domain contains two file servers. The file servers are configured as shown in the following table.

You create a Group Policy object (GPO) named GPO1 and you link GPO1 to OU1. You configure the advanced audit policy. You discover that the settings are not applied to Server1. The settings are applied to Server2. You need to ensure that access to the file shares on Server1 is audited. What should you do?

A.    From Active Directory Users and Computers, modify the permissions of the computer account for Server1.
B.    From GPO1, configure the Security Options.
C.    From Active Directory Users and Computers, add Server1 to the Event Log Readers group.
D.    On Server1, run seceditexe and specify the /configure parameter.
E.    On Server1, run auditpol.exe and specify the /set parameter.

Answer: E

QUESTION 292
Your network contains an Active Directory domain named contoso.com. You have an organizational unit (OU) named Sales and an OU named Engineering. Each OU contains over 200 user accounts. The Sales OU and the Engineering OU contain several user accounts that are members of a universal group named Group1. You have a Group Policy object (GPO) linked to the domain. You need to prevent the GPO from being applied to the members of Group1 only. What should you do?

A.    Modify the Group Policy permissions.
B.    Configure Restricted Groups.
C.    Configure WMI filtering.
D.    Configure the link order.
E.    Enable loopback processing in merge mode.
F.    Link the GPO to the Sales OU.
G.    Configure Group Policy Preferences.
H.    Link the GPO to the Engineering OU.
I.    Enable block inheritance.
J.    Enable loopback processing in replace mode.

Answer: A

QUESTION 293
Your network contains an Active Directory domain. You have two Group Policy objects (GPOS) named GPO1 and GPO2. GPO1 and GPO2 are linked to the Finance organizational unit (OU) and contain multiple settings. You discover that GPO2 has a setting that conflicts with a setting in GPO1. When the policies are applied, the setting in GPO2 takes effect. You need to ensure that the settings in GPO1 supersede the settings in GPO2. The solution must ensure that all non-conflicting settings in both GPOs are applied. What should you do?

A.    Configure the link order.
B.    Configure Restricted Groups.
C.    Enable block inheritance.
D.    Link the GPO to the Finance OU.
E.    Enable Ioopback processing in merge mode.
F.    Enable Ioopback processing in replace mode.
G.    Link the GPO to the Human Resources OU.
H.    Configure Group Policy Preferences.
I.    Configure WMI filtering.
J.    Modify the Group Policy permissions.

Answer: A

QUESTION 294
You have a domain controller named DC1 that runs Windows Server 2008 R2. DC1 is configured as a DNS server for contoso.com. You install the DNS server server role on a member server named server1 and then you create a standard secondary zone for contoso.com. You configure DC1 as the master server for the zone. You need to ensure that Server1 receives zone updates from DC1. What should you do

A.    On DC1, modify the permissions of contoso.com zone.
B.    On Server1, add a conditional forwarder.
C.    Add the Server1 computer account to the DNsUpdateProxy group.
D.    On DC1, modify the zone transfer settings for the contoso.com zone.

Answer: D

QUESTION 295
A corporate network includes an Active Directory-integrated zone. AIl DNS servers that host the zone are domain controllers. You add multiple DNS records to the zone. You need to ensure that the new records are available on all DNS servers as soon as possible. Which tool should you use?

A.    Active Directory Sites And Services console
B.    Ntdsutil
C.    Dnslint
D.    Nslookup

Answer: A

QUESTION 296
Your network contains an Active Directory domain named contoso.com. Contoso.com contains two domain controllers named DC1 and DC2. DC1 and DC2 are configured as DNS servers and host the Active Directory-integrated zone for contoso.com. From DNS Manager on DC1, you enable scavenging for the contoso.com zone. You discover stale DNS records in the zone. You need to ensure that the stale DNS records are deleted from contoso.com. What should you do?

A.    From DNS Manager, enable scavenging on DC1.
B.    From DNS Manager, reload the zone.
C.    Run dnscmd.exe and specify the ageallrecords parameter.
D.    Run dnscmd.exe and specify the startscavenging parameter.

Answer: D

QUESTION 297
Your network contains an Active Directory forest. The forest contains one domain named contoso.com. You discover the following event in the Event log of domain controllers:
” The request for a new account-identifier pool failed. The operation will be retried until the request succeeds. The error is ” %1 “”

You need to ensure that the domain controllers can acquire new account-identifier pools successfully. What should you do?

A.    Move the domain naming master role.
B.    Move the global catalog server.
C.    Restart the Active Directory Domain Services (AD DS) service.
D.    Deploy an additional global catalog server.
E.    Move the infrastructure master role.
F.    Move the PDC emulator role.
G.    Install a read-only domain controller (RODC).
H.    Move the RID master role.
I.    Move the bridgehead server.
J.    Move the schema master role.

Answer: H

QUESTION 298
Your network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008 R2 Enterprise. All client computers run Windows 7 Professional. The network contains an enterprise certification authority (CA). You enable key archival on the CA. The CA is configured to use custom certificate templates for Encrypted File System (EFS) certificates. All users plan to encrypt files by using EFS. You need to ensure that the private keys for all new EFS certificates are archived. Which snap-in should you use?

A.    Share and Storage Management
B.    Security Configuration wizard
C.    Enterprise PKI
D.    Active Directory Administrative Center
E.    Certification Authority
F.    Group Policy Management
G.    Certificate Templates
H.    Authorization Manager
I.    Certificates

Answer: E

QUESTION 299
Your network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008 R2 Enterprise. All client computers run Windows 7 Professional. The network contains an enterprise certification authority (CA). You have a custom certificate template named Sales_Temp. Sales_Temp is published to the CA. You need to ensure that all of the members of a group named Sales can enroll for certificates that use Sales_Temp. Which snap-in should you use?

A.    Enterprise PKI
B.    Certification Authority
C.    Share and storage Management
D.    Certificate Templates
E.    Security Configuration Wizard
F.    Authorization Manager
G.    Group Policy Management
H.    Certificates
I.    Active Directory Administrative Center

Answer: D

QUESTION 300
Your network contains an Active Directory forest named adatum.com. All domain controllers currently run Windows Server 2003 Service Pack 2 (SP2). The functional level of the forest and the domain is Windows Server 2003. You need to deploy a read-only domain controller (RODC) that runs Windows Server 2008 R2. What should you do first?

A.    Deploy a writable domain controller that runs Windows Server 2008 R2.
B.    Raise the functional level of the forest to Windows Server 2008.
C.    Run adprep.exe.
D.    Raise the functional level of the domain to Windows Server 2003.

Answer: C


http://www.passleader.com/70-640.html

[Pass Ensure VCE Dumps] Reliable 651q 70-640 Exam Dumps From PassLeader For Free Download (301-320)

$
0
0

How to pass the newest 70-640 exam? What new questions are on the latest 70-640 exam? PassLeader’s best 70-640 VCE and PDF exam dumps/70-640 sample questions will tell you all about the 70-640 exam. For all PassLeader’s 651q 70-640 exam questions are the newest and covered all new added questions and answers, which will help you 100% passing exam. And we PassLeader will continue update 70-640 exam questions and answers, you will never fail the 70-640 exam. Hurry up and get the free VCE Player with your premium 70-640 VCE dumps from passleader.com now!

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 301
Your network contains two Active Directory forests named contoso.com and nwtraders.com. Active Directory Rights Management Services (AD RMS) is deployed in each forest. You need to ensure that users from the nwtraders.com forest can access AD RMS protected content in the contoso.com forest. What should you do?

A.    Add a trusted user domain to the AD RMS cluster in the nwtraders.com domain.
B.    Add a trusted user domain to the AD RMS cluster in the contoso.com domain.
C.    Create an external trust from nwtraders.com to contoso.com.
D.    Create an external trust from contoso.com to nwtraders.corn.

Answer: B

QUESTION 302
Your company plans to open a new branch office. The new office will have a Iow-speed connection to the Internet. You plan to deploy a read-only domain controller (RODC) in the branch office. You need to create an offline copy of the Active Directory database that can be used to install Active Directory on the new RODC. Which commands should you run from Ntdsutil? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:

QUESTION 303
Your network contains an Active Directory forest. All users have a value set for the Department attribute. From Active Directory Users and computers, you search a domain for all users who have a Department attribute value of Marketing. The search returns 50 users. From Active Directory Users and Computers, you search the entire directory for all users who have a Department attribute value of Marketing. The search does not return any users. You need to ensure that a search of the entire directory for users in the marketing department returns all of the users who have the Marketing Department attribute. What should you do?

A.    Install the Windows Search Service role service on a global catalog server.
B.    From the Active Directory Schema snap-in, modify the properties of the Department attribute.
C.    Install the Indexing Service role service on a global catalog server.
D.    From the Active Directory Schema snap-in, modify the properties of the user class.

Answer: B

QUESTION 304
A corporate network includes a single Active Directory Domain Services (AD DS) domain. The AD DS infrastructure is shown in the following graphic.

When the Montreal site domain controller is offline, authentication requests for Montreal branch office users are sent to the Toronto site domain controller. You need to ensure that when the Montreal Site domain controller is offline, authentication requests for Montreal branch office users are sent to the Quebec City site domain controller. What should you do?

A.    Create a site link bndge between the Montreal site and the Quebec City site.
B.    Enable the global catalog role on the Montreal site domain controller.
C.    Modify the Default Domain Policy Group Policy Object.
D.    Delete the Toronto-Montreal Site Link

Answer: C

QUESTION 305
A corporate environment includes two Active Directory Domain Services (AD DS) forests, as shown in the following table.

You need to ensure that users in the contoso.com domain can access resources in the eng.fabrikam.com domain. What should you do?

A.    Enable selective authentication.
B.    Enable forest-wide authentication.
C.    Create an external trust between contoso.com and eng.fabrikam.com.
D.    Enable domain-wide authentication.

Answer: C

QUESTION 306
Your network contains an Active Directory domain. You need to activate the Active Directory Recycle Bin in the domain. Which tool should you use?

A.    Dsamain
B.    Set-ADDomain
C.    Add-WindowsFeature
D.    Ldp

Answer: D

QUESTION 307
Your network contains an Active Directory domain named contoso.com. You need to create a script that runs the Best Practices Analyzer (BPA) each week for all of the server roles that BPA supports on each domain controller. You must achieve this goal by using the minimum amount of administrative effort. Which tools should you use? (Each correct answer presents part of the solution. Choose three.)

A.    Get-Troubleshooting Pack / Invoke-Troubleshooting Pack.
B.    Import-Module Best Practices.
C.    Get-BPA Model / Invoke-BPA Model.
D.    Import-Module Troubleshooting Pack.
E.    Get- BPA Result.

Answer: BCE

QUESTION 308
A corporate network includes a single Active Directory Domain Services (AD DS) domain. All regular user accounts reside in an organizational unit (OU) named Employees. All administrator accounts reside in an OU named Admins. You need to ensure that any time an administrator modifies an employee’s name in AD DS, the change is audited. What should you do first?

A.    Enable the Audit directory service access setting in the Default Domain Controllers Policy Group Policy Object.
B.    Create a Group Policy Object with the Audit directory service access setting enabled and link it to the Employees OU.
C.    Enable the Audit directory service access setting in the Default Domain Policy Group Policy Object.
D.    Modify the searchFlags property for the User class in the schema.

Answer: C

QUESTION 309
Your network contains an Active Directory domain. You need to back up all of the Group Policy objects (GPOs), Group Policy permissions, and Group Policy links for the domain. What should you do?

A.    From Group Policy Management Console (GPMC), back up the GPOs.
B.    From Windows Explorer, copy the content of the %systemroot%\SYSVOL folder.
C.    From Windows Server Backup, perform a system state backup.
D.    From Windows PowerShell, run the Backup-GPO cmdlet.

Answer: A

QUESTION 310
Your network contains a domain controller that runs Windows Server 2008 R2. You need to reset the Directory Services Restore Mode (DSRM) password on the domain controller. Which tool should you use?

A.    Ntdsutil
B.    Dsamain
C.    Active Directory Users and Computers
D.    Local Users and Groups

Answer: A


http://www.passleader.com/70-640.html

QUESTION 311
Your network contains an Active Directory forest. All client computers run Windows 7. The network contains a high-volume enterprise certification authority (CA). You need to minimize the amount of network bandwidth required to validate a certificate. What should you do?

A.    Configure an LDAP publishing point for the certificate revocation list (CRL).
B.    Configure an Online Certification Status Protocol (OCSP) responder.
C.    Modify the settings of the delta certificate revocation list (CRL).
D.    Replicate the certificate revocation list (CRL) by using Distributed File System (DFS).

Answer: B

QUESTION 312
Your network contains an Active Directory domain. You have five organizational units (OUs) named Finance, HR, Marketing, Sales, and Dev. You link a Group Policy object named GPO1 to the domain as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that GPO1 is applied to users in the Finance, HR, Marketing, and Sales OUs. The solution must prevent GPO1 from being applied to users in the Dev OU. What should you do?

A.    Enforce GPO1.
B.    Modify the security settings of the Dev OU.
C.    Link GPO1 to the Finance OU.
D.    Modify the security settings of the Finance OU.

Answer: C

QUESTION 313
Your network contains an Active Directory domain. The domain contains an organizational unit (OU) named OU1. OU1 contains all managed service accounts in the domain. You need to prevent the managed service accounts from being deleted accidentally from OU1. Which cmdlet should you use?

A.    Set-ADUser
B.    Set-ADOrganizationalUnit
C.    Set-ADServiceAccount
D.    Set-ADObject

Answer: D

QUESTION 314
Your network contains an Active Directory domain named contoso.com. Contoso.com contains a writable domain controller named DC1 and a read-only domain controller (RODC) named DC2. All domain controllers run Windows Server 2008 R2. You need to install a new writable domain controller named DC3 in a remote site. The solution must minimize the amount of replication traffic that occurs during the installation of Active Directory Domain Services (AD DS) on DC3. What should you do first?

A.    Run dcpromo.exe /createdcaccount on DC3.
B.    Run ntdsutil.exe on DC2.
C.    Run dcpromo.exe /adv on DC3.
D.    Run ntdsutil.exe on DC1.

Answer: C

QUESTION 315
Your network contains an Active Directory forest. The forest contains 10 domains. All domain controllers are configured as global catalog servers. You remove the global catalog role from a domain controller named DC5. You need to reclaim the hard disk space used by the global catalog on DC5. What should you do?

A.    From Active Directory Sites and Services, run the Knowledge Consistency Checker (KCC).
B.    From Active Directory Sites and Services, modify the general properties of DC5.
C.    From Ntdsutil, use the Semantic database analysis option.
D.    From Ntdsutil, use the Files option.

Answer: D

QUESTION 316
A corporate network includes an Active Directory-integrated zone. All DNS servers that host the zone are domain controllers. You add multiple DNS records to the zone. You need to ensure that the new records are available on all DNS servers as soon as possible. Which tool should you use?

A.    Ldp
B.    Repadmin
C.    Ntdsutil
D.    Nslookup
E.    Active Directory Sites And Services console
F.    Active Directory Domains And Trusts console
G.    Dnslint
H.    Dnscmd

Answer: B

QUESTION 317
You have a DNS zone that is stored in a custom application partition. You need to add a domain controller to the replication scope of the custom application partition. Which tool should you use?

A.    DNScmd
B.    DNS Manager
C.    Server Manager
D.    Dsmod

Answer: A

QUESTION 318
Your network contains a server named Server1 that runs Windows Server 2008 R2 Standard. Server1 has the Active Directory Certificate Services (AD CS) role installed. You configure a certificate template named Template1 for autoenrollment. You discover that certificates are not being issued to any client computers. The event logs on the client computers do not contain any autoenrollment errors. You need to ensure that all of the client computers automatically receive certificates based on Template1. What should you do?

A.    Modify the Default Domain Policy Group Policy object (GPO).
B.    Modify the Default Domain Controllers Policy Group Policy object (GPO).
C.    Upgrade Server1 to Windows Server 2008 R2 Enterprise.
D.    Restart Certificate Services on Server1.

Answer: A

QUESTION 319
Your network contains a server that has the Active Directory Lightweight Directory Services (AD LDS) role installed. You need to perform an automated installation of an AD LDS instance. Which tool should you use?

A.    Dism.exe
B.    Servermanagercmd.exe
C.    Adaminstall.exe
D.    Ocsetup.exe

Answer: C

QUESTION 320
Your network contains an Active Directory domain named contoso.com. A partner company has an Active Directory domain named nwtraders.com. The networks for contoso.com and nwtraders.com connect to each other by using a WAN link. You need to ensure that users in contoso.com can access resources in nwtraders.com and resources on the Internet. What should you do first?

A.    Modify the Trusted Root Certification Authorities store.
B.    Modify the Intermediate Certification Authorities store.
C.    Create conditional forwarders.
D.    Add a root hint to the DNS server.

Answer: C


http://www.passleader.com/70-640.html

[Pass Ensure VCE Dumps] PassLeader Premium 70-640 Exam Questions For Free Reading (321-340)

$
0
0

How to pass the newest 70-640 exam? What new questions are on the latest 70-640 exam? PassLeader’s best 70-640 VCE and PDF exam dumps/70-640 sample questions will tell you all about the 70-640 exam. For all PassLeader’s 651q 70-640 exam questions are the newest and covered all new added questions and answers, which will help you 100% passing exam. And we PassLeader will continue update 70-640 exam questions and answers, you will never fail the 70-640 exam. Hurry up and get the free VCE Player with your premium 70-640 VCE dumps from passleader.com now!

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 321
Your network contains an Active Directory forest. The forest contains multiple domains. You need to ensure that users in the human resources department can search for employees by using the employeeNumber attribute. What should you do?

A.    From Active Directory Sites and Services, modify the properties of each global catalog server.
B.    From the Active Directory Schema snap-in, modify the properties of the user object class.
C.    From Active Directory Sites and Services, modify the NTDS Settings objectof each global catalog server.
D.    From the Active Directory Schema snap-in, modify the properties of the employeeNumber attribute.

Answer: D

QUESTION 322
Your network contains a single Active Directory domain. The domain contains an enterprise certification authority (CA). You need to ensure that the encryption keys for e-mail certificates can be recovered from the CA database. You modify the e-mail certificate template to support key archival. What should you do next?

A.    Issue the key recovery agent certificate template.
B.    Run certutil.exe -recoverkey.
C.    Run certreq.exe-policy.
D.    Modify the location of the Authority Information Access (AIA) distribution point.

Answer: A

QUESTION 323
Your network contains an Active Directory-integrated DNS zone named contoso.com. You discover that the zone includes DNS records for computers that were removed from the network. You need to ensure that the DNS records are deleted automatically from the zone. What should you do?

A.    From DNS Manager, set the aging properties.
B.    Create a scheduled task that runs dnslint.exe /v /d contoso.com.
C.    From DNS Manager, modify the refresh interval of the start of authority (SOA) record.
D.    Create a scheduled task that runs ipconfig.exe /flushdns.

Answer: A

QUESTION 324
Your network contains a domain controller that runs Windows Server 2008 R2. You run the following command on the domain controller:
dsamain.exe C dbpath c:\$SNAP_201006170326_VOLUMEC$\Windows\NTDS\ntds.dit C ldapport 389 – allowNonAdminAccess
The command fails. You need to ensure that the command completes successfully. How should you modify the command?

A.    Change the value of the -dbpath parameter.
B.    Include the path to Dsamain.
C.    Change the value of the -ldapport parameter.
D.    Remove the CallowNonAdminAccess parameter.

Answer: C

QUESTION 325
Your network contains an Active Directory domain. The domain contains 10 domain controllers that run Windows Server 2008 R2. You need to monitor the following information on the domain controllers during the next five days:
– Memory usage
– Processor usage
– The number of LDAP queries
What should you do?

A.    Create a User Defined Data Collector Set (DCS) that uses the Active Directory Diagnostics template.
B.    Use the System Performance Data Collector Set (DCS).
C.    Create a User Defined Data Collector Set (DCS) that uses the System Performance template.
D.    Use the Active Directory Diagnostics Data Collector Set (DCS).

Answer: A

QUESTION 326
Your network contains an Active Directory domain named contoso.com. Contoso.com contains a domain controller named DC1 and a read-only domain controller (RODC) named RODC1. You need to view the most recent user accounts authenticated by RODC1. What should you do first?

A.    From Active Directory Sites and Services, right-click the Connection object for DC1, and then click Replicate Now.
B.    From Active Directory Sites and Services, right-click the Connection object for DC2, and then click Replicate Now.
C.    From Active Directory Users and Computers, right-click contoso.com, click Change DomainController, and then connect to DC1.
D.    From Active Directory Users and Computers, right-click contoso.com, click Change Domain Controller, and then connect to RODC1.

Answer: C

QUESTION 327
Your network contains an Active Directory domain. The domain contains 3,000 client computers. All of the client computers run Windows 7. Users log on to their client computers by using standard user accounts. You plan to deploy a new application named App1. The vendor of App1 provides a Setup.exe file to install App1. Setup.exe requires administrative rights to run. You need to deploy App1 to all client computers. The solution must meet the following requirements:
– App1 must automatically detect and replace corrupt application files.
– App1 must be available from the Start menu on each client computer.
What should you do first?

A.    Create a logon script that calls Setup.exe for App1.
B.    Create a .zap file.
C.    Create a startup script that calls Setup.exe for App1.
D.    Repackage App1 as a Windows Installer package.

Answer: D

QUESTION 328
Your network contains an Active Directory domain named contoso.com. Contoso.com contains two sites named Site1 and Site2. Site1 contains a domain controller named DC1. In Site1, you install a new domain controller named DC2. You ship DC2 to Site2. You discover that certain users in Site2 authenticate to DC1. You need to ensure that the users in Site2 always attempt to authenticate to DC2 first. What should you do?

A.    From Active Directory Users and Computers, modify the Location settings of the DC2 computer object.
B.    From Active Directory Sites and Services, modify the Location attribute for Site2.
C.    From Active Directory Sites and Services, move the DC2 server object.
D.    From Active Directory Users and Computers, move the DC2 computer object.

Answer: C

QUESTION 329
Your network contains an Active Directory domain. The domain contains an enterprise certification authority (CA). You need to ensure that only members of a group named Admin1 can create certificate templates. Which tool should you use to assign permissions to Admin1?

A.    the Certification Authority console
B.    Active Directory Users and Computers
C.    the Certificates snap-in
D.    Active Directory Sites and Services

Answer: A

QUESTION 330
Your network contains an Active Directory domain named contoso.com. Contoso.com contains a server named Server2. You open the System properties on Server2 as shown in the exhibit. (Click the Exhibit button.)

When you attempt to configure Server2 as an enterprise subordinate certification authority (CA), you discover that the enterprise subordinate CA option is unavailable. You need to configure Server2 as an enterprise subordinate CA. What should you do first?

A.    Upgrade Server2 to Windows Server 2008 R2 Enterprise.
B.    Log in as an administrator and run Server Manager.
C.    Import the root CA certificate.
D.    Join Server2 to the domain.

Answer: D


http://www.passleader.com/70-640.html

QUESTION 331
Your network contains an Active Directory domain. All DNS servers are domain controllers. You view the properties of the DNS zone as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that only domain members can register DNS records in the zone. What should you do first?

A.    Modify the zone type.
B.    Create a trust anchor.
C.    Modify the Advanced properties of the DNS server.
D.    Modify the Dynamic updates setting.

Answer: A

QUESTION 332
Your company has a single Active Directory forest with a single domain. Consultants in different departments of the company require access to different network resources. The consultants belong to a global group named TempWorkers. Three file servers are placed in a new organizational unit named SecureServers. The file servers contain confidential data in shared folders. You need to prevent the consultants from accessing the confidential data. What should you do?

A.    Create a new Group Policy Object (GPO) and link it to the SecureServers organizational unit. Assign the Deny access to this computer from the network user right to the TempWorkers global group.
B.    Create a new Group Policy Object (GPO) and link it to the domain. Assign the Deny access to this computer from the network user right to the TempWorkers global group.
C.    On the three file servers, create a share on the root of each hard disk. Configure the Deny Full control permission for the TempWorkers global group on the share.
D.    Create a new Group Policy Object (GPO) and link it to the domain. Assign the Deny log on locally user right to the TempWorkers global group.
E.    Create a new Group Policy Object (GPO) and link it to the SecureServers organizational unit. Assign the Deny log on locally user right to the TempWorkers global group.

Answer: A

QUESTION 333
Your network contains two Active Directory forests named contoso.com and nwtraders.com. The functional level of both forests is Windows Server 2003. Contoso.com contains one domain. Nwtraders.com contains two domains. You need to ensure that users in contoso.com can access the resources in all domains. The solution must require the minimum number of trusts. Which type of trust should you create?

A.    external
B.    forest
C.    realm
D.    shortcut

Answer: B

QUESTION 334
You install an Active Directory domain in a test environment. You need to reset the passwords of all the user accounts in the domain from a domain controller. Which two Windows PowerShell commands should you run? (Each correct answer presents part of the solution, choose two.)

A.    $ newPassword = *
B.    Import-Module ActiveDirectory
C.    Import-Module WebAdministration
D.    Get- AdUser -filter * | Set- ADAccountPossword – NewPassword $ newPassword – Reset
E.    Set- ADAccountPossword – NewPassword – Reset
F.    $ newPassword = (Read-Host – Prompt “New Password” – AsSecureString )
G.    Import-Module ServerManager

Answer: DF

QUESTION 335
Your network contains two forests named adatum.com and litwareinc.com. The functional level of all the domains is Windows Server 2003. The functional level of both forests is Windows 2000. You need to create a forest trust between adatum.com and litwareinc.com. What should you do first?

A.    Create an external trust.
B.    Raise the functional level of both forests.
C.    Configure SID filtering.
D.    Raise the functional level of all the domains.

Answer: B

QUESTION 336
Your network contains an Active Directory forest named adatum.com. All client computers used by the marketing department are in an organizational unit (OU) named Marketing Computers. All user accounts for the marketing department are in an OU named Marketing Users. You purchase a new application. You need to ensure that every user in the domain who logs on to a marketing department computer can use the application. The application must only be available from the marketing department computers. What should you do?

A.    Create and link a Group Policy object (GPO) to the Marketing Users OU. Copy the installation package to a shared folder on the network. Assign the application.
B.    Create and link a Group Policy object (GPO) to the Marketing Computers OU. Copy the installation package to a shared folder on the network. Assign the application.
C.    Create and link a Group Policy object (GPO) to the Marketing Computers OU. Copy the installation package to a local drive on each marketing department computer. Publish the application.
D.    Create and link a Group Policy object (GPO) to the Marketing Users OU. Copy the installation package to a folder on each marketing department computer. Publish the application.

Answer: B

QUESTION 337
Your network contains an Active Directory forest named adatum.com. You need to create an Active Directory Rights Management Services (AD RMS) licensing-only cluster. What should you install before you create the AD RMS root cluster?

A.    The Failover Cluster feature
B.    The Active Directory Certificate Services (AD CS) role
C.    Microsoft Exchange Server 2010
D.    Microsoft SharePoint Server 2010
E.    Microsoft SQL Server 2008

Answer: E

QUESTION 338
Your network contains an Active Directory domain named contoso.com. The contoso.com domain contains a domain controller named DC1. You create an Active Directory-integrated GlobalNames zone. You add an alias (CNAME) resource record named Server1 to the zone. The target host of the record is server2.contoso.com. When you ping Server1, you discover that the name fails to resolve. You are able to successfully ping server2.contoso.com. You need to ensure that you can resolve names by using the GlobalNames zone. Which command should you run?

A.    Dnscmd DCl.contoso.com /ZoneAdd GlobalNames /DsPrimary /DP /domain
B.    Dnscmd DCl.contoso.com /config /Enableglobalnamessupport forest
C.    DnscmdDCl.contoso.com/config/Enableglobalnamessupport 1
D.    Dnscmd DCl.contoso.com /ZoneAdd GlobalNames /DsPrimary /DP /forest

Answer: C

QUESTION 339
Your network contains an Active Directory domain named contoso.com. The network has a branch office site that contains a read-only domain controller (RODC) named R0DC1. R0DC1 runs Windows Server 2008 R2. A user logs on to a computer in the branch office site. You discover that the user’s password is not stored on R0DC1. You need to ensure that the user’s password is stored on RODC1 when he logs on to a branch office site computer. What should you do?

A.    Modify the RODC s password replication policy by removing the entry for the Allowed RODC Password Replication Group.
B.    Modify the RODC’s password replication policy by adding R0DC1’s computer account to the list of allowed users, groups, and computers.
C.    Add the user’s user account to the built-in Allowed RODC Password Replication Group on R0DC1.
D.    Add R0DC1’s computer account to the built-in Allowed RODC Password Replication Group on R0DC1.

Answer: C

QUESTION 340
You deploy an Active Directory Federation Services (AD FS) Federation Service Proxy on a server named Server1. You need to configure the Windows Firewall on Server1 to allow external users to authenticate by using AD FS. Which protocol should you allow on Server1?

A.    Kerberos
B.    SSL
C.    SMB
D.    RPC

Answer: B


http://www.passleader.com/70-640.html

[Pass Ensure VCE Dumps] New PassLeader 651q 70-640 Exam Questions For Free Download (341-360)

$
0
0

Being tormented to get well prepared for your 70-640 exam? Don’t worry! PassLeader now offer the first-hand 70-640 exam dumps, you will pass 70-640 exam for your first try with PassLeader’s latest real 651q 70-640 exam questions. We offer you the newest 70-640 exam study guide with VCE test engine or PDF format braindumps, you can get the basic knowledge and all details about 70-640 exam. Do not hesitate to try our high quality 651q 70-640 practice tests!

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 341
Your network contains an Active Directory domain named contoso.com. Contoso.com contains a member server that runs Windows Server 2008 R2 Standard. You need to create an enterprise subordinate certification authority (CA) that can issue certificates based on version 3 certificate templates. You must achieve this goal by using the minimum amount of administrative effort. What should you do first?

A.    Run the certutil.exe – addenrollmentserver command.
B.    Install the Active Directory Certificate Services (AD CS) role on the member server.
C.    Upgrade the member server to Windows Server 2008 R2 Enterprise.
D.    Run the certutil.exe – installdefaulttemplates command.

Answer: C

QUESTION 342
Your network contains a server named Server1. The Active Directory Rights Management Services (AD RMS) server role is installed on Server1. An administrator changes the password of the user account that is used by AD RMS. You need to update AD RMS to use the new password. Which console should you use?

A.    Active Directory Rights Management Services
B.    Active Directory Users and Computers
C.    Local Users and Groups
D.    Services

Answer: A

QUESTION 343
Your company, Contoso, Ltd., has a main office and a branch office. The offices are connected by a WAN link. Contoso has an Active Directory forest that contains a single domain named ad.contoso.com. The ad.contoso.com domain contains one domain controller named DC1 that is located in the main office. DC1 is configured as a DNS server for the ad.contoso.com DNS zone. This zone is configured as a standard primary zone. You install a new domain controller named DC2 in the branch office. You install DNS on DC2. You need to ensure that the DNS service can update records and resolve DNS queries in the event that a WAN link fails. What should you do?

A.    Create a new secondary zone named ad.contoso.com on DC2.
B.    Create a new stub zone named ad.contoso.com on DC2.
C.    Configure the DNS server on DC2 to forward requests to DC1.
D.    Convert the ad.contoso.com zone on DC1 to an Active Directory-integrated zone.

Answer: D

QUESTION 344
Your network contains an enterprise certification authority (CA) that runs Windows Server 2008 R2 Enterprise. You enable key archival on the CA. The CA is configured to use custom certificate templates for Encrypted File System (EFS) certificates. You need to archive the private key for all new EFS certificates. Which snap-in should you use?

A.    Active Directory Users and Computers
B.    Authorization Manager
C.    Group Policy Management
D.    Enterprise PKI
E.    Security Templates
F.    TPM Management
G.    Certificates
H.    Certification Authority
I.    Certificate Templates

Answer: H

QUESTION 345
Your network contains an enterprise certification authority (CA) that runs Windows Server 2008 R2 Enterprise. You need to ensure that all of the members of a group named Group1 can view the event log entries for Certificate Services. Which snap-in should you use?

A.    Certificate Templates
B.    Certification Authority
C.    Authorization Manager
D.    Active Directory Users and Computers
E.    TPM Management
F.    Security Templates
G.    Group Policy Management
H.    Enterprise PKI
I.    Certificates

Answer: D

QUESTION 346
Your network contains an enterprise certification authority (CA) that runs Windows Server 2008 R2 Enterprise. You need to ensure that users can enroll for certificates that use the IPSEC (Offline request) certificate template. Which snap-in should you use?

A.    Enterprise PKI
B.    TPM Management
C.    Certificates
D.    Active Directory Users and Computers
E.    Authorization Manager
F.    Certification Authority
G.    Group Policy Management
H.    Security Templates
I.    Certificate Templates

Answer: I

QUESTION 347
Your network contains an enterprise certification authority (CA) that runs Windows Server 2008 R2 Enterprise. You have a custom certificate template named Template 1. Template1 is published to the CA. You need to ensure that all of the members of a group named Group1 can enroll for certificates that use Template1. Which snap-in should you use?

A.    Security Templates
B.    Enterprise PKI
C.    Certification Authority
D.    Certificate Templates
E.    Certificates
F.    TPM Management
G.    Authorization Manager
H.    Group Policy Management
I.    Active Directory Users and Computers

Answer: D

QUESTION 348
Your network contains an enterprise certification authority (CA) that runs Windows Server 2008 R2 Enterprise. You need to approve a pending certificate request. Which snap-in should you use?

A.    Active Directory Users and Computers
B.    Authorization Manager
C.    Certification Authority
D.    Group Policy Management
E.    Certificate Templates
F.    TPM Management
G.    Certificates
H.    Enterprise PKI
I.    Security Templates

Answer: C

QUESTION 349
Your network contains an Active Directory domain. The domain contains a domain controller named DC1 that runs windows Server 2008 R2 Service Pack 1 (SP1). You need to implement a central store for domain policy templates. What should you do? To answer, select the source content that should be copied to the destination folder in the answer area.

Answer:

QUESTION 350
Your network contains an Active Directory forest named contoso.com. You plan to migrate all user accounts to a new forest named litwareinc.com. The functional level of the contoso.com forest is Windows Server 2003. Contoso.com contains four servers. The servers are configured as shown in the following table.

The functional level of the litwareinc.com forest is Windows Server 2008. Litwareinc.com contains four servers. The servers are configured as shown in the following table.

You need to identify on which server in the litwareinc.com forest you must install Active Directory Migration Tool version 3.2 (ADMT v3.2). Which server should you identify?

A.    Litw_Srv4
B.    Litw_Srv1
C.    Litw_Srv2
D.    Litw_Srv3

Answer: D


http://www.passleader.com/70-640.html

QUESTION 351
Your network contains an Active Directory domain. The password policy for the domain is configured as shown in the Current Policy exhibit, (Click the Exhibit button.)

You change the password policy for the domain as shown in the New Policy exhibit. (Click the Exhibit button.)

You need to provide users with examples of a valid password. Which password examples should you provide to the users? (Each correct answer presents a complete solution. Choose three.)

A.    123456!@#$%^
B.    !@#$1234ABCD
C.    passwordl234
D.    1-2-3-4-5-a-b-c-e
E.    %%PASS1234%%
F.    111111aaaaaaa

Answer: BDE

QUESTION 352
Your network contains an Active Directory domain named contoso.com. The Active Directory sites are configured as shown in the Sites exhibit. (Click the Exhibit button.) You need to ensure that DC1 and DC4 are the only servers that replicate Active Directory changes between the sites. What should you do?

A.    Configure DC1 as a preferred bridgehead server for IP transport.
B.    Configure DC4 as a preferred bridgehead server for IP transport.
C.    From the DC4 server object, create a Connection object for DC1.
D.    From the DC1 server object, create a Connection object for DC4.

Answer: A

QUESTION 353
Your network contains an Active Directory forest named contoso.com. The functional level of the forest is Windows Server 2008 R2. The forest contains a single domain. You need to ensure that objects can be restored from the Active Directory Recycle Bin. Which tool should you use?

A.    Ntdsutil
B.    Set-ADDomain
C.    Dsamain
D.    Enable-ADOptionalFeature

Answer: D

QUESTION 354
Your network contains an Active Directory domain. The domain is configured as shown in the exhibit. (Click the Exhibit button.) Users in the Finance organizational unit (OU) frequently log on to client computers in the Human Resources OU. You need to meet the following requirements:
– All of the user settings in the Group Policy objects (GPOs) linked to both the Finance OU and the Human Resources OU must be applied to finance users when they log on to client computers in the Engineering OU.
– Only the policy settings in the GPOs linked to the Finance OU must be applied to finance users when they log on to client computers in the Finance OU.
– Policy settings in the GPOs linked to the Finance OU must not be applied to users in the Human Resources OU.
What should you do?

A.    Modify the Group Policy permissions.
B.    Enable block inheritance.
C.    Configure the link order.
D.    Enable loopback processing in merge mode.
E.    Enable loopback processing in replace mode.
F.    Configure WMI filtering.
G.    Configure Restricted Groups.
H.    Configure Group Policy Preferences.
I.    Link the GPO to the Finance OU.
J.    Link the GPO to the Human Resources OU.

Answer: D

QUESTION 355
Your network contains an Active Directory domain. The domain is configured as shown in the exhibit, (Click the Exhibit button.) You need to ensure that when users log on to client computers, they are added automatically to the local Administrators group. The users must be removed from the group when they log off of the client computers. What should you do?

A.    Modify the Group Policy permissions.
B.    Enable block inheritance.
C.    Configure the link order.
D.    Enable loopback processing in merge mode.
E.    Enable loopback processing in replace mode.
F.    Configure WMI filtering.
G.    Configure Restricted Groups.
H.    Configure Group Policy Preferences.
I.    Link the Group Policy object (GPO) to the Finance organizational unit (OU).
J.    Link the Group Policy object (GPO) to the Human Resources organizational unit (OU).

Answer: H

QUESTION 356
Your company plans to open a new branch office. The new office will have a low-speed connection to the Internet. You plan to deploy a read-only domain controller (RODC) in the branch office. You need to create an offline copy of the Active Directory database that can be used to install the Active Directory on the new RODC. Which commands should you run from Ntdsutil? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:

QUESTION 357
Your network contains an Active Directory forest named contoso.com. The forest contains four computers. The computers are configured as shown in the following table.

An administrator creates a script that contains the following commands:

You need to identity which computers can successfully run all of the commands in the script. Which two computers should you identify? (Each correct answer presents part of the solution. Choose two.)

A.    Computer1
B.    Server1
C.    Computer2
D.    Server2

Answer: BD

QUESTION 358
Your network contains an Active Directory forest named contoso.com. You need to use Group Policies to deploy the applications shown in the following table.

What should you do? To answer, drag the appropriate deployment method to the correct application in the answer area.

Answer:

QUESTION 359
Your network contains an Active Directory domain named contoso.com. You need to view which password setting object is applied to a user. Which filter option in Attribute Editor should you enable? To answer, select the appropriate filter option in the answer area.

Answer:

QUESTION 360
Your network contains an Active Directory forest named contoso.com. The forest contains two sites named Seattle and Montreal. The Seattle site contains two domain controllers. The domain controllers are configured as shown in the following table.

The Montreal site contains a domain controller named DC3. DC3 is the only global catalog server in the forest. You need to configure DC2 as a global catalog server. Which object’s properties should you modify? To answer, select the appropriate object in the answer area.

Answer:


http://www.passleader.com/70-640.html

[New Exam Dumps] PassLeader Free 221q 70-688 VCE Dumps Cover All New Questions

$
0
0

New Updated 70-688 Exam Questions from PassLeader 70-688 PDF dumps! Welcome to download the newest PassLeader 70-688 VCE dumps: http://www.passleader.com/70-688.html (221 Q&As)

Keywords: 70-688 exam dumps, 70-688 exam questions, 70-688 VCE dumps, 70-688 PDF dumps, 70-688 practice tests, 70-688 study guide, 70-688 braindumps, Support Windows 8.1 (Managing and Maintaining Windows 8.1) Exam

NEW QUESTION 207
You administer Windows 8.1 Pro client computers that are members of an Active Directory domain that includes Active Directory Certificate Services (AD CS). You restored a computer from a backup that was taken 45 days ago. Users are no longer able to log on to that computer by using their domain accounts. An error message states that the trust relationship between the computer and the primary domain has failed. You need to restore the ability to log on to domain accounts, with a minimal risk of data loss. What should you do?

A.    Logon as a local administrator and issue the netdom resetpwd command. Log off and restart the computer.
B.    Reset the passwords of all affected domain users.
C.    Restore the client computer from a known good backup that was taken two weeks earlier than the backup you previously restored.
D.    Renew the certificates issued to the dient computer.

Answer: A

NEW QUESTION 208
You administer Windows 8.1 Pro desktops. You discover that a company employee enabled file encryption on several folders by using a self- signed Encrypted File System (EFS) certificate. You need to ensure that you are able to decrypt the encrypted files if the user profile is deleted. What should you do?

A.    Open the Certificates console and connect to the user account certificates.
Find the personal self-signed EFS certificate and export it to a Personal Information Exchange (PFX) file.   
B.    Open the Certificates console and connect to the computer account certificates.
Export the self-signed EFS certificate from the Trusted People folder to a Canonical Encoding Rules (CER) file.
C.    Open the Certificates console and connect to the user account certificates.
Export the personal seff-signed EFS certificate from the Trusted Root Certification Authority folder to a Personal Information Exchange (PFX) file.
D.    Open the Certificates console and connect to the user account certificates.
Export the self-signed EFS certificate from the Trusted People folder to a Canonical Encoding Rules (CER) file.

Answer: B

NEW QUESTION 209
A Windows 8.1 computer has an external hard drive that contains selected folders that are encrypted by using EFS. The computer’s internal hard drive fails. You have the computer’s backup certificate and key. You need to provide access to the encrypted folders on the external hard drive. Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.)

NEW QUESTION 210
You manage more than 100 desktop computers for your company. Your users works from home and connect to the company’s private network via a VPN connection over a high-speed Internet link. A user is unable to connect via VPN and receives the following error code 741: “The local computer does not support encryption.” You need to configure the computers to connect via VPN. What should you do?

A.    Modify the Advanced settings of the VPN connection and enable the use of a certificate for encryption.
B.    Enable EAP-MSCHAPv2 encryption on the Local Area Connection on the computer.
C.    Set the type of VPN to IKEv2.
D.    Modify the properties of the VPN connection and set data encryption to Maximum strength encryption.

Answer: D

NEW QUESTION 211
You manage the desktop and laptop computers for your company. The company has a Windows Seiver 2008 R2 Active Directory Domain Services (AD DS) environment. Remote users connect from the Internet to the company intranet by using DirectAccess. You configure Windows 8.1 on a group of laptop computers. You use a special segment that is outside the Internet firewall to ascertain whether these computers have access to the company intranet. The computers are unable to connect by using DirectAccess. You perform the recommended troubleshooting steps. You need to capture a network trace of the DirectAccess client. Which Windows 8.1 diagnostic tool should you use?

A.    netstat
B.    nbtstat
C.    netsh
D.    PowerShell

Answer: A

NEW QUESTION 212
……


Download the newest PassLeader 70-688 dumps from passleader.com now! 100% Pass Guarantee!

70-688 PDF dumps & 70-688 VCE dumps: http://www.passleader.com/70-688.html (221 Q&As)

[Pass Ensure VCE Dumps] Premium 651q 70-640 Exam Questions Ensure 100 Percent Exam Passing (361-380)

$
0
0

Being tormented to get well prepared for your 70-640 exam? Don’t worry! PassLeader now offer the first-hand 70-640 exam dumps, you will pass 70-640 exam for your first try with PassLeader’s latest real 651q 70-640 exam questions. We offer you the newest 70-640 exam study guide with VCE test engine or PDF format braindumps, you can get the basic knowledge and all details about 70-640 exam. Do not hesitate to try our high quality 651q 70-640 practice tests!

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 361
Your network contains an Active Directory forest named contoso.com. The forest contains two Active Directory sites named Seattle and Montreal. The Montreal site is a branch office that contains only a single read-only domain controller (RODC). You accidentally delete the site link between the two sites. You recreate the site link while you are connected to a domain controller in Seattle. You need to replicate the change to the RODC in Montreal. Which node in Active Directory Sites and Services should you use? To answer, select the appropriate node in the answer area.

Answer:

QUESTION 362
Your network contains an Active Directory domain named adatum.com. You need to use Group Policies to deploy the line-of-business applications shown in the following table.

What should you do? To answer, drag the appropriate deployment method to the correct application in the answer area.

Answer:

QUESTION 363
Your network contains an Active Directory forest named contoso.com. The forest contains two sites named Seattle and Montreal. The Seattle site contains two domain controllers. The domain controllers are configured as shown in the following table.

You need to enable universal group membership caching in the Seattle site. Which object’s properties should you modify? To answer, select the appropriate object in the answer area.

Answer:

QUESTION 364
Your network contains two Active Directory forests named contoso.com and fabrikam.com. A two-way forest trust exists between the forests. Selective authentication is enabled on the trust. Fabrikam.com contains a server named Server1. You assign Contoso\Domain Users the Manage documents permission and the Print permission to a shared printer on Server1. You discover that users from contoso.com cannot access the shared printer on Server1. You need to ensure that the contoso.com users can access the shared printer on Server1. Which permission should you assign to Contoso\Domain Users. To answer, select the appropriate permission in the answer area.

Answer:

QUESTION 365
Your network contains an Active Directory forest named adatum.com. The forest contains four child domains named europe.adatum.com, northamerica.adatum.com, asia.adatum.com, and africa.adatum.com. You need to create four new groups in the forest root domain. The groups must be configured as shown in the following table.

What should you do? To answer, drag the appropriate group type to the correct group name in the answer area.

Answer:

QUESTION 366
Your network contains an Active Directory forest. The DNS infrastructure fails. You rebuild the DNS infrastructure. You need to force the registration of the Active Directory Service Locator (SRV) records in DNS. Which service should you restart on the domain controllers? To answer, select the appropriate service in the answer area.

Answer:

The Netlogon service would be involved with this.

QUESTION 367
Your network contains an Active Directory forest named contoso.com. The password policy of the forest requires that the passwords for all of the user accounts be changed every 30 days. You need to create user accounts that will be used by services. The passwords for these accounts must be changed automatically every 30 days. Which tool should you use to create these accounts? To answer, select the appropriate tool in the answer area.

Answer:

Creating a Managed Service Account
Applies To: Windows Server 2008 R2
This topic explains how to use the Active Directory module for Windows PowerShell to create a managed service account. Managed service accounts are used to run various services for applications that are operating in your domain environment.
Example 1
The following example demonstrates how to create a service account, SQL-SRV1, in the container Managed Service Accounts in the Fabrikam.com domain:
New-ADServiceAccount -Name SQL-SRV1 -Path “CN=Managed Service Accounts,DC=FABRIKAM,DC=COM”

QUESTION 368
Your network contains an Active Directory forest named contoso.com. All client computers run Windows 7 Enterprise. You need automatically to create a local group named PowerManagers on each client computer that contains a battery. The solution must minimize the amount of administrative effort. Which node in Group Policy Management Editor should you use? To answer, select the appropriate node in the answer area.

Answer:

Would be a GPO applied to a computer.

Control Panel Settings under Preferences.
Select

QUESTION 369
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1. Server1 has an IP address of 192.168.200.100. You need to view the Pointer (PTR) record for Server1. Which zone should you open in the DNS snap-in to view the record? To answer, select the appropriate zone in the answer area.

Answer:

the corresponding in-addr.arpa zone would be 200.168.192, assuming a default subnet of /24s

QUESTION 370
Your network contains an Active Directory domain. You need to create a new site link between two sites named Site1 and Site3. The site link must support the replication of domain objects. Under which node in Active Directory Sites and Services should you create the site link? To answer, select the appropriate node in the answer area

Answer:

To Create A Site Link
Open Active Directory Sites and Services. To open Active Directory Sites and Services, click Start, click Administrative Tools, and then click Active Directory Sites and Services.
In the console tree, right-click the intersite transport protocol that you want the site link to use.
Where? Active Directory Sites and Services\Sites\Inter-Site Transports\IP or SMTP

Click New Site Link.
In Name, type the name for the site link.
In Sites not in this site link, click a site to add to the site link, and then click Add. Repeat to add more sites to the site link. To remove a site from the site link, in Sites in this link, click the site, and then click Remove.
When you have added the sites that you want to be connected by this site link, click OK.


http://www.passleader.com/70-640.html

QUESTION 371
Your company has a main office and a branch office. All servers are located in the main office. The network contains an Active Directory forest named adatum.com. The forest contains a domain controller named MainDC that runs Windows Server 2008 R2 Enterprise and a member server named FileServer that runs Windows Server 2008 R2 Standard. You have a kiosk computer named Public_Computer that runs Windows 7. Public_Computer is not connected to the network. You need to join Public_Computer to the adatum.com domain. What should you do? To answer, move the appropriate actions from the Possible Actions list to the Necessary Actions area and arrange them in the correct order.

Answer:

QUESTION 372
Drag and Drop Question
Your network contains two forests named contoso.com and fabrikam.com. The functional level of all the domains is Windows Server 2003. The functional level of both forests is Windows 2000. You need to create a trust between contoso.com and fabrikam.com. The solution must ensure that users from contoso.com can only access the servers in fabrikam.com that have the Allowed to Authenticate permission set. What should you do? To answer, move the appropriate actions from the Possible Actions list to the Necessary Actions area and arrange them in the correct order.

Answer:

QUESTION 373
Drag and Drop Question
Your network contains an Active Directory forest named contoso.com. You need to create an Active Directory Rights Management Services (AD RMS) licensing-only cluster. What should you do? To answer, move the appropriate actions from the Possible Actions list to the Necessary Actions area and arrange them in the correct order.

Answer:

QUESTION 374
Your network contains an Active Directory forest named contoso.com. The forest contains a domain controller named DC1 that runs Windows Server 2008 R2 Enterprise and a member server named Server1 that runs Windows Server 2008 R2 Standard. You have a computer named Computer1 that runs Windows 7. Computer1 is not connected to the network. You need to join Computer1 to the contoso.com domain. What should you do? To answer, move the appropriate actions from the Possible Actions list to the Necessary Actions area and arrange them in the correct order.

Answer:

QUESTION 375
You need to modify the Password Replication Policy on a read-only domain controller (RODC). Which tool should you use? To answer, select the appropriate tool in the answer area.

Answer:

QUESTION 376
Your network contains an Active Directory domain named contoso.com. You need to ensure that IP addresses can be resolved to fully qualified domain names (FQDNs). Under which node in the DNS snap-in should you add a zone? To answer, select the appropriate node in the answer area.

Answer:

QUESTION 377
Your company has two domain controllers named DC1 and DC2. DC1 hosts all domain and forest operations master roles. DC1 fails. You need to rebuild DC1 by reinstalling the operating system. You also need to rollback all operations master roles to their original state. You perform a metadata cleanup and remove all references of DC1. Which three actions should you perform next? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

QUESTION 378
A server named DC1 has the Active Directory Domain Services (AD DS) role and the Active Directory Lightweight Directory Services (AD LDS) role installed. An AD LDS instance named LDS1 stores its data on the C: drive. You need to relocate the LDS1 instance to the D: drive. Which three actions should you perform in sequence? (To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

QUESTION 379
You need to perform an offline defragmentation of an Active Directory database. Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

QUESTION 380
Your company has an Active Directory forest that contains multiple domain controllers. The domain controllers run Windows Server 2008. You need to perform an an authoritative restore of a deleted orgainzational unit and its child objects. Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area, and arrange them in the correct order.)

Answer:


http://www.passleader.com/70-640.html

[Pass Ensure VCE Dumps] Collection Of PassLeader Free 70-640 Practice Test in PDF Download (381-400)

$
0
0

New 70-640 Exam Questions Updated Today! PassLeader just released the latest Microsoft 70-640 pdf and vce exam dumps(Now Total 651q) with all new exam questions, which will help you 100% passing the newest 70-640 exam. This new questions are exactly the same as real test’s. Now visit passleader.com to get the newest 651q 70-640 pdf or vce exam dumps with 10% discount and FREE VCE TEST SOFTWARE!

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 381
ABC.com has an Active Directory forest on a single domain. The domain operates Windows Server 2008. A new administrator accidentally deletes the entire organizational unit in the Active Directory database that hosts 6000 objects. You have backed up the system state data using third-party backup software. To restore backup, you start the domain controller in the Directory Services Restore Mode (DSRM). You need to perform an authoritative restore of the organizational unit and restore the domain controller to its original state. Which three actions should you perform?

Answer:

QUESTION 382
You have a single Active Directory domain. All domain controllers run Windows Server 2008 and are configured as DNS servers. The domain contains one Active Directory-integrated DNS zone. You need to ensure that outdated DNS records are automatically removed from the DNS zone. What should you do?

A.    From the properties of the zone, modify the TTL of the SOA record.
B.    From the properties of the zone, enable scavenging.
C.    From the command prompt, run ipconfig /flushdns.
D.    From the properties of the zone, disable dynamic updates.

Answer: B

QUESTION 383
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. The Audit account management policy setting and Audit directory services access setting are enabled for the entire domain. You need to ensure that changes made to Active Directory objects can be logged. The logged changes must include the old and new values of any attributes. What should you do?

A.    Run auditpol.exe and then configure the Security settings of the Domain Controllers OU.
B.    From the Default Domain Controllers policy, enable the Audit directory service access setting and enable directory service changes.
C.    Enable the Audit account management policy in the Default Domain Controller Policy.
D.    Run auditpol.exe and then enable the Audit directory service access setting in the Default Domain policy.

Answer: A

QUESTION 384
Your company, Contoso Ltd has a main office and a branch office. The offices are connected by a WAN link. Contoso has an Active Directory forest that contains a single domain named ad.contoso.com. The ad.contoso.com domain contains one domain controller named DC1 that is located in the main office. DC1 is configured as a DNS server for the ad.contoso.com DNS zone. This zone is configured as a standard primary zone. You install a new domain controller named DC2 in the branch office. You install DNS on DC2. You need to ensure that the DNS service can update records and resolve DNS queries in the event that a WAN link fails. What should you do?

A.    Create a new stub zone named ad.contoso.com on DC2.
B.    Create a new standard secondary zone named ad.contoso.com on DC2.
C.    Configure the DNS server on DC2 to forward requests to DC1.
D.    Convert the ad.contoso.com zone on DC1 to an Active Directory-integrated zone.

Answer: D

QUESTION 385
Your company has a server that runs an instance of Active Directory Lightweight Directory Service (AD LDS). You need to create new organizational units in the AD LDS application directory partition. What should you do?

A.    Use the dsmod OU <OrganizationalUnitDN> command to create the organizational units.
B.    Use the Active Directory Users and Computers snap-in to create the organizational units on the AD LDS application directory partition.
C.    Use the dsadd OU <OrganizationalUnitDN> command to create the organizational units.
D.    Use the ADSI Edit snap-in to create the organizational units on the AD LDS application directory partition.

Answer: D

QUESTION 386
Your company has an Active Directory domain. The company has two domain controllers named DC1 and DC2. DC1 holds the Schema Master role. DC1 fails. You log on to Active Directory by using the administrator account. You are not able to transfer the Schema Master operations role. You need to ensure that DC2 holds the Schema Master role. What should you do?

A.    Configure DC2 as a bridgehead server.
B.    On DC2, seize the Schema Master role.
C.    Log off and log on again to Active Directory by using an account that is a member of the Schema Administrators group. Start the Active Directory Schema snap-in.
D.    Register the Schmmgmt.dll. Start the Active Directory Schema snap-in.

Answer: B

QUESTION 387
Your company has an Active Directory forest that runs at the functional level of Windows Server 2008. You implement Active Directory Rights Management Services (AD RMS). You install Microsoft SQL Server 2005. When you attempt to open the AD RMS administration Web site, you receive the following error message: “SQL Server does not exist or access denied.” You need to open the AD RMS administration Web site. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Restart IIS.
B.    Manually delete the Service Connection Point in AD DS and restart AD RMS.
C.    Install Message Queuing.
D.    Start the MSSQLSVC service.

Answer: AD

QUESTION 388
Your network consists of an Active Directory forest that contains one domain named contoso.com. All domain controllers run Windows Server 2008 R2 and are configured as DNS servers. You have two Active Directory-integrated zones: contoso.com and nwtraders.com. You need to ensure a user is able to modify records in the contoso.com zone. You must prevent the user from modifying the SOA record in the nwtraders.com zone. What should you do?

A.    From the Active Directory Users and Computers console, run the Delegation of Control Wizard.
B.    From the Active Directory Users and Computers console, modify the permissions of the Domain Controllers organizational unit (OU).
C.    From the DNS Manager console, modify the permissions of the contoso.com zone.
D.    From the DNS Manager console, modify the permissions of the nwtraders.com zone.

Answer: C

QUESTION 389
Your company has an Active Directory domain. All servers run Windows Server 2008 R2. Your company uses an Enterprise Root certificate authority (CA). You need to ensure that revoked certificate information is highly available. What should you do?

A.    Implement an Online Certificate Status Protocol (OCSP) responder by using an Internet Security and Acceleration Server array.
B.    Publish the trusted certificate authorities list to the domain by using a Group Policy Object (GPO).
C.    Implement an Online Certificate Status Protocol (OCSP) responder by using Network Load Balancing.
D.    Create a new Group Policy Object (GPO) that allows users to trust peer certificates. Link the GPO to the domain.

Answer: C

QUESTION 390
You have two servers named Server1 and Server2. Both servers run Windows Server 2008 R2. Server1 is configured as an enterprise root certification authority (CA). You install the Online Responder role service on Server2. You need to configure Server1 to support the Online Responder. What should you do?

A.    Import the enterprise root CA certificate.
B.    Configure the Certificate Revocation List Distribution Point extension.
C.    Configure the Authority Information Access (AIA) extension.
D.    Add the Server2 computer account to the CertPublishers group.

Answer: C


http://www.passleader.com/70-640.html

QUESTION 391
Your company has an Active Directory domain. A user attempts to log on to a computer that was turned off for twelve weeks. The administrator receives an error message that authentication has failed. You need to ensure that the user is able to log on to the computer. What should you do?

A.    Run the netsh command with the set and machine options.
B.    Reset the computer account. Disjoin the computer from the domain, and then rejoin the computer to the domain.
C.    Run the netdom TRUST /reset command.
D.    Run the Active Directory Users and Computers console to disable, and then enable the computer account.

Answer: B

QUESTION 392
Your company has an Active Directory forest that contains a single domain. The domain member server has an Active Directory Federation Services (AD FS) role installed. You need to configure AD FS to ensure that AD FS tokens contain information from the Active Directory domain. What should you do?

A.    Add and configure a new account partner.
B.    Add and configure a new resource partner.
C.    Add and configure a new account store.
D.    Add and configure a Claims-aware application.

Answer: C

QUESTION 393
You network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to reset the Directory Services Restore Mode (DSRM) password on a domain controller. What tool should you use?

A.    Active Directory Users and Computers snap-in
B.    ntdsutil
C.    Local Users and Groups snap-in
D.    dsmod

Answer: B

QUESTION 394
Your company has a main office and a branch office. You deploy a read-only domain controller (RODC) that runs Microsoft Windows Server 2008 to the branch office. You need to ensure that users at the branch office are able to log on to the domain by using the RODC. What should you do?

A.    Add another RODC to the branch office.
B.    Configure a new bridgehead server in the main office.
C.    Decrease the replication interval for all connection objects by using the Active Directory Sites and Services console.
D.    Configure the Password Replication Policy on the RODC.

Answer: D

QUESTION 395
Your network contains a single Active Directory domain. The functional level of the forest is Windows Server 2008. The functional level of the domain is Windows Server 2008 R2. All DNS servers run Windows Server 2008. All domain controllers run Windows Server 2008 R2. You need to ensure that you can enable the Active Directory Recycle Bin. What should you do?

A.    Change the functional level of the forest.
B.    Change the functional level of the domain.
C.    Modify the Active Directory schema.
D.    Modify the Universal Group Membership Caching settings.

Answer: A

QUESTION 396
Your network contains an Active Directory domain. The domain contains several domain controllers. All domain controllers run Windows Server 2008 R2. You need to restore the Default Domain Controllers Policy Group Policy object (GPO) to the Windows Server 2008 R2 default settings. What should you do?

A.    Run dcgpofix.exe /target:dc.
B.    Run dcgpofix.exe /target:domain.
C.    Delete the link for the Default Domain Controllers Policy, and then run gpupdate.exe /sync.
D.    Delete the link for the Default Domain Controllers Policy, and then run gpupdate.exe /force.

Answer: A

QUESTION 397
Your network contains an Active Directory domain. The domain contains two Active Directory sites named Site1 and Site2. Site1 contains two domain controllers named DC1 and DC2. Site2 contains two domain controller named DC3 and DC4. The functional level of the domain is Windows Server 2008 R2. The functional level of the forest is Windows Server 2003. Active Directory replication between Site1 and Site2 occurs from 20:00 to 01:00 every day. At 07:00, an administrator deletes a user account while he is logged on to DC1. You need to restore the deleted user account. You want to achieve this goal by using the minimum amount of administrative effort. What should you do?

A.    On DC1, run the Restore-ADObject cmdlet.
B.    On DC3, run the Restore-ADObject cmdlet.
C.    On DC1, stop Active Directory Domain Services, restore the System State, and then start Active Directory Domain Services.
D.    On DC3, stop Active Directory Domain Services, perform an authoritative restore, and then start Active Directory Domain Services.

Answer: D

QUESTION 398
Your network contains an Active Directory domain. The domain contains two domain controllers named DC1 and DC2. You perform a full backup of the domain controllers every night by using Windows Server Backup. You update a script in the SYSVOL folder. You discover that the new script fails to run properly. You need to restore the previous version of the script in the SYSVOL folder. The solution must minimize the amount of time required to restore the script. What should you do first?

A.    Run the Restore-ADObject cmdlet.
B.    Restore the system state to its original location.
C.    Restore the system state to an alternate location.
D.    Attach the VHD file created by Windows Server Backup.

Answer: D

QUESTION 399
Your network contains an Active Directory domain. You need to restore a deleted computer account from the Active Directory Recycle Bin. What should you do?

A.    From the command prompt, run recover.exe.
B.    From the command prompt, run ntdsutil.exe.
C.    From the Active Directory Module for Windows PowerShell, run the Restore-Computer cmdlet.
D.    From the Active Directory Module for Windows PowerShell, run the Restore-ADObject cmdlet.

Answer: D

QUESTION 400
You need to back up all of the group policies in a domain. The solution must minimize the size of the backup. What should you use?

A.    the Add-WBSystemState cmdlet
B.    the Group Policy Management console
C.    the Wbadmin tool
D.    the Windows Server Backup feature

Answer: B


http://www.passleader.com/70-640.html


[Pass Ensure VCE Dumps] Best 651q PassLeader 70-640 Exam Dumps Help Passing Exam Easily (401-420)

$
0
0

New 70-640 Exam Questions Updated Today! PassLeader just released the latest Microsoft 70-640 pdf and vce exam dumps(Now Total 651q) with all new exam questions, which will help you 100% passing the newest 70-640 exam. This new questions are exactly the same as real test’s. Now visit passleader.com to get the newest 651q 70-640 pdf or vce exam dumps with 10% discount and FREE VCE TEST SOFTWARE!

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 401
You have an enterprise root certification authority (CA) that runs Windows Server 2008 R2. You need to ensure that you can recover the private key of a certificate issued to a Web server. What should you do?

A.    From the CA, run the Get-PfxCertificate cmdlet.
B.    From the Web server, run the Get-PfxCertificate cmdlet.
C.    From the CA, run the certutil.exe tool and specify the -exportpfx parameter.
D.    From the Web server, run the certutil.exe tool and specify the -exportpfx parameter.

Answer: D

QUESTION 402
Your company has a main office and a branch office. The network contains a single Active Directory domain. The main office contains a domain controller named DC1. You need to install a domain controller in the branch office by using an offline copy of the Active Directory database. What should you do first?

A.    From the Ntdsutil tool, create an IFM media set.
B.    From the command prompt, run djoin.exe /loadfile.
C.    From Windows Server Backup, perform a system state backup.
D.    From Windows PowerShell, run the get-ADDomainController cmdlet.

Answer: A

QUESTION 403
Your network contains an Active Directory domain. All domain controllers run Windows Server 2008. The functional level of the domain is Windows Server 2003. All client computers run Windows 7. You install Windows Server 2008 R2 on a server named Server1. You need to perform an offline domain join of Server1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    From Server1, run djoin.exe.
B.    From Server1, run netdom.exe.
C.    From a Windows 7 computer, run djoin.exe.
D.    Upgrade one domain controller to Windows Server 2008 R2.
E.    Raise the functional level of the domain to Windows Server 2008.

Answer: AC

QUESTION 404
You have an Active Directory snapshot. You need to view the contents of the organizational units (OUs) in the snapshot. Which tools should you run?

A.    explorer.exe, netdom.exe, and dsa.msc
B.    ntdsutil.exe, dsamain.exe, and dsa.msc
C.    wbadmin.msc, dsamain.exe, and netdom.exe
D.    wbadmin.msc, ntdsutil.exe, and explorer.exe

Answer: B

QUESTION 405
Your network contains a domain controller that runs Windows Server 2008 R2. You run the following command on the domain controller:
dsamain.exe dbpath c:\$SNAP_201006170326_VOLUMEC$\Windows\NTDS\ntds.dit ldapport 389 – allowNonAdminAccess
The command fails. You need to ensure that the command completes successfully. How should you modify the command?

A.    Include the path to Dsamain.
B.    Change the value of the -dbpath parameter.
C.    Change the value of the -ldapport parameter.
D.    Remove the allowNonAdminAccess

Answer: C

QUESTION 406
Your network contains an Active Directory domain. The domain contains five domain controllers. A domain controller named DC1 has the DHCP role and the file server role installed. You need to move the Active Directory database on DC1 to an alternate location. The solution must minimize impact on the network during the database move. What should you do first?

A.    Restart DC1 in Safe Mode.
B.    Restart DC1 in Directory Services Restore Mode.
C.    Start DC1 from Windows PE.
D.    Stop the Active Directory Domain Services service on DC1.

Answer: D

QUESTION 407
Your company has a main office and a branch office. The network contains an Active Directory forest. The forest contains three domains. The branch office contains one domain controller named DC5. DC5 is configured as a global catalog server, a DHCP server, and a file server. You remove the global catalog from DC5. You need to reduce the size of the Active Directory database on DC5. The solution must minimize the impact on all users in the branch office. What should you do first?

A.    Start DC5 in Safe Mode.
B.    Start DC5 in Directory Services Restore Mode.
C.    On DC5, start the Protected Storage service.
D.    On DC5, stop the Active Directory Domain Services service.

Answer: D

QUESTION 408
Your network contains a domain controller that runs Windows Server 2008 R2. You need to change the location of the Active Directory log files. Which tool should you use?

A.    Dsamain
B.    Dsmgmt
C.    Dsmove
D.    Ntdsutil

Answer: D

QUESTION 409
Your network contains a single Active Directory domain. All servers run Windows Server 2008 R2. You deploy a new server that runs Windows Server 2008 R2. The server is not connected to the internal network. You need to ensure that the new server is already joined to the domain when it first connects to the internal network. What should you do?

A.    From a domain controller, run sysprep.exe and specify the /oobe parameter. From the new server, run sysprep.exe and specify the /generalize parameter.
B.    From a domain controller, run sysprep.exe and specify the /generalize parameter. From the new server, run sysprep.exe and specify the /oobe parameter.
C.    From a domain-joined computer, run djoin.exe and specify the /provision parameter. From the new server, run djoin.exe and specify the /requestodj parameter.
D.    From a domain-joined computer, run djoin.exe and specify the /requestodj parameter. From the new server, run djoin.exe and specify the /provision parameter.

Answer: C

QUESTION 410
Your network contains an Active Directory domain. The domain contains four domain controllers. You modify the Active Directory schema. You need to verify that all the domain controllers received the schema modification. Which command should you run?

A.    dcdiag.exe /a
B.    netdom.exe query fsmo
C.    repadmin.exe /showrepl *
D.    sc.exe query ntds

Answer: C


http://www.passleader.com/70-640.html

QUESTION 411
You remotely monitor several domain controllers. You run winrm.exe quickconfig on each domain controller. You need to create a WMI script query to retrieve information from the bios of each domain controller. Which format should you use to write the query?

A.    XrML
B.    XML
C.    WQL
D.    HTML

Answer: C

QUESTION 412
Your network contains an Active Directory domain named contoso.com. The domain contains five domain controllers. You add a logoff script to an existing Group Policy object (GPO). You need to verify that each domain controller successfully replicates the updated group policy. Which two objects should you verify on each domain controller? (Each correct answer presents part of the solution. Choose two.)

A.    \\servername\SYSVOL\contoso.com\Policies\{GUID}\gpt.ini
B.    \\servername\SYSVOL\contoso.com\Policies\{GUID}\machine\registry.pol
C.    the uSNChanged value for the CN={GUID},CN=Policies,CN=System,DC=contoso,DC=com container
D.    the versionNumber value for the CN={GUID},CN=Policies,CN=System,DC=contoso,DC=com container

Answer: AD

QUESTION 413
Your network contains an Active Directory domain that contains five domain controllers. You have a management computer that runs Windows 7. From the Windows 7 computer, you need to view all account logon failures that occur in the domain. The information must be consolidated on one list. Which command should you run on each domain controller?

A.    Wecutil.exe qc
B.    Wevtutil.exe gli
C.    Winrm.exe quickconfig
D.    Winrshost.exe

Answer: C

QUESTION 414
You create a new Active Directory domain. The functional level of the domain is Windows Server 2008 R2. The domain contains five domain controllers. You need to monitor the replication of the group policy template files. Which tool should you use?

A.    Dfsrdiag
B.    Fsutil
C.    Ntdsutil
D.    Ntfrsutl

Answer: A

QUESTION 415
You have a domain controller named DC1 that runs Windows Server 2008 R2. DC1 is configured as a DNS Server for contoso.com. You install the DNS Server role on a member server named Server1 and then you create a standard secondary zone for contoso.com. You configure DC1 as the master server for the zone. You need to ensure that Server1 receives zone updates from DC1. What should you do?

A.    On DC1, modify the permissions of contoso.com zone.
B.    On Server1, add a conditional forwarder.
C.    On DC1, modify the zone transfer settings for the contoso.com zone.
D.    Add the Server1 computer account to the DNSUpdateProxy group.

Answer: C

QUESTION 416
Your company has an Active Directory domain. All servers run Windows Server 2008 R2. Your company runs an Enterprise Root certification authority (CA). You need to ensure that only administrators can sign code. Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Edit the local computer policy of the Enterprise Root CA to allow only administrators to manage Trusted Publishers.
B.    Modify the security settings on the template to allow only administrators to request code signing certificates.
C.    Edit the local computer policy of the Enterprise Root CA to allow users to trust peer certificates and allow only administrators to apply the policy.
D.    Publish the code signing template.

Answer: BD

QUESTION 417
Your company has an Active Directory forest. You plan to install an Enterprise certification authority (CA) on a dedicated stand-alone server. When you attempt to add the Active Directory Certificate Services (AD CS) role, you find that the Enterprise CA option is not available. You need to install the AD CS role as an Enterprise CA. What should you do first?

A.    Add the DNS Server role.
B.    Add the Active Directory Lightweight Directory Service (AD LDS) role.
C.    Add the Web server (IIS) role and the AD CS role.
D.    Join the server to the domain.

Answer: D

QUESTION 418
Your company has an Active Directory domain. A user attempts to log on to the domain from a client computer and receives the following message: “This user account has expired. Ask your administrator to reactivate the account.” You need to ensure that the user is able to log on to the domain. What should you do?

A.    Modify the properties of the user account to set the account to never expire.
B.    Modify the properties of the user account to extend the Logon Hours setting.
C.    Modify the default domain policy to decrease the account lockout duration.
D.    Modify the properties of the user account to set the password to never expire.

Answer: A

QUESTION 419
You have an existing Active Directory site named Site1. You create a new Active Directory site and name it Site2. You need to configure Active Directory replication between Site1 and Site2. You install a new domain controller. You create the site link between Site1 and Site2. What should you do next?

A.    Use the Active Directory Sites and Services console to assign a new IP subnet to Site2. Move the new domain controller object to Site2.
B.    Use the Active Directory Sites and Services console to configure a new site link bridge object.
C.    Use the Active Directory Sites and Services console to decrease the site link cost between Site1 and Site2.
D.    Use the Active Directory Sites and Services console to configure the new domain controller as a preferred bridgehead server for Site1.

Answer: A

QUESTION 420
Your company has an Active Directory forest. Each branch office has an organizational unit and a child organizational unit named Sales. The Sales organizational unit contains all users and computers of the sales department. You need to install an Office 2007 application only on the computers in the Sales organizational unit. You create a GPO named SalesApp GPO. What should you do next?

A.    Configure the GPO to assign the application to the computer account. Link the SalesAPP GPO to the Sales organizational unit in each location.
B.    Configure the GPO to assign the application to the computer account. Link the SalesAPP GPO to the domain.
C.    Configure the GPO to publish the application to the user account. Link the SalesAPP GPO to the Sales organizational unit in each location.
D.    Configure the GPO to assign the application to the user account. Link the SalesAPP GPO to the Sales organizational unit in each location.

Answer: A


http://www.passleader.com/70-640.html

[Pass Ensure VCE Dumps] Free Download PassLeader 70-640 VCE Braindump For Passing Exam Successfully (421-440)

$
0
0

Need New 70-640 Exam Dumps? Download the valid PassLeader 651q 70-640 exam dumps! PassLeader offer the newest 70-640 pdf and vce dumps, which including all the new 70-640 exam questions and answers. We PassLeader ensure that our 651q 70-640 practice test is the most valid and you can get all real exam questions with our 70-640 study guide and pdf ebook materials. We share the 70-640 sample questions with vce and pdf for free download now!

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 421
Your network consists of an Active Directory forest that contains one domain. All domain controllers run Windows Server 2008 R2 and are configured as DNS servers. You have an Active Directory- integrated zone. You have two Active Directory sites. Each site contains five domain controllers. You add a new NS record to the zone. You need to ensure that all domain controllers immediately receive the new NS record. What should you do?

A.    From the DNS Manager console, reload the zone.
B.    From the DNS Manager console, increase the version number of the SOA record.
C.    From the command prompt, run repadmin /syncall.
D.    From the Services snap-in, restart the DNS Server service.

Answer: C

QUESTION 422
Your company has a single Active Directory domain named intranet.contoso.com. All domain controllers run Windows Server 2008 R2. The domain functional level is Windows 2000 native and the forest functional level is Windows 2000. You need to ensure the UPN suffix for contoso.com is available for user accounts. What should you do first?

A.    Raise the intranet.contoso.com forest functional level to Windows Server 2003 or higher.
B.    Raise the intranet.contoso.com domain functional level to Windows Server 2003 or higher.
C.    Add the new UPN suffix to the forest.
D.    Change the Primary DNS Suffix option in the Default Domain Controllers Group Policy Object (GPO) to contoso.com.

Answer: C

QUESTION 423
You have a Windows Server 2008 R2 Enterprise Root CA . Security policy prevents port 443 and port 80 from being opened on domain controllers and on the issuing CA. You need to allow users to request certificates from a Web interface. You install the Active Directory Certificate Services (AD CS) server role. What should you do next?

A.    Configure the Online Responder Role Service on a member server.
B.    Configure the Online Responder Role Service on a domain controller.
C.    Configure the Certificate Enrollment Web Service role service on a member server.
D.    Configure the Certificate Enrollment Web Service role service on a domain controller.

Answer: C

QUESTION 424
You need to relocate the existing user and computer objects in your company to different organizational units. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A.    Run the move-item command in the Microsoft Windows PowerShell utility.
B.    Run the Active Directory Users and Computers utility.
C.    Run the Dsmove utility.
D.    Run the Active Directory Migration Tool (ADMT).

Answer: BC

QUESTION 425
Your network consists of an Active Directory forest named contoso.com. All servers run Windows Server 2008 R2. All domain controllers are configured as DNS servers. The contoso.com DNS zone is stored in the ForestDnsZones Active Directory application partition. You have a member server that contains a standard primary DNS zone for dev.contoso.com. You need to ensure that all domain controllers can resolve names for dev.contoso.com. What should you do?

A.    Modify the properties of the SOA record in the contoso.com zone.
B.    Create a NS record in the contoso.com zone.
C.    Create a delegation in the contoso.com zone.
D.    Create a standard secondary zone on a Global Catalog server.

Answer: C

QUESTION 426
Your company has a single Active Directory domain. All domain controllers run Windows Server 2003. You install Windows Server 2008 R2 on a server. You need to add the new server as a domain controller in your domain. What should you do first?

A.    On a domain controller run adprep /rodcprep.
B.    On the new server, run dcpromo /adv.
C.    On the new server, run dcpromo /createdcaccount.
D.    On a domain controller, run adprep /forestprep.

Answer: D

QUESTION 427
Your company has a main office and three branch offices. Each office is configured as a separate Active Directory site that has its own domain controller. You disable an account that has administrative rights. You need to immediately replicate the disabled account information to all sites. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A.    From the Active Directory Sites and Services console, configure all domain controllers as global catalog servers.
B.    From the Active Directory Sites and Services console, select the existing connection objects and force replication.
C.    Use Repadmin.exe to force replication between the site connection objects.
D.    Use Dsmod.exe to configure all domain controllers as global catalog servers.

Answer: BC

QUESTION 428
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to capture all replication errors from all domain controllers to a central location. What should you do?

A.    Start the Active Directory Diagnostics data collector set.
B.    Start the System Performance data collector set.
C.    Install Network Monitor and create a new a new capture.
D.    Configure event log subscriptions.

Answer: D

QUESTION 429
Your company has an Active Directory forest that contains client computers that run Windows Vista and Microsoft Windows XP. You need to ensure that users are able to install approved application updates on their computers. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Set up Automatic Updates through Control Panel on the client computers.
B.    Create a GPO and link it to the Domain Controllers organizational unit. Configure the GPO to automatically search for updates on the Microsoft Update site.
C.    Create a GPO and link it to the domain. Configure the GPO to direct the client computers to the Windows Server Update Services (WSUS) server for approved updates.
D.    Install the Windows Server Update Services (WSUS). Configure the server to search for new updates on the Internet. Approve all required updates.

Answer: CD

QUESTION 430
Your company has an Active Directory domain that has an organizational unit named Sales. The Sales organizational unit contains two global security groups named sales managers and sales executives. You need to apply desktop restrictions to the sales executives group. You must not apply these desktop restrictions to the sales managers group. You create a GPO named DesktopLockdown and link it to the Sales organizational unit. What should you do next?

A.    Configure the Deny Apply Group Policy permission for Authenticated Users on the DesktopLockdown GPO.
B.    Configure the Deny Apply Group Policy permission for the sales executives on the DesktopLockdown GPO.
C.    Configure the Allow Apply Group Policy permission for Authenticated Users on the DesktopLockdown GPO.
D.    Configure the Deny Apply Group Policy permission for the sales managers on the DesktopLockdown GPO.

Answer: D


http://www.passleader.com/70-640.html

QUESTION 431
Your company network has an Active Directory forest that has one parent domain and one child domain. The child domain has two domain controllers that run Windows Server 2008. All user accounts from the child domain are migrated to the parent domain. The child domain is scheduled to be decommissioned. You need to remove the child domain from the Active Directory forest. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A.    Run the Computer Management console to stop the Domain Controller service on both domain controllers in the child domain.
B.    Delete the computer accounts for each domain controller in the child domain. Remove the trust relationship between the parent domain and the child domain.
C.    Use Server Manager on both domain controllers in the child domain to uninstall the Active Directory domain services role.
D.    Run the Dcpromo tool that has individual answer files on each domain controller in the child domain.

Answer: CD

QUESTION 432
Your network consists of a single Active Directory domain. The domain contains 10 domain controllers. The domain controllers run Windows Server 2008 R2 and are configured as DNS servers. You plan to create a new Active Directory-integrated zone. You need to ensure that the new zone is only replicated to four of your domain controllers. What should you do first?

A.    From the command prompt, run dnscmd and specify the /createdirectorypartition parameter.
B.    Create a new delegation in the ForestDnsZones application directory partition.
C.    From the command prompt, run dnscmd and specify the /enlistdirectorypartition parameter.
D.    Create a new delegation in the DomainDnsZones application directory partition.

Answer: A

QUESTION 433
Your company has an Active Directory domain and an organizational unit. The organizational unit is named Web. You configure and test new security settings for Internet Information Service (IIS) Servers on a server named IISServerA. You need to deploy the new security settings only on the IIS servers that are members of the Web organizational unit. What should you do?

A.    Run secedit /configure /db iis.inf from the command prompt on IISServerA, then run secedit /configure /db webou.inf from the comand prompt.
B.    Export the settings on IISServerA to create a security template. Import the security template into a GPO and link the GPO to the Web organizational unit.
C.    Export the settings on IISServerA to create a security template. Run secedit /configure /db webou.inf from the comand prompt.
D.    Import the hisecws.inf file template into a GPO and link the GPO to the Web organizational unit.

Answer: B

QUESTION 434
Your network consists of an Active Directory forest that contains two domains. All servers run Windows Server 2008 R2. All domain controllers are configured as DNS Servers. You have a standard primary zone for dev. contoso.com that is stored on a member server. You need to ensure that all domain controllers can resolve names from the dev.contoso.com zone. What should you do?

A.    On the member server, create a stub zone.
B.    On the member server, create a NS record for each domain controller.
C.    On one domain controller, create a conditional forwarder. Configure the conditional forwarder to replicate to all DNS servers in the forest.
D.    On one domain controller, create a conditional forwarder. Configure the conditional forwarder to replicate to all DNS servers in the domain.

Answer: C

QUESTION 435
Your company has an Active Directory domain. You install a new domain controller in the domain. Twenty users report that they are unable to log on to the domain. You need to register the SRV records. Which command should you run on the new domain controller?

A.    Run the netsh interface reset command.
B.    Run the ipconfig /flushdns command.
C.    Run the dnscmd /EnlistDirectoryPartition command.
D.    Run the sc stop netlogon command followed by the sc start netlogon command.

Answer: D

QUESTION 436
You have a Windows Server 2008 R2 that has the Active Directory Certificate Services server role installed. You need to minimize the amount of time it takes for client computers to download a certificate revocation list (CRL). What should you do?

A.    Install and configure an Online Responder.
B.    Import the Issuing CA certificate into the Trusted Root Certification Authorities store on all client workstations.
C.    Install and configure an additional domain controller.
D.    Import the Root CA certificate into the Trusted Root Certification Authorities store on all client workstations.

Answer: A

QUESTION 437
You want users to log on to Active Directory by using a new Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use?

A.    Dsmod
B.    Netdom
C.    Redirusr
D.    Active Directory Domains and Trusts

Answer: A

QUESTION 438
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. Auditing is configured to log changes made to the Managed By attribute on group objects in an organizational unit named OU1. You need to log changes made to the Description attribute on all group objects in OU1 only. What should you do?

A.    Run auditpol.exe.
B.    Modify the auditing entry for OU1.
C.    Modify the auditing entry for the domain.
D.    Create a new Group Policy Object (GPO). Enable Audit account management policy setting. Link the GPO to OU1.

Answer: B

QUESTION 439
Your company uses shared folders. Users are granted access to the shared folders by using domain local groups. One of the shared folders contains confidential data. You need to ensure that unauthorized users are not able to access the shared folder that contains confidential data. What should you do?

A.    Enable the Do not trust this computer for delegation property on all the computers of unauthorized users by using the Dsmod utility.
B.    Instruct the unauthorized users to log on by using the Guest account. Configure the Deny Full control permission on the shared folders that hold the confidential data for the Guest account.
C.    Create a Global Group named Deny DLG. Place the global group that contains the unauthorized users in to the Deny DLG group. Configure the Allow Full control permission on the shared folder that hold the confidential data for the Deny DLG group.
D.    Create a Domain Local Group named Deny DLG. Place the global group that contains the unauthorized users in to the Deny DLG group. Configure the Deny Full control permission on the shared folder that hold the confidential data for the Deny DLG group.

Answer: D

QUESTION 440
Your company has an Active Directory domain. You install an Enterprise Root certification authority (CA) on a member server named Server1. You need to ensure that only the Security Manager is authorized to revoke certificates that are supplied by Server1. What should you do?

A.    Remove the Request Certificates permission from the Domain Users group.
B.    Remove the Request Certificated permission from the Authenticated Users group.
C.    Assign the Allow – Manage CA permission toonly the Security Manager user Account.
D.    Assign the Allow – Issue and Manage Certificates permission to only the Security Manger user account.

Answer: D


http://www.passleader.com/70-640.html

[Pass Ensure VCE Dumps] Free PassLeader Valid 70-640 Braindumps Guarantee 100 Percent Pass (441-460)

$
0
0

Need New 70-640 Exam Dumps? Download the valid PassLeader 651q 70-640 exam dumps! PassLeader offer the newest 70-640 pdf and vce dumps, which including all the new 70-640 exam questions and answers. We PassLeader ensure that our 651q 70-640 practice test is the most valid and you can get all real exam questions with our 70-640 study guide and pdf ebook materials. We share the 70-640 sample questions with vce and pdf for free download now!

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 441
You need to deploy a read-only domain controller (RODC) that runs Windows Server 2008 R2. What is the minimal forest functional level that you should use?

A.    Windows Server 2008 R2
B.    Windows Server 2008
C.    Windows Server 2003
D.    Windows 2000

Answer: C

QUESTION 442
Your company has three Active Directory domains in a single forest. You install a new Active Directory enabled application. The application ads new user attributes to the Active Directory schema. You discover that the Active Directory replication traffic to the Global Catalogs has increased. You need to prevent the new attributes from being replicated to the Global Catalog. You must achieve this goal without affecting application functionality. What should you do?

A.    Change the replication interval for the DEFAULTIPSITELINK object to 9990.
B.    Change the cost for the DEFAULTIPSITELINK object to 9990.
C.    Make the new attributes in the Active Directory as defunct.
D.    Modify the properties in the Active Directory schema for the new attributes.

Answer: D

QUESTION 443
You are decommissioning one of the domain controllers in a child domain. You need to transfer all domain operations master roles within the child domain to a newly installed domain controller in the same child domain. Which three domain operations master roles should you transfer? (Each correct answer presents part of the solution. Choose three.)

A.    RID master
B.    PDC emulator
C.    Schema master
D.    Infrastructure master
E.    Domain naming master

Answer: ABD

QUESTION 444
There are 100 servers and 2000 computers present at your company’s headquarters. The DHCP service is installed on a two-node Microsoft failover cluster named CKMFO to ensure the high availability of the service. The nodes are named as CKMFON1 and CKMFON2. The cluster on CKMFO has one physical shared disk of 400 GB capacity. A 200GB single volume is configured on the shared disk. Company has decided to host a Windows Internet Naming Service (WINS) on CKMFON1. The DHCP and WINS services will be hosted on other nodes. Using High Availability Wizard, you begin creating the WINS service group on cluster available on CKMFON1 node. The wizard shows an error “no disks are available” during configuration. Which action should you perform to configure storage volumes on CKMFON1 to successfully add the WINS Service group to CKMFON1?

A.    Backup all data on the single volume on CKMFON1 and configure the disk with GUID partition table and create two volumes. Restore the backed up data on one of the volumes and use the other for WINS service group.
B.    Add a new physical shared disk to the CKMFON1 cluster and configure a new volume on it. Use this volume to fix the error in the wizard.
C.    Add new physical shared disks to CKMFON1 and EMBFON2. Configure the volumes onthese disk and direct CKMOFONI to use CKMFON2 volume for the WINS service group.
D.    Add and configure a new volume on the existing shared disk which has 400GB of space. Use this volume to fix the error in the wizard.
E.    None of the above.

Answer: B

QUESTION 445
Company servers run Windows Server 2008. It has a single Active Directory domain. A server called S4 has file services role installed. You install some disk for additional storage. The disks are configured as shown in the exhibit. To support data stripping with parity, you have to create a new drive volume. What should you do to achieve this objective?

A.    Build a new spanned volume by combining Disk0 and Disk1
B.    Create a new Raid-5 volume by adding another disk.
C.    Create a new virtual volume by combining Disk 1 and Disk 2
D.    Build a new striped volume by combining Disk0 and Disk 2

Answer: B

QUESTION 446
Your company asks you to implement Windows Cardspace in the domain. You want to use Windows Cardspace at your home. Your home and office computers run Windows Vista Ultimate. What should you do to create a backup copy of Windows Cardspace cards to be used at home?

A.    Log on with your administrator account and copy \Windows\ServiceProfiles folder to your USB drive
B.    Backup \Windows\Globalization folder by using backup status and save the folder on your USB drive
C.    Back up the system state data by using backup status tool on your USB drive
D.    Employ Windows Cardspace application to backup the data on your USB drive
E.    Reformat the C: Drive
F.    None of the above

Answer: D

QUESTION 447
Company has servers on the main network that run Windows Server 2008. It also has two domain controllers. Active Directory services are running on a domain controller named CKDC1. You have to perform critical updates of Windows Server 2008 on CKDC1 without rebooting the server. What should you do to perform offline critical updates on CKDC1 without rebooting the server?

A.    Start the Active Directory Domain Services on CKDC1.
B.    Disconnect from the network and start the Windows update feature.
C.    Stop the Active Directory domain services and install the updates. Start the Active Directory domain services after installing the updates.
D.    Stop Active Directory domain services and install updates. Disconnect from the network and then connect again.
E.    None of the above.

Answer: C

QUESTION 448
Your network contains a server named Server1 that runs Windows Server 2008 R2. On Server1, you create an Active Directory Lightweight Directory Services (AD LDS) instance named Instance1. You connect to Instance1 by using ADSI Edit. You run the Create Object wizard and you discover that there is no User object class. You need to ensure that you can create user objects in Instance1. What should you do?

A.    Run the AD LDS Setup Wizard.
B.    Modify the schema of Instance1.
C.    Modify the properties of the Instance1 service.
D.    Install the Remote Server Administration Tools (RSAT).

Answer: A

QUESTION 449
Your network contains an Active Directory domain. The domain contains a server named Server1. Server1 runs Windows Server 2008 R2. You need to mount an Active Directory Lightweight Directory Services (AD LDS) snapshot from Server1. What should you do?

A.    Run ldp.exe and use the Bind option.
B.    Run diskpart.exe and use the Attach option.
C.    Run dsdbutil.exe and use the snapshot option.
D.    Run imagex.exe and specify the /mount parameter.

Answer: C

QUESTION 450
Your network contains a single Active Directory domain. Active Directory Rights Management Services (AD RMS) is deployed on the network. A user named User1 is a member of only the AD RMS Enterprise Administrators group. You need to ensure that User1 can change the service connection point (SCP) for the AD RMS installation. The solution must minimize the administrative rights of User1. To which group should you add User1?

A.    AD RMS Auditors
B.    AD RMS Service Group
C.    Domain Admins
D.    Schema Admins

Answer: C


http://www.passleader.com/70-640.html

QUESTION 451
Your network contains two Active Directory forests named contoso.com and adatum.com. Active Directory Rights Management Services (AD RMS) is deployed in contoso.com. An AD RMS trusted user domain (TUD) exists between contoso.com and adatum.com. From the AD RMS logs, you discover that some clients that have IP addresses in the adatum.com forest are authenticating as users from contoso.com. You need to prevent users from impersonating contoso.com users. What should you do?

A.    Configure trusted e-mail domains.
B.    Enable lockbox exclusion in AD RMS.
C.    Create a forest trust between adatum.com and contoso.com.
D.    Add a certificate from a third-party trusted certification authority (CA).

Answer: A

QUESTION 452
Your network contains an Active Directory domain named contoso.com. The network contains client computers that run either Windows Vista or Windows 7. Active Directory Rights Management Services (AD RMS) is deployed on the network. You create a new AD RMS template that is distributed by using the AD RMS pipeline. The template is updated every month. You need to ensure that all the computers can use the most up-to-date version of the AD RMS template. You want to achieve this goal by using the minimum amount of administrative effort. What should you do?

A.    Upgrade all of the Windows Vista computers to Windows 7.
B.    Upgrade all of the Windows Vista computers to Windows Vista Service Pack 2 (SP2).
C.    Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all users by using a Software Installation extension of Group Policy.
D.    Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all computers by using a Software Installation extension of Group Policy.

Answer: B

QUESTION 453
Active Directory Rights Management Services (AD RMS) is deployed on your network. Users who have Windows Mobile 6 devices report that they cannot access documents that are protected by AD RMS. You need to ensure that all users can access AD RMS protected content by using Windows Mobile 6 devices. What should you do?

A.    Modify the security of the ServerCertification.asmx file.
B.    Modify the security of the MobileDeviceCertification.asmx file.
C.    Enable anonymous authentication for the _wmcs virtual directory.
D.    Enable anonymous authentication for the certification virtual directory.

Answer: B

QUESTION 454
Your network contains a server named Server1. The Active Directory Rights Management Services (AD RMS) server role is installed on Server1. An administrator changes the password of the user account that is used by AD RMS. You need to update AD RMS to use the new password. Which console should you use?

A.    Active Directory Rights Management Services
B.    Active Directory Users and Computers
C.    Component Services
D.    Services

Answer: A

QUESTION 455
Your network contains an Active Directory Rights Management Services (AD RMS) cluster. You have several custom policy templates. The custom policy templates are updated frequently. Some users report that it takes as many as 30 days to receive the updated policy templates. You need to ensure that users receive the updated custom policy templates within seven days. What should you do?

A.    Modify the registry on the AD RMS servers.
B.    Modify the registry on the users’ computers.
C.    Change the schedule of the AD RMS Rights Policy Template Management (Manual) scheduled task.
D.    Change the schedule of the AD RMS Rights Policy Template Management (Automated) scheduled task.

Answer: B

QUESTION 456
Your network contains an Active Directory domain named adatum.com. You need to ensure that IP addresses can be resolved to fully qualified domain names (FQDNs). Under which node in the DNS snap-in should you add a zone?

A.    Reverse Lookup Zones
B.    adatum.com
C.    Forward Lookup Zones
D.    Conditional Forwarders
E.    _msdcs.adatum.com

Answer: A

QUESTION 457
Your network contains an Active Directory domain named adatum.com. The domain contains a domain controller named DC1. DC1 has an IP address of 192.168.200.100. You need to identify the zone that contains the Pointer (PTR) record for 0C1. Which zone should you identify?

A.    adatum.com
B.    _msdcs.adatum.com
C.    100.168.192.in-addr.arpa
D.    200.168.192.in-addr.arpa

Answer: D

QUESTION 458
Your network contains an Active Directory forest named adatum.com. The DNS infrastructure fails. You rebuild the DNS infrastructure. You need to force the registration of the Active Directory Service Locator (SRV) records in DNS. Which service should you restart on the domain controllers?

A.    Netlogon
B.    DNS Server
C.    Network Location Awareness
D.    Network Store Interface Service
E.    Online Responder Service

Answer: A

QUESTION 459
Your network contains an Active Directory domain named adatum.com. The password policy of the domain requires that the passwords for all user accounts be changed every 50 days. You need to create several user accounts that will be used by services. The passwords for these accounts must be changed automatically every 50 days. Which tool should you use to create the accounts?

A.    Active Directory Administrative Center
B.    Active Directory Users and Computers
C.    Active Directory Module for Windows PowerShell
D.    ADSI Edit
E.    Active Directory Domains and Trusts

Answer: C

QUESTION 460
Your network contains an Active Directory domain. The domain contains several domain controllers. You need to modify the Password Replication Policy on a read-only domain controller (RODC). Which tool should you use?

A.    Group Policy Management
B.    Active Directory Domains and Trusts
C.    Active Directory Users and Computers
D.    Computer Management
E.    Security Configuration Wizard

Answer: C


http://www.passleader.com/70-640.html

[Pass Ensure VCE Dumps] Quality 651q 70-640 Exam Questions Verified By Experts Ensure 100 Percent Pass (461-480)

$
0
0

PassLeader’s 651q 70-640 vce dumps and pdf dumps help passing 70-640 exam! PassLeader nowadays provide the new version 70-640 exam questions with vce and pdf for free download, the latest 70-640 study guide and practice test tell you all details about exam 70-640, you can acquire the 70-640 certification easily by learning PassLeader’s 651q 70-640 premium vce file and pdf dumps. Now visit passleader.com and download free 70-640 exam dumps and you will pass 70-640 exam the other day.

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 461
Your network contains an Active Directory forest. The forest contains domain controllers that run Windows Server 2008 R2. The functional level of the forest is Windows Server 2003. The functional level of the domain is Windows Server 2008. From a domain controller, you need to perform an authoritative restore of an organizational unit (OU). What should you do first?

A.    Raise the functional level of the forest.
B.    Modify the tombstone lifetime of the forest.
C.    Restore the system state.
D.    Raise the functional level of the domain.

Answer: C

QUESTION 462
Your network contains an Active Directory forest. The forest contains two domains named contoso.com and woodgrovebank.com. You have a custom attribute named Attribute 1 in Active Directory. Attribute 1 is associated to User objects. You need to ensure that Attribute1 is included in the global catalog. What should you do?

A.    From the Active Directory Schema snap-in, modify the properties of the Attribute 1 attributeSchema object.
B.    In Active Directory Users and Computers, configure the permissions on the Attribute 1 attribute for User objects.
C.    From the Active Directory Schema snap-in, modify the properties of the User classSchema object.
D.    In Active Directory Sites and Services, configure the Global Catalog settings for all domain controllers in the forest.

Answer: A

QUESTION 463
Your network contains a server named Server1. Server1 runs Windows Server 2008 R2 and has the Active Directory Lightweight Directory Services (AD LDS) role installed. Server1 hosts two AD LDS instances named Instance1 and Instance2. You need to remove Instance2 from Server1 without affecting Instance1. Which tool should you use?

A.    NTDSUtil
B.    Dsdbutil
C.    Programs and Features in the Control Panel
D.    Server Manager

Answer: C

QUESTION 464
Your network contains an Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to compact the Active Directory database. What should you do?

A.    Run the Get-ADForest cmdlet.
B.    Configure subscriptions from Event Viewer.
C.    Run the eventcreate.exe command.
D.    Configure the Active Directory Diagnostics Data Collector Set (OCS).
E.    Create a Data Collector Set (DCS).
F.    Run the repadmin.exe command.
G.    Run the ntdsutil.exe command.
H.    Run the dsquery.exe command.
I.    Run the dsamain.exe command.
J.    Create custom views from Event Viewer.

Answer: G

QUESTION 465
Your network contains an Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to collect all of the Directory Services events from all of the domain controllers and store the events in a single central computer. What should you do?

A.    Run the ntdsutil.exe command.
B.    Run the repodmin.exe command.
C.    Run the Get-ADForest cmdlet.
D.    Run the dsamain.exe command.
E.    Create custom views from Event Viewer.
F.    Run the dsquery.exe command.
G.    Configure the Active Directory Diagnostics Data Collector Set (DCS),
H.    Configure subscriptions from Event Viewer.
I.    Run the eventcreate.exe command.
J.    Create a Data Collector Set (DCS).

Answer: H

QUESTION 466
Your network contains an Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to receive a notification when more than 100 Active Directory objects are deleted per second. What should you do?

A.    Create custom views from Event Viewer.
B.    Run the Get-ADForest cmdlet.
C.    Run the ntdsutil.exe command.
D.    Configure the Active Directory Diagnostics Data Collector Set (DCS).
E.    Create a Data Collector Set (DCS).
F.    Run the dsamain.exe command.
G.    Run the dsquery.exe command.
H.    Run the repadmin.exe command.
I.    Configure subscriptions from Event Viewer.
J.    Run the eventcreate.exe command.

Answer: E

QUESTION 467
Your network contains an Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to create a snapshot of Active Directory. What should you do?

A.    Run the dsquery.exe command.
B.    Run the dsamain.exe command.
C.    Create custom views from Event Viewer.
D.    Configure subscriptions from Event Viewer.
E.    Create a Data Collector Set (DCS).
F.    Configure the Active Directory Diagnostics Data Collector Set (DCS).
G.    Run the repadmin.exe command.
H.    Run the ntdsutil.exe command.
I.    Run the Get-ADForest cmdlet.
J.    Run the eventcreate.exe command.

Answer: H

QUESTION 468
Your network contains an Active Directory domain. All domain controllers run Windows Server 2008 R2. You mount an Active Directory snapshot. You need to ensure that you can query the snapshot by using LDAP. What should you do?

A.    Run the dsamain.exe command.
B.    Create custom views from Event Viewer.
C.    Run the ntdsutil.exe command.
D.    Configure subscriptions from Event Viewer.
E.    Run the Get-ADForest cmdlet.
F.    Create a Data Collector Set (DCS).
G.    Run the eventcreate.exe command.
H.    Configure the Active Directory Diagnostics Data Collector Set (DCS).
I.    Run the repadmin.exe command.
J.    Run the dsquery.exe command.

Answer: A

QUESTION 469
Domains provide which of the following functions?

A.    Creating logical boundaries
B.    Easing the administration of users, groups, computers, and other objects
C.    Providing a central database of network objects
D.    All of the above

Answer: D

QUESTION 470
You are the administrator for a large organization with multiple remote sites. Your supervisor security. What type of server can you implement to ease their would like to have remote users log in locally to their own site, but he is nervous about concerns?

A.    Domain controller
B.    Global Catalog
C.    Read-only domain controller
D.    Universal Group Membership Caching Server

Answer: C


http://www.passleader.com/70-640.html

QUESTION 471
You are the network administrator for the ABC Company. Your network consists of two DNS servers named DNS1 and DNS2. The users who are configured to use DNS2 complain because they are unable to connect to Internetwebsites.

The users connected to DNS2 need to be able to access the Internet. What needs to be done?

A.    Build a new Active Directory Integrated zone on DNS2.
B.    Delete the .(root) zone from DNS2 and configure Conditional forwarding on DNS2.
C.    Delete the current cache.dns file.
D.    Update your cache.dns file and root hints.

Answer: B

QUESTION 472
You are the network administrator for a large company that has one main site and one branch office. Your company has a single Active Directory forest, ABC.com. You have a single domain controller named ServerA in the main site that has the DNS role installed. ServerA is configured as a primary DNS zone. You have decided to place a domain controller named ServerB in the remote site and implement theDNS role on that server. You want to configure DNS so that if the WAN link fails, users in both sites can still update recordsand resolve any DNS queries. How should you configure the DNS servers?

A.    Configure Server B as a secondary DNS server. Set replication to occur every 5 minutes.
B.    Configure Server B as s stub zone.
C.    Configure Server B as an Active Directory Integrated zone and convert Server A to an Active Directory Integrated zone.
D.    Configure Server A as an Active Directory Integrated zone and configure Server B as a secondary zone.

Answer: C

QUESTION 473
You are the network administrator for an organization that has two locations, New York and London. Each location has multiple domains but all domains fall under the same tree, Stellacon.com. Users in the NY.us.stellacon.com domain need to access resources in the London.uk.stellacon.com domain. You need to reduce the amount of time it takes for authentication when users from NY.us.stellacon.com access resources in London.uk.stellacon.com. What can you do?

A.    Set up a one-way shortcut trust from London.uk.stellacon.com to NY.us.stellacon.com.
B.    Set up a one-way shortcut trust from NY.us.stellacon.com to London.uk.stellacon.com.
C.    Enable Universal Group Membership Caching in NY.us.stellacon.com.
D.    Enable Universal Group Membership Caching in London.uk.stellacon.com.

Answer: A

QUESTION 474
You need to deactivate the UGMC option on some of your domain controllers. At which level in Active Directory would you deactivate UGMC?

A.    Server
B.    Site
C.    Domain
D.    Forest

Answer: B

QUESTION 475
You work for an organization with a single domain forest. Your company has one main location and two branch locations. All locations are configured as Active Directory sites and all sites are connected with the DEFAULTIPSITELINK object. Your connections are running slower than the company policy allows. You want to decrease the replication latency between all domain controllers in the various sites. What should you do?

A.    Decrease the Replication interval for the DEFAULTIPSITELINK object.
B.    Decrease the Replication interval for the site.
C.    Decrease the Replication schedule for the site.
D.    Decrease the Replication schedule for all domain controllers.

Answer: A

QUESTION 476
You are the network administrator for the ABC Company. The ABC Company has all Windows Server 2008 R2 Active Directory domains and uses an EnterpriseRoot certificate server. You need to verify that revoked certificate data is highly available. What should you do?

A.    Implement a Group Policy Object(GPO) that has the Certificate Verification Enabled option.
B.    Using Network Load Balancing, implement an Online Certificate Status Protocol(OCSP) responder.
C.    Implement a Group Policy object(GPO) that enables the Online Certificate Status Protocol(OCSP) responder.
D.    Using Network Load Balancing, implement the Certificate Verification Enabled option.

Answer: B

QUESTION 476
You deploy a new Active Directory Federation Services (AD FS) federation server. You request new certificates for the AD FS federation server. You need to ensure that the AD FS federation server can use the new certificates. To which certificate store should you import the certificates?

A.    Computer
B.    IIS Admin Service service account
C.    Local Administrator
D.    World Wide Web Publishing Service service account

Answer: A

QUESTION 478
You are the administrator of an organization with a single Active Directory domain. A user who left the company returns after 16 weeks. The user tries to log onto their old computer and receives an error stating that authentication hasfailed. The user’s account has been enabled. You need to ensure that the user is able to log onto the domain using that computer. What do you do?

A.    Reset the computer account in Active Directory. Disjoin the computer from the domain and then rejoin the computer to the domain.
B.    Run the ADadd command to rejoin the computer account.
C.    Run the MMC utility on the user’s computer and add the Domain Computers snap-in.
D.    Re-create the user account and reconnect the user account to the computer account.

Answer: A

QUESTION 479
You are the administrator of an organization with a single Active Directory domain. One of your senior executives tries to log onto a machine and receives the error “This user account has expired. Ask your administrator to reactivate your account”. You need to make sure this doesn’t happen again to this user. What do you do?

A.    Configure the domain policy to disable account lockouts.
B.    Configure the password policy to extend the maximum password age to 0.
C.    Modify the user’s properties to set the Account Never Expires setting.
D.    Modify the user’s properties to extend the maximum password age to 0.

Answer: C

QUESTION 480
You work for an organization with a single Windows Server 2008 R2 Active Directory domain. The domain has OUs for Sales, Marketing, Admin, R&D and Finance. You need only the users in the Finance OU to get Windows Office 2010 installed automatically ontotheir computers. You create a GPO named OfficeApp. What is the next step in getting all the Finance users Office 2010?

A.    Edit the GPO and assign the Office application to the users account. Link the GPO to the Finance OU.
B.    Edit the GPO and assign the Office application to the users account. Link the GPO to the domain.
C.    Edit the GPO and assign the Office application to the computer account. Link the GPO to the domain.
D.    Edit the GPO and assign the Office application to the computer account. Link the GPO to the Finance OU.

Answer: D


http://www.passleader.com/70-640.html

[Pass Ensure VCE Dumps] Learning PassLeader 70-640 Free VCE and PDF Dumps To Pass Exam Quickly (481-500)

$
0
0

PassLeader’s 651q 70-640 vce dumps and pdf dumps help passing 70-640 exam! PassLeader nowadays provide the new version 70-640 exam questions with vce and pdf for free download, the latest 70-640 study guide and practice test tell you all details about exam 70-640, you can acquire the 70-640 certification easily by learning PassLeader’s 651q 70-640 premium vce file and pdf dumps. Now visit passleader.com and download free 70-640 exam dumps and you will pass 70-640 exam the other day.

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 481
You are the systems administrator for a medium-sized Active Directory domain. Currently, the environment supports many different domain controllers, some of which are running Windows NT 4 and others that are running Windows 2003 and Server 2008 R2. When you are running domain controllers in this type of environment, which of the following types of groups can you not use? (Choose Two)

A.    Universal security groups
B.    Global groups
C.    Domain local groups
D.    Computer groups

Answer: AD

QUESTION 482
You are the network administrator for an organization that has all Windows Server 2008 R2 domain controllers. You need to capture all replication errors that occur between all domain controllers. What should you do?

A.    Use System Performance data collector sets.
B.    Use ntdsutil.
C.    Configure event log subscriptions.
D.    Use the ADSI Edit tool.

Answer: C

QUESTION 483
You are one of two network administrators for your organization. Your IT partner does most of the work in Active Directory. While working in Active Directory, your partner accidently deleted a user from the Sales OU. You recover the user from tape backup but you want to help prevent this from happening again inthe future. What can you do?

A.    Enable the Active Directory Recycle Bin.
B.    Use ADSI Edit to restore the user.
C.    Take away all rights from the other administrator.
D.    Use the Directory Services Restore Mode Lockout command.

Answer: A

QUESTION 484
What is the maximum number of domains that a Windows Server 2008 R2 computer, configured as a domain controller, may participate in at one time?

A.    Zero
B.    One
C.    Two
D.    Any number of domains

Answer: B

QUESTION 485
You are the systems administrator of a large organization that has recently implemented Windows Server 2008 R2. You have a few remote sites that do not have very tight security. You have decided to implement read-only domain controllers (RODC). What forest functional levels does the network need for you to do the install? (Choose Three)

A.    Windows 2000 Mixed
B.    Windows 2008 R2
C.    Windows 2003
D.    Windows 2008

Answer: BCD

QUESTION 486
Your network contains an Active Directory domain. The domain contains 20 domain controllers. You need to identify which domain controllers are global catalog servers. Which tool should you use?

A.    dsquery
B.    netsh
C.    nltest
D.    Get-ADOptionalFeature

Answer: A

QUESTION 487
ABC.com has a network that consists of a single Active Directory domain.Windows Server 2008 is installed on all domain controllers in the network. You are instructed to capture all replication errors from all domain controllers to a central location. What should you do to achieve this task?

A.    Initiate the Active Directory Diagnostics data collector set
B.    Set event log subscriptions and configure it
C.    Initiate the System Performance data collector set
D.    Create a new capture in the Network Monitor

Answer: B

QUESTION 488
Your network contains an Active Directory forest. The forest contains two domains named contoso.com and east.contoso.com. The contoso.com domain contains a domain controller named DC1. The east.contoso.com domain contains a domain controller named DC2. DC1 and DC2 have the DNS Server server role installed. You need to create a DNS zone that is available on DC1 and DC2. The solution must ensure that zone transfers are encrypted. What should you do?

A.    Create a primary zone on DC1 and store the zone in DC=Contoso, DC=com naming context.
Create a secondary zone on DC2 and select DC1 as the master.
B.    Create a primary zone on DC1 and store the zone in a zone file.
Configure Encrypting File System (EFS) encryption.
Create a secondary zone on DC2 and select DC1 as the master.
C.    Create a primary zone on DC1 and store the zone in a zone file.
Configure IPSec on DC1 and DC2.
Create a secondary zone on DC2 and select DC1 as the master.
D.    Create a primary zone on DC1 and store the zone in a zone file.
Configure DNSSEC for the zone.
Create a secondary zone on DC2 and select DC1 as the master.

Answer: C

QUESTION 489
You are hired as a consultant by ABC Corporation to implement a Windows Server 2008 R2 computer onto their Windows Server 2003 domain. All of the client machines are Windows 7. You install Windows Server 2008 R2 onto a new computer and join that computer to the Windows 2003 domain. You want to upgrade the Windows Server 2008 R2 to a domain controller. What should you do first?

A.    On the new server, run adprep /domainprep.
B.    On the new server, run adprep /forestprep.
C.    On a Windows Server 2003 domain controller, run adprep /domainprep.
D.    On a Windows Server 2003 domain controller, run adprep /forestprep.

Answer: D

QUESTION 490
You are the network administrator for your organization. Your company uses a Windows Server 2008 R2 Enterprise Root CA. The company has issued a new policy that prevents port 443 and port 80 from being opened on domain controllers and on issuing CAs. Your users need to request certificates from a web interface. You have already installed the AD CS role. What do you need to do next?

A.    Configure the Certificate Authority Web Enrollment Service on a member server.
B.    Configure the Certificate Authority Web Enrollment Service on a domain server.
C.    Configure AD FS on member server to allow secure web-based access.
D.    Configure AD FS on domain controller to allow secure web-based access.

Answer: A


http://www.passleader.com/70-640.html

QUESTION 491
Your network contains an Active Directory forest named contoso.com. You need to identify whether a fine-grained password policy is applied to a specific group. Which tool should you use?

A.    Active Directory Users and Computers
B.    Security Configuration Wizard (SCW)
C.    Group Policy Management Editor
D.    Active Directory Sites and Services

Answer: A

QUESTION 492
Your network contains an Active Directory forest. The forest contains one domain named contoso.com. You attempt to run adprep /forestprep and the operation fails. You discover that the first domain controller deployed to the forest failed. You need to run adprep /forestprep successfully. What should you do?

A.    Move the PDC emulator role.
B.    Move the RID master role.
C.    Move the infrastructure master role.
D.    Move the schema master role.
E.    Move the global catalog server.
F.    Move the bridgehead server.
G.    Install a read-only domain controller (RODC).
H.    Deploy an additional global catalog server.
I.    Restart the Active Directory Domain Services (AD DS) service.

Answer: D

QUESTION 493
Your network contains an Active Directory forest named contoso.com. The functional level of the forest is Windows Server 2008 R2. The forest contains a single domain. You need to ensure that objects can be restored from the Active Directory Recycle Bin. Which tool should you use?

A.    Ntdsutil
B.    Dsamain
C.    Ldp
D.    Add-PSSnapin

Answer: C

QUESTION 494
Your network contains an Active Directory forest named contoso.com. The functional level of the forest is Windows Server 2008 R2. You have four Active Directory sites. Each site has multiple Active Directory subnets. You need to identify all of the authentication requests that originate from client computers that are not associated to an Active Directory subnet. What should you use?

A.    The System log
B.    The %Systemroot%\Debug\Netsetup.log log file
C.    The Authentication User Interface operational log
D.    The %Systemroot%\Security\Logs\Winlogon.log log file

Answer: B

QUESTION 495
Your network contains an Active Directory domain named fabrikam.com. The domain has one Active Directory site. The domain contains an organizational unit (OU) named SalesOU. SalesOU contains all of the user accounts for the sales department. Some of the sales users are temporary employees. You apply a Group Policy object (GPO) named SalesGPO to SalesOU. You need to prevent SalesGPO from being applied to the temporary sales employees. All other sales employees must have SalesGPO applied to them. What should you do?

A.    Configure the permissions on the user accounts of the temporary sales employees.
B.    Configure the permissions of SalesGPO.
C.    Link SalesGPO to the site and remove the link for SalesGPO from SalesOU.
D.    Disable the computer configurations of SalesGPO.

Answer: B

QUESTION 496
A corporate network includes a single Active Directory Domain Services (AD D5) domain. The domain contains 10 domain controllers. The domain controllers run Windows Server 2008 R2 and are configured as DNS servers. You plan to create an Active Directory-integrated zone. You need to ensure that the new zone is replicated to only four of the domain controllers. What should you do first?

A.    Use the dnscmd tool with the /enlistdirectorypartition parameter.
B.    Create a new delegation in the ForestDnsZones application directory partition.
C.    Use the dnscmd tool with the /createdirectorypartition parameter.
D.    Use the dnscmd tool with the /createbuiltindirectorypartitions parameter.

Answer: D

QUESTION 497
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. DC1 has the DNS Server server role installed and hosts the zone for contoso.com. All host (A) records are registered in DNS by using dynamic updates. You deploy a new server named dns.contoso.com. You install the DNS Server server role on dns.contoso.com. The Name Servers list is shown in the Name Server exhibit. (Click the Exhibit button.)

The Zone Transfers settings are shown in the Zone Transfers exhibit. (Click the Exhibit button.)

On dns.contoso.com, you create a secondary zone for contoso.com and you specify DC1 as the master server. You discover that the zone fails to transfer to dns.contoso.com. You open DNS Manager as shown in the DNS Manager exhibit. (Click the Exhibit button.)

You need to ensure that dns.contoso.com can transfer the contoso.com zone. What should you do?

A.    Modify the name servers list for the contoso.com zone.
B.    Change the A record for dns.contoso.com to use 10.0.0.2.
C.    Add an A record for contoso.com that has a value of 10.0.0.2.
D.    Allow zone transfers to the 10.0.0.2 IP address.
E.    Add a name server (NS) record for contoso.com that has a value of 10.0.0.2.

Answer: A

QUESTION 498
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain and 10 domain controllers. All of the domain controllers run Windows Server 2008 R2 Service Pack 1 (SP1). The forest contains an application directory partition named dc=app1/dc=contoso,dc=com. A domain controller named DC1 has a copy of the application directory partition. You need to configure a domain controller named DC2 to receive a copy of dc=app1,dc=contoso,dc=com. Which tool should you use?

A.    Dsdbutil
B.    smgmt
C.    Dsamain
D.    Dsmod

Answer: B

QUESTION 499
A corporate network includes a single Active Directory Domain Services (AD D5) domain and two AD DS sites. The AD DS sites are named Toronto and Montreal. Each site has multiple domain controllers. You need to determine which domain controller holds the Inter-Site Topology Generator role for the Toronto site. What should you do?

A.    Use the Ntdsutil tool with the roles parameter.
B.    Use the Ntdsutil tool with the local roles parameter.
C.    Use the LDP tool to view the NTDS Site Settings for the Toronto site.
D.    Use the LDP tool to view the properties of each domain controller in the Toronto site.

Answer: D

QUESTION 500
Your network contains an Active Directory forest named contoso.com. The forest contains six domains. You need to ensure that the administrators of any of the domains can specify a user principal name (UPN) suffix of litwareinc.com when they create user accounts by using Active Directory Users and Computers. Which tool should you use?

A.    Set-ADAccountControl
B.    Active Directory Domains and Trusts
C.    Set-ADDomain
D.    Active Directory Users and Computers

Answer: B


http://www.passleader.com/70-640.html

[Pass Ensure VCE Dumps] All Vaild 70-640 651q Braindump Offered By PassLeader For Free Download (501-520)

$
0
0

Preparing 70-640 exam with vaild 70-640 exam dumps, trying PassLeader’s 70-640 vce dumps or 70-640 pdf dumps, our 70-640 exam dumps coverd all the real exam questions, all new 70-640 exam questions are available in PassLeader’s 70-640 braindumps. Our 651q 70-640 premium vce file is the best study guide for preparing 70-640 exam, browsing PassLeader’s website and download 651q 70-640 exam questions.

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 501
Your network contains an Active Directory forest named contoso.com. The functional level of the forest is Windows Server 2008 R2. You have four Active Directory sites. Each site has multiple Active Directory subnets. You need to identify all of the authentication requests that originate from client computers that are not associated to an Active Directory subnet. What should you use?

A.    The %Systemroot%\System32\Network_llu.log log file
B.    The %Systemroot%\Debug\Netsetup.log log file
C.    The Authentication User Interface operational log
D.    The %Systemroot%\Debug\Netlogon.log log file

Answer: B

QUESTION 502
Your network contains an Active Directory domain. The domain contains five sites. One of the sites contains a read-only domain controller (RODC) named RODC1. You need to identify which user accounts can have their password cached on RODC1. Which tool should you use?

A.    Get-ADFineGrainedPasswordPolicy
B.    Dcdiag
C.    Get-ADDomamControllerPasswordReplicationPolicy
D.    Get-ADAccountResultantPasswordReplicationPolicy

Answer: C

QUESTION 503
Your network contains an Active Directory domain. The domain is configured as shown in the exhibit. (Click the Exhibit button.)

You have a Group Policy object (GPO) linked to the domain. The GPO is used to deploy a number of software packages. You need to ensure that the GPO is applied only to client computers that have sufficient free disk space. What should you do?

A.    Modify the Group Policy permissions.
B.    Enable block inheritance.
C.    Configure the link order.
D.    Enable loopback processing in merge mode.
E.    Enable loopback processing in replace mode.
F.    Modify the Group Policy permissions.
G.    Enable block inheritance.
H.    Configure the link order.
I.    Enable loopback processing in merge mode.
J.    Enable loopback processing in replace mode.

Answer: F

QUESTION 504
Your network contains an Active Directory domain named contoso.com. All servers are located in the same Active Directory site. The domain contains two domain controllers named DC1 and DC2. Both domain controllers host an Active Directory-integrated zone for contoso.com. The Start of Authority (SOA) record of the contoso.com zone is shown in the exhibit. (Click the Exhibit button.)

You have a member server named Server1. Server1 hosts a secondary zone of contoso.com. On DC1, you add a new record to the contoso.com zone. In the table below, identify the maximum amount of time required to replicate the record to each server. Make only one selection in each column.

Answer:

QUESTION 505
You have an Active Directory domain named contoso.com. You need to view the account lockout threshold and duration for the domain. Which tool should you use?

A.    Get-ItemProperty
B.    Active Directory Domains and Trusts
C.    Net User
D.    Gpresult

Answer: C

QUESTION 506
Your network contains an Active Directory domain named litwareinc.com. The domain contains two sites named Site1 and Site2. Site2 contains a read-only domain controller (RODC). You need to identify which user accounts attempted to authenticate to the RODC. Which tool should you use?

A.    Repadmin
B.    Dcdiag
C.    Get-ADAccountResultantPasswordReplicationPolicy
D.    Active Directory Sites and Services

Answer: A

QUESTION 507
Your network contains an Active Directory forest named contoso.com. The functional level of the forest is Windows Server 2008 R2. The DNS zone for contoso.com is Active Directory-integrated. You deploy a read-only domain controller (RODC) named RODC1. You install the DNS Server server role on RODC1. You discover that RODC1 does not have any DNS application directory partitions. You need to ensure that RODC1 has a copy of the DNS application directory partition of contoso.com. What should you do?

A.    From DNS Manager, right-click RODC1 and click Create Default Application Directory Partitions.
B.    From DNS Manager, create primary zones.
C.    Run ntdsutil.exe. From the Partition Management context, run the create nc command.
D.    Run dnscmd.exe and specify the /enlistdirectorypartition parameter.

Answer: A

QUESTION 508
Your network contains an Active Directory domain named contoso.com. You have a comma separated value (CSV) file named Users.txt. Users.txt contains the information for 500 users and all of the attributes required to create user accounts. You plan to automate the creation of user accounts by using the Users.txt file. You need to identify which two cmdlets you must run. The solution must pipe the output from the first cmdlet to the second cmdlet. What should you run from Windows PowerShell? To answer, configure the appropriate PowerShell command in the answer area.

Answer:

QUESTION 509
Your network contains an Active Directory domain named contoso.com. You have an organizational unit (OU) named Sales and an OU named Engineering. You have two Group Policy objects (GPOs) named GPO1 and GP02. GPO1 and GP02 are linked to the Sales OU and contain multiple settings. You discover that GP02 has a setting that conflicts with a setting in GPO1. When the policies are applied, the setting in GP02 takes effect. You need to ensure that the settings in GPO1 supersede the settings in GP02. The solution must ensure that all non-conflicting settings in both GPOs are applied. What should you do?

A.    Modify the Group Policy permissions.
B.    Enable block inheritance.
C.    Configure the link order.
D.    Enable loopback processing in merge mode.
E.    Enable loopback processing in replace mode.
F.    Configure WMI filtering.
G.    Configure Restricted Groups.
H.    Configure Group Policy Preferences.
I.    Link the GPO to the Sales OU.
J.    Link the GPO to the Engineering OU.

Answer: C

QUESTION 510
You have a standard primary zone named contoso.com. You need to configure how often the zone will be transferred to servers that host a secondary copy of the zone. Which tab should you use? To answer, select the appropriate tab in the answer area.

Answer:


http://www.passleader.com/70-640.html

QUESTION 511
Your network contains an Active Directory domain. The domain contains five sites. One of the sites contains a read-only domain controller (RODC) named RODC1. You need to identify which user accounts can have their password cached on RODC1. Which tool should you use?

A.    Ntdsutil
B.    Dcdiag
C.    Repadmin
D.    Get-ADAccountResultantPasswordReplicationPolicy

Answer: A

QUESTION 512
Your network contains four domain controllers. The domain controllers are configured as shown in the following table.

All of the domain controllers are configured to host an Active Directory-integrated zone for their respective domain. A GlobalNames zone is deployed in the fabrikam.com forest. You add a canonical (CNAME) record named Server1 to the GlobalNames zone. You discover that users in the contoso.com forest cannot resolve the name Server1. The users in fabrikam.com can resolve the name Server1. You need to ensure that the contoso.com users can resolve names in the GlobalNames zone. What should you do? (Each correct answer presents part of the solution. Choose two.)

A.    Run dnscmd.exe and specify the globalnamesqueryorder parameter on CONT-DC1 and CONT-DC2.
B.    Add service location (SRV) records named _globalnames to the _msdcs.contoso.com zone.
C.    Run dnscmd.exe and specify the enableglobalnamessupport parameter on CONT-DC1 and CONTDC2.
D.    Run dnscmd.exe and specify the globalnamesqueryorder parameter on FABR-DC1 and FABR-DC2.
E.    Run dnscmd.exe and specify the enableglobalnamessupport parameter on FABR-DC1 and FABRDC2.
F.    Add service location (SRV) records named _globalnames to the _msdcs.fabrikam.com zone.

Answer: AD

QUESTION 513
A corporate network includes an Active Directory-integrated zone. All DNS servers that host the zone are domain controllers. You add multiple DNS records to the zone. You need to ensure that the new records are available on all DNS servers as soon as possible. Which tool should you use?

A.    Repadmin
B.    Ldp
C.    Dnscmd
D.    Ntdsutil

Answer: A

QUESTION 514
Your network contains an Active Directory domain. The domain contains two file servers. The file servers are configured as shown in the following table.

You create a Group Policy object (GPO) named GPO1 and you link GPO1 to OU1. You configure the advanced audit policy as shown in the exhibit. (Click the Exhibit button.)

You discover that the settings are not applied to Server1. The settings are applied to Server2. You need to ensure that access to the file shares on Server1 is audited. What should you do?

A.    On Server1, run secedit.exe and specify the /configure parameter.
B.    On Server1, run auditpol.exe and specify the /set parameter.
C.    From GPO1, configure the Security Options.
D.    From Active Directory Users and Computers, modify the permissions of the computer account for Server1.
E.    From Active Directory Users and Computers, add Server1 to the Event Log Readers group.

Answer: B

QUESTION 515
A corporate network includes a single Active Directory Domain Services (AD DS} domain. The HR department has a dedicated organization unit (OU) named HR. The HR OU has two sub-OUs: HR Users and HR Computers. User accounts for the HR department reside in the HR Users OU. Computer accounts for the HR department reside in the HR Computers OU. All HR department employees belong to a security group named HR Employees. All HR department computers belong to a security group named HR PCs. Company policy requires that passwords are a minimum of six characters. You need to ensure that, the next time HR department employees change their passwords, the passwords are required to have at least eight characters. The password length requirement should not change for employees of any other department. What should you do?

A.    Modify the local security policy on each computer in the HR PCs group.
B.    Create a fine-grained password policy and apply it to the HR Employees group.
C.    Create a new GPO, with the necessary password policy, and link it to the HR Computers OU.
D.    Create a fine-grained password policy and apply it to the HR Computers OU.

Answer: B

QUESTION 516
Your network contains an Active Directory domain. The domain contains a domain controller named DC1 that runs Windows Server 208 R2 Service Pack 1 (SP1). You need to implement a central store for domain policy templates. What should you do? To answer, select the source content that should be copied to the destination folder in the answer area.

Answer:

QUESTION 517
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. Server1 has a shared folder named Profiles. You plan to create a new user template named User_Template. You need to ensure that when you copy User_Temptate, the new user account has a unique profile folder created in the Profiles share. Which value should you specify for the profile path?

A.    %Userprofile%\Server1\profiles
B.    \\Server1\profiles\%username%
C.    \\Server1\%userprofile%\
D.    \\Server1\profiles\username

Answer: B

QUESTION 518
You deploy a certification authority (CA) named CA1. CA1 will be used to issue a large number of temporary certificates to provide users with access to public wireless access points (WAPs). You create a certificate template named Template1. You enable the Do not store certificates and requests in the CA database option. You need to configure CA1 to ensure that certificate requests and issued certificates for Template1 are not stored in the CA database. Which command should you run?

A.    certutil -setreg DBFlags +DBFLAGS_MAXCACHESIZEX100
B.    certutil -setreg DBFlags +DBFLAGS_CREATEIFNEEDED
C.    certutil -setreg DBFlags -DBFLAGS_LOGBUFFERSHUGE
D.    certutil -setreg DBFlags +DBFLAGS_ENABLEVOLATILEREQUESTS

Answer: D

QUESTION 519
A user attempts to join a computer to the domain, but the attempt fails. You need to ensure that the user can join fifty computer to the domain. You must ensure that the user is denied any additional rights beyond those required to complete the task. What should you do?

A.    Prestage each computer account in the Active Directory domain.
B.    Deploy a Group Policy Object (GPO) that modifies the user rights settings.
C.    Add the user to the Domain Administrators group for one day.
D.    Deploy a Group Policy object (GPO) that modifies the Restricted Groups settings.

Answer: C

QUESTION 520
A corporate network includes a single Active Directory Domain Services (AD D5) domain. All regular user accounts reside in an organizational unit (OU) named Employees. All administrator accounts reside in an OU named Admins. You need to ensure that any time an administrator modifies an employee’s name in AD DS, the change is audited. What should you do first?

A.    Use the Auditpol.exe command-line tool to enable the directory services access auditing subcategory.
B.    Enable the Audit directory service access setting in the Default Domain Controllers Policy Group Policy Object.
C.    Create a Group Policy Object with the Audit directory service access setting enabled and link it to the Employees OU.
D.    Enable the Audit directory service access setting in the Default Domain Policy Group Policy Object.

Answer: A
Explanation:
Before we can use the Directory Service Changes audit policy subcategory, we have to enable it first. We can do that by using auditpol.exe.
http://technet.microsoft.com/en-us/library/cc731607.aspx


http://www.passleader.com/70-640.html

[Pass Ensure VCE Dumps] PassLeader Free 70-640 Study Guide With Premium VCE and PDF Dumps Download (521-540)

$
0
0

Preparing 70-640 exam with vaild 70-640 exam dumps, trying PassLeader’s 70-640 vce dumps or 70-640 pdf dumps, our 70-640 exam dumps coverd all the real exam questions, all new 70-640 exam questions are available in PassLeader’s 70-640 braindumps. Our 651q 70-640 premium vce file is the best study guide for preparing 70-640 exam, browsing PassLeader’s website and download 651q 70-640 exam questions.

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 521
Your network contains an Active Directory domain. The domain contains four domain controllers. You create a new application directory partition. You need to ensure that the new application directory partition replicates to only three of the domain controllers. Which tool should you use?

A.    Active Directory Administrative Center
B.    Dsamain
C.    Dsmod
D.    Ntdsutil

Answer: D

QUESTION 522
Your network contains an Active Directory domain named contoso.com. All domain controllers run a Server Core installation of Windows Server 2008 R2. You need to identify which domain controller holds the PDC emulator role. Which tool should you run?

A.    Get-AdOptionalFeature
B.    netdom.exe
C.    Search-AdAccount
D.    dsrm.exe

Answer: B
Explanation:
The FSMO role holders can be easily found by use of the Netdom command. On any domain controller, click Start, click Run, type CMD in the Open box, and then click OK. In the Command Prompt window, type netdom query /domain:<domain> fsmo (where <domain> is the name of YOUR domain).
Note: The five FSMO roles [in Windows 2003] are:
Schema master – Forest-wide and one per forest.
Domain naming master – Forest-wide and one per forest.
RID master – Domain-specific and one for each domain.
PDC – PDC Emulator is domain-specific and one for each domain.
Infrastructure master – Domain-specific and one for each domain.

QUESTION 523
Your network contains an Active Directory forest. The forest contains two domains. The forest contains four domain controllers. The domain controllers are configured as shown in the following table.

All user accounts are located in the child.contoso.com domain. Users in the child.contoso.com domain are members of several security groups in the contoso.com domain. Your company decides to change the naming standard of user accounts. You rename all of the user accounts to comply with the new standard. You discover that the old user names are listed in the members’ list of the security groups in the contoso.com domain. You need to ensure that the members’ list of the security groups in the contoso.com domain displays the new user names. What should you do?

A.    Transfer the PDC emulator role from DC2 to DC3.
B.    Configure DC5 as a global catalog server.
C.    Configure DC1 as a global catalog server.
D.    Transfer the infrastructure master role from DC3 to DC2.

Answer: D

QUESTION 524
You are decommissioning a child domain. The child domain contains five operations master roles. You need to transfer the forest operations master roles to a newly installed domain controller in a different child domain. Which two domain operations master roles should you transfer? (Each correct answer presents part of the solution. Choose two.)

A.    RID master
B.    PDC emulator
C.    Schema master
D.    Domain naming master
E.    Infrastructure master

Answer: CD
Explanation:
Forestwide Operations Master Roles The schema master and domain naming master are forestwide roles, meaning that there is only one schema master and one domain naming master in the entire forest.
Note:
Operations Master Roles The five operations master roles are assigned automatically when the first domain controller in a given domain is created. Two forest-level roles are assigned to the first domain controller created in a forest and three domain-level roles are assigned to the first domain controller created in a domain. . The five FSMO roles [in Windows 2003] are: Schema master – Forest-wide and one per forest. Domain naming master – Forest-wide and one per forest. RID master – Domain-specific and one for each domain. PDC – PDC Emulator is domain-specific and one for each domain. Infrastructure master – Domain-specific and one for each domain.

QUESTION 525
Your network contains an Active Directory domain. The domain contains a certification authority (CA). The network contains several Layer 3 switches. You need to ensure that the switches can request certificates from the CA. Which role service should you deploy?

A.    Network Device Enrollment Service
B.    Windows Token-based Agent
C.    Network Policy Server
D.    Client Certificate Mapping Authentication

Answer: A

QUESTION 526
Your network contains an Active Directory forest named contoso.com. The forest contains an enterprise certification authority (CA). The enterprise CA is inaccessible from the internet. You have a server named Server1 that runs Windows Server 2008 R2. Server1 is accessible from the Internet. Server1 can communicate with the enterprise CA. You need to ensure that laptops that are joined to the domain can renew their certificates automatically from the Internet. Which two role services should you install on Server1? (To answer, select the two appropriate role services in the answer area.)

Answer:

QUESTION 527
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. You configure Server1 as a standalone root certification authority (CA). You identify the following requirements for the public key infrastructure (PKI):
– The root CA must be offline once the PKI is deployed.
– Users must be able to enroll for certificates automatically.
You need to configure Server2 to meet the PKI requirements. What should you configure on Server2?

A.    A standalone subordinate CA
B.    A standalone root CA
C.    An enterprise subordinate CA
D.    An enterprise root CA

Answer: C

QUESTION 528
Your network contains an Active Directory domain named contoso.com. The aging and scavenging settings of the contoso.com zone are configured as shown in the exhibit. (Click the Exhibit button.)

To answer, complete each statement according to the information presented in the exhibit.

Answer:

QUESTION 529
Your network contains an Active Directory domain named contoso.com. The domain contains three domain controllers named DC1, DC2 and DC3. You need to create a zone named adatum.com that replicates between DC1 and DC2 only. The zone data for adatum.com must be writable on both DC1 and DC2. Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

QUESTION 530
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. The domain contains a domain controller named DC1. DC1 hosts an Active Directory-integrated zone for contoso.com. You enable record scavenging for contoso.com by using the default settings. You configure scavenging to run every seven days. After 30 days, you discover that some DNS records of computers that were removed from the network are still present in the contoso.com zone. You need to ensure that the scavenging process can remove the stale records.What command should you run? (To answer, select the appropriate options in the answer area.)

Answer:


http://www.passleader.com/70-640.html

QUESTION 531
Your network consists of an Active Directory forest that contains one domain named contoso.com. All domain controllers run Windows Server 2008 R2 and are configured as DNS servers. You have two Active Directory-integrated zones: contoso.com and nwtraders.com. You need to ensure a user is able to modify records in the nwtraders.com zone. The solution must prevent the user from modifying the SOA record in the contoso.com zone. What should you do?

A.    From the DNS Manager console, modify the permissions of the nwtraders.com zone.
B.    From the DNS Manager console, modify the permissions of the contoso.com zone.
C.    From the Active Directory Users and Computers console, run the Delegation of Control Wizard.
D.    From the Active Directory Users and Computers console, modify the permissions of the Domain Controllers organizational unit (OU).

Answer: A

QUESTION 532
Your network contains 50 domain controllers that runs Windows Server 2008 R2. You need to create a script that resets the Directory Services Restore Mode (DSRM) password on all of the domain controllers. The solution must NOT maintain passwords in the script. Which two tools should you use? (Each correct answer presents part of the solution. Choose two.)

A.    Active Directory Users and Computers
B.    Ntdsutil
C.    Dsamain
D.    Local Users and Groups

Answer: BD

QUESTION 533
Your network contains an Active Directory domain. The domain contains four domain controllers. You modify the Active Directory schema. You need to verify that all the domain controllers received the schema modification. Which command should you run?

A.    netdom.exe query fsmo
B.    repadmin.exe /showrepl *
C.    dcdiag.exe /e /test:Topology
D.    dcdiag.exe /a

Answer: B

QUESTION 534
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. You install Active Directory Lightweight Directory Services (AD LDS) on a member server named Server2. On Server2, you create a directory partition named fabrikam.com. You need to configure the MS-AdamSyncConfig.xml file to synchronize data from contoso.com to fabrikam.com. What should you do? (To answer, select the appropriate options in the answer area.)

Answer:

QUESTION 535
Your network contains an Active Directory domain named contoso.com. The domain has a branch site that contains a read-only domain controller (RODC) named R0DC1. A user named User1 is a member of the Allowed RODC Password Replication Group. User1 frequently logs on to a computer in the branchsite. You remove User1 from the Allowed RODC Password Replication Group. You need to ensure that the password of User1 is no longer cached on RODC1. What should you do?

A.    Add User1 to the Denied RODC Password Replication Group, and then force Active Directory replication.
B.    Run repadmin /rodcpwdrepl rodc2.contoso.com dc.contoso.com cn = User1,cn-users,dc = contoso,dccom.
C.    Run repadmin /prp delete rodcl.contoso.com allow cn = User1, cn = users, dc = contoso,dc = com.
D.    Reset the password of User1, and then force Active Directory replication.

Answer: D

QUESTION 536
Your network contains an Active Directory forest. The forest contains a single domain named contoso.com. The domain contains domain controllers that run either Windows Server 2003 or Windows Server 2008 R2. The functional level of the domain and the forest is Windows Server 2003. You need to add a read-only domain controller (RODC) to the forest. What should you do first?

A.    Upgrade the domain controllers that run Windows Server 2003.
B.    Raise the domain functional level.
C.    Run the adprep command.
D.    Raise the forest functional level.

Answer: C

QUESTION 537
Your company has two offices. The offices are located in Miami and London. The network contains an Active Directory forest named contoso.com. The forest contains two child domains named miami.contoso.com and london.contoso.com. Each domain contains 50 domain controllers that run Windows Server 2008 R2. Each office is configured as an Active Directory site. The office in London recently hired several thousand new employees. You need to move 10 domain controllers from miami.contoso.com to london.contoso.com. What should you do?

A.    Run the dsadd.exe command.
B.    Run the nltest.exe command.
C.    Run the Set-AdDomain cmdlet.
D.    Run the dsmove.exe command.
E.    Run the dcpromo.exe command.
F.    Run the Move-AdDirectoryServer cmdlet.
G.    Use the Active Directory Schema snap-in.
H.    Use the Active Directory Users and Computers console.

Answer: E

QUESTION 538
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains 50 domain controllers that run Windows Server 2008 R2. The domain contains a group named Computer_Location. You plan to create 1,000 computer accounts in the domain in several organizational units (OUs). You need to ensure that the members of the Computer_Location group can modify the description of each computer account as soon as the account is created. The solution must use permissions that are applied explicitly to the new computer accounts. What should you do?

A.    Run the dsadd.exe command.
B.    Run the nltest.exe command.
C.    Run the Set-AdDomain cmdlet.
D.    Run the dsmove.exe command.
E.    Run the dcpromo.exe command.
F.    Run the Move-AdDirectoryServer cmdlet.
G.    Use the Active Directory Schema snap-in.
H.    Use the Active Directory Users and Computers console.

Answer: G

QUESTION 539
Your company has two offices. The offices are located in Miami and London. The network contains an Active Directory forest named contoso.com. The forest contains two child domains named miami.contoso.com and london.contoso.com. The domain contains 50 domain controllers that run Windows Server 2008 R2. Each office is configured as an Active Directory site. The forest contains a custom attribute named SecurityAccessCode. You recently configured a domain controller named DC22 as a global catalog server. You need to verify that SecurityAccessCode is configured to replicate to DC22. What should you do?

A.    Run the dsadd.exe command.
B.    Run the nltest.exe command.
C.    Run the Set-AdDomain cmdlet.
D.    Run the dsmove.exe command.
E.    Run the dcpromo.exe command.
F.    Run the Move-AdDirectoryServer cmdlet.
G.    Use the Active Directory Schema snap-in.
H.    Use the Active Directory Users and Computers console.

Answer: G

QUESTION 540
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. DC1 hosts an Active Directory-integrated zone for contoso.com. The research department maintains its own DNS servers and hosts a zone named research.contoso.com on a UNIXbased server named Server1. The perimeter network contains a DNS server named Server2. Server2 is a standalone server that runs Windows Server 2008 R2. You need to configure the DNS settings of Server2 to meet the following requirements:
– Server2 must maintain a copy of all the records in research.contoso.com.
– DC1 must query Server2 to resolve the names of Internet hosts.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Create a secondary zone.
B.    Create a conditional forwarder.
C.    Create a stub zone.
D.    Create a primary zone.
E.    Create a Forwarder.

Answer: AE
Explanation:
A: When a zone that this DNS server hosts is a secondary zone, this DNS server is a secondary source for information about this zone. The zone at this server must be obtained from another remote DNS server computer that also hosts the zone. This DNS server must have network access to the remote DNS server that supplies this server with updated information about the zone. Because a secondary zone is merely a copy of a primary zone that is hosted on another server, it cannot be stored in AD DS.
E: A forwarder is a Domain Name System (DNS) server on a network that is used to forward DNS queries for external DNS names to DNS servers outside that network.
Incorrect: Not B: You can configure your server to forward queries according to specific domain names using conditional forwarders.


http://www.passleader.com/70-640.html


[Pass Ensure VCE Dumps] PassLeader Free Valid 70-640 VCE and PDF Exam Questions (541-560)

$
0
0

Download the newest 70-640 vce dumps or 70-640 pdf dumps to prepare TS: Windows Server 2008 Active Directory, Configuring Exam. Now, PassLeader has published the new 651q 70-640 exam dumps with PDF and VCE file download, PassLeader’s 70-640 study guide with 651q 70-640 braindumps has been corrected all the questions and answers, also, all new 70-640 exam questions have been added, which will help you passing 70-640 exam easily. Download the 70-640 practice test with new questions from PassLeader quickly!

keywords: 70-640 exam,651q 70-640 exam dumps,651q 70-640 exam questions,70-640 pdf dumps,70-640 practice test,70-640 vce dumps,70-640 study guide,70-640 braindumps,TS: Windows Server 2008 Active Directory, Configuring Exam

QUESTION 541
Your network contains an Active Directory domain named contoso.com. The Zone Transfers settings of contoso.com are configured as shown in the Zone Transfers exhibit. (Click the Exhibit button.)

The Name Servers settings of contoso.com are configured as shown in the Name Servers exhibit. (Click the Exhibit button.)


To answer, complete each statement according to the information presented in the exhibits.

Answer:

QUESTION 542
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2008 R2. You need to increase the amount of Active Directory diagnostic information logged to the Event Viewer on DC1. What should you do?

A.    Modify the properties of the objects in the Active Directory Diagnostics Data Collector Set (DCS).
B.    Modify the properties of the System Log and the Application Log.
C.    Modify the flags attribute of DC1.
D.    Modify the settings in the HKey_Local_Machine\SYSTEM\CurrentControlSet\services\NTDS\Diagnostics registry key.

Answer: D

QUESTION 543
Your network contains an Active Directory domain named contoso.com. The domain contains an enterprise certification authority (CA). You plan to delegate certificate enrollment for Smartcard Logon certificates to a user named User1. User1 is the member of a group named CONTOSO\DelegatedAdmins. You need to recommend a solution to provide User1 with the ability to enroll for Smartcard Logon certificates on behalf of other domain users. What should you include in the recommendation?

A.    Duplicate the Smartcard Logon certificate template. Modify the Extensions settings and the Request Handling settings of the new template.
B.    Modify the Issuance Requirements settings and the Security settings of the Smartcard Logon certificate template.
C.    Modify the Extensions settings and the Request Handling settings of the Smartcard Logon certificate template.
D.    Duplicate the Smartcard Logon certificate template. Modify the Issuance Requirements settings and the Security settings of the new template.

Answer: D

QUESTION 545
Your network contains an Active Directory domain named contoso.com. You need to ensure that when computers are joined manually to the domain by using the System Properties, the computer account of the computers is created automatically in an organizational unit (OU) named NewComputers. Which command should you run?

A.    dsmgmt.exe
B.    redircmp.exe
C.    csvde.exe
D.    computerdefaults.exe

Answer: B

QUESTION 546
A corporate network includes an Active Directory Domain Services (AD DS) forest that contains two domains. All servers run Windows Server 2008 R2. All domain controllers are configured as DNS servers. A standard primary zone for dev.contoso.com is stored on a member server. You need to ensure that all domain controllers can resolve names from the dev.contoso.com zone. What should you do?

A.    On one domain controller, create a stub zone.
Configure the stub zone to replicate to all DNS servers in the forest.
B.    On one domain controller, create a stub zone.
Configure the stub zone to replicate to all DNS servers in the domain.
C.    On one domain controller, create a conditional forwarder.
Configure the conditional forwarder to replicate to all DNS servers in the domain.
D.    On the member server, create a secondary zone.

Answer: A

QUESTION 547
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. You have a member server named Server1. Both DC1 and Server1 have the DNS Server server role installed. On DC1, you create an Active Directory-integrated zone named adatum.com. You need to ensure that Server1 receives a copy of the zone. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Create a secondary zone on Server1.
B.    Modify the zone type of adatum.com.
C.    Modify the Zone Transfers settings of adatum.com.
D.    Add Server1 to the DNSUpdateProxy group.
E.    Create a primary zone on Server1.

Answer: AC

QUESTION 548
Your company has one main office and four branch offices. The main office contains a standard primary DNS zone named adatum.com. Each branch office contains a copy of the adatum.com zone. When records are added to the adatum.com zone, you discover that it takes up to one hour before the changes replicate to each zone in the branch offices. You need to minimize the amount of time it takes for the records to be updated in the branch offices. What should you do?

A.    On the DNS server in the main office, configure the Notify settings.
B.    On the DNS servers in the branch offices, configure the Notify settings.
C.    On the DNS servers in the branch offices, configure the Zone Aging/Scavenging Properties.
D.    On the DNS server in the main office, configure the Zone Aging/Scavenging Properties.

Answer: A

QUESTION 549
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. DC1 has the DNS namespaces configured as shown in the following table.

In the table below, identify which queries will have an authoritative or non-authoritative response from DC1. Make only one selection in each row.

Answer:

QUESTION 550
Your network contains an Active Directory domain named contoso.com. You have a server named Server1 that is configured as an enterprise root certification authority (CA). You need to ensure that private keys can be archived on Server1. Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:


http://www.passleader.com/70-640.html

QUESTION 551
Your network contains an Active Directory domain named contoso.com. The network contains a public key infrastructure (PKI). You deploy a new certificate revocation list (CRL) distribution point (CDP) to a server named Server1. You discover that users cannot download delta CRLs from Server1. You verify that the users can download the complete CRL successfully. You need to ensure that the users can download delta CRLs from Server1. Which command should you run?

A.    Appcmd set config “Default Web Site”/section:system.webServer/Security/requestFiltering -allowDoubleEscaping:True
B.    Appcmd set config “Certificates” /section:system.webServer/Security/requestFiltering – allowDoubleEscaping:False
C.    Certutil -setreg CA\CRLDeltaPeriod “Days”
D.    Certutil -setreg CA\CRLOverlapPeriod “Days”

Answer: A

QUESTION 552
Your network contains an Active Directory domain named contoso.com. A portion of the Group Policy object (GPO) settings for a computer in the contoso.com domain is configured as shown in the following exhibit. (Click the Exhibit button.)

To answer, complete each statement according to the information presented in the exhibit.

Answer:

QUESTION 553
Your network contains an Active Directory domain named contoso.com. You create two global groups named Group1 and Group2. The group membership of each group is shown in the following table.

You create the Password Settings objects (PSOs) shown in the following table.

In the table below, identify which PSOs will apply to User1 and User2. Make only one selection in each column.

Answer:

QUESTION 554
Your network contains an Active Directory domain named contoso.com. You need to create one password policy for administrators and another password policy for all other users. Which tool should you use?

A.    Group Policy Management Editor
B.    Authorization Manager
C.    Dsadd
D.    Ldifde

Answer: D
Explanation:
http://technet.microsoft.com/en-US/library/cc754461.aspx

QUESTION 555
Your network contains an Active Directory domain named contoso.com. Members of the sales department are issued laptops that have wireless network cards. You need to ensure that when users connect to an unidentified network from their laptop, the network is configured as a Public network. Which node in Group Policy Management Editor should you use?To answer, select the appropriate node in the answer area.

Answer:

QUESTION 556
Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named SalesUsers. The OU contains 50 user accounts. You need to identify the effective Password Settings object (PSO) of each user in the SalesUsers OU. Which command should you run? (To answer, select the appropriate options in the answer area.)

Answer:

QUESTION 557
Your network contains an Active Directory forest named contoso.com. The forest contains one domain. The domain contains three domain controllers. The domain controllers are configured as shown in the following table.

DC2 fails and cannot be recovered. Several weeks later, administrators report that they can no longer create new users and groups in the domain. You need to ensure that the administrators can create new users and groups. What should you add?

A.    the RID master role to DC3
B.    the schema master role to DC1
C.    the infrastructure master role to DC1
D.    the domain naming master role to DC3

Answer: A

QUESTION 558
Your network contains an Active Directory domain. The domain contains eight domain controllers. You need to verify that all the domain controllers can connect to the time server. Which command should you run?

A.    netdom.exe query fsmo
B.    dcdiag.exe /e /test:Topology
C.    repadmin.exe /showrepl *
D.    dcdiag.exe /a

Answer: D

QUESTION 559
Your company has a main office and 40 branch offices. Each branch office is configured as a separate Active Directory site that has a dedicated read-only domain controller (RODC). You need to identify the user accounts that can be cached on the RODC server. Which utility should you use?

A.    Dsmod.exe
B.    Repadmin.exe
C.    Active Directory Domain and Trusts
D.    Active Directory Sites and Services

Answer: B

QUESTION 560
Your network contains an Active Directory domain named contoso.com. The properties of the contoso.com DNS zone are configured as shown in the exhibit. (Click the Exhibit button.)

You need to update the Host (A) record for a domain controller in the domain. What should you do?

A.    Restart the Netlogon service.
B.    Restart the DNS Client service.
C.    Run sc.exe and specify the triggerinfo parameter.
D.    Run ipconfig.exe and specify the /registerdns parameter.

Answer: D


http://www.passleader.com/70-640.html

[Pass Ensure VCE Dumps] 70-576 Exam Questions with Free PDF and VCE Download From PassLeader (1-20)

$
0
0

Get valid 70-576 PDF dumps or VCE dumps from PassLeader, we guarantee our 160q 70-576 exam questions are the newest and all the new 70-576 exam questions and answers are available. Now try our best 70-576 practice test with VCE dumps or PDF dumps and you will acquire PRO: Designing and Developing Microsoft SharePoint 2010 Applications Exam certification immediately.

keywords: 70-576 exam,160q 70-576 exam dumps,160q 70-576 exam questions,70-576 pdf dumps,70-576 vce dumps,70-576 study guide,70-576 practice test,PRO: Designing and Developing Microsoft SharePoint 2010 Applications Exam

QUESTION 1
You are helping an organization’s executive team to design an automated approval process to standardize certain documents. You have the following requirements:
– The documents must be reviewed and approved by multiple teams in the approval chain.
– Each reviewer must provide feedback as part of completing a review.
– Each reviewer must either approve or reject the documents.
After review, the document status must be changed; an e-mail must be generated to the document author and the next reviewer in the approval chain; and a task should be created for the next reviewer in the approval chain. You must design a custom workflow solution for the document approval process on a SharePoint 2010 site. What should the solution include?

A.    an initiation form to collect the reviewer’s feedback and a Simple activity to approve and reject the document.
B.    an association form to collect the reviewer’s feedback and a Composite activity to support conditional activities such as approval and rejection.
C.    a task form to collect the reviewer’s feedback and a Composite activity to support conditional activities such as approval and rejection.
D.    a task form to collect the reviewer’s feedback and a Simple activity to approve and reject the document.

Answer: C

QUESTION 2
You are designing a SharePoint 2010 feature. The feature includes a feature receiver that executes code on activation and deactivation. The feature receiver code interacts with a Web service, which could cause errors beyond your control. You need to ensure that the feature does not activate or deactivate if the Web service causes an error. Which approach should you recommend?

A.    Wrap your code in a Try-Catch block.
Log the error and issue another request to the Web service in the Catch block.
B.    Wrap your code in a Try-Catch block.
Log the error and throw an exception in the Catch block.
C.    Wrap your code in a Try-Catch block.
Only catch exceptions of type SPException.
D.    Wrap your code in a Try-Finally block.
Log any issues your code encounters in the Finally block.

Answer: B

QUESTION 3
You are designing a SharePoint 2010 information architecture plan for a client that specifies the mechanics of implementing content type change control. The requirements for the change control plan specify that:
– Site Managers can create site-specific content types based on the content types in the parent site.
– Content types must not be overwritten when changes are made to parent site content types.
– Site managers can change child site content types.
You need to specify a content type change control plan that meets all these requirements. Which approach should you recommend?

A.    Direct the site manager to explicitly set the read-only property of the content type to True.
Direct the site collection manager to make the specified change required in the child site to the content type at the site collection level.
B.    Direct the site manager to explicitly set the read-only property of the content type to True.
Perform a push-down operation from the parent site to overwrite the required changes to the read-only content types in all the child sites.
C.    Define the content type as read-only at the child site level.
Direct the site manager to explicitly set the read-only property of the content type to False to make changes to the content type.
Then change the readonly property to True.
D.    Define the content type as sealed.
Direct the site manager to explicitly set the sealed property of the content type to False to make changes to the content type.
Then change the sealed property of the content type to True.

Answer: C

QUESTION 4
You are designing a SharePoint 2010 application to store 50 GB of digital assets, including audio and video files that are up to 20 MB in size. You have the following requirements:
– The disk storage system must use standard hard drives and must be configured to optimize read performance.
– The SharePoint 2010 database uses Microsoft SQL Server Express 2008.
– The application must leverage standard SharePoint 2010 components to limit the requirement for custom development.
You need to design a storage solution that meets all of these requirements. Which approach should you recommend?

A.    Enable FILESTREAM storage for a Microsoft SQL Server Express 2008 database on a RAID 0 disk system. Then install and configure remote Binary Large Object (BLOB) storage in SharePoint 2010.
B.    Store the assets directly in Microsoft SQL Server Express 2008 and create multiple content databases on a RAID 0 disk system.
C.    Install and configure support for external BLOB storage for SharePoint 2010 and use the ISPExternalBinaryProvider interface to manage files on a RAID 0 disk system.
D.    Install and configure support for external BLOB storage for SharePoint 2010 and configure a Microsoft SQL Server Express 2008 database to store BLOBs on a RAID 5 disk system.

Answer: A

QUESTION 5
You are designing a SharePoint 2010 application that stores information about each machine in a factory. This information includes an inventory of parts, the machine’s maintenance history, and a document library of repair manuals for each machine in Microsoft Word format. The application must:
– Establish links between the factory machine data, the machine part inventory, the maintenance history, and the repair manuals to allow the display of additional fields from the other lists.
– Enforce relational integrity between the data to create custom views for various business users.
– Allow nontechnical users to update the individual list data and views, as well as to update the manuals.
– Enforce relationships that allow cascade deletes of items from the machine parts list when items are deleted from the machine list, but prevent data in the machine parts list from being orphaned.
You need to design a data access plan that meets all these requirements and allows all data to be managed within the SharePoint 2010 system. Which plan should you recommend?

A.    Create tables in Microsoft SQL Server for each set of inventories.
Create relationships with primary and foreign keys linking the tables.
Use Business Connectivity Services (BCS) to connect SharePoint 2010 lists to these tables to manage the data.
B.    Create tables in Microsoft SQL Server for each set of inventories.
Create relationships with primary and foreign keys linking the tables.
Store machine part manuals in a SharePoint document library and use event receivers to synchronize data in the lists and libraries.
C.    Use SharePoint 2010 lists and document libraries to store data.
Create relationships using lookup fields and relationship joins between the lists and document libraries.
D.    Use SharePoint 2010 lists and document libraries to store data.
Create a custom workflow to update information in the lists and document libraries.

Answer: C

QUESTION 6
You are designing a SharePoint 2010 solution that allows users to enter address information for contacts into a list named Address. You have the following requirements:
– Ensure that users enter full nine-digit zip codes for the address information.
– Display a custom message indicating that a zip code is invalid if the entered zip code does not match the full nine-digit requirements.
You need to ensure that the application is designed to meet these requirements. Which approach should you recommend?

A.    Create a custom command.
B.    Create a Datasheet view on the Address list.
C.    Use the Form Options of the Address list.
D.    Create a formula on the column.

Answer: D

QUESTION 7
You are designing a SharePoint 2010 solution that stores employee information in a list named Employees and company information in a list named Company. Each company has one or more employees. You need to recommend that a developer add a new column so that a one-to-many relationship is created between the Company list and Employees list. Which approach should you recommend?

A.    Add an External Data column on the Employees list.
B.    Add a Lookup column on the Employees list.
C.    Add a Managed Metadata column on the Company list.
D.    Add a Lookup column on the Company list.

Answer: B

QUESTION 8
You are using Business Connectivity Services to design a SharePoint 2010 application that connects to an external database. The database users have accounts for authentication that are different from their Active Directory accounts. You have a requirement to allow users to connect to the external database without prompting the user for credentials. You need to store user credentials and use these credentials when connecting to the external database. Which approach should you recommend?

A.    Create a target application that uses the Microsoft Single Sign-On Service. Select the Connect with Impersonated Custom Identity option when creating the connection to the database.
B.    Create a target application that uses the Secure Store Service. Select the Connect with Impersonated Custom Identity option when creating the connection to the database.
C.    Create a target application that uses the Single Sign-On Service. Select the Connect with User’s Identity option when creating the connection to the database.
D.    Create a target application that uses the Secure Store Service. Select the Connect with User’s Identity option when creating the connection to the database.

Answer: B

QUESTION 9
You are designing an external binary large object (BLOB) store provider by implementing the ISPExternalBinaryProvider interface. The farm has existing sites that contain content. Your implementation has been verified to be working correctly. You need to ensure that content within existing sites is moved using the external BLOB store provider. You also must ensure that the solution does not require further custom coding. Which approach should you recommend?

A.    Perform a backup and restore on each site.
B.    Perform a backup and restore of each content database.
C.    Perform a backup and restore on each site collection.
D.    Perform a backup and restore of the configuration database.

Answer: C

QUESTION 10
You are designing a SharePoint 2010 application that includes a Task list. You have the following requirements:
– For each task, allow users to specify one of three values for an item named Phase using a drop-down menu.
– Allow contributors to add new values for the Phase item.
You need to design this application without using custom code. Which approach should you recommend?

A.    Create a Multiple lines of text field type on the Task list.
B.    Create a Single line of text field type on the Task list.
C.    Create a Choice field type on the Task list that gets values from a custom list.
D.    Create a Lookup field type on the Task list that gets values from a custom list.

Answer: D


http://www.passleader.com/70-576.html

QUESTION 11
You are designing an asset management solution using SharePoint 2010. You need to design a solution that meets the following requirements:
– Binary large objects (BLOBs) cannot be stored in Microsoft SQL Server.
– There can be no custom development or third-party products.
Which approach should you recommend?

A.    Install and configure Remote BLOB Storage and enable the content databases to use Remote BLOB Storage.
B.    Install and configure Remote BLOB Storage and enable the configuration databases to use Remote BLOB Storage.
C.    Install and configure an external BLOB store provider and enable the content databases to use the external BLOB store provider.
D.    Install and configure an external BLOB store provider and enable the configuration databases to use the external BLOB store provider.

Answer: A

QUESTION 12
You need to specify the correct artifacts to use in a SharePoint 2010 application for a school district. The school district’s administrator needs to be able to search for student information on an intranet SharePoint 2010 portal. Student information is currently available in another database, which supports an Open Database Connectivity (ODBC) driver. You need to design the solution to meet the following requirements:
– Provide a user interface to search for a student based on name.
– Enable the administrator to select the correct student name from the search results.
– Provide a student header section that displays the primary student identity information, which will enable the administrator to correlate any new information with the correct student.
– Provide additional data entry pages to add or update additional student information.
Which approach should you recommend?

A.    Design HTML Web pages to render the student details. Install these pages under the /templates/_layouts/1033 folder and load these pages in Web Parts.
B.    Design connected Web Parts to share information among search data entry, student header information, and new data entry information Web Parts.
C.    Design a user control and load this control in a Web Part to search for a student. Then render the student details in a SharePoint page.
D.    Design a Web Part to search for a student. Then render the student record details in a SharePoint page.

Answer: B

QUESTION 13
You are designing a SharePoint 2010 site. You need to design the site to meet all the following requirements:
– Your business requires a consistent structure to manage sales proposal documents across all account teams.
– The sales director must ensure that all sales documents conform to the same template.
– All sales proposals must be reviewed and approved by the sales manager.
– Every site must be created with a document library, a list of the account team members, and the account status.
Which approach should you recommend?

A.    Design a site template with a standard list of account team members and a shared document library to hold the proposal documents.
B.    Design a proposal content type to store proposal document metadata and a shared document library to hold the proposal documents.
C.    Design a proposal content type to include required metadata information about the proposal documents. Also design a site template with a standard document library and account team members list for consistency across all account teams.
D.    Design a content type that uses a Microsoft Word template for proposal documents. The content type includes required metadata. Also design a site template with a customized document library and list for consistency across all account teams.

Answer: D

QUESTION 14
You are designing a solution that includes a custom list on a SharePoint 2010 site. You need to design the solution to meet the following requirements:
– The solution needs to add customized files to the site as part of the list provisioning.
– The list should only be provisioned in the sites of the site collection where it is specifically needed.
– The files must no longer remain provisioned in the site if the custom list is removed.
Which approach should you take?

A.    Design a custom list. Implement list event receivers to add the custom files to the bin directory of the Web application.
B.    Design a custom feature solution. Implement feature event receivers on the Activate action to add files to the site.
C.    Design a custom feature solution. Implement feature event receivers on these two actions:
* Install action to add files
* Uninstall action to delete the files that were added during installation of the feature
D.    Design a custom feature solution. Implement feature event receivers on these two actions:
* Activate action to add the files
* Deactivate action to delete the files that were added during activation of the feature

Answer: D

QUESTION 15
You are designing a SharePoint 2010 solution for a large sales force. You have the following requirements:
– Each sales region must have its own site within the solution with lists to track the current sales data of the sales executives.
– These lists must contain information about the status of sales opportunities, the estimated price, the expected close date, and contact information for the potential sale.
– The welcome page for the root site must display a current summary for all regions, including the percentage of sales expected to close within the next month and total expected revenue over time.
You need to design the solution to meet all these requirements. What approach should you recommend?

A.    Create site columns from the Managed Metadata Services feature within Central Administration to specify and display the sales information on the root site.
B.    Create an event receiver for each list to copy the list data when an item is inserted into a list on the root site. Create a List View Web Part to display the sales information on the root site.
C.    Create a content type for the metadata to be tracked. Use a Content Query Web Part to display the sales information on the root site.
D.    Create a custom workflow to manage the list item data and update properties on the Web Part to display the sales information on the root site.

Answer: C

QUESTION 16
You are designing a SharePoint 2010 solution to manage statements of work. You need to design the solution according to the following requirements:
– Store the Customer ID, purchase order numberm estimated completion date, and other fields associated with specific documents as they are uploaded.
– The information must be created so that it can be set within the Microsoft Word document information panel.
– Programmatically execute a series of tasks, including assigning tasks to validate the information and creating team sites, based on information related to each document.
– These tasks must run to completion, even if the server is rebooted.
Which approach should you recommend?

A.    Create a document library for a custom content type that contains site columns for the document information. Develop a SharePoint workflow for the document library to execute the document tasks.
B.    Create a document library for a custom content type that contains site columns for the document information. Develop an event receiver for the document library to execute the document tasks.
C.    Create a custom list with fields to store the additional items and an attached document. Develop a SharePoint workflow for the custom list to execute the additional tasks.
D.    Create a custom list with fields to store the additional items and an attached document. Develop an event receiver for the custom list to execute the additional tasks.

Answer: A

QUESTION 17
You are designing a SharePoint 2010 solution. You need to design the solution to meet the following requirements:
– All sites must have a consistent structure when initially created.
– All sites must include a document library that contains Word documents with searchable properties.
– Site users must be able to generate a spreadsheet detailing the properties of the document library contents.
Which approach should you recommend?

A.    Create a feature to create the required site structure programmatically.
Create a content type for the document library.
Create a custom workflow for the document library to allow users to generate the spreadsheet.
B.    Create a feature to create the required site structure programmatically.
Use feature stapling to associate the feature with all site definitions.
Create a custom action for the standard document library to allow users to generate the spreadsheet.
C.    Create a custom site definition for the sites and allow only that site definition to be used.
Create a content type for the document library.
Create a custom action for the document library to allow users to generate the spreadsheet.
D.    Create a custom site definition for the sites and allow only that site definition to be used.
Create a content type for the document library.
Create a custom event receiver to allow users to generate the spreadsheet.

Answer: C

QUESTION 18
You are designing a SharePoint 2010 application. You need to ensure that a custom list named Phone Numbers is automatically created and added to the site whenever a new Team Site is created. Which approach should you recommend?

A.    Create a feature that defines a Phone Numbers list template. Then activate the feature on the team site.
B.    Create a feature that defines a Phone Numbers list template. Then use feature stapling to associate the feature with the site definition of the team site.
C.    Create the custom Phone Numbers ListTemplate element and add the ListTemplate element to the onet.xml file of the team site.
D.    Create the custom fields, views, and other specifications for the Phone Numbers list definition and add them to the schema.xml file.

Answer: B

QUESTION 19
You are designing a custom SharePoint 2010 solution package. It will include a feature that contains a Web Part, which requires a custom assembly for its functionality. You need to design the feature based on the following requirements:
– The Web Part must be a partial trust application and support a custom Code Access Security (CAS) Policy.
– The solution package must be deployed without the need of farm-level administrator permissions.
Which approach should you recommend?

A.    Create the Web Part feature and deploy the required assembly to the bin directory of only the Web applications that require it. Then delegate administration to the site administrator. Lastly, create a custom CAS policy file and point to it the web.config file of the application.
B.    Create the Web Part feature assembly with a strong name and deploy it using a .wsp file to the _app_bin directory of all Web applications where it is needed. Then activate it using delegated administration.
C.    Create an assembly with a strong name and deploy it to the global assembly cache at the farm level. Activate the feature at the site collection level with delegated administration.
D.    Create the Web Part feature as a sandboxed solution.

Answer: D

QUESTION 20
A SharePoint 2010 server farm has a custom feature installed that provides specialized business logic for a SharePoint solution package. The solution package is being updated to include additional functionality. Your job is to specify a deployment method for the updates that will:
– Add the additional application business logic to the solution package.
– Provide the least downtime for the application.
– Automate the application upgrade a much as possible.
You need to update the solution package with additional business logic and meet all these requirements. Which approach should you recommend?

A.    Create a new feature containing the new business logic.
Use the feature upgrade process to deploy the solution package by incrementing the version number of the feature in the Feature.xml file.
B.    Add the new business logic to the existing feature.
Use the feature upgrade process to deploy the solution package by incrementing the version number of the feature in the Feature.xml file.
C.    Use Visual Studio 2010 to add the new business logic to the existing code in the .wsp package for the feature.
Create two timer jobs-one to retract the current solution package and one to deploy the solution package with the updated feature.
D.    Use the object model to create a custom feature receiver to increment the version property of the SPFeature Definition class.
Increment the version number of the current solution in the Feature.xml file.

Answer: B


http://www.passleader.com/70-576.html

[Pass Ensure VCE Dumps] PassLeader Valid 70-576 Real Exam Questions Guarantee 100 Percent Pass (21-40)

$
0
0

Get valid 70-576 PDF dumps or VCE dumps from PassLeader, we guarantee our 160q 70-576 exam questions are the newest and all the new 70-576 exam questions and answers are available. Now try our best 70-576 practice test with VCE dumps or PDF dumps and you will acquire PRO: Designing and Developing Microsoft SharePoint 2010 Applications Exam certification immediately.

keywords: 70-576 exam,160q 70-576 exam dumps,160q 70-576 exam questions,70-576 pdf dumps,70-576 vce dumps,70-576 study guide,70-576 practice test,PRO: Designing and Developing Microsoft SharePoint 2010 Applications Exam

QUESTION 21
You have a SharePoint Server 2010 server farm that contains a web Application named WebApp1 and a site collection named Site1. Users deploy several SharePoint user solutions to Site1. You need to view the average resource usage of the SharePoint user solutions for the last 14 days. What should you view?

A.    that General Settings of WebApp1
B.    the Site Web Analytics reports of Site1
C.    the content of the solution gallery of Site1
D.    the health reports of WebApp1 from Central Administration

Answer: C

QUESTION 22
You have a SharePoint Server 2010 server that contains two Web servers named Server1 and Server2. You discover that the average CPU utilization on Server1 is 99 percent and the average CPU utilization on Server2 is 1 percent. You need to decrease CPU utilization on Server1. What should you do?

A.    Create an additional Application pool.
B.    Create an extended Web Application zone.
C.    Configure Windows Network Load Balancing.
D.    Configure the maximum number of worker processes.

Answer: C

QUESTION 23
You have a SharePoint Server 2010 server farm. You modify the Web Application default settings to prevent views from displaying more than 2,000 Items. You discover a custom SharePoint user solution that contains a custom Web Part display with more than 2,000 items. You need to prevent all Web Parts from displaying more than 2,000 items. What should you do?

A.    From Library Settings, modify the Validation Settings.
B.    From Library Settings, modify the Per-location view settings.
C.    From Central Administration, modify the Resource Throttling settings.
D.    From Central Administration, modify the User Solutions Management settings.

Answer: C

QUESTION 24
You have a SharePoint Server 2010 server farm. You create two site collections named Site1 and Site2 that use the same template. You update the content and several Web Part pages in Site1. You need to ensure that all changes in Site1 are automatically copied to Site2 every night. What should you do?

A.    Create a content deployment path.
B.    Configure the Data Retrieval Service.
C.    Configure the default backup and restore settings.
D.    Modify the content database settings.

Answer: A

QUESTION 25
You have a SharePoint 2010 server farm. You need to ensure that you can restore the contents of a list without restoring an entire site. You want to achieve this goal while using the minimum amount of administrative effort. What should you do?

A.    From Central Administration, export the list.
B.    From Central Administration, perform a full backup.
C.    From Microsoft SQL Server Management Studio, configure differential backups.
D.    From the SharePoint 2010 Management Shell, run the backup-spfarm cmdlet.

Answer: A

QUESTION 26
You are designing a solution on a SharePoint 2010 intranet site where administrative access to the SharePoint 2010 application server is not available. You need to ensure that site usage information is collected on search statistics for all the sites on the farm. Which approach should you recommend?

A.    Create a Windows service and schedule it to collect the search statistics according to a specified schedule.
B.    Create a SharePoint sandboxed solution to collect the search statistics.
C.    Write a console application to collect search statistics. Create a timer job to run the application according to a specified schedule.
D.    Write a console application to collect search statistics. Use Windows Task Scheduler to run the application at regular intervals.

Answer: C

QUESTION 27
You are using SharePoint 2010 to design a site at your company. All employees need to have permission to fill out a new form. When an employee submits the form, the request should be saved as an item in a custom list. You have the following requirements:
– For security reasons, employees must only be able to view their own requests.
– Employees must not be able to view requests that other employees have submitted.
– Company managers must have permission to view every request submitted.
Which approach should you recommend?

A.    Create a new workflow that updates the owner of the list item to the username of the employee who submitted the form.
B.    Create and schedule a SharePoint timer job that sets item level security on each item in the list.
C.    Create an event receiver that sets the appropriate item level security. Add the event receiver to the ItemAdded event in the list.
D.    Create an event receiver that sets the appropriate list level security. Add the event receiver to the ItemUpdated event in the list.

Answer: C

QUESTION 28
You manage your company’s SharePoint 2010 development efforts. Your company has hired an outside vendor to print its marketing materials. The head of the marketing department has asked you to design a plan to add functionality to the intranet site that will allow company employees to submit their print orders to a SharePoint list on the intranet site throughout the day. The vendor should receive a daily e-mail that shows them all the orders that were submitted to the intranet site the day before. Your plan needs to make this functionality possible. Which approach should you recommend?

A.    Create a custom workflow that generates an e-mail with order details and sends it to the vendor. Attach the workflow to the list and configure it to execute each time an item is added to the list.
B.    Create an event receiver that generates an e-mail with order details and sends it to the vendor. Attach the event receiver to the ItemAdding event on the list.
C.    Create an event receiver that generates an e-mail with order details and sends it to the vendor. Attach the event receiver to the ItemAdded event on the list.
D.    Create a timer job that retrieves all the orders submitted to the SharePoint list, generates an e-mail containing the order information, and sends it to the vendor. Schedule the timer job to run each morning.

Answer: D

QUESTION 29
You are designing a SharePoint 2010 intranet site at your company. The accounting department has designed a SharePoint list. They need this list to be included in any new site that is created by using the Team Site site definition provided by SharePoint. A feature has been created that provisions the list in a site. You need to satisfy the request from the accounting department, while reducing the risk that future SharePoint service pack updates will impact your solution. Which approach should you recommend?

A.    Modify the Team Site onet.xml file.
Add the feature to the WebFeatures element in the onet.xml file.
B.    Modify the Team Site onet.xml file.
Add the feature to the SiteFeatures element in the onet.xml file.
C.    Create an event handler and register it with the WebAdding event.
Activate the feature in the event handler.
D.    Create an event handler and register it with the WebProvisioned event.
Activate the feature in the event handler.

Answer: D

QUESTION 30
You are designing a SharePoint 2010 application that will be used across multiple Web applications. A custom list definition is deployed to every site collection in the farm. Your application must include a report that shows how often the new list is provisioned anywhere in the farm. The application must enable permissions to be granted to specific users to view the report, without the redeployment of code. You need to design a system for logging and reporting this activity. Which two actions should be performed? (Each correct answer presents part of the solution. Choose two.)

A.    Create an event handler and register it with the ListAdded event of your custom list definition. In the event handler, connect to the logging service and log the list creation event. Deploy the event handler to every site collection in the farm.
B.    Create a list workflow and bind it to the custom list definition. When the ItemAdded event executes, connect to the logging service and log the list creation event. Deploy the workflow to every site collection in the farm.
C.    Create a Web service that adds a row to a custom database each time a list is created. Create an application page that displays a report of logged activity. Grant specific users permission to view the page in the code-behind of the application page. Deploy the page to Central Administration.
D.    Create a service application that adds a row to a custom database each time a list is created, and displays a report of the logged activity. Create an instance of the service application that can be used by every Web application in the farm. Grant specific users permission to view the report from the Services Applications tab in Central Administration.

Answer: AD


http://www.passleader.com/70-576.html

QUESTION 31
You are using SharePoint 2010 to design an intranet application for a manufacturer. Employees need to view Web pages with instructions on how to assemble various products. The legal department requires that employees can view past versions of each set of instructions. The instructions may contain rich text elements such as bullets and images. You need to design a solution that meets these requirements. Which approach should you recommend?

A.    For each product, create a Web Part page and add a Content Editor Web Part titled  “Instructions” to a Web Part zone on that page. Add the set of instructions to the Web Part.
B.    For each product, create an application page and add a Content Editor Web Part titled “Instructions” to a Web Part Zone on that page. Add the set of instructions to the Web Part.
C.    Create a page layout that includes a Web Part zone and a Content Editor Web Part titled “Instructions” in that Web Part Zone. For each product, create a publishing page based on that page layout and add the set of instructions to the Web Part.
D.    Create a content type with a Publishing HTML column titled “Instructions”. Create a page layout based on the content type for each product. For each product, create a publishing page using the page layout. Add the set of instructions to the “Instructions” column.

Answer: C

QUESTION 32
You are designing the modification of an existing SharePoint 2010 intranet site for a school. The registrar at the school needs each department to be able to add a new page to their departmental site. The page must be preconfigured with a Web Part showing the latest announcement list items from the registrar’s site regarding class enrollment for the upcoming semester. You need to design a page template that can be used by multiple departments. Which approach should you recommend?

A.    Create a custom master page that includes a Web Part zone. Add a Web Part containing the registrar’s announcements to the Web Part zone. Apply the master page to the intranet site.
B.    Create a publishing page in the registrar’s site that includes a Web Part zone. Add a Web Part containing the registrar’s announcements to the Web Part zone.
C.    Create a page layout the includes a Web Part zone. Add a Web Part containing the registrar’s announcements to the Web Part zone.
D.    Create an application page with a Web Part Zone. Add a Web Part containing the registrar’s announcements to the Web Part Zone. Deploy the application page to the _layouts directory.

Answer: C

QUESTION 33
You are designing a SharePoint 2010 site that employees will use for project collaboration. The design should include a project name, identification number, and the names of the people on the project team displayed on a new page. You need to design the site to meet the following requirements:
– This page must be immediately available in existing sites in the site collection upon deployment.
– New sites must have this page immediately available.
Which approach should you recommend?

A.    Create a master page and deploy it to the Master Page Gallery. Apply the master page to every site in the site collection.
B.    Create a page layout and deploy it to the Master Page Gallery. Create a publishing page, based on the page layout, in every site in the site collection.
C.    Create an application page and deploy it to the _layouts directory.
D.    Create a Web Part page and deploy it to the top-level site of the site collection.

Answer: C

QUESTION 34
You are designing a SharePoint 2010 application to manage projects. The application has the following requirements:
– Users must have access to the CreateProject.aspx page.
– All changes to the CreateProject.aspx page must be reflected on all project sites.
You need to design a page that can be accessed from each project site. Which approach should you recommend?

A.    Create a master page and deploy it to the _layouts directory.
B.    Create a master page and deploy it to the _masterpages directory.
C.    Create an application page and deploy it to the _layouts directory.
D.    Create an application page and deploy it to the Pages library.

Answer: C

QUESTION 35
You are using SharePoint 2010 to develop multiple Internet sites. You have the following requirements:
– Create a user registration page for each site.
– Use the logic found in a custom control named UserRegistration.ascx.
You need to provide a solution that will allow each site to have a custom user registration page with HTML editing capability. Which approach should you recommend?

A.    Create a page based on a page layout that references UserRegistration.ascx and includes an HTML editing field.
B.    Create a page that references UserRegistration.ascx and includes an HTML editing field.
C.    Create an application page deployed to the _layouts directory that references UserRegistration.ascx and includes an HTML editing field.
D.    Create an application page deployed to the Pages library that references UserRegistration.ascx and includes an HTML editing field.

Answer: A

QUESTION 36
You are designing a SharePoint 2010 application. You need to design the application so that it meets the following requirements:
– Content authors must be allowed to create product pages.
– Content authors also must be able to add Web Parts to customize the page.
– Product pages must allow the content author to select a value from a Product Type field as defined in an existing site column.
Which approach should you recommend?

A.    Create an application page that includes the Product Type field and Web Part zones.
B.    Create a page layout that includes the Product Type field and Web Part zones.
C.    Create a static page that includes the Product Type field and Web Part zones.
D.    Create a Web Part page that includes the Product Type field and Web Part zones.

Answer: B

QUESTION 37
You are designing a SharePoint 2010 application. You need to specify that a custom button is defined and added to the SharePoint 2010 ribbon. Which two actions should be performed? (Each correct answer presents part of the solution. Choose two.)

A.    Create a new Content Organizer content type that defines the button.
B.    Create Feature Definition and Feature Element XML files that define the button.
C.    Use the STSADM.EXE utility to deploy the button.
D.    Use the Site Collection Features option in the Site Collection Administration group to deploy the button.

Answer: BC

QUESTION 38
You are designing a SharePoint 2010 application that allows users to enter contact information into a form. You need to design the application so that it displays a dialog box prompting users to validate their contact information before the data is saved. Which approach should you recommend?

A.    Create an application page that calls the SP.UI.ModalDialog class.
B.    Create an application page that calls the SP.UI.PopoutMenu class.
C.    Create a Web Part that calls the MessageBox class.
D.    Create a visual Web Part that calls the SP.UI.PopoutMenu class.

Answer: A

QUESTION 39
You have a sandboxed SharePoint 2010 application for managing sales proposals. The application runs in a hosted environment that does not allow direct access to external services or the installation of proxies or external content types. The account status for your application is contained in a Customer Relationship Management (CRM) system hosted on a separate server. The account status information is exposed via Web services. You need to display account status from the CRM system in the form of dashboards, pie charts, and other reports to the users within your firewall. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A.    Develop a Silverlight component that is responsible for making the Web service call from the client and rendering the returned data.
B.    Develop a Web Part that uses AJAX and is responsible for making the Web service call from the client and rendering the returned data.
C.    Develop a Visual Web Part that calls the Web service in the OnLoad event of the contained ASMX control.
D.    Develop a user control that calls the Web service in the OnPreRender event and render the returned data through XSLT.

Answer: AB

QUESTION 40
You have a social networking site in SharePoint 2010 that allows users to post content for all other users to view. Users have read-only access to documents that they did not upload themselves. You are designing a way for users to easily flag content as objectionable so that the site administrators can evaluate and remove this content as necessary. You need to add this objectionable content functionality to all document libraries. Which approach should you recommend?

A.    Add a button to the ribbon associated to document libraries, which will execute the objectionable content functionality when clicked.
B.    Add a dialog to the site default page that will walk the user through how to report objectionable content.
C.    Modify the system files within the layouts directory that are used to render the form pages.
D.    Add a custom field to the base document content type and an event receiver to the document library that will execute the objectionable content functionality.

Answer: A


http://www.passleader.com/70-576.html

[Pass Ensure VCE Dumps] PassLeader Real 160q 70-576 Exam VCE Dumps Help You Passing Exam Easily (41-60)

$
0
0

Pass 70-576 exam with premium 70-576 exam dumps! PassLeader are offering the newest 160q 70-576 vce dumps and 70-576 pdf dumps including all the new added 70-576 exam questions, which are 100% valid for passing the 70-576 exam. PassLeader provide PDF and VCE format exam 70-576 briandumps with free version VCE player! Visit passleader.com now and download the 100% passing guarantee 160q 70-576 vce and pdf dumps to achieve 70-576 certification today!

keywords: 70-576 exam,160q 70-576 exam dumps,160q 70-576 exam questions,70-576 pdf dumps,70-576 vce dumps,70-576 study guide,70-576 practice test,PRO: Designing and Developing Microsoft SharePoint 2010 Applications Exam

QUESTION 41
You are designing a SharePoint 2010 solution. The solution includes the rendering of a highly interactive control that must allow the following functionality:
– Fading items in and out.
– Dragging items around the display.
– Seamlessly updating information on the server without affecting other items on the page.
You need to design the interactive control according to these requirements. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A.    Use cascading style sheets (CSS) to render the graphical enhancements.
Use AJAX to post the client-side information back to the server.
B.    Use client-side scripting to render the graphical enhancements.
Use AJAX to post the client-side information back to the server.
C.    Use Silverlight to render the graphical enhancements.
Use Microsoft Windows Communication Foundation (WCF) to post the client-side information back to the server.
D.    Use a visual Web Part to render the graphical enhancements.
Raise custom events on the client side to post information back to the server.

Answer: BC

QUESTION 42
You are developing an Internet Web site. You plan to use SharePoint 2010 for content management. The Web site design includes extensive graphics. You need to ensure that the following project requirements for the site are met:
– Complex structural changes to support the new branding
– Consistency across all of its pages and subsites
– Support for multiple browsers
Which approach should you recommend?

A.    Develop a new custom master page to be applied throughout the site.
B.    Develop a new custom template to be used throughout the site.
C.    Use PowerPoint 2010 themes to apply new custom SharePoint branding throughout the site.
D.    Specify an alternate cascading style sheet (CSS) file to use for all pages within the site.

Answer: A

QUESTION 43
Your company has more than 100 SharePoint 2010 intranet sites. The branding of several individual department subsites is not consistent with company standards. You need to ensure that the branding of all intranet subsites is consistent with company standards and graphics. Which approach should you recommend?

A.    Create a master page at the root level that specifies the company branding and graphics, and force all subsites to inherit the master page.
B.    Create a master page in the Master Page gallery that specifies the company branding and graphics, and disable document versioning within the Master Page gallery.
C.    Create a theme at the root level that specifies the company branding and graphics, and force all subsites to inherit the theme.
D.    Create a theme at the root level that specifies the company branding and graphics, and reset each subsite back to its original site definition.

Answer: A

QUESTION 44
You are designing a branding strategy for a SharePoint 2010 site that uses several third-party controls. Many of these controls contain inline styling that conflicts with the desired branding. You do not have access to the code for these controls. The design must ensure that this SharePoint styling will be applied to the controls. Which approach should you recommend?

A.    Edit the master page for the site to include the proper styling.
B.    Apply a SharePoint theme, which will override the controls styling.
C.    Use client-side scripting to remove the inline styles.
D.    Modify the core.css file to contain the branding for the site.

Answer: C

QUESTION 45
You are designing a branding strategy for a customer with a new SharePoint 2010 server farm. The branding strategy you recommend must enable each department in the company to customize sites with their specific branding preferences. The design requirements specify that users should be able to:
– Create top-level sites for self-service site and subsite creation.
– Modify their sites without affecting other existing sites.
– Create multiple lists of the same types with different content.
– Implement SharePoint themes.
You need to meet all these design requirements without custom development. Which strategy should you design for each department to meet these requirements?

A.    a master page
B.    a Microsoft Office PowerPoint 2010 theme
C.    a site definition
D.    a site template

Answer: D

QUESTION 46
You are planning an upgrade from an existing Microsoft Office SharePoint Server (MOSS) 2007 farm to a SharePoint 2010 farm. The existing farm contains customized master pages. These master pages include modifications of the:
– Publishing console
– Site Actions Menu
– Log-in Control
Your design must specify an upgrade to the existing master pages to function correctly in SharePoint 2010. Which approach should you recommend?

A.    Create a new SharePoint 2010 master page and add the required controls into the Ribbon on the page.
B.    Update the cascading style sheet (CSS) styles in the core.css file of the existing SharePoint sites with the SharePoint 2010 CSS styles.
Add SharePoint 2010 content placeholders to the existing master pages.
C.    Create SharePoint 2010 delegate controls for all of the custom controls in the existing MOSS 2007 master pages.
Add these controls to the new SharePoint 2010 master pages.
D.    Use the Farm Configuration wizard to upgrade the existing MOSS 2007 master pages so that the pages are compatible with SharePoint 2010.

Answer: A

QUESTION 47
Your company has a SharePoint 2010 Web application that contains multiple site collections. You have a custom master page that will be used by every site collection in the application. You need to make sure that changes made to this custom master page are displayed across all site collections in the Web application. Which approach should you recommend?

A.    Use SharePoint Designer 2010 to add the new master page to each site collection.
B.    Use the Site Master Page Settings page in the Web browser to apply the new master page to the top-level site of each site collection.
C.    Manually upload the master page to the Master Page gallery of each site collection using the Web browser.
D.    Deploy a solution package using Visual Studio that includes the master page in a feature, and activate the feature in each site collection.

Answer: D

QUESTION 48
You are designing a SharePoint 2010 intranet site for your company. You need to make sure that each department’s SharePoint site has a unique appearance by using different fonts and font colors for each site. Your design should include no custom development. Which approach should you recommend?

A.    Configure a separate theme using the Site Theme page for each department’s site.
B.    Create a new cascading style sheet for each department. Define unique fonts and font colors for that department in the new cascading style sheet.
C.    Create a feature for each department that deploys a customized cascading style sheet to the style library for the department site.
D.    Create a new master page for each department’s site and assign unique fonts and font colors inside the master page.

Answer: A

QUESTION 49
You are designing a SharePoint 2010 intranet site for a corporation. Your design must meet the following requirements:
– The homepage must contain a single Web Part that displays a view of a specific document library.
– Each employee must be able to create a persistent view of the list that would be filtered, grouped, and sorted based on their selection criteria.
Which approach should you recommend?

A.    Create a new page for each employee and add the document library Web Part to the page.
Instruct each employee to customize an individual view of the Web Part.
Then select the Make Homepage button in the Page tab on the ribbon.
B.    Create the site homepage.
Deploy a copy of SharePoint Designer to each employee’s computer.
Instruct each employee to use SharePoint Designer to customize the site homepage, including the view of the document library.
C.    Create the site homepage.
Add the document library Web Part to the page, with the Allow Editing in Personal View option selected.
Instruct each employee to personalize the page in the browser and to customize an individual view of the Web Part.
D.    Create the site homepage.
Instruct each employee to edit the homepage in the browser, adding a copy of the document library Web Part to the page.
Instruct each employee to customize an individual view of the document library in the new Web Part.

Answer: C

QUESTION 50
You are designing a SharePoint 2010 application that creates a content type. You need to design the application so that users are not able to change the content type from within the SharePoint 2010 user interface. Which approach should you recommend?

A.    Create a content type that is read-only and deployed as a feature.
B.    Create a content type that is sealed and deployed as a feature.
C.    Use SharePoint Designer 2010 to create a content type and uncheck Allow Modifications.
D.    Use SharePoint Designer 2010 to create a content type that is read-only.

Answer: B


http://www.passleader.com/70-576.html

QUESTION 51
You are designing a site on SharePoint 2010. You need to design the site so that it meets the following requirements:
– Contributors must be able to use the SharePoint user interface to add, remove, and delete Web Parts only in a Web Part zone named Your Web Parts.
– Only site collection owners may add, remove, and delete Web Parts in a Web Part zone named Required Web Parts.
Which approach should you recommend?

A.    Create a page layout with a Web Part zone named Your Web Parts that allows customizations. Create a Web Part zone named Required Web Parts that allows customizations.
B.    Create a page layout with a Web Part zone named Your Web Parts that allows customizations. Create a Web Part zone named Required Web Parts that does not allow customizations with the desired Web Parts pre-loaded.
C.    Create a page layout with Web Part zones that do not allow customizations and grant contributors full control to the site collection.
D.    Create a Web Part page with a Web Part zone named Your Web Parts that does not allow customizations. Create a Web Part zone named Required Web Parts that allows customizations.

Answer: B

QUESTION 52
You are responsible for rebranding the My Sites section of a corporate SharePoint 2010 farm. The new branding includes a change to the Quick Launch menu in all corporate My Sites pages. You do not have access to modify any master pages. Also, the new branding is not yet finalized and might need to be reverted. You need to ensure that the Quick Launch menu is updated in all corporate My Sites pages, using the least amount of workforce effort. Which approach should you recommend?

A.    Use client-side code to inject your modifications into the rendered page.
B.    Use a feature that includes a delegate control with a lower sequence number than the default My Site Quick Launch Delegate.
C.    Manually modify the navigation under Site Settings for each My Site page.
D.    Write and execute a PowerShell script that will iterate through each My Site and modify the navigational settings.

Answer: B

QUESTION 53
Your company is rebranding its corporate extranet SharePoint 2010 site. The new design requires the site’s global navigation to use nonstandard fonts for both the top-level and secondary drop-down menus. You need to ensure that the new branding is rendered consistently in all browsers supported by SharePoint 2010. Which approach should you recommend?

A.    Specify the CssClass of the SharePoint AspMenu control.
B.    Specify the DynamicMenuItem Style property of the SharePoint AspMenu control to render the text as an image.
C.    Use a theme to specify the font in the design.
D.    Develop a custom menu control to render the text as an image.

Answer: D

QUESTION 54
You are designing a maintenance plan for a SharePoint 2010 intranet site. You have the following requirements:
– The site has 25 custom content types and 5 document libraries. One of the document libraries has more than 1,000 documents.
– Every document in the site is associated with one of the custom content types.
– Each document library has a single view, showing the name of the document and the person who last modified it.
– Private views are not permitted in the site.
– The site is used for collaboration and does not have any of the SharePoint publishing features enabled.
You need to enable users to filter the documents in the large document library by content type. Which approach should you recommend?

A.    Activate the Metadata Navigation and Filtering feature. Modify the metadata navigation settings for the document library by adding Content Type to the list of selected hierarchy fields.
B.    Create a new site scope for each content type. For each scope, add a rule of type Property Query. Set the Property Restriction to include any item with the name of the content type of the scope.
C.    For each content type, create a newWeb Part using the Content Query Web Part. Configure the Web Part to filter the documents in the document library by that content type.
D.    Go to the site navigation page and enable the Tree View option. Use the Tree View option to filter the documents in the document library.

Answer: A

QUESTION 55
You are designing a SharePoint 2010 intranet site. Each department has its own site collection. A link to each of the departments must appear in the global navigation for each site collection. You have implemented the SharePoint AspMenu control in the master page. Your design must specify the correct provider for the menu control. Which provider should you recommend?

A.    SPContentMapProvider
B.    SPSiteMapProvider
C.    PortalSiteMapProvider
D.    SPXmlContentMapProvider

Answer: D

QUESTION 56
You work for a manufacturer who needs to advertise its catalog of products online using a SharePoint 2010 publishing site. A page author will create a Web page for every type of product the manufacturer makes. Each Web page will display the name of the material the product is made from and a photo of the product. You need to design this site to satisfy the following requirements:
– When the page author creates a new Web page for a product, the author should only be able to choose from a list of five materials.
– The manufacturer’s marketing manager should be able to add to the list of materials at any time without assistance from the IT department.
– Users can choose to view the site in English, German, or Spanish. A user should see the name of the product material in only the language they have selected.
– The URL of the page should remain the same for each type of product regardless of the language the user has selected.
Which approach should you recommend?

A.    Create a site column of type “Choice” for English, German, and French, and add the translated list of materials to the site column for each language. Add all three site columns to the page layout. Give the marketing manager permission to edit the Choice site column values for each language.
B.    Create a resource file for each language and install the resource file using a SharePoint solution package. Show the marketing manager how to edit the resource file.
C.    Use the Managed Metadata Service to create a set of terms used for product materials and translate each term into English, German, and Spanish. Add a site column mapped to the term set to the page layout. Make the marketing manager the term set owner.
D.    For each type of product, create three Web pages, one for each language. Give the marketing manager permission to edit all the product Web pages.

Answer: C

QUESTION 57
You are designing a multi-lingual publishing Web site using SharePoint 2010. Administrators have installed language packs for Japanese, Chinese, and Vietnamese on the server. Users whose browser locale is set to Japanese, Chinese, or Vietnamese must be able to navigate to a corresponding language-specific site with as few clicks as possible. Your design needs to ensure that this is accomplished with no custom development. Which approach should you recommend?

A.    Create a variation label for Japanese, Chinese, and Vietnamese. For each variation label, create a hierarchy. SharePoint will automatically redirect users to the language-specific site that corresponds to their browser locale.
B.    Create a language-specific site for Japanese, Chinese, and Vietnamese. Create a top-level site with a welcome page that contains hyperlinks to the language-specific sites. Allow users to navigate to the language-specific site of their choosing.
C.    Create a language-specific site for Japanese, Chinese, and Vietnamese. Create an application page that queries that user’s browser locale and redirects them to the appropriate language-specific site. Make this page the welcome page for the top-level site.
D.    Create a language-specific site for Japanese, Chinese, and Vietnamese. Create a JScript file that queries the user’s browser locale and redirects them to the appropriate language-specific site. Add a reference to the JScript file to each master pages used in the site collection.

Answer: A

QUESTION 58
You work for a product company that sells custom SharePoint 2010 Web Parts to customers. You are designing a Web Part that will be deployed to the Web Part gallery when a feature is activated. The feature must accomodate multiple languages, so that a user will see the name of the feature in the same language that was used to create the site. You need to ensure that your design meets this requirement. Which two approaches would accomplish this goal? (Each correct answer presents a complete solution. Choose two.)

A.    For each language, add a new node to the Manifest.xml file. Add the language ID and the localized name of the feature to each node.
B.    For each language, add a new node to the Feature.xml file. Add the language ID and the localized name of the feature to each node.
C.    Create a resource file for each language. Deploy the .resx files to the 14\Resources folder. Assign the name of the feature a resource token value.
D.    Create a resource file for each language. Deploy the .resx files to a folder named Resources inside the feature folder. Assign the name of the feature a resource token value.

Answer: CD

QUESTION 59
You are designing a collection of Web Parts that will be packaged into a SharePoint 2010 application that you plan to market worldwide. In order to be accessible in many different languages, the following elements must comply with localization requirements:
– The feature title and description
– The UI property labels
You need to design the Web Parts according to the localization requirements in a way that takes the fewest developer hours to implement and maintain. Which approach should you recommend?

A.    Include feature receivers that ensure the supported language packs are installed before continuing with the installation.
B.    Include code to programmatically create a new term set with localized labels, and reference these throughout your solution.
C.    Include resource files with localized labels, and reference these throughout your solution.
D.    Compile a different version of your solution for each language you intend to support.

Answer: C

QUESTION 60
You are planning an upgrade for an existing SharePoint 2010 intranet site to support a Spanish language version of all existing sites. You need to meet the following requirements:
– All text on the sites must appear in both Spanish and English.
– Every page on the current English sites must also appear in Spanish.
– All future pages must be created in both languages in a consistent manner.
– The upgrade must involve the least amount of human effort and the least expenditure of hardware and software resources.
Which approach should you recommend?

A.    Install a parallel SharePoint farm using Spanish as the default language.
Recreate all sites and incorporate the Spanish language version of the site definition by specifying the Spanish language identifier.
B.    Install a language pack for Spanish on the existing SharePoint farm.
Recreate all sites and incorporate the Spanish language version of the site definition by specifying the Spanish language identifier.
C.    Install a language pack for Spanish on the existing SharePoint farm.
Create SharePoint workflows that apply the Spanish language identifier for the sites by specifying Spanish variations.
D.    Install a language pack for Spanish on the existing SharePoint farm.
Apply the Spanish language identifier to the existing site templates.

Answer: B


http://www.passleader.com/70-576.html

[Pass Ensure VCE Dumps] 100% Valid 70-576 Exam Questions and Answers Everyone Want To Download (61-80)

$
0
0

Pass 70-576 exam with premium 70-576 exam dumps! PassLeader are offering the newest 160q 70-576 vce dumps and 70-576 pdf dumps including all the new added 70-576 exam questions, which are 100% valid for passing the 70-576 exam. PassLeader provide PDF and VCE format exam 70-576 briandumps with free version VCE player! Visit passleader.com now and download the 100% passing guarantee 160q 70-576 vce and pdf dumps to achieve 70-576 certification today!

keywords: 70-576 exam,160q 70-576 exam dumps,160q 70-576 exam questions,70-576 pdf dumps,70-576 vce dumps,70-576 study guide,70-576 practice test,PRO: Designing and Developing Microsoft SharePoint 2010 Applications Exam

QUESTION 61
You are designing an application in a SharePoint 2010 server farm for an international firm. The sites must be localized for the languages in different countries. The application must include support for the following functionality:
– Feature-specific resource files
– Language-specific Web Part package assemblies and resources
– Language-specific Web template files
– Language-specific _layout files
You need to design a solution that meets all these requirements. Which approach should you recommend?

A.    Create a language pack for the specific language required and add it to the solution store before adding the corporate solution.
Deploy the language pack and then deploy the solution.
B.    Create a language pack for the specific language required and add it to the solution store before adding the corporate solution.
Deploy the solution and then deploy the language pack.
C.    Create a language pack for the specific language required and add it to the solution store after adding the corporate solution.
Deploy the language pack and then deploy the solution.
D.    Create a language pack for the specific language required and add it to the solution store after adding the corporate solution.
Deploy the solution and then deploy the language pack.

Answer: D

QUESTION 62
You are consulting with a customer who plans to scale out their SharePoint 2010 Internet farm. You recommend that they install the standard SharePoint 2010 software needed to support the Web server role, including language support software, on their servers. The new requirements for the farm include the following:
– Two new front-end Web servers will be added to the current system to increase the performance and availability of the Internet sites.
– The new Web servers must properly render all sites in the five languages currently supported in the farm.
– The installation must support the addition of more languages in the future and conform to all future service pack updates.
– The installation plan must use standard SharePoint 2010 tools and procedures.
You need to design a plan for the customer to set up the Web servers to support all of the languages and meet the requirements. What should you recommend that the customer do next?

A.    Install a language pack for each of the languages needed to display all site pages correctly. Include each of the language-specific site templates used to create the current sites.
B.    Install the same multilingual installation packages on the Web servers that were used to install the supported languages.
C.    Create the site collections needed to support the sites in all supported languages, including each of the language-specific site templates. Install a language pack for each of the supported languages.
D.    Install the default language for the current farm on the two new Web servers. Then migrate all sites in the farm to these servers, including all language-specific site templates. Update the new Web servers with all necessary language packs.

Answer: A

QUESTION 63
You are designing a SharePoint 2010 implementation that will be used by a company with a variety of authentication systems. The authentication system must provide:
– Authentication for Windows-based and Linux-based systems
– Support for multiple authentication types
– Strong real-time authentication for applications
– Delegation of user identity among applications
You need to use standard SharePoint 2010 technologies to meet all these requirements. Which authentication model should you design for the SharePoint farm?

A.    claims based
B.    forms based
C.    Kerberos
D.    Windows

Answer: A

QUESTION 64
You are designing a Web application for a SharePoint 2010 system. You need to plan an authorization system that meets the following requirements:
– It must enforce uniform security throughout all site collections at the Web application or zone level.
– It must use Windows authentication.
– It must assign a role incorporating a collection of rights to individual SharePoint 2010 users or domain groups.
– It must specify the rights for a user or group in the Web application based on an Active Directory (AD) user or group account.
– The rights should not be shared across other Web applications.
You need to design a plan that provides specific control of SharePoint object access and meets all requirements. Which approach should you recommend?

A.    Create custom SharePoint roles and assign AD users and groups to the roles.
B.    Create a security policy in the web.config file for the Web application. Add AD users and groups to the policy.
C.    Create a forms-based authentication and set the Zone to Extranet for the Web application. Specify a custom role provider that maps to a custom Microsoft SQL Server database for users and groups.
D.    Create a custom authentication provider based on Kerberos for the Web application. Specify roles for the users and groups in a Lightweight Directory Access Protocol (LDAP) directory.

Answer: B

QUESTION 65
You are designing a SharePoint 2010 application that contains a Web Part. The Web Part must connect to an RSS data stream provided by a Web service. The Web service is on another server in the domain. You need to recommend an authentication approach that meets the following requirements:
– SharePoint users must not be required to supply additional credentials for the Web service.
– Standard authentication systems available to SharePoint 2010 must be used.
Which authentication approach should you recommend?

A.    NTLM
B.    forms-based authentication (FBA)
C.    Kerberos
D.    Lightweight Directory Access Protocol (LDAP)

Answer: C

QUESTION 66
You are designing an application that will use a timer job that will run each night to send documents to a SharePoint 2010 Records Center site for archiving. The security on the site requires higher privileges than those normally associated with the application. The security requirements for this application specify that:
– It must not require customized storage of the user credentials.
– The user token used for security access must expire within 24 hours unless specifically refreshed to prevent extended or unintended use over time.
– The security mechanism must require a two-way trust to prevent unauthorized activity between domains.
– The application must use the SharePoint object model to accomplish this.
You need to design the application to support these security requirements. How should you design the timer job?

A.    to inherit the security role assignments
B.    to log on to the Records Center site with a service account stored in a database
C.    to run with elevated privileges
D.    to run with impersonation

Answer: D

QUESTION 67
You are designing an authentication plan for a SharePoint 2010 intranet site for a large enterprise. The site administrator and the Active Directory (AD) administrator are concerned that the traffic on the SharePoint site might cause performance issues related to site authentication. Average user page sessions typically last longer than 15 minutes. You must design an authentication plan that provides the best possible performance and meets the following requirements:
– The plan must be able to accommodate 50,000 users.
– The existing infrastructure must be used as much as possible but the performance problem with user access must be prevented.
Which approach should you recommend?

A.    Design a SharePoint 2010 site that requires Windows Kerberos authentication to log on.
B.    Design a SharePoint 2010 site that requires Windows NTLM authentication to log on.
C.    Design a site that requires basic authentication to log on.
D.    Design a site that requires forms-based authentication to log on.

Answer: A

QUESTION 68
You are designing a knowledge base (KB) solution for a SharePoint 2010 Internet site for vendors and employees in your organization. The employees have Active Directory (AD) accounts. You have the following requirements:
– You must incorporate the existing Windows authentication system based on AD.
– Vendors who have no Windows credentials must have access to the KB .
– Content editors must be able to use their Windows credentials to log on to the site and publish the content.
You need to ensure that vendors and content editors can access the site. Which approach should you recommend?

A.    Use Windows based authentication for employees and vendors to access the KB.
B.    Use Windows based authentication for employees and forms-based authentication for vendors to access the KB.
C.    Create a custom SharePoint group that includes employees and vendors. Give this group permission to access the KB.
D.    Use SharePoint user profiles to allow vendors and employees to access the KB.

Answer: B

QUESTION 69
You are designing an extranet site using SharePoint 2010. This site must allow employees to log on to the extranet site from home. They should use their corporate Active Directory credentials by typing their user name and password into text boxes on a logon page on the site. After users log on, they should be redirected to the site home page. You need to meet these requirements with the least amount of configuration. Which type of authentication should you design?

A.    forms-based authentication (FBA)
B.    Web Single-Sign On (SSO)
C.    NTLM
D.    Kerberos

Answer: A

QUESTION 70
Your company has a SharePoint 2010 farm that has one Web application with multiple site collections. Your team needs to meet the following requirements:
– Certain individual need to have the “Full Control” permission set on every site collection in the Web application.
– Permissions must be set in a central location and should effect all current and future site collections.
Which approach should you recommend?

A.    Add users to the local administrators group on the server.
B.    Add users to the Site Owners group in each site collection.
C.    Create a user policy for the Web application in Central Administration.
D.    Create a group policy in the Active Directory domain to which the SharePoint users authenticate.

Answer: C


http://www.passleader.com/70-576.html

QUESTION 71
You are planning security for a SharePoint 2010 intranet site. A subsite for the human resources (HR) department contains a list of salary information. All the HR department employees are in an Active Directory (AD) group named SharePoint HR. The SharePoint HR AD group has been granted Read access to the subsite. You have the following requirements:
– Access to the list should be handled only through the HR department group.
– The group membership of the AD HR group should be used to specifiy the site permissions.
– The department’s administrative assistant should not have access to view the salary list.
You need to ensure that permissions are configured on the subsite to meet these requirements. Which plan should you recommend?

A.    Remove the assistant from the SharePoint HR AD group. Give the assistant individual Read access to the site. Modify the salary list permissions, removing the assistant from the list.
B.    Modify the salary list permissions, explicitly denying the assistant Read access to the salary list.
C.    Modify the salary list permissions, remove the SharePoint HR group from the list of users and groups who have been granted any sort of access to the list. Grant each employee of the HR department individual Read access to the salary list, with the exception of the assistant.
D.    Modify the salary list permissions, explicitly denying the SharePoint HR group Read access to the salary list. Grant each employee of the HR department individual Read access to the salary list, with the exception of the assistant.

Answer: A

QUESTION 72
You are designing a SharePoint 2010 application and a Web application. You need to design a security model for the application that requires users to be authenticated through the Windows Live ID service without using a custom provider. Which type of authentication should you recommend?

A.    claims-based authentication
B.    Kerberos
C.    NTLM
D.    forms-based authentication

Answer: A

QUESTION 73
You are designing a SharePoint 2010 application. You have the following requirements:
– Display sales data from a CRM system.
– Authenticate users to the CRM system through their Windows credentials.
– Eliminate multiple authentication requests.
You need to choose an authentication method that supports the requirements. Which authentication method should you recommend?

A.    NTLM
B.    Kerberos
C.    forms-based authentication that prompts for the user’s Windows credentials
D.    forms-based authentication that uses the ASP.NET SQL Membership provider

Answer: B

QUESTION 74
You are designing a SharePoint 2010 solution that requires custom configuration settings. The solution will reside in every Web application within the environment because subsequent features depend on these settings. The server farm that the code is currently deployed to is going to be replaced with a new one. The content databases will be migrated to the new server farm. Manual changes to any files will not be allowed after the migration is complete. You need to ensure that the configuration settings are in place on the new server farm. Which approach should you recommend?

A.    Place your settings within a feature that uses the SPWebConfigModification property to persist the information in the web.config file.
B.    Place your settings in a file named webconfig.MySolution.xml and place it in the \14\config directory.
C.    Place your settings in the current web.config file for each Web application.
D.    Place your settings in the hierarchical object store in the SPPersistedObject class.

Answer: D

QUESTION 75
You are designing a feature for a SharePoint 2010 solution that will be activated by default in your site definition. The values for the configuration settings are based on the particular Web site on which the feature is activated. You have the following requirements:
– Setting the configuration values should not cause downtime.
– The configuration settings must be accessible by other features.
You need to design how the configuration settings will be stored. Which approach should you recommend?

A.    Specify the configuration settings using the SPWebConfigModification object.
B.    Specify the configuration settings in the property bag for the Web site.
C.    Place the configuration settings in the web.config file.
D.    Place the configuration settings in a list created by the site definition.

Answer: B

QUESTION 76
You are designing a SharePoint 2010 solution. Site administrators do not have direct access to the file system on the Web servers. You need to design the solution according to following requirements:
– It must contain a set of Web Parts that receive information from a common collection of configuration dat a.
– Site administrators must be able to modify the configuration settings for individual sites using the standard SharePoint user interface.
Which approach should you recommend?

A.    Set the configuration data with the SPWebConfigModification object.
B.    Set the configuration data with SharePoint persisted objects.
C.    Set the configuration data in the property bag for each Web site.
D.    Set the configuration data in a list on each site where the Web Parts are placed.

Answer: D

QUESTION 77
You are designing a SharePoint 2010 application that connects to an external Microsoft SQL Server database. You have the following requirements:
– Server administrators can add and edit connection strings at the Web application level.
– SharePoint users must not be able to view or modify sensitive data in the connection strings.
– Server administrators can add or change the connection strings declaratively with no custom UI required.
– The connection strings can be modified programmatically without redeploying code.
You need to create a plan to store connection strings for the database within the SharePoint system. Which approach should you recommend?

A.    Add or change the connection strings in the web.config file.
B.    Use a hierarchical object store configuration approach to store the connection strings.
C.    Use a property bag configuration approach to store the connection strings.
D.    Use SharePoint lists to store the connection strings.

Answer: A

QUESTION 78
You are designing an application configuration approach for a custom SharePoint 2010 application. You need to design the application configuration to:
– Store and secure custom configuration settings for the application including connection strings, server names, file paths, and other miscellaneous settings.
– Read and display the settings on the site with an administrative user interface that can be configured using a custom _layouts page.
– Store configuration settings at the farm, Web application, site collection, and site levels as needed.
You need to design a storage option that is simple and lightweight in structure and programmatically configurable. Which approach should you recommend?

A.    Add custom configuration settings to the web.config file and programmatically read this file to display the custom settings.
B.    Use a hierarchical object store to save the custom configuration settings and programmatically read it to display the custom settings.
C.    Use a property bag to store the custom configuration settings.
D.    Use SharePoint lists to store the custom configuration settings.

Answer: C

QUESTION 79
You are designing a SharePoint 2010 intranet site. Your design must:
– Specify the manner in which to store and read custom configuration settings.
– Use a standard user interface to allow the configuration settings to be created or changed.
You need to design the solution at the site collection and site levels to meet these requirements. Which approach should you recommend?

A.    Use the property bag to store custom configuration settings.
B.    Use the hierarchical object store to store custom configuration settings.
C.    Use SharePoint lists to store the custom configuration settings.
D.    Add custom configuration settings in the web.config file to display the settings.

Answer: C

QUESTION 80
You are designing a SharePoint 2010 farm implementation that will include an extranet zone that will employ forms-based authentication (FBA). The plan must:
– Specify how farm administrators will manage modifications to the configuration settings for the FBA within each Web application.
– Support granular modifications to the individual Web applications.
– Include a process to apply the modifications to the SharePoint configuration database.
– Specify a process to deploy the changes throughout the server farm by propagating the changes to all Webfront-end servers.
You need to create a software configuration management plan for the farm that meets all these requirements. Which approach should your plan recommend?

A.    Create a feature that contains code to read, modify, and save the configuration setting for the SPWebApplication object for each Web application. Save the settings in the hierarchical object store by creating a SPPersistedObject class to store the configuration.
B.    Create a feature that contains code to modify the configuration settings to the web.config file for each Web application. Then propagate the changes programmatically by implementing the SPWebConfigModification class.
C.    Build a custom list for each Web application that stores the required configuration information. Create a custom workflow that uses the Set Field in Current Item action to synchronize the settings in the list with the configuration database and the Web servers.
D.    Build the required changes declaratively by creating an XML extension containing the settings needed. Deploy the file to the 14\Config directory. Then use the Stsadm copyappbincontent command to merge these changes with the existing web.config file.

Answer: B


http://www.passleader.com/70-576.html

Viewing all 1919 articles
Browse latest View live