Ensurepass

QUESTION 101

DRAG DROP

Your company has a server named VS1 that runs Windows Server 2008 R2 and Hyper-V.

The VS1 server hosts 10 virtual servers.

 

A virtual server named VS-DB has one 64-GB fixed-size virtual hard disk (VHD). The VHD file name is disk1.vhd.

 

You discover that VS-DB utilizes only 5 GB of the VHD.

 

You turn off the VS-DB virtual server and want to regain the unused disk space on the VS1 physical server.

 

You need to configure VS-DB to make the disk1.vhd file as small as possible. What should you do? (To answer, move the appropriate tasks from the list of tasks to the answer area and arrange them in the correct order.)

 

image053

 

Correct Answer:

image055

 

 

QUESTION 102

You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.

 

You create a new virtual machine and perform an installation of Windows Server 2003 on

the virtual machine.

 

You configure the virtual machine to use the physical network card of the host server. You notice that you are unable to access network resources from the virtual machine. You need to ensure that the virtual host can connect to the physical network.

 

What should you do?

 

A.

On the host server, install the Microsoft Loopback adapter.

B.

On the host server, enable the Multipath I/O feature.

C.

On the virtual machine, install the Microsoft Loopback adapter.

D.

On the virtual machine, install Microsoft Hyper-V Integration Components.

 

Correct Answer: D

Explanation:

Networking and virtual machines

To connect a virtual machine to a virtual network, you add a virtual network adapter to the virtual machine and then connect the virtual network adapter to an existing virtual network. There are two types of network adapters available for Hyper-V: a network adapter and a legacy network adapter. The network adapter is designed specifically for Hyper-V and requires a virtual machine driver that is included with the Hyper-V integration services. This type of networking adapter provides better performance than a legacy network adapter and is the recommended choice when it can be used. Because this type of virtual network adapter requires integration services in the guest operating system, it can be used only with guest operating systems for which integration services are available.

Note:

If a network adapter is configured for a virtual machine but integration services are not installed in the guest operating system, Device Manager lists the network adapter as an unknown device.

Source: http://technet.microsoft.com/en-us/library/cc816585.aspx Integration services Integration services are available for supported guest operating systems as described in the following table.

Windows 2003 SP2 Guest operating system – Device and service support Windows Server 2003 (x64 editions) with Service Pack 2 Drivers: IDE, SCSI, networking, video, and mouse Services: operating system shutdown, time synchronization, data exchange, heartbeat, and online backup

Note This operating system does not support a legacy network adapter. Windows Server 2003 (x86 editions) with Service Pack 2 Drivers: IDE, SCSI, networking, video, and mouse Services: operating system shutdown, time synchronization, data exchange, heartbeat, and online backup

Source: http://technet.microsoft.com/en-us/library/cc794868(WS.10).aspx

 

 

QUESTION 103

You have two servers that run Windows Server 2008 R2 Enterprise. Both servers have the Failover Clustering feature installed. You configure the servers as a two-node cluster. The cluster nodes are named NODE1 and NODE2.

 

You have an application named PrintService that includes a print spooler resource. You need to configure the cluster to automatically return the PrintService application to NODE1 after a failover.

 

Which two actions should you perform? (Each correct answer presents part of the solution.

Choose two.)

 

A.

Set the Period (hours) option to 0 in the properties of the print spooler resource.

B.

Move NODE1 to the top of the list of preferred owners for the PrintService application.

C.

Enable the Allow Failback and Immediate options for the PrintService application.

D.

Disable the If restart is unsuccessful, failover all resources in this server or application option in the properties of the print spooler resource.

 

Correct Answer: BC

Explanation:

Preferred nodes list defined

If you define a complete preferred nodes list for a group (that is, one listing all the nodes in the cluster), then the Cluster service uses this defined list as its internal list. However, if you define a partial preferred nodes list for a group, then the Cluster service uses this defined list as its internal list and appends any other installed nodes not on the preferred list, ordered by their node IDs. For example, if you created a 5-node cluster (installing the nodes in the order Node1, Node2, Node3, Node4, and Node5) and defined Node3, Node4, and Node5 as preferred owners for the resource group, PRINTGR1, the Cluster service would maintain this ordered list for PRINTGR1: Node3, Node4, Node5, Node1, Node2. How the Cluster service uses this list depends on whether the resource group move is due to a resource/node failure or a manual move group request.

Preferred lists and resource or node failures

For resource group or node failures, the group fails over to the node next to the current owner on the preferred nodes list. In the example above, if the resource group PRINTGR1 on Node3 fails, then the Cluster service would fail that group over to the next node on the

 

list, Node4. If you allow failback for that group, then when Node3 comes up again, the Cluster service will fail back PRINTGR1 to that node.

 

Source: http://technet.microsoft.com/en-us/library/cc737785.aspx

 

 

QUESTION 104

A server runs Windows Server 2008 R2. The Remote Desktop Services server role is installed on the server.

 

You deploy a new application on the server. The application creates files that have an extension of .xyz.

 

You need to ensure that users can launch the remote application from their computers by double- clicking a file that has the .xyz extension.

 

What should you do?

 

A.

Configure the Remote Desktop Connection Client on the users’ computers to point to the server.

B.

Configure the application as a published application by using a Remote Desktop Program file.

C.

Configure the application as a published application by using a Microsoft Windows Installer package file.

D.

Configure the application as a published application by using a Remote Desktop Web Access Web site.

 

Correct Answer: C

Explanation:

Launching Apps from the Desktop

For users who want to double-click documents to launch the application, terminal services now provides the ability to “install” the remote application’s link to the desktop. This process effectively wraps the Remote-App’s RDP file into a Windows Installer package–an MSI file–that is later installed to desktops in the environment. At the same time, the installed MSI can modify the file extension associations on the desktop to reroute a double-clicked file to its associated RemoteApp on the terminal server. Figure 3 shows how the file extension associations have been modified on a client system after a Word RemoteApp is installed. Now, double-clicking any of the common Word file extensions will launch Word via the Remote Desktop Connection.

image056

 

Figure 3 File extension associations that have been altered to launch the Remote Desktop Connection To create a Windows Installer package out of an existing RemoteApp, first navigate to the TS RemoteApp Manager. Right-click the RemoteApp of interest and select Create Windows Installer Package. By default, all created Windows Installer packages are stored in the location C:\Program Files\Packaged Programs, but this location can be changed from within the RemoteApp Wizard. Also configurable within the wizard are the name and port for the server that will host the RemoteApp, as well as server authentication, certificate settings, and TS Gateway settings.

Settings that relate to the application’s location after installation to a candidate desktop are shown in Figure 4.

 

As you can see, it is possible to create a shortcut on the desktop as well as to a location within the Start menu folder. The most important checkbox on this screen is at the very bottom. It’s the checkbox for Take over client settings, and it re-associates any file extension associations for the RemoteApp from the local desktop to the terminal server.

 

This checkbox must be selected if you want users to be able to double-click documents to launch their TS-hosted application. Click Next and Finish to complete the wizard. Please Note: -Since Windows2008R2 Terminal Services (TS) is now rebranded to Remote Desktop Services (RDS)-

Source: http://technet.microsoft.com/en-us/query/dd314392

 

 

QUESTION 105

You have a server that runs Windows Server 2008 R2. The server has Remote Desktop Web Access (RD Web Access) installed.

 

Several line-of-business applications are available on the server by using RD Web Access.

 

You install a new application on the server.

 

You need to make the application available through RD Web Access.

 

What should you do?

 

A.

From the command prompt, run the mstsc.exe command and specify the /v parameter.

B.

From the RD Web Access Web site, specify the data source for RD Web Access.

C.

From RemoteApp Manager, add the application to the RemoteApp Programs list.

D.

From the Local Users and Groups snap-in, add the users to the TS Web Access Computers group.

 

Correct Answer: C

Explanation:

Once you’ve installed a RemoteApp, enabling it for TS Web Access is done by right- clicking the configured RemoteApp in the TS RemoteApp Manager and selecting Show in TS Web Access.

Please Note: -Since Windows2008R2 Terminal Services (TS) is now rebranded to Remote Desktop Services (RDS)-

Source: http://technet.microsoft.com/en-us/query/dd314392

 

 

QUESTION 106

You have a server that runs the Remote Desktop Gateway (RD Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices. You create a security group named Remote1 for the users who need to connect to computers in their offices.

 

You need to enable the users to connect to the RD Gateway.

 

What should you do?

 

A.

Add the Remote1 security group to the local remote desktop users group on the RD Gateway server.

B.

Create a connection authorization policy. Add the Remote1 security group and enable Device redirection.

C.

Create a resource authorization policy. Add the Remote1 security group and enable Users to connect to any resource.

D.

Create a Group Policy object and enable the Set RD Gateway authentication method properties to Ask for credentials, use Basic protocol. Apply the policy to the RD Gateway server.

 

Correct Answer: B

Explanation:

Once you’ve installed a RemoteApp, enabling it for TS Web Access is done by right- clicking the configured RemoteApp in the TS RemoteApp Manager and selecting Show in TS Web Access. Please Note: -Since Windows2008R2 Terminal Services (TS) is now rebranded to Remote Desktop Services (RDS)-

Source: http://technet.microsoft.com/en-us/query/dd314392

 

 

QUESTION 107

Your network contains a server that has Microsoft SharePoint Foundation 2010 installed.

 

You need to ensure that a user named User1 can use Windows PowerShell to back up SharePoint site collections.

 

Which two actions should you perform? (Each correct answer presents part of the solution.

Choose two.)

 

A.

Run the Add-SPShellAdmin cmdlet.

B.

Run the Start-SPAssignment cmdlet.

C.

Add User1 to the Farm Administrators group.

D.

Add User1 to the local Backup Operators group.

 

Correct Answer: AC

Explanation:

Group memberships required to run backup and restore operations in Central Administration

You must ensure that all user accounts that will be backing up or restoring your farm and farm components by using Central Administration have the group memberships that are described in the following table.

 

Required group memberships

Setting permissions for running backup and restore operations by using Windows PowerShell

You must ensure that all user accounts that will be backing up or restoring your farm and farm components by using Windows PowerShell are added to the SharePoint_Shell_Access role for a specified database and have the permissions described in the table later in this section.

You can run the Add-SPShellAdmin cmdlet to add a user account to this role. You must run the command for each user account. Moreover, you must run the command for all databases to which you want to grant access.

 

Add-SPShellAdmin -Username <User account> -Database <Database ID>

 

Source: http://technet.microsoft.com/en-us/library/ee748626.aspx

 

 

QUESTION 108

Your network contains a server that runs Windows Server 2008 R2. The server has Microsoft SharePoint Foundation 2010 installed.

 

You create a new Web application named WebApp1. Webapp1 is configured to use a service account named Service1.

You need to ensure that the password for Service1 is automatically changed every 30 days.

 

What should you modify from Central Administration?

 

A.

the Authentication Providers

B.

the Managed Accounts settings

C.

the Password Management Settings

D.

the Service Account settings

 

Correct Answer: B

 

 

 

 

QUESTION 109

Your network contains a server that runs Windows Server 2008 R2. The server has Microsoft SharePoint Foundation 2010 installed.

 

You create a new Web application named WebApp1.

 

You need to configure WebApp1 to meet the following requirements:

 

What should you do first?

 

A.

Extend WebApp1.

B.

Modify the User Policy.

C.

Modify the Permissions Policy.

D.

Configure the Alternate Access Mappings.

 

Correct Answer: A

Explanation:

Extend a Web application

If you want to expose the same content in a Web application to different types of users by using additional URLs or authentication methods, you can extend an existing Web application into a new zone. When you extend the Web application into a new zone, you create a separate Internet Information Services (IIS) Web site to serve the same content, but with a unique URL and authentication type. An extended Web application can use up to five network zones (Default, Intranet, Internet, Custom, and Extranet). For example, if you want to extend a Web application so that customers can access content from the Internet, you select the Internet zone and choose to allow anonymous access and grant anonymous users readonly permissions. Customers can then access the same Web application as internal users, but through different URLs and authentication settings. For more information, see Configure anonymous access for a claims-based Web application (SharePoint Foundation 2010), and Plan authentication methods (SharePoint Foundation 2010).

Source: http://technet.microsoft.com/en-us/library/cc288162.aspx

 

 

QUESTION 110

Your network contains a server that has Microsoft SharePoint Foundation 2010 installed.

You create a new SharePoint site named Site1. You have a group named Group1.

 

You need to grant Group1 access to Site1. Group1 must have the following permissions:

 

The solution must minimize the number of permissions assigned to Group1.

 

Which permission level should you assign to Group1?

 

A.

Contribute

B.

Design

C.

Full Control

D.

Read

 

Correct Answer: B

Explanation:

Section: SharePoint

 

Default permission levels

Permission levels are collections of permissions that allow users to perform a set of related tasks. SharePoint Foundation 2010 includes five permission levels by default. You can customize the permissions available in these permission levels (except for the Limited Access and Full Control permission levels), or you can create customized permission levels that contain only the permissions you need. The following table lists the default permission levels for team sites in SharePoint

 

image058

 

Source: http://technet.microsoft.com/en-us/library/cc288074.aspx

 

Instant Access to Download Latest Complete Collection of Microsoft 70-643 Real Exam

Try Microsoft 70-643 Free Demo