Ensurepass

QUESTION 261

Your network contains a server named Server1 that runs Windows Server 2008 R2. You have a Microsoft Application Virtualization (App-V) application named App1.

 

You need to publish App1 as a RemoteApp program.

Which role service should you install on Server1?

 

A.

Remote Desktop Gateway (RD Gateway)

B.

Remote Desktop Session Host (RD Session Host)

C.

Remote Desktop Virtualization Host (RD Virtualization Host)

D.

Remote Desktop Web Access (RD Web Access)

 

Correct Answer: B

 

QUESTION 262

Your network contains an Active Directory domain. You deploy a server named Server1 that has the Remote Desktop Connection Broker (RD Connection Broker) role service installed. You need to ensure that all servers that have the Remote Desktop Session Host (RD Session Host) role service installed are automatically configured to use Server1 as an RD Connection Broker. What should you do?

 

A.

Register a service principal name (SPN) for Server1.

B.

Register a service location (SRV) record for Server1.

C.

Use a Group Policy to configure the Restricted Groups settings.

D.

Use a Group Policy to configure the Remote Desktop Services settings.

 

Correct Answer: D

Explanation:

RD Connection Broker

Policy settings in this node control configuration of a Remote Desktop Session Host server that is a member of a load-balanced Remote Desktop Session Host server farm. The full path of this node in the Group Policy Management Console is Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\RD Connection Broker.

 

Available policy settings Join RD Connection Broker This policy setting allows you to specify whether the RD Session Host server should join a farm in RD Connection Broker. RD

Connection Broker tracks user sessions and allows a user to reconnect to their existing session in a load-balanced RD Session Host server farm. To participate in RD Connection Broker, the Remote Desktop Session Host role service must be installed on the server. If the policy setting is enabled, the RD Session Host server joins the farm that is specified in the Configure RD Connection Broker Farm Name setting. The farm exists on the RD

 

Connection Broker server that is specified in the Configure RD Connection Broker Server name policy setting.

If you disable this policy setting, the server does not join a farm in RD Connection Broker, and user session tracking is not performed. If the setting is disabled, you cannot use either the Remote Desktop Session Host Configuration tool or the Terminal

 

Services WMI provider to join the server to RD Connection Broker.

 

If the policy setting is not configured, the setting is not specified at the Group Policy level.

In this case, you can configure the server

to join RD Connection Broker by using the Remote Desktop Session Host Configuration tool or the Terminal Services WMI provider.

If you enable this setting, you must also enable the “Configure RD Connection Broker Farm Name” and Configure RD Connection Broker Server name policy settings, or configure these settings by using either the Remote Desktop Session Host Configuration tool or the Terminal Services WMI provider.

Configure RD Connection Broker farm name

This policy setting allows you to specify the name of a farm to join in RD Connection Broker. RD Connection Broker uses the farm name to determine which RD Session Host servers are in the same RD Session Host server farm. Therefore, you must use the same farm name for all RD Session Host servers in the same load-balanced farm. The farm name does not have to correspond to a name in Active Directory Domain Services. If you specify a new farm name, a new farm is created in RD Connection Broker. If you specify an existing farm name, the server joins that farm in RD Connection Broker. If you enable this policy setting, you must specify the name of a farm in RD Connection Broker.

If you disable or do not configure this policy setting, the farm name is not specified by Group Policy. In this case, you can adjust the farm name by using the Remote Desktop Session Host Configuration tool or the Terminal Services WMI provider. This setting is not effective unless both the Join RD Connection Broker and the Configure RD Connection Broker server name settings are enabled and configured by using Group Policy, the Remote Desktop Session Host Configuration tool, or the Terminal Services WMI provider.

Configure RD Connection Broker server name

 

This policy setting allows you to specify the RD Connection Broker server that the RD Session Host server uses to track and redirect user sessions for a load-balanced RD Session Host server farm. The specified server must be running the Remote Desktop Connection Broker service. All RD Session Host servers in a load-balanced farm should use the same RD Connection Broker server.

 

If you enable this policy setting, you must specify the RD Connection Broker server, using either its host name, IP address, or fully qualified domain name. If you specify a name or IP address for the RD Connection Broker server that is not valid, an error message is logged in Event Viewer on the RD Session Host server.

If you disable or do not configure this policy setting, you can adjust the RD Connection Broker server name or IP address by usin the Remote Desktop Session Host Configuration tool or the Terminal Services WMI provider.

This policy setting is not effective unless the Join RD Connection Broker policy setting is enabled or the RD Session Host server is configured to join RD Connection Broker by using the Remote Desktop Session Host Configuration tool or the Terminal Services WMI provider.

To be an active member of an RD Connection Broker-enabled RD Session Host server farm, the computer account for each RD Session Host server in the farm must be a member of the Session Directory Computers local group on the RD Connection Broker server.

 

Use RD Connection Broker load balancing

This policy setting allows you to specify whether to use the RD Connection Broker load balancing feature to balance the load between servers in an RD Session Host server farm. If you enable this policy setting, RD Connection Broker redirects users who do not have an existing session to the RD Session Host server in the farm with the fewest sessions. Redirection behavior for users with existing sessions is not affected. If the server is configured to use RD Connection Broker, users who have an existing session are redirected to the RD Session Host server where their session exists. If you disable this policy setting, users who do not have an existing session log on to the first RD Session Host server to which they connect. If you do not configure this policy setting, you can configure the RD Session Host server to participate in RD Connection Broker load balancing by using the Remote Desktop Session Host Configuration tool or the Terminal Services WMI provider. If you enable this policy setting, you must also enable the Join RD Connection Broker, the Configure RD Connection Broker farm name, and the Configure RD Connection Broker server name policy settings.

 

Source: http://technet.microsoft.com/en-us/library/ee791821.aspx

 

 

QUESTION 263

You have a server named Server1 that runs Windows Server 2008 R2. Server1 has the Key Management Service (KMS) installed. You need to identify how many computers were activated by Server1. What should you run?

 

A.

cliconfg.exe

B.

mrinfo.exe Server1

C.

slmgr.vbs / dli

D.

slui.exe

 

Correct Answer: C

Explanation:

slmgr.vbs /dli – Retrieves the current KMS activation count from the KMS host.

 

image162

 

Source: http://technet.microsoft.com/en-us/library/ff793407.aspx

 

 

QUESTION 264

Your network contains 10 servers that have the Remote Desktop Session Host (RD Session Host) role service installed.

 

You install the Remote Desktop Gateway (RD Gateway) role service on a new server.

 

You need to ensure that users can access the RD Session Host servers by using the RD Gateway.

 

Which two actions should you perform? (Each correct answer presents part of the solution.

Choose two.)

 

A.

Create a Remote Desktop resource authorization policy (RD RAP).

B.

Create a Remote Desktop connection authorization policy (RD CAP).

C.

Install the RD Session Broker role service.

D.

Install the Remote Desktop Web Access (RD Web Access) role service.

 

Correct Answer: AB

 

 

 

 

 

QUESTION 265

Your company has an Active Directory domain. The company runs Remote Desktop Services. You configure the main office printer as the default printer on the Remote Desktop Session Host Server.

 

The company policy states that all remote client computers must meet the following requirements:

 

You need to create a Group Policy object (GPO) by using the Remote Desktop Session Host Printer Redirection template to meet the company policy.

What should you do?

 

A.

Set the Use Remote Desktop Easy Print printer driver first option to Disabled. Apply the GPO to the Remote Desktop Session Host Server.

B.

Set the Use Remote Desktop Easy Print printer driver first option to Disabled. Apply the GPO to all the client computers.

C.

Set the Do not set default client printer to be default printer in a session option to Enabled. Apply the GPO to the Remote Desktop Session Host Server.

D.

Set the Do not set default client printer to be default printer in a session option to Enabled. Apply the GPO to all the client computers.

 

Correct Answer: C

Explanation:

Do not set default client printer to be default printer in a session This policy setting allows you to specify whether the client default printer is automatically set as the default printer in a Terminal Services session. By default, Terminal Services automatically designates the client default printer as the default printer in a Terminal Services session. You can use this policy setting to override this behavior.

If you enable this policy setting, the default printer is the printer specified on the remote computer.

If you disable this policy setting, the terminal server automatically maps the client default printer and sets it as the default printer upon connection. If you do not configure this policy setting, the default printer is not specified at the Group Policy level. However, an administrator can configure the default printer for client sessions by using the Terminal Services Configuration tool. Source: http://technet.microsoft.com/en-us/library/cc731963(WS.10).aspx

 

 

QUESTION 266

Your network contains two servers that have the Remote Desktop Web Access (RD Web Access) role service installed. Each server hosts three different RemoteApp programs.

 

You deploy a new server that has the Remote Desktop Connection Broker (RD Connection Broker) role service installed.

 

Users report that when they connect to one of the RD Web Access servers, they see only three applications.

You need to ensure that the users see all six RemoteApp programs when they connect to an RD Web Access server.

 

Which two actions should you perform? (Each correct answer present part of the solution.

Choose two.)

 

A.

From RemoteApp Manager, configure the RD Gateway Settings

B.

From RemoteApp Manager, configure the Digital Signature Settings.

C.

From Remote Desktop Connection Manager, add RemoteApp sources.

D.

From Remote Desktop Connection Manager, add RD Web Access servers.

 

Correct Answer: CD

 

 

QUESTION 267

Your network contains a server that has the Remote Desktop Session Host (RD Session Host) role service installed.

 

You need to ensure that the Remote Desktop sessions of administrators are more responsive than other sessions when the server is under a heavy load.

 

What should you do?

 

A.

From the RDP-Tcp properties, modify the Client Settings.

B.

From the RDP-Tcp properties, modify the Sessions settings.

C.

Install and configure the RD Session Broker role service.

D.

Install and configure Windows System Resource Manager (WSRM).

 

Correct Answer: D

 

QUESTION 268

Your network contains two servers that run Windows Server 2008 R2. The servers are located on different IP subnets. You plan to configure the servers in a two-node failover cluster. You need to select the quorum model for the cluster.

 

The solution must ensure that users can access the cluster resources if a single node fails.

 

Which quorum model should you select?

 

A.

No Majority: Disk Only

B.

Node and Disk Majority

C.

Node and File Share Majority

D.

Node Majority

 

Correct Answer: C

Explanation:

Quorum configuration choices

You can choose from among four possible quorum configurations:

Node Majority (recommended for clusters with an odd number of nodes) Can sustain failures of half the nodes (rounding up) minus one. For example, a seven node cluster can sustain three node failures.

Node and Disk Majority (recommended for clusters with an even number of nodes) Can sustain failures of half the nodes (rounding up) if the disk witness remains online. For example, a six node cluster in which the disk witness is online could sustain three node failures. Can sustain failures of half the nodes (rounding up) minus one if the disk witness goes offline or fails. For example, a six node cluster with a failed disk witness could sustain two (3-1=2) node failures.

Node and File Share Majority (for clusters with special configurations) Works in a similar way to Node and Disk Majority, but instead of a disk witness, this cluster uses a file share witness.

Note that if you use Node and File Share Majority, at least one of the available cluster nodes must contain a current copy of the cluster configuration before you can start the cluster. Otherwise, you must force the starting of the cluster through a particular node. For more information, see “Additional considerations” in Start or Stop the Cluster Service on a Cluster Node.

No Majority: Disk Only (not recommended) Can sustain failures of all nodes except one (if the disk is online). However, this configuration is not recommended because the disk might be a single point of failure.

 

Illustrations of quorum configurations

 

The following illustrations show how three of the quorum configurations work. A fourth configuration is described in words, because it is similar to the Node and Disk Majority configuration illustration.

 

Note:

In the illustrations, for all configurations other than Disk Only, notice whether a majority of the relevant elements are in communication (regardless of the number of elements). When they are, the cluster continues to function.

When they are not, the cluster stops functioning.

 

image163

 

As shown in the preceding illustration, in a cluster with the Node Majority configuration, only nodes are counted when calculating a majority.

 

image164

 

As shown in the preceding illustration, in a cluster with the Node and Disk Majority configuration, the nodes and the disk witness are counted when calculating a majority.

 

Node and File Share Majority Quorum Configuration

In a cluster with the Node and File Share Majority configuration, the nodes and the file share witness are counted when calculating a majority. This is similar to the Node and Disk Majority quorum configuration shown in the previous illustration, except that the witness is a file share that all nodes in the cluster can access instead of a disk in cluster storage.

 

image165

 

In a cluster with the Disk Only configuration, the number of nodes does not affect how quorum is achieved. The disk is the quorum. However, if communication with the disk is lost, the cluster becomes unavailable.

 

Source: http://technet.microsoft.com/en-us/library/cc731739.aspx

 

 

QUESTION 269

Your network contains a two-node Hyper-V cluster that hosts 10 virtual machines (VMs). You discover that when a failover occurs, all of the VMs fail over simultaneously.

 

You need to modify the cluster so that you can fail over each VM individually.

 

What should you do first?

 

A.

Add a third node to the cluster.

B.

Create a Clustered Shared Volume.

C.

Add a new disk to the failover cluster.

D.

Modify the properties of the cluster failover.

 

Correct Answer: B

 

QUESTION 270

Your network contains a server that runs Windows Server 2008 R2 Standard. The server is configured to native boot from a virtual hard disk (VHD). All hard disks on the server are configured as basic disks that use an MBR. A new corporate security policy states that all of the hard disks on the server must use Windows BitLocker Drive Encryption (BitLocker). You need to ensure that the server meets the corporate security policy. What should you do first?

 

A.

Configure the disks to use a GPT.

B.

Convert the disks to dynamic disks.

C.

Upgrade the server to Windows Server 2008 R2 Enterprise.

D.

Back up the server and restore the server to a physical volume.

 

Correct Answer: D

Explanation:

Applies To: Windows 7, Windows Server 2008 R2

 

Configuring native VHD boot if the host volume is protected by BitLocker. You can save a VHD file on a file system that is protected by BitLockerTM, but you cannot use the VHD for native boot or enable Bitlocker on the volume(s) that are contained inside a VHD.

 

Source: http://technet.microsoft.com/en-us/library/dd440865(WS.10).aspx

 

Instant Access to Download Latest Complete Collection of Microsoft 70-643 Real Exam

Try Microsoft 70-643 Free Demo