Ensurepass

QUESTION 331

Your network contains an Active Directory domain named adatum.com. the domain contains a server named Server5 that has the Remote Desktop Services (RDS) server role installed and all of the RDS role services installed.

 

You have two support Administrators named Admin1 and Admin2,

 

Admin1 and Admin2 connect to Server5 by using Remote Desktop Connections, to run network managementtools

 

You need to identify which processes currently run in Admin1’s remote Desktop session.

 

Which tool should you use?

 

A.

Regedit

B.

Remote Desktop Gateway Manager

C.

Dism

D.

Rdpsign

E.

Netsh

F.

Remote Desktop Services Manager

G.

Windows System Resource Manager (WSRM)

H.

Rdpinit

I.

Mstsc

J.

Remote Desktop Connection Manager

K.

Remote Desktop Session Host Configuration

 

Correct Answer: J

Explanation:

Remote Desktop Services Manager

You can use Remote Desktop Services Manager to view information about and monitor users, sessions, and processes on RD Session Host servers. You can also perform certain administrative tasks; for example, you can disconnect or log off users from their Remote Desktop Services sessions.

http://technet.microsoft.com/en-us/library/cc770412.aspx

 

 

 

QUESTION 332

You have a Remote Desktop Session Host (RD Session Host) server named SRV4.

 

You Open Remote Desktop Services Manager as shown in the exhibit (Click the Exhibit

button.)

 

You need to take remote control of the session of User1.

 

What should you do first?

 

A.

From Remote Desktop Connection, connect to Server4.

B.

From local Users and Groups, add user1 to the Remote Desktop Users group.

C.

From Remote Desktop Services Manager, disconnect the session of User1.

D.

From Local Users and Groups, add the built-in Administrator account to the Remote Desktop Users group.

 

Correct Answer: A

 

 

QUESTION 333

Your network contains a server named Web1 that has Microsoft SharePoint Foundation 2010 installed.

 

You open Configure the incoming email settings as shown in the exhibit. (Click the Exhibit button.).

 

clip_image002

 

You need to configure the incoming email settings to use automatic mode.

What should you do first?

 

A.

Configure the outgoing email settings.

B.

Install the SMTP Server feature.

C.

Activate the email Integration with Content Organizer feature.

D.

Install the Message Queuing feature.

 

Correct Answer: B

Explanation:

clip_image004

 

 

QUESTION 334

Your network contains an Active Directory domain named fabrikam.com

 

The domain contains a Web server named Web1 that runs Windows Server 2008 R2.

 

You install the FTP Server role service on Web1.

 

You need to manage the FTP server settings on Web1.

Which tool should you use?

 

A.

Services

B.

Internet Information Services (IIS) Manager

C.

Internet Information Services (IIS) 6.0 Manager

D.

Ftp

 

Correct Answer: C

 

 

QUESTION 335

Your network contains a server named Server1 that runs Windows Server 2008 R2.

 

You add a new 1TB hard disk to Server1.

 

You need to minimize the risk of file system corruption or loss on the new volume in the event of a system failure.

 

What should you do?

 

A.

Initialize the disk as a GUID partition Table (GPT) disk.

B.

Initialize the disk as a Master Boot Record (MBR) disk.

C.

Disable write caching for the hard disk.

D.

Disable direct memory access (DMA) for the hard disk controller.

 

Correct Answer: C

 

 

QUESTION 336

Your network contains a server named Server1 that has the Streaming Media Services server role installed.

 

Server1 streams content from two folders as shown in the exhibit. (Click the Exhibit button.)

 

clip_image006

 

You discover that you can stream content from the public Content folder, but you cannot stream content from the Secure Content folder.

 

You need to ensure that you can stream content from both folders.

 

What should you configure?

 

A.

the Windows Audio Endpoint Builder service

B.

the WMS negotiate Authentication plug-in at the publishing point level

C.

the WMS NTFS ACL Authorization plug-in at the publishing point level

D.

the Windows Media Services service

E.

the WMS Negotiate Authentication plug-in at the server level

F.

the WMS NTFS ACL Authorization plug-in at the server level

 

Correct Answer: D

Explanation:

Green color means that this folder was encrypted by EFS.

Sourcing from an encrypted directory

Security concerns may require that you maintain some or all of your content in an encrypted directory. The encryption process encodes the data in a file so that it is unreadable to a computer or account that does not have the appropriate file encryption key. In the Windows operating system, the file encryption key is assigned to an account. Anyone who logs on using that account is then able to decrypt and use the content. Windows Media Services can decrypt and stream encrypted content if it is logged on to the proper account. By default, Windows Media Services logs on to the Network Service account. To access the encrypted content, you must set Windows Media Services to log on to the same account that encrypted the content. You can change the account Windows Media Services uses to log on to the computer by using Microsoft Management Console. For more information about encryption, accounts, and user privileges, see Windows Help and Support.

 

http://technet.microsoft.com/en-us/library/cc754882.aspx

 

 

QUESTION 337

Your network contains an Active Directory domain named adatum.com.

 

The domain contains a server named Server5 that runs Windows Server 2008 R2 Service Pack 1 (SP1).

 

You install the Remote Desktop Services (RDS) server role and all of the RDS role services on Server5.

 

You create universal security group named Support.yYou add 10 user accounts to the Support group.

 

You need to ensure that Remote Desktop sessions established by members of the Support group receive the highest possible CPU allocation on Server5.

 

Which tool should you use?

 

A.

Regedit

B.

Remote Desktop Gateway Manager

C.

Dism

D.

Rdpsign

E.

Netsh

F.

Remote Desktop Services Manager

G.

Windows System Resource Manager (WSRM)

H.

Rdpinit

I.

Mstsc

J.

Remote Desktop Connection Manager

K.

Remote Desktop Session Host Configuration

 

Correct Answer: G

 

 

QUESTION 338

Your network contains an Active Directory domain named adatum.com.

 

The domain contains a server named Server5 that has the Remote Desktop Services (RDS) server role installed and all of the RDS role services installed.

 

Server5 is configured as a file server and a Remote Desktop Services client access licences (RDS CALS) on Server5.

 

Which tool should you use?

 

A.

Regedit

B.

Remote Desktop Gateway Manager

C.

Dism

D.

Rdpsign

E.

Netsh

F.

Remote Desktop Services Manager

G.

Windows System Resource Manager (WSRM)

H.

Rdpinit

I.

Mstsc

J.

Remote Desktop Connection Manager

K.

Remote Desktop Session Host Configuration

 

Correct Answer: F

 

 

QUESTION 339

Your network contains an Active Directory domain named adatum.com.

 

The domain contains a server named Server5 that has the Remote Desktop Services (RDS) server role installed and all of the RDS role services installed.

 

Server5 is configured as a file server and a Remote Desktop services server.

 

You configure a remote Desktop Connection named server5.rdp.

 

You plan to deploy server5.rdp to all users in the domain.

You need to ensure that server5.rdp cannot be used by any user if the content of the file has been modified

 

Which tool should you use?

 

A.

Regedit

B.

Remote Desktop Gateway Manager

C.

Dism

D.

Rdpsign

E.

Netsh

F.

Remote Desktop Services Manager

G.

Windows System Resource Manager (WSRM)

H.

Rdpinit

I.

Mstsc

J.

Remote Desktop Connection Manager

K.

Remote Desktop Session Host Configuration

 

Correct Answer: D

 

 

 

QUESTION 340

You manage a Web server named Server1 that runs Windows 2008 R2 Server1 has the SMTP Server feature installed.

 

You need to verify whether you can connect to Server1 over port 25

 

Which tool should you use?

 

A.

Ftp

B.

Services

C.

Security Configuration Wizard (SCW)

D.

Internet Information Services (IIS) 6.0 Manager

E.

Internet Information Services (IIS) Manager

F.

Iisreset

G.

Performance Monitor

H.

Windows Firewall

I.

Telnet

J.

Local Security Policy

K.

System Configuration

L.

Component Services

 

Correct Answer: I

 

Instant Access to Download Latest Complete Collection of Microsoft 70-643 Real Exam

Try Microsoft 70-643 Free Demo