Ensurepass.com : Ensure you pass the IT Exams
2018 July Microsoft Official New Released 70-642
100% Free Download! 100% Pass Guaranteed!

TS: Windows Server 2008 Network Infrastructure, Configuring

Question No: 291 – (Topic 3)

Your network contains a domain-based Distributed File System (DFS) namespace named

\\contoso.com\dfs. \\contoso.com\\dfs is configured to use Windows 2000 Server mode.

The domain contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 is configured as a namespace server for \\contoso.com\dfs.

You need to migrate \\contoso.com\dfs to Windows Server 2008 mode. You install the Distributed File System role service on Server2.

What should you do next?

  1. Configure Server2 as a namespace server for \\contoso.com\dfs.

  2. At the command prompt, run dfsutil root export \\contoso.com\dfs c:\dfs.xml.

  3. At the command prompt, run dfsutil root adddom \\contoso.com\dfs v2.

  4. Create a new shared folder named DFS on Server2.

Answer: B Explanation:

At a command prompt

Dfsutil root export \\domain\namespace c:\filename.xml http://technet.microsoft.com/en-us/library/cc753875.aspx

Question No: 292 – (Topic 3)

Your network contains a server named Server1 that runs Windows Server 2008 R2. You need to ensure that you can log performance counter data from Server1 to a SQL database.

Which tool should you use?

  1. Component Services

  2. Data Sources (ODBC)

  3. Share and Storage Management

  4. Storage Explorer

Answer: B

Question No: 293 – (Topic 3)

You are planning the network for a branch office. The branch office will contain 100 IPv4 hosts.

You need to recommend a subnet mask for the branch office. The subnet mask must minimize the number of unused IP addresses.

Which subnet mask should you use?

A. 255.255.255.0

B. 255.255.255.128

C. 255.255.0.0

D. 255.255.128.0

Answer: B Explanation:

http://www.pantz.org/software/tcpip/subnetchart.html

Question No: 294 – (Topic 3)

Your network contains two Active Directory sites named Site1 and Site2. Site1 contains a domain controller named DC1 and a file server named Server1. Site2 contains a file server named Server2.

You have a Distributed File System (DFS) namespace named \\contoso.com\root\ that has a namespace server named DC1.

On Server1 and Server2, you create a shared folder named Marketing.

You need to configure DFS to meet the following requirements:

->Ensure that clients connect to the Marketing share in their local site.

->Ensure that the files in Marketing are replicated between Server1 and Server2.

->Ensure that clients can connect to Marketing by using the URL contoso.com\root\marketing.

What should you do? (Each correct answer presents part of the solution. Choose three)

  1. Install the DFS Replication role service on Server1 and Server2

  2. Configure the properties of the contoso.com namespace.

  3. Install the DFS Replication role service on DC1.

  4. Add a folder to the namespace and specify the folder targets.

  5. Run the New Replication Group wizard.

Answer: A,D,E

Question No: 295 – (Topic 3)

You network contains an Active Directory forest named Contoso.com. The forest contains two domains named Contoso.com and child.contoso.com.

The Contoso.com domain contains a server named Server1. Server1 has the Network Policy and Access Services (NPAS) server role instead.

You need to ensure that Server1 can read the dial-in properties of user accounts in the child.contoso.com domain.

Which tool should you use?

  1. Netcfg

  2. Active Directory Users and Computers

  3. Useraccountcontrolsettings

  4. Authorization manager

Answer: B

Question No: 296 – (Topic 3)

Your network contains a server named Server1 that runs a Server Core installation of Windows Server 2008 R2. The network contains a client computer named Computer1 that runs Windows 7.

You need to ensure that you can collect events from Server1 on Computer1. What should you run on Server1?

  1. wecutil cs

  2. eventcreate /so

  3. winrm quickconfig

  4. net config server

Answer: C Explanation:

http://technet.microsoft.com/en-us/library/cc748890(v=WS.10).aspx

Question No: 297 – (Topic 3)

Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network.

Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).

Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.

You need to ensure that client computers meet the company policy requirement. What should you do?

  1. Enable automatic updates on each client.

  2. Enable the Security Center on each client.

  3. Quarantine clients that do not have all available security updates installed.

  4. Disconnect the connection until the required updates are installed.

Answer: C

Question No: 298 – (Topic 3)

Your network contains an Active Directory domain. The domain contains a DNS server that runs Windows Server 2008 R2.

You plan to deploy DirectAccess on the network.

You need to ensure that the internal DNS infrastructure supports name resolution for DirectAccess.

What should you do?

  1. Modify the Dynamic updates setting.

  2. Add a trust anchor.

  3. Modify the global query block list.

  4. Create a GlobalNames zone.

    Answer: C Explanation:

    To remove ISATAP from the DNS global query block list

    1. Click Start, click All Programs, click Accessories, rightclick Command Prompt, and then click Run as administrator.

    2. In the Command Prompt window, type dnscmd /config / globalqueryblocklist wpad, and then press ENTER.

    3. Close the Command Prompt window.

OR To remove ISATAP from the DNS global query block list on a DNS server 1- Click Start, type regedit.exe, and then press ENTER.

  1. In the console tree, open Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS

    \Parameters.

  2. In the contents pane, double-click the GlobalQueryBlockList value.

  3. In the Edit Multi-String dialog box, remove the name ISATAP from the list, and then click OK.

  4. Start a command prompt as an administrator.

  5. In the Command Prompt window, run the following commands: net stop dns

net start dns

http://technet.microsoft.com/en-us/library/ee649158(v=ws.10).aspx

Question No: 299 – (Topic 3)

Your network contains an Active Directory domain. Your company provides VPN access for multiple organizations.

You need to configure Network Policy Server (NPS) to forward authentication requests to

the appropriate organization.

What should you configure on the NPS server?

  1. the RADIUS Accounting accounting provider

  2. the Windows Accounting accounting provider

  3. remediation server groups

  4. health policies

  5. connection request policies

  6. the RADIUS Authentication authentication provider

  7. the Windows Authentication authentication provider

  8. system health validators (SHVs)

  9. Group Policy preferences

  10. IKEv2 client connections

Answer: E Explanation:

Connection request policies are sets of conditions and settings that allow network administrators to designate which Remote Authentication Dial-In User Service (RADIUS) servers perform the authentication and authorization of connection requests that the server running Network Policy Server (NPS) receives from RADIUS clients. Connection request policies can be configured to designate which RADIUS servers are used for RADIUS accounting.

Ref: http://technet.microsoft.com/en-us/library/cc753603.aspx

Question No: 300 – (Topic 3)

Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.

You implement Network Access Protection (NAP) for the domain.

You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?

  1. Challenge Handshake Authentication Protocol (CHAP)

  2. Extensible Authentication Protocol (EAP)

  3. Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)

  4. Password Authentication Protocol (PAP)

Answer: B Explanation:

With EAP, the specific authentication mechanism is not chosen during the link establishment phase of the PPP connection; instead, the PPP peers negotiate to perform EAP during the connection authentication phase. When the connection authentication phase is reached, the peers negotiate the use of a specific EAP authentication scheme known as an EAP method.

After the EAP method is agreed upon, EAP allows for an open-ended exchange of messages between the access client and the authenticating server that can vary based on the parameters of the connection. The conversation consists of requests and responses for authentication information. The EAP method determines the length and details of the authentication conversation.

http://technet.microsoft.com/en-us/library/bb457039.aspx

100% Ensurepass Free Download!
Download Free Demo:70-642 Demo PDF
100% Ensurepass Free Guaranteed!
70-642 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.