[2016-NEW-MAY ]New Braindump2go Microsoft 70-646 Exam PDF Updated[NQ1-NQ10]
May-2016-Microsoft-Official-News: 70-646 Exam Questions New Released Today in Braindump2go.com Online IT Certifications Study Website! NEW QUESTIONS 1 - NEW QUESTIONS 10 QUESTION 1 A company has servers that run a Server Core installation of Windows Server 2008. You are designing the migration of the servers to Windows Server 2008 R2. After the migration, you will install the Remote Desktop Services server role and the Print and Document Services server role on the servers. You need to ensure that shared resources on the servers are available after the migration, and minimize administrative effort. What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.) A. Deploy new servers with a Server Core installation of Windows Server 2008 R2. Migrate the shared resources to the new servers. B. Upgrade the existing servers to a Server Core installation of Windows Server 2008 R2, and then upgrade the servers to a full installation of Windows Server 2008 R2. C. Move the shared resources off of the existing servers. Perform a clean installation of Windows Server 2008 R2 on the servers. Move the shared resources back onto the servers. D. Deploy new servers with Windows Server 2008 R2 installed. Migrate the shared resources to the new servers. Answer: D Explanation: The key here is minimize effort & remote desktop services. Server core wouldn't allow remote desktop services as it has no GUI so that would rule out answer A you also cant upgrade from core to full see http://www.windowsitpro.com/article/tips/can-iupgrade-fromserver-core-2008-to-the-full-windows-server-2008- or http://serverfault.com/questions/92523/upgrade-fromwindows-2008-server-core-to-full-windows-2008- server upgrade considerations for server core installations of windows server 2008 so that rules our B You can use the server core installation option only by performing a clean installation. You cannot upgrade from earlier versions of windows to server core installations of windows server 2008. You cannot upgrade from non-server core installations of windows server 2008 to server core installations of windows server 2008. You cannot convert server core installations of windows server 2008 to non-server core installations of windows server 2008. You can upgrade server core installations of windows server 2008 only to windows server core r2 when it is released. Answer C is possible but again you're asked to minimize effort so D would be 1 step less thus reducing your effort and possible down time. QUESTION 2 As part of a Windows Server 2008 R2 Active Directory deployment, you are designing a Group Policy object (GPO) hierarchy. Client computers run Windows 7 and Windows XP. All client computers are in an organizational unit (OU) named Client Computers. Additional Windows 7 and Windows XP client computers will be joined to the domain over the next six months. You have the following requirements: - Install the antivirus application on all Windows XP computers. - Do not install the antivirus application on the Windows 7 computers. - Do not make changes to the existing Active Directory logical structure. You need to design a Group Policy strategy that meets the requirements. Which GPO configuration should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.) A. Publish the antivirus application to client computers. Link the GPO to the domain. Use security filtering to prevent the Windows 7 client computers from receiving the GPO. B. Assign the antivirus application to client computers. Link the GPO to the Client Computers OU. Create a WMI Filter that queries whether the client computer's Win32_OperatingSystem caption contains "Windows 7" . Associate the WMI filter with the GPO. C. Assign the antivirus application to client computers. Link the GPO to the domain. Place all the Windows 7 computers in a security group. Use security filtering to prevent the Windows 7 client computers from receiving the GPO. D. Assign the antivirus application to client computers. Link the GPO to the Client Computers OU. Create a WMI Filter that queries whether the client computer's Win32_OperatingSystem caption contains "Windows XP" . Associate the WMI Filter with the GPO. Answer: D Explanation: http://technet.microsoft.com/en-us/library/cc947846%28v=ws.10%29.aspx & http://technet.microsoft.com/enus/library/cc947846%28v=ws.10%29.aspx#bkmk_1 Depending on which OS you're asked to install the AV app on your answer could change. There are reports that you're now being asked to install the AV on the Win7 clients. if that is the case then you would select the Windows 7 option QUESTION 3 A company has servers that run Windows Server 2008 R2. Administrators use a graphic-intensive application to remotely manage the network. You are designing a remote network administration solution. You need to ensure that authorized administrators can connect to internal servers over the Internet from computers that run Windows 7 or Windows Vista. Device redirection enforcement must be enabled for these connections. What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.) A. Deploy and configure a server with the Remote Desktop Web Access server role. Enable Forms-based authentication. Ensure that administrators use RDC 6.1 when accessing internal servers remotely. B. Deploy and configure a server with the Remote Desktop Web Access server role. Enable Forms-based authentication. Ensure that administrators use RDC 7.0 when accessing internal servers remotely, C. Deploy and configure a server with the Remote Desktop Gateway server role. Ensure that administrators use RDC 7.0 when accessing internal servers remotely. D. Deploy and configure a server with the Remote Desktop Gateway server role. Ensure that administrators use RDC 6.1 when accessing internal servers remotely. Answer: C Explanation: http://windows.microsoft.com/en-us/windows7/What-is-a-Remote-Desktop-Gateway-server A Remote Desktop Gateway (RD Gateway) server is a type of gateway that enables authorized users to connect to remote computers on a corporate network from any computer with an Internet connection. RD Gateway uses the Remote Desktop Protocol (RDP) along with the HTTPS protocol to help create a more secure, encrypted connection. http://technet.microsoft.com/en-us/library/dd560672%28v=ws.10%29.aspx Device redirection enforcement An RD Gateway server running Windows Server 2008 R2 includes the option to allow remote desktop clients to only connect to RD Session Host servers that enforce device redirection. RDC 7.0 is required for device redirection to be enforced by the RD Session Host server running Windows Server 2008 R2. Device redirection enforcement is configured on the Device Redirection tab of the RD CAP by using Remote Desktop Gateway Manager. QUESTION 4 You are designing a server infrastructure to support a new stateful application. The server infrastructure must meet the following requirements: - Use two servers, each with two NIC cards and 32 GB of RAM. - Provide access to the application in the event of the failure of a single server. - Provide the ability to scale up the application. - Minimize the attack surface of each server. - Minimize server disk space requirements. You need to design a server infrastructure that meets the requirements. What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.) A. Perform a Server Core installation of Windows Server 2008 R2 Standard Edition. Configure both servers in a failover cluster. B. Perform a Server Core installation of Windows Server 2008 R2. Configure both servers in a Windows Network Load Balancing array, C. Install Windows Server 2008 R2 on both servers. Use DNS Round Robin to balance the load between the servers. D. Install Windows Server 2008 R2 on both servers. Configure both servers in a Windows Network Load Balancing array. Answer: A Explanation: Failover clusters are designed for applications that have long-running in-memory state, or that have large, frequently updated data states. These are called stateful applications, and they include database applications and messaging applications. Typical uses for failover clusters include file servers, print servers, database servers, and messaging servers. Not B (stateful application in this scenario): Network Load Balancing is intended for applications that do not have long-running in-memory state. These are called stateless applications. A stateless application treats each client request as an independent operation, and therefore it can load-balance each request independently. Stateless applications often have read-only data or data that changes infrequently. Front-end Web servers, virtual private networks (VPNs), File Transfer Protocol (FTP) servers, and firewall and proxy servers typically use Network Load Balancing. Network Load Balancing clusters can also support other TCP- or UDP-based services and applications. Note: - Windows Server 2008 provides two clustering technologies: failover clusters and Network Load Balancing (NLB). Failover clusters primarily provide high availability; Network Load Balancing provides scalability and at the same time helps increase availability of Web-based services. - Server Core provides you with a minimal installation of Windows Server 2008 that supports installing only certain server roles. Server Core includes Network Load Balancing and Failover Clustering. Reference: Failover Cluster Overview QUESTION 5 You are planning to deploy new servers that will run Windows Server 2008 R2. Each server will have 32 GB of RAM. The servers must support installation of the following role services: - Routing and Remote Access - Remote Desktop Services Gateway You need to deploy the minimum edition of Windows Server 2008 R2 that meets the requirements. What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.) A. Windows Server 2008 R2 Standard B. Windows Server 2008 R2 Enterprise C. Windows Server 2008 R2 Web D. Windows Server 2008 R2 Datacenter Answer: A Explanation: http://www.microsoft.com/en-us/server-cloud/windows-server/2008-r2-standard.aspx R2 Standard provides these services and is the minimum edition they are available on. 32 GB RAM is also supported if its a 64 bit version http://technet.microsoft.com/enus/windowsserver/bb414778.aspx QUESTION 6 A company wants to prevent employees who access the company's Remote Desktop Session Hosts (RD Session Hosts) from introducing malware onto the corporate network. You have the following requirements: - Ensure that only client computers that have an up-to-date antivirus program installed can connect to the RD Session Hosts. - Display a notification when a client computer that does not meet the antivirus requirements attempts to connect to an RD Session Host. Provide information about how to resolve the connection problem. - Ensure that client computers can access only the RD Session Hosts. You need to recommend a Remote Desktop Services (RDS) management strategy that meets the requirements. What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.) A. Deploy a Remote Desktop Gateway in a perimeter network. Install and configure a Network Policy and Access Services server. Configure the System Health Validator. Enable the Remote Desktop Gateway Network Access Protection Enforcement Client. Configure Remote Desktop Connection Authorization Policies and Remote Desktop Resource Authorization Polices. B. Deploy the Routing and Remote Access Service in a perimeter network to support VPN connections. Install and configure a Network Policy and Access Services server. Enable the Network Access Protection VPN Enforcement Client. Configure the System Health Validator. Configure static routes on the VPN server to allow access only to the RD Session Hosts. C. Deploy a Remote Desktop Gateway in a perimeter network. Configure Remote Desktop Connection Authorization Policies and Remote Desktop Resource Authorization Polices. Configure a logon message. D. Deploy the Routing and Remote Access Service in a perimeter network to support VPN connections. Configure Connection Request Policies to specify which computers can connect to the corporate network. Configure static routes on the VPN server to allow access only to the RD Session Hosts. Answer: A Explanation: NAP with SHVs configured will ensure that the AV is installed and up to date. if they ar not you can direct them to a quarantine/remediation server to update http://www.techrepublic.com/article/solutionbase-configuring-network-access-protection-forwindows-server-2008/178022 RD RAP Remote Desktop resource authorization policies (RD RAPs) allow you to specify the internal network resources (computers) that remote users can connect to through an RD Gateway server. http://technet.microsoft.com/en-us/library/cc730630 RD CAP Remote Desktop connection authorization policies (RD CAPs) allow you to specify who can connect to an RD Gateway server http://technet.microsoft.com/en-us/library/cc731544 QUESTION 7 A network includes servers that run Windows Server 2008 R2 with the Network Policy Server (NPS) server role installed. You are planning to deploy a remote network administration solution. The remote administration solution must meet the following requirements: - Include fault tolerance. - Define the users who have remote access and the resources they can remotely access. You need to design a remote administration solution that meets the requirements. What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.) A. Deploy and configure multiple servers with the Remote Desktop Gateway server role. Create a central Remote Desktop Connection Authorization Policy (RD CAP) and a Resource Authorization Policy (RD RAP). B. Deploy and configure multiple servers with the Remote Desktop Gateway server role. Create a local Remote Desktop Connection Authorization Policy (RD CAP) and a Resource Authorization Policy (RD RAP). C. Deploy and configure one server with the Remote Desktop Web Access server role. Create a central Remote Desktop Connection Authorization Policy (RD CAP) and a Resource Authorization Policy (RD RAP). D. Deploy and configure one server with the Remote Desktop Web Access server role. Create a local Remote Desktop Connection Authorization Policy (RD CAP) and a Resource Authorization Policy (RD RAP). Answer: A Explanation: You can also configure RD Gateway to use Remote Desktop connection authorization policies (RD CAPs) that are stored on another server that runs the Network Policy Server (NPS) service. By doing this, you are using the server running NPS, formerly known as a Remote Authentication Dial-In User Service (RADIUS) server, to centralize the storage, management, and validation of RD CAPs. If you have already deployed a server running NPS for remote access scenarios such as VPN and dial-up networking, using the existing server running NPS for RD Gateway scenarios as well can enhance your deployment. RAP Remote Desktop resource authorization policies (RD RAPs) allow you to specify the internal network resources (computers) that remote users can connect to through an RD Gateway server. Remote users connecting to the network through an RD Gateway server are granted access to computers on the internal network if they meet the conditions specified in at least one RD CAP and one RD RAP. CAP Remote Desktop connection authorization policies (RD CAPs) allow you to specify who can connect to an RD Gateway server QUESTION 8 You are designing a monitoring solution to log performance on member servers that run Windows Server 2008 R2. The monitoring solution must meet the following requirements for members of the Operations team: - Create and modify Data Collector Sets. - Display log file data and real-time performance data in Performance Monitor. You need to design a monitoring solution that meets the requirements. What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.) A. Add members of the Operations team to the Performance Monitor Users group. Assign the Act as part of the operating system user right to the Performance Monitor Users group B. Add members of the Operations team to the Performance Log Users group C. Add members of the Operations team to the Administrators group D. Add members of the Operations team to the Power Users group. Assign the Act as part of the operating system user right to the Power Users group Answer: B Explanation: A Data Collector Set is the building block of performance monitoring and reporting in Windows Performance Monitor. It organizes multiple data collection points into a single component that can be used to review or log performance. A Data Collector Set can be created and then recorded individually, grouped with other Data Collector Set and incorporated into logs, viewed in Performance Monitor, configured to generate alerts when thresholds are reached, or used by other non-Microsoft applications. It can be associated with rules of scheduling for data collection at specific times. Windows Management Interface (WMI) tasks can be configured to run upon the completion of Data Collector Set collection. Data Collector Sets can contain the following types of data collectors: Performance counters Event trace data System configuration information (registry key values) You can create a Data Collector Set from a template, from an existing set of Data Collectors in a Performance Monitor view, or by selecting individual Data Collectors and setting each individual option in the Data Collector Set properties. http://technet.microsoft.com/en-us/library/cc722148 You can create a Data Collector Set from counters in the current Performance Monitor display. Membership in the local Performance Log Users or Administrators group, or equivalent, is the minimum required to complete this procedure. QUESTION 9 A company has 10,000 client computers that run Windows 7. The company has a single domain Active Directory Domain Services (AD DS) forest with domain controllers that run Windows Server 2008 R2. Users have local administrative rights on client computers. You need to design a Group Policy solution that deploys a printer and enforces printer settings. What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.) A. Use the Local Security Policy. B. Use Group Policy preferences (GPPs). C. Use a Group Policy object (GPO) Windows setting. D. Use Starter Group Policy objects (GPOs). Answer: B Explanation: Group Policy preferences, new for the Windows Server 2008 operating system, include more than 20 new Group Policy extensions that expand the range of configurable settings within a Group Policy object (GPO). These new extensions are included in the Group Policy Management Editor window of the Group Policy Management Console (GPMC), under the new Preferences item. Examples of the new Group Policy preference extensions include folder options, mapped drives, printers, scheduled tasks, services, and Start menu settings. In addition to providing significantly more coverage, better targeting, and easier management, Group Policy preferences enable you to deploy settings to client computers without restricting the users from changing the settings. This capability provides you with the flexibility to decide which settings to enforce and which settings to not enforce. You can deploy settings that you do not want to enforce by using Group Policy preferences. System requirements and installation steps To use Group Policy preferences, complete the following steps: Install the set of client-side extensions (CSEs) on client computers. Supported operating systems: Windows Vista RTM or later, Windows XP with Service Pack 2 or later, Windows Server 2003 with Service Pack 1 or later Download locations: Windows Vista (x86): http://go.microsoft.com/fwlink/?LinkId=111859Windows Vista(x64): http://go.microsoft.com/fwlink/?LinkID=111857 Windows XP (x86): http://go.microsoft.com/fwlink/?LinkId=111851 Windows XP (x64): http://go.microsoft.com/fwlink/?LinkId=111862 Windows Server 2003 (x86): http://go.microsoft.com/fwlink/?LinkId=111852 Windows Server 2003 (x64): http://go.microsoft.com/fwlink/?LinkId=111863 For more information, see Article 943729 in the Microsoft Knowledge Base. Install the XMLLite low-level XML parser on client computers that are not running Windows Vista. Supported operating systems: Windows XP SP2 or later, Windows Server 2003 SP1 or later Download location: http://go.microsoft.com/fwlink/?LinkId=111843 worth looking at: GP Policy vs. Preference vs. GP preferences http://blogs.technet.com/b/grouppolicy/archive/2008/03/04/gp-policy-vs-preference-vs-gppreferences.aspx QUESTION 10 A company has a single Active Directory Domain Services (AD DS) domain and a single Remote Desktop Session Host (RD Session Host). The RD Session Host is approaching full memory capacity. All servers run Windows Server 2008 R2. You are designing a Remote Desktop Services (RDS) infrastructure. The infrastructure must meet the following requirements: - Allow infrastructure capacity to increase. - Minimize the number of physical servers. - Do not require administrative action on the client computers if the infrastructure capacity increases. You need to design an RDS infrastructure that meets the requirements. What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.) A. Migrate the RD Session Host to a virtual machine (VM) running in Microsoft Hyper-V. Add memory to the VM as demand increases. B. Add RD Session Hosts as demand increases, and use Group Policy to direct users to the correct server. C. Install and configure Windows Server Resource Manager (WSRM) on the RD Session Host to control user resource allocation. D. Implement an RD Session Host server farm and add servers as required. Answer: A Explanation: Virtualization meets the requirements easily enough, as capacity needs grow the VMs can be migrated to more powerful physical servers, again virtualization reduces the number of physical servers and finally as the actual RD Session Host wont change regardless of the location of that VM it will meet the third requirement Ans D does not meet the 3rd requirement Ans C wont resolve the problem of running out of memory only that addition of RAM will resolve that issue Ans B again does not meet the 3rd requirement 2016 Valid Microsoft 70-646 Exam Preparation Materials: 1.|Latest 70-646 PDF Dumps and 70-646 VCE Dumps 283Q&As - All New Questions Included: http://www.braindump2go.com/70-646.html [100% Exam Pass Guaranteed!] 2.|Newest 70-646 Exam Questions and Answers PDF - Google Drive: https://drive.google.com/folderview?id=0B9YP8B9sF_gNZEZXM1JpenRpekk&usp=sharing [Just Recently New Added Questions] 3.|More Valid 70-646 Practice Questions: https://drive.google.com/folderview?id=0B75b5xYLjSSNdmtpSEFJamVwQUU&usp=sharing
|