Tag Archives: 70-649

70-652 Exam


 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 



QUESTION 1
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network, including virtual computers, have Windows
Server 2008 installed and all workstations have Windows 7 installed.
You have installed the Hyper-V server role on a server named ABC-SR34, and the Windows
Deployment Services role on a server named ABC-SR35. Certkingdom.com’s virtual computer, named
ABC-VM01, only has a solitary Virtual Hard Disk (VHD) configured.
You have been instructed to make sure that an image of ABC-VM01’s Virtual Hard Disk (VHD) is
deployed to physical and virtual hosts via Windows Deployment Services.
To achieve this, you first need to have an image of ABC-VM01’s Virtual Hard Disk (VHD)
positioned on ABC-SR35.
Which combination of the following actions should you take?

A. You should consider exporting ABC-VM01, and then configuring the use of a legacy network
adapter.
B. You should consider configure ABC-VM01 to make use of a legacy adapter prior to restarting it
with a Windows Deployment Services discover image.
C. You should configure ABC-VM01 to make use of a legacy adapter prior to restarting it with a
Windows Deployment Services discover image.
D. You should configure ABC-VM01 to make use of a legacy adapter prior to restarting it with a
Windows Deployment Services capture image.

Answer: D

Explanation:


QUESTION 2
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
Certkingdom.com has a server, named ABC-SR14, which has a Windows Server 2008 Server Core
installation and is also configured as a Hyper-V server.
You have been informed that a Windows Vista SP1 64-bit workstation must be able to open
Hyper-V Manager, and also establish a link to ABC-SR14.
Which of the following actions should you take?

A. You should consider making use of the winrm command-line tool.
B. You should consider making use of the cscript command-line tool.
C. You should consider making use of the oclist command-line tool.
D. You should consider making use of the ocsetup command-line tool.
E. You should consider making use of the Netsh advfirewall command-line tool.

Answer: E

Explanation:


QUESTION 3
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
Certkingdom.com has a server named ABC-SR14 that is configured as a Hyper-V server, and hosts four
virtual computers. These servers are named ABC-VM01, ABC-VM02, ABC-VM03 and ABC-VM04.
Certkingdom.com also has a server named ABC-SR15 that is configured as a Hyper-V server, but hosts
no virtual computers. Certkingdom.com has another server named ABC-SR16 that has Microsoft System
Center Virtual Manager (SCVMM) 2008 installed.
You have been instructed to relocate ABC-VM04 from ABC-SR14 to ABC-SR15 without altering
the virtual computer configurations.
You have to make sure that ABC-VM04 is offline for as little time as possible. You have also been
informed that user interaction must be kept to a minimum.
Which of the following actions should you take?

A. You should consider relocating ABC-VM04 to a host group via the Hyper-V Manager.
B. You should consider importing ABC-VM04 via the Virtual Machine Manager on ABC-SR15.
C. You should consider dragging ABC-VM04 from ABC-SR14 and dropping it on ABC-SR15 via
the Virtual Machine Manager.
D. You should consider exporting ABC-VM04 from ABC-SR14 via the Virtual Machine Manager.

Answer: C

Explanation:


QUESTION 4
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
When Certkingdom.com acquires a new server, you are instructed to install the Hyper-V server role on it.
The server has a 32-bit Dual-core CPU, 4GB RAM, a single port network card, and two SATA hard
drives.
You need to make sure that you are able to install the Hyper-V server role on the new server.
Which of the following actions should you take?

A. You should install an additional network adaptor to system.
B. You should install an additional 8 GB RAM.
C. You should substitute the 32-bit CPU with a 64-bit CPU.
D. You should install an additional 500 GB hard drive.

Answer: C

Explanation:


QUESTION 5
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
A network administrator, named Andy Reid, has requested that you compile a report for server
consolidation suggestions. This report should list servers on which virtualization can be
configured, as well as performance monitoring information.
Which of the following actions should you take?

A. You should consider having the Virtual Machine Manager 2008 update first.
B. You should consider having the Virtual Machine Manager (VMM) Self-Service Portal installed first.
C. You should consider executing the ocsetup Microsoft-Hyper-V command first.
D. You should consider having Microsoft Assessment and Planning Solution Accelerator installed
first.

Answer: D

Explanation:


QUESTION 6
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
Certkingdom.com has a server named ABC-SR35, which is configured as a Hyper-V server. ABC-SR35
has two disks, of which one is configured as the C: drive and the other has not been allocated as
yet. Both of these drives are online.
You are tasked with creating a pass-through disk. After accessing Hyper-V Manager, you find that
you are unable to create a pass-through disk because the hard disk option is not displayed.
You are required to rectify this as soon as possible.
Which of the following actions should you take?

A. You should consider completely removing the C: drive.
B. You should consider completely removing the unallocated disk.
C. You should consider marking the unallocated disk as offline.
D. You should consider marking the C: drive as offline.

Answer: C

Explanation:


QUESTION 7
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
You have been tasked with creating a virtual computer named ABC-VM05. ABC-VM05 has six
virtual drives configured. There is a 100 GB drive, a DVD drive, as well as four 300 GB drives.
You would like to configure as little disk controllers as possible for ABC-VM05’s virtual disks.
Which of the following actions should you take?

A. You should consider configuring an SCSI controller for the DVD drive, and a single IDE
controller for the five hard drives.
B. You should consider configuring an SCSI controller and five IDE controllers for each of the hard
drives.
C. You should consider configuring six SCSI controllers.
D. You should consider configuring six IDE controllers.

Answer: A

Explanation:


QUESTION 8
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
Certkingdom.com has a server named ABC-SR35, which is configured as a Hyper-V server. ABC-SR35
has two virtual computers installed, named ABC-VM01 and ABC-VM02. Each virtual computer has
one Virtual Hard Disk (VHD) configured as a differencing disk. The Virtual Hard Disks (VHDs) are
named ABC-vm01.vhd and ABC-vm02.vhd respectively.
A fellow administrator, named Kara Lang, has removed lots of information from ABC-VM01, and
would like to know how to decrease ABC-vm01.vhd’s size. Kara Lang would like to complete this
task without affecting the current information on ABC-vm01.vhd. Kara Lang also informs you that
the solution should not have an effect on ABC-vm02.vhd.
Which of the following actions should you take?

A. You should consider deleting ABC-vm01.vhd.
B. You should consider compacting ABC-vm01.vhd.
C. You should consider expanding ABC-vm02.vhd.
D. You should consider editing ABC-vm02.vhd.

Answer: B

Explanation:


QUESTION 9
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
You have been tasked with running tests on a new application, named TestApp1. The tests will be
performed on a Windows Vista SP1 virtual computer named Test-VM01, which is installed on a
workstation in Certkingdom.com’s test lab named Test-WS01. Every test you are about to perform will alter
TestApp1’s configuration.
You must make sure that every test is performed with TestApp1’s default configuration.
You have already deployed the application with the default configuration, and also taken a
snapshot image of the virtual computer.
Which of the following actions should you take?

A. You should consider choosing the option to revert Test-VM01 subsequent to every test.
B. You should consider choosing the option to restart Test-WS01 subsequent to every test.
C. You should consider choosing the option to restore Test-WS01 subsequent to every test.
D. You should consider choosing the option to reset Test-VM01 subsequent to every test.

Answer: A

Explanation:


QUESTION 10
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
You have been tasked with running tests on a new application, named TestApp1. The tests will be
performed on a Windows Vista SP1 virtual computer named Test-VM01, which is installed on a
server in Certkingdom.com’s test lab named TestLab-SR35. Every test requires TestLab-SR35 to restart.
You have to make sure that the tests continue to run at startup.
Which of the following actions should you take?

A. You should consider choosing the option to restore Test-SR01.
B. You should consider choosing the option to revert Test-VM01
C. You should consider choosing the option to restart Test-SR01.
D. You should consider choosing the option to reset Test-VM01.

Answer: C

Explanation:

 

 


 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

70-236 Exam

70-236 Exam

 

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 


QUESTION 1
You work as the Exchange Administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 infrastructure.
The network contains a mailbox named TestResources. At present all users are able to diarize
appointments for TestResources. A new company policy states that only Kara Lang and Mia
Hamm are permitted to diarize appointments for TestResources.
What actions must you take to comply with the Certkingdom.com policy?

A. You should run the following cmdlet:
Set- MailboxCalendarSettings – Identity”TestResources” – MonthCalendar calendar = new
MonthCalendar(); KaraLang , MiaHamm.
B. You should run the following cmdlet:
Set-MailboxCalendarSettings – Identity ” TestResources” – BookInPolicy KaraLang , MiaHamm –
AllBookInPolicy $false cmdlet.
C. You should run the following cmdlet:
Set – MonthCalendar calendar = new MonthCalendar(); “host.KaraLang , MiaHamm = calendar ”
this.Content = host;.
D. You should run the following cmdlet:
Set – MonthCalendar calendar = new MonthCalendar();
HwndSource source = HwndSource.FromHwnd(calendar.Handle);
this.Content = calendar;Delegates KaraLang , MiaHamm.

Answer: B

Explanation:


QUESTION 2
You work as the Exchange Administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment. Certkingdom.com has headquarters in London and branch offices in Paris and
Berlin. The marketing department is located at the Paris office. The personnel in Paris connect to
the network through the Internet and use Outlook Anywhere on their laptops. To ensure
productivity management wants you to make sure that the marketing personnel have access to the
companies’ mailboxes.
What actions must you take?

A. You should utilize the Test- MAPIConnectivity and the Test- WebServicesConnectivity cmdlet.
B. You should utilize Get- Recipient – Filter cmdlet.
C. You should utilize Show-MailboxStatistics cmdlet.
D. You should utilize List-Mailbox cmdlet.

Answer: A

Explanation:


QUESTION 3
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment. The Certkingdom.com network has an Exchange Server 2007 environment.
The Edge Transport Server role is installed on a server named ABC-EX01. Due to this server
failure, you have decided to install a new Microsoft Windows Server 2003 server named ABCEX03
on the network with the reinstallation of the Edge Transport Server role. However, the
address rewrites that was functional on ABC-EX01 did not in operation on ABC-EX03. This
functionality is needed.
What actions must you take?

A. You should use the ImportEdgeConfig.ps1 on ABC-EX03.
B. You should use the iiscnfg/enable: application name check version.
C. You should use the Transaction Logs for sp_configure configuration.
D. You should use create a new Send connector on ABC-EX03.

Answer: A

Explanation:


QUESTION 4
You work as the Exchange administrator at Certkingdom.com. Certkingdom.com has headquarters in London and
a branch office in Paris. The Exchange Server 2007 server in the London office is named ABCEX07
and the Exchange Server 2003 server in the London office is named ABC-EX08. You need
to transfer the mailbox from ABC-EX07 to ABC-EX08.
What actions must you take?

A. You should include the IgnoreRuleLimitErrors parameter when using the Move-Mailbox cmdlet.
B. You should use the System configuration data collector.
C. You should create a mapping schema definition.
D. You should enable the Windows Remote Management (WinRM).

Answer: A

Explanation:


QUESTION 5
You work as the Exchange administrator at Certkingdom.com. Certkingdom.com has its headquarters in Chicago
and a branch office in Dallas. You are implementing a new Exchange Server 2007 Organization.
The Exchange Server 2007 environment of Certkingdom.com has the following server installed:
• An Edge Transport server named ABC-EX01
• A Hub Transport server named ABC-EX02.
During the course of the day you have received instruction from the CIO to have e-mail routing
configured on ABC-EX01 and ABC-EX02. In your solution you need to ensure that ABC-EX01 is
able to transmit e-mail messages to and from the Internet. You should also ensure that Internet email
is sent to ABC-EX01 via ABC-EX02.
What actions must you take?

A. You should use the Microsoft System Center Configuration Manager (SCCM).
B. You should export a new Edge Subscription file to ABC-EX01 and Import the Edge Subscription
file to ABC-EX02.
C. You should use the Microsoft System Center Operations Manager (SCOM).
D. You should use the Microsoft Exchange Internet Message Access Protocol, Version 4 (IMAP4).

Answer: B

Explanation:


QUESTION 6
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
You were compelled to restore the directory objects and settings from a backup. However, after
the restoration a number of employees reported that they are unable to access their mailboxes
that were assigned to them before the backup was made. The employees need to access their
mailboxes.
What actions must you take?

A. You should use the Get-Mailbox cmdlet.
B. You should use the Get-MailboxInformation cmdlet.
C. You should use the Connect-Mailbox cmdlet.
D. You should use the Show-Information cmdlet.

Answer: C

Explanation:


QUESTION 7
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
During routine maintenance of the Exchange server you discover that the storage limits are all
different in the mailboxes.
What actions must you take to ensure that the storage limits to be the same?

A. You should use the Get-MailboxStatistics cmdlet and forward it to the Get-Mailbox cmdlet.
B. You should use the Show-MailboxStatistics cmdlet and forward it to the Select-Object cmdlet.
C. You should use the Get-MailboxInformation cmdlet and forward it to the Select-Object cmdlet.
D. You should create an Exchange Management Shell script and forward the Get-Mailbox
Database cmdlet output to the Set-Mailbox Database cmdlet.

Answer: D

Explanation:


QUESTION 8
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment. The Certkingdom.com network contains a stand-alone server named ABCSR09.
Your boss, CertKingdom, wants to know which Exchange Server 2007 server role can ABC-SR09
support.
What would you reply?

A. It can support the Terminal Service Session Broker (TS Session Broker) role.
B. It can support the Edge Transport server role.
C. It can support the PDC emulator role.
D. It can support the Exchange Recipient Administrators role.

Answer: B

Explanation:


QUESTION 9
You work as the Exchange Administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 infrastructure that has two Client Access Servers with load balancing.
The employees on the intranet has 24/7 access to data when utilizing Outlook Anywhere. During
the course of the day you have received instruction from the CIO to ensure that the employees
who connect to the Exchange infrastructure via the IUnernet also have access to data 24/7.
What actions must you take?

A. You should enable the Microsoft Exchange Information Store.
B. You should enable the Microsoft Exchange Search Service.
C. You should set the external URL on every Client Access Server.
D. You should enable the Microsoft Exchange File Distribution service.

Answer: C

Explanation:


QUESTION 10
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
You have received several complaints from employees in various departments stating that e-mail
messages are ending up in their Junk E-mail folder even though the sender’s e-mail address is on
their Safe Senders List. You need to ensure that the employees’ Safe Senders Lists are used.
What actions must you take?

A. You should modify the SMTP Send connectors.
B. You should utilize the Get-Mailbox cmdlet.
C. You should utilize the Show-Information cmdlet.
D. You should utilize the Update-SafeList cmdlet on each mailbox.

Answer: D

Explanation:


QUESTION 11
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
Certkingdom.com recently acquired a new company named TestLabs, Inc. The Certkingdom.com management
wants all mail to TestLabs, Inc. to be accepted by the Certkingdom.com Exchange servers as the e
Exchange servers of TestLabs, Inc. will be decommissioned.
What actions must you take to receives TestLabs, Inc’s mail?

A. You should set up TestLabs Inc as an authoritative domain.
B. You should create a Send connector for TestLabs Inc.
C. You should configure the RejectMessagesFrom setting in TestLabs Inc.
D. You should run the Set-CASMailbox cmdlet.

Answer: A

Explanation:


QUESTION 12
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment. Certkingdom.com makes use of Microsoft ActiveSync policy.
As a security measure the Microsoft ActiveSync policy is configured to ensure that idle clients
provide their password every 20 minutes. You therefore decide to set up an inactivity timer on the
network computers.
During the course of the day you have receive a request from the Marketing manager named Amy
Wilson, to ensure that her laptop, ABC-WS236 is not affected by this Microsoft ActiveSync policy.
What actions must you take to ensure that ABC-WS236 is not affected by the Microsoft
ActiveSync policy but all other computers are?

A. You should disable Microsoft ActiveSync on ABC-WS236.
B. You should use the Set- ReceiveConnector – ProtocolLoggingLevel None cmdlet.
C. You should set up a new ActiveSync policy to accommodate ABC-WS236.
D. You should run the Set-CASMailbox cmdlet on ABC-WS236.

Answer: C

Explanation:


QUESTION 13
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
2007 environment.
Microsoft ActiveSync is on the Exchange servers but is disabled. You are in the process of
assigning a new notebook computer named ABC-WS123 to Rory Allen that should be
synchronized with the Exchange servers.
What actions must you take?

A. You should run the Set- ContentFilterConfig – RecipientEnabled $false cmdlet.
B. You should run the Set-CASMailbox cmdlet and enable the feature.
C. You should run the Set- ContentFilterConfig – BypassedRecipients anti-spam@Certkingdom.com
cmdlet.
D. You should create a new ActiveSync policy that contains all the necessary settings.

Answer: B

Explanation:


QUESTION 14
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
Certkingdom.com has two servers named ABC-EX01 and ABC-EX02. ABC-EX01 is hosting the Client
Access server role and ABC-EX02 is hosting the Hub Transport server role. During the week ABCEX01
has a failure. To ensure productivity you need to transfer the Client Access Server role to
ABC-EX02.
What actions must you take?

A. You should run the Disable-StorageGroupCopy cmdlet and enable the DatabaseCopy cmdlet.
B. You should utilize the Setup/mode:RecoverServer command.
C. You should utilize the Add or Remove Programs applet.
D. You should open the Exchange Management Console and imported the Client Access server
role.

Answer: C

Explanation:


QUESTION 15
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
2007 environment. Certkingdom.com wants to know how much space the mailboxes take up at present.
How would you find this information?

A. By running the AutomateProcessing Auto Update cmdlet.
B. By running the Show-MailboxStatistics cmdlet.
C. By running the Get-MailboxStatistics cmdlet.
D. By running the Get-MailboxInformation cmdlet.

Answer: C

Explanation:


QUESTION 16
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment with a server named ABC-EX10. ABC-EX10 had several physical hard
disk drives. You have received instruction from the CIO to ensure that ABC-EX10 has the best
possible I/O performance while also being fault tolerant.
What actions must you take?

A. You should make use of a dedicated RAID 3 array.
B. You should make use of a dedicated RAID 10 array.
C. You should make use of a dedicated RAID 5 array.
D. You should make use of a dedicated RAID 0 array.

Answer: B

Explanation:


QUESTION 17
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment. The Certkingdom.com network has a server named ABC-EX12 that functions as
a mailbox. You need to determine whether the employees in the Finance department can use
Microsoft Office Outlook to access their mailboxes on ABC-EX12.
What actions must you take?

A. You should make use the Microsoft Baseline Security Analyzer.
B. You should make use the Event trace data collector.
C. You should make use the Test- ServiceHealth cmdlet.
D. You should make use the Test-ExchangeSearch cmdlet.

Answer: C

Explanation:


QUESTION 18
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
Certkingdom.com contains quite a few distribution groups. A new Certkingdom.com policy only allows the owner to
add or remove members from their distribution group.
What actions must you take to adhere to the Certkingdom.com policy?

A. You should create a universal distribution group without any permission.
B. You should create a universal security group but disable its mailbox.
C. You should attach the owner to the Managed By tab of their distribution group and click the
Manager can update membership list check box.
D. You should create a mail-enabled universal security group.

Answer: C

Explanation:


QUESTION 19
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
A Certkingdom.com user named Mia Hamm complains that she cannot access her mailbox. You
investigate and discover that Mia Hamm’s mailbox was removed from a Mailbox server named
ABC-EX07; however there is an exciting back of the mailbox that resides in the recovery storage
group.
What actions must you do to get the mailbox to the working database?

A. You should make use the Restore-DatabaseCopy cmdlet.
B. You should make use the Copy-StorageGroupCopy cmdlet.
C. You should make use the Set-Mailbox cmdlet.
D. You should make use the Restore-Mailbox cmdlet.

Answer: D

Explanation:


QUESTION 20
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
The Certkingdom.com network has a server named ABC-EX11 that is configured as a mailbox server. A
Certkingdom.com user named Andy Reid complains one morning that he is unable to access his mailbox.
You then discover that there mailbox store has become corrupt. You thus recover mailbox store
from a recent backup to a recovery storage group. However, Andy Reid reports that he still is
unable to access his mailbox.
What actions must you take to ensure that Andy Reid can access his mailbox?

A. You should add Andy Reid as a mailbox before reconnecting.
B. You should shift the mailbox to a standard storage group before reconnecting.
C. You should add Andy Reid as a mailbox-enabled user before reconnecting.
D. You should use the Get-MailboxStatistics cmdlet.

Answer: B

Explanation:


QUESTION 21
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
The Certkingdom.com network contains a mail server named ABC-EX04 that has the complete Client
Access server role installed. Due to a failure on ABC-EX04, you have implemented a server
named ABC-EX05 on the Certkingdom.com network that is running Exchange Server 2007 and restore the
System State data. However, the Certkingdom.com CIO wants the Client Access server role to have same
settings as the previous one.
What actions must you take?

A. You should copy the log files from ABC-EX04 on ABC-EX05.
B. You should run the ISInteg utility on ABC-EX04 and copy the log files on ABC-EX05.
C. You should make use of the Setup/mode:RecoverServer command and execute a System State.
D. You should restore the \ClientAccess\ directory and run the Setup /mode:RecoverServer
command for the implementation of the Client Access server role.

Answer: D

Explanation:


QUESTION 22
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
Certkingdom.com contains two servers named ABC-EX08 and ABC-EX09. ABC-EX08 hosts the Edge
Transport server role and ABC-EX09 hosts the Hub Transport role. The Edge Subscription of
ABC-EX08 resides on ABC-EX09.
The internet connection to ABC-EX08 goes down for a considerable period and when the
connection is re-established you notice that no delivery of e-mails is taking place.
What actions must you take to restore e-mail delivery?

A. You should utilize the Get-Queue – Filter {status – eq “retry” cmdlet on ABC-EX08.
B. You should utilize the Get-Message –Filter {Subject – eq “Latest Production Line”} cmdlet on ABC-EX08.
C. You should utilize the Resume-queue –filter {status – eq “retry”} cmdlet on ABC-EX08.
D. You should utilize the Retry-Queue cmdlet on ABC-EX08.

Answer: D

Explanation:

 

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

70-649 Exam

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com


QUESTION 1
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a Routing and Remote Access computer named ABCSR01
running Network Access Protection.
How should you configure ABC-SR01 to ensure Point-to-Point (PP) authentication is used?

A. By using the Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) protocol.
B. By using the Secure Shell (SSH) protocol.
C. By using the Extensible Authentication Protocol (EAP) protocol.
D. By using the Kerberos v5 protocol.

Answer: C

Explanation:
To configure the Point-to-Point Protocol (PPP) authentication method on ABC-SR01, you need to
configure Extensible Authentication Protocol (EAP) authentication method.
Microsoft Windows uses EAP to authenticate network access for Point-to-Point Protocol (PPP)
connections. EAP was designed as an extension to PPP to be able to use newer authentication
methods such as one-time passwords, smart cards, or biometric techniques.
Reference: Making sense of remote access protocols in Windows / DIAL-UP AUTHENTICATION
http://articles.techrepublic.com.com/5100-10878_11-1058239.html


QUESTION 2
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a computer named ABC-SR01 using the default security
settings to run Remote Desktop.
How would you configure the Remote Desktop connection to ensure secure connections between
ABC-SR01 and accessing clients?

A. By configuring Windows Firewall to block communications via port 110 on the firewall.
B. By obtaining user certificates from the internal certificate authority.
By allowing connections to Remote Desktop client computers that use Network Level
Authentication only.
C. By configuring Windows Firewall to block communications via port 443 on the firewall.
D. By obtaining user certificates from the external certificate authority.
By allowing connections to Remote Desktop client computers that use Network Level
Authentication only.
E. By configuring Windows Firewall to block communications via port 1423 on the firewall.

Answer: B

Explanation:
To ensure the RDP connections are as secure as possible, you need to first acquire user
certificates from the internal certificate authority and then configure each server to allow
connections only to Remote Desktop client computers that use Network Level Authentication.
In the pre-W2008 Terminal Server, you used to enter the name of the server and a connection is
initiated to its logon screen. Then, at that logon screen you attempt to authenticate. From a
security perspective, this isn’t a good idea. Because by doing it in this manner, you’re actually
getting access to a server prior to authentication – the access you’re getting is right to a session
on that server – and that is not considered a good security practice.
NLA, or Network Level Authentication, reverses the order in which a client attempts to connect.
The new RDC 6.0 client asks you for your username and password before it takes you to the
logon screen. If you’re attempting to connect to a pre-W2008 server, a failure in that initial logon
will fail back to the old way of logging in. It shines when connecting to Windows Vista computers
and W2008 servers with NLA configured it prevents the failback authentication from ever
occurring, which prevents the bad guys from gaining accessing your server without a successful
authentication.
Reference: Server 2008 Terminal Services Part 2: NLA – Network Level Authentication
http://www.realtime-windowsserver.com/tips_tricks/2007/06/server_2008_terminal_services_2.htm


QUESTION 3
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a computer named ABC-SR18 configured to host the
Internet Information Services (IIS) Web server role and SMTP gateway role.
ABC.com has a Marketing division using ABC-SR18 to send and receive e-mail from the Internet.
The ABC.com Marketing division accesses the Internet using the SMTP gateway on port 25.
How would you configure ABC-SR18 to send e-mail to Internet recipients after configuring the
SMTP gateway to relay messages?

A. By creating an SRV record for the SMTP gateway on an internal DNS server.
B. By creating a host (A) record for the SMTP gateway on an internal DNS server.
C. By configuring the SMTP email feature for the website on ABC-SR18.
D. By creating a CNAME record for the SMTP gateway on an internal DNS server.

Answer: C

Explanation: You need to configure the SMTP email feature for the website on ABC-SR18. The
Simple Message Transfer Protocol allows the emails to be sent to a specific address.
Reference: https:://technet2.microsoft.com/windowsserver2008/en/library/4ade618d-ff7a-4359-
b6ba-4982f0bdf4a51033.mspx?mfr=true


QUESTION 4
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a computer named ABC-SR15 configured to host the
Active Directory Lightweight Directory Services (AD LDS) service.
How would you replicate Active Directory Lightweight Directory Services (AD LDS) to a newly
deployed server?

A. By using the ADSI Edit Snap-in to replicate the AD LDS instance.
B. By creating and installing a replica of AD LDS running the AD LDS Setup wizard on ABC-SR15
C. By using the xcopy command to copy the entire AD LDS instance.
D. By using Active Directory Sites and Services to replicate the AD LDS instance.

Answer: B

Explanation: You need to run the AD LDS setup wizard on the computer in the lab to create and
install a replica of AD LDS. In the AD LDS setup wizard there will be an option to replicate the AD
LDS instance on another computer.


QUESTION 5
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a computer named ABC-SR01 configured to host
virtualization role service and virtual machines installed with the KingSales application.
How would you configure the virtual machines to be recovered to the original state if installation of
KingSales fails?

A. By using an Automated System Recovery (ASR) disk on the virtual machine when the
application fails.
B. By installing and configuring third party backup software on Virtual machine.
C. By creating a snapshot of the virtual machine through the Virtualization Management Console.
D. By using the Windows Backup utility to backup the Virtual machines.

Answer: C

Explanation: To ensure that you can restore the Virtual machine to its original state if an
application installation fails, you should create a snapshot of the virtual machine using the
Virtualization Management Console. You can always restore the virtual machines in its original
state by using the snapshot you created.


QUESTION 6
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has two computers configured as follows:
• ABC-DC01 – configured as a domain controller.
• ABC-DC02 – configured as a Read-Only Domain Controller (RODC).
ABC.com Marketing division members makes use of ABC-DC01 to log onto the domain.
How would you ensure that ABC-DC02 can be used by the Marketing division to log onto the
domain?

A. By deploying a computer running Active Directory Certificate Services (AD CS).
B. By using a Password Replication Policy on the RODC.
C. By installing and configuring an Active Directory Federation Services (AD FS) front-end server.
D. By deploying a computer running Active Directory Lightweight Directory Services (AD LDS) and
Active Directory Domain Services (AD DS).

Answer: B

Explanation: You should use the Password Replication Policy on the RODC. This will allow the
users at the Dallas office to log on to the domain with RODC. RODCs don’t cache any user or
machine passwords.


QUESTION 7
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a computer named ABC-SR21 in the default Web site
running WSUS for updates.
How would you configure a group policy with the port and intranet update location to ensure the
Secure Sockets Layer (SSL) is used on ABC-SR21?

A. By using https://ABC-sr21: 80 to indicate the default port and intranet update location.
B. By using https://ABC-sr21 to indicate the default port and intranet update location.
C. By using https:://ABC-sr21: 1073 to indicate the default port and intranet update location.
D. By using https:://ABC-sr21: 110 to indicate the default port and intranet update location.

Answer: B

Explanation: You need to use https://ABC-sr21 to configure a group policy object (GPO) that
specifies the intranet update locations on a default port. You also need a URL for a secure port
that the WSUS server is listening on. You should make use of a URL that specifies HTTPS. This
will secure the client computer channel. However, if you are using any port other than 443 for SSL,
you need to include that port in the URL, too.
Reference: WSUS SSL Client Configuration
http://www.techsupportforum.com/microsoft-support/windows-nt-2000-2003-server/115983-wsusssl-
client-configuration.html


QUESTION 8
You are employed as an enterprise administrator at ABC.com. The ABC.com has a domain
named ABC.com. All servers on the domain run Microsoft Windows Server 2008 and all client
computers run Microsoft Windows Vista. ABC.com has a computer named ABC-SR20 that hosts
the Internet Information Services (IIS) Web Server role though being configured not to utilize the
Windows Performance and Reliability Monitor. During the course of the day ABC.com instructs
you to install and configure Reliability Monitor.
How can you ensure ABC-SR20 collects reliability information keeping the system stability share
current?

A. By configuring the Remote Access Auto Connection Manager service to start automatically on
the ABC-SR20.
B. By configuring the Net Logon service to start automatically on the ABC-SR20.
C. By configuring the Task scheduler service to start automatically on the ABC-SR20.
D. By configuring the Error Reporting Services service to start automatically on the ABC-SR20.

Answer: C

Explanation: To configure the ABC-SR20 to collect the reliability monitor data, you need to
configure the Task scheduler service to start automatically.
Reliability Monitor uses data provided by the RACAgent scheduled task, a pre-defined task that
runs by default on a new installation of Windows Vista. The seamless integration between the
Task Scheduler user interface and the Event Viewer allows an event-triggered task to be created
with just five clicks.
In addition to events, the Task Scheduler in Windows Vista / Server 2008 supports a number of
other new types of triggers, including triggers that launch tasks at machine idle, startup, or logon.
Because you need Task Scheduler to collect reliability monitor data, you need to you need to
configure the Task scheduler service to start automatically.
Reference: Network Monitor 3.1 OneClick … now what? / Task Scheduler Changes in Windows
Vista and Windows Server 2008 – Part One
http://blogs.technet.com/askperf/
Reference: What allows the Reliability Monitor to display data?
http://www.petri.co.il/reliability_monitor_windows_vista.htm


QUESTION 9
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has three computers configured as follows:
• ABC-SR11 – configured with Event Log subscription monitoring
• ABC-SR12 – configured as a domain controller.
• ABC-SR13 – configured as a domain controller.
During the course of the day ABC.com instructs you to create the subscription using ABC-SR12 or
ABC-SR13 which fails as the operation does not complete.
How would you ensure that the subscription can be created using either ABC-SR12 or ABCMicrosoft
70-649: Practice Exam
SR13? (Choose two)

A. By running the command wecutil cs subscription.xml on ABC-SR11.
B. By creating subscription.xml custom view on ABC-SR11.
C. By running the wecutil qc command on ABC-SR12.
D. By running the winrm connect command on ABC-SR13.
E. By running the winrm allow command on ABC-SR13

Answer: A,B

Explanation: To configure a subscription on ABC-SR11, you need to first create an event
collector subscription configuration file and Name the file subscription.xml. You need to then run
the wecutil cs subscription.xml command on ABC-SR11.
This command enables you to create and manage subscriptions to events that are forwarded from
remote computers, which support WS-Management protocol. wecutil cs subscription.xml
command will create a subscription to forward events from a Windows Vista Application event log
of a remote computer at ABC.com to the ForwardedEvents log.
Reference: Wecutil
http://technet2.microsoft.com/windowsserver2008/en/library/0c82a6cb-d652-429c-9c3d-
0f568c78d54b1033.mspx?mfr=true


QUESTION 10
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a computer named ABC-SR11 configured to run Internet
Information Services (IIS) Web server role hosting confidential company information.
ABC.com has a Marketing division accessing the confidential information which loads excessively
slow. During the course of the maintenance you discovered ABC-SR11 uses a high percentage of
processor time.
How would you gather information regarding the processor utilizing high percentages of processor
time?

A. By using Windows Reliability and Performance Monitor to check percentage of processor
capacity.
B. By using a counter log to track the processor usage.
C. By using the Performance Logs and Alerts.
D. By checking the security log for Performance events.
E. By checking the error log for performance events.

Answer: A

Explanation: Explanation
To gather additional data to diagnose the cause of the problem, you need to use the Resource
View in Windows Reliability and Performance Monitor to see the percentage of processor capacity
used by each application.
The Resource View window of Windows Reliability and Performance Monitor provides a real-time
graphical overview of CPU, disk, network, and memory usage. By expanding each of these
monitored elements, system administrators can identify which processes are using which
resources. In previous versions of Windows, this real-time process-specific data was only
available in limited form in Task Manager
Reference: Windows Reliability and Performance Monitor
http://technet.microsoft.com/en-us/library/cc755081.aspx

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com