[Free] 2018(Jan) EnsurePass Dumpsleader Microsoft 70-646 Dumps with VCE and PDF Download 131-140

Ensurepass.com : Ensure you pass the IT Exams 2018 Jan Microsoft Official New Released 70-646
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-646.html

Pro: Windows Server 2008, Server Administrator

Question No: 131 – (Topic 4)

You need to recommend a backup solution for the VMs that meets the museum#39;s technical requirements. What should you include in the recommendation?

  1. On each VM, perform a full server backup by using Windows Server Backup.

  2. On each physical node, perform a full server backup by using Windows Server Backup.

  3. Deploy Microsoft System Center Data Protection Manager 2010 and create a new protection group.

  4. Deploy Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and schedule checkpoints

Answer: C Explanation:

http://technet.microsoft.com/en-us/library/ff399260.aspx What is Data Protection Manager?

Microsoft System Center Data Protection Manager (DPM) 2010 is a member of the Microsoft System Center family of management products, designed to help IT professionals manage their Windows environment. DPM provides Windows backup and recovery-delivering seamless data protection for Microsoft application and file servers by using integrated disk and tape media. DPM performs replication, synchronization, and recovery point creation to provide reliable protection and rapid recovery of data for both system administrators and endusers.

What is a custom volume?

You can assign a custom volume to a protection group member, in place of the DPM storage pool. A custom volume is a volume that is not in the DPM storage pool and is specified to store the replica and recovery points for a protection group member.

Any volume that is attached to the DPM server can be selected as a custom volume, except the volume that contains the system and program files. To use custom volumes for

a protection group member, two custom volumes must be available: one volume to store the replica and one volume to store the recovery points

Question No: 132 – (Topic 4)

You need to recommend an administrative solution for the help desk technicians that meets the museum#39;s technical requirements.

What should you recommend?

  1. Add the help desk technicians to the Domain Admins group.

  2. Add the help desk technicians to the Accounts Operators group.

  3. Assign permissions for the Groups OU and the Branch1 OU to the help desk technicians.

  4. Assign permissions for the domain object and the Users container to the help desk technicians.

Answer: C Explanation:

You can delegate administrative control to any level of a domain tree by creating organizational units within a domain and delegating administrative control for specific organizational units to particular users or groups. By giving permissions on the Groups OU they can modify group membership and create groups within that OU, by giving them permissions on the Branch1 OU they will be able to reset passwords within that OU. http://www.windowsecurity.com/articles/Implementing-Active-Directory-Delegation- Administration.html

How to delegate password reset permissions for your IT staff

One of the most common tasks to delegate, usually to a service desk or Help desk, is the capacity to reset users’ passwords when they forget them and unlock their accounts. To accomplish this, you’ll need to perform a few delegations: You’ll need to delegate the Reset Password Extended Right permission and the Write

Property permission for the pwdLastSet and lockoutTime attributes. http://community.spiceworks.com/how_to/show/1464 well worth a look To delegate group membership

http://www.scribd.com/doc/42818731/AD-Delegating-Control-of-Group-Membership

Question No: 133 – (Topic 4)

You need to recommend a monitoring solution for App1 that meets the museum#39;s technical requirements. What should you include in the recommendation?

  1. event subscriptions

  2. Microsoft SharePoint Foundation 2010 alerts

  3. Microsoft System Center Operations Manager 2007 R2 and the SMTP service

  4. Resource Monitor

Answer: A Explanation:

http://technet.microsoft.com/en-us/library/cc749183.aspx

Event Viewer enables you to view events on a single remote computer. However, troubleshooting an issue might require you to examine a set of events stored in multiple logs on multiple computers.

Windows Vista includes the ability to collect copies of events from multiple remote computers and store them locally. To specify which events to collect, you create an event subscription. Among other details, the subscription specifies exactly which events will be collected and in which log they will be stored locally. Once a subscription is active and events are being collected, you can view and manipulate these forwarded events as you would any other locally stored events.

Using the event collecting feature requires that you configure both the forwarding and the collecting computers.

The functionality depends on the Windows Remote Management (WinRM) service and the Windows Event Collector (Wecsvc) service. Both of these services must be running on computers participating in the forwarding and collecting process. To learn about the steps required to configure event collecting and forwarding computers, see Configure Computers to Forward and Collect Events.

Question No: 134 – (Topic 4)

You need to recommend an access solution for the users in the sales department that meets the museum#39;s technical requirements. What should you include in the recommendation?

  1. BranchCache in Distributed Cache mode

  2. BranchCache in Hosted Cache mode

  3. offline files

  4. transparent caching

Answer: C Explanation:

http://technet.microsoft.com/en-us/library/gg277982(WS.10).aspx

Offline Files (Client Side Caching or CSC) and Folder Redirection are two features that are often used together to redirect the path of local folders such as the Documents folder to a network location, while caching the contents locally for increased speed and reliability.

Question No: 135 – (Topic 4)

You are planning to upgrade the client computers of the users in the sales department to Windows 7.

You need to recommend an upgrade solution to ensure that the client computers can run App2.

What should you include in the recommendation?

  1. Internet Explorer Administration Kit (IEAK)

  2. Microsoft Application Compatibility Toolkit (ACT)

  3. Microsoft Application Virtualization (AppV)

  4. Microsoft Enterprise Desktop Virtualization (MED-V)

Answer: D Explanation:

http://technet.microsoft.com/en-us/library/ff433573.aspx

MED-V uses Microsoft Virtual PC to provide an enterprise solution for desktop virtualization. With MED-V, you can easily create, deliver, and manage corporate Virtual PC images on any Windows庐-based desktop.

MED-V is an integral component of the Microsoft Desktop Optimization Pack, a dynamic solution available to Software Assurance customers, which helps reduce application deployment costs, enables delivery of applications as services, and helps to better manage and control enterprise desktop environments.

Topic 5, Woodgrove Bank Scenario:

COMPANY OVERVIEW

Overview

Woodgrove Bank is an international financial organization.

Physical Location

The company has a main office and multiple branch offices.

EXISTING ENVIRONMENT

Active Directory Environment

The network contains one Active Directory forest. A separate domain exists for each office.

Network Infrastructure

All offices have domain controllers that are configured as DNS servers. All client computers are configured to connect to the DNS servers in their respective office only.

The main office has the following servers and client computers:

->One Windows Server Update Services (WSUS) server.

->Client computers that run either Windows XP Service Pack 3 (SP3) or Windows 7.

->Ten file servers that host multiple shared folders. The file servers run either Windows Server 2003 or Windows Server 2008 R2.

->One domain-based Distributed File System (DFS) namespace that has two replicas. The DFS servers run Windows Server 2008 R2. The DFS namespace is configured to use Windows 2000 Server mode.

Each branch office has a WAN link to the main office. The WAN links are highly saturated. Each office has a dedicated high-speed Internet connection.

All of the client computers in the branch offices run Windows 7.

User Problems

Users report that it is difficult to find the shared folders on the network.

REQUIREMENTS

Planned Changes

Woodgrove Bank plans to implement the following changes:

->Deploy a new Application named App1 on each client computer. App1 has a Windows Installer package and is compatible with Windows XP, Windows Vista, and Windows 7.

->Designate a user in each office to manage the address information of the user accounts in that office.

->Deploy a new branch office named Branch22 that has the following servers:

->uk.co.certification.simulator.questionpool.PList@299569d0

Technical Requirements

Woodgrove Bank must meet the following technical requirements:

->Minimize hardware and software costs, whenever possible.

->Encrypt all DNS replication traffic between the DNS servers.

->Ensure that users in the branch offices can access the DFS targets if a WAN link fails.

->Ensure that users can only view the list of DFS targets to which they are assigned permissions.

->Minimize the amount of network traffic between the main office and the branch offices, whenever possible.

->Minimize the amount of name resolution traffic from the branch offices to the DNS servers in the main office.

->Ensure that the administrators in the main office manage all Windows update approvals and all computer groups.

->Manage all of the share permissions and the folder permissions for the file servers from a single management console.

->Ensure that if a file on a file server is deleted accidentally, users can revert to a previous version of the file without administrator intervention.

->Ensure that administrators are notified by e-mail each time a user successfully copies a file that has an .avi extension to one of the file servers.

Security Requirements

Woodgrove Bank must meet the following security requirements:

->Access rights and user rights must be minimized.

->The Guest account mustoe disabled on all servers.

->Internet Information Services (IIS) must only be installed on authorized servers.

Question No: 136 – (Topic 5)

You need to recommend changes to the DFS infrastructure that meet the company#39;s technical requirements. What should you recommend implementing in each branch office? (Each correct answer presents part of the solution. Choose two.)

  1. a DFS namespace server

  2. a DFS replica

  3. a standalone DFS namespace

  4. BranchCache in Distributed Cache mode

  5. BranchCache in Hosted Cache mode

Answer: A,B Explanation:

When deploying domain-based namespaces, you can add additional namespace servers to

host a namespace.

This has several advantages:

If one namespace server hosting the namespace goes down, the namespace will still be available to users who need to access shared resources on your network. Adding another namespace thus increases the availability of your namespace.

If you have a namespace that must be available to users all across your organization but your Active Directory network has more than one site, then each site should have a namespace server hosting your namespace. That way, when users in a site need to contact a namespace server for referrals, they can do so locally instead of sending traffic requests to other sites. This improves performance and reduces unnecessary WAN traffic. Note that adding additional namespace servers is only supported for domain-based namespaces, not standalone namespaces.

http://technet.microsoft.com/en-us/library/cc732863(v=ws.10).aspx

DFS Namespaces enables you to group shared folders located on different servers by transparently connecting them to one or more namespaces. A namespace is a virtual view of shared folders in an organization. When you create a namespace, you select which shared folders to add to the namespace, design the hierarchy in which those folders appear, and determine the names that the shared folders show in the namespace. When a user views the namespace, the folders appear to reside on a single, high-capacity hard disk. Users can navigate the namespace without needing to know the server names or shared folders hosting the data.

The path to a namespace is similar to a Universal Naming Convention (UNC) path of a shared folder, such as \\Server1\Public\Software\Tools. If you are familiar with UNC paths, you know that in this example the shared folder, Public, and its subfolders, Software and Tools, are all hosted on Server1. Now, assume you want to give users a single place to locate data, but you want to host data on different servers for availability and performance purposes. To do this, you can deploy a namespace similar to the one shown in the following figure. The elements of this namespace are described after the figure.

Ensurepass 2018 PDF and VCE

Namespace server. A namespace server hosts a namespace. The namespace server can

be a member server or a domain controller.

Namespace root. The root is the starting point of the namespace. In the previous figure, the name of the root is Public, and the namespace path is \\Contoso\Public. This type of namespace is known as a domain-based namespace, because it begins with a domain name (for example, Contoso) and its metadata is stored in AD DS. Although a single namespace server is shown in the previous figure, a domain-based namespace can be hosted on multiple namespace servers.

Folder. Folders help build the namespace hierarchy. Folders can optionally have folder targets. When users browse a folder with targets in the namespace, the client computer receives a referral that directs the client computer to one of the folder targets.

Folder targets. A folder target is a UNC path of a shared folder or another namespace that is associated with a folder in a namespace. In the previous figure, the folder named Tools has two folder targets, one in London and one in New York, and the folder named Training Guides has a single folder target in New York. A user who browses to

\\Contoso\Public\Software\Tools is transparently redirected to the shared folder \\LDN- SVR-01\Tools or \\NYC-SVR-01\Tools, depending on which site the user is in.

Question No: 137 – (Topic 5)

You plan to implement a WSUS server in a branch office.

You need to recommend a solution for deploying the WSUS server that meets the company#39;s technical requirements.

What should you include in the recommendation?

  1. an autonomous WSUS server that is configured to download updates from Microsoft Update

  2. an autonomous WSUS server that is configured to download updates from the WSUS server in the main office

  3. a WSUS server running in replica mode that is configured to download updates from Microsoft Update

  4. a WSUS server running in replica mode that is configured to download updates from the WSUS server in the main office

Answer: C Explanation:

Each Office has a highspeed link and the WAN link to the main office is saturated as one of the requirements is to minimize traffic between branch and main offices then C offers the

best solution.

http://technet.microsoft.com/en-us/library/dd939820(WS.10).aspx Replica mode (centralized administration)

In replica mode, an upstream WSUS server shares updates, approval status, and computer groups with downstream servers. Downstream replica servers inherit update approvals and are not administered separately from the upstream WSUS server.

The following image shows how you might deploy replica WSUS servers in a branch office environment.

Ensurepass 2018 PDF and VCE

says the branch sites have a dedicated high speed link so utalise that instead of the wan link

Question No: 138 – (Topic 5)

You need to recommend a monitoring solution for the file servers in the main office. The solution must meet the company#39;s technical requirements.

What should you include in the recommendation?

  1. File Server Resource Manager (FSRM) active file screens

  2. File Server Resource Manager (FSRM) passive file screens

  3. Performance Monitor alerts

  4. Performance Monitor logs

Answer: B Explanation:

http://technet.microsoft.com/en-us/library/cc732349(WS.10).aspx Active = prevents the saving of restricted files

Passive = monitors for the saving of restricted files

Create file screens to block files that belong to particular file groups from being saved on a volume or in a folder tree. A file screen affects all folders in the designated path. For example, you might create a file screen to prevent users from storing audio and video files in their personal folders on the server.

You can configure File Server Resource Manager to generate e-mail or other notifications when a file screening event occurs.

A file screen can be either active or passive:

-Active screening prevents users from saving unauthorized file types on the server.

-Passive screening monitors users saving specific file types and generates any configured notifications, but does not prevent users from saving files.

Question No: 139 – (Topic 5)

You need to recommend changes to the DFS infrastructure that meet the company#39;s security requirements. What should you recommend?

  1. Modify the NTFS permissions and the share permissions of the DFS targets.

  2. Modify the referrals settings of the DFS namespace and the NTFS permissions of the DFS targets.

  3. Migrate the namespace to Windows Server 2008 mode and modify the referrals settings.

  4. Migrate the namespace to Windows Server 2008 mode and enable accessbased enumeration (ABE).

Answer: D Explanation:

ABE is enabled by default and lets you hide files and folders from users who do not have access to them.

Question No: 140 – (Topic 5)

You need to recommend a solution for deploying App1. The solution must support the company#39;s planned changes. What should you include in the recommendation?

  1. Group Policy Software Installation

  2. Microsoft Application Virtualization (App-V)

  3. Microsoft Enterprise Desktop Virtualization (MED-V)

  4. Microsoft System Center Configuration Manager

Answer: A

Explanation: Requirements include minimize costs when possible Using a GPO to install software is freely available in AD

Assigning Software

You can assign a program distribution to users or computers. If you assign the program to a user, it is installed when the user logs on to the computer. When the user first runs the program, the installation is finalized. If you assign the program to a computer, it is installed when the computer starts, and it is available to all users who log on to the computer. When a user first runs the program, the installation is finalized.

Publishing Software

You can publish a program distribution to users. When the user logs on to the computer, the published program is displayed in the Add or Remove Programs dialog box, and it can be installed from there.

Create a Distribution Point

To publish or assign a computer program, you must create a distribution point on the publishing server:

Log on to the server computer as an administrator.

Create a shared network folder where you will put the Microsoft Windows Installer package (.msi file) that you want to distribute.

Set permissions on the share to allow access to the distribution package.

Copy or install the package to the distribution point. For example, to distribute Microsoft Office XP, run the administrative installation (setup.exe /a) to copy the files to the distribution point.

Create a Group Policy Object

To create a Group Policy object (GPO) to use to distribute the software package:

Start the Active Directory Users and Computers snap-in. To do this, click Start, point to Administrative Tools, and then click Active Directory Users and Computers.

In the console tree, right-click your domain, and then click Properties. Click the Group Policy tab, and then click New.

Type a name for this new policy (for example, Office XP distribution), and then press ENTER.

Click Properties, and then click the Security tab.

Click to clear the Apply Group Policy check box for the security groups that you want to prevent from having this policy applied.

Click to select the Apply Group Policy check box for the groups that you want this policy to apply to.

When you are finished, click OK.

Assign a Package

To assign a program to computers that are running Windows Server 2003, Windows 2000, or Microsoft Windows XP Professional, or to users who are logging on to one of these workstations:

Start the Active Directory Users and Computers snap-in. To do this, click Start, point to Administrative Tools, and then click Active Directory Users and Computers.

In the console tree, right-click your domain, and then click Properties.

Click the Group Policy tab, select the group policy object that you want, and then click Edit. Under Computer Configuration, expand Software Settings.

Right-click Software installation, point to New, and then click Package.

In the Open dialog box, type the full Universal Naming Convention (UNC) path of the shared installer package that you want. For example, \\file server\share\file name.msi. Important Do not use the Browse button to access the location. Make sure that you use the UNC path to the shared installer package.

Click Open.

Click Assigned, and then click OK. The package is listed in the right pane of the Group Policy window.

Close the Group Policy snap-in, click OK, and then quit the Active Directory Users and Computers snap-in.

When the client computer starts, the managed software package is automatically installed.

Publish a Package

To publish a package to computer users and make it available for installation from the Add or Remove Programs tool in Control Panel:

Start the Active Directory Users and Computers snap-in. To do this, click Start, point to Administrative Tools, and then click Active Directory Users and Computers.

In the console tree, right-click your domain, and then click Properties.

Click the Group Policy tab, click the group policy object that you want, and then click Edit. Under User Configuration, expand Software Settings.

Right-click Software installation, point to New, and then click Package.

In the Open dialog box, type the full UNC path of the shared installer package that you want. For example, \\file server\share\file name.msi.

Important Do not use the Browse button to access the location. Make sure that you use the UNC path to the shared installer package.

Click Open.

Click Publish, and then click OK.

The package is listed in the right pane of the Group Policy window.

Close the Group Policy snap-in, click OK, and then quit the Active Directory Users and Computers snap-in.

Test the package:

Note Because there are several versions of Microsoft Windows, the following steps may be different on your computer. If they are, see your product documentation to complete these steps.

Log on to a workstation that is running Windows 2000 Professional or Windows XP Professional by using an account that you published the package to.

In Windows XP, click Start, and then click Control Panel.

Double-click Add or Remove Programs, and then click Add New Programs.

In the Add programs from your network list, click the program that you published, and then click Add. The program is installed.

Click OK, and then click Close. Redeploy a Package

In some cases you may want to redeploy a software package. For example, if you upgrade or modify the package. To redeploy a package:

Start the Active Directory Users and Computers snap-in. To do this, click Start, point to Administrative Tools, and then click Active Directory Users and Computers.

In the console tree, right-click your domain, and then click Properties.

Click the Group Policy tab, click the Group Policy object that you used to deploy the package, and then click Edit.

Expand the Software Settings container that contains the software installation item that you used to deploy the package.

Click the software installation container that contains the package.

In the right pane of the Group Policy window, right-click the program, point to All Tasks, and then click

Redeploy application. You will receive the following message:

Redeploying this application will reinstall the application everywhere it is already installed. Do you want to continue?

Click Yes.

Quit the Group Policy snap-in, click OK, and then quit the Active Directory Users and

Computers snap-in.

Remove a Package

To remove a published or assigned package:

Start the Active Directory Users and Computers snap-in. To do this, click Start, point to Administrative Tools, and then click Active Directory Users and Computers.

In the console tree, right-click your domain, and then click Properties.

Click the Group Policy tab, click the Group Policy object that you used to deploy the package, and then click

Edit.

Expand the Software Settings container that contains the software installation item that you used to deploy the package.

Click the software installation container that contains the package.

In the right pane of the Group Policy window, right-click the program, point to All Tasks, and then click

Remove.

Do one of the following:

Click Immediately uninstall the software from users and computers, and then click OK. Click Allow users to continue to use the software but prevent new installations, and then click OK.

Quit the Group Policy snap-in, click OK, and then quit the Active Directory Users and Computers snap-in.

100% Ensurepass Free Download!
Download Free Demo:70-646 Demo PDF
100% Ensurepass Free Guaranteed!
70-646 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No