getcertified4sure.com

Ultimate Guide: testking 70-640




Cause all that matters here is passing the Microsoft 70-640 exam. Cause all that you need is a high score of 70-640 TS: Windows Server 2008 Active Directory. Configuring exam. The only one thing you need to do is downloading Pass4sure 70-640 exam study guides now. We will not let you down with our money-back guarantee.

2021 Oct cbt nuggets for 70-640:

Q161. ABC.com has a network that is comprise of a single Active Directory Domain. 

As an administrator at ABC.com, you install Active Directory Lightweight Directory Services (AD LDS) on a server that runs Windows Server 2008. To enable Secure Sockets Layer (SSL) based connections to the AD LDS server, you install certificates from a trusted Certification Authority (CA) on the AD LDS server and client computers. 

Which tool should you use to test the certificate with AD LDS? 

A. Ldp.exe 

B. Active Directory Domain services 

C. ntdsutil.exe 

D. Lds.exe 

E. wsamain.exe 

F. None of the above 

Answer: A 

Explanation: 

http://technet.microsoft.com/en-us/library/cc725767%28v=ws.10%29.aspx Appendix A: Configuring LDAP over SSL Requirements for AD LDS The Lightweight Directory Access Protocol (LDAP) is used to read from and write to Active Directory Lightweight Directory Services (AD LDS). By default, LDAP traffic is not transmitted securely. You can make LDAP traffic confidential and secure by using Secure Sockets Layer (SSL) / Transport Layer Security (TLS) technology. Step 3: Connect to the AD LDS instance over LDAPS using Ldp.exe To test your server authentication certificate, you can open Ldp.exe on the computer that is running the AD LDS instance and then connect to this AD LDS instance that has the SSL option enabled. 


Q162. Your network contains a domain controller that runs Windows Server 2008 R2. You run the following command on the domain controller: 

dsamain.exe -dbpath c:\$SNAP_201006170326_VOLUMEC$\Windows\NTDS\ntds.dit -ldapport 389 -allowNonAdminAccess 

The command fails. 

You need to ensure that the command completes successfully. 

How should you modify the command? 

A. Include the path to Dsamain. 

B. Change the value of the -dbpath parameter. 

C. Change the value of the -ldapport parameter. 

D. Remove the allowNonAdminAccess 

Answer: C 

Explanation: MS Press - Self-Paced Training Kit (Exam 70-640) (2nd Edition, July 2012) page 690 Use the AD DS database mounting tool to load the snapshot as an LDAP server. dsamain -dbpath c:\$SNAP_datetime_VOLUMEC$\windows\ntds\ntds.dit -ldapport portnumber Be sure to use ALL CAPS for the -dbpath value and use any number beyond 40,000 for the 

-ldapport value to ensure that you do not conflict with AD DS. 

Also note that you can use the minus (–) sign or the slash (/) for the options in the 

command. 


Q163. You have a domain controller named DC1 that runs Windows Server 2008 R2. DC1 is 

configured as a DNS Server for contoso.com. 

You install the DNS Server role on a member server named Server1 and then you create a 

standard secondary zone for contoso.com. 

You configure DC1 as the master server for the zone. 

You need to ensure that Server1 receives zone updates from DC1. 

What should you do? 

A. On DC1, modify the permissions of contoso.com zone. 

B. On Server1, add a conditional forwarder. 

C. On DC1, modify the zone transfer settings for the contoso.com zone. 

D. Add the Server1 computer account to the DNSUpdateProxy group. 

Answer: C 

Explanation: http://technet.microsoft.com/en-us/library/cc771652.aspx 

Modify Zone Transfer Settings You can use the following procedure to control whether a zone will be transferred to other servers and which servers can receive the zone transfer. 

To modify zone transfer settings using the Windows interface 

1. Open DNS Manager. 

2. Right-click a DNS zone, and then click Properties. 

3. On the Zone Transfers tab, do one of the following: 

To disable zone transfers, clear the Allow zone transfers check box. 

To allow zone transfers, select the Allow zone transfers check box. 

4. If you allowed zone transfers, do one of the following: 

To allow zone transfers to any server, click To any server. 

To allow zone transfers only to the DNS servers that are listed on the Name Servers tab, 

click Only to servers listed on the Name Servers tab. 

To allow zone transfers only to specific DNS servers, click Only to the following servers, 

and then add the IP address of one or more DNS servers. 


Q164. Your company has an Active Directory domain. You have a two-tier PKI infrastructure that contains an offline root CA and an online issuing CA. The Enterprise certification authority is running Windows Server 2008 R2. 

You need to ensure users are able to enroll new certificates. 

What should you do? 

A. Renew the Certificate Revocation List (CRL) on the root CA. Copy the CRL to the CertEnroll folder on the issuing CA. 

B. Renew the Certificate Revocation List (CRL) on the issuing CA, Copy the CRL to the SysternCertificates folder in the users' profile. 

C. Import the root CA certificate into the Trusted Root Certification Authorities store on all client workstations. 

D. Import the issuing CA certificate into the Intermediate Certification Authorities store on all client workstations. 

Answer: A 

Explanation: 

http://social.technet.microsoft.com/wiki/contents/articles/2900.offline-root-certification-authority-ca.aspx Offline Root Certification Authority (CA) A root certification authority (CA) is the top of a public key infrastructure (PKI) and generates a self-signed certificate. This means that the root CA is validating itself (self-validating). This root CA could then have subordinate CAs that effectively trust it. The subordinate CAs receive a certificate signed by the root CA, so the subordinate CAs can issue certificates that are validated by the root CA. This establishes a CA hierarchy and trust path. CA Compromise If a root CA is in some way compromised (broken into, hacked, stolen, or accessed by an unauthorized or malicious person), then all of the certificates that were issued by that CA are also compromised. Since certificates are used for data protection, identification, and authorization, the compromise of a CA could compromise the security of an entire organizational network. For that reason, many organizations that run internal PKIs install their root CA offline. That is, the CA is never connected to the company network, which makes the root CA an offline root CA. Make sure that you keep all CAs in secure areas with limited access. To ensure the reliability of your CA infrastructure, specify that any root and non-issuing intermediate CAs must be offline. A non-issuing CA is one that is not expected to provide certificates to client computers, network devices, and so on. This minimizes the risk of the CA private keys becoming compromised, which would in turn compromise all the certificates that were issued by the CA. How Do Offline CAs issue certificates? Offline root CAs can issue certificates to removable media devices (e.g. floppy disk, USB drive, CD/DVD) and then physically transported to the subordinate CAs that need the certificate in order to perform their tasks. If the subordinate CA is a non-issuing intermediate that is offline, then it will also be used to generate a certificate and that certificate will be placed on removable media. Each CA receives its authorization to issue certificates from the CA directly above it in the CA hierarchy. However, you can have multiple CAs at the same level of the CA hierarchy. Issuing CAs are typically online and used to issue certificates to client computers, network devices, mobile devices, and so on. Do not join offline CAs to an Active Directory Domain Services domain Since offline CAs should not be connected to a network, it does not make sense to join them to an Active Directory Domain Services (AD DS) domain, even with the Offline Domain Join [This link is external to TechNet Wiki. It will open in a new window.] option introduced with Windows 7 and Windows Server 2008 R2. Furthermore, installing an offline CA on a server that is a member of a domain can cause problems with a secure channel when you bring the CA back online after a long offline period. This is because the computer account password changes every 30 days. You can get around this by problem and better protect your CA by making it a member of a workgroup, instead of a domain. Since Enterprise CAs need to be joined to an AD DS domain, do not attempt to install an offline CA as a Windows Server Enterprise CA. http://technet.microsoft.com/en-us/library/cc740209%28v=ws.10%29.aspx Renewing a certification authority A certification authority may need to be renewed for either of the following reasons: Change in the policy of certificates issued by the CA Expiration of the CA's issuing certificate 


Q165. Your company has a main office and five branch offices that are connected by WAN links. The company has an Active Directory domain named contoso.com. 

Each branch office has a member server configured as a DNS server. All branch office DNS servers host a secondary zone for contoso.com. 

You need to configure the contoso.com zone to resolve client queries for at least four days in the event that a WAN link fails. 

What should you do? 

A. Configure the Expires after option for the contoso.com zone to 4 days. 

B. Configure the Retry interval option for the contoso.com zone to 4 days. 

C. Configure the Refresh interval option for the contoso.com zone to 4 days. 

D. Configure the Minimum (default) TTL option for the contoso.com zone to 4 days. 

Answer: A 

Explanation: 

http://technet.microsoft.com/en-us/library/cc816704%28v=ws.10%29.aspx 

Adjust the Expire Interval for a Zone 

You can use this procedure to adjust the expire interval for a Domain Name System (DNS) 

zone. Other DNS servers that are configured to load and host the zone use the expire 

interval to determine when zone data expires if it is not successfully transferred. By default, 

the expire interval for each zone is set to one day. 

You can complete this procedure using either the DNS Manager snap-in or the dnscmd 

command-line tool. 

To adjust the expire interval for a zone using the Windows interface 

1. Open DNS Manager. To open DNS Manager, click Start, point to Administrative Tools, and then click DNS. 

2. In the console tree, right-click the applicable zone, and then click Properties. 

3. On the General tab, verify that the zone type is either Primary or Active Directory-integrated. 

4. Click the Start of Authority (SOA) tab. 

5. In Expires after, click a time period in minutes, hours, or days, and then type a number in the text box. 

6. Click OK to save the adjusted interval. 


70-640 exam prep

Replace 70-640 pdf:

Q166. Your network contains a server named Server1 that runs Windows Server 2008 R2. 

You create an Active Directory Lightweight Directory Services (AD LDS) instance on Server1. 

You need to create an additional AD LDS application directory partition in the existing instance. 

Which tool should you use? 

A. Adaminstall 

B. Dsadd 

C. Dsmod 

D. Ldp 

Answer: D 

Explanation: 

http://technet.microsoft.com/en-us/library/cc755251.aspx Create an Application Directory Partition You use Ldp.exe to add a new application directory partition to an existing instance of Active Directory Lightweight Directory Services (AD LDS). 


Q167. You need to purge the list of user accounts that were authenticated on a read-only domain 

controller (RODC). 

What should you do? 

A. Run the repadmin.exe command and specify the /prp parameter. 

B. From Active Directory Sites and Services, modify the properties of the RODC computer object. 

C. From Active Directory Users and Computers, modify the properties of the RODC computer object. 

D. Run the dsrm.exe command and specify the -u parameter. 

Answer: A 

Explanation: 

http://technet.microsoft.com/en-us/library/rodc-guidance-for-administering-the-password-replication-policy.aspx 

Clearing the authenticated accounts list 

In addition to reviewing the list of authenticated users, you may decide to periodically clean up the list of accounts that are authenticated to the RODC. Cleaning up this list may help you more easily determine the new accounts that have authenticated through the RODC. 

Membership in the Domain Admins group of the domain in which the RODC is a member, or equivalent, is the minimum required to complete this procedure. 

To clear all entries from the list, run the command repadmin /prp delete <hostname> auth2 /all. 

Substitute the actual host name of the RODC that you want to clear. For example, if you want to clear the list of authenticated accounts for RODC2, type repadmin /prp delete rodc2 auth2 /all, and then press ENTER. 


Q168. Your network contains an Active Directory domain named contoso.com. The domain contains the servers shown in the following table. 


The functional level of the forest is Windows Server 2003. The functional level of the domain is Windows Server 2003. 

DNS1 and DNS2 host the contoso.com zone. 

All client computers run Windows 7 Enterprise. 

You need to ensure that all of the names in the contoso.com zone are secured by using DNSSEC. 

What should you do first? 

A. Change the functional level of the forest. 

B. Change the functional level of the domain. 

C. Upgrade DC1 to Windows Server 2008 R2. 

D. Upgrade DNS1 to Windows Server 2008 R2. 

Answer: D 

Explanation: 

http://technet.microsoft.com/en-us/library/ee683904%28v=ws.10%29.aspx 

DNS Security Extensions (DNSSEC) 

What are the major changes? 

Support for Domain Name System Security Extensions (DNSSEC) is introduced in 

Windows Server. 2008 R2 and Windows. 7. With Windows Server 2008 R2 DNS server, 

you can now sign and host DNSSECsigned zones to provide security for your DNS 

infrastructure. 

The following changes are available in DNS server in Windows Server 2008 R2: 

Ability to sign a zone and host signed zones. 

Support for changes to the DNSSEC protocol. 

Support for DNSKEY, RRSIG, NSEC, and DS resource records. 

The following changes are available in DNS client in Windows 7: 

Ability to indicate knowledge of DNSSEC in queries. 

Ability to process the DNSKEY, RRSIG, NSEC, and DS resource records. 

Ability to check whether the DNS server with which it communicated has performed 

validation on the client’s behalf. The DNS client’s behavior with respect to DNSSEC is controlled through the Name Resolution Policy Table (NRPT), which stores settings that define the DNS client’s behavior. The NRPT is typically managed through Group Policy. What does DNSSEC do? DNSSEC is a suite of extensions that add security to the DNS protocol. The core DNSSEC extensions are specified in RFCs 4033, 4034, and 4035 and add origin authority, data integrity, and authenticated denial of existence to DNS. In addition to several new concepts and operations for both the DNS server and the DNS client, DNSSEC introduces four new resource records (DNSKEY, RRSIG, NSEC, and DS) to DNS. In short, DNSSEC allows for a DNS zone and all the records in the zone to be cryptographically signed. When a DNS server hosting a signed zone receives a query, it returns the digital signatures in addition to the records queried for. A resolver or another server can obtain the public key of the public/private key pair and validate that the responses are authentic and have not been tampered with. In order to do so, the resolver or server must be configured with a trust anchor for the signed zone, or for a parent of the signed zone. 


Q169. One of the remote branch offices is running a Windows Server 2008 read only domain controller (RODC). For security reasons you don't want some critical credentials like (passwords, encryption keys) to be stored on RODC. 

What should you do so that these credentials are not replicated to any RODC's in the forest? (Select 2) 

A. Configure RODC filtered attribute set on the server 

B. Configure RODC filtered set on the server that holds Schema Operations Master role. 

C. Delegate local administrative permissions for an RODC to any domain user without granting that user any user rights for the domain 

D. Configure forest functional level server for Windows server 2008 to configure filtered attribute set. 

E. None of the above 

Answer: B,D 

Explanation: 

http://technet.microsoft.com/en-us/library/cc753223.aspx Adding attributes to the RODC filtered attribute set The RODC filtered attribute set is a dynamic set of attributes that is not replicated to any RODCs in the forest. You can configure the RODC filtered attribute set on a schema master that runs Windows Server 2008. When the attributes are prevented from replicating to RODCs, that data cannot be exposed unnecessarily if an RODC is stolen or compromised. A malicious user who compromises an RODC can attempt to configure it in such a way that it tries to replicate attributes that are defined in the RODC filtered attribute set. If the RODC tries to replicate those attributes from a domain controller that is running Windows Server 2008, the replication request is denied. However, if the RODC tries to replicate those attributes from a domain controller that is running Windows Server 2003, the replication request could succeed. Therefore, as a security precaution, ensure that forest functional level is Windows Server 2008 if you plan to configure the RODC filtered attribute set. When the forest functional level is Windows Server 2008, an RODC that is compromised cannot be exploited in this manner because domain controllers that are running Windows Server 2003 are not allowed in the forest. 


Q170. You need to ensure that domain controllers only replicate between domain controllers in adjacent sites.What should you configure from Active Directory Sites and Services? 

A. From the IP properties, select Ignore all schedules. 

B. From the IP properties, select Disable site link bridging. 

C. From the NTDS Settings object, manually configure the Active Directory Domain Services connection objects. 

D. From the properties of the NTDS Site Settings object, configure the Inter-Site Topology Generator for each site. 

Answer: B 

Explanation: 

http://www.omnisecu.com/windows-2003/active-directory/what-is-site-link-bridge.htm What is Site Link Bridge and How to create Site Link Bridge A site link bridge connects two or more site links. A site link bridge enables transitivity between site links. Each site link in a bridge must have a site in common with another site link in the bridge. By default, all site links are transitive and it is recommended to keep transitivity enabled by not changing the default value of "Bridge all site links" (enabled by default). 


C:\Documents and Settings\usernwz1\Desktop\1.PNG 

We may need to disable "Bridge all site links" and create a site link bridge design if 

. When the IP network is not fully routed. 

. When we need to control the replication flow in Active Directory.