getcertified4sure.com

The Only Tip You Need: 70-642 study guide




Exam Code: 70-642 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: TS: Windows Server 2008 Network Infrastructure, Configuring
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-642 Exam.

2021 Nov testout 70-642:

Q41. - (Topic 1) 

Your network contains a file server named Server1 that runs Windows Server 2008 R2. Users report that when they try to open some of the folders in \\server1\folder1, they receive an Access is Denied error message. 

You need to ensure that when the users connect to \\server1\folder1, they only see the files and the folders to which they are assigned permissions. 

Which tool should you use? 

A. Local Security Policy 

B. Share and Storage Management 

C. Windows Explorer 

D. Windows Firewall with Advanced Security 

Answer:

Explanation: 

http://technet.microsoft.com/fr-fr/library/dd772681(v=ws.10).aspx Access-based enumeration displays only the files and folders that a user has permissions to access. Accessbased enumeration is now included in the Windows Server 2008 operating system, and you can enable it by using Share and Storage Management. 


Q42. - (Topic 1) 

Your network contains an Active Directory domain. The domain contains DNS servers that run Windows Server 2008 R2. 

The network has two external links. One link connects to the Internet. The other link directly connects to the network of a partner company. 

The partner companys network is not connected to the Internet. You need to ensure that users on your network can access resources on the partner companys network. The solution must ensure that the users on your network can continue to access resources on the Internet. 

Which two actions should you perform on the DNS servers? (Each correct answer presents a complete solution. Choose two.) 

A. Configure conditional forwarding. 

B. Add a stub zone. 

C. Modify the root hints. 

D. Add a reverse lookup zone. 

E. Add a trust anchor. 

Answer: A,C 


Q43. - (Topic 4) 

Your network contains a RADIUS server named Server1 and a VPN server named Server2. 

You deploy Network Policy and Access Services (NPAS) to a new server named Server3. 

You need to configure Server3 as a RADIUS proxy. The solution must ensure that Server3 accepts authentication requests from Server2 and forwards the requests to Server1. 

Which three actions should you perform on Server3? (Each correct answer presents part of the solution. Choose three.) 

A. Configure a connection request policy. 

B. Create a health policy. 

C. Create a remote RADIUS server group. 

D. Add a RADIUS client. 

E. Configure a network policy. 

Answer: A,C,D 


Q44. - (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the SNMP Service installed. 

You perform an SNMP query against Server1 and discover that the query returns the incorrect identification information. 

You need to change the identification information returned by Server1. 

What should you do? 

A. From the properties of the SNMP Service, modify the Agent settings. 

B. From the properties of the SNMP Service, modify the General settings. 

C. From the properties of the SNMP Trap Service, modify the Logon settings. 

D. From the properties of the SNMP Trap Service, modify the General settings. 

Answer:


Q45. - (Topic 3) 

Your network contains a file server named Server1 that runs Windows Server 2008 R2. 

Server1 hosts a shared folder that stores Microsoft Excel spreadsheets. A new Excel spreadsheet is created each day. 

You need to ensure that all Excel spreadsheets that are older than one month are automatically moved to a different folder. 

What should you do? 

A. Create an Active Directory Rights Management Services (AD RMS) policy template. 

B. Create a quota for the shared folder. 

C. Create a file management task. 

D. Modify the archive attribute of the shared folder. 

Answer:

Explanation: 

File expiration tasks are used to automatically move all files that match certain criteria to a specified expiration directory, where an administrator can then back those files up and delete them. When a file expiration task is run, a new directory is created within the expiration directory, grouped by the server name on which the task was run. The new directory name is based on the name of the file management task and the time it was run. When an expired file is found it is moved into the new directory, while preserving its original directory structure. http://technet.microsoft.com/en-us/library/dd759233.aspx 


Regenerate mcts 70-642:

Q46. - (Topic 3) 

Your network contains an Active Directory domain. 

You deploy Network Access Protection (NAP). 

You need to verify whether VPN clients have Windows Firewall enabled. 

What should you configure? 

A. connection request policies 

B. IKEv2 client connections 

C. Group Policy preferences 

D. the RADIUS Authentication authentication provider 

E. remediation server groups 

F. the Windows Authentication authentication provider 

G. the Windows Accounting accounting provider 

H. the RADIUS Accounting accounting provider 

I. system health validators (SHVs) 

J. health policies 

Answer:

Explanation: 

System health validators (SHVs) define configuration requirements for NAP client computers. All SHVs include five error code conditions. If an error code is returned to the SHV, you can choose to have the SHV evaluate the client as either compliant or noncompliant. http://technet.microsoft.com/en-us/library/dd314150(v=ws.10).aspx 


Q47. - (Topic 4) 

You have a client computer named Computer1. Computer1 uses the 172.16.33.105/20 IP address. 

You plan to add three client computers to the subnet where Computer1 is located. 

You need to identify a valid IP address to assign to the new client computers. The solution must ensure that the new client computers can communicate with Computer1 by using IPv4. 

Which IP address should you identify? (Each correct answer presents part of the solution. Choose three.) 

A. 172.16.29.50 

B. 172.16.47.209 

C. 172.16.50.156 

D. 172.16.30.80 

E. 172.16.35.12 

F. 172.16.49.11 

G. 172.16.45.99 

H. 172.16.31.222 

Answer: B,E,G 

Explanation: The range of the subnet that the 172.16.33.105/20 IP address is in is 

172.16.32.0 to 172.16.47.255. 


Q48. - (Topic 1) 

Your network contains two DHCP servers named Server1 and Server2. On Server1, you create a scope named Scope1. 

You need to ensure that DHCP clients receive IP addresses from the address range in Scope1 if Server1 is unavailable. The solution must prevent both servers from assigning duplicate IP addresses. 

What should you do from the DHCP console? 

A. On Server1, create a superscope. 

B. On Server1, select Scope1, and then run the Split-Scope wizard. 

C. On Server2, create a scope, and then reconcile each scope. 

D. On Server2, create a scope, and then enable Network Access Protection. 

Answer:


Q49. - (Topic 3) 

Your network contains a server named Server1. Server1 has the DHCP server role installed and contains multiple scopes. 

You restore the DHCP database and discover that the active IP address leases are not displayed. You need to ensure that all IP address leases are displayed. 

What should you do? 

A. Reconcile all of the scopes. 

B. Run jetpack.exe dhcp.mdb temp.mdb. 

C. Restart the DHCP Server service. 

D. Authorize Server1. 

Answer:

Explanation: 

Recovery: Restoring DHCP Database from Backup: If the DHCP server database becomes corrupted or is lost, simple recovery is possible by replacing the server database file (Dhcp.mdb), located in the % SystemRoot %\System32\Dhcp folder, with a backup copy of the same file. You can then perform a simple file copy to overwrite the current corrupted database with a backup copy of the same file. 

If DHCP Manager has been used previously to enable backup, you can obtain the backup copy of the server database file located in the % SystemRoot %\System32\Dhcp\Backup folder. As an option, you can also choose to restore the Dhcp.mdb file from a tape backup or other backup media. Before restoring the database file from backup, the DHCP service must first be stopped. Once you have copied the backup file to the % SystemRoot %\System32\Dhcp folder from your preferred backup source, you can restart the DHCP service. 

To stop the DHCP server service, type the following at a command prompt: net stop dhcpserver Once the DHCP service has been stopped, the following procedure can be used to safely restore a backup copy of the database from either backup media or the DHCP service backup folder. First, move the files from your existing DHCP folder to a different folder location, such as \Olddhcp. Be careful to keep the DHCP folder structure intact. For example, type the following set of commands at a command prompt to perform this step: md c:\Olddhcp move % SystemRoot % \system32\DHCP\*.* C:\Olddhcp Next, remove the corrupted server database file. This can also be done at the command prompt: del % SystemRoot % \system32\DHCP\Dhcp.mdb You can then copy the backup database file into the DHCP service folder. The path to be used when performing the actual copy operation varies (as shown in Table 4.15), depending on the specific server version of Windows running on the computer where the DHCP database file is being restored. http://technet.microsoft.com/en-us/library/cc958954.aspx 


Q50. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains two sites named Site1 and Site2. The servers for the sites are configured as shown in the following table. 

Server1 hosts a standard primary zone for contoso.com. Server2 hosts a secondary zone for contoso.com. 

You need to ensure that all DNS replication traffic between Server1 and Server2 is encrypted. 

What should you do? 

A. On Server1, configure DNSSEC for the contoso.com zone. 

B. On Server1, convert the contoso.com zone to an Active Directory-integrated zone. 

C. On each server, create connection security rules. 

D. On each server, enable Encrypting File System (EFS) encryption for the contoso.com.dns file. 

Answer: