It is impossible to pass Microsoft 70-646 exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed Microsoft 70-646 practice questions. You will get a surprising result by our Most up-to-date PRO: Windows Server 2008, Server Administrator practice guides.
Q1. - (Topic 1)
A company has client computers that run Windows 7. The company has Windows Server Update Services (WSUS) 3.0 with Service Pack 2 (SP2) deployed on a server that runs Windows Server 2008 R2.
You are designing an update management solution for the company's client computers. The solution must meet the following requirements:
. Client computers must use WSUS for the installation of updates.
. Only administrators should receive update notifications from WSUS.
You need to design an update management solution that meets the requirements.
What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.)
A. Define the WSUS settings in the Computer Configuration area of the Group Policy Management Console.
B. Define the WSUS settings in the User Configuration area of the Group Policy Management Console.
C. Define the WSUS settings in the User Configuration area of the Local Group Policy on client computers.
D. Define the WSUS settings in the Computer Configuration area of the Local Group Policy on client computers.
Answer: A
Explanation:
FROM Step by Step guide to setting up WSUS 3.0 SP2 http://technet.microsoft.com/en-us/library/cc708519%28v=ws.10%29 or http://blogs.microsoft.co.il/blogs/yanivf/archive/2007/09/23/install-wsus-3-0-stepby-step.aspx
To configure Automatic Updates In Group Policy Object Editor, expand Computer Configuration, expand Administrative Templates, expand Windows Components, and then click Windows Update. In the details pane, double-click Configure Automatic Updates. Click Enabled, and then click one of the following options: Notify for download and notify for install: This option notifies a logged-on administrative user before the download and before the installation of the updates. Auto download and notify for install: This option automatically begins downloading updates and then notifies a logged-on administrative user before installing the updates. Auto download and schedule the install: If Automatic Updates is configured to perform a scheduled installation, you must also set the day and time for the recurring scheduled installation. Allow local admin to choose setting: With this option, local administrators are allowed to use Automatic Updates in Control Panel to select a configuration option of their choice. For example, they can choose their own scheduled installation time. Local administrators are not allowed to disable Automatic Updates. Click OK.
Set Up E-Mail Notifications http://technet.microsoft.com/en-us/library/cc708608%28v=ws.10%29.aspx
In the WSUS Administration console, click Options in the left pane.
In the center pane, click E-Mail Notifications.
Click the General tab.
If you want update notifications, select the Send e-mail notification when new updates are
synchronized check box.
In the Recipients box, type the e-mail addresses of the people who should receive update
notifications.
Separate the names with semi-colons.
If you want status reports, select the Send status reports check box.
In the Frequency box, select either Daily or Weekly.
In the Send reports at box, set the time at which you want status reports to be sent.
In the Recipients box type the e-mail addresses of the people who should receive status
reports, delimited by semicolons.
In the Language box, select the language in which the status reports should be sent.
Click Apply to save these settings.
Q2. - (Topic 18)
You are planning a recovery strategy in the event that a file server is unable to boot into Windows. You need to ensure that file servers can be restored from backups.
What should the recovery strategy include?
A. Deploy backups by using WDS.
B. Boot from the Windows Server 2008 R2 DVD into the Recovery Environment, then restore from file server backups by using WBAdmin.
C. Reinstall Windows Server 2008 R2 from DVD, then restore from file server backups by using Windows Server Backup.
D. Restore from file server backups by using NTBackup.
Answer: A
Explanation:
Thanks to Testy for highlighting this one. NTBackup is not compatible with Server 2008 R2. Your requirements are for remote backup and remote restore. The network has WDS installed and uses PXE boot on the servers so WDS could be used to deploy a backup. Windows Recovery Environment (Windows RE) is an extensible recovery platform based on Windows Preinstallation Environment (Windows PE). When the computer fails to start, Windows automatically fails over into this environment, and the Startup Repair tool in Windows RE automates the diagnosis and repair of an unbootable Windows Vista installation. Furthermore, Windows RE is a starting point for various tools for manual system recovery. The primary audience of this technology includes original equipment manufacturers (OEMs), original device manufacturers (ODMs), and corporate IT professionals. Image-based Recovery from Windows RE In the event that the Windows installation cannot be repaired with Startup Repair or other manual repair steps, Windows RE can be used to launch an image-based recovery tool. User-created Recovery Image Windows Vista provides end users with the ability to create a backup image of their entire operating system. End users can do this by using the Backup tool. The system image can be stored on an external hard disk, on a hard disk partition other than those imaged, or on a DVD. To restore the computer by using this system image, users must launch the restore interface from the list of Windows RE manual tools. Factory-created Recovery Image To facilitate restoring a computer to its factory state, a recovery image can be placed on the Windows RE partition. This eliminates the need for a separate recovery media in most cases. If the Windows image format is used in the manufacturing process, the same operating system image can be used for recovery as well. A computer manufacturer can develop an application by using the Imaging APIs for Windows and the Windows image to restore the operating system volume. This application can be launched from the Windows RE user interface (UI) by using customizations provided by the ODM.
Q3. - (Topic 15)
You need to increase the reliability of the print server on the main campus. What should you do?
A. Create printer pools.
B. Configure printer redirection.
C. Configure printer driver isolation.
D. Change the location of the Spool folder.
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/dd878502%28WS.10%29.aspx Printer driver isolation Prior to Windows Server 2008 R2, the failure of printer driver components has been a main print server support issue—the failure of a printer driver loaded onto the print spooler process would cause the process to fail, which would lead to an outage of the entire printing system. The impact of a spooler failure on a print server is particularly significant because of the number of users and printers that are typically affected. In Windows Server 2008 R2, you can now configure printer driver components to run in an isolated process separate from the printer spooler process. By isolating the printer driver, you can prevent a faulty printer driver from stopping all print operations on a print server, which results in a significant increase in server reliability. In addition to the benefit of improving overall printing system stability, this new feature provides a means to isolate new drivers for testing and debugging, and to identify which printer drivers have been causing spooler failures.
Q4. - (Topic 13)
You need to recommend a solution for promoting the RODC in the new branch office.
What should you include in the recommendations?
A. Implement the Windows Search service and implement a custom iFilter.
B. Implement File Server Resource Manager (FSRM) and configure file classifications.
C. Implement Microsoft SharePoint Foundation 2010 and create a custom workflow.
D. Implement a Distributed File System (DFS) namespace and configure folder targets.
Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/ee344836%28WS.10%29.aspx What is the File Classification Infrastructure? The Windows Server 2008 R2 File Classification Infrastructure (FCI) automates classification processes so that you can manage your data more effectively. You can save money and reduce risk by storing and retaining files based on their business value or impact. The built-in solution for file classification provides expiration, custom tasks, and reporting. The extensible infrastructure enables you to meet additional customer classification needs by building rich end-to-end classification solutions that are built on the classification foundation of Windows Server in a consistent and supported way and within the existing Windows file serving platforms.
Q5. - (Topic 5)
You need to recommend a monitoring solution for the file servers in the main office. The solution must meet the company's technical requirements.
What should you include in the recommendation?
A. File Server Resource Manager (FSRM) active file screens
B. File Server Resource Manager (FSRM) passive file screens
C. Performance Monitor alerts
D. Performance Monitor logs
Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/cc732349%28WS.10%29.aspx Active = prevents the saving of restricted files Passive = monitors for the saving of restricted files
Create file screens to block files that belong to particular file groups from being saved on a
volume or in a folder tree. A file screen affects all folders in the designated path. For
example, you might create a file screen to prevent users from storing audio and video files
in their personal folders on the server.
You can configure File Server Resource Manager to generate e-mail or other notifications
when a file screening event occurs.
A file screen can be either active or passive:
-Active screening prevents users from saving unauthorized file types on the server.
-Passive screening monitors users saving specific file types and generates any configured
notifications, but does not prevent users from saving files.
Q6. - (Topic 1)
Your company purchases 15 new 64bit servers as follows:
...
Five of the servers have a single processor.
Five of the servers have a single dual core processor.
Five of the servers have two quad core processors.
You plan to deploy Windows Server 2008 R2 on the new servers by using Windows Deployment Services (WDS). You need to recommend a WDS install image strategy that meets the following requirements:
..
Minimizes the number of install images Supports the deployment of Windows Server 2008 R2
What should you recommend?
A. one install image file that contains three install images
B. one install image file that contains a single install image
C. two install image files that each contain a single install image
D. three install image files that each contain a single install image
Answer: B
Explanation:
You only need one image per processor type Windows Deployment Services Images Windows Deployment Services uses two different types of images: install images and boot images. Install images are the operating system images that will be deployed to Windows Server 2008 or Windows Vista client computers. A default installation image is located in the \Sources directory of the Windows Vista and Windows Server 2008 installation DVDs. If you are using WDS to deploy Windows Server 2008 to computers with different processor architectures, you will need to add separate installation images for each architecture to the WDS server. Architecture-specific images can be found on the architecture-specific installation media. For example, the Itanium image is located on the Itanium installation media and the x64 default installation image is located on the x64 installation media. Although you can create custom images, you only need to have one image per processor architecture. For example, deploying Windows Server 2008 Enterprise Edition x64 to a computer with 1 x64 processor and to a computer with 8 x64 processors in SMP configuration only requires access to the default x64 installation image. Practice exercise 2 at the end of this lesson covers the specifics ol adding a default installation image to a WDS server.
Q7. - (Topic 19)
You need to recommend a solution to migrate shared printers from the print server at Wingtip Toys to the print server at Tailspin Toys.
What should you recommend?
A. On the TT-PRINT01 server, run the printmig.exe command-line tool
B. On the WT-PRINT01 server, run the printbrm.exe command-line tool
C. On the WT-PRINT01 server, run the printmig.exe command-line tool
D. On the TT-PRINT01 server, run the printbrm.exe command-line tool
Answer: D
Explanation:
you are moving from a 2003 to a 2008 server so option B wont work coz WT-print01 is the 2003 server you can export print queues, printer settings, printer ports, and language monitors, and then import them on another print server running a Windows operating system. This is an efficient way to consolidate multiple print servers or replace an older print server.
Print Migrator 3.1 is no longer supported by Microsoft. The Printer Migration Wizard and the Printbrm.exe command-line tool were introduced in Windows 7 to replace it. For more information about this decision, see the blog Ask the Performance Team (http://blogs.technet.com/askperf/archive/2008/10/17/why-printmig-3-1-isretired.aspx).
Q8. - (Topic 13)
You are evaluating whether to add an iSCSI target in the main office to add storage to the file servers. Which technical requirement cannot be met when using an iSCSI target?
A. Ensure that the data on the file servers is protected by using BitLocker.
B. Ensure that the file servers can access additional storage as a local drive.
C. Ensure that new storage solutions are supported by Windows Failover Clustering.
D. Ensure that storage can be provisioned without causing any downtime of the file servers.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/ee449438%28WS.10%29.aspx
Q9. - (Topic 11)
You need to recommend the minimum number of logical unit numbers (LUNs) that must be provisioned for Cluster1. The recommendation must support the company's planned changes.
Which number should you recommend?
A. 1
B. 2
C. 8
D. 9
Answer: B
Explanation:
LUN Stands for "Logical Unit Number." LUNs are used to identify SCSI devices, such as
external hard drives, connected to a computer. Each device is assigned a LUN, from 0 to 7,
which serves as the device's unique address.
LUNs can also be used for identifying virtual hard disk partitions, which are used in RAID
configurations. For example, a single hard drive may be partitioned into multiple volumes.
Each volume can then be assigned a unique LUN.
A failover cluster is a group of independent computers that work together to increase the
availability of applications and services. The clustered servers (called nodes) are
connected by physical cables and by software. If one of the cluster nodes fails, another
node begins to provide service (a process known as failover).
Users experience a minimum of disruptions in service.
In simple terms, the quorum for a cluster is the number of elements that must be online for
that cluster to continue running. In effect, each element can cast one “vote” to determine
whether the cluster continues running. The voting elements are nodes or, in some cases, a
disk witness or file share witness. Each voting element (with the exception of a file share
witness) contains a copy of the cluster configuration, and the Cluster service works to keep
all copies synchronized at all times.
There are four quorum modes:
Node Majority: Each node that is available and in communication can vote. The cluster
functions only with a majority of the votes, that is, more than half.
Node and Disk Majority: Each node plus a designated disk in the cluster storage (the “disk
witness”) can vote, whenever they are available and in communication. The cluster
functions only with a majority of the votes, that is, more than half.
Node and File Share Majority: Each node plus a designated file share created by the
administrator (the “file share witness”) can vote, whenever they are available and in communication. The cluster functions only with a majority of the votes, that is, more than half. No Majority: Disk Only: The cluster has quorum if one node is available and in communication with a specific disk in the cluster storage.
Choosing the quorum mode for a particular cluster
The following table describes clusters based on the number of nodes and other cluster characteristics, and lists the quorum mode that is recommended in most cases. A “multi-site” cluster is a cluster in which an investment has been made to place sets of nodes and storage in physically separate locations, providing a disaster recovery solution.
as the Quorum will be set to Node And Disk Majority this means we need an even number of nodes which we have (node1 & node2)
Q10. - (Topic 15)
You need to recommend changes to the file server on the main campus that meet the company's technical requirements.
What should you include in the recommendation?
A. Encrypting File System (EFS)
B. NTFS permissions
C. Syskey
D. Windows BitLocker Drive Encryption (BitLocker)
Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/cc731549%28WS.10%29.aspx BitLocker Drive Encryption allows you to encrypt all data stored on the Windows operating system volume and configured data volumes, and by using a Trusted Platform Module (TPM), it can also help ensure the integrity of early startup components. BitLocker was first introduced with Windows Vista and Windows Server 2008 and subsequently updated with the release of Windows 7 and Windows Server 2008 R2.
Topic 16, Proseware, Inc
Scenario
COMPANY OVERVIEW
Proseware, Inc. is a publishing company that has a main office and a branch office. The main office is located in New York. The branch office is located in Sydney. The main office has 5,000 users. The branch office has 1,000 users.
PLANNED CHANGES
Proseware plans to deploy a new 64-bit Application named App2 to 10 users in the branch office. Only members of the local Administrators group can run App2.
Proseware is evaluating whether to deploy virtual desktop pools. The virtual desktop pools
must meet the following requirements: Apply the settings in GPO1 to the virtual machines (VMs). Prevent the VMs from receiving the Automatic Updates settings from GP02, Ensure that only the host VM is affected if a virtual hard disk (VHD) file becomes corrupt. Minimize the amount of storage used to support the VMs. Minimize the amount of memory and CPU resources used by the VMs. Minimize administrative effort.
EXISTING ENVIRONMENT
All servers run either Windows Server 2008 or Windows Server 2008 R2. All of the client
computers in the main office run Windows 7. All of the client computers in the branch office
run Windows XP (x86) with Service Pack 3 (SP3).
All of the client computers in the main office are configured as Microsoft Enterprise Desktop
Visualization (MED-V) and Microsoft Application Virtualization (App-V) clients.
A two-node Hyper-V cluster is deployed in the main office. The cluster uses Clustered
Shared Volumes.
Existing Active Directory/Directory Services
The network contains a single Active Directory domain named proseware.com. The functional level of the forest is Windows Server 2008.
... ...
The relevant organizational units (OUs) for the domain are configured as shown in the following table.
.......
A custom Group Policy object (GPO) named GPO1 is linked to the domain, GPO1 contains corporate computer security settings.
A custom GPO named GP02 is linked to both office OUs. GP02 contains Windows Server Update Services (WSUS) settings.
Existing Network Infrastructure
Each office has servers that have the following server roles or role services installed:
WSUS
Hyper-V
File Services
Remote Desktop Web Access (RD Web Access)
Remote Desktop Session Host (RD Session Host)
Remote Desktop Virtualization Host (RD Virtualization Host)
Remote Desktop Connection Broker (RD Connection Broker)
REQUIREMENTS
Technical Requirements
When users interactively logs on to any of the client computers in the branch office, they must automatically receive the local administrator rights to that computer. When users logs off, they must lose the administrator rights.
The disk space on all file servers must be monitored. If any file server has less than 20% free disk space on a volume, a script must run that deletes temporary files.
Problem Statements
The main office has a shared folder named Legal. The Legal share is only accessed by users in the legal department. Legal department users report that it takes a long time to locate files in the Legal share by using keyword searches.