getcertified4sure.com

Foolproof microsoft server 2008 server administrator exam 70-646 tips




Exam Code: 70-646 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: PRO: Windows Server 2008, Server Administrator
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-646 Exam.

2021 Oct free training 70-646:

Q11. - (Topic 9) 

You need to recommend the server configurations for the new failover cluster. The configurations must support the company's planned changes. 

Which two actions should you recommend? (Each correct answer presents part of the solution. Choose two.) 

A. From HyperV Manager on each node, configure one virtual network. 

B. From HyperV Manager on one node, configure two virtual networks. 

C. Install one network adapter on each node. Configure the network adapters to use multiple IP addresses. 

D. Install two network adapters on each node. Configure the network adapters to communicate on separate subnets. 

Answer: A,D 

Explanation: 

There's only a need for one virtual network because a virtual network is the same as a virtual switch and there is no requirement for a separate switch your requirement is to have inter cluster network traffic isolated from other network traffic by creating separate subnets you can ensure that cluster related traffic remains on one subnet while regular network traffic is carried on the other subnet 


Q12. - (Topic 15) 

You need to recommend a solution that meets the company's Application provisioning requirements. What should you recommend? 

A. Create a new MEDV workspace. 

B. Publish a new RemoteApp program. 

C. Create an Application compatibility shim. 

D. Package a new Application by using the AppV Sequencer. 

Answer:

Explanation: 

MED-V Benefits The key benefit of MED-V is that it helps enterprises deal with incompatibility between applications and the operating system. For instance, if a user needs to run an early version of Internet Explorer and that version of Internet Explorer is not supported on Windows Vista, the administrator can use MED-V 1.0 to deploy this early version of Internet Explorer to the user as part of a Windows XP virtual image. (And when MED-V 1.0 SP1 becomes available in Q1 of 2010, the user will be able to do the same thing on computers running Windows 7.) The user can then have two copies of Internet Explorer running simultaneously on his desktop—the most recent version (running on the host computer) and the earlier version (running in the MED-V workspace). From the user’s perspective, both copies of Internet Explorer appear as if they were running on the local computer. MED-V does this by allowing users to run legacy applications within a virtual machine that has an earlier version of Microsoft Windows installed. The user can then access these applications either from a virtual desktop (as with Virtual PC 2007 running natively on a system) or by using application windows that are seamlessly integrated into the local desktop of the user’s computer (similar to RemoteApp in Remote Desktop Services). 

MED-V Usage Scenarios 

The key usage scenario for MED-V is resolving application-to-operating system Incompatibility to accelerate the upgrade path to a new operating system. Businesses that need to continue to run legacy line-of-business applications on users’ desktop computers can do so by using Virtual PC. Incompatibility between legacy applications and newer versions of Microsoft Windows can often be a primary blocking issue preventing an enterprise from upgrading to the latest version of Windows, such as Windows Vista, to take advantage of the many new features and enhancements offered by this version. By delivering those applications in a Virtual PC that runs a previous version of the operating system (for example, Windows XP or Windows 2000), MED-V allows administrators to break the tight dependency between a computer’s underlying hardware and the operating system, and it can help remove such blocking issues so that your users can benefit from having the latest version of Windows deployed on their desktop computers. From the user’s perspective, with MED-V, these applications are accessible from the Start menu and appear side by side with regular applications—so there is minimal change to the user experience. App1 is only xp compatible but needs to be available on win7 clients, it also needs to be centrally managed. So Med-V fits the needed requirements 


Q13. - (Topic 1) 

Your network consists of a single Active Directory domain. Users access and share documents by using a DFS namespace. 

You need to recommend a solution to manage user access to documents. The solution must meet the following requirements: 

. Allow for document versioning 

. Allow for online collaboration 

What should you recommend? 

A. File Server Resource Manager (FSRM) 

B. Volume Shadow Copy Service (VSS) 

C. Microsoft SharePoint Foundation 2010 

D. Windows System Resource Manager (WSRM) 

Answer:

Explanation: 

sharepoint allows collaboration and versioning http://www.plusconsulting.com/WhitePapers/SharePoint%202110%20Business%20Value% 20WhitePaper.pdf 


Q14. - (Topic 1) 

Your company has a main office and a branch office. You plan to deploy a Readonly Domain Controller (RODC) in the branch office. 

You need to plan a strategy to manage the RODC. Your plan must meet the following requirements: 

. Allow branch office support technicians to maintain drivers and disks on the RODC . Prevent branch office support technicians from managing domain user accounts 

What should you include in your plan? 

A. Configure the RODC for Administrator Role Separation. 

B. Configure the RODC to replicate the password for the branch office support technicians. 

C. Set NTFS permissions on the Active Directory database to Read & Execute for the branch office support technicians. 

D. Set NTFS permissions on the Active Directory database to Deny Full Control for the branch office support technicians. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc753170%28WS.10%29.aspx 


Q15. - (Topic 17) 

You are evaluating whether to deploy Hyper-V. 

Which technical requirement is NOT met by a HyperV deployment? 

A. Allocate CPU resources between VMs. 

B. Simplify the management of all hardware. 

C. Ensure that the VMs can connect to multiple VLANs. 

D. Minimize the amount of administrative effort required to convert physical servers to VMs. 

Answer:


Most recent transcender 70-646:

Q16. - (Topic 6) 

You need to recommend a solution for the new VMs that supports the company's planned changes. What should you recommend doing before the new VMs are deployed? 

A. Purchase one additional Enterprise license. 

B. Purchase two additional Enterprise licenses. 

C. Deploy an additional physical server that runs Microsoft HyperV Server 2008 R2. 

D. Deploy an additional physical server that runs Windows Server 2008 R2 Enterprise. 

Answer:

Explanation: 

Best I could come up with was the following: Enterprise release includes the license for 4 virtual servers on one physical Server if that physical server is only running hyper V. as it stands the existing server has only 3 VMs leaving on license free, you need a total of 5 VMs running concurrently so you can utilize the one spare that you have. 


Q17. - (Topic 12) 

You need to recommend a solution for deploying the custom Word dictionary. 

What should you include in the recommendation? 

A. Distributed File System (DFS) 

B. Group Policy preferences 

C. Offline servicing 

D. WDS 

Answer:

Explanation: 

http://support.microsoft.com/kb/943729 This article discusses the Group Policy preferences that are new in Windows Server 2008 and how to enable down-level computers to process these new items. Group Policy preferences are made up of more than 20 new Group Policy client-side extensions (CSEs) that expand the range of configurable settings in a Group Policy object (GPO). These new preference extensions are included in the Group Policy Management Editor window of the Group Policy Management Console (GPMC). The kinds of preference items that can be created by using each extension are listed when New is selected for the extension. Examples of the new Group Policy preference extensions include the following: Folder Options Drive Maps Printers Scheduled Tasks Services Start Menu 


Q18. - (Topic 1) 

Your network consists of a single Active Directory forest. The sales department in your company has 600 Windows Server 2008 R2 servers. 

You need to recommend a solution to monitor the performance of the 600 servers. 

Your solution must meet the following requirements: 

. Generate alerts when the average processor usage is higher than 90 percent for 20 minutes. . Automatically adjust the processor monitoring threshold to allow for temporary changes in the workload. 

What should you recommend? 

A. Install Windows System Resource Manager (WSRM) on each server. 

B. Deploy Microsoft System Center Operations Manager (OpsMgr). 

C. Deploy Microsoft System Center Configuration Manager (SysMgr). 

D. Configure Reliability and Performance Monitor on each server 

Answer:

Explanation: 

MCITP Self-Paced Training Kit Exam 70-646 Windows Server Administration: Microsoft System Center Operations Manager 2007 When planning the centralized monitoring and management of large numbers of Windows Server 2008 computers, you should consider implementing Microsoft System Center Operations Manager 2007. System Center Operations Manager 2007 was touched on briefly during Chapter 4, “Application Servers and Services.”Microsoft System Center Operations Manager 2007 allows you to centrally manage and monitor thousands of servers and applications and provides a complete overview of the health of your network environment. System Center Operations Manager 2007 is the most recent version of Microsoft Operations Manager 2005 (MOM). System Center Operations Manager 2007 provides the following features: Proactive alerts that recognize conditions that are likely to lead to failure of critical services, applications, and servers in the future The ability to configure tasks to automatically execute to resolve problems when given events occur The collection of long-term trend data from all servers and applications across the 

organization with the ability to generate comparison reports against current performance Correlation of auditing data generated across the organization, allowing the detection of trends that might not be apparent when examining server auditing data in isolation 


Q19. - (Topic 1) 

... 

Your network consists of a single Active Directory domain. Your main office has an Internet connection. 

Your company plans to open a branch office. The branch office will connect to the main office by using a WAN link. The WAN link will have limited bandwidth. The branch office will not have access to the Internet. The branch office will contain 30 Windows Server 2008 R2 servers. 

You need to plan the deployment of the servers in the branch office. 

The deployment must meet the following requirements: 

Installations must be automated. 

Computers must be automatically activated. 

Network traffic between the offices must be minimized. 

What should you include in your plan? 

A. In the branch office, implement Key Management Service (KMS), a DHCP server, and Windows Deployment Services (WDS). 

B. Use Multiple Activation Key (MAK) Independent Activation on the servers. In the main office, implement a DHCP server and Windows Deployment Services (WDS). 

C. In the main office, implement Windows Deployment Services (WDS). In the branch office, implement a DHCP server and implement the Key Management Service (KMS). 

D. Use Multiple Activation Key (MAK) Independent Activation on the servers. In the main office, implement a DHCP server. In the branch office, implement Windows Deployment Services (WDS). 

Answer:

Explanation: 

The key here is that bandwidth from the branch to the main office is limited and there is no direct link to MS. 

WDS and Product Activation 

Although product activation does not need to occur during the actual installation process, administrators considering using WDS to automate deployment should also consider using volume activation to automate activation. Volume activation provides a simple centralized method that systems administrators can use for the activation of large numbers of deployed servers. Volume activation allows for two types of keys and three methods of activation. The key types are the Multiple Activation Key (MAK) and the Key Management Services (KMS) key. 

Multiple Activation Keys allow activation of a specific number of computers. Each successful activation depletes the activation pool. For example, a MAK key that has 100 activations allows for the activation of 100 computers. The Multiple Activation Key can use the MAK Proxy Activation and the MAK Independent Activation activation methods. MAK Proxy Activation uses a centralized activation request on behalf of multiple products using a single connection to Microsoft’s activation servers. MAK Independent Activation requires that each computer activates individually against Microsoft's activation servers. The Branch office has no internet connection, so MAK is not the solution. 

KMS requires at least 25 computers connecting before activation can occur, and activation must be renewed by reconnecting to the KMS server every 180 days. You can use KMS and MAK in conjunction with one another. The number of computers, how often they connect to the network, and whether there is Internet connectivity determines which solution you should deploy. You should deploy MAK if substantial numbers of computers do not connect to the network for more than 180 days. If there is no Internet connectivity and more than 25 computers, you should deploy KMS. If there is no Internet connectivity and less than 25 computers, you will need to use MAK and activate each system over the telephone. 


Q20. - (Topic 10) 

You need to recommend a process for monitoring the servers. The process must meet the company's technical requirements. 

What should you include in the recommendation? 

A. event subscriptions 

B. Data Collector Sets (DCSs) 

C. Resource Monitor 

D. Microsoft System Center Operations Manager 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc749183.aspx Event Viewer enables you to view events on a single remote computer. However, troubleshooting an issue might require you to examine a set of events stored in multiple logs on multiple computers. Windows Vista includes the ability to collect copies of events from multiple remote computers and store them locally. To specify which events to collect, you create an event subscription. Among other details, the subscription specifies exactly which events will be collected and in which log they will be stored locally. Once a subscription is active and events are being collected, you can view and manipulate these forwarded events as You would any other locally stored events. Using the event collecting feature requires that you configure both the forwarding and the collecting computers. The functionality depends on the Windows Remote Management (WinRM) service and the Windows Event Collector (Wecsvc) service. Both of these services must be running on computers participating in the forwarding and collecting process. To learn about the steps required to configure event collecting and forwarding computers, see Configure Computers to Forward and Collect Events.