|PDF Version||Software Version|
100% Guarantee on Products High Success Rate, supported by our 99.3% pass rate history and money back guarantee should you fail your exam.
Updated regularly Get hold of Updated Exam Materials Every time. Free updates without any extra charges to the actual exam.
70-646 PDF Questions & Answers Available in a universal Adobe PDF format. Portable and printable anywhere anytime.
Quality and Value Exact Exam Questions with Correct Answers, verified by Experts with years of Experience in IT Field.
Customizable Testing Engine Simulates a real world exam environment to prepare you for 70-646 Success.
Unlimited Practice 70-646 Exam Re-takes Practice Until you get it right. With options to Highlight missed questions, you can analyse your mistakes and prepare for Ultimate 70-646 Success.
Special Promotion More than 30% Discount for Royal Pack.
Our knowledgeable specialists compile your Microsoft certification practice dumps based on the syllabus regarding Microsoft Microsoft real exam that you will find all the key items and objectives. The Microsoft 70-646 exam questions as well as answers are updated regularly inside accordance with the Microsoft certification true exam. You will find your Microsoft practice demos quite beneficial, precise and accurate.
Q51. - (Topic 14)
You need to recommend a strategy for recovering objects deleted from Active Directory that supports the planned changes.
What should you include in the recommendation? (Each correct answer presents part of the solution. Choose two.)
A. Active Directory Recycle Bin
B. Active Directory snapshots
C. non-authoritative restores
D. tombstone reanimation
The domain level is only server 2008 so recycle bin isn't available. http://technet.microsoft.com/en-us/library/cc753609%28WS.10%29.aspx This guide shows how you can use an improved version of Ntdsutil and a new Active Directory. database mounting tool in Windows Server. 2008 to create and view snapshots of data that is stored in Active Directory Domain Services (AD DS) or Active Directory Lightweight Directory Services (AD LDS), without restarting the domain controller or AD LDS server. A snapshot is a shadow copy—created by the Volume Shadow Copy Service (VSS)—of the volumes that contain the Active Directory database and log files.
The Active Directory database mounting tool (Dsamain.exe) can improve recovery processes for your organization by providing a means to compare data as it exists in snapshots that are taken at different times so that you can better decide which data to restore after data loss. This eliminates the need to restore multiple backups to compare the Active Directory data that they contain.
This guide provides step-by-step instructions for using the Active Directory database mounting tool, including creating, listing, and mounting snapshots of AD DS; preparing them for viewing as a Lightweight Directory Access Protocol (LDAP) server; and viewing the data itself.
If you have some idea which organizational unit (OU) or objects were deleted, you can look up the deleted objects in the snapshots and record the attributes and back-links that belonged to the deleted objects. You can reanimate these objects by using the tombstone reanimation feature on a domain controller in your production environment. Then, you must manually repopulate these objects with the stripped attributes and back-links as identified in the snapshots. For more information about tombstone reanimation, see Reanimating Active Directory Tombstone Objects (http://go.microsoft.com/fwlink/?LinkID=116204).
Q52. - (Topic 1)
Your network consists of an Active Directory domain. The domain controllers run Windows Server 2008 R2. Client computers run Windows 7.
You need to implement Encrypting File System (EFS) for all client computers.
You want to achieve this goal while meeting the following requirements:
. You must minimize the amount of data that is transferred across the network when
a user logs on to or off from a client computer. . Users must be able to access their EFS certificates on any client computers. . If a client computer's disk fails, EFS certificates must be accessible.
What should you do?
A. Enable credential roaming.
B. Enable roaming user profiles.
C. Enable a Data Recovery Agent.
D. Issue smart cards to all users.
Configuring Credential Roaming
Credential roaming allows for the storage of certificates and private keys within Active Directory. For example, a user’s encrypting file system certificate can be stored in Active Directory and provided to the user when she logs on to different computers within the domain. The same EFS certificate will always be used to encrypt files.
This means that the user can encrypt files on an NTFS-formatted USB storage device on one computer and then decrypt them on another, because the EFS certificate will be transferred to the second computer’s certificate store during the logon process.Credential roaming also allows for all of a user’s certificates and keys to be removed when he logs off of the computer.
Credential roaming is enabled through the Certificate Services Client policy, located under User Configuration\\Policies\\Windows Settings\\Security Settings\\Public Key Policies and shown in Figure 10-4.
Figure 10-4Credential Roaming Policy
Credential roaming works in the following manner. When a user logs on to a client
computer in a domain where the Credential Roaming Policy has been enabled, the
certificates in the user’s store on the client computer are compared to certificates stored for
the user within Active Directory.
If the certificates in the user’s certificate store are up to date, no further action is taken.
If more recent certificates for the user are stored in Active Directory, these credentials are
copied to the client computer.
If more recent certificates are located in the user’s store, the certificates stored in Active
Directory are updated.
Credential roaming synchronizes and resolves any conflicts between certificates and
private keys from any number of client computers that a user logs on to, as well as
certificates and private keys stored within Active Directory. Credential roaming is triggered
whenever a private key or certificate in the local certificate store changes, whenever the
user locks or unlocks a computer, and whenever Group Policy refreshes. Credential
roaming is supported on Windows Vista, Windows Server 2008, Windows XP SP2, and
Windows Server 2003
MORE INFO More on credential roaming
For more information on configuring credential roaming, consult the following TechNet
Q53. - (Topic 1)
A company has 10,000 client computers that run Windows 7. The company has a single domain Active Directory Domain Services (AD DS) forest with domain controllers that run Windows Server 2008 R2. Users have local administrative rights on client computers.
You need to design a Group Policy solution that deploys a printer and enforces printer settings.
What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.)
A. Use the Local Security Policy.
B. Use Group Policy preferences (GPPs).
C. Use a Group Policy object (GPO) Windows setting.
D. Use Starter Group Policy objects (GPOs).
Group Policy preferences, new for the Windows Server 2008 operating system, include more than 20 new Group Policy extensions that expand the range of configurable settings within a Group Policy object (GPO). These new extensions are included in the Group Policy Management Editor window of the Group Policy Management Console (GPMC), under the new Preferences item. Examples of the new Group Policy preference extensions include folder options, mapped drives, printers, scheduled tasks, services, and Start menu settings.
In addition to providing significantly more coverage, better targeting, and easier management, Group Policy preferences enable you to deploy settings to client computers without restricting the users from changing the settings. This capability provides you with the flexibility to decide which settings to enforce and which settings to not enforce. You can deploy settings that you do not want to enforce by using Group Policy preferences.
System requirements and installation steps To use Group Policy preferences, complete the following steps: Install the set of client-side extensions (CSEs) on client computers. Supported operating systems: Windows Vista RTM or later, Windows XP with Service Pack 2 or later, Windows Server 2003 with Service Pack 1 or later Download locations: Windows Vista (x86): http://go.microsoft.com/fwlink/?LinkId=111859Windows Vista (x64): http://go.microsoft.com/fwlink/?LinkID=111857Windows XP (x86): http://go.microsoft.com/fwlink/? LinkId=111851Windows XP (x64): http://go.microsoft.com/fwlink/?LinkId=111862Windows Server 2003 (x86): http://go.microsoft.com/fwlink/?LinkId=111852Windows Server 2003 (x64): http://go.microsoft.com/fwlink/? LinkId=111863 For more information, see Article 943729 in the Microsoft Knowledge Base. Install the XMLLite low-level XML parser on client computers that are not running Windows Vista. Supported operating systems: Windows XP SP2 or later, Windows Server 2003 SP1 or later Download location: http://go.microsoft.com/fwlink/?LinkId=111843 worth looking at: GP Policy vs. Preference vs. GP preferences http://blogs.technet.com/b/grouppolicy/archive/2008/03/04/gp-policy-vs-preference-vs-gp-preferences.aspx
Q54. - (Topic 7)
You need to recommend a solution for starting the servers in the San Francisco office from Windows Recovery Environment (Windows RE). The solution must meet the company's security requirements.
What should you include in the recommendation?
A. an iSCSI initiator
B. the Multipath I/O feature
C. Wake On LAN
D. Windows Deployment Services (WDS)
All Servers are PXE enabled
Q55. - (Topic 1)
A company has file servers that run a Server Core installation of Windows Server 2008.
You are designing the migration of the file servers to Windows Server 2008 R2. After the migration, you will install the Remote Desktop Services server role on the file servers.
You need to ensure that shared resources on the file servers are available after the migration, and minimize administrative effort.
What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.)
A. Move the shared resources off of the existing file servers. Perform a clean installation of Windows Server 2008 R2 on the file servers. Move the shared resources back onto the file servers.
B. Upgrade the existing file servers to a Server Core installation of Windows Server 2008 R2, and then upgrade the file servers to a full installation of Windows Server 2008 R2.
C. Deploy new file servers with Windows Server 2008 R2 installed. Migrate the shared resources to the new file servers.
D. Deploy new file servers with a Server Core installation of Windows Server 2008 R2. Migrate the shared resources to the new file servers.
The key here is minimize effort & Remote Desktop Services.
Server Core wouldn't allow remote desktop services as it has no GUI so that would rule out
answer A you also cant upgrade from Core to Full see
http://www.windowsitpro.com/article/tips/can-i-upgrade-fromserver-core-2008-to-the-full-windows-server-2008- or http://serverfault.com/questions/92523/upgrade-fromwindows-
2008-server-core-to-full-windows-2008-server upgrade considerations for Server Core
installations of Windows Server 2008
You can use the Server Core installation option only by performing a clean installation.
You cannot upgrade from earlier versions of Windows to Server Core installations of
Windows Server 2008.
You cannot upgrade from non-Server Core installations of Windows Server 2008 to Server
Core installations of Windows Server 2008.
You cannot convert Server Core installations of Windows Server 2008 to non-Server Core
installations of Windows Server 2008.
You can upgrade Server Core installations of Windows Server 2008 only to Windows
Server Core R2 when it is released.
Answer C is possible but again you're asked to minimize effort so D would be 1 step less
thus reducing your effort and possible down time.
Q56. - (Topic 1)
Your company has a main office and a branch office. The offices connect by using WAN links. The network consists of a single Active Directory domain. An Active Directory site exists for each office. Servers in both offices run Windows Server 2008 R2 Enterprise. You plan to deploy a failover cluster solution to service users in both offices.
You need to plan a failover cluster to meet the following requirements:
•Maintain the availability of services if a single server fails
•Minimize the number of servers required
What should you include in your plan?
A. Deploy a failover cluster that contains one node in each office.
B. Deploy a failover cluster that contains two nodes in each office.
C. In the main office, deploy a failover cluster that contains one node. In the branch office, deploy a failover cluster that contains one node.
D. In the main office, deploy a failover cluster that contains two nodes. In the branch office, deploy a failover cluster that contains two nodes.
MCITP Self-Paced Training Kit Exam 70-646 Windows Server Administration: Failover Clustering Failover clustering is a technology that allows another server to continue to service client requests in the event that the original server fails. Clustering is covered in more detail in Chapter 11, “Clustering and High Availability.” You deploy failover clustering on mission-critical servers to ensure that important resources are available even if a server hosting those resources fails. Failover clustering The Failover Clustering feature enables multiple servers to work together to increase the availability of services and applications. If one of the clustered servers (or nodes) fails, another node provides the required service through failover and is available in Windows Server 2008 Enterprise and Datacenter editions and is not available in Windows Server 2008 Standard or Web editions. Failover clustering - Formerly known as server clustering, Failover Clustering creates a logical grouping of servers, also known as nodes, that can service requests for applications with shared data stores.
Q57. - (Topic 9)
You need to ensure that Admin2 can administer Active Directory to meet the company's technical requirements. What should you do?
A. Add Admin2 to the Domain Admins global group.
B. Add Admin2 to the Backup Operators domain local group.
C. Delegate full control of all objects in graphicdesigninstitute.com to Admin2.
D. Delegate full control of all objects in the Domain Controllers organizational unit (OU) to Admin2.
You can enable Active Directory Recycle Bin only if the forest functional level of your environment is set to Windows Server 2008 R2. Membership in Domain Admins, or equivalent, is the minimum required to use AD recycle bin
Q58. - (Topic 18)
You need to configure the role services on all file servers that are necessary to meet the technical requirements. Which role services should you configure? (Choose all that Apply.)
A. File Server Resource Manager
B. BranchCache for network files
C. Windows Search Service
D. Distributed File System
E. Services for Network File System
Requirements: Minimize downtime for users accessing across a WAN = Branch Cache Files Always opened from the nearest Server =DFS Files at same path = DFS Department volumes have Quotas There is some debat if FSRM is needed. the original answer from Pass4Sure says that A FSRM is required.
However if you look at the exhibit it clearly says Departmental Volumes and not departmental shares so the question is do you need FSRM to apply quotas to a Volume? the answer is No you dont. NTFS Quota will apply quota by right clicking on the volume then selecting properties then selecting quotas. The differences between NTFS and FSRM quotas are basically NTFS is a disk quota, so the accounts cannot use more than the allowed space on the complete disk. With FSRM you can use folder quotas and differentiate it for your needs. so with NTFS if you set the quotas to 3 GB on one volume then all users that save data to that volume can only have up to 3GB of data on the whole volume, with FSRM quotas you can set it at the volume OR folder level.
A basic disk is a physical disk that contains primary partitions, extended partitions, or logical drives. Partitions and logical drives on basic disks are known as basic volumes. You can only create basic volumes on basic disks.
BranchCache is a wide area network (WAN) bandwidth optimization technology that is included in the Windows Server. 2008 R2 and Windows. 7 operating systems.
To optimize WAN bandwidth, BranchCache copies content from your main office content servers and caches the content at branch office locations, allowing client computers at branch offices to access the content locally rather than over the WAN.
At branch offices, content is cached either on servers that are running the BranchCache feature of Windows Server 2008 R2 or, when no server is available in the branch office, on computers running Windows 7. After a client computer requests and receives content from the main office and the content is cached at the branch office, other computers at the same branch office can obtain the content locally rather than contacting the main office over the WAN link.
BranchCache helps improve content query response times for clients and servers in branch offices, and can also help improve network performance by reducing traffic over WAN links. The BranchCache for network files role service is part of the File Services server role. BranchCache for network files is deeply integrated with file services and allows you to deploy a BranchCache-enabled file server.
When you deploy a BranchCache-enabled file server, BranchCache creates content information for every file in every shared folder where BranchCache is enabled. Distributed File System (DFS) Namespaces and DFS Replication offer simplified, highly-available access to files, load sharing, and WAN-friendly replication. In the Windows Server. 2003 R2 operating system, Microsoft revised and renamed DFS Namespaces (formerly called DFS), replaced the Distributed File System snap-in with the DFS Management snap-in, and introduced the new DFS Replication feature. In the Windows Server. 2008 operating system, Microsoft added the Windows Server 2008 mode of domain-based namespaces and added a number of usability and performance improvements. What does Distributed File System (DFS) do?
The Distributed File System (DFS) technologies offer wide area network (WAN)-friendly replication as well as simplified, highly-available access to geographically dispersed files. The two technologies in DFS are the following: DFS Namespaces. Enables you to group shared folders that are located on different servers into one or more logically structured namespaces. Each namespace appears to users as a single shared folder with a series of subfolders. This structure increases availability and automatically connects users to shared folders in the same Active Directory Domain Services site, when available, instead of routing them over WAN connections.
DFS Replication. DFS Replication is an efficient, multiple-master replication engine that you can use to keep folders synchronized between servers across limited bandwidth network connections. It replaces the File Replication Service (FRS) as the replication engine for DFS Namespaces, as well as for replicating the AD DS SYSVOL folder in domains that use the Windows Server 2008 domain functional level.
For completion I've included details on FSRM FSRM
With the increasing demand on storage resources, as organizations rely more heavily on
data than ever before, IT administrators face the challenge of overseeing a larger and more
complex storage infrastructure, while at the same time, tracking the kind of information
available in it. Managing storage resources not only includes data size and availability any
more but also the enforcement of company policies and a very good understanding of how
existing storage is utilized, allowing for sound strategic planning and proper response to
File Server Resource Manager is a suite of tools that allows administrators to understand,
control, and manage the quantity and type of data stored on their servers. By using File
Server Resource Manager, administrators can place quotas on folders and volumes,
actively screen files, and generate comprehensive storage reports.
This set of advanced instruments not only helps the administrator to efficiently monitor
existing storage resources but it also aids in the planning and implementation of future
Q59. - (Topic 7)
You need to recommend a solution to minimize the amount of time it takes for users in the Boston office to log on to their client computers.
What should you include in the recommendation?
A. access based enumeration (ABE)
B. folder redirection
C. the Active Directory site link cost
D. universal group membership caching
http://technet.microsoft.com/en-us/library/cc732275.aspx Folder Redirection User settings and user files are typically stored in the local user profile, under the Users folder. The files in local user profiles can be accessed only from the current computer, which makes it difficult for users who use more than one computer to work with their data and synchronize settings between multiple computers. Two technologies exist to address this problem: Roaming Profiles and Folder Redirection. Both technologies have their advantages, and they can be used separately or together to create a seamless user experience from one computer to another. They also provide additional options for administrators managing user data. When a user logs in their profile is loaded as part of the login process. the My Documents folder is part of the user profiel, by redirecting this folder to a file server it means that it does not needed to be loaded at login thus reducing the login time. while having the added benifit of enabling the company to back up these files.
Q60. DRAG DROP - (Topic 1)
A company currently has a Remote Desktop Services (RDS) farm consisting of three Remote Desktop Session Hosts (RD Session Hosts) and one Remote Desktop Session Broker (RD Session Broker). The RD Session Hosts are configured to use Windows Network Load Balancing.
The RDS servers run slowly every Monday morning between 9:00 A.M. and 11:00 A.M.
You establish that your third-party backup solution is running on the RDS servers at these times and is causing the poor performance. Company policy mandates that the backup must occur at this time.
You have the following requirements:
. Implement Windows System Resource Manager (WSRM) on each of the RDS servers to minimize the system resources utilized by the backup Application. . Ensure that WSRM runs only when required.
You need to configure WSRM.
Which actions should you perform in sequence?
To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. (Use only actions that Apply.)