Microsoft 70-646 ExamPro: Windows Server 2008 - Server Administrator

Total Question: 262 Last Updated: Jul 13,2019
  • Updated 70-646 Dumps
  • Based on Real 70-646 Exams Scenarios
  • Free 70-646 pdf Demo Available
  • Check out our 70-646 Dumps in a new PDF format
  • Instant 70-646 download
  • Guarantee 70-646 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial
Home > 70-646

Latest Microsoft 70-646 dump (Topic 8)

41. Your companyhas a main office and three branch offices. The network consists of a single

Active Directory domain. Each office contains an Active Directory domain controller.

You need to create a DNS infrastructure for the network that meets the following


The DNS infrastructure must allow the client computers in each office to register

DNS names within their respective offices.

The client computers must be able to resolve names for hosts in all offices.

What should you do?

A. Create an Active Directory-integrated zone at the main office site.

B. Create a standard primary zone at the main office site and at each branch office site.

C. Create a standard primary zone at the main office site. Create a secondary zone at each

branch office site.

D. Create astandard primary zone at the main office site. Create an Active Directoryintegrated

stub zone at each branch office site.

Answer: A



In an ADI primary zone, rather than keeping the old zone file on a disk, the DNS records

are stored in the AD, and Active Directory replication is used rather than the old

problematic zone transfer. If all DNS servers were to die or become inaccessible, you could

simply install DNS on any domain controller (DC) in the domain. The records would be

automatically populated and your DNS server would be up without the messy import/export

tasks of standard DNS zone files.

Windows 2000 and 2003 allow you to put a standard secondary zone (read only) on a

member server and use one of the ADI primary servers as the master.

When you decide which replication scope to choose, consider that the broader the

replication scope, the greater the network traffic caused by replication. For example, if you

decide to have AD DS-integrated DNS zone data replicated to all DNS servers in the forest,

this will produce greater network traffic than replicating the DNS zone data to all DNS

servers in a single AD DS domain in that forest.

AD DS-integrated DNS zone data that is stored in an application directory partition is not

replicated to the global catalog for the forest. The domain controllerthat contains the global

catalog can also host application directory partitions, but it will not replicate this data to its

global catalog.

AD DS-integrated DNS zone data that is stored in a domain partition is replicated to all

domain controllers in itsAD DS domain, and a portion of this data is stored in the global

catalog. This setting is used to support Windows 2000.

If an application directory partition's replication scope replicates across AD DS sites,

replication will occur with the same intersite replication schedule as is used for domain

partition data.

By default, the Net Logon service registers domain controller locator (Locator) DNS

resource records for the application directory partitions that are hosted on a domain

controller in the same manner as it registers domain controller locator (Locator) DNS

resource records for thedomain partition that is hosted on a domain controller.


42. You are designing a server infrastructure to support a new statefulApplication.

The server infrastructure must meet the following requirements:

Use two servers, each with two NIC cards and 32 GB of RAM.

Provide access to the Application in the event of the failure of a single server.

Provide the ability to scale up the Application.

Minimize the attack surface of each server.

Minimize server disk space requirements.

You need to design a server infrastructure that meets the requirements.

What should you recommend? (More than one answer choice may achieve the goal.

Selectthe BEST answer.)

A. Perform a Server Core installation of Windows Server 2008 R2 Standard Edition.

Configure both servers in a failover cluster.

B. Perform a Server Core installation of Windows Server 2008 R2. Configure both servers

ina Windows NetworkLoad Balancing array.

C. Install Windows Server 2008 R2 on both servers. Use DNS Round Robin to balance the

load between the servers.

D. Install Windows Server 2008 R2 on both servers. Configure both servers in a Windows

Network Load Balancing array.

Answer: A


Failover clusters are designed for applications that have long-running in-memory state, or

that have large, frequently updated data states. These are called stateful applications, and

they include database applications and messaging applications. Typical uses for failover

clusters include file servers, print servers, database servers, and messaging servers.

Not B (stateful application in this scenario):

Network Load Balancing is intended for applications that do not have long-runninginmemory

state. These are called stateless applications. A stateless application treats each

client request as an independent operation, and therefore it can load-balance each request

independently. Stateless applications often have read-only data or data that changes

infrequently. Front-end Web servers, virtual private networks (VPNs), File Transfer Protocol

(FTP) servers, and firewall and proxy servers typically use Network Load Balancing.

Network Load Balancing clusters can also support other TCP- or UDP-based services and



* Windows Server 2008 provides two clustering technologies: failover clusters and Network

Load Balancing (NLB). Failover clusters primarily provide high availability; Network Load

Balancing provides scalability and at the same time helps increase availability of Webbased


* Server Core provides you with a minimal installation of Windows Server 2008 that

supports installing only certain server roles. Server Core includes Network Load Balancing

and Failover Clustering.

Reference: Failover Cluster Overview


43. Your network contains a Windows Server 2008 R2 server that functions as a file server. All

users have laptop computers that run Windows 7.

The network is not connected tothe Internet.

Users save files to a shared folder on the server.

You need to design a data provisioning solution that meets the following requirements:

Users who are not connected to the corporate network must be able to access the

files and the folders in the corporate network.

Unauthorized users must not have access to the cached files and folders.

What should you do?

A. Implement a certification authority (CA). Configure IPsec domain isolation.

B. Implement a certification authority (CA). Configure Encrypting File System (EFS) for the

drive that hosts the files.

C. Implement Microsoft SharePoint Foundation 2010. Enable Secure Socket Layer (SSL)


D. Configure caching on the shared folder. Configure offline files to use encryption.

Answer: D


MCITP Self-Paced Training Kit Exam 70-646 Windows Server Administration:

Lesson 2: Provisioning Data

Lesson 1 in this chapter introduced the Share And Storage Management tool, which gives

you access to the Provision Storage Wizard and the Provision A Shared Folder Wizard.

These tools allow you to configure storage on the volumes accessed by your server and to

set up shares. When you add the Distributed File System (DFS) role service to the File

Services server role you can create a DFS Namespace and go on to configure DFSR.

Provisioning data ensures that user files are available and remain available even if a server

fails or a WAN link goes down. Provisioning data also ensures that users canwork on

important files when they are not connected to the corporate network.

In a well-designed data provisioning scheme, users should not need to know the network

path to their files, or from which server they are downloading them. Even large files should

typically download quickly—files should not be downloaded or saved across a WAN

linkwhen they are available from a local server. You need to configure indexing so that

users can find information quickly and easily. Offline files need to be synchronized quickly

and efficiently, and whenever possiblewithout user intervention. A user should always be

working with the most up-to-date information (except when a shadow copy is specified) and

fast and efficient replication should ensure that where several copies of a file exist on a

network they contain the same information and latency is minimized.

You have several tools that you use to configure shares and offline files, configure storage,

audit file access, prevent inappropriate access, prevent users from using excessive disk

resource, and implement disaster recovery. However, the main tool for provisioning storage

and implementing a shared folder structure is DFS Management, specifically DFS

Namespaces. The main tool for implementing shared folder replication in a

Windows Server 2008 network is DFS Replication.


44. Your network consists of a single Active Directory domain. The domain contains a file

server named Server1 that runs Windows Server 2008 R2. The file server contains a

shared folder named UserDocs. Each user has a subfolder in UserDocs that they use to

store personal data.

You need to design a data management solution that meets the following requirements:

Limits the storage space that is available to each user in UserDocs

Sends a notification to the administrator if a users attempts to save multimedia

files in UserDocs

Minimizes administrative effort

What should you include in your design?

A. Configure NTFS quotas on UserDocs. Configure a task in Event Viewer to send an

email notification.

B. Configure NTFS quotas on UserDocs. Schedule a script to monitor the contents of

UserDocs and send an email notification if a multimedia file is found.

C. Install the File Server Resource Manager (FSRM) role service on Server1. Configure

event subscriptions.

D. Install the File Server ResourceManager (FSRM) role service on Server1. Configure

hard quotas and file screening.

Answer: D


MCITP Self-Paced Training Kit Exam 70-646 Windows Server Administration:

Creating Quotas

If the FSRM File Services server role is installed, you canuse FSRM to create quotas. The

Create Quota dialog box is shown in Figure 6-13. Note that you will be unable to access

this box if you have not installed the appropriate server role, which you will do in the

practice session later in this lesson.


The Create Quota dialog box

You specify a path to the volume or folder for which you want to create the quota and then

specify whether you want to create a quota only on that path or whether a template-based

quota will be automatically generated and applied to existing and new subfolders on the

path of the parent volume or folder. To specify the latter action, select Auto Apply Template

And Create Quotas On Existing And New Subfolders. Typically you would select Derive

Properties From This Quota Template (Recommended) and select a template. You can, if

you want, define custom quota properties, but this is not recommended. You can select

templates that specify the quota size that is allocated to each user and whether the quota is

hard or soft. A hard quota cannot be exceeded. A user can exceed a soft quota, but

typically exceeding the quota limit generates a report in addition to sending an e-mail notification and logging the event. Soft quotas are used for monitoring. Quota templates

include the following:

100 MB LimitThis is a hard quota. It e-mails the user and specified administrators if the100

percent quota limit has been reached and writes an event to the event log.

200 MB Limit Reports to UserThis is a hard quota. It generates a report, sends e-mails,

and writes an event to the event log if the 100 percent quota limit has been reached.

200 MB Limit with 50 MB ExtensionTechnically this is a hard quota because it performs

an action when the user attempts to exceed the limit, rather than merely monitoring the

exceeded limit. The action is to run a program that applies the 250 MB Extended Limit

template and effectively gives the user an additional 50 MB.

E-mails are sent and the event is logged when the limit is extended.

250 MB Extended LimitThe250 MB limit cannot be exceeded. E-mails are sent and the

event is logged when the limit is reached.

Monitor 200 GB Volume UsageThis is a soft quota that can be applied only to volumes. It

is used for monitoring.

Monitor 50 MB Share UsageThis is a softquota that can be applied only to shares. It is

used for monitoring.

Managing File Screens

You can use FSRM to create and manage file screens that control the types of files that

users can save, and generate notifications when users attempt to save unauthorized files.

You can also define file screening templates that you can apply to new volumes or folders

and use across your organization.

FSRM also enables you to create file screening exceptions that extend the flexibility of the

file screening rules.

You could, for example, ensure that users do not store music files in personal folders, but

you could allow storage of specific types of media files, such as training files that comply

with company policy. You could also create an exception that allows members of the senior

management group to save any type of file they want to (provided they comply with legal


You can also configure your screening process to notify you by e-mail when an executable

file is stored on a shared folder. This notification can include information about the user

who stored the file and the file’s exact location.

Exam TipFile screens are not specifically included on the objectives for the 70-646

examination. You should know what they are, what they do, and that you canmanage them

from FSRM. You probably will not come across detailed questions about file screen




A company has servers that run Windows Server 2008 R2 and client computers that run

32-bit Windows 7 Enterprise. The environment includes Microsoft Application Visualization


You plan to deploy a 64-bit only Application.

You need to ensure that users can run the Application. The Application must be

automatically available on the client computers.

Which actions should you perform in sequence?

To answer, move the appropriate actions from the list of actions to the answer area and

arrange them in the correct order. (Use only actions that Apply.)




Get More Information : 70-646 exam