70-646 Pro: Windows Server 2008, Server Administratorgattner.name/simon/public/microsoft/Windows...

of 148 /148
Microsoft 70-646 70-646 Pro: Windows Server 2008, Server Administrator Practice Test Updated: Jan 19, 2010 Version

Embed Size (px)

Transcript of 70-646 Pro: Windows Server 2008, Server Administratorgattner.name/simon/public/microsoft/Windows...

  • Microsoft 70-646

    70-646 Pro: Windows Server 2008, Server

    Administrator

    Practice Test

    Updated: Jan 19, 2010

    Version

  • Actu

    alTe

    sts.

    com

    QUESTION NO: 1

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of 200 Windows Server 2008 servers. The company has recently decided to open a new

    branch office and moved 75 Windows Server 2008 servers from the existing office to the new

    network segment.

    Which of the following options would you choose to change the TCP/IP addresses on the 75

    servers that have been moved to the new branch office by using the minimum amount of

    administrative effort?

    A. Use ServerManagerCMD tool and run it on the administrator's client computer.

    B. Use the Netsh tool and run it on the administrator's client computer.

    C. Use Remote Desktop to connect to each server to make the changes.

    D. Visit each server to make the changes.

    E. None of the above

    Answer: B

    Explanation:

    To change the TCP/IP addresses on the 75 servers that have been moved to the new branch

    office by using the minimum amount of administrative effort, you need to run the Netsh tool from

    an administrator's client computer.

    You can use NETSH to make dynamic IP address changes from a static IP address to DHCP

    simply by importing a file. NETSH can also bring in the entire Layer-3 configuration (TCP/IP

    Address, DNS settings, WINS settings, IP aliases, etc.). This can be handy when you're working

    on networks without DHCP and have a mobile computer that connects to multiple networks, some

    of which have DHCP. NETSH shortcuts will far exceed the capabilities of using Windows

    Automatic Public IP Addressing.

    Reference: 10 things you should know about the NETSH tool

    / #4: Using NETSH to dynamically change TCP/IP addresses

    http://www.builderau.com.au/program/windows/soa/10-things-you-should-know-about-the-NETSH-

    tool/0,339024644,339272916,00.htm

    Reference: 10 Windows Server 2008 Netsh commands you should know

    http://www.windowsnetworking.com/articles_tutorials/10-Windows-Server-2008-Netsh-

    commands.html

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 2

  • Actu

    alTe

    sts.

    com

    QUESTION NO: 2

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    runs 28 Windows Server 2008 servers and two Windows Server 2003 servers. One of the

    Windows Server 2003 servers called CertKillerServer1 hosts an application called App1 and

    another Windows Server 2003 server called CertKillerServer2 hosts the application called App2

    The App1application uses the 32-bit installation of Windows Server 2003 and App2 application

    uses the 64-bit installation of Windows Server 2003. You need to run both the applications on

    Windows Server 2008 server.

    Which of the following options would you choose for replacing the servers that host App1 and

    App2 in the minimum cost amount? (Select three. Each correct answer will present a part of the

    solution.)

    A. Install a new server that runs a 64-bit version of Windows Server 2008 Enterprise Edition.

    B. Install two new servers that run 64-bit versions of Windows Server 2008 Enterprise Edition.

    C. Install two new servers. On one of the servers install the 32-bit version of Windows Server 2008

    Enterprise Edition and install the 64-bit version of Windows Server 2008 Enterprise Edition on the

    other server.

    D. Install the Hyper-V feature on the server(s).

    E. Install Windows System Resource Manager (WSRM) on the server(s).

    F. Install App1 and App2 in separate child virtual machines

    G. Install App1 on the 32-bit server. Install App2 on the 64-bit server.

    Answer: A,D,F

    Explanation:

    For replacing the servers that host App1 and App2 in the minimum cost amount, you need to

    install a new server that runs a 64-bit version of Windows Server 2008 Enterprise Edition. Install

    the Hyper-V feature on the new server. Install App1 and App2 in separate child virtual machines

    Hyper-V consists of a 64-bit hypervisor that can run 32-bit and 64-bit virtual machines

    concurrently. Therefore you need to install just one Windows Server 2008 to run these two

    applications. You can then install Hyper V feature that would allow you to create virtual machines

    and run both the applications as desired. Hyper-V virtualization works with single and multi-

    processor virtual machines and includes tools such as snapshots, which capture the state of a

    running virtual machine.

    Reference : Microsoft Hyper-V Guide

    http://searchservervirtualization.techtarget.com/generic/0,295582,sid94_gci1318785,00.html

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 3

  • Actu

    alTe

    sts.

    com

    QUESTION NO: 3

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    runs two Windows Server 2008 servers.

    You have been asked to configure the Windows Server 2008 servers in such a way that they

    support the installation of Microsoft SQL Server 2005 and provide redundancy for SQL services if

    a single server fails. (Select two. Each correct answer will present a part of the solution.)

    Which of the following options would you choose to accomplish this task?

    A. Install a full installation of Windows Server 2008 Standard Edition on the servers.

    B. Install a full installation of Windows Server 2008 Enterprise Edition on the servers.

    C. Install a Server Core installation of Windows Server 2008 Enterprise Edition on the servers.

    D. Configure Network Load Balancing on the servers.

    E. Configure failover clusters on the servers.

    Answer: B,E

    Explanation:

    To configure the Windows Server 2008 servers in such a way that they support the installation of

    Microsoft SQL Server 2005 and provide redundancy for SQL services if a single server fails, you

    need to install a full installation of Windows Server 2008 Enterprise Edition on the servers.

    Configure failover clusters on the servers.

    Failover clustering is a process in which the operating system and SQL Server 2008 work together

    to provide availability in the event of an application failure, hardware failure, or operating-system

    error. Failover clustering provides hardware redundancy through a configuration in which mission-

    critical resources are transferred from a failing machine to an equally configured server

    automatically.

    Reference : SQL Server 2008 Pricing and Licensing/ PASSIVE SERVERS / FAILOVER

    SUPPORT

    http://download.microsoft.com/download/1/e/6/1e68f92c-f334-4517-b610-

    e4dee946ef91/2008%20SQL%20Licensing%20Overview%20final.docx .

    QUESTION NO: 4

    You are an Enterprise administrator for CertKiller.com. The company has a head office and five

    branch offices. The corporate network of the company consists of a single Active Directory

    domain.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 4

  • Actu

    alTe

    sts.

    com

    Each office contains Windows 2000 Server domain controller and Windows Server 2008 member

    servers. The physical security of the member servers was not reliable and servers could be

    attacked.

    Therefore, you decided to implement Windows BitLocker Drive Encryption (BitLocker) on the

    member servers.

    Which of the following options would you choose to ensure that you can access the BitLocker

    volume even if the BitLocker keys are corrupted on the member servers and store the recovery

    information at a central location? (Select two. Each correct answer will present a part of the

    solution.)

    A. Upgrade all domain controllers to Windows Server 2008.

    B. Upgrade the domain controller that has the schema master role to Windows Server 2008.

    C. Upgrade the domain controller that has the primary domain controller (PDC) emulator role to

    Windows Server 2008.

    D. Use Group Policy to configure Public Key Policies.

    E. Use Group Policy to enable a Data Recovery Agent (DRA).

    F. Use Group Policy to enable Trusted Platform Module (TPM) backups to Active Directory.

    Answer: A,F

    Explanation:

    To ensure that you can access the BitLocker volume even if the BitLocker keys are corrupted on

    the member servers and store the recovery information at a central location, you need to upgrade

    all domain controllers to Windows Server 2008. Use Group Policy to enable Trusted Platform

    Module (TPM) backups to Active Directory.

    By default, no recovery information is backed up. Administrators can configure Group Policy

    settings to enable backup of BitLocker or TPM recovery information.

    All user interfaces and programming interfaces within BitLocker and TPM Management features

    will adhere to your configured Group Policy settings. When these settings are enabled, recovery

    information (such as recovery passwords) will be automatically backed up to Active Directory

    whenever this information is created and changed.

    Reference : BitLocker Drive Encryption Configuration Guide: Backing Up BitLocker and TPM

    Recovery Information to Active Directory

    http://technet.microsoft.com/en-us/library/cc766015.aspx

    QUESTION NO: 5

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 5

  • Actu

    alTe

    sts.

    com

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain that contain 100 Windows Server 2003 physical

    servers having 64-bit hardware.

    The company has given you the responsibility to consolidate the 100 physical servers into 30

    Windows Server 2008 physical servers and send the remaining physical servers to the new

    branch office that plans to open shortly.

    Which of the following options would you choose to achieve the desired goal while ensuring the

    maximum resource utilization by using existing hardware and software? You also need to ensure

    that your solution would support 64-bit child virtual machines and maintain separate services

    among the servers.

    A. Install the Hyper-V feature on the existing hardware. Then convert the physical machines into

    virtual machines.

    B. Install the Microsoft Virtual PC. Then convert the physical machines into virtual machines.

    C. Create the necessary host (A) records after consolidating services across the physical

    machines.

    D. Install Microsoft Virtual Server 2005 R2 on the existing hardware after installing Windows

    Server 2008 on them. Then convert the physical machines into virtual machines.

    E. None of the above

    Answer: A

    Explanation:

    To ensure the maximum resource utilization by using existing hardware and software and to

    ensure the support for 64-bit child virtual machines while maintaining separate services among the

    servers, you need to install the Hyper-V feature to convert the physical machines into virtual

    machines.

    The Hyper-V feature provides Physical-to-Virtual (P2V) Conversion Wizard that guides

    administrators through the process of creating a virtual version of a physical server, including

    creating images of physical hard disks, preparing the images for use in a VM, and creating the

    final VM. The wizard can create virtual servers from physical servers and can run on Windows

    Server 2003 with SP1 (32-bit only) and on Windows Server 2008 (without Hyper-V role enabled)

    besides many other Operating systems.

    Reference : Virtual Machine Manager 2008 Supports Hyper-V / Other Features

    http://www.directionsonmicrosoft.com/sample/DOMIS/update/2008/07jul/0708vmm2sh.htm

    Section 2, Plan for automated server deployment (9 Questions)

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 6

  • Actu

    alTe

    sts.

    com

    QUESTION NO: 6

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain that contains a Windows Server 2008 server called

    CertKillerServer1. The server runs the DHCP service on it for the network.

    Your company has decided to add a few Windows Vista computers and Windows Server 2008

    servers on the network.

    You have been asked to prepare the network for the automated deployment of the above given

    operating systems with the use Pre-boot Execution Environment (PXE) network adapter.

    Which of the following options would you choose to accomplish this task?

    A. Install Windows Automated Installation Kit (WAIK) on a new server.

    B. Configure the Windows Deployment Services (WDS) server role on a new server.

    C. Install Windows Automated Installation Kit (WAIK) on CertKillerServer1.

    D. Configure the Windows Deployment Services (WDS) server role on CertKillerServer1.

    E. None of the above

    Answer: D

    Explanation:

    To prepare the network for the automated deployment of the above given operating systems with

    the use Pre-boot Execution Environment (PXE) network adapter, you need to configure the

    Windows Deployment Services (WDS) server role on CertKillerServer1.

    Windows Deployment Services enables you to deploy Windows operating systems, particularly

    WindowsVista and Windows Server2008. You can use it to set up new computers by using a

    network-based installation. This means that you do not have to install each operating system

    directly from a CD or DVD. It is an extensible and higher-performing PXE server component.

    You must have a functioning DHCP server with an active scope. To utilize PXE WDS required a

    DHCP server. Therefore you need to configure WDS on CertKillerServer1

    Reference : Step-by-Step Guide for Windows Deployment Services in Windows Server 2003 /

    What is Windows Deployment Services?

    http://technet.microsoft.com/en-us/library/cc766320.aspx#BKMK_1

    Reference : Planning for PXE Initiated Operating System Deployments/ Windows Deployment

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 7

  • Actu

    alTe

    sts.

    com

    Services (WDS) and DHCP

    http://technet.microsoft.com/en-us/library/bb680753.aspx

    QUESTION NO: 7

    You are an Enterprise administrator for CertKiller.com. The company consists of a head office and

    a branch office. The corporate network of the company consists of a single Active Directory

    domain.

    Because the branch office was comparatively less secure, you decided to deploy a Read-only

    Domain Controller (RODC) in the branch office so that branch office support technicians cannot

    manage domain user accounts on the RODC. However, they should be able to maintain drivers

    and disks on the RODC.

    Which of the following options would you choose to manage the RODC to meet the desired goal?

    A. Configure Administrator Role Separation on the RODC.

    B. For the branch office support technicians, set NTFS permissions on the Active Directory

    database to Read & Execute.

    C. Configure the RODC to replicate the password for the branch office support technicians.

    D. For the branch office support technicians, set NTFS permissions on the Active Directory

    database to Deny Full Control.

    E. None of the above

    Answer: A

    Explanation:

    To ensure that branch office support technicians would not manage domain user accounts on the

    RODC and should be able to maintain drivers and disks on the RODC, you need to configure the

    RODC for Administrator Role Separation.

    Administrator Role Separation specifies that any domain user or security group can be delegated

    to be the local administrator of an RODC without granting that user or group any rights for the

    domain or other domain controllers. Accordingly, a delegated administrator can log on to an

    RODC to perform maintenance work on the server such as upgrading a driver. But the delegated

    administrator would not be able to log on to any other domain controller or perform any other

    administrative task in the domain.

    Reference : RODC Features/ Administrator role separation

    http://technet.microsoft.com/en-us/library/cc753223.aspx#bkmk_separation

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 8

  • Actu

    alTe

    sts.

    com

    QUESTION NO: 8

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain that contain.

    The company currently consists of a main office that has an Internet connection configured. The

    company plans to open a new branch office in near future and plans to connect the branch office

    to the main office by using a WAN link having a limited bandwidth.

    The branch office will not have access to the Internet and will contain 30 Windows Server 2008

    servers. The installations of these servers must be automated and must be automatically

    activated. Besides the network traffic between the offices must be minimized.

    Which of the following options would you include in your plan for the deployment of the servers in

    the branch office?

    A. Use Multiple Activation Key (MAK) Independent Activation on the servers. In the main office,

    implement a DHCP server and Windows Deployment Services (WDS).

    B. In the branch office, implement Key Management Service (KMS), a DHCP server, and Windows

    Deployment Services (WDS).

    C. In the main office, implement Windows Deployment Services (WDS). In the branch office,

    implement a DHCP server and implement the Key Management Service (KMS).

    D. Use Multiple Activation Key (MAK) Independent Activation on the servers. In the main office,

    implement a DHCP server. In the branch office, implement Windows Deployment Services (WDS).

    E. None of the above

    Answer: B

    Explanation:

    For the deployment of the servers in the branch office with the given requirements, you need to

    implement Key Management Service (KMS), a DHCP server, and Windows Deployment Services

    (WDS) in the branch office.

    The KMS key is used to activate computers against a service that you can host in your

    environment, so you don't have to connect to Microsoft servers. To activate computers by using

    KMS, you must have a minimum number of physical computers. The KMS key is installed on the

    host computer only.

    To activate the KMS host, you must have at least 25 computers running Windows Vista or

    Windows Server 2008 that are connected together; for Windows Server 2008, the minimum is 5

    computers.

    You need Windows Deployment Services (WDS) because it enables you to automate the

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 9

  • Actu

    alTe

    sts.

    com

    deployment Windows operating systems. You can use it to set up new computers by using a

    network-based installation. This means that you do not have to install each operating system

    directly from a CD or DVD.

    You must have a functioning DHCP server with an active scope so that WDS will utilize PXE.

    Reference : Microsoft Product Activation

    http://www.microsoft.com/licensing/resources/vol/default.mspx

    Reference : Step-by-Step Guide for Windows Deployment Services in Windows Server 2003 /

    What is Windows Deployment Services?

    http://technet.microsoft.com/en-us/library/cc766320.aspx#BKMK_1

    Reference : Planning for PXE Initiated Operating System Deployments/ Windows Deployment

    Services (WDS) and DHCP

    http://technet.microsoft.com/en-us/library/bb680753.aspx

    QUESTION NO: 9

    You are an Enterprise administrator for CertKiller.com. The company has a head office and 250

    branch offices. The corporate network of the company consists of a single Active Directory

    domain.

    All the domain controllers on the corporate network run Windows Server 2008. You have been

    asked to deploy Read-only Domain Controllers (RODCs) in each designated branch offices

    because the physical security at branch office locations cannot be guaranteed.

    While deploying the RODCs, you need to ensure that the RODC installation source files do not

    contain cached secrets and the bandwidth used during the initial synchronization of Active

    Directory Domain Services (AD DS) is minimized.

    Which of the following options would you choose to accomplish the given task?

    A. Backup of the critical volumes of an existing domain controller by using Windows Server

    Backup. Now build the new RODCs using the backup.

    B. Using one of the domain controllers on the nework create a DFS Namespace that contains the

    Active Directory database and then build the new RODCs using by using an answer file.

    C. Create an RODC installation media using ntdsutil ifmand the build the RODCs from the RODC

    installation media.

    D. Perform a full backup of an existing domain controller using Windows Server Backup and then

    use the backup to build the new RODCs.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 10

  • Actu

    alTe

    sts.

    com

    E. None of the above

    Answer: C

    Explanation:

    :

    The new ntdsutil ifm subcommand can be used to create installation media. It can be used to

    remove secrets, such as passwords, from the AD DS database, so that you can install a read-only

    domain controller (RODC) without them. When you remove these secrets, the RODC installation

    media is more secure if it must be transported to a branch office for an RODC installation.

    Ntbackup.exe cannot remove cached secrets from the installation media.

    Reference : Steps for Deploying an RODC/ Optional: Install RODC from media

    http://technet.microsoft.com/en-us/library/cc754629.aspx

    QUESTION NO: 10

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain. You have been asked to deploy file servers that run

    Windows Server 2008 and ensure that the file server support volumes larger than 2 terabytes.

    You also need to ensure that if a single server fails, access to all data is maintained and if a single

    disk fails, the data redundancy is maintained. You also need to maximize the disk throughput

    Which of the following options would you choose to accomplish the assigned task? (Select 2. Each

    correct answer will present a part of the solution)

    A. Deploy a Windows Server 2008 server and connect an external storage subsystem to it that

    supports Microsoft Multipath I/O.

    B. Deploy a two-node failover cluster. Connect an external storage subsystem.

    C. Configure the external storage subsystem as a RAID 1 array and format the array as an MBR

    disk.

    D. Configure the external storage subsystem as a RAID 10 array and format the array as a GPT

    disk.

    Answer: B,D

    Explanation:

    To ensure that if a single server fails, access to all data is maintained and if a single disk fails, the

    data redundancy is maintained, you need to deploy a two-node failover cluster. Connect an

    external storage subsystem. Configure the external storage subsystem as a RAID 10 array.

    Format the array as a GPT disk.

    A combining the different RAID levels gives us the option of RAID10. RAID10 is equivalent

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 11

  • Actu

    alTe

    sts.

    com

    toRAID1 + 0. So, you can have a few disks (at least 4 and always even numbers) and mirror the

    drives two at a time. This gives the redundancy. Then you take those mirrors and combine them

    into a RAID 0 stripe. This allows redundancy, faster read operations, and fast writes (avoiding a

    parity calculation).

    RAID1 is a mirror which is faster than a single disk, but not as fast for read operations as 3+ disks

    (RAID1 is just 2 disks). RAID5 is a stripe with parity which is faster on read operations than RAID1

    but not ideal for write operations because it is required to calculate a parity block of data.

    Reference : Brad Kingsley's Blog

    http://blogs.orcsweb.com/brad/archive/2007/08/06/raid10.aspx

    QUESTION NO: 11

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain. You have planned to install 10 new Windows Server

    2008 servers on the network.

    You want to automate the installation of the servers and activate the servers automatically. Which

    of the following options would you choose to accomplish the desired goal?

    A. Implement Multiple Activation Key (MAK) Independent Activation and Deployment Services

    (WDS).

    B. Implement Key Management Service (KMS) and Windows Deployment Services (WDS).

    C. Use Multiple Activation Key (MAK) Independent Activation.

    D. Implement a DHCP server and the Key Management Service (KMS).

    E. None of the above

    Answer: B

    Explanation:

    For the deployment of the servers in the branch office with the given requirements, you need to

    implement Key Management Service (KMS), and Windows Deployment Services (WDS).

    The KMS key is used to activate computers against a service that you can host in your

    environment, so you don't have to connect to Microsoft servers. To activate computers by using

    KMS, you must have a minimum number of physical computers. The KMS key is installed on the

    host computer only.

    To activate the KMS host, you must have at least 25 computers running Windows Vista or

    Windows Server 2008 that are connected together; for Windows Server 2008, the minimum is 5

    computers.

    You need Windows Deployment Services (WDS) because it enables you to automate the

    deployment Windows operating systems. You can use it to set up new computers by using a

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 12

  • Actu

    alTe

    sts.

    com

    network-based installation. This means that you do not have to install each operating system

    directly from a CD or DVD.

    Reference : Microsoft Product Activation

    http://www.microsoft.com/licensing/resources/vol/default.mspx

    Reference : Step-by-Step Guide for Windows Deployment Services in Windows Server 2003 /

    What is Windows Deployment Services?

    http://technet.microsoft.com/en-us/library/cc766320.aspx#BKMK_1

    QUESTION NO: 12

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain.

    Which of the following options would you choose to consolidate the 50 physical Windows Server

    2003 servers into 10 physical Windows Server 2008 servers?

    While consolidation, you need to ensure that the existing hardware and software should be used

    and 64-bit child virtual machines can be created. Which of the following options would you choose

    to accomplish the desired task?

    A. Install Microsoft Virtual PC.

    B. Install the Hyper-V feature.

    C. Consolidate services across the physical machines and create the necessary host (A) records.

    D. Install Microsoft Virtual Server 2005 R2.

    E. None of the above

    Answer: B

    Explanation:

    To ensure that existing hardware and software is used and to ensure the support for 64-bit child

    virtual machines, you need to install the Hyper-V feature to convert the physical machines into

    virtual machines.

    The Hyper-V feature provides Physical-to-Virtual (P2V) Conversion Wizard that guides

    administrators through the process of creating a virtual version of a physical server, including

    creating images of physical hard disks, preparing the images for use in a VM, and creating the

    final VM. The wizard can create virtual servers from physical servers and can run on Windows

    Server 2003 with SP1 (32-bit only) and on Windows Server 2008 (without Hyper-V role enabled)

    besides many other Operating systems.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 13

  • Actu

    alTe

    sts.

    com

    Reference : Virtual Machine Manager 2008 Supports Hyper-V / Other Features

    http://www.directionsonmicrosoft.com/sample/DOMIS/update/2008/07jul/0708vmm2sh.htm

    QUESTION NO: 13

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain. The company has decided to open 2 new branch

    offices and deploy 1,000 new Windows Vista Enterprise Edition computers.

    The Windows Vista installations need to be done using Pre-boot Execution Environment (PXE)

    network adapters that those 1000 computers already have.

    Which of the following options would you choose to ensure that 50 simultaneous installations of

    Windows Vista can be done in minimum amount of time and the impact of network operations

    during the deployment of the new computers is minimized?

    A. Install Windows Deployment Services (WDS) server role and configure all the routers with IP

    Helper tables.

    B. Install Windows Deployment Services (WDS) server role and configure eachWDS server by

    using legacy mode.

    C. Install both Windows Deployment Services (WDS) server role and Transport Server role

    services and then configure the Transport Server with a static multicast address range.

    D. Install both Windows Deployment Services (WDS) server role and Transport Server role

    services and then configure the Transport Server to use a custom network profile.

    E. None of the above

    Answer: C

    Explanation:

    To ensure that 50 simultaneous installations of Windows Vista in minimum amount of time in a

    Pre-boot Execution Environment, you need to deploy the Windows Deployment Services (WDS)

    server role and the Transport Server feature. You can install both the Deployment Server and

    Transport Server role services (which is the default installation) or only Transport Server role

    services.

    The Windows Deployment Services (WDS) enables you to automate the deployment of Windows

    operating systems. You can use it to set up new computers by using a network-based installation.

    This means that you do not have to install each operating system directly from a CD or DVD

    You can configure Transport Server to enable you to boot from the network using Pre-Boot

    Execution Environment (PXE) and Trivial File Transfer Protocol (TFTP), a multicast server, or

    both.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 14

  • Actu

    alTe

    sts.

    com

    The Transport Server role service provides a subset of the functionality of Windows Deployment

    Services. It contains only the core networking parts. You can use Transport Server to create

    multicast namespaces that transmit data (including operating system images) from a stand-alone

    server. The stand-alone server does not need Active Directory, DHCP, or DNS. You can

    If multiple servers are using multicast functionality on a network (Transport Server, Deployment

    Server, or another solution), it is important that each server is configured so that the multicast IP

    addresses do not collide. Otherwise, you may encounter excessive traffic when you enable

    multicasting. Note that each Windows Deployment Services server will have the same default

    range. To work around this issue, specify static ranges that do not overlap to ensure that each

    server is using a unique IP address

    Reference : Transport Server

    http://technet.microsoft.com/en-us/library/cc771645.aspx

    QUESTION NO: 14

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain that runs a 64-bit version of Windows Server 2008

    server. The server has DHCP server role installed on it. The corporate network only uses IPv4.

    The company has decided to deploy 50 new Windows Server 2008 servers.The installations need

    to be done using Pre-boot Execution Environment (PXE) network adapters that is already

    supported by the new computers. Besides some of the new computers contain 64-bit hardware

    and some of the servers contain 32-bit hardware.

    Which of the following options would you choose to ensure the automated deployment of the new

    servers in minimum hardware cost?

    A. Deploy Windows Deployment Services (WDS) on two Windows Server 2008 servers. One for

    the 64-bit server and the other for 32-bit server

    B. Deploy Remote Installation Services (RIS) on two Windows Server 2003 servers having Service

    Pack 2 installed. One for the 64-bit server and the other for 32-bit server

    C. Deploy Windows Deployment Services (WDS) on the DHCP server

    D. Deploy Remote Installation Services (RIS) on a 64-bit Windows Server 2003 server.

    E. None of the above

    Answer: C

    Explanation:

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 15

  • Actu

    alTe

    sts.

    com

    To ensure the automated deployment of the new servers in minimum hardware cost in the given

    scenario, you need to deploy Windows Deployment Services (WDS) on the DHCP server.

    You must have a working DHCP server with an active scope on the network because Windows

    Deployment Services uses PXE, which relies on DHCP for IP addressing

    Reference : Installing Windows Deployment Services

    http://technet.microsoft.com/en-us/library/cc771670.aspx

    Section 3, Plan infrastructure services server roles (10 Questions)

    QUESTION NO: 15

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory forest having 20 domains configured under it.

    All the domain controllers on the network run Windows Server 2008 and have the DNS role

    installed on them. You company has decided to replace a legacy Windows Internet Name Service

    (WINS) environment with a DNS-only environment for the name resolution.

    Which of the following options would you choose to Support IPv4 and IPv6 environments, allow

    single-label name resolution across all domains, and minimize the amount of NetBT traffic on the

    network while replacing a legacy Windows Internet Name Service (WINS) environment?

    A. Configure all the DNS zones to perform a WINS forward lookup.

    B. Configure all the DNS zones to replicate as part of a custom Active Directory replication

    partition.

    C. Configure a GlobalNames zone on each domain controller.

    D. Configure all the DNS zones to replicate to each DNS server in the forest.

    E. None of the above

    Answer: C

    Explanation:

    To Support IPv4 and IPv6 environments, allow single-label name resolution across all domains,

    and minimize the amount of NetBT traffic on the network while replacing a legacy Windows

    Internet Name Service (WINS) environment with a DNS-only environment, you need to configure a

    GlobalNames zone on each domain controller.

    The DNS Server Role in Windows Server 2008 now supports the GlobalNames Zone. This has

    been introduced to assist organizations to move away from WINS and allow organizations to move

    to an all-DNS environment. Unlike WINS, The GlobalNames zone is not intended to be used for

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 16

  • Actu

    alTe

    sts.

    com

    peer-to-peer name resolution.

    The GlobalNames Zone (GNZ) is used to hold single-label names. The GlobalNames zone is most

    commonly used to hold CNAME resource records to map a single-label name to a Fully Qualified

    Domain Name (FQDN). GNZ provides single-label name resolution whereas WINS provides

    NetBIOS resolution. If you plan to retire WINS or plan to deploy IPv6 only in your environment, all

    name resolution will rely on DNS. It supports dual IPv4 and IPv6 environment and use only DNS

    for name resolution.

    Reference : Understanding the New GlobalNames Zone Functionality in Windows Server2008

    http://johnpolicelli.wordpress.com/2008/01/15/understanding-the-new-globalnames-zone-in-

    windows-server-2008/

    Reference : DNS Server GlobalNames Zone Deployment /

    How GNZ Resolution Works

    http://download.microsoft.com/download/e/2/0/e2090852-3b7f-40a3-9883-07a427af1560/DNS-

    GlobalNames-Zone-Deployment.doc .

    QUESTION NO: 16

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain. All servers on the corporate network run Windows

    Server 2008 and all client computers run Windows Vista. The company has an enterprise

    certification authority (CA).

    You have been asked to install certificates automatically on each client computer and deploy the

    certificates to all users by using a new certificate template by using minimum amount of effort. You

    need to ensure that users have access to the new certificates when they log on to any client

    computer in the domain.

    Which of the following options would you choose to accomplish the given task? (Select two. Each

    correct answer will form a part of the solution)

    A. Configure autoenrollment of certificates.

    B. Deploy an enterprise subordinate CA

    C. Configure roaming user profiles.

    D. Configure folder redirection.

    E. Configure Credential Roaming.

    Answer: A,E

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 17

  • Actu

    alTe

    sts.

    com

    Explanation:

    To ensure that users have access to the new certificates when they log on to any client computer

    in the domain while meeting other requirements, you need to Configure autoenrollment of

    certificates and Credential Roaming

    The autoenrollment process grants certificates based on certificate templates that are supplied

    with Read, Enroll, and Autoenroll permissions for the users, groups, or computers who require

    autoenrollment.

    With the credential roaming functionality, managed environments can now store X.509 certificates,

    certificate requests, and private keys specific to a user in Active Directory, independently from the

    profile.

    The credential roaming implementation in Windows Vista and Windows Server "Longhorn" is

    additionally able to roam stored user names and passwords. This would ensure that users have

    access to the new certificates when they log on to any client computer in the domain

    With credential roaming, once a domain user chooses in a Windows authentication dialog box to

    cache or 'remember' the current credentials, the user will have the same experience on any

    domain-joined computer that the user logs on to.

    Reference : How can I enable digital certificate autoenrollment in Windows Server 2003?

    http://windowsitpro.com/article/articleid/48665/how-can-i-enable-digital-certificate-autoenrollment-

    in-windows-server-2003.html

    Reference : About Credential Roaming

    http://technet.microsoft.com/hi-in/library/cc700848(en-us).aspx

    QUESTION NO: 17

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain. All domain controllers on the corporate network run

    Windows Server 2008 and all client computers run either Windows Vista or Windows XP Service

    Pack 1.

    The corporate network contains 100 servers and 5,000 client computers. Which of the following

    options would you choose to implement a VPN solution that allows you to store VPN passwords

    as encrypted text and provide support for Suite B cryptographic algorithms?

    Besides it should support client computers that are configured as members of a workgroup and

    allow automatic enrollment of certificates. (Select three. Each correct answer will form a part of the

    answer.)

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 18

  • Actu

    alTe

    sts.

    com

    A. Upgrade the client computers to Windows Vista.

    B. Upgrade the client computers to Windows XP Service Pack 2.

    C. Implement an enterprise certification authority (CA) that is based on Windows Server 2008.

    D. Implement a stand-alone certification authority (CA).

    E. Implement an IPsec VPN that uses pre-shared keys.

    F. Implement an IPsec VPN that uses certificate-based authentication.

    Answer: A,C,F

    Explanation:

    To implement a VPN solution that allows you to store VPN passwords as encrypted text and

    provide support for Suite B cryptographic algorithms, you need to Upgrade the client computers to

    Windows Vista and implement an enterprise certification authority (CA) that is based on Windows

    Server 2008.

    Suite B cryptographic algorithms that was added in Windows Vista Service Pack 1 (SP1) and in

    Windows Server 2008. Suite B is a set of standards that are specified by the National Security

    Agency (NSA). Suite B includes Encryption algorithms.

    To support client computers that are configured as members of a workgroup and allow automatic

    enrollment of certificates, you need to Implement an IPsec VPN that uses certificate-based

    authentication.

    IPSec deployments can take advantage of certificate-based authentication via

    industry-standard x.509 digital certificates. ADCS in Windows Server2008 provides customizable

    services for creating and managing the X.509 certificates that are used in software security

    systems that employ public key technologies. Organizations can use ADCS to enhance security by

    binding the identity of a person, device, or service to a corresponding public key. ADCS also

    includes features that allow you to manage certificate enrollment and revocation in a variety of

    scalable environments.

    Reference : Description of the support for Suite B cryptographic algorithms that was added in

    Windows Vista Service Pack 1 and in Windows Server 2008

    http://support.microsoft.com/kb/949856

    Reference : iPhone and Virtual Private Networks

    (VPN)

    http://images.apple.com/iphone/enterprise/docs/iPhone_VPN.pdf .

    QUESTION NO: 18

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 19

  • Actu

    alTe

    sts.

    com

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company is

    configured with Perimeter network as shown in the exhibit.

    Exhibit:

    The company uses an enterprise certification authority (CA) and a Microsoft Online Responder on

    the internal network.

    Which of the following options would you choose to implement a secure method for Internet users

    to verify the validity of individual certificates with the use of minimum network bandwidth? (Select

    two. Each correct answer will form a part of the answer.)

    A. Install a stand-alone CA on a server on the perimeter network

    B. Deploy a subordinate CA on the perimeter network.

    C. Install Network Device Enrollment Service (NDES) on a server on the perimeter network.

    D. Install a Network Policy Server (NPS) on a server on the perimeter network.

    E. Redirect authentication requests to a server on the internal network.

    F. Install IIS on a server on the perimeter network

    G. Configure IIS to redirect requests to the Online Responder on the internal network.

    Answer: F,G

    Explanation:

    To implement a secure method for Internet users to verify the validity of individual certificates with

    the use of minimum network bandwidth, you need to install IIS on a server on the perimeter

    network and configure IIS to redirect requests to the Online Responder on the internal network.

    Windows Vista and the WindowsServer2008 operating system will natively support both CRL

    and Online Certificate Status Protocol (OCSP) as a method of determining certificate status. The

    OCSP support includes both the client component as well as the Online Responder, which is the

    server component.

    The Online Responder Web proxy cache represents the service interface for the Online

    Responder. It is implemented as an Internet Server Application Programming Interface (ISAPI)

    extension hosted by Internet Information Services (IIS)

    When an application performs a certificate evaluation, the validation is performed on all certificates

    in that certificate's chain. This includes every certificate from the end-entity certificate presented to

    the application to the root certificate. It is an online process and is designed to respond to single

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 20

  • Actu

    alTe

    sts.

    com

    certificate status requests.

    Reference : Online Responder Installation, Configuration, and Troubleshooting Guide

    http://technet.microsoft.com/en-us/library/cc770413.aspx

    QUESTION NO: 19

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain. All the servers on the network either run Windows

    Server 2003 or Windows Server 2008 and all client computers run Windows Vista.

    The company possesses a public key infrastructure (PKI) that consists of an offline root

    certification authority (CA) and two Enterprise Subordinate CAs that run Windows Server 2003.

    You publish the certificates to the user accounts and the computer accounts in Active Directory.

    Which of the following options would you choose to create a PKI solution for the Windows Vista

    client computers and the Windows Server 2008 servers in such a way that the certificates must

    support Suite B hashing and encryption algorithms and store private keys in Active Directory in

    minimum amount of administrative effort?

    A. Configure cross-certification between the CA hierarchies by creating a new PKI that uses

    Windows Server 2008 CAs..

    B. Install a new Windows Server 2008 enterprise subordinate CA.

    C. Install a new Windows Server 2008 stand-alone subordinate CA.

    D. Create a new Active Directory forest and configure one-way forest trusts between the two

    forests by deploying a new PKI that uses Windows Server 2008 CAs.

    E. None of the above.

    Answer: B

    Explanation:

    To create a PKI solution for the Windows Vista client computers and the Windows Server 2008

    servers that meed the desired requirements, you need to install a new Windows Server 2008

    enterprise subordinate CA.

    To use SuiteB algorithms for cryptographic operations, you first need a Windows Server2008-

    based CA to issue certificates that are SuiteB-enabled

    SuiteB algorithms such as ECC are supported only on the WindowsVista and Windows

    Server2008 operating systems. This means it is not possible to use those certificates on earlier

    versions of Windows such as WindowsXP or WindowsServer2003.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 21

  • Actu

    alTe

    sts.

    com

    If you already have a PKI with CAs running WindowsServer2003 or where classic algorithms

    are being used to support existing applications, you can add a subordinate CA on a server running

    Windows Server2008, but you must continue using classic algorithms.

    Reference : Cryptography Next Generation / How should I prepare to deploy this feature?

    http://technet.microsoft.com/en-us/library/cc730763.aspx

    QUESTION NO: 20

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory forest called CertKiller.com. The forest contains two domains.

    You want to configure another child domain called Branch3.CertKiller.com with two domain

    controllers having the DNS server role installed.

    You want to put all the users and computers in the new branch office in the branch3.CertKiller.com

    domain. Which of the following options would you choose to implement a DNS infrastructure for

    the child domain to ensure resources in the root domain and child domains are accessible by fully

    qualified domain names?

    You solution must also provide name resolution services in the event that a single server fails for a

    prolonged period of time and automatically recognize when new DNS servers are added to or

    removed from the CertKiller.com domain.

    A. Add conditional forwarders for CertKiller.com on both the domain controllers of

    branch3.CertKiller.com domain. Next create a standard primary zone for branch.CertKiller.com.

    B. On one of the domain controllers of branch3.CertKiller.com domain, create a standard primary

    zone for CertKiller.com. On the other domain controller, create a standard secondary zone for

    CertKiller.com.

    C. On both the domain controllers of branch3.CertKiller.com domain, modify the root hints to

    include the domain controllers for CertKiller.com. On one of domain controllers, create an Active

    Directory integrated zone for branch.CertKiller.com.

    D. On one of the domain controllers of branch3.CertKiller.com domain, create an Active Directory

    Integrated zone for branch3.CertKiller.com and create an Active Directory Integrated stub zone for

    CertKiller.com.

    E. None of the above.

    Answer: D

    Explanation:

    To implement a DNS infrastructure for the child domain to ensure resources in the root domain

    and child domains are accessible by fully qualified domain names, you need to create an Active

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 22

  • Actu

    alTe

    sts.

    com

    Directory Integrated zone for branch3.CertKiller.com on one of the domain controllers of

    branch3.CertKiller.com domain.

    Active Directory Integrated zones, store their zone information within Active Directory instead of

    text files. The advantages of this new type of zone included using Active Directory replication for

    zone transfers and allowing resource records to be added or modified on any domain controller

    running DNS. In other words, all Active Directory Integrated zones are always primary zones as

    they contain writable copies of the zone database.This would ensure that the name resolution

    service will automatically recognize when new DNS servers are added to or removed from the

    CertKiller.com domain

    You also need to create an Active Directory Integrated stub zone for CertKiller.com to ensure the

    name resolution services in the event that a single server fails for a prolonged period of time. It

    contains copies of all the resource records in the corresponding zone on the master name server.

    A stub zone is like a secondary zone in that it obtains its resource records from other name

    servers (one or more master name servers). Stub zones can be used instead of secondary zones

    to reduce the amount of zone transfer traffic over the WAN link connecting the two companies.

    When Active Directory-integrated stub zones are hosted in separate sites, you can update them

    using a local list of master servers in each site.

    Reference : DNS Stub Zones in Windows Server 2003

    http://www.windowsnetworking.com/articles_tutorials/DNS_Stub_Zones.html

    Reference: Host Name Resolution Overview

    http://www.tech-faq.com/planning-and-implementing-a-dns-namespace.shtml

    QUESTION NO: 21

    You are an Enterprise administrator for CertKiller.com. The company consists of a head office and

    three branch offices. The corporate network of the company consists of a single Active Directory

    domain.

    Each office contains an Active Directory domain controller. Which of the following options would

    you choose to create a DNS infrastructure for the network that would allow the client computers in

    each office to register DNS names within their respective offices? You also need to ensure that the

    client computers must be able to resolve names for hosts in all offices.

    A. For each office site, create a standard primary zone.

    B. For the head office site, create a standard primary zone and for each branch office site, create

    an Active Directory-integrated stub zone.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 23

  • Actu

    alTe

    sts.

    com

    C. For the head office site, create a standard primary zone at the head office site and for each

    branch office site, create a secondary zone.

    D. Create an Active Directory-integrated zone at the head office site.

    E. None of the above.

    Answer: D

    Explanation:

    To create a DNS infrastructure for the network that would allow the client computers in each office

    to register DNS names within their respective offices and to ensure that the client computers must

    be able to resolve names for hosts in all offices, you need to create an Active Directory-integrated

    zone at the head office site

    Active Directory Integrated zones, store their zone information within Active Directory instead of

    text files. This ensures that the client computers can resolve names for hosts in all offices. The

    advantages of this new type of zone included using Active Directory replication for zone transfers

    and allowing resource records to be added or modified on any domain controller running DNS. In

    other words, all Active Directory Integrated zones are always primary zones as they contain

    writable copies of the zone database.

    Reference : DNS Stub Zones in Windows Server 2003

    http://www.windowsnetworking.com/articles_tutorials/DNS_Stub_Zones.html

    QUESTION NO: 22

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory forest called CertKiller.com. The forest contains five domains.

    The domain controllers on the network run Windows Server 2008 and have the DNS server role

    installed.

    You company has decided to replace a legacy Windows Internet Name Service (WINS)

    environment with a DNS-only environment for name resolution.

    Which of the following options would you choose to plan the infrastructure for name resolution to

    support IPv4 and IPv6 environments, enable single-label name resolution across all domains, and

    minimizing the amount of NetBIOS over TCP/IP (NetBT) traffic on the network?

    A. Implement custom Active Directory replication partition and modify each DNS zone to replicate

    as part of it

    B. Configure each DNS zone to perform a WINS forward lookup.

    C. Configure each DNS zone to replicate to each DNS server in the forest.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 24

  • Actu

    alTe

    sts.

    com

    D. Configure a GlobalNames zone on each domain controller.

    E. None of the above.

    Answer: D

    Explanation:

    To replace a legacy Windows Internet Name Service (WINS) environment with a DNS-only

    environment for name resolution with given requirements, you need to configure a GlobalNames

    zone on each domain controller.

    The DNS Server Role in Windows Server 2008 now supports the GlobalNames Zone. This has

    been introduced to assist organizations to move away from WINS and allow organizations to move

    to an all-DNS environment. Unlike WINS, The GlobalNames zone is not intended to be used for

    peer-to-peer name resolution.

    The GlobalNames Zone (GNZ) is used to hold single-label names. The GlobalNames zone is most

    commonly used to hold CNAME resource records to map a single-label name to a Fully Qualified

    Domain Name (FQDN). GNZ provides single-label name resolution whereas WINS provides

    NetBIOS resolution. If you plan to retire WINS or plan to deploy IPv6 only in your environment, all

    name resolution will rely on DNS. It supports dual IPv4 and IPv6 environment and use only DNS

    for name resolution.

    Reference : Understanding the New GlobalNames Zone Functionality in Windows Server2008

    http://johnpolicelli.wordpress.com/2008/01/15/understanding-the-new-globalnames-zone-in-

    windows-server-2008/

    Reference : DNS Server GlobalNames Zone Deployment /

    How GNZ Resolution Works

    http://download.microsoft.com/download/e/2/0/e2090852-3b7f-40a3-9883-07a427af1560/DNS-

    GlobalNames-Zone-Deployment.doc .

    QUESTION NO: 23

    You are an Enterprise administrator for CertKiller.com. Your company possesses a stand-alone

    root certification authority (CA) for the corporate network.

    The corporate network contains a Windows Server 2008 server called CertKillerServer1. You

    issue a server certificate to CertKillerServer1 and deploy Secure Socket Tunneling Protocol

    (SSTP) on CertKillerServer1 for secure browsing.

    Which of the following options would you choose to ensure that the external partner computers

    would be allowed to access internal network resources by using SSTP?

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 25

  • Actu

    alTe

    sts.

    com

    A. Terminal Services Session Broker role service

    B. Firewall to allow inbound traffic on TCP Port 1723

    C. Root CA certificate on external computers

    D. Network Access Protection (NAP) on the network

    E. None of the above.

    Answer: C

    Explanation:

    To ensure that the external partner computers would be allowed to access internal network

    resources by using SSTP, you need to deploy the Root CA certificate to the external computers.

    SSTP is a new kind of Virtual Private Networking (VPN) tunnel that is available in the Routing and

    Remote Access server role in Windows Server 2008. SSTP allows for Point-to-Point Protocol

    (PPP) packets to be encapsulated over HTTP. This feature allows for a VPN connection to be

    more easily established through a firewall or through a Network Address Translation (NAT) device.

    Also, this feature allows for a VPN connection to be established through an HTTP proxy device.

    Generally, if the client computer is joined to the domain and if you use domain credentials to log

    on to the VPN server, the certificate is automatically installed in the Trusted Root Certification

    Authorities store. However, if the computer is not joined to the domain or if you use an alternative

    certificate chain, you may need to Root CA certificate to the external computers.

    Reference : How to troubleshoot Secure Socket Tunneling Protocol (SSTP)-based connection

    failures in Windows Server 2008

    http://support.microsoft.com/kb/947031

    QUESTION NO: 24

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain. All the servers on the network either run Windows

    Server 2003 or Windows Server 2008 and all client computers run Windows Vista or Windows XP

    SP2.

    You have been assigned the task to implement Encrypting File System (EFS) for all the client

    computers on the network and ensure that users must be able to access their EFS certificates on

    any client computers.

    You also need to ensure that if a client computers disk fails, the EFS certificates must be

    accessible and only the minimum amount of data that is transferred across the network when a

    user logs on to or off from a client computer.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 26

  • Actu

    alTe

    sts.

    com

    Which of the following options would you choose to accomplish the assigned task?

    A. Smart cards

    B. Credential roaming

    C. Roaming user profiles

    D. Data Recovery Agent

    E. None of the above.

    Answer: B

    Explanation:

    Since credential roaming is not part of Windows XP SP2, the feature is available as a separate

    software update that can be deployed in Windows XP SP2 computers. The credential roaming

    functionality is also implemented as a core feature in Windows Vista.

    Credential roaming can enhance the use of Encrypting File System (EFS) in various ways, for

    example, roaming EFS certificates that are signed by a CA or are self-signed. With the credential

    roaming functionality in the CSC, managed environments can now store X.509 certificates,

    certificate requests, and private keys specific to a user in Active Directory, independently from the

    profile.

    The credential roaming implementation in Windows Vista is additionally able to roam stored user

    names and passwords. Users typically maintain stored user names and passwords of certain Web

    sites or file servers that do not have a default trust relationship with the user's computer. With

    credential roaming, once a domain user chooses in a Windows authentication dialog box to cache

    or 'remember' the current credentials, the user will have the same experience on any domain-

    joined computer that the user logs on to.

    Reference : About Credential Roaming

    http://technet.microsoft.com/hi-in/library/cc700848(en-us).aspx

    Reference : Configuring and Troubleshooting Certificate Services Client-Credential Roaming /

    Using Encrypting File System

    http://technet.microsoft.com/en-us/library/cc700823.aspx

    Section 4, Plan application servers and services (4 Questions)

    QUESTION NO: 25

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain. The network contains three servers that run Windows

    Server 2000 and a few custom applications.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 27

  • Actu

    alTe

    sts.

    com

    The applications on these servers are incompatible with each other, incompatible with Windows

    Server 2008, and consume less than 10 percent of the system resources. The company has

    decided to update all the servers to Windows Server 2008.

    As an Enterprise administrator of the company, you have been assigned the task to migrate the

    applications to new Windows Server 2008 servers in minimum hardware costs.

    Which of the following two options would you choose to accomplish the assigned task? (Select

    two. Each selected option will present a part of the answer.)

    A. Deploy one new server that runs Windows Server 2008 Enterprise Edition.

    B. Deploy three new servers that run Windows Server 2008 Standard Edition.

    C. Deploy one new server that runs Windows Server 2008 Datacenter Edition.

    D. Install the Windows System Resource Manager (WSRM) feature on the new server.

    E. Configure Windows 2000 compatibility mode for each application.

    F. Install the Hyper-V feature on the new server. Create three child virtual machines.

    G. Install the Desktop Experience feature.

    Answer: A,F

    Explanation:

    To migrate the applications to new Windows Server 2008 servers in minimum hardware costs, you

    need to deploy one new server that runs Windows Server 2008 Enterprise Edition, install the

    Hyper-V feature on the new server, and then create three child virtual machines for each

    application.

    Application virtualization of Hyper-V feature helps isolate the application running environment from

    the operating system install requirements by creating application-specific copies of all shared

    resources and helps reduce application to application incompatibility and testing needs.

    With Microsoft SoftGrid, desktop and network users can also reduce application installation time

    and eliminate potential conflicts between applications by giving each application a virtual

    environment that's not quite as extensive as an entire virtual machine. By providing an abstracted

    view of key parts of the system, application virtualization reduces the time and expense required to

    deploy and update applications.

    Reference : Windows Server 2008 Hyper-V Product Overview - An Early look Application

    Virtualization

    http://download.microsoft.com/download/4/2/b/42bea8d6-9c77-4db8-b405-

    6bffce59b157/WS08%20Virtualization%20Product%20Overview.doc

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 28

  • Actu

    alTe

    sts.

    com

    QUESTION NO: 26

    You are an Enterprise administrator for CertKiller.com. The company consists of a head office and

    a branch office. The corporate network of the company consists of a single Active Directory

    domain and an Active Directory site exists for each office. All the domain controllers on the

    network run Windows Server 2008.

    You have been assigned the task to modify the DNS infrastructure in such a way that the DNS

    service is available even if a single server fails, the synchronization data that is sent between DNS

    servers is encrypted and dynamic updates are supported on all DNS servers.

    Which of the following options would you choose to accomplish the given task? (Select two. Each

    selected option will present a part of the answer.)

    A. Install the DNS server role on a domain controller in the head office and on a Read only

    Domain Controller (RODC) in the branch office.

    B. Install the DNS server role on a domain controller in the head office and on a domain controller

    in the branch office.

    C. Install the DNS server role on two servers. Create a primary zone on the DNS server in the

    head office.

    D. Configure DNS to use Active Directory integrated zones.

    E. Create a secondary zone on the DNS server in the branch office.

    F. Install the DNS server role on two servers. Create a primary zone and a GlobalNames zone on

    the DNS server in the head office.

    G. Create a GlobalNames zone on the DNS server in the branch office.

    Answer: B,D

    Explanation:

    To modify the DNS infrastructure in such a way that the DNS service is available even if a single

    server fails, you need to install the DNS server role on a domain controller in the head office and

    on a domain controller in the branch office and then configure DNS to use Active Directory

    integrated zones.

    This would also ensure that the synchronization data that is sent between DNS servers is

    encrypted and dynamic updates are supported on all DNS servers.

    DNS servers running on domain controllers can store their zones in Active Directory. In this way, it

    is not necessary to configure a separate DNS replication topology that uses ordinary DNS zone

    transfers, because all zone data is replicated automatically by means of Active Directory

    replication. This simplifies the process of deploying DNS provides the following advantages:

    Multiple masters are created for DNS replication. Therefore:

    Any domain controller in the domain running the DNS server service can write updates to the

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 29

  • Actu

    alTe

    sts.

    com

    Active Directory-integrated zones for the domain name for which they are authoritative. A separate

    DNS zone transfer topology is not needed.

    Secure dynamic updates are supported. Secure dynamic updates allow an administrator to control

    which computers update which names, and prevent unauthorized computers from overwriting

    existing names in DNS.

    ActiveDirectory-integrated DNS in Windows Server2008 stores zone data in application directory

    partitions. (There are no behavioral changes from WindowsServer2003-based DNS integration

    with ActiveDirectory.)

    Reference : Active Directory-Integrated Zones

    http://technet.microsoft.com/en-us/library/cc772746.aspx

    QUESTION NO: 27

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain. All the servers on the network either run Windows

    Server 2008 and all client computers run Windows Vista Service Pack 1. The corporate network is

    connected to the Internet through a firewall.

    Which of the following options would you choose to allow remote access to the servers on your

    network while ensure that all the remote connections and all remote authentication attempts to the

    servers are encrypted? You also need to ensure that only inbound connections to TCP port 80 and

    TCP port 443 are allowed on the firewall.

    A. Point-to-Point Tunneling Protocol (PPTP) and Microsoft Point-to-Point Encryption (MPPE)

    B. Microsoft Secure Socket Tunneling Protocol (SSTP)

    C. Internet Protocol security (IPsec) and network address translation traversal (NAT-T).

    D. Internet Protocol security (IPsec) and certificates

    E. None of the above

    Answer: B

    Explanation:

    To allow remote access to the servers on your network while ensure that all the remote

    connections and all remote authentication attempts to the servers are encrypted and to ensure

    that only inbound connections to TCP port 80 and TCP port 443 are allowed on the firewall, you

    need to install Microsoft Secure Socket Tunneling Protocol (SSTP).

    The Microsoft Secure Socket Tunneling Protocol (SSTP), a mechanism to transport data-link layer

    (L2) frames on a Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) connection.

    The protocol currently supports only the Point-to-Point Protocol (PPP) link layer.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 30

  • Actu

    alTe

    sts.

    com

    The SSTP server directly accepts the HTTPS connection, which is similar to a virtual private

    network (VPN) server positioned on the edge of a network. The Secure Sockets Layer/Transport

    Layer Security (SSL/TLS) certificate is deployed on the SSTP server.

    Introduction

    http://msdn.microsoft.com/en-us/library/cc247339.aspx

    Reference : The Cable Guy The Secure Socket Tunneling Protocol SSTP in Windows

    http://technet.microsoft.com/en-us/magazine/cc162322.aspx

    QUESTION NO: 28

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain. All the domain controllers on the network either run

    Windows Server 2008 and all client computers run Windows Vista.

    The company plan to collaborate on a project with an external partner company called

    TechKing.com. The TechKing.com domain also consists of an Active Directory domain that runs

    Windows Server 2008 domain controllers.

    You have been assigned the task to design a collaboration solution that allows the users of both

    the companies to prevent sensitive documents from being forwarded to untrusted recipients or

    from being printed.

    Besides, the users of TechKing.com should be allowed to access the protected content in

    CertKiller.com to which they have been granted rights. You need to ensure that all inter-

    organizational traffic is sent over port 443.

    Which of the following options would you choose to accomplish the desired goal in a minimum

    amount of the administrative effort? (Select two. Each selected option will present a part of the

    answer.)

    A. Establish a federated trust between your company and the external partner.

    B. Establish an external forest trust between your company and the external partner.

    C. Deploy a Windows Server 2008 server that runs Microsoft Office SharePoint Server 2007 and

    that has the Active Directory Rights Management Services (AD RMS) role installed.

    D. Deploy a Windows Server 2008 server that has the Active Directory Rights Management

    Service (AD RMS) role installed and the Windows SharePoint Services role installed.

    E. Deploy a Windows Server 2008 server that has the Active Directory Certificate Services role

    installed. Implement Encrypting File System (EFS).

    F. Deploy a Windows Server 2008 server that has the Windows SharePoint Services role installed.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 31

  • Actu

    alTe

    sts.

    com

    Answer: A,C

    Explanation:

    To design a collaboration solution that allows the users of both the companies to prevent sensitive

    documents from being forwarded to untrusted recipients or from being printed, you need to

    establish a federated trust between your company and the external partner. Deploy a Windows

    Server 2008 server that runs Microsoft Office SharePoint Server 2007 and that has the Active

    Directory Rights Management Services (AD RMS) role installed

    With a federation trust, you can extend Active Directory to allow for the sharing of resources

    securely in a B2B environment. Once the federation trust is established, authentication requests

    that are made to the Intranet server in the resource domain can flow through the federation trust

    from users who are located in the domain where the accounts are located without issue.

    Active Directory Rights Management Services (AD RMS) is an information protection technology

    that works with AD RMS-enabled applications to help safeguard digital information from

    unauthorized use. Content owners can define who can open, modify, print, forward, or take other

    actions with the information.

    Office SharePoint Server 2007 provides an easy way to collaborate on documents by posting

    them to an Office SharePoint Server 2007 site so that they can be accessed over the corporate

    network. The goal of integrating an Office SharePoint Server 2007 deployment with an ADRMS

    infrastructure is to be able to protect documents that are downloaded from the Office SharePoint

    Server 2007 server by users of any given organization.

    Reference : Window Server 2003 R2, what's new with Active Directory? / Federation Trust

    http://www.windowsnetworking.com/articles_tutorials/Window-Server-2003-R2-New-Active-

    Directory.html

    Reference : Windows Server 2008: Active Directory Rights Management Services (AD RMS)

    http://www.keepingitreal.nu/2008/07/windows-server-2008-active-directory_7307.html

    Reference : Deploying Active Directory Rights Management Services with Microsoft Office

    SharePoint Server 2007 Step-By-Step Guide

    http://technet.microsoft.com/en-us/library/cc753046.aspx

    Section 5, Plan file and print server roles (9 Questions)

    QUESTION NO: 29

    You are an Enterprise administrator for CertKiller.com. The company consists of a head office and

    a branch office. The corporate network of the company consists of a single Active Directory

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 32

  • Actu

    alTe

    sts.

    com

    domain. All the servers on the network run Windows Server 2008 and all client computers run

    Windows Vista.

    The branch office contains a Windows Server 2008 member server named BranchServer1 that

    has the File Services server role installed on it. The Active Directory contain an organizational unit

    (OU) called BranchOU to keep the computer objects for the servers in the Branch office.

    Besides the OU, a global group called Branch-adm also exists in AD to keep the user accounts for

    the administrators in the branch office. Till now the administrators on the corporate network

    manage the shared folders on the servers in the Branch office.

    However, you now want to ensure that the members of Branch-adm can create shared folders on

    BranchServer1. Which of the following options would you choose to accomplish this task?

    A. Assign Full Control permissions on the BranchOU.

    B. Add the Branch-adm group to the Power Users local group on BranchServer1.

    C. Create Shared Folders permissions on the BranchOU.

    D. Add the Branch-adm group to the Administrators local group on BranchServer1.

    E. None of the above

    Answer: D

    Explanation:

    To ensure that the members of Branch-adm can create shared folders on BranchServer1, you

    need to add the Branch-adm group to the Administrators local group on BranchServer1

    Administrators is a local group that provides full administrative access to an individual computer or

    a single domain, depending on its location. Because this account has complete access, you

    should be very careful about adding users to this group. To make someone an administrator for a

    local computer or domain, all you need to do is make that person a member of this group. Only

    members of the Administrators group can modify this account.

    Reference : Using Default Group Accounts

    http://technet.microsoft.com/en-us/library/bb726982.aspx

    Reference : Securing the Local Administrators Group on Every Desktop

    http://www.windowsecurity.com/articles/Securing-Local-Administrators-Group-Every-Desktop.html

    QUESTION NO: 30

    You are an Enterprise administrator for CertKiller.com. All the servers on the network run Windows

    Server 2008.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 33

  • Actu

    alTe

    sts.

    com

    The company has assigned you the task to plan a data storage solution for the company by

    utilizing the existing network infrastructure and ensuring that the storage space to the servers is

    allocated as needed. You also need to ensure the maximum performance and the maximum fault

    tolerance in your solution.

    To begin with, you decided to deploy eight file servers on the network and connect them to

    Ethernet switches. Which of the following options will you include next in your plan to accomplish

    the desired goal? (Select two. Each selected option will present a part of the answer.)

    A. Install Windows Server 2008 Datacenter Edition on each server.

    B. Install Windows Server 2008 Enterprise Edition on each server.

    C. Install Windows Server 2008 Standard Edition on each server.

    D. Deploy the servers in a failover cluster and deploy an iSCSI storage area network (SAN).

    E. Deploy the servers in a Network Load Balancing (NLB) cluster and map a network drive on

    each server to an external storage array.

    F. Deploy the servers in a Network Load Balancing (NLB) cluster and implement RAID 5 on each

    server.

    G. Deploy the servers in a failover cluster and deploy a Fibre Channel (FC) storage area network

    (SAN).

    Answer: A,D

    Explanation:

    To plan a data storage solution for the company to ensure the maximum performance and the

    maximum fault tolerance, you need to i nstall Windows Server 2008 Datacenter Edition on each

    server and deploy the servers in a failover cluster. Next deploy an iSCSI storage area network

    (SAN).

    The Datacenter Edition supports both iSCSI storage and failover clustering. The failover clustering

    will ensure the fault tolerance. A popular SAN protocol, iSCSI allows clients to send SCSI

    commands to storage devices on remote servers. Unlike Fibre Channel, which requires special-

    purpose cabling, iSCSI can be run over long distances using existing network infrastructure

    The iSCSI is a protocol that allows two hosts to send SCSI commands over a TCP/IP network. By

    doing this, you can use SCSI but free yourself of the limitations of traditional SCSI cabling and,

    instead, use your LAN to connect your SCSI PCs and Server to your SCSI storage.

    iSCSI is a type of storage area network (SAN) and it is typically compared to Fibre Channel (FC) -

    its much more expensive competitor.

    With iSCSI you have a client who needs access to the storage on the server. The client uses

    initiator software (making it the initiator) to connect to the storage server (called the target).

    Reference : What is iSCSI?

    http://www.windowsnetworking.com/articles_tutorials/Connect-Windows-Server-2008-Windows-

    Vista-iSCSI-Server.html

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 34

  • Actu

    alTe

    sts.

    com

    QUESTION NO: 31

    You are an Enterprise administrator for CertKiller.com. The company consists of a head office and

    a branch office. The corporate network of the company consists of a single Active Directory

    domain, which run at the functional level of Windows Server 2008. All the servers on the network

    run Windows Server 2008 and all client computers run Windows Vista.

    You have been asked to design a file sharing strategy that ensures that the users in both the

    offices must be able to access the same files using the same Universal Naming Convention (UNC)

    path to access the files.

    The users must be able to access files even if a server fails. While designing your file sharing

    strategy, you need to take care you're your design must reduce the amount of bandwidth used to

    access files.

    To start with you deployed file servers on the network. Which of the following options would you

    choose next to accomplish this task?

    A. Domain-based DFS namespace using replication

    B. Stand-alone DFS namespace using replication

    C. Multi-site failover cluster having two servers, one located in the head office and another in the

    branch office

    D. Network Load Balancing cluster having two servers, one located in the head office and another

    in the branch office.

    E. None of the above

    Answer: A

    Explanation:

    To design a file sharing strategy that meets the given requirements, you need to configure a

    domain-based DFS namespace that uses replication.

    The domain based namespaces require all servers to be members of an Active Directory domain.

    This environment support automatic synchronization of DFS targets.

    The domain-based DFS enables multiple replications that provides you with a degree of

    scalability. Rather than having every user in your organization access their files from the same

    server, you can distribute the user workload across multiple DFS replicas rather than over

    burdening a single server. This ensures that the users in both the offices must be able to access

    the same files using the same Universal Naming Convention (UNC) path to access the files in

    reduced bandwidth.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 35

  • Actu

    alTe

    sts.

    com

    Another reason for having multiple DFS replicas is because doing so provides you with a degree

    of fault tolerance.DFS can also provide fault tolerance from the standpoint of protecting you

    against network link failures.The fault tolerance ensures that users are able to access files even if

    a server fails.

    Reference : Planning a DFS Architecture, Part 1, Planning a DFS Architecture, Part 2 / Domain-

    Based Namespaces

    http://www.petri.co.il/planning-dfs-architecture-part-one.htm

    QUESTION NO: 32

    You are an Enterprise administrator for CertKiller.com. The company has a head office and a

    branch office. The corporate network of the company consists of a single Active Directory domain.

    All the servers on the network run Windows Server 2008.

    The company has four domain administrators and two support technicians, which are located in

    the head office and the branch office respectively.

    Which of the following options would you choose to deploy a new Windows Server 2008 server in

    the branch office? You want to minimize the security privileges granted to the support technicians.

    However, you want to ensure that the support technicians are allowed to install server roles and

    are allowed to stop and start services.

    A. Configure the restricted enrollment agent on the new Windows Server 2008 server and then

    create a permissions list for the support technicians.

    B. Create a new organizational unit (OU) for the support technicians permission and then assign

    them the permissions to modify objects in the new OU. Put the new Windows Server 2008 server

    in the new OU.

    C. Add the support technicians to the Domain Admins group.

    D. Assign the support technicians to the Administrators group on the new Windows Server 2008

    server.

    E. None of the above

    Answer: D

    Explanation:

    'Administrators' is a local group that provides full administrative access to an individual computer

    or a single domain, depending on its location. Because this account has complete access, you

    should be very careful about adding users to this group. To make someone an administrator for a

    local computer or domain, all you need to do is make that person a member of this group. Only

    members of the Administrators group can modify this account.

    Microsoft 70-646: Practice Exam

    "Pass Any Exam. Any Time." - www.actualtests.com 36

  • Actu

    alTe

    sts.

    com

    Reference: Using Default Group Accounts

    http://technet.microsoft.com/en-us/library/bb726982.aspx

    Reference: Securing the Local Administrators Group on Every Desktop

    http://www.windowsecurity.com/articles/Securing-Local-Administrators-Group-Every-Desktop.html

    QUESTION NO: 33

    You are an Enterprise administrator for CertKiller.com. The corporate network of the company

    consists of a single Active Directory domain. All the servers on the network run Windows Server

    2008. The network contains two Windows Server 2008 computers called CertKillerServer1 and

    CertKillerServer2 and two identical print devices.

    Which of the following options would you choose to plan a print services infrastructure that would

    allow you to manage the print queue from a central location and make the print services available,

    even if one of the print devices fails?

    A. Install and share a printer on CertKillerServer1 and enable printer pooling.

    B. Create