You need to make the application available through RD Web Access
You have a server that runs Windows Server 2008 R2.
The server has Remote Desktop Web Access (RD Web Access) installed.
Several line-of-business applications are available on the server by using RD Web Access.
You install a new application on the server.
You need to make the application available through RD Web Access.
What should you do?
You need to ensure that users can launch the remote application from their computers by double- clicking a fil
A server runs Windows Server 2008 R2.
The Remote Desktop Services server role is installed on the server.
You deploy a new application on the server.
The application creates files that have an extension of .xyz.
You need to ensure that users can launch the remote application from their computers by double- clicking a file that has the .xyz extension.
What should you do?
You need to install the application to support multiple user sessions
A server named Server2 runs Windows Server 2008 R2.
The Remote Desktop Services server role is installed on Server2.
You plan to deploy an application on Server2.
The application vendor confirms that the application can be deployed in a Remote Desktop Services environment.
The application does not use Microsoft Windows Installer packages for installation.
The application makes changes to the current user registry during installation.
You need to install the application to support multiple user sessions.
What should you do?
You need to implement the highest security available for communications to and from the iSCSI SAN
Your company has a single Active Directory domain. All servers run Windows Server 2008 R2.
You install an iSCSI storage area network (SAN) for a group of file servers.
Corporate security policy requires that all data communication to and from the iSCSI SAN must be as secure as possible.
You need to implement the highest security available for communications to and from the iSCSI SAN.
What should you do?
You need to prevent failback of the cluster during business hours
You have two servers named FC1 and FC2 that run Windows Server 2008 R2 Enterprise.
Both servers have the Failover Clustering feature installed.
You configure the servers as a two-node cluster.
The cluster runs an application named APP1.
Business hours for your company are 09:00 to 17:00. APP1 must be available during these hours.
You configure FC1 as the preferred owner for APP1.
You need to prevent failback of the cluster during business hours.
What should you do?
Which command should you run on the server?
You install the Web Server (IIS) server role on a server that runs Windows Server 2008 R2.
You configure a Web site named contoso.com and a Web application named Acctg on the Web server.
The Web server runs out of disk space.
You move Acctg to another drive on the Web server.
The following table shows the current application configuration:
Users report that they cannot access Acctg.
You need to enable users to access Acctg.
Which command should you run on the server?
Which commands should you run?
Your company has an Active Directory domain.
The company runs Remote Desktop Services.
All Remote Desktop Services accounts are configured to allow session takeover without permission.
A user has logged on to a server named Server2 by using an account named User1.
The session ID for User1 is 1337.
You need to perform a session takeover for session ID 1337.
Which commands should you run?
You need to configure the Remote Desktop Services Per User Client Access License (RD Per User CAL) tracking an
Your company has a Windows Server 2003 Active Directory domain.
A server named Server1 runs Windows Server 2008 R2.
The Remote Desktop Services server role is installed on Server1.
A server named Server2 runs Windows Server 2003.
The TS Licensing role service is installed on Server2.
You need to configure the Remote Desktop Services Per User Client Access License (RD Per User CAL) tracking and reporting to work on both Server1 and Server2.
What should you do?
You need to find out whether a user named User1 has ever connected to his office workstation through the RD Ga
You manage a member server that runs Windows Server 2008 R2.
The server runs the Remote Desktop Gateway (RD Gateway) role service.
You need to find out whether a user named User1 has ever connected to his office workstation through the RD Gateway server.
What should you do?
Which Group Policy object (GPO) should you create and apply to the Remote Desktop Server farm?
Your company has an Active Directory domain.
All servers in the domain run Windows Server 2008 R2.
The RD Gateway role service is installed on a server named Server1.
The Remote Desktop Services server role is installed on two servers named Server2 and Server3.
Server2 and Server3 are configured in a load balancing Remote Desktop Services farm named Farm1.
You deploy the RD Connection Broker service on a new server named Server4.
You confirm that the RD Connection Broker works correctly.
You deploy a hardware load balancing device to handle the load distribution to the Remote Desktop Services farm.
The device has specialized support for remote desktop services and routing tokens.
You discover that the RD Connection Broker no longer works correctly.
You need to ensure that the RD Connection Broker works correctly.
Which Group Policy object (GPO) should you create and apply to the Remote Desktop Server farm?