PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which protocol should you allow on the firewall?

Your network contains an internal network and a perimeter network.
The networks are separated by a firewall. The internal network contains a Central Management Server.
The perimeter network contains an Edge Server. You discover that changes to the Central Management Store (CMS) do not replicate to the Edge Server.
You need to ensure that all changes to the CMS replicate to the Edge Server.
Which protocol should you allow on the firewall?

What should you do to raise the level of security?

You are configuring a new SQL Server installation. The SQL Server instance will be used for both online
analytical processing (OLAP) and relational data. The data in the server is accessed frequently.
You can configure the services, startup type, and accounts used by the services that run on the server
according to the following table.
Service Startup type Account
SQL Server Automatic Local System
SQL Server Agent Automatic Local System
Analysis Services Automatic Local System
You want to raise the level of security on the server.
You need to minimize the surface area for potential attacks on the server.
What should you do? (More than one answer choice may achieve the goal. Select the BEST answer.)

Which action will you perform to finish the task?

You are a professional level SQL Sever 2008 Database Administrator in an international corporation
named Wiikigo. You are experienced in managing databases in an enterprise-level organization,optimizing
and sustaining the database life cycle.
In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization.
A SQL Server 2008 instance is managed by you. And a large database is hosted by the instance.
The company utilizes the following backup strategy for the database.
First, the performance of a full database backup is implemented at 02:00 hr every Monday.
Secondly, the performance of a differential backup is implemented at 23:00 hr every day.
Thirdly, the performance of a transaction log backup is implemented on an hourly basis.
A reboot is caused on the SQL Server 2008 server by a power failure at 09:15 hr, Thursday.
Fifteen minutes after the reboot of the server, it is reported that certain queries that access customer data cannot be executed.
You find that the customer data remains unvaried after the power failure.
When the DBCC CHECKDB command is executed on the database, the following error message is received.
Object ID 2814307832,
index ID 2,
partition ID 83127819437122157,
alloc unit ID 82134587923221126 (type In-row data): Page (3421:169) could not be processed.
See other errors for details.
Table error: Object ID 2814307832, index ID 2, partition ID 83127819437122157, alloc unit ID
82134587923221126 (type In-row data), page (3421:169).
Test (IS_OFF (BUF_IOERR, pBUF->bstat)) failed.
Values are 16928422 and -8.CHECKDB found 0 allocation errors and 2 consistency errors in table
‘tbl_Customer’ (object ID 2814307832).
When the sp_help ‘tbl_customer’ stored procedure is executed, the following result set is received:
index_name index_description
PK clustered located on PRIMARY
NCIX nonclustered located on PRIMARY
Since you are the technical support, you are required to make sure that the data should be accessible in
the shortest time. And the impact on users should be cut to the least. Which action will you perform to
finish the task?

Which cluster configuration should you use?

You administer four SQL Server 2008 instances. Each instance hosts a single database application.
You plan to migrate all four instances to a new SQL Server failover cluster.
The four instances are configured as shown in the following table.
Instance Name Configuration
Instance 1 8 processors that have 16-GB RAM
Instance 2 4 processors that have 8-GB RAM
Instance 3 2 processors that have 16-GB RAM
Instance 4 4 Processors that have 8-GB RAM
The four instances are fully optimized and have no spare CPU cycles or extra memory.
The new cluster will host all four databases on a single virtual cluster IP address.
You need to ensure that the new cluster is configured to handle the workload of all the database
applications by using the minimum amount of hardware resources.
Which cluster configuration should you use?

Which port should you open on the firewall?

Your network contains an internal network and a perimeter network.
The networks are separated by a firewall. The internal network contains a Lync Server 2010 pool.
The perimeter network contains a Lync Server 2010 Edge pool.
You discover that updates to the Lync Server 2010 topology do not replicate to the Edge Servers.
You need to ensure that the Lync server replicates successfully to the Edge Servers.
Which port should you open on the firewall?

What should you do first?

Your network connects to the Internet by using a server that runs Microsoft Forefront Threat Management Gateway (TMG).
The network has a Lync Server 2010 infrastructure that contains an Edge Server and a Front End Server.
All client computers run Microsoft Lync 2010. Some users work remotely.
Remote users report they are unable to expand distribution groups.
You verify that all of the users can initiate IM conversations.
You need to enable distribution group expansion for all users.
What should you do first?

Which two tasks should you perform?

Your network has Lync Server 2010 and Microsoft Office Communications Server 2007 R2 deployed.
The network contains an Edge Server that runs Office Communications Server 2007 R2.
Lync users report that they are unable to initiate IM conversations to federated contacts.
You verify that Office Communications Server 2007 R2 users can successfully initiate IM conversations to federated contacts.
You need to ensure that all Lync users can successfully communicate with the federated contacts.
Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)