PrepAway - Latest Free Exam Questions & Answers

Category: 70-640 (v.4)

Exam 70-640: TS: Windows Server 2008 Active Directory, Configuring (updated May 5th, 2015)

You need to ensure that access to the file shares on Server1 is audited

Your network contains an Active Directory domain. The domain contains two file servers.
The file servers are configured as shown in the following table.

You create a Group Policy object (GPO) named GPO1 and you link GPO1 to OU1.
You configure the advanced audit policy as shown in the exhibit. (Click the Exhibit button.)

You discover that the settings are not applied to Server1. The settings are applied to
Server2.
You need to ensure that access to the file shares on Server1 is audited.
What should you do?

You need to ensure that the contoso.com users can resolve names in the GlobalNames zone

Your network contains four domain controllers. The domain controllers are configured as
shown in the following table.

All of the domain controllers are configured to host an Active Directory-integrated zone for
their respective domain.
A GlobalNames zone is deployed in the fabrikam.com forest.
You add a canonical (CNAME) record named Server1 to the GlobalNames zone.
You discover that users in the contoso.com forest cannot resolve the name Server1. The
users in fabrikam.com can resolve the name Server1.
You need to ensure that the contoso.com users can resolve names in the GlobalNames
zone.
What should you do? (Each correct answer presents part of the solution. Choose two.)

You need to ensure that the settings in GPO1 supersede the settings in GPO2

Your network contains an Active Directory domain named contoso.com.
You have an organizational unit (OU) named Sales and an OU named Engineering.
You have two Group Policy objects (GPOs) named GPO1 and GPO2. GPO1 and GPO2 are
linked to the Sales OU and contain multiple settings.
You discover that GPO2 has a setting that conflicts with a setting in GPO1. When the
policies are applied, the setting in GPO2 takes effect.
You need to ensure that the settings in GPO1 supersede the settings in GPO2. The solution
must ensure that all non-conflicting settings in both GPOs are applied.
What should you do?

What should you run from Windows PowerShell?

HOTSPOT
Your network contains an Active Directory domain named contoso.com.
You have a comma separated value (CSV) file named Users.txt. Users.txt contains the
information for 500 users and all of the attributes required to create user accounts.
You plan to automate the creation of user accounts by using the Users.txt file.
You need to identify which two cmdlets you must run. The solution must pipe the output from
the first cmdlet to the second cmdlet.
What should you run from Windows PowerShell? To answer, configure the appropriate
PowerShell command in the answer area.

You need to ensure that RODC1 has a copy of the DNS application directory partition of contoso.com

Your network contains an Active Directory forest named contoso.com. The functional level of
the forest is Windows Server 2008 R2.
The DNS zone for contoso.com is Active Directory-integrated.
You deploy a read-only domain controller (RODC) named RODC1.
You install the DNS Server server role on RODC1.
You discover that RODC1 does not have any DNS application directory partitions.
You need to ensure that RODC1 has a copy of the DNS application directory partition of
contoso.com.
What should you do?

You need to ensure that the GPO is applied only to client computers that have sufficient free disk space

Your network contains an Active Directory domain. The domain is configured as shown in
the exhibit. (Click the Exhibit button.)

You have a Group Policy object (GPO) linked to the domain. The GPO is used to deploy a
number of software packages.
You need to ensure that the GPO is applied only to client computers that have sufficient free
disk space.
What should you do?

You need to identify all of the authentication requests that originate from client computers that are not asso

Your network contains an Active Directory forest named contoso.com. The functional level of
the forest is Windows Server 2008 R2.
You have four Active Directory sites. Each site has multiple Active Directory subnets.
You need to identify all of the authentication requests that originate from client computers
that are not associated to an Active Directory subnet.
What should you use?


Page 12 of 62« First...1011121314...203040...Last »