PrepAway - Latest Free Exam Questions & Answers

Category: 70-643 (v.1)

Exam 70-643: TS: Windows Server 2008 Applications Infrastructure, Configurings (21 percent)

You need to implement the highest security available for communications to and from the iSCSI SAN

Your company has a single Active Directory domain. All servers run Windows Server 2008 R2.

You install an iSCSI storage area network (SAN) for a group of file servers.

Corporate security policy requires that all data communication to and from the iSCSI SAN must be as secure as possible.

You need to implement the highest security available for communications to and from the iSCSI SAN.

What should you do?

You need to prevent failback of the cluster during business hours

You have two servers named FC1 and FC2 that run Windows Server 2008 R2 Enterprise.
Both servers have the Failover Clustering feature installed.
You configure the servers as a two-node cluster.
The cluster runs an application named APP1.
Business hours for your company are 09:00 to 17:00. APP1 must be available during these hours.
You configure FC1 as the preferred owner for APP1.

You need to prevent failback of the cluster during business hours.

What should you do?

Which command should you run on the server?

You install the Web Server (IIS) server role on a server that runs Windows Server 2008 R2.
You configure a Web site named contoso.com and a Web application named Acctg on the Web server.
The Web server runs out of disk space.
You move Acctg to another drive on the Web server.

The following table shows the current application configuration:

Users report that they cannot access Acctg.

You need to enable users to access Acctg.

Which command should you run on the server?

Which commands should you run?

Your company has an Active Directory domain.
The company runs Remote Desktop Services.
All Remote Desktop Services accounts are configured to allow session takeover without permission.
A user has logged on to a server named Server2 by using an account named User1.
The session ID for User1 is 1337.

You need to perform a session takeover for session ID 1337.

Which commands should you run?

You need to configure the Remote Desktop Services Per User Client Access License (RD Per User CAL) tracking an

Your company has a Windows Server 2003 Active Directory domain.
A server named Server1 runs Windows Server 2008 R2.
The Remote Desktop Services server role is installed on Server1.
A server named Server2 runs Windows Server 2003.
The TS Licensing role service is installed on Server2.

You need to configure the Remote Desktop Services Per User Client Access License (RD Per User CAL) tracking and reporting to work on both Server1 and Server2.

What should you do?

Which Group Policy object (GPO) should you create and apply to the Remote Desktop Server farm?

Your company has an Active Directory domain.
All servers in the domain run Windows Server 2008 R2.
The RD Gateway role service is installed on a server named Server1.
The Remote Desktop Services server role is installed on two servers named Server2 and Server3.
Server2 and Server3 are configured in a load balancing Remote Desktop Services farm named Farm1.
You deploy the RD Connection Broker service on a new server named Server4.
You confirm that the RD Connection Broker works correctly.
You deploy a hardware load balancing device to handle the load distribution to the Remote Desktop Services farm.
The device has specialized support for remote desktop services and routing tokens.
You discover that the RD Connection Broker no longer works correctly.

You need to ensure that the RD Connection Broker works correctly.

Which Group Policy object (GPO) should you create and apply to the Remote Desktop Server farm?

Which two actions should you perform? (Each correct answer presents part of the solution

Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster.
The cluster is intended to provide high availability and load balancing for only the intranet Web site.
The name of the cluster is web.contoso.com.
You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name.
The web.contoso.com Network Load Balancing cluster is configured with only one port rule.

You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

Which two actions should you perform? (Each correct answer presents part of the solution

You have two servers that run Windows Server 2008 R2 Enterprise.
Both servers have the Failover Clustering feature installed.
You configure the servers as a two-node cluster.
The cluster nodes are named NODE1 and NODE2.
You have an application named PrintService that includes a print spooler resource.

You need to configure the cluster to automatically return the PrintService application to NODE1 after a failover.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

You need to configure the virtual machine to meet the following requirements:

You have a server that runs Windows Server 2008 R2 and has the Hyper-V server role installed.
You create a new virtual machine.

You need to configure the virtual machine to meet the following requirements:

* Allow network communications between the virtual machine and the host system.
* Prevent communications to other network servers.

What should you do first?


Page 27 of 32« First...1020...2526272829...Last »