PrepAway - Latest Free Exam Questions & Answers

Tag: 70-649

What should you do?

Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has two network adapters.
You need to configure Server1 to meet the following requirements:
All virtual machines (VMs) on Server1 must be able to communicate with other computers on the
network.
The number of virtual network connections must be minimized.

What should you do?

What should you do?

You have a test lab that contains 20 client computers and a server named Server1. The client computers run Windows 7. Server1 runs Windows Server 2008 Service Pack 2 (SP2). You install the Key Management Service (KMS) on Server1. You need to ensure that the client computers can successfully activate by using Server1.
What should you do?

Which Web site feature should you configure?

You have a server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed.
The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts. You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site.
Which Web site feature should you configure?

What should you do?

You install the Web Server (IIS) on a server that runs Windows Server 2008 R2. You install a Microsoft .NET Framework application on a Web site that is hosted on the server in a folder named wwwroot.
The .NET Framework application must write to a log file that resides in the Program FilesWebApp folder.
You need to configure the .NET Framework trust level setting for the Web site so that the application can write to the log file.
What should you do?

What should you do?

You install the Web Server (IIS) server role on a new server that runs Windows Server 2008 R2. You install a Microsoft .NET Framework application on a Web site on the Web server. The application launches a process that presents a real-time graphical report to the Web browser and creates a text report file on the hard disk drive.
The company security policy states that the application must not perform any of the following tasks:
Write to the event log.
Access Open Database Connectivity (ODBC) data sources.
Make network or Web service calls.

You need to configure the Web site so that the application can be executed. You must ensure that the application meets the outlined security requirements.
What should you do?


Page 9 of 49« First...7891011...203040...Last »