web analytics
Skip to content

[Pass Ensure VCE Dumps] Download New Free PassLeader 448q 70-642 Exam Questions Help 100% Passing Exam (16-30)

100% Valid 70-642 Exam Pass Tips: PassLeader’s 448q 70-642 exam dumps were updated in recent days with new 70-642 exam questions added, PassLeader ensure the latest 70-642 VCE dumps or PDF dumps are the newest and the most valid, our 70-642 practice tests will help you 100 percent pass 70-642 exam. Visit passleader.com and get the 70-642 exam questions with PDF and VCE. New version VCE player is also free now.

keywords: 70-642 exam,448q 70-642 exam dumps,448q 70-642 exam questions,70-642 pdf dumps,70-642 vce dumps,70-642 braindumps,70-642 practice tests,70-642 study guide,TS: Windows Server 2008 Network Infrastructure, Configuring Exam

QUESTION 16
You create a Data Collector Set (DCS). You need prevent the DCS from logging data if the server has less than 1 GB of available disk space. What should you do?

A.    Create a passive file screen.
B.    Create an active file screen.
C.    Modify the Data Manager settings of the DCS.
D.    Modify the Stop Conditions settings of the DCS.

Answer: C

QUESTION 17
Your network contains a server named Server1 that runs Windows Server 2008 R2. You discover that the server unexpectedly shut down several times during the past week. You need to identify what caused the shutdowns and which software was recently installed. What should you click from Action Center?

A.    Maintenance, and then View reliability history
B.    Troubleshooting, and then Programs
C.    Troubleshooting, and then System and Security
D.    Troubleshooting, and then View history

Answer: A

QUESTION 18
You need to document the following configurations of a server that runs Windows Server 2008 R2:
– System services
– Startup programs
– Hardware configuration
– Current CPU, network, disk, and memory utilization
Which command should you run?

A.    mrinfo.exe localhost
B.    msinfo32.exe
C.    perfmon.exe /report
D.    systeminfo.exe

Answer: C
Explanation:
Perfmon – its capable of collecting all information that is required.
Msinfo – can’t collect cpu information
http://technet.microsoft.com/en-us/library/cc766130.aspx

QUESTION 19
Your network contains a server that runs Windows Server 2008 R2. You need to create a script to identify known configuration issues. What should you include in the script?

A.    the Get-BPAModel cmdlet
B.    the Invoke-BPAModel cmdlet
C.    the Mrinfo tool
D.    the Systeminfo tool

Answer: B
Explanation:
The Invoke-BPAModel cmdlet allows you to start a Best Practices Analyzer (BPA) scan for a specific model that is installed on your computer. Check the technet here:
http://technet.microsoft.com/en-us/library/ee617290.aspx

QUESTION 20
Your network contains a server named Server1 that runs Windows Server 2008 R2. You need to identify which processes perform the most disk writes and disk reads per second. Which tool should you use?

A.    Disk Management
B.    Reliability Monitor
C.    Resource Monitor
D.    Storage Explorer

Answer: C

QUESTION 21
Your network contains a server named Server1 that runs Windows Server 2008 R2. You have a user named User1. You need to ensure that User1 can schedule Data Collector Sets (DCSs) on Server1. The solution must minimize the number of rights assigned to User1. What should you do?

A.    Add User1 to the Performance Log Users group.
B.    Add User1 to the Performance Monitor Users group.
C.    Assign the Profile single process user right to User1.
D.    Assign the Bypass traverse checking user right to User1.

Answer: A
Explanation:
Both A and B are valid users group but:
Performance Log users group : Members of this group may schedule logging of performance counters, enable trace providers, and collect event traces both locally and via remote access to this computer
Performance Monitor users group : Members of this group can access performance counter data locally and remotely.
Hence answer is “A”.

QUESTION 22
Your network contains a server named Server1 that runs Windows Server 2008 R2. You need to ensure that an administrator is notified by e-mail if the Event Viewer logs any error. What should you do from the Event Viewer console?

A.    Create a custom view, and then click the Filter Current Custom View action.
B.    Create a custom view, and then click the Attach Task to This Custom View action.
C.    From the System log, click the Filter Current Log action.
D.    From the System log, select an Error event, and then click the Attach Task to This Event action.

Answer: B


http://www.passleader.com/70-642.html

QUESTION 23
Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. From Server1, you create a collector-initiated subscription that uses Server2 as a source computer. You verify the event subscription and discover the error message shown in the exhibit. (Click the Exhibit button.)

You need to ensure that the subscription collection runs successfully. What should you do?

A.    On Server1, run winrm quickconfig.
B.    On Server2, run winrm quickconfig.
C.    From the properties of the subscription, modify the User Account options.
D.    From the properties of the subscription, modify the Protocol and Port options.

Answer: C

QUESTION 24
Your network contains a DNS server named DNS1 that runs Windows Server 2008 R2. You need to be notified by e-mail if the DNS service logs errors or warnings. The solution must minimize the number of e-mail notifications you receive. What should you do?

A.    Create an alert in Performance Monitor.
B.    Run the Configure a DNS Server Wizard.
C.    Select the DNS Server log from Event Viewer and attach a task to the log.
D.    Create a custom view from Event Viewer and attach a task to the custom view.

Answer: D

QUESTION 25
Your network contains a server named Server1 that runs Windows Server 2008 R2. You have a user named User1. You need to ensure that User1 can view the events in the Security event log. The solution must minimize the number of rights assigned to User1. What should you do?

A.    In Event Viewer, filter the Security log.
B.    In Event Viewer, configure the properties of the Security log.
C.    In the Local Security Policy console, modify the Security Options.
D.    In the Registry Editor, add a Security Descriptor Definition Language (SDDL) value.

Answer: D
Explanation:
The Security Descriptor for each log is specified by using Security Descriptor Definition Language (SDDL) syntax. For more information about SDDL syntax, see the Platform SDK, or visit the Microsoft Web site mentioned in the “References” section of this article. To construct an SDDL string, note that there are three distinct rights that pertain to event logs: Read, Write, and Clear. These rights correspond to the following bits in the access rights field of the ACE string:
1= Read
2 = Write
4 = Clear
Read more here:
http://support.microsoft.com/kb/323076

QUESTION 26
Your network contains 200 servers that run Windows Server 2008 R2. You need to archive the Security log for each server on a daily basis. Which tool should you use?

A.    Netsh
B.    Secedit
C.    Wecutil
D.    Wevtutil

Answer: D
Explanation:
wevtutil al <FileName.evtx> [/l:<LocaleString>]
http://technet.microsoft.com/en-us/library/cc749339.aspx
http://technet.microsoft.com/pt-br/library/cc732848(v=ws.10).aspx

QUESTION 27
Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations. What should you do?

A.    Configure dynamic NAT on the firewall.
B.    Configure the firewall to allow the use of Teredo.
C.    Configure a link local IPv6 address for the internal interface of the firewall.
D.    Configure a global IPv6 address for the external interface of the firewall.

Answer: B
Explanation:
In computer networking, Teredo is a transition technology that gives full IPv6 connectivity for Ipv6-capable hosts which are on the IPv4 Internet but which have no direct native connection to an IPv6 network. Compared to other similar protocols its distinguishing feature is that it is able to perform its function even from behind network address translation (NAT) devices such as home routers.
http://technet.microsoft.com/en-us/library/ee126159(v=ws.10).aspx

QUESTION 28
Your company has four DNS servers that run Windows Server 2008 R2. Each server has a static IP address. You need to prevent DHCP from assigning the addresses of the DNS servers to DHCP clients. What should you do?

A.    Create a new scope for the DNS servers.
B.    Create a reservation for the DHCP server.
C.    Configure the 005 Name Servers scope option.
D.    Configure an exclusion that contains the IP addresses of the four DNS servers.

Answer: D

QUESTION 29
You have a DHCP server named Server1 and an application server named Server2. Both servers run Windows Server 2008 R2. The DHCP server contains one scope. You need to ensure that Server2 always receives the same IP address. Server2 must receive its DNS settings and its WINS settings from DHCP. What should you do?

A.    Create a multicast scope.
B.    Assign a static IP address to Server2.
C.    Create an exclusion range in the DHCP scope.
D.    Create a DHCP reservation in the DHCP scope.

Answer: D

QUESTION 30
Your network contains a file server that runs Windows Server 2008 R2. You create a shared folder on the server. You need to ensure that an administrator is notified whenever a user saves .exe files to the shared folder. What should you do?

A.    Configure access-based enumeration (ABE).
B.    Create a file screen.
C.    Modify the NTFS permissions and the share permissions.
D.    Create a soft quota.

Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/cc732349(WS.10).aspx


http://www.passleader.com/70-642.html

Comments are closed, but trackbacks and pingbacks are open.