MICROSOFT NEWS: 70-646 Exam Questions has been Updated Today! Get Latest 70-646 VCE and 70-646 PDF Instantly! Welcome to Download the Newest Braindump2go 70-646 VCE&70-646 PDF Dumps: http://www.braindump2go.com/70-646.html (283 Q&As)

Quick and Effective Microsoft 70-646 Exam Preparation Options – Braindump2go new released 70-646 Exam Dumps Questions! Microsoft Official 70-646 relevant practice tests are available for Instant downloading at Braindump2go! PDF and VCE Formates, easy to use and install! 100% Success Achievement Guaranteed!

Exam Code: 70-646
Exam Name Windows Server 2008, Server Administrator
Certification Provider: Microsoft
Corresponding Certifications: MCSA, MCSA: Windows Server 2008, MCSE, MCSE: Private Cloud Windows Server 2008

70-646 Dumps,70-646 Study Guide,70-646 Exam Questions,70-646 eBook,70-646 eBook PDF,70-646 Dumps PDF,70-646 Dumps Latest,70-646 Book,70-646 Braindumps,70-646 Braindump PDF,70-646 Braindump Free,70-646 Practice Test,70-646 Practice Questions,70-646 PDF eBook,70-646 PDF,70-646 VCE

QUESTION 181
You need to recommend changes to Web1 to ensure that server backups can be performed remotely from Backup1.
Which two changes should you include in the recommendation? (Each correct answer presents part of the solution. Choose two.)

A.    Install Windows PowerShell.
B.    Install Windows Server Backup.
C.    Modify the Windows Firewall settings.
D.    Enable the IIS Management Service feature.

Answer: BC

QUESTION 182
You need to recommend a security strategy for WebApp2 that meets the company’s application requirements.
What should you include in the recommendation?

A.    Basic authentication and connection security rules
B.    Basic authentication and SSL
C.    Digest authentication and connection security rules
D.    Digest authentication and SSL

Answer: B
Explanation:
You must support multiple browsers and one advantage of the basic access authentication is all web browsers support it. But due to the fact that the username and password are passed in clear text, it is rarely used by itself on publicly accessible Internet web sites. However, it is somewhat commonly found on publicly accessible sites if combined with SSL/TLS (HTTPS).
The use of SSL/TLS to encrypt the entire connection mitigates the fact that the Basic passwords themselves are not encrypted. Most browsers will actually display an alert of some kind if a site uses Basic Auth without SSL/TLS, but will not display an alert when Basic Auth is used on a connection that has SSL/TLS enabled.

Case Study 11 – Nothwind Traders (QUESTION 183 – QUESTION 188)
COMPANY OVERVIEW
Northwind Traders is an import/export company that has a main office and two branch offices.
The main office is located in Toronto.
The branch offices are located in Vancouver and Seattle.
The main office has 2,000 users. Each branch office has 500 users.
EXISTING ENVIRONMENT
All client computers run Windows 7 Enterprise.
All servers run Windows Server 2008 R2.
All new servers are deployed by using Windows Deployment Services (WDS).
Northwind Traders has multiple Hyper-V servers.
The Hyper-V servers are managed by using Microsoft System Center Virtual Machine Manager (VMM).
The perimeter network contains a standalone server.
The server has the Active Directory Lightweight Directory Service (AD LDS) service role installed.
AD LDS is administered on the server by using the Active Directory module for Windows PowerShell.
All virtual machines (VMs) access iSCSI-based storage by using a Microsoft iSCSI Initiator installed on the VM.
Existing Active Directory/Directory Services
The network contains a single Active Directory forest named northwindtraders.com.
The forest contains five Remote Desktop servers.
All Remote Desktop servers are in an organizational unit (OU) named RD Servers.
TECHNICAL REQUIREMENTS
Northwind Traders must meet the following technical requirements:
– Minimize server downtime.
– Ensure that you can recover all of the data hosted on the VMs.
– Ensure that you can perform bare metal restores of the Hyper-V servers.
– Minimize the number of times a server restarts when it is deployed.
– Monitor the CPU utilization, memory utilization, and disk utilization of all the servers to analyze performance trends.
– Ensure that a specific set of Group Policy settings are applied to users who use Remote Desktop to connect to the Remote Desktop servers.
The settings must differ from those applied when the users log on locally to their own computers.
– Copy a custom Microsoft Office Word dictionary to the computers in the legal department.
Update the custom dictionary on a regular basis.
Copy the updated version of the dictionary as soon as possible to the legal department computers.

QUESTION 183
You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.
What should you include in the recommendation?

A.    a server authentication certificate
B.    client authentication certificates
C.    Digest authentication
D.    Windows Integrated authentication

Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/cc725767%28WS.10%29.aspx
The Lightweight Directory Access Protocol (LDAP) is used to read from and write to Active
Directory Lightweight Directory Services (AD LDS). By default, LDAP traffic is not transmitted securely.
You can make LDAP traffic confidential and secure by using Secure Sockets Layer (SSL) / Transport Layer Security (TLS) technology.
To enable SSL-based encrypted connections to AD LDS, you must request and obtain a server authentication certificate from a trusted certification authority (CA) in your organization or from a trusted third-party CA. For more information about installing and using a CA, see Certificate Services (http://go.microsoft.com/fwlink/?LinkID=48952).

QUESTION 184
You need to recommend a solution for monitoring the servers.
The solution must meet the company’s technical requirements.
What should you include in the recommendation?

A.    Data Collector Sets (DCSs)
B.    event subscriptions
C.    Reliability Monitor
D.    Windows System Resource Manager (WSRM)

Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/cc771692%28WS.10%29.aspx
Data Collector Sets An important new feature in Windows Reliability and Performance Monitor is the Data Collector Set, which groups data collectors into reusable elements for use with different performance monitoring scenarios. Once a group of data collectors is stored as a Data Collector
Set, operations such as scheduling can be applied to the entire set through a single property change. You can schedule repeated collection of a Data Collector Set to create logs, load it in
Performance Monitor to see the data in real time, and save it as a template to use on other computers.
Windows Reliability and Performance Monitor also includes default Data Collector Set templates to help you begin collecting performance data immediately.

QUESTION 185
You need to recommend a solution for improving the automated deployment of servers.
The solution must meet the company’s technical requirements.
What should you include in the recommendation?

A.    an offline domain join
B.    native-boot virtual hard disks (VHDs)
C.    the Offline servicing of images
D.    the Online servicing of images

Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/offline-domain-join-djoin-step-bystep%28WS.10%29.aspx
Offline domain join is a new process that computers that run Windows® 7 or Windows Server®
2008 R2 can use to join a domain without contacting a domain controller. This makes it possible to join computers to a domain in locations where there is no connectivity to a corporate network.

QUESTION 186
You need to recommend a Group Policy strategy for the Remote Desktop servers.
What should you include in the recommendation?

A.    block inheritance
B.    loopback processing
C.    security filtering
D.    WMI filtering

Answer: B
Explanation:
http://support.microsoft.com/?id=231287
Group Policy applies to the user or computer in a manner that depends on where both the user and the computer objects are located in Active Directory. However, in some cases, users may need policy applied to them based on the location of the computer object alone. You can use the
Group Policy loopback feature to apply Group Policy Objects (GPOs) that depend only on which computer the user logs on to.
http://technet.microsoft.com/en-us/windowsserver/cc817587
Managing Terminal Services
What is loopback processing?
Group Policy loopback processing can be used to alter the application of GPOs to a user by including GPOs based on the location of the computer object. The typical way to use loopback processing is to apply GPOs that depend on the computer to which the user logs on.

QUESTION 187
You need to recommend a solution for deploying the custom Word dictionary.
What should you include in the recommendation?

A.    Distributed File System (DFS)
B.    Group Policy preferences
C.    Offline servicing
D.    WDS

Answer: B

QUESTION 188
You need to recommend a backup strategy for HyperV.
What should you recommend?

A.    Take a snapshot of each VM, and then run a full backup of the HyperV hosts by using
Windows Server Backup.
B.    Shut down the VMs, and then run a full backup of the HyperV hosts by using Windows
Server Backup. Restart the VMs when the backup is complete.
C.    From each VM, run a full backup by using Windows Server Backup, and then run a full
backup of the HyperV hosts by using Windows Server Backup.
D.    From each VM, run a full backup by using Windows Server Backup.
Shut down the VMs, and then run a full backup of the HyperV hosts by using Windows
Server Backup. Restart the VMs when the backup is complete.

Answer: C

Case Study 12 – Wingtip Toys (QUESTION 189 – QUESTION 194)
COMPANY OVERVIEW
Wingtip Toys is an international company that has a main office and several branch offices.
The main office is located in Moscow.
The branch offices are located throughout Europe.
The main office has 500 users. Each branch office has 4 to 70 users.
PLANNED CHANGES
Wingtip Toys opens a new branch office that contains a file server.
You plan to promote the file server to a Read-only Domain Controller (RODC).
Wingtip Toys plans to hire a consulting firm to manage its Web site.
The consulting firm must only be permitted to manage the Web site and must be prevented from accessing to all other server resources.
Wingtip Toys plans to purchase a high-resolution printer that will be connected to a print server in the main office.
Users must be charged for each page that they print on the printer.
You plan to present additional storage to a two node failover cluster in the main office.
The storage will be used by the file server instance.
EXISTING ENVIRONMENT
All servers run either Windows Server 2008 or Windows Server 2008 R2.
All client computers run either Windows Vista Enterprise or Windows 7 Enterprise.
Existing Network Infrastructure
The network contains an internal network and a perimeter network.
The company Web site is hosted on a standalone server in the perimeter network.
The main office connects to each branch office by using a 1-Mbps WAN link.
Existing Active Directory Environment
The network contains a single Active Directory domain named wingtiptoys.com.
An Active Directory site exists for each office.
Each Active Directory site contains a single subnet.
The main office has two domain controllers.
Each branch office has a single domain controller.
REQUIREMENTS
Technical Requirements
Wingtip Toys must meet the following technical requirements:
– Minimize network utilization.
– Minimize WAN link utilization.
– Ensure that the file servers can access additional storage as a local drive.
– Ensure that changes to the network are transparent to users whenever possible.
– Ensure that new storage solutions are supported by Windows Failover Clustering.
– Ensure that each user can access his Documents folder from any client computer.
– Automatically organize the files on the file servers according to the contents of the files.
– Ensure that storage can be provisioned without causing any downtime of the file servers.
– Ensure that the data on the file servers is protected by using Windows BitLocker Drive Encryption (BitLocker).
Problem Statements
All users store their documents and other data in the Documents folder on their respective client computers.
The users report that when they log on to a computer that is not their own, their documents are unavailable.

QUESTION 189
You need to recommend a solution for storing user documents.
What should you include in the recommendation?

A.    folder redirection
B.    home folders
C.    mandatory user profiles
D.    roaming user profiles

Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/cc732275.aspx
Folder Redirection User settings and user files are typically stored in the local user profile, under the Users folder. The files in local user profiles can be accessed only from the current computer, which makes it difficult for users who use more than one computer to work with their data and synchronize settings between multiple computers. Two technologies exist to address this problem:
Roaming Profiles and Folder Redirection. Both technologies have their advantages, and they can be used separately or together to create a seamless user experience from one computer to another. They also provide additional options for administrators managing user data.

QUESTION 190
You need to recommend a monitoring solution for the new printer.
What should you include in the recommendation?

A.    Data Collector Sets (DCSs)
B.    event subscriptions
C.    object access auditing
D.    Print Management filters

Answer: C


Braindump2go Promises All our customers: 100% All Exams Pass Or Full Money Back! Our experts have complied the fail proof 70-646 Exam content to help all candidates pass your 70-646 certification exam easily in the first attempt and score the top possible grades too.Do you want to sucess? Come to Braindump2go and our experts team will tell you what you need to do! 70-646 Exam Dumps Full Version Download:

FREE DOWNLOAD: NEW UPDATED 70-646 PDF Dumps & 70-646 VCE Dumps from Braindump2go: http://www.braindump2go.com/70-646.html (283 Q&As)