Free Download Microsoft 70-643 PDF Full Version Now (101-110)
QUESTION 101
Drag and Drop Question
Your company has a server named VS1 that runs Windows Server 2008 R2 and Hyper-V. The VS1 server hosts 10 virtual servers. A virtual server named VS-DB has one 64-GB fixed-size virtual hard disk (VHD). The VHD file name is disk1.vhd. You discover that VS-DB utilizes only 5 GB of the VHD. You turn off the VS-DB virtual server and want to regain the unused disk space on the VS1 physical server. You need to configure VS-DB to make the disk1.vhd file as small as possible. What should you do? (To answer, move the appropriate tasks from the list of tasks to the answer area and arrange them in the correct order.)
QUESTION 102
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed. You create a new virtual machine and perform an installation of Windows Server 2003 on the virtual machine. You configure the virtual machine to use the physical network card of the host server. You notice that you are unable to access network resources from the virtual machine. You need to ensure that the virtual host can connect to the physical network. What should you do?
A. On the host server, install the Microsoft Loopback adapter.
B. On the host server, enable the Multipath I/O feature.
C. On the virtual machine, install the Microsoft Loopback adapter.
D. On the virtual machine, install Microsoft Hyper-V Integration Components.
Answer: D
Explanation:
Networking and virtual machines To connect a virtual machine to a virtual network, you add a virtual network adapter to the virtual machine and then connect the virtual network adapter to an existing virtual network. There are two types of network adapters available for Hyper-V: a network adapter and a legacy network adapter. The network adapter is designed specifically for Hyper-V and requires a virtual machine driver that is included with the Hyper-V integration services. This type of networking adapter provides better performance than a legacy network adapter and is the recommended choice when it can be used. Because this type of virtual network adapter requires integration services in the guest operating system, it can be used only with guest operating systems for which integration services are available. Note If a network adapter is configured for a virtual machine but integration services are not installed in the guest operating system, Device Manager lists the network adapter as an unknown device. Source: http://technet.microsoft.com/en- us/library/cc816585.aspx Integration services Integration services are available for supported guest operating systems as described in the following table. Windows 2003 SP2 Guest operating system – Device and service support Windows Server 2003 (x64 editions) with Service Pack 2 Drivers: IDE, SCSI, networking, video, and mouse Services: operating system shutdown, time synchronization, data exchange, heartbeat, and online backup Note This operating system does not support a legacy network adapter. Windows Server 2003 (x86 editions) with Service Pack 2 Drivers: IDE, SCSI, networking, video, and mouse Services: operating system shutdown, time synchronization, data exchange, heartbeat, and online backup Source:
http://technet.microsoft.com/en-us/library/cc794868(WS.10).aspx
QUESTION 103
You have two servers that run Windows Server 2008 R2 Enterprise. Both servers have the Failover Clustering feature installed. You configure the servers as a two-node cluster. The cluster nodes are named NODE1 and NODE2. You have an application named PrintService that includes a print spooler resource. You need to configure the cluster to automatically return the PrintService application to NODE1 after a failover. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Set the Period (hours) option to 0 in the properties of the print spooler resource.
B. Move NODE1 to the top of the list of preferred owners for the PrintService application.
C. Enable the Allow Failback and Immediate options for the PrintService application.
D. Disable the If restart is unsuccessful, failover all resources in this server or application option in the
properties of the print spooler resource.
Answer: BC
Explanation:
Preferred nodes list defined
If you define a complete preferred nodes list for a group (that is, one listing all the nodes in the cluster), then the Cluster service uses this defined list as its internal list. However, if you define a partial preferred nodes list for a group, then the Cluster service uses this defined list as its internal list and appends any other installed nodes not on the preferred list, ordered by their node IDs. For example, if you created a 5-node cluster (installing the nodes in the order Node1, Node2, Node3, Node4, and Node5) and defined Node3, Node4, and Node5 as preferred owners for the resource group, PRINTGR1, the Cluster service would maintain this ordered list for PRINTGR1:
Node3, Node4, Node5, Node1, Node2. How the Cluster service uses this list depends on whether the resource group move is due to a resource/node failure or a manual move group request.
Preferred lists and resource or node failures
For resource group or node failures, the group fails over to the node next to the current owner on the preferred nodes list. In the example above, if the resource group PRINTGR1 on Node3 fails, then the Cluster service would fail that group over to the next node on the list, Node4. If you allow failback for that group, then when Node3 comes up again, the Cluster service will fail back PRINTGR1 to that node.
Source: http://technet.microsoft.com/en-us/library/cc737785.aspx
QUESTION 104
A server runs Windows Server 2008 R2. The Remote Desktop Services server role is installed on the server. You deploy a new application on the server. The application creates files that have an extension of .xyz. You need to ensure that users can launch the remote application from their computers by double- clicking a file that has the .xyz extension. What should you do?
A. Configure the Remote Desktop Connection Client on the users’ computers to point to the server.
B. Configure the application as a published application by using a Remote Desktop Program file.
C. Configure the application as a published application by using a Microsoft Windows Installer package file.
D. Configure the application as a published application by using a Remote Desktop Web Access Web site.
Answer: C
Explanation:
Launching Apps from the Desktop
For users who want to double-click documents to launch the application, terminal services now provides the ability to "install" the remote application’s link to the desktop. This process effectively wraps the Remote-App’s RDP file into a Windows Installer package–an MSI file–that is later installed to desktops in the environment.
At the same time, the installed MSI can modify the file extension associations on the desktop to reroute a double-clicked file to its associated RemoteApp on the terminal server. Figure 3 shows how the file extension associations have been modified on a client system after a Word RemoteApp is installed. Now, double-clicking any of the common Word file extensions will launch Word via the Remote Desktop Connection.
Figure 3 File extension associations that have been altered to launch the Remote Desktop Connection To create a Windows Installer package out of an existing RemoteApp, first navigate to the TS RemoteApp Manager. Right-click the RemoteApp of interest and select Create Windows Installer Package. By default, all created Windows Installer packages are stored in the location
C:\Program Files\Packaged Programs, but this location can be changed from within the RemoteApp Wizard. Also configurable within the wizard are the name and port for the server that will host the RemoteApp, as well as server authentication, certificate settings, and TS Gateway settings. Settings that relate to the application’s location after installation to a candidate desktop are shown in Figure 4.
As you can see, it is possible to create a shortcut on the desktop as well as to a location within the Start menu folder. The most important checkbox on this screen is at the very bottom. It’s the checkbox for Take over client settings, and it re-associates any file extension associations for the RemoteApp from the local desktop to the terminal server.
This checkbox must be selected if you want users to be able to double-click documents to launch their TS-hosted application. Click Next and Finish to complete the wizard. Please Note: -Since Windows2008R2 Terminal Services (TS) is now rebranded to Remote Desktop Services (RDS)-
Source: http://technet.microsoft.com/en-us/query/dd314392
QUESTION 105
You have a server that runs Windows Server 2008 R2. The server has Remote Desktop Web Access (RD Web Access) installed. Several line-of-business applications are available on the server by using RD Web Access. You install a new application on the server. You need to make the application available through RD Web Access. What should you do?
A. From the command prompt, run the mstsc.exe command and specify the /v parameter.
B. From the RD Web Access Web site, specify the data source for RD Web Access.
C. From RemoteApp Manager, add the application to the RemoteApp Programs list.
D. From the Local Users and Groups snap-in, add the users to the TS Web Access Computers group.
Answer: C
Explanation:
Once you’ve installed a RemoteApp, enabling it for TS Web Access is done by right- clicking the configured RemoteApp in the TS RemoteApp Manager and selecting Show in TS Web Access. Please Note: -Since Windows2008R2 Terminal Services (TS) is now rebranded to Remote Desktop Services (RDS)-
Source: http://technet.microsoft.com/en-us/query/dd314392
QUESTION 106
You have a server that runs the Remote Desktop Gateway (RD Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices. You create a security group named Remote1 for the users who need to connect to computers in their offices. You need to enable the users to connect to the RD Gateway. What should you do?
A. Add the Remote1 security group to the local remote desktop users group on the RD Gateway server.
B. Create a connection authorization policy.
Add the Remote1 security group and enable Device redirection.
C. Create a resource authorization policy.
Add the Remote1 security group and enable Users to connect to any resource.
D. Create a Group Policy object and enable the Set RD Gateway authentication method properties to Ask for
credentials, use Basic protocol.
Apply the policy to the RD Gateway server.
Answer: B
Explanation:
Once you’ve installed a RemoteApp, enabling it for TS Web Access is done by right- clicking the configured RemoteApp in the TS RemoteApp Manager and selecting Show in TS Web Access. Please Note: -Since Windows2008R2 Terminal Services (TS) is now rebranded to Remote Desktop Services (RDS)-
Source: http://technet.microsoft.com/en-us/query/dd314392
QUESTION 107
Your network contains a server that has Microsoft SharePoint Foundation 2010 installed. You need to ensure that a user named User1 can use Windows PowerShell to back up SharePoint site collections. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Run the Add-SPShellAdmin cmdlet.
B. Run the Start-SPAssignment cmdlet.
C. Add User1 to the Farm Administrators group.
D. Add User1 to the local Backup Operators group.
Answer: AC
Explanation:
Group memberships required to run backup and restore operations in Central Administration You must ensure that all user accounts that will be backing up or restoring your farm and farm components by using Central Administration have the group memberships that are described in the following table. Required group memberships Setting permissions for running backup and restore operations by using Windows PowerShell You must ensure that all user accounts that will be backing up or restoring your farm and farm components by using Windows PowerShell are added to the SharePoint_Shell_Access role for a specified database and have the permissions described in the table later in this section.
You can run the Add-SPShellAdmin cmdlet to add a user account to this role. You must run the command for each user account. Moreover, you must run the command for all databases to which you want to grant access.
Add-SPShellAdmin -Username <User account> -Database <Database ID>
Source: http://technet.microsoft.com/en-us/library/ee748626.aspx
QUESTION 108
Your network contains a server that runs Windows Server 2008 R2. The server has Microsoft SharePoint Foundation 2010 installed. You create a new Web application named WebApp1. Webapp1 is configured to use a service account named Service1. You need to ensure that the password for Service1 is automatically changed every 30 days. What should you modify from Central Administration?
A. the Authentication Providers
B. the Managed Accounts settings
C. the Password Management Settings
D. the Service Account settings
Answer: B
Explanation:
Configure managed accounts
You need to register managed accounts with the farm to make the accounts available to multiple services. You can register a managed account by using the Register Managed Account page in Central Administration. There are no options on the Register Managed Account page to create an account in Active Directory Domain Services, or on the local computer. The options can be used to register an existing account on the SharePoint Foundation 2010 farm. Perform the steps in the following procedure to use Central Administration to configure managed account settings. To configure managed account settings by using Central Administration
1. Verify that the user account that is performing this procedure is a farm administrator.
2. On the Central Administration Web site, select Security.
3. Under General Security, click Configure managed accounts.
4. On the Managed Accounts page, click Register Managed Account.
5. In the Account Registration section of the Register Managed Account page, enter the service account credentials.
6. In the Automatic Password Change section, select the Enable automatic password change check box to allow SharePoint Foundation 2010 to manage the password for the selected account. Next, enter a numeric value that indicates the number of days prior to password expiration that the automatic password change process will be initiated.
7. In the Automatic Password Change section, select the Start notifying by email check box, and then enter a numeric value that indicates the number of days prior to the initiation of the automatic password change process that an email notification will be sent. You can then configure a weekly or monthly email notification schedule.
8. Click OK.
Source: http://technet.microsoft.com/en-us/library/ff607826.aspx
QUESTION 109
Your network contains a server that runs Windows Server 2008 R2. The server has Microsoft SharePoint Foundation 2010 installed.
You create a new Web application named WebApp1.
You need to configure WebApp1 to meet the following requirements:
– Internal users must be authenticated by using Kerberos authentication.
– External users must be authenticated by using NTLM authentication.
What should you do first?
A. Extend WebApp1.
B. Modify the User Policy.
C. Modify the Permissions Policy.
D. Configure the Alternate Access Mappings.
Answer: A
Explanation:
Extend a Web application
If you want to expose the same content in a Web application to different types of users by using additional URLs or authentication methods, you can extend an existing Web application into a new zone. When you extend the Web application into a new zone, you create a separate Internet Information Services (IIS) Web site to serve the same content, but with a unique URL and authentication type. An extended Web application can use up to five network zones (Default, Intranet, Internet, Custom, and Extranet). For example, if you want to extend a Web application so that customers can access content from the Internet, you select the Internet zone and choose to allow anonymous access and grant anonymous users readonly permissions. Customers can then access the same Web application as internal users, but through different URLs and authentication settings. For more
information, see Configure anonymous access for a claims-based Web application (SharePoint Foundation 2010), and Plan authentication methods (SharePoint Foundation 2010).
Source: http://technet.microsoft.com/en-us/library/cc288162.aspx
QUESTION 110
Your network contains a server that has Microsoft SharePoint Foundation 2010 installed. You create a new SharePoint site named Site1. You have a group named Group1. You need to grant Group1 access to Site1. Group1 must have the following permissions:
• Add Items
• Edit Items
• Approve Items
The solution must minimize the number of permissions assigned to Group1. Which permission level should you assign to Group1?
A. Contribute
B. Design
C. Full Control
D. Read
Answer: B
Explanation:
Section: SharePoint
Default permission levels
Permission levels are collections of permissions that allow users to perform a set of related tasks. SharePoint Foundation 2010 includes five permission levels by default. You can customize the permissions available in these permission levels (except for the Limited Access and Full Control permission levels), or you can create customized permission levels that contain only the permissions you need. The following table lists the default permission levels for team sites in SharePoint
Source: http://technet.microsoft.com/en-us/library/cc288074.aspx
If you want to pass Microsoft 70-643 successfully, donot missing to read latest lead2pass Microsoft 70-643 exam questions.
If you can master all lead2pass questions you will able to pass 100% guaranteed.
http://www.lead2pass.com/70-643.html
Why Choose Lead2pass?
If you want to pass the exam successfully in first attempt you have to choose the best IT study material provider, in my opinion, Lead2pass is one of the best way to prepare for the exam.
Lead2pass | Testking | Pass4sure | Actualtests | Others | |
$99.99 | $124.99 | $125.99 | $189 | $29.99-$49.99 | |
Up-to-Dated | ✔ | ✖ | ✖ | ✖ | ✖ |
Real Questions | ✔ | ✖ | ✖ | ✖ | ✖ |
Error Correction | ✔ | ✖ | ✖ | ✖ | ✖ |
Printable PDF | ✔ | ✖ | ✖ | ✖ | ✖ |
Premium VCE | ✔ | ✖ | ✖ | ✖ | ✖ |
VCE Simulator | ✔ | ✖ | ✖ | ✖ | ✖ |
One Time Purchase | ✔ | ✖ | ✖ | ✖ | ✖ |
Instant Download | ✔ | ✖ | ✖ | ✖ | ✖ |
Unlimited Install | ✔ | ✖ | ✖ | ✖ | ✖ |
100% Pass Guarantee | ✔ | ✖ | ✖ | ✖ | ✖ |
100% Money Back | ✔ | ✖ | ✖ | ✖ | ✖ |