How to pass cbt nuggets 70-642 download in Jun 2016
With the help of Testking 70-642 puts, you can aquire a good end result basically that will make you complete Microsoft examination. Moreover, if you been unsuccessful in the 70-642 examination the first time of using the items, just about all cash you have to pay will probably be refund. You simply need to send your own 70-642 report log since any pdf to us. Following confirming your details, well refund the amount of money and also give it back for your accounts at the earliest opportunity.
2016 Jun pdf for 70-642:
Q131. - (Topic 4)
Your network contains an Active Directory domain named litwareinc.com.
All domain controllers and servers run Windows Server 2008 R2 Service Pack 1 (SP1).
A domain controller named DC1 hosts a primary zone for litwareinc.com.
You have two servers named Server1 and Server2. Both servers host the same website.
Server1 is located on a subnet named Subnet1. Server2 is located on a subnet named Subnet2.
You create two host (A) records for web.litwareinc.com. One record points to the IP address of Server1. The other record points to the IP address of Server2. All users access the website by using the URL http://web.litwareinc.com.
You discover that the client computers on Subnet1 always connect to Server1 when they access the URL
You need to ensure that all of the client computers are distributed randomly between Server1 and Server2 when accessing the URL http://web.litwareinc.com.
What should you do?
A. Modify the time-to-live (TTL) value for the A records of Server1.litwareinc.com and server1.litwareinc.com.
B. Disable DNS round robin on DC1.
C. Disable netmask ordering on DC1.
D. Modify the time-to-live (TTL) value for the A records ofweb.litwareinc.com.
Round robin: Determines whether the DNS server uses the round robin mechanism to rotate and reorder a list of resource records if multiple resource records exist of the same type that exist for a query answer. By default, the DNS Server service uses round robin. Netmask ordering: Determines whether the DNS server reorders address (A) resource records within the same resource record that is set in the server's response to a query based on the Internet Protocol (IP) address of the source of the query.By default, the DNS Server service uses local subnet priority to reorder A resource records. http://technet.microsoft.com/en-us/library/cc757837(v=ws.10).aspx
Q132. - (Topic 1)
Your network contains a file server named Server1 that runs Windows Server 2008 R2. Users report that when they try to open some of the folders in \\server1\folder1, they receive an Access is Denied error message.
You need to ensure that when the users connect to \\server1\folder1, they only see the files and the folders to which they are assigned permissions.
Which tool should you use?
A. Local Security Policy
B. Share and Storage Management
C. Windows Explorer
D. Windows Firewall with Advanced Security
http://technet.microsoft.com/fr-fr/library/dd772681(v=ws.10).aspx Access-based enumeration displays only the files and folders that a user has permissions to access. Accessbased enumeration is now included in the Windows Server 2008 operating system, and you can enable it by using Share and Storage Management.
Q133. - (Topic 3)
Your company has a single Active Directory domain. The domain has servers that run Windows Server 2008 R2.
You have a server named NAT1 that functions as a NAT server. You need to ensure that administrators can access a server named RDP1 by using Remote Desktop Protocol (RDP).
What should you do?
A. Configure NAT1 to forward port 389 to RDP1.
B. Configure NAT1 to forward port 1432 to RDP1.
C. Configure NAT1 to forward port 3339 to RDP1.
D. Configure NAT1 to forward port 3389 to RDP1.
Q134. - (Topic 4)
You need to ensure that only the members of the Power Users group and the members of the Administrators group can view the events in the System log.
Which tools should you use?
B. Event Viewer
If you need to define access to just the System event log on our Windows 2008 Server.
1. open the command prompt, and run the following command to dump out the SDDL for the System log out to a txt file.wevtutil gl system > C:\temp\out.txt
2. Open the text file and copy out the channelAccess: entry channelAccess:
3. Copy the Interactive User (IU) rights and add your user or group to them.
(A;;0x1;;; S-1-5-3-3127463467463)) Last we need to apply the new SDDL. Just replace the
O:BAG:XXXX with your SDDL String you created in the previous step.
wevtutil sl System /ca:O:BAG:XXXX
In addition you can remove access for the Event Log Readers group from event log in question by removing the (A;;0x1;;;S-1-5-32-573) entry from the respective log SDDL String. http://blogs.technet.com/b/janelewis/archive/2010/04/30/giving-non-administrators-permission-to-read-eventlogs-windows-2003-and-windows-2008.aspx
Q135. - (Topic 1)
Your network contains an Active Directory forest. The forest contains a member server named Server1 that runs Windows Server 2008 R2.
You need to configure Server1 to provide central authentication of dial-up, VPN, and wireless connections to the network.
Which server role, role service or feature should you install?
A. Simple TCP/IP Services
B. Windows System Resource Manager (WSRM)
C. Routing and Remote Access service (RRAS)
D. Network Policy Server (NPS)
E. File Server Resource Manager (FSRM)
F. Network Load Balancing (NLB)
G. Windows Internal Database
H. Health Registration Authority (HRA)
I. Group Policy Management
J. Wireless LAN Service
K. Connection Manager Administration Kit (CMAK)
L. Windows Server Update Services (WSUS)
M. Services for Network File System (NFS)
Renovate examcollection 70-642:
Q136. - (Topic 1)
You have a DHCP server that runs Windows Server 2008 R2. The DHCP server has two network connections named LAN1 and LAN2.
You need to prevent the DHCP server from responding to DHCP client requests on LAN2. The server must continue to respond to non-DHCP client requests on LAN2.
What should you do?
A. From the DHCP snap-in, modify the bindings to associate only LAN1 with the DHCP service.
B. From the DHCP snap-in, create a new multicast scope.
C. From the properties of the LAN1 network connection, set the metric value to 1.
D. From the properties of the LAN2 network connection, set the metric value to 1.
Correct answer(s): A By default, the service bindings depend on whether the network connection is configured dynamically or statically for TCP/IP. Based on the method of configuration it uses, reflected by its current settings in Internet Protocol (TCP/IP) properties, the DHCP Server service performs default service bindings as follows: If the first network connection uses a manually specified IP address, the connection is enabled in server bindings. For this to occur, a value for IP address must be configured and the Use the following IP address option selected in Internet Protocol (TCP/IP) properties. In this mode, the DHCP server listens for and provides service to DHCP clients. If the first network connection uses an IP address configured dynamically, the connection is disabled in server bindings. This occurs when the Obtain an IP address automatically option is selected in Internet Protocol (TCP/ IP) properties. For computers running Windows Server 2008 R2 operating systems, this is the default setting.
In this mode, the DHCP server does not listen for and provide service to DHCP clients until a static IP address is configured. The DHCP server will bind to the first static IP address configured on each adapter. Note By design, DHCP server bindings are enabled and disabled on a per-connection, not per-address basis. All bindings are based on the first configured IP address for each connection appearing in the Network Connections folder. If additional static IP addresses (for example, as set in Advanced TCP/IP properties) are configured for the applicable connection, these addresses are never used by DHCP servers running Windows Server 2008 R2 and are inconsequential for server bindings. DHCP servers running Windows Server 2008 R2 never bind to any of the NDISWAN or DHCP-enabled interfaces used on the server. These interfaces are not displayed in the DHCP console under the current server bindings list because they are never used for DHCP service. Only additional network connections that have a primary static IP address configured can appear in the server bindings list (or be selectively enabled or disabled there).
Q137. - (Topic 2)
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2008 R2.
DC1 hosts a primary zone for contoso.com. DC2 hosts a secondary zone for contosto.com.
You need to ensure that DNS zone data is encrypted when the data replicates across the network. DC2 must provide authoritative responses to client computers.
What should you do?
A. Configure the contoso.com zone to use DNSSEC.
B. Create a new delegation in the contoso.com zone.
C. Modify the zone transfer settings of the contoso.com zone.
D. Convert the contoso.com zone to an Active Directory-integrated zone.
Q138. - (Topic 4)
Your company has a main office and a branch office. The main office has a domain controller named MAIN1 that hosts a DNS primary zone. The branch office has a DNS server named BRANCH1 that hosts a DNS secondary zone. All client computers are configured to use their local server for DNS resolution.
You change the IP address of an existing server named FILE1 in the main office.
You need to ensure that BRANCH1 reflects the change immediately.
What should you do?
A. Run the dnscmd command by using the /zonerefresh option on MAIN1.
B. set the refresh interval to 10 minutes on the Start of Authority (SOA) record.
C. Restart the DNS Server service on MAIN1.
D. Run the dnscmd command by using the/zonerefresh option on BRANCH1.
Q139. - (Topic 4)
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the SNMP Service installed.
You perform an SNMP query against Server1 and discover that the query returns the incorrect contact and location information.
You need to change the contact and location information returned by Server1.
What should you do?
A. From the properties of the SNMP Trap Service, modify the General settings.
B. From the properties of the SNMP Trap Service, modify the Logon settings.
C. From the properties of the SNMP Service, modify the General settings.
D. From the properties of the SNMP Service, modify the Agent settings.
Q140. - (Topic 2)
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2008 R2. All client computers run Windows 7.
You discover that users can use Encrypting File System (EFS) when the smart cards on their computers are removed.
You need to prevent the users from accessing EFS-encrypted files when their smart cards are removed. From the EFS properties, you click Require a smart card for EFS.
What should you do next?
A. Set the Elliptic Curve Cryptography to Allow.
B. Set the Elliptic Curve Cryptography to Require.
C. Disable the Allow delegating saved credentials setting.
D. Disable the Create caching-capable user key from smart card option.
see more http://www.2passeasy.com/exam/70-642/