2012年12月5日星期三

Latest Microsoft 070-659 Exam Questions for Free, Download the Best 70-659 Practice Test, Study Guide and Dumps


Latest Microsoft 070-659 Exam Questions for Free, Download the Best 70-659 Practice Test, Study Guide and Dumps

Enjoy the Best Microsoft 070-659 Exam Questions for FREE. Download the Free 070-659 Sample Questions Here.

Version: 8.5  Last Update: June, 2012


1. You install Windows Server 2008 R2 Enterprise (Full Installation).
You need to add the Hyper-V role to the server.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.
Choose two.)
A. Run the start /w hvconfig command.
B. Run the start /w ocsetup Microsoft-Hyper-V command.
C. Run the Add-WindowsFeature Hyper-V PowerShell cmdlet.
D. Run the Add-WindowsFeature RSAT-Hyper-V PowerShell cmdlet.
Answer: BC
2. You add the Hyper-V role to your Windows Server 2008 R2 Datacenter server.
You see the following error in the Windows system event log: Hyper-V launch failed: No-execute (NX) or
DEP not enabled on processor 0x0 (check BIOS settings).
You need to be able to start the Hyper-V services.
What should you do?
A. Remove and re-add the Hyper-V role.
B. Restart the Hyper-V Virtual Machine Management service.
C. Enable the Intel XD bit (exclude disable bit) or AMD NX bit (no execute bit).
D. Enable the Intel Virtualization Technology (Intel VT) or AMD Virtualization (AMD -V).
Answer: C
3. You have a Microsoft Hyper-V Server 2008 R2 server.
You need to join the server to an existing Active Directory Domain Services (AD DS) domain.
Which should you use?
A. ocsetup
B. hvconfig
C. sc config
D. net config
Answer: B
4. You install Windows Server 2008 R2 (Server Core Installation) on a server.
You need to be able to remotely manage storage on the server by using Disk Manager.
What should you do?
A. Install the Microsoft Remote Server Administration Tools (RSAT).
B. Use the DISKPART utility to run the attributes volume clear readonly command for each volume.
C. Run the netsh advfirewall Firewall set rule group="Remote Administration" new enable=yes command.
D. Run the netsh advfirewall Firewall set rule group="Remote Volume Management" new enable=yes
command.
Answer: D
5. You have a Windows Server 2008 R2 Hyper-V server with a single network adapter that is connected to
a virtual network. The virtual network is configured as External. Virtual machines (VMs) running on the
server are not able to communicate with the host server over the network.
You need to ensure that VMs running on the serv er are able to communicate with the host server over the
network.
In Virtual Network Manager, what should you do?
A. Select the Internal only connection type.
B. Select the Private virtual machine network connection type.
C. Select the Allow management operating system to share this network adapter check box.
D. Clear the Allow management operating system to share this network adapter check box.
Answer: C
6. Your company has a Microsoft Hyper-V Server 2008 R2 environment. You manage the virtual
environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2.
You are creating a virtual test environment by installing two child partitions. The test environment must be
completely isolated from all production servers.
You need to ensure that the child partitions can communicate with each other.
Which connection type should you configure?
A. Private
B. Internal
C. External
D. Dedicated host
Answer: A
7. You have a Windows Server 2008 R2 Hyper-V server with two network adapters named Adapter1 and
Adapter2.
You need to configure the server to host virtual machines (VMs) on different networks.
Which two actions should you perform on the host server? (Each correct answer presents part of the
solution. Choose two.)
A. Set Adapter1 as a management interface.
B. Configure Adapter1 to support jumbo frames.
C. Set Adapter2 in Trunk mode, and configure VM VLAN tags.
D. Disable TCP Chimney support on Adapter2, and configure VM VLAN tags.
Answer: AC
8. You install Windows Server 2008 R2 (Server Core Ins tallation) on a server. The server will store virtual
machines (VMs) on a volume that is attached to the server by means of an iSCSI connection.
You need to configure the server so that VMs can be stored on the iSCSI volume.
Which two commands should you run? (Each correct answer presents part of the solution. Choose two.)
A. iscsicli listTarget
B. iscsicli qaddTarget
C. iscsicli qloginTarget
D. iscsicli AddConnection
Answer: BC
9. You are configuring a Windows Server 2008 R2 Hyper-V failover cluster. You configure five iSCSI
logical unit numbers (LUNs) on shared storage, and you present them to the first server.
Each LUN appears twice in the Disk Management console.
You need to ensure that each LUN appears only once in the Disk Management console.
What should you do?
A. Reset the iSCSI initiator name to the default name.
B. Install and configure Microsoft Multipath I/O (MPIO).
C. In the Disk Management console, rescan the disks.
D. In the Disk Management console, configure shadow copies.
Answer: B
10. You create a virtual machine (VM) on a Windows Server 2008 R2 Hyper-V server. The VM has a
single VHD file that is connected to an IDE controller.
You need to add five new virtual disks to the VM. You must minimize the amount of virtual hardware.
What should you do?
A. Add the virtual disks to IDE Controller 0.
B. Add the virtual disks to an existing SCSI controller.
C. Remove the virtual DVD drive, and add the virtual disks to IDE Controller 1.
D. Add five SCSI controllers to the VM, and add one virtual di sk to each SCSI controller.
Answer: B
11. You are configuring a virtual machine (VM) that is running on a Windows Server 2008 R2 host server.
The primary virtual disk is connected to IDE Controller 0.
You need to add a virtual disk to the VM without shut ting down the VM.
What should you do?
A. Add the virtual disk to IDE Controller 0.
B. Add the virtual disk to IDE Controller 1.
C. Add the virtual disk to an existing SCSI controller.
D. Add a virtual network adapter to the VM. Attach an iSCSI disk to the VM through the virtual network
adapter.
Answer: C
12. Your environment includes a Windows Server 2008 R2 Hyper-V server. The server hosts several
virtual machines (VMs).
You are configuring a VM to use pass-through disks.
In the Hyper-V Manager Settings window for the VM, Disk 1 through Disk 7, Disk 9, and Disk 10 are
available in the Physical hard disk list. Disk 8 does not appear in the list, as shown in the following display.
You need to configure the VM to use Disk 8 as a pass -through disk.
What should you do?
A. Take Disk 8 offline.
B. Convert Disk 8 to a dynamic disk.
C. Format Disk 8, and mark the partition as active.
D. Run the Diskpart command. At the Diskpart prompt, type select disk 8, and then type recover.
Answer: A
13. You are configuring a Windows Server 2008 R2 server to support a virtual machine (VM) that uses a
pass-through disk.
You need to install the operating system on the VM.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Attach the pass-through disk to an IDE controller.
B. Attach the pass-through disk to a SCSI controller.
C. Place the VM configuration file on the host server.
D. Place the VM configuration file on the pass-through disk.
Answer: AC
14. You are preparing to install an operating system on virtual machines (VMs) in a Hyper -V environment.
You need to configure each VM so that you can perform a network -based operating system installation.
What should you do for each VM?
A. Add a Network Adapter.
B. Add a Legacy Network Adapter.
C. Configure a static MAC address.
D. Configure a dynamic MAC address.
Answer: B
15. You are configuring networking for a new Windows Server 2003 SP2 virtual machine (VM) in a
Windows Server 2008 R2 Hyper-V environment.
You need to configure the VM to achieve optimum network performance.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Install Integration Services on the VM.
B. In the virtual machine settings, add a Network Adapte r.
C. In the virtual machine settings, add a Legacy Network Adapter.
D. Configure a fixed maximum transmission unit (MTU) size of 1384 on the host server's virtual network
adapter.
Answer: AB
16. You use Hyper-V Manager to create a new virtual machine named VM1. VM1 has the configuration
shown in the following display.
You start VM1 and begin installing Windows Server 2008 R2 from a DVD. An error message appears, and
you are unable to complete Windows Setup.
You need to be able to install Windows Server 2008 R2 on VM1.
What should you do?
A. Move VM1.vhd to IDE Controller 0.
B. Increase the Memory setting to 2048 MB.
C. Change the BIOS setting to Boot from IDE.
D. Change the Processor setting to 1 Virtual processor.
Answer: A
17. You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage virtual
machines (VMs).
You need to deploy a cloned VM and automatically assign it a different name.
Where should you deploy the cloned VM?
A. to the same host as the source VM
B. to a different host from the source VM
C. to the same library as the source VM
D. to a different library from the source VM
Answer: A
18. You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to create and manage
virtual machines (VMs).
You attempt to create the first VM on a Hyper-V host by using Windows PowerShell. You receive an error
message stating that the New-VM PowerShell cmdlet is not recognized.
You need to be able to create VMs by using PowerShell.
What should you do?
A. Install the VMM Self-Service Portal.
B. Enable the Windows PowerShell Integrated Scripting Environment feature.
C. In PowerShell, run the Add-PSSnapin Microsoft.SystemCenter.VirtualMachineManager cmdlet.
D. Run the Create-VM -Name "VM01" -VirtualHardDisk $VHD -VMHost $VMHost -Path "C:\MyVMs"
PowerShell cmdlet.
Answer: C
19. You configure a new virtual machine (VM) on a Windows Server 2008 R2 Hyper -V failover cluster. You
install the operating system on the VM from a media image. You install Microsoft System Center
Operations Manager 2007 R2 in the environment.
Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 reports the VM status as Unsupported
Cluster Configuration.
You need to ensure that you can manage the VM by using VMM.
What should you do?
A. Detach the media image from the VM configuration.
B. Place the VM's VHD on a Customer Shared Volume (CSV)
C. Implement Performance and Resource Optimization (PRO).
D. Copy the media image to the same disk as the VM, and mount the ISO file.
Answer: A
20. You add a Windows Server 2008 R2 server with the Hyper-V role installed to an existing Hyper-V
failover cluster.
After you move a virtual machine (VM) to the new cluster node, Microsoft System Center Virtual Machine
Manager (VMM) 2008 R2 reports the status of the VM as Uns upported Cluster Configuration.
You need to be able to manage the VM by using VMM.
What should you do?
A. Disable TCP Chimney Offload on the new cluster node's network adapters.
B. Disable the TCP/IP Offload Engine (TOE) on the new cluster node's network adapters.
C. Move the VM configuration file to a local storage device, and update the pointer to the file.
D. Update the virtual networking configuration of the new cluster node to match the virtual networking
configuration of the original cluster nodes.
Answer: D
21. You have a Windows Server 2008 R2 Hyper-V failover cluster with a single iSCSI logical unit number
(LUN) and one highly available virtual machine (HAVM). You manage the virtual environment by using
Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You monitor the environment by
using Microsoft System Center Operations Manager 2007 R2.
You configure a new virtual machine (VM) by deploying a VHD from the VMM library and placing the VHD
on the existing iSCSI LUN. You create a HAVM configuration, and you attach the VHD to the
configuration.
VMM reports the status of the VMs as Unsupported Cluster Configuration.
You need to be able to manage the VMs by using VMM.
What should you do?
A. Move the VHD of one HAVM to a new iSCSI LUN.
B. Move the VHD of one HAVM to the system volume of a cluster node.
C. Configure Performance and Resource Optimization (PRO) on the Windows Server 2008 R2 cluster
nodes.
D. Configure Windows System Resource Manager (WSRM) on the Windows Server 2008 R2 cluster
nodes.
Answer: A
22. You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center
Virtual Machine Manager (VMM) 2008 R2. Testers are members of an AD security group named Test.
You need to ensure that members of the Test grou p can create VMs on a specific host server by using the
VMM Self-Service Portal.
What should you do?
A. In VMM, specify a template for new VMs created by members of the Test group.
B. In VMM, create a Delegated Administrator user role and add the Test gro up to this role.
C. In VMM, assign the Test group the Local Administrator permission for the specific host server.
D. Install Hyper-V Manager on the client computer of each member of the Test group, and grant the Test
group administrative privileges on the specific host server.
Answer: A
23. You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center
Virtual Machine Manager (VMM) 2008 R2.
You grant a user the Delegated Administrator user role.
You need to provide the user with the ability to manage VMs through the VMM Self -Service Portal.
What should you do?
A. In VMM, grant the user the Self-Service user role.
B. In VMM, grant the user the Administrator user role.
C. Enable the Integrated Windows Authentication option for t he VMM Self-Service Portal.
D. Enable the Single sign-on for Terminal Services option for the VMM Self -Service Portal.
Answer: A
24. Your company has an Active Directory Domain Services (AD DS) domain that includes an AD security
group named Development.
You have a member server that runs Windows Server 2008 R2 with the Hyper -V role installed.
You need to ensure that Development group members can only manage virtual machines (VMs).
Development group members must not have administrative privileges on the h ost server.
What should you use?
A. Authorization Manager
B. Local Users and Groups
C. the net localgroup command
D. Active Directory Administrative Center
Answer: A
25. Your company has an Active Directory Domain Services (AD DS) domain that includes an AD security
group named Monitoring.
You are configuring a Windows Server 2008 R2 Hyper -V server.
You need to ensure that members of the Monitoring group can view virtual machines (VMs) but cannot
make changes to them.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.
Choose two.)
A. In Active Directory, create a group named HVMonitor. Grant the Read permission to the HVMonitor
group for the VM configuration files and the VHD files. Add the Monitoring group to the HVMonitor group.
B. In Local Users and Computers, create a group named HVMonitor. Grant the Read permission to the
HVMonitor group for the VM configuration files and the VHD files. Add the Monitoring group to the
HVMonitor group.
C. In Authorization Manager, create a role named HVMonitor. Add all the View operations and the Read
Service Configuration operation to the role. Assign the role to the Monitoring group.
D. In Authorization Manager, create a role named HVMonitor. Create a task that includes all the View
operations and the Read Service Configuration operation. Add this task to the HVMonitor role. Assign the
role to the Monitoring group.
Answer: CD
26. You are configuring your Microsoft System Center Virtual Machine Manager (VMM) 2008 R2
environment.
A VMware ESX 3.5 host server named Host1 is added to the existing VMware Infrastructure 3 (VI3)
environment that you manage by using VMM.
You need to add Host1 to your VMM environment.
What should you do?
A. In the Computer name field of the Add VMware VirtualCenter server dialog box, type the fully qualified
domain name (FQDN) of Host1.
B. In the Computer name field of the Add VMware VirtualCenter server dialog box, type the fully qualified
domain name (FQDN) of the VMware VirtualCenter server th at manages Host1.
C. In the Add Hosts wizard, select the VMware ESX Server host (any location) option. In the Computer
name field, type the fully qualified domain name (FQDN) of Host1.
D. In the Add Hosts wizard, select the VMware ESX Server host (any location) option. In the Computer
name field, type the fully qualified domain name (FQDN) of the VMware VirtualCenter server that
manages Host1.
Answer: C
27. You are configuring a new Microsoft System Center Virtual Machine Manager (VMM) 2008 R2
environment to manage your existing virtual infrastructure. The existing infrastructure includes Windows
Server 2008 R2 host servers and VMware ESX host servers.
You need to add a VMware ESX host server named Host1 to your VMM environment.
What should you do?
A. In the Computer name field of the Add VMware VirtualCenter server dialog box, type the fully qualified
domain name (FQDN) of Host1.
B. In the Computer name field of the Add VMware VirtualCenter server dialog box, type the fully qualified
domain name (FQDN) of the VMware VirtualCenter server that manages Host1.
C. In the Add Hosts wizard, select the VMware ESX Server host (any location) option. In the Computer
name field, type the fully qualified domain name (FQDN) of Host1.
D. In the Add Hosts wizard, select the VMware ESX Server host (any location) option. In the Computer
name field, type the fully qualified domain name (FQDN) of the VMware VirtualCenter server that
manages Host1.
Answer: B
28. You have a Windows Server 2008 R2 Hyper-V server.
You need to ensure that you are prompted to specify a custom snapshot name when you create a
snapshot.
What should you use to create the snapshot?
A. Hyper-V Manager
B. Windows Server Backup
C. the Virtual Machine Connection window
D. the Backup command-line tool (also known as wbadmin.exe)
Answer: C
29. You have a Windows Server 2008 R2 Hyper-V server. You take periodic snapshots of your virtual
machines (VMs) when the VMs are not running.
You delete several snapshots from the snapshot tree of a VM. The .avhd files th at are associated with the
deleted snapshots are not deleted from the volume where the VHD files are stored.
You need to ensure that the .avhd files are deleted.
What should you do?
A. Reset the VM.
B. Pause the VM.
C. Export the VM.
D. Shut down the VM.
Answer: D
30. You have a Windows Server 2008 R2 Hyper-V server.
One of the virtual machines (VMs) that is hosted on the server has a directly attached physical disk.
You need to back up the VM.
What should you do?
A. Perform a full server backup on the VM.
B. Perform a critical-volume backup on the VM.
C. Perform a full server backup on the host server.
D. Perform a critical-volume backup on the host server.
Answer: A
31. Your company has a Microsoft Hyper-V Server 2008 R2 environment.
You need to manually back up a child partition while it is turned off.
Which two elements should you back up? (Each correct answer presents part of the solution. Choose
two.)
A. the system state
B. the InitialStore.xml file
C. the child .vhd files
D. the child .xml configuration file
Answer: CD
32. Your company has a Microsoft Hyper-V Server 2008 R2 environment. You manage the environment
by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2.
You plan to install 3 host servers and 15 child partitions in the virtual environment. You will perform child
partition placements by using SAN migration.
You need to place the appropriate number of child partitions on each logical unit number (LUN) to support
SAN migrations.
How many child partitions should you place on each LUN?
A. 1
B. 3
C. 5
D. 15
Answer: A
33. Your Hyper-V servers run Windows Server 2008 R2 Standard. You manage the virtual environment by
using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2.
You need to ensure that you can migrate child partitions between host servers.
What are two possible methods that will allow you to achieve this goal? (Each correct answer presents a
complete solution. Choose two.)
A. live migration
B. SAN migration
C. quick migration
D. network migration
Answer: BD
34. Your virtual environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage
the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2.
You need to configure the live migration network priorities f or all virtual machines (VMs).
What should you do?
A. Enable Cluster Shared Volumes (CSVs).
B. In Failover Cluster Manager, edit the properties of a single VM.
C. In Virtual Network Manager, edit the properties of the virtual network.
D. In Hyper-V Manager, take each VM offline and edit the settings of each VM.
Answer: B
35. You host 16 virtual machines that are distributed evenly across an 8-node Windows Server 2008 R2
Hyper-V failover cluster.
You plan to perform live migrations of the VMs to prepare for the installation of software updates on the
cluster.
You need to perform the maximum number of simultaneous live migrations.
How many live migrations should you perform simultaneously?
A. one
B. two
C. four
D. eight
Answer: C
36. You manage your virtual environment by using Microsoft System Center Virtual Machine Manager
(VMM) 2008 R2. You monitor the environment by using Microsoft System Center Operations Manager
2007 R2.
You have three Windows Server 2008 R2 Hyper-V servers in a failover cluster.
You need to ensure that all virtual machines (VMs) are distributed automatically across the host servers,
and that the VMs will automatically fail over to the most appropriate host server.
What should you do?
A. Configure network load balancing on the VMs.
B. Configure Performance and Resource Optimization (PRO) Tips for the VMs.
C. In VMM, create a host group. Move the three host servers into the host group.
D. Configure a Fibre Channel logical unit number (LUN) on a SAN device. Configure your VMs to store
the configuration files on the Fibre Channel LUN.
Answer: B
37. You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage your Hyper -V
environment.
The finance department uses a legacy application that is not supported on Windows Serve r 2008 R2. The
application runs on a server that has the following configuration:
HWindows 2000 Server operating system
HOne 10GB hard disk, FAT formatted
H512 MB of RAM
You need to ensure that you can perform a physical -to-virtual (P2V) conversion of the server.
What should you do?
A. Use online P2V.
B. Use offline P2V.
C. Increase the server's RAM to at least 1024 MB.
D. Run the convert c: /FS:NTFS command on the server.
Answer: B
38. You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage your Hyper-V
environment.
Failures occur when you perform offline physical -to-virtual (P2V) conversions by using VMM.
You need to ensure that you have the information that is necessary to troubleshoot the problem.
What should you do?
A. Create the x:\Windows\inf\setupapi.dev.log file in Windows PE.
B. Create the scvmm_winpe.etl file on the root of the source computer's boot volume.
C. Create the scvmm_winpe_setupapi.log file on the root of the source computer's boot volume.
D. Create the scvmm_enable_winpe_tracing.txt file on the root of the source computer s boot volume.
Answer: D
39. You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage your Hyper -V
environment.
You start a physical-to-virtual (P2V) conversion by using the Convert Physical Server (P2V) Wizard. The
wizard indicates that a driver is missing.
You need to ensure that you can complete the P2V conversion.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Add the driver file to the VMM library.
B. Add the driver file to the Patch Import directory on the VMM server.
C. Run the PowerShell Add-Patch cmdlet.
D. Run the PowerShell Get-HotFix cmdlet.
Answer: BC
40. You are consolidating your data center by using Windows Server 2008 R2 Hyper-V servers.
You are performing virtual-to-virtual (V2V) conversions from Microsoft Virtual Server 2005 R2 and
VMware ESX environments by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2.
You need to place the virtual machines (VMs) to fully utilize the Windows Server 2008 R2 host servers.
What should you do?
A. Set the placement goal to Load balancing.
B. Set the placement goal to Resource maximization.
C. Implement Windows System Resource Monitor (WSRM).
D. Implement Performance and Resource Optimization (PRO).
Answer: B
41. Your environment includes Hyper-V and VMware ESX. You manage your virtual environment by using
Microsoft System Center Virtual Machine Manager (VMM) 2008 R2.
You plan to perform a virtual-to-virtual (V2V) conversion of a virtual machine (VM) that is located on the
ESX server.
You start the conversion by using the Convert Virtual Machine Wizard. Communication between the
destination host and the ESX server fails, and the conversion do es not finish successfully.
You need to ensure that the conversion finishes successfully.
What should you change?
A. WSMan permissions and settings
B. Server Message Block (SMB) settings
C. Secure Shell (SSH) and HTTPS settings
D. Windows Firewall exceptions for Background Intelligent Transfer Service (BITS)
Answer: C
42. You manage your Hyper-V environment by using Microsoft System Center Virtual Machine Manager
(VMM) 2008 R2.
You plan to perform a virtual-to-virtual (V2V) conversion of several virtual machines (VMs).
In VMM, you need to configure the default placement options to consolidate the VMs on the fewest
possible host servers.
What should you do?
A. In Administration view, set the placement goal to Load balancing.
B. In Administration view, set the placement goal to Resource maximization.
C. In the Convert Virtual Machine (V2V) Wizard, set the placement goal to Load balancing.
D. In the Convert Virtual Machine (V2V) Wizard, set the placement goal to Resource maximization.
Answer: B
43. You create a virtual machine (VM) named Server1. You export the VM to the C: \VM folder.
You need to import the VM from the correct folder.
Which folder should you choose?
A. C:\VM
B. C:\VM\Server1
C. C:\VM\Server1\Virtual Hard Disks
D. C:\VM\Server1\Virtual Machines
Answer: B
44. You are configuring a virtual machine (VM) that is hosted on a Windows Server 2008 R2 Hyper-V
server. The VM is currently in the Running state.
You need to export the VM without loss of data.
What are two possible first steps that you could perform to achieve this goal? (Each correct answer
presents a complete solution. Choose two.)
A. Save the VM.
B. Pause the VM.
C. Turn off the VM.
D. Shut down the VM.
Answer: AD
45. All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services
(RDS).
You are configuring the Remote Desktop Session Host (RD Session Host) role service.
You need to ensure that authentication occurs before the Remote Desktop Connection logon screen
appears.
What should you do?
A. In the RD Session Host Configuration tool, select the Allow connections only from computers running
Remote Desktop with Network Level Authentication option.
B. In the RD Session Host Configuration tool, select the Allow connections from computers running any
version of Remote Desktop option.
C. In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use
smart card.
D. In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use
locally logged-on credentials.
Answer: A
46. All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services
(RDS).
You are configuring the Remote Desktop Session Host (RD Session Host) role service.
You need to ensure that programs that are running continue to run when users are no longer actively
connected to the RD Session Host server.
Which setting should you configure?
A. Idle session limit
B. Active session limit
C. End a disconnected session
D. When a session limit is reached or connection is broken
Answer: C
47. Your network includes the servers shown in the following table.
Server name Operating system Role services
Server1 Windows Server 2008 R2 Standard RDS Licensing
Server2 Windows Server 2008 R2 Enterprise Remote Desktop
Server3 Windows Server 2008 R2 Enterprise Remote Desktop
Per-device Remote Desktop Services client access licenses (RDS CALs) are installed on Server1.
After you refresh a group of client computers with Windows 7, users on those computers can no longer
connect to Server2.
You need to ensure that the users can connect to remote applications.
What should you do?
A. From the affected client computers, initiate a Remote Desktop connection to Server1.
B. From the affected client computers, initiate a Remote Deskto p connection to Server3.
C. On the affected client computers, open port 3389 on the Windows Firewall.
D. On Server1, revoke the RDS device CALs of the affected client computers.
Answer: D
48. Your company has a load-balanced Remote Desktop Session Host (RD Session Host) cluster.
You need to track user session information for the load -balanced RD Session Host cluster.
What should you do?
A. Create a Remote Desktop resource authorization policy (RD RAP).
B. Create a Remote Desktop connection authorization p olicy (RD CAP).
C. Install and configure the Remote Desktop Licensing role service.
D. Install and configure the Remote Desktop Connection Broker role service.
Answer: D
49. Your company has a load-balanced Remote Desktop Session Host (RD Session Host) cluster. You
are configuring the Remote Desktop Gateway (RD Gateway) role service on servers that run Windows
Server 2008 R2.
You need to centralize the storage of Remote Desktop connection authorization policies (RD CAPs).
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Install the Network Policy Server role service.
B. Install the Distributed File System role service.
C. Configure the RD Gateway servers to use a local RD CAP store.
D. Configure the RD Gateway servers to use a remote RD CAP store.
Answer: AD
50. Your company uses Remote Desktop Services (RDS).
You install and configure the Remote Desktop Gateway (RD Gateway) role service on a server that runs
Windows Server 2008 R2. Employees connect to RDS from unmanaged remote computers.
Employees are unable to access the RD Gateway server from the unmanaged remote computers.
You need to ensure that employees can access the RD Gateway server.
What should you do?
A. Create a Remote Desktop resource authorization policy (RD RAP).
B. Create a Remote Desktop connection authorization policy (RD CAP).
C. On the RD Gateway server, open port 3389 on the Windows Firewall.
D. On the RD Gateway server, configure Network Access Protection (NAP) health policy c hecking.
Answer: B


Latest Version: 9.5  Last Update: December, 2012

Need the Latest version of 70-659 Exam Prep or the other Microsoft Exam Prep, Visit the Cheat-Test.com Official website.

2012年8月9日星期四

Free practice questions and answers are guaranteed to make you pass your HP HP3-X11 exam

Professional practice questions and answers are guaranteed to make you pass your HP HP3-X11 exam.
Cheat-Test training materials are frequently updated for relevance and accuracy. Stay ahead of the curve and have the latest exam information, tips and passing score!
Cheat-Test Printed Version
Take your training with you where ever you may roam, using the printed and bound version of the Cheat-Test HP HP3-X11 practice exam questions and answers. Once you are done preparing and pass you your exam – pass your Printed Version on to a friend or coworker, or simply keep it and review materials or use it as a reference in your daily work.
No matter what level of entry you are for your HP Certification, you will pass your HP3-X11 exam, FAST!
We provide 100% pass guarantee with our products. That is because we have 100% trust in the abilities of our professional and experience product team, and our record is a proof of that.
HP HP3-X11 Pass Guarantee
How do we maintain 100% Guarantee on Products?
We at Cheat-Test are committed to our customer’s success. Our products are created with utmost care and professionalism. We utilize the experience and knowledge of a team of industry professionals from leading organizations all over the world.
‘Success of our customers is our success’
We understand that your time is precious and our products are intended to help utilize it in an efficient way. Senior IT professionals craft the products with great efforts. We strive towards continuous improvement of our products and service. Customers are really happy with our products but if one of our customers does not succeed in an exam we provide full refund at Single E-mail notification. Additionally we review that product instantly.
Failing an Exam won’t damage you financially as we provide 100% refund on claim. On request we can provide you with another exam of your choice absolutely free of cost. Think again! What do you have to lose?
Claiming Guarantee:
Simple and Easy! To take advantage of the guarantee, simply contact Customer Support, requesting the exam you would like to claim. Send us a scanned copy of your failed exam and we will promptly proceed to refund.
Cheat-Test.com Guarantee insures your Success Otherwise Get Your MONEYBACK!
Hundreds of professionals each month – thousands each year have fantastic success with Cheat-Test Exams.
Climb up the ladder with the Cheat-Test preparation program. It is a highly recommended program for certification exams like HP3-X11 exam.
I pay bundles of gratitude to the Cheat-Test preparation package. I could never dream of passing the HP3-X11 exam without Cheat-Test. I strongly recommend HP3-X11 exam preparation program to everybody. All different preparation packages were like a ladder for me. I easily cleared one exam after the other. Today, I am a manager in a renowned IT corporation. I really enjoyed the journey with Cheat-Test. From study material to practice test, everything was so organized and clear that I did not require any other help. Thanks to Cheat-Test. ”
“Improbable study material organized in an equally excellent manner; reason of Cheat-Test’s success” – Adam Jenkins
I was really impressed by the study material that Cheat-Test had to offer while I was preparing for my HP3-X11 exam. I just cannot forget the final days of my exam when all that I had to rely upon were the practice tests of Cheat-Test that I had to go through over and over again in order to completely polish my concepts. With the help of all the content that TopITexams had to offer for HP3-X11 exam, there was no single moment where I found myself dreading in the exam. ”
Jonathan Smith thanks Cheat-Test for getting him off to a good career
I had just graduated and was in the job market, but it became frustrating getting turned down after every interview. I soon realized that I needed an edge to get hired so I decided to get some extra certification. So I searched on the internet and decided to try out Cheat-Test and after I got the material I gave exam HP3-X11. I did well and managed to land a job. Now I look back and thank Cheat-Test and I now have the confidence to get more certifications. I will turn to Cheat-Test again to help me in my career.”

2012年3月30日星期五

Cheat-Test Oracle 11g free training materials

Two years ago, when people referred to Oracle IT certificate, they would feel that the one who got it must be very excellent and he usually would be the focus of people’s eyes. But today, when you ask a friend who works in the IT field whether he has got the Oracle 11g certificate, he may exclaim, ‘why should I learn Oracle 11g which is so excessive? There are so many IT certification that many companies won’t approve it.’ This kind of reaction forces us to envisage the present state of IT certification, and is IT certification really that worthless?
IT certification, at the very beginning is that every manufacturers cultured numbers of skilled person who could give skill aid to their own products aiming at promoting them. Examinees take the examinations to get the level of 156-315 certificates, usually by standardized examinations. Similar technique authentications cover almost all the IT fields. The people gaining the certificate could be admitted by manufacturer and employers. Of course, his wage treatment would be matched with the related certification. His wage treatment would be completely improved if he could acquire higher level technical certifications.
Seen from the learning system, at present, many CISSP certifications apply the “two in one” method of combining training organizations and examining organizations together. The lure of payment attracts people’s attention, and many non-computer personnel squeeze in, so that IT certification fever continues to heat up. However, because such certifications are too many, the negative effect is that when a lot of graduates take out the certificate , they get the not entirely agreement of the recruitment staff but accompanied by a kind of suspicion.
Now, every year thousands of people participate in Oracle certification exams, thousands of people participate in Oracle 11g, more and more people participate in HP0-S21 certification exams. In the number of candidates, students and practitioners constitute a major force of testing certification groups. However, the excessive large amount of this kind of certifications lead to the negative effect that when a graduating student take out a lot of certificates, what he receives are not only the appraisal of the employers but also the suspicion of them. The official training regulations of Oracle 11g writes that students of more than two years’ experience are suggested to take part in the training.
That means what training provides are to help student to develop their academic level instead of eliminate illiteracy in IT industry. Then, how do those collage students without any working experience pass the PMI-001 and get PW0-104 certification? Therefore, every kind of way and problem appeare, subject stock, repeating skill, substituting for exam, cheatings would become more obviously and seriously in the management-disorder IT certification world. It is a comfort to see that there is the Oracle certificate which has a really high value. Its high training expense and strict admission system, especially the practical operation pattern allows the trainees to learn something and keeps the original ‘hardness’ of Oracle certificate at the same time. What’s more, it leaves nowhere for the ‘piracy talent’ to hide. Oracle is well known for its strict requirement. Those who have obtained the certificate have received three to four times of training on average. There is no record showing that one has passed the exam upon the first training.

Related Exams:
1Y0-A05 – Implementing Citrix XenApp 5.0 for Windows Server 2008
642-067 – 642-067 Hardcopy
1Y0-A11 – Basic Administration for Citrix NetScaler 9.0
220-702 – CompTIA A+ Practical Application (2009)
1Y0-A08 – Advanced Administration for Citrix XenApp 5.0 for Windows Sever 2008

2012年2月24日星期五

100% Assure to Pass Your Own Test

Cheat-Test.com study guide will expose you to the actual primary reasoning of numerous subjects so that you not just discover, but you additionally comprehend numerous technologies and subjects. All of us assure that utilizing our exercise test may adequately prepare you for your own exam, and hang you as much as move your own exam the very first time.

The actual Cheat-Test.com study guide is guaranteed to be 100% braindump totally free. All of us worth the quality of instruction you obtain through the study guide and will by no means support braindumps, or any mind get rid of website. The braindump sites can’t compare to the actual understanding, learning and comprehension you will gain from a non-braindumps website, according to details and case research, like Cheat-Test review.

With the help of braindumps applicants may measure on their own accurately against the pass requirement, monitor their own improvement and know that they’re ready for the exam in addition if you want to be aware of style of the actual exam interface and get another test prep assist you’ll be able to use exam concerns. The actual exam user interface supplied by it is really better than the genuine article. Cheat-Test review is renowned for the research material it offers on the internet for its visitors. You can even download a few real exam questions and obtain prepared for your certification exam. You can also browse the brain dumps appear for that exercise test and get to understand the details of that specific evaluation.

When choosing the actual Cheat-Test study planning supplies, you’re purchasing the best quality products accessible through the internet or even on the internet these days. The Cheat-Test exercise examinations and study instructions courses and downloading are current as well as up-to-date monthly, offering you the most recent trends. Obtain to the path for success by getting a Cheat-Test reviews. Purchase the Cheat-Test reviews training supplies these days!

Cheat-Test remains one of these simple most up-to-date websites that is well-liked all over the world because of its a lot more characteristics. It retains excellent info on IT Qualifications and offers the present data. It’s not only comprehensive information on each and every certification but additionally gives you your own required study material for the targeted accreditation. Cheat-Test.com is the best choice for you.

Microsoft

70-177 70-270

70-290 70-291

70-293 70-294

70-403 70-577

70-433 70-450
70-536 70-620
70-630 70-640
70-642 70-646
70-648 70-649
70-673 70-680
70-685 70-686

Cisco

350-001 640-802

640-816 640-822

640-864 642-415

642-545 642-642

642-813 642-832

642-874 642-902
646-205 646-364
650-299 650-379

Oracle

1Z0-858 1Z0-862

1Z0-876 1Z0-897

HP

HP0-J52 HP0-J54

HP0-M46 HP0-M47

HP0-M50 HP0-Y42
HP2-E15 HP2-E36

IBM

000-109 000-163

000-183 000-184

000-M88 000-M94

000-M96 000-M97

COG-700 COG-706

Citrix

1Y0-A18 1Y0-A19
1Y0-A23 1Y0-A24

CompTIA

220-701 200-702
N10-004 SY0-301

VMWare

VCP-410 VCP510