[Free] 2018(May) EnsurePass Testking Microsoft 70-646 Dumps with VCE and PDF 111-120

Ensurepass.com : Ensure you pass the IT Exams
2018 May Microsoft Official New Released 70-646
100% Free Download! 100% Pass Guaranteed!

Pro: Windows Server 2008, Server Administrator

Question No: 111 – (Topic 2)

You need to recommend a solution for managing GPOs. The solution must meet the company#39;s technical requirements.

What should you include in the recommendation?

  1. Desktop Optimization Pack

  2. Forefront EndPoint Protection

  3. System Center Configuration Manager

  4. System Center Operations Manager

    Answer: A Explanation:

    http://technet.microsoft.com/en-us/library/ee532079.aspx

    Imagine a tool that could help you take control of Group Policy. What would this tool do? It could help you delegate who can review, edit, approve, and deploy Group Policy objects (GPOs). It might help prevent widespread failures that can result from editing GPOs in

    production environments. You could use it to track each version of each GPO, just as developers use version control to track source code. Any tool that provided these capabilities, cost little, and was easy to deploy would certainly be worth a closer look. Such a tool indeed exists, and it is an integral part of the Microsoft庐 Desktop Optimization Pack (MDOP) for Software Assurance. MDOP can help organizations reduce the cost of deploying applications, deliver applications as services, and better manage desktop configurations. Together, the MDOP applications shown in Figure 1 can give Software Assurance customers a highly cost-effective and flexible solution for managing desktop computers.

    Ensurepass 2018 PDF and VCE

    Microsoft Advanced Group Policy Management (AGPM) is the MDOP application that can help customers overcome the challenges that can affect Group Policy management in any organization, particularly those with complex information technology (IT) environments. A robust delegation model, role-based administration, and change-request approval provide granular administrative control. For example, you can delegate Reviewer, Editor, and Approver roles to other users-even users who do not typically have access to production GPOs. (Editors can edit GPOs but cannot deploy them; Approvers can deploy GPO changes.)

    AGPM can also help reduce the risk of widespread failures. You can use AGPM to edit GPOs offline, outside of the production environment, and then audit changes and easily find differences between GPO versions. In addition, AGPM supports effective change control by providing version tracking, history capture, and quick rollback of deployed GPO changes. It even supports a management workflow by allowing you to create GPO template libraries and send GPO change e-mail notifications.

    This white paper describes the key features of AGPM, such as change control and role- based delegation. The paper then describes how Software Assurance customers can begin

    evaluating AGPM today.

    Offline Editing

    The AGPM archive provides offline storage for GPOs. As Figure 2 shows, changes that you make to GPOs in the archive do not affect the production environment until you deploy the GPOs. By limiting changes to the archive, you can edit GPOs and test them in a safe environment, without affecting the production environment.

    After reviewing and approving the changes, you can then deploy them with the knowledge that you can quickly roll them back if they have an undesired effect.

    Ensurepass 2018 PDF and VCE

    GPMC Integration

    AGPM has a server component (the AGPM Service) and a client component (the AGPM snap-in), each of which you install separately. First, you install Microsoft Advanced Group Policy Management – Server on a system that has access to the policies that you want to manage. Then, you install the Microsoft Advanced Group Policy Management – Client on any system from which Group Policy administrators will review, edit, and deploy GPOs.

    The AGPM snap-in integrates completely with the Group Policy Management Console (GPMC), as Figure 3 shows. Click Change Control in the console tree to open AGPM in the details pane and to manage the AGPM archive on the Contents tab. Here, you can review, edit, and deploy controlled GPOs (that is, GPOs in the archive). You can also take control of uncontrolled GPOs (that is, GPOs that are not in the archive), approve pending changes, and manage GPO templates. On the Domain Delegation tab, AGPM Administrators (Full Control) delegate roles to AGPM users and configure e-mail notifications. Configure the AGPM Server connection on the AGPM Server tab. AGPM 3.0 introduced the Production Delegation tab, which AGPM Administrators can use to delegate permission to edit GPOs in the production environment.

    Ensurepass 2018 PDF and VCE

    Change Control

    AGPM provides advanced change control features that can help you manage the lifecycle of GPOs. Many of the AGPM change control concepts will be familiar to administrators who have experience using common version-control tools, such as the version control feature in Microsoft Office SharePoint庐 Server 2007. The following steps are necessary to change and deploy a GPO:

    1. Check out the GPO from the archive.

    2. Edit the GPO as necessary.

    3. Check in the GPO to the archive.

    4. Deploy the GPO to production.

Change control means more than locking a GPO to prevent multiple users from changing it at the same time. AGPM keeps a history of changes for each GPO, as shown in Figure 4. You can deploy any version of a GPO to production, so you can quickly roll back a GPO to an earlier version if necessary. AGPM can also compare different versions of a GPO, showing added, changed, or deleted settings. Therefore, you can easily review changes before approving and deploying them to the production environment. In addition, a complete history of each GPO enables you to audit not only changes but also all activities related to that GPO.

Ensurepass 2018 PDF and VCE

Role-Based Delegation

Group Policy already provides a rich delegation model that allows you to delegate administration to regional and task-oriented administrators. However, Group Policy also lets administrators approve their own changes. In contrast, AGPM provides a role-based delegation model that adds a review and approval step to the workflow, as shown in Figure 5.

Ensurepass 2018 PDF and VCE

An AGPM Administrator has full control of the AGPM archive. In addition to the AGPM Administrator role, AGPM defines three special roles to support its delegation model:

  • Reviewer. Reviewers can view and compare GPOs. They cannot edit or deploy GPOs.

  • Editor. Editors can view and compare GPOs. They can also check out GPOs from the

    archive, edit GPOs, and check in GPOs to the archive. Editors can request deployment of a GPO.

  • Approver. Approvers can approve the creation and deployment of GPOs. (When Approvers create or deploy a GPO, approval is automatic.)

As an AGPM Administrator, you can delegate these roles to users and groups for all controlled GPOs within the domain (domain delegation). For example, you can delegate the Reviewer role to users, allowing them to review any controlled GPO in the domain. You can also delegate these roles to users for individual controlled GPOs. Rather than allow users to edit any controlled GPO in the domain, for example, you can give them permission to edit a specific controlled GPO by delegating the Editor role for that GPO only.

Search and Filter

AGPM 4.0 introduces the ability to filter the list of GPOs that it displays. For example, you can filter the list by name, status, or comment. You can even filter the list to show GPOs that were changed by a particular user or on a specific date. AGPM displays partial matches, and searches are not case sensitive.

AGPM supports complex search strings using the format column: string, where column is the name of the column by which to search and string is the string to match. For example, to display GPOs that were checked in by Jerry, type state: “checked in” changed by: Jerry in the Search box. Figure 6 shows another example. You can also filter the list by GPO attributes by using the format attribute: string, where attribute is the name of the GPO attribute to match. To display all GPOs that use the Windows庐 Management Instrumentation (WMI) filter called MyWMIFilter, type wmi filter: mywmifilter in the Search box.

When searching for GPOs, you can use special terms to search by date, dynamically. These special terms are the same terms that you can use when using Windows Explorer to search for files. For example, you can filter the list to display GPOs that were changed today, yesterday, this week, last week, and so on.

Cross-Forest Management

In addition to filtering, AGPM 4.0 also introduces cross-forest management. You can use the following process to copy a controlled GPO from a domain in one forest to a domain in a second forest:

Ensurepass 2018 PDF and VCE

  1. Export the GPO from a domain in the first forest to a CAB file, by using AGPM (Figure 7).

  2. On a computer in a domain in the first forest, copy the CAB file to a portable storage device.

  3. Insert the portable storage device into a computer in a domain in the second forest.

  4. Import the GPO into the archive in a domain in the second forest, by using AGPM. When you import the GPO into the second forest, you can import it as a new controlled GPO. You can also import it to replace the settings of an existing GPO that is checked out of the archive.

    The obvious benefit of cross-forest management is testing. Combined with offline editing and change control, cross-forest management enables you to test GPOs in a controlled test environment (the first forest). After verifying the GPO, you can move it into the production environment (the second forest).

    Windows Support

    Three versions of AGPM are available: AGPM 2.5, AGPM 3.0, and AGPM 4.0. Each is incompatible with the others and supports different Windows operating systems. For more information about choosing the right version of AGPM for your environment and about the Windows operating systems that each supports, see Choosing Which Version of AGPM to Install.

    AGPM 4.0 introduces support for Windows 7 and Windows Server庐 2008 R2. Additionally,

    AGPM 4.0 still supports Windows Vista庐 with Service Pack 1 (SP1) and Windows Server 2008. Table 1 describes limitations in mixed environments that include newer and older Windows operating systems.

    Question No: 112 – (Topic 2)

    You need to recommend a server build for the Web servers. Which server build should you recommend?

    1. Class 1

    2. Class 2

    3. Class 3

    4. Class 4

Answer: A

Question No: 113 – (Topic 2)

You need to recommend a strategy for using managed service accounts on the Web servers.

How many managed service accounts should you recommend?

  1. 1

  2. 2

  3. 3

  4. 5

Answer: D Explanation:

There are 5 web servers in total, 3 in the forest root domain and 1 in each child domain. Q 9 in this exam actually confirms the answer is 5 Service Account Vulnerability The practice of configuring services to use domain accounts for authentication leads to potential security exposure. The degree of risk exposure is dependent on various factors, including:

The number of servers that have services that are configured to use service accounts. The vulnerability profile of a network increases for every server that has domain account authenticated services that run on that server. The existence of each such server increases

the odds that an attacker might compromise that server, which can be used to escalate privileges to other resources on a network.

The scope of privileges for any given domain account that services use. The larger the scope of privileges that a service account has, the greater the number of resources that can be compromised by that account.

Domain administrator level privileges are a particularly high risk, because the scope of vulnerability for such accounts includes any computer on the network, including the domain controllers. Because such accounts have administrative privileges to all member servers, the compromise of such an account would be severe and all computers and data in the domain would be suspect.

The number of services configured to use domain accounts on any given server. Some services have unique vulnerabilities, which make them somewhat more susceptible to attacks. Attackers will usually attempt to exploit known vulnerabilities first. Use of a domain account by a vulnerable service presents an escalated risk to other systems, which could have otherwise been isolated to a single server.

The number of domain accounts that are used to run services in a domain. Monitoring and managing the security of service accounts requires more diligence than ordinary user accounts, and each additional domain account in use by services only complicates administration of those accounts. Given that administrators and security administrators need to know where each service account is used to detect suspicious activity highlights The need to minimize the number of those accounts.

The preceding factors lead to several possible vulnerability scenarios that can exist, each with a different level of potential security risk. The following diagram and table describe these scenarios.

For these examples it is assumed that the service accounts are domain accounts and each account has at least one service on each server using it for authentication. The following information describes the domain accounts shown in the following figure.

Account A has Administrator-equivalent privileges to more than one domain controller. Account B has administrator-equivalent privileges on all member servers.

Account C has Administrator-equivalent privileges on servers 2 and 3. Account D has Administrator-equivalent privileges on servers 4 and 5.

Account E has Administrator-equivalent privileges on a single member server only.

Ensurepass 2018 PDF and VCE

Question No: 114 – (Topic 2)

You are evaluating whether to use express installation files as an update distribution mechanism. Which technical requirement is met by using the express installation files?

  1. Newly implemented technologies must minimize the impact on LAN traffic.

  2. Newly implemented technologies must minimize the storage requirements.

  3. Newly implemented technologies must minimize the amount of bandwidth used on Internet connections.

  4. All patches and updates must be tested in a nonproduction environment before they are App1ied to production servers.

Answer: A Explanation:

http://technet.microsoft.com/en-us/library/cc708456(v=ws.10).aspx

The express installation files feature is an update distribution mechanism. You can use express installation files to limit the bandwidth consumed on your local network, but at the cost of bandwidth consumption on your Internet connection. By default, WSUS does not use express installation files. To better understand the tradeoff, you first have to understand how WSUS updates client computers.

Updates typically consist of new versions of files that already exist on the computer being

updated. On a binary level these existing files might not differ very much from updated versions. The express installation files feature is a way of identifying the exact bytes that change between different versions of files, creating and distributing updates that include just these differences, and then merging the original file with the update on the client computer. Sometimes this is called delta delivery because it downloads only the difference, or delta, between two versions of a file.

When you distribute updates by using this method, it requires an initial investment in bandwidth. Express installation files are larger than the updates they are meant to distribute. This is because the express installation file must contain all the possible variations of each file it is meant to update.

The upper part of the quot;Express Installation Files Featurequot; illustration depicts an update being distributed by using the express installation files feature; the lower part of the illustration depicts the same update being distributed without using the express installation files feature. Notice that with express installation files enabled, you incur an initial download three times the size of the update. However, this cost is mitigated by the reduced amount of bandwidth required to update client computers on the corporate network. With express installation files disabled, your initial download of updates is smaller, but whatever you download must then be distributed to each of the clients on your corporate network.

Important

Although there are some variables with express installation files, there are also some things you can count on.

For example, express installation files are always bigger in size than the updates they are meant to distribute.

As far as bandwidth goes, it is always less expensive to distribute updates using express installation files than to distribute updates without.

Not all updates are good candidates for distribution using express installation files. If you select this option, you obtain express installation files for any updates being distributed this way. If you are not storing updates locally, you cannot use the express installation files feature. By default, WSUS does not use express installation files.

To enable this option see http://technet.microsoft.com/en- us/library/cc708460(v=ws.10).aspx

Update Storage Options

Use the Update Files section to determine if updates will be stored on WSUS or if client computers will connect to the Internet to get updates. There is a description of this feature in Determine Where to Store Updates earlier in this guide.

To specify where updates are stored

On the WSUS console toolbar, click Options, and then click Synchronization Options. Under Update Files and Languages, click Advanced, then read the warning and click OK.

If you want to store updates in WSUS, in the Advanced Synchronization Options dialog box, under Update Files, click Store update files locally on this server. If you want clients to connect to the Internet to get updates, then click Do not store updates locally; clients install updates from Microsoft Update.

Deferred Downloads Options

Use the Update Files section to determine if updates should be downloaded during synchronization or when the update is approved. Find a description of this feature in quot;Deferring the Download of Updates,quot; in Determine Bandwidth Options to Use for Your Deployment earlier in this guide.

To specify whether updates are downloaded during synchronization or when the update is approved On the WSUS console toolbar, click Options, and then click Synchronization Options.

Under Update Files and Languages, click Advanced, then read the warning and click OK. If you want to download only metadata about the updates during synchronization, in the Advanced Synchronization Options dialog box, under Update Files, select the Download updates to this server only when updates are approved check box. If you want the update files and metadata during synchronization, clear the check box.

Express Installation Files Options

Use the Update Files section to determine if express installation files should be downloaded during synchronization. Find a description of this feature in “Using Express installation files,” in Determine Bandwidth Options to Use for Your Deployment earlier in this paper.

To specify whether express installation files are downloaded during synchronization On the WSUS console toolbar, click Options, and then click Synchronization Options.

Under Update Files and Languages, click Advanced, then read the warning and click OK. If you want to download express installation files, in the Advanced Synchronization Options dialog box, under Update Files, select the Download express installation files check box. If you do not want express installation files, clear the check box.

Filtering Updates Options

Use the Languages section to select the language of the updates to synchronize. There is a description of this feature in “Filtering updates,” in Determine Bandwidth Options to Use for Your Deployment earlier in this guide.

To specify language options

On the WSUS console toolbar, click Options, and then click Synchronization Options. Under Update Files and Languages, click Advanced, then read the warning and click OK. In the Advanced Synchronization Options dialog box, under Languages, select one of the following language options, and then click OK.

Download only those updates that match the locale of this server (Locale) where Locale is the name of the server locale. This means that only updates targeted to the locale of the server will be downloaded during synchronization.

Download updates in all languages, including new languages This means that all languages will be downloaded during synchronization. If a new language is added, it will be automatically downloaded.

Download updates only in the selected languages This means that only updates targeted to the languages you select will be downloaded during synchronization. If you choose this option, you must also choose each language you want from the list of those available.

Question No: 115 – (Topic 2)

You need to recommend a solution to minimize the amount of time it takes for the legal department users to locate files in the Legal share.

What should you include in the recommendation?

  1. File Server Resource Manager (FSRM)

  2. Print and Document Services

  3. Services for Network File System (NFS)

  4. Windows Search Service

    Answer: D

    Explanation: windows search is an optional component in server 2008. You have to enable the file server role to get it.

    The Windows Search Service is a file server role service that provides indexing of common files on Windows computers. By installing the Windows Search Service, clients can search more quickly for files, using an index that is stored on the file server to enable it follow these steps

    http://www.win2008workstation.com/win2008/enable-windows-search-service

    1. Start the Server Manager by clicking the Server Manager icon in the systray, or the Server Manager shortcut in directly the Start menu or in the menu Administrative Tools.

      Ensurepass 2018 PDF and VCE

    2. In the Server Manager click below the category Roles Summary on Add Roles.

      Ensurepass 2018 PDF and VCE

    3. Click Next in the Before You Begin screen.

      Ensurepass 2018 PDF and VCE

    4. In the Select Server Roles screen check File Services, then click Next.

      Ensurepass 2018 PDF and VCE

    5. You can eventually read the Introduction to File Services, and click Next.

      Ensurepass 2018 PDF and VCE

    6. Select the Windows Search Service in the Role Services list. You can optionally uncheck the File Server role.

      Ensurepass 2018 PDF and VCE

    7. Select your setting for the volumes you want to index.

      Ensurepass 2018 PDF and VCE

    8. At the Confirm Installation Selections page click Install to start the installation of the Windows Search Service role.

      Ensurepass 2018 PDF and VCE

    9. After the installation has finished click Close. The Windows Search service has now automatically be started and will be indexing your system during idle time!

      Ensurepass 2018 PDF and VCE

      Question No: 116 – (Topic 2)

      You need to recommend a solution to decrease the amount of time it takes for the sales managers to generate reports. What should you include in the recommendation?

      1. Implement Windows System Resource Manager (WSRM) on the Remote Desktop servers.

      2. Implement File Server Resource Manager (FSRM) on the Remote Desktop servers.

      3. Implement Windows System Resource Manager (WSRM) on the web servers.

      4. Implement File Server Resource Manager (FSRM) on the web servers.

Answer: A Explanation: Dedulas:

http://technet.microsoft.com/en-us/library/cc754150

You can use Windows System Resource Manager to allocate processor and memory resources to applications, users, Remote Desktop Services sessions, and Internet

Information Services (IIS) application pools So based upon the information given in the exhibits: the reports are CPU INTENSIVE amp; when there are a lot of users connected the report take longer to process.you need to reduce the time it takes for reports to be generated a bottle neck on the CPU would increase the time it takes to generate reports so the required solution would need to allocate additional CPU resources to the sales managers or else limit the CPU resources used by the regular users.

Question No: 117 – (Topic 2)

You need to recommend a strategy for using managed service accounts on the Web servers.

Which managed service accounts should you recommend?

  1. One account for all the web servers.

  2. One account for each web server.

  3. One account for the parent domain and one account for both child domains.

  4. One account for the parent domain and one account for each child domain.

Answer: B Explanation:

There are 5 web servers in total, 3 in the forest root domain and 1 in each child domain.

Service Account Vulnerability

The practice of configuring services to use domain accounts for authentication leads to potential security exposure. The degree of risk exposure is dependent on various factors, including:

The number of servers that have services that are configured to use service accounts. The vulnerability profile of a network increases for every server that has domain account authenticated services that run on that server. The existence of each such server increases the odds that an attacker might compromise that server, which can be used to escalate privileges to other resources on a network.

The scope of privileges for any given domain account that services use. The larger the scope of privileges that a service account has, the greater the number of resources that can be compromised by that account.

Domain administrator level privileges are a particularly high risk, because the scope of vulnerability for such accounts includes any computer on the network, including the domain controllers. Because such accounts have administrative privileges to all member servers, the compromise of such an account would be severe and all computers and data in the

domain would be suspect.

The number of services configured to use domain accounts on any given server. Some services have unique vulnerabilities, which make them somewhat more susceptible to attacks. Attackers will usually attempt to exploit known vulnerabilities first. Use of a domain account by a vulnerable service presents an escalated risk to other systems, which could have otherwise been isolated to a single server.

The number of domain accounts that are used to run services in a domain. Monitoring and managing the security of service accounts requires more diligence than ordinary user accounts, and each additional domain account in use by services only complicates administration of those accounts. Given that administrators and security administrators need to know where each service account is used to detect suspicious activity highlights the need to minimize the number of those accounts.

The preceding factors lead to several possible vulnerability scenarios that can exist, each with a different level of potential security risk. The following diagram and table describe these scenarios.

For these examples it is assumed that the service accounts are domain accounts and each account has at least one service on each server using it for authentication. The following information describes the domain accounts shown in the following figure.

Account A has Administrator-equivalent privileges to more than one domain controller. Account B has administrator-equivalent privileges on all member servers.

Account C has Administrator-equivalent privileges on servers 2 and 3. Account D has Administrator-equivalent privileges on servers 4 and 5.

Account E has Administrator-equivalent privileges on a single member server only.

Ensurepass 2018 PDF and VCE

Topic 3, Contoso, Ltd. Scenario:

COMPANY OVERVIEW

Contoso, Ltd. is a consulting company that has a main office and two branch offices. The main office is located in Johannesburg. The branch offices are located in Brisbane and Montreal. The Johannesburg office has 400 users. Each branch office has 100 users.

PLANNED CHANGES

Contoso plans to open a new branch office. The new office will have a 512-Kbps connection to the Montreal office and a 2-Mbps connection to the Internet.

The new branch office will have a domain controller, a DirectAccess server, a file server, and a Web server. All branch office servers will be virtualized.

Contoso plans to implement role-based access control for all new virtual machines (VMs) deployed on Hyper-V servers.

In the new branch office, a user named User1 must be permitted to perform only the following actions on the Hyper-V server:

->Start the VMs.

->View the configuration of the VMs.

EXISTING ENVIRONMENT

All servers run Windows Server 2008 R2. All client computers run Windows 7 Enterprise. The main office has multiple file servers. Each branch office has one file server. Each file server has two hard disks. One disk has the server#39; s operating system installed and the other disk stores data files. File server backups are performed regularly.

The main office has a Windows Server Update Services (WSUS) server. All client computers are configured to receive updates from the WSUS server.

The main office connects to each branch office by using a 512-Kbps WAN link.

Existing Active Directory/Directory Services

The network contains a single Active Directory domain named contoso.com. An Active Directory site exists for each office. Each Active Directory site contains three subnets. Each subnet contains client computers.

The main office has two domain controllers. Each branch office has one domain controller.

REQUIREMENTS

Storage Requirements

Contoso must meet the following storage requirements:

->Improve data availability on the file servers.

->Improve the performance of the file servers.

->Limit each user#39;s storage space on the file servers to 2 GB.

->Prevent users from storing audio and video files on the file servers.

->Provide additional storage on the file servers without causing downtime.

->Enable users to access the previous versions of all the files stored on the file servers.

Technical Requirements

Contoso must meet the following technical requirements:

->Minimize the potential attack surface.

->Minimize WAN link utilization between the offices.

->Minimize the number of server licenses purchased.

->Minimize server downtime caused by Applying updates.

->Minimize the amount of administrative effort required to approve the updates.

->Minimize the amount of time it takes for users in the branch offices to access files on the file servers in the main office.

Problem Statements

Users in the accounting department use a custom Application named App1. The configurations for App1 can only be changed by editing the registry. Currently, a technician must visit each client computer in the accounting department to change the App1 configurations.

Question No: 118 – (Topic 3)

You need to recommend a solution for users in the branch office to access files in the main office. What should you include in the recommendation?

  1. a BranchCache server that operates in Distributed Cache mode

  2. a BranchCache server that operates in Hosted Cache mode

  3. a domainbased Distributed File System (DFS) namespace and DFS Replication

  4. a standalone Distributed File System (DFS) namespace and DFS Replication

Answer: B Explanation:

http://technet.microsoft.com/en-us/library/dd755969(WS.10).aspx

requirement = Minimize the amount of time it takes for users in the branch offices to access files on the file servers in the main office BranchCache鈩?is a feature in Windows庐 7 and Windows Server庐 2008 R2 that can reduce wide area network (WAN) utilization and enhance network application responsiveness when users access content in a central office from branch office locations. When you enable BranchCache, a copy of the content that is

retrieved from the Web server or file server is cached within the branch office. If another client in the branch requests the same content, the client can download it directly from the local branch network without needing to retrieve the content by using the Wide Area Network (WAN).

This whitepaper provides an overview of BranchCache, explains the different modes in which BranchCache operates, and describes how BranchCache is configured. The paper also explains how BranchCache works with Web servers and file servers and the steps BranchCache takes to determine that the content is up-to-date.

Hosted Cache mode

The Hosted Cache is a central repository of data downloaded from BranchCache enabled servers into the branch office by BranchCache enabled clients. The configuration of Hosted Cache mode is described later in this document.

Hosted Cache mode does not require a dedicated server. The BranchCache feature can be enabled on a server that is running Windows Server 2008 R2, which is located in a branch that is also running other workloads. In addition, BranchCache can be set up as a virtual workload and run on a server with other workloads, such as File and Print.

Figure 2 illustrates Hosted Cache mode and provides a simplified illustration of the document caching and retrieval process.

Ensurepass 2018 PDF and VCE

Question No: 119 – (Topic 3)

You need to recommend a solution for the file servers in the branch offices that meets the storage Requirements. What should you include in the recommendation?

  1. Distributed File System (DFS) and access-based enumeration (ABE)

  2. File Server Resource Manager (FSRM) quotas and file screens

  3. NTFS disk quotas and NTFS permissions

  4. Services for Network File System (NFS) and offline files

Answer: B Explanation:

http://technet.microsoft.com/en-us/library/cc732431.aspx

File Server Resource Manager is a suite of tools for Windows Server庐 2008 that allows administrators to understand, control, and manage the quantity and type of data that is stored on their servers. By using File Server Resource Manager, administrators can place quotas on folders and volumes, actively screen files, and generate comprehensive storage reports. This set of advanced instruments not only helps the administrator efficiently monitor existing storage resources, but it also aids in the planning and implementation of future policy changes.

Setting File Server Resource Manager Options Information about configuring general notification and reporting options before working with File Server Resource Manager. Quota Management Information about creating quotas that set a soft or hard space limit on a volume or folder tree.

File Screening Management Information about creating file screening rules that block files from a volume or a folder tree.

Storage Reports Management Information about generating storage reports that can be used to monitor disk usage patterns, identify duplicate files and dormant files, track quota usage, and audit file screening.

Classification Management Information about creating and applying file classification properties, which are used to categorize files.

File Management Tasks Information about performing file management tasks to automate the process of finding subsets of files on a server and applying simple commands.

Managing Remote Storage Resources Information about performing resource management tasks on a remote computer where File Server Resource Manager is also installed.

Troubleshooting File Server Resource Manager Instructions for problem solving.

Using File Server Resource Manager

Applies To: Windows Server 2008 R2

There are several navigational options in the File Server Resource Manager snap-in. The following tables detail the navigational options in the File Server Resource Manager nodes, which include:

Quotas

Quota Templates File Screens

File Screen Templates File Groups

Ensurepass 2018 PDF and VCE

Ensurepass 2018 PDF and VCE

Question No: 120 – (Topic 3)

You need to recommend a solution that enables User1 to perform the required actions on the Hyper-V server. What should you include in the recommendation?

  1. Authorization Manager role assignment

  2. Group Policy object (GPO) assignment on the VMs

  3. Group Policy object (GPO) assignment on the Hyper-V server

  4. local security groups on the VMs

Answer: A

100% Ensurepass Free Download!
Download Free Demo:70-646 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2018 EnsurePass 70-646 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *