[Free] 2018(May) EnsurePass Testking Microsoft 70-646 Dumps with VCE and PDF 41-50

Ensurepass.com : Ensure you pass the IT Exams
2018 May Microsoft Official New Released 70-646
100% Free Download! 100% Pass Guaranteed!

Pro: Windows Server 2008, Server Administrator

Question No: 41 – (Topic 1)

Your company has two branch offices that connect by using a WAN link. Each office contains a server that runs Windows Server 2008 R2 and that functions as a file server.

Users in each office store data on the local file server. Users have access to data from the other office.

You need to plan a data access solution that meets the following requirements:

->Folders that are stored on the file servers must be available to users in both offices.

->Network bandwidth usage between offices must be minimized.

->Users must be able to access all files in the event that a WAN link fails.

What should you include in your plan?

  1. On both servers, implement DFS Replication.

  2. On both servers, install and configure File Server Resource Manager (FSRM) and File Replication Service (FRS).

  3. On one server, install and configure File Server Resource Manager (FSRM). On the other server, install and configure File Replication Service (FRS).

  4. On one server, install and configure Distributed File System (DFS). On the other server, install and configure the Background Intelligent Transfer Service (BITS).

Answer: A Explanation:

MCITP Self-Paced Training Kit Exam 70-646 Windows Server Administration:

DFS Replication provides a multimaster replication engine that lets you synchronize folders on multiple servers across local or WAN connections. It uses the Remote Differential Compression (RDC) protocol to update only those files that have changed since the last replication. You can use DFS Replication in conjunction with DFS Namespaces or by itself. File Replication Service (FRS) The File Replication Service (FRS) enables you to synchronize folders with file servers that use FRS. Where possible you should use the DFS Replication (DFSR) service. You should install FRS only if your Windows Server 2008 server needs to synchronize folders with servers that use FRS with the Windows Server 2003 or Windows 2000 Server implementations of DFS.

The main tool for implementing shared folder replication in a Windows Server 2008 network

is DFS Replication.

Using DFS Namespace to Plan and Implement a Shared Folder Structure and Enhance Data Availability

When you add the DFS Management role service to the Windows Server 2008 File Services Server role, the DFS Management console is available from the Administrative Tools menu or from within Server Manager. This console provides the DFS Namespaces and DFS Replication tools as shown in Figure 6-31 DFS Namespaces lets you group shared folders that are located on different servers into one or more logically structured namespaces. Each namespace appears to users as a single shared folder with a series of subfolders.

This structure increases availability. You can use the efficient, multiple-master replication engine provided by DFSR to replicate a DFS Namespace within a site and across WAN links. A user connecting to files within the shared folder structures contained in the DFS Namespace will automatically connect to shared folders in the same AD DS site (when available) rather than across a WAN. You can have several DFS Namespace servers in a site and spread over several sites, so if one server goes down, a user can still access files within the shared folder structure.

Because DFSR is multimaster, a change to a file in the DFS Namespace on any DFS Namespace server is quickly and efficiently replicated to all other DFS Namespace servers that hold that namespace. Note that DFSR replaces the File Replication Service (FRS) as the replication engine for DFS Namespaces, as well as for replicating the AD DS SYSVOL folder in domains that use the Windows Server 2008 domain functional level. You can install FRS Replication as part of the Windows Server 2003 File Services role service, but you should use it only if you need to synchronize with servers that use FRS with the Windows Server 2003 or Windows 2000 Server implementations of DFS.

Question No: 42 DRAG DROP – (Topic 1)

A company has its main office in New York and branch offices in Miami and Quebec. All sites are connected by reliable WAN links.

You are designing a Windows Server Update Services (WSUS) deployment strategy. The deployment strategy must meet the following requirements:

->Download updates from Windows Update only in the New York office.

->Ensure that the update language can be specified for the Quebec office.

You need to design a deployment strategy that meets the requirements.

How should you configure the servers and hierarchy types?

To answer, drag the appropriate server types and hierarchy types from the list to the correct location or locations in the answer area.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Ensurepass 2018 PDF and VCE

The most basic WSUS deployment consists of a server inside the corporate firewall that serves client computers on a private intranet, as shown in the quot;Simple WSUS Deploymentquot; illustration below. The WSUS server connects to Microsoft Update to download updates.

This is known as synchronization. During synchronization, WSUS determines if any new updates have been made available since the last time you synchronized. If it is your first time synchronizing WSUS, all updates are made available for download.

WSUS server hierarchies.

You can create complex hierarchies of WSUS servers. Since you can synchronize one WSUS server with another WSUS server instead of with Microsoft Update, you need to have only a single WSUS server that is connected to Microsoft Update. When you link WSUS servers together, there is an upstream WSUS server and a downstream WSUS server, as shown in the quot;WSUS Server Hierarchyquot; illustration below.

There are two ways to link WSUS servers together:

Autonomous mode: An upstream WSUS server shares updates with its downstream server or servers during synchronization, but not update approval status or computer group information. Downstream WSUS servers must be administered separately. Autonomous servers can also synchronize updates for a set of languages that is a subset of the set synchronized by their upstream server.

Replica mode: An upstream WSUS server shares updates, approval status, and computer groups with its downstream server or servers. Downstream replica servers inherit update approvals and cannot be administered apart from their upstream WSUS server.

Centralized management

Centrally managed WSUS servers utilize replica servers. Replica servers are not administered separately, and are used only to distribute approvals, groups, and updates. The approvals and targeting groups you create on the master server are replicated throughout the entire organization, as shown in the quot;WSUS Centralized Management (Replica Servers)quot; illustration below. Remember that computer group membership is not distributed throughout the replica group, only the computer groups themselves. In other words, you always have to load client computers into computer groups.

Ensurepass 2018 PDF and VCE

It is possible that not all the sites in your organization require the same computer groups. The important thing is to create enough computer groups on the administered server to satisfy the needs of the rest of the organization. Computers at different sites can be moved into a group appropriate for the site. Meanwhile, computer groups inappropriate for a particular site simply remain empty. All update approvals, like computer groups, must be created on the master server. For step-by-step instructions, see Create Replica Servers later in this guide.

You should also make sure that the upstream server is configured for all the languages required by its replica servers. If you add languages to the upstream server, you should copy the new updates to its replica servers.

Changing language options on the upstream server alone might result in a mismatch between the number of updates that are approved on the central server and the number of updates approved on the replica servers.

Distributed management

Distributed management offers you full control over approvals and computer groups for the WSUS server, as shown in the quot;WSUS Distributed Managementquot; illustration below. With the distributed management model, there is usually an administrator at each site who decides which update languages are needed, creates computer groups, assigns computers to groups, tests and approves updates, and ensures that the correct updates are installed on the right computer groups. Distributed management is the default installation option for all WSUS installations.

Ensurepass 2018 PDF and VCE

Question No: 43 – (Topic 1)

Your network consists of a single Active Directory site that includes two network segments. The network segments connect by using a router that is RFC 1542 compliant.

You plan to use Windows Deployment Services (WDS) to deploy Windows Server 2008 R2 servers. All new servers support PreBoot Execution Environment (PXE).

You need to design a deployment strategy to meet the following requirements:

->Support Windows Server?2008 R2

->Deploy the servers by using WDS in both network segments

->Minimize the number of servers used to support WDS

What should you include in your design?

  1. Deploy one server. Install WDS and DHCP on the server. Configure the IP Helper tables on the router between the network segments.

  2. Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 60.

  3. Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 252.

  4. Deploy two servers. Install WDS and DHCP on one server. Install DHCP on the other server. Place one server on each of the network segments. Configure both servers to support DHCP option 60.

Answer: A Explanation:

http://support.microsoft.com/kb/926172

IP Helper table updates

The PXE network boot method uses DHCP packets for communication. The DHCP packets serve a dual purpose. They are intended to help the client in obtaining an IP address lease from a DHCP server and to locate a valid network boot server. If the booting client, the DHCP server, and the network boot server are all located on the same network segment, usually no additional configuration is necessary. The DHCP broadcasts from the client reach both the DHCP server and the network boot server.

However, if either the DHCP server or the network boot server are on a different network segment than the client, or if they are on the same network segment but the network is controlled by a switch or a router, you may have to update the routing tables for the networking equipment in order to make sure that DHCP traffic is directed correctly.

Such a process is known as performing IP Helper table updates. When you perform this process, you must configure the networking equipment so that all DHCP broadcasts from the client computer are directed to both a valid DHCP server and to a valid network boot server.

Note: It is inefficient to rebroadcast the DHCP packets onto other network segments. It is best to only forward the DHCP packets to the recipients that are listed in the IP Helper table.

After the client computer has obtained an IP address, it contacts the network boot server directly in order to obtain the name and the path of the network boot file to download.

Again, this process is handled by using DHCP packets.

Note: We recommend that you update the IP Helper tables in order to resolve scenarios in which the client computers and the network boot server are not located on the same network segment.

Question No: 44 – (Topic 1)

Your network contains a standalone root certification authority (CA). You have a server named Server1 that runs Windows Server 2008 R2. You issue a server certificate to Server1. You deploy Secure Socket Tunneling Protocol (SSTP) on Server1.

You need to recommend a solution that allows external partner computers to access internal network resources by using SSTP.

What should you recommend?

  1. Enable Network Access Protection (NAP) on the network.

  2. Deploy the Root CA certificate to the external computers.

  3. Implement the Remote Desktop Connection Broker role service.

  4. Configure the firewall to allow inbound traffic on TCP Port 1723.

Answer: B Explanation:

Lesson 1: Configuring Active Directory Certificate Services

Certificate Authorities are becoming as integral to an organization’s network infrastructure as domain controllers, DNS, and DHCP servers. You should spend at least as much time planning the deployment of Certificate Services in your organization’s Active Directory environment as you spend planning the deployment of these other infrastructure servers. In this lesson, you will learn how certificate templates impact the issuance of digital certificates, how to configure certificates to be automatically assigned to users, and how to configure supporting technologies such as Online Responders and credential roaming.

Learning how to use these technologies will smooth the integration of certificates into your organization’s Windows Server 2008 environment.

After this lesson, you will be able to:

Install and manage Active Directory Certificate Services. Configure autoenrollment for certificates.

Configure credential roaming.

Configure an Online Responder for Certificate Services.

Estimated lesson time: 40 minutes Types of Certificate Authority

When planning the deployment of Certificate Services in your network environment, you must decide which type of Certificate Authority best meets your organizational requirements. There are four types of Certificate Authority (CA):

Enterprise Root Enterprise Subordinate Standalone Root

Standalone Subordinate

The type of CA you deploy depends on how certificates will be used in your environment and the state of the existing environment. You have to choose between an Enterprise or a Standalone CA during the installation of the Certificate Services role, as shown in Figure 10-1. You cannot switch between any of the CA types after the

CA has been deployed.

Ensurepass 2018 PDF and VCE

Figure 10-1Selecting an Enterprise or Standalone CA

Enterprise CAs require access to Active Directory. This type of CA uses Group Policy to propagate the certificate trust lists to users and computers throughout the domain and publish certificate revocation lists to Active Directory. Enterprise CAs issue certificates from certificate templates, which allow the following functionality:

Enterprise CAs enforce credential checks on users during the certificate enrollment process. Each certificate template has a set of security permissions that determine whether a particular user is authorized to receive certificates generated from that template.

Certificate names are automatically generated from information stored within Active Directory. The method by which this is done is determined by certificate template configuration.

Autoenrollment can be used to issue certificates from Enterprise CAs, vastly simplifying the certificate distribution process. Autoenrollment is configured through applying certificate template permissions.

In essence, Enterprise CAs are fully integrated into a Windows Server 2008 environment. This type of CA makes the issuing and management of certificates for Active Directory

clients as simple as possible.

Standalone CAs do not require Active Directory. When certificate requests are submitted to Standalone CAs, the requestor must provide all relevant identifying information and manually specify the type of certificate needed. This process occurs automatically with an Enterprise CA. By default, Standalone CA requests require administrator approval.

Administrator intervention is necessary because there is no automated method of verifying a requestor’s credentials. Standalone CAs do not use certificate templates, limiting the ability for administrators to customize certificates for specific organizational needs.

You can deploy Standalone CAs on computers that are members of the domain. When installed by a user that is a member of the Domain Admins group, or one who has been delegated similar rights, the Standalone CA’s information will be added to the Trusted Root Certificate Authorities certificate store for all users and computers in the domain. The CA will also be able to publish its certificate revocation list to Active Directory.

Whether you install a Root or Subordinate CA depends on whether there is an existing certificate infrastructure.

Root CAs are the most trusted type of CA in an organization’s public key infrastructure (PKI) hierarchy. Root CAs sit at the top of the hierarchy as the ultimate point of trust and hence must be as secure as possible. In many environments, a Root CA is only used to issue signing certificates to Subordinate CAs. When not used for this purpose, Root CAs are kept offline in secure environments as a method of reducing the chance that they might be compromised.

If a Root CA is compromised, all certificates within an organization’s PKI infrastructure should be considered compromised. Digital certificates are ultimately statements of trust. If you cannot trust the ultimate authority from which that trust is derived, it follows that you should not trust any of the certificates downstream from that ultimate authority.

Subordinate CAs are the network infrastructure servers that you should deploy to issue the everyday certificates needed by computers, users, and services. An organization can have many Subordinate CAs, each of which is issued a signing certificate by the Root CA. In the event that one Subordinate CA is compromised, trust of that CA can be revoked from the Root CA. Only the certificates that were issued by that CA will be considered untrustworthy. You can replace the compromised Subordinate CA without having to replace the entire organization’s certificate infrastructure. Subordinate CAs can be replaced, but a compromised Enterprise Root CA usually means you have to redeploy the Active Directory forest from scratch. If a Standalone Root CA is compromised, it also necessitates the replacement of an organization’s PKI infrastructure.

Question No: 45 – (Topic 1)

Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. The domain contains 200 Windows Server 2008 R2 servers.

You need to plan a monitoring solution that meets the following requirements:

->Sends a notification by email to the administrator if an Application error occurs on any of the servers

->Uses the minimum amount of administrative effort

What should you include in your plan?

  1. On one server, create event subscriptions for each server. On the server, attach tasks to the Application error events.

  2. On one server, create an Event Trace Sessions Data Collector Set. On all servers, create a System Performance Data Collector Set.

  3. On all servers, create event subscriptions for one server. On all servers, attach a task for the Application error events.

  4. On all servers, create a System Performance Data Collector Set. On one server, configure the report settings for the new Data Collector set.

    Answer: A Explanation:

    http://technet.microsoft.com/en-us/library/cc749183.aspx http://technet.microsoft.com/en-us/library/cc748890.aspx http://technet.microsoft.com/en-us/library/cc722010.aspx

    Event Subscriptions

    Applies To: Windows 7, Windows Server 2008 R2, Windows Vista

    Event Viewer enables you to view events on a single remote computer. However, troubleshooting an issue might require you to examine a set of events stored in multiple logs on multiple computers.

    Windows Vista includes the ability to collect copies of events from multiple remote computers and store them locally. To specify which events to collect, you create an event subscription. Among other details, the subscription specifies exactly which events will be collected and in which log they will be stored locally. Once a subscription is active and events are being collected, you can view and manipulate these forwarded events as you would any other locally stored events.

    Using the event collecting feature requires that you configure both the forwarding and the collecting computers. The functionality depends on the Windows Remote Management (WinRM) service and the Windows Event Collector (Wecsvc) service. Both of these

    services must be running on computers participating in the forwarding and collecting process. To learn about the steps required to configure event collecting and forwarding computers, see Configure Computers to Forward and Collect Events.

    Additional Considerations

  • You can subscribe to receive events from an existing subscription on a remote computer. Configure Computers to Forward and Collect Events

    Applies To: Windows 7, Windows Server 2008 R2, Windows Vista

    Before you can create a subscription to collect events on a computer, you must configure both the collecting computer collected (collector) and each computer from which events will be collected (source). Updated information about event subscriptions may be available online at Event Subscriptions.

    To configure computers in a domain to forward and collect events

      1. Log on to all collector and source computers. It is a best practice to use a domain account with administrative privileges.

      2. On each source computer, type the following at an elevated command prompt:

        Ensurepass 2018 PDF and VCE

        Ensurepass 2018 PDF and VCE

        Ensurepass 2018 PDF and VCE

        Question No: 46 – (Topic 1)

        Your network consists of a single Active Directory domain. The network includes a branch office named Branch1. Branch1 contains a Read only Domain Controller (RODC) named Server1. A global group named Branch1admins contains the user accounts for administrators. Administrators manage the client computers and servers in Branch1.

        You need to recommend a solution for delegating control of Server1.

        Your solution must meet the following requirements:

        ->Allow the members of the Branch1admins group to administer Server1 including, change device drivers and install operating system updates by using Windows Update.

        ->Provide the Branch1admins group rights on Server1 only.

        ->Prevent Branch1admins group from modifying Active Directory objects.

        What should you recommend?

        1. Add the Branch1admins global group to the Server Operators builtin local group.

        2. Add the members of the Branch1admins global group to the Administrators builtin local

          group of Server1.

        3. Grant Full Control permission on the Server1 computer object in the domain to the Branch1admins group

        4. Move the Server1 computer object to a new organizational unit (OU) named Branch1servers. Grant Full Control permission on the Branch1servers OU to the Branch1admins group.

    Answer: B Explanation:

    http://technet.microsoft.com/en-us/library/cc753223(WS.10).aspx Administrator role separation

    Administrator role separation specifies that any domain user or security group can be delegated to be the local administrator of an RODC without granting that user or group any rights for the domain or other domain controllers. Accordingly, a delegated administrator can log on to an RODC to perform maintenance work, such as upgrading a driver, on the server. But the delegated administrator is not able to log on to any other domain controller or perform any other administrative task in the domain. In this way, a security group that comprises branch users, rather than members of the Domain Admins group, can be delegated the ability to effectively manage the RODC in the branch office, without compromising the security of the rest of the domain.

    Question No: 47 – (Topic 1)

    Your network consists of a single Active Directory domain. The relevant portion of the Active Directory domain is configured as shown in the following diagram.

    Ensurepass 2018 PDF and VCE

    The Staff organizational unit (OU) contains all user accounts except for the managers#39; user accounts.

    The Managers OU contains the managers#39; user accounts and the following global groups:

    ->Sales

    ->Finance

    ->Engineering

    You create a new Group Policy object (GPO) named GPO1, and then link it to the Employees OU.

    Users from the Engineering global group report that they are unable to access the Run command on the Start menu. You discover that the GPO1 settings are causing the issue.

    You need to ensure that the users from the Engineering global group are able to access the Run command on the Start menu.

    What should you do?

    1. Configure GPO1 to use the Enforce Policy option.

    2. Configure Block Inheritance on the Managers OU.

    3. Configure Group Policy filtering on GPO1 for the Engineering global group.

    4. Create a new child OU named Engineering under the Employees OU. Move the Engineering global group to the new Engineering child OU.

    Answer: C Explanation:

    MCITP Self-Paced Training Kit Exam 70-646 Windows Server Administration

    No administrator likes exceptions, but we are required to implement them. Typically you might have configured security filtering, Windows Management Instrumentation (WMI) filters, block inheritance settings, no-override settings, loopback processing, and slow-link settings. You need to check that these settings are not affecting normal GPO processing.

    Question No: 48 – (Topic 1)

    Your network contains several Windows Server 2008 R2 servers that run Windows Server Update Services (WSUS). The WSUS servers distribute updates to all computers on the internal network. Remote users connect from their personal computers to the internal network by using a splittunnel VPN connection.

    You need to plan a strategy for patch management that deploys updates on the remote users#39; computers.

    Your strategy must meet the following requirements:

    ->Minimize bandwidth use over the VPN connections

    ->Require updates to be approved on the WSUS servers before they are installed on the client computers.

    What should you include in your plan?

    1. Create a Group Policy object (GPO) to perform clientside targeting.

    2. Create a computer group for the remote users#39; computers. Configure the remote users#39; computers to use the internal WSUS server.

    3. Create a custom connection by using the Connection Manager Administration Kit (CMAK). Deploy the custom connection to all of the remote users#39; computers.

    4. Deploy an additional WSUS server. Configure the remote users#39; computers to use the additional WSUS server. Configure the additional WSUS server to leave the updates on the Microsoft Update Web site.

    Answer: D Explanation:

    Performance and Bandwidth Optimization

    Branch offices with slow WAN connections to the central server but broadband connections to the Internet can be configured to get metadata from the central server and update

    content from the Microsoft Update Web site.

    Question No: 49 DRAG DROP – (Topic 1)

    A company has offices in New York and Seattle. Project managers from each office are in the NewYork_PM and Seattle_PM Active Directory security groups, respectively.

    You are planning to store all active IT project resources for the Project Management Office in branch-specific folders in a namespace.

    You need to ensure that project managers from each branch can see only folders from that branch in the namespace.

    Which actions should you perform in sequence?

    To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. (Use only actions that Apply.)

    Ensurepass 2018 PDF and VCE

    Answer:

    Ensurepass 2018 PDF and VCE

    Explanation:

    Ensurepass 2018 PDF and VCE

    DFS Services are available on all currently supported versions of Windows Server, but there are significant improvements in the Windows Server 2008 editions. The DFS namespace client is available for all currently supported versions of Windows, both client and server. Domain-based DFS namespaces require the use of Active Directory.

    DFS Namespaces

    A DFS namespace is basically a place where you will have links to all your file shares. From an administrator point of view, you should think of it as a folder structure where you keep the list of target file shares. Your users will see it as a single share with many folders and they will have no idea that they are navigating across a set of servers to get to the subfolders and files.

    Ensurepass 2018 PDF and VCE

    When configuring DFS, you have a choice of using a domain-based or a stand-alone namespace. If you already have Active Directory deployed, you should consider using a domain-based namespace. If you’re not using Active Directory, your only choice is a stand- alone one.

    The main advantage of the domain-based namespaces is that your configuration will be

    stored in Active Directory and you won’t have to rely on a single server to provide the namespace information to your clients.

    The path users refer to uses the name of the domain and it will not need to change because your namespace server name changed (only if you change your domain name). With a stand-alone DFS, that server name becomes part of the main path to the namespace.

    There are also two domain-based DFS modes: Windows Server 2008 mode and Windows Server 2000 mode.

    Windows Server 2008 mode (which requires Windows Server 2003 forest functional level, Windows Server 2008 domain functional level and Windows Server 2008 running on all namespace servers) includes support for more than 5,000 folders with targets per namespace and access-based enumeration.

    Adding Folders to the Namespace

    After your create the namespace, you will add folders to it, specifying the associated folder target. This means pointing to the actual file shares, making each one appear to users as a folder under the namespace. Before you do that, you want to think long and hard about the folder structure you’re creating. A basic goal of DFS is to create a stable infrastructure that will not constantly change on your users.

    Multiple Targets

    It’s useful to have multiple copies of the same data stored in different file servers. One reason for that is faulttolerance (if one server is unavailable, you can still access the other one). The other reason is to choose the copy of the data that is closer to you. If you’re in a branch office and you want to access a very large file, you would rather get a copy from a server in that branch.

    It’s actually quite simple to add more folder targets to an existing folder or create the folder with multiple targets initially. All you have to do is make sure that you provide the multiple targets for the same folder in that namespace when you configure it.

    DFS Replication

    At this point, you’re probably thinking: How does the data get copied across multiple servers?

    Well, Windows Server includes a component to replicate data between file servers in case you need that. It’s called DFS-R (Distributed File System Replication). DFS-R was introduced with Windows Server 2003 R2 (replacing the old NTFRS with many advantages). DFS-R can be used for both domain-based and stand-alone DFS.

    To replicate files between two (or more) shares, you need to create a replication group and specify a few things like which servers will replicate (members) and what they will replicate (replicated folders). DFS-R is aware of site topology. It also has options to control

    scheduling and the use of bandwidth (throttling). DFS-R uses

    Remote Differential Compression (RDC), meaning that only changes in the files are sent over the network, not the entire file.

    Ensurepass 2018 PDF and VCE

    What does access-based enumeration do?

    Access-based enumeration displays only the files and folders that a user has permissions to access. If a user does not have Read (or equivalent) permissions for a folder, Windows hides the folder from the user’s view.

    This feature is active only when viewing files and folders in a shared folder; it is not active when viewing files and folders in the local file system.

    Access-based enumeration can be enabled or disabled by using Share and Storage Management Access-based enumeration can be manually enabled or disabled on individual shared folders and volumes by using Share and Storage Management. This snap-in is available after a folder or volume has been shared. You can access Share and Storage Management in the File Services server role in Server Manager, and in Administrative Tools. You can also install it manually in Server Manager by adding the File Server role service to File Services.

    There are two ways to enable and disable access-based enumeration by using Share and Storage Management:

    Share a folder or volume by using the Provision a Shared Folder Wizard. If you select the SMB protocol on the Share Protocols page of the Provision a Shared Folder Wizard, the advanced settings options on the SMB Settings page includes the option to enable access- based enumeration on the shared folder or volume. (To see the advanced settings options, on the SMB Settings page of the wizard, click Advanced).

    Change the properties of an existing shared folder or volume. To change the properties of an existing shared folder or volume, on the Shares tab of Share and Storage Management, click the shared folder or volume, and then click Properties in the Action pane. The information under Advanced settings displays whether accessbased enumeration is enabled. Click Advanced and then select or clear the Enable access-based enumeration

    check box.

    Question No: 50 DRAG DROP – (Topic 1)

    A company#39;s file servers are running out of disk space. The company uses folder redirection policies to redirect user profile folders to 50 dedicated file servers.

    The files stored on the file servers include the following types of files that should not be stored in user profile folders:

    ->Audio and video files

    ->Files created by a computer-aided drafting (CAD) Application

    You decide to implement File Server Resource Manager (FSRM) on the dedicated file servers. You have the following requirements:

    ->Prevent users from saving audio and video files to their user profile folders.

    ->Prevent users from saving CAD files to their user profile folders.

    ->Notify users by e-mail if they attempt to save files of a blocked file type.

    You need to configure FSRM with the least amount of administrative effort. Which actions should you perform in sequence?

    To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. (Use only actions that Apply.)

    Ensurepass 2018 PDF and VCE

    Answer:

    Ensurepass 2018 PDF and VCE

    Explanation:

    Ensurepass 2018 PDF and VCE

    FSRM

    File Server Resource Manager is a suite of tools that allows administrators to understand, control, and manage the quantity and type of data stored on their servers. By using File Server Resource Manager, administrators can place quotas on folders and volumes, actively screen files, and generate comprehensive storage reports.

    This set of advanced instruments not only helps the administrator to efficiently monitor existing storage resources but it also aids in the planning and implementation of future policy changes.

    Also

    http://blogs.technet.com/b/josebda/archive/2008/08/20/the-basics-of-windows-server-2008- fsrm-file-serverresource-manager.aspx

    100% Ensurepass Free Download!
    Download Free Demo:70-646 Demo PDF
    100% Ensurepass Free Guaranteed!
    Download 2018 EnsurePass 70-646 Full Exam PDF and VCE

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No
  • Leave a Reply

    Your email address will not be published. Required fields are marked *