[Free] 2018(Aug) Dumps4cert Microsoft 70-642 Dumps with VCE and PDF Download 251-260

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug Microsoft Official New Released 70-642
100% Free Download! 100% Pass Guaranteed!

TS: Windows Server 2008 Network Infrastructure, Configuring

Question No: 251 – (Topic 3)

Your network contains a server named Server1 that runs Windows Server 2008 R2 Service pack1 (SP1).

Server1 has Microsoft SQL Server 2008 R2 and the File Services server role installed.

You need to log the CPU utilization of the processes running on Server1 if the CPU utilization exceeds 85 percent for more than one minute.

What should you do? (Each correct answer presents part of the solution. Choose two.)

  1. Configure an action on the performance alert to run the systempropertiesperformance.exe command.

  2. Create a Data Collector Set that has a performance alert to run the \Processor (_Total)\%Processor Time.

  3. Enable the SQMLogger event trace session.

  4. Create a scheduled task that runs the Get-PSProvider cmdlet.

  5. Configure a trigger on the performance alert to start the System Performance Data Collector Set.

Answer: B,E

Question No: 252 – (Topic 3)

Your network consists of a single Active Directory domain. All servers run Windows Server

2008 R2. You have a server named Server1 that hosts shared documents. Users report extremely slow response times when they try to open the shared documents on Server1.

You log on to Server1 and observe real-time data indicating that the processor is operating at 100 percent of capacity.

You need to gather additional data to diagnose the cause of the problem. What should you do?

  1. In the Performance Monitor console, create a counter log to track processor usage.

  2. In Event Viewer, open and review the application log for Performance events.

  3. In Resource Monitor, use the Resource View to see the percentage of processor capacity used by each application.

  4. In Performance Monitor, create performance counter alert that will be triggered when processor usage exceeds 80 percent for more than five minutes on Server1.

Answer: C

Question No: 253 – (Topic 3)

Your network contains a server named Server1 that has the Routing and Remote Access service (RRAS) role service installed.

Server1 provides access to the internal network by using Point-to-Point Tunneling Protocol (PPTP). Static RRAS filters on the external interface of Server1 allow only PPTP. The IP address of the external interface is 131.107.1.100.

You install the Web Server (IIS) role on Server1.

You need to ensure that users on the Internet can access a Web site on Server1 by using HTTP. The solution must minimize the number of open ports on Server1.

Which two static RRAS filters should you configure on Server1? (Each correct answer presents part of the solution. Choose two.)

  1. An outbound filter that has the following configurations: Source network: 131.107.1.100/32

    Destination network: Any

    Protocol: TCP (established) Port: 80

  2. An outbound filter that has the following configurations: Source network: 131.107.1.100/32

    Destination network: Any Port: 80

  3. An outbound filter that has the following configurations: Source network: 131.107.1.100/32

    Destination network: Any Protocol: TCP

    Port: Any

  4. An inbound filter that has the following configurations: Source network: Any

    Destination network: 131.107.1.100/32 Protocol: TCP

    Port: 80

  5. An inbound filter that has the following configurations: Source network: 131.107.1.100/32

Destination network: Any Protocol: TCP

Port: Any

Answer: A,D

Question No: 254 – (Topic 3)

Your company has a main office and five branch offices. The branch offices connect to the main office by using a WAN link.

Each branch office has 100 client computers that run Windows XP or Windows Vista. All servers run Windows Server 2008 R2.

The main office has a Windows Server Update Services (WSUS) server.

You need to minimize the amount of WAN traffic used to download updates from the WSUS server.

What should you do?

  1. From Windows Explorer, enable Offline Files.

  2. From a Group Policy, enable Allow BITS Peercaching.

  3. From a Group Policy, enable the Set BranchCache Distributed Cache mode setting.

  4. From a Group Policy, enable the Set BranchCache Hosted Cache mode setting.

Answer: B Explanation:

Windows Update and Microsoft Update use the Background Intelligent Transfer Service (BITS) to download updates. You can optimize download performance by configuring BITS through Group Policy.

Peer caching is a feature of BITS that enables peer computers to share files. Peer computers are computers that have the peer caching feature enabled and that are located in the same subnet. If peer caching is enabled on a computer, Automatic Updates instructs BITS to make downloaded files available to the computer#39;s peers. When updates are downloaded, BITS caches them. When another peer caching-enabled computer tries to download the same update, BITS sends a multicast request to all peers. If peer computers respond to the request, BITS downloads the file from the first peer computer to respond. If the download from the peer computer fails or take too long, BITS continues the download from the WSUS server or from Microsoft Update.

Peer caching can optimize bandwidth in the following ways:

  • Decreases the data that is transferred from the WSUS server to client computers because computers in the same subnet will usually download the updates from each other.

  • Decreases the data that is transferred across the WAN when some or all of the client computers of a WSUS server are located in different locations.

  • Decreases the data that is transferred across the Internet if WSUS client computers that are located in the same subnet are configured to download updates from Microsoft Update. http://technet.microsoft.com/en-us/library/dd939927(v=ws.10).aspx

    Question No: 255 – (Topic 3)

    Your network contains a server that runs Windows Server 2008 R2. You create a User Defined Data Collector Set (DCS) named Set1.

    You need to ensure that the reports generated for Set1 are stored for at least one year. What should you do?

    1. From the properties of Set1, modify the Schedule settings.

    2. From Data Manager for Set1, modify the Actions settings.

    3. From the properties of Set1, modify the Task settings.

    4. From Data Manager for Set1, modify the Data Manager settings.

    Answer: B Explanation:

    The time before a log shall be deleted settings are in the Data Manager#39;s quot;Actions Tabquot; of the custom/user defined DSC.

    Dumps4Cert 2018 PDF and VCE

    Question No: 256 – (Topic 3)

    Your network has Network Access Protection (NAP) policies deployed.

    You need to identify the health agent compliance status of a client computer. Which command should you run?

    1. net config workstation

    2. net statistics workstation

    3. netsh nap client show config

    4. netsh nap client show state

    Answer: D Explanation:

    netsh nap client show state – Displays state information, including client access restriction state, the state of installed enforcement clients and system health agents, and the client compliance and remediation results.

    http://technet.microsoft.com/en-us/library/cc732873(v=ws.10).aspx#BKMK_29

    Question No: 257 – (Topic 3)

    You need to use link-local IPv6 addresses to perform multicasting. Which IPv6 prefix should you use?

    A. FF00::/8 B. FD00::/8 C. FE80::/10 D. FEC0::/10

    Answer: A Explanation:

    IPv6 multicast addresses have the first eight bits fixed at 1111 1111. Therefore the address prefix for all IPv6 multicast addresses is FF00::/8. Beyond the first eight bits, multicast addresses include additional structure to identify flags, their scope, and the multicast group. http://technet.microsoft.com/en-us/library/bb726995.aspx

    Question No: 258 – (Topic 3)

    Your network contains an Active Directory domain. The domain contains four client computers. The client computers are configured as shown in the following table.

    Dumps4Cert 2018 PDF and VCE

    Your company plans to implement DirectAccess.

    You need to identify which client computers can use DirectAccess.

    Which client computers should you identify? (Each correct answer presents part of the solution. Choose two.)

    1. Computer2

    2. Computer3

    3. Computer4

    4. Computer1

    Answer: B,C Explanation:

    DirectAccess requires the following:

    -One or more DirectAccess servers running Windows Server 2008 R2 (with or without UAG) with two network adapters: one that is connected directly to the Internet and one that is connected to the intranet. DirectAccess servers must be a member of an AD DS domain.

    -On the DirectAccess server, at least two consecutive, public IPv4 addresses assigned to the network adapter that is connected to the Internet.

    -DirectAccess client computers that are running Windows 7 Enterprise or Windows 7 Ultimate. DirectAccess clients must be members of an AD DS domain.

    -At least one domain controller and DNS server that is running Windows Server 2008 SP2 or Windows Server 2008 R2. When UAG is used, DirectAccess can be deployed with DNS servers and domain controllers that are running Windows Server 2003 when NAT64 functionality is enabled.

    -A public key infrastructure (PKI) to issue computer certificates, and optionally, smart card

    certificates for smart card authentication and health certificates for NAP. For more information, see Public Key Infrastructure on the Microsoft Web site.

    -Without UAG, an optional NAT64 device to provide access to IPv4-only resources for DirectAccess clients. DirectAccess with UAG provides a built-in NAT64. http://technet.microsoft.com/en-us/library/dd637797(v=ws.10).aspx

    Question No: 259 – (Topic 3)

    You manage a server that runs Windows Server 2008 R2.

    The D:\Payroll folder is corrupted. The most recent backup version is 10/29/2007-09:00. You need to restore all the files in the D:\Payroll folder back to the most recent backup version without affecting other folders on the server.

    What should you do on the server?

    1. Run the Recover d:\payroll command.

    2. Run the Wbadmin restore catalog -backuptarget:D: -version:10/29/2007-09:00 -quiet command.

    3. Run the Wbadmin start recovery -backuptarget:D: -version:10/29/2007-09:00 -overwrite

  • quiet command.

    1. Run the Wbadmin start recovery -version:10/29/2007-09:00 -itemType:File – items:d:\Payroll -overwrite -recursive -quiet command.

    Answer: D

    Question No: 260 – (Topic 3)

    Your network contains an Active Directory domain.

    The network contains a standalone server that runs Windows Server 2008 R2. The server has a static IP address.

    You need to configure the server as a DHCP Relay Agent.

    What should you do first?

    1. Install the Health Registration Authority (HRA) role service on the server.

    2. Configure the server to use a dynamic IP address.

    3. Install the Routing and Remote Access service (RRAS) role service on the server.

    4. Join the server to the domain.

    Answer: C

    100% Dumps4cert Free Download!
    70-642 PDF
    100% Dumps4cert Pass Guaranteed!
    70-642 Dumps

    Dumps4cert ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No