[Free] Get all latest Microsoft 98-365 Actual Tests 141-150



In an Active Directory infrastructure, the group policies are applied in a particular order.

Rearrange the levels in the correct order in which the group policies are applied.




Correct Answer:





You work as a Server Administrator for company Inc. The company has a Windows-based network

environment with Windows 7 running client computers and Windows Server 2008 running a

server. The company uses an order-processing application that accesses customer records stored

in a database. The application accesses customer information through a set of WCF Web services.

Which of the following server roles will you configure on the server used in your organization?


A.      Windows Server Virtualization

B.      Network Policy and Access Services

C.      Application Server

D.      DHCP Server


Correct Answer: C




Which of the following alerts gets generated when any server or client computer in the network

has low disk space, which is less than 10% available across all volumes?


A.      Network Services Alerts

B.      Server Event Log Alerts

C.      User Performance Alerts

D.      Performance Counter Alerts


Correct Answer: D




Which of the following is a web server application and set of feature extension modules created

by Microsoft for use with Microsoft Windows?


A.      Secure Sockets Layer

B.      File Transfer Protocol

C.      Internet Information Services

D.      World Wide Web


Correct Answer: C




Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2008

domain-based network. Mark has recently installed Windows Server 2008 R2 on a computer. He

wants to implement Distributed File system on the network using Windows Server 2008 R2. What

are the changes to DFS Namespaces available with Windows Server 2008 Release 2? Each correct

answer represents a complete solution. Choose three.


A.      Performance improvements for large namespaces

B.      Performance counters

C.      DFS management support for enabling access-based enumeration

D.      Failover cluster support


Correct Answer: ABC




You work as a Server Administrator for company Inc. The company has an Active Directory

Domain Services (ADDS) domain. All servers of the company run Windows Server 2008 R2 and all

client side computers run Windows 7. You want to facilitate authorized remote users to connect

to resources on an internal network from any Internet-connected device that is used to run the

Remote Desktop Connection (RDC) client. Which of the following will you deploy to accomplish

the task?


A.      RD Connection Broker

B.      RD Licensing

C.      RD Web Access

D.      RD Gateway


Correct Answer: D




Which of the following statements are true about the Information Technology Infrastructure

Library? Each correct answer represents a complete solution. Choose all that apply.


A.      It illustrates organization-specific tasks and checklists that are used by an organization for

establishing a maximum level of competency.

B.      It mainly focuses on aligning IT services with the needs of business.

C.      It is a set of good practices for IT service management (ITSM).

D.      It is used to demonstrate compliance and to measure improvement.


Correct Answer: BCD




Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server

2008 R2 domain-based network. The network consists of Windows Server 2008 R2 member

server, Windows 7, and Windows Vista client computers. The company has distributed network

shares. All shares are distributed over numerous servers, due to which employees face problems

in accessing shares from different locations. To resolve this issue, Mark implements Distributed

file system (Dfs). What are the advantages of Dfs? Each correct answer represents a complete

solution. Choose two.


A.      It improves system performance.

B.      It provides faster data recovery.

C.      It provides availability of the network files and folders.

D.      It provides server load sharing.


Correct Answer: CD




Which of the following methods will you use to automate the deployment of Windows Server

2008 R2 and NLB cluster hosts? Each correct answer represents a complete solution. Choose



A.      Windows SIM

B.      Windows DS

C.      Sysprep

D.      Unattended installation


Correct Answer: BCD




You have created a cloned copy of Windows Server 2008 R2 and applied this cloned copy to

multiple computers. Each cloned copy of Windows uses the same image with the same

parameters, including the computer name and security identifier. For these computers to operate

properly without conflicting on a network, all parameters should be unique. What will you do to

overcome this problem?


A.      Restart the computers.

B.      Run msconfig.exe.

C.      Use the Sysprep tool.

D.      Use Windows System Image Manager.


Correct Answer: C


Instant Access to Download Testing Software & PDF File for Microsoft 98-366 Real Exam

Instant Access to Try Microsoft 98-366 Free Demo