Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

October 2012 brain dump for 70-642

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
Your company has an IPv6 network that has 25 segments. You deploy a server on the IPv6 network. You need to ensure that the server can communicate with all segments on the IPv6 network. What should you do?   Configure the IPv6 address as fd00::2b0:d0ff:fee9:4143/8.  
🗑
Server1 will be used to collect events from the Security event logs of the other servers on the network. You need to define the Custom Event Delivery Optimization settings on Server1. Which tool should you use?   Wecutil  
🗑
You need to ensure that each time the script runs, an entry is added to the Application event log. Which tool should you use?   Eventcreate  
🗑
You need to configure the SNMP security settings on the server. Which tool should you use?   Services console  
🗑
You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What should you do?   Create a scheduled task that runs the Nmcap tool.  
🗑
You need to ensure that when you monitor network traffic, you see the interface identifiers derived from the Extended Unique Identifier (EUI)-64 address. Which command should you run?   netsh.exe interface ipv6 set global randomizeidentifiers=disabled  
🗑
Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations. What should you do?   Configure the firewall to allow the use of Teredo.  
🗑
You need to ensure that the event log file displays the same information when the file is open on Server1 and on DC1. What should you do on Server1?   Copy the LocaleMetaData folder from DC1.  
🗑
You have a DHCP server that runs Windows Server 2008 R2. You need to reduce the size of the DHCP database. What should you do?   From the folder that contains the DHCP database, run jetpack.exe dhcp.mdb temp.mdb.  
🗑
You need to prevent the DHCP server from responding to DHCP client requests on LAN2. The server must continue to respond to non-DHCP client requests on LAN2. What should you do?   From the DHCP snap-in, modify the bindings to associate only LAN1 with the DHCP service.  
🗑
You need to ensure that Server1 only resolves queries issued from client computers in the same subnet as Server1. The solution must ensure that Server1 can resolve Internet host names. What should you do on Server1?   Configure Windows Firewall.  
🗑
You need to create a sender policy framework (SPF) record for the e-mail servers on your network. Which type of resource record should you create?   Text (TXT)  
🗑
Your network contains an Active Directory forest named fabrikam.com. The forest contains a DNS server named Server1. You need to configure Server1 to resolve single-label names. What should you do?   Create a DNS zone named GlobalNames. Run dnscmd.exe and specify the Config parameter.  
🗑
You need to prevent the DNS server from sending queries to f.root-servers.net. The server must be able to resolve names for Internet hosts. Which two actions should you perform?   Enable forwarding to your ISP's DNS servers. Disable the root hints on the DNS server.  
🗑
You need to ensure that all public DNS queries are channeled through a single-caching-only DNS server. Which two actions should you perform?   Disable the root hints. Configure a forwarder to the caching DNS server.  
🗑
You need to ensure that the NPS log files on Server1 contain information of client connections. What should you do?   Configure the DTS Compilant log file format.  
🗑
Server1 has the DNS Server server role installed. You need to configure Server1 to support the DNSSEC evaluation. Which two actions should you perform?   Create a new Signature (SIG) DNS record. Create a new Public key (KEY) DNS record.  
🗑
You need to ensure that inquiries about contoso.com are sent to dnsadmin@contoso.com. What should you do?   Modify the Start of Authority (SOA) record on the domain controller.  
🗑
You need to configure DNS to include the following parameters for the custom application: Service Priority Weight Protocol Port number Host offering this service   Service Location (SRV)  
🗑
You need to ensure that the adatum.com DNS zone is only replicated to DC5 and DC2. The solution must ensure that all zone replication traffic is encrypted. What should you do first?   Create an application directory partition.  
🗑
You need to identify which client computers have active IPSec associations to Server1. Which administrative tool should you use to achieve this task?   Windows firewall  
🗑
You need to identify whether the issues on Server1 coincide with the installation of the application. What should you do?   From Reliability Monitor, review the reliability details.  
🗑
You need to ensure that when the users connect to \\server1\folder1, they only see the files and the folders to which they are assigned permissions. Which tool should you use?   Share and Storage Management  
🗑
You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?   Configure all access points to use 802.1X authentication.  
🗑
You need to ensure that you can connect to Server1 by using the IP Security Monitor on Computer1. What should you do?   Add a value to the PolicyAgent registry key on Server1.  
🗑
You need to ensure that UNIX-based client computers can access shared folders on Server1. Which server role, role service, or feature should you install?   Network File System (NFS)  
🗑
You need to create folder quotas on Server1. Which server role, role service, or feature should you install?   File Server Resource Manager (FSRM)  
🗑
You need to configure Server1 as a network location server (NLS). Which Web Server (IIS) role service should you install on Server1?   IP and Domain Restrictions  
🗑
You need to identify the total number of authentication failures and negotiation failures that occurred on Server1. Which node should you use to achieve this task?   Security Associations  
🗑
You enable IPSec on Server1. You need to identify which client computers have active IPSec associations to Server1. Which administrative tool should you use to achieve this task?   Windows Firewall with Advanced Security  
🗑
DC1 hosts an Active Directory-integrated stub zone named contoso.com. You need to ensure that DC1 contains the most up-to-date records for the zone. What should you do?   From DNS Manager, click Update Server Data Files.  
🗑
You need to ensure that DHCP clients receive IP addresses from the address range in Scope1 if Server1 is unavailable.   On Server1, select Scope1, and then run the Split-Scope wizard.  
🗑
You need to prevent unauthorized DHCP clients from receiving addresses from Server1. What should you do?   From the DHCP console, configure filters.  
🗑
You need to ensure that Web1 is accessible from the Internet by using https://131.107.0.2. What should you do from the Routing and Remote Access console?   From the NAT interface, add an address pool and a reservation.  
🗑
Server1 and Server2 run the Server Core installation of Windows Server 2008 R2. You need to duplicate the Windows Firewall configurations from Server1 to Server2. What should you use?   Netsh tool  
🗑
You need to encrypt App1 data on the network. What should you do?   From the Windows Firewall with Advanced Security console, create a connection security rule.  
🗑
You open the Forwarders settings of the DNS server and discover that the option to add forwarders is disabled. You need to add forwarders to the DNS server. What should you do first?   Delete the "." (root) zone.  
🗑
You need to ensure that DNS1 only responds to DNS queries from computers that are located in the same subnet. What should you configure?   Windows Firewall  
🗑
You need to ensure that client computers in the branch office can receive authoritative responses to queries for contoso.com if a WAN link fails. DNSSEC security must be maintained. What should you configure on DNS2 for contoso.com?   a secondary zone  
🗑
Server1 hosts a standard primary zone for contoso.com. Server2 hosts a secondary zone for contoso.com. You need to ensure that all DNS replication traffic between Server1 and Server2 is encrypted. What should you do?   On each server, create connection security rules.  
🗑
You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com. The solution must not require any changes to the zone configuration of nwtraders.com. What should you configure on Server1?   a conditional forwarder  
🗑
You discover that client computers in contoso.com cannot use single-label names to access servers in nwtraders.com. You need to ensure that contoso.com computers can access nwtraders.com servers by using singlelabel names. What should you modi   the DNS suffix search order on the client computers  
🗑
You add a DNS server option to the reservation. You need to ensure that Computer1 immediately receives the new option. What should you do?   Run ipconfig.exe /renew.  
🗑
You need to ensure that Server1 can initiate connections to DirectAccess client computers. Which settings should you modify from the DirectAccess Setup console?   Infrastructure Servers  
🗑
Your network contains a client computer named Computer1 that runs Windows 7. Computer1 is configured to use DirectAccess. You need to identify the URL of the network location server that Computer1 is configured to use. What should you do?   From a command prompt, run netsh.exe namespace show policy.  
🗑
You need to ensure that users can view their DirectAccess status by using the DCA. Which two group policy settings should you configure? (Each correct answer presents part of the solution. Choose two.)   Dynamic Tunnel Endpoints (DTEs) Corporate Resources  
🗑
You need to configure the DNS servers on your network to support DirectAccess. What should you do?   Modify the GlobalQueryBlockList registry key and restart the DNS Server service.  
🗑
You need to configure Windows Firewall on Server1 to support DirectAccess connections. What should you allow from Windows Firewall on Server1?   ICMPv6 Echo Requests  
🗑
You need to track the usage information of all VPN connections. Which RADIUS attribute should you log?   Class  
🗑
Your network contains a Network Policy Server (NPS) named Server1. You need to configure a network policy for a VLAN. Which RADIUS attributes should you add?   ·Tunnel-Pvt-Group-ID ·Tunnel-Type ·Tunnel-Tag  
🗑
you have a standalone Network Policy Server (NPS) named NPS1. You have a VPN server named VPN1. VPN1 is configured as a RADIUS client to NPS1. You need to ensure that users from both forests can establish VPN connections by using their own domain accou   On NPS1, configure connection request policies.  
🗑
You need to ensure that NAS1 can successfully send authentication and accounting messages to NPS1. Which ports should you allow through the firewall?   UDP ports 1812, 1813, 1645 and 1646  
🗑
A domain user named User1 has been locked out by NPS1. You need to unlock the User1 user account on NPS1. What should you use?   the Registry Editor  
🗑
Your network contains a server that runs Windows Server 2008 R2. You need to enable access- based enumeration (ABE) on a shared folder. Which console should you use?   Share and Storage Management  
🗑
You need to ensure that users only connect to the \\contoso.com\DFS1 namespace on Server1 if Server2 is unavailable. How should you configure the \\contoso.com\DFS1 namespace?   From the properties of the \\SERVER2\DFS1 namespace servers entry, modify the advanced settings.  
🗑
Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are displayed. What should you do?   Enable access-based enumeration (ABE).  
🗑
You discover that the Exchange Server 2010 transaction log files are purged during the backup. You need to prevent the Exchange Server 2010 transaction log files from being purged. What should you do?   From the properties of the backup, modify the VSS settings.  
🗑
The file screen is configured to block files contained in the Audio and Video file group. You need to allow users in the sales department to upload video files to C:\Data\Sales. What should you do?   Create a file screen exception  
🗑
You discover that scanned documents stored as JPG files are not being classified. You need to ensure that all file classification rules apply to scanned documents. What should you do?   Enable the Windows TIFF IFilter feature  
🗑
Server1 has three shared printers named Printer1, Printer2, and Printer3. Each shared printer uses a different driver. You need to ensure that if Printer1 causes an exception, users can still print to Printer2 and Printer3. What should you do?   Modify the driver isolation settings.  
🗑
You download a critical update. You need to ensure that the WSUS client computers install the critical update during the next detection interval. What should you do?   From the server, configure the deadline settings.  
🗑
You need to ensure that the WSUS server automatically downloads service packs. What should you do first?   From the Products and Classifications options, modify the Classifications settings.  
🗑
You need to ensure that the Update Services console on WSUS2 only displays computers that receive updates from WSUS2. What should you configure on WSUS2?   Personalization  
🗑
You need to document the following configurations of a server that runs Windows Server 2008 R2: System services Startup programs Hardware configuration Current CPU, network, disk, and memory utilization Which command should you run?   perfmon.exe /report  
🗑
You need to create a script to identify known configuration issues. What should you include in the script?   the Invoke-BPAModel cmdlet  
🗑
You need to identify which processes perform the most disk writes and disk reads per second. Which tool should you use?   Resource Monitor  
🗑
You need to ensure that User1 can schedule Data Collector Sets (DCSs) on Server1. The solution must minimize the number of rights assigned to User1. What should you do?   Add User1 to the Performance Log Users group.  
🗑
You need to ensure that User1 can view the events in the Security event log. The solution must minimize the number of rights assigned to User1. What should you do?   In the Registry Editor, add a Security Descriptor Definition Language (SDDL) value.  
🗑
Your network contains one Active Directory domain. You have a member server that runs Windows Server 2008 R2. You need to immediately disable all incoming connections to the server.   From Windows Firewall, enable the Block all connections option on the Domain Profile.  
🗑
You assign the Secure Server (Require Security) IPsec policy to Server1 by using a Group Policy object (GPO). Users report that they fail to connect to Server1. You need to ensure that users can connect to Server1. What should you do?   Assign the Client (Respond Only) IPsec policy to all client computers.  
🗑
You need to ensure that all public DNS queries are channeled through a single-caching-only DNS server. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)   Disable the root hints. Configure a forwarder to the caching DNS server.  
🗑
Server3 is configured to forward all DNS requests to Server2. You update a DNS record on Server2. You need to ensure that Server3 is able to immediately resolve the updated DNS record. What should you do?   Run the dnscmd . /clearcache command on Server3.  
🗑
Your partner company has a single domain named partner.com. The partner.com DNS zone is Active Directoryintegrated. You need to ensure name resolution for users in contoso.com to resources in partner.com.   Create a stub zone for partner.com on each DNS server in contoso.com.  
🗑
You need to ensure that users in the branch offices can access their local application server even if the WAN links are down for three days.   Increase the Expires After setting to 4 days on the Start of Authority (SOA) record for the zone.  
🗑
You need to migrate \\contoso.com\dfs to Windows Server 2008 mode. You install the Distributed File System role service on Server2. What should you do next?   At the command prompt, run dfsutil root export  
🗑
All data must be encrypted by using end-to-end encryption. The VPN connection must use computer-level authentication. User names and passwords cannot be used for authentication. What should you do?   use the EAP-TLS authentication  
🗑
You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?   Create a remote access policy that requires users to authenticate by using EAP-TLS.  
🗑
You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?   Extensible Authentication Protocol (EAP)  
🗑
Your network contains a server that runs Windows Server 2008 R2. The server has the Network Policy and Access Services server role installed. You need to allow only members of a global group named Group1 VPN access to the network. What should you do?   Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.  
🗑
You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?   Configure all access points as RADIUS clients to the Network Policy Server (NPS).  
🗑
You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?   Configure all access points to use 802.1X authentication.  
🗑
You need to prevent all users, except administrators, from creating new folders or new files at the root of the \ \contoso.com\dfs share. What should you do?   Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users group to Reader. Set the permissions for the Administrators group to Co-owner.  
🗑
The \\contoso.com\Management namespace hierarchy is updated frequently. You need to configure the \ \contoso.com\Management namespace to reduce the workload of the PDC emulator.   Enable the Optimize for scalability option.  
🗑
Server1 fails. You install a new server named Server2 that runs Windows Server 2008 R2. You need to restore the company's Windows SharePoint Services (WSS) site to Server2. What should you do?   Use Wbadmin to restore the application and the sites from backup.  
🗑
You configure quotas on the server. You need to view each user's quota usage on a per folder basis. What should you do?   From File Server Resource Manager, create a Storage Management report.  
🗑
You need to reduce the number of events registered in the system log on Printer1. What should you do?   Open the Print Management console. Open the properties of Printer1 and clear the Log spooler information events option  
🗑
You install a new server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed. After a week, you discover that the Reliability Monitor has no data, and that the Systems Stability chart has never been updated.   Configure the Task Scheduler service to start automatically.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: jrhighfield
Popular Computers sets