Microsoft 70-642 exam - 10 Sample Questions.
Certification Disclaimer and Tips - Please Read Me First
TrevDogCertified.com has multiple DNS servers in the main office. You plan to install DNS on a member server in a TrevDogCertified.com branch office. You need to ensure that the DNS server in the branch office is able to query any DNS server in the main office, and you need to limit the number of DNS records that are transferred to the DNS server in the branch office. What should you do?
[A] Configure a stub zone on the DNS server in the main office.
[B] Configure a secondar zone on the DNS server in the branch office.
[C] Configure a primary zone on the DNS server in the branch office.
[D] Configure a stub zone on the DNS server in the branch office.
You are configuring a new DNS server in TrevDogCertified,com. You want to configure the new DNS server to specify the root server in your organization as its root servers. What should you do?
[A] Configure the new DNS server to forward queries to the root servers in your organization.
[B] Configure a HOSTS file with the names and addresses of the root server in your organization.
[C] Configure a LMHOSTS file with the names and addresses of the root server in your organization.
[D] Remplace the Cache.dns file with a new version specifying the company root server.
You want to prevent a certain host (A) record from being scavenged. The record belongs to a portable computer named TrevDogA that connects to the network only infrequently. TrevDogA obtains this address from a DHCP server. Which of the following steps would best enable you to achieve this goal?
[A] Create a record for TrevDogA manually.
[B] Disable scavenging on the server with which TrevDogA registers its record.
[C] Disable scavenging on the zone in which the record has been created.
[D] Assign the computer a static address.
Which of the following commands should you run to install a DHCP server on a Server Core installation of windows server 2008?
[A] servermanagercmd -install dhcp
[B] net start DHCPServer
[C] start /w ocsetup DHCPServer
[D] sc config dhcpserver start=auto
You are currently planning a wireless deployment for an enterprise organization. Based on the physical layout of your facillities, you determine that you need 12 wireless access points for adequate coverage. You want to provide the best wireless perfomance possible, buy you need to support wireless clients that are compatible wtih only 802.11.b. Which wireless protocol should you choose?
TrevDogCertified.com has decided to provide authentication and encrypted wireless network access throughout its facillities. TrevDogCertified.com is not willing to sacrifice security, however, and requires the most secure authentication mechanisms available. You have recntly upgraded all client computers to either Windows XP (with the latest service pack) or Windows Vista. Which wireless security standard should you use?
[A] 128-bit WEP
[D] 64-bit WEP
TrevDogCertified.com has six offices and a centralized IT department that manages all of the 900 client computers. Each of the offices has about 150 computers. The WAN uses a hub-andspoke architecture, with each of the five remote offices connected directly to the headquarters. How would you design the WSUS architecture?
[A] Deploy a WSUS server at the headquarters. Configure all client computers to retrieve updates directly from Microsoft
[B] Deploy a WSUS server at the headquarters. Configure all client computers to retrieve updates directly from the WSUS server
[C] Deploy a WSUS server to each office. Configure the WSUS servers at the remote offices to be replicas of the WSUS server at the headquarters
[D] Deploy a WSUS server to each office. Configure the WSUS to be managed by eacho office local IT support department
A TrevDogCertified.com computer running windows server 2008 has been experiencing intermittent performance problems. You think the problems might be caused by an application that was installed last week. Which tool would you use to determine exactly when the application was installed?
[A] Realiability Monitor
[B] Data Collector Sets
[C] Performance Monitor
[D] Network Monitor
Network access protection (NAP) is a set of operating system components that provide a platform for protected access to private networks. Now, you are an administrator of TrevDogCertified.com and NAP is deployed in your network. A security policy that secure wireless access to the network by using 802.1x authentication from any access point is created and applied. Your I.T. Manager asks you to ensure that all client computers that access the network are evaluated by NAP. What should you perform?
[A] Configure a Network Policy that specifies EAP-TLS as the only available authenticacion method and apply it.
[B] Configure all access points as Remote Authentication Dial In Use Service (RADIUS) clients to the Network Policy Server (NPS)
[C] Configure a Network Policy that defines Remote Access Server as a network connection method and apply it.
[D] Configure all access points as Remote Authentication Dial In Use Service (RADIUS) clients to the Remediatio server
As an Administrator for TrevDogCertified.com, you need to write a script to publish several printers to the Active Directory. Which tool should you use?
Q1 : D
Q2 : D
Q3 : A
Q4 : C
Q5 : B
Q6 : C
Q7 : C
Q8 : A
Q9 : B
Q10 : B