Latest Real 70-640 Tests Dumps and VCE Exam Questions 491-500

Ensurepass

QUESTION 491

Your network contains an Active Directory forest named contoso.com. The functional level of the forest is Windows Server 2008 R2. You have four Active Directory sites. Each site has multiple Active Directory subnets. You need to identify all of the authentication requests that originate from client computers that are not associated to an Active Directory subnet. What should you use?

 

A.      The %Systemroot%System32Network_llu.log log file

B.      The %Systemroot%DebugNetsetup.log log file

C.      The Authentication User Interface operational log

D.      The %Systemroot%DebugNetlogon.log log file

 

Correct Answer: B

 

 

QUESTION 492

Your network contains an Active Directory domain. The domain contains five sites. One of the sites contains a read-only domain controller (RODC) named RODC1. You need to identify which user accounts can have their password cached on RODC1. Which tool should you use?

 

A.      Get-ADFineGrainedPasswordPolicy

B.      Dcdiag

C.      Get-ADDomamControllerPasswordReplicationPolicy

D.      Get-ADAccountResultantPasswordReplicationPolicy

 

Correct Answer: C

 

 

QUESTION 493

A user attempts to join a computer to the domain, but the attempt fails. You need to ensure that the user can join fifty computer to the domain. You must ensure that the user is denied any additional rights beyond those required to complete the task. What should you do?

 

A.      Prestage each computer account in the Active Directory domain.

B.      Deploy a Group Policy Object (GPO) that modifies the user rights settings.

C.      Add the user to the Domain Administrators group for one day.

D.      Deploy a Group Policy object (GPO) that modifies the Restricted Groups settings.

 

Correct Answer: A

 

 

QUESTION 494

Your network contains an Active Directory domain. The domain is configured as shown in the exhibit.

 

clip_image002

 

You have a Group Policy object (GPO) linked to the domain. The GPO is used to deploy a number of software packages. You need to ensure that the GPO is applied only to client computers that have sufficient free disk space. What should you do?

 

A.      Modify the Group Policy permissions.

B.      Enable block inheritance.

C.      Configure the link order.

D.      Enable loopback processing in merge mode.

E.       Enable loopback processing in replace mode.

F.       Modify the Group Policy permissions.

G.      Enable block inheritance.

H.      Configure the link order.

I.        Enable loopback processing in merge mode.

J.        Enable loopback processing in replace mode.

 

Correct Answer: F

 

 

QUESTION 495

Your network contains an Active Directory domain named contoso.com. You have a comma separated value (CSV) file named Users.txt. Users.txt contains the information for 500 users and all of the attributes required to create user accounts. You plan to automate the creation of user accounts by using the Users.txt file. You need to identify which two cmdlets you must run. The solution must pipe the output from the first cmdlet to the second cmdlet. What should you run from Windows PowerShell?

 

To answer, configure the appropriate PowerShell command in the answer area.

 

Select and Place:

clip_image003

 

Correct Answer:

clip_image004

 

 

QUESTION 496

Your network contains an Active Directory domain named contoso.com. All domain controllers run a Server Core installation of Windows Server 2008 R2. You need to identify which domain controller holds the PDC emulator role. Which tool should you run?

 

A.      Get-AdOptionalFeature

B.      netdom.exe

C.      Search-AdAccount

D.      dsrm.exe

 

Correct Answer: B

 

 

QUESTION 497

You have a standard primary zone named contoso.com. You need to configure how often the zone will be transferred to servers that host a secondary copy of the zone. Which tab should you use?

 

To answer, select the appropriate tab in the answer area.

 

Hot Area:

clip_image005

 

Correct Answer:

clip_image006

 

 

QUESTION 498

Your network contains four domain controllers. The domain controllers are configured as shown in the following table.

 

clip_image007

 

All of the domain controllers are configured to host an Active Directory-integrated zone for their respective domain. A GlobalNames zone is deployed in the fabrikam.com forest. You add a canonical (CNAME) record named Server1 to the GlobalNames zone. You discover that users in the contoso.com forest cannot resolve the name Server1. The users in fabrikam.com can resolve the name Server1. You need to ensure that the contoso.com users can resolve names in the GlobalNames zone. What should you do? (Each correct answer presents part of the solution. Choose two.)

 

A.      Run dnscmd.exe and specify the globalnamesqueryorder parameter on CONT-DC1 and CONT-DC2.

B.      Add service location (SRV) records named _globalnames to the _msdcs.contoso.com zone.

C.      Run dnscmd.exe and specify the enableglobalnamessupport parameter on CONT-DC1 and CONT-DC2.

D.      Run dnscmd.exe and specify the globalnamesqueryorder parameter on FABR-DC1 and FABR-DC2.

E.       Run dnscmd.exe and specify the enableglobalnamessupport parameter on FABR-DC1 and FABR-DC2.

F.       Add service location (SRV) records named _globalnames to the _msdcs.fabrikam.com zone.

 

Correct Answer: AD

 

 

QUESTION 499

A corporate network includes a single Active Directory Domain Services (AD DS) domain. The HR department has a dedicated organization unit (OU) named HR. The HR OU has two sub-OUs: HR Users and HR Computers. User accounts for the HR department reside in the HR Users OU. Computer accounts for the HR department reside in the HR Computers OU. All HR department employees belong to a security group named HR Employees. All HR department computers belong to a security group named HR PCs. Company policy requires that passwords are a minimum of six characters. You need to ensure that, the next time HR department employees change their passwords, the passwords are required to have at least eight characters. The password length requirement should not change for employees of any other department. What should you do?

 

A.      Modify the local security policy on each computer in the HR PCs group.

B.      Create a fine-grained password policy and apply it to the HR Employees group.

C.      Create a new GPO, with the necessary password policy, and link it to the HR Computers OU.

D.      Create a fine-grained password policy and apply it to the HR Computers OU.

 

Correct Answer: B

 

 

QUESTION 500

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. Server1 has a shared folder named Profiles. You plan to create a new user template named User_Template. You need to ensure that when you copy User_Temptate, the new user account has a unique profile folder created in the Profiles share. Which value should you specify for the profile path?

 

A.      %Userprofile%Server1profiles

B.      \Server1profiles%username%

C.      \Server1%userprofile%

D.      \Server1profilesusername

 

Correct Answer: B

 

 

Download Latest Microsoft 70-640 Real Free Tests ,help you to pass exam 100%.