Ms 70-640

45 Questions  I  By Rayandlisaj
Please take the quiz to rate it.

Microsoft Quizzes & Trivia
MS 70-640 practice exam

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
  • 1. 
    Which of the following are required to create a domain controller successfully? (Choose all that apply.)chapter 1 lesson 1  
    • A. 

      A valid DNS domain name

    • B. 

      A valid NetBIOS name

    • C. 

      A DHCP server to assign an IP address to the domain controller

    • D. 

      A DNS server


  • 2. 
    You are logged on as Administrator to SERVER02, one of four domain controllers in thecontoso.com domain that run Server Core. You want to demote the domain controller. Which of the following is required?chapter 1 lesson 2
    • A. 

      The local Administrator password

    • B. 

      The credentials for a user in the Domain Admins group

    • C. 

      The credentials for a user in the Domain Controllers group

    • D. 

      The address of a DNS server


  • 3. 
    SERVER02 is running Server Core. It is already configured with the AD DS role. You want to add Active Directory Certificate Services (AD CS) to the server. What must you do?chapter 1 lesson 2
    • A. 

      Install the Active Directory Certificate Services role.

    • B. 

      Install the Active Directory Federated Services role.

    • C. 

      Install the AD RMS role.

    • D. 

      Reinstall the server as Windows Server 2008 (Full Installation).


  • 4. 
    You are a support professional for Contoso, Ltd. The domain’s administrators have distributed a custom console with the Active Directory Users and Computers snap-in. When you open the console and attempt to reset a user’s password, you receive Access Denied errors. You are certain that you have been delegated permission to reset passwords for users. What is the best solution?
    • A. 

      Close the custom console and open Server Manager. Use the Active Directory Users and Computers snap-in in Server Manager.

    • B. 

      Close the custom console and open a command prompt. Type dsa.msc.

    • C. 

      Close the custom console, and then right-click the console and choose Run As Administrator. Type the credentials for your secondary administrative account.

    • D. 

      Close the custom console, and then right-click the console and open a command prompt. Use the DSMOD USER command with the –p switch to change the user’s password


  • 5. 
    You have opened a command prompt, using Run As Administrator, with credentials in the Domain Admins group. You use the Dsrm command to remove an OU that had been created accidentally by James, a member of the Administrators group of the domain. You receive the response: Dsrm Failed: Access Is Denied. What is the cause of the error? chapter 2 lesson 2
    • A. 

      You must launch the command prompt as a member of Administrators to perform Active Directory tasks.

    • B. 

      Only Administrators can delete OUs.

    • C. 

      Only the owner of the OU can delete an OU.

    • D. 

      The OU is protected from deletion.


  • 6. 
    You want to enable your help desk to reset user passwords and unlock user accounts. Which of the following tools can be used? (Choose all that apply.)chapter 2 lesson 3
    • A. 

      The Delegation of Control Wizard

    • B. 

      DSACLS

    • C. 

      DSUTIL

    • D. 

      The Advanced Security Settings dialog box


  • 7. 
    You are an administrator at a large university, and you have just been sent an Excel file containing information about 2,000 students who will enter the school in two weeks. You want to create user accounts for the new students with as little effort as possible. Which of the following tasks should you perform? chapter 3 lesson 1
    • A. 

      Create a user account template and copy it for each student.

    • B. 

      Run LDIFDE -i.

    • C. 

      Use CSVDE -i.

    • D. 

      Run the DSADD USER command.


  • 8. 
    You are an administrator at a large university. Which command can be used to delete user accounts for students who graduated? chapter 3 lesson 1
    • A. 

      LDIFDE

    • B. 

      Dsmod

    • C. 

      DEL

    • D. 

      CSVDE


  • 9. 
    You want to create a user object with Windows PowerShell. Which of the following must you do? chapter 3 lesson 2
    • A. 

      Use the Create-User cmdlet.

    • B. 

      Use the NewUser method of ADSI.

    • C. 

      Invoke the Create method of an OU.

    • D. 

      Use the set objUser=CreateObject statement.


  • 10. 
    You want to create a user object with a single command. Which of the following should you do? chapter 3 lesson 2
    • A. 

      Use the Create-Item cmdlet.

    • B. 

      Use the SetInfo method.

    • C. 

      Use the Create method of an OU.

    • D. 

      Use the Dsadd command.


  • 11. 
    Which of the following lines of Windows PowerShell code are necessary to create a user object in the People OU? (Choose all that apply. Each correct answer is a part of the solution.) chapter 3 lesson 2
    • A. 

      $objUser=$objOU.Create("user","CN=Jeff Ford")

    • B. 

      $objUser.SetInfo()

    • C. 

      $objUser=CreateObject("LDAP://CN=Jeff Ford,OU=People,DC=contoso,DC=com")

    • D. 

      $objOU=[ADSI]"LDAP://OU=People,DC=contoso,DC=com"


  • 12. 
    You want to set the Office property of ten users in two different OUs. The users currently have the Office property configured as Miammi. You recently discovered the typographic error and want to change it to Miami. What can you do to make the change? (Choose all that apply.) chapter 3 lesson 3
    • A. 

      Select all ten users by holding the Ctrl key and opening the Properties dialog box.

    • B. 

      Use Dsget and Dsmod.

    • C. 

      Use Dsquery and Dsmod.

    • D. 

      Use Get-Item and Move-Item.


  • 13. 
    You want to move a user from the Paris OU to the Moscow OU. Which tools can you use? (Choose all that apply.)chapter 3 lesson 3
    • A. 

      Move-Item

    • B. 

      The MoveHere method of the Moscow OU

    • C. 

      Dsmove

    • D. 

      Redirusr.exe

    • E. 

      Active Directory Migration Tool


  • 14. 
    A user reports that she is receiving a logon message that states, "Your account is configured to prevent you from using the computer. Please try another computer." What should you do to enable her to log on to the computer? chapter 3 lesson 3
    • A. 

      Click the Log On To button on the Account tab of her user account.

    • B. 

      Click the Allowed To Join Domain button in the New Computer dialog box.

    • C. 

      Use the Dsmove command.

    • D. 

      Give her the right to log on locally, using the local security policy of the computer.


  • 15. 
    A new project requires that users in your domain and in the domain of a partner organization have access to a shared folder on your file server. Which type of group should you create to manage the access to the shared folder?   Chapter 4 lesson 1
    • A. 

      Universal security group

    • B. 

      Domain local security group

    • C. 

      Global security group

    • D. 

      Domain local distribution group


  • 16. 
    Your domain includes a global distribution group named Company Update. It has been used to send company news by e-mail to its members. You have decided to allow all members to contribute to the newsletter by creating a shared folder on a file server. What must you do to allow group members access to the shared folder?   Chapter 4 lesson 1
    • A. 

      Change the group scope to domain local.

    • B. 

      Change the group scope to universal.

    • C. 

      Add the group to the Domain Users group.

    • D. 

      Use Dsmod with the –secgrp yes switch.


  • 17. 
    You have created a global security group in the contoso.com domain named Corporate Managers. Which members can be added to the group? (Choose all that apply.)   Chapter 4 lesson 1
    • A. 

      Sales Managers, a global group in the tailspintoys.com domain, a domain in the contoso. com forest

    • B. 

      Linda Mitchell, a user in the tailspintoys.com domain, a domain in the contoso.com forest

    • C. 

      Jeff Ford, a user in the fabrikam.com domain, a trusted domain of a partner company

    • D. 

      Mike Danseglio, a user in the contoso.com domain

    • E. 

      Sales Executives, a global group in the contoso.com domain


  • 18. 
    Which of the following can be used to remove members from a group? (Choose all that apply.)   Chapter 4 lesson 2
    • A. 

      Remove-Item

    • B. 

      Dsrm

    • C. 

      Dsmod

    • D. 

      D. LDIFDE

    • E. 

      CSVDE


  • 19. 
    You are using Dsmod to add a domain local group named GroupA to a global group named GroupB. You are receiving errors. Which command will solve the problem so that you can then add GroupA to GroupB? (Choose all that apply.)   Chapter 4 lesson 2
    • A. 

      Dsrm.exe

    • B. 

      Dsmod.exe

    • C. 

      Dsquery.exe

    • D. 

      Dsget.exe


  • 20. 
    Your management has asked you to produce a list of all users who belong to the Special Project group, including those users belonging to groups nested into Special Project. Which of the following can you use?   Chapter 4 lesson 2
    • A. 

      Get-Members

    • B. 

      Dsquery.exe

    • C. 

      LDIFDE

    • D. 

      Dsget.exe


  • 21. 
    Your company is conducting a meeting for a special project. The data is particularly confidential. The team is meeting in a conference room, and you have configured a folder on the conference room computer that grants permission to the team members. You want to ensure that team members access the data only while logged on to the computer in the conference room, not from other computers in the enterprise. What must you do?   Chapter 4 lesson 3
    • A. 

      Assign the Allow Read permission to the Interactive group.

    • B. 

      Assign the Allow Read permission to the team group.

    • C. 

      Assign the Deny Traverse Folders permission to the team group.

    • D. 

      Assign the Deny Full Control permission to the Network group.


  • 22. 
    You want to allow a user named Mike Danseglio to add and remove users from a group called Special Project. Where can you configure this permission? Chapter 4 lesson 3
    • A. 

      The Members tab of the group

    • B. 

      The Security tab of Mike Danseglio’s user object

    • C. 

      The Member Of tab of Mike Danseglio’s user object

    • D. 

      The Managed By tab of the group


  • 23. 
    Which of the following groups can shut down a domain controller? (Choose all that apply.)   Chapter 4 lesson 3
    • A. 

      Account Operators

    • B. 

      Print Operators

    • C. 

      Backup Operators

    • D. 

      Server Operators

    • E. 

      Interactive


  • 24. 
    You want to require all new computer accounts created when computers join the domain to be placed in the Clients OU. Which command should you use?   Chapter 5 lesson 1
    • A. 

      Dsmove

    • B. 

      Move-Item

    • C. 

      Netdom

    • D. 

      Redircmp


  • 25. 
    You want to prevent non administrative users from joining computers to the domain. What should you do?   Chapter 5 lesson 1
    • A. 

      Set ms-DS-MachineAccountQuota to zero.

    • B. 

      Set ms-DS-DefaultQuota to zero.

    • C. 

      Remove the Add Workstations To Domain user right from Authenticated Users.

    • D. 

      On the domain, deny the Authenticated Users group the Create Computer Objects permission.


  • 26. 
    You want to join a remote computer to the domain. Which command should you use?   Chapter 5 lesson 1
    • A. 

      Dsadd.exe

    • B. 

      Netdom.exe

    • C. 

      Dctest.exe

    • D. 

      System.cpl


  • 27. 
    Your manager has just asked you to create an account for DESKTOP234. Which of the following enables you to do that in one step?   Chapter 5 lesson 2  
    • A. 

      CSVDE

    • B. 

      LDIFDE

    • C. 

      Dsadd

    • D. 

      Windows PowerShell

    • E. 

      VBScript


  • 28. 
    Your hardware vendor has just given you an Excel worksheet containing the asset tags of computers that will be delivered next week. You want to create computer objects for the computers in advance. Your naming convention specifies that computers’ names are their asset tags. Which of the following tools can you use to import the computers? (Choose all that apply.)   Chapter 5 lesson 2
    • A. 

      CSVDE

    • B. 

      LDIFDE

    • C. 

      Dsadd

    • D. 

      Windows PowerShell

    • E. 

      VBScript


  • 29. 
    A server administrator reports Failed To Authenticate events in the event log of a file server. What should you do?   Chapter 5 lesson 3
    • A. 

      Reset the server account.

    • B. 

      Reset the password of the server administrator.

    • C. 

      Disable and enable the server account.

    • D. 

      Delete the account of the server administrator.


  • 30. 
    A computer has permissions assigned to its account to support a system service. It also belongs to 15 groups. The computer is being replaced with new hardware. The new hardware has a new asset tag, and your naming convention uses the asset tag as the computer name. What should you do? (Choose all that apply. Each correct answer is a part of the solution.)   Chapter 5 lesson 3
    • A. 

      Delete the computer account for the existing system.

    • B. 

      Create a computer account for the new system.

    • C. 

      Reset the computer account for the existing system.

    • D. 

      Rename the computer account for the existing system.

    • E. 

      Join the new system to the domain.


  • 31. 
    Your enterprise recently created a child domain to support a research project in a remote location. Computer accounts for researchers were moved to the new domain. When you open Active Directory Users And Computers, the objects for those computers are displayed with a down-arrow icon. What is the most appropriate course of action?   Chapter 5 lesson 3
    • A. 

      Reset the accounts.

    • B. 

      Disable the accounts.

    • C. 

      Enable the accounts.

    • D. 

      Delete the accounts.


  • 32. 
    Litware, Inc., has three business units, each represented by an OU in the litwareinc.com domain. The business unit administrators want the ability to manage Group Policy for the users and computers in their OUs. Which actions do you perform to give the administrators the ability to manage Group Policy fully for their business units? (Choose all that apply. Each correct answer is a part of the solution.)   chapter 6 lesson 1
    • A. 

      Copy administrative templates from the central store to the PolicyDefinitions folder on the administrators’ Windows Vista workstations.

    • B. 

      Add business unit administrators to the Group Policy Creator Owners group.

    • C. 

      Delegate Link GPOs permission to the administrators in the litwareinc.com domain.

    • D. 

      Delegate Link GPOs permission to the each business unit’s administrators in the business unit’s OU.


  • 33. 
    You are an administrator at Contoso, Ltd. At a recent conference, you had a conversation with administrators at Fabrikam, Inc. You discussed a particularly successful set of configurations you have deployed using a GPO. The Fabrikam administrators have asked you to copy the GPO to their domain. Which steps can you and the Fabrikam administrators perform?   chapter 6 lesson 1
    • A. 

      Right-click the Contoso GPO and choose Save Report. Create a GPO in the Fabrikam domain, right-click it, and choose Import.

    • B. 

      Right-click the Contoso GPO and choose Back Up. Right-click the Group Policy Objects container in the Fabrikam domain and choose Restore From Backup.

    • C. 

      Right-click the Contoso GPO and choose Back Up. Create a GPO in the Fabrikam domain, right-click it, and choose Paste.

    • D. 

      Right-click the Contoso GPO and choose Back Up. Create a GPO in the Fabrikam domain, right-click it, and choose Import Settings.


  • 34. 
    You want to deploy a GPO named Northwind Lockdown that applies configuration to all users at Northwind Traders. However, you want to ensure that the settings do not apply to members of the Domain Admins group. How can you achieve this goal? (Choose all that apply.)   chapter 6 lesson 2
    • A. 

      Link the Northwind Lockdown GPO to the domain, and then right-click the domain and choose Block Inheritance.

    • B. 

      Link the Northwind Lockdown GPO to the domain, right-click the OU that contains the user accounts of all users in the Domain Admins group, and choose Block Inheritance.

    • C. 

      Link the Northwind Lockdown GPO to the domain, and then assign the Domain Admins group the Deny Apply Group Policy permission.

    • D. 

      Link the Northwind Lockdown GPO to the domain, and then configure security filtering so that the GPO applies to Domain Users.


  • 35. 
    You want to create a standard lockdown desktop experience for users when they log on to computers in your company’s conference and training rooms. You have created a GPO called Public Computers Configuration with desktop restrictions defined in the User Configuration node. What additional steps must you take? (Choose all that apply. Each correct answer is a part of the solution.)   chapter 6 lesson 2
    • A. 

      Enable the User Group Policy Loopback Processing Mode policy setting.

    • B. 

      Link the GPO to the OU containing user accounts.

    • C. 

      Select the Block Inheritance option on the OU containing conference and training room computers.

    • D. 

      Link the GPO to the OU containing conference and training room computers.


  • 36. 
    A user calls the help desk at your organization and reports problems that you suspect might be related to changes that were recently made to Group Policy. You want to examine information regarding Group Policy processing on her system. Which tools can you use to gather this information remotely? (Choose all that apply.)   chapter 6 lesson 3
    • A. 

      Group Policy Modeling Wizard

    • B. 

      Group Policy Results Wizard

    • C. 

      Gpupdate.exe

    • D. 

      Gpresult.exe

    • E. 

      Msconfig.exe


  • 37. 
    You are the administrator at Contoso, Ltd. The contoso.com domain has five GPOs linked to the domain, one of which configures the password-protected screen saver and screen saver timeout required by corporate policy. Some users report that the screen saver is not launching after 10 minutes as expected. How do you know when the GPO was applied?   chapter 6 lesson 3
    • A. 

      Run Gpresult.exe for the users.

    • B. 

      Run Gpresult.exe –computer.

    • C. 

      Run Gpresult –scope computer.

    • D. 

      Run Gpupdate.exe /Target:User.


  • 38. 
    The contoso.com domain contains a GPO named Corporate Help Desk, linked to the Clients OU, and a GPO named Sydney Support linked to the Sydney OU within the Clients OU. The Corporate Help Desk GPO includes a restricted groups policy for the CONTOSO\ Help Desk group that specifies This Group Is A Member Of Administrators. The Sydney Support GPO includes a restricted groups policy for the CONTOSO\Sydney Support group that specifies This Group Is A Member Of Administrators. A computer named DESKTOP234 joins the domain in the Sydney OU. Which of the following accounts will be a member of the Administrators group on DESKTOP234? (Choose all that apply.)   chapter 7 lesson 1
    • A. 

      Administrator

    • B. 

      Domain Admins

    • C. 

      Sydney Support

    • D. 

      Help Desk

    • E. 

      Remote Desktop Users


  • 39. 
    The contoso.com domain contains a GPO named Corporate Help Desk, linked to the Clients OU, and a GPO named Sydney Support linked to the Sydney OU within the Clients OU. The Corporate Help Desk GPO includes a restricted groups policy for the Administrators group that specifies the Members Of This Group setting to be CONTOSO\Help Desk. The Sydney Support GPO includes a restricted groups policy for the Administrators group that specifies the Members Of This Group setting to be CONTOSO\Sydney Support. A computer named DESKTOP234 joins the domain in the Sydney OU. Which of the following accounts will be a member of the Administrators group on DESKTOP234? .(Choose all that apply.)   chapter 7 lesson 1
    • A. 

      Administrator

    • B. 

      Domain Admins

    • C. 

      Sydney Support

    • D. 

      Help Desk

    • E. 

      Remote Desktop Users


  • 40. 
    The contoso.com domain contains a GPO named Corporate Help Desk, linked to the Clients OU, and a GPO named Sydney Support linked to the Sydney OU within the Clients OU. The Corporate Help Desk GPO includes a restricted groups policy for the Administrators group that specifies the Members Of This Group setting to be CONTOSO\Help Desk. The Sydney Support GPO includes a restricted groups policy for the CONTOSO \Sydney Support group that specifies This Group Is A Member Of Administrators. A computer named DESKTOP234 joins the domain in the Sydney OU. Which of the following accounts will be a member of the Administrators group on DESKTOP234? (Choose all that apply.)   chapter 7 lesson 1
    • A. 

      Administrator

    • B. 

      Domain Admins

    • C. 

      Sydney Support

    • D. 

      Help Desk

    • E. 

      Remote Desktop Users


  • 41. 
    You want to deploy security settings to multiple servers by using Group Policy. The settings need to apply the user rights that you have configured and validated on a server in your test environment. Which tool should you use?   chapter 7 lesson 2
    • A. 

      Local Security Policy

    • B. 

      Security Configuration And Analysis

    • C. 

      Security Configuration Wizard

    • D. 

      Security Templates


  • 42. 
    You want to deploy security settings to multiple servers by using Group Policy. The settings need to configure services, firewall rules, and audit policies appropriate for servers in your enterprise that act as file and print servers. Which tool would be the best choice for you to use?   chapter 7 lesson 2
    • A. 

      Local Security Policy

    • B. 

      Security Configuration And Analysis

    • C. 

      Security Configuration Wizard

    • D. 

      Security Templates


  • 43. 
    You created a security policy by using the Security Configuration Wizard. Now you want to deploy the settings in that security policy to the servers in your Servers OU. Which of the following steps are required? (Choose two. Each correct answer is a part of the solution.)   chapter 7 lesson 2
    • A. 

      Use Scwcmd.exe /transform.

    • B. 

      Create a Group Policy Object in the Group Policy Objects container.

    • C. 

      Right-click the Security Settings node of a GPO and choose import.

    • D. 

      Link the GPO to the Servers OU.


  • 44. 
    You want to raise the domain functional level of a domain in the contoso.com forest. Which tool can you use? (Choose all that apply.)   chapter 12 lesson 1
    • A. 

      Active Directory Users And Computers

    • B. 

      Active Directory Schema

    • C. 

      Active Directory Sites And Services

    • D. 

      Active Directory Domains And Trusts


  • 45. 
    You are an administrator of the contoso.com domain. You want to add a read-only domain controller to a domain with one Windows Server 2003 domain controller and one Windows 2008 domain controller. Which of the following must be done before adding a new server as an RODC? (Choose all that apply. Each correct answer is part of the solution.)   chapter 12 lesson 1
    • A. 

      Upgrade the Windows 2003 domain controller to Windows Server 2008.

    • B. 

      Raise the domain functional level to Windows Server 2003.

    • C. 

      Raise the domain functional level to Windows Server 2008.

    • D. 

      Raise the forest functional level to Windows Server 2003.

    • E. 

      Run Adprep /rodcprep.


Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.