Ms 70-640

45 Questions  I  By Rayandlisaj on July 30, 2010
MS 70-640 practice exam

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Which of the following are required to create a domain controller successfully? (Choose all that apply.)chapter 1 lesson 1  
A.
B.
C.
D.
2.  You are logged on as Administrator to SERVER02, one of four domain controllers in thecontoso.com domain that run Server Core. You want to demote the domain controller. Which of the following is required?chapter 1 lesson 2
A.
B.
C.
D.
3.  SERVER02 is running Server Core. It is already configured with the AD DS role. You want to add Active Directory Certificate Services (AD CS) to the server. What must you do?chapter 1 lesson 2
A.
B.
C.
D.
4.  You are a support professional for Contoso, Ltd. The domain’s administrators have distributed a custom console with the Active Directory Users and Computers snap-in. When you open the console and attempt to reset a user’s password, you receive Access Denied errors. You are certain that you have been delegated permission to reset passwords for users. What is the best solution?
A.
B.
C.
D.
5.  You have opened a command prompt, using Run As Administrator, with credentials in the Domain Admins group. You use the Dsrm command to remove an OU that had been created accidentally by James, a member of the Administrators group of the domain. You receive the response: Dsrm Failed: Access Is Denied. What is the cause of the error? chapter 2 lesson 2
A.
B.
C.
D.
6.  You want to enable your help desk to reset user passwords and unlock user accounts. Which of the following tools can be used? (Choose all that apply.)chapter 2 lesson 3
A.
B.
C.
D.
7.  You are an administrator at a large university, and you have just been sent an Excel file containing information about 2,000 students who will enter the school in two weeks. You want to create user accounts for the new students with as little effort as possible. Which of the following tasks should you perform? chapter 3 lesson 1
A.
B.
C.
D.
8.  You are an administrator at a large university. Which command can be used to delete user accounts for students who graduated? chapter 3 lesson 1
A.
B.
C.
D.
9.  You want to create a user object with Windows PowerShell. Which of the following must you do? chapter 3 lesson 2
A.
B.
C.
D.
10.  You want to create a user object with a single command. Which of the following should you do? chapter 3 lesson 2
A.
B.
C.
D.
11.  Which of the following lines of Windows PowerShell code are necessary to create a user object in the People OU? (Choose all that apply. Each correct answer is a part of the solution.) chapter 3 lesson 2
A.
B.
C.
D.
12.  You want to set the Office property of ten users in two different OUs. The users currently have the Office property configured as Miammi. You recently discovered the typographic error and want to change it to Miami. What can you do to make the change? (Choose all that apply.) chapter 3 lesson 3
A.
B.
C.
D.
13.  You want to move a user from the Paris OU to the Moscow OU. Which tools can you use? (Choose all that apply.)chapter 3 lesson 3
A.
B.
C.
D.
E.
14.  A user reports that she is receiving a logon message that states, "Your account is configured to prevent you from using the computer. Please try another computer." What should you do to enable her to log on to the computer? chapter 3 lesson 3
A.
B.
C.
D.
15.  A new project requires that users in your domain and in the domain of a partner organization have access to a shared folder on your file server. Which type of group should you create to manage the access to the shared folder?   Chapter 4 lesson 1
A.
B.
C.
D.
16.  Your domain includes a global distribution group named Company Update. It has been used to send company news by e-mail to its members. You have decided to allow all members to contribute to the newsletter by creating a shared folder on a file server. What must you do to allow group members access to the shared folder?   Chapter 4 lesson 1
A.
B.
C.
D.
17.  You have created a global security group in the contoso.com domain named Corporate Managers. Which members can be added to the group? (Choose all that apply.)   Chapter 4 lesson 1
A.
B.
C.
D.
E.
18.  Which of the following can be used to remove members from a group? (Choose all that apply.)   Chapter 4 lesson 2
A.
B.
C.
D.
E.
19.  You are using Dsmod to add a domain local group named GroupA to a global group named GroupB. You are receiving errors. Which command will solve the problem so that you can then add GroupA to GroupB? (Choose all that apply.)   Chapter 4 lesson 2
A.
B.
C.
D.
20.  Your management has asked you to produce a list of all users who belong to the Special Project group, including those users belonging to groups nested into Special Project. Which of the following can you use?   Chapter 4 lesson 2
A.
B.
C.
D.
21.  Your company is conducting a meeting for a special project. The data is particularly confidential. The team is meeting in a conference room, and you have configured a folder on the conference room computer that grants permission to the team members. You want to ensure that team members access the data only while logged on to the computer in the conference room, not from other computers in the enterprise. What must you do?   Chapter 4 lesson 3
A.
B.
C.
D.
22.  You want to allow a user named Mike Danseglio to add and remove users from a group called Special Project. Where can you configure this permission? Chapter 4 lesson 3
A.
B.
C.
D.
23.  Which of the following groups can shut down a domain controller? (Choose all that apply.)   Chapter 4 lesson 3
A.
B.
C.
D.
E.
24.  You want to require all new computer accounts created when computers join the domain to be placed in the Clients OU. Which command should you use?   Chapter 5 lesson 1
A.
B.
C.
D.
25.  You want to prevent non administrative users from joining computers to the domain. What should you do?   Chapter 5 lesson 1
A.
B.
C.
D.
26.  You want to join a remote computer to the domain. Which command should you use?   Chapter 5 lesson 1
A.
B.
C.
D.
27.  Your manager has just asked you to create an account for DESKTOP234. Which of the following enables you to do that in one step?   Chapter 5 lesson 2  
A.
B.
C.
D.
E.
28.  Your hardware vendor has just given you an Excel worksheet containing the asset tags of computers that will be delivered next week. You want to create computer objects for the computers in advance. Your naming convention specifies that computers’ names are their asset tags. Which of the following tools can you use to import the computers? (Choose all that apply.)   Chapter 5 lesson 2
A.
B.
C.
D.
E.
29.  A server administrator reports Failed To Authenticate events in the event log of a file server. What should you do?   Chapter 5 lesson 3
A.
B.
C.
D.
30.  A computer has permissions assigned to its account to support a system service. It also belongs to 15 groups. The computer is being replaced with new hardware. The new hardware has a new asset tag, and your naming convention uses the asset tag as the computer name. What should you do? (Choose all that apply. Each correct answer is a part of the solution.)   Chapter 5 lesson 3
A.
B.
C.
D.
E.
31.  Your enterprise recently created a child domain to support a research project in a remote location. Computer accounts for researchers were moved to the new domain. When you open Active Directory Users And Computers, the objects for those computers are displayed with a down-arrow icon. What is the most appropriate course of action?   Chapter 5 lesson 3
A.
B.
C.
D.
32.  Litware, Inc., has three business units, each represented by an OU in the litwareinc.com domain. The business unit administrators want the ability to manage Group Policy for the users and computers in their OUs. Which actions do you perform to give the administrators the ability to manage Group Policy fully for their business units? (Choose all that apply. Each correct answer is a part of the solution.)   chapter 6 lesson 1
A.
B.
C.
D.
33.  You are an administrator at Contoso, Ltd. At a recent conference, you had a conversation with administrators at Fabrikam, Inc. You discussed a particularly successful set of configurations you have deployed using a GPO. The Fabrikam administrators have asked you to copy the GPO to their domain. Which steps can you and the Fabrikam administrators perform?   chapter 6 lesson 1
A.
B.
C.
D.
34.  You want to deploy a GPO named Northwind Lockdown that applies configuration to all users at Northwind Traders. However, you want to ensure that the settings do not apply to members of the Domain Admins group. How can you achieve this goal? (Choose all that apply.)   chapter 6 lesson 2
A.
B.
C.
D.
35.  You want to create a standard lockdown desktop experience for users when they log on to computers in your company’s conference and training rooms. You have created a GPO called Public Computers Configuration with desktop restrictions defined in the User Configuration node. What additional steps must you take? (Choose all that apply. Each correct answer is a part of the solution.)   chapter 6 lesson 2
A.
B.
C.
D.
36.  A user calls the help desk at your organization and reports problems that you suspect might be related to changes that were recently made to Group Policy. You want to examine information regarding Group Policy processing on her system. Which tools can you use to gather this information remotely? (Choose all that apply.)   chapter 6 lesson 3
A.
B.
C.
D.
E.
37.  You are the administrator at Contoso, Ltd. The contoso.com domain has five GPOs linked to the domain, one of which configures the password-protected screen saver and screen saver timeout required by corporate policy. Some users report that the screen saver is not launching after 10 minutes as expected. How do you know when the GPO was applied?   chapter 6 lesson 3
A.
B.
C.
D.
38.  The contoso.com domain contains a GPO named Corporate Help Desk, linked to the Clients OU, and a GPO named Sydney Support linked to the Sydney OU within the Clients OU. The Corporate Help Desk GPO includes a restricted groups policy for the CONTOSO\ Help Desk group that specifies This Group Is A Member Of Administrators. The Sydney Support GPO includes a restricted groups policy for the CONTOSO\Sydney Support group that specifies This Group Is A Member Of Administrators. A computer named DESKTOP234 joins the domain in the Sydney OU. Which of the following accounts will be a member of the Administrators group on DESKTOP234? (Choose all that apply.)   chapter 7 lesson 1
A.
B.
C.
D.
E.
39.  The contoso.com domain contains a GPO named Corporate Help Desk, linked to the Clients OU, and a GPO named Sydney Support linked to the Sydney OU within the Clients OU. The Corporate Help Desk GPO includes a restricted groups policy for the Administrators group that specifies the Members Of This Group setting to be CONTOSO\Help Desk. The Sydney Support GPO includes a restricted groups policy for the Administrators group that specifies the Members Of This Group setting to be CONTOSO\Sydney Support. A computer named DESKTOP234 joins the domain in the Sydney OU. Which of the following accounts will be a member of the Administrators group on DESKTOP234? .(Choose all that apply.)   chapter 7 lesson 1
A.
B.
C.
D.
E.
40.  The contoso.com domain contains a GPO named Corporate Help Desk, linked to the Clients OU, and a GPO named Sydney Support linked to the Sydney OU within the Clients OU. The Corporate Help Desk GPO includes a restricted groups policy for the Administrators group that specifies the Members Of This Group setting to be CONTOSO\Help Desk. The Sydney Support GPO includes a restricted groups policy for the CONTOSO \Sydney Support group that specifies This Group Is A Member Of Administrators. A computer named DESKTOP234 joins the domain in the Sydney OU. Which of the following accounts will be a member of the Administrators group on DESKTOP234? (Choose all that apply.)   chapter 7 lesson 1
A.
B.
C.
D.
E.
41.  You want to deploy security settings to multiple servers by using Group Policy. The settings need to apply the user rights that you have configured and validated on a server in your test environment. Which tool should you use?   chapter 7 lesson 2
A.
B.
C.
D.
42.  You want to deploy security settings to multiple servers by using Group Policy. The settings need to configure services, firewall rules, and audit policies appropriate for servers in your enterprise that act as file and print servers. Which tool would be the best choice for you to use?   chapter 7 lesson 2
A.
B.
C.
D.
43.  You created a security policy by using the Security Configuration Wizard. Now you want to deploy the settings in that security policy to the servers in your Servers OU. Which of the following steps are required? (Choose two. Each correct answer is a part of the solution.)   chapter 7 lesson 2
A.
B.
C.
D.
44.  You want to raise the domain functional level of a domain in the contoso.com forest. Which tool can you use? (Choose all that apply.)   chapter 12 lesson 1
A.
B.
C.
D.
45.  You are an administrator of the contoso.com domain. You want to add a read-only domain controller to a domain with one Windows Server 2003 domain controller and one Windows 2008 domain controller. Which of the following must be done before adding a new server as an RODC? (Choose all that apply. Each correct answer is part of the solution.)   chapter 12 lesson 1
A.
B.
C.
D.
E.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz