[OFFICIAL]Braindump2go 70-659 Practice Tests Download (61-70)

[OFFICIAL]Braindump2go 70-659 Practice Tests Download (61-70)

greatexam December 30, 2015

MICROSOFT NEWS: 70-659 Exam Questions has been Updated Today! Get Latest 70-659 VCE and 70-659 PDF Instantly! Welcome to Download the Newest Braindump2go 70-659 VCE&70-659 PDF Dumps: http://www.braindump2go.com/70-659.html (161 Q&As)

Real Latest 70-659 Exam Questions Updated By Official Microsoft Exam Center! Braindump2go Offers 70-659 Dumps sample questions for free download now! You also can visit our website, download our premium Microsoft 70-659 Exam Real Answers, 100% Exam Pass Guaranteed!

Exam Code: 70-659
Exam Name: TS: Windows Server 2008 R2, Server Virtualization
Certification Provider: Microsoft

70-659 Dumps,70-659 Book,70-659 Study Guide PDF,70-659 eBook,70-659 Braindump,70-659 eBook,70-659 Exam Questions,70-659 Exam Prep,70-659 Dumps PDF,70-659 Dumps Free,70-659 Latest Dumps,70-659 Practice Exam,70-659 Practice Questions,70-659 PDF,70-659 VCE

QUESTION 61
Your company has a load-balanced Remote Desktop Session host (RD Session Host) cluster.
You need to track user session information for the load-balanced RD Session Host cluster.
What should you do?

A.    Create a Remote Desktop connection authorization policy (RD CAP).
B.    Create a Remote Desktop authorization policy (RD RAM).
C.    Install and configure the remote Desktop Connection Broker role service.
D.    Install and configure the remote Desktop licensing role service.

Answer: C
Explanation:
Remote Desktop Connection Broker (RD Connection Broker), formerly Terminal Services Session Broker (TS Session Broker), is a role service that provides the following functionality:
Allows users to reconnect to their existing sessions in a load-balanced RD Session Host server farm.
This prevents a user with a disconnected session from being connected to a different RD Session Host server in the farm and starting a new session. Enables you to evenly distribute the session load among RD Session Host servers in a load-balanced RD Session Host server farm Provides users access to virtual desktops hosted on RD Virtualization Host servers and to RemoteApp programs hosted on RD Session Host servers through RemoteApp and Desktop Connection.
Remote Desktop Connection Broker (RD Connection Broker), formerly Terminal Services Session Broker (TS Session Broker), is used to provide users with access to RemoteApp and Desktop Connection. RemoteApp and Desktop Connection provides users a single, personalized, and aggregated view of RemoteApp programs, session-based desktops, and virtual desktops to users. RD Connection Broker supports load balancing and reconnection to existing sessions on virtual desktops, Remote Desktop sessions, and RemoteApp programs accessed by using RemoteApp and Desktop Connection. RD Connection Broker also aggregates RemoteApp sources from multiple Remote Desktop Session Host (RD Session Host) servers that may host different RemoteApp programs.
To configure which RemoteApp programs and virtual desktops are available through RemoteApp and Desktop Connection, you must add the RD Connection Broker role service on a computer running Windows Server 2008 R2, and then use Remote Desktop Connection Manager (RD Connection Manager).

QUESTION 62
A company is preparing to deploy Windows Server 2008 R2 Remote Desktop Services (RDS).
You have obtained RDS Client access licenses (CALs).
You need to prepare the environment for the installation of the RDS CALs.
What should you do?

A.    Install the RD licensing role services.
B.    Configure Remote Desktop licensing mode on the RD session Host.
C.    Create an RDS farm and add the Rd session Host to the farm.
D.    Activate the Remote Desktop license server.

Answer: A
Explanation:
“prepare the environment for the installation of the RDS CALs”

QUESTION 63
Your company uses Remote Desktop Services (RDS).
You install and configure the Remote Desktop Gateway (RD Gateway) role service on a server that runs Windows Server 2008 R2.
Employees connect to RDS from unmanaged remote computers
Employees are unable to access the RD Gateway server from the unmanaged remote computers.
You need to ensure that employees can access the RD Gateway server.
What should you do?

A.    On the RD Gateway server, open port 3389 on the Windows Firewall.
B.    Create a Remote Desktop connection authorization policy (RD CAP).
C.    Create a Remote Desktop resource authorization policy (RD RAP).
D.    On the RD Gateway server, configure Network Access Protection (NAP) health policy
checking.

Answer: B
Explanation:
Remote Desktop Gateway (RD Gateway) is a role service that enables authorized remote users to connect to resources on an internal corporate or private network, from any Internet-connected device that can run the Remote Desktop Connection (RDC) client. The network resources can be Remote Desktop Session Host (RD Session Host) servers, RD Session Host servers running RemoteApp programs, or computers with Remote Desktop enabled.
RD Gateway uses the Remote Desktop Protocol (RDP) over HTTPS to establish a secure, encrypted connection between remote users on the Internet and the internal network resources on which their productivity applications run.
Users on Remote Desktop Services clients must meet specific requirements before they can connect to RDGateway. These requirements include the following:
Supported Windows authentication method (required).You can configure the authentication methods that the RDGateway server will allow by using Remote Desktop Gateway Manager.
On clients, you can configure the authentication method to be used to connect to the RDGateway server by using Group Policy.
User group membership (required).You configure the user group membership requirement by using Remote Desktop Gateway Manager.
Client computer group membership (optional).You configure the client computer group membership requirement by using Remote Desktop Gateway Manager.
For remote clients to successfully connect to internal network resources (computers) through a Remote Desktop Gateway (RD Gateway) server, clients must meet the conditions specified in at least one Remote Desktop connection authorization policy (RD CAP) and Remote Desktop resource authorization policy (RD RAP). RD CAPs specify who can connect to an RD Gateway server and the authentication method that must be used. RD RAPs specify the computers that clients can connect to through an RD Gateway server.
Note: A limit can be set on the RD Gateway server to restrict the maximum number of simultaneous client connections.

QUESTION 64
All servers on your network run Windows Server 2008 R2.
You deploy Remote Desktop Services (RDS).
You are configuring the Remote Desktop Session Host (RD Session Host) role service.
You need to ensure that authentication occurs before the Remote Desktop Connection logon screen appears.
What should you do?

A.    In the Group Policy Object Editor, configure the Set TS Gateway authentication method
setting to Use smart card.
B.    In the Group Policy Object Editor, configure the Set TS Gateway authentication method
setting to Use locally logged-on credentials.
C.    In the RD Session Host Configuration tool, select the Allow connections from computers
running any version of Remote Desktop option.
D.    In the RD Session Host Configuration tool, select the Allow connections only from computers running Remote Desktop with Network Level Authentication option.

Answer: D
Explanation:
Network Level Authentication is an authentication method that can be used to enhance RD Session Host server security by requiring that the user be authenticated to the RD Session Host server before a session is created.
Network Level Authentication completes user authentication before you establish a remote desktop connection and the logon screen appears. This is a more secure authentication method that can help protect the remote computer from malicious users and malicious software. The advantages of Network Level Authentication are:
It requires fewer remote computer resources initially. The remote computer uses a limited number of resources before authenticating the user, rather than starting a full remote desktop connection as in previous versions.
It can help provide better security by reducing the risk of denial-of-service attacks.
To use Network Level Authentication, you must meet the following requirements:
The client computer must be using at least Remote Desktop Connection 6.0.
The client computer must be using an operating system, such as Windows 7, Windows Vista, or Windows XP with Service Pack 3, that supports the Credential Security Support Provider (CredSSP) protocol.
The RD Session Host server must be running Windows Server 2008 R2 or Windows Server 2008.

QUESTION 65
Drag and Drop Question
A company has a two-node Microsoft Hyper-v failover cluster that hosts virtual machines (VMs).
The company has the following VM administrative requirements:
You need to deploy a solution to meet the administrative requirements.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of answers choices to the answer and arrange them in the correct order)

Answer:


QUESTION 66
All serves on your network run Windows Server 2008 R2.
All client computers run Windows 7.
You deploy remote desktop Services (RDS).
You are configuring the Remote Desktop Session Host (RD Session Host) role services.
You need to configure the RD Session Host Servers to ensure that all communication between client computers and servers users 128-bit encryption.
What should you do?

A.    In the Group Policy Object Editor, configure the Set client encryption level setting to the FIPS Compliant.
B.    In the RD Session Host Configuration tool, require the SSL (TLS 1.0) security layer.
C.    In the RD Session Host Configuration tool, require the RDP security layer.
D.    In the Group Policy Object Editor, configure the set client encryption level setting to high.

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/cc770833
As clients are all Windows 7, Defaults to Highest supported encryption, however you must force 128-bit which is equivalent to Group Policy setting High.
SSL 1.0 is greater than 128-bit encryption and requires a certificate.

QUESTION 67
Your company has an Active Directory Domain Services (AD DS) domain that includes an AD security group named Monitoring.
You are configuring a Windows Server 2008 R2 Hyper-V server.
You need to ensure that members of the Monitoring group can view virtual machines (VMs) but cannot make changes to them.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A.    In Active Directory, create a group named HVMonitor.
Grant the Read permission to the HVMonitor group for the VM configuration files and the
VHD files.
Add the Monitoring group to the HVMonitor group.
B.    In Local Users and Computers, create a group named HVMonitor.
Grant the Read permission to the HVMonitor group for the VM configuration files and the
VHD files.
Add the Monitoring group to the HVMonitor group.
C.    In Authorization Manager, create a role named HVMonitor.
Add all the View operations and the Read Service Configuration operation to the role.
Assign the role to the Monitoring group.
D.    In Authorization Manager, create a role named HVMonitor.
Create a task that includes all the View operations and the Read Service Configuration
operation.
Add this task to the HVMonitor role.
Assign the role to the Monitoring group.

Answer: CD
Explanation:
AD security group named Monitoring has already been created, A and B are invalid.

QUESTION 68
A company has a Hyper-V server named SERVER01 that Runs Windows Server 2008 R2 Enterprise with Service pack (SP) 1.
All virtual machines (VMs) runs Windows Server 2008 R2 Enterprise with SP1.
All VMs are configured to use Dynamic Memory.
A VM named VM01 is exhibiting performance problems.
You need to assertions how much memory VM01 is consuming.
What should you do?

A.    In Hyper-V manager, view the Memory Demand value.
B.    User performance Monitor to view the \Hyper-V Dynamic VM\Guest visible Dynamic memory performance counter for Vm01.
C.    Use Performance Monitor to view the \Hyper-V Dynamic memory balancer \ Availability
Memory performance counter for SERVER01.
D.    In Hyper-V manager, view the assigned memory value.

Answer: A

QUESTION 69
Drag and Drop Question
A company has an environment that includes Microsoft Hyper-V Servers 2008 R2, Microsoft System Center Virtual manager (VM) and the VMM self service portal (SSP).
That company’s network consists of one Active Directory Domains Services (AD DS) forest domain.
All virtual machines (VMs) are currently owned by individual database team members.
The company wants to delegate rights for virtual machines (VMs) and has the following requirements:
You need to provide a solution to meet the requirements.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer, arrange them in the correct order)

Answer:


QUESTION 70
Your company has a single active Directory Domain Services (AD DS) domain that includes AD Security group named test and development.
You are configuring a Windows server 2008 R2 Hyper-V server.
The server hosts five virtual machines (VMs) that are used by test group members can manage only the Development VMs.
You need to ensure that Test group members can manage only the Test VMs and that development group members can manage only the Development VMs.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two)

A.    In the authorization manager, create a group named AzManTest and group named
AzmanDev.
Add the test group members to the AzManTest group, and add the development group
members to the AzmanDev group.
Assign the AzManTest and AzManDev group to the administrator role in the default scope.
B.    Add the Test VM computer accounts to the Test group, and add the Development VM
computer accounts to the development group.
C.    Create and run a script that uses windows management instrument (VMI) to assign each VM
to the appropriate scope.
D.    In Authorization Manager, create a scope named Test and a scope named Development.
In each scope, create an Administrator role, and add all the Hyper-V operations to the role.
Assign the Test group to the Test scope Administrator role, and assign the Development
group to the Development scope Administrator role.

Answer: BD


Braindump2go Promise All 70-659 Questions and Answers are the Latest Updated,we aim to provide latest and guaranteed questions for all certifications.You just need to be braved in trying then we will help you arrange all left things! 100% Pass All Exams you want Or Full Money Back! Do yo want to have a try on passing 70-659?

FREE DOWNLOAD: NEW UPDATED 70-659 PDF Dumps & 70-659 VCE Dumps from Braindump2go: http://www.braindump2go.com/70-659.html (161 Q&As)