-
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
A . Layer 2 Edge mode
B . Layer 2 Central mode
C . Layer 2 In-Band mode
D . Layer 3 mode
-
You have a server named Server1 that runs Windows Sever 2003 Service Pack 2 (SP2). You create a FTP site on Server1.You need identify how many users are connected to the FTP site. What should you do?()
A . From Task Manger, view the Networking tab.
B . From the command prompt, run Net view \\server1.
C . From the properties of the FTP site, view Current Sessions.
D . From the properties of the FTP site, enable Open Database Connectivity (ODBC) logging.
-
You are designing a DNS name resolution strategy to allow all users access to internal and external web sites. What should you do?()
A . Allow zone transfers to any DNS server.
B . Create a new stub zone for the DNS zone on the DNS server.
C . Configure the DNS server to forward all unanswered queries to a DNS server located at the ISP.
D . Add the DNS server located at the ISP to the list of name servers for the fourthcoffee.com DNS zone.
-
Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()
A . Easy VPN
B . GRE tunneling
C . Virtual Tunnel Interfaces
D . Dynamic Multipoint VPN
E . Group Encrypted Transport VPN
-
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
A . Layer 2 mode
B . Layer 3 Edge mode
C . Layer 3 Central mode
D . Layer 3 In-Band mode
-
You are designing a site topology to meet the business and technical requirements. What should you do?()
A . Increase the replication interval between sites.
B . Use SMTP as the transport protocol for replication.
C . Create site links to represent the physical topology.
D . Disable the Knowledge Consistency Checker (KCC) and manually configure site replication.
-
Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()
A . Easy VPN
B . GRE tunneling
C . Virtual Tunnel Interfaces
D . DynamicMultipoint VPN
E . Group Encrypted Transport VPN
-
You are designing a site topology for the new Active Directory environment. What should you do? ()
A . Create one site for all offices. Place the subnets for the four branch offices and the Sydney main office in this site.
B . Create two sites: one site for the four branch offices and one site for the Sydney main office. Place the subnets for the branch offices in one site. Place the subnet for the Sydney main office in the other site.
C . Create three sites: one site for the four branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
D . Create four sites: one for the Melbourne and Perth branch offices, one site for the Berlin and Paris branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
E . Create five sites; one site for the Melbourne branch office, one site for the Perth branch office, one site for the Berlin branch office, one site for the Paris branch office, and one site for the Sydney main office. Place the subnets for each branch office and the Sydney main office in their respective sites.
-
You are designing a client computer upgrade strategy for Contoso.Ltd. What should you do?()
A . Use the ldifde command to migrate user settings.
B . Use the User State Migration Tool (USMT) to Migrate user settings.
C . Create trust relationships between the Chicago domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
D . Create trust relationships between the forest root domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
-
Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients toact as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()
A . Easy VPN
B . GRE tunneling
C . Virtual Tunnel Interfaces
D . Dynamic Multipoint VPN
E . Group Encrypted Transport VPN
-
You are an administrator for a corporate network. At a branch office,you want to deploy Windows Vista to21 client computers and Windows Server 2008 to four servers. For which operating systems is the branchoffice eligible for KMS licensing?()
A . Windows Vista
B . Windows Server 2008
C . Both Windows Vista and Windows Server 2008
D . Neither Windows Vista nor Windows Server 2008
-
A consulting firm is locating 30 consultants at a client site for a nine-month project. What need does the firm have that can be met by a wireless solution?()
A . Providing a temporary network need
B . Ensuring secure presentations
C . Having freedom of movement within a network range
D . Augmenting an existing network
-
You are building a client for a Windows Communication Foundation (WCF) service. You need to create a proxy to consume this service. Which class should you use?()
A . ChannelFactory
B .
-
You are deploying a Web site to a server managed by a hosting company. The only access you have to the server is through FTP. You need to precompile and deploy the Web site without its source files. What should you do? ()
A . Use the Copy Web tool.
B . Use the Publish Web tool.
C . Use XCOPY.
D . Use the Web Setup project Installer.
-
You are designing a client computer upgrade strategy for Contoso.Ltd. What should you do?()
A . Use the ldifde command to migrate user settings.
B . Use the User State Migration Tool (USMT) to Migrate user settings.
C . Create trust relationships between the Chicago domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
D . Create trust relationships between the forest root domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
-
You are designing a DNS name resolution strategy to allow all users access to internal and external web sites. What should you do?()
A . Allow zone transfers to any DNS server.
B . Create a new stub zone for the DNS zone on the DNS server.
C . Configure the DNS server to forward all unanswered queries to a DNS server located at the ISP
D . Add the DNS server located at the ISP to the list of name servers for the fourthcoffee.com DNS zone
-
You are designing a site topology for the new Active Directory environment. What should you do?()
A . Create one site for all offices. Place the subnets for the four branch offices and the Sydney main office in this site.
B . Create two sites: one site for the four branch offices and one site for the Sydney main office. Place the subnets for the branch offices in one site. Place the subnet for the Sydney main office in the other site.
C . Create three sites: one site for the four branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
D . Create four sites: one for the Melbourne and Perth branch offices, one site for the Berlin and Paris branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
E . Create five sites; one site for the Melbourne branch office, one site for the Perth branch office, one site for the Berlin branch office, one site for the Paris branch office, and one site for the Sydney main office. Place the subnets for each branch office and the Sydney main office in their respective sites.
-
A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service.You must ensure that the client application can interact with the WCF service. What should you do?()
A . On the OperationContractAttribute, set the AsyncPattern property value to true.
B . On the OperationContractAttribute, set the ReplyAction property value to the endpoint address of the client.
C . On the client, create a proxy derived from DuplexClientBase<TChannel >.
D . On the client, use GetCallbackChannel<T >.
-
A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service. You must ensure that the client application can interact with the WCF service. What should you do? ()
A . On the OperationContractAttribute, set the AsyncPattern property value to True.
B . On the OperationContractAttribute, set the ReplyAction property value to the endpoint address of the client. For interactive and self-paced preparation of exam 70-513, try our practice exams. Practice exams also include self assessment and reporting features!
C . On the client, create a proxy derived from DuplexClientBase(Of TChannel).
D . On the client, use GetCallbackChannel(Of T).
-
You are proceeding to a distress site.The survivors are in liferafts.What will make your ship more visible to the survivors().
A . Steering a sinuous course
B . Steering a zig-zag course
C . Turning on all available deck lights at night
D . Dumping debris over the side to make a trail to your vessel
-
You are developing a client application that consumes a Windows Communication Foundation (
You are developing a client application that consumes a Windows Communication Foundation (WCF) service.The operation contract is as follows.[OperationContract][FaultContract(typeof(SalesFault))]string GetSales(string saleId);()The service configuration file contains the following line in the serviceBehaviors section.A divide-by-zero exception is not being handled by the service.You need to ensure that the exception is caught in the client application.Which type of exception should the client catch?()
A. TimeoutException
B. FaultException
C. DivideByZeroException
D. FaultException<SalesFault>
-
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003.The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.You need to collect information about which users are connecting to the Web site by using HTTPS.What should you do?()
A. Check the application log on the Web server.
B. Use Network Monitor to capture network traffic on the Web server.
C. Review the log files created by IIS on the Web server.
D. Configure a performance log to capture all Web service counters. Review the performance log data.
-
All servers in your environment run Windows Server 2008 R2. All client computers run Windows 7.Each client computer has at least 2 5 GB free disk space.You virtualize applications by using Microsoft Application Virtualization (App-V). The App-V client cache is set to 4096 MB. User profiles are virtualized and stored on a server.You need to increase the size of the file system cache on a client computer to at least 10 GB.What should you do?()
A.Use the AppVCacheSize tool to set the maximum cache size to 10240.
B.Use the AppVCacheSize tool to set the minimum free disk space threshold to 10240.
C.Set the HKLM\SOFTWARE\Microsoft\SoftGrid\4.5\Client\AppFS\State registry key to 10240.
D.Set the HKLM\SOFTWARE\Microsoft\SoftGrid\4.5\Client\AppFS\FileSize registry key to 10240.