Top 17 bundle 70-294 for IT learners (171 to 187)

Exact of 70-294 exams materials and resource for Microsoft certification for candidates, Real Success Guaranteed with Updated 70-294 pdf dumps vce Materials. 100% PASS Today!

2016 Mar 70-294 Study Guide Questions:

Q171. Your company has a hub-and-spoke network topology. The network spans several physical locations. Each location is configured as an Active Directory directory service site. There are two domain controllers in each site. 

You need to prevent the spoke sites from creating replication connections to other spoke sites in the event that all domain controllers in the hub site are unavailable. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Clear the Bridge all site links option. 

B. Ensure that the Bridge all site links option is selected. 

C. Designate a preferred bridgehead server in each site. 

D. Create site links between each spoke site and the hub site. 

Answer: AD 


Q172. HOTSPOT  

You are a network administrator for a company that operates a call center. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers are members of the domain. Computers in the call center are configured by a Group Policy object (GPO) to have a common, restricted desktop. All computers in the call center have accounts in an organizational unit (OU) named Call Center Computers. Nonmanagement users have user accounts in an OU named CallCenterStaff. 

Managers have user accounts in an OU named ManagementUsers. You link a GPO to the Call Center Computers OU. The current settings of the GPO are shown in the work area. Any user logging on to these computers receives the restricted desktop. Currently, a manager who logs on to a computer in the call center is presented with the restricted desktop. The restricted desktops prevent managers from performing management tasks. 

You need to ensure that any manager logging on to a computer in the call center receives a normal, unrestricted desktop. Which GPO setting should you change? To answer, select the appropriate setting in the work area. 


Answer: 


Q173. You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 print servers and printer objects. A group named Printer Support needs to be able to manage the printers and print queues in the domain. The Printer Support group also needs to manage the printer objects in Active Directory. The Printer Support group does not need to perform any other tasks. You need to grant the Printer Support group only the permissions that it needs. Which action or actions should you take? (Choose all that apply.) 

A. Make the Printer Support group a member of the Print Operators group in the Built-in container. 

B. Make the Printer Support group a member of the Power Users group on each print server. 

C. Make the Printer Support group a member of the HelpServicesGroup group on each print server. 

D. Make the Printer Support group a member of the Print Operators group on each print server. 

E. Make the Printer Support group a member of the Server Operators group in the Built-in container. 

Answer: A 


Q174. You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. 

All servers that are not domain controllers have computer accounts in an organizational unit (OU) named Application Servers. Client computers have computer accounts in 15 OUs organized by department. All users have user accounts in an OU named Company Users. 

Your company wants all users to have Microsoft Word available on their client computers. Your company does not want to install Word on domain controllers or other servers. You need to configure the network to install the application as required, without affecting any existing policies or settings. What should you do? 

A. Create a Group Policy object (GPO) configured with Microsoft Word listed in the software installation section of the computer settings. Link this GPO to the domain. Configure permissions on the GPO so that all server and domain controller accounts are denied the permissions to read and apply the GPO. 

B. Create a Group Policy object (GPO) configured with Microsoft Word listed in the software installation section of the computer settings. Link this GPO to the domain. Configure the Domain Controllers OU and the Application Servers OU to block policy inheritance. 

C. Create a Group Policy object (GPO) configured with Microsoft Word listed in the software installation section of the user settings. Link this GPO to the domain. Configure the Domain Controllers OU and the Application Servers OU to block policy inheritance. 

D. Create a Group Policy object (GPO) configured with Microsoft Word listed in the software installation section of the user settings. Link this GPO to the domain. Configure permissions on the GPO so that all server and domain controller accounts are denied the permissions to read and apply the GPO. 

Answer: A 


Q175. CORRECT TEXT 

Activate Universal Group Membership caching on the Site Cairo and ensure that they replicated only with the GC in London. What should you do? 

Answer: 


70-294 free exam questions

Refresh 70-294 torrent:

Q176. You have a Windows Server 2003 Active Directory directory service environment. Group Policy objects (GPOs) are linked to parent organizational units (OUs), and user and computer objects are located in child OUs. When users log on to their client computers, Folder Redirection policies are applied as expected. However, when users log on to a kiosk computer, a different Folder Redirection setting is applied. You need to ensure that users receive the same Folder Redirection policy regardless of which computer they log on to. What should you do? 

A. Disable loopback processing in the GPOs. 

B. Enable loopback processing by selecting the Merge Mode option in the GPOs. 

C. Enable loopback processing by selecting the Replace Mode option in the GPOs. 

D. Select the Block Inheritance option on the OU where the kiosk computer is located. 

Answer: A 


Q177. DRAG DROP 

You are the network administrator for Contoso, Ltd. The network consists of a single Active Directory domain named contoso.com. All servers run windows Server 2003. YOU are planning the implementation of new Group Policy objects (GPOs). 

The accounting department and the research department each has its own organizational unit (OU). The accounting department includes the accounts payable (AP) department and the accounts receivable (AR) department. The Accounting OU contains an AP OU and an AR OU. User accounts are in the Accounting, AP, AR, and Research OUs. 

The accounting department has an accounting application that must be installed on the computers that are used by users in the accounting department. You want to avoid installing the accounting application on the computers of any other users. You plan to create a GPO named Software to install the accounting application. 

The research department's user accounts must have passwords that are at least eight characters in length and must be changed every 30 days. There are no specific password requirements for any other users in the contoso.com domain. You plan to create a GPO named Password to configure the minimum password length and password age. 

You need to decide the correct locations for placing the Password GPO and the Software GPO, while minimizing the time it takes for any user to log on to the domain. 

Where should you link the Password GPO and the Software GPO? 

To answer, drag the appropriate GPO or GPOs to the correct location or locations in the work area. If both policies need to be linked to the same location, use the source labeled Both GPOs. 


Answer: 


Q178. You have a single Active Directory service domain. You use Group Policy for software installation. You need to find out why a Group Policy object (GPO) is not being applied to a specific user account. What should you do? 

A. View the Userenv log file on the users computer. 

B. View the Security event log on the users computer. 

C. View the Userenv log file on the domain controller against which the user is authenticating. 

D. View the Security event log on the domain controller against which the user is authenticating. 

Answer: A 


Q179. You have a single Active Directory service domain. Your company has a main office and multiple branch offices. Each office has an Active Directory site. The companys network is not fully routed. You need to ensure complete replication between the Active Directory sites. What should you do? 

A. Configure site links, and disable site link bridging. 

B. Configure site links to use the SMTP transport, and enable site link bridging. 

C. Configure a preferred bridgehead server for each branch office site. 

D. Configure a preferred bridgehead server for the main office site. 

Answer: A 


Q180. Your company has a single Active Directory service domain with three domain controllers. You need to move domain-wide FSMO roles to a different domain controller. Which tool should you use? 

A. Active Directory Domains and Trusts snap-in 

B. Active Directory Sites and Services snap-in 

C. Active Directory Users and Computers snap-in 

D. Active Directory Schema snap-in 

Answer: C 


70-294 practice

100% Guarantee 70-294 real exam:

Q181. Your network consists of Windows XP computers. All computers are joined to a single Active Directory service domain and located in a single Active Directory site. You create a new Group Policy object (GPO) and link it to the site. The policy configures default screensaver settings. User accounts of users in the research department are located in an organizational unit (OU) named Research. 

You need to allow users in the research department to configure a different screensaver setting on their computers. What should you do? 

A. Move the user accounts of users in the research department to the Users container. 

B. Configure a local security policy on all computers in the research department to allow users to modify their screensaver settings. 

C. Add users in the research department to a domain group. Allow the group the Apply Group Policy permission for the GPO. 

D. Add users in the research department to a domain group. Deny the group the Apply Group Policy permission to the GPO. 

Answer: D 


Q182. You are the network administrator for your company. Your company consists of two subsidiaries named Contoso, Ltd., and Fabrikam, Inc. The network consists of two Active Directory domains in a single forest with four sites. The network configuration is shown in the exhibit. (Click the Exhibit button.) All client computers run Windows XP Professional. Users who have accounts in the fabrikam.com domain frequently travel to Site3. When these users log on to the network in Site3, the logon process can take up to 10 minutes. You discover that when these users log on to the network in Site3, they are authenticated by DC5.Fabrikam.com in Site1. You need to ensure that the Fabrikam, Inc., users can log on more quickly from Site3. What should you do? 


A. Modify the subnet object linked to Site3 so that it is linked to Site1. 

B. Configure a site link bridge that will bridge SiteLink-3-4 and SiteLink-2-4. 

C. Increase the site link cost for SiteLink-1-3 to 500. 

D. Move the DC5.Fabrikam.com domain controller object from Site1 to Site3. 

Answer: B 


Q183. DRAG DROP 

You are the network administrator for your company. The network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003.Your Company has a main office and four branch offices. Each branch office is connected to the main office by a WAN connection. You configure an Active Directory site for each office. The sites and WAN connections are shown in the exhibit. (Click the Exhibit button.)You need to create site links to minimize replication traffic over WAN connections. Which site link or site links should you create? To answer, drag the appropriate site link or site links to the correct location or locations in the work area. 


Answer: 


Q184. You are the network administrator for your company. The company consists of two subsidiaries named Contoso, Ltd., and Fabrikam, Inc. The network consists of two Active Directory forests. The WAN connections that connect some domain controllers are unreliable. The domain and trust configuration is shown in the Network Diagram exhibit. (Click the Exhibit button.) 

You create shared folders on Windows Server 2003 member servers in both forests. Some of the shared folders are accessible to users from both forests. For each of the shared folders, you create a domain local group. 

You add global groups from domains in either forest to the domain local group. The Fabrikam, Inc., division is sold to a different company. 

You delete the trust relationship between the two forests. You notice that after the trust relationship is deleted, the membership lists for some of the domain local groups are no longer accurate. When you view a membership list, it contains entries without user-friendly names. A sample is shown in the Membership List exhibit. (Click the Exhibit button.) 

You need to delete all the unknown groups from the membership list for the domain local groups. You want to achieve this goal by using the minimum amount of administrative effort, and without modifying the access to resources for users in the contoso.com forest. 

What should you do? 


A. Verify all remaining trust relationships. Then delete the unknown accounts from the domain local groups. 

B. Re-create the trust relationship between contoso.com forest and the fabrikam.com forest. Delete all the fabrikam.com global group accounts from the domain local group membership lists. Delete the trust relationship between the two forests. 

C. Delete all the affected domain local groups. Re-create the groups. Add the appropriate global groups from the contoso.com forest to the groups. Grant appropriate permissions to the domain local groups. 

D. Create new domain local groups. Add the required global groups from the contoso.com forest to the domain local groups. Grant appropriate permissions to the domain local groups. Delete the original domain local groups. 

Answer: A 


Q185. You are the network administrator for Blue Yonder Airlines. The company has offices in Toronto, New York, and Chicago. The network connections are shown in the exhibit. (Click the Exhibit button.) 

The network consists of two Active Directory domains. User objects for users in the Toronto office and the New York office are stored in the blueyonderairlines.com domain. User objects for users in the Chicago office are stored in the production.blueyonderairlines.com domain. Active Directory is configured as shown in the following table. 

Users in the New York office frequently report that they cannot log on to the network, or that logging on takes a very long time. You notice increased global catalog queries to servers in the Toronto office during peak logon times. 

You need to improve logon performance for users in the New York office without increasing WAN traffic that is due to replication. 

What should you do? 


A. Install an additional domain controller in the New York office. 

B. Configure Active Directory to cache universal group memberships for the New York office. 

C. Configure Active Directory to cache universal group memberships for the Toronto office. 

D. Configure the domain controller in the New York office as a global catalog server. 

Answer: B 


Q186. Your company has a Windows Server 2003 environment with a single Active Directory directory service forest. The forest has multiple domains and two sites named Site1 and Site2. Site1 has six domain controllers. Two of the domain controllers are global catalog servers. Site2 has three domain controllers. 

The WAN link between Site1 and Site2 is slow. 

You are preparing the environment for an Active Directory application that requires universal group membership to make authorization decisions. Application servers will be located in Site1 and Site2. 

You need to prepare the Active Directory environment for the introduction of the Active Directory application. 

What should you do? 

A. Increase the number of domain controllers in Site2 to four. 

B. Enable universal group membership caching in Site1. 

C. Add additional global catalog servers to Site1. 

D. Configure at least one of the domain controllers in Site2 to be a global catalog server. 

Answer: D 


Q187. You are the network administrator for Contoso Pharmaceuticals. Your network consists of a single Active Directory forest that contains three domains. The forest root domain is named contoso.com. The domain contains two child domains named usa.contoso.com and europe.contoso.com. The functional level of the forest is Windows Server 2003. 

Each domain contains two Windows Server 2003 domain controllers named DC1 and DC2. DC1 in the contoso.com domain performs the following two operations master roles: schema master and domain naming master. DC1 in each child domain performs the following three operations master roles: PDC emulator master, relative ID (RID) master, and infrastructure master. DC1 in each domain is also a global catalog server. 

The user account for Nancy Buchanan in the europe.contoso.com domain is a member of the Medicine Students security group. Because of a name change, the domain administrator of europe.contoso.com changes the Last name field of Nancy's user account from Buchanan to Anderson. 

The domain administrator of usa.contoso.com discovers that the user account for Nancy is still listed as Nancy Buchanan. 

You need to ensure that the user account for Nancy Anderson is correctly listed in the Medicine Students group. 

What should you do? 

A. Transfer the infrastructure master role from DC1 to DC2 in each domain. 

B. Transfer the RID master role from DC1 to DC2 in each domain. 

C. Transfer the schema master role from DC1 to DC2 in the contoso.com domain. 

D. Transfer the PDC emulator master role from DC1 to DC2 in each domain. 

Answer: A