You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. The company has many remote users One of the servers on the network calledServer01 has the Terminal Services Gateway (TS Gateway) role installed on it. The remote users of thecompany need to connect remotely to desktop computers located in their offices through the gateway. Toensure secure connection to the gateway, you created a security group named RemoteUsersGrp1 for theremote users who need to connect to computers in their offices. Which of the following options would youchoose to enable the remote users to connect to the TS Gateway? ()
You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runsTerminal services to enable remote users to run commonly required applications from their terminal. A remote user logged on to the Terminal Server, required some help on the application he wanted to run.However,when you connect to the Terminal Server session,you cannot operate any applications. Which of the following options would you choose to ensure that you can assist any user on the Terminal Server?()
You are an Administrator at Cer-tech .com. you manage a member server that runs Windows Server 2008.The Terminal Server Gateway (TS Gateway) is also installed on the member server. You want to find outwhether a group of users have ever connected to their workstations remotely through TS Gateway server. What should you do to achieve this task?()
You work as aplication developer at Cer-Tech.com. You have recently created an aplication that includes the code shown below.You now need to invoke the GetFileContents method asynchronously.You have to ensure that the code you use to invoke the GetFileContents method will continue to process other user instructions, and displays the results as soon as the GetFileContents method finishes processing. What should you do?()
You are an enterprise administrator for Cer-tech .com. All the servers on the network run Windows Server2008. The network consists of a server called Server01 that runs Microsoft Hyper-V and hosts three virtualmachines. To fulfill a network requirement, you need to configure all of the virtual machines to connect toeach other. However, the company policy states that the virtual machines must not connect to the companynetwork. Which of the following options would you choose to ensure that all the virtual machines connect to eachother and you meet the company policy also?()
Cer-tech .com has a server that runs Windows Server 2008. You installed Windows Deployment Services(WDS) role on the server. You decide to install Windows Vista on a computer that does not support Preboot Execution Environment (PXE). The Windows Vista image is stored on the WDS server. You haveto start the computer and install the Windows Vista image stored on the WDS server. What should you create to achieve this task?()
You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. The Windows Server virtualization role service installed on two servers calledServer01 and Server02. Which of the following options would you choose to remotely manage thevirtualization settings of Server02 from Server01?()
You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runsTerminal services to enable remote users to run commonly required applications from their terminal. Aremote user logged on to the Terminal Server, required some help on the application he wanted to run.However, when you connect to the Terminal Server session, you cannot operate any applications. Which ofthe following options would you choose to ensure that you can assist any user on the Terminal Server?()
Cer-tech .com has a single Active Directory domain called cer-tech.com. All servers in the domain runWindows Server 2008. There are two domain controllers in the network: ED1 and ED2 and the DNS service is installed on the domain controllers. Both DNS servers host Active Directory integrated zones thatare configured to allow the most secured updates. ED1 has a Key Management Services (KMS) installedand activated. During maintenance, you find that the service locater records from the cer-tech.com zonehosted on Server02 and Server02 are missing. You have to force registration of the KMS service locatorrecords in the Cer-tech .com zone. What should you do to correct this problem?()
You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runsTerminal services to enable remote users to run commonly required applications from their terminal. Anorganizational unit (OU) called TermSerUsers have been configured for the standard users who connect tothe Terminal Server and an OU called TermSerAdmin is configured for the administrative users. Besidesthese two types of users, no other user can connect to the Terminal Server. Which of the following optionswould you choose to ensure that only members of the TermSerAdmin OU can run the Remote DesktopProtocol files?()