ts: windows server 2008 r2, desktop virtualization · 2019-10-25 · all servers on the network run...

154
TS: Windows Server 2008 R2, Desktop Virtualization Number : 070-669 Passing Score : 700 Time Limit : 120 min File Version : 1.2 http://www.gratisexam.com/ Microsoft EXAM 70-669 TS:Windows Server 2008 R2,Desktop Virtualzation Total Questions: 123 -I have added another dump (Microsoft_Prepking_70-669_v2011-11-22_54q_By-Moe) Still need to verify the answers By SharmaAshle (Junjunwala) Updated by JunJunwala (2012-04-02)

Upload: others

Post on 13-May-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

TS: Windows Server 2008 R2, Desktop Virtualization

Number: 070-669Passing Score: 700Time Limit: 120 minFile Version: 1.2

http://www.gratisexam.com/

Microsoft

EXAM 70-669

TS:Windows Server 2008 R2,Desktop Virtualzation

Total Questions: 123 -I have added another dump (Microsoft_Prepking_70-669_v2011-11-22_54q_By-Moe)

Still need to verify the answers

By SharmaAshle (Junjunwala)

Updated by JunJunwala (2012-04-02)

Page 2: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Exam A

QUESTION 1Your company uses Microsoft Application Virtualization (App-V). You maintain the sequencing for applications.You need to add a template to an existing sequenced application. What should you do?

A. Edit the application, add the template, and then save the application with a new name.B. Sequence the template as a new application to the original application installation folder.C. Restore the sequencing computer and add the template to the original application installation folder.D. Upgrade the existing sequencing package, add the template to the package, and then save the application.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 2Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service on a server that runs WindowsServer 2008 R2.All client computers run Windows 7.You need to ensure that the current Libraries from users' computers are available when they log on to the RDSession Host server.What Should you do?

A. Use Group Policy Preferences to copy .library-ms files from the client computers to the RD Session Hostserver.

B. Redirect each user's Documents folder to a network share.C. Redirect each user's Links folder to the RD Session Host server.D. Use a startup script to copy .library-ms files from the client computers to the RD Session Host server.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 3Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. You provide access to some applications through a virtual desktop infrastructure (VDI) environment.All Remote Desktop Session Host (RD Session Host) server objects are located in an organizational unit (OU)named RDServers. All virtual desktop computers are located in an organizational unit (OU) namedVirtualDesktops. All other client computer objects are located in an OU named Desktops. The system drive ineach RD Session Host server is running out of free disk space. You need to restrict the amount of disk spaceused by the roaming user profile cache. What should you do?

A. Create a Group Policy object (GPO) that enables folder redirection for all users. Link the GPO to theRDServers OU.

B. Create a Group Policy object (GPO) that enables folder redirection for all users. Link the GPO to theVirtualDesktops OU.

C. Create a Group Policy object (GPO) that configures the Limit the size of the entire roaming user profilecache setting. Link the GPO to the RDServers OU.

D. Create a Group Policy object (GPO) that configures the Limit the size of the entire roaming user profile

Page 3: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

cache setting. Link the GPO to the VirtualDesktops OU.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 4You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. The clientcomputers run a mix of Windows XP Professional, Windows Vista Business and Windows 7 Enterprise.

The network includes 10 servers that run the Remote Desktop Session Host (RD Session Host) role. Thecomputer accounts for the RD Session Host servers are located in an organizational unit (OU) named ABC-RDSHservers. The computer accounts for the client computers are located in an organizational unit (OU)named ABC-Clients.

The roaming user profile cache is using a large amount of disk space on the system drive of the

RD Session Host servers.

How can you limit the amount of disk space used by the roaming user profile cache?

A. By configuring a Group Policy Object linked to the ABC-RDShservers OU that configures the Limit the sizeof the entire roaming user profile cache setting.

B. By configuring a Group Policy Object linked to the ABC-Clients OU that configures the Limit the size of theentire roaming user profile cache setting.

C. By configuring a Group Policy Object linked to the ABC-RDShservers OU that configures disk quotas for thesystem drive.

D. By configuring a Group Policy Object linked to the ABC-Clients OU that configures disk quotas for thesystem drive.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 5Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008. You install Remote Desktop role services on servers as shown in the following table.

You need to present a RemoteApp program by using Remote Desktop Web Access (RD Web Access).

What should you do?

A. Add Server2 to the TS Web Access security group on Server1.

Page 4: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

B. Add Server2 to the Session Broker security group on Server3.C. Add Server1 to the Session Broker security group on Server3.D. Add Server1 to the TS Web Access Administrators security group on Server2.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 6Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Remote client computers are not members of the domain.Your environment includes a Remote Desktop Gateway (RD Gateway) server.You install an application on a Remote Desktop Session Host (RD Session Host) server.You need to ensure that remote users can run the application.

http://www.gratisexam.com/

What should you do?

A. On each remote client computer, configure the Remote Desktop Connection client to connect to the RDGateway server.

B. On each remote client computer, configure the Remote Desktop Connection client to connect withoutwarning if server authentication fails.

C. On the RD Gateway server, add the Guests local group to the Remote Desktop Users local group.D. On the RD Session Host server, configure the Remote Desktop Connection client to connect to the RD

Gateway server.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 7Your company has an Active Directory Domain Services (AD DS) domain.All servers run Windows Server 2008 R2.All client computers run Windows 7.You run Remote Desktop Services and Microsoft Virtual Desktop Infrastructure (VDI). You have the servers shown in the following table.

Page 5: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

You are configuring Remote Desktop Web Access (RD Web Access) to publish VDI desktops and remoteapplications on the RD Web Access server.

You need to ensure that when remote users log on to the RD Web Access server they are presented with allremote applications and only their assigned VDI desktop.

Which two actions should you perform on Server4? (Each correct answer presents part of the solution. Choosetwo.)

A. Set the source name to Server1;Server2.B. Select the option to use to one or more RemoteApp sources.C. Set the source name to Server3.D. Select the option to use a Remote Desktop Connection Broker server as the source.

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 8You use Microsoft Application Virtualization for Desktops to virtualize applications for client computers.

A virtual application that was installed by using a Windows Installer Package (.msi) file has become corrupted.

You need to restore access to the virtual application.

Which two actions should you perform? (Each correct answer presents a complete solution. Choose two.)

A. Reload the virtual application package.B. Use the Microsoft Application Virtualization (App-V) Sequencer to edit the virtual application package.C. Use the Repair function in the Windows Installer Package. D. Use the Microsoft Application Virtualization (App-V) to re-sequence the application.E. Reinstall the virtual application package.

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 9Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. You use a virtual desktop infrastructure (VDI) environment to provide access to applications. Allvirtual desktop computer objects are located in an organizational unit (OU) named VirtualDesktops. All clientcomputer objects are located in an OU named Desktops. You need to ensure that all users receive the samedesktop shortcuts, and that they are not able to modify the shortcuts from virtual desktops. Which two actions

Page 6: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Create a mandatory user profile.B. Create a new default user profile.C. Create a Group Policy object (GPO) that configures the user profile. Link the GPO to the Desktops OU.D. Create a Group Policy object (GPO) that configures the user profile. Link the GPO to the VirtualDesktops

OU.

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:

QUESTION 10You work as a desktop technician at ABC.com. The ABC.com network consists of an Active Directory DomainServices domain named ABC.com. All servers on the network run Windows Server 2008. The client computersrun a mix of Windows XP Professional and Windows 7 Enterprise.

The company is planning to roll out Windows 7 Enterprise throughout the network. Users that require legacyapplications will be able to run them in Windows XP Mode virtual machines on their computers.

You are conducting some testing with Windows XP Mode virtual machines (VMs). You have two Windows XPMode VMs on your Windows 7 client computer.

You want to configure the networking options for the two VMs so that they have network connectivity to eachother but not to your host computer or the rest of the ABC.com network.

How should you configure the VMs?

A. You should navigate to the Networking node in the VM Settings and configure the network adapter to usethe Internal Network option.

B. You should navigate to the Networking node in the VM Settings and configure the network adapter to usethe Shared Networking (NAT) option.

C. You should navigate to the Networking node in the VM Settings and configure the network adapter to usethe Bridge Mode option.

D. You should configure the Bridge Connections option in the Network Adapter properties in Windows XP oneach VM.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 11You work as a desktop technician at ABC.com. The ABC.com network consists of an Active Directory DomainServices domain named ABC.com. All servers on the network run Windows Server 2008 R2 and all clientcomputers run Windows 7 Enterprise.

The network includes a Windows Server 2008 R2 server named ABC-Deploy1. ABC-Deploy1 runs the IISServer role and is part of the company's Microsoft Enterprise Desktop Virtualization (MED- V) environment.

Your Windows 7 client computer is named ABC-Tech1. The MED-V Management console is

installed on ABC-Tech1.

Page 7: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

You are configuring the Microsoft Enterprise Desktop Virtualization (MED-V) environment to deploy MED-Vvirtual machines to several client computers.

You have configured a MED-V image with the required applications. You run Sysprep on the image and uploadit to ABC-Deploy1.

Which two of the following steps will ensure that computer names following a specified naming convention aregenerated when the VMs are first run after the deployment? Choose two.

A. In the Workspace settings, navigate to the VM Setup tab and configure the computer name pattern.B. In the Workspace settings, navigate to the Deployment tab and configure the computer name pattern.C. Add a Script Action to rename the computer.D. Run the Setup Manager Wizard and configure the computer name pattern.E. Add the computer names to Sysprep.inf.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 12You work as a desktop technician at ABC.com. The ABC.com network consists of an Active Directory DomainServices domain named ABC.com. All servers on the network run Windows Server 2008 R2 and all clientcomputers run Windows 7 Enterprise.

You are in the process of configuring a Microsoft Enterprise Desktop Virtualization (MED-V) environment. Youneed to configure a central image repository for client computers to download images from.

You install a Windows Server 2008 R2 member server named ABC-Deploy1. You create a folder namedMEDVImages on ABC-Deploy1.

What should you do next on ABC-Deploy1?

A. You should share the MEDVImages folder.B. You should install the IIS Server role and configure a virtual directory to point to the MEDVImages folder.C. You should install the FTP Server component of IIS and configure an FTP site to point to the MEDVImages

folder.D. You should install an SSL Certificate.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 13You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and allclient computers run Windows 7 Enterprise.

ABC.com runs a Microsoft Enterprise Desktop Virtualization (MED-V) environment. A Windows Server 2008 R2member server named ABC-Deploy1 is configured to run Microsoft Enterprise Desktop Virtualization (MED-V)Server and hosts the central MED-V image repository.

Page 8: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

You notice that the disk space on ABC-Deploy1 is running low due to the MEDVImages folder taking up a largeamount of disk space.

You open the MED-V Management Console and note that there are several versions of the MED- V Workspacevirtual machines (VMs).

How can you minimize the disk space used by the MEDVImages folder?

A. By deselecting the "Workspace is persistent" option.B. By configuring the image update settings to keep a limited number of images.C. By configuring the image update settings to select the "Clients should use the Download manager when

downloading the images" option.D. By manually deleting old image files.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 14You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008. The clientcomputers run a mix of Windows XP Professional and Windows 7 Enterprise.

You are in the process of migrating the Windows XP Professional client computers to Windows 7 Enterprise.

You need to design a solution to resolve application compatibility issues. You are planning a desktopvirtualization solution that will run legacy applications on virtual machines (VMs) running Windows XPProfessional.

You want to deploy Windows Virtual PC 2007 and a virtual machine image to the client computers when theyare migrated to Windows 7 Enterprise.

How can you create a single installation package that includes both Windows Virtual PC 2007 and a virtualmachine image?

A. By using the Packaging Wizard from Microsoft Enterprise Desktop Virtualization (MED-V).B. By using Package Manager (pkrmgr.exe) from the Windows Automated Installation Kit (WAIK) tools.C. By using a template created using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2.D. By using Windows System Image Manager from the Windows Automated Installation Kit (WAIK) tools.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 15You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2.

You have recently migrated 2000 client computers from Windows XP Professional to Windows 7 Enterpriseand deployed Microsoft Enterprise Desktop Virtualization (MED-V) to resolve application compatibility issues.

Page 9: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

All client computers use a single MED-V Workspace. For performance reasons, company policy states that thehard drives of the client computers should not be indexed.

You are planning to update the Workspace image.

How can you minimize the network impact of the client computers downloading the updated image?

A. By configuring the image update settings to select the "Clients should use the Trim Transfer whendownloading the images" option.

B. By compressing the folder on the deployment server that contains the images.C. By using the Pack option in MED-V to compress the images.D. By compressing the folder on the client computers that contains the virtual machine.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 16You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and allclient computers run Windows 7 Enterprise.

You have been asked to deploy a custom sales application named SalesApp to the client computers in theSales department. However the custom application will only run on Windows XP Professional.

You install Windows XP Mode on your Windows 7 computer. You plan to test the application in Windows XPMode and deploy Windows XP Mode to the Sales department computers if your tests are successful.

You install the application in the Windows XP Mode virtual machine. You click the start menu in the VM andsuccessfully launch SalesApp. You attempt to start the application from your Windows 7 start menu but there isno shortcut to SalesApp.

How can you ensure that Sales users will be able to start SalesApp from their Window 7 start menus?

A. By copying the SalesApp application shortcut to the All Users profile in Windows 7.B. By copying the SalesApp application shortcut to the All Users profile in the Windows XP Mode virtual

machine.C. By installing the Virtual PC Integration Components in the Windows XP Mode virtual machine.D. By installing the Virtual PC Integration Components in Windows 7.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 17You work as a network administrator at ABC.com. The ABC.com network consists of an Active

Directory Domain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2and all client computers run Windows 7 Enterprise.

You are in the process of configuring a Microsoft Enterprise Desktop Virtualization (MED-V) environment.

Page 10: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

All client computers will use a single MED-V Workspace. The virtual machine (VM) image will be downloadedfrom a central image repository on a Windows Server 2008 R2 computer.

How can you ensure that any changes made by users to the VM are maintained between sessions?

A. By configuring the Allow Write permission on the server folder containing the VM image.B. By configuring the Allow Write permission on the VM image files on the client computers.C. By selecting the Workspace is revertible option in the MED-V Management Console.D. By selecting the Workspace is persistent option in the MED-V Management Console.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 18You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and allclient computers run Windows 7 Enterprise.

You are in the process of configuring a Microsoft Enterprise Desktop Virtualization (MED-V) environment.

You want to install MED-V in a server cluster. You install MED-V on one server in the cluster.

What should you do next?

A. You should install Network Load Balancing (NLB) on all servers in the cluster.B. You should install the MED-V client on all servers in the cluster.C. You should install Cluster Administrator on all servers in the cluster.D. You copy the <InstallDir>/Servers/ConfigurationServer folder from the installed node to a shared network

folder.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 19You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and allclient computers run Windows 7 Enterprise.

ABC.com includes a Development department. Users in the Development department develop softwareapplications for use by ABC.com customers.

You have configured a Microsoft Enterprise Desktop Virtualization (MED-V) environment to provide theDevelopers with temporary test environments.

The temporary MED-V Workspaces have expiry dates configured on them.

How can you minimize the disk space used by obsolete MED-V Workspaces?

A. By configuring the option to keep a limited number of old image versions on the Virtual Machine tab in the

Page 11: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

MED-V Management console.B. By configuring the Workspace Deletion options on the Deployment tab in the MED-V Management console.C. By selecting the Workspace is revertible option on the Virtual Machine tab in the MED-V Management

console.D. By clearing the Enable Workspace option on the Deployment tab in the MED-V Management console.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 20You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and allclient computers run Windows 7 Enterprise.

A server named ABC-Deploy1 runs Microsoft System Center Configuration Manager 2007 R2 and is used tomanage client computers. ABC-Deploy1 also runs Microsoft Enterprise Desktop Virtualization (MED-V) Server.

A server named ABC-Deploy2 runs IIS and is configured as a central repository to store MED-V Workspaceimages.

A server named ABC-SQL1 runs Microsoft SQL server 2008.

You want to configure the deployment infrastructure to store MED-V logging information in a central locationand provide the ability to generate reports from the logs.

Where should you store the logs?

A. You should store the logs in a Public folder on a member server.B. You should store the logs in an SQL database on ABC-SQL1.C. You should store the logs in virtual directory on ABC-Deploy2.D. You should store the logs in a folder on ABC-Deploy1.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 21You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and allclient computers run Windows 7 Enterprise.

A desktop administrator named Clive Allen is using a Windows 7 client computer to learn about PCvirtualization. He has downloaded and installed Windows Virtual PC on his computer.

Clive wants to create multiple virtual machines (VMs) all running Windows XP Professional. Clive creates a VMnamed XP1. Clive asks you how he can easily create additional VMs and minimize the hard disk space used bythe VMs.

What advice should you provide to Clive?

Page 12: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

A. You should advise Clive to create dynamically expanding virtual hard disks (VHDs) for the additional VMs.B. You should advise Clive to create fixed size virtual hard disks (VHDs) for the additional VMs.C. You should advise Clive to use Windows Explorer to make multiple copies of the virtual hard disks (VHD)

file used by XP1.D. You should advise Clive to create differencing virtual hard disks (VHDs) for the additional VMs and

configure them to use XP1's VHD as the parent VHD.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 22You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com.

The client computers in the domain run Windows XP Professional or Windows 7 Professional. The functionallevel of the domain is Windows Server 2008 R2.

You use Microsoft Volume Licensing for the Windows 7 client computers and Windows Server 2008 R2servers.

A server named ABC-KMS1 runs the Key Management Service (KMS) to activate the volume licenses.

The company purchases 10 new client computers for users in the Sales department. You install Windows 7Professional on the client computers. You discover that the operating systems haven't automatically activated.

Which two of the following options could you take to manually activate the operating systems using the KMSserver? (Choose two. Each answer represents a complete solution.)

A. You could activate the operating systems using the Control Panel System applet.B. You could activate the operating systems using the slmgr.vbs script with the -rearm parameter.C. You could activate the operating systems using the slmgr.vbs script with the -ato parameter.D. You could activate the operating systems using the Volume Activation Management Tool (VAMT).E. You could activate the operating systems using the Computer Management tool.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 23You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and allclient computers run Windows 7 Enterprise.

The company has decided to deploy Remote Desktop Services for application consolidation purposes. Userswill use Remote Desktop Connections to connect to servers to run applications in Remote Desktop sessions.

You install Windows Server 2008 R2 on a server and name it ABC-RDS1. You configure ABC- RDS1 to run theRemote Desktop Session Host role.

You need to migrate user profile settings from client computers to ABC-RDS1.

Page 13: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

How can you automate the migration of user profile settings from their client computers to ABC- RDS1?

A. By running the Scanstate and Loadstate commands from the User State Migration Tool (USMT) 4.0.B. By running the Windows Easy Migration tool.C. By using the ImageX tool from the Windows Automated Installation Kit (WAIK).D. By using the Windows Optimized Desktop Toolkit.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 24You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. The clientcomputers run a mix of Windows XP Professional, Windows Vista Business and Windows 7 Enterprise.

You are planning to deploy a virtual desktop infrastructure (VDI). The virtual machine computer accounts arelocated in an organizational unit (OU) named VirtualPCs.

To provide a standard desktop environment to all users and to ensure that users cannot change the desktopenvironment, you configure a mandatory user profile.

How can you ensure that all virtual desktop users use the mandatory profile?

A. By configuring a Group Policy object (GPO) linked to the Default Domain Controllers OU to apply themandatory user profile.

B. By configuring a Group Policy object (GPO) linked to the VirtualPCs OU to apply the mandatory user profile.C. By copying the mandatory user profile to the All Users profile on each virtual machine.D. By copying the mandatory user profile to the Default User profile on each domain controller.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 25You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and allclient computers run a mix of Windows Vista Business and Windows 7 Enterprise.

The network includes a Remote Desktop Services environment for application consolidation.

A Windows Server 2008 R2 server named ABC-RDS1 runs the Remote Desktop Session Host role.Users use Remote Desktop Connections to connect to ABC-RDS1 to run applications in Remote Desktopsessions.You deploy another Windows Server 2008 R2 server named ABC-RDGW1 and install the Remote DesktopGateway (RD Gateway) role on it. ABC-RDGW1 will be used to provide external users access to virtual desktops on ABC-RDS1.

You need to configure the corporate firewall to allow access to ABC-RDGW1.

How should you configure the firewall?

Page 14: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

A. You should enable inbound port 3389.B. You should enable inbound port 443.C. You should enable outbound port 3389.D. You should enable outbound port 443.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 26You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. The clientcomputers run Windows 7 Enterprise.

The network includes 10 servers that run the Remote Desktop Session Host (RD Session Host) role. Companyusers can connect to any of the RD Session Host servers.

The computer accounts for the RD Session Host servers are located in an organizational unit (OU) namedABC-RDSHservers.

The computer accounts for the client computers are located in an organizational unit (OU) named ABC-Clients.

http://www.gratisexam.com/

The user accounts for all users are located in an organizational unit (OU) named ABC-Users.

The domain controller computer accounts are located in the Default Domain Controllers container.

You create a Group Policy object (GPO). The GPO is configured to redirect the Documents folder so that userscan access their own Documents folder from any of the RD Session Host servers.

Where should you link the GPO?

A. You should link the GPO to the ABC-RDSHservers OU.B. You should link the GPO to the ABC-Clients OU.C. You should link the GPO to the ABC-Users OU.D. You should link the GPO to the Default Domain Controllers container.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 27You work as a network administrator at ABC.com. The ABC.com network consists of an Active Directory

Page 15: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Domain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and allclient computers run Windows 7 Enterprise.

The company has decided to deploy Remote Desktop Services for application consolidation purposes. Userswill use Remote Desktop Connections to connect to servers to run applications in Remote Desktop sessions.

You install Windows Server 2008 R2 on a server and name it ABC-RDS1. You configure ABC- RDS1 to run theRemote Desktop Session Host role.

You have purchased Remote Desktop Services client access licenses (RDS CALs).

What should you do before installing the CALs?

A. You should install the Active Directory Certificate Services role on a server.B. You should install Remote Desktop Licensing role.C. You should install the Remote Desktop Services Manager role.D. You should run the Manage RDS CALs application.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 28You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. The clientcomputers run Windows 7 Enterprise.

The network includes 10 servers that run the Remote Desktop Session Host (RD Session Host) role.

A server named ABC-RDLicensing runs the Remote Desktop Licensing role and has 200 Remote DesktopServices client access licenses (RDS CALs) installed.

You are planning to deploy 20 new Windows 7 client computers to the network.

You notice that the pool of RDS CALs is getting low. You want to return 20 RDS CALs to the license pool toaccommodate the new client computers.

How can you return 20 RDS CALs to the license pool?

A. By rebooting 20 client computers that have Per Device RDS CALs.B. By logging off 20 users that have Per User RDS CALs.C. By reinstalling 20 RDS CALs.D. By revoking 20 Per User RDS CALs.E. By revoking 20 Per Device RDS CALs.

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 29You work as a network administrator at ABC.com. The ABC.com network consists of an Active Directory

Page 16: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Domain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2.

The network includes a virtual desktop infrastructure (VDI) environment that is used to provide a virtualWindows 7 desktop environment to company users.

The virtual desktop image is stored on a server named ABC-VDI1.

You have created an updated virtual desktop image and uploaded it to ABC-VDI1.

You plan to use User State Migration Tool (USMT) 4.0 to migrate application settings from the original virtualdesktop image to the new virtual desktop image.

Which two of the following options describe how you should run the USMT commands? Choose two.

A. On the original virtual desktop image, run Scanstate.exe with the /offlinewinold option.B. On the original virtual desktop image, run Scanstate.exe with the /hardlink option.C. On the original virtual desktop image, run Loadstate.exe with the /offlinewinold option.D. On the original virtual desktop image, run Loadstate.exe with the /hardlink option.E. On the new virtual desktop image, run Scanstate.exe with the /offlinewinold option.F. On the new virtual desktop image, run Scanstate.exe with the /hardlink option.G. On the new virtual desktop image, run Loadstate.exe with the /offlinewinold option.H. On the new virtual desktop image, run Loadstate.exe with the /hardlink option.

Correct Answer: AHSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 30You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. The clientcomputers in the domain run Windows 7 Professional.

You use Microsoft Volume Licensing for the Windows 7 client computers and Windows Server 2008 R2servers.

A newly installed server named ABC-KMS1 runs the Key Management Service (KMS) to activate the volumelicenses. You discover that the client computers are not being activated.

You suspect a DNS issue. You check the DNS zone for ABC.com and verify that there is a Host (A) record forABC-KMS1.

Which other type of DNS record should you check for?

A. You should check that a PTR record exists for ABC-KMS1.B. You should check that an SOA record exists for ABC-KMS1.C. You should check that an SRV record exists for ABC-KMS1.D. You should check that a CNAME record exists for ABC-KMS1.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Page 17: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 31You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. The clientcomputers run a mix of Windows XP Professional, Windows Vista Business and Windows 7 Enterprise.

A server named ABC-CA1 is configured as a Certificate Authority for the ABC.com domain.

You have installed a server named ABC-RDHost1 that runs the Remote Desktop Session Host (RD SessionHost) role. Users will use RemoteApp connections to connect to ABC-RDHost1.

You are creating Remote Desktop Protocol (.rdp) files to issue to users for the RemoteApp connections.

You want to use certificates from ABC-CA1 to sign the .rdp files.

Which three types of certificate could you use to sign the .rdp files? (Choose three.)

A. You could use a Workstation Authentication certificate.B. You could use a Code Signing certificate.C. You could use a Server Authentication (SSL) certificate.D. You could use a User Authentication certificate.E. You could use a Remote Desktop Protocol (RDP) Signing certificate.

Correct Answer: BCESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 32You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. The clientcomputers run Windows 7 Enterprise.

The network includes two servers that run the Remote Desktop Session Host (RD Session Host) role.

The computer accounts for the RD Session Host servers are located in an organizational unit (OU) namedABC-RDSHservers.

The computer accounts for the client computers are located in an organizational unit (OU) named ABC-Clients.

A new company security policy states that before users are authenticated for Remote Desktop Connections, thecomputer identities should you validated.

You need to configure a Group Policy Object (GPO) to comply with the company security policy.

Which three of the following steps describe how you should configure the GPO? Choose three.

A. Enable the "Configure server authentication for client" setting.B. Disable the "Configure server authentication for client" setting.C. Select the "Do not connect if authentication fails" option.D. Select the "Always connect, even if authentication fails" option.E. Link the GPO to the ABC-RDSHservers OU.F. Link the GPO to the ABC-Clients OU.

Correct Answer: ACE

Page 18: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 33You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. The clientcomputers run a mix of Windows XP Professional and Windows 7 Enterprise.

A Windows Server 2008 R2 server named ABC-RDS1 runs the Remote Desktop Session Host role.

You install a custom graphics application named ABCApp1 as a RemoteApp application on ABC- RDS1.

You need to ensure that ABCApp1 opens when a user double-clicks on a bitmap (.bmp) picture file.

You plan to use TS RemoteApp Manager on ABC-RDS1 to create a Windows Installer file to distribute theRemoteApp package to users.

How should you configure the RemoteApp package?

A. You should enable the Allow any arguments setting when creating the package.B. You should remove the .bmp file extension association on the client computers.C. You should enable the client extensions for this program option when creating the package.D. You should deploy a Remote Desktop Protocol (.rdp) file to the client computers before installing the

package.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 34You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and allclient computers run Windows 7 Enterprise.

A Windows Server 2008 R2 server named ABC-RDS1 runs the Remote Desktop Session Host role. ABC-RDS1 hosts several RemoteApp applications. The RemoteApp applications are available to users in allABC.com company departments.

A Windows Server 2008 R2 server named ABC-RDSW runs the Remote Desktop Web Access (RD WebAccess) role. ABC-RDSW provides Remote Desktop Web Access to the RemoteApp applications on ABC-RDS1.

You install a custom sales application named ABCSalesApp as a RemoteApp application on ABC- RDS1.

You need to configure RD Web Access so that only users in the Sales department can see ABCSalesApp asan available RemoteApp.

Which two of the following steps would achieve this goal? (Choose two.)

A. Move all user accounts for the Sales users to an Organization Unit (OU) named SalesUsers.B. Add all user accounts for the Sales users to a global security group named SalesUsers.C. Allow only the SalesUsers group NTFS permission to the folder containing ABCSalesApp.

Page 19: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

D. Assign only the SalesUsers OU to the ABCSalesApp RemoteApp when enabling RD Web Access.E. Assign only the SalesUsers group to the ABCSalesApp RemoteApp when enabling RD Web Access.

Correct Answer: BESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 35You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. The corporate firewall divides the network into an internal LocalArea Network (LAN) and an external perimeter network. All servers on the network run Windows Server 2008R2 and all client computers run Windows 7 Enterprise.

The perimeter network hosts servers that are accessible from the public internet.

A Windows Server 2008 R2 server named ABC-RDS1 is located in the LAN and runs the Remote DesktopSession Host role.

A Windows Server 2008 R2 server named ABC-RDSW is located in the LAN and runs the Remote DesktopWeb Access (RD Web Access) role. ABC-RDSW provides Remote Desktop Web Access to the RemoteAppapplications on ABC-RDS1.

A Windows Server 2008 R2 server named ABC-RDGW is located in the perimeter network and runs theRemote Desktop Gateway (RD Gateway) role.

To improve security, you move ABC-RDSW to the perimeter network.

Users now report that they are unable to see the RemoteApp applications when the log on to RD Web Access.

How can you ensure that RemoteApp applications on ABC-RDS1 are available through RD Web Access?

A. By configuring the firewall to allow port 3389 between ABC-RDSW and ABC-RDS1.B. By configuring the firewall to allow Windows Management Instrumentation (WMI) communication between

ABC-RDSW and ABC-RDS1.C. By restarting the World Wide Web Publishing Service on ABC-RDSW.D. By configuring the firewall to allow port 443 between ABC-RDSW and ABC-RDGW.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 36You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. The clientcomputers run a mix of Windows XP Professional and Windows 7 Enterprise.

A Windows Server 2008 R2 server named ABC-RDS1 runs the Remote Desktop Session Host role.

You install a custom graphics application named ABCApp1 as a RemoteApp application on ABC- RDS1.

You need to deploy ABCApp1 so that users can access the application from a Start menu shortcut.

Page 20: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

How should you create a package to deploy to the client computers?

A. You should use TS RemoteApp Manager to create a Remote Desktop Protocol (.rdp) file.B. You should use TS RemoteApp Manager to .msiC. You should use Package Manager to create a Windows Image (.wim) file.D. You should use Windows Explorer to create a Shortcut (.lnk) file.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 37You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. The clientcomputers run a mix of Windows XP Professional and Windows 7 Enterprise.

A Windows Server 2008 R2 server named ABC-RDS1 runs the Remote Desktop Session Host role and theMicrosoft Application Virtualization (App-V) 4.6 client.

You use App-V to publish a custom Sales application named ABC-SalesApp on ABC-RDS1.

You want to provide external Sales users access to ABC-SalesApp. You provide the external Sales users aRemote Desktop Protocol file that enables them to use the Connect From Anywhere feature to access ABC-SalesApp on ABC-RDS1.

You now need to configure the corporate firewall to allow the external connections to ABC-RDS1.

Which port should you open on the firewall?

A. You should open HTTP port 80.B. You should open RTSP port 554.C. You should open HTTPS port 443.D. You should open RDP port 3389.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:RDP runs on 3389

QUESTION 38You work as a network administrator at ABC.com. The company consists of a main office and a branch office.Both offices are part of a single Active Directory Domain Services domain named ABC.com. The two officesare connected by a slow WAN link.

All servers are located in the main office and run Windows Server 2008 R2. All client computers in both officesrun Windows 7 Enterprise.

You are configuring a Microsoft Application Virtualization (App-V) 4.5 environment.

You use App-V to virtualize an application. The virtual application will be used by users in both offices.

When you test the virtual application from the branch office, you discover that the bandwidth of the WAN link isnot sufficient to run the application.

Page 21: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Which two of the following options would enable the virtual applications to work in the branch office? (Choosetwo. Each answer represents part of the solution).

A. Use App-V Desktop Client version 4.6 instead of version 4.5 on the branch office client computers.B. Install a Windows Server 2008 R2 server in the branch office.C. Install Microsoft System Center Application Virtualization Management Server in the branch office.D. Configure serverCache in Host Cache mode in the branch office.E. Configure an Application Virtualization File Server in the branch office.

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 39You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2.

The client computers run a mix of Windows XP Professional, Windows Vista Business and Windows 7Enterprise.

The network includes a Microsoft Application Virtualization (App-V) environment.

All Windows XP Professional client computers are 32-bit operating systems and run App-V Desktop Client 4.5.

The Windows Vista client computers run either the 32-bit or 64-bit operating systems and run App- V DesktopClient 4.5.

The Windows 7 client computers run either the 32-bit or 64-bit operating systems and run App-V Desktop Client4.6.

You plan to install a reference computer which will be used to virtualize a custom application. The virtualizedapplication will be used by all company users.

Which software configuration should you use on the reference computer? (Choose two. Each answerrepresents part of the solution).

A. You should install Windows 7 64-bit.B. You should install Windows 7 32-bit.C. You should install Windows Vista 64-bit.D. You should install Windows Vista 32-bit.E. You should install Windows XP Professional 32-bit.F. You should install App-V Sequencer 4.5.G. You should install App-V Sequencer 4.6.

Correct Answer: EFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 40

Page 22: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

You work as a network administrator at ABC.com. The company consists of a main office and two branchoffices. All three offices are part of a single Active Directory Domain Services domain named ABC.com. Thetwo branch offices are connected by slow WAN links to the main office.

All servers are located in the main office and run Windows Server 2008 R2. All client computers run Windows 7Enterprise. Users with portable Windows 7 computers often travel between offices.

A server named ABC-DC1 in the main office is configured as a domain controller and primary DNS server forthe domain.

You are configuring a Microsoft Application Virtualization (App-V) 4.6 environment.

You deploy Windows Server 2008 R2 servers in the main office and both branch offices. The three servers runthe IIS Server role.

App-V users in each office will stream virtual applications from the local IIS server.

How would you configure DNS to ensure that users in each office connect to their local IIS server to streamvirtual applications? (Choose three. Each answer represents part of the solution). (Need to have confirmationon this answer) Create a single DNS A record and configure a HTTP host header for each IIS server.

A. By creating a Host (A) record with the same name for each server.B. By creating an Alias (CNAME) record with the same name for each server.C. By creating a Service Locator (SRV) record with the same name for each server.D. By disabling Round Robin.E. By disabling Netmask Ordering.F. By enabling Round Robin.G. By enabling Netmask Ordering.

Correct Answer: ABGSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 41You work as a network administrator at ABC.com. The company consists of a main office and a branch office.Both offices are part of a single Active Directory Domain Services domain named ABC.com. The two officesare connected by a slow WAN link.

All servers are located in the main office and run Windows Server 2008 R2. All client computers in both officesrun Windows 7 Enterprise.

You are configuring a Microsoft Application Virtualization (App-V) 4.5 environment.

You use App-V to virtualize an application. The virtual application will be used by users in both offices.

When you test the virtual application from the branch office, you discover that the bandwidth of the WAN link isnot sufficient to run the application.

How can you enable the branch office users to run the virtual application?

A. Use App-V Desktop Client version 4.6 instead of version 4.5 on the branch office client computers.B. Create a Windows Installer (.msi) package for the virtual application and deploy that to the branch office

client computers.C. Install Microsoft System Center Application Virtualization Management Server in the branch office.

Page 23: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

D. Configure BranchCache in Distributed Cache mode in the branch office.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 42You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. All clientcomputers run Windows 7 Enterprise.

The network includes a Microsoft Application Virtualization (App-V) environment.

To troubleshoot an issue with App-V, you configure the registry by setting the following registry key to 0: HKLM\SOFTWARE\Microsoft\SoftGrid\4.5\Client\AppFS\State.

What effect will this have on the client computer?

A. It will disable FileSystem caching.B. It will reset the FileSystem cache.C. It will disable the cache space management feature.D. It will allow an unlimited FileSystem cache size.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 43You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. All clientcomputers run Windows 7 Enterprise.

The network includes a Microsoft Application Virtualization (App-V) 4.6 environment.

You have multiple virtualized applications. One of the virtualized applications is named ABC- App1.

You need to add some files to ABC-App1.

Which two of the following steps describe how to add files to ABC-App1? (Choose two. Each answerrepresents part of the solution).

A. Use the App-V Sequencer to open ABC-App1 with the Edit option.B. Use the App-V Sequencer to open ABC-App1 with the UABCrade option.C. Use the App-V Sequencer to sequence the additional files as a new application.D. Add the files and save the application with a new name.E. Add the files and save the application.

Correct Answer: BESection: (none)Explanation

Page 24: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Explanation/Reference:Explanation:

QUESTION 44Your company uses Microsoft Application Virtualization (App-V) 4.5 and 4.6.

You maintain the sequencing for applications. All existing sequenced applications were sequenced by usingApp-V 4.5.

You need to modify an existing sequenced application for deployment to a computer that runs Windows 7Enterprise x64.

What should you do?

A. Edit the Sequencer Project (.sprj) file for the application and add <OS VALUE="X64"/>.B. Install the App-V 4.6 32-bit sequencer. Edit the application by using the App-V 4.6 32-bit sequencer. Add

Windows 7 64-bit to the Selected Operating Systems list.C. Install the App-V 4.6 64-bit sequencer. Open and save the application package by using the App-V 4.6 64-

bit sequencer.D. Edit the Sequencer Project (.sprj) file for the application and add <OS VALUE="Win7"/>.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

Page 25: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Exam B

QUESTION 1Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host)server.

You need to select a digital certificate for signing Remote Desktop Protocol (.rdp) files.

Which two certificate types can you use to achieve this goal? (Each correct answer presents a completesolution. Choose two.)

A. Remote Desktop Protocol (RDP) SigningB. Workstation AuthenticationC. Authenticated SessionD. Trusted third party SSL certificate

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:You can sign .rdp files that are used for RemoteApp connections by using a Server Authentication certificate[Secure Sockets Layer (SSL) certificate], a Code Signing certificate, or a specially defined Remote DesktopProtocol (RDP) Signing certificate.

http://technet.microsoft.com/en-us/library/cc754499.aspx

QUESTION 2Your company has a main office and four branch offices. You have an Active Directory Domain Services (ADDS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App-V). You need to ensure that all users access virtualized applications from their local branch office, and allow foractive upgrades. Which should you install in each branch office?

A. a server with the File Services role installedB. a server with the Web Server (IIS) role installedC. Microsoft System Center Configuration Manager 2007 R2D. Microsoft System Center Application Virtualization Streaming Server

Correct Answer: DSection: (none)Explanation

Explanation/Reference:The App-V Management Server streams the package content and publishes the shortcuts and file-typeassociations to the App-V Client. The App-V Management Server also supports active upgrade, licensemanagement, and a database that can be used for reporting.Application Virtualization (App-V) Streaming ServerThe App-V Streaming Server hosts the packages for s treaming to App-V Clients in environments suchas branch offices, where the bandwidth of the conne ction to the App-V Management Server isinsufficient for streaming package content to clien ts. The Streaming Server contains only streamingfunctionality and does not provide you with the App -V Management Console or the App-V ManagementWeb Service .Application Virtualization (App-V) Data StoreThe App-V data store, in the SQL database, retains information related to the App-V infrastructure. The

Page 26: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

information in the App-V data store includes all application records, application assignments, and which groupsmanage the Application Virtualization environment.Application Virtualization (App-V) Management ServiceThe App-V Management Service communicates read/write requests to the Application Virtualization data store.This component can be installed on the same computer as the App-V Management Server or on a separatecomputer with IIS installed.Application Virtualization (App-V) Management ConsoleThe App-V Management Console is a snap-in management utility for App-V Server administration. Thiscomponent can be installed on the same computer as the App-V Server or on a separate workstation that hasMMC 3.0 and .NET 2.0 installed.Application Virtualization (App-V) SequencerThe App-V Sequencer monitors and captures the installation of applications and creates virtual applicationpackages. The output of the Sequencer consists of the application icon, the OSD file containing applicationdefinition information, a package manifest file, and an SFT file containing the application’s content files.Optionally, a Windows Installer file can be created for installing the package without using the App-Vinfrastructure.Application Virtualization (App-V) ClientThe App-V Client is installed on the App-V Desktop Client computer or on the App-V Terminal Services Clientcomputer. It provides the virtual environment for the virtual application packages. The App-V Client managesthe package streaming to the cache, virtual application publishing refresh, and interaction with the ApplicationVirtualization Servers.

Page 27: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Application Virtualization (App-V) Management Server

QUESTION 3Your organization has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. You need to deploy Microsoft Application Virtualization (App-V) 4.6 in a stand-alone configuration.Which should you install?

A. Microsoft Application Virtualization Database

Page 28: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

B. Microsoft Application Virtualization Desktop ClientC. Microsoft System Center Application Virtualization Streaming ServerD. Microsoft System Center Application Virtualization Management Server

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 4

Page 29: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Your company uses Microsoft Application Virtualization (App-V). When sequencing applications, you receive anerror indicating that the App-V Sequencer is unable to save temporary files. You need to ensure that you cansequence applications. What should you do on the App-V Sequencer computer?

A. Increase the amount of memory.B. Increase the size of the page file.C. Increase the priority of the App-V Sequencer process.D. Increase the storage space available to the scratch directory.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Configure the temp directory with enough free disk space.

The Sequencer uses the %TMP% or %TEMP% directory and the Scratch directory to store temporary filesduring sequencing. You should configure these directories on the computer running the Sequencer with freedisk space equivalent to the estimated application installation requirements. You can verify the location of the Scratch directory by opening the Sequencer console and selecting Tools , Options , and then selecting thePaths tab. Configuring the temp directories and the Scratch directory on different hard drive partitions canimprove performance during sequencing.

http://technet.microsoft.com/en-us/library/dd351420.aspx

When you sequence large applications, use two hard drives. App-V (SoftGrid) Sequencer uses %TMP%, %TEMP%, and its own scratch directory for large temporary files. If you redirect these directories to a directory ona separate hard disk drive, you can shorten the sequence time. The %TMP% environment and the %TEMP%environment should be changed in the System control panel for the specific user account that will be used forsequencing. To change the App-V (SoftGrid) Sequencer scratch directory, click Options on the Tools menu,click the Path tab, and then change the directory that appears in Scratch Root. For example, on your primaryhard disk drive, you have a "C" partition and a "Q" partition. And, on your secondary drive, you have an "E"partition. On the "E" partition, you can redirect the specified directories to E:\SEQTMP.

http://support.microsoft.com/kb/932137

Frequently asked questions

What do I do if an application must install to drive C?

To simplify the Sequencing process, we recommend that you use the same drive for the Installation directory,for the Asset directory, and for the App-V (SoftGrid) client mount. By default, App-V (SoftGrid) labels the drive"Drive Q." Because certain applications must be installed on drive C or because some application must be runfrom drive C, App-V (SoftGrid) Sequencer accommodates this requirement. In this case, do not give the Assetdirectory the same name as the Installation directory. We do not recommend that you sequence to drive C forthe following reasons:Depending on how the sequencing is performed, the process may introduce small App-V (SoftGrid) overheador a significant App-V (SoftGrid) overhead.The specific drive letter, "C", must be present on the App-V (SoftGrid) client.To accommodate this situation, specify a directory on drive C for the Installation directory during the sequencingprocess. Then, specify a directory on drive Q to use as the Asset directory. This causes the whole application tobe run on the App-V (SoftGrid) Virtual File System. Do not modify the FILENAME attribute to point to drive C.The executable file that is specified in this attribute must point to drive Q.What do I do if I have to sequence an MMC snap-in or an Internet Explorer plug-in?Note Examples of Internet Explorer plug-ins include different versions of Java runtimes, different versions ofActiveX components, different versions of Flash runtimes, and different versions of Shockwave runtimes.

Even though you cannot sequence core operating system components such as Windows Internet Explorer, youcan create multiple virtual environments for each of these applications. Make sure that you do not install these

Page 30: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

applications during the sequencing process. Instead, refer to the local copy of the application. This causes thelocal application to be pulled into a virtual environment that includes the desired version of the plug-in that wassequenced. The correct versions of the core operating system components on the App-V (SoftGrid) clientsmust match the versions on App-V (SoftGrid) Sequencer.

To create the sequence, follow these steps:Create an empty folder on drive Q.Point to this folder when App-V (SoftGrid) Sequencer asks where the application was installed during theinstallation phase. Install the plug-in to this location on drive Q during the installation phase.During the execution phase, test the application by using local shortcuts. Then, save the sequence.Modify the .osd file to point to the local core operating system executable file by using appropriate parameters.

For example, if you are sequencing an Internet Explorer plug-in, use the following parameters:FILENAME="%CSIDL_PROGRAM_FILES%\Internet Explorer\IExplore.exe"If you are sequencing an MMC snap in, use the following parameters:FILENAME="%CSIDL_SYSTEM%\MMC.EXE"PARAMETERS="%SFT_MNT%\Asset directory name\path to an .msc file"Why should I sequence an application to a root folder that has a unique name of eight characters or less?You must use a globally unique name because each application is mounted on drive Q as "Q:\Asset foldername." We recommend that you use eight characters or less to make sure that the short path names of thefiles are correctly preserved on the client. Certain operating system components require short names. Forexample, when Microsoft Office XP is installed on the App-V (SoftGrid) Sequencer computer, it is assigned theshort path name of "Micros~1". When Microsoft Office 2000 is installed on the App-V (SoftGrid) Sequencercomputer, after the computer has been hosted to the original state, it is assigned the short path name of"Micros~1".

If Microsoft Office XP is streamed to a fresh client, it is given the short path name of "Micros~1". If MicrosoftOffice 2000 is then streamed to the same client, it is given the short path name of "Micros~2". This causes theapplication to fail because non-parsed registry keys point to "Micros~1".

If you hardcode two applications to Q:\Office, and then you try to stream the second version of Office when thefirst version of Office is already streamed, the App-V (SoftGrid) client will be unable to correctly mount thesecond version of Office on the drive Q.Can I sequence an application on one operating system and then stream it to another operating system?Yes, App-V (SoftGrid) lets you sequence on one operating system and then stream it to another operatingsystem. However, the application may not work correctly if it detects the operating system version when theapplication is installed. The application may select different components depending on that detection. This maycause problems depending on the component compatibility with other operating systems. Before you try tostream an application to another operating system, determine whether additional sequencings are required foreach operating system. You may have to contact the application vendor.What are the current limitations of the Save-As feature?The current version of the App-V (SoftGrid) Sequencer Save-As feature requires that the package rootdirectory, the asset directory, be changed as part of the process. This can cause applications that have hard-coded paths or that have some forms of copy protection to fail after a Save-As operation. To work around thisproblem, resequence the application without using the Save-As feature.

The third-party products that this article discusses are manufactured by companies that are independent ofMicrosoft. Microsoft makes no warranty, implied or otherwise, about the performance or reliability of theseproducts.

QUESTION 5Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by usingMicrosoft Application Virtualization (App-V). You are creating an application virtualization package. You need toallow Microsoft Update to run during monitoring. Which should you use?

A. Microsoft Application Virtualization SequencerB. Microsoft Application Virtualization Desktop Client

Page 31: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

C. Microsoft System Center Application Virtualization Streaming ServerD. Microsoft System Center Application Virtualization Management Server

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Page 32: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 6All client computers in your environment run Windows 7, You virtualize applications by using MicrosoftApplication Virtualization (App-V). You need to reset the FileSystem cache on a client computer. What shouldyou do?

http://www.gratisexam.com/

A. Use the AppVCacheSize tool to set the maximum cache size to 0.B. Use the AppVCacheSize tool to set the minimum free disk space threshold to 0.C. Set the HKLM\SOFTWARE\Microsoft\SoftGrid\4.5\Client\AppFS\State registry key to 0.D. Set the HKLM\SOFTWARE\Microsoft\SoftGrid\4.5\Client\AppFS\FileSize registry key to 0.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:How to Reset the Application Virtualization File System Cache File?

http://support.microsoft.com/kb/931575

When you remove an application from SoftGrid Client Management, the application is removed from theSoftGrid Client cache. However, the size of the cache file does not decrease. You may have to recover diskspace by manually reducing the size of the cache file.

You can do this by using the following method. This method removes all the application data from the SoftGridClient cache. Therefore, the size of the cache is reduced to zero. However, the applications remain listed in

Page 33: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

SoftGrid Client Management. Additionally, the user settings remain intact. Therefore, the applications areloaded the next time that the application starts.Remove application data from the SoftGrid Client ca cheTo manually reduce the size of the cache file, follow these steps:Start Registry Editor.ExpandHKEY_LOCAL_MACHINE, and then expandSOFTWARE.ExpandSoftricity, and then expandSoftGrid Client.ExpandCurrentVersion, and then clickAppFS.Right-clickState , and then clickModify .Type0in theValue data box, and then clickOK.Exit Registry Editor.Restart the SoftGrid Client computer.For Application Virtualization versions 4.5 and later:Start Registry Editor.Locate the following registry key:HKEY_LOCAL_MACHINE\Software\Microsoft\Softgrid\4.5\ Client\AppFS.Right-click State , and then click Modify .Type 0 in the Value data box, and then click OK.Exit Registry Editor.Restart the App-V Client computer.

QUESTION 7Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All client computers run Windows 7. You virtualize applications by using Microsoft ApplicationVirtualization (App-V). You are deploying servers to five new branch offices. Each branch office will streamvirtual applications from a local file server and perform application sequencing locally. You need to replicateapplication packages to all file servers and minimize bandwidth usage.What should you do?

A. Create a Distributed File System (DFS) root on each file server.B. On each file server, add the BranchCache for network files role service.C. Create an Active Directory Distributed File System (DFS) root target folder.D. Create a Distributed File System Replication (DFSR) full mesh replication group.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 34: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 35: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

The Full Mesh TopologyAnother commonly used replication topology is the full mesh topology.

Page 36: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

This topology, shown in Figure B, allows every replica to replicate with every other replica. The advantage ofusing this topology is that replication will still continue to function even if a server drops off-line. Of course thedisadvantage to using this method is that it can result in an excessive amount of replication traffic.

QUESTION 8Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. You provide access to some applications that run on Windows 7 through a virtual desktop infrastructure (VDI)environment. You add a new Windows 7 virtual desktop image to the same server as an existing Windows 7virtual desktop image. You need to ensure that all application settings are copied from the original virtualdesktop image to the new virtual desktop image. What should you do? (Need to verify)

A. From the new virtual desktop, run Windows Easy Transfer and use the network option.B. From the original virtual desktop, run Windows Easy Transfer and use the Easy Transfer cable option.C. On the new virtual desktop, run the ScanState tool with the /hardlink option, and then run the LoadState tool

Page 37: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

with the /offlinewinold option.D. On the original virtual desktop, run the ScanState tool with the /offlinewinold option. From a command

prompt on the new virtual desktop, run the LoadState tool with the /hardlink option.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 38: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 9Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host)server and a Remote Desktop Gateway (RD Gateway) server. You change the configuration of WindowsFirewall by using Group Policy. Users on the corporate network are then unable to connect to their virtualdesktops. You need to ensure that users can connect to their virtual desktops. What should you do? (Eachcorrect answer presents part of the solution. Choose two.)

A. Create a Windows Firewall inbound rule for port 443 on the RD Gateway server.B. Create a Windows Firewall inbound rule for port 443 on the RD Session Host server.C. Create a Windows Firewall inbound rule for port 3389 on the RD Gateway server.D. Create a Windows Firewall inbound rule for port 3389 on the RD Session Host server.

Correct Answer: ADSection: (none)Explanation

Page 39: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Explanation/Reference:

Connection typeProtocol

VMM server to VMM agent on Windows Server–based host (control) WS-ManagementVMM server to VMM agent on Windows Server–based host (file transfers) HTTPS (using BITS)VMM Self-Service Portal to VMM self-service Web server HTTPSVMM library server to hosts BITSVMM host-to-host file transfer BITSVMConnect (RDP) to Hyper-V hosts RDPRemote Desktop to virtual machines RDPVMware Web Services communication HTTPSSFTP file transfer from VMM server to VMWare ESXServer3i hosts HTTPS

What does TS Gateway do?

TS Gateway provides many benefits, including:

TS Gateway enables remote users to connect to internal network resources over the Internet, by using anencrypted connection, without needing to configure virtual private network (VPN) connections.TS Gateway provides a comprehensive security configuration model that enables you to control access tospecific internal network resources.TS Gateway provides a point-to-point RDP connection, rather than allowing remote users access to all internalnetwork resources.TS Gateway enables most remote users to connect to internal network resources that are hosted behindfirewalls in private networks and across network address translators (NATs). With TS Gateway, you do notneed to perform additional configuration for the TS Gateway server or clients for this scenario.Prior to this release of Windows Server, security measures prevented remote users from connecting to internalnetwork resources across firewalls and NATs. This is because port 3389, the port used for RDPconnections, is typically blocked for network secur ity purposes at the firewalls. TS Gateway transmitsRDP traffic to port 443 instead, by using an HTTP S ecure Sockets Layer/Transport Layer Security (SSL/TLS) tunnel. Because most corporations open port 44 3 to enable Internet connectivity, TS Gatewaytakes advantage of this network design to provide r emote access connectivity across multiplefirewalls.

The TS Gateway Manager snap-in console enables you to configure authorization policies to define conditionsthat must be met for remote users to connect to internal network resources. For example, you can specify:Who can connect to network resources (in other words, the user groups who can connect). What network resources (computer groups) users can connect to.Whether client computers must be members of Active Directory security groups.Whether device and disk redirection is allowed.Whether clients need to use smart card authentication or password authentication, or whether they can useeither method.You can configure TS Gateway servers and Terminal Services clients to use Network Access Protection (NAP)to further enhance security. NAP is a health policy creation, enforcement, and remediation technology that isincluded in Windows® XP Service Pack 3 (SP3), Windows Vista®, and Windows Server 2008. With NAP,system administrators can enforce health requirements, which can include software requirements, securityupdate requirements, required computer configurations, and other settings. NoteComputers running Windows Server 2008 cannot be used as NAP clients when TS Gateway enforces NAP.Only computers running Windows XP with SP3 and Windows Vista can be used as NAP clients when TSGateway enforces NAP.

QUESTION 10You use Microsoft Application Virtualization (App-V).

Page 40: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

You need to automate the process of sequencing applications.

Which command should you run?

A. SFTSequencer / UPGRADE:" P ath ToS ourceSPRJ " / INSTALLPACKAGE:" PathToUpgradeInstalIer " /DECODEPATH:" P ath T o D ecode F older " / OUTPUTFILE:" P ath T o D estinationSPRJ "

B. SFTMIME configure package: "PackageName " / OverrideURL FILE: "PathTOSFT "C. SFTSequencer / I:"PathToMSI " / P:"PathToPackageRoot " / 0:"PathToDestinationSPRJ "D. SFTMIME ADD APP:"AppIicationName " /OSD " PathToOSD " /CONSOLE

Correct Answer: CSection: (none)Explanation

Explanation/Reference:How to Upgrade a Virtual Application by Using the Command Linehttp://technet.microsoft.com/en-us/library/cc843809.aspx

Use the following procedure to upgrade a virtual application by using a command line.To upgrade a virtual applicationOn the computer that is running the Application Virtualization (App-V) Sequencer, to open the commandprompt, select Start ,Run , and type cmd . Click OK.At the command prompt, specify the location where the App-V Sequencer is installed. For example, at thecommand prompt, you could type the following:cd C:\Program Files\Microsoft Application Virtualiz ationSequencer .At the command prompt, type the following command, replacing the text in quotation marks with your values:SFTSequencer /UPGRADE:“pathtosourceSPRJ” /INSTALLPA CKAGE:“pathtoUpgradeInstaller”/DECODEPATH:”pathtodecodefolder” /OUTPUTFILE:“patht odestinationSPRJ”

You can specify additional parameters by using the command line, depending on the complexity of the application you are upgrading. For a complete list of parametersthat are available for use with the App-V Sequencer, seeSequencer Command-Line Parameters.Use the value descriptions in the following table to help you determine the actual text you will use in thepreceding command.

Value Description

pathtosourceSPRJ Specifies the directory location of the virtual application to be upgraded.pathtoUpgradeInstaller Specifies the Windows Installer or a batch file that will be used to install an upgrade to the application.pathtodecodefolder Specify the directory in which to unpack the SFT file.pathtodestinationSPRJ Specifies the path and file name of the SPRJ file that will be created.Press Enter .

Sequencer Command-Line ParametersYou can use the following Application Virtualization (App-V) Sequencer parameters to sequence an applicationand to upgrade an existing virtual application by using a command line. For more information about sequencingan application by using a command line, Sequencer Command-Line Parameters/HELP or /?Displays information about parameters that are available for using a command line to sequence applications./INSTALLPACKAGE or /I : Specifies the Windows Installer or a batch file that will be used to install anapplication so that it can be sequenced./INSTALLPATH or /P : Specifies the package root directory for an application./OUTPUTFILE or /O : Specifies the path and file name of the SPRJ file that will be generated./FULLLOAD or /F : Specifies whether all files will be contained in the primary feature block. If the/

Page 41: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

FULLLOAD parameter is specified on the command line, all of the associated application data is added toprimary feature block. If the/FULLLOAD parameter is not specified on the command line, then none of theassociated application data is added to the primary feature block./PACKAGENAME or /K : Specifies the package name that will be assigned to the sequenced application./BLOCKSIZESpecifies the SFT file block size that will be used to stream the package to client computers. You can selectone of the following values:4 KB16 KB32 KB64 KBYou should consider the size of the SFT file when you specify the block size. A file with a smaller block sizetakes longer to stream over the network but is less bandwidth-intensive. Files with larger block sizes use morenetwork bandwidth./COMPRESSION Specifies the method for compressing the SFT file that will be streamed to the client./MSI or /M Specifies whether a Windows Installer for the sequenced application should be created./DEFAULT Specifies the default SPRJ file that will be used when creating a virtual application package. Thisfile is used as the .sprj template when the application is sequenced for the first time./UPGRADE Specifies the path and file name of the SPRJ file that will be upgraded./DECODEPATHSpecifies the directory on the sequencing computer where the files associated with the sequenced applicationpackage are installed. Use one of the following formats when specifying the directory:/decodepath:Q:/decodepath:Q:./decodepath:”Q:.”/decodepath:”Q:”

QUESTION 11All client computers in your company run Windows 7 Enterprise. Each client computer runs one guest virtualmachine (VM) in Windows Virtual PC.

A user reports that a supported USB device connected to his client computer does not appear in the guest VM.The USB device functions correctly on the client computer.

You need to ensure that the USB device can be installed in the guest VM.

What should you do?

A. Use Virtual PC Manager to attach the USB device on the host.B. Use the Computer Management console to scan for hardware changes in the guest.C. Run the Add Hardware Wizard in the guest.D. Use the Computer Management console to update the USB Virtualization Bus driver on the host.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:USB Architecture in Windows Virtual PCSome old legacy devices may not have driver support for newer operating systems (Windows® Vista andbeyond). Windows® Virtual PC (WVPC) makes it possible to use these devices in Windows® 7, usingWindows® XP Mode. Users can, at the same time, utilize the benefits of newer and secure features ofWindows® 7. In this article, we will describe the USB architecture in WVPC. Typical USB devices used in aVirtual Machine (VM) are:PrintersFlash memory sticks

Page 42: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

External hard disksWebcams and Digital camerasSmartcards

Figure 1a: USB Menu on a Virtual Machine’s Tool Bar

Figure 1b: Manage USB Devices for Virtual Applicati onsDetails on using these devices with the VM can be found in anearlier post.WVPC uses theRedirection Policy Manager(RPM) of the Windows to provide the USB redirection in a VirtualMachine. It loads an alternate driver in the lieu of the original driver to redirect the device to a Virtual machine.WVPC creates a virtualized host controller in the Virtual Machine that is being offered using a VPCBusChannel. For more details, please refer toearlier post.USB ArchitectureThe overall USB architecture is shown in Figure 2.

Page 43: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Figure 2: USB Architecture showing a USB Device in VMUSB architecture consists of a server side component running in Host OS and a client side component runningin Virtual Machine. The server side involves a Connector driver to manage USB devices and a Stub instance forevery USB Device. The client side implements a VPCBus enumerated virtual host controller that supports thesubset of the USB driver interfaces that are necessary for compatibility with the supported devices. Theredirection process also triggers the connector driver to send commands to the guest to create the PDO for theredirected device. After this the Stub driver, Connector driver and the Virtual bus/hub driver work in unison toenable communication of commands, responses and data between physical USB device and the redirectedUSB device. Component details are described below:Server Side (Host OS)A channel is created by Virtual PC host process (VPC.exe) through the Connector Driver using VPCBuswhenever a VM boots up. Also, a server side hub instance is created internally by the Connector with thischannel for every VM. There are two drivers on the server side as below:The Connector driver provides services regardless of the devices that are currently connected.The USB Stub driver is the alternate driver loaded by the USB stack instead of the vendor supplied or systemsupplied driver for the device using RPM. Please refer Figure 2. The Stub driver just forwards requests from theConnector driver to the PDO created by the hub driver.A total of up to 8 USB devices can be assigned to a VM at a time. HID and Hub Class Devices cannot beassigned to the VM. The USB devices in VM can be safely removed just like in Host OS whenever the USBdevice driver supports.

QUESTION 12Your organization has an Active Directory Domain Services (AD DS) domain. All client computers run Windows7.

You create a Windows XP image.

You need to deploy the image as a virtual machine (VM) to the client computers so that the image can run in

Page 44: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Windows Virtual PC.

Which should you use?

A. Microsoft System Center Configuration Manager 2007 R2B. Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 with a templateC. Microsoft System Center Virtual Machine Manager (VMM) 2008 with a templateD. Microsoft Virtual Desktop Infrastructure (VDI)

Correct Answer: ASection: (none)Explanation

Explanation/Reference:VMM - is for virtual machinesVDI - is complete set of desktop virtualization not the image management.

Page 45: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 13Your company has an Active Directory Domain Services (AD DS) domain.

You plan to virtualize an applications by using Microsoft Application Virtualization (App-V).

You are creating an application virtualization package.

Page 46: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

What should you use?

A. Microsoft Application Virtualization SequencerB. Microsoft Application Virtualization Desktop ClientC. Microsoft System Center Application Virtualization Streaming ServerD. Microsoft System Center Application Virtualization Management Server

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 14Your company runs Remote Desktop Services. All client computers run Windows Vista SP2. You have a Remote Desktop Session Host (RD Session Host) server.You need to deploy a RemoteApp application to client computers and ensure that the application appears onthe Start menu. Which file type should you distribute to the client computers?

A. Windows Installer (.msi)B. Client Configuration File (.wcx)C. Remote Desktop Protocol (.rdp)D. RemoteApp Programs list and settings (.tspub)

Correct Answer: ASection: (none)

Page 47: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Explanation

Explanation/Reference:

QUESTION 15Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. You activate the Key Management Service (KMS) on a server to handle volume activation for your Windows 7client computers. Windows 7 client computers are not being activated. The KMS licensing status is shown as Licensed. The Windows Event Log does not contain any corresponding activation-related events. You need to ensure that the KMS server can activate Windows 7 client computers. What should you do?

A. Run the slmgr.vbs /dlv command.B. Run the slmgr.vbs /ato command.

Page 48: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

C. Add a DNS SOA record pointing to the KMS server.D. Add a DNS SRV record pointing to the KMS server.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

http://technet.microsoft.com/en-us/library/ff793419.aspx

QUESTION 16Your company has an Active Directory Domain Services (AD DS) domain that runs at the Windows Server2008 functional level.All servers run Windows Server 2008 R2. All client computers run Windows XP Professional. You use the Key Management Service (KMS) to manage your volume license activations. All servers havebeen activated by using KMS.You deploy 20 Windows 7 virtual desktops. The virtual desktop operating systems do not activate. You need to ensure that the virtual desktops activate by using KMS. What should you do?

A. Deploy five more virtual desktops.B. Run slmgr.vbs with the -ato parameter.C. Use the Volume Activation Management Tool (VAMT).D. Raise the domain functional level to Windows Server 2008 R2.

Correct Answer: BSection: (none)Explanation

Page 49: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Explanation/Reference:With KMS you can complete activations on your local network, eliminating the need for individual computers toconnect to Microsoft for product activation. KMS is a lightweight service that does not require a dedicatedsystem and can easily be co-hosted on a system that provides other services.By default, volume editions of Windows 7 and Windows Server 2008 R2 connect to a system that hosts theKMS service to request activation. No action is required from the user.KMS requires a minimum number of computers (physical or virtual machines) in a network environment. Theinstitutions must have at least five computers to a ctivate Windows Server 2008 R2 and at least 25computers to activate clients that are running Wind ows 7 . These minimums are referred to as activationthresholds.

QUESTION 17You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and allclient computers run Windows 7 Enterprise.

The company has decided to deploy Remote Desktop Services for application consolidation purposes.

You install Windows Server 2008 R2 on a server and name it ABC-RDS1. You configure ABC- RDS1 to run theRemote Desktop Session Host role.

You need to ensure the Remote Desktop connections are as secure as possible by ensuring that the session isnot created until the user is authenticated.

How should you configure ABC-RDS1?

A. You should set the security layer option to the RDP Security Layer.B. You should configure the firewall to block port 3389.C. You should configure the server to allow connections only to Remote Desktop client computers that use

Network Level Authentication.D. You should set the encryption level option to FIPS Compliant.

Page 50: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

1) All connections from computers running any version of Remote Desktopor2) Allow connections only from computers running Remote Destop with Network Level Authentication

QUESTION 18You work as a network administrator at ABC.com. The company consists of a main office and a branch office.Both offices are part of a single Active Directory Domain Services domain named ABC.com. The two officesare connected by a slow WAN link.

All servers are located in the main office and run Windows Server 2008 R2. All client computers in both officesrun Windows 7 Enterprise.

The company has decided to deploy Remote Desktop Services for application consolidation purposes.

You install Windows Server 2008 R2 on a server in the main office and name it ABC-RDS1. You configureABC-RDS1 to run the Remote Desktop Session Host role.

Users in the branch office report slow performance when accessing applications on ABC-RDS1.

Page 51: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

You want to minimize the bandwidth used by branch office user's connections to ABC-RDS1.

How can you minimize the bandwidth used?

A. By installing a Global Catalog server in the branch office.B. By configuring ABC-RDS1 to allow computers from clients running any version of Remote Desktop.C. By selecting a lower connection speed in the Remote Desktop Connection options on each client computer

in the branch office.D. By selecting High Color (16 bit) in the Remote Desktop Connection options on each client computer in the

branch office.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 19You work as a network administrator at ABC.com. The company consists of a main office and two branchoffices. All three offices are part of a single Active Directory Domain Services domain named ABC.com. The

Page 52: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

two branch offices are connected by slow WAN links to the main office.

All servers run Windows Server 2008 R2 and all client computers run Windows 7 Enterprise.

A server named ABC-DC1 in the main office is configured as a domain controller and primary DNS server forthe domain.

You are configuring a Microsoft Application Virtualization (App-V) 4.6 environment.

You deploy Windows Server 2008 R2 servers in the main office and both branch offices.

You want users in each office to stream virtual applications from their local server. You also want the clients toautomatically receive any uABCrades to the virtual applications.

How should you configure the new servers?

A. You should install the Web Server (IIS) role on all three servers.B. You should install Microsoft System Center Application Virtualization Streaming Server on all three servers.C. You should install Microsoft System Center Configuration Manager on the main office server and install the

File Services role on the branch office servers.D. You should install Microsoft System Center Configuration Manager on the main office server and install the

Web Server (IIS) role on the branch office servers.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Application Virtualization (App-V) Management ServerThe App-V Management Server streams the package content and publishes the shortcuts and file-typeassociations to the App-V Client. The App-V Management Server also supports active upgrade, licensemanagement, and a database that can be used for reporting.Application Virtualization (App-V) Streaming ServerThe App-V Streaming Server hosts the packages for s treaming to App-V Clients in environments suchas branch offices, where the bandwidth of the conne ction to the App-V Management Server isinsufficient for streaming package content to clien ts. The Streaming Server contains only streamingfunctionality and does not provide you with the App -V Management Console or the App-V ManagementWeb Service.Application Virtualization (App-V) Data StoreThe App-V data store, in the SQL database, retains information related to the App-V infrastructure. Theinformation in the App-V data store includes all application records, application assignments, and which groupsmanage the Application Virtualization environment.Application Virtualization (App-V) Management ServiceThe App-V Management Service communicates read/write requests to the Application Virtualization data store.This component can be installed on the same computer as the App-V Management Server or on a separatecomputer with IIS installed.Application Virtualization (App-V) Management ConsoleThe App-V Management Console is a snap-in management utility for App-V Server administration. Thiscomponent can be installed on the same computer as the App-V Server or on a separate workstation that hasMMC 3.0 and .NET 2.0 installed.Application Virtualization (App-V) SequencerThe App-V Sequencer monitors and captures the installation of applications and creates virtual applicationpackages. The output of the Sequencer consists of the application icon, the OSD file containing applicationdefinition information, a package manifest file, and an SFT file containing the application’s content files.Optionally, a Windows Installer file can be created for installing the package without using the App-Vinfrastructure.Application Virtualization (App-V) ClientThe App-V Client is installed on the App-V Desktop Client computer or on the App-V Terminal Services Clientcomputer. It provides the virtual environment for the virtual application packages. The App-V Client manages

Page 53: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

the package streaming to the cache, virtual application publishing refresh, and interaction with the ApplicationVirtualization Servers.

QUESTION 20You work as a network administrator at ABC.com. The ABC.com network consists of an Active DirectoryDomain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. All clientcomputers run Windows 7 Enterprise.

The ABC.com virtualization environment includes Remote Desktop Services, Microsoft ApplicationVirtualization (App-V) 4.6 and Microsoft Enterprise Desktop Virtualization (MED-V).

Members of the ABC.com Sales team use portable computers and often work away from the office.

You want to create a virtualized application package that contains two Sales applications. The Salesapplications require authorization to run and will need to be available for offline use for the roaming Sales users.

Which three of the following steps describe how you should create the virtualized Sales application package?(Choose three. Each answer represents part of the solution).

A. You should use MED-V to create the package.B. You should use App-V to create the package.C. You should install the applications on a Remote Desktop Session Host server.D. You should configure the ApplicationSourceRoot registry key on each client computer.E. You should configure the AutoLoadTriggers, AutoLoadTarget and RequireAuthorizationCached registry

keys on each client computer.F. Log in to each client computer as administrator and launch one of the Sales applications.G. Log in to each client computer as the Sales user and launch one of the Sales applications.

Correct Answer: BEGSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 21Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host)server.

You need to ensure that remote desktop users can print only to the printers that are installed on the RDSession Host server.

What should you do?

A. Enable the Do not allow client printer redirection Group Policy setting.B. Disable the Do not allow client printer redirection Group Policy setting.C. Enable the Do not set default client printer to be default pri nter in a session Group Policy setting.D. Disable the Do not set default client printer to be default pri nter in a session Group Policy setting.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 54: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

http://technet.microsoft.com/en-us/library/cc731963(WS.10).aspx

QUESTION 22All Client computers in your company run Windows 7 Enterprise.

Users run Windows XP Mode guest virtual machines (VMs) on their computers. Each client computer runs twoguest VMs.

Each guest VM requires network connectivity to the other guest VM on the host computer, but most not havenetwork connecticity to the hostcomputer operating system or to the internet

You need to configure each guest VM to meet the requirements.

What should you do?

A. Set each VM network adapter to Not connected.B. Configure each VM to use one Internal Network network adapter.C. Configure each VM to use one Shared Networking (NAT) network adapter.D. Disable Integration Features for each VM. Configure Windows Firewall to allow incoming ICMP traffic, and

remove all other Windows Firewall exceptions

Correct Answer: BSection: (none)Explanation

Explanation/Reference:- Shared Networking (NAT) refers to a virtual NAT (Network Address Translation) which allows the VM toleverage the external TCP/IP network connected to the host. This is very useful if you regularly move the hostcomputer between different network configurations. NAT is the preferred networking option when there is ashortage of IP addresses, a need to ensure the VM’s IP address is not targetable from an external network, ora need for connecting using WWAN.

Page 55: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

- In contrast, Bridge mode uses the network adapter on the host. This option appears in the drop down menuas the name of the adapter. The VM is connected directly to the selected network connection of the Windows 7host, and will behave like a separate physical computer on the same network. If the host has a wirelessadapter, its name will appear in the dropdown list. In Bridge mode, Virtual Machine Network Services driverhelps redirect the incoming network traffic to the correct VM and associate the correct MAC address in alloutbound network traffic. In scenarios using VPN, Bridge mode is the preferred option.

- Choosing the option ‘Not connected’ disables the VM’s networking ability and completely isolates it from thenetwork.

- ‘Internal Network’ option enables networking among only the VMs on the single Windows 7 host.

http://blogs.technet.com/b/windows_vpc/archive/2009/09/26/networking-and-using-windows-xp-mode.aspx

Page 56: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Windows Server-based hosts on a perimeter network

Aperimeter networkis separate from an organization's internal network and the Internet and has the followingcharacteristics:Allows external users to access specific computers located on the perimeter network.Prevents access to computers on the organization's internal network.Can be set up to allow limited access from users on the internal network to computers located on the perimeternetwork.For example, a perimeter network can include the company's Web server so that it can deliver Web content tothe Internet. However, the perimeter network does not allow external users to access any private company dataon computers on the internal network. Even if an external user penetrates the perimeter network security, onlythe perimeter network servers might be compromised.

You can deploy virtual machines on a host on a perimeter network from within the internal network. However,after you deploy virtual machines on a host on a perimeter network, you cannot migrate those virtual machinesback to a host on the internal network or to another host on the perimeter network.

Because a perimeter network is separate from the internal network, security for a host on a perimeter networkmust be provided by a local service account.

QUESTION 23Your company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7.

You are deploying Microsoft Enterprise Desktop Virtualization (MED-V) virtual machines (VMs) on several clientcomputers.

You need to ensure that names of the new VMs follow a naming convention.

What should you do?

A. In the MED-V Management console, configure the Image Update Settings.B. In the MED-V Management console, add a script action and set the VM computer name pattern.C. In the VM, configure the Identification String option by using the Setup Manager Wizard.D. In the VM, run the System Preparation Tool (Sysprep) and choose to start the factory session after

rebooting.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:http://technet.microsoft.com/en-us/library/ff433616.aspx

Using Variables to Manage the Naming of your Persistent MED-V WorkspacesMany organizations want to use variables to simplify the naming and manageability of MED-V workspaces.While regular operating system environment variables cannot be used inside the workspace policy, MED-V hasvariables that can be used for persistent workspaces. The workspace policy must use the VM Setup script toimplement these variables.These variables can be selected when configuring the MED-V workspace policy inside the MED-Vmanagement console (run from the client.)To view and select these variables, do the following:1.) Log into the MED-V Management Server (policy server) using the MED-V Management utility.2.) When the policy loads, navigate to the Policy node.3.) Select your desired workspace, then click on the VM Setup Tab. (Be advised that this option is only availablefor persistent workspaces which is defined in the Virtual Machine tab.)4.) In the VM Setup tab you will see an option for "VM Computer Name Pattern" near the bottom of the page.

Page 57: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

The default pattern for the machine image name is: MED-V%workspace########## where %workspacerepresents the name of the workspace used by this image on the client computer. The remaining # charactersdenote a random generated character. It is here where you have the option to insert different variables andwhere you can define your own computer name pattern. The variables that can be used are:%Workspace : The name of the MED-V workspace being used by this image during the VM setup.%User : The name of the user logged on to MED-V during the VM setup.%Domain : The domain name (short name) of the authenticating MED-V Active Directory domain.%Hostname : The hostname of the physical machine running the MED-V Client using this workspace.%VMName: The name of the Virtual Machine name (Name of the virtual machine image file used by theworkspace.)

Examples:

If a user named Ernie from the domain CORPORATE logged on to a machine named CLIENT234 using theworkspace called IE_7 leveraging the image XP01 will have the following name translations after generation:VM Computer Name Pattern Actual NameMED-V%Domain##### MED-VCORPORATE5%Workspace-%User IE_7-ERNIE%UserMED-V ERNIEMED-V%Hostname-MEDV CLIENT234-MEDV%VMNameMEDV##### XP01MEDV64345NOTE: The maximum limit for a name is 15 characters. Any pattern that generates a result that exceeds thislimit will be truncated to the first 15 characters.

Page 58: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

5.) Once this is determined, you will need to include the action within the VM setup script. This will require youto click the "Script Editor" option under Persistent VM Setup. Click on this button. The "Rename Computer"Action is required to generate the computer name. Also note, this will need to be followed by a "RestartComputer" action.

QUESTION 24Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All client computers run Windows 7. You use Microsoft Enterprise Desktop Virtualization (MED-V) to support client virtualizationrequirements.

You need to ensure that all MED-V virtual machine (VM) images can be centrally stored and are available to allclient computers.

What should you do?

A. Install and configure IIS on a member server.B. Configure a shared folder on a member server.C. Create a visible workspace for client computers.D. Install and configure Microsoft SQL Server on a member server.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:An image repository is an optional server that is used for image distribution (where administrators upload newimages and client computers check the server every 15 minutes and update their image if a new one isavailable).An image distribution server requires the following:Internet Information Services (IIS)

During the IIS installation, when adding role services, select the following supported authentication methods:Basic AuthenticationWindows AuthenticationClient Certificate Mapping Authentication

Page 59: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

When configuring IIS, include the following:

Add a virtual directory, with the alias named MEDVImages . The physical path should point to the location ofthe images.Enable BITS.Add the following MIME types:

- .ckm (application/octet-stream) - .index (application/octet-stream )

On the MED-V site, add read permissions to Everyone .Restart IIS.

http://technet.microsoft.com/en-us/library/ff433547.aspx

QUESTION 25Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All client computers runWindows 7. Your environment includes Microsoft Enterprise Desktop Virtualization (MED-V).

You update the MED-V Workspace virtual machines (VMs) several times and notice that the server is runningout of disk space.

You need to configure the Workspace to minimize the disk space requirements.

What should you do? ( Need to validate the answer)

A. Configure the Workspace as revertible.B. Set an expiration date for the Workspace.C. Specify the number of image versions to keep.D. Specify that clients should use the Trim Transfer when downloading the images.

Page 60: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Base VHD + (User per computer x (Difference Disk + Saved State))

http://technet.microsoft.com/en-us/library/ff433598.aspxhttp://technet.microsoft.com/en-us/library/gg548584.aspx

If you are updating the image several times then you will have multiple workspace and the image will grow andconsume more space on the server.

http://technet.microsoft.com/en-us/library/gg548480.aspx

Calculate the Disk Space Requirements for Shared ME D-V Workspaces

If you are calculating for a shared MED-V workspace deployment on a single computer, then the number of users per computer in your calculation is always “1 ” because MED-V only configures a single differencingdisk for all users.

You can find the differencing disk and the saved state file for shared MED-V workspaces in %ProgramData%\Microsoft\Medv\AllUsers.

the default Image Update Settings of not enabling the Keep Only (#) Old Image Versions and

Suggest Update When A New Version Is Available.

Also accept the default setting of enabling Clients Should Use Trim Transfer When Downloading Images ForThis Workspace.

Trim Transfer is a MED-V technology that optimizes the process of deploying or updating a Workspace image

Page 61: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

to a client. Prior to MED-V deploying an image to a client, Trim Transfer indexes the client hard drive andcompares this data to the Workspace image, looking for duplicated operating system and application data.Once this process is complete, Trim Transfer will transfer only image data from the Repository Server thatdoesn’t already reside on the client hard disk, minimizing the amount of data transferred, optimizing networkbandwidth, and reducing deployment and update time.

Adding and Removing Applications on the Core Image

Although not considered a MED-V best practice, you can add and remove applications directly on the coreimage. After you have added or removed an application, you can redeploy the MED-V workspace back out toyour enterprise just as you deployed it originally.

For more information about how to add or remove applications on the core image, see Installing Applications ona Windows Virtual PC Image.

ImportantWe do not recommend this method of managing applications. If you add or remove applications on the coreimage and redeploy the MED-V workspace back out to your enterprise, first time setup must run again, and anydata saved on the virtual machine is lost.NoteEven though an application is installed into a MED-V workspace, you might also have to publish the applicationbefore it becomes available to the end user. For example, you might have to publish an installed application ifthe installation did not automatically create a shortcut on the Start menu. Likewise, to unpublish an application,you might have to manually remove a shortcut from the Start menu.By default, most applications are published at the time that they are installed, when shortcuts are automaticallycreated and enabled.

QUESTION 26Your organization has an Active Directory Domain Services (AD DS) domain. All client computers run Windows7.

You need to create a single distribution file containing Windows Virtual PC and a virtual machine image that willbe deployed to all the client computers.

What should you use?

A. Microsoft Deployment Toolkit (MDT) 2010B. Deployment Images Servicing and Management (DISM)C. Microsoft Enterprise Desktop Virtualization (MED-V) Packaging WizardD. Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 with a template

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 62: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Removable Media DeploymentRemovable media such as a DVD or USB storage device can also be used to initially deploy a MED-VWorkspace. The process for deploying a MED-V Workspace using removable media is provided in thefollowing steps:

1. Create the MED-V Workspace, and upload the packed image to the repository using the MED-VManagement Console. You can skip this step if you have already created theMED-V Workspace and image.

2. Download the image to the desired Management Console workstation using the MED-V ManagementConsole. The image files will be downloaded to C:\MED-V_Images\PackedImages\imagename directory on the local hard disk of the Management Console.

You can skip this step if you have already downloaded the MED-V Workspace and image.

3. To prepare for the Packaging Wizard deployment package process, create a local or network directory withseparate subdirectories for the MED-V client, Virtual PC, and .NET Framework installation files, and copy the associated setup files into these directories. The PackagingWizard will ask for the location of these installation files during this process.4. �On the MED-V Management Console top menu bar, select Tools Packaging Wizard.5. On the Packaging Wizard Deployment Package screen, click Next.6. On the Workspace Image screen, mark the check box to include the image in the package. Select the image we just downloaded and click Next.7. On the MED-V Installation Settings screen, select the path where we located the MED-V installation files,enter the MED-V server address and port, select Install MED-V Using Default Installation Settings if appropriate, and click Next.8. On the Additional Installations screen, select the appropriate check boxes and installation path for Virtual PC2007 SP1, Virtual PC QFE, and .NET Framework 2.0, and click Next.9. On the Finalize screen, enter the path for the package destination and package name, and click Finish.10. Copy the contents of the MED-V deployment package to the removable media (DVD or USB storagedevice). a. On the personal computer targeted for the Workspace deployment, insert the DVD or USB storagedevice that has the deployment package files that we previously copied. b. Open the removable media device, and launch the MedvAutorun.exe application. The MED-V screen willappear, asking if you would like to install the MED-V package now. The Installer screen will be also be displayed and will provide progress information for the installation ofVirtual PC 2007 SP1, Virtual PC 2007 SP1 Update, MED-V Client, and the importing of theWorkspace image. At the end of the process, the MED-V Installer window will display a message saying thatMED-V was successfully installed. c. The MED-VWorkspace is now ready to use.

Page 63: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 27Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All client computers runWIndows 7. Your environment includes Microsoft Enterprise Desktop Virtualization (MED-V).

You are preparing to update a MED-V Workspace that is used by 1000 client computers.

You need to minimize the network impact of updating the workspace.

What are the two possible ways to achieve this goal? (Each correct answer presents a complete solution.Choose two.)

A. Pack the Workspace images.B. Enable Trim Transfer on the Workspace.C. Send each virtual machine file storage folder to a compressed (zipped) folder.D. On each virtual machine file in the Workspace, enable file system compression.

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:http://technet.microsoft.com/en-us/library/ff433545.aspx

the default Image Update Settings of not enabling the Keep Only (#) Old Image Versions and Suggest UpdateWhen A New Version Is Available. Also accept the default setting of enabling Clients Should Use Trim Transfer When Downloading Images ForThis Workspace. Trim Transfer is a MED-V technology that optimizes the process of deploying or updating a Workspace imageto a client. Prior to MED-V deploying an image to a client, Trim Transfer indexes the client hard drive and compares thisdata to the Workspace image, looking for duplicated operating system and application data. Once this processis complete, Trim Transfer will transfer only image data from th e Repository Server that doesn’t alreadyreside on the client hard disk, minimizing the amou nt of data transferred, optimizing networkbandwidth, and reducing deployment and update time .

MED-V Trim Transfer Technology

The MED-V advanced Trim Transfer de-duplication technology accelerates the download of initial and updatedvirtual machine images over the LAN or WAN, thereby reducing the network bandwidth needed to transport aMED-V workspace virtual machine to multiple end users. This technology uses existing local data to build thevirtual machine image, leveraging the fact that in many cases, much of the virtual machine (for example,system and application files) already exists on the end user's disk. For example, if a virtual machine containingWindows XP is delivered to a client running a local copy of Windows XP, MED-V will automatically remove theredundant Windows XP elements from the transfer. To ensure a valid and functional workspace, the MED-Vclient cryptographically verifies the integrity of local data before it is utilized, guaranteeing that the local blocksof data are absolutely bit-by-bit identical to those in the desired virtual machine image. Blocks that do not matchare not used.

The process is bandwidth-efficient and transparent, and transfers run in the background, utilizing unusednetwork and CPU resources.

Page 64: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

When updating to a new image version (for example, when administrators want to distribute a new applicationor patch), only the elements that have changed ("deltas") are downloaded, and not the entire virtual machine,significantly reducing the required network bandwidth and delivery time.

0000

QUESTION 28All client computers in your company run Windows 7 Enterprise.

You are planning to deploy a custom application that runs only on Windows XP to all users.

You install Windows XP Mode on each host computers and install the application in the Windows XP guestvirtual machines (VMs). You verify that the application runs in the guest VMs.

An application shortcut does not appear on the Windows 7 host computers.

You need to ensure that the applications can be launched directly from Windows 7 host computers.

What should you do in the guest VMs?

A. Repair the application.B. Upgrade the Virtual PC Integration Components.C. Copy the application shortcut to the Start menu to All Users.

Page 65: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

D. Assign the Full Control permission to the application shortcut to the everyone group.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:http://blogs.technet.com/b/windows_vpc/archive/2009/11/02/publishing-virtual-applications-in-windows-virtual-pc.aspx

QUESTION 29Your organization has an Active Directory Domain Services (AD DS) domain. All client computers run Windows7.

You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage your Hyper-V hosts.Your environment includes Microsoft Enterprise Desktop Virtualizaetion (MED-V).

You plan to deploy a virtual machine (VM) image to all client computers.

You need to ensure that user state information is maintained between sessions in the VM.

What should you do?

A. Use VMM to configure placement settings.B. Configure MED-V revertible workspace policy.C. Configure MED-V persistent workspace policy.D. Use Hyper-V Manager to create a revert snapshot.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:The following MED-V workspace types are available:Persistent —In a persistent MED-V workspace, all changes and additions the user makes to the MED-Vworkspace are saved in the MED-V workspace between sessions. Additionally, a persistent MED-V workspaceis generally used in a domain environment.

Revertible —In a revertible MED-V workspace, at the completion of each session (that is, when the MED-Vworkspace is stopped), the MED-V workspace reverts to its original state during deployment. No changes oradditions that the user made are saved on the MED-V workspace between sessions. A revertible MED-Vworkspace cannot be used in a domain environment.

http://technet.microsoft.com/en-us/library/ff433566.aspx

QUESTION 30Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All client computers run Windows 7. You use Microsoft Enterprise Desktop Virtualization (MED-V).

You need to prepare the MED-V server for cluster mode.

What should you do?

A. Copy the ConfigurationServer folder to a network share.B. Add the Failover Clustering feature to the MED-V server.C. Add the Network Load Balancing (NLB) feature to the MED-V server.

Page 66: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

D. Migrate the MED-V server to a highly available virtual machine (HAVM).

Correct Answer: ASection: (none)Explanation

Explanation/Reference:To configure the MED-V server in cluster mode

1. Install and configure MED-V on one of the servers.2. Create a shared network in a central location where all of the servers can access it.3. Copy the contents of the <InstallDir>/Servers/ConfigurationServer folder to the shared network.4. Install MED-V server on all designated servers.5. On the shared network, assign full access to all MED-V server system accounts.6. On each server, do the following: a. In the <InstallDir>/Servers/ServerConfiguration.xml file, set the value of <StorePath> to the sharednetwork path. b. Copy the <InstsallDir>/Servers/KeyPair.xml file from the original server to all MED-V servers. c. Restart the MED-V service.

http://technet.microsoft.com/en-us/library/ff433584.aspx

The Global Data Location is a single location where all virtual applications on a computerare stored in an immutable state. This folder must be on a local drive and accessible to allusers who will log in to this machine. The preferred drive letter is a logical mount point onthe client and is a pointer to a local cache in the Global Data Location. The User-SpecificData Location is where the user’s application state is located. This can be a network shareto allow the user state to roam with the user. You should test to determine the size becausethe size of user states can vary widely across applications, and it could become too large toroam and lead to decreased user satisfaction.

How to Share Folders Between the Host and the MED-V Workspace

Page 67: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

This topic has not yet been rated Rate this topicUpdated: April 1, 2010

Applies To: Microsoft Enterprise Desktop Virtualization

You can share folders between the host and the MED-V workspace. The shared folders can be stored on thefollowing:

An external computer on the network

The host computer

The following procedures demonstrate how to share folders between the host and the MED-V workspace.

To share folders located on the network

Configure MED-V in full desktop mode.

In MED-V management, on the Network tab, click Use different IP address than host (Bridge).

Do the following on the host computer:

In Control Panel, click View network status and tasks, and set Network discovery to On.

On the Start menu, right-click Computer, and click Map network drive.

In the Map Network Drive dialog box, in the Drive field, select a drive.

NoteEnsure that the same drive letter is not in use on both computers.Click Browse.

In the Browse For Folder dialog box, browse to the shared drive, and click OK.

Click Finish.

Repeat step 3 in the MED-V workspace. Point to the same drive as on the host computer.

To share folders located on the host

Configure the folder to be shared with the appropriate permissions.

From the MED-V workspace, go to My network places and locate the shared folder.

From the MED-V workspace, locate the shared folder.

NoteEnsure that both the host and MED-V workspace computers are in the same domain or workgroup.

QUESTION 31Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All client computers runWindows 7.

Your environment includes Microsoft Enterprise Desktop Virtualization (MED-V). You use MED-V to supporttemporary test environments.

You need to ensure that the disk space used by obsolete Workspaces is automatically minimized.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two)

Page 68: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

A. Configure the Workspace as revertible.B. Set an expiration date for the Workspace.C. Specify the number of image versions to keep.D. Configure automatic deletion at the Workspace.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Workspace Deletion Options

The administrator can set the MED-V workspace deletion options for each user or group so that the MED-Vworkspace is automatically deleted under certain conditions.To set MED-V workspace deletion options1. In the Deployment pane, click Workspace deletion options . 2. In the Workspace Deletion Options dialog box, select from the following options:

The Workspace has been disabled —If the administrator disables the MED-V workspace, the MED-Vworkspace is deleted from the user or group computer.The Workspace has expired —If the MED-V workspace expires according to the date specified, the MED-Vworkspace is deleted from the user or group computer.User is offline for more than the allowed period —If the policy is not refreshed in the time period specifiedsince the user was offline, the MED-V workspace is deleted from the user or group computer.

3. Click OK.

http://technet.microsoft.com/en-us/library/ff433568.aspxhttp://technet.microsoft.com/en-us/library/ff433598.aspx

QUESTION 32Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All client computers runWindows 7. You manage client computers by using Microsoft System Center Configuraion Manager 2007 R2.

You are deploying Microsoft Enterprise Desktop Virtualization (MED-V) to support client virtualizationrequirements.

You need to ensure that administrators can centrally store MED-V logging information and generate reports.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Install and configure IIS on a member server.B. Configure a shared folder on a member server.C. Install and configure Microsoft SQL server 2008 on a member server.D. Configure Microsoft Asset Inventory Service on the Configuration Manager server.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Recommended System Configuration Memory 2 GB RAM or greater Processor Recommended: 2 GHz or faster Operating system Windows Server 2008 Standard/

Enterprise Edition Database MS SQL Server Enterprise/Express

Page 69: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Edition

QUESTION 33All client computers in your company run Windows 7. Windows Virtual PC is installed on all client computers.

You create and configure a virtual machine (VM) named Guest1.

You need to use the Guest1 virtual hard disk (VHD) as a base for additional VMs that will run on the same hostcomputer, and minimize the diskspace required for each new VM.

Which type of VHD should you create for the new VMs?

A. fixed sizeB. differencingC. dynamically expandingD. linked to a physical hard disk

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

http://technet.microsoft.com/en-us/library/dd440865(WS.10).aspx

QUESTION 34Your company has an Active Directory Domain Services (AD DS) domain that runs at the Windows Server2008 R2 functional level. All servers run Windows Server 2008 R2. All client computers run Windows XPProfessional.

You use the Key Management Service (KMS) to manage your volume license activations. All servers havebeen activated by using KMS.

Page 70: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

You deploy 20 Windows 7 virtual desktops. The virtual desktop operating systems do not activate.

You need to ensure that the virtual desktops activate by using KMS.

What should you do?

A. Deploy five more virtual desktops.B. Run slmgr.vbs with the -ato parameter.C. Use the Volume Activation Management Tool (VAMT).D. Raise the domain functions level to Windows Server 2008 R2.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:To manually activate KMS clients (for example, disconnected clients) before distributing them to users, use theControl Panel System item, or run slmgr.vbs /ato at an elevated command prompt. The Slmgr.vbs scriptreports activation success or failure and provides a result code. To perform activation, the KMS client musthave access to a KMS host on the organization’s network.

http://technet.microsoft.com/en-us/library/ee355153.aspx#E1AA

QUESTION 35Your company has Active Directory Domain Services (AD DS) domain. You install the Remote DesktopSession Host (RD Session Host) roleservice on a server that runs Windows Server 2008 R2. Client computers run Windows Vista and Windows 7.

You need to automate the migration of user settings from client computers to the RD Session Host Server.

Which tool should you use?

A. Windows Easy TransferB. User State Migration Tool (USMT)C. Windows System Image Manager (Windows SIM)D. Deployment Image Servicing and Mangaement (DISM)

Correct Answer: BSection: (none)Explanation

Explanation/Reference:- Microsoft® Windows® User State Migration Tool (USMT) migrates user files and settings during deploymentsof Microsoft Windows XP and Windows Vista. You can use USMT to perform unattended migrations and tomigrate files and settings for computers with multiple users. Also, with USMT you have the ability to encrypt andcompress the store. USMT is intended for administrators who are performing automated deployments.

- The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr, PEImg, and IntlConfgtools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of thefunctions of these three tools in a more efficient and standardized way, eliminating the source of many of thefrustrations experienced by current users of these tools.

- Windows System Image Manager (Windows SIM) is the tool used to create unattended Windows Setupanswer files. You can create an answer file by using information from a Windows image (.wim) file and acatalog (.clg) file. Component settings are added to an appropriate configuration pass in the answer file. Youcan also add packages to be installed during Windows Setup. The following topics describe conceptual

Page 71: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

information about Windows SIM.

QUESTION 36Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2.

You use a virtual desktop infrastructure (VDI) environment to provide access to applications. All virtual desktopcomputer objects are located inan organizational unit (OU) named VirtualDesktops. All client computer objects are located in an OU namedDesktops.

You need to ensure that all users receive the same desktop shortcuts, and that they are not able to modify theshortcuts from virtual desktops.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Create a mandatory user profile.B. Create a new default user profile.C. Create a Group Policy object (GPO) that configures the user profile. Link the GPO to the Desktops OU.D. Create a Group Policy object (GPO) that configures the user profile. Link the GPO to the VirtualDesktops

OU.

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:A mandatory user profile is a type of profile that administrators can use to specify settings for users. Onlysystem administrators can make changes to mandatory user profiles. Changes made by users to desktopsettings are lost when the user logs off.

http://msdn.microsoft.com/en-us/library/bb776892(VS.85).aspx

QUESTION 37Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All client computers runWindows 7. You have a Remote Desktop Session Host (RD Session Host) server and a Remote DesktopGateway (RD Gateway) server.

You change the configuration of Windows Firewall by using Group Policy. Users on the corporate network arethen unable to connect to their virtual desktops.

You need to ensure that users can connect to their virtual desktops.

What should you do? (Each correct answer presents part of the solutions. Choose two.)

A. Create a Windows Firewall inbound rule for port 443 on the RD Gateway server.B. Create a Windows Firewall inbound rule for port 443 on the RD Session Host server.C. Create a Windows Firewall inbound rule for port 3389 on the RD Gateway server.D. Create a Windows Firewall inbound rule for port 3389 on the RD Session Host server.

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:An RD Gateway server uses port 443, which transmits data through a Secure Sockets Layer (SSL) tunnel.

Page 72: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

http://windows.microsoft.com/en-us/windows7/What-is-a-Remote-Desktop-Gateway-server

QUESTION 38Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. You provide access to some applications through a virtual desktop infrastructure (VDI) environment.

All Remote Desktop Session Host (RD Session Host) server objects are located in an organizational unit (OU)named RDServers. All virtual desktop computers are located in an organizational unit (OU) namedVirtualDesktops. All other client computer objects are located in an OU named Desktops.

The system drive in each RD Session Host server is running out of free disk space.

You need to restrict the amount of disk space used by the roaming user profile cache.

What should you do?

A. Create a Group Policy object (GPO) that enables folder redirection for all users. Link the GPO to theRDServers OU.

B. Create a Group Policy object (GPO) that enables folder redirection for all users. Link the GPO to theVirtualDesktops OU.

C. Create a Group Policy object (GPO) that configures the Limit the size of the entire roaming user profilecache setting. Link the GPO tothe RDServers OU.

D. Create a Group Policy object (GPO) that configures the Limit the size of the entire roaming user profilecache setting. Link the GPO to the VirtualDesktops OU

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Roaming user profile cache management

A new Group Policy setting is available for Remote Desktop Services in Windows Server 2008 R2 that limits thesize of the overall profile cache. If the size of the profile cache exceeds the configured size, Remote DesktopServices deletes the least recently used profiles until the overall cache goes below the quota. You can configure the maximum size of the roaming user profile cache on an RD Session Host server byapplying the Limit the size of the entire roaming user profile c ache Group Policy setting. The Group Policysetting is located in Computer Configuration\Policies\Administrative Temp lates\Windows Components\Remote Desktop Services\Remote Desktop Session Hos t\Profiles . If you enable this policy setting, youmust specify a monitoring interval (in minutes) and a maximum size (in gigabytes) for the entire roaming userprofile cache. The monitoring interval determines how often the size of the roaming user profile cache ischecked.

http://technet.microsoft.com/en-us/library/dd560667(WS.10).aspx

QUESTION 39Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote DesktopSession Host (RD Session Host) roleservice on a server that runs Windows Server 2008 R2. All RD Session Host servers are located in anOrganizational Unit (OU) named RDSessionHosts. All user accounts are located in an OU named Employees.

Users connect to multiple RD Session Host servers by using the Remote Desktop Connection client on theirWindows 7 client computers.

Page 73: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

You need to ensure that users can access the files stored in their own Documents folders regardless of the RDSession Host server to which they are connected

What should you do?

A. Create a mandatory profile on each client computer.B. Create a mandatory profile on each RD Session Host server.C. Create a Group Policy object (GPO) that redirects the Documents folder, and link the GPO to the

employees OU.D. Create a Group Policy object (GPO) that redirects the Documents folder, and link the GPO to the

RDSessionHosts OU

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Folder Redirection

User settings and user files are typically stored in the local user profile, under the Users folder. The files in localuser profiles can be accessed only from the current computer, which makes it difficult for users who use morethan one computer to work with their data and synchronize settings between multiple computers. Twotechnologies exist to address this problem: Roaming Profiles and Folder Redirection. Both technologies havetheir advantages, and they can be used separately or together to create a seamless user experience from onecomputer to another. They also provide additional options for administrators managing user data.Folder Redirection lets administrators redirect the path of a folder to a new location. The location can be afolder on the local computer or a directory on a network file share. Users can work with documents on a serveras if the documents were based on a local drive. The documents in the folder are available to the user from anycomputer on the network. Folder Redirection is located under Windows Settings in the console tree when youedit domain-based Group Policy by using the Group Policy Management Console (GPMC). The path is [GroupPolicy Object Name]\User Configuration\Policies\Win dows Settings\Folder Redirection .

http://technet.microsoft.com/en-us/library/cc732275.aspxHow to configure Folder Redirection as an alternati ve to Roaming ProfilesCreate and configure a location for the folder redirection

1. Create a folder called ‘Fldredir’

2. Turn off inheritance on the folder and copy the permissions.

a. Click the Advanced button found on the Security tab.b. Clear Allow inheritable permissions to propagate to this object check box in the Advanced Security Settingsdialog box.c. Click Copy when prompted by the Security dialog box.

3. Click OK to return to the Security tab. Ensure we have the following permissions set:

Administrators: Full ControlSystem: Full ControlCreator Owner: Full ControlAuthenticated Users: Modify

5. Change permissions for Authenticated Users so they cannot access other users’ folders. You do this by:

a. Click Advanced on the Security tab.b. Click Authenticated Users, and then click Edit.c. On the Permissions Entry for ‘Fldrredir’ dialog box, drop down the Apply onto and select This folder only.d. Click OK twice.

Page 74: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Create a Group Policy Object to redirect selected profile components

1. Create a GPO and link to the OU. It needs to be linked to an Users OU

Page 75: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

2. Configure the GPO as follows (click on the image to zoom):

Page 76: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 77: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

3. Clear the old Roaming Profile path from user account properties

Verify the operation of Folder redirection

The user redirected folders should start appearing inside the ‘Fdlredir’

Page 78: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

*****EDIT*****

For ‘Documents’ folder: you need to choose ‘redirect…’ instead of ‘create…’ Otherwise the policy will createDocuments folder for each user.

QUESTION 40Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2.

Page 79: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

You are deploying Remote Desktop Services (RDS). You install a Remote Desktop Session Host (RD SessionHost) server in the environment.

You need to install Remote Desktop Services client access licenses (RDS CALs).

What should you do first?

A. Run the Install Licenses Wizard.B. Run the Manage RDS CALs Wizard.C. Add the Remote Desktop Licensing role service.D. Add the RD Session Host server to a new group in the Remote Desktop Connection Manager console.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:To use Remote Desktop Services, you must also have at least one license server deployed in yourenvironment. For small deployments, you can install both the RD Session Host role service and the RDLicensing role service on the same computer. For larger deployments, it is recommended that the RD Licensingrole service be installed on a separate computer from the RD Session Host role service.

http://technet.microsoft.com/en-us/library/dd983943(WS.10).aspx

QUESTION 41Your company has an Active Directory Domain Services (AD DS) domain. You have multiple Remote DesktopSession Host (RD Session Host)servers. You have 100 Windows Server 2008 R2 Remote Desktop Services client access licenses (RDS CALs)installed on your license server.

You need to return 10 RDS CALs to the pool on the license server.

What should you do?

A. Remove the Per User RDS CALs.B. Revoke the Per Device RDS CALs.C. Remove the Per Device RDS CALs.D. Repeat the installation of the RDS CALs.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:http://technet.microsoft.com/en-us/library/cc732416.aspx

QUESTION 42Your company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7.You have a Remote Desktop Session Host (RD Session Host) server.

You need to ensure that computer identities are validated before user authentication is performed.

What should you do?

A. Configure the Set TS Gateway authentication method Group Policy setting to Use smart card.B. Configure the Set TS Gateway authentication method Group Policy setting to Use locally logged-on

credentials.

Page 80: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

C. Enable the Configure server authentication for client Group Policy setting and then select Do notconnect if authentication fails.

D. Enable the Configure server authentication for client Group Policy setting and then select Alwaysconnect, even if authenticationfails.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:http://windows.microsoft.com/en-US/windows-vista/What-are-server-authentication-options

Page 81: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 43Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host)server.

You enable Microsoft Word as a RemoteApp application on the RD Session Host server.

Page 82: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

You need to ensure that the RemoteApp application opens when a user double-clicks a Word (.docx) file on aclient computer.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Create a Windows Installer (.wmi) file.B. Create a Remote Desktop Protocol (.rdp) file.C. In the properties of the RemoteApp application, enable the Allow any command-line arguments setting.D. Enable the Associate client extensions for this program with t he RemoteApp program setting for the

file.

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:RemoteApp Considerations

By using RemoteApp with App V it is possible to deploy virtual applications to users. However, configuring avirtual application for RemoteApp will require additional administrative steps and is not recommended. UsingRemoteApp with computer-based targeting, administrators can control which applications are available toindividual users by only deploying the RDP or MSI files to the appropriate users. This will achieve a similarfunctionality as a session-based desktop with user-based targeting, but will have the added benefit ofintegrating the virtual application into the user’s local desktop.

http://blogs.technet.com/b/appv/archive/2010/05/27/ the-app-v-4-6-for-rds-whitepaper-is-now-available.aspx

Distribute RemoteApp Programs to Users

Applies To: Windows Server 2008 R2You can distribute RemoteApp programs to users several ways. Depending on the method that you choose,users can:

Access a link to the program through RemoteApp and Desktop Connection by using RD Web Access. RD Web Access is a Remote Desktop Services role service that lets you make RemoteApp programs availableto users through RemoteApp and Desktop Connection. For more information, see Remote Desktop WebAccess (RD Web Access).

Double-click an .rdp file that has been created and distributed by their administrator. You can create a Remote Desktop Protocol (.rdp) file to distribute RemoteApp programs to users. For moreinformation, see Create an .rdp File. You can distribute an .rdp file to client computers by using your existingsoftware distribution process, such as Microsoft System Center Configuration Manager, or through a file share.

Double-click a program icon on their desktop or Sta rt menu that has been created and distributed bytheir administrator with a Windows Installer packag e. You can create a Windows Installer (.msi) package to distribute RemoteApp programs to users. For moreinformation, see Create a Windows Installer Package. To distribute a Windows Installer package to clientcomputers, you can use your existing software distribution process, such as Microsoft System CenterConfiguration Manager or Active Directory Group Policy. You can also make the Windows Installer packageavailable through a file share.

The Generate Microsoft Windows Installer (MSI) Package option creates an MSI file,which can be used to distribute this virtual application to a stand-alone machine withno need for a streaming server. This is helpful for contract or home workers who needaccess to an application but don’t have Active Directory domain access.

Page 83: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Understanding Supported Deployment ScenariosA very common misconception is to think that App-V is an all-or-nothing proposition requiringmuch complexity and architectural considerations. With the latest technologies built intothe App-V client, it is possible to get your feet wet with App-V with no additional backendinfrastructure whatsoever and achieve a very quick return on investment (ROI). In this scenario

App-V is reduced in complexity to that of a packaging technology. Chances are your organizationis already packaging or repackaging MSI files, so packaging to an App-V standard requireslittle extra training because it is a very similar skill set. Be sure that the business justification for an App-Vproject plays a central role in determining which deployment scenario you choose.shows high-level descriptions of the relative complexity of three deployment models.

Stand-alone MSI DeploymentWhen the App-V client is put into stand-alone mode, it does not change the nature of the virtualapplication. The application still exists virtually, and all of the benefits of isolation betweenapplications, packaging with dependencies, and others are still there. What is different, however,is that a sequencer-generated MSI file performs many of the functions of the managementserver, because in this model there is no management server or any other backend requirements.The MSI will copy the SFT file into cache, register file-type associations, and publishthe shortcuts to their locations specified during sequencing.A stand-alone MSI app is managed in a fashion similar to a locally installed application. Itwill register itself with Programs and Features (appwiz.cpl) and will be available to all usersof that PC. Since there is no streaming server to update the virtual app, it is also updated asa physical MSI using your existing processes. Nearly any form of distribution can deploy anApp-V MSI such as USB flash drive, DVD, UNC path, or Group Policy. A shrink-wrappedapplication installer to a deployed virtual application is essentially a three-step process, asshown in Figure

To configure an App-V client for stand-alone operation, first delete all applications listed inthe Application Virtualization Client console and make the following dword value changes inthe Registry:[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SoftGrid\4.5\Client\Configuration]"RequireAuthorizationIfCached"=dword:00000000[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SoftGrid\4.5\Client\Network]"AllowDisconnectedOperation"=dword:00000001

Page 84: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

"Online"=dword:00000000[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SoftGrid\4.5\Client\Permissions]"ToggleOfflineMode"=dword:00000000The last step is to reboot the machine. The machine is now configured as a stand-aloneclient. Remember that this can also be configured centrally via Group Policy with the MicrosoftApplication Virtualization Administrative Template.To install an MSI-wrapped virtual application, launch the MSI file located in the same folderas the virtual application’s SFT file

MSI Install of a virtual application

The stand-alone MSI deployment model is usually the best choice for the following scenarios:◆ In rarely connected or severely bandwidth-limited situations◆ Remote users or contractors who do not have access to Active Directory or to your App-V infrastructure◆ In mature environments where existing application deployment processes are extremely efficient

The stand-alone MSI deployment model’ considerations are◆ No centralized reporting◆ No package upgrade

Double-click a file where the file name extension i s associated with a RemoteApp program. If you distribute RemoteApp programs through Windows Installer packages, you can configure whether the RDSession Host server will take over client file name extensions for the RemoteApp program. For moreinformation, see Create a Windows Installer Package.

http://technet.microsoft.com/en-us/library/cc730603.aspx

QUESTION 44Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. You have a Remote Desktop Session Host (RD Session Host) server and a Remote Desktop WebAccess (RD Web Access) server.

Page 85: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

You enable several RemoteApp applications in the RD Session Host server.

You need to configure access to RemoteApp applications so that RD Web Access users see only applicationsto which they have been grantedaccess.

What should you do?

A. Set NTFS permissions on the installation folder for each RremoteApp application.B. Assign domain users and domain security groups to each RemoteApp application.C. Add domain users and domain security groups to the TS Web Access Computers security group on the RD

Session Host Server.D. Specify custom menu locations on the RD Session Host server for each domain security group by using a

Group Policy object (GPO).

Correct Answer: BSection: (none)Explanation

Explanation/Reference:You can specify which domain users and domain groups can see the icon for a RemoteApp program when theRemoteApp program is made available through RD Web Access. By default, all authenticated domain users willbe able to see the icon for a RemoteApp program on the Web site provided by RD Web Access.

http://technet.microsoft.com/en-us/library/dd851539.aspx

QUESTION 45Your company runs Remote Desktop Services. All client computers run Windows Vista SP2. You have aRemote Desktop Session Host (RD Session Host) server.

You need to deploy a RemoteApp application to client computers and ensure that the application appears onthe Start menu.

Which file type should you distribute to the client computers?

A. Windows Installer (.msi)B. Client Configuration File (.wcx)C. Remote Desktop Protocol (.rdp)D. RemoteApp Programs list and settings (.tspub)

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Users can run RemoteApp programs in a number of ways. They can:- Double-click a Remote Desktop Protocol (.rdp) file that has been created and distributed by theiradministrator.- Double-click a program icon on their desktop or Start menu that has been created and distributed by theiradministrator with a Windows Installer (.msi) package.- Double-click a file whose extension is associated with a RemoteApp program. (This can be configured by theiradministrator with a Windows Installer package.)- Access a link to the RemoteApp program on a Web site by using TS Web Access.

http://technet.microsoft.com/en-us/library/cc753844(WS.10).aspx

Page 86: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 46Your company has an Active Directory Domain Services (AD DS) domain.You install the Remote Desktop Session Host (RD Session Host) role service and the Microsoft ApplicationVirtualization (App-V) 4.6 client on a server that runs Windows Server 2008 You publish applicaions to the RD Session Host server by using App-V. Partner companies require access toan internal application. You provide each partner company with a preconfigured Remote Desktop Protocol(.rdp) file that enables the company to access the application by using the Connect From Anywhere feature.

You need to specify the protocol that each partner company must allow through its firewall to establish theconnection.

Which protocol should you specify?

A. RDPB. HTTPSC. RTSPD. RTSPS

Correct Answer: ASection: (none)Explanation

Explanation/Reference:http://blogs.technet.com/b/appv/archive/2010/05/27/the-app-v-4-6-for-rds-whitepaper-is-now-available.aspx

Microsoft Windows Server Remote Desktop ServicesMicrosoft’s solution for presentation virtualization has traditionally been called Terminal Services.In Windows Server 2008 R2, Terminal Services has been renamed to Remote DesktopServices (RDS) to better reflect the solution’s abilities to deliver both presentation virtualizationand VDI services.Microsoft Windows Server 2008 R2 RDS can be used to deliver a desktop environment toan endpoint device via RDP. This can be accomplished via the Microsoft Remote Desktop Connection, with aweb browser via (RD) Web Access and via the Windows 7 Start menu. Inaddition, the RD gateway can also be used to provide remote access to an organization’s RDSapplications and remote desktops via RDP over HTTPS.

QUESTION 47Your company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7.You have a Remote Desktop Session Host (RD Session Host) server.

You have the following requirements:

Local devices from remote desktop clients must be redirected to the RD Session Host server.USB devices from remote desktop clients must not be redirected to the RD Session Host server.

What should you do?

A. Disable drive redirection on the remote desktop clients.B. Disable drive redirection on the RD Session Host server.C. Enable the Prevent installation of removable devices Group Policy Setting on the remote desktop clients.D. Enable the Prevent installation of removable devices Group Policy setting on the RD Session Host

server.

Correct Answer: ASection: (none)Explanation

Page 87: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Explanation/Reference:Do not allow drive redirection

Specifies whether to prevent the mapping of client drives in a Remote Desktop Services session (driveredirection).By default, an RD Session Host server maps client drives automatically upon connection. Mapped drivesappear in the session folder tree in Windows Explorer or Computer in the format <driveletter> on<computername>. You can use this setting to override this behavior.If the status is set to Enabled, client drive redirection is not allowed in Remote Desktop Services sessions.If the status is set to Disabled, client drive redi rection is always allowed.If the status is set to Not Configured, client drive redirection is not specified at the Group Policy level. However,an administrator can still disable client drive redirection by using the Remote Desktop Session HostConfiguration tool.

http://technet.microsoft.com/en-us/library/ee791794(WS.10).aspx

Prevent Installation of Removable Devices

You can use this procedure to prevent installation of any removable device.A device is considered removable when its device driver, or the device driver for the bus to which the device isattached, reports that it is a removable device.If this policy is enabled, in addition to preventing installation of the affected devices, it also prevents users fromupdating the device drivers for already installed devices that match the policy.Membership in the local Administrators group, or equivalent, is the minimum required to complete thisprocedure.

http://technet.microsoft.com/en-us/library/cc753539(WS.10).aspx

QUESTION 48Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2.

You need to deploy Microsoft Application Virtualization (App-V) 4.6 in a stand-alone configuration.

Which should you install?

A. Microsoft Application Virtualization DatabaseB. Microsoft Application Virtualization Desktop ClientC. Microsoft System Center Application Virtualization Streaming ServerD. Microsoft System Center Application Virtualization Management Server

Correct Answer: BSection: (none)Explanation

Explanation/Reference:http://www.microsoft.com/systemcenter/appv/infrastructure.mspx

QUESTION 49Your company uses Microsoft Application Virtualizaetion (App-V). Your environment includes multiple clientcomputer configurations, as shown in the following table.

Page 88: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

You need to deploy a 32-bit application to all client computers.

Which reference computer configuration should you use?

A. Config1 with App-V Sequencer 4.5 32-bitB. Config2 with App-V Sequencer 4.6 64-bitC. Config3 with App-V Sequencer 4.6 32-bitD. Config4 with App-V Sequencer 4.6 64-bit

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Sequence to the lowest operating system version used in the target environment. If your client computers runmultiple operating systems at various service pack levels, and it is not practical to sequence the applicationsmultiple times, sequence to the lowest common denominator. However, there is no guarantee that anapplication sequenced on one operating system functions as expected on a different operating system. Forexample, if anapplication is known not to function on Windows 7, sequencing it on Windows XP and deploying it to Windows7 will not work.

MOC 10324A Student Handbook

We need to deploy a 32-bit application to all clients. (B and D are eliminated)

Considering Vista and Windows 7, we have to take the older version to support the old version of OS.

QUESTION 50Your computer has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All portable computers runWindows 7. You virtualize applications by using Microsoft Application Virtualization (App-V).

You are deploying servers to five new branch offices. Each branch office has its own subnet, and will streamvirtual applications from a local IISserver. Users frequently move between branch offices with their portable computers.

You need to ensure that branch office users access virtualized application only from the local IIS server.

What should you do? (Need to have confirmation on this answer)

A. Create a single DNS SRV record that contains all servers.B. Create a single DNS A record and configure a HTTP host header for each IIS server.C. Create five DNS A records with the same name. Point each A record to a different IIS server and disable

the round robin options.D. Create five DNS CNAME records wih the same name. Point each CNAME record to a single IIS server.

Disable the netmask orderingoption.

Correct Answer: B

Page 89: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Section: (none)Explanation

Explanation/Reference:

http://technet.microsoft.com/en-us/library/cc753195(WS.10).aspx

QUESTION 51All client computers in your environment run Windows 7. You virtualize applications by using MicrosoftApplication Virtualization (App-V).

You need to reset the FileSystem cache on a client computer.

What should you do?

A. Use the AppVCacheSize to set the maximum cache size to 0.B. Use the AppVCacheSize tool to set the minimum free disk space threshold to 0.C. Set the HKLM\SOFTWARE\Microsoft\SoftGrid\4.5\Client\AppFS\S tate registry key to 0.D. Set the HKLM\SOFTWARE\Microsoft\SoftGrid\4.5\Client\AppFS\F ileSize registry key to 0.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:How to Reset the FileSystem Cache

Resetting the FileSystem cache is not something that should usually be necessary. However if you need tocompletely reset the FileSystem cache, perhaps for troubleshooting purposes, you can use the followingprocedure. Administrative rights are required to perform this action.

To reset the FileSystem cacheSet the following registry value to 0 (zero):HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SoftGrid\4.5\Client\AppFS\StateRestart the computer.

http://technet.microsoft.com/en-us/library/cc843790.aspx

QUESTION 52

Page 90: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Your company uses Microsoft Application Virtualization (App-V).

You maintain the sequencing for applications.

You need to add a template to an exisiting sequenced application.

What should you do?

A. Edit the application, add the template, and then save the application with a new name.B. Sequence the template as a new application to the original application installation folder.C. Restore the sequencing computer and add the template to the original application installation folder.D. Upgrade the existing sequencing package, add the template to the package, and then save the application.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:http://technet.microsoft.com/en-us/library/cc843764.aspx

QUESTION 53Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All client computers run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App-V).

You are deploying servers to five new branch offices. Each branch office will stream virtual applications from alocal file server and performapplication sequencing locally.

You need to replicate application packages to all file servers and minimize bandwidth usage.

What should you do?

A. Create a Distributed File System (DFS) root on each file server.B. On each file server, add the BranchCache for network files role service.C. Creates an Active Directory Distributed File System (DFS) root target folder.D. Create a Distributed File System Replication (DFSR) full mesh replication group.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Distributed File System

Distributed File System (DFS) Namespaces and DFS Replication offer simplified, highly-available access tofiles, load sharing, and WAN-friendly replication. In the Windows Server® 2003 R2 operating system, Microsoftrevised and renamed DFS Namespaces (formerly called DFS), replaced the Distributed File System snap-inwith the DFS Management snap-in, and introduced the new DFS Replication feature. In the Windows Server®2008 operating system, Microsoft added the Windows Server 2008 mode of domain-based namespaces andadded a number of usability and performance improvements.

What does Distributed File System (DFS) do?The Distributed File System (DFS) technologies offer wide area network (WAN)-friendly replication as well assimplified, highly-available access to geographically dispersed files. The two technologies in DFS are thefollowing:DFS Namespaces . Enables you to group shared folders that are located on different servers into one or more

Page 91: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

logically structured namespaces. Each namespace appears to users as a single shared folder with a series ofsubfolders. This structure increases availability and automatically connects users to shared folders in the sameActive Directory Domain Services site, when available, instead of routing them over WAN connections.

DFS Replication . DFS Replication is an efficient, multiple-master replication engine that you can use to keepfolders synchronized between servers across limited bandwidth network connections. It replaces the FileReplication Service (FRS) as the replication engine for DFS Namespaces, as well as for replicating the AD DSSYSVOL folder in domains that use the Windows Server 2008 domain functional level.

http://technet.microsoft.com/en-us/library/cc753479(WS.10).aspx

BranchCache

Key BranchCache design pointsWhile you design your BranchCache solution, it is useful to remember the following key points:BranchCache can decrease wide area network traffic between computers that are running Windows Server®2008 R2 and computers that are running Windows® 7.

BranchCache has two modes of operation, distributed cache mode and hosted cache mode. When the contentcache at a branch office is distributed among client computers, BranchCache is running in distributed cachemode. When the content cache at a branch office is hosted on a server computer, BranchCache is running inhosted cache mode.

BranchCache is installed by default on client computers running Windows® 7 Enterprise and Windows® 7Ultimate, however you must enable BranchCache and create firewall exceptions to allow BranchCache trafficbetween client computers.

BranchCache supports the optimization of downloads over end-to-end secure transports such as HypertextTransfer Protocol Secure (HTTPS) and Internet Protocol security (IPsec).

To cache application and Web server content that is sent to branch offices over Hypertext Transfer Protocol(HTTP), you must install the BranchCache feature on the application server or Web server whose content youwish to cache in branch offices.

To cache File Server content that is sent to branch offices using the Server Message Block (SMB) protocol, the BranchCache for network files role service of the File Server role in Windows Server 2008 R2 must beinstalled and enabled.

BranchCache might not function correctly when used in combination with a hardware-based WAN accelerator,because WAN accelerators might alter the fields and messages that are necessary for BranchCache operation.When you deploy a WAN accelerator with BranchCache, BranchCache might work for some protocols, but notfor other protocols. For example, some WAN accelerators cannot process server message block (SMB) 2.1,but can process HTTP and HTTPs. Review your WAN accelerator documentation for more information.

BranchCache is designed to prevent unauthorized access to content. Before transfer between peers orbetween clients and the hosted cache server, content is encrypted by BranchCache. Content can only bedecrypted using the identifiers provided by the content server in the main office. The content server providesidentifiers only to authenticated clients that are members of the same domain as the content server.

Distributed cache mode is best suited for small branch offices that do not contain a local server for use as ahosted cache server. Distributed cache mode allows you to deploy BranchCache with minimal hardwaredeployments in branch offices. However, if the branch office contains additional infrastructure, such as one ormore servers that are running other workloads, deploying BranchCache in hosted cache mode might bebeneficial for the following reasons:

Increased cache availability . Hosted Cache mode increases the cache efficiency because content is availableeven if the client that originally requested and cached the data is offline. Because the hosted cache server isalways available, more content is cached, providing greater WAN bandwidth savings, and BranchCacheefficiency is improved.

Page 92: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Centralized caching for multiple-subnet branch offi ces . Distributed cache mode operates on a singlesubnet. At a multiple-subnet branch office that is configured for distributed cache mode, a file downloaded toone subnet cannot be shared with client computers on other subnets. Because of this, clients on other subnets,unable to discover that the file has already been downloaded, get the file from the main office content server,using WAN bandwidth in the process. When you deploy hosted cache mode, however, this is not the case - allclients in a multiple-subnet branch office can access a single cache, which is stored on the hosted cacheserver, even if the clients are on different subnets. If you have a multiple-subnet branch office with less than100 users, therefore, using hosted cache mode is recommended.

You can use the following guidelines to determine the mode in which you want to deploy BranchCache:For a branch office that contains less than 100 users and does not have any local servers, use distributedcache mode.

For a branch office (either single subnet or multiple-subnet) that contains less than 100 users and also containsa local server that you can use as a hosted cache server, use hosted cache mode.

For a multiple-subnet branch office that contains more than 100 users, but less than 100 users per subnet, usedistributed cache mode.

http://technet.microsoft.com/en-au/library/ee307962(WS.10).aspx

QUESTION 54Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. The Remote Desktop Services (RDS) environment includes a Remote Dekstop Session Host (RDSession Host) server in the LAN environment, and a Remote Desktop Gateway (RD Gateway) server in theperimeter network (also known as DMZ).

You deploy a Remote Desktop Web Access (RD Web Access) server in the perimeter network. You publish aRemoteApp application. The RemoteApp application is not visible to users when they log in to AD Web Access.

You need to ensure that authorized users can run RemoteApp applications from RD Web Access.

What would you do?

A. Restart the World Wide Web Publishing Service on the RD Web Access server.B. Disable Forms Authentication on the Default Web Site on the RD Web Access server.C. Allow Windows Management Instrumentation (WMI) communication between the RD Gateway server and

the RD Session Host server.D. Allow Windows Management Instrumentation (WMI) communication between the RD Web Access server

and the RD Session Host server.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Configure the TS Web Access server to allow access from the Internet

To allow users to access the TS Web Access server from the Internet, the recommended configuration is toplace both the TS Gateway server and the TS Web Access server in the perimeter network, with the terminalservers that host RemoteApp programs behind the internal firewall. Alternatively, you can deploy TS Web Access on the internal network, and then make the Web site availablethrough Microsoft Internet Security and Acceleration (ISA) Server. If you deploy TS Web Access in the perimeter network, you must configure your firewall to allow WindowsManagement Instrumentation (WMI) traffic from the TS Web Access server to the terminal server.

http://technet.microsoft.com/en-us/library/cc730673(WS.10).aspx

Page 93: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 55Your computer has an Active Directory Domain Services (AD DS) domain. You have a main office and a branchoffice that are connected by a slowWAN link. All servers are located in the main office.

You virtualize an application by using Microsoft Application Virtualizaetion (App-V) 4.5. The available bandwidthis not sufficient for branch office users to run the virtualized application.

You need to ensure that branch office users can run the virtualized application by using the MicrosoftApplication Virtualization Desktop Client.

What should you do?

A. Configure BranchCache in Distributed Cache mode.B. On each client computer in the branch office, upgrade the App-V desltop client to 4.6.C. On each client computer in the branch office, install the application by using Windows Installer (.msi) files

created by the App-V Sequencer.D. In the Microsoft System Center Application Virtualization Management Server, configure an Application

Virtualization file server for the mainoffice.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:App-V Standalone mode enables you to deploy MSI wrapped virtual applications seamlessly via CD, USB, or byintegrating with your existing software delivery system.

http://www.microsoft.com/systemcenter/appv/infrastructure.mspx

Page 94: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 56

Page 95: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All client computers runWindows 7.

Your environment includes Microsoft Enterprise Desktop Virtualization (MED-V). You use MED-V to supporttemporary test environments.

You need to ensure that the disk space used by obsolete Workspaces is automatically minimized.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two)

A. Configure the Workspace as revertible.B. Set an expiration date for the Workspace.C. Specify the number of image versions to keep.D. Configure automatic deletion at the Workspace.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Workspace Deletion Options

The administrator can set the MED-V workspace deletion options for each user or group so that the MED-Vworkspace is automatically deleted under certain conditions.To set MED-V workspace deletion options1. In the Deployment pane, click Workspace deletion options . 2. In the Workspace Deletion Options dialog box, select from the following options:

The Workspace has been disabled —If the administrator disables the MED-V workspace, the MED-Vworkspace is deleted from the user or group computer.The Workspace has expired —If the MED-V workspace expires according to the date specified, the MED-Vworkspace is deleted from the user or group computer.User is offline for more than the allowed period —If the policy is not refreshed in the time period specifiedsince the user was offline, the MED-V workspace is deleted from the user or group computer.

3. Click OK.

http://technet.microsoft.com/en-us/library/ff433568.aspxhttp://technet.microsoft.com/en-us/library/ff433598.aspx

QUESTION 57Your company uses Microsoft Application Virtualization (App-V).

You maintain the sequencing for applications.

You need to add a template to an exisiting sequenced application.

What should you do?

A. Edit the application, add the template, and then save the application with a new name.B. Sequence the template as a new application to the original application installation folder.C. Restore the sequencing computer and add the template to the original application installation folder.D. Upgrade the existing sequencing package, add the template to the package, and then save the application.

Correct Answer: DSection: (none)Explanation

Page 96: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Explanation/Reference:http://technet.microsoft.com/en-us/library/cc843764.aspx

QUESTION 58Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All client computers runWindows 7.

Your environment includes Microsoft Enterprise Desktop Virtualization (MED-V). You use MED-V to supporttemporary test environments.

You need to ensure that the disk space used by obsolete Workspaces is automatically minimized.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two) (notsure about the below choice)

A. Configure the Workspace as revertible.B. Set an expiration date for the Workspace.C. Specify the number of image versions to keep.D. Configure automatic deletion at the Workspace.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Workspace Deletion Options

The administrator can set the MED-V workspace deletion options for each user or group so that the MED-Vworkspace is automatically deleted under certain conditions.To set MED-V workspace deletion options1. In the Deployment pane, click Workspace deletion options . 2. In the Workspace Deletion Options dialog box, select from the following options:

The Workspace has been disabled —If the administrator disables the MED-V workspace, the MED-Vworkspace is deleted from the user or group computer.The Workspace has expired —If the MED-V workspace expires according to the date specified, the MED-Vworkspace is deleted from the user or group computer.User is offline for more than the allowed period —If the policy is not refreshed in the time period specifiedsince the user was offline, the MED-V workspace is deleted from the user or group computer.

3. Click OK.

Page 97: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

The first option controls how many versions will be maintained on the MED-V client before the images will bedeleted (oldest first.) The second option will determine if the user will be prompted when a new version is madeavailable. The third option will determine if TrimTransfer is going to be used when downloaded updated imageversions. Please note that this option also turns on local image indexing which will always run the first time aworkspace is started prior to initial image download.

http://technet.microsoft.com/en-us/library/ff433568.aspxhttp://technet.microsoft.com/en-us/library/ff433598.aspx

QUESTION 59Your companys main office and a branch office are connected by a slow WAN link. All servers run WindowsServer 2008 R2. All client computers run Windows 7. You install an application on a Remote Desktop SessionHost (RD Session Host) server. Users in the branch office experience slow performance when accessing theapplication through Remote Desktop. You need to minimize the bandwidth utilization to the RD Session Hostserver. What should you do?

A. Configure BranchCache in Hosted Cache mode.B. On the RD Session Host server, configure the RDP-TCP properties to allow only Network Level

Authentication.C. On each client computer, set the display colors in the Remote Desktop Connection client to High Color (15

bit).D. On each client computer, configure the Connect From Anywhere settings in the Remote Desktop

Connection client.

Page 98: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Choosing 15 bit color will diminish the graphic quality you see on the child computer, but unless you’re usingPhotoshop or other graphic intensive programs on the child computer, the difference won’t matter. And, the lessvisual data that has to be streamed back to the parent computer means a snappier remoting experience!

Page 99: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 60Your company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7.You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that each user isauthenticated to the RD Session Host server before a session is created. What should you do?

A. Set the security layer option to SSL (TLS 1.0).B. Set the encryption level option to FIPS Compliant.C. Set the log on option to Always prompt for password.D. Set the security option to Allow connections only from computers running Remote Desktop with Network

Level Authentication.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 100: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 61Your organization has an Active Directory Domain Services (AD DS) domain. All client computers run Windows7. You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage your Hyper-V hosts. Your environment includes Microsoft Enterprise Desktop Virtualization (MED-V).You plan to deploy a virtual machine (VM) image to all client computers.You need to ensure that user state information is maintained between sessions in the VM. What should youdo?

A. Use VMM to configure placement settings.B. Configure a MED-V revertible workspace policy.C. Configure a MED-V persistent workspace policy.D. Use Hyper-V Manager to create a revert snapshot.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 101: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

A revertible VM is a MED-V Workspace image that returns to its original state after each session. Leave theSynchronize Workspace Time Zone With Host option at its defaultsetting of being selected.

A Workspace can also be configured to be persistent. A persistent VM is a MED-V Workspace image thatsaves its state after each session. Other options for a persistentWorkspace include shutting down the VM when stopping the Workspace, logging into Windows, running in theVM, and using MED-V credentials to support Single Sign-on (SSO).

Client virtualization is the decoupling of computer resources on the client endpoint device,such as hardware, operating system, applications, and user settings and data. Virtualizationsolutions including desktop virtualization, application virtualization, and user-state virtualizationenable the decoupling or separation of client computing resources. This separationprovides a more flexible or agile environment, reducing complexity and costs and improvingdeployment, security, and manageability. All of these benefits have the potential to improve theoverall desktop environment. A model of the traditional client endpoint device and virtualizedclient architecture is illustrated in Figure

Page 102: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 62All client computers in your company run Windows 7.Windows Virtual PC is installed on all client computers.You create and configure a virtual machine (VM) named Guest1. You need to use the Guest1 virtual hard disk (VHD) as a base for additional VMs that will run on the same hostcomputer, and minimize the disk space required for each new VM. Which type of VHD should you create for thenew VMs?

A. fixed sizeB. differencingC. dynamically expandingD. linked to a physical hard disk

Correct Answer: BSection: (none)Explanation

Explanation/Reference:http://technet.microsoft.com/en-us/library/gg548480.aspx

Differencing . A differencing virtual hard disk stores the differences from the virtual hard disk on themanagement operating system. This allows you to isolate changes to a virtual machine and keep a virtual harddisk in an unchanged state. The differencing disk on the management operating system can be shared withvirtual machines and, as a best practice, must remain read-only. If it is not read-only, the virtual machine’svirtual hard disk will be invalidated.

Base VHD + (User per computer x (Difference Disk + Saved State))

To calculate the required disk space, determine the following:

Page 103: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Size of the base VHD – the virtual hard disk that was used to create the MED-V workspace.

Do not use the .medv file size for your calculation because the .medv file is compressed.Users per computer – MED-V creates a MED-V workspace for each user on a computer; the MED-Vworkspace consumes disk space as each user logs on and the MED-V workspace is created.Size of the differencing disk – used to track the difference from the base VHD. This size varies as you addapplications and software updates to the virtual hard disk. A differencing disk is created for each MED-V userwhen they start MED-V for the first time.Size of the Saved State file – used to maintain state in the virtual machine. Typically, this is just a bit largerthan the allocated RAM for the virtual machine. For example, 1 GB of RAM allocated creates a file about1,081,000 KB.The following example shows a calculation based on three users of a MED-V workspace that has a 2.6 GBvirtual hard disk:2.6gb + (3 x (1.5gb + 1gb)) = 10.1gb

A MED-V best practice is to calculate the required space by using a lab deployment to validate the requirements.Locate the Files to Determine File SizeThe following locations contain the files for the computer and user settings:

Type Location Files

Base VHD %ProgramData%\Microsoft\Medv\Workspace InternalName .vhd - WhereInternalNamethat you selected in the MED-V Workspace Packager.

DifferencingDisk

%LocalAppData%\Microsoft\MEDV\v2\VirtualMachines

WorkspaceName .vhd

Saved StateFile

%LocalAppData%\Microsoft\MEDV\v2\VirtualMachines

WorkspaceName .vsv

Calculate the Disk Space Requirements for Shared MED-V WorkspacesIf you are calculating for a shared MED-V workspace deployment on a single computer, then the number ofusers per computer in your calculation is always “1” because MED-V only configures a single differencing diskfor all users.You can find the differencing disk and the saved state file for shared MED-V workspaces in %ProgramData%\Microsoft\Medv\AllUsers.

Bump

Page 104: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 63All client computers in your company run Windows 7 Enterprise. You are planning to deploy a custom application that runs only on Windows XP to all users. You install Windows XP Mode on each host computer and install the application in the Windows XP guestvirtual machines (VMs). You verify that the application runs in the guest VMs. An application shortcut does not appear on the Windows 7 host computers. You need to ensure that the application can be launched directly from the Windows 7 host computers. What should you do in the guest VMs?

A. Repair the application.B. Upgrade the Virtual PC Integration Components.C. Copy the application shortcut to the Start menu for All Users.D. Assign the Full Control permission to the application shortcut to the Everyone group.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 105: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 64Your company has an Active Directory Domain Services (AD DS) domain that runs at die Windows Server 2008functional level.All domain controllers run Windows Server 2008 R2 (Core Installation).You have a Remote Desktop Services infrastructure that Includes a Remote Desktop Connection Broker (RDConnection Broker) server and a Remote Desktop Session Host (RD Session Host) server in redirection mode.You configure a virtual machine (VM) as a personal virtual desktop for an employee.The Personal Virtual Desktop tab is not visible when you display the properties or the employee's user account.You need to assign a personal virtual desktop to the user account.What should you do?

A. Use the Active Directory Users and Computers console on a server that runs Windows Server 2008 R2.B. Raise the domain functional level to Windows Server 2008 R2.C. Configure a virtual desktop pool on the RD Connection Broker server. Add the VM to the pool.D. Run the Configure Virtual Desktops Wizard.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Page 106: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 65Your organization has an Active Directory Domain Services (AD DS) domain, You use Microsoft System CenterVirtual Machine Manager (VMM) 2008 R2 to manage your Hyper-V hosts.

Your environment includes Windows Server Update Services (WSUS).

You create a new Windows 7 virtual machine (VM) image and run the sysprep /oobe /generalize /shutdowncommand. You store the image in the VMM library.

You need to apply operating system updates to the image without affecting licensing or activation status of theimage.

What should you do?

A. Use the Deployment Image Servicing and Management (DISM) tool to service an offline image.B. Use VMM to deploy the image, and then apply the operating system updates.C. Use the Windows Optional Component Setup (OCSetup.exe) tool with an online image.D. Use the Sysprep Tool to service the image.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Page 107: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

http://www.elbacom.com/blog/page/6/

Page 108: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 66Your companys main office and a branch office are connected by a slow WAN link. All servers run Windows Server 2008 R2. All client computers run Windows 7.

You install an application on a Remote Desktop Session Host (RD Session Host) server. Users in the branch office experience slow performance when accessing the application through RemoteDesktop.

You need to minimize the bandwidth utilization to the RD Session Host server.

What should you do?

A. Configure BranchCache in Hosted Cache mode.B. On the RD Session Host server, configure the RDP-TCP properties to allow only Network Level

Authentication.C. On each client computer, configure the Remote Desktop Connection Client Experience.D. On each client computer, configure the Connect From Anywhere settings.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 109: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 67Your company runs Remote Desktop Services on Windows Server 2008. You have a Remote Desktop Session Host (RD Session Host) server.You plan to install an application on the RD Session Host server by running a setup.exe file.You need to ensure that the application will install properly and be useable by all users on the RD Session Hostserver.What should you do first on the RD Session Host server?

A. Run the Change user /install command.B. Set the Remote Desktop licensing mode to RDS Per User CAL.C. Run the Change user /execute command.D. Set the Remote Desktop licensing mode to RDS Per Device CAL.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:http://support.microsoft.com/kb/320185

You must put a Terminal Services server in Install mode to install or remove programs on the server. You canput a Terminal Services server in Install mode either by using the Add/Remove Programs tool in Control Panelto add or remove a program, or by using the change user command at a command prompt. This articledescribes how to use the change user command.

Page 110: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

To Switch Terminal Services to Install ModeWhen you want to add or remove programs, put the Terminal Services server in Install mode. To do this:Click Start, and then click Run.In the Open box, type cmd, and then click OK.At the command prompt, type change user /install , and then press ENTER. The following messageappears:User session is ready to install applications.Type exit, and then press ENTER.Add or remove the programs that you want.Back to the topTo Switch Terminal Services to Execute ModeWhen you are finished adding or removing programs, return the Terminal Services server to Execute mode. Todo this:Click Start, and then click Run.In the Open box, type cmd, and then click OK.At the command prompt, type change user /execute , and then press ENTER. The following messageappears:User session is ready to execute applications.Type exit, and then press ENTER.

QUESTION 68You have an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7.All client computers are configured to extend the desktop display across two monitors.You have a Remote Desktop Session Host (RD Session Host) server.You need to ensure that users can extend the Remote Desktop Connection window across both monitors.What should you do?

A. Configure the screen resolution of the RD Session Host server.B. Configure the Ease of Access options on the RD Session Host server.C. Configure the display configuration settings of the Remote Desktop Connection client to use all monitors.D. Configure the display configuration settings of the Remote Desktop Connection client to set the size of the

remote desktop to Full Screen.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 111: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

If you have dual or multiple monitors setup on your desktop and often use remote desktop client log into remoteterminal server, you may want to have the same screen setup over on remote desktop session as well to havemore screen real state. And here is how.

Page 112: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

The version of remote desktop client that comes with Windows 7 supports multiple monitors natively, so youdon’t need 3rd party tools to help make that happen.

If you are remote desktop to a windows prior to Windows 7 or Windows server 2008 R2

Launch the remote desktop client from the command line by using the following command:

mstsc.exe /span

What it does is to match the remote desktop width and height with the local virtual desktop, spanning acrossmultiple monitors if necessary. It works pretty smooth but with some of the limitations:

The set of monitors must form a rectangle. In other words, the set of monitors have to use the exact samescreen resolution. If one monitor sets to 1600×1200 and the second one to 1400×1050, span option will beignored, and you are still stuck in one monitor.The total of the resolutions must be below 4096×2048.The multiple monitors are in span mode. Maximizing one application window will maximize the window acrossall monitors, instead of one.

QUESTION 69Your company runs Remote Desktop Services. All client computers run Windows XP SP3. You have a Remote Desktop Session Host (RD Session Host) server.You need to ensure that users can print by using Easy Print while connected to the RD Session Host server.

What should you do on the client computers?

A. Enable a Windows Firewall Inbound Rule for File and Printer Sharing.B. Enable a Windows Firewall Outbound Rule for File and Printer Shanng.C. Enable Network Level Authentication (NLA)D. Install .NET Framework 3.5.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:To use the Terminal Services Easy Print driver, clients must be running both of the following:

Remote Desktop Connection (RDC) 6.1NoteThe RDC 6.1 (6.0.6001) client supports Remote Desktop Protocol 6.1.At least Microsoft .NET Framework 3.0 Service Pack 1 (SP1)

http://technet.microsoft.com/en-us/library/cc753853(v=ws.10).aspx

Using Remote Desktop Easy Print in Windows 7 and Windows Server 2008 R2Remote Desktop Easy Print configuration properties:The following table displays the Client/Server combinations that support Easy Print.

Client / Server ->|v

Windows 7 Windows Server2008

Windows Server2008 R2

Windows XP Client : (1), (2) Client : (1), (2)Server : (3)

Client : (1), (2)Server : (4)

Page 113: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Windows Vista Client : (1), (2) Client : (1), (2)Server : (3)

Client : (1), (2)Server : (4)

Windows 7 Server : (3) Server : (4)Windows Server2008

Client : (2) Client : (2)Server : (3)

Client : (2)Server : (4)

Windows Server2008 R2

Server : (3) Server : (4)

(1) RDC 6.1 or above (Windows XP with Service Pack 3 and above includes this).(2) Even if RDC 6.1 or above is used,the user must install a supported version of.NET Framework separately . Microsoft .NET Framework 3.5 (which includes .NETFramework 3.0 SP1) can be downloaded from the Microsoft Download Center (http://go.microsoft.com/fwlink/?LinkId=109422).*In Windows Vista SP2 with RDC 7.0 andKB971644installed, .NET Framework is notrequired(3) Terminal Services role.

(4) Remote Desktop Session Host Role.If all the requirements are met, the Easy Print driver is listed in the Model field of the redirected printer’sProperties dialog.

Troubleshooting:If you experience formatting problems using Easy Pr int.Refer to the KB- 954744 article athttp://support.microsoft.com/kb/954744(related: KB954743).

Page 114: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Refer to the KB- 970603 article athttp://support.microsoft.com/kb/970603Refer to the KB- 959442 article athttp://support.microsoft.com/kb/959442If the client printers are not redirected as Easy P rint:First check the RDP version on the RDP client computer as well as the .NET framework version with respect tothe operating system used (as explained above). Also verify that the RD Session Host / Terminal Server role isinstalled if the host computer is running Windows Server 2008 R2 or Windows Server 2008.Group Policy must be correctly set to enable Easy Print on the Server. The policy location is “ComputerConfiguration -> Administrative templates -Windows Components -> Remote Desktop Services > RemoteDesktop Session Host -> Printer Redirection”. The setting “Use Remote Desktop Easy Print printer driver first”must be set to “Enabled” for Easy Print redirection, and it has to be “Disabled” for Legacy Print. For “Notconfigured”, Easy Print is chosen by default.

Check The Remote Desktop Configuration Tool (tsconfig.msc) settings to ensure that the “Windows Printer”option is not disabled (it is not disabled by default).Make sure that the “Printers” check box in the client (mstsc.exe) window on the “Local Resources” tab ischecked. The corresponding setting in the associated RDP file is “redirectprinters:i:1”.Ensure that the spooler service is running on both the RDP Client & Server.Windows Server 2008 added the ability for an Admin to configure spooler security and Windows 7/WindowsServer 2008 R2 adds the UI for this. Therefore, it would be possible to alter the RDP server’s spooler securitydescriptor which might prevent RDP client printers from being redirected on the session. The spooler securitydescriptor must contain the “AU” (Authenticated User) ACL (Access Control List) which allows anyauthenticated user to open the spooler service for reading operations. Therefore,if that ACL is missing from thespooler security descriptor, it must beaddedlike the example below using the command prompt (elevated).> sc sdshow spoolerD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWRPWPDTLOCRRC;;;SY)> sc sdset spooler D:(A;;CCLCSWLOCRRC;;;AU) (A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWRPWPDTLOCRRC;;;SY)[SC] SetServiceObjectSecurity SUCCESSIf you connect over RD Gateway, ensure that the policy that disables printer redirection is turned off.If everything listed so far is correct and you still have a redirection problem, check the event logs.

Some of the events to look for are:

Event ID Message Explanation1105 Printer security information for the

printer could not be set.

Page 115: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

1109 The printer could not be set as thedefault printer.

The default client printerand the default printer inthe RDP session must bethe same.

1111 The driver required for the printer isunknown. Contact the administratorto install the driver before you log inagain.

If the Easy Print driver ismissing in the host, thisevent will be logged.

1116 The printer cannot be redirected byusing Remote Desktop EasyPrint.The client computer may nothave a version of the RemoteDesktop Connection client orMicrosoft .NET Frameworkinstalled that supports this driver.

Make sure you’ve met allthe requirements in thetable above.

1103 An internal communication erroroccurred. Redirected printing will nolonger function for a single usersession. Check the status of theRemote Desktop Device Redirectorin the System folder of DeviceManager.

1124 The number of printers per sessionlimit was reached.

If the number of redirected printers is less than t he number of the RDP client printers.The maximum number of printers that can be redirected is controlled by the registry key“MaxPrintersPerSession REG_DWORD” which is under the node “HKLM\\Software\\Policies\\Microsoft\\Windows NT\\Terminal Services”.The default value for this is 20 printers per session.If Easy Print is unable to print on a domain contro ller.Refer to the Knowledge Base Article 968605 athttp://support.microsoft.com/kb/968605/EN-USIf the client printer is redirected as Easy Print a nd the user is unable to stop a print job on theredirected printer.Take ownership of the printer and allow the “Print” & “Manage printers” permissions. But note that when loggedoff from the RD Session, the remote printer settings are not retained.

QUESTION 70Your company has an Active Directory Domain Services (AD DS) domain. You are installing the RD Session Host (RD Session Host) role service in Server Manager on a server that runsWindows Server 2008 R2.

The Audlo and video playback check box on the Configure Client Experience page is not available.

You need to ensure that you can enable audio and video playback for users connecting to the RD Session Hostserver.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Start the Windows Audio EndPoint Builder service.B. Install the Desktop Experience feature.C. Start the Windows Audio service.

Page 116: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

D. Install Connection Manager Administration Kit feature.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:

Page 117: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 118: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 71Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You have a Remote Desktop Services infrastructure that hosts remote desktop sessions for users.You need to be able to revoke 240 Remote Desktop Services client access licenses (RDS CALS).What should you do?

A. Configure the Remote Desktop Session Host (RD Session Host) server to use Per Device licensing mode.Install 20 RDS CALs.

B. Configure the Remote Desktop Session Host (RD Session Host) server to use Per User licensing mode.Install 100 RDS CALs.

C. Conngure the Remote Desktop Session Host (RD Session Host) server to use Per User licensing mode.Install 20 RDS CALs.

D. Configure the Remote Desktop Session Host (RD Session Host) server to use Per Device licensing mode.Install 100 RDS CALs.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 119: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

We talked about licensing Windows Server on a VMware environment but that’s only one part of thelicensingnightmare. You will also need client access licenses also called CALs.Client Access LicensingIn addition of the Windows Server 2008 License you also need a Windows Server 2008 Client Access Licensealso called CAL. This is required for each user or device (or combination of both) that accesses or uses theWindows 2008 software.RequirementsEvery user or device accessing the Windows Server 2008 needs a CAL. Youdon’tneed a CAL when:You access the instance of server software only through the internet without being authenticated or individuallyidentified by the server software;You access Windows Web Server 2008;If external users are accessing the instances of server software and you have acquired a Windows Server 2008External Connector License for each server being accessed;You only administer the server software with two devices or users;You use the Windows Server 2008 solely as a virtualization host.The last point doesn’t impact us much because we use VMware ESXi solely as our virtualization platform.How to choose the correct CAL licensing?Step 1 – Choose your CAL type: Device CAL or User CALYou can choose between two types of Windows CALs: device-based (Device CALs) or user-based (WindowsUser CALs).

With a device-CAL you access the network and the Windows Server 2008 resources from a device which mightbe used by multiple users. For every device which accesses the network you need a device CAL.

Page 120: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

With a user-CAL one user uses multiple devices to access the resources on the network for every user in theorganization that accesses the network you will need a user-CAL license.Step 2 – Choose your Client Access Licensing Mode: Per User/Per Device Mode or Per Server modeAfter choosing a user-based or device-based license you have the option to use the server software in twodifferent modes: Per User/Per Device mode or Per Server mode. Both modes are available for either type oflicense.Per User/Per Device modeThis mode is the mode where 1 user may access several servers, it replaces the Per Seat mode found in olderversions of Windows. (99.9% of the customers run the software in this mode)Per Server modeIn this mode you need a CAL for every user/device who accesses a server. So if you have multiple servers youneed per user/device a CAL for every server accessed.Now that we have the Server licenses and the different forms let’s try an example.Example:An organization uses 3 VMware vSphere 4 ESXi servers, with 2 Six Core CPUs per server to host 60 Windows2008 and 5 Windows 2003 virtual machines. These machines are accessed by 2500 Internet users withoutbeing authenticated, 1200 employees who work in 3 – 8 hour shifts on about 2000 different devices.What licensing do we need here?6 Windows Server 2008 Datacenter licenses and 1200 Windows User CALs (user based licenses) and theservers in per user/per device mode.If you deploy Windows Server 2003 virtual machines onto VMware ESXi, you do not require Windows Server2008 CALs for your virtual machine users. (You will still require CALs for your appropriate Windows Serveredition, in this case, for Windows Server 2003), because of the server mode and the CALs best be user-basedyou already have the appropriate licenses for the Windows 2003 servers if you bought new ones for theWindows 2008 servers.Do we need a CAL or an External Connector License?

QUESTION 72Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host)server. You need to ensure that remote desktop users can print only to the printers that are installed on the RDSession Host server. What should you do?

A. Enable the Do not allow client printer redirection Group Policy setting.B. Disable the Do not allow client printer redirection Group Policy setting.C. Enable the Do not set default client printer to be default printer in a session Group Policy setting.D. Disable the Do not set default client printer to be default printer in a session Group Policy setting.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 121: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 73Your company has an Active Directory Domain Services (AD DS) domain.All servers run Windows Server 2008 R2. All client computers run Windows 7. Your environment includes Microsoft Application Virtualization (App-V), Microsoft Enterprise DesktopVirtualization (MED-V), and Remote Desktop Services.

Page 122: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

You have three applications that are in one package and require authorization to run. You need to deploy the applications for offline use. What should you do?

A. Configure a MED-V revertible workspace policy.B. Configure the Remote Desktop Connection Broker (RD Connection Broker). Create a Group Policy object

(GPO) to configure the Configure server authentication for client setting.C. Use Microsoft Application Virtualization for Desktops. On each client computer, set the client cache

configuration settings to Use free disk space threshold and configure the ApplicationSourceRoot registrykey.

D. Use Microsoft Application Virtualization for Desktops. On each client computer, configure theAutoLoadTriggers, AutoLoadTarget and RequireAuthorizationIfCached registry parameters. Then launchany one of the applications while logged in with the computer users credentials.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:A. MED-V revertible workspace policy

Self-cleaning (revertible) virtual machine —MED-V offers a unique method for managing an easy to supportvirtual desktop environment. It takes advantage of hardware independence enabled by virtualization, andmaintains the exact same image across multiple endpoints. All user changes to applications or the OS arediscarded once the virtual PC session ends, and the virtual machine reverts to the original image, as packagedand delivered by the administrator. This can significantly simplify management, support, and troubleshooting forvirtual machines. Updates, patches, new applications, and settings changes are applied to the master virtualimage, tested by the administrator, and uploaded as a new version of the virtual image to the MED-V imagerepository. The new version is delivered to all endpoints using Trim Transfer technology, removing the need toupdate each endpoint separately. This method is applicable only where no user data or settings need to be keptin the virtual image (for instance, when all user data and settings are stored on a network location). Also whenusing the revertible method, the virtual machine sh ould not be part of an Active Directory domain.

B. Remote Desktop Connection Broker

Remote Desktop Connection Broker (RDConnection Broker), formerly Terminal Services Session Broker (TSSession Broker), is used to provide users with access to RemoteApp and Desktop Connection. RemoteAppand Desktop Connection provides users a single, personalized, and aggregated view of RemoteApp programs,session-based desktops, and virtual desktops to users. RDConnection Broker supports load balancing andreconnection to existing sessions on virtual desktops, Remote Desktop sessions, and RemoteApp programsaccessed by using RemoteApp and Desktop Connection. RDConnection Broker also aggregates RemoteAppsources from multiple Remote Desktop Session Host (RDSession Host) servers that may host differentRemoteApp programs.

To configure which RemoteApp programs and virtual desktops are available through RemoteApp and DesktopConnection, you must add the RDConnection Broker role service on a computer running WindowsServer2008R2, and then use Remote Desktop Connection Manager (RDConnection Manager).For more information, seeRemoteApp and Desktop Connection.

Who will be interested in this feature?

The improvements to the RDConnection Broker role service will be of interest to organizations that areimplementing either a Virtual Desktop Infrastructure (VDI) or are deploying session-based desktops orRemoteApp programs. Additionally, these improvements will be of interest to organizations that currently use orare interested in Remote Desktop Services.

What does RD Connection Broker do?

RDConnection Broker extends the TS Session Broker capabilities included in Windows Server2008 by creatinga unified administrative experience for traditional session-based remote desktops and virtual machine-based

Page 123: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

remote desktops. A virtual machine-based remote desktop can be either a personal virtual desktop or part of avirtual desktop pool. In the case of a personal virtual desktop, there is a one-to-one mapping of virtualmachines to users. Each user is assigned a personal virtual desktop that can be personalized and customized.These changes are available to users each time that they log on to their personal virtual desktop. For a virtualdesktop pool, a single image is replicated across many virtual machines. As users connect to the shared virtualdesktop pool, they are dynamically assigned a virtual desktop. Because users may not be assigned the samevirtual desktop when they connect, any personalization and customization made by a user are not saved. If youchoose to use a virtual desktop pool and users need their personalization and customizations saved, you canuse roaming profiles and folder redirection.

Which editions include this feature?

RDConnection Broker is available in the following editions of Windows Server2008R2:Windows Server2008R2 StandardWindows Server2008R2 EnterpriseWindows Server2008R2 Datacenter

RDConnection Broker is not available in the following editions of Windows Server2008R2:Windows Web Server 2008 R2Windows Server2008R2 for Itanium-Based Systems

Additional references

For information about other new features in Remote Desktop Services, seeWhat's New in Remote DesktopServices.

Remote Desktop Connection Broker (RDConnection Broker), formerly Terminal Services Session Broker(TSSession Broker), is a role service that provides the following functionality:Allows users to reconnect to their existing sessions in a load-balanced RDSession Host server farm. Thisprevents a user with a disconnected session from being connected to a different RDSession Host server in thefarm and starting a new session.

Enables you to evenly distribute the session load among RDSession Host servers in a load-balancedRDSession Host server farm.Provides users access to virtual desktops hosted on RDVirtualization Host servers and to RemoteAppprograms hosted on RDSession Host servers through RemoteApp and Desktop Connection.

Overview of Remote Desktop Connection Broker (RD Connection Broker)

Remote Desktop Connection Broker (RDConnection Broker), formerly Terminal Services Session Broker(TSSession Broker), is a role service that provides the following functionality:Allows users to reconnect to their existing sessions in a load-balanced RDSession Host server farm. Thisprevents a user with a disconnected session from being connected to a different RDSession Host server in thefarm and starting a new session.

Enables you to evenly distribute the session load among RDSession Host servers in a load-balancedRDSession Host server farm.Provides users access to virtual desktops hosted on RDVirtualization Host servers and to RemoteAppprograms hosted on RDSession Host servers through RemoteApp and Desktop Connection.

RDConnection Broker keeps track of user sessions in a load-balanced RDSession Host server farm. TheRDConnection Broker database stores session information, including the name of the RDSession Host serverwhere each session resides, the session state for each session, the session ID for each session, and the username associated with each session. RDConnection Broker uses this information to redirect a user who has anexisting session to the RDSession Host server where the user’s session resides.

If a user disconnects from a session (whether intentionally or because of a network failure), the applicationsthat the user is running will continue to run. When the user reconnects, RDConnection Broker is queried todetermine whether the user has an existing session, and if so, on which RDSession Host server in the farm. Ifthere is an existing session, RDConnection Broker redirects the client to the RDSession Host server where the

Page 124: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

session exists.

With RDConnection Broker Load Balancing, when a user without an existing session connects to anRDSession Host server in the load-balanced RDSession Host server farm, the user will be redirected to theRDSession Host server with the fewest sessions. If a user with an existing session reconnects, the user isredirected to the RDSession Host server where the user’s existing session resides. To distribute the sessionload between more powerful and less powerful servers in the farm, you can assign a relative server weightvalue to a server.RDConnection Broker is also used to provide users with access to RemoteApp and Desktop Connection.RemoteApp and Desktop Connection provides a customized view of RemoteApp programs and virtualdesktops to users. RDConnection Broker supports load balancing and reconnection to existing sessions onvirtual desktops accessed by using RemoteApp and Desktop Connection. To configure the RDConnectionBroker server to support RemoteApp and Desktop Connection, use the Remote Desktop Connection Managertool. For more information, see the Remote Desktop Connection Manager Help in Windows Server2008R2.

RD Connection Broker components

There are two RDConnection Broker components to consider in a load-balanced RDSession Host server farm.RD Connection Broker server. This is the server that runs the Remote Desktop Connection Broker serviceand tracks user sessions for one or more load-balanced RDSession Host server farms. RDConnection Brokeruses a farm name to determine which servers are in the same RDSession Host server farm.RDSession Host servers that use RD Connection Broke r.These are RDSession Host servers that aremembers of a farm in RDConnection Broker. To participate in RDConnection Broker, a server must meet thefollowing criteria:

The server must have the RDSession Host role service installed.The server must be a member of an ActiveDirectory domain.The server must be a member of the Session Broker Computers local group on the RDConnection Brokerserver.The server must be a member of a load-balanced RDSession Host server farm.

C. Use Microsoft Application Virtualization for Desktops. On each client computer, set the client cacheconfiguration settings to Use free disk space threshold and configure the ApplicationSourceRoot registry key.

The FileSystem cache space management feature uses a Least Recently Used (LRU) algorithm and is enabledby default. If the space that is required for a new package would exceed the available free space in the cache,the Application Virtualization (App-V) Client uses this feature to determine which, if any, existing packages itcan delete from the cache to make room for the new package. The client deletes the package with the oldestlast-accessed date if it is older than the value specified in the MinPkgAge registry value. Use of the FileSystemcache space management feature can also help to avoid low cache space problems.More than one package is deleted if necessary. Packages that are locked are not deleted.

To ensure that the cache has sufficient space allocated for all packages that might be deployed, use theUse free disk space thresholdthat the cache can grow as needed. Alternatively, determine in advance how much disk space will be needed for the App-V cache, and at installation time, set the cache sizeaccordingly.

QUESTION 74Your company has an Active Directory Domain Services (AD DS) domain.All servers run Windows Server 2008 R2.You are deploying Remote Desktop Services (RDS). You install a Remote Desktop Session Host (RD Session Host) server in the environment. You need to install Remote Desktop Services client access licenses (RDS CALs). What should you do first?

A. Run the Install Licenses Wizard.B. Run the Manage RDS CALs Wizard.C. Add the Remote Desktop Licensing role service.

Page 125: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

D. Add the RD Session Host server to a new group in the Remote Desktop Connection Manager console.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 75Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host)server. You need to select a digital certificate for signing Remote Desktop Protocol (.rdp) files.Which two certificate types can you use to achieve this goal? (Each correct answer presents a completesolution. Choose two.)

A. Code SigningB. Authenticated SessionC. Workstation AuthenticationD. Remote Desktop Protocol (RDP) Signing

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:Code signing is the process of digitally signing executables and scripts to confirm the software author andguarantee that the code has not been altered or corrupted since it was signed by use of a cryptographic hash.

Code signing can provide several valuable features. The most common use of code signing is to providesecurity when deploying; in some programming languages, it can also be used to help prevent namespace

Page 126: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

conflicts. Almost every code signing implementation will provide some sort of digital signature mechanism toverify the identity of the author or build system, and a checksum to verify that the object has not been modified.It can also be used to provide versioning information about an object or to store other meta data about anobject.

About Digitally Signing RemoteApp ProgramsYou can use a digital signature to sign .rdp files that are used for RemoteApp connections to the RemoteDesktop Session Host (RDSession Host) server. This includes the .rdp files that are used for connectionsthrough RDWeb Access to RemoteApp programs and to the desktop of an RDSession Host server.

To connect to a RemoteApp program by using a digitally signed .rdp file, the client must be running at least Remote Desktop Client (RDC)6.1. (The RDC6.1 client supportsRemote Desktop Protocol6.1.)If you use a digital certificate, the cryptographic signature on the connection file provides verifiable informationabout your identity as its publisher. This enables clients to recognize your organization as the source of theRemoteApp program or the remote desktop connection, and allows them to make more informed trustdecisions about whether to start the connection. This helps protect against the use of .rdp files that were alteredby a malicious user.You can sign .rdp files that are used for RemoteApp connections by using a Server Authentication certificate[Secure Sockets Layer (SSL) certificate], a Code Signing certificate, or a specially defined Remote DesktopProtocol (RDP) Signing certificate. You can obtain SSL and Code Signing certificates from public certificationauthorities (CAs), or from an enterprise CA in your public key infrastructure hierarchy. Before you can use anRDP Signing certificate, you must configure a CA in your enterprise to issue RDP Signing certificates.If you are already using an SSL certificate for RDSession Host server or RDGateway connections, you can usethe same certificate to sign .rdp files. However, if users will connect to RemoteApp programs from public orhome computers, you must use either of the following:A certificate from a public CA that participates in the Microsoft Root Certificate Program Members program(http://go.microsoft.com/fwlink/?LinkID=59547).If you are using an enterprise CA, your enterprise CA-issued certificate must be co-signed by a public CA thatparticipates in the Microsoft Root Certification Program Members program.Membership in the localAdministrators group, or equivalent, on the RDSession Host server that you plan toconfigure, is the minimum required to complete this procedure.Review details about using the appropriateaccounts and group memberships athttp://go.microsoft.com/fwlink/?LinkId=83477.To configure the digital certificate to useOn the RDSession Host server, open RemoteApp Manager. To open RemoteApp Manager, clickStart , pointtoAdministrative Tools , point toRemote Desktop Services , and then clickRemoteApp Manager .In theActions pane of RemoteApp Manager, clickDigital Signature Settings . (Or, in theOverview pane, nexttoDigital Signature Settings , clickChange .)Select theSign with a digital certificate check box.In theDigital certificate details box, clickChange .In theSelect Certificate dialog box, select the certificate that you want to use, and then click OK.

The Select Certificate dialog box is populated by certificates that are located in the local computer's certificates store or in your personal certificate store. Thecertificate that you want to use must be located in one of these stores.Using Group Policy settings to control client behavior when opening a digitally signed .rdp fileYou can use Group Policy to configure clients to always recognize RemoteApp programs from a particularpublisher as trusted. You can also configure whether clients will block RemoteApp programs and remotedesktop connections from external or unknown sources. By using these policy settings, you can reduce thenumber and complexity of security decisions that users face. This reduces the chances of inadvertent useractions that may lead to security vulnerabilities.The relevant Group Policy settings are:Specify SHA1 thumbprints of certificates representi ng trusted .rdp publishersAllow .rdp files from valid publishers and user’s d efault .rdp settingsAllow .rdp files from unknown publishersThese Group Policy settings are located inComputer Configuration\Policies\Administrative Temp lates\Windows Components\Remote Desktop Services\Remote Desktop Connection Client andUserConfiguration\Policies\Administrative Templates\Win dows Components\Remote Desktop Services\Remote Desktop Connection Client .

Page 127: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

These Group Policy settings can be configured by using either the Local Group Policy Editor or the GroupPolicy Management Console (GPMC).For more information about Group Policy settings for Remote Desktop Services, see the Remote DesktopServices Technical Reference (http://go.microsoft.com/fwlink/?LinkId=138134).

QUESTION 76Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service on a server that runs WindowsServer 2008 R2. Client computers run Windows Vista and Windows 7. You need to automate the migration of user settings from client computers to the RD Session Host server. Which tool should you use?

A. Windows Easy TransferB. User State Migration Tool (USMT)C. Windows System Image Manager (Windows SIM)D. Deployment Image Servicing and Management (DISM)

Correct Answer: BSection: (none)Explanation

Explanation/Reference:The User State Migration Tool (USMT) is a Microsoft command line utility program intended to allow advancedusers, comfortable with Scripting language, to transfer files and settings between PCs. This task is alsoperformed by Windows Easy Transfer, recommended for general users. USMT supports the high-volume,automated deployment of files and settings from Microsoft Windows versions 2000, XP, Vista and Windows 7and is useful in migrating user settings and files during OS upgrades. 32-bit to 64-bit migrations are supported,but 64-bit to 32-bit are not.Because USMT has high complexity and a command line interface, there have been several attempts toprovide access to its useful functionality by creating GUI wrappers for it.

Windows® User State Migration Tool (USMT) 4.0 is a scriptable command-line tool that provides a highly-customizable user-profile migration experience for IT professionals. USMT includes two components,ScanState and LoadState, and a set of modifiable .xml files: MigApp.xml, MigUser.xml, and MigDocs.xml. Inaddition, you can create custom .xml files to support your migration needs. You can also create a Config.xmlfile to specify files or settings to exclude from the migration.

For the latest updates to this documentation, as well as USMT 4.0 white papers, go to thisMicrosoft Web site.

Benefits

USMT 4.0 provides the following benefits to businesses that are deploying Windows® operating systems:Safely migrates user accounts, operating system and application settings.Lowers the cost of deploying Windows® by preserving user stateReduces end-user downtime required to customize desktops and find missing filesReduces help-desk callsReduces the time needed for the user to become familiar with the new operating systemIncreases employee satisfaction with the migration experience.Limitations

USMT is intended for administrators who are performing large-scale automated deployments. If you are onlymigrating the user states of a few computers, you can useWindows Easy Transferfor computers runningWindowsVista® or Windows®7.

There are some scenarios in which the use of USMT 4.0 is not recommended. These include:Migrations that require end-user interaction.Migrations that require customization on a machine-by-machine basis.

Page 128: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 129: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

QUESTION 77Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2.You provide access to some applications through a virtual desktop infrastructure (VDI) environment. All virtual desktop computers are located in an organizational unit (OU) named VirtuaIDesktops.All other client computer objects are located in an OU named Desktops.Many users experience long logon times when logging into virtual desktop computers due to large roamingprofiles.You need to reduce the user logon times for virtual desktop computers.What should you do?

A. On each virtual desktop computer, set a disk quota on the system drive.B. On each client computer, set the temporary folders option to not use session-specific temporary folders.C. Create a Group Policy object (GPO) that enables folder redirection for all users. Enable slow link detection,

and link the GPO to the VirtuaIDesktops OU.D. Create a Group Policy object (GPO) that enables folder redirection for all users. Enable loopback

processing, and link the GPO to the VirtualDesktops OU.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 130: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

An Overview on Folder Redirection

Page 131: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Folder Redirection is a Group Policy feature that enables users to redirect the system folders containing theprofile of a user on the network, through the use of the Folder Redirection node in the Group Policy ObjectEditor console. This basically makes folder redirection a user configuration option. Through the use of theFolder Redirection feature, users can configure that the system folders’ contents on the user remains the same,irrespective of the particular computer used to log onto the system. The system folders that users can configurefor folder redirection are listed below:

Application Data: This folder contains user configuration files, user specific data that applications utilize, andPublic Key Infrastructure files.Desktop: This folder holds the shortcuts and files that appear on the user’s desktop.My Documents: This folder holds the user’s files and pictures.Start Menu: This folder holds the shortcuts and files that appear on the Start menu.Folder redirection settings are stored in the User Configuration node of the Group Policy Object Editor. TheOffline Files feature can be configured to enable users to access redirected folders when no networkconnection exists. Users can use the Offline Folder node in Group Policy to configure this feature.

Folder redirection provides the benefits listed below:

Redirecting the My Documents folder ensures that users can access their data from any computer. This appliesto all other redirected folders as well.Because redirected folder data is stored on a network server, the user can back up the data to an offline

Page 132: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

storage media.The disk quotas feature specifies the amount of space that each user’s redirected folders are allowed to use.By configuring the Offline files feature, users can ensure that they have access to the My Documents folderwhen the network connection is lost. This capability is useful to individuals that use laptop computers.When roaming profiles are utilized for users, the network path to My Documents is included in the roaming userprofile. The folder is not included in the profile.The situations in which users should enable folder redirection for the different types of system folders aresummarized below:

Redirect the My Documents folder to allow access to the same documents from any computer on the network.Redirect the Application Data folder when applications should operate in the same manner for a user wheneverthe user utilizes a new system. When the Application Data folder is redirected, the user does not need to beconfigured again when he/she changes systems.Redirect the Desktop folder when users save files that contain data to the desktop.Redirect the Start Menu folder in the following situations:When a user saves files containing data to icons located on the Start menu.When there are consistent software installations through the network.When a user needs to access the Favorites and Printers and Faxes foldersIf an organization already has home folders, Windows Server 2003 includes an option that allows users toredirect My Documents to the user’s home folder. One requirement though is that the user’s home folder needsa Windows XP Professional client. Windows XP Home Edition, Microsoft Windows 2000, and Windows NTclient cannot be utilized.

The manners in which users can configure folder redirection are listed below:

Users can redirect folders to a location based on the security group’s membership.Users can redirect folders to a single location for all users in a site, domain, or OU.When specifying the location for the redirected folders, the following options exist:

Create a folder for the user beneath the root pathRedirect the folders to a specified location.Redirect the folders to the user’s local profileRedirect the folders to the user’s home folderHow to Redirect Folders to a Location Based on Security Group Membership

Windows Server 2003 includes additional options for redirecting folders that the Windows 2000 Server does notoffer. With Windows 2000 Server, users could only specify the location for the target folder location in the oneprovided text box. Windows Server 2003 offers more options in the Target Folder Location list.

Use the steps below to redirect folders to a location based on security group membership:

Open the GPO linked to the site, domain, or OU that holds the users for which folder redirection should beenabled.Expand the User Configuration node, expand the Windows Settings node, and then expand the FolderRedirection node.Right-click the folder that should be redirected and then select Properties from the shortcut menu.When the Properties dialog box for the folder selected for redirection opens, in the Setting list of the Target tab,choose the Advanced-Specify Locations For Various User Groups option.When the Specify Group And Location dialog box opens, click the Browse button in the Security GroupMembership area.When the Select Group dialog box opens, specify the name of the security group for whom the folder should beredirected. Click OK.In the Specify Group And Location dialog box, choose the location for the redirected folder. Choose one of theoptions listed below:Create A Folder For Each User Under The Root Path – a folder with the user’s name is created under the rootpath. The option is not available if the user selected to redirect the Start Menu folder.Redirect To The Following Location – the folder is redirected to a location specified.Redirect To The Local Userprofile Location – the folder is redirected to the default folder location.Redirect To The User’s Home Folder – the folder is redirected to the user’s home directory. The option isavailable when the My Documents folder is redirected.

Page 133: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Enter the path to which the folder should be redirected if the Create A Folder For Each User Under The RootPath option was selected or the Redirect To The Following Location option in Step 7. Enter the UNC path or apath on the user’s local computer.Click OK.Click the Settings tab.The Grant The User Exclusive Rights To Redirected Folder checkbox is enabled by default. It is recommendedto leave this option unchanged.The Move The Contents Of User’s Current Folder To The New Location checkbox is enabled by default. It isrecommended to also leave this option unchanged.In the Policy Removal box of the Settings tab, it is recommended to leave the Leave The Folder In The NewLocation When Policy Is Removed option selected.In the My Pictures Preferences box of the Settings tab, it is recommended to leave the Make My Pictures ASubfolder Of My Documents option enabled. This is the default configuration setting.Click OK.How to Redirect Folders to a Single Location for All Users in a Site, Domain, or OU

Open the GPO linked to the site, domain, or OU that holds the users for whom the folder redirection should beenabled.Expand the User Configuration node, expand the Windows Settings node, and then expand the FolderRedirection node.Right-click the folder that should be redirected and then select Properties from the shortcut menu.When the Properties dialog box for the folder selected for redirection opens, in the Setting list of the Target tab,choose the Basic-Redirect Everyone’s Folder To The Same Location option.Select one of the following options from the Target Folder Location list:Create A Folder For Each User Under The Root Path – a folder with the user’s name is created in the root path.Redirect To The Following Location – the folder is redirected to a specified location.Redirect To The Local Userprofile Location – the folder is redirected to the default folder location.Redirect To The User’s Home Folder – the folder is redirected to the user’s home directory.Enter the path to which the folder should be redirected if the Create A Folder For Each User Under The RootPath option was selected or the Redirect To The Following Location option in the previous step.Click the Settings tab.It is recommended to leave The Grant The User Exclusive Rights To Redirected Folder checkbox and MoveThe Contents Of User’s Current Folder To The New Location checkbox enabled or selected. This is the defaultsetting for those two checkboxes.In the Policy Removal box of the Settings tab, it is recommended to leave the Leave The Folder In The NewLocation When Policy Is Removed option enabled.In the My Pictures Preferences box of the Settings tab, leave the Make My Pictures A Subfolder Of MyDocuments option enabled. This is the default configuration setting.Click OK.How to set up the network share for offline files and folders

As mentioned earlier, the user can configure the Offline Files feature so that others can still access redirectedfolders when the network connection is lost. When configured, the Offline Files feature stores any files that areaccessed via folder redirection on the local computer’s hard drive. The file is updated locally when the useraccesses a file of a redirected folder. When the user logs off the computer, the file is moved to the server andstored.

Configuring the network share for offline files and folders is the initial step in the configuration of the OfflineFiles feature.

Navigate to and right-click the shared folder that includes the offline files, then select Sharing And Security onthe shortcut menu.Click Offline Settings on the Sharing tab.When the Offline Settings dialog box opens, select one of the options listed below:Only The Files And Programs That Users Specify Will Be Available Offline – allows users to specify files foroffline availability.All Files And Programs That Users Open From The Share Will Be Automatically Available Offline – all files thatusers access are available offline.Files Or Programs From The Share Will Not Be Available Offline – no files will be available offline.Click OK.

Page 134: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

How to Set Up the Offline Files Feature for Computers and Servers

Open My Computer.Click Folder Options on the Tools menu.When the Folder Options dialog box opens, select the Offline Files tabCheck the Enable Offline Files checkbox.The options that can be selected for a full synchronization of Offline Files are listed below:Synchronize All Offline Files When Logging On checkbox – for a full synchronization of Offline Files when theuser logs onSynchronize All Offline Files Before Logging Off checkbox – for a full synchronization of Offline Files when theuser logs off.Users can enable the Display A Reminder Every checkbox so that reminder balloons are displayed when thecomputer goes offline. The reminder balloons are displayed on the desktop’s notification area. Specify howfrequently the reminders should be displayed.To display a shortcut to the Offline Files folder on the desktop, select the Create An Offline Files Shortcut OnThe Desktop checkbox.To encrypt offline files, select the Encrypt Offline Files To Secure Data checkbox.Set the amount of disk space to use for temporary offline files by using the slider.Click the Advanced Button.When the Offline Files-Advanced Settings dialog box opens, choose one of the options listed below:Notify Me And Begin Working Offline – enables the user to continue to access files when the networkconnection is unavailable.Never Allow My Computer To Go Offline – prevents the user from accessing files when the network connectionis unavailable.Click Add to access the Offline Files-Add Custom Action dialog box. This is where users can configure aspecific action for a computer so that it is treated differently when another computer loses a networkconnection.Enter the name of the computer in the Computer text box.Specify how the computer should be treated by selecting an option in the When A Network Connection Is Lostarea of the dialog box.Click OK.Click OK in the Offline Files-Advanced Settings dialog box.Click OK in the Folder Options dialog box.How to Configure Synchronization of Offline Files and Folders

Click Start, All Programs, Accessories, and click Synchronize.Click Setup on the Items To Synchronize dialog box.The Synchronization Settings dialog box opens.On the Logon/Logoff tab of the dialog box, in the When I Am Using This Network Connection list, select theconnection to be utilized.In the Synchronize The Following Checked Items list, choose the items that should be synchronized.Enable the When I Log On To My Computer checkbox to allow synchronization to occur when the user logs onto the computer.Enable the When I Log Off My Computer checkbox to allow synchronization to occur when the user logs off thecomputer.In order to display a message, asking for permission to perform synchronization, enable the Ask Me BeforeSynchronizing The Items checkbox.Click OK.Best Practices for Implementing Folder Redirection

A few best practices for implementing folder redirection using Group Policy are summarized below:

It is recommended to accept the default folder redirection settings on the Settings tab when configuring folderredirection.It is always best to allow the system to create the folders.Because users typically need to access the contents of redirected folders when the network connection is lost,enable the Offline Files feature for redirected folders.The My Pictures folder should exist within the My Documents folder.When specifying the location for redirected folders, use fully qualified UNC paths.Only redirect the My Documents folder to the user’s home folder if there is an existing home folder

Page 135: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

environment.The Application Data folder should not be redirected if using the Encrypting File System (EFS).

Situation: An organization has users that log into workstations interactively and also log into a Terminal Serverwith the same user account, but stricter policies are desired for the Terminal Server session than for the users’interactive session with their own computer. Also, certain users (such as Administrators) should be exemptfrom these policies.ex: When a domain user logs on to Terminal Server, they do not have access to the Control Panel and cannotchange the Desktop wallpaper; on their own machine these actions are allowed. Administrators that log on tothe Terminal Server still must have access to the Control Panel and all other areas of the system.Problem: Since users can only be contained in a single OU, and user policies assigned to OUs that contain onlycomputers are not processed, it may seem that this is not possible without creating separate user accounts justfor accessing the Terminal Server. Strict local policies could be used on the Terminal Server itself, but thesewould also apply to Administrators making the server difficult to manage.

Solution: Use loopback processing of group policy in conjunction with security filtering of certain GPOs to allowdifferent user policies to be applied depending on what computer the user logs on to.

In Active Directory Users and Computers, make sure that the Terminal Server is in its own OU just for TerminalServers. If the Terminal Server is also a Domain Controller, a new OU can be created inside of the DomainControllers OU so that domain controller policies are still applied as well.In the Group Policy Management MMC, create a new GPO called “Loopback” and link it to the TerminalServers OU created in step 1.Edit the new Loopback policy to enable Loopback processing. The setting is under Computer Configuration ->Policies -> Administrative Templates -> Group Policy -> User Group Policy loopback processing mode. Seeexample below:

Now create another GPO linked to the same Terminal Servers OU. This one will contain the user policies thatwill be in effect when users from another OU log on to a computer in this OU. Name it something like “TerminalServer Lockdown”, or whatever suits the situation.Before editing this policy, it is important to set up some security filters first. Assuming you do not want thispolicy applied to Domain Administrators, perform the following steps:Select the GPO and go to the “Delegation” tab.

Click “Advanced…” to view the ACL.Add the “Domain Admins” group (or whichever group is appropriate) and grant the group all permissions exceptDENY the “Apply group policy” permission as shown below:Click “OK” to save the ACL.Edit this “Lockdown” policy just as you would any other user policy, making sure that you edit items in the “User”section, not the “Computer” section. Remove the Control Panel, lock the taskbar, customize Internet Explorer,etc.If everything went properly, this policy will be applied to any user that logs on to the Terminal Server (or anycomputer in the “Terminal Servers” OU) except those that are members of the Domain Admins group. If thepolicies do not immediately work, try running gpupdate /force when logged on to the server as a Domain User.-nRelated content:Group Policy Not Applied To Remote VPN UsersHow To: Time Sync Across Windows NetworkAdding Sites to Internet Security Zones Using Group PolicyTerminal Server Does Not Accept Enough Client ConnectionsRedirected Printer: Access Denied in Remote Desktop Session

QUESTION 78Your company has an Active Directory Domain Services (AD DS) domain. You have multiple Remote DesktopSession Host (RD Session Host) servers. You have 100 Windows Server 2008 R2 Remote Desktop Servicesclient access licenses (RDS CALs) installed on your license server. You need to return 10 RDS CALs to thepool on the license server. What should you do?

Page 136: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

A. Remove the Per User RDS CALs.B. Revoke the Per Device RDS CALs.C. Remove the Per Device RDS CALs.D. Repeat the installation of the RDS CALs.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Licensing Corner – CALs

We are often asked by clients “What are these CAL things and why do I need to buy them – I’m already buying(or I’ve already bought) a server license?” Well, this goes back to the way that Microsoft sells and licenses mostof their server products. If you remember the inaugural License Corner back in October 2010, we said thatwhen you pay Microsoft for software you are not acquiring a physical object that has intrinsic value in the objectitself but, rather, are acquiring a limited right to use the software. A software license provides the legal right toinstall, use, access, display, run, or otherwise interact with a software program.

For most server products Microsoft uses a Server + Client Access License (CAL) model as the primary methodfor licensing the use of the software. This means that first you must purchase a license to install and operatethe server software on the physical server. Then for every user or device that accesses the server to useservices on that server, such as file storage or printing or to utilize an application running on that server, aClient Access License (CAL) must be purchased. So the CAL simply permits access to the server. (Note: if youhave multiple Windows Servers in your network one CAL permits access to all the servers. You don’t have tobuy a CAL for every unique server.)There are two types of CALs and the decision on which to purchase is based on how users (employees,typically) will access the server. There are User CALs and Device CALs.

User CALsWith the User CAL, you purchase a CAL for every user who accesses the server to use services such as filestorage or printing, regardless of the number of devices they use for that access. Purchasing a User CAL mightmake more sense if your company employees need to have roaming access to the corporate network usingmultiple devices, or from unknown devices, or simply have more devices than users in your organization.

Page 137: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Device CALsWith a Device CAL, you purchase a CAL for every device that accesses your server, regardless of the numberof users who use that device to access the server. Device CALs may make more economic and administrativesense if your company has workers who share devices, for example, on different work shifts.The Microsoft products that utilize the User/Device CAL model are:Windows ServerRemote Desktop Services Server (formerly Terminal Server)SQL ServerExchange ServerLync Server (Formerly Office Communications Sever)SharePoint ServerSince every Microsoft server needs the Windows operating system running on it to function just about everyWindows server requires CALs to be accessed. Then if any of the Microsoft server systems listed above areinstalled on the Windows server, those CALs are also needed. So, for example, an Exchange server requiresWindows CALs and Exchange CALs.Pricing is typically the same for User and Device CALs. In addition, both types of CALs can be reassigned fromone device to another or from one user to another provided the reassignment is made either (a) permanentlyaway from the one device or user or (b) temporarily to accommodate the use of the Windows CAL either by aloaner device, while a permanent device is out of service, or by a temporary worker, while a regular employee isabsent. You can also have both User and Device CALs accessing the same server. You can only switchbetween User and Device CALs if the CALs have Software Assurance (see License Corner November 2010)and only upon renewal of the Software Assurance.

Per Device License (Device CAL)The licenses for device (Device CAL) grant the right to use the features provided by one or more servers for allthe devices are fully licensed CAL.Per User License (User CAL)Licenses Per User (User CAL) grant the right to use the features provided by one or more servers to a nameduser.The user can use the functions made available by one or more servers also using more than one device.For server licensesThis licensing model to a particular server is assigned a set number of CALs and the number of devicesallowed to concurrently access the server can not exceed the number of CALs purchased for the server.CALsare not permanently associated to a given device, if the organization decides to add another server WindowsServer 2003 R2, always in a per server, to access the second server will need to purchase additional CALs forWindows Server.For deployment in the server is the system administrator when configuring the serverdetermines the number of CALs to associate, based on the number of licenses purchased for the server.Forserver licenses are available for Windows Server 2003 R2.Processor licensesFor some server products are also available for per-processor licensing model, which includes the purchase ofa license for each processor installed on the server where the software must be run.The license allows theprocessor to access by an unlimited number of users that can connect from the LAN (Local Area Network) orWAN (Wide Area Network) or outside the firewall.Therefore, it is not necessary to purchase additional serverlicenses, CALs, or Internet Connector.Example Scenarios

Page 138: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Dismissal "To Device" or "Per User"In this scenario, the organization has chosen to deploy Windows Server 2003 R2 in mixed mode "To Device"and "Per User" by buying a mix of Device CALs and User.

Dismissal "Per Server"In this scenario, the organization has chosen to deploy Windows Server 2003 R2 on a per server, the purchaseof five CALs allow a maximum of five devices to connect simultaneously to the server.To provide an opportunityto connect to the server, by excluding devices, will be necessary to increase the amount of CALs, or wait forone of five devices that occupies a CAL terms the connection to the server and, therefore, makes it free.

Client Access LicensingIn addition of the Windows Server 2008 License you also need a Windows Server 2008 Client Access Licensealso called CAL. This is required for each user or device (or combination of both) that accesses or uses theWindows 2008 software.RequirementsEvery user or device accessing the Windows Server 2008 needs a CAL. Youdon’tneed a CAL when:You access the instance of server software only through the internet without being authenticated or individuallyidentified by the server software;You access Windows Web Server 2008;If external users are accessing the instances of server software and you have acquired a Windows Server 2008External Connector License for each server being accessed;You only administer the server software with two devices or users;You use the Windows Server 2008 solely as a virtualization host.The last point doesn’t impact us much because we use VMware ESXi solely as our virtualization platform.How to choose the correct CAL licensing?Step 1 – Choose your CAL type: Device CAL or User CALYou can choose between two types of Windows CALs: device-based (Device CALs) or user-based (WindowsUser CALs).

Page 139: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

With a device-CAL you access the network and the Windows Server 2008 resources from a device which mightbe used by multiple users. For every device which accesses the network you need a device CAL.

With a user-CAL one user uses multiple devices to access the resources on the network for every user in theorganization that accesses the network you will need a user-CAL license.Step 2 – Choose your Client Access Licensing Mode: Per User/Per Device Mode or Per Server modeAfter choosing a user-based or device-based license you have the option to use the server software in twodifferent modes: Per User/Per Device mode or Per Server mode. Both modes are available for either type oflicense.

What types of CALs are out there?As you can see there are a lot of flavors and different CALs out there, some we mentioned are:Windows User CALDevice CALTS CAL (Terminal Services)RDS CAL (Remote Desktop Services)Per Processor CALManagement Server CALCore CAL (Suite)Enterprise CAL (Suite)RMS CALVECDCAL SuitesCore CAL SuiteEnterprise CAL SuiteBecause CAL Suites contain licenses to products that are released independently, CAL Suites are version-less.CAL Suites are only offered with Software Assurance coverage, and accordingly give customers the right to usethe most recent version of every product in the suite.All Enterprise CAL Suite components are available for individual purchase also. For more information aroundlicensing the core CAL and Enterprise Suite follow thislink.VECDEither VECD or VECD for SA is required for any VDI environment running Windows as the guest operatingsystem, regardless of the choice of infrastructure or hypervisor vendor that the customer chooses. Moreinformation about the VECD license can be found at the followinglink.CAL TrackingBecause of all the different CALs and software licenses it becomes hard too find out which software you useand which license you will need, Microsoft made a tool called the MAP Toolkit to help us track which software isused in the environment so we get a picture of what licenses we should get to get compliant with the terms andconditions.The Microsoft Assessment and Planning (MAP) Toolkit is an agentless tool designed to simplify and streamlinethe IT infrastructure planning process across multiple scenarios through network-wide automated discovery andassessments. MAP performs an inventory of heterogeneous IT environments and provides you with usage

Page 140: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

information for SQL Server and servers in the Core CAL Suite.The Microsoft Assessment and Planning (MAP) Toolkit 5.0 includes the following new features for simplified ITinfrastructure planning:Heterogeneous IT environment inventorySoftware usage tracking for Windows Server, SharePo int Server, System Center ConfigurationManager, Exchange Server, and SQL ServerMicrosoft Office 2010 readiness assessmentSQL Server discovery and assessment for consolidationWindows 2000 migration assessmentYou can use this toolkit to track the use of Windows Server and several Microsoft applications like Sharepoint,SCCM , Exchange Server and SQL Server.

QUESTION 79Your company runs Remote Desktop Services.You have a Remote Desktop Web Access (RD Web Access) server.You publish several applications on the internal network by using RD Web Access.You need to ensure that the published applications are accessible from the internet via an HTTPS connectionover port 443.What should you do first?

A. Install and configure the Remote Desktop Connection Broker (RD Connection Broker) role service on meRD Web Access server.

B. Use Intemet Information Services (IIS) Manager to enable Windows Authentication.C. Use Intemet Information Services (IIS) Manager to disable Forms Authentication.D. Install and configure the Remote Desktop Gateway (RD Gateway) role service on the RD Web Access

server.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Creating a Remote Desktop Gateway (RD Gateway) is straight forward and can be used to securely accessyour Windows servers over port 443 using the Remote Desktop Connection Client. I use this to access myhome lab when I’m on the road or at work, and it saves exposing your machines to the internet directly overRDP (TCP 3389). The RD Gateway isn’t new, in fact it was available on Windows Server 2008 as TS Gateway,and the installation is the same. For this article, I will be using Windows Server 2008 R2.

Step 1: Build a new virtual machine and install Windows Server 2008 R2.Step 2: Click on Add Roles (in Server Manager). You will then be presented with the following wizard dialogboxes. Click on each image for full screen.

Page 141: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 142: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 143: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 144: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 145: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 146: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 147: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 148: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 149: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 150: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 151: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 152: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional
Page 153: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Step 3: Configuring the RD GatewayNow the RD Gateway is installed, go to Start > Administrative Tools > Remote Desktop Services > RemoteDesktop Gateway Manager.Right click on the RD Gateway server within the RD Gateway Manager console and select Properties.Select “Create a self-signed certificate” then click “Create and Import Certificate”. You will then be presentedwith the following:

Page 154: TS: Windows Server 2008 R2, Desktop Virtualization · 2019-10-25 · All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional

Make sure that the certificate name is the internet DNS (domain) name that resolves to the internet IP addressof the RD Gateway server. The firewall will need to allow communication to the server on TCP port 443.Tick “Store the root certificate” and choose a file location to save the certificate. For example: C:\rd-cert.cerAs this is a self-signed certificate, you will need to import the certificate to your machine that you are accessingthe RD Gateway from. To do this, follow these steps:From the client machine accessing the RD Gateway, right click on the certificate file and click “InstallCertificate”Click Next then select “Place all certificates in the following store”Browse to “Trusted Root Certification Authorities”, then click Next.Click FinishNote: You will need to ensure that the internet (DNS) host name can be resolved to the internet IP address ofthe RD Gateway server, so make sure that this is the case. This domain name must match the certificate name(E.g. rdg.mydomain.com)Step 4: Configuring the Remote Desktop Connection ClientLaunch the Remote Desktop Connection client.Select the “Advanced” tab and click “Settings”.Select “Use these RD Gateway server settings” (Windows XP will be “Use these TS Gateway settings”)Enter the server / host name (E.g. rdg.mydomain.com) of your RD Gateway serverOptional: Select “Use my RD Gateway credentials for the remote computer”Click OK.Finally, under the “General” tab enter the local IP address or server name of the machine you wish to connectto.Your connection will be tunnelled over SSL, providing your firewall configuration permits TCP port 443 from theinternet to your RD Gateway server and TCP port 3389 from the RD Gateway server to your internal network.

http://www.gratisexam.com/