78
Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation Number : 070-669 Passing Score : 700 Time Limit : 100 min File Version : 1.0 http://www.gratisexam.com/

Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation

Number: 070-669Passing Score: 700Time Limit: 100 minFile Version: 1.0

http://www.gratisexam.com/

Page 2: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Exam A

QUESTION 1Your franchise company is deploying a Microsoft Virtual Desktop Infrastructure (VDI) on servers that runWindows Server 2008 R2.

The franchise owners need access to corporate applications that run on virtual desktops. The owners will use aweb browser to connect to the virtual desktops. Web Single Sign-On (SSO) is not required.

You need to authorize the Microsoft Remote Desktop (RD) servers for Microsoft RemoteApp andDesktop Connection.

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

A. On the RD Session Host server, add the RD Virtualization Host server to the TS Web Access Computersgroup.

B. Add the RD Licensing role service to the RD Web Access server.C. On the RD Connection Broker server, add the RD Web Access server to the Session Broker Computers

group. D. On the RD Session Host server, add the RD Web Access server to the TS Web Access Computers group. E. On the RD Session Host server, add the RD Connection Broker server to the TS Web Access Computers

group. F. On the RD Connection Broker server, add the RD Virtualization Host server to the Session Broker

Computers group. G. Add the RD Licensing role service to the RD Connection Broker server.

Correct Answer: DEFSection: (none)Explanation

Explanation/Reference:Populate the TS Web Access Computers Security GroupIf the RD Web Access server and the Remote Desktop Session Host (RD Session Host) server that hosts theRemoteApp programs are separate servers, you must add the computer account of the RD Web Access serverto the TS Web Access Computers security group on the RD Session Host server.

http://technet.microsoft.com/en-us/library/cc771623.aspx

---AND---

In this step, you will configure RemoteApp and Desktop Connection so that users in the CONTOSO domaincan access it by using Remote Desktop Web Access (RD Web Access). Use the following steps to configureRemoteApp and Desktop Connection:Add the RDCB-SRV (RD Connection Broker) computer ac count object to the TS Web AccessComputers security group on RDSH-SRV (RD Session Host) .

Add a RemoteApp program by using RemoteApp Manager.

Add the RDWA-SRV (RD Web Access) computer account object to the TS Web Access Computerssecurity group on RDCB-SRV.

Assign a RemoteApp source on the RD Web Access server (RDWA-SRV).

Add a RemoteApp source on the RDCB-SRV computer by using Remote Desktop Connection Manager.,you must add the RDCB-SRV computer account object to the TS Web Access Computers security group onRDSH-SRV.

http://technet.microsoft.com/en-us/library/dd883260(v=ws.10)

Page 3: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

---AND---

Configure Security Groups on an RD Connection Broke r ServerYou must configure the following two security groups on the Remote Desktop Connection Broker (RDConnection Broker) server:

TS Web Access ComputersSession Broker Computers

If you have installed and configured a Remote Desktop Session Host (RD Session Host) server to provideredirection to virtual desktops, you must add the computer account for that computer to the local SessionBroker Computers group on the RD Connection Broker server. For information about configuring an RDSession Host server for redirection, see Configuring an RD Session Host Server to Provide Redirection toVirtual Desktops.

If you have deployed a load-balanced RD Session Host server farm to provide RemoteApp programs throughRemoteApp and Desktop Connection, add the computer account for each RD Session Host server in the load-balanced RD Session Host server farm to the Session Broker Computers group.

NoteThe Session Broker Computers group on the RD Connection Broker server must also contain the computeraccounts for any Remote Desktop Virtualization Host (RD Virtualization Host) servers that are hosting virtualmachines used for RemoteApp and Desktop Connection. The computer account for an RD Virtualization Hostserver is automatically added to the Session Broker Computers group when you add the RD Virtualization Hostserver by using the Remote Desktop Connection Manager tool. For more information, see Add an RDVirtualization Host Server for RemoteApp and Desktop Connection.http://technet.microsoft.com/en-us/library/ee216748.aspx

QUESTION 2The company has the following profile redirection requirements:

A single GPO must be used to perform all redirection.All users' Documents folders must reside on their client computers. Redirection must be based on the membership of five existing AD DS security groups. All five AD DS security groups must be defined with a unique folder redirection path.

You need to redirect the users' Pictures folders.

Which Group Policy setting should you select? To answer, select the appropriate setting in the answer area.

Point and Shoot:

Page 4: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Basic Redirection and Advanced RedirectionBasic Redirection and Advanced Redirection are available to all folders listed in the snap-in. You use basicredirection when you store the selected folder in the Group Policy object on the same share for all users. Youuse Advanced Redirection when you want to redirect the selected folder to a different location basedon a security group membership of the user. For example, you would use Advanced Folder Redirectionwhen you want to redirect folders belonging to the Accounting group to the Finance server and foldersbelonging to the Sales group to the Marketing server.

Page 5: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

NoteIf a user is a member of multiple security groups listed for a specific folder, Folder Redirection will use the pathof the first security group that matches for the given user.

Follow Documents folderThe Music, Pictures, and Videos folders support another Folder Redirection setting called Follow Documentsfolder. The Follow Documents folder setting redirects the Music, Pictures, and Videos folders as subfolders ofthe Documents folder. This folder redirection will make the selected folder inherit folder redirection options fromthe Documents folder and disable the folder redirection options for the selected folder.

http://technet.microsoft.com/en-us/library/cc766489(v=WS.10).aspx

QUESTION 3A university is deploying folder redirection for the members of the Students, Staff, and Faculty Active DirectoryDomain Services (AD DS) security groups. All client computers run Windows 7. Currently, there are noredirection policies in place.

The IT department requires that members of each security group store data on a separate file server. Eachuser must have access to only their data from any client computer.

You need to enable folder redirection for all of th e users.

What should you do?

A. Deploy a single Group Policy object and use the Grant the user exclusive rights setting. B. Deploy a single Group Policy object and use the Also apply redirection policy to Windows 2000, Windows

2000 Server, Windows XP, and Windows 2003 operating systems setting.C. Deploy a single Group Policy object and use the Advanced - Specify locations for various user groups

setting.

Page 6: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

D. Deploy three Group Policy objects and use the Redirect to the local user profile location setting.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Basic Redirection and Advanced RedirectionBasic Redirection and Advanced Redirection are available to all folders listed in the snap-in. You use basicredirection when you store the selected folder in the Group Policy object on the same share for all users. Youuse Advanced Redirection when you want to redirect the selected folder to a different location basedon a security group membership of the user. For example, you would use Advanced Folder Redirectionwhen you want to redirect folders belonging to the Accounting group to the Finance server and foldersbelonging to the Sales group to the Marketing server.

NoteIf a user is a member of multiple security groups listed for a specific folder, Folder Redirection will use the pathof the first security group that matches for the given user.

http://technet.microsoft.com/en-us/library/cc766489(v=WS.10).aspx

QUESTION 4Your company uses Microsoft Remote Desktop Services (RDS) in a virtual environment.

The Remote Desktop Licensing (RD Licensing) database has become corrupted.

You need to ensure that you can manage the RDS clie nt access licenses (RDS CALs).

What should you do first?

Page 7: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

A. Reinstall the RDS CALs. B. Migrate the RDS CALs from another license server to this license server. C. Rebuild the license server database. D. Reactivate the license server.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Event ID 47 — Remote Desktop License Server Database AvailabilityEvent DetailsMessage: The RD Licensing database is corrupt . RD Licensing could not rename the RD Licensing database file "%1!s!" to create abackup. Rename the file manually and restart the Remote Desktop Licensing service. To reinstall the Remote Desktop Services clientaccess licenses (RDS CALs), you will need to call the Microsoft Clearinghouse. When you call the Clearinghouse, ensure that yourLicense Purchase Agreement information is readily available.

ResolveReinstall the RDS CALs onto the license server by u sing the telephone methodTo resolve this issue, do the following on the Remote Desktop license server:

Rename the RD Licensing database file. Start the Remote Desktop Licensing service. Reinstall the Remote Desktop Services client access licenses (RDS CALs) by using the telephone method.

To perform these procedures, you must have membership in the local Administrators group, or you must havebeen delegated the appropriate authority.

http://technet.microsoft.com/en-us/library/ee891345(v=ws.10).aspx

QUESTION 5A company is migrating all of its computers from Windows Vista to Windows 7.

You need to use the Microsoft User State Migration Tool (USMT) to migrate user profiles andapplication customization settings to Windows 7.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list ofactions to the answer area and arrange them in the correct order.)

Build List and Reorder:

Page 8: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Scenario One: PC refresh using a compressed migrati on storeFor example, a company has just received funds to update all of its computers to Windows® 7. Each employeewill keep the same computer, but the operating system on each computer will be updated.1. An administrator runs the ScanState command-line tool on each computer. ScanState saves each userstate to a server.2. On each computer, an administrator installs the company's standard operating environment, which includesWindows 7, Microsoft® Office, and other company applications .3. An administrator runs the LoadState command-line tool on each computer. LoadState restores each userstate back to the source computer.

QUESTION 6Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2.

You use a virtual desktop infrastructure (VDI) environment to provide access to applications. AII virtual desktopcomputer objects are located in an organizational unit (OU) named VirtuaIDesktops. All client computer objectsare located in an OU named Desktops.

Page 9: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

You need to ensure that all existing users receive the same desktop shortcuts, and that they are notable to modify the shortcuts from virtual desktops.

http://www.gratisexam.com/

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Create a new default user profile. B. Create a Group Policy object (GPO) that configures the user profile. Link the GPO to the VirtuaIDesktops

OU. C. Create a Group Policy object (GPO) that configures the user profile. Link the GPO to the Desktops OU. D. Create a mandatory user profile.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:A mandatory user profile is a special type of pre-configured roaming user profile that administrators can use tospecify settings for users. With mandatory user profiles, a user can modify his or her desktop, but the changesare not saved when the user logs off. The next time the user logs on, the mandatory user profile created by theadministrator is downloaded. There are two types of mandatory profiles: normal mandatory profiles and super-mandatory profiles.User profiles become mandatory profiles when the administrator renames the NTuser.dat file (the registry hive)on the server to NTuser.man. The .man extension causes the user profile to be a read-only profile.User profiles become super-mandatory when the folder name of the profile path ends in .man; for example, \\server\share\mandatoryprofile.man\.Super-mandatory user profiles are similar to normal mandatory profiles, with the exception that users who havesuper-mandatory profiles cannot log on when the server that stores the mandatory profile is unavailable. Userswith normal mandatory profiles can log on with the locally cached copy of the mandatory profile.Only system administrators can make changes to mandatory user profiles.http://msdn.microsoft.com/en-us/library/windows/desktop/bb776895(v=vs.85).aspx

To create a roaming user profile1. Open Active Directory Users and Computers .2. Click the domain and the OU where the user account resides.3. Right-click the user account for which to set a roaming profile, and then click Properties .4. Click the Profile tab, and then type the profile path information in Profile path . (Use the full path in each

user account. For example, type \\Server\ShareName\UserName .)

To create a roaming user profile for a user that ha s a local profileOpen Active Directory Users and Computers .

1. Click the domain and the OU where the user account resides.2. Right-click the appropriate user account for which to set a roaming profile, and then click Properties.3. Click the Profile tab, and type the profile path information in Profile path (for example, type \\Server

\ShareName\UserName ).

Additional Policy Settings That Are Related to User ProfilesPrevent roaming profile changes from propagating to the serverThis policy determines if the changes a user makes to their roaming profile are merged with the server copy oftheir profile. If this policy is set, at logon users receive their roaming profile, but any changes users make to

Page 10: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

their profile are not merged to the users’ roaming profile at logoff.

Then create a dummy account as described earlier, log on to a desktop machine using this account,preconfigure the desktop, and log off. Log on to the desktop as Administrator and open the User Profiles dialogbox as before, using System in Control Panel. Select the local profile for your template account and click onCopy To as before. But this time, in the Copy To box above, type \\<dcname>\NETLOGON\Default User,where <dcname> is the name of your domain controller. Then click on Change and specify Everyone so thatany user can use this new profile. Now when you click on OK, your preconfigured profile is copied to the NETLOGON share on your domain controller as a folder named Default User. When a user logs on to thenetwork for the first time, her machine will access this share and use this preconfigured profile as the basis forcreating her roaming profile, which is saved in \\<servername>\<sharename> as before.http://windowsdevcenter.com/pub/a/windows/2004/08/17/roaming_profiles.html

QUESTION 7Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote DesktopSession Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. All clientcomputers run Windows 7.

You need to ensure that the current Libraries from users' computers are available when they Iog on tothe RD Session Host server.

What should you do?

A. Redirect each user s Documents folder to a network share.B. Use Group Policy Preferences to copy .library-ms files from the client computers to the RD Session Host

server. C. Redirect each user's Links folder to the RD Session Host server. D. Use a startup script to copy .library-ms files from the client computers to the RD Session Host server.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Administrators can deploy customized libraries in the following ways:

Using a logon script or Group Policy Preferences (through the Default User profile)Adding custom libraries to the server where Roaming User Profiles are redirected

Deploying through a logon script or Group Policy Pr eferencesYou can copy the .library-ms files to a local computer or copy them to a server if the users’ library directoriesare redirected to a network location. You can use a logon script or Group Policy Preferences to copy libraries tothe %userprofile%\Appdata\roaming\Microsoft\Windows\Lib raries directory. The locations specified in custom libraries need to be accessible by the target users. These locations includeknown folders, fixed local folders, mapped drives on the users’ computers, or network shared resources whereusers have access. If a user does not have permissions to a folder, that folder does not appear in the libraryand no warning appears for the user. Using the Default User profile Administrators can edit the set of libraries associated with the Default Userprofile, and then deploy the libraries to users who derive from Default User.Deploying libraries using Roaming User ProfilesRemote libraries can include content from locations that are local or remote to the server, much as locallibraries can. To support this, the user’s known folders are ideally redirected and available in the Roaming UserProfiles. Library definition files are located in the %userprofile%\Appdata\roaming\Microsoft\Windows\Libraries directory, and they can be shared on a server.

http://technet.microsoft.com/en-us/library/ee461108(v=ws.10).aspx

QUESTION 8

Page 11: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Your company has an Active Directory Domain Services (AD DS) domain that runs at the Windows Server2008 functional level. All servers run Windows Server 2008 R2. AII client computers run Windows XPProfessional.

You use the Key Management Service (KMS) to manage your volume license activations. AII servers havebeen activated by using KMS.

You deploy 20 Windows 7 virtual desktops. The virtual desktop operating systems do not activate.

You need to ensure that the virtual desktops activa te by using KMS.

What should you do?

A. Deploy five more virtual desktops.B. Raise the domain functional level to Windows Server 2008 R2.C. Use the Volume Activation Management Tool (VAMT).D. Run slmgr vbs with the -ato parameter.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:KMS Activation ThresholdsKMS can activate both physical computers and virtual machines. To qualify for KMS activation, a network mustmeet the activation threshold: KMS hosts activate client computers only after meeting this threshold. To ensurethat the activation threshold is met, a KMS host counts the number of computers that are requesting activationon the network. For computers running Windows Server 2008 or Windows Server 2008 R2, the activationthreshold is five. For computers running Windows Vista or Windows 7, t he activation threshold is 25 .The thresholds include client computers and servers that are running on physical computers or virtualmachines.A KMS host responds to each valid activation request from a KMS client with the count of how many computershave contacted the KMS host for activation. Clients that receive a count below their activation threshold are notactivated. For example, if the first two computers that contact the KMS host are running Windows 7, the firstreceives an activation count of 1, and the second receives an activation count of 2. If the next computer is aWindows 7 virtual machine, it receives an activation count of 3, and so on. None of these computers isactivated, because computers running Windows 7 must receive an activation count ≥25 to be activated. KMSclients in the grace state that are not activated because the activation count is too low connect to the KMS hostevery two hours to get the current activation count and will be activated when the threshold is met.

http://technet.microsoft.com/en-us/library/ff793434.aspx

QUESTION 9Your company has an Active Directory Domain Services (AD DS) domain. You have multiple Remote DesktopSession Host (RD Session Host) servers. You have 100 Windows Server 2008 R2 Remote Desktop Servicesclient access licenses (RDS CALs) installed on your license server.

You need to return 10 RDS CALs to the pool on the l icense server.

What should you do?

A. Remove the Per User RDS CALs. B. Remove the Per Device RDS CALs.C. Revoke the Per User RDS CALs. D. Revoke the Per Device RDS CALs.

Correct Answer: DSection: (none)

Page 12: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Explanation

Explanation/Reference:A permanent RDS Per Device CAL issued by a license server is configured to automatically expire after arandom period between 52 and 89 days, at which time the RDS Per Device CAL returns to the pool of availableRDS Per Device CALs on the license server.In some circumstances, you might want or need to return an RDS Per Device CAL that has been issued backto the available pool on the license server before the automatic expiration period has been reached. Forexample, you might want to do this if the client computer or device is no longer a part of your environment.You can revoke an RDS Per Device CAL by using the Remote Desktop Licensing Manager tool.

ImportantYou can only revoke an RDS Per Device CAL. You cannot revoke an RDS Per User CAL.

http://technet.microsoft.com/en-us/library/cc732416.aspx

QUESTION 10Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2.

You provide access to some applications through a virtual desktop infrastructure (VDI) environment.AII virtualdesktop computers are located in an organizational unit (OU) named VirtuaIDesktops. All other client computerobjects are located in an OU named Desktops.

Many users experience long logon times when logging into virtual desktop computers due to large roamingprofiles.

You need to reduce the user logon times for virtual desktop computers.

What should you do?

A. Create a Group Policy object (GPO) that enables folder redirection for all users. Enable loopbackprocessing, and link the GPO to the VirtuaIDesktops OU.

B. On each virtual desktop computer, set a disk quota on the system drive.C. Create a Group Policy object (GPO) that enables folder redirection for all users. Enable slow link detection,

and link the GPO to the VirtuaIDesktops OU. D. On each client computer, set the temporary folders option to not use session-specific temporary folders.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Combine Roaming User Profiles with Folder Redirecti onWhen a user gets a roaming user profile, the data and settings that are stored in the user’s local profiledirectories become mobile. The profile data is stored on a server and copied to a workstation when the userlogs on. Storing this data on servers simplifies data backup and security. However, because large folders, suchas My Documents , are copied, there can be logon delays. You can avoid these delays by using FolderRedirection in combination with Roaming User Profiles.When a user profile folder is redirected to a shared folder on the network, the folder is no longer part of the userprofile. While other profile data is copied to the local workstation when the user logs on, the redirected folderremains on the server and is accessed over the network.

Limiting use of Group Policy loopback processing if you use roaming profilesThe User Group Policyloopback processing mode policy setting is an advanced option that is intended tokeep the desktop configuration the same regardless of who logs on. This option is appropriate for use in certainclosely managed environments, such as classrooms, public kiosks, reception areas, servers, and terminal

Page 13: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

servers. When you enable the loopback processing policy setting in a GPO, you can configure user-basedpolicy settings within that GPO, and those settings are applied regardless of which user logs on to thecomputer, meaning that those settings override individual user settings. When you use the User GroupPolicyloopback processing mode policy setting, you must ensure that both the computer and user portions ofthe GPO are enabled. The User Group Policyloopback processing mode policy setting is available in theComputer Configuration\Administrative Templates\Sys tem\Group Policy node of the Group Policy ObjectEditor.By default, the user’s Group Policy objects determine which user settings apply. When you enable this policysetting, you also specify either the Replace mode or the Merge mode, which determines the policies that areapplied.Replace mode The user settings that are defined in the computer’s Group Policy objects replace the usersettings that are typically applied to the user.Merge mode The user settings that are defined in the computer’s Group Policy objects and the user settingsthat are typically applied to the user are combined. If the settings conflict, the user settings in the computer’sGroup Policy objects take precedence over the user’s policy settings.If you disable or do not configure the User Group Policyloopback processing mode setting, the user’s GroupPolicy objects determine which user settings apply.

http://technet.microsoft.com/en-us/library/cc736881(v=ws.10)

QUESTION 11Your company is deploying 200 Windows 7 Enterprise virtual machines (VMs). The company uses KeyManagement Service (KMS) for client computer activation. Two servers named Server1 and Server2 are KMShosts that run Windows Server 2008 R2.

After deployment, the VMs are unable to activate on Server1.

You need to ensure that the VMs can activate by usi ng KMS.

On Server1, which firewall rule should you change? To answer, select the appropriate setting in the answerarea.

Point and Shoot:

Correct Answer:

Page 14: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Section: (none)Explanation

Explanation/Reference:Q. I've enabled Key Management Service (KMS) on a server, but clients can’t activate. Why not?A. There’s a minimum number of activations before a KMS server will start activating clients. However, if theclients can’t even connect, make sure the firewalls on the server and client have the Key Management Service(TCP-In) exception enabled, which allows KMS communications through port 1688 as shown.http://www.windowsitpro.com/article/systems-management/q-i-ve-enabled-key-management-service-kms-on-a-server-but-clients-can-t-activate-why-not-

QUESTION 12Your company has a Windows Hyper-V environment with existing virtual machines (VMs). You manage theVMs with Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and VMM 2008 R2 Self-ServicePortal (VMMSSP) that runs on Windows Server 2008 R2.

The company has the following VMMSSP environment requirements:

Developers must be able to create and manage VMs on two Windows Hyper-V hosts. Other hosts must not be impacted by the developers' VMs.

You need to configure the VMMSSP environment to mee t company requirements.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list ofactions to the answer area and arrange them in the correct order.)

Build List and Reorder:

Page 15: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Correct Answer:

Section: (none)Explanation

Explanation/Reference:1. Go to Microsoft System Center => Virtual Machine Manager 2008 and launch the virtual machineadministrator console.2. Create a new group called HyperV by right-clicking All Hosts and selecting New host group .

Figure 8: Creating a host group3. Click on the Hosts button in the left pane and click the Add Hosts link on the right. Notice the Add VMwareVirtualCenter Server link. This feature is used to add your VitrtualCenter server to VMM and will be explored inan upcoming article!

Page 16: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Figure 9: Adding a host

http://www.virtualizationadmin.com/articles-tutorials/microsoft-hyper-v-articles/general/managing-hyper-v-systemcenter-virtual-machine-manager-2008-part1.html

---AND---The Virtual Machine Manager (VMM) Self-Service Portal is an optional, Web-based component that a VMMadministrator can configure to enable end users to create and manage their own virtual machines within acontrolled environment.4. The VMM administrator limits the scope of self-service users by creating self-service policies. A self-service policy grants a user or group permissions to create, operate, manage, store, create checkpoints for,and connect to their own virtual machines.

http://technet.microsoft.com/en-us/library/bb894362.aspx

QUESTION 13A company is deploying a Microsoft Virtual Desktop Infrastructure (VDI) for hosting Windows 7 client computerson a server that runs Windows Server 2008 R2 Enterprise.

Each device connecting to the VDI needs a license for compliance. The company acquires Windows Server2008 R2 client access licenses (CALs) for all users. The company does not use Microsoft ApplicationVirtualization (App-V).

You need to specify the license types required for the devices that connect to the VDI.

Which three license types you should specify? (Each correct answer presents a complete solution. Choosethree.)

A. Windows Virtual Enterprise Centralized Desktop (VECD) B. RDS Client Access License (CAL) C. Windows 7 Client Access License (CAL) D. Microsoft VDI Standard Suite license E. Microsoft VDI Premium Suite licenseF. Windows Virtual Desktop Access (VDA)

Correct Answer: ADFSection: (none)Explanation

Explanation/Reference:Microsoft's VECD a mandatory license for virtualiza tionVECD stands for "Virtual Enterprise Centralized Desktop." It's the license that Microsoft requires to use itsdesktop virtualization. VECD must be purchased in addition to the base Windows operating system license. Soif you want to virtualize Windows, you have to buy this VECD license as a second license. If you don't like it --too bad. Don't use Windows then. (Ah, the joys of a monopoly.)

Page 17: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

http://searchvirtualdesktop.techtarget.com/news/1379180/Microsofts-VECD-a-mandatory-license-for-virtualization

Thin Client Devices Still Need LicensingCertain devices, such as thin clients, are not eligible for Software Assurance and therefore will not haveWindows Virtual Desktop Access Rights. You can license such devices with a Windows VDA subscriptionlicense.http://www.microsoft.com/licensing/software-assurance/windows-virtualization.aspx

The VDI Standard Suite is a collection of technology to help organizations deploy the basic infrastructure forVDI. Hyper-V Server 2008 R2 is the virtualization platform for hosting your servers and desktops. Managementof your virtual infrastructure is taken care of the various system center components, including System CenterVirtual Machine Manager, System Center Operations Manager 2007 R2 and System Center ConfigurationManager 2007 R2. Applications can be delivered dynamically via App-V, since MDOP is also included in theVDI standard suite. The standard suite also enables restricted use rights for Remote Desktop Services, todeliver VDI desktops to users .http://ladylicensing.wordpress.com/2009/09/30/introducing-vdi-standard-and-premium-suites-%E2%80%93-overview-and-licensing-tcs/

QUESTION 14Note: This question is part of s series of question s that use the same set of answer choices. An answe rchoice may be correct for more than one question in the series.

All client computers in a test environment run Windows 7 Enterprise with Windows XP Mode.

You are planning to publish a new application on a Windows XP Mode virtual machine (VM).

You need to ensure that you can discard all of the changes to the VM by using the least amount ofadministrative effort.

What should you do?

A. Merge the disk. B. Compact the disk. C. Create a fixed-size disk.D. Create a differencing disk. E. Create a dynamically expanding disk.F. Enable Integration Features.G. Configure Enable Undo Disks.H. Configure the VM network adapter to Not Connected.I. Configure the VM network adapter to Internal Network.J. Configure the VM network adapter to Shared Networking (NAT).K. Configure the VM network adapter to the physical network adapter.

Correct Answer: GSection: (none)Explanation

Explanation/Reference:Use Undo Disks

Undo Disks is a feature that saves changes to a virtual machine in a separate undo disk file in case you want toreverse the changes. The Undo Disks setting applies to all virtual hard disks attached to the virtual machine. When you run a virtual machine that is using Undo Disks, any changes to a virtual hard disk are temporarilystored in an undo disk (.vud) file, rather than in the virtual hard disks attached to the virtual machine. As youcontinue to make changes to a virtual machine, those changes continue to grow in the undo disk. If you decideto either apply or discard the changes stored in an undo disk, that action applies to all changes stored in the

Page 18: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

undo disk—in other words, you cannot selectively apply or discard changes on an undo disk.

To turn the Undo Disks feature on or offIf the virtual machine is running or hibernated, shut it down. For instructions, see Shut down a virtual machinemanually.1. Open the Virtual Machines folder.2. Right-click the name of the virtual machine, and then click Settings .3. In the left pane of Windows Virtual PC Settings , click Undo Disks .4. In the right pane, click Enable Undo Disks , and then click OK.After you turn on the Undo Disks feature for a virtual machine, an undo disk stores all the changes associatedwith that virtual machine from the time that you start using the feature. These changes can include data thatyou add or delete to a virtual machine, updates applied to the guest operating system or applications, or eventhe addition or removal of applications. All virtual hard disks attached to the virtual machine are unaffected bythe changes unless you apply the changes. To delete the undo disk file, you discard all the changes. Thiseffectively leaves the virtual hard disks intact and eliminates the possibility that the changes will be applied tothe virtual hard disk.

Refer to the following steps to apply or delete an undo disk. You also can configure the virtual machine so youcan choose to discard the undo disk when you close the virtual machine. For more information, see Close avirtual machine.Note. The undo disk file is stored in the same folder as the virtual machine configuration (.vmc) file.

To apply or delete an undo disk1. Follow the steps in the previous section to open the Enable Undo Disks setting.2. In the right pane, click either Apply changes or Discard changes , and then click OK.

http://technet.microsoft.com/en-us/library/ee449453(v=ws.10)

QUESTION 15Note: This question is part of a series of question s that use the same set of answer choices. An answe rchoice may be correct for more than one question in the series.

All client computers in your company run Windows 7 Enterprise and Windows Virtual PC with multiple virtualmachines (VMs).

A new company security policy states that all VMs must be able to communicate only with other VMs on thesame host.

You need to ensure that the VMs do not connect to t he company's network.

What should you do?

A. Merge the disk. B. Compact the disk. C. Create a fixed-size disk.D. Create a differencing disk. E. Create a dynamically expanding disk.F. Enable Integration Features.G. Configure Enable Undo Disks.H. Configure the VM network adapter to Not Connected.I. Configure the VM network adapter to Internal Network.J. Configure the VM network adapter to Shared Networking (NAT).K. Configure the VM network adapter to the physical network adapter.

Correct Answer: ISection: (none)Explanation

Page 19: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Explanation/Reference:Configure networking for virtual machines

You can configure networking to provide virtual machines with different types of network connectivity. A virtualmachine can have as many as four network adapters enabled, each of which can be configured to use adifferent type of networking. You can use the following types of networking in a virtual machine:

Internal network . This option provides networking between virtual machines only. This type of networkconnection is useful when you want to provide a networking communications channel to the virtual machines onone physical computer while isolating the virtual machines from all external networks, both wired and wireless,as well as the host operating system.

<Network adapter name> (on host operating system) . This option is sometimes referred to as “bridgedmode”. It uses a physical network adapter to connect the virtual machine to a physical TCP/IP-based networkas a separate computer. The virtual machine appears and operates like a separate physical computer on thenetwork. You use this option by selecting the name of the physical network adapter that is connected to thenetwork you want to use. You can choose from both wired and wireless network adapters.

Shared networking (NAT) . This option is available for the first network adapter in the virtual machine. It allowsthe virtual machine to share one connection to a physical TCP/IP network with the host operating system.When you use this option, the virtual machine is not listed as a separate computer on the network. This isuseful if you regularly move the host between different network configurations, if you want to connect the virtualmachine to the Internet through a broadband or dial-up connection used by the host, including a virtual privatenetwork (VPN) connection, or if there is a shortage of IP addresses. However, performance is not as fast as theperformance offered by bridged mode.

If the Windows 7 host uses a wireless WAN (WWAN) device to connect to the Internet and you want a virtualmachine to be able to use this connection, you must configure the virtual machine to use shared networking(NAT).

http://technet.microsoft.com/en-us/library/ee449441(v=ws.10).aspx

QUESTION 16Note: This question is part of a series of question s that use the same set of answer choices. An answe rchoice may be correct for more than one question in the series.

A company is deploying Windows XP Mode virtual machines (VMs) to all its Windows 7 client computers.

You need to ensure that the VMs are visible to the client computers on the company network.

What should you do?

A. Merge the disk. B. Compact the disk. C. Create a fixed-size disk.D. Create a differencing disk. E. Create a dynamically expanding disk.F. Enable Integration Features.G. Configure Enable Undo Disks.H. Configure the VM network adapter to Not Connected.I. Configure the VM network adapter to Internal Network.J. Configure the VM network adapter to Shared Networking (NAT).K. Configure the VM network adapter to the physical network adapter.

Correct Answer: KSection: (none)

Page 20: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Explanation

Explanation/Reference:Configure networking for virtual machines

You can configure networking to provide virtual machines with different types of network connectivity. A virtualmachine can have as many as four network adapters enabled, each of which can be configured to use adifferent type of networking. You can use the following types of networking in a virtual machine:

Internal network . This option provides networking between virtual machines only. This type of networkconnection is useful when you want to provide a networking communications channel to the virtual machines onone physical computer while isolating the virtual machines from all external networks, both wired and wireless,as well as the host operating system.

<Network adapter name> (on host operating system) . This option is sometimes referred to as “bridgedmode”. It uses a physical network adapter to connect the virtual machine to a physical TCP/IP-based networkas a separate computer. The virtual machine appears and operates like a separate physical computer on thenetwork. You use this option by selecting the name of the physical network adapter that is connected to thenetwork you want to use. You can choose from both wired and wireless network adapters.

Shared networking (NAT) . This option is available for the first network adapter in the virtual machine. It allowsthe virtual machine to share one connection to a physical TCP/IP network with the host operating system.When you use this option, the virtual machine is not listed as a separate computer on the network. This isuseful if you regularly move the host between different network configurations, if you want to connect the virtualmachine to the Internet through a broadband or dial-up connection used by the host, including a virtual privatenetwork (VPN) connection, or if there is a shortage of IP addresses. However, performance is not as fast as theperformance offered by bridged mode.

If the Windows 7 host uses a wireless WAN (WWAN) device to connect to the Internet and you want a virtualmachine to be able to use this connection, you must configure the virtual machine to use shared networking(NAT).

http://technet.microsoft.com/en-us/library/ee449441(v=ws.10).aspx

QUESTION 17Note: This question is part of a series of question s that use the same set of answer choices. An answe rchoice may be correct for more than one question in the series.

A company has a main office and several branch offices. Each branch office is connected to the main office bya low-bandwidth link.

You have a virtual hard disk (VHD) that contains Windows 7 and a large amount of data. You delete asignificant portion of the data.

You need to prepare the existing VHD for deployment to the branch offices while minimizing thedeployment time.

What should you do?

A. Merge the disk. B. Compact the disk. C. Create a fixed-size disk.D. Create a differencing disk. E. Create a dynamically expanding disk.F. Enable Integration Features.G. Configure Enable Undo Disks.H. Configure the VM network adapter to Not Connected.

Page 21: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

I. Configure the VM network adapter to Internal Network.J. Configure the VM network adapter to Shared Networking (NAT).K. Configure the VM network adapter to the physical network adapter.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Compacting a dynamically expanding virtual hard disk reduces the size of the virtual hard disk (.vhd) file asmuch as possible. Typically you would compact a virtual hard disk in situations such as the following:

After you install the guest operating system (which uses many temporary files)After you delete large amounts of dataWhen you are preparing the virtual hard disk for archiving, for deployment to another computer or CD-ROM,or for distribution

You can compact a dynamically expanding virtual hard disk. You cannot compact any other type of virtual harddisk. However, you can convert a fixed-size virtual hard disk to a dynamically expanding virtual hard disk andthen compact the disk. If you want to compact a differencing virtual hard disk or an undo disk, you must mergethe changes to the parent disk and then compact the parent disk, if it is a dynamically expanding virtual harddisk. For instructions on converting disks, see Convert a virtual hard disk. For instructions on merging disks,see Merge a virtual hard disk.

http://technet.microsoft.com/en-us/library/cc708394(v=ws.10).aspx

QUESTION 18You manage a server that runs Windows Server 2008 R2 with the Remote Desktop Services (RDS) roles.Some applications are accessible through Remote Desktop Web Access (RD Web Access).

You need to ensure that a newly installed applicati on is accessible through RD Web Access.

Which tool should you use?

A. RemoteApp ManagerB. Remote DesktopsC. Remote Desktop Session Host ConfigurationD. RD Web Access ConfigurationE. Remote Desktop Services Manager

Correct Answer: ASection: (none)Explanation

Explanation/Reference:1. Choose Start, Administrative Tools, Remote Desktop Services, RemoteApp Manager to open its MMCsnap-in:

Page 22: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Click the A Remote Desktop Connection for This Server Is Not Visible in RD Web Access Change link to openthe RemoteApp Deployment Settings dialog with the RD Session Host Server tab active and mark the Show aRemote Desktop Connection … check box:

Page 23: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

http://oakleafblog.blogspot.com/2012/07/enabling-remote-desktop-services-in.html

----AND---

To enable users to have access to remote applications is needed to publish them in the RemoteApp Server, asthe following procedure.

Procedure

The first step is to install all applications on RemoteApp that will be available on Server. Is interesting to checkwith the vendor if the application supports Windows Server 2008 for compatibility issues.

After that, click Start> Administrative Tools> Remote Desktop Services and open the RemoteApp Manager .

On the right side of the screen click Add RemoteApp Programs , as shown in Figure 1.

Page 24: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Figure 1 - Adding an application to the RemoteApp Server

Soon will be displayed a to add the application. Click Next.

On the next screen you can see a list of all applications available to add. Some of them are native to Windowsand the rest are the ones that were installed on the server.

Choose programs that will be added and click Next. In the example 2 were added to WordPad and Notepad.

Page 25: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Figure 2 - the RemoteApp Programs Available

After this, click Next and Finish to confirm the addition.

In RemoteApp Manager will be displayed a list of applications that have been added. By default all users thathave access to RemoteApp Server can use them.

If you need to restrict access to a user group, click the right application and then click Properties .

Click the User Assignment tab and add the desired groups. After this procedure, only those groups and / orusers of this list will have access to the software.

Page 26: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Figure 3 - Users with access to software

Users can now access the programs through the RDP connection. For demonstration in Figure 4 and 5 wasused the Remote Desktop Web portal access to applications. The user used is a member of the access groupadded in step one.

Page 27: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Figure 4 – Remote Desktop Web Portal

Figure 5 - Access Group RDS

Page 28: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

This is not the only way to use the applications. You can also create an MSI file to install an icon on the desktopand start menu containing the access settings or creating a connection to access RemoteApp.

http://social.technet.microsoft.com/wiki/contents/articles/publish-a-remoteapp-application-on-remote-desktop-service.aspx

QUESTION 19Your company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7.You have a Remote Desktop Session Host (RD Session Host) server.

You have the following requirements:

Local devices from remote desktop clients must be r edirected to the RD Session Host server. USB devices from remote desktop clients must not be redirected to the RD Session Host server.

What should you do?

A. Enable the Prevent installation of removable devices Group Policy setting on the RD Session Hostserver.

B. Disable drive redirection on the RD Session Host server. C. Disable drive redirection on the remote desktop clients. D. Enable the Prevent installation of removable devices Group Policy setting on the remote desktop clients.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Prevent Installation of Removable Devices

You can use this procedure to prevent installation of any removable device.A device is considered removable when its device driver, or the device driver for the bus to which the device isattached, reports that it is a removable device.If this policy is enabled, in addition to preventing installation of the affected devices, it also prevents users fromupdating the device drivers for already installed devices that match the policy.

http://technet.microsoft.com/en-us/library/cc753539(v=ws.10).aspx

QUESTION 20You deploy a Microsoft RemoteApp program on a Remote Desktop Session Host (RD Session Host) serverfarm. The RD Session Host servers run on Windows Server 2008 R2.

When users log in to the RemoteApp program, a list of the local drives of the RD Session Host servers isdisplayed. Users often save files on local server drives in the Downloads folder and on the server desktop ofthe RD Session Host servers.

You need to ensure that a list of local drives and folders on the RD Session Host servers is notdisplayed to users. The solution cannot negatively impact performance of the RemoteApp program.

Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)

A. Modify the registry on each RD Session Host server to hide Favorites and Libraries from the navigationpane.

B. Configure the RD Session Host servers to disable redirection of the local device. C. Deploy the Group Policy settings Hide these specified drives in My Computer and Prevent access to

drives from My Computer to the RD Session Host servers. D. Deploy the Group Policy settings for a Software Restriction Policy with a security level of Basic User to the

Page 29: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

RD Session Host servers.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:The primary reason to remove Favorites and Libraries and access to drives is because they contain mostlyaccessed locations on a system, so in the case of the RD Session Host server, this includes the desktop,downloads, recent places, etc. It is recommended that a user not save any documents to these locations.

Removing Favorites and LibrariesYou must perform these modifications on the RD Session Host server. You can use the Registry to make thesechanges.

Using the Registry (applies to all users including the administrators )1. For Favorites , the key is: [HKEY_CLASSES_ROOT\CLSID\{323CA680-C24D-4099-B94D-446DD2D7249E}\ShellFolder] "Attributes"=dword:a0900100 Changing a0900100 to a9400100 will hide Favorites from the navigation pane.

2. For Libraries , the key is:[HKEY_CLASSES_ROOT\CLSID\{031E4825-7B94-4dc3-B131-E946B44C8DD5}\ShellFolder] "Attributes"=dword:b080010d Changing b080010d to b090010d will hide Libraries from the navigation pane.

Hiding/Preventing Access to DrivesYou can use Group Policy settings to hide and restrict access to drives on the RD Session Host server. Byenabling these settings you can ensure that users do not inadvertently access data stored on other drives, ordelete or damage programs or other critical system files on drive C.

The following settings are located in the Group Policy Management Console under User Configuration\Policies\Administrative Templates\Windows Componen ts\Windows Explorer :Hide these specified drives in My Computer. You can remove the icons for specified drives from a user’s MyComputer folder by enabling this setting and using the drop-down list to select the drives you would like to hide.However, this setting does not restrict access to these drives. Prevent access to drives from My Computer. Enable this setting to prevent users from accessing the chosencombination of drives. Use this setting to lock down the RD Session Host server for users accessing it for theirprimary desktop.

http://blogs.msdn.com/b/rds/archive/2011/05/26/how-to-restrict-users-from-accessing-local-drives-of-an-rd-session-host-server-while-using-remoteapp-programs.aspx

QUESTION 21Your company runs Remote Desktop Services. You have a Remote Desktop Web Access (RD Web Access)server.

You publish several applications on the internal network by using RD Web Access.

You need to ensure that the published applications are accessible from the Internet via an HTTPSconnection over port 443.

What should you do first?

A. Use Internet Information Services (IIS) Manager to enable Windows Authentication. B. Use Internet Information Services (IIS) Manager to disable Forms Authentication. C. Install and configure the Remote Desktop Connection Broker (RD Connection Broker) role service on the

RD Web Access server.

Page 30: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

D. Install and configure the Remote Desktop Gateway (RD Gateway) role service on the RD Web Accessserver.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Remote Desktop Services in Windows 2008 R2 – Part 2 – RD GatewayThe RD Gateway was formerly known as Terminal Server (TS) Gateway. TS Gateway opened up RemoteAccess barriers providing access to our Terminal Servers via SSL or port 443, as opposed to the conventional“legacy” VPN access through either IPSEC or L2TP. In Windows Server 2008 R2, not much has changed andin today’s article I will provide you with a step by step guide on configuring your RD Gateway which will provideyour remote users access to the Remote Desktop Host or RD Web Access via any Internet connection utilisingRemote Desktop Connection client over HTTPS.http://sharepointgeorge.com/2009/remote-desktop-services-windows-2008-r2-part-2-gateway/

Checklist: Make RemoteApp Programs Available from t he InternetBy using RemoteApp together with RD Gateway, you can enable users to connect from the Internet to individualprograms on a Remote Desktop Session Host (RD Session Host) server without having to first establish avirtual private network (VPN) connection. Depending on the deployment method that you choose, remote userscan connect to a program by opening an .rdp file, by clicking a shortcut to a Windows Installer package on theirdesktop or Start menu, or by accessing a RemoteApp program through RemoteApp and Desktop Connectionby using RD Web Access.http://technet.microsoft.com/en-us/library/cc772415.aspx

Configure the Remote Desktop Web Access Server to A llow Access from the InternetTo allow users to access the RD Web Access server from the Internet, you can also deploy RD Gateway. Arecommended configuration is to place both the RD Gateway server and the RD Web Access server in theperimeter network, with the Remote Desktop Session Host (RD Session Host) servers that host RemoteAppprograms behind the internal firewall. For more information about how to deploy RD Gateway and about how to make RemoteApp programsavailable from the Internet, see Checklist: Make RemoteApp Programs Available from the Internet.After you have deployed RemoteApp programs, RD Gateway, and RD Web Access, you must configure yourfirewall to allow Windows Management Instrumentation (WMI) traffic from the RD Web Access server to theRD Session Host server.

Additionally, verify that the RD Web Access Web site is configured to use Forms Authentication.To configure the RD Web Access Web site to use Windows Authentication instead of Forms Authentication orto not use SSL, see Remote Desktop Web Access Security.http://technet.microsoft.com/en-us/library/cc770330

ImportantThe RD Web Access Web site is automatically configured to use Secure Sockets Layer (SSL) with a self-signed certificate. By default, the self-signed certificate is not a trusted certificate, and self-signed certificatesare recommended only for testing and evaluation purposes. For more information about configuring the RDWeb Access Web site to use a trusted certificate, such as a certificate issued by a trusted public certificationauthority (CA), see Remote Desktop Web Access Security.http://technet.microsoft.com/en-us/library/cc730739.aspx

QUESTION 22Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host)server.

You need to ensure that remote desktop users can pr int only to the printers that are installed on the RDSession Host server.

What should you do?

Page 31: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

A. Disable the Do not allow client printer redirection Group Policy setting. B. Enable the Do not set default client printer to be default pri nter in a session Group Policy setting. C. Disable the Do not set default client printer to be default pri nter in a session Group Policy setting. D. Enable the Do not allow client printer redirection Group Policy setting.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Do not allow client printer redirectionThis policy setting allows you to specify whether to prevent the mapping of client printers in Terminal Servicessessions.You can use this policy setting to prevent users from redirecting print jobs from the remote computer to a printerattached to their local (client) computer. By default, Terminal Services allows this client printer mapping.

If you enable this policy setting, users cannot redirect print jobs from the remote computer to a local clientprinter in Terminal Services sessions.If you disable this policy setting, users can redirect print jobs with client printer mapping.If you do not configure this policy setting, client printer mapping is not specified at the Group Policy level.However, an administrator can still disable client printer mapping by using the Terminal ServicesConfiguration tool.

http://technet.microsoft.com/en-us/library/cc731963(v=ws.10).aspx

QUESTION 23Your company is installing the Remote Desktop Session Host (RD Session Host) role service on a server thatruns Windows Server 2008 R2. All client computers that connect to the RD Session Host run Windows 7.

Audio redirection, printer redirection, and clipboard redirection are enforced by a Group Policy object (GPO).Users who connect to the RD Session Host over low-speed broadband report poor performance.

You need to configure the Remote Desktop Connection on the client computers for optimalperformance over a low-speed broadband connection. The display size and color depth must not bealtered.

Which tab should you select to configure the appropriate setting? To answer, select the appropriate setting orsettings in the answer area.

Point and Shoot:

Page 32: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Experience settingsThe settings that you’ll find on the Experience tab, shown in Figure 5, allow you to choose your connectionspeed and then choose to enable or disable certain graphical enhancement settings that may take a heavy tollon bandwidth. There are four connection speed settings on the drop down list and each setting has acorresponding default set of graphical enhancement settings. However, you can pick and choose the settingsyou feel you need and your bandwidth can support.

Page 33: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Figure 5: When you choose a connection speed, you c an choose a set of graphical enhancementsettings that are appropriate for your connection’s bandwidth.The Desktop Background check box allows the remote system’s desktop wallpaper to appear on your remotedesktop. Desktop wallpaper will hog a lot of bandwidth and only makes sense for LAN connections. When theDesktop Background check box is unchecked, Remote Desktop displays a blank desktop using the defaultbackground color. The next two check boxes allow animation special effects settings to be used during a remote session. If youhave a high-speed connection, you can leave these settings enabled. However, both of these settings will addunnecessary drag to your connection, so you may want to turn them off to enhance performance even if youhave a high-speed connection.If your office system is using Desktop Themes, you can opt to have them appear in a Remote Desktop session.However, transmitting all the graphics associated with a Desktop Theme will definitely add unnecessary drag toyour connection, so you may want to turn it off.Now, the last setting on the Experience tab, Bitmap Caching, allows a Remote Desktop session to cachecertain graphical screen elements to reduce the amount of data that must be transferred in order to display theremote system’s screen on your client system. This will help with some of the graphical enhancement settingsmentioned above, but may not provide significant enough improvement to warrant using the graphicalenhancements in low to medium bandwidth situations.http://www.win.net/optimator/WinWiz/Tips/WXPRDP2.htm

QUESTION 24Your company uses the Remote Desktop Session Host (RD Session Host) role service on a server that runsWindows Server 2008 R2. All client computers run Windows 7.

Company policy restricts users from copying files between a remote computer and a client computer during aRemote Desktop Services session.

You need to ensure that the Remote Desktop clients comply with the company policy.

Page 34: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Which Group Policy setting should you use? To answer, select the appropriate settings in the answer area.

Point and Shoot:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Since Windows 7 and Windows Server 2008 it is possible to copy any files or foldersbetween local and remote computers without disk redirection, just by enabling “clipboard”redirection (see screenshot under point 1).

http://www.thinstuff.com/faq/index.php?action=artikel&cat=9&id=108&artlang=en

Do not allow drive redirection

This policy setting allows you to specify whether to prevent the mapping of client drives in a Terminal Servicessession (drive redirection).By default, Terminal Services maps client drives automatically upon connection. Mapped drives appear in thesession folder tree in Windows Explorer or My Computer in the format <driveletter> on <computername>. Youcan use this policy setting to override this behavior.If you enable this policy setting, client drive redirection is not allowed in Terminal Services sessions.If you disable this policy setting, client drive redirection is always allowed.If you do not configure this policy setting, client drive redirection is not specified at the Group Policy level.However, an administrator can still disable client drive redirection by using the Terminal Services Configurationtool.

Page 35: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

http://technet.microsoft.com/en-us/library/cc725887(v=ws.10).aspx

NoteRemote Desktop Services in Windows Server 2008 R2 supports redirection of some additional supported Plugand Play devices. These additional supported Plug and Play devices exclude the various kinds of Plug and Playdevices that are already supported in other categories, such as Drives, Printers, or Smart Cards. For example,a USB thumb drive that gets installed as a drive letter on the client computer will be listed as available forredirection under the Drives category, and a USB Plug and Play printer attached to the client computer will beredirected under the Printers category.

http://technet.microsoft.com/en-us/library/cc770631.aspx

QUESTION 25A software company is developing two applications (App1 and App2) that will run on multiple versions ofWindows operating systems. Both applications are hosted from a Microsoft Remote Desktop Services (RDS)infrastructure that runs on Windows Server 2008 R2.

The company has the following requirements:

App1 must not display that it is a remote applicati on. App2 is a large application and must minimize overa ll disk space consumption. The browser has been disabled on client computers.

You need to deploy the applications by using Remote App.

What should you use to deploy the applications? (To answer, drag the appropriate answer from the list ofanswer choices to the correct location or locations in the answer area.)

Select and Place:

Correct Answer:

Page 36: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Section: (none)Explanation

Explanation/Reference:

QUESTION 26You manage a server that runs Windows Server 2008 R2 with the Remote Desktop Services role.

Your company uses a custom Line-of-Business (LOB) application that generates document files with the ".lob"custom filename extension. The files can be opened only by the LOB client application, which resides on theRemote Desktop Session Host (RD Session Host) server. The application is accessible as a RemoteAppapplication.

You need to enable users to open the RemoteApp appl ication by double-clicking a .lob file on theirclient computer.

What should you do?

A. Distribute the URL for the RemoteApp application to the users. B. Deploy a Windows Installer (MSI) package for the RemoteApp application to the client computers. C. Install a custom administrative (ADM) template on the client computers. D. Copy a Remote Desktop Protocol (RDP) package for the RemoteApp application to the client computers.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:At this point you should see the program you chose to deploy as a RemoteApp in the RemoteApp Programs listat the bottom of the RemoteApp Manager. The next step is to create an .rdp or .msi file to run the RemoteAppon your client. The .rdp file will be able to open your RemoteApp when users double-click on it, but it will notassociate a file extension with the RemoteApp. To make the file association you need to create an .msi filefor your RemoteApp . When you run the .msi file on a compatible client it will setup the file association andcreate icons (which you can configure).

http://www.enterprisenetworkingplanet.com/windows/article.php/3777631/Configure-Microsofts-RemoteApp-for-Terminal-Services.htm

Page 37: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

QUESTION 27You have an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. TheRemote Desktop Services (RDS) environment includes a Remote Desktop Session Host (RD Session Host)server in the LAN environment, and a Remote Desktop Gateway (RD Gateway) server in the perimeternetwork.

You deploy a Remote Desktop Web Access (RD Web Access) server in the perimeter network. You publish aRemoteApp application. The RemoteApp application is not visible to users when they log in to RD Web Access.

You need to ensure that authorized users can run Re moteApp applications from RD Web Access.

What should you do?

A. Allow Windows Management Instrumentation (WMI) communication between the RD Web Access serverand the RD Session Host server.

B. Restart the World Wide Web Publishing Service on the RD Web Access server. C. Allow Windows Management Instrumentation (WMI) communication between the RD Gateway server and

the RD Session Host server. D. Disable Forms Authentication on the Default Web Site on the RD Web Access server.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Configure the Remote Desktop Web Access Server to Allow Access from the Internet

After you have deployed RemoteApp programs, RD Gateway, and RD Web Access, you must configure yourfirewall to allow Windows Management Instrumentation (WMI) traffic from the RD Web Access server to theRD Session Host server.

http://technet.microsoft.com/en-us/library/cc770330.aspx

QUESTION 28Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host)server.

You enable Microsoft Word as a RemoteApp application on the RD Session Host server.

You need to ensure that the RemoteApp application o pens when a user double-clicks a Word (.docx)file on a client computer.

Which two actions should you performs (Each correct answer presents part of the solution. Choose two.)

A. In the properties of the RemoteApp application, enable the Allow any command-line arguments setting. B. Enable the Associate client extensions for this program with t he RemoteApp program setting for the

file.C. Create a Windows Installer (.msi) file.D. Create a Remote Desktop Protocol (.rdp) file.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:At this point you should see the program you chose to deploy as a RemoteApp in the RemoteApp Programs list

Page 38: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

at the bottom of the RemoteApp Manager. The next step is to create an .rdp or .msi file to run the RemoteAppon your client. The .rdp file will be able to open your RemoteApp when users double-click on it, but it will notassociate a file extension with the RemoteApp. To make the file association you need to create an .msi filefor your RemoteApp . When you run the .msi file on a compatible client it will setup the file association andcreate icons (which you can configure).

http://www.enterprisenetworkingplanet.com/windows/article.php/3777631/Configure-Microsofts-RemoteApp-for-Terminal-Services.htm

Creating a Windows Installer Package from a RemoteApp ProgramTo view what file name extensions are associated with a program on the terminal server, click Start , clickControl Panel , and then double-click Default Programs . Click Associate a file type or protocol with aprogram to view the file name extensions and their default associated program.

http://technet.microsoft.com/en-us/library/ff519250(v=ws.10).aspx

QUESTION 29Your company has an Active Directory Domain Services (AD DS) domain. You are installing the RD SessionHost (RD Session Host) role service in Server Manager on a server that runs Windows Server 2008 R2.

The Audio and video playback check box on the Configure Client Experience page is not available.

You need to ensure that you can enable audio and vi deo playback for users connecting to the RDSession Host server.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Start the Windows Audio EndPoint Builder service. B. Start the Windows Audio service. C. Install the Desktop Experience feature. D. Install Connection Manager Administration Kit feature.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Configure Audio and Video Playback on an RD Session Host Server

Audio and video playback allows users to redirect the remote computer’s audio in a remote session, andprovides an improved experience for video playback in remote sessions. By default, audio and video playbackis not allowed when connecting to a computer running Windows Server 2008 R2.

Manually configuring audio and video playbackTo manually configure audio and video playback on a Remote Desktop Session Host (RD Session Host)server, you need to do the following:1. Install the Desktop Experience feature.2. Start the Windows Audio service.3. Enable the Allow audio and video playback redirection Group Policy setting.4. Set the maximum color depth to 32 bits per pixel.

http://technet.microsoft.com/en-us/library/dd759165.aspx

QUESTION 30You manage a server that runs Windows Server 2008 R2 with SP1 with the Remote Desktop Services role.Users do not have the necessary permissions to install applications on their computers.

You install a new application on the server. Users must be able to access the application by double-clicking an

Page 39: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

icon on their desktops.

You need to configure the environment to meet the c ompany requirements.

http://www.gratisexam.com/

You launch RemoteApp Manager and add the RemoteApp application. Which three actions should you performnext in sequence? (To answer, move the appropriate actions from the list of actions to the answer area andarrange them in the correct order.)

Build List and Reorder:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:You can distribute RemoteApp programs to users several ways. Depending on the method that you choose,users can:

Access a link to the program through RemoteApp and Desktop Connection by using RD WebAccess.

RD Web Access is a Remote Desktop Services role service that lets you make RemoteApp programsavailable to users through RemoteApp and Desktop Connection. For more information, see RemoteDesktop Web Access (RD Web Access).

Double-click an .rdp file that has been created and distributed by their administrator.

You can create a Remote Desktop Protocol (.rdp) file to distribute RemoteApp programs to users. You candistribute an .rdp file to client computers by using your existing software distribution process, such as

Page 40: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Microsoft System Center Configuration Manager, or through a file share.

Double-click a program icon on their desktop or Start menu that has been created and distribute dby their administrator with a Windows Installer pac kage.

You can create a Windows Installer (.msi) package to distribute RemoteApp programs to users. Todistribute a Windows Installer package to client computers, you can use your existing software distributionprocess, such as Microsoft System Center Configuration Manager or Active Directory Group Policy. You canalso make the Windows Installer package available through a file share.

Double-click a file where the file name extension i s associated with a RemoteApp program.

If you distribute RemoteApp programs through Windows Installer packages, you can configure whether theRD Session Host server will take over client file name extensions for the RemoteApp program.

http://technet.microsoft.com/en-us/library/cc730603.aspx

To create a Windows Installer package 1. On the RD Session Host server, open RemoteApp Manager. To open RemoteApp Manager, click Start ,

point to Administrative Tools , point to Remote Desktop Services , and then click RemoteApp Manager .2. In the RemoteApp Programs list, click the program that you want to create a Windows Installer package

for. To select multiple programs, press and hold the CTRL key when you click each program name.3. In the Actions pane for the program or selected programs, click Create Windows Installer Package .

http://technet.microsoft.com/en-us/library/cc771468.aspx

QUESTION 31Your company is planning to use Microsoft Desktop Enterprise Virtualization (MED-V) 1.0 SP1 on servers thatrun Windows Server 2008 SP2. The company plans to provide virtual desktops for all client computers.

You deploy a server to store and distribute virtual machines (VMs).

You need to configure the image distribution server for MED-V.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list ofactions to the answer area and arrange them in the correct order.)

Build List and Reorder:

Page 41: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Correct Answer:

Section: (none)Explanation

Explanation/Reference:MED-V Installation PrerequisitesThe following are prerequisites for installing MED-V:

Active Directory RequirementsReport DatabaseAntivirus/Backup Software ConfigurationMicrosoft Virtual PC 2007 SP1

http://technet.microsoft.com/en-us/library/ff433629

How to Configure the Image Web Distribution ServerAn image repository is an optional server that is used for image distribution (where administrators upload newimages and client computers check the server every 15 minutes and update their image if a new one isavailable).

An image distribution server requires the following:Internet Information Services (IIS)—For information, see Internet Information Services.

During the IIS installation, when adding role services, select the following supported authentication methods:Basic Authentication

Page 42: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Windows AuthenticationClient Certificate Mapping Authentication

When configuring IIS, include the following:

1. Add a virtual directory, with the alias named MEDVImages . The physical path should point to the location ofthe images.2. Enable BITS.3. Add the following MIME types:

.ckm (application/octet-stream)

.index (application/octet-stream )4. On the MED-V site, add read permissions to Everyone .5. Restart IIS.

BITS Server Extensions for IIS—For information, see Install BITS Server Extensions.http://technet.microsoft.com/en-us/library/ff433547.aspx

Goog guide from MS:http://blogs.technet.com/b/medv/archive/2009/07/21/full-guide-to-med-v-server-settings.aspx

QUESTION 32A company is migrating all of its client computers from Windows XP to Windows 7 Enterprise.

The company has a legacy application that does not work in Windows 7. The application only installs a shortcuton the user's desktop.

You need to ensure that the application can be laun ched from the Windows 7 Start menu.

Which three actions should you perform in sequence on the client computers? (To answer, move theappropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Build List and Reorder:

Correct Answer:

Page 43: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Section: (none)Explanation

Explanation/Reference:Windows XP Mode provides a virtual Windows XP Professional with Service Pack 3 (SP3) environment forcomputers running Windows 7 Professional, Windows 7 Ultimate, or Windows 7 Enterprise. You can use thisenvironment to run your applications for Windows XP directly from the Windows 7 desktop.

When you install applications on virtual machines that you use with Windows Virtual PC on Windows® 7, youcan start these virtual applications directly from the Windows 7 Start menu. This document answers severalcommon questions about publishing virtual applications to the Windows 7 Start menu, explains which virtualapplications start automatically when the virtual environment starts, and describes how to troubleshoot commonproblems with virtual applications published to the Windows 7 Start menu.

If you have installed an application on a Windows XP or Windows Vista virtual machine and it does not appearin the Windows 7 Start menu, check the following:

Verify that the appropriate Integration Components are installed on the virtual machine. To install IntegrationComponents, start the virtual machine. From the Tools menu of the virtual machine window, click InstallIntegration Components or Update Integration Components .Verify that the appropriate RemoteApp update is installed on the virtual machine.Verify that Auto Publish is enabled in the virtual machine settings. Open the Virtual Machines folder, selectthe virtual machine, and click Settings in the toolbar. In the list of settings, click Auto Publish , and verifythat Automatically publish virtual applications is selected. If it is not selected, you must shut down thevirtual machine (if it is running), change the setting, and then start the virtual machine again.Verify that the application was installed in the %ALLUSERSPROFILE%\Start Menu\Programs\ directory. Ifit was installed in a different location, it will not appear in the Windows 7 Start menu unless you create anapplication shortcut in the All Users profile.

http://technet.microsoft.com/en-US/library/ee706515.aspx

QUESTION 33You are using Microsoft Enterprise Desktop Virtualization (MED-V) 2.0 to manage URL redirection in a MED-Vworkspace.

You need to ensure that all new URLs are redirected to the MED-V workspace.

Which two actions should you perform? (Each correct answer presents a complete solution. Choose two.)

A. Use Group Policy to edit the system registry value RedirectUrls with updated URL redirection information.B. Use the MED-V Workspace Packager to rebuild and redeploy the existing MED-V workspace package with

updated URL redirection in formation. C. Use the MED-V Workspace Packager to build and deploy a new MED-V workspace package with new URL

redirection information. D. Use Group Policy to edit the system registry value UrIAllowList with updated URL redirection information.

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

Page 44: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

How to Add or Remove URL Redirection Information in a Deployed MED-V Workspace

To edit URL redirection information in a deployed MED-V workspace, we recommend that you update thesystem registry by using Group Policy. Although we do not recommend it, you can also rebuild and redeploy theMED-V workspace with the updated URL redirection information.

The registry key is usually located at:

Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MEDV\v2\UserExperienceThe following multi-string value must be present: RedirectUrls

The value data for RedirectUrls is a list of all of the URLs that you specified for redirection when you builtthe MED-V workspace package by using the MED-V Workspace Packager . For more information, see Createa MED-V Workspace Package.

http://technet.microsoft.com/en-US/library/gg548530.aspx

---OR--1: UPDATE URL REDIRECTION INFORMATION USING GROUP POLI CY

7.1 Managing URL RedirectionAfter you deploy a MED-V workspace you can use the MED-V Workspace Packager to add or remove URLredirection in the MED-V workspace.<..>METHOD 2: UPDATE URL REDIRECTION INFORMATION USING GROUP POLICYNote: This method will overwrite any current settings for URL Redirection so all of the current URLs would needto be included unless the intent is in removal.1. Launch GPMC.MSC on your Domain Controller.2. Expand Domains, yourDomain, Group Policy Objects.3. Right-click Group Policy Objects and click New.4. In the Name field, enter MED-V Web Redirection and click Ok.5. Right-click MED-V Web Redirection and select Edit .6. Under Computer Configuration , expand Preferences, Windows Settings.7. Right-click Registry and select New, Registry Item.8. Set Action to Replace . Set Hive to HKEY_LOCAL_MACHINE , Set Key Path to SOFTWARE\Microsoft

\Medv\v2\UserExperience , Set Value Name to RedirectUrls , Set Value type to REG_MULTI_SZ. InValue data enter http://download.microsoft.com and click Ok.

9. Close the Group Policy Management Editor window.10.Under Group Policy Objects , drag-and-drop the MED-V Web Redirection GPO to the OU that contains

the MEDVADMIN machine.Open Internet Explorer and browse to http://download.microsoft.com. Notice that the web page opens withinthe Internet Explorer 6 browser from the MED-V workspace.

---- OR ---2: Create a Workspace Deployment PackagePerform the following steps on the MEDVADMIN computer:1. Open the MED-V Workspace Packager, click Start\All programs\Microsoft Enterprise DesktopVirtualization\MED-V Workspace Packager .2. On the MED-V Workspace Packager main panel, click Create a MED-V Workspace Package .<..>

h. Web Redirection: i. URL redirection contains those URLs that you want redirected from the host computer to Internet Explorer6 in the MED-V workspace. When you are using the packaging wizard to create the MED-V workspace, youtype, import or copy and paste this redirection information. Enter each web address on a single line. For example:

http://www.medvdemo.comhttp://*.contoso.com

Page 45: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

http://www.microsoft.com/silverlight

ii. Select Do no change the Internet zone security level and Remove default browsing capabilities andclick Next.

Deploying the MED-V WorkspaceAfter you have created your MED-V installer package, you can deploy it throughout your enterprise by usingyour company’s preferred method of provisioning software and other applications or manually.

http://www.microsoft.com/en-us/download/details.aspx?id=21677

QUESTION 34AII client computers on your network run Windows 7 Enterprise.

You are deploying Windows XP Mode images on the Windows 7 computers.

You need to copy data to a folder within a Windows XP Mode image without starting the virtualmachine (VM).

Which tool should you use first?

A. Disk Management B. Device Manager C. fdisk.exeD. Disk Cleanup

Correct Answer: ASection: (none)Explanation

Explanation/Reference:One tool that comes with Windows 7 is very handy when customizing Windows XP Mode images, however.That tool is Diskpart. By using Diskpart, you can attach a Windows XP VHD to the computer, add or removefiles from the image, and then detach the VHD from the computer. You can also use the Disk Management toattach the Windows XP VHD:On the Start menu, type disk management , and click create and format hard disk partitions .Click Action and click Attach VHD .In the Location box, type the path and file name of the VHD you want to edit or click Browse to open the file.Click OK to mount the VHD to a drive letter (Figure 1).

Page 46: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Figure 1. An attached VHDBy using Windows Explorer and other tools, edit the VHD as necessary. For example, you can add files to theVHD, edit a settings file, or even delete files from the VHD.In the Disk Management console, right-click the attached VHD, and click Detach VHD .Click OK to confirm that you want to detach the VHD.

http://www.microsoft.com/en-us/download/details.asp x?id=21529

QUESTION 35You are planning to deploy Windows 7 client computers in a virtual environment.

Company policy states that all deployments must be to known computers.

You need to deploy the virtual desktop images in th e virtual environment while meeting the companypolicy.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list ofactions to the answer area and arrange them in the correct order.)

Build List and Reorder:

Page 47: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Correct Answer:

Section: (none)Explanation

Explanation/Reference:You can find the server GUID from the VM config XML file. Usually the XML file is named as the VM Name.And you will find the config file in the Virtual Machine folder. But if you have not changed the default path for thevirtual machine config folder in Hyper-V Management console you will end up having all XML config files in thesame folder. Then it will be difficult to find out which file is pointing to which server.Here are some easy methods to find out all virtual machines, their operational state, and their process ID &GUID. All these information are usually stored in WMI namespace root\virtualization & classmsvm_computersystem. So we are going to query the WMI namespace & retrieve all these info.Using PowershellGet-WmiObject -Namespace root\virtualization -class msvm_computersystem | select elementname,operationalstatus, processid, name| ft -auto

Page 48: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

http://techontip.wordpress.com/2011/05/12/hyper-v-virtual-machine-process-id-guid/

To prestage client computers by using the Windows i nterface On the server running Active Directory Users and Computers, open the Active Directory Users and ComputersMMC snap-in (click Start , click Run , type dsa.msc , and then click OK).

NoteTo manage the server remotely, you can install “AD DS Snap-Ins and Command-Line Tools” in Remote ServerAdministration Tools. To do this, click Add Features in Server Manager, and install the feature from thefollowing location: Remote Server Administration Tools>Remote Administration Tools>AD DS and AD LDSTools>AD DS Tools>AD DS Snap-Ins and Command-line Tools.

In the console tree, right-click the organizational unit that will contain the new client computer.Click New, and then click Computer .Type the client computer name, click Next , and then click This is a managed computer .In the text box, type the client computer's media access control (MAC) address preceded with twenty zeros orthe globally unique identifier (GUID) in the format: {XXXXXXXX-XXXX-XXXX-XXX-XXXXXXXXXXXX}. Click Next , and click one of the following options to specify which server or servers will support this clientcomputer:Any available remote installation server

The following remote installation server

Click Next , and then click Finish .

http://technet.microsoft.com/en-us/library/cc754469.aspx

Windows Deployment Services uses two basic image types, both of which use the Windows Image (.wim) fileformat:

Install image : The operating system image that you deploy to the client computer. To create install imagesusing Windows Deployment Services, you must first create a capture image.

Boot image : The Microsoft Windows Preinstallation Environment (Windows PE) image that you boot a clientinto before you install the install image. To install an operating system, you first boot the computer into the bootimage, and then you select the install image to install. You can also create two additional types of boot images:

Capture image : A type of boot image that you boot a client computer into to capture the operating systemas a .wim file. You must first create a capture image when you are creating custom install images.

Discover image : A type of boot image that you can use to install an operating system on a computer that isnot Pre-Boot Execution Environment (PXE) enabled. When you boot a computer into a discover image, aWindows Deployment Services server will be located, and then you can choose the install image you wantto install.

http://technet.microsoft.com/en-us/library/cc730907(v=ws.10).aspx

QUESTION 36Your company has an Active Directory Domain Services (AD DS) domain. AII servers run Windows Server2008 R2. AII client computers run Windows 7. You use Microsoft Enterprise Desktop Virtualization (MED-V) tosupport client virtualization requirements.

You need to ensure that all MED-V virtual machine ( VM) images can be centrally stored and areavailable to all client computers.

What should you do?

A. Install and configure IIS on a member server.

Page 49: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

B. Install and configure Microsoft SQL Server 2008 on a member server. C. Configure a shared folder on a member server.D. Create a single workspace for all client computers.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:MED-V Installation PrerequisitesThe following are prerequisites for installing MED-V:

Active Directory RequirementsReport DatabaseAntivirus/Backup Software ConfigurationMicrosoft Virtual PC 2007 SP1

http://technet.microsoft.com/en-us/library/ff433629

How to Configure the Image Web Distribution ServerAn image repository is an optional server that is used for image distribution (where administrators upload newimages and client computers check the server every 15 minutes and update their image if a new one isavailable).

An image distribution server requires the following:Internet Information Services (IIS).

During the IIS installation, when adding role services, select the following supported authentication methods:Basic AuthenticationWindows AuthenticationClient Certificate Mapping Authentication

When configuring IIS, include the following:

1. Add a virtual directory, with the alias named MEDVImages . The physical path should point to the location ofthe images.2. Enable BITS.3. Add the following MIME types:

.ckm (application/octet-stream)

.index (application/octet-stream )4. On the MED-V site, add read permissions to Everyone .5. Restart IIS.

BITS Server Extensions for IIS—For information, see Install BITS Server Extensions.http://technet.microsoft.com/en-us/library/ff433547.aspx

Goog guide from MS:http://blogs.technet.com/b/medv/archive/2009/07/21/full-guide-to-med-v-server-settings.aspx

QUESTION 37Your company has a Windows 7 image named WinImage with an image index of 5. All images are stored in C:\Mount.

An update named Critical1 has been released and must be applied to all new Windows 7 deployments.

You need to add the update to the image.

Page 50: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Which three commands should you run in sequence? (To answer, move the appropriate actions from the list ofactions to the answer area and arrange them in the correct order.)

Build List and Reorder:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Apply Updates to an Image Using DISMAlthough the recommended method of applying packages and updates to a Windows Embedded Standard 7image is by creating a Configuration Set and then using Deployment Imaging Servicing and Management(DISM) to install that configuration set, DISM can be used to install individual updates to an image as well. Thismethod some additional risks and is not recommended.

Note: You can only use DISM to apply an .msu file to an offline image. For online images, you must use WindowsUpdate Standalone Installer or create a configuration set or answer file for use with DISM.

Apply an update package to an offline image

1. Create a directory on your development computer and mount your image to that directory by typing thefollowing at the a command prompt:

MD C:\MyDir\MountDISM \Mount-Wim /Wimfile:E:\images\myimage.wim /index:1 /Mountdir:C:\MyDir\Mount

Page 51: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

2. Apply the update package (.msu) file by typing the following at a command prompt, replacing <file_path> withthe full path to the configuration set:

DISM /image:C:\MyDir\Mount /Add-Package /Packagepath:<file_path>

3. Unmount the image and commit your changes by typing the following at a command prompt:

DISM /Unmount-Wim /Mountdir:C:\MyDir\Mount /Commit

http://msdn.microsoft.com/en-us/library/ff794819(v=winembedded.60).aspx

QUESTION 38Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. AII client computers run Windows 7.

Your environment includes Microsoft Enterprise Desktop Virtualization (MED-V). You use MED-V to supporttemporary test environments.

You need to ensure that the disk space used by obso lete Workspaces is automatically minimized.

Which two actions should you performs? (Each correct answer presents part of the solution. Choose two.)

A. Set an expiration date for the Workspace.B. Configure automatic deletion of the Workspace. C. Specify the number of image versions to keep.D. Configure the Workspace as revertible.

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Workspace Expiration OptionsUsing the MED-V Management Console, Workspace expiration options are set in the General section of thedeployment tab.

Expiration options can be set on a per-user or per-group basis. When the workspace expiration date is set, ittakes effect for the workspace during the next policy refresh (which is on login, every 15 minutes, or manuallythrough the system tray). If a workspace is active, and the workspace expiration occurs, it will not affect anactive workspace session. But once the workspace stops in that case, the workspace will no longer be madeavailable to the user.

Workspace Deletion OptionsAn additional option is made available for determining the behavior of workspace images on the client undercertain configuration parameters. These include when the workspace is expired, when the workspace is offlinefor a certain amount of time, or the workspace has been disabled. These options were primarily designed forrevertible workspaces in that deletion of persistent workspaces are often only used for added security ofnormally connected workspaces.

If a parameter triggering workspace deletion has occurred and the workspace is currently running, the deletionwill take place once the workspace is stopped. It is important to note only the images (all versions) beneath C:

Page 52: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

\MED-V Images\<IMAGENAME> will be deleted and not pre-staged CKM images.

The BehaviorNote that it is important that you understand the behavior from a user’s standpoint. If the user is attempting tostart a MED-V Workspace, he may receive a message stating that there are no workspaces available, or hemay see a list of workspaces but the one the user is looking for is not available. This usually means one of thefollowing:

The workspace has not been enabled for the user The workspace is enabled but has expired

Users will receive no warning prior to expiration. In addition, users will not receive any notice once theworkspace has expired.

Tip by J.C. Hornbeck, a System Center Knowledge Engineer at Microsoft. Among other duties, J.C. Hornbeckmanages a variety of TechNet blogs, including The Microsoft Enterprise Desktop Virtualization (MED-V) Blog.Check it out for more information on Microsoft Application Virtualization.

http://technet.microsoft.com/en-us/magazine/gg277503.aspx

QUESTION 39You use Microsoft Enterprise Desktop Virtualization (MED-V) 2.0 workspaces to provide a virtual desktopenvironment for all the users in your company. All servers run Windows Server 2008 R2.

The virtual environment becomes inconsistent when workspace policies are deployed.

To fix the inconsistencies, you need to change a va lue in the search path for MED-V 2.0.

What should you do?

A. Change the value under the HKLM\Security registry key. B. Modify the Config.ini file on the MED-V server.C. Change the value under the HKLM\Software registry key. D. Modify the Web.config file on the MED-V server.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:After you have deployed your MED-V workspaces, you can change certain MED-V configuration settings byediting the registry entries.

Page 53: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

MED-V uses the following search path when looking for the resultant settings values:

MED-V first looks in the machine policy. If the value is not found, MED-V looks in the user policy. If the value is not found, MED-V looks in the HKEY_LOCAL_MACHINE\System hive. If the value is not found, MED-V looks in the HKEY_CURRENT USER registry hive. If the value is still not found, MED-V uses the default.

A general best practice is to set the value in the HKEY_LOCAL_MACHINE\System hive or in the machinepolicy. But if you want the end user to be able to configure a particular setting, then you should leave it out.

http://technet.microsoft.com/en-us/library/gg548492.aspx

Most settings is stored at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Medv\v2\ hive.

QUESTION 40Your company has an Active Directory Domain Services (AD DS) forest with a single domain. All servers runWindows Server 2008 R2. AII client computers run Windows 7 Enterprise. You deploy Microsoft EnterpriseDesktop Virtualization (MED-V) in the environment.

After deployment, you are unable to connect to the MED-V environment.

You need to ensure that firewalls allow connections to the MED-V environment.

Which port should you open in the firewalls?

A. 143B. 3389C. 1723D. 8051E. 464F. 1110

Correct Answer: BSection: (none)Explanation

Explanation/Reference:One port, that is needed to distribute (and deploy) MED-V packages is the HTTP/HTTPS port (TCP 80).Second port, that is needed for operations between MED-V Host Agent and MED-V Server is the RDP (TCP3389).

Explanation:When a user starts a MED-V seamless application from the host, an instance of VMSAL.exe is launched toinitiate, monitors, and controls the application. An in-process ActiveX control, MSTSCAX.dll, actually acts as theRDP client. VMSAL.exe will create a named pipe to connect to the appropriate RDP server service on the VMguest and specifies port TCP port 3389 as the target server port on the guest.

http://florentium.rssing.com/chan-2091262/latest.php

PS. Port TCP 8051 was set "for example" in one of technet's guides. See http://blogs.technet.com/b/medv/archive/2009/07/21/full-guide-to-med-v-server-settings.aspx

QUESTION 41You manage a Microsoft Application Virtualization (App-V) environment.

Users report that they receive an error when they use a sequenced application. You trace the problem to aregistry value present in the sequenced application.

Page 54: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

You need to modify the Open Software Description (O SD) file for the sequenced application toreconfigure this registry value.

Which two actions should you perform? (Each correct answer presents a complete solution. Choose two.)

A. Configure settings on the Files tab in the Sequencer.B. Configure settings on the OSD tab in the Sequencer.C. Update the OSDSourceRoot registry value on the client with the new registry values. D. Configure settings on the Properties tab in the Sequencer.E. Use a text editor to manually edit the OSD file.

Correct Answer: BESection: (none)Explanation

Explanation/Reference:There’s basically two ways for you to add script into your existing package; using “OSD Editor” in theSequencer or editing OSD files directly with suitable text editor (I prefer Notepad++ which is very able and,best of all, a free text editor; just remember to add OSD as custom extension into style configuratorconfiguration so it will automatically use XML highlighting for OSD files).

http://blog.gridmetric.com/2011/10/05/osd-scripting-primer/

Application Virtualization Sequencer Console Overvi ewThe following tabs are displayed when you view a virtual application in the App-V Sequencer Console:<...>OSD—Displays information about the Open Software Descriptor (OSD) associated with the virtual application.You can update the files associated with the OSD file by right-clicking the appropriate entry and selecting theaction that you want.http://technet.microsoft.com/en-us/library/cc843767.aspx

QUESTION 42Your company is deploying a third-party application named App1 by using Microsoft Application Virtualization(App-V) 4.6. App-V 4.6 SP1 has not been installed in the environment.

Page 55: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

All App-V deployments must conserve memory when possible.

You need to sequence the application for deployment .

Which six actions should you perform in sequence? (To answer, move the appropriate actions from the list ofactions to the answer area and arrange them in the correct order.)

Build List and Reorder:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Sample SequencingThis section describes some of the key points to remember during sequencing. To begin open the ApplicationVirtualization Sequencer and select Create a Package from the Welcome Screen .1. Welcome Screen

Page 56: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

2. Package Information3. Advanced OptionsWhen advanced options are selected in the package information screen, the Sequencer will be presented withoptions for Microsoft Update and Rebasing DLLs.

4. Monitor InstallationAfter the package information has been collected, the next step is to monitor the installation of the application.

Page 57: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Selecting Begin Monitoring will prompt for an installation directory. Next, the virtual environment will be builtand the Sequencer will start monitoring specific locations and processes for activity. In App-V 4.6, one changeis that the Monitor Installation page will not minimize after choosing to Begin Monitoring. After selecting BeginMonitoring, most operations will be recorded as part of the package, unless a specific exception has beenconfigured on the Sequencer.

After you click “Begin Monitoring” you will be prompted to create the installation folder. In version 4.2 this wasdone when you clicked “Stop Monitoring .”

5. Configure Applications6. Launch Applications7. Package Deployment8. Saving the Package

The last step in the process of sequencing is to save the package. Saving the package should be done to adifferent directory than the installation of the application(s).

Page 58: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

http://download.microsoft.com/download/F/7/8/F784A197-73BE-48FF-83DA-4102C05A6D44/APP-V/App-46_Sequencing_Guide_Final.docx

QUESTION 43You manage applications that are deployed with Microsoft Application Virtualization (App-V).

A software vendor has released a new plug-in for a sequenced application.

You need to update the parent application with the new plug-in.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list ofactions to the answer area and arrange them in the correct order.)

Build List and Reorder:

Correct Answer:

Page 59: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Section: (none)Explanation

Explanation/Reference:How to Upgrade an Existing Virtual Application

You can upgrade an existing virtual application to a new version by using the Application Virtualization (App-V)Sequencer. The upgrade process is similar to creating a new virtual application. You must open the existingvirtual application for an upgrade, make the necessary updates, and then save the updated virtual application toa new location in the package root directory.

You can also use the App-V Sequencer Console to make changes to an existing virtual application withoutperforming an upgrade. However, you cannot make modifications to the virtual application’s file system byusing this method because the App-V Sequencer does not actually decode the associated .sft file. For example;you can open an existing virtual application in the App-V Sequencer Console by selecting Open on the Filemenu. You can update the Package Name and the associated Comments , and you can make changes to thevirtual file system and virtual registry. You can also create a Windows Installer file.

To upgrade an existing virtual application1. To start the App-V Sequencer Console, on the computer running the App-V Sequencer, select Start /

Programs /Microsoft Application Virtualization /Microsoft Application Virtualization Sequencer . 2. To open the existing virtual application, in the App-V Console, select File /Open for Package Upgrade . Use

the Open For Package Upgrade dialog box to locate the associated SPRJ file you want to open forupgrade.

3. To specify the location of where the package will be decoded, click Browse For Folder and specify the Q:\.This is the location where the package root directory will be created as specified in the associated SFT file.When you create the updated version of the package, it will be denoted with a sequential addition to thedirectory name—for example, “.1” will be added to the directory name located on the Q:\ drive.

4. To open the Sequencing Wizard, select Tools /Sequencing Wizard . On the Package Information page,optionally specify the new Package Name and add optional comments that will be associated with theupdated virtual application. Click Next .

5. On the Monitor Installation page, to begin monitoring the new installation, click Begin Monitoring . Afterthe virtual environment has finished loading, install the updated version of the application, or apply updatesto the existing application. After you have finished updating the virtual application, click Stop Monitoring ,and then click Next .

6. On the Additional Files to Map to Virtual File System (VFS ) page, to specify additional files to be addedto the Virtual File System (VFS), click Add . Browse to the file you want to add, and click Open . To clearexisting files that have been added, click Reset , and then click Next .

7. On the Configure Applications page, configure the shortcuts and file type associations that will beassociated with the updated virtual application. Select the element you want to update, and then click EditLocations . Specify the configurations in the Shortcut Locations dialog box, and then click Next .

8. On the Launch Applications page, to start the application to ensure that the package is optimized forstreaming, select the package and click Launch . This step is useful for configuring how the applicationinitially runs on target computers and for accepting any associated license agreements before the packageis made available to clients. If there are multiple applications associated with this package, you can select Launch All to open all of the applications. To sequence the new version of the virtual application, clickNext .

9. To finish and to close the Sequencing Wizard, on the Sequence Package page, click Finish .10.After you have successfully updated the virtual application, to save the package, in the App-V Sequencer

Console, on the File menu, select Save. The virtual application can be accessed in the directory specified instep 3.

Page 60: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

http://technet.microsoft.com/en-us/library/cc817189

Expand the parent package to the local system and select the .sprj file. Install the plug-in. - We do not need toexpand something.Save the package as a new package by using a package accelerator. - MS doesn't mention about"accelerators".

QUESTION 44Your company has a single domain Active Directory Domain Services (AD DS) forest. All servers run WindowsServer 2008 R2. All client computers run Windows 7. You install a Microsoft Application Virtualization (App-V)management server.

Your company policy requires that the information transmitted between the clients and the App-V server mustbe secured with Transport Layer Security (TLS).

You need to install a certificate on the App-V serv er.

Which type of certificate should you install?

A. PKCS# 10 B. X.509 v2 C. X.509 v3 D. X.521

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Installing App-V Management Server or Streaming Ser ver SecurelyNote:Installing or configuring an App-V Management or Streaming Server to use enhanced security (for example,Transport Layer Security, or TLS) requires that an X.509 V3 certificate has been provisioned to the App-Vserver.

--- OR ---Configuring Certificates to Support Secure Streamin gBy default, the App-V service runs under the Network Service account. However, you can create a serviceaccount in Active Directory Domain Services and replace the Network Service account with the Active DirectoryDomain account.The security context under which the service runs is important for configuring enhanced securecommunications. This security context must have read permissions for the certificate private key. When a PKCS#10 Certificate Signing Request (CSR) is generated for the App-V server, the Windows CryptographicService Provider is called and a private key is generated. The private key is secured with permissions given tothe System and Administrator accounts only.

http://technet.microsoft.com/en-us/library/ee662336.aspx

QUESTION 45Your company has a single-domain Active Directory Domain Services (AD DS) forest. All servers run WindowsServer 2008 R2. You are implementing a Microsoft Application Virtualization (App-V) environment.

You need to configure the servers that run Windows Server 2008 R2 to support App-V installations.

Which server role should you install? To answer, select the appropriate setting in the answer area.

Page 61: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Point and Shoot:

Correct Answer:

Section: (none)

Page 62: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Explanation

Explanation/Reference:3 App-V Server Deployment

3.1 Pre-installation

3.1.1 Create AD groupsCreate the following groups in ADApp-V AdminsApp-V Users

3.1.2 Create content shareCreate shared folder on the management servers and share them with the below permissions for NTFS andshare permissionsApp-V_admins: Full controlApp-V_users: read onlyMsappv: read onlyNetwork Service: Read permission

3.1.3 install management server prerequisitesInstall IIS 7 and make sure the below are selected· ASP.NET (and all its required role services and features)· Windows Authentication· IIS Management Scripts and Tools· IIS 6 Management Compatibility

Page 63: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Install and wait for the installation to complete and click close

Install .Net framework from features from add new feature wizard

3.1.4 install management server

http://blogs.technet.com/b/meamcs/archive/2011/01/09/app-v-4-6-step-by-step-installation-guide-part-3.aspx

QUESTION 46You use Microsoft Application Virtualization for Desktops to virtualize applications for client computers.

A virtual application that was installed by using a Windows Installer Package (.msi) file has become corrupted.

You need to restore access to the virtual applicati on.

Which two actions should you perform? (Each correct answer presents a complete solution. Choose two.)

A. Reinstall the virtual application package.

Page 64: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

B. Reload the virtual application package.C. Use the Repair function in the Windows Installer Package. Use the Microsoft Application Virtualization (App-

V) to re-sequence the application.D. Use the Microsoft Application Virtualization (App-V) Sequencer to edit the virtual application package.

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:1: RE-LOAD PACKAGE FROM Application Virtualization Client Management Console:

How to Load or Unload an ApplicationYou can use the following procedures to load or unload an application from the cache, directly from the Resultspane of the Application node in the Application Virtualization Client Management Console. When you selectthis node, the Results pane displays a list of applications.

Note:When you load or unload a package, all the applications in the package are loaded into or removed from cache.When loading a package, if you do not have adequate space in cache to load the applications, increase yourcache size. For more information about cache size, see How to Change the Cache Size and the Drive LetterDesignation.

http://technet.microsoft.com/en-us/library/cc843823.aspx

------ OR ------2: Remove and Install an MSI-PACKAGE (which automatically re-load app-v package)

Stand-Alone Mode with MSIThe App-V 4.5 Sequencer supports creating an MSI during the sequencing process. This process does nothave a formal publishing or streaming procedure. This MSI will contain the ICO, OSD, and Manifest.xml filesthat are necessary for publishing the application on the machine it is run from and how to import the SFT fileinto the App-V client cache. The package file (SFT) is not part of the MSI that is generated during sequencingand will need to be in the same directory as the MSI to successfully complete by default. In some scenarios itmay be necessary to place the SFT files at an alternate location like a file server. In this scenario theadministrator could use the SFTPATH parameter to specify an alternate location of the SFT file. This would notrequire the SFT file to be in the same directory as the MSI. In Standalone mode the package will be publishedand the SFT file contents will be loaded into the client cache completely. The following command shows how toinstall an MSI based package when the SFTFILE is located on a file server.Msiexec.exe /i \\PathToMsi\packagename.msi SFTPATH=\\server\share\package.sft /q

Streaming Mode with MSIAnother option is to use MSI based packages but choose to stream the SFT file contents from an App-VServer, file server, or local file location. In this scenario the package will be published, but the SFT file will bestreamed to the App-V client cache. The process of streaming the SFT will be done by default as part of theinstallation of the MSI, but could optionally be configured to happen when the user launches the application thefirst time.

Source: App-V Application Publishing and Client Interaction Copyright © 2008 MICROSOFTCORPORATION

--- NOT ---Use the Repair function in the Windows Installer Package. Use the Microsoft Application Virtualization (App-V)to re-sequence the application. - it is WRONG. Repair function of MSI-package not reload SFT-package. Butyou can choose Repair function of Client Management Console:How to Repair an Application

To repair a selected application, you can perform the following procedure directly from the Results pane of theApplication node in the Application Virtualization Client Management Console. When you repair an application,

Page 65: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

you remove any custom user settings and restore the default settings. This action does not change or deleteshortcuts or file type associations, and it does not remove the application from cache.http://technet.microsoft.com/en-us/library/cc843802

---NOT---Use the Microsoft Application Virtualization (App-V) Sequencer to edit the virtual application package. - it isWRONG. Question about user's side, not server's side.

QUESTION 47Your company has servers that run Windows Server 2008 R2 with Microsoft Application Virtualization (App-V)and Microsoft System Center Configuration Manager (ConfigMgr) 2007.

Your company creates a new internal department and purchases new client computers for the department'semployees. The new client computers are pre-loaded with the App-V and ConfigMgr client applications. Youhave sequenced a new custom line-of-business (LOB) application in App-V.

You need to deploy the LOB application to the new d epartment's client computers.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list ofanswer choices to the answer area and arrange them in the correct order.)

Build List and Reorder:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:You need at least SCCM 2007 R2 to work with APP-V 4.6.

http://blogs.technet.com/b/ptsblog/archive/2011/12/21/integration-of-system-center-configuration-manager-and-app-v-part-2.aspx

Page 66: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

QUESTION 48All client computers in a company run Windows 7 Enterprise. The company is deploying a 4.1-GB applicationnamed App1 by using Microsoft Application Virtualization (App-V). The App-V Sequencer configuration dialogbox is shown in the graphic in the work area.

You need to ensure that you can deploy the applicat ion only to client computers that run all versions ofWindows 7.

Which options should you select in the App-V Sequencer? (To answer, drag the appropriate solution from thelist of answer choices to the correct location or locations in the answer area.)

Select and Place:

Correct Answer:

Page 67: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Section: (none)Explanation

Explanation/Reference:Operating SystemsUse the Operating Systems controls to specify the application's operating system requirements. If anApplication Virtualization Desktop Client cannot support any of the selected operating systems, the applicationwill not start.Compression AlgorithmUse to select the method for compressing the SFT file for streaming across a network. Select one of thefollowing compression methods:Compressed —Specifies that the SFT file be compressed in the ZLIB format.

http://technet.microsoft.com/en-us/library/cc843635.aspx

QUESTION 49Your company plans to deploy Microsoft Application Virtualization (App-V) 4.6 applications from servers that runWindows Server 2008 R2.

The App-V applications will be streamed to the following computers:

10,000 client computers within the corporate office firewall 1,000 client computers in a field office that is connected to the corporate site via a limited-capacity and high-latency WAN Individual client computers connecting via the Internet without the use of a virtual private network (VPN)

The company has the following deployment requirements:

All application publishing must be accomplished from one place. WAN usage must be minimized. CPU usage of client computers must be minimized when possible. A minimum number of ports must be opened on the corporate firewall for inbound Internet connections.

You need to deploy streaming solutions to the corpo rate office and field office. You also need to sele ctthe appropriate protocol for client connections.

Which solution should be deployed at the corporate and field office, and which protocol should be used forclient computers at each location? (To answer, drag the appropriate solution from the list of answer choices tothe correct location or locations in the answer area.)

Page 68: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Select and Place:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:

QUESTION 50Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server2008 R2. All portable computers run Windows 7. You virtualize applications by using Microsoft ApplicationVirtualization (App-V).

You are deploying servers to five new branch offices. Each branch office has its own subnet, and will streamvirtual applications from a local IIS server. Users frequently move between branch offices with their portable

Page 69: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

computers.

You need to ensure that branch office users access virtualized applications only from the local IISserver.

What should you do?

A. Create a single DNS A record and configure an HTTP host header for each IIS server. B. Create five DNS CNAME records with the same name. Point each CNAME record to a single IIS server.

Disable the netmask ordering option. C. Create a single DNS SRV record that contains all servers. D. Create five DNS A records with the same name. Point each A record to a different IIS server and disable

the round robin option.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Configuring Subnet Prioritization

If the resolver receives multiple A resource records from a DNS server, and some have IP addresses fromnetworks to which the computer is directly connected to, the resolver orders those resource records first. Thisreduces network traffic across subnets by forcing computers to connect to network resources that are closer tothem.

Subnet prioritization prevents the resolver from using the round robin feature, defined in RFC 1794. Using theround robin feature, the server rotates the order of resource record data returned in a query answer in whichmultiple resource records of the same type exist for a queried DNS domain name.

You can also change the round robin setting from the registry; however, do so from the DNS snap-in instead.If Enable round robin is selected (the default) and the value of LocalNetPriority is 1, the server rotatesamong the A resource records that it returns in the order of their similarity to the IP address of the queryingclient.If Enable round robin is deselected and the value of LocalNetPriority is 1, the server returns therecords in local net priority order. It does not rotate among available addresses.

http://technet.microsoft.com/en-us/library/cc961422.aspxhttp://msmvps.com/blogs/acefekay/archive/2010/05/29/dns-and-subnet-priortization-amp-dns-round-robin.aspx

QUESTION 51You manage servers that run Windows Server 2008 R2 and Microsoft Application Virtualization (App-V).

You configure a Group Policy object to allow disconnected operations. However, users are unable to run somecached applications while they are disconnected from the network.

You need to allow users to run any cached applicati on, even if they have not run the application befor e,while they are disconnected from the network.

Which Group Policy setting should you modify? To answer, select the appropriate setting in the answer area.

Point and Shoot:

Page 70: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Correct Answer:

Section: (none)Explanation

Explanation/Reference:If you plan to use the Microsoft App-V Stand-Alone Mode some Registry Settings are required for theApplication Virtualization Client as described in detail on this App-V site here. But instead of setting theseregistry keys manually or through a custom script, you can also manage these settings through Group Policy. First download the Microsoft Application Virtualization Administrative Template (ADM Template). The ADMTemplate provides configuration options for the App-V 4.5/4.6 Client settings such as Client Permissions, ClientInterface behavior and Client Communication Settings. Once you have added the ADM Template to your GPO object you can find them under the “ClassicAdministrative Templates (ADM)” branch as shown in the picture below.

Page 71: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Then configure the Group Policy Settings as shown below.

Once the GPO is enabled run the command gpupdate /force on the client to ensure that all GPO settingsget applied. Then open the Registry Editor and validate that all settings are configured as described hereNow install your previously sequenced application through the generated MSI installation package. If all goeswell, you should be able to launch your Virtual Application in Stand-Alone mode now.

Page 72: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

http://www.verboon.info/index.php/2010/03/configuring-app-v-standalone-mode-through-group-policy/

QUESTION 52You manage a Microsoft Application Virtualization (App-V) environment.

A user cannot launch App-V applications that have been cached on a 32-bit client computer.

You need to clear the client cache.

What should you do?

A. Set the HKEY_LOCAL_MACHINE\SOFTlNARE\Microsoft\SoftGrid\4.5 \CIient\AppFS\State registry valueto 0 and restart the computer.

B. Set the HKEY_LOCAL_MACHINE\SOFTlNARE\Microsoft\SoftGnd\4.5\ Client\AppFS\State registry valueto 1 and restart the computer.

C. Open an elevated command prompt and run the SFTMIME DELETE APP command. D. Open an elevated command prompt and run the SFTMIME CLEAR APP command. E. Open an elevated command prompt and run the SFTMIME LOCK APP command.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:How to Reset the FileSystem Cache

Resetting the FileSystem cache is not something that should usually be necessary. However if you need tocompletely reset the FileSystem cache, perhaps for troubleshooting purposes, you can use the followingprocedure. Administrative rights are required to perform this action.To reset the FileSystem cache1. Set the following registry value to 0 (zero):HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SoftGrid\4.5\Client\AppFS\State2. Restart the computer. http://technet.microsoft.com/en-us/library/cc843790.aspx

QUESTION 53Your company hosts all virtual applications through Microsoft Application Virtualization (App-V) 4.6 on serversthat run Windows Server 2008 R2. You will use Microsoft System Center Configuration Manager (ConfigMgr)2007 R3 to deploy all virtual applications to client computers via the App-V client.

The company has the following deployment requirements:

All client computers must be enabled for virtual ap plication packages in ConfigMgr. AII client computers must be configured to check fo r new application packages that are scoped toActive Directory Domain Services (AD DS) security g roups. The new program notification icon must be enabled t o open the Run Advertised Programs window.

You need to enable the client computers for softwar e distribution.

Which settings should you select in the ConfigMgr Advertised Programs Client Agent Properties dialog box? Toanswer, select the appropriate check box or check boxes in the dialog box.

Hot Area:

Page 73: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Correct Answer:

Section: (none)Explanation

Page 74: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Explanation/Reference:http://technet.microsoft.com/en-us/library/bb632371.aspxhttp://technet.microsoft.com/en-us/library/cc180879.aspxhttp://technet.microsoft.com/en-us/library/cc161869.aspx

QUESTION 54Your company has a server that runs Windows Server 2008 R2 with the Remote Desktop Session Host (RDSession Host) role service. All client computers run 64-bit Windows 7.

You need to terminate active sessions for Remote De sktop client connections after one hour. You mustnot impact any other session states.

Which RD Session Host settings should you use? To answer, select the appropriate settings in the answerarea.

Hot Area:

Correct Answer:

Page 75: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Section: (none)Explanation

Explanation/Reference:Active sesstion limit + End session

QUESTION 55Your company is deploying an application by using Microsoft Application Virtualization (App-V) 4.6. App-V 4.6SP1 is not installed.

Company policy states that the application must meet the following requirements:

Services must not be virtualized.The Windows Installer must be disabled.Filenames must contain build numbers.Operating system activities must be virtualized.

You need to deploy the application according to com pany policy.

Which settings should you choose? To answer, select the appropriate setting or settings in the answer area.

Hot Area:

Page 76: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Correct Answer:

Page 77: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

Section: (none)Explanation

Explanation/Reference:Allow Use of MSI Installer checkbox: Specifies, when checked, the MSI Server service in the Windowsoperating system has been enabled to permit correct interaction of the SoftGrid Sequencer and the applicationinstaller (default is checked). Allow Virtualization of Events checkbox: Specifies, when checked, that certain low-level operating systemactivities of the application, such as the ever popular semaphores, will be virtualized when the application is runon SoftGrid Clients (default is checked – do not deselect without consulting Microsoft Technical Support). Allow Virtualization of Services: Specifies, when checked, that any embedded services that an applicationuses will be virtualized. (default is checked). Append Package Version to Filename: When selected the upgraded version indicator will automatically beappended to the name of the .SFT file during a save operation. This option applies to a Package Upgrade andis useful in the Active Upgrade scenarios.

http://blogs.technet.com/b/appv/archive/2007/08/21/inside-the-sequencer-part-1.aspx

QUESTION 56AII client computers on your network run Windows 7 Enterprise.

You are deploying Windows XP Mode images on the Windows 7 computers.

You need to copy data to a folder within a Windows XP Mode image without starting the virtualmachine (VM).

Which tool should you use first?

A. diskpart.exeB. Device ManagerC. fdisk.exeD. Disk Cleanup

Correct Answer: ASection: (none)Explanation

Explanation/Reference:DiskPart.exe and managing Virtual Hard Disks (VHDs) in Windows 7In Windows 7, new commands have been added in DiskPart to allow for the creation and management ofVirtual Hard Disks (.vhd files). The DiskPart VHD management commands have been provided below in 2sections – commonly used commands with examples and other commands. It is assumed in each of theexamples that DiskPart.exe has already been launched in an elevated command prompt.Creating a VHD The example below creates a 20GB dynamically expanding VHD called "test.vhd" and places it in the root ofthe C: drive. Note that the type parameter is optional and the default type is fixed .

create vdisk file=c:\test.vhd maximum=20000 type=expandable

Attaching a VHD The following example shows how to select and attach the VHD. It also provides steps for partitioning,formatting and assigning a drive letter to the attached VHD.

select vdisk file=c:\test.vhd attach vdisk create partition primary format fs=ntfs label="Test VHD" quick

Page 78: Microsoft.70-669.TS:Windows Server 2008 R2, Desktop Virtualiazation · 2012. 9. 13. · You use a virtual desktop infrastructure (VDI) environment to provide access to applications

assign letter=v

Detaching the VHD To detach (i.e. unmount) the VHD, use the following example:

select vdisk file=c:\test.vhd detach vdisk Note : All 3 of these VHD actions can also be performed in the Disk Management Console of Windows 7.

http://blogs.msdn.com/b/7/archive/2009/10/08/diskpart-exe-and-managing-virtual-hard-disks-vhds-in-windows-7.aspx

http://www.gratisexam.com/