REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 

Condo

Nicholas

 
 

Braindumps of 70-501
Planning.Deploying,and Managing a Hosting Environment

 

Exam Questions, Answers, Braindumps (70-501)
Thanx to www.exams.ws for providing helpful material

1 Your company is planning to host 5000 Microsoft Windows SharePoint Services Web sites on a single Web server. You need to ensure that your server can support 5000 Web sites. You must accomplish this goal while achieving the highest possible Web server performance. You may not add additional hardware. What should you do?

A. Configure your Web server to require SSL for all Web connections.
B. Configure your Web server to use Basic authentication.
C. Run the STSADM.EXE command with the hh parameter.
D. Run the STSADM.EXE command with the GlobalInstall parameter.
Answer: C

2 Your company hosts Web sites. Each Web site is stored in a dedicated folder. You need to allow a customer to use Web Folders to access her Web site. You must ensure that she cannot access other customers Web sites. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Configure ACLs on each customers folder.
B. Grant the application pool identity the modify permission on the customers folder.
C. Enable Digest authentication on the Web server.
D. Enable the WebDAV server extension on the Web server.
Answer: A, D

3 Your company hosts an FTP server that is configured to allow incoming connections only on port 21. Some users report that they can connect to the server but that they cannot transfer files between their client computers and the server. You need to ensure that all users can connect to the FTP server. You must accomplish this task without changing the configuration of the server. What should you do?
A. Instruct the users to enable PORT FTP on their client computers.
B. Instruct the users to use a command linebased FTP application.
C. Instruct the users to enable PASV FTP on their client computers.
D. Instruct the users to enable automatically detect LAN settings in their Web browsers.
Answer: C

4 Your company hosts Web applications on a single shared Web server that runs Microsoft Windows Server 2003 R2. The Web server also runs Microsoft SQL Server 2005. The Web applications write data to databases on the SQL Server 2005 instance. You discover that one of your customers database files are consuming all available disk space. You increase the amount of disk space on the Web server. You need to ensure that no one customers database files can consume all available disk space. What should you do?
A. Implement volume level quotas on the volume that contains the SQL Server database.
B. Implement directory level quotas on the Web server.
C. Implement bandwidth throttling on the Web server.
D. Configure a maximum file size on each SQL Server database.
Answer: D

5 Your company hosts Microsoft Windows SharePoint Services Web sites. Each of your customers is assigned a Web site collection on a single Windows SharePoint Services virtual server. Your Web server is configured to use Active Directory account creation mode. All user accounts for customers are stored in a single Active Directory domain. You need to ensure that each customer cannot create more than 10 user accounts. You must accomplish this task with the least administrative effort. What should you do?
A. Create a user quota template for each site collection. Set the user quota to 10.
B. Disable Active Directory account creation mode. Create a custom application to create user accounts for customers.
C. Set the connection limit on the customers Web sites to 10.
D. Create a user quota template for the virtual server. Set the user quota to 10.
Answer: A

6 Your company hosts Web applications. One of your customers creates a Microsoft ASP.NET 2.0 Web application that uses a Microsoft Office Access 2003 database. The Web application is configured to use the Medium Trust trust level. The customer reports that when he attempts to access the Access 2003 database by using the Web application, he receives an ASP.NET SecurityPermission error. You need to ensure that the customers Web application functions correctly. What should you do?
A. Grant the application pool identity the read and execute permissions on the Access 2003 database file.
B. Add the OLEDB permission entry to the Web_MediumTrust.Config file on the Web site.
C. In the root level Web.Config file, set the customErrors element mode attribute to off.
D. Grant the anonymous user account the modify permission on the Access 2003 database file.
Answer: D

7 You are planning a hosting solution that must meet the following technical and operational requirements. You must support 10,000 customers in a shared hosting environment. You must be able to host databases, Web sites, and Microsoft Windows SharePoint Server Web sites. You must provide single sign-on for all available services. You must provide the highest possible reliability for hosted databases. You must provide the highest possible performance for hosted Web sites. Which three components should you include in your plan? (Each correct answer presents part of the solution. Choose three.)
A. Active Directory in Application Mode
B. Network Load Balancing (NLB)
C. Microsoft Cluster Services
D. Active Directory
E. Round Robin DNS
Answer: B, C, D

70-501


 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend