QUESTION 171
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the Streaming Media Services role installed. On Server1, you create an on-demand publishing point named PublishingPoint1. You need to ensure that only members of a group named Group1 can access content from PublishingPoint1. Which two plug-ins should you configure for PublishingPoint1? (Each correct answer presents part of the solution. Choose two.)
A. WMS Anonymous User Authentication
B. WMS IP Address Authorization
C. WMS Negotiate Authentication
D. WMS Publishing Points ACL Authorization
Answer: CD
Explanation:
WMS Negotiate Authentication
The WMS Negotiate Authentication plug-in grants access to the server based upon the user’s network logon approval. This plug-in uses an encrypted challenge/response scheme to authenticate users. It is a secure form of authentication because the user name and password are not sent across the network; the player acknowledges the password by using a cryptographic exchange with the Windows Media server. Because this plug-in relies upon established user logon credentials, the player and server must be on the same domain or on trusted domains. Negotiate authentication does not work across proxy servers or other firewall applications. Source:
http://technet.microsoft.com/en-us/library/cc730972.aspx WMS Publishing Points ACL Authorization
The WMS Publishing ACL Authorization plug-in is used to control access to your content based on the permissions you have set on your publishing points. You can configure the following options on the General tab for this plug-in.
QUESTION 172
Your network contains a hardware firewall between the internal network and the Internet. On the internal network, you install a new server named Server1. Server1 has the Streaming Media Services role installed. You configure Server1 to use only real-time streaming protocol (RTSP) streaming. You create an on-demand unicast publishing point. You need to ensure that users from the Internet can access the publishing point on Server1. Which inbound ports should you allow on the hardware firewall?
A. TCP 21, UDP 5000, and UDP 5001
B. TCP 80, TCP 1024, and UDP 500
C. TCP 443, TCP 8080, and UDP 5000
D. TCP 554, UDP 5004, and UDP 5005
Answer: D
Explanation:
Delivering a unicast stream
To make sure that your content is available to all client versions that connect to your server, open all ports described in the table for all of the connection protocols that might be used during protocol rollover. When you install Windows Media Services 2008 on a computer that is running Windows Server 2008 or Windows Server 2008 R2, the Windows Media Services program (wmserver.exe) is added as an exception in Windows Firewall to open the default inbound ports for unicast streaming, and manually opening ports in the firewall is not required. Source: http://technet.microsoft.com/en-us/library/ee126132.aspx
QUESTION 173
Your network contains an Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the Streaming Media Services role installed. You need to ensure that all streaming media is encrypted when the media is sent over the network.
What should you do?
A. Configure a connection security rule.
B. Configure the WMS Digest Authentication plug-in.
C. Configure the WMS Publishing Points ACL Authorization plug-in.
D. Install an SSL certificate and bind the certificate to port 443.
Answer: A
QUESTION 174
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the Streaming Media Services role and the Web Server (IIS) role installed. Server1 has a broadcast publishing point named Broadcast1. Broadcast1 publishes a file named Broadcast1.wmv. You run the Unicast Announcement Wizard for Broadcast1 and create a new announcement file. You need to ensure that only authorized users have permission to access the announcement file. What should you modify?
A. the Authentication settings for Broadcast1
B. the Authorization settings for Broadcast1
C. the NTFS permissions on c:\inetpub\wwwroot\Broadcast1.asx
D. the NTFS permissions on c:\wmpub\wmroot\Broadcast1.wmv
Answer: C
QUESTION 175
Your network contains a server that has Microsoft SharePoint Foundation 2010 installed. A user named User1 is a member of the Members group. You create a new page in an existing SharePoint site. You need to prevent User1 from modifying the page. The solution must ensure that User1 is allowed to modify other pages in the site. What should you do first?
A. Modify the site permissions.
B. Edit the properties of the page.
C. Stop the inheritance of permissions.
D. Change the default Permission Levels.
Answer: C
Explanation:
About permission inheritance
Permissions on securable objects within a site are inherited from the parent object by default. You can break inheritance and use fine-grained permissions — unique permissions on the list or library, folder, or item or document level — to gain more control of the actions users can take on your site. Stopping inheriting permissions copies the groups, users, and permission levels from the parent object to the child object, and then breaks the inheritance. When permission inheritance is broken, all permissions are explicit and any changes to parent object do not affect the child object. If you restore inherited permissions, the child object will inherit its users, groups, and permission levels from the parent again, and you will lose any users, groups, or permission levels that were unique to the child object.
For ease of management, use permission inheritance wherever possible. Source: http://technet.microsoft.com/en-us/library/cc287752.aspx
QUESTION 176
You deploy a server that has Microsoft SharePoint Foundation 2010 installed. You create several SharePoint site collections in the default Web application. You need to ensure that a user named User1 can access all of the site collections in the Web application. What should you modify in the properties of the default Web application?
A. the General Settings
B. the Permissions Policy
C. the User Permissions
D. the User Policy
Answer: D
Explanation:
Manage permission policies for a Web application
A Web application is composed of an Internet Information Services (IIS) Web site that acts as a logical container for the site collections that you create. Before you can create a site collection, you must first create a Web application. A Web application can contain as many as 500,000 site collections. Managing permissions for so many site collections can be complicated and error-prone, especially if some users or groups need permissions other than those that apply for the entire Web application. Permission policies provide a centralized way to configure and manage a set of permissions that applies to only a subset of users or groups in a Web application The differences between specifying user permissions for a Web application and creating a permission policy for a Web application are the users and to which the permissions apply and the scope at which the permissions apply. There is also a difference in the permissions lists where individual permissions are selected. Permissions for a Web application are comprehensive settings that apply to all users and groups for all site collections within a Web application. The permissions list contains only one column, and all permissions are enabled by default. You must disable specific permissions individually A permission policy level for a Web application contains permissions that enable a subset of users or groups to work with site collections in a specific way. For example, you might want to create a permission policy level for users of a site collection who will be allowed to add, edit, or delete items from a list, open a list, and view items, lists, and pages. However, you might want to prevent the same users from creating or deleting lists, which would require the Manage Lists permission.
The permissions list contains a Grant All column and a Deny All column. You can either grant or deny all permissions as part of a permission policy level. You can also grant or deny individual permissions. No permissions are enabled by default. If an individual permission is neither granted nor denied, it can be set at the discretion of the site collection administrator or site administrator. Manage user permission policy You can add users to a permission policy, edit the policy settings, and delete users from a permission policy.
The following settings can be specified or changed:
Zone: If a Web application has multiple zones, you can specify the zone that you want the permission policy to apply to. The default is all zones, which can be specified for Windows users only.
Permissions: You can specify Full Control, Full Read, Deny Write, and Deny All permissions, or you can specify a custom permission level.
System: This setting enables SharePoint to display SHAREPOINT\System for system- related activity regardless of the Windows user accounts that have been configured for the hosting application pool and the SharePoint farm service account. You may want to specify this setting to prevent unnecessary information disclosure to end users and potential hackers who would be interested in knowing more about how SharePoint is deployed in your enterprise. Add users to a permission policy You may want to add users to a permission policy to ensure that all users are accessing content with the same\ set of permissions.
To add users to a permission policy
1. Verify that you have the following administrative credentials: You must be a member of the Farm Administrators group on the computer that is running the SharePoint Central Administration Web site.
2. On the Central Administration Web site, in the Application Management section, click Manage web applications.
3. Click to highlight the line for the Web application whose permission policy you want to manage.
4. In the Policy group of the ribbon, click User Policy.
5. In the Policy for Web Application dialog box, select the check box next to the user or group that you want to manage, and then click Add Users.
6. In the Add Users dialog box, in the Zone list, click the zone to which you want the permissions policy to apply.
7. In the Choose Users section, type the user names, group names, or email addresses that you want to add to the permissions policy. You can also click the applicable icon to check a name or browse for names.
8. In the Choose Permissions section, select the permissions that you want the users to have.
9. In the Choose System Settings section, check Account operates as System to specify whether a user account should be displayed as SHAREPOINT\System instead of the actual accounts that perform specific tasks within the SharePoint environment.
10. Click Finish.
Source: http://technet.microsoft.com/en-us/library/ff607712.aspx
QUESTION 177
You deploy a server that has Microsoft SharePoint Foundation 2010 installed. You create a Web application named WebApp1. You need to enable anonymous access to WebApp1. Which settings should you configure first?
A. Anonymous Policy
B. Authentication Providers
C. User Permissions
D. User Policy
Answer: B
Explanation:
Enable anonymous access for a zone of a Web application
1. From Administrative Tools, open the SharePoint Central Administration Web site application.
2. On the Central Administration home page, click Application Management.
3. On the Application Management page, in the Application Security section, click Authentication providers.
4. On the Authentication Providers page, make sure the Web application that is listed in the Web Application box (under Site Actions) is the one that you want to configure. If the listed Web application is not the one that you want to configure, click the drop-down arrow to the right of the Web Application drop-down list box and select Change Web Application.
5. In the Select Web Application dialog box, click the Web application that you want to configure.
6. On the Authentication Providers page, click the zone of the Web application on which you want to enable anonymous access. The zones that are configured for the selected Web application are listed on the Authentication Providers page.
7. On the Edit Authentication page, in the Anonymous Access section, select Enable Anonymous Access, and then click Save. At this point, the Web application zone has been enabled for anonymous access. Source:
http://technet.microsoft.com/en-us/library/cc561167.aspx
QUESTION 178
Your network contains a server that has Microsoft SharePoint Foundation 2010 installed. You discover that the SharePoint database has a large amount of unused space. You need to reduce the amount of unused space in the database. What should you do?
A. From Central Administration, run the farm configuration wizard.
B. From Microsoft SQL Server Management Studio, use the Object Explorer.
C. From the SharePoint 2010 Management Shell, run the Set-SPContentDatabase cmdlet.
D. At the command prompt, run the stsadm.exe command and specify the mergecontentdbs parameter.
Answer: B
Explanation:
How to: Shrink a Database This topic describes how to shrink a database by using Object Explorer in SQL Server Management Studio. The database cannot be made smaller than the minimum size of the database. The minimum size is the size specified when the database was originally created, or the last explicit size set by using a file-size-changing operation, such as DBCC SHRINKFILE. For example, if a database was originally created with a size of 10 MB and grew to 100 MB, the smallest size the database could be reduced to is 10 MB, even if all the data in the database has been deleted. To shrink a database
1. In Object Explorer, connect to an instance of the SQL Server Database Engine, and then expand that instance.
2. Expand Databases, and then right-click the database that you want to shrink.
3. Point to Tasks, point to Shrink, and then click Database.
4. Optionally, select the Reorganize files before releasing unused space check box. If selected, a value must be specified for Maximum free space in files after shrinking . Selecting this option is the same as specifying a target_percent value when executing DBCC SHRINKDATABASE. Clearing this option is the same as executing DBCC SHRINKDATABASE using the TRUNCATEONLY option. TRUNCATEONLY shrinks the file to the last allocated extent. This reduces the file size without moving any data. By default, the option is cleared.
5. Enter the maximum percentage of free space to be left in the database files after the database has been shrunk. Permissible values are between 0 and 99. This option is only available when Reorganize files before releasing unused space is selected.
6. Click OK.
Source: http://technet.microsoft.com/en-us/library/ms189035.aspx
QUESTION 179
You deploy a server that has Microsoft SharePoint Foundation 2010 installed. You need to ensure that all SharePoint site content and server farm configurations are backed up automatically every night. What should you do?
A. From Central Administration, configure a Full Backup.
B. From Central Administration, configure a Granular Backup.
C. Create a scheduled task that uses the Backup-SPSite cmdlet.
D. Create a scheduled task that uses the Backup-SPFarm cmdlet.
Answer: D
Explanation:
Backup-SPFarm
Creates a backup of an individual database, Web application, or the entire farm.
Source: http://technet.microsoft.com/en-us/library/ff607881.aspx Backup-SPSite
Performs a backup of a site collection.
Source: http://technet.microsoft.com/en-us/library/ff607901.aspx
QUESTION 180
Your network contains a server that has Microsoft SharePoint Foundation 2010 installed. You need to ensure that a user named User1 can use Central Administration to back up SharePoint site collections. The solution must minimize the number of permissions assigned to User1. To which group should you add User1?
A. local Administrators
B. local Backup Operators
C. SharePoint Delegated Administrators
D. SharePoint Farm Administrators
Answer: D
Explanation:
Group memberships required to run backup and restore operations in Central Administration You must ensure that all user accounts that will be backing up or restoring your farm and farm components by using Central Administration have the group memberships that are described in the following table. Required group memberships
If you want to pass Microsoft 70-643 successfully, donot missing to read latest lead2pass Microsoft 70-643 practice exams.
If you can master all lead2pass questions you will able to pass 100% guaranteed.