[Realistic] 70-414 Microsoft testing engine 1-16 (Mar 2016)

70-414 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library! Try it Free Today!

Get it now →

Product Description:
Exam Number/Code: 70-414
Exam name: Implementing an Advanced Server Infrastructure
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Free Certification Real IT 70-414 Exam pdf Collection

Verified of 70-414 exam materials and preparation labs for Microsoft certification for IT engineers, Real Success Guaranteed with Updated 70-414 pdf dumps vce Materials. 100% PASS Implementing an Advanced Server Infrastructure exam Today!

2016 Mar 70-414 Study Guide Questions:

Q1. DRAG DROP - (Topic 3) 

You need to implement a Hyper-V Recovery Manager solution in the hosting environment of Northwind Traders. 

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



Q2. DRAG DROP - (Topic 8) 

Your network contains two servers named Server1 and Server2 that run Windows Server 

2012. 

Server1 has the iSCSI Target Server role service installed and is configured to have five 

iSCSI virtual disks. 

You install the Multipath I/O (MPIO) feature on Server2. From the MPIO snap-in, you add support for iSCSI devices. 

You need to ensure that Server2 can connect to the five iSCSI disks. The solution must 

ensure that Server2 uses MPIO to access the disks. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area 

and arrange them in the correct order. 


Answer: 



Q3. - (Topic 8) 

You plan to allow users to run internal applications from outside the company's network. You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed. You must secure on-premises resources by using multi-factor authentication (MFA). You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices. 

Solution: You migrate the AD FS server to Microsoft Azure and connect it to the internal Active Directory instance on the network. Then, you use the Workplace Join process to configure access for personal devices to the on-premises resources. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: A 


Q4. - (Topic 8) 

An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled. 

Solution: You add the backup service account to the SuperUsers group and back up the protected content. Then, you restore the content to a file server and apply the required NTFS permissions to the files. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: B 


Q5. - (Topic 8) 

You need to configure migration for HV-CLUSTER1. What should you do? 

A. Use live migration between HV-Cluster1 and HV-Cluster3. 

B. Configure a Hyper-V replica between HV-Cluster1 and HV-Cluster3. 

C. Configure a Hyper-V replica between HV-Cluster1 and HV-Cluster4. 

D. Use live migration between HV-Cluster1 and HV-Cluster4. 

Answer: C 


70-414 actual exam

Up to date 70-414 answers:

Q6. - (Topic 8) 

You have a System Center 2012 R2 Configuration Manager deployment. 

All users have client computers that run Windows 8.1. The users log on to their client computer as standard users. 

An application named App1 is deployed to the client computers by using System Center. 

You need to recommend a solution to validate a registry key used by App1. If the registry key has an incorrect value, the value must be changed. The registry key must be validated every day. The solution must generate a report on non-compliant computers. 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. Group Policy preferences 

B. A desired configuration baseline 

C. The Windows PowerShell Desired State Configuration (DSC) feature 

D. The Microsoft Baseline Security Analyzer (MBSA) 

Answer: B 


Q7. - (Topic 8) 

You plan to allow users to run internal applications from outside the company’s network. You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed. You must secure on-premises resources by using multi-factor authentication (MFA). You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices. 

Solution: You install a local instance of the MFA Server. You connect the instance to the Microsoft Azure MFA provider and then you use Microsoft Intune to manage personal devices. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: A 


Q8. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. 

You need to issue a certificate to users to meet the following requirements: 

. Ensure that the users can encrypt files by using Encrypting File System (EFS). . Ensure that all of the users reenroll for their certificate every six months. 

Solution: You create a copy of the Basic EFS certificate template, and then you modify the validity period of the copy. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: A 


Q9. - (Topic 5) 

You need to ensure that the developers can manage their own virtual machines. 

Solution: You perform the following actions: 

. In Virtual Machine Manager, you create a new user role named DevUsers that 

uses the Application Administrator profile. 

. You grant Checkpoint permissions to the DevUsers role. 

. You distribute the Self-Service Portal URL to the developers. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: B 


Q10. - (Topic 4) 

You need to recommend a solution that meets the notification requirements. 

Which System Center 2012 components should you include in the recommendation? 

A. Service Manager, Orchestrator and App Controller 

B. Configuration Manager, Service Manager and Orchestrator 

C. App Controller, Configuration Manager and Operations Manager 

D. Operations Manager, Service Manager and Orchestrator 

Answer: D 


70-414 braindumps

Tested 70-414 dumps:

Q11. - (Topic 7) 

Your network contains an Active Directory domain named contoso.com. 

Your company has an enterprise root certification authority (CA) named CA1. 

You plan to deploy Active Directory Federation Services (AD FS) to a server named 

Server1. 

The company purchases a Microsoft Office 365 subscription. 

You plan to register the company's SMTP domain for Office 365 and to configure single sign-on for all users. 

You need to identify which certificate is required for the planned deployment. 

Which certificate should you identify? 

A. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name serverl.contoso.com 

B. a self-signed server authentication certificate for server1.contoso.com 

C. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name Server1 

D. a server authentication certificate that is issued by CA1 and that contains the subject name Server1 

Answer: A 

Explanation: Prepare Your Server and Install ADFS You can install ADFS on a domain controller or another server. You’ll first need to configure a few prerequisites. The following steps assume you’re installing to Windows Server 2008 R2. 

Using Server Manager, install the IIS role and the Microsoft .NET Framework. Then purchase and install a server-authentication certificate from a public certificate authority. Make sure you match the certificate’s subject name with the Fully Qualified Domain Name of the server. Launch IIS Manager and import that certificate to the default Web site. 

Reference: Geek of All Trades: Office 365 SSO: A Simplified Installation Guide 

https://technet.microsoft.com/en-us/magazine/jj631606.aspx 


Q12. - (Topic 8) 

Your network contains a Microsoft System Center 2012 Virtual Machine Manager (VMM) server named Server1. 

You use Server1 to manage 20 Hyper-V hosts. 

The network also contains five Citrix XenServer virtualization hosts. 

You need to recommend which installation is required to manage the XenServer servers from Server1. 

What should you recommend installing? 

A. The Citrix XenServer - Microsoft System Center Integration Pack on the Citrix XenServer hosts 

B. The Citrix XenServer - Microsoft System Center Integration Pack on Server1 

C. Citrix Essentials for Hyper-V on Server1 

D. Citrix Essentials for Hyper-V on the Citrix XenServer hosts 

Answer: A 


Q13. - (Topic 5) 

You need to ensure that the developers can manage their own virtual machines. 

Solution: You perform the following tasks: 

In Virtual Machine Manager, you create a new user role named DevUsers that 

uses the Application Administrator profile, 

You add the virtual machines to the DevUsers role. 

You grant Checkpoint permissions to the DevUsers role. 

You install and configure App Controller. 

You distribute the App Controller console URL to the developers. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: A 


Q14. - (Topic 8) 

Your network contains an internal network and a perimeter network. The internal network contains an Active Directory domain named contoso.com. All client computers in the perimeter network are part of a workgroup. 

The internal network contains a Microsoft System Center 2012 infrastructure. 

You plan to implement an update infrastructure to update the following: 

Windows Server 2012 

System Center 2012 

Windows Server 2003 

Microsoft SQL Server 2012 

Third-party virtualization hosts 

Microsoft SharePoint Server 2010 

...... 

Another administrator recommends implementing a single WSUS server to manage all of the updates. You need to identify which updates can be applied by using the recommended deployment of WSUS. 

What should you identify? (Each correct answer presents part of the solution. Choose all that apply.) 

A. SQL Server 2012 

B. System Center 2012 

C. SharePoint Server 2010 

D. Windows Server 2012 

E. Third-party virtualization hosts 

F. Windows Server 2003 

Answer: B,C,D,E 


Q15. - (Topic 7) 

This question consists of two statements: One is named Assertion and the other is named Reason. Both of these statements may be true; both may be false; or one may be true, while the other may be false. 

To answer this question, you must first evaluate whether each statement is true on its own. If both statements are true, then you must evaluate whether the Reason (the second statement) correctly explains the Assertion (the first statement). You will then select the answer from the list of answer choices that matches your evaluation of the two statements. 

Assertion: 

You can manage VMware ESX hosts and virtual machines by using a System Center Virtual Machine Manager (SCVMM) server. 

Reason: 

SCVMM automatically imports ESX hosts and virtual machines when you add the corresponding VMware vCenter to the SCVMM server. 

Evaluate the Assertion and Reason statements and choose the correct answer option. 

A. Both the Assertion and Reason are true, and the Reason is the correct explanation for the Assertion. 

B. Both the Assertion and Reason are true, but the Reason is not the correct explanation for the Assertion. 

C. The Assertion is true, but the Reason is false. 

D. The Assertion is false, but the Reason is true. 

E. Both the Assertion and the Reason are false. 

Answer: C 

Explanation: * Assertion: true Virtual Machine Manager (VMM) enables you to deploy and manage virtual machines and services across multiple hypervisor platforms, including VMware ESX and ESXi hosts. 

* Reason: False When you add a vCenter Server, VMM no longer imports, merges and synchronizes the VMware tree structure with VMM. Instead, after you add a vCenter Server, you can add selected ESX servers and hosts to any VMM host group. Therefore, there are fewer issues with synchronization. 

Reference: Managing VMware ESX Hosts in VMM Overview 

https://technet.microsoft.com/en-us/library/gg610683.aspx 


Q16. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. 

You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table. 


You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. 

Solution: From Configuration Manager, you create a Collection and a Desired Configuration Management baseline. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: B 



see more 70-414 - Implementing an Advanced Server Infrastructure