70-414 vce(113 to 128) for IT candidates: Mar 2016 Edition

70-414 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library! Try it Free Today!

Get it now →

Product Description:
Exam Number/Code: 70-414
Exam name: Implementing an Advanced Server Infrastructure
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Free Certification Real IT 70-414 Exam pdf Collection

Question No. 113

HOTSPOT - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. System Center 2012 R2 Virtual Machine Manager (VMM) is deployed to the domain. 

In VMM, you create a host group named HostGroup1. You add a 16-node Hyper-V failover cluster to HostGroup1. From Windows PowerShell, you run the following commands: 


Use the drop-down menus to select the answer choice that completes each statement. 



Answer: 



Question No. 114

- (Topic 8) 

You have a Windows Server 2012 R2 failover cluster that contains four nodes. The cluster has Dynamic Optimization enabled. You deploy three highly available virtual machines to the cluster by using System Center 2012 R2 Virtual Machine Manager (VMM). 

You need to prevent Dynamic Optimization from placing any of the three virtual machines in the same node. 

What should you do? 

A. From the Virtual Machine Manager console, modify the Compatibility settings in the Hardware Configuration properties of the virtual machines. 

B. Set the Priority property of the virtual machine cluster role. 

C. From the Virtual Machine Manager console, modify the Servicing Windows settings of the virtual machines. 

D. From the Virtual Machine Manager console, modify the Availability settings in the Hardware Configuration properties of the virtual machines. 

Answer:


Question No. 115

DRAG DROP - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. The domain contains a server named Server1. 

Server1 is a certification authority (CA). All servers run Windows Server 2012 R2. 

You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers. The unique identifier for your organization is set to Contoso. 

You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data recovery agent. You must be able to perform the recovery from any administrative computer. 

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



Question No. 116

- (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. 

You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table. 


You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. 

Solution: From Operations Manager, you create a Distributed Application and a Service Level Tracking object. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Question No. 117

- (Topic 2) 

You need to recommend changes to the virtual desktop infrastructure (VDI) environment. 

What should you recommend? 

A. Implement Hyper-V replication between VDI1 and VDI2. 

B. Create new VDI virtual machines that are Generation 2 virtual machines. 

C. Convert the existing VHDs to .vhdx format. 

D. Move the VHDs to a Cluster Shared Volume (CSV) and implement Data Deduplication on the CSV. 

Answer:


Question No. 118

- (Topic 1) 

You need to recommend a solution that resolves the current file server issue. The solution must meet the business requirements. 

What should you include in the recommendation? 

A. BranchCache in hosted cache mode 

B. BranchCache in distributed cache mode 

C. A storage pool 

D. Distributed File System (DFS) 

Answer:


Question No. 119

- (Topic 8) 

You have a Hyper-V host named Hyper1 that has Windows Server 2012 installed. Hyper1 hosts 20 virtual machines. 

Hyper1 has one physical network adapter. 

You need to implement a networking solution that evenly distributes the available bandwidth on Hyper1 to all of the virtual machines. 

What should you modify? 

A. The settings of the virtual switch 

B. The settings of the virtual network adapter 

C. The Quality of Service (QoS) Packet Scheduler settings of the physical network adapter 

D. The settings of the legacy network adapter 

Answer:


Question No. 120

- (Topic 8) 

Your network contains four clusters. The clusters are configured as shown in the following table. 


You manage all of the clusters by using Microsoft System Center 2012 Virtual Machine Manager (VMM). You plan to implement Dynamic Optimization for the virtual machines. 

You need to recommend a configuration for the planned implementation. 

What should you recommend? 

A. Dynamic Optimization on Cluster2 and Cluster4 only Virtual machines that are balanced across the clusters 

B. Dynamic Optimization on Cluster1 and Cluster2 only Virtual machines that are balanced across the nodes in the clusters 

C. Dynamic Optimization on all of the clusters Virtual machines that are balanced across the nodes in the clusters 

D. Dynamic Optimization on all of the clusters Virtual machines that are balanced across the clusters 

Answer:


Question No. 121

DRAG DROP - (Topic 3) 

You need to prepare the required Hyper-V virtual network components for Customer2. 

Which four objects should you create and configure in sequence? To answer, move the appropriate objects from the list of objects to the answer area and arrange them in the correct order. 


Answer: 



Question No. 122

- (Topic 4) 

You need to recommend a storage solution for the App1 VHDs. The solution must minimize downtime if a Hyper-V host fails. 

What should you include in the recommendation? 

A. Distributed File System (DFS) Replication 

B. A clustered file server of the File Server for scale-out application data type 

C. A clustered file server of the File Server for general use type 

D. A Distributed File System (DFS) namespace 

Answer:


Question No. 123

- (Topic 2) 

You are evaluating the use of VMM to migrate APP1 for the sales users. You need to identify the effects of the migration. 

What should you identify? 

A. The VHDs and the virtual machine configuration files will move. The sales users' access to APP1 will be interrupted. 

B. The VHDs will move but the virtual machine configuration files will remain in the original location. The sales users will continue to have uninterrupted access to APP1. 

C. The virtual machine configuration files will move but the VHDs will remain in the original location. The sales users' access to APP1 will be interrupted. 

D. The VHDs and the virtual machine configuration files will move. The sales users will continue to have uninterrupted access to APP1. 

Answer:


Question No. 124

- (Topic 4) 

You need to recommend which type of clustered file server and which type of file share must be used in the Hyper-V cluster that hosts App2. The solution must meet the technical requirements and the security requirements. 

Solution: You recommend a scale-out file server that uses an NFS share. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Question No. 125

DRAG DROP - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that are configured as Hyper-V hosts. 

You plan to implement four virtual machines. The virtual machines will be configured as shown in the following table. 


You need to identify which network must be added to each virtual machine. 

Which network types should you identify? 

To answer, drag the appropriate Network Type to the correct virtual machine in the answer area. Each Network Type may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 


Answer: 



Question No. 126

HOTSPOT - (Topic 6) 

You plan to configure Windows Network Load Balancing (NLB) for a company. You display following Network Load Balancing Manager window: 


Use the drop-down menus to select the answer choice that answers each question based on the information presented in the graphic. 


Answer: 



Question No. 127

- (Topic 7) 

An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled. 

Solution: You enable the decommissioning service by using the AD RMS management console. You grant all users the Read & Execute permission to the decommission pipeline. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:

Explanation: The proper procedure is: 

. Inform your users that you are decommissioning the AD.RMS installation and advise them to connect to the cluster to save their content without AD.RMS protection. Alternatively, you could delegate a trusted person to decrypt all rights-protected content by temporarily adding that person to the AD.RMS super users group. 

. After you believe that all of the content is unprotected and saved, you should export the server licensor certificate, and then uninstall AD.RMS from the server. 


Question No. 128

HOTSPOT - (Topic 8) 

Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2. The forest contains two servers. 

The servers are configured as shown in the following table. 


You prepare the forest to support Workplace Join and you enable the Device Registration Service (DRS) on Server1. 

You need to ensure that Workplace Join meets the following requirements: 

Application access must be based on device claims. 

Users who attempt to join their device to the workplace through Server2 must be 

prevented from locking out their Active Directory account due to invalid credentials. 

Which cmdlet should you run to achieve each requirement? To answer, select the cmdlet for each requirement in the answer area. 



Answer: