getcertified4sure.com

Today Big Q: 70 413 exam?




Act now and download your Microsoft 70 413 exam test today! Do not waste time for the worthless Microsoft 70 413 exam tutorials. Download Up to the immediate present Microsoft Designing and Implementing a Server Infrastructure exam with real questions and answers and begin to learn Microsoft microsoft 70 413 with a classic professional.

Q81. - (Topic 8) 

Your network contains an Active Directory forest named contoso.com. 

You plan to deploy 200 Hyper-V hosts by using Microsoft System Center 2012 Virtual Machine Manager (VMM) Service Pack 1 (SP1). 

You add a PXE server to the fabric. 

You need to identify which objects must be added to the VMM library for the planned deployment. 

What should you identify? (Each correct answer presents part of the solution. Choose all that apply.) 

A. A host profile 

B. A capability profile 

C. A hardware profile 

D. A generalized image 

E. A service template 

Answer: A,D 

Explanation: Templates and profiles are used to standardize the creation of virtual 

machines and services. 

These configurations are stored in the VMM database but are not represented by physical 

configuration files. 

 (D) 

There are several new types of templates and profiles in VMM, most of which are used for service creation. 

 (A) 

There are also host profiles, used for deploying a Hyper-V host from a bare-metal computer, and capability profiles, used to specify the capabilities of virtual machines on each type of supported hypervisor when virtual machines are deployed to a private cloud. 

Note: 

* host profile: 

A Virtual Machine Manager library resource that contains hardware and operating system 

configuration settings to convert a bare-metal computer to a managed Hyper-V host. 

*capability profile: 

A Virtual Machine Manager library resource that defines which resources (for example, 

number of processors or maximum memory) are available to a virtual machine that is 

created in a private cloud. 


Q82. - (Topic 3) 

You need to recommend a solution that meets the security requirements. 

Which schema attribute properties should you recommend modifying? 

A. isIndexed 

B. searchFlags 

C. isCriticalSystemObject 

D. schemaFlagsEx 

Answer:

Explanation: 

* Scenario: ). Confidential attributes must not be replicated to the Chicago office. 

* Applies To: Windows Server 2008, Windows Server 2012 This topic includes procedures for adding an attribute to the filtered attribute set (FAS) for a readonly domain controller (RODC) and marking the attribute as confidential data. You can perform these procedures to exclude specific data from replicating to RODCs in the forest. Because the data is not replicated to any RODCs, you can be assured that the data will not be revealed to an attacker who manages to successfully compromise an RODC. In most cases, adding an attribute to the RODC FAS is completed by the developer of the application that added the attribute to the schema. 

. Determine and then modify the current searchFlags value of an attribute 

. Verify that an attribute is added to the RODC FAS -Determine and then modify the current searchFlags value of an attribute To add an attribute to an RODC FAS, you must first determine the current searchFlags value of the attribute that you want to add, and then set the following values for searchflags: 

. To add the attribute to the RODC FAS, set the 10th bit to 0x200. 

. To mark the attribute as confidential, set the 7th bit to 0x080. 

Reference: Adding Attributes to the RODC Filtered Attribute Set 

http://technet.microsoft.com/en-us/library/cc754794(v=ws.10).aspx 


Q83. - (Topic 1) 

You need to recommend a fault-tolerant solution for the VPN. The solution must meet the technical requirements. 

What should you include in the recommendation? 

A. Network adapter teaming 

B. Network Load Balancing (NLB) 

C. Failover Clustering 

D. DirectAccess 

Answer:

Explanation: 

* Scenario: Core networking services in each office must be redundant if a server fails. 

* The Network Load Balancing (NLB) feature distributes traffic across several servers by using the TCP/IP networking protocol. By combining two or more computers that are running applications into a single virtual cluster, NLB provides reliability and performance for web servers and other mission-critical servers. 

Reference: Network Load Balancing Overview 

http://technet.microsoft.com/en-us/library/hh831698.aspx 


Q84. - (Topic 8) 

Your company has a main office. The main office is located in a building that has 10 floors. 

A datacenter on the ground floor contains a Windows Server 2012 failover cluster. The failover cluster contains a DHCP server resource named DHCP1. All client computers receive their IP addresses from DHCP1. All client computers are part of the 131.107.0.0/16 IPv4 subnet. 

You plan to implement changes to the network subnets to include a separate subnet for each floor of the office building. The subnets will connect by using routers. 

You need to recommend changes to the DHCP infrastructure to ensure that all of the client computers can receive their IP configuration by using DHCP. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Install a remote access server on each floor. Configure a DHCP relay agent on each new DHCP server. Create a scope for each subnet on DHCP1. 

B. Install a DHCP server on each floor. Create a scope for the local subnet on each new DHCP server. Enable DHCP Failover on each new DHCP server. 

C. Configure each router to forward requests for IP addresses to DHCP1. Create a scope for each subnet on DHCP1. 

D. Configure each router to forward requests for IP addresses to DHCP1. Create a scope for the 10.0.0.0/16 subnet on DHCP1. 

Answer:

Explanation: 

Excerpt: In TCP/IP networking, routers are used to interconnect hardware and software used on different physical network segments called subnets and forward IP packets between each of the subnets. To support and use DHCP service across multiple subnets, routers connecting each subnet should comply with DHCP/ BOOTP relay agent capabilities described in RFC 1542. 

Reference: Support multiple subnets with one DHCP server by configuring DHCP relay agents 

http://technet.microsoft.com/en-us/library/cc771390.aspx 


Q85. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The physical 

topology of the network is configured as shown in the exhibit. 

Each office contains 500 employees. 

You plan to deploy several domain controllers to each office. 

You need to recommend a site topology for the planned deployment. 

What should you include in the recommendation? 

More than one answer choice may achieve the goal. Select the BEST answer. 

Exhibit 

A. Five sites and one site link 

B. Three sites and three site links 

C. One site 

D. Five sites and three site links 

Answer:

Explanation: 

Create a site for each LAN, or set of LANs, that are connected by a high speed backbone, and assign the site a name. Connectivity within the site must be reliable and always available. This would mean 5 sites Site links are transitive, so if site A is connected to site B, and site B is connected to site C, then the KCC assumes that domain controllers in site A can communicate with domain controllers in site C. You only need to create a site link between site A and site C if there is in fact a distinct network connection between those two sites. This would mean 3 sitelinks So answer is "Five sites and three site links" 

Reference: Defining Sites and Site Links http://technet.microsoft.com/en-us/library/cc960573.aspx 


Q86. DRAG DROP - (Topic 8) 

Your company plans to deploy a remote access solution to meet the following requirements: 

. Ensure that client computers that are connected to the Internet can be managed remotely without requiring that the user log on. 

. Ensure that client computers that run Windows Vista or earlier can connect remotely. 

. Ensure that non-domain-joined computers can connect remotely by using TCP port 443. 

You need to identify which remote access solutions meet the requirements. 

Which solutions should you identify? 

To answer, drag the appropriate solution to the correct requirement in the answer area. Each solution may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q87. - (Topic 1) 

You implement and authorize the new DHCP servers. You import the server configurations and the scope configurations from PA1 and AM1. 

You need to ensure that clients can obtain DHCP address assignments after you shut down PA1 and AM1. The solution must meet the technical requirements. 

What should you do? 

A. Run the Get-DhcpServerv4Lease cmdlet and the Remove-DhcpServerv4Lease cmdlet. Run the Windows Server Migration Tools. 

B. Run the Get-DhcpServerv4Lease cmdlet and the Add-DhcpServerv4Lease cmdlet. Activate the scopes. 

C. Run the Get-DhcpServerv4FreeIPAddress cmdlet and the Invoke-DhcpServerv4FailoverReplication cmdlet. Run the Windows Server Migration Tools. 

D. Run the Get-DhcpServerv4FreeIPAddress cmdlet and the Invoke-DhcpServerv4FailoverReplication cmdlet Activate the scopes. 

Answer:

Explanation: The Get-DhcpServerv4Lease cmdlet gets one or more lease records from the Dynamic Host Configuration Protocol (DHCP) server service. The Add-DhcpServerv4Lease cmdlet adds a new IPv4 address lease on the Dynamic Host Configuration Protocol (DHCP) server service. This cmdlet is only supported for DHCP server service running on Windows Server. 2012. 


Q88. DRAG DROP - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 resides in the perimeter network and has the Remote Access server role installed. 

Some users have laptop computers that run Windows 7 and are joined to the domain. Some users work from home by using their home computers. The home computers run either Windows XP, Windows Vista/ Windows 7, or Windows 8. 

You need to configure the computers for remote access. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q89. HOTSPOT - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. You plan to implement multiple DHCP servers. 

An administrator named Admin1 will authorize the DHCP servers. You need to ensure that Admin1 can authorize the planned DHCP servers. 

To which container should you assign Admin1 permissions? To answer, select the appropriate node in the answer area. 

Answer: 


Q90. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The Active Directory site topology is configured as shown in the exhibit. (Click the Exhibit button.) 

DC1 and DC2 run Windows Server 2003 R2. All FSMO roles are located on DC2. 

You plan to deploy a read-only domain controller (RODC) to Site3. 

You need to recommend changes to the network to support the planned RODC 

implementation. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. To Site1, add an RODC that runs Windows Server 2012. 

B. Replace DC2 with a domain controller that runs Windows Server 2012. 

C. To Site2, add an RODC that runs Windows Server 2012. 

D. Replace DC1 with a domain controller that runs Windows Server 2012. 

Answer:

Explanation: Each RODC requires a writable domain controller running Windows Server 

2012 for the same domain from which the RODC can directly replicate. 

Typically, this requires that a writable domain controller running Windows Server 2012 be 

placed in the nearest site in the topology. 

Reference: Active Directory Replication Considerations