getcertified4sure.com

Secrets to 70 413 exam




It is more faster and easier to pass the Microsoft 70 413 pdf exam by using Exact Microsoft Designing and Implementing a Server Infrastructure questuins and answers. Immediate access to the Rebirth microsoft 70 413 Exam and find the same core area 70 413 pdf questions with professionally verified answers, then PASS your exam with a high score now.

Q71. - (Topic 1) 

You need to recommend a solution for DHCP logging. The solution must meet the technical requirement. 

What should you include in the recommendation? 

A. Event subscriptions 

B. IP Address Management (IPAM) 

C. DHCP audit logging 

D. DHCP filtering 

Answer:

Explanation: * Scenario: A central log of the IP address leases and the users associated to those leases must be created. 

* Feature description IPAM in Windows Server 2012 is a new built-in framework for discovering, monitoring, auditing, and managing the IP address space used on a corporate network. IPAM provides for administration and monitoring of servers running Dynamic Host Configuration Protocol (DHCP) and Domain Name Service (DNS). IPAM includes components for: 

. Automatic IP address infrastructure discover)': IPAM discovers domain controllers, DHCP servers, and DNS servers in the domains you choose. You can enable or disable management of these servers by IPAM. 

. Custom IP address space display, reporting, and management: The display of IP addresses is highly customizable and detailed tracking and utilization data is available. IPv4 and IPv6 address space is organized into IP address blocks, IP address ranges, and individual IP addresses. IP addresses are assigned built-in or user-defined fields that can be used to further organize IP address space into hierarchical, logical groups. 

. Audit of server configuration changes and tracking of IP address usage: Operational events are displayed for the IPAM server and managed DHCP servers. IPAM also enables IP address tracking using DHCP lease events and user logon events collected from Network Policy Server (NPS), domain controllers, and DHCP servers. Tracking is available by IP address, client ID, host name, or user name. 

. Monitoring and management of DHCP and DNS services: IPAM enables automated service availability monitoring for Microsoft DHCP and DNS servers across the forest. DNS zone health is displayed, and detailed DHCP server and scope management is available using the IPAM console. 

Reference: IP Address Management (IPAM) Overview 


Q72. - (Topic 3) 

You need to recommend a server deployment strategy for the main office that meets the server deployment requirements. 

What should you recommend installing in the main office? 

A. Windows Deployment Services (WDS) 

B. The Windows Automated Installation Kit (Windows AIK) 

C. The Express Deployment Tool (EDT) 

D. The Windows Assessment and Deployment Kit (Windows ADK) 

Answer:

Explanation: WDS is a server role that enables you to remotely deploy Windows operating systems. You can use it to set up new computers by using a network-based installation. 

This means that you do not have to install each operating system directly from a CD, USB drive, or DVD. 

Reference: What's New in Windows Deployment Services in Windows Server 


Q73. - (Topic 8) 

Your company has a main office, ten regional datacenters and 100 branch offices. You are designing the site topology for an Active Directory forest named contoso.com. The forest will contain the following servers: 

* In each regional datacenter and in the main office, a domain controller that runs Windows 

Server 2012 

* In each branch office, a file server that runs Windows Server 2012 

You have a shared folder that is accessed by using the path \\contoso.com\shares\software. The folder will be replicated to a local file server in each branch office by using Distributed File System (DFS) replication. 

You need to recommend an Active Directory site design to meet the following requirements: 

* Ensure that users in the branch offices will be authenticated by a domain controller in the closest regional datacenter. 

* Ensure that users automatically connect to the closest file server when they access \\contoso.com\shares\software. 

How many Active Directory sites should you recommend? 

A. 1 

B. 10 

C. 11 

D. 111 

Answer:


Q74. - (Topic 8) 

Your network contains a Hyper-V host named Host1 that runs Windows Server 2012. Host1 contains a virtual machine named DC1. DC1 is a domain controller that runs Windows Server 2012. 

You plan to clone DC1. 

You need to recommend which steps are required to prepare DC1 to be cloned. 

What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Run dcpromo.exe /adv. 

B. Create a file named Dccloneconfig.xml. 

C. Add DC1 to the Cloneable Domain Controllers group. 

D. Run sysprep.exe /oobe. 

E. Run New-VirtualDiskClone. 

Answer: B,C 

Explanation: 

B: DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways. 

C: There's a new group in town. It's called Cloneable Domain Controllers and you can find it in the Users container. Membership in this group dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn't be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete. Cloned DCs will also end up in the Cloneable Domain Controllers group. Make sure to remove those as well. 


Q75. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table. 

All client computers run either Windows 7 or Windows 8. 

The corporate security policy states that all of the client computers must have the latest security updates installed. 

You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3. 

Solution: You implement the DHCP Network Access Protection (NAP) enforcement method. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:

Explanation: Implementing DHCP NAP to Enforce WSUS Updates 


Q76. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. The domain contains two sites named Site1 and Site2. The sites connect to each other by using a 1-Mbps WAN link. 

The sites contain four servers. The servers are configured as shown in the following table. 

In Site2, you plan to deploy 50 Hyper-V hosts. 

You need to recommend a solution to deploy the Hyper-V hosts by using VMM. The solution must minimize the amount of traffic between Site1 and Site2 during deployment. 

What should you recommend? 

A. On Server4, install VMM. From the Virtual Machine Manager console, add Server1 as a PXE server and add Server4 as a library server. 

B. On Server4/ install VMM. From the Virtual Machine Manager console, add Server1 as a PXE server and a library server. 

C. On Server4, install WDS. From the Virtual Machine Manager console, add Server4 as a PXE server and a library server. 

D. On Server4, install WDS. From the Virtual Machine Manager console, add Server4 as a PXE server and add Server1 as a library server. 

Answer:


Q77. - (Topic 8) 

Your network contains 50 servers that run Windows Server 2003 and 50 servers that run Windows Server 2008. 

You plan to implement Windows Server 2012 R2. 

You need to create a report that includes the following information: 

. The servers that run applications and services that can be moved to Windows Server 2012 R2 

. The servers that have hardware that can run Windows Server 2012 R2 . The servers that are suitable to be converted to virtual machines hosted on Hyper-

V hosts that run Windows Server 2012 R2 

Solution: From an existing server, you run the Microsoft Application Compatibility Toolkit (ACT). 

Does this meet the goal? 

A. Yes 

B. No 

Answer:

Explanation: With the ACT, you can: Analyze your portfolio of applications, websites, and computers Evaluate operating system deployments, the impact of operating system updates, and your compatibility with websites Centrally manage compatibility evaluators and configuration settings Rationalize and organize applications, websites, and computers Prioritize application compatibility efforts with filtered reporting Add and manage issues and solutions for your enterprise-computing environment Deploy automated mitigations to known compatibility issues Send and receive compatibility information from the Microsoft Compatibility Exchange 


Q78. - (Topic 3) 

You need to recommend changes to the Active Directory site topology to support on the company's planned changes. 

What should you include in the recommendation? 

A. A new site 

B. A new site link bridge 

C. A new site link 

D. A new subnet 

Answer:

Explanation: 

* Scenario: 

The forest contains a child domain for each office. An Active Directory site exists for each 

office. 

* Sites overview 

Sites in AD DS represent the physical structure, or topology, of your network. AD DS uses 

network topology information, which is stored in the directory as site, subnet, and site link 

objects, to build the most efficient replication topology. The replication topology itself 

consists of the set of connection objects that enable inbound replication from a source 

domain controller to the destination domain controller that stores the connection object. 

The Knowledge 

Consistency Checker (KCC) creates these connection objects automatically on each 

domain controller. 

Reference: Understanding Sites, Subnets, and Site Links 

http://technet.microsoft.com/en-us/library/cc754697.aspx 


Q79. - (Topic 8) 

Your network contains an Active Directory forest named adatum.com. All domain controllers run Windows Server 2008 R2. The functional level of the domain and the forest is Windows Server 2008. 

You deploy a new Active Directory forest named contoso.com. All domain controllers run Windows Server 2012 R2. The functional level of the domain and the forest is Windows Server 2012 R2. 

You establish a two-way, forest trust between the forests. Both networks contain member servers that run either Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2 or Windows Server 2008. 

You plan to use the Active Directory Migration Tool 3.2 (ADMT 3.2) to migrate user accounts from adatum.com to contoso.com. SID history will be used in contoso.com and passwords will be migrated by using a Password Export Server (PES). 

You need to recommend which changes must be implemented to support the planned migration. 

Which two changes should you recommend? Each correct answer presents part of the solution. 

A. In the contoso.com forest, deploy a domain controller that runs Windows Server 2008 R2. 

B. In the adatum.com forest, upgrade the functional level of the forest and the domain. 

C. In the contoso.com forest, downgrade the functional level of the forest and the domain. 

D. In the adatum.com forest, deploy a domain controller that runs Windows Server 2012 R2. 

Answer: A,C 


Q80. - (Topic 8) 

Your company has two main offices and 10 branch offices. Each office is configured as a separate Active Directory site. 

The main offices sites are named Site1 and Site2. Each office connects to Site1 and Site2 by using a WAN link. Each site contains a domain controller that runs Windows Server 2008. 

You are redesigning the Active Directory infrastructure. 

You plan to implement domain controllers that run Windows Server 2012 and decommission all of the domain controllers that run Windows Server 2008. 

You need to recommend a placement plan for the Windows Server 2012 domain controllers to meet the following requirements: 

. Ensure that users can log on to the domain if a domain controller or a WAN link fails. . Minimize the number of domain controllers implemented. 

What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Read-only domain controllers (RODCs) in the branch office sites 

B. A writable domain controller in Site1 

C. A writable domain controller in Site2 

D. Writable domain controllers in the branch office sites 

Answer: A,B,C 

Explanation: A (not D) Writeable domain controllers are not needed to authenticate users at the branch offices.