Cause all that matters here is passing the Microsoft 70 413 pdf exam. Cause all that you need is a high score of 70 413 pdf Designing and Implementing a Server Infrastructure exam. The only one thing you need to do is downloading Actualtests 70 413 exam exam study guides now. We will not let you down with our money-back guarantee.
Q21. - (Topic 8)
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Network Policy Server server role installed.
You configure Server1 as part of a Network Access Protection (NAP) solution that uses the
802.lx enforcement method,
You add a new switch to the network and you configure the switch to use 802.lx authentication.
You need to ensure that only compliant client computers can access network resources through the new switch.
What should you do on Server1?
A. Add the IP address of each new switch to a remediation server group.
B. Add the IP address of each new switch to the list of RADIUS clients.
C. Add the IP address of each new switch to a connection request policy as an Access Client IPv4 Address.
D. Add the IP address of each new switch to a remote RADIUS server group.
Answer: B
Explanation: 802.1X and RADIUS-compliant APs (Acess Points), when they are deployed in a RADIUS infrastructure with a RADIUS server such as an NPS server, are called RADIUS clients.
Q22. - (Topic 5)
You need to perform the directory synchronization with Office 365.
What should you do first?
A. Set the domain functional level to Windows Server 2012.
B. Upgrade the Office 365 licenses to Enterprise E4.
C. Set the forest functional level to Windows Server 2012.
D. Create a site-to-site VPN.
E. Install the DirSync utility in the on-premises environment.
Answer: E
Q23. HOTSPOT - (Topic 8)
Your network contains an Active Directory domain named contoso.com.
The domain has a certification authority (CA). You create four certificate templates. The templates are configured as shown in the following table:
You install the Remote Access server role in the domain.
You need to configure DirectAccess to use one-time password (OTP) authentication.
What should you do? To answer, select the appropriate options in the answer area,
Answer:
Q24. DRAG DROP - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains five servers. The servers are configured as shown in the following table.
You plan to implement Network Access Protection (NAP) with IPSec enforcement on all client computers.
You need to identify on which servers you must perform the configurations for the NAP deployment.
Which servers should you identify? To answer, drag the appropriate servers to the correct actions. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
Q25. HOTSPOT - (Topic 2)
You need to recommend a storage configuration for the Hyper-V hosts.
What should you recommend? To answer, select the appropriate options in the answer area.
Answer:
Q26. - (Topic 3)
You need to recommend a change to the Active Directory environment to support the company's planned changes.
What should you include in the recommendation?
A. Raise the functional level of the domain and the forest.
B. Implement Administrator Role Separation.
C. Upgrade the domain controllers that have the PDC emulator master role to Windows Server 2012.
D. Upgrade the domain controller that has the domain naming master role to Windows Server 2012.
Answer: A
Explanation:
* Scenario:
The functional level of the domain and the forest is Windows Server 2008.
Implement the Active Directory Recycle Bin.
Q27. - (Topic 8)
Your network contains an Active Directory forest named contoso.com.
You plan to deploy 200 new physical servers during the next 12 months by using Windows
Deployment Services (WDS). You identify four server builds for the 200 servers as shown in the following table.
You need to recommend the minimum number of images that must be created for the planned deployment.
How many images should you recommend?
A. 1
B. 2
C. 3
D. 4
Answer: B
Explanation:
One image for the Full Installation of Windows Server 2012, and one image for Server Core installation of Windows Server 2012.
Q28. - (Topic 2)
You need to recommend a solution for the RODC.
Which attribute should you include in the recommendation?
A. systemFlags
B. searchFlags
C. policy-Replication-Flags
D. flags
Answer: B
Explanation: * Scenario: Deploy a read-only domain controller (RODC) to the London office
* The read-only domain controller (RODC) filtered attribute set (FAS) is a set of attributes of the Active Directory schema that is not replicated to an RODC. If you have data that you do not want to be replicated to an RODC in case it is stolen, you can add these attributes to the RODC FAS. If you add the attributes to the RODC FAS before you deploy the first RODC, the attributes are never replicated to any RODC.
/ To decide which attributes to add to the RODC FAS, review any schema extensions that have been performed in your environment and determine whether they contain credential-like data or not. In other words, you can exclude from consideration any attributes that are part of the base schema, and review all other attributes. Base schema attributes have the.systemFlags.attribute value 16 (0x10) set.
Reference: Customize the RODC Filtered Attribute Set
Q29. - (Topic 8)
Your network contains multiple servers that run Windows Server 2012. All client computers run Windows 8.
You need to recommend a centralized solution to download the latest antivirus definitions for Windows Defender.
What should you include in the recommendation?
A. Microsoft System Center 2012 Endpoint Protection
B. Network Access Protection (NAP)
C. Microsoft System Center Essentials
D. Windows Server Update Services (WSUS)
Answer: D
Explanation:
To use WSUS to deploy Windows Defender definition updates to client computers, follow these steps:
1. Open the WSUS Administrator console, and then click Options at the top of the console.
2. Click Synchronization Options.
3. Under Products and Classifications, click Change under Products.
4. Verify that the Windows Defender check box is selected, and then click OK.
5. Under Products and Classifications, click Change under Update Classifications.
6. Verify that the Definition Updates check box is selected, and then click OK.
7. Optional Update the automatic approval rule. To do this, follow these steps:
a. At the top of the console, click Options.
b. Click Automatic Approval Options.
c. Make sure that the Automatically approve updates for installation by using the following rule check box is selected.
d. Under Approve for Installation, click Add/Remove Classification.
e. Verify that the Definition Updates check box is selected, and then click OK.
8. At the top of the console, click Options.
9. Click Synchronization Options.
10. On the taskbar on the left, click Synchronize now.
11. At the top of the console, click Updates.
12. Approve any Windows Defender updates that WSUS should deploy.
Reference: How to use Windows Server Update Services (WSUS) to deploy definition updates to computers that are running Windows Defender
Q30. - (Topic 8)
Your network contains an Active Directory domain named contoso.com.
You deploy several servers that have the Remote Desktop Session Host role service installed.
You have two organizational units (OUs). The OUs are configured as shown in the following table.
GPO1 contains the Folder Redirection settings for all of the users.
You need to recommend a solution to prevent the sales users' folders from being redirected when the users log on to a Remote Desktop session.
What should you include in the recommendation?
A. FromGPO2, set the loopback processing mode.
B. From GPO1, set the loopback processing mode.
C. Configure security filtering for GPO1.
D. Apply a WMI filter to GPO2.
Answer: A
Explanation:
Group Policy applies to the user or computer in a manner that depends on where both the user and the computer objects are located in Active Directory. However, in some cases, users may need policy applied to them based on the location of the computer object alone. You can use the Group Policy loopback feature to apply Group Policy Objects (GPOs) that depend only on which computer the user logs on to.
Reference: Loopback processing of Group Policy