Cause all that matters here is passing the Microsoft 70-414 exam. Cause all that you need is a high score of 70-414 Implementing an Advanced Server Infrastructure exam. The only one thing you need to do is downloading Examcollection 70-414 exam study guides now. We will not let you down with our money-back guarantee.
Q31. - (Topic 8)
You need to deploy the virtual network for the development servers.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Associate VLAN ID 40 with the new logical network.
B. On HV-Cluster1, create a new logical network that uses a single connected network.
C. Associate VLAN ID 20 with the new logical network.
D. On HV-Cluster1, create a new logical network that uses private VLAN networks.
E. On HV-Cluster2, create a new logical network that uses a single connected network.
F. On HV-Cluster2, create a new logical network that uses private VLAN networks.
Answer: A,B
Q32. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
Solution: From Operations Manager, you create a Distributed Application and a Monitor Override.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q33. - (Topic 8)
You have a System Center 2012 R2 Configuration Manager deployment.
All users have client computers that run Windows 8.1. The users log on to their client computer as standard users.
An application named App1 is deployed to the client computers by using System Center.
You need to recommend a solution to validate a registry key used by App1. If the registry key has an incorrect value, the value must be changed. The registry key must be validated every day. The solution must generate a report on non-compliant computers.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. Group Policy preferences
B. A desired configuration baseline
C. The Windows PowerShell Desired State Configuration (DSC) feature
D. The Microsoft Baseline Security Analyzer (MBSA)
Answer: B
Q34. - (Topic 8)
Your network contains multiple servers that run Windows Server 2012.
The network contains a Storage Area Network (SAN) that only supports Fibre Channel connections.
You have two failover clusters. The failover clusters are configured as shown in the following table.
Only the members of Cluster1 can connect to the SAN.
You plan to implement 15 highly available virtual machines on Cluster2. All of the virtual machines will be stored in a single shared folder.
You need to ensure that the VHD files of the virtual machines can be stored on the SAN.
What should you do? (Each correct answer presents a complete solution. Choose all that apply.)
A. From a node in Cluster2, create a Virtual Fibre Channel SAN.
B. From a node in Cluster1, create a Virtual Fibre Channel SAN.
C. From Cluster1, add the iSCSI Target Server cluster role.
D. From Cluster1, configure the clustered File Server role of the File Server for scale-out application data type.
Answer: A,D
Q35. - (Topic 8)
Your network contains a data center named DataCenter1 that contains multiple servers.
The servers are configured as Hyper-V hosts.
Your company deploys a disaster recovery site. The disaster recovery site has a dedicated connection to DataCenter1.
The network is connected to the disaster recovery site by using a dedicated link.
DataCenter1 contains 10 business critical virtual machines that run a line-of-business application named App1.
You need to recommend a business continuity solution to ensure that users can connect to App1 within two hours if DataCenter1 fails.
What should you include in the recommendation?
More than one answer choice may achieve the goal. Select the BEST answer.
A. From Microsoft System Center 2012 Virtual Machine Manager (VMM), implement live migration on the virtual machines.
B. From Hyper-V Manager, implement Hyper-V replicas.
C. From Microsoft System Center 2012 Data Protection Manager, implement a protection group.
D. From Hyper-V Manager, create snapshots of the virtual machines.
Answer: B
Q36. - (Topic 8)
Your network contains four clusters. The clusters are configured as shown in the following table.
You manage all of the clusters by using Microsoft System Center 2012 Virtual Machine Manager (VMM). You plan to implement Dynamic Optimization for the virtual machines.
You need to recommend a configuration for the planned implementation.
What should you recommend?
A. Dynamic Optimization on Cluster2 and Cluster4 only Virtual machines that are balanced across the clusters
B. Dynamic Optimization on Cluster1 and Cluster2 only Virtual machines that are balanced across the nodes in the clusters
C. Dynamic Optimization on all of the clusters Virtual machines that are balanced across the nodes in the clusters
D. Dynamic Optimization on all of the clusters Virtual machines that are balanced across the clusters
Answer: C
Q37. - (Topic 8)
Your network contains the following:
. 20 Hyper-V hosts
. 100 virtual machines
. 2,000 client computers
You need to recommend an update infrastructure design to meet the following requirements:
. Deploy updates to all of the virtual machines and the client computers from a single console. . Generate reports that contain a list of the applied updates.
What should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.
A. One Windows Server Update Services (WSUS) server integrated with Microsoft System Center 2012 Configuration Manager and a second WSUS server that is integrated with Microsoft System Center 2012 Virtual Machine Manager (VMM)
B. One Windows Server Update Services (WSUS) server integrated with Microsoft System Center 2012 Virtual Machine Manager (VMM)
C. One Windows Server Update Services (WSUS) server integrated with Microsoft System Center 2012 Configuration Manager, a second WSUS server integrated with Microsoft System Center 2012 Virtual Machine Manager (VMM), and a third standalone WSUS server.
D. One Windows Server Update Services (WSUS) server integrated with Microsoft System Center 2012 Configuration Manager and Microsoft System Center 2012 Virtual Machine Manager (VMM)
Answer: D
Q38. - (Topic 8)
Your network contains 500 client computers that run Windows 7 and a custom application named App1. App1 uses data stored in a shared folder.
You have a failover cluster named Cluster1 that contains two servers named Server1 and Server2.
Server1 and Server2 run Windows Server 2012 and are connected to an iSCSI Storage Area Network (SAN).
You plan to move the shared folder to Cluster1.
You need to recommend which cluster resource must be created to ensure that the shared folder can be accessed from Cluster1.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. The Generic Application cluster role
B. The DFS Namespace Server cluster role
C. The clustered File Server role of the File Server for general use type
D. The clustered File Server role of the File Server for scale-out application data type
Answer: C
Q39. DRAG DROP - (Topic 8)
You are planning to set up a proof-of-concept network virtualization environment.
The environment will contain three servers. The servers will be configured as shown in the following table.
VMM will be used to manage the virtualization environment.
Server2 runs three virtual machines. All of the virtual machines are configured to use
network virtualization.
You need to enable network connectivity between the virtual machines and Server3.
Which four actions should you perform in sequence? To answer, move the appropriate
actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q40. DRAG DROP - (Topic 8)
Your network contains servers that run Windows Server 2012. The network contains two servers named Server1 and Server2 that are connected to a SAS storage device. The device only supports two connected computers.
Server1 has the iSCSI Target Server role service installed. Ten application servers use their iSCSI Initiator to connect to virtual disks in the SAS storage device via iSCSI targets on Server1.
Currently, Server2 is used only to run backup software.
You install the iSCSI Target Server role service on Server2.
You need to ensure that the iSCSI targets are available if Server1 fails.
Which five actions should you perform?
To answer, move the five appropriate actions from the list of actions to the answer area
and arrange them in the correct order.
Answer: