getcertified4sure.com

What Renewal 70-414 Is?




It is more faster and easier to pass the Microsoft 70-414 exam by using 100% Correct Microsoft Implementing an Advanced Server Infrastructure questuins and answers. Immediate access to the Refresh 70-414 Exam and find the same core area 70-414 questions with professionally verified answers, then PASS your exam with a high score now.

Q21. HOTSPOT - (Topic 2) 

You need to recommend a design that meets the technical requirements for managing the Hyper-V hosts by using VMM. 

What should you recommend? To answer, select the appropriate options in the answer area. 

Answer: 


Q22. - (Topic 4) 

You need to recommend a solution that meets the security requirements for Group1. 

To which System Center 2012 Virtual Machine Manager (VMM) group should you assign Group1? 

A. Delegated Administrator 

B. Administrators 

C. Self-Service User 

D. Read-Only Administrator 

Answer:


Q23. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. 

The corporate security policy states that when new user accounts, computer accounts, and contacts are added to an organizational unit (OU) named Secure, the addition must be audited. 

You need to recommend an auditing solution to meet the security policy. 

What should you include in the recommendation? (Each answer presents part of the solution. Choose all that apply.) 

A. From the Default Domain Controllers Policy, enable the Audit directory services setting. 

B. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit directory services setting. 

C. From the Secure OU, modify the Auditing settings. 

D. From the Default Domain Controllers Policy, enable the Audit object access setting. 

E. From the Secure OU, modify the Permissions settings. 

F. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit object access setting. 

Answer: A,B 


Q24. - (Topic 5) 

You need to ensure that the developers can manage their own virtual machines. 

Solution: You perform the following actions: 

. In Virtual Machine Manager, you create a new user role named DevUsers that 

uses the Application Administrator profile. 

. You grant Checkpoint permissions to the DevUsers role. 

. You distribute the Self-Service Portal URL to the developers. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q25. - (Topic 8) 

Your network contains five servers that run Windows Server 2012 R2. 

You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. 

You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. 

Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. 

You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. 

You need to ensure that the NLB feature can distribute connections across all of the virtual machines. 

Solution: From the properties of each virtual machine, you enable MAC address spoofing for the existing virtual network adapter. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q26. - (Topic 8) 

Your network contains the following roles and applications: 

Microsoft SQL Server 2012 

Distributed File System (DFS) Replication 

Active Directory Domain Services (AD DS) 

Active Directory Rights Management Services (AD RMS) 

Active Directory Lightweight Directory Services (AD LDS) 

You plan to deploy Active Directory Federation Services (AD FS). 

You need to identify which deployed services or applications can be used as attribute stores for the planned AD FS deployment. 

What should you identify? (Each correct answer presents a complete solution. Choose all that apply.) 

A. DFS 

B. AD RMS 

C. Microsoft SQL Server 2012 

D. AD LDS 

E. AD DS 

Answer: C,D,E 


Q27. HOTSPOT - (Topic 8) 

Your network contains five physical servers. The servers are configured as shown in the following table. 

All servers run Windows Server 2012 R2. 

During the setup of VMM, you configure distributed key management. 

You need to ensure that the entire VMM infrastructure can be restored. 

What should you include in the backup plan? To answer, select the appropriate server to 

back up for each backup content type in the answer. 

Answer: 


Q28. DRAG DROP - (Topic 8) 

You need to ensure that all new production Hyper-V virtual machines can be deployed correctly. 

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q29. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. 

You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table. 

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. 

Solution: From Configuration Manager, you create a Collection and a Desired Configuration Management baseline. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q30. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The network contains a server named Server1 that runs Windows Server 2012. Server1 has the Active Directory Certificate Services server role installed. Server1 is configured as an offline standalone root certification authority (CA). 

You install the Active Directory Certificate Services server role on Server2 and configure the server as an enterprise subordinate CA. 

You need to ensure that the certificate issued to Server2 is valid for 10 years. 

What should you do first? 

A. Modify the subordinate CA certificate template. 

B. Modify the registry on Server2. 

C. Modify the registry on Server1. 

D. Modify the CAPolicy.inf file on Server2. 

E. Modify the CAPolicy.inf file on Server1. 

Answer: