16 October, 2019
Designing And Implementing A Server Infrastructure 70-413 Study Guides
We provide microsoft 70 413 which are the best for clearing 70-413 test, and to get certified by Microsoft Designing and Implementing a Server Infrastructure. The microsoft 70 413 covers all the knowledge points of the real 70-413 exam. Crack your Microsoft 70-413 Exam with latest dumps, guaranteed!
Online Microsoft 70-413 free dumps demo Below:
Question 1
- (Topic 9)
You have a virtual machine (VM) named VM-APP1 that hosts critical application named APP1. The VM has the following VHDX virtual disks:
Both VHDX virtual disks are located on LUN1 of a Storage Area Network.
Every time you perform Storage Live Migration for VM-APP1, it takes a few hours.
You need to ensure that the storage supports Offloaded Data Transfer (ODX), and that ODX is enabled.
Which two Windows PowerShell commands should you run? Each correct answer presents part of the solution.
You have a virtual machine (VM) named VM-APP1 that hosts critical application named APP1. The VM has the following VHDX virtual disks:
Both VHDX virtual disks are located on LUN1 of a Storage Area Network.
Every time you perform Storage Live Migration for VM-APP1, it takes a few hours.
You need to ensure that the storage supports Offloaded Data Transfer (ODX), and that ODX is enabled.
Which two Windows PowerShell commands should you run? Each correct answer presents part of the solution.
Question 2
- (Topic 7)
You have an IP Address Management (IPAM) server that runs Windows Server 2012 SP1. You need to integrate the IPAM server with System Center Virtual Machine Manager (SCVMM).
Solution: You create a dedicated user account named IPAM_svc, and add it to the Local Administrators local group on the SO/MM server.
Does this meet the goal?
You have an IP Address Management (IPAM) server that runs Windows Server 2012 SP1. You need to integrate the IPAM server with System Center Virtual Machine Manager (SCVMM).
Solution: You create a dedicated user account named IPAM_svc, and add it to the Local Administrators local group on the SO/MM server.
Does this meet the goal?
Question 3
- (Topic 3)
You need to recommend changes to the Active Directory site topology to support on the company's planned changes.
What should you include in the recommendation?
You need to recommend changes to the Active Directory site topology to support on the company's planned changes.
What should you include in the recommendation?
Question 4
DRAG DROP - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains an IP Address Management (IPAM) server.
You plan to delegate the administration of IPAM as shown in the following table.
You need to recommend which IPAM security group must be used for each department. The solution must minimize the number of permissions assigned to each group.
What should you recommend?
To answer, drag the appropriate group to the correct department in the answer area. Each group may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Solution:
Box 1:
Box 2:
Box 3:
* IPAM IP Audit Administrators: Members of this group have IPAM Users privileges and can perform IPAM common management tasks and can view IP address tracking information.
* IPAM Users: Members of this group can view all information in server discovery, IP address space, and server management. They can view IPAM and DHCP server operational events, but cannot view IP address tracking information.
* IPAM ASM Administrators: IPAM address space management (ASM) administrators have IPAM Users privileges and can perform IPAM common management tasks and IP address space tasks.
Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The domain contains an IP Address Management (IPAM) server.
You plan to delegate the administration of IPAM as shown in the following table.
You need to recommend which IPAM security group must be used for each department. The solution must minimize the number of permissions assigned to each group.
What should you recommend?
To answer, drag the appropriate group to the correct department in the answer area. Each group may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Solution:
Box 1:
Box 2:
Box 3:
* IPAM IP Audit Administrators: Members of this group have IPAM Users privileges and can perform IPAM common management tasks and can view IP address tracking information.
* IPAM Users: Members of this group can view all information in server discovery, IP address space, and server management. They can view IPAM and DHCP server operational events, but cannot view IP address tracking information.
* IPAM ASM Administrators: IPAM address space management (ASM) administrators have IPAM Users privileges and can perform IPAM common management tasks and IP address space tasks.
Does this meet the goal?
Question 5
- (Topic 9)
Your network contains an Active Directory forest named contoso.com. The forest contains one domain.
Your company plans to open a new division named Division1. A group named Division1Admins will administer users and groups for Division1.
You identify the following requirements for Division1:
✑ All Division1 users must have a complex password that is 14 characters.
✑ Division1Admins must be able to manage the user accounts for Division1.
✑ Division1Admins must be able to create groups, and then delete the groups that they create.
✑ Division1Admins must be able to reset user passwords and force a password change at the next logon for all Division1 users.
You need to recommend changes to the forest to support the Division1 requirements.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
Your network contains an Active Directory forest named contoso.com. The forest contains one domain.
Your company plans to open a new division named Division1. A group named Division1Admins will administer users and groups for Division1.
You identify the following requirements for Division1:
✑ All Division1 users must have a complex password that is 14 characters.
✑ Division1Admins must be able to manage the user accounts for Division1.
✑ Division1Admins must be able to create groups, and then delete the groups that they create.
✑ Division1Admins must be able to reset user passwords and force a password change at the next logon for all Division1 users.
You need to recommend changes to the forest to support the Division1 requirements.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
Question 6
- (Topic 9)
Your network contains an Active Directory domain named contoso.com. All client computers run either Windows 7 or Windows 8.
Some users work from customer locations, hotels, and remote sites. The remote sites often have firewalls that limit connectivity to the Internet.
You need to recommend a VPN solution for the users. Which protocol should you include in the recommendation?
Your network contains an Active Directory domain named contoso.com. All client computers run either Windows 7 or Windows 8.
Some users work from customer locations, hotels, and remote sites. The remote sites often have firewalls that limit connectivity to the Internet.
You need to recommend a VPN solution for the users. Which protocol should you include in the recommendation?
Question 7
- (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
All client computers run either Windows 7 or Windows 8.
The corporate security policy states that all of the client computers must have the latest security updates installed.
You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.
Solution: You implement the DHCP Network Access Protection (NAP) enforcement method.
Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
All client computers run either Windows 7 or Windows 8.
The corporate security policy states that all of the client computers must have the latest security updates installed.
You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.
Solution: You implement the DHCP Network Access Protection (NAP) enforcement method.
Does this meet the goal?
Question 8
- (Topic 9)
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2.
Does this meet the goal?
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2.
Does this meet the goal?
Question 9
HOTSPOT - (Topic 4)
On Server2, you create a Run As Account named Account1. Account1 is associated to an Active Directory account named VMMIPAM.
You need to implement an IPAM solution.
What should you do? To answer, select the appropriate configuration for each server in the answer area.
Solution:
Box 1: Add a network service
On the VMM server use the Add Network Service Wizard to setup a service, which runs with the newly created VMMIPAM account, and which connects to IPAM server on Server3. Box 2:
On the IPAM server add the new VMMIPAM account to the IPAM ASM Administrators and to the Remote Management Users groups. This ensures that the Network Service which is run with the VMMIPAM account has the required permissions to access the IPAM server.
Scenario:
Server2 is running System Center 2012 R2 Virtual Machine Manager (VMM) server. Server3 is running IPAM server.
Does this meet the goal?
On Server2, you create a Run As Account named Account1. Account1 is associated to an Active Directory account named VMMIPAM.
You need to implement an IPAM solution.
What should you do? To answer, select the appropriate configuration for each server in the answer area.
Solution:
Box 1: Add a network service
On the VMM server use the Add Network Service Wizard to setup a service, which runs with the newly created VMMIPAM account, and which connects to IPAM server on Server3. Box 2:
On the IPAM server add the new VMMIPAM account to the IPAM ASM Administrators and to the Remote Management Users groups. This ensures that the Network Service which is run with the VMMIPAM account has the required permissions to access the IPAM server.
Scenario:
Server2 is running System Center 2012 R2 Virtual Machine Manager (VMM) server. Server3 is running IPAM server.
Does this meet the goal?
Question 10
HOTSPOT - (Topic 9)
You plan to implement a virtualization solution to host 10 virtual machines. All of the virtual machines will be hosted on servers that run Windows Server 2012.
You need to identify which servers must be deployed for the planned virtualization solution. The solution must meet the following requirements:
• Minimize the number of servers.
• Ensure that live migration can be used between the hosts.
Which servers should you identify?
To answer, select the appropriate servers in the answer area.
Solution:
Just two server with Hyper-V installed is enough to perform a Live Migration. (Minimize the number of servers)
Does this meet the goal?
You plan to implement a virtualization solution to host 10 virtual machines. All of the virtual machines will be hosted on servers that run Windows Server 2012.
You need to identify which servers must be deployed for the planned virtualization solution. The solution must meet the following requirements:
• Minimize the number of servers.
• Ensure that live migration can be used between the hosts.
Which servers should you identify?
To answer, select the appropriate servers in the answer area.
Solution:
Just two server with Hyper-V installed is enough to perform a Live Migration. (Minimize the number of servers)
Does this meet the goal?
Question 11
DRAG DROP - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 resides in the perimeter network and has the Remote Access server role installed.
Some users have laptop computers that run Windows 7 and are joined to the domain. Some users work from home by using their home computers. The home computers run either Windows XP, Windows Vista/ Windows 7, or Windows 8.
You need to configure the computers for remote access. Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Solution:
Box 1: Installing CMAK
CMAK is an optional component that is not installed by default. You must install CMAK to create connection profiles that your users can install to access remote networks.
Box 2: The Connection Manager Administration Kit (CMAK) is a tool that you can use to customize the remote connection experience for users on your network by creating predefined connections to remote servers and networks. To create and customize a connection for your users, you use the CMAK wizard.
Box 3: Distributing your completed connection profile
Running the CMAK wizard produces a connection profile that is stored in an executable file. Running that file on a client computer equips that computer with everything needed to establish the network connection that you designed.
Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 resides in the perimeter network and has the Remote Access server role installed.
Some users have laptop computers that run Windows 7 and are joined to the domain. Some users work from home by using their home computers. The home computers run either Windows XP, Windows Vista/ Windows 7, or Windows 8.
You need to configure the computers for remote access. Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Solution:
Box 1: Installing CMAK
CMAK is an optional component that is not installed by default. You must install CMAK to create connection profiles that your users can install to access remote networks.
Box 2: The Connection Manager Administration Kit (CMAK) is a tool that you can use to customize the remote connection experience for users on your network by creating predefined connections to remote servers and networks. To create and customize a connection for your users, you use the CMAK wizard.
Box 3: Distributing your completed connection profile
Running the CMAK wizard produces a connection profile that is stored in an executable file. Running that file on a client computer equips that computer with everything needed to establish the network connection that you designed.
Does this meet the goal?
Question 12
- (Topic 3)
You need to implement the technical requirements for the boston.litwareinc.com domain. Which tools should you use?
You need to implement the technical requirements for the boston.litwareinc.com domain. Which tools should you use?
Question 13
- (Topic 9)
Your network contains an Active Directory forest that has two domains named contoso.com and europe.contoso.com. The forest contains five servers. The servers are configured as shown in the following table.
You plan to manage the DHCP settings and the DNS settings centrally by using IP Address Management (IPAM).
You need to ensure that you can use IPAM to manage the DHCP and DNS settings in both domains. The solution must use the minimum amount of administrative effort.
What should you do?
Your network contains an Active Directory forest that has two domains named contoso.com and europe.contoso.com. The forest contains five servers. The servers are configured as shown in the following table.
You plan to manage the DHCP settings and the DNS settings centrally by using IP Address Management (IPAM).
You need to ensure that you can use IPAM to manage the DHCP and DNS settings in both domains. The solution must use the minimum amount of administrative effort.
What should you do?
Question 14
DRAG DROP - (Topic 9)
You have a file server named File1 that runs Windows Server 2012. File1 has five physical disks.
You plan to create a highly available network share named Share1.
You need to create Share1 on File1. The solution must ensure that Share1 is available if a single disk fails.
Which four actions should you perform?
Solution:
Create a parity virtual disk. Create a simple volume. Create and attach a VHD. Create a storage pool.
Does this meet the goal?
You have a file server named File1 that runs Windows Server 2012. File1 has five physical disks.
You plan to create a highly available network share named Share1.
You need to create Share1 on File1. The solution must ensure that Share1 is available if a single disk fails.
Which four actions should you perform?
Solution:
Create a parity virtual disk. Create a simple volume. Create and attach a VHD. Create a storage pool.
Does this meet the goal?
Question 15
- (Topic 9)
A new company registers the domain name of contoso.com. The company has a web presence on the Internet. All Internet resources have names that use a DNS suffix of contoso.com.
A third-party hosts the Internet resources and is responsible for managing the contoso.com DNS zone on the Internet. The zone contains several hundred records.
The company plans to deploy an Active Directory forest.
You need to recommend an Active Directory forest infrastructure to meet the following requirements:
✑ Ensure that users on the internal network can resolve the names of the company's Internet resources.
✑ Minimize the amount of administrative effort associated with the addition of new
Internet servers. What should you recommend?
A new company registers the domain name of contoso.com. The company has a web presence on the Internet. All Internet resources have names that use a DNS suffix of contoso.com.
A third-party hosts the Internet resources and is responsible for managing the contoso.com DNS zone on the Internet. The zone contains several hundred records.
The company plans to deploy an Active Directory forest.
You need to recommend an Active Directory forest infrastructure to meet the following requirements:
✑ Ensure that users on the internal network can resolve the names of the company's Internet resources.
✑ Minimize the amount of administrative effort associated with the addition of new
Internet servers. What should you recommend?
Question 16
- (Topic 9)
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest named contoso.com. The forest contains a Microsoft Exchange Server 2010 organization. All of the domain controllers in contoso.com run Windows Server 2012.
The perimeter network contains an Active Directory forest named litware.com.
You deploy Microsoft Forefront Unified Access Gateway (UAG) to litware.com. All of the domain controllers in litware.com run Windows Server 2012.
Some users connect from outside the network to use Outlook Web App.
You need to ensure that external users can authenticate by using client certificates. What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest named contoso.com. The forest contains a Microsoft Exchange Server 2010 organization. All of the domain controllers in contoso.com run Windows Server 2012.
The perimeter network contains an Active Directory forest named litware.com.
You deploy Microsoft Forefront Unified Access Gateway (UAG) to litware.com. All of the domain controllers in litware.com run Windows Server 2012.
Some users connect from outside the network to use Outlook Web App.
You need to ensure that external users can authenticate by using client certificates. What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
Question 17
- (Topic 9)
You have a server named Server1 that runs Windows Server 2012. You have a 3-TB database that will be moved to Server1.
Server1 has the following physical disks:
✑ Three 2-TB SATA disks that are attached to a single IDE controller
✑ One 1-TB SATA disk that is attached to a single IDE controller
You need to recommend a solution to ensure that the database can be moved to Server1. The solution must ensure that the database is available if a single disk fails.
What should you include in the recommendation?
You have a server named Server1 that runs Windows Server 2012. You have a 3-TB database that will be moved to Server1.
Server1 has the following physical disks:
✑ Three 2-TB SATA disks that are attached to a single IDE controller
✑ One 1-TB SATA disk that is attached to a single IDE controller
You need to recommend a solution to ensure that the database can be moved to Server1. The solution must ensure that the database is available if a single disk fails.
What should you include in the recommendation?
Question 18
- (Topic 9)
You have a Windows Server 2012 R2 failover cluster that contains four nodes. The cluster has Dynamic Optimization enabled. You deploy three highly available virtual machines to the cluster by using System Center 2012 R2 Virtual Machine Manager (VMM).
You need to prevent Dynamic Optimization from placing any of the three virtual machines in the same node.
What should you do?
You have a Windows Server 2012 R2 failover cluster that contains four nodes. The cluster has Dynamic Optimization enabled. You deploy three highly available virtual machines to the cluster by using System Center 2012 R2 Virtual Machine Manager (VMM).
You need to prevent Dynamic Optimization from placing any of the three virtual machines in the same node.
What should you do?
Question 19
- (Topic 9)
You have an IP address Management (IPAM) server that runs Windows Server 2012 SP1. You need to integrate the IPAM server with System center Virtual Machine Manager (SCVMM)
Solution: You add the IPAM server in SCVMM and specify the IPAM_svc user account as the RunAs account.
Does this meet the goal?
You have an IP address Management (IPAM) server that runs Windows Server 2012 SP1. You need to integrate the IPAM server with System center Virtual Machine Manager (SCVMM)
Solution: You add the IPAM server in SCVMM and specify the IPAM_svc user account as the RunAs account.
Does this meet the goal?
Question 20
HOTSPOT - (Topic 4)
You need to recommend a solution for communicating to Windows Azure services.
What should you recommend? To answer, select the appropriate options in the answer area.
Solution:
Does this meet the goal?
You need to recommend a solution for communicating to Windows Azure services.
What should you recommend? To answer, select the appropriate options in the answer area.
Solution:
Does this meet the goal?
Question 21
- (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains several domain controllers. The domain controllers run either Windows Server 2012 or Windows Server 2008 R2.
The domain functional level is Windows Server 2008 R2. The forest functional level is Windows Server 2008.
The corporate compliance policy states that all items deleted from Active Directory must be recoverable from a Recycle Bin.
You need to recommend changes to the current environment to meet the compliance policy.
Which changes should you recommend? (Each correct answer presents part of the solution. Choose all that apply.)
Your network contains an Active Directory domain named contoso.com. The domain contains several domain controllers. The domain controllers run either Windows Server 2012 or Windows Server 2008 R2.
The domain functional level is Windows Server 2008 R2. The forest functional level is Windows Server 2008.
The corporate compliance policy states that all items deleted from Active Directory must be recoverable from a Recycle Bin.
You need to recommend changes to the current environment to meet the compliance policy.
Which changes should you recommend? (Each correct answer presents part of the solution. Choose all that apply.)
Question 22
- (Topic 9)
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the DHCP Server server role installed.
All of the client computers that are in a subnet named Subnet1 receive their IP address configurations from Server1.
You plan to add another DHCP server named Server2 to Subnet1.
You need to recommend changes to the DHCP infrastructure to ensure that the client computers continue to receive IP addressing information if a single DHCP server fails.
What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the DHCP Server server role installed.
All of the client computers that are in a subnet named Subnet1 receive their IP address configurations from Server1.
You plan to add another DHCP server named Server2 to Subnet1.
You need to recommend changes to the DHCP infrastructure to ensure that the client computers continue to receive IP addressing information if a single DHCP server fails.
What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
Question 23
- (Topic 5)
You need to plan the expansion of the Los Angeles office. What should you do?
You need to plan the expansion of the Los Angeles office. What should you do?
Question 24
- (Topic 9)
Your company has a main office and a branch office. The main office contains 2,500 users. The branch office contains 1200 users. Each office contains two IP subnets.
The company plans to deploy an Active Directory forest.
You need to recommend an Active Directory infrastructure to meet the following requirements:
✑ Ensure that the users are authenticated by using a domain controller in their respective office.
✑ Minimize the amount of Active Directory replication traffic between the offices.
Which Active Directory infrastructure should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
Your company has a main office and a branch office. The main office contains 2,500 users. The branch office contains 1200 users. Each office contains two IP subnets.
The company plans to deploy an Active Directory forest.
You need to recommend an Active Directory infrastructure to meet the following requirements:
✑ Ensure that the users are authenticated by using a domain controller in their respective office.
✑ Minimize the amount of Active Directory replication traffic between the offices.
Which Active Directory infrastructure should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
Question 25
- (Topic 9)
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The network contains a System Center 2012 R2 Data Protection Manager (DPM) deployment.
The domain contains six servers. The servers are configured as shown in the following table.
You install System Center 2012 R2 Virtual Machine Manager (VMM) on the nodes in Cluster2.
You configure VMM to use a database in Cluster1. Server5 is the first node in the cluster. You need to back up the VMM encryption key.
What should you back up?
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The network contains a System Center 2012 R2 Data Protection Manager (DPM) deployment.
The domain contains six servers. The servers are configured as shown in the following table.
You install System Center 2012 R2 Virtual Machine Manager (VMM) on the nodes in Cluster2.
You configure VMM to use a database in Cluster1. Server5 is the first node in the cluster. You need to back up the VMM encryption key.
What should you back up?
Question 26
DRAG DROP - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2008. Server1 is configured as an enterprise certification authority (CA).
You back up all of the data on Server1, and then export the private and public keys of the CA.
You plan to replace Server1 with a new member server that was purchased recently. You need to identify which actions must be performed on the new server to restore the
certificate services of Server1.
Which three actions should you identify?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Solution:
Box 1: We will need the Active Directory Certificate Services role to import the key, and later restore the certificate services database.
Box 2: Import the private key with the help of the AD CS Configuration Wizard.
The private key will be needed in the next step when you restore the certificate services registry settings and the certificate services database.
Box 3: Restore the certificate services registry settings and the certificate services database-
Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2008. Server1 is configured as an enterprise certification authority (CA).
You back up all of the data on Server1, and then export the private and public keys of the CA.
You plan to replace Server1 with a new member server that was purchased recently. You need to identify which actions must be performed on the new server to restore the
certificate services of Server1.
Which three actions should you identify?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Solution:
Box 1: We will need the Active Directory Certificate Services role to import the key, and later restore the certificate services database.
Box 2: Import the private key with the help of the AD CS Configuration Wizard.
The private key will be needed in the next step when you restore the certificate services registry settings and the certificate services database.
Box 3: Restore the certificate services registry settings and the certificate services database-
Does this meet the goal?
Question 27
HOTSPOT - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains a Network Load Balancing (NLB) cluster named Cluster1 that contains four nodes. Cluster1 hosts a web application named App1. The session state information of App1 is stored in a Microsoft SQL Server 2012 database.
The network contains four subnets.
You discover that all of the users from a subnet named Subnet1 always connect to the same NLB node.
You need to ensure that all of the users from each of the subnets connect equally across all of the nodes in Cluster1.
What should you modify from the port settings?
To answer, select the appropriate setting in the answer area.
Solution:
Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The domain contains a Network Load Balancing (NLB) cluster named Cluster1 that contains four nodes. Cluster1 hosts a web application named App1. The session state information of App1 is stored in a Microsoft SQL Server 2012 database.
The network contains four subnets.
You discover that all of the users from a subnet named Subnet1 always connect to the same NLB node.
You need to ensure that all of the users from each of the subnets connect equally across all of the nodes in Cluster1.
What should you modify from the port settings?
To answer, select the appropriate setting in the answer area.
Solution:
Does this meet the goal?
Question 28
- (Topic 9)
Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are part of a host group named Group1 in Microsoft System Center 2012 Virtual Machine Manager (VMM).
Server1 and Server2 have identical hardware, software, and settings.
You configure VMM to migrate virtual machines if the CPU utilization on a host exceeds 65 percent. The current load on the servers is shown following table.
You start a new virtual machine on Server2 named VM8. VM8 has a CPU utilization of 20 percent.
You discover that none of the virtual machines hosted on Server2 are migrated to Server1. You need to ensure that the virtual machines hosted on Server2 are migrated to Server1. What should you modify from the Dynamic Optimization configuration?
Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are part of a host group named Group1 in Microsoft System Center 2012 Virtual Machine Manager (VMM).
Server1 and Server2 have identical hardware, software, and settings.
You configure VMM to migrate virtual machines if the CPU utilization on a host exceeds 65 percent. The current load on the servers is shown following table.
You start a new virtual machine on Server2 named VM8. VM8 has a CPU utilization of 20 percent.
You discover that none of the virtual machines hosted on Server2 are migrated to Server1. You need to ensure that the virtual machines hosted on Server2 are migrated to Server1. What should you modify from the Dynamic Optimization configuration?
Question 29
- (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
All client computers run either Windows 7 or Windows 8.
The corporate security policy states that all of the client computers must have the latest security updates installed.
You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.
Which Network Access Protection (NAP) enforcement method should you implement?
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
All client computers run either Windows 7 or Windows 8.
The corporate security policy states that all of the client computers must have the latest security updates installed.
You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.
Which Network Access Protection (NAP) enforcement method should you implement?