Designing And Implementing A Server Infrastructure 70-413 Study Guides

We provide microsoft 70 413 which are the best for clearing 70-413 test, and to get certified by Microsoft Designing and Implementing a Server Infrastructure. The microsoft 70 413 covers all the knowledge points of the real 70-413 exam. Crack your Microsoft 70-413 Exam with latest dumps, guaranteed!

Online Microsoft 70-413 free dumps demo Below:

Page: 1 / 21
Total 262 questions Full Exam Access
Question 1
- (Topic 9)
You have a virtual machine (VM) named VM-APP1 that hosts critical application named APP1. The VM has the following VHDX virtual disks:
70-413 dumps exhibit
Both VHDX virtual disks are located on LUN1 of a Storage Area Network.
Every time you perform Storage Live Migration for VM-APP1, it takes a few hours.
You need to ensure that the storage supports Offloaded Data Transfer (ODX), and that ODX is enabled.
Which two Windows PowerShell commands should you run? Each correct answer presents part of the solution.
My answer: -
Reference answer: AC
Reference analysis:

C: To use ODX, validate all the file system filter drivers on all servers that are hosting the storage support ODX.
To validate the opt-in status of file system filter drivers, use the type the following command for each filter driver:
Get-ItemProperty hklm:\\system\\currentcontrolset\\services\\

Question 2
- (Topic 7)
You have an IP Address Management (IPAM) server that runs Windows Server 2012 SP1. You need to integrate the IPAM server with System Center Virtual Machine Manager (SCVMM).
Solution: You create a dedicated user account named IPAM_svc, and add it to the Local Administrators local group on the SO/MM server.
Does this meet the goal?
My answer: -
Reference answer: B
Reference analysis:

Reference: How to integrate IPAM with SCVMM 2012 R2

Question 3
- (Topic 3)
You need to recommend changes to the Active Directory site topology to support on the company's planned changes.
What should you include in the recommendation?
My answer: -
Reference answer: D
Reference analysis:

From the Planned Changes section of the scenario we find that a migration to IPv6 addressing in the Los Angeles office will happen.
A new subnet would be needed to implement this change.
Incorrect:
Not A: A new branch office will open in Chicago, and this would require a new site. However, this change is classified as Security Requirements, not as Planned Changes.
Reference: Understanding Sites, Subnets, and Site Links http://technet.microsoft.com/en-us/library/cc754697.aspx

Question 4
DRAG DROP - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains an IP Address Management (IPAM) server.
You plan to delegate the administration of IPAM as shown in the following table.
70-413 dumps exhibit
You need to recommend which IPAM security group must be used for each department. The solution must minimize the number of permissions assigned to each group.
What should you recommend?
To answer, drag the appropriate group to the correct department in the answer area. Each group may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
70-413 dumps exhibit
Solution:
Box 1:
70-413 dumps exhibit
Box 2:
70-413 dumps exhibit
Box 3:
70-413 dumps exhibit
* IPAM IP Audit Administrators: Members of this group have IPAM Users privileges and can perform IPAM common management tasks and can view IP address tracking information.
* IPAM Users: Members of this group can view all information in server discovery, IP address space, and server management. They can view IPAM and DHCP server operational events, but cannot view IP address tracking information.
* IPAM ASM Administrators: IPAM address space management (ASM) administrators have IPAM Users privileges and can perform IPAM common management tasks and IP address space tasks.

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 5
- (Topic 9)
Your network contains an Active Directory forest named contoso.com. The forest contains one domain.
Your company plans to open a new division named Division1. A group named Division1Admins will administer users and groups for Division1.
You identify the following requirements for Division1:
✑ All Division1 users must have a complex password that is 14 characters.
✑ Division1Admins must be able to manage the user accounts for Division1.
✑ Division1Admins must be able to create groups, and then delete the groups that they create.
✑ Division1Admins must be able to reset user passwords and force a password change at the next logon for all Division1 users.
You need to recommend changes to the forest to support the Division1 requirements.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
My answer: -
Reference answer: A
Reference analysis:

None

Question 6
- (Topic 9)
Your network contains an Active Directory domain named contoso.com. All client computers run either Windows 7 or Windows 8.
Some users work from customer locations, hotels, and remote sites. The remote sites often have firewalls that limit connectivity to the Internet.
You need to recommend a VPN solution for the users. Which protocol should you include in the recommendation?
My answer: -
Reference answer: B
Reference analysis:

Secure Socket Tunneling Protocol (SSTP) is a form of VPN tunnel that provides a mechanism to transport PPP or L2TP traffic through an SSL 3.0 channel. SSL
provides transport-level security with key-negotiation, encryption and traffic integrity checking. The use of SSL over TCP port 443 allows SSTP to pass through virtually all firewalls and proxy servers except for authenticated web proxies.
Reference: https://en.wikipedia.org/wiki/Secure_Socket_Tunneling_Protocol

Question 7
- (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
70-413 dumps exhibit
All client computers run either Windows 7 or Windows 8.
The corporate security policy states that all of the client computers must have the latest security updates installed.
You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.
Solution: You implement the DHCP Network Access Protection (NAP) enforcement method.
Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

Implementing DHCP NAP to Enforce WSUS Updates

Question 8
- (Topic 9)
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2.
Does this meet the goal?
My answer: -
Reference answer: B
Reference analysis:

None

Question 9
HOTSPOT - (Topic 4)
On Server2, you create a Run As Account named Account1. Account1 is associated to an Active Directory account named VMMIPAM.
You need to implement an IPAM solution.
What should you do? To answer, select the appropriate configuration for each server in the answer area.
70-413 dumps exhibit
70-413 dumps exhibit
Solution:
Box 1: Add a network service
On the VMM server use the Add Network Service Wizard to setup a service, which runs with the newly created VMMIPAM account, and which connects to IPAM server on Server3. Box 2:
On the IPAM server add the new VMMIPAM account to the IPAM ASM Administrators and to the Remote Management Users groups. This ensures that the Network Service which is run with the VMMIPAM account has the required permissions to access the IPAM server.
Scenario:
Server2 is running System Center 2012 R2 Virtual Machine Manager (VMM) server. Server3 is running IPAM server.

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 10
HOTSPOT - (Topic 9)
You plan to implement a virtualization solution to host 10 virtual machines. All of the virtual machines will be hosted on servers that run Windows Server 2012.
You need to identify which servers must be deployed for the planned virtualization solution. The solution must meet the following requirements:
• Minimize the number of servers.
• Ensure that live migration can be used between the hosts.
Which servers should you identify?
To answer, select the appropriate servers in the answer area.
70-413 dumps exhibit
Solution:
Just two server with Hyper-V installed is enough to perform a Live Migration. (Minimize the number of servers)

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 11
DRAG DROP - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 resides in the perimeter network and has the Remote Access server role installed.
Some users have laptop computers that run Windows 7 and are joined to the domain. Some users work from home by using their home computers. The home computers run either Windows XP, Windows Vista/ Windows 7, or Windows 8.
You need to configure the computers for remote access. Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
70-413 dumps exhibit
Solution:
Box 1: Installing CMAK
CMAK is an optional component that is not installed by default. You must install CMAK to create connection profiles that your users can install to access remote networks.
Box 2: The Connection Manager Administration Kit (CMAK) is a tool that you can use to customize the remote connection experience for users on your network by creating predefined connections to remote servers and networks. To create and customize a connection for your users, you use the CMAK wizard.
Box 3: Distributing your completed connection profile
Running the CMAK wizard produces a connection profile that is stored in an executable file. Running that file on a client computer equips that computer with everything needed to establish the network connection that you designed.

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 12
- (Topic 3)
You need to implement the technical requirements for the boston.litwareinc.com domain. Which tools should you use?
My answer: -
Reference answer: B
Reference analysis:

* Scenario, technical requirements include:
Minimize the amount of administrative effort whenever possible Rename boston.litwareinc.com domain to bos.litwareinc.com
* Rendom.exe is a command-line tool that is used to rename Active Directory domains.
Gpfixup fixes domain name dependencies in Group Policy Objects and Group Policy links after a domain rename operation.
Reference: Rendom
http://technet.microsoft.com/en-us/library/cc732097(v=ws.10).aspx
Reference: Gpfixup
https://technet.microsoft.com/en-us/library/hh852336.aspx

Question 13
- (Topic 9)
Your network contains an Active Directory forest that has two domains named contoso.com and europe.contoso.com. The forest contains five servers. The servers are configured as shown in the following table.
70-413 dumps exhibit
You plan to manage the DHCP settings and the DNS settings centrally by using IP Address Management (IPAM).
You need to ensure that you can use IPAM to manage the DHCP and DNS settings in both domains. The solution must use the minimum amount of administrative effort.
What should you do?
My answer: -
Reference answer: B
Reference analysis:

* You can use IPAM to manage DHCP servers running on Windows Server 2008 R2 and above. Here DCE1 and DCE2 are running Windows 2003, so they need to be upgraded to Windows Server 2008 R2 or above.
* Invoke-IpamGpoProvisioning
Creates and links group policies in the specified domain for provisioning required access settings on the servers managed by the computer running the IP Address Management (IPAM) server.
Incorrect:
Not C: DC1 and DC2 do not need to be upgraded as IPAM can manage DHCP servers running on Windows Server 2008 R2 and above.
Not A, Not D: Set-IpamConfiguration
Sets the configuration for the computer running the IP Address Management (IPAM) server, including the TCP port number over which the computer running the IPAM Remote Server Administration Tools (RSAT) client connects with the computer running the IPAM server.
Reference: IPAM managed DHCP server requirements http://windowsitpro.com/windows-server-2003-end-support/ipam-managed-dhcp-server-
requirements
Upgrade the Windows 2003 Servers.

Question 14
DRAG DROP - (Topic 9)
You have a file server named File1 that runs Windows Server 2012. File1 has five physical disks.
You plan to create a highly available network share named Share1.
You need to create Share1 on File1. The solution must ensure that Share1 is available if a single disk fails.
Which four actions should you perform?
70-413 dumps exhibit
Solution:
Create a parity virtual disk. Create a simple volume. Create and attach a VHD. Create a storage pool.

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 15
- (Topic 9)
A new company registers the domain name of contoso.com. The company has a web presence on the Internet. All Internet resources have names that use a DNS suffix of contoso.com.
A third-party hosts the Internet resources and is responsible for managing the contoso.com DNS zone on the Internet. The zone contains several hundred records.
The company plans to deploy an Active Directory forest.
You need to recommend an Active Directory forest infrastructure to meet the following requirements:
✑ Ensure that users on the internal network can resolve the names of the company's Internet resources.
✑ Minimize the amount of administrative effort associated with the addition of new
Internet servers. What should you recommend?
My answer: -
Reference answer: C
Reference analysis:

Rules for Selecting a Prefix for a Registered DNS Name Select a prefix that is not likely to become outdated.
Avoid names such as a business line or operating system that might change in the future. Generic names such as corp or ds are recommended.
Incorrect:
not A, not B: Using single label names or unregistered suffixes, such as .local, is not recommended.
Reference: Selecting the Forest Root Domain https://technet.microsoft.com/en-us/library/cc726016(v=ws.10).aspx

Question 16
- (Topic 9)
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest named contoso.com. The forest contains a Microsoft Exchange Server 2010 organization. All of the domain controllers in contoso.com run Windows Server 2012.
The perimeter network contains an Active Directory forest named litware.com.
You deploy Microsoft Forefront Unified Access Gateway (UAG) to litware.com. All of the domain controllers in litware.com run Windows Server 2012.
Some users connect from outside the network to use Outlook Web App.
You need to ensure that external users can authenticate by using client certificates. What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
My answer: -
Reference answer: D
Reference analysis:

Forefront TMG provides support for Kerberos constrained delegation (often abbreviated as KCD) to enable published Web servers to authenticate users by Kerberos afterForefront TMG verifies their identity by using a non-Kerberos authentication method. When used in this way, Kerberos constrained delegation eliminates the need for requiring
users to provide credentials twice.
Reference: About Kerberos constrained delegation https://technet.microsoft.com/en-us/library/cc995228.aspx

Question 17
- (Topic 9)
You have a server named Server1 that runs Windows Server 2012. You have a 3-TB database that will be moved to Server1.
Server1 has the following physical disks:
✑ Three 2-TB SATA disks that are attached to a single IDE controller
✑ One 1-TB SATA disk that is attached to a single IDE controller
You need to recommend a solution to ensure that the database can be moved to Server1. The solution must ensure that the database is available if a single disk fails.
What should you include in the recommendation?
My answer: -
Reference answer: D
Reference analysis:

A parity virtual disk is similar to a hardware Redundant Array of Inexpensive Disks (RAID5). Data, along with parity information, is striped across multiple physical disks. Parity enables Storage Spaces to continue to service read and write requests even when a drive has failed. A minimum of three physical disks is required for a parity virtual disk. Note that a parity disk cannot be used in a failover cluster.
Reference: https://winsvr.wordpress.com/2013/01/22/storage-space-virtual-disk/

Question 18
- (Topic 9)
You have a Windows Server 2012 R2 failover cluster that contains four nodes. The cluster has Dynamic Optimization enabled. You deploy three highly available virtual machines to the cluster by using System Center 2012 R2 Virtual Machine Manager (VMM).
You need to prevent Dynamic Optimization from placing any of the three virtual machines in the same node.
What should you do?
My answer: -
Reference answer: D
Reference analysis:

None

Question 19
- (Topic 9)
You have an IP address Management (IPAM) server that runs Windows Server 2012 SP1. You need to integrate the IPAM server with System center Virtual Machine Manager (SCVMM)
Solution: You add the IPAM server in SCVMM and specify the IPAM_svc user account as the RunAs account.
Does this meet the goal?
My answer: -
Reference answer: B
Reference analysis:

None

Question 20
HOTSPOT - (Topic 4)
You need to recommend a solution for communicating to Windows Azure services.
What should you recommend? To answer, select the appropriate options in the answer area.
70-413 dumps exhibit
70-413 dumps exhibit
Solution:
70-413 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 21
- (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains several domain controllers. The domain controllers run either Windows Server 2012 or Windows Server 2008 R2.
The domain functional level is Windows Server 2008 R2. The forest functional level is Windows Server 2008.
The corporate compliance policy states that all items deleted from Active Directory must be recoverable from a Recycle Bin.
You need to recommend changes to the current environment to meet the compliance policy.
Which changes should you recommend? (Each correct answer presents part of the solution. Choose all that apply.)
My answer: -
Reference answer: AB
Reference analysis:

You can enable Active Directory Recycle Bin only if the forest functional level of your environment is set to Windows Server 2008 R2.
B: Enabling Active Directory Recycle Bin
After the forest functional level of your environment is set to Windows Server 2008 R2, you can enable Active Directory Recycle Bin by using the following methods:
/ Enable-ADOptionalFeature Active Directory module cmdlet (This is the recommended method.)
/ Ldp.exe
Note: By default, Active Directory Recycle Bin in Windows Server 2008 R2 is disabled. Reference: Enable Active Directory Recycle Bin

Question 22
- (Topic 9)
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the DHCP Server server role installed.
All of the client computers that are in a subnet named Subnet1 receive their IP address configurations from Server1.
You plan to add another DHCP server named Server2 to Subnet1.
You need to recommend changes to the DHCP infrastructure to ensure that the client computers continue to receive IP addressing information if a single DHCP server fails.
What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
My answer: -
Reference answer: B
Reference analysis:

One of the great features in Windows Server 2012 R2 is the DHCP failover for Microsoft DHCP scopes. Failover is where the environment suffers an outage of a service which triggers the failover of that service function to a secondary server or site. The assumption for most failover configurations is that the primary server is completely unavailable.
\"70-413
Reference: Step-by-Step: Configure DHCP for Failover https://technet.microsoft.com/en-us/library/hh831385.aspx

Question 23
- (Topic 5)
You need to plan the expansion of the Los Angeles office. What should you do?
My answer: -
Reference answer: D
Reference analysis:

None

Question 24
- (Topic 9)
Your company has a main office and a branch office. The main office contains 2,500 users. The branch office contains 1200 users. Each office contains two IP subnets.
The company plans to deploy an Active Directory forest.
You need to recommend an Active Directory infrastructure to meet the following requirements:
✑ Ensure that the users are authenticated by using a domain controller in their respective office.
✑ Minimize the amount of Active Directory replication traffic between the offices.
Which Active Directory infrastructure should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
My answer: -
Reference answer: A
Reference analysis:

Reference: Active Directory Replication Traffic https://msdn.microsoft.com/en-us/library/bb742457.aspx

Question 25
- (Topic 9)
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The network contains a System Center 2012 R2 Data Protection Manager (DPM) deployment.
The domain contains six servers. The servers are configured as shown in the following table.
70-413 dumps exhibit
You install System Center 2012 R2 Virtual Machine Manager (VMM) on the nodes in Cluster2.
You configure VMM to use a database in Cluster1. Server5 is the first node in the cluster. You need to back up the VMM encryption key.
What should you back up?
My answer: -
Reference answer: A
Reference analysis:

None

Question 26
DRAG DROP - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2008. Server1 is configured as an enterprise certification authority (CA).
You back up all of the data on Server1, and then export the private and public keys of the CA.
You plan to replace Server1 with a new member server that was purchased recently. You need to identify which actions must be performed on the new server to restore the
certificate services of Server1.
Which three actions should you identify?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
70-413 dumps exhibit
Solution:
Box 1: We will need the Active Directory Certificate Services role to import the key, and later restore the certificate services database.
Box 2: Import the private key with the help of the AD CS Configuration Wizard.
The private key will be needed in the next step when you restore the certificate services registry settings and the certificate services database.
Box 3: Restore the certificate services registry settings and the certificate services database-

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 27
HOTSPOT - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains a Network Load Balancing (NLB) cluster named Cluster1 that contains four nodes. Cluster1 hosts a web application named App1. The session state information of App1 is stored in a Microsoft SQL Server 2012 database.
The network contains four subnets.
You discover that all of the users from a subnet named Subnet1 always connect to the same NLB node.
You need to ensure that all of the users from each of the subnets connect equally across all of the nodes in Cluster1.
What should you modify from the port settings?
To answer, select the appropriate setting in the answer area.
70-413 dumps exhibit
Solution:
70-413 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 28
- (Topic 9)
Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are part of a host group named Group1 in Microsoft System Center 2012 Virtual Machine Manager (VMM).
Server1 and Server2 have identical hardware, software, and settings.
You configure VMM to migrate virtual machines if the CPU utilization on a host exceeds 65 percent. The current load on the servers is shown following table.
70-413 dumps exhibit
You start a new virtual machine on Server2 named VM8. VM8 has a CPU utilization of 20 percent.
You discover that none of the virtual machines hosted on Server2 are migrated to Server1. You need to ensure that the virtual machines hosted on Server2 are migrated to Server1. What should you modify from the Dynamic Optimization configuration?
My answer: -
Reference answer: C
Reference analysis:

None

Question 29
- (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
70-413 dumps exhibit
All client computers run either Windows 7 or Windows 8.
The corporate security policy states that all of the client computers must have the latest security updates installed.
You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.
Which Network Access Protection (NAP) enforcement method should you implement?
My answer: -
Reference answer: D
Reference analysis:

The most common method of the list is 802.1x for a variety of reasons. First, the industry has been selling 802.1x network authentication for the last 10 years. 1x gained tremendous popularity as wireless networking became prevalent in the late 90\'s and early 2000\'s and
has been proven to be a viable solution to identifying assets and users on your network. For customers that have invested in 802.1x capable switches and access points, NAP can very easily be implemented to complement what is already in place. The Network Policy Server (NPS) role
Windows Server 2008 has been dramatically improved to make 802.1x policy creation much simpler to do.
Reference: Network Access Protection Using 802.1x VLAN’s or Port ACLs – Which is right for you?
http://blogs.technet.com/b/wincat/archive/2008/08/19/network-access-protection-using-802- 1x-vlan-s-or-port-acls-which-is-right-for-you.aspx

Page: 1 / 21
Total 262 questions Full Exam Access