Latest 70-414: Actualtests real braindumps from 33 to 48

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-414 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-414-dumps.html


70-414 Product Description:
Exam Number/Code: 70-414 vce
Exam name: Implementing an Advanced Server Infrastructure
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: Microsoft 70-414 Implementing an Advanced Server Infrastructure

70-414 examcollection

Question No. 33

DRAG DROP - (Topic 8) 

You need to configure the environment to support App1. 

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



Question No. 34

- (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains four servers on a test network. The servers are configured as shown in the following table. 


Server1 uses the storage shown in the following table. 


You perform the following tasks: 

On Server2, you create an advanced SMB share named Share2A and an 

applications SMB share named Share2B. 

On Server3, you create an advanced SMB share named Share3. 

On Server4, you create an applications SMB share named Share4. 

You add Server3 and Server4 to a new failover cluster named Clus1. 

On Clus1, you configure the File Server for general use role, you create a quick 

SMB share named Share5A, and then you create an applications SMB share 

named Share5B. 

You plan to create a failover cluster of two virtual machines hosted on Server1. The clustered virtual machines will use shared .vhdx files. 

You need to recommend a location to store the shared .vhdx files. 

Where should you recommend placing the virtual hard disk (VHD)? 

A. \\Server3\Share3 

B. \\Server2\Share2B 

C. \\Clus1\Share5B 

D. \\Server4\Share4 

Answer:


Question No. 35

DRAG DROP - (Topic 8) 

You are planning to set up a proof-of-concept network virtualization environment. 

The environment will contain three servers. The servers will be configured as shown in the following table. 


VMM will be used to manage the virtualization environment. 

Server2 runs three virtual machines. All of the virtual machines are configured to use 

network virtualization. 

You need to enable network connectivity between the virtual machines and Server3. 

Which four actions should you perform in sequence? To answer, move the appropriate 

actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



Question No. 36

DRAG DROP - (Topic 5) 

You need to implement the network Unlock feature to meet the BitLocker requirements. 

In which order should you perform the actions? To answer, move all actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



Question No. 37

- (Topic 5) 

You need to design a solution that meets all of the software update requirements. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Implement System Center Service Manager. 

B. Deploy a configuration baseline to all devices. 

C. Implement System Center Operations Manager. 

D. Implement System Center Configuration Manager. 

Answer: B,C 


Question No. 38

- (Topic 8) 

Your network contains multiple servers that run Windows Server 2012. 

The network contains a Storage Area Network (SAN) that only supports Fibre Channel connections. 

You have two failover clusters. The failover clusters are configured as shown in the following table. 


Only the members of Cluster1 can connect to the SAN. 

You plan to implement 15 highly available virtual machines on Cluster2. All of the virtual machines will be stored in a single shared folder. 

You need to ensure that the VHD files of the virtual machines can be stored on the SAN. 

What should you do? (Each correct answer presents a complete solution. Choose all that apply.) 

A. From a node in Cluster2, create a Virtual Fibre Channel SAN. 

B. From a node in Cluster1, create a Virtual Fibre Channel SAN. 

C. From Cluster1, add the iSCSI Target Server cluster role. 

D. From Cluster1, configure the clustered File Server role of the File Server for scale-out application data type. 

Answer: A,D 


Question No. 39

- (Topic 8) 

Your network contains five servers that run Windows Server 2012 R2. 

You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. 

You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. 

Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. 

You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. 

You need to ensure that the NLB feature can distribute connections across all of the virtual machines. 

Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Question No. 40

- (Topic 1) 

You are planning the delegation for the virtualization environment. The delegation must 

meet the virtualization requirements. 

Which user role profile should you select for Group2? 

A. Administrators 

B. Read-Only Administrator 

C. Self-Service User 

D. Delegated Administrator 

Answer:


Question No. 41

- (Topic 8) 

You have a System Center 2012 R2 Configuration Manager deployment. 

All users have client computers that run Windows 8.1. The users log on to their client computer as standard users. 

An application named App1 is deployed to the client computers by using System Center. 

You need to recommend a solution to validate a registry key used by App1. If the registry key has an incorrect value, the value must be changed. The registry key must be validated every day. The solution must generate a report on non-compliant computers. 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. Group Policy preferences 

B. A desired configuration baseline 

C. The Windows PowerShell Desired State Configuration (DSC) feature 

D. The Microsoft Baseline Security Analyzer (MBSA) 

Answer:


Question No. 42

- (Topic 7) 

Your network contains an Active Directory domain named contoso.com. The network contains two servers named Server1 and Server2. 

You deploy Active Directory Certificate Services (AD CS). The certification authority (CA) is configured as shown in the exhibit. (Click the Exhibit button). 


You need to ensure that you can issue certificates based on certificate templates. 

What should you do? 

A. Configure Server2 as a standalone subordinate CA. 

B. On Server1, install the Network Device Enrollment service role service. 

C. Configure Server2 as an enterprise subordinate CA. 

D. On Server1, run the Add-CATemplate cmdlet. 

Answer:

Explanation: The Add-CATemplate cmdlet adds a certificate template to the CA for issuing. Certificate templates allow for the customization of a certificate that can be issued by the CA. Example: Adds a CA template with the template display name Basic EFS and the template name EFS. Windows PowerShell C:\PS>Add-CATemplate -Name EFS 


Question No. 43

DRAG DROP - (Topic 7) 

You need to delegate permissions for DETCA01. 

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



Question No. 44

- (Topic 8) 

Your network contains an Active Directory domain named contoso.com. 

You currently have an intranet web site that is hosted by two Web servers named Web1 and Web2. Web1 and Web2 run Windows Server 2012. 

Users use the name intranet.contoso.com to request the web site and use DNS round robin. 

You plan to implement the Network Load Balancing (NLB) feature on Web1 and Web2. 

You need to recommend changes to the DNS records for the planned implementation. 

What should you recommend? 

A. Create a service locator (SRV) record. Map the SRV record to Intranet. 

B. Delete both host (A) records named Intranet. Create a pointer (PTR) record for each Web server. 

C. Remove both host (A) records named Intranet. Create a new host (A) record named Intranet. 

D. Delete both host (A) records named Intranet. Create two new alias (CNAME) records named Intranet. Map each CNAME record to a Web server name. 

Answer:


Question No. 45

- (Topic 8) 

You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1. You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases. 

Solution: You set the memory-weight threshold value to High for each business-critical VM, Does this meet the goal? 

A. Yes 

B. No 

Answer:


Question No. 46

- (Topic 4) 

You need to recommend which Certificate Services role service must be deployed to the perimeter network. The solution must meet the security requirements. 

Which Certificate Services role services should you recommend? 

A. Online Responder and Network Device Enrollment Service 

B. Online Responder and Certificate Enrollment Web Service 

C. Certificate Enrollment Web Service and Certificate Enrollment Policy Web Service 

D. Certificate Enrollment Policy Web Service and Certification Authority Web Enrollment 

Answer:


Question No. 47

- (Topic 8) 

An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled. 

Solution: You add the backup service account to the SuperUsers group and back up the protected content. Then, you restore the content to a file server and apply the required NTFS permissions to the files. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Question No. 48

HOTSPOT - (Topic 3) 

You need to recommend changes to allow Customer1 to delegate permissions in its hosting environment to its users. 

Where should you recommend performing each task? To answer, select the appropriate location for each task in the answer area. 



Answer: