Microsoft 70-413 Designing and Implementing a Server Infrastructure Exam Practice Test

Page: 1 / 14
Total 262 questions
Question 1

You have a System Center 2012 R2 Virtual Machine Manager (VMM) infrastructure that manages five Hyper-V hosts. The Hyper-V hosts are not clustered.

You have a virtual machine template that deploys a base image of Windows Server 2012 R2. No role services or features are enabled in the base image.

You need to deploy a virtual machine named VM1 that is based on the virtual machine template.

VM1 will be deployed as part of a service. VM1 must have the Web Server (IIS) server role installed. The solution must not require modifications to the virtual machine template or the base image.

What are two possible profile types that achieve the goal? Each correct answer presents a complete solution.



Answer : B, C

B: You can only use an application profile when you deploy a virtual machine as part of a service. In this case it would be as part of the IIS service.

C:Guest OS profile

When you define a new Guest OS Profile you specify which Roles and features, such as IIS, which should be included in the profile.

If machines based on this Guest OS Profile are going to need certain .NET framework versions installed, or have IIS installed, I can

Note: In a virtual environment, a guest operating system is the operating system that runs on a virtual machine, in contrast to the host operating system that runs on the physical host computer on which one or more virtual machines are deployed. In Virtual Machine Manager, a guest operating system profile is a collection of operating system settings that can be imported into a virtual machine template to provide a consistent operating system configuration for virtual machines created from that template.

Incorrect:

Not A: Capability profiles are for managing the hypervisors.


https://technet.microsoft.com/en-us/library/hh427291.aspx

https://technet.microsoft.com/en-us/library/bb740889.aspx

Question 2

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.

You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.

Solution: From Operations Manager, you create a Distributed Application and a Monitor Override.

Does this meet the goal?



Answer : B


Question 3

Your company plans to hire 100 sales representatives who will work remotely.

Each sales representative will be given a laptop that will run Windows 7. A corporate image of Windows 7 will be applied to each laptop.

While the laptops are connected to the corporate network, they will be joined to the domain. The sales representatives will not be local administrators.

Once the laptops are configured, each laptop will be shipped by courier to a sales representative.

The sales representative will use a VPN connection to connect to the corporate network.

You need to recommend a solution to deploy the VPN settings for the sales representatives. The solution must meet the following requirements:

Ensure that the VPN settings are the same for every sales representative.

Ensure that when a user connects to the VPN, an application named App1 starts.

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.



Answer : C

We can use CMAK to create a connection that starts the Application App1 when the connectioin is established. The latter is achieved through the configuring CMAK ''Post-Connect'' custom action.

Note : Connection Manager is a client network connection tool that allows a user to connect to a remote network, such as an Internet service provider (ISP), or a corporate network protected by a virtual private network (VPN) server.

The Connection Manager Administration Kit (CMAK) is a tool that you can use to customize the remote connection experience for users on your network by creating predefined connections to remote servers and networks. To create and customize a connection for your users, you use the CMAK wizard.

Incorrect:

Not B: The Add-VpnConnection cmdlet would be able to establish a connection, but it could not start the App1 application.


https://technet.microsoft.com/en-us/library/cc752995.aspx

Question 4

You need to recommend a solution for DHCP logging. The solution must meet the technical requirement.

What should you include in the recommendation?



Answer : B

* Scenario: A central log of the IP address leases and the users associated to those leases must be created.

* Feature description

IPAM in Windows Server 2012 is a new built-in framework for discovering, monitoring, auditing, and managing the IP address space used on a corporate network. IPAM provides for administration and monitoring of servers running Dynamic Host Configuration Protocol (DHCP) and Domain Name Service (DNS). IPAM includes components for:

* Automatic IP address infrastructure discover)': IPAM discovers domain controllers, DHCP servers, and DNS servers in the domains you choose. You can enable or disable management of these servers by IPAM.

* Custom IP address space display, reporting, and management: The display of IP addresses is highly customizable and detailed tracking and utilization data is available. IPv4 and IPv6 address space is organized into IP address blocks, IP address ranges, and individual IP addresses. IP addresses are assigned built-in or user-defined fields that can be used to further organize IP address space into hierarchical, logical groups.

* Audit of server configuration changes and tracking of IP address usage: Operational events are displayed for the IPAM server and managed DHCP servers. IPAM also enables IP address tracking using DHCP lease events and user logon events collected from Network Policy Server (NPS), domain controllers, and DHCP servers. Tracking is available by IP address, client ID, host name, or user name.

* Monitoring and management of DHCP and DNS services: IPAM enables automated service availability monitoring for Microsoft DHCP and DNS servers across the forest. DNS zone health is displayed, and detailed DHCP server and scope management is available using the IPAM console.


Question 5

You need to recommend a server deployment strategy for the main office that meets the server deployment requirements.

What should you recommend installing in the main office?



Answer : A

WDS is a server role that enables you to remotely deploy Windows operating systems. You can use it to set up new computers by using a network-based installation. This means that you do not have to install each operating system directly from a CD, USB drive, or DVD.


Question 6

You need to recommend a trust model.

What should you include in the recommendation?



Answer : A

As users in the Montreal office is in a separate site, and they need access to only to some of the resources, the File01 file server in New York and the File02 file server in Chicago, we should use a one-way forest trust with selective authentication.

* When you enable the selective authentication feature of a forest trust relationship, users accessing cross-forest resources from one forest cannot authenticate to a domain controller or resource server (e.g., file server, print server) in the other forest unless they are explicitly allowed to do so. Selective authentication lessens the attack surface by restricting the quantity of authentication requests that can pass through an interforest trust.

* From case study:

/ The Montreal site will have its own forest named montreal.proseware.com.

/ Users in the Montreal office must only be allowed to access shares that are located on File01 and File02. The Montreal users must be prevented from accessing any other servers in the proseware.com forest regardless of the permissions on the resources.


Question 7

You are evaluating the implementation of data deduplication on the planned Windows Server 2012 file servers.

The planned servers will have the identical disk configurations as the current servers.

You need to identify which volumes can be enabled for data deduplication.

Which volumes should you identify? (Each correct answer presents part of the solution. Choose all that apply.)



Answer : C, E

* Scenario:

A mounted virtual hard disk (VHD) named DATA that is formatted NTFS

A simple volume named E that is formatted NTFS

* Note: Data Deduplication feature doesn't do everything in this version. It is only available in certain Windows Server 2012 editions and has some limitations. Deduplication was built for NTFS data volumes and it does not support boot or system drives and cannot be used with

Cluster Shared Volumes (CSV). We don't support deduplicating live VMs or running SQL databases. See how to determine which volumes are candidates for deduplication on Technet.

Incorrect:

Not A: Volume C is a boot volume. Data deduplication does not work on boot volumes.

Not B: Volume B is FAT32 volume. Data deduplication requires NTFS.

Not D: Deduplication cannot be used with CSV.


Page:    1 / 14   
Total 262 questions