[Free] 2018(May) EnsurePass Examcollection Microsoft 70-414 Dumps with VCE and PDF 121-130

Ensurepass.com : Ensure you pass the IT Exams
2018 May Microsoft Official New Released 70-414
100% Free Download! 100% Pass Guaranteed!

Implementing an Advanced Server Infrastructure

Question No: 121 – (Topic 8)

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

On Server1, an administrator creates a virtual machine named VM1. A user named User1 is the member of the local Administrators group on Server1. User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the Exhibit button.)

Ensurepass 2018 PDF and VCE

You need to ensure that User1 can modify the settings of VM1 by running the Set-Vm cmdlet.

What should you instruct User1 to do?

  1. Run Windows PowerShell with elevated privileges.

  2. Install the Integration Services on VM1.

  3. Modify the membership of the local Hyper-V Administrators group.

  4. Import the Hyper-V module.

Answer: A Explanation:

You can only use the PowerShell snap-in to modify the VM settings with the vm cmdlets when you are an Administrator.

Thus best practices dictate that User1 run the Powershell with elevated privileges. References: http://technet.microsoft.com/en-us/library/jj713439.aspx

Question No: 122 – (Topic 8)

Your company has 10,000 users located in 25 different sites.

All servers run Windows Server 2012. All client computers run either Windows 7 or Windows 8.

You need to recommend a solution to provide self-service password reset for all of the users.

What should you include in the recommendation?

  1. The Microsoft System Center 2012 Service Manager Self-Service Portal and Microsoft System Center 2012 Orchestrator runbooks

  2. Microsoft System Center 2012 Operations Manager management packs and Microsoft System Center 2012 Configuration Manager collections

  3. The Microsoft System Center 2012 Service Manager Self-Service Portal and Microsoft System Center 2012 Operation Manager management packs

  4. Microsoft System Center 2012 App Controller and Microsoft System Center 2012

Orchestrator runbooks

Answer: A

Question No: 123 – (Topic 8)

An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled.

Solution: You add the backup service account to the SuperUsers group and back up the protected content. Then, you restore the content to a file server and apply the required NTFS permissions to the files.

Does this meet the goal?

  1. Yes

  2. No

Answer: B

Question No: 124 – (Topic 8)

Your network contains two servers named Server1 and Server2 that run Windows Server 2012.

Server1 and Server2 are members of a failover cluster named Cluster1 and are connected to an iSCSI Storage Area Network (SAN).

You need to ensure that you can implement the clustered File Server role of the File Server for scale-out application data type for Cluster1.

What should you install?

  1. The iSCSI Target Server cluster role

  2. The Distributed Transaction Coordinator (DTC) cluster role

  3. The DFS Namespace Server cluster role

  4. A Cluster Shared Volume (CSV)

Answer: D

Reference: http://technet.microsoft.com/en-us/library/jj612868.aspx

Question No: 125 – (Topic 8)

Your network contains five servers that run Windows Server 2012 R2.

You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.

You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.

Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.

You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.

You need to ensure that the NLB feature can distribute connections across all of the virtual machines.

Solution: On each Hyper-V server, you create a new external virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new external virtual network switches.

Does this meet the goal?

  1. Yes

  2. No

Answer: B

Question No: 126 – (Topic 8)

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.

What should you do?

  1. From Configuration Manager, create a Collection and a Desired Configuration Management baseline.

  2. From Virtual Machine Manager (VMM), modify the properties of the service template.

  3. From Operations Manager, create a Distributed Application and a Monitor Override.

  4. From Operations Manager, create a Distributed Application and a Service Level Tracking object.

Answer: D

Reference: http://www.windowsitpro.com/article/system-center/dashboards-operations- manager-2012-141491

t8 q113-2

Reference: http://technet.microsoft.com/en-us/library/hh230719.aspx

Question No: 127 – (Topic 8)

You plan to allow users to run internal applications from outside the company’s network. You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed. You must secure on-premises resources by using multi-factor authentication (MFA). You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.

Solution: You install a local instance of MFA Server and connect it to your Microsoft Azure MFA provider. Then, you use the Workplace Join process to configure access for personal devices to the on-premises resources.

Does this meet the goal?

  1. Yes

  2. No

Answer: A

Reference: Setting up on-premises conditional access using Azure Active Directory Device Registration

https://azure.microsoft.com/en-gb/documentation/articles/active-directory-conditional- access-on-premises-setup/

Question No: 128 – (Topic 8)

You plan to allow users to run internal applications from outside the company’s network. You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed. You must secure on-premises resources by using multi-factor authentication (MFA). You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.

Solution: You install a local instance of the MFA Server. You connect the instance to the Microsoft Azure MFA provider and then you use Microsoft Intune to manage personal devices.

Does this meet the goal?

  1. Yes

  2. No

Answer: A

Question No: 129 – (Topic 8)

Your network contains an Active Directory domain named contoso.com. The domain contains 200 servers that run either Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2. The servers run the following enterprise applications:

->Microsoft Exchange Server 2013

->Microsoft SQL Server 2014

System Center 2012 R2 Operations Manager is deployed to the domain. Operations Manager monitors all of the servers in the domain. Audit Collection Services (ACS) is installed.

You need to recommend a monitoring strategy for the domain that meets the following requirements:

->A group of administrators must be notified when an error is written to the System log on the servers that run Exchange Server 2013.

->A group of administrators must be notified when a specific event is written to The

Application log on the servers that run SQL Server 2014.

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.

  1. From Operations Manager, enable audit collection.

  2. From Operations Manager, implement two monitors.

  3. From Computer Management, implement one event subscription.

  4. From Operations Manager, implement two rules.

Answer: D

Question No: 130 – (Topic 8)

An organization uses an Active Directory Rights Management Services (AD RMS) cluster

names RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled.

Solution: You run the following Windows PowerShell command:

Set-ItemProperty -Path lt;protected contentgt;:\ -Name IsDecommissioned -Value $true

-EnableDecommission Does this meet the goal?

  1. Yes

  2. No

Answer: B

100% Ensurepass Free Download!
Download Free Demo:70-414 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2018 EnsurePass 70-414 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply