• Recent Posts

  • AmazonExam

  • Braindumps

    Easy Pass Exams!
  • Testking

    Easy Pass Exams!
  • ExamCollection

    Easy Pass Exams!
  •  

    HOT 70-410 Exam VCE Dumps >> Free Download

    HOT 70-411 Exam VCE Dumps >> Free Download

    HOT 70-412 Exam VCE Dumps >> Free Download

    HOT 70-413 Exam VCE Dumps >> Free Download

    HOT 70-414 Exam VCE Dumps >> Free Download

    HOT 70-415 Exam VCE Dumps >> Free Download

    HOT 70-416 Exam VCE Dumps >> Free Download

    HOT 70-417 Exam VCE Dumps >> Free Download

    NEW 70-432 Exam VCE Dumps >> Free Download

    NEW 70-448 Exam VCE Dumps >> Free Download

    NEW 70-457 Exam VCE Dumps >> Free Download

    NEW 70-458 Exam VCE Dumps >> Free Download

    NEW 70-459 Exam VCE Dumps >> Free Download

    HOT 70-460 Exam VCE Dumps >> Free Download

    HOT 70-461 Exam VCE Dumps >> Free Download

    HOT 70-462 Exam VCE Dumps >> Free Download

    HOT 70-463 Exam VCE Dumps >> Free Download

    HOT 70-464 Exam VCE Dumps >> Free Download

    HOT 70-465 Exam VCE Dumps >> Free Download

    HOT 70-466 Exam VCE Dumps >> Free Download

    HOT 70-467 Exam VCE Dumps >> Free Download

    HOT 70-469 Exam VCE Dumps >> Free Download

    NEW 70-470 Exam VCE Dumps >> Free Download

    NEW 70-480 Exam VCE Dumps >> Free Download

    NEW 70-481 Exam VCE Dumps >> Free Download

    NEW 70-482 Exam VCE Dumps >> Free Download

    HOT 70-483 Exam VCE Dumps >> Free Download

    NEW 70-484 Exam VCE Dumps >> Free Download

    NEW 70-485 Exam VCE Dumps >> Free Download

    NEW 70-486 Exam VCE Dumps >> Free Download

    NEW 70-487 Exam VCE Dumps >> Free Download

    HOT 70-488 Exam VCE Dumps >> Free Download

    NEW 70-489 Exam VCE Dumps >> Free Download

    NEW 70-490 Exam VCE Dumps >> Free Download

    NEW 70-491 Exam VCE Dumps >> Free Download

    NEW 70-492 Exam VCE Dumps >> Free Download

    NEW 70-494 Exam VCE Dumps >> Free Download

    NEW 70-496 Exam VCE Dumps >> Free Download

    NEW 70-497 Exam VCE Dumps >> Free Download

    NEW 70-498 Exam VCE Dumps >> Free Download

    NEW 70-499 Exam VCE Dumps >> Free Download

    NEW 70-511 Exam VCE Dumps >> Free Download

    NEW 70-513 Exam VCE Dumps >> Free Download

    NEW 70-515 Exam VCE Dumps >> Free Download

    NEW 70-516 Exam VCE Dumps >> Free Download

    NEW 70-517 Exam VCE Dumps >> Free Download

    HOT 70-532 Exam VCE Dumps >> Free Download

    HOT 70-533 Exam VCE Dumps >> Free Download

    HOT 70-534 Exam VCE Dumps >> Free Download

    NEW 70-573 Exam VCE Dumps >> Free Download

    NEW 70-576 Exam VCE Dumps >> Free Download

    NEW 70-640 Exam VCE Dumps >> Free Download

    NEW 70-642 Exam VCE Dumps >> Free Download

    NEW 70-646 Exam VCE Dumps >> Free Download

    NEW 70-659 Exam VCE Dumps >> Free Download

    NEW 70-662 Exam VCE Dumps >> Free Download

    NEW 70-663 Exam VCE Dumps >> Free Download

    NEW 70-667 Exam VCE Dumps >> Free Download

    NEW 70-668 Exam VCE Dumps >> Free Download

    NEW 70-673 Exam VCE Dumps >> Free Download

    HOT 70-680 Exam VCE Dumps >> Free Download

    NEW 70-685 Exam VCE Dumps >> Free Download

    NEW 70-686 Exam VCE Dumps >> Free Download

    NEW 70-687 Exam VCE Dumps >> Free Download

    HOT 70-688 Exam VCE Dumps >> Free Download

    NEW 70-689 Exam VCE Dumps >> Free Download

    NEW 70-692 Exam VCE Dumps >> Free Download

    NEW 70-694 Exam VCE Dumps >> Free Download

    NEW 70-695 Exam VCE Dumps >> Free Download

    NEW 70-696 Exam VCE Dumps >> Free Download

    NEW 70-697 Exam VCE Dumps >> Free Download

    NEW 70-980 Exam VCE Dumps >> Free Download

    NEW 70-981 Exam VCE Dumps >> Free Download

    NEW 74-335 Exam VCE Dumps >> Free Download

    NEW 74-338 Exam VCE Dumps >> Free Download

    NEW 74-343 Exam VCE Dumps >> Free Download

    NEW 74-344 Exam VCE Dumps >> Free Download

    HOT 74-409 Exam VCE Dumps >> Free Download

    NEW 74-674 Exam VCE Dumps >> Free Download

    NEW 74-678 Exam VCE Dumps >> Free Download

    HOT 74-697 Exam VCE Dumps >> Free Download

    NEW 77-427 Exam VCE Dumps >> Free Download

  • « | Main | »

    70-413.Lead2pass.Premium.Exam.229q part2

    By admin | July 26, 2016

    Tagged with:

    QUESTION 81
    You are evaluating the deployment of a multi-site Hyper-V failover cluster in the Miami office and
    the Seattle office to host App2.
    You need to identify which changes must be made to support the use of the multi-site cluster.
    Which changes should you identify?
    A. Purchase a storage solution that replicates the virtual machines.
    Configure all of the virtual machines to use dynamic memory.
    B. Upgrade the WAN link between the Miami and Seattle offices.
    Purchase a storage solution that replicates the virtual machines.
    C. Configure all of the virtual machines to use dynamic memory.
    Implement Distributed File System (DFS) Replication and store the virtual machine files in a

    replicated folder.
    D. Implement Distributed File System (DFS) Replication and store the virtual machine files in a
    replicated folder.
    Upgrade the WAN link between the Miami and Seattle offices.
    Answer: B
    Explanation:
    You must have a Fast WAN for Multisite clustering and DFS doesn’t work for multisite Hyper-V
    Clusters
    http://technet.microsoft.com/en-us/library/dd197575%28v=ws.10%29.aspx

    70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 82
    You need to recommend a software update solution that meets the technical requirements.
    What should you recommend deploying to each branch office?
    A. An endpoint protection point
    B. A distribution point
    C. A management point
    D. An enrollment proxy point
    Answer: B
    Explanation:

    70-413.Lead2pass.Premium.Exam.229q part2

    70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 83
    You need to recommend which type of clustered file server and which type of file share must be
    used in the Hyper-V cluster that hosts App2.
    The solution must meet the technical requirements and the security requirements.
    Solution: You recommend a scale-out file server that uses an SMB share.
    Does this meet the goal?
    A. Yes
    B. No
    Answer: A
    QUESTION 84
    You need to recommend which type of clustered file server and which type of file share must be
    used in the Hyper-V cluster that hosts App2.
    The solution must meet the technical requirements and the security requirements.
    Solution: You recommend a scale-out file server that uses an NFS share.
    Does this meet the goal?
    A. Yes
    B. No
    Answer: B
    QUESTION 85
    Your network contains a Microsoft System Center 2012 Virtual Machine Manager (VMM)
    infrastructure.
    You plan to provide self-service users with the ability to create virtual machines that run Windows
    Server 2012 and have the following configurations:
    – 8 GB of memory
    – The File Server server role
    – Windows Internal Database
    – A local Administrator password set to ‘P@$$w0rd”
    You have a VHD that contains a generalized version of Windows Server 2012.
    You need to ensure that the self-service users can provision virtual machines that are based on

    the VHD.
    What should you create? (Each correct answer presents part of the solution. Choose all that
    apply.)
    A. A Hardware Profile
    B. An Application Profile
    C. An Application Host Profile
    D. A VM Template
    E. A Guest OS Profile
    Answer: ADE
    Explanation:
    http://technet.microsoft.com/en-us/library/hh368987.aspx

    70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 86
    Your network contains an Active Directory domain named contoso.com.
    The domain contains multiple servers that are configured as Hyper-V hosts.
    You plan to implement four virtual machines.
    The virtual machines will be configured as shown in the following table.

    70-413.Lead2pass.Premium.Exam.229q part2

    You need to identify which network must be added to each virtual machine.
    Which network types should you identify? To answer, drag the appropriate Network Type to the
    correct virtual machine in the answer area. Each Network Type may be used once, more than
    once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to
    view content.

    70-413.Lead2pass.Premium.Exam.229q part2

    Explanation:
    http://blogs.technet.com/b/jhoward/archive/2008/06/17/hyper-v-what-are-the-uses-for-differenttypes-
    of-virtual-networks.aspx
    An external network, which provides communication between a virtual machine and a physical
    network by creating an association to a physical network adapter on the virtualization server.
    An internal network, which provides communication between the virtualization server and virtual
    machines.
    A private network, which provides communication between virtual machines only.
    http://technet.microsoft.com/en-us/library/cc732470%28v=WS.10%29.aspx

    QUESTION 87
    Your network contains a Hyper-V cluster named Cluster1.
    You install Microsoft System Center 2012 Virtual Machine Manager (VMM).
    You create a user account for another administrator named User1.
    You plan to provide User1 with the ability to manage only the virtual machines that User1 creates.
    You need to identify what must be created before you delegate the required permissions.
    What should you identify?
    A. A cloud
    B. A service template
    C. A host group
    D. A Delegated Administrator
    Answer: C
    Explanation:
    http://technet.microsoft.com/en-us/library/gg610645.aspx
    You can assign host groups to the Delegated Administrator and the Read-Only Administrator user
    roles to scope the user roles to specific host groups.
    Members of these user roles can view and manage the fabric resources that are assigned to
    them at the host group level.
    You can create a private cloud from resources in host groups.
    When you create a private cloud, you select which host groups will be part of the private cloud.
    You can then allocate all or some of the resources from the selected host groups to the private
    cloud.
    QUESTION 88
    Your network contains four servers,
    The servers are configured as shown in the following table.
    You manage all of the servers and all of the clusters by using Microsoft System Center 2012
    Virtual Machine Manager (VMM).
    You plan to implement Dynamic Optimization for the virtual machines.
    You need to recommend a configuration for the planned implementation.
    What should you recommend?

    70-413.Lead2pass.Premium.Exam.229q part2

    A. Dynamic Optimization on Cluster3 and Cluster4 only
    Virtual machines that are balanced across the clusters
    B. Dynamic Optimization on all of the clusters
    Virtual machines that are balanced across the nodes in the clusters
    C. Dynamic Optimization on all of the clusters
    Virtual machines that are balanced across the clusters
    D. Dynamic Optimization on Cluster1 and Cluster2 only
    Virtual machines that are balanced across the nodes in the clusters

    Answer: B
    Explanation:
    http://technet.microsoft.com/en-us/library/gg675109.aspx

    70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 89
    Your network contains two servers that run Windows Server 2012.
    The servers are members of a failover cluster.
    Each server has 32 GB of RAM and has the Hyper-V server role installed.
    Each server hosts three highly available virtual machines.
    All of the virtual machines have an application named App1 installed.
    Each of the virtual machines is configured to have 4 GB of memory.
    During regular business hours, the virtual machines use less than 2 GB of memory.
    Each night, App1 truncates its logs and uses almost 4 GB of memory.
    You plan to add another three virtual machines to each host.
    The new virtual machines will run the same load as the existing virtual machines.
    You need to ensure that all of the virtual machines can run on one of the Hyper-V hosts if a single
    host fails.
    What should you do?

    A. From the properties of each Hyper-V host, modify the Allow virtual machines to span NUMA
    nodes.
    B. From the properties of each virtual machine, modify the NUMA Configuration-Maximum
    amount of memory setting.
    C. From the properties of each virtual machine, modify the Smart Paging File Location.
    D. From the properties of each virtual machine, modify the Dynamic Memory settings.
    Answer: D
    Explanation:

    70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 90
    Your network contains an Active Directory domain.
    The domain contains 10 file servers.
    The file servers connect to a Fibre Channel SAN.
    You plan to implement 20 Hyper-V hosts in a failover cluster.
    The Hyper-V hosts will not have host bus adapters (HBAs).
    You need to recommend a solution for the planned implementation that meets the following
    requirements:
    – The virtual machines must support live migration.
    – The virtual hard disks (VHDs) must be stored on the file servers.
    Which two technologies achieve the goal? Each correct answer presents a complete solution.
    A. Cluster Shared Volume (CSV)
    B. An NFS share
    C. Storage pools
    D. SMB 3.0 shares
    Answer: CD

    QUESTION 91
    Your network contains two servers named Server1 and Server2 that run Windows Server 2012.
    Server1 and Server2 have the Hyper-V server role installed and are members of a failover
    cluster.
    The network contains a Storage Area Network (SAN) that has a LUN named LUN1.
    LUN1 is connected to a 12-TB disk on the SAN.
    You plan to host three new virtual machines on the failover cluster.
    Each virtual machine will store up to 4 TB of data on a single disk.
    The virtual machines will be backed up from the hosts by using the Volume Shadow Copy
    Service (VSS).
    You need to ensure that Server1 and Server2 can store the new virtual machines on the SAN.
    Which three actions should you perform? To answer, move the three appropriate actions from the
    list of actions to the answer area and arrange them in the correct order.

    70-413.Lead2pass.Premium.Exam.229q part2 Explanation:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 92
    Your network contains an Active Directory domain named contoso.com.
    The domain contains four servers on a test network.
    The servers are configured as shown in the following table.

    70-413.Lead2pass.Premium.Exam.229q part2

    You perform the following tasks:
    – On Server2F you create an advanced SMB share named Share2A and an
    applications SMB share named Share2B.
    – On Server3, you create an advanced SMB share named Share3.
    – On Server4, you create an applications SMB share named Share4.
    You add Server3 and Server4 to a new failover cluster named Clus1.
    On Clus1, you configure the File Server for general use role, you create a quick SMB share named
    Share5A, and then you create an applications SMB share named Share5B.
    You plan to create a failover cluster of two virtual machines hosted on Server1.
    The clustered virtual machines will use shared .vhdx files.
    You need to recommend a location to store the shared .vhdx files.
    Where should you recommend placing the virtual hard disk (VHD)?
    A. \\Server3\Share3
    B. \\Server2\Share2B
    C. \\Clus1\Share5B
    D. \\Server4\Share4
    Answer: C
    QUESTION 93
    Your network contains an Active Directory domain named contoso.com.
    All servers run Windows Server 2012 R2.

    The network contains a System Center 2012 R2 Data Protection Manager (DPM) deployment.
    The domain contains six servers.
    The servers are configured as shown in the following table.
    You install System Center 2012 R2 Virtual Machine Manager (VMM) on the nodes in Cluster2.
    You configure VMM to use a database in Cluster1. Server5 is the first node in the cluster.
    You need to back up the VMM encryption key.
    What should you back up?

    70-413.Lead2pass.Premium.Exam.229q part2

    A. A full system backup of Server1
    B. A full system backup of Server3
    C. A backup of the Windows\DigitalLocker folder on Server5
    D. A backup of the Windows\DigitalLocker folder on Server1
    Answer: A
    QUESTION 94
    You have a Windows Server 2012 R2 failover cluster that contains four nodes.
    The cluster has Dynamic Optimization enabled.
    You deploy three highly available virtual machines to the cluster by using System Center 2012 R2
    Virtual Machine Manager (VMM).
    You need to prevent Dynamic Optimization from placing any of the three virtual machines in the
    same node.
    What should you do?
    A. From the Virtual Machine Manager console, modify the Compatibility settings in the
    Hardware Configuration properties of the virtual machines.
    B. Set the Priority property of the virtual machine cluster role.
    C. From the Virtual Machine Manager console, modify the Servicing Windows settings of the
    virtual machines.
    D. From the Virtual Machine Manager console, modify the Availability settings in the Hardware
    Configuration properties of the virtual machines.
    Answer: D
    Explanation:
    The correct answer in the real exam is Anti Affinity command.
    Case Study 3: Proseware Inc (QUESTION 95 – QUESTION 103)
    Overview
    General Overview
    Proseware Inc., is a manufacturing company that has 4,000 employees.

    Proseware works with a trading partner named Fabrikam, Inc.
    Physical Locations
    Proseware has a main office and two branch offices.
    The main office is located in London.
    The branch offices are located in Madrid and Berlin.
    Proseware has a sales department based in the London office and a research department based
    in the Berlin office.
    The offices connect to each other by using a WAN link.
    Each office connects directly to the Internet.
    Proseware rents space at a hosting company.
    All offices have a dedicated WAN link to the hosting company.
    Web servers that are accessible from the Internet are located at the hosting company.
    Active Directory
    The Proseware network contains an Active Directory forest named proseware.com.
    The forest contains a single domain. The forest functional level is Windows Server 2012.
    Each office contains three domain controllers. An Active Directory site is configured for each office.
    System state backups are performed every day on the domain controllers by using System Center
    2012 R2 Data Protection Manager (DPM).
    Virtualization
    Proseware has Hyper-V hosts that run Windows Server 2012 R2.
    Each Hyper-V host manages eight to ten virtual machines.
    The Hyper-V hosts are configured as shown in the following table.

    70-413.Lead2pass.Premium.Exam.229q part2

    All of the Hyper-V hosts store virtual machines on direct-attached storage (DAS).
    Servers
    All servers run Windows Server 2012 R2.
    All of the servers are virtualized, except for the Hyper-V hosts.
    VDI1 and VDI2 use locally attached storage to host virtual hard disk (VHD) files.
    The VHDs use the .vhd format.
    A line-of-business application named SalesApp is used by the sales department and runs on a
    server named APP1. APP1 is hosted on HyperV2.
    A server named CA1 has the Active Directory Certificate Services server role installed and is
    configured as an enterprise root certification authority (CA) named ProsewareCA.

    Ten load-balanced web servers hosted on HyperV7 and HyperV8 run the Internet-facing web site
    that takes orders from Internet customers.
    System Center 2012 R2 Operations Manager is used to monitor the health of the servers on the
    network.
    All of the servers are members of the proseware.com domain, except for the servers located in the
    perimeter network.
    Client Computers
    All client computers run either Windows 8.1 or Windows 7. Some of the users in the London office
    connect to pooled virtual desktops hosted on VDI1 and VDI2.
    Problem Statements
    Proseware identifies the following issues on the network:
    Virtualization administrators report that the load on the Hyper-V hosts is inconsistent.
    The virtualization administrators also report that administrators fail to account for host utilization
    when creating new virtual machines.
    Users in the sales department report that they experience issues when they attempt to access
    SalesApp from any other network than the one in the London office.
    Sometimes, configuration changes are not duplicated properly across the web servers, resulting in
    customer ordering issues. Web servers are regularly changed.
    Demand for virtual desktops is increasing. Administrators report that storage space is becoming an
    issue as they want to add more virtual machines.
    In the past, some personally identifiable information (PII) was exposed when paper shredding
    procedures were not followed.
    Requirements
    Planned Changes
    Proseware plans to implement the following changes on the network:
    – Implement a backup solution for Active Directory.
    – Relocate the sales department to the Madrid office.
    – Implement System Center 2012 R2 components, as required.
    – Protect email attachments sent to Fabrikam that contain PII data so
    that the attachments cannot be printed.
    – Implement System Center 2012 R2 Virtual Machine Manager (VMM) to manage
    the virtual machine infrastructure. Proseware does not plan to use private
    clouds in the near future.
    – Deploy a new Hyper-V host named RESEARCH1 to the Berlin office.
    RESEARCH1 will be financed by the research department. All of the virtual
    machines deployed to RESEARCH1 will use VMM templates.
    Technical Requirements
    Proseware identifies the following virtualization requirements:
    – The increased demand for virtual desktops must be met.
    – Once System Center is deployed, all of the Hyper-V hosts must be managed
    by using VMM.
    – If any of the Hyper-V hosts exceeds a set number of virtual machines,
    an administrator must be notified by email.
    – Network administrators in each location must be responsible for managing
    the Hyper-V hosts in their respective location. The management of the
    hosts must be performed by using VMM.
    – The network technicians in each office must be able to create virtual
    machines in their respective office.
    – The network technicians must be prevented from modifying the host server
    settings.

    – New virtual machines must be deployed to RESEARCH1 only if the virtual
    machine template used to create the machine has a value specified for a
    custom property named CostCenter’ that matches Research’.
    The web site configurations must be identical on all web servers.
    Security Requirements
    Proseware identifies the following security requirements:
    – All email messages sent to and from Fabrikam must be encrypted by using
    digital certificates issued to users by the respective CA of their company.
    No other certificates must be trusted between the organizations.
    – Microsoft Word documents attached to email messages sent from Proseware
    to Fabrikam must be protected.
    – Privileges must be minimized, whenever possible.
    QUESTION 95
    You need to recommend changes to the virtual desktop infrastructure (VDI) environment.
    What should you recommend?
    A. Implement Hyper-V replication between VDI1 and VDI2.
    B. Create new VDI virtual machines that are Generation 2 virtual machines.
    C. Convert the existing VHDs to .vhdx format.
    D. Move the VHDs to a Cluster Shared Volume (CSV) and implement Data Deduplication on the
    CSV.
    Answer: D
    QUESTION 96
    You need to recommend changes to the existing environment to meet the web server requirement.
    Which two actions should you recommend? Each Answer presents part of the solution.
    A. On one web server, run the Start-DSCConfiguration cmdlet.
    Create and run a configuration script.
    B. On all of the web servers, install the Windows PowerShell Web Access feature,
    and then run the Set-DscLocalConfigurationManager cmdlet.
    C. On all of the web servers, configure the Local Configuration Manager settings,
    and then run the Set-DscLocalConfigurationManager cmdlet.
    D. On one web server, install the Windows PowerShell Desired State Configuration (DSC)
    feature. Create and run a configuration script.
    Answer: CD
    QUESTION 97
    You are evaluating the use of VMM to migrate APP1 for the sales users.
    You need to identify the effects of the migration.
    What should you identify?
    A. The VHDs and the virtual machine configuration files will move.
    The sales users’ access to APP1 will be interrupted.
    B. The VHDs will move but the virtual machine configuration files will remain in the original

    location.
    The sales users will continue to have uninterrupted access to APP1.
    C. The virtual machine configuration files will move but the VHDs will remain in the original
    location.
    The sales users’ access to APP1 will be interrupted.
    D. The VHDs and the virtual machine configuration files will move.
    The sales users will continue to have uninterrupted access to APP1.
    Answer: D
    QUESTION 98
    You need to recommend changes to the existing environment to meet the PII requirement.
    What should you recommend?
    A. In the Default Domain Policy, configure auto-enrollment for the S/MIME certificates
    from ProsewareCA.
    B. Create an AD RMS cluster in Proseware, and then provision the user accounts in Proseware
    for the Fabrikam users.
    C. Configure Active Directory Federation Services (AD FS) in Fabrikam, and then install a
    web application proxy in Proseware.
    D. In the Default Domain Policy, configure auto-enrollment for the S/MIME certificates
    from FabrikamCA.
    Answer: B
    QUESTION 99
    You need to ensure that RESEARCH1 only contains the required virtual machines.
    What should you do?
    A. Create an availability set.
    B. Create a custom placement rule.
    C. Set RESEARCH1 as a possible owner.
    D. Set RESEARCH1 as a preferred owner.
    Answer: B
    QUESTION 100
    You need to recommend changes to the existing environment to meet the email requirement.
    What should you recommend?
    A. Implement a two-way forest trust that has selective authentication.
    B. Implement qualified subordination.
    C. Deploy the FabrikamCA root certificate to all of the client computers.
    D. Deploy a user certificate from FabrikamCA to all of the users.
    Answer: B
    QUESTION 101
    You need to implement a solution for the email attachments.

    Both organizations exchange root CA certificates and install the certificates in the relevant stores.
    You duplicate the Enrollment Agent certificate template and generate a certificate based on the
    new template.
    Which additional two actions should you perform? Each Answer presents part of the solution.
    A. Request cross-certification authority certificates.
    B. Create Capolicy.inf files.
    C. Request subordinate CA certificates.
    D. Create Policy.inf files.
    Answer: AD
    QUESTION 102
    You need to recommend a design that meets the technical requirements for managing the Hyper-
    V hosts by using VMM.
    What should you recommend? To answer, select the appropriate options in the answer area.

    70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 103
    You need to recommend a monitoring solution for Proseware.
    Which three actions should you recommend performing in sequence? To answer, move the
    appropriate actions from the list of actions to the answer area and arrange them in the correct order.

    Case Study 4: Northwind Traders (QUESTION 104 – QUESTION 114)
    Overview
    Northwind Traders is an IT services and hosting provider.

    Northwind Traders has two main data centers in North America.
    The data centers are located in the same city.
    The data centers connect to each other by using high-bandwidth, low-latency WAN links.
    Each data center connects directly to the Internet.
    Northwind Traders also has a remote office in Asia that connects to both of the North American
    data centers by using a WAN link.
    The Asian office has 30 multipurpose servers.
    Each North American data center contains two separate network segments.
    One network segment is used to host the internal servers of Northwind Traders.
    The other network segment is used for the hosted customer environments.
    Existing Environment
    Active Directory
    The network contains an Active Directory forest named northwindtraders.com.
    The forest contains a single domain.
    All servers run Windows Server 2012 R2.
    Server Environment
    The network has the following technologies deployed:
    – Service Provider Foundation
    – Windows Azure Pack for Windows Server
    – System Center 2012 R2 Virtual Machine Manager (VMM)
    – An Active Directory Rights Management Services (AD RMS) cluster
    – An Active Directory Certificate Services (AD CS) enterprise
    certification authority (CA)
    All newly deployed servers will include the following components:
    – Dual 10-GbE Remote Direct Memory Access (RDMA)-capable network adapters
    – Dual 1-GbE network adapters
    – 128 GB of RAM
    Requirements
    Business Goals
    Northwind Traders will provide hosting services to two customers named Customer1 and
    Customer2.
    The network of each customer is configured as shown in the following table.

    70-413.Lead2pass.Premium.Exam.229q part2

    Planned Changes
    Northwind Traders plans to implement the following changes:
    – Deploy System Center 2012 R2 Operations Manager.

    – Deploy Windows Server 2012 R2 iSCSI and SMB-based storage.
    – Implement Hyper-V Recovery Manager to protect virtual machines.
    – Deploy a certificate revocation list (CRL) distribution point (CDP) on
    the internal network.
    – For Customer 1, install server authentication certificates issued by
    the CA of Northwind Traders on the virtual machine in the hosting networks.
    General Requirements
    Northwind Traders identifies the following requirements:
    – Storage traffic must use dedicated adapters.
    – All storage and network traffic must be load balanced.
    – The amount of network traffic between the internal network and the
    hosting network must be minimized.
    – The publication of CRLs to CDPs must be automatic.
    – Each customer must use dedicated Hyper-V hosts.
    – Administrative effort must be minimized, whenever possible.
    – All servers and networks must be monitored by using Operations Manager.
    – Anonymous access to internal file shares from the hosting network must
    be prohibited.
    – All Hyper-V hosts must use Cluster Shared Volume (CSV) shared storage
    to host virtual machines.
    – All Hyper-V storage and network traffic must remain available if single
    network adapter fails.
    – The Hyper-V hosts connected to the SMB-based storage must be able to
    make use of the RDMA technology.
    – The number of servers and ports in the hosting environment to which the
    customer has access must be minimized.
    Customer1 Requirements
    Northwind Traders identifies the following requirements for Customer1:
    – Customer1 must use SMB-based storage exclusively.
    – Customer1 must use App Controller to manage hosted virtual machines.
    – The virtual machines of Customer1 must be recoverable if a single data
    center fails.
    – Customer1 must be able to delegate self-service roles in its hosted
    environment to its users.
    – Customer1 must be able to check for the revocation of certificates
    issued by the CA of Northwind Traders.
    – The users of Customer1 must be able to obtain use licenses for documents
    protected by the AD RMS of Northwind Traders.
    – Certificates issued to the virtual machines of Customer1 that reside on
    the hosted networks must be renewed automatically.
    Customer2 Requirements
    Northwind Traders identifies the following requirements for Customer2:
    – Customer2 must use iSCSI-based storage exclusively.
    – All of the virtual machines of Customer2 must be migrated by using a
    SAN transfer.
    – None of the metadata from the virtual machines of Customer2 must be
    stored in Windows Azure.
    – The network configuration of the Hyper-V hosts for Customer2 must be
    controlled by using logical switches.
    – The only VMM network port profiles and classifications allowed by
    Customer2 must be low-bandwidth, medium-bandwidth, or high-bandwidth.

    – The users at Northwind Traders must be able to obtain use licenses for
    documents protected by the AD RMS cluster of Customer2. Customer2 plans
    to decommission its AD RMS cluster during the next year.
    QUESTION 104
    You need to recommend a monitoring solution for Northwind Traders.
    What is the best approach to achieve the goal? More than one answer choice may achieve the
    goal. Select the BEST answer.
    A. Three Operations Manager management servers and two Operations Manager gateway
    servers
    B. One Operations Manager management server
    C. Two Operations Manager management servers and three Operations Manager gateway
    servers
    D. Five Operations Manager management servers
    Answer: C
    QUESTION 105
    You plan to implement a solution that meets the certificate requirements of Customer1.
    You need to identify which role services must be deployed to the hosting environment.
    Which two role services should you identify? Each Answer presents part of the solution.
    A. Certification Authority Web Enrollment
    B. Online Responder
    C. Certificate Enrollment Policy Web Service
    D. Certificate Enrollment Web Service
    Answer: CD
    QUESTION 106
    You need to recommend changes to allow Customer1 to delegate permissions in its hosting
    environment to its users.
    Where should you recommend performing each task? To answer, select the appropriate location
    for each task in the answer area.

    70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 107
    You need to recommend a solution that meets the AD RMS requirements of Customer1 and
    Customer2.
    Which actions should you recommend performing for each customer? To answer, select the
    appropriate customer for each action in the answer area.

    70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 108
    You need to prepare for the migration of virtual machines across the Hyper-V hosts of Customer2.
    Which three actions should you perform in sequence? To answer, move the appropriate actions
    from the list of actions to the answer area and arrange them in the correct order.

    70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 109
    You need to recommend a network configuration for the newly deployed Hyper-V hosts used by
    Customer1.
    On which network adapter should you recommend performing each configuration? To answer,
    select the appropriate network adapter for each configuration in the answer area.

    70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 110
    You need to recommend which setting must be applied to the virtualization infrastructure of
    Northwind Traders to minimize the impact of multiple virtual machines starting concurrently.
    What command should you recommend running? To answer, select the appropriate options in the
    answer area.

    70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 111
    You need to prepare the required Hyper-V virtual network components for Customer2.
    Which four objects should you create and configure in sequence? To answer, move the appropriate
    objects from the list of objects to the answer area and arrange them in the correct order.

    70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 112
    You need to implement a Hyper-V Recovery Manager solution in the hosting environment of
    Northwind Traders.
    Which four actions should you perform in sequence? To answer, move the appropriate actions from
    the list of actions to the answer area and arrange them in the correct order.

    70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 113
    You need to recommend a configuration for the CA extensions of Northwind Traders that meets the

    certificate revocation requirement of Customer1.
    What should you recommend? To answer, select the appropriate prefix of the target location for the
    each extension settings in the answer area.

    70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 114
    Your network contains a main data center and a disaster recovery data center.
    Each data center contains a Storage Area Network (SAN).
    The main data center contains a two-node failover cluster named Cluster1 that hosts a Microsoft
    SQL Server 2012 database named DB1.
    The database files in DB1 are stored on the SAN in the main office.
    The disaster recovery data center contains a server that runs SQL Server 2012.
    You need to recommend a disaster recovery solution for the SQL Server database.
    The solution must ensure that the database remains available if the main data center fails.
    What should you recommend? More than one answer choice may achieve the goal. Select the
    BEST answer.
    A. Deploy Distributed File System (DFS) Replication.
    B. Extend the failover cluster to the disaster recovery data center.
    C. Implement a Cluster Shared Volume (CSV) and move the database files to the CSV.
    D. Implement SQL Server database replication between the two data centers.
    Answer: D
    Explanation:

    70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 115
    Your Active Directory currently contains five virtualized domain controllers that run Windows Server
    2012 R2.
    The system state of each domain controller is backed up daily.
    The backups are shipped to a remote location weekly.
    Your company recently implemented a disaster recovery site that contains several servers.
    The servers run Windows Server 2012 R2 and have the Hyper-V server role installed.
    The disaster recovery site has a high-speed WAN link to the main office.
    You need to create an Active Directory recovery plan that meets the following requirements:
    – Restores the Active Directory if a catastrophe prevents all access to
    the main office.
    – Minimizes data loss.
    What should you include in the plan?
    A. Hyper-V replicas
    B. Live migration
    C. Virtual machine checkpoints
    D. System state restores
    Answer: A
    QUESTION 116
    Your network contains 500 client computers that run Windows 7 and a custom application named
    App1.
    App1 uses data stored in a shared folder.
    You have a failover cluster named Cluster1 that contains two servers named Server1 and Server2.
    Server1 and Server2 run Windows Server 2012 and are connected to an iSCSI Storage Area
    Network (SAN).
    You plan to move the shared folder to Cluster1.
    You need to recommend which cluster resource must be created to ensure that the shared folder
    can be accessed from Cluster1.
    What should you recommend? More than one answer choice may achieve the goal. Select the
    BEST answer.

    A. The Generic Application cluster role
    B. The DFS Namespace Server cluster role
    C. The clustered File Server role of the File Server for general use type
    D. The clustered File Server role of the File Server for scale-out application data type
    Answer: C
    QUESTION 117
    Your network contains five servers that run Windows Server 2012 R2.
    You install the Hyper-V server role on the servers.
    You create an external virtual network switch on each server.
    You plan to deploy five virtual machines to each Hyper-V server.
    Each virtual machine will have a virtual network adapter that is connected to the external virtual
    network switch and that has a VLAN identifier of 1.
    Each virtual machine will run Windows Server 2012 R2.
    All of the virtual machines will run the identical web application.
    You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
    virtual machine to an NLB cluster.
    The cluster will be configured to use unicast only.
    You need to ensure that the NLB feature can distribute connections across all of the virtual
    machines.
    Solution: From the properties of each virtual machine, you enable MAC address spoofing for the
    existing virtual network adapter.
    Does this meet the goal?
    A. Yes
    B. No
    Answer: A
    QUESTION 118
    Your network contains five servers that run Windows Server 2012 R2.
    You install the Hyper-V server role on the servers.
    You create an external virtual network switch on each server.
    You plan to deploy five virtual machines to each Hyper-V server.
    Each virtual machine will have a virtual network adapter that is connected to the external virtual
    network switch and that has a VLAN identifier of 1.
    Each virtual machine will run Windows Server 2012 R2.
    All of the virtual machines will run the identical web application.
    You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
    virtual machine to an NLB cluster.
    The cluster will be configured to use unicast only.
    You need to ensure that the NLB feature can distribute connections across all of the virtual
    machines.
    Solution: On each Hyper-V server, you create a new external virtual network switch.
    From the properties of each virtual machine, you add a second virtual network adapter and connect
    the new virtual network adapters to the new external virtual network switches.
    Does this meet the goal?
    A. Yes
    B. No

    Answer: B
    QUESTION 119
    Your network contains five servers that run Windows Server 2012 R2.
    You install the Hyper-V server role on the servers.
    You create an external virtual network switch on each server.
    You plan to deploy five virtual machines to each Hyper-V server.
    Each virtual machine will have a virtual network adapter that is connected to the external virtual
    network switch and that has a VLAN identifier of 1.
    Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the
    identical web application.
    You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
    virtual machine to an NLB cluster.
    The cluster will be configured to use unicast only.
    You need to ensure that the NLB feature can distribute connections across all of the virtual
    machines.
    Solution: On each Hyper-V server, you create a new private virtual network switch.
    From the properties of each virtual machine, you add a second virtual network adapter and connect
    the new virtual network adapters to the new private virtual network switches.
    Does this meet the goal?
    A. Yes
    B. No
    Answer: B
    QUESTION 120
    Your network contains five servers that run Windows Server 2012 R2.
    You install the Hyper-V server role on the servers.
    You create an external virtual network switch on each server.
    You plan to deploy five virtual machines to each Hyper-V server.
    Each virtual machine will have a virtual network adapter that is connected to the external virtual
    network switch and that has a VLAN identifier of 1.
    Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the
    identical web application.
    You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
    virtual machine to an NLB cluster.
    The cluster will be configured to use unicast only.
    You need to ensure that the NLB feature can distribute connections across all of the virtual
    machines.
    Solution: From the properties of each virtual machine, you add a second virtual network adapter.
    You connect the new virtual network adapters to the external virtual network switch and configure
    the new virtual network adapters to use a VLAN identifier of 2.
    Does this meet the goal?
    A. Yes
    B. No
    Answer: B
    QUESTION 121
    Your network contains an Active Directory domain named contoso.com.

    The domain contains a Microsoft System Center 2012 infrastructure.
    You deploy a service named Service1 by using a service template.
    Service1 contains two virtual machines.
    The virtual machines are configured as shown in the following table.
    You need to recommend a monitoring solution to ensure that an administrator can review the
    availability information of Service1.
    You need to recommend a monitoring solution to ensure that an administrator can review the
    availability information of Service1.
    Solution: From Configuration Manager, you create a Collection and a Desired Configuration
    Management baseline.
    Does this meet the goal?

    70-413.Lead2pass.Premium.Exam.229q part2

    A. Yes
    B. No
    Answer: B
    QUESTION 122
    Your network contains an Active Directory domain named contoso.com.
    The domain contains a Microsoft System Center 2012 infrastructure.
    You deploy a service named Service1 by using a service template.
    Service1 contains two virtual machines.
    The virtual machines are configured as shown in the following table.
    You need to recommend a monitoring solution to ensure that an administrator can review the
    availability information of Service1.
    Solution: From Virtual Machine Manager (VMM), you modify the properties of the service template.
    Does this meet the goal?

    70-413.Lead2pass.Premium.Exam.229q part2

    A. Yes
    B. No
    Answer: B
    QUESTION 123
    Your network contains an Active Directory domain named contoso.com.
    The domain contains a Microsoft System Center 2012 infrastructure.
    You deploy a service named Service1 by using a service template.
    Service1 contains two virtual machines.
    The virtual machines are configured as shown in the following table.
    You need to recommend a monitoring solution to ensure that an administrator can review the
    availability information of Service1.
    Solution: From Operations Manager, you create a Distributed Application and a Service Level
    Tracking object.
    Does this meet the goal?

    70-413.Lead2pass.Premium.Exam.229q part2

    A. Yes
    B. No
    Answer: A
    QUESTION 124
    Your network contains an Active Directory domain named contoso.com.
    The domain contains a Microsoft System Center 2012 infrastructure.
    You deploy a service named Service1 by using a service template.
    Service1 contains two virtual machines.
    The virtual machines are configured as shown in the following table.
    You need to recommend a monitoring solution to ensure that an administrator can review the
    availability information of Service1.
    Solution: From Operations Manager, you create a Distributed Application and a Monitor Override.
    Does this meet the goal?

    70-413.Lead2pass.Premium.Exam.229q part2

    A. Yes
    B. No
    Answer: B
    QUESTION 125
    Your network contains an Active Directory domain named contoso.com.
    The network has an Active Directory Certificate Services (AD CS) infrastructure.
    You need to issue a certificate to users to meet the following requirements:
    – Ensure that the users can encrypt files by using Encrypting File System
    (EFS).
    – Ensure that all of the users reenroll for their certificate every six
    months.
    Solution: You create a copy of the User certificate template, and then you modify the extensions of
    the copy.
    Does this meet the goal?
    A. Yes
    B. No
    Answer: B
    QUESTION 126
    Your network contains an Active Directory domain named contoso.com.
    The network has an Active Directory Certificate Services (AD CS) infrastructure.
    You need to issue a certificate to users to meet the following requirements:
    – Ensure that the users can encrypt files by using Encrypting File System
    (EFS).
    – Ensure that all of the users reenroll for their certificate every six
    months.
    Solution: From the properties of the Basic EFS template, you assign the Allow-Enroll permission to
    the Authenticated Users group.
    Does this meet the goal?
    A. Yes

    B. No
    Answer: B
    QUESTION 127
    Your network contains an Active Directory domain named contoso.com.
    The network has an Active Directory Certificate Services (AD CS) infrastructure.
    You need to issue a certificate to users to meet the following requirements:
    – Ensure that the users can encrypt files by using Encrypting File System
    (EFS).
    – Ensure that all of the users reenroll for their certificate every six
    months.
    Solution: You create a copy of the Basic EFS certificate template, and then you modify the validity
    period of the copy.
    Does this meet the goal?
    A. Yes
    B. No
    Answer: A
    QUESTION 128
    Your network contains an Active Directory domain named contoso.com.
    The network has an Active Directory Certificate Services (AD CS) infrastructure.
    You need to issue a certificate to users to meet the following requirements:
    – Ensure that the users can encrypt files by using Encrypting File System
    (EFS).
    – Ensure that all of the users reenroll for their certificate every six
    months.
    Solution: From the properties of the User certificate template, you assign the Allow-Enroll
    permission to the Authenticated Users group.
    Does this meet the goal?
    A. Yes
    B. No
    Answer: B
    QUESTION 129
    Your network contains an Active Directory forest named contoso.com.
    The forest contains multiple servers that run Windows Server 2012.
    The network contains 1,000 client computers that run Windows 7.
    Two hundred remote users have laptop computers and only work from home.
    The network does not provide remote access to users.
    You need to recommend a monitoring solution to meet the following requirements:
    – Generate a list of updates that are applied successfully to all
    computers.

    – Minimize the amount of bandwidth used to download updates.
    – An administrator must approve the installation of an update on any
    client computer.
    What should you include in the recommendation? (Each Answer presents part of the solution.
    Choose all that apply.)
    A. Microsoft Asset Inventory Service (AIS)
    B. Windows InTune
    C. Windows Server Update Services (WSUS)
    D. Active Directory Federation Services (AD FS)
    E. Microsoft System Center 2012 Service Manager
    Answer: ABC
    QUESTION 130
    Your network contains an Active Directory domain named contoso.com.
    The domain contains a System Center 2012 R2 Virtual Machine Manager (VMM) deployment.
    The domain contains 20 Hyper-V hosts that run Windows Server 2012 R2. Currently, the computer
    accounts of all of the Hyper-V hosts are in organizational unit (OU) named Virtualization.
    You plan to create two private clouds by using VMM named Cloud1 and Cloud2.
    The virtual machines for Cloud1 will be hosted on two Hyper-V hosts named Server1 and Server2.
    The virtual machines for Cloud2 will be hosted on two Hyper-V hosts named Server3 and Server4.
    You need to recommend an administrative model for Cloud1 and Cloud2.
    Which technology best achieves the goal? More than one answer choice may achieve the goal.
    Select the BEST answer.
    A. Two sites and two Application Administrator (Self-Service User) user roles
    B. Two host groups and two Application Administrator (Self-Service User) user roles
    C. Two OUs and two Application Administrator (Self-Service User) user roles
    D. Two logical units and two Tenant Administrator user roles
    Answer: B
    QUESTION 131
    Your company has three offices.
    The offices are located in Seattle, London, and Tokyo.
    The network contains an Active Directory domain named northwindtraders.com.
    Each office is configured as an Active Directory site.
    System Center 2012 R2 Operations Manager is deployed to the domain.
    The servers in all three sites are monitored by using Operations Manager.
    The company has a web site for its customers.
    The web site requires users to sign-in.
    You need to recommend a solution to monitor the web site.
    The solution must meet the following requirements:
    – Monitor the availability of the web site from locations in North America,
    Europe, Asia, and Australia.
    – Monitor multi-step requests to the web site.
    – Use a central console for monitoring.
    What should you include in the recommendation?

    A. Import the System Center Global Services Monitoring Management Pack and add the
    Web Application Availability Monitoring monitoring type.
    B. Add the Web Application Transaction monitoring type and configure watcher nodes.
    C. Add the TCP Port monitoring type and configure watcher nodes.
    D. Import the System Center Global Services Monitor Management Pack and add the Visual
    Studio Web Test Monitoring monitoring type.
    Answer: D
    QUESTION 132
    You have a System Center 2012 R2 Configuration Manager deployment.
    All users have client computers that run Windows 8.1.
    The users log on to their client computer as standard users.
    An application named App1 is deployed to the client computers by using System Center.
    You need to recommend a solution to validate a registry key used by App1.
    If the registry key has an incorrect value, the value must be changed.
    The registry key must be validated every day.
    The solution must generate a report on non-compliant computers.
    What is the best approach to achieve the goal? More than one answer choice may achieve the
    goal. Select the BEST answer.
    A. Group Policy preferences
    B. A desired configuration baseline
    C. The Windows PowerShell Desired State Configuration (DSC) feature
    D. The Microsoft Baseline Security Analyzer (MBSA)
    Answer: B
    QUESTION 133
    Your network contains an Active Directory forest named contoso.com.
    Your company works with a partner company that has an Active Directory forest named
    fabrikam.com.
    Both forests contain domain controllers that run only Windows Server 2012 R2.
    The certification authority (CA) infrastructure of both companies is configured as shown in the
    following table.
    You need to recommend a certificate solution that meets the following requirements:
    – Server authentication certificates issued from fabrikam.com must be
    trusted automatically by the
    computers in contoso.com.
    – The computers in contoso.com must not trust automatically any other
    type of certificates issued from the CA hierarchy in fabrikam.com.
    What should you include in the recommendation?

    70-413.Lead2pass.Premium.Exam.229q part2

    A. Deploy a Group Policy object (GPO) that defines intermediate CAs.
    Import a certificate that has an application policy object identifier (OID) of CA Encryption
    Certificate.
    B. Deploy a Group Policy object (GPO) that defines an enterprise trust.
    Import a certificate that has an application policy object identifier (OID) of Microsoft Trust
    List Signing.
    C. Deploy a Group Policy object (GPO) that defines an enterprise trust.
    Import a certificate that has an application policy object identifier (OID) of CA Encryption
    Certificate.
    D. Deploy a Group Policy object (GPO) that defines intermediate CAs.
    Import a certificate that has an application policy object identifier (OID) of Microsoft Trust
    List Signing.
    Answer: B
    QUESTION 134
    Your network contains an Active Directory domain named contoso.com.
    You plan to implement Network Load Balancing (NLB).
    You need to identify which network services and applications can be load balanced by using NLB.
    Which services and applications should you identify?
    A. Microsoft SQL Server 2012 Reporting Services
    B. A failover cluster
    C. A DHCP server
    D. A Microsoft Exchange Server 2010 Mailbox server
    E. A file server
    F. A Microsoft SharePoint Server 2010 front-end Web server
    Answer: AF
    QUESTION 135
    Your network contains an Active Directory domain named contoso.com.
    The domain contains multiple servers that run Windows Server 2012.
    All client computers run Windows 7.
    The network contains two data centers.
    You plan to deploy one file server to each data center.
    You need to recommend a solution to provide redundancy for shared folders if a single data center
    fails.
    What should you recommend? More than one answer choice may achieve the goal. Select the
    BEST answer.
    A. A Distributed File System (DFS) namespace and DFS Replication
    B. Cluster Shared Volumes (CSVs)
    C. The clustered File Server role of the File Server for general use type
    D. The clustered File Server role of the File Server scale-out application data type
    Answer: A
    QUESTION 136
    You have a Windows Server 2012 R2 failover cluster that contains four nodes.
    Each node has four network adapters.

    70-413.Lead2pass.Premium.Exam.229q part2

    You need to ensure that ClusterNetwork4 is used for Cluster Shared Volume (CSV) redirected traffic.
    What should you do?
    A. Set the metric of ClusterNetwork4 to 90,000 and disable SMB Multichannel.
    B. On each server, replace NIC4 with a 1-Gbps network adapter.
    C. Set the metric of ClusterNetwork4 to 30,000 and disable SMB Multichannel.
    D. On each server, enable RDMA on NIC4.
    Answer: C
    QUESTION 137
    Your network contains an Active Directory domain named contoso.com.
    The domain contains 200 servers that run either Windows Server 2012 R2, Windows Server 2012,
    or Windows Server 2008 R2.
    The servers run the following enterprise applications:
    – Microsoft Exchange Server 2013
    – Microsoft SQL Server 2014
    System Center 2012 R2 Operations Manager is deployed to the domain.
    Operations Manager monitors all of the servers in the domain.
    Audit Collection Services (ACS) is installed.
    You need to recommend a monitoring strategy for the domain that meets the following requirements:
    – A group of administrators must be notified when an error is written to
    the System log on the servers that run Exchange Server 2013.
    – A group of administrators must be notified when a specific event is
    written to The Application log on the servers that run SQL Server 2014.
    What is the best approach to achieve the goal? More than one answer choice may achieve the
    goal. Select the BEST answer.

    A. From Operations Manager, enable audit collection.
    B. From Operations Manager, implement two monitors.
    C. From Computer Management, implement one event subscription.
    D. From Operations Manager, implement two rules.
    Answer: D
    QUESTION 138
    Your company has four offices.
    The offices are located in Montreal, Seattle, New York, and Miami.
    Users access all of the web-based resources by using web proxy servers.
    The IP addresses of the web proxies at each office are configured as shown in the following table.

    70-413.Lead2pass.Premium.Exam.229q part2

    The connections to the web proxies are balanced by using round-robin DNS.
    The company plans to deploy a new application.
    The new application has a farm of front-end web servers that connect to a back-end application
    server.
    When a session to a web server is established, the web server stores data until the session closes.
    Once the session closes, the data is sent to the application server.
    You need to ensure that the incoming sessions to the web server farm are distributed among the
    web servers.
    The solution must ensure that if a web server fails, the users are NOT directed to the failed server.
    How should you configure the port rule? To answer, select the appropriate options in the answer
    area.

    70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 139
    Your network contains an Active Directory domain named contoso.com.
    The domain contains a Network Load Balancing (NLB) cluster named Cluster1 that contains four
    nodes. Cluster1 hosts a web application named App1.
    The session state information of App1 is stored in a Microsoft SQL Server 2012 database.
    The network contains four subnets.
    You discover that all of the users from a subnet named Subnet1 always connect to the same NLB
    node.
    You need to ensure that all of the users from each of the subnets connect equally across all of the
    nodes in Cluster1.
    What should you modify from the port settings? To answer, select the appropriate setting in the
    answer area.

    70-413.Lead2pass.Premium.Exam.229q part2

    Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 140
    Your network contains an Active Directory domain named contoso.com.
    The domain contains two domain controllers named DC1 and DC2.
    The domain contains a server named Server1.
    Server1 is a certification authority (CA).
    All servers run Windows Server 2012 R2.
    You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers.
    The unique identifier for your organization is set to Contoso.
    You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data
    recovery agent.
    You must be able to perform the recovery from any administrative computer.
    Which four actions should you perform in sequence? To answer, move the appropriate actions from
    the list of actions to the answer area and arrange them in the correct order.

    70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 141
    You plan to deploy a certification authority (CA) infrastructure that contains the following servers:
    – An offline standalone root CA named CA1
    – An enterprise subordinate CA named CA2
    On all of the computers, you import the root CA certificate from CA1 to the Trusted Root Certification
    Authorities Certificates store.
    You need to ensure that CA2 can issue certificates for the CA hierarchy.
    What should you do? To answer, select the appropriate options in the answer area.

    70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 142
    Your network contains five physical servers.
    The servers are configured as shown in the following table.

    70-413.Lead2pass.Premium.Exam.229q part2

    All servers run Windows Server 2012 R2.
    During the setup of VMM, you configure distributed key management.
    You need to ensure that the entire VMM infrastructure can be restored.
    What should you include in the backup plan? To answer, select the appropriate server to back up
    for each backup content type in the answer.

    70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 143
    Your network contains an Active Directory domain named contoso.com.
    All servers run Windows Server 2012 R2. System Center 2012 R2 Virtual Machine Manager (VMM)
    is deployed to the domain.
    In VMM, you create a host group named HostGroup1.
    You add a 16-node Hyper-V failover cluster to HostGroup1.
    From Windows PowerShell, you run the following commands:

    70-413.Lead2pass.Premium.Exam.229q part2 Use the drop-down menus to select the answer choice that completes each statement70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 144
    You are planning to set up a proof-of-concept network virtualization environment.
    The environment will contain three servers.
    The servers will be configured as shown in the following table.

    70-413.Lead2pass.Premium.Exam.229q part2

    You need to enable network connectivity between the virtual machines and Server3.
    Which four actions should you perform in sequence? To answer, move the appropriate actions from
    the list of actions to the answer area and arrange them in the correct order.

    70-413.Lead2pass.Premium.Exam.229q part2 70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 145
    You have a System Center 2012 R2 Virtual Machine Manager (VMM) deployment.
    You implement Hyper-V Recovery Manager for the deployment.
    You create two new clouds named Cloud1 and Cloud2.
    Metadata for both clouds is uploaded to Windows Azure.
    You need to ensure that the virtual machines in Cloud1 are protected by using replicas in Cloud2.
    Where should you perform each action? To answer, select the appropriate tool for each action in
    the answer area.

    70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 146
    Your network contains an Active Directory forest named contoso.com.
    All servers run Windows Server 2012 R2. The forest contains two servers.
    The servers are configured as shown in the following table.

    70-413.Lead2pass.Premium.Exam.229q part2

    You prepare the forest to support Workplace Join and you enable the Device Registration Service
    (DRS) on Server1.
    You need to ensure that Workplace Join meets the following requirements:
    – Application access must be based on device claims.
    – Users who attempt to join their device to the workplace through Server2
    must be prevented from
    locking out their Active Directory account due to invalid credentials.
    Which cmdlet should you run to achieve each requirement? To answer, select the cmdlet for each
    requirement in the answer area.

    70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 147
    What is the minimum number of certificate servers you need to deploy?
    A. 2
    B. 3
    C. 4
    D. 5
    Answer: C
    Explanation:

    70-413.Lead2pass.Premium.Exam.229q part2 70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 148
    Your network contains two servers named Server1 and Server2 that run Windows Server 2012.
    Server1 and Server2 are members of a failover cluster named Cluster1 and are connected to an
    iSCSI Storage Area Network (SAN).
    You need to ensure that you can implement the clustered File Server role of the File Server for
    scale-out application data type for Cluster1.
    What should you install?
    A. The iSCSI Target Server cluster role
    B. The Distributed Transaction Coordinator (DTC) cluster role
    C. The DFS Namespace Server cluster role
    D. A Cluster Shared Volume (CSV)
    Answer: D
    Explanation:

    70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 149
    Your network contains an Active Directory domain named contoso.com.
    The domain contains Server 2012 R2 and has the Hyper-V server role installed.
    You need to log the amount of system resources used by each virtual machine.
    What should you do?
    A. From Windows PowerShell, run the Enable-VMResourceMeteringcmdlet.
    B. From Windows System Resource Manager, enable Accounting.
    C. From Windows System Resource Manager, add a resource allocation policy.
    D. From Windows PowerShell, run the Measure-VM cmdlet.
    Answer: A
    Explanation:
    The Enable-VMResourceMeteringcmdlet collects resource utilization data for a virtual machine or
    resource pool.
    QUESTION 150
    Your network contains an Active Directory domain named contoso.com.
    The domain contains a member server named HVServer1.
    HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

    HVServer1 hosts 10 generation 1 virtual machines.
    All of the virtual machines connect to a virtual switch named Switch1.
    Switch1 is configured as a private network.
    All of the virtual machines have the DHCP guard and the router guard settings enabled.
    You install the DHCP server role on a virtual machine named Server1.
    You authorize Server1 as a DHCP server in contoso.com.
    You create an IP scope.
    You discover that the virtual machines connected to Switch1 do not receive IP settings from
    Server1.
    You need to ensure that the virtual machines can use Server1 as a DHCP server.
    What should you do?
    A. Enable MAC address spoofing on Server1.
    B. Enable single-root I/O visualization (SR-IOV) on Server1.
    C. Disable the DHCP guard on Server1.
    D. Disable the DHCP guard on all of the virtual machines that are DHCP clients.
    Answer: C
    Explanation:
    DHCP guard setting
    This setting stops the virtual machine from making DHCP offers over this network interface.
    To be clear this does not affect the ability to receive a DHCP offer (i.e. if you need to use DHCP
    to acquire an IP address that will work) it only blocks the ability for the virtual machine to act as a
    DHCP server.
    QUESTION 151
    You have a server named Server1 that runs Windows Server 2012 R2.
    You plan to enable Hyper-V Network Virtualization on Server1.
    You need to install the Windows Network Virtualization Filter Driver on Server1.
    Which Windows PowerShell cmdlet should you run?
    A. Set-NetVirtualizationGlobal
    B. Enable-NetAdapterBinding
    C. Add – WindowsFeature
    D. Set-NetAdapterVmq
    Answer: B
    Explanation:
    Hyper-V Network Virtrtualization runs multiple virtual networks on a physical network. And each
    virtual network operates as if it is running as a physical network. The The Set-NetAdaptercmdlet
    sets the basic properties of a network adapter such as virtual LAN (VLAN) identifier (ID) and MAC
    address. Thus if you add the binding parameter to the command then you will be able to install
    the Windows Network Virtualization Filter Driver.
    Step one: Enable Windows Network Virtualization (WNV). This is a binding that is applied to the
    NIC that you External Virtual Switch is bound to. This can be a physical NIC, it can be an LBFO
    NIC team. Either way, it is the network adapter that your External Virtual Switch uses to exit the
    server. This also means that if you have multiple virtual networks or multiple interfaces that you
    can pick and choose and it is not some global setting.If you have one External Virtual Switch this
    is fairly easy:
    $vSwitch = Get-VMSwitch -SwitchType External# Check if Network Virtualization is bound#
    This could be done by checking for the binding and seeing if it is enabledForEach-Object –
    InputObject $vSwitch {if ((Get-NetAdapterBinding -ComponentID "ms_netwnv" –
    InterfaceDescription $_.NetAdapterInterfaceDescription).Enabled -eq $false){ # Lets enable
    itEnable-NetAdapterBinding -InterfaceDescription $_.NetAdapterInterfaceDescription –

    ComponentID "ms_netwnv"}}
    QUESTION 152
    Your network contains an Active Directory domain named contoso.com.
    You install Windows Server 2012 R2 on a new server named Server1 and you join Server1 to the
    domain.
    You need to ensure that you can view processor usage and memory usage information in Server
    Manager.
    What should you do?
    A. From Server Manager, click Configure Performance Alerts.
    B. From Performance Monitor, create a Data Collector Set (DCS).
    C. From Performance Monitor, start the System Performance Data Collector Set (DCS).
    D. From Server Manager, click Start Performance Counters.
    Answer: D
    Explanation:
    You should navigate to the Server Manager snap-in and there click on All Servers, and then
    Performance Counters. The Performance Counters, when started can be set to collect and
    display data regarding processor usage, memory usage, amongst many other resources like diskrelated
    and security related data, that can be monitored.
    http://technet.microsoft.com/en-us/library/bb734903.aspx
    QUESTION 153
    Your network contains an Active Directory domain named contoso.com.
    The domain contains a server named Server1 that runs Windows Server 2012 R2.
    Server1 has the Hyper-V server role installed.
    The domain contains a virtual machine named VM1.
    A developer wants to attach a debugger to VM1.
    You need to ensure that the developer can connect to VM1 by using a named pipe.
    Which virtual machine setting should you configure?
    A. BIOS
    B. Network Adapter
    C. COM 1
    D. Processor
    Answer: C
    Explanation:
    Named pipes can be used to connect to a virtual machine by configuring COM 1.
    http://support.microsoft.com/kb/819036
    http://support.microsoft.com/kb/141709
    QUESTION 154
    Your network contains an Active Directory domain named contoso.com.
    The domain contains a member server named Server 1.
    Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
    You create an external virtual switch named Switch1.
    Switch1 has the following configurations:
    – Connection type: External network
    – Single-root I/O virtualization (SR-IOV): Enabled

    Ten virtual machines connect to Switch1.
    You need to ensure that all of the virtual machines that connect to Switch1 are isolated from the
    external network and can connect to each other only.
    The solution must minimize network downtime for the virtual machines.
    What should you do?
    A. Remove Switch1 and recreate Switch1 as an internal network.
    B. Change the Connection type of Switch1 to Private network.
    C. Change the Connection type of Switch1 to Internal network.
    D. Remove Switch1 and recreate Switch1 as a private network.
    Answer: B
    Explanation:
    You can change the connection type of a virtual switch from the virtual switch manager without
    having to remove it. A private virtual network is isolated from all external network traffic on the
    virtualization server, as well any network traffic between the management operating system and
    the external network. This type of network is useful when you need to create an isolated
    networking environment, such as an isolated test domain.
    http://technet.microsoft.com/en-us/library/cc816585%28v=WS.10%29.aspx
    http://blogs.technet.com/b/jhoward/archive/2008/06/17/hyper-v-what-are-the-uses-for-differenttypes-
    of-virtual-networks.aspx
    QUESTION 155
    Your network contains two Hyper-V hosts named Host1 and Host2.
    Host1 contains a virtual machine named VM1.
    Host2 contains a virtual machine named VM2.
    VM1 and VM2 run Windows Server 2012 R2.
    You install the Network Load Balancing feature on VM1 and VM2.
    You need to ensure that the virtual machines are configured to support Network Load Balancing
    (NLB).
    Which virtual machine settings should you configure on VM1 and VM2?
    A. DHCP guard
    B. MAC address
    C. Router guard
    D. Port mirroring
    Answer: B
    Explanation:
    When MAC addresses are not assigned to virtual machines, it could cause network problems.
    http://blogs.msdn.com/b/clustering/archive/2010/07/01/10033544.aspx
    QUESTION 156
    Your network contains an Active Directory domain named contoso.com.
    The domain contains a server named Server1.
    Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
    On Server1, an administrator creates a virtual machine named VM1.
    A user named User1 is the member of the local Administrators group on Server1.
    User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the Exhibit
    button.)

    70-413.Lead2pass.Premium.Exam.229q part2

    You need to ensure that User1 can modify the settings of VM1 by running the Set-Vmcmdlet.
    What should you instruct User1 to do?
    A. Run Windows PowerShell with elevated privileges.
    B. Install the Integration Services on VM1.
    C. Modify the membership of the local Hyper-V Administrators group.
    D. Import the Hyper-V module.
    Answer: A
    Explanation:
    You can only use the PowerShell snap-in to modify the VM settings with the vmcmdlets when you
    are an Administrator.
    Thus best practices dictate that User1 run the Powershell with elevated privileges.
    http://technet.microsoft.com/en-us/library/jj713439.aspx
    QUESTION 157
    Your network contains an Active Directory domain named contoso.com.
    The domain contains two member servers named Server1 and Server2.
    All servers run Windows Server 2012 R2.
    Server1 and Server2 have the Failover Clustering feature installed.
    The servers are configured as nodes in a failover cluster named Cluster1.
    Cluster1 has access to four physical disks.
    The disks are configured as shown in the following table.

    70-413.Lead2pass.Premium.Exam.229q part2

    You need to ensure that all of the disks can be added to a Cluster Shared Volume (CSV).
    Which two actions should you perform? (Each correct answer presents part of the solution.
    Choose two.)
    A. Enable BitLocker on Disk4.
    B. Disable BitLocker on Disk1.
    C. Format Disk2 to use NTFS.
    D. Format Disk3 to use NTFS.
    Answer: CD
    Explanation:

    You cannot use a disk for a CSV that is formatted with FAT, FAT32, or Resilient File System (ReFS).
    QUESTION 158
    Your network contains three servers named HV1, HV2, and Server1 that run Windows Server
    2012 R2. HV1 and HV2 have the Hyper-V server role installed.
    Server1 is a file server that contains 3 TB of free disk space.
    HV1 hosts a virtual machine named VM1. The virtual machine configuration file for VM1 is stored
    in D:\VM and the virtual hard disk file is stored in E:\VHD.
    You plan to replace drive E with a larger volume.
    You need to ensure that VM1 remains available from HV1 while drive E is being replaced.
    You want to achieve this goal by using the minimum amount of administrative effort.
    What should you do?
    A. Perform a live migration to HV2.
    B. Add HV1 and HV2 as nodes in a failover cluster.
    Perform a storage migration to HV2.
    C. Add HV1 and HV2 as nodes in a failover cluster.
    Perform a live migration to HV2.
    D. Perform a storage migration to Server1.
    Answer: D
    QUESTION 159
    Hotspot Question
    Your network contains an Active Directory domain named contoso.com.
    You have a failover cluster named Cluster1 that contains two nodes named Server1 and Server2.
    Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed.
    You plan to create two virtual machines that will run an application named App1.
    App1 will store data on a virtual hard drive named App1data.vhdx.
    App1data.vhdx will be shared by both virtual machines.
    The network contains the following shared folders:
    – An SMB file share named Share1 that is hosted on a Scale-Out File Server.
    – An SMB file share named Share2 that is hosted on a standalone file
    server.
    – An NFS share named Share3 that is hosted on a standalone file server.
    You need to ensure that both virtual machines can use App1data.vhdx simultaneously.
    What should you do? To answer, select the appropriate configurations in the answer area.

    image

    Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 160
    You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.
    Server1 hosts 50 virtual machines that run Windows Server 2012 R2.
    Your company uses smart cards for authentication.
    You need to ensure that you can use smart card authentication when you connect to the virtual
    machine by using Virtual Machine Connection.
    What should you configure?
    A. The NUMA Spanning settings
    B. The RemoteFX settings
    C. The Enhanced Session Mode Policy
    D. The Integration Services settings
    Answer: C
    QUESTION 161
    You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.
    Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
    VM1 has several snapshots.
    You need to modify the snapshot file location of VM1.
    What should you do?
    A. Delete the existing snapshots, and then modify the settings of VM1.
    B. Right-click VM1, and then click Move. ..
    C. Right-click VM1, and then click Export…
    D. PauseVM1, and then modify the settings of VM1.
    Answer: A
    Explanation:
    You will need to navigate to the Hyper-V Management snap-in
    (C:\ProgramData\Microsoft\Windows\Hyper-V) and from there access the Snapshot file Location
    tab where you can change the settings for the VM1 snapshot file location. However, since there
    are already several snapshots in existence, you will need to delete them first because you will not
    be able to change the location of the snapshot file while there is an existing snapshot.
    You need to modify the snapshot file location of VM1.

    QUESTION 162
    Your network contains an Active Directory domain named contoso.com.
    The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows
    Server 2012 R2.
    All servers have the Hyper-V server role and the Failover Clustering feature installed.

    70-413.Lead2pass.Premium.Exam.229q part2

    You need to replicate virtual machines from Cluster1 to Cluster2.
    Which three actions should you perform? (Each correct answer presents part of the solution.
    Choose three.)
    A. From Hyper-V Manager on a node in Cluster2, create three virtual machines.
    B. From Cluster2, add and configure the Hyper-V Replica Broker role.
    C. From Failover Cluster Manager on Cluster1, configure each virtual machine for replication.
    D. From Cluster1, add and configure the Hyper-V Replica Broker role.
    E. From Hyper-V Manager on a node in Cluster2 modify the Hyper-V settings.
    Answer: BCD
    Explanation:
    These are two clusters, to replicate any VM to a cluster you need to configure the Replica Broker
    role on each cluster the last step should be enabling replication on the VMs.
    Case Study 5: Contoso Ltd Case B (QUESTION 163 – QUESTION 168)
    Background
    Overview
    Contoso, Ltd., is a software development company. The company has a main office in Seattle
    and branch offices that are located in Los Angeles and New Delhi. Contoso’s sales staff are all
    located in the Los Angeles office. Contoso’s software developers are all located in the New Delhi
    office.
    Current Environment
    The network for the Seattle office contains:
    – 2 domain controllers with integrated DNS
    – 200 Windows workstations
    – 14-node Hyper-V cluster
    – 1 file server with multiple shares
    – 1 Active Directory Rights Management Services (AD RMS) cluster
    The network for the Los Angeles office contains:
    – 2 domain controllers with integrated DNS
    – 100 Windows workstations
    – 1 file server with multiple shares

    The network for the New Delhi office contains:
    – 2 domain controllers with integrated DNS
    – 300 Windows workstations
    – 10 Hyper-V servers that host 100 development virtual machines (VMs)
    – 50 production virtual machines that are hosted in Azure
    All the Contoso offices connect to each other by using VPN links, and each office is connected to
    the Internet.
    Contoso has a single Active Directory Domain Services (AD DS) domain named contoso.com.
    Contoso.com has a configured certification authority (CA). Contoso currently leverages System
    Center Virtual Machine Manager 2012 R2 to manage its virtual environment servers.
    Contoso uses an application named HRApp1 for its human resources (HR) department. HR users
    report that the application stops responding and must be restarted before they can continue their
    work.
    Fabrikam Inc
    Contoso has recently acquired Fabrikam. Inc. Fabrikam has a single office that is located in
    Seattle.
    Fabrikam has a single AD DS domain named fabrikam.com.
    The network for Fabrikam contains:
    – 2 domain controllers with Active Directory-integrated DNS
    – 150 Windows workstations
    – 5 Hyper-V servers
    – 1 file server with multiple shares
    A two-way trust exists between Contoso.com and Fabrikam.com.
    Business Requirements
    Consolidation
    Contoso must complete the consolidation of the Contoso and Fabrikam networks.
    The consolidation of the two networks must:
    – Minimize all hardware and software costs.
    – Minimize WAN traffic.
    – Enable the users by providing self-service whenever possible.
    Security
    Contoso requires that all Windows client devices must be encrypted with BitLocker by using the
    Trusted Platform
    The CA for the domain contoso.com must be designated as the resource forest. The domain
    fabrikam.com must leverage certificates that are issued by the domain contoso.com.
    Other Information
    HRApp1
    Each time HRApp1 stops responding and is restarted, an incident must be created and
    associated with the existing problem ticket.
    Development environment
    You have the following requirements:
    – Developers must be able to manage their own VM checkpoints.
    – You must implement a disaster recovery strategy for development
    virtual machines.

    Technical Requirements
    Windows System Updates
    You have the following system update requirements:
    – Consolidate reporting of all software updates in all offices.
    – Software updates must be applied to all Windows devices.
    – Ensure the ability to report on update compliance.
    Monitoring
    You have the following monitoring requirements:
    – Each time HRApp1 shows performance problems, ensure that a ticket is
    created.
    – When performance problems are resolved, ensure that the ticket closes
    automatically.
    Security
    You have the following security requirements:
    – Ensure that all documents are protected.
    – Ensure that contoso.com domain users get use licenses for RMSprotected
    documents from the domain contoso.com.
    – Ensure that fabrikam.com domain users get use licenses for RMSprotected
    documents from the domain contoso.com.
    QUESTION 163
    Drag and Drop Question
    You need to implement the network Unlock feature to meet the BitLocker requirements.
    In which order should you perform the actions? To answer, move all actions from the list of
    actions to the answer area and arrange them in the correct order.

    70-413.Lead2pass.Premium.Exam.229q part2

    Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 164
    You need to ensure that the developers can manage their own virtual machines.
    Solution: You perform the following actions:
    – In Virtual Machine Manager, you create a new user role named DevUsers
    that uses the Application Administrator profile.
    – You grant Checkpoint permissions to the DevUsers role.
    – You distribute the Self-Service Portal URL to the developers.
    Does this meet the goal?
    A. Yes
    B. No
    Answer: B
    QUESTION 165
    This question consists of two statements: One is named Assertion and the other is named
    Reason. Both of these statements may be true; both may be false; or one may be true, while the
    other may be false.
    To answer this question, you must first evaluate whether each statement is true on its own.
    If both statements are true, then you must evaluate whether the Reason (the second statement)
    correctly explains the Assertion (the first statement). You will then select the answer from the list
    of answer choices that matches your evaluation of the two statements.
    Assertion:
    You must implement a Windows Server Gateway in the Seattle office.
    Reason:
    A Windows Server Gateway will prevent users from saving documents outside of the Seattle
    location.
    Evaluate the Assertion and Reason statements and choose the correct answer option.

    A. Both the Assertion and Reason are true, and the Reason is the correct explanation for the
    Assertion.
    B. Both the Assertion and Reason are true, but the Reason is not the correct explanation for the
    Assertion.
    C. The Assertion is true, but the Reason is false.
    D. The Assertion is false, but the Reason is true.
    E. Both the Assertion and the Reason are false.
    Answer: C
    QUESTION 166
    You need to ensure that the developers can manage their own virtual machines.
    Solution: You perform the following tasks:
    – In Virtual Machine Manager, you create a new user role named DevUsers
    that uses the Application Administrator profile,
    – You add the virtual machines to the DevUsers role.
    – You grant Checkpoint permissions to the DevUsers role.
    – You install and configure App Controller.
    – You distribute the App Controller console URL to the developers.
    Does this meet the goal?
    A. Yes
    B. No
    Answer: A
    Explanation:
    Virtual Machine Manager Self-Service Portal The VMM Self-Service Portal is an optional, Webbased
    component that a VMM administrator can install and configure to allow users to create and
    manage their own virtual machines within a controlled environment on a limited group of virtual
    machine hosts. The VMM administrator creates self-service user roles which determine the scope
    of the users’ actions on their own virtual machines. To create, operate, and manage virtual
    machines, self-service users use the Virtual Machine Manager Self-Service Portal. The
    administrator determines which host groups self-service users can create virtual machines on.
    When a self-service user creates a virtual machine, the virtual machine is automatically placed on
    the most suitable host in the host group based on host ratings.
    https://technet.microsoft.com/en-us/library/cc764267.aspx
    QUESTION 167
    You need to design a solution that meets all of the software update requirements.
    Which two actions should you perform? Each correct answer presents part of the solution.
    A. Implement System Center Service Manager.
    B. Deploy a configuration baseline to all devices.
    C. Implement System Center Operations Manager.
    D. Implement System Center Configuration Manager.
    Answer: BC

    QUESTION 168
    This question consists of two statements: One is named Assertion and the other is named
    Reason. Both of these statements may be true; both may be false; or one may be true, while the
    other may be false.
    To answer this question, you must first evaluate whether each statement is true on its own. If both
    statements are true, then you must evaluate whether the Reason (the second statement)
    correctly explains the Assertion (the first statement). You will then select the answer from the list
    of answer choices that matches your evaluation of the two statements.
    Assertion:
    You must implement Azure site recovery between the New Delhi and Seattle offices to meet the
    backup requirements.
    Reason:
    Azure site recovery allows replication and failover of virtual machines on host servers that are
    located in the Virtual Machine Manager cloud.
    Evaluate the Assertion and Reason statements and choose the correct answer option.
    A. Both the Assertion and Reason are true, and the Reason is the correct explanation for the
    Assertion.
    B. Both the Assertion and Reason are true, but the Reason is not the correct explanation for the
    Assertion.
    C. The Assertion is true, but the Reason is false.
    D. The Assertion is false, but the Reason is true.
    E. Both the Assertion and the Reason are false.
    Answer: B
    Case Study 6: Contoso Ltd Case C (QUESTION 169 – QUESTION 178)
    Background
    Overview
    Contoso, Ltd., is a manufacturing company. The company has offices in Chicago and Seattle.
    Each office contains two data centers. All of the data centers and sites for the company have
    network connectivity to each other. The company uses a single Active Directory Domain Services
    (AD DS) domain.
    Contoso is growing rapidly and needs to expand its computer infrastructure.
    Current Environment Chicago Office
    The Chicago office contains a primary data center and a backup data center. A Hyper-V cluster
    named Clusterl.contoso.com resides in the primary data center. The cluster has a multiple
    network path configured. The cluster includes two unused SQL Server virtual machines (VMs)
    named SQL-SERVER1 and SQL-SERVER2. The cluster also includes a Hyper-V Host group
    named Chi-Primary.
    Clusterl.contoso.com contains the following servers:
    – CHI1-HVNODE1.contoso.com
    – CHI1-HVNODE2.contoso.com
    – CHI1-HVNODE3.contoso.com
    – CHI1-HVNODE4.contoso.com
    The backup data center for the Chicago office is located on a Hyper-V cluster named
    Cluster2.contoso.com. The cluster has a single network path configured. The cluster includes a

    Hyper-V Host group named Chi-Backup.
    Cluster2.contoso.com contains the following servers:
    – CHI2-HVNODEl.contoso.com
    – CHI2-HVNODE2.contoso.com
    – CHI2-HVNODE3.contoso.com
    – CHI2-HVNODE4.contoso.com
    In addition, the Chicago office contains two standalone Hyper-V servers named CHIHVSERVER1.
    contoso.com and CHI-HVSERVER2.contoso.com.
    There are also four newly built servers:
    – CHI-SERVERl.contoso.com
    – CHI-SERVER2.contoso.com
    – CHI-SERVER3.contoso.com
    – CHI-SERVER4.contoso.com
    All the servers in the Chicago office run Windows Server 2012. Any future servers that are
    deployed in the Chicago office must also run Windows Server 2012.
    All servers in the Chicaoo office use the subnet 10.20.xx.
    Current Environment Seattle Office
    The Seattle office contains a primary data center and a backup data center. The primary data
    center is located on a Hyper-V cluster named Cluster3.contoso.com. The cluster has a multiple
    network path configured. The cluster includes two unused SQL Server virtual machines named
    SQL-SERVER3 and SQL-SERVERS The cluster includes a Hyper-V Host group named Sea-
    Primary.
    Cluster3.contoso.com contains the following servers:
    – SEA3-HVNODEl.contoso.com
    – SEA3-HVNODE2.contoso.com
    – SEA3-HVNODE3.contoso.com
    – SEA3-HVNODE4.contoso.com
    The backup data center for the Seattle office is located on a Hyper-V cluster named
    Cluster4.contoso.com. The cluster has a single network path configured.
    The cluster includes a Hyper-V Host group named Sea-Backup.
    Cluster4.contoso.com contains the following servers:
    – SEA4-HVNODEl.contoso.com
    – SEA4-HVNODE2.contoso.com
    – SEA4-HVNODE3.contoso.com
    – SEA4-HVNODE4.contoso.com
    In addition, the Seattle office contains two standalone Hyper-V servers named SEAHVSERVERl.
    contoso.com and SEA-HVSERVER2.contoso.com.
    There are also four newly built servers:
    – SEA-SERVERl.contoso.com
    – SEA-SERVER2.contoso.com
    – SEA-SERVER3.contoso.com
    – SEA-SERVER4.contoso.com
    All servers in the Seattle office run Windows Server 2012 R2. Any future servers that are
    deployed in the Seattle office must also run Windows Server 2012 R2.
    All servers in the Seattle office use the subnet 10.10.x.x.

    Business Requirements
    Apps
    Contoso plans to deploy new applications to make its departments more efficient.
    App1
    Contoso must create a new application named App1 for the human resources (HR) department.
    The infrastructure for App1 must reside in a virtual environment and the data files for App1 must
    reside on a single shared disk.
    In addition, the infrastructure for App1 must meet the following requirements:
    – maximize data protection
    – withstand the loss of a single guest virtual machine
    – withstand the loss of a single physical server
    To support App1, Contoso must deploy a new cluster named Applcluster.contoso.com.
    The cluster has the following requirements:
    – It must span multiple sites.
    – It must support dynamic quorums.
    – It must prevent failures caused by a 50% split.
    App2
    Contoso must create a new application named App2. To support App2, Contoso must deploy a
    new SQL Server cluster. The cluster must not be part of the domain.
    The server deployment team that will install the cluster has limited permissions. The server
    deployment team does not have the ability to create objects in Active Directory.
    Virtualization and Storage
    New VMs
    Any new VMs that are deployed to the Hyper-V cluster in Cluster3.contoso.com have the
    following requirements:
    – New SQL Server VMs must be deployed only to odd-numbered servers in
    the cluster.
    – All other new VM guests must be deployed to any available server in
    the cluster.
    New VDE
    The company needs a highly available file share cluster for a new Virtual Desktop Environment
    (VDE). It has the following requirements:
    – The file share cluster must withstand the loss of a single server.
    – The file share cluster must withstand the loss of a single network
    path.
    – The file share cluster must use the least amount of disk space.
    New virtualized SQL Server cluster
    Contoso must create a new application for manufacturing. The company needs a new virtualized
    SQL Server cluster named VM-SQLclusterl.contoso.com.
    It has the following requirements:
    – The cluster must use a shared virtual hard disk.
    – The cluster must have two nodes named VM-SQL-NODE1.contoso.com and
    VM-SQL-NODE2.contoso.com.

    Highly available storage solution
    The company is deploying new hardware that will replace the existing Hyper-V clusters.
    The new file share cluster must have a highly available storage solution for a Hyper-V
    environment.
    It has the following requirements:
    – The new file share cluster must support guest VM clusters.
    – The storage cannot reside on any of the physical Hyper-V hosts.
    QUESTION 169
    You need to enable virtual machine network health detection on all supported clusters.
    What should you do?
    A. On the virtual machine settings page for Cluster4, select the Protect network checkbox for
    each virtual machine on the cluster.
    B. On the virtual machine settings page for Cluster1, select the Protect network checkbox for
    each virtual machine on the cluster.
    C. On each guest virtual machine in Cluster4, configure protected access for the network
    interface card.
    D. On each guest virtual machine in Cluster3, configure protected access for the network
    interface card.
    E. On the virtual machine settings page for Cluster3, select the Protect network checkbox for
    each virtual machine on the cluster.
    F. On each guest virtual machine in Cluster1, configure protected access for the network
    interface card.
    Answer: B
    QUESTION 170
    Hotspot Question
    You plan to configure Windows Network Load Balancing (NLB) for a company.
    You display following Network Load Balancing Manager window:

    70-413.Lead2pass.Premium.Exam.229q part2

    Use the drop-down menus to select the answer choice that answers each question based on the
    information presented in the graphic.

    70-413.Lead2pass.Premium.Exam.229q part2

    Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 171
    Drag and Drop Question
    You need to implement Windows Network Load Balancing (NLB).
    Which three actions should you perform in sequence? To answer, move the appropriate actions

    from the list of actions to the answer area and arrange them in correct order.70-413.Lead2pass.Premium.Exam.229q part2 Answer:70-413.Lead2pass.Premium.Exam.229q part2

    QUESTION 172
    Drag and Drop Question
    You need to collect the required security logs.
    Which three actions should you perform in sequence? To answer, move the appropriate actions
    from the list of actions to the answer area and arrange them in the correct order.

    70-413.Lead2pass.Premium.Exam.229q part2

      ES TK PS AT OB
     

    Examsavior

    Test King

    Pass4sure

    Actual Tests

    Other Brands

    Customer Reviews 5stars 1star 1star 1star 1star
     

    $89.99

    $124.99

    $125.99

    $189.00

    $29.99~$49.99

    Up-To-Dated Available NotAvailable NotAvailable NotAvailable NotAvailable
    Real Questions & Answers Available NotAvailable NotAvailable NotAvailable NotAvailable
    Correct All Error Available NotAvailable NotAvailable NotAvailable NotAvailable
    Premium VCE Dumps Available NotAvailable NotAvailable NotAvailable NotAvailable
    Free VCE Simulator Available NotAvailable NotAvailable NotAvailable NotAvailable
    Unlimited After One Time Purchasing Available NotAvailable NotAvailable NotAvailable NotAvailable
    Instant Download Available NotAvailable NotAvailable NotAvailable NotAvailable
    Printable PDF Dumps Available NotAvailable NotAvailable NotAvailable NotAvailable
    100% Pass Guarantee Available NotAvailable NotAvailable NotAvailable NotAvailable
    100% Money Back Available NotAvailable NotAvailable NotAvailable NotAvailable

    100% Pass:http://examsavior.com/

    94 Total Views 1 Views Today

    Topics: Microsoft | Comments Off on 70-413.Lead2pass.Premium.Exam.229q part2

    Tagged with:

    Comments are closed.