Tuesday, July 26, 2016

70-414.lead2pass.Premium.Exam.229q part2

QUESTION 73
You need to recommend which type of clustered file server and which type of file share must be
used in the Hyper-V cluster that hosts App2.
The solution must meet the technical requirements and the security requirements.
What should you recommend?
A. A scale-out file server that uses an NFS share
B. A file server that uses an SMB share
C. A scale-out file server that uses an SMB share
D. A file server that uses an NFS share
Answer: C
Explanation:
70-414.lead2pass.Premium.Exam.229q part2
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 74
You need to recommend a solution that meets the notification requirements.
Which System Center 2012 components should you include in the recommendation?
A. Operations Manager, Service Manager and Orchestrator
B. Configuration Manager, Service Manager and Orchestrator
C. App Controller, Configuration Manager and Operations Manager
D. Service Manager, Orchestrator and App Controller
Answer: A
Explanation:

70-414.lead2pass.Premium.Exam.229q part2
QUESTION 75
You are configuring the Certification Authority role service.
From the Certification Authority console, you enable logging.
You need to ensure that configuration changes to the certification authority (CA) are logged.
Which audit policy should you configure?
A. Audit policy change
B. Audit privilege use
C. Audit system events
D. Audit object access
Answer: D
Explanation:

70-414.lead2pass.Premium.Exam.229q part2
 70-414.lead2pass.Premium.Exam.229q part2
QUESTION 76
You need to recommend a solution to maintain a copy of App2.
The solution must meet the application requirements and must minimize additional hardware
purchases.
What should you include in the recommendation?
A. Multi-site Failover Clustering
B. Hyper-V replicas
C. Single-site Failover Clustering
D. Distributed File System (DFS) Replication
Answer: B
Explanation:

70-414.lead2pass.Premium.Exam.229q part2
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 77
You need to recommend a solution that meets the security requirements for Group1.
To which System Center 2012 Virtual Machine Manager (VMM) group should you assign
Group1?
A. Read-Only Administrator
B. Administrators
C. Delegated Administrator
D. Self-Service User
Answer: D
Explanation:

70-414.lead2pass.Premium.Exam.229q part2
QUESTION 78
You need to recommend which Certificate Services role service must be deployed to the
perimeter network.
The solution must meet the technical requirements.
Which Certificate Services role services should you recommend?
A. Certificate Enrollment Web Service and Certificate Enrollment Policy Web Service
B. Certificate Enrollment Policy Web Service and Certification Authority Web Enrollment
C. Online Responder and Network Device Enrollment Service
D. Online Responder and Certificate Enrollment Web Service
Answer: A
Explanation:
70-414.lead2pass.Premium.Exam.229q part2
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 79
You have a service template to deploy Appl.
You are evaluating the use of Network Load Balancing (NLB) for the front-end servers used by
Appl.
You need to recommend which component must be added to the service template.
What should you recommend?
A. Guest OS profile
B. A host profile
C. A capability profile
D. A VIP template
Answer: D
Explanation:
70-414.lead2pass.Premium.Exam.229q part2
 70-414.lead2pass.Premium.Exam.229q part2
QUESTION 80
You need to recommend a storage solution for the App1 VHDs.
The solution must minimize downtime if a Hyper-V host fails.
What should you include in the recommendation?
A. Distributed File System (DFS) Replication
B. A clustered file server of the File Server for general use type
C. A Distributed File System (DFS) namespace
D. A clustered file server of the File Server for scale-out application data type
Answer: D
Explanation:

70-414.lead2pass.Premium.Exam.229q part2
 70-414.lead2pass.Premium.Exam.229q part2
QUESTION 81
You are evaluating the deployment of a multi-site Hyper-V failover cluster in the Miami office and
the Seattle office to host App2.
You need to identify which changes must be made to support the use of the multi-site cluster.
Which changes should you identify?
A. Purchase a storage solution that replicates the virtual machines.
Configure all of the virtual machines to use dynamic memory.
B. Upgrade the WAN link between the Miami and Seattle offices.
Purchase a storage solution that replicates the virtual machines.
C. Configure all of the virtual machines to use dynamic memory.
Implement Distributed File System (DFS) Replication and store the virtual machine files in a

replicated folder.
D. Implement Distributed File System (DFS) Replication and store the virtual machine files in a
replicated folder.
Upgrade the WAN link between the Miami and Seattle offices.
Answer: B
Explanation:
You must have a Fast WAN for Multisite clustering and DFS doesn't work for multisite Hyper-V
Clusters
http://technet.microsoft.com/en-us/library/dd197575%28v=ws.10%29.aspx
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 82
You need to recommend a software update solution that meets the technical requirements.
What should you recommend deploying to each branch office?
A. An endpoint protection point
B. A distribution point
C. A management point
D. An enrollment proxy point
Answer: B
Explanation:
70-414.lead2pass.Premium.Exam.229q part2
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 83
You need to recommend which type of clustered file server and which type of file share must be
used in the Hyper-V cluster that hosts App2.
The solution must meet the technical requirements and the security requirements.
Solution: You recommend a scale-out file server that uses an SMB share.
Does this meet the goal?
A. Yes
B. No
Answer: A
QUESTION 84
You need to recommend which type of clustered file server and which type of file share must be
used in the Hyper-V cluster that hosts App2.
The solution must meet the technical requirements and the security requirements.
Solution: You recommend a scale-out file server that uses an NFS share.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 85
Your network contains a Microsoft System Center 2012 Virtual Machine Manager (VMM)
infrastructure.
You plan to provide self-service users with the ability to create virtual machines that run Windows
Server 2012 and have the following configurations:
- 8 GB of memory
- The File Server server role
- Windows Internal Database
- A local Administrator password set to 'P@$$w0rd''
You have a VHD that contains a generalized version of Windows Server 2012.
You need to ensure that the self-service users can provision virtual machines that are based on
the VHD.
What should you create? (Each correct answer presents part of the solution. Choose all that
apply.)
A. A Hardware Profile
B. An Application Profile
C. An Application Host Profile
D. A VM Template
E. A Guest OS Profile
Answer: ADE
Explanation:
http://technet.microsoft.com/en-us/library/hh368987.aspx
70-414.lead2pass.Premium.Exam.229q part2
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 86
Your network contains an Active Directory domain named contoso.com.
The domain contains multiple servers that are configured as Hyper-V hosts.
You plan to implement four virtual machines.
The virtual machines will be configured as shown in the following table.
70-414.lead2pass.Premium.Exam.229q part2
You need to identify which network must be added to each virtual machine.
Which network types should you identify? To answer, drag the appropriate Network Type to the
correct virtual machine in the answer area. Each Network Type may be used once, more than
once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to
view content.
70-414.lead2pass.Premium.Exam.229q part2
 Answer:70-414.lead2pass.Premium.Exam.229q part2
Explanation:
http://blogs.technet.com/b/jhoward/archive/2008/06/17/hyper-v-what-are-the-uses-for-differenttypes-
of-virtual-networks.aspx
An external network, which provides communication between a virtual machine and a physical
network by creating an association to a physical network adapter on the virtualization server.
An internal network, which provides communication between the virtualization server and virtual
machines.
A private network, which provides communication between virtual machines only.
http://technet.microsoft.com/en-us/library/cc732470%28v=WS.10%29.aspx

QUESTION 87
Your network contains a Hyper-V cluster named Cluster1.
You install Microsoft System Center 2012 Virtual Machine Manager (VMM).
You create a user account for another administrator named User1.
You plan to provide User1 with the ability to manage only the virtual machines that User1 creates.
You need to identify what must be created before you delegate the required permissions.
What should you identify?
A. A cloud
B. A service template
C. A host group
D. A Delegated Administrator
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/gg610645.aspx
You can assign host groups to the Delegated Administrator and the Read-Only Administrator user
roles to scope the user roles to specific host groups.
Members of these user roles can view and manage the fabric resources that are assigned to
them at the host group level.
You can create a private cloud from resources in host groups.
When you create a private cloud, you select which host groups will be part of the private cloud.
You can then allocate all or some of the resources from the selected host groups to the private
cloud.
QUESTION 88
Your network contains four servers,
The servers are configured as shown in the following table.
You manage all of the servers and all of the clusters by using Microsoft System Center 2012
Virtual Machine Manager (VMM).
You plan to implement Dynamic Optimization for the virtual machines.
You need to recommend a configuration for the planned implementation.
What should you recommend?
70-414.lead2pass.Premium.Exam.229q part2
A. Dynamic Optimization on Cluster3 and Cluster4 only
Virtual machines that are balanced across the clusters
B. Dynamic Optimization on all of the clusters
Virtual machines that are balanced across the nodes in the clusters
C. Dynamic Optimization on all of the clusters
Virtual machines that are balanced across the clusters
D. Dynamic Optimization on Cluster1 and Cluster2 only
Virtual machines that are balanced across the nodes in the clusters
Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/gg675109.aspx
70-414.lead2pass.Premium.Exam.229q part2
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 89
Your network contains two servers that run Windows Server 2012.
The servers are members of a failover cluster.
Each server has 32 GB of RAM and has the Hyper-V server role installed.
Each server hosts three highly available virtual machines.
All of the virtual machines have an application named App1 installed.
Each of the virtual machines is configured to have 4 GB of memory.
During regular business hours, the virtual machines use less than 2 GB of memory.
Each night, App1 truncates its logs and uses almost 4 GB of memory.
You plan to add another three virtual machines to each host.
The new virtual machines will run the same load as the existing virtual machines.
You need to ensure that all of the virtual machines can run on one of the Hyper-V hosts if a single
host fails.
What should you do?
Answer: D
Explanation:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 90
Your network contains an Active Directory domain.
The domain contains 10 file servers.
The file servers connect to a Fibre Channel SAN.
You plan to implement 20 Hyper-V hosts in a failover cluster.
The Hyper-V hosts will not have host bus adapters (HBAs).
You need to recommend a solution for the planned implementation that meets the following
requirements:
- The virtual machines must support live migration.
- The virtual hard disks (VHDs) must be stored on the file servers.
Which two technologies achieve the goal? Each correct answer presents a complete solution.
A. Cluster Shared Volume (CSV)
B. An NFS share
C. Storage pools
D. SMB 3.0 shares
Answer: CD
QUESTION 91
Your network contains two servers named Server1 and Server2 that run Windows Server 2012.
Server1 and Server2 have the Hyper-V server role installed and are members of a failover
cluster.
The network contains a Storage Area Network (SAN) that has a LUN named LUN1.
LUN1 is connected to a 12-TB disk on the SAN.
You plan to host three new virtual machines on the failover cluster.
Each virtual machine will store up to 4 TB of data on a single disk.
The virtual machines will be backed up from the hosts by using the Volume Shadow Copy
Service (VSS).
You need to ensure that Server1 and Server2 can store the new virtual machines on the SAN.
Which three actions should you perform? To answer, move the three appropriate actions from the
list of actions to the answer area and arrange them in the correct order.
70-414.lead2pass.Premium.Exam.229q part2
Explanation:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 92
Your network contains an Active Directory domain named contoso.com.
The domain contains four servers on a test network.
The servers are configured as shown in the following table.
70-414.lead2pass.Premium.Exam.229q part2
You perform the following tasks:
- On Server2F you create an advanced SMB share named Share2A and an
applications SMB share named Share2B.
- On Server3, you create an advanced SMB share named Share3.
- On Server4, you create an applications SMB share named Share4.
You add Server3 and Server4 to a new failover cluster named Clus1.
On Clus1, you configure the File Server for general use role, you create a quick SMB share named
Share5A, and then you create an applications SMB share named Share5B.
You plan to create a failover cluster of two virtual machines hosted on Server1.
The clustered virtual machines will use shared .vhdx files.
You need to recommend a location to store the shared .vhdx files.
Where should you recommend placing the virtual hard disk (VHD)?
A. \\Server3\Share3
B. \\Server2\Share2B
C. \\Clus1\Share5B
D. \\Server4\Share4
Answer: C
QUESTION 93
Your network contains an Active Directory domain named contoso.com.
All servers run Windows Server 2012 R2.
The network contains a System Center 2012 R2 Data Protection Manager (DPM) deployment.
The domain contains six servers.
The servers are configured as shown in the following table.
You install System Center 2012 R2 Virtual Machine Manager (VMM) on the nodes in Cluster2.
You configure VMM to use a database in Cluster1. Server5 is the first node in the cluster.
You need to back up the VMM encryption key.
What should you back up?
70-414.lead2pass.Premium.Exam.229q part2
A. A full system backup of Server1
B. A full system backup of Server3
C. A backup of the Windows\DigitalLocker folder on Server5
D. A backup of the Windows\DigitalLocker folder on Server1
Answer: A
QUESTION 94
You have a Windows Server 2012 R2 failover cluster that contains four nodes.
The cluster has Dynamic Optimization enabled.
You deploy three highly available virtual machines to the cluster by using System Center 2012 R2
Virtual Machine Manager (VMM).
You need to prevent Dynamic Optimization from placing any of the three virtual machines in the
same node.
What should you do?
A. From the Virtual Machine Manager console, modify the Compatibility settings in the
Hardware Configuration properties of the virtual machines.
B. Set the Priority property of the virtual machine cluster role.
C. From the Virtual Machine Manager console, modify the Servicing Windows settings of the
virtual machines.
D. From the Virtual Machine Manager console, modify the Availability settings in the Hardware
Configuration properties of the virtual machines.
Answer: D
Explanation:
The correct answer in the real exam is Anti Affinity command.
Case Study 3: Proseware Inc (QUESTION 95 - QUESTION 103)
Overview
General Overview
Proseware Inc., is a manufacturing company that has 4,000 employees.
Proseware works with a trading partner named Fabrikam, Inc.
Physical Locations
Proseware has a main office and two branch offices.
The main office is located in London.
The branch offices are located in Madrid and Berlin.
Proseware has a sales department based in the London office and a research department based
in the Berlin office.
The offices connect to each other by using a WAN link.
Each office connects directly to the Internet.
Proseware rents space at a hosting company.
All offices have a dedicated WAN link to the hosting company.
Web servers that are accessible from the Internet are located at the hosting company.
Active Directory
The Proseware network contains an Active Directory forest named proseware.com.
The forest contains a single domain. The forest functional level is Windows Server 2012.
Each office contains three domain controllers. An Active Directory site is configured for each office.
System state backups are performed every day on the domain controllers by using System Center
2012 R2 Data Protection Manager (DPM).
Virtualization
Proseware has Hyper-V hosts that run Windows Server 2012 R2.
Each Hyper-V host manages eight to ten virtual machines.
The Hyper-V hosts are configured as shown in the following table.
70-414.lead2pass.Premium.Exam.229q part2
All of the Hyper-V hosts store virtual machines on direct-attached storage (DAS).
Servers
All servers run Windows Server 2012 R2.
All of the servers are virtualized, except for the Hyper-V hosts.
VDI1 and VDI2 use locally attached storage to host virtual hard disk (VHD) files.
The VHDs use the .vhd format.
A line-of-business application named SalesApp is used by the sales department and runs on a
server named APP1. APP1 is hosted on HyperV2.
A server named CA1 has the Active Directory Certificate Services server role installed and is
configured as an enterprise root certification authority (CA) named ProsewareCA.
Ten load-balanced web servers hosted on HyperV7 and HyperV8 run the Internet-facing web site
that takes orders from Internet customers.
System Center 2012 R2 Operations Manager is used to monitor the health of the servers on the
network.
All of the servers are members of the proseware.com domain, except for the servers located in the
perimeter network.
Client Computers
All client computers run either Windows 8.1 or Windows 7. Some of the users in the London office
connect to pooled virtual desktops hosted on VDI1 and VDI2.
Problem Statements
Proseware identifies the following issues on the network:
Virtualization administrators report that the load on the Hyper-V hosts is inconsistent.
The virtualization administrators also report that administrators fail to account for host utilization
when creating new virtual machines.
Users in the sales department report that they experience issues when they attempt to access
SalesApp from any other network than the one in the London office.
Sometimes, configuration changes are not duplicated properly across the web servers, resulting in
customer ordering issues. Web servers are regularly changed.
Demand for virtual desktops is increasing. Administrators report that storage space is becoming an
issue as they want to add more virtual machines.
In the past, some personally identifiable information (PII) was exposed when paper shredding
procedures were not followed.
Requirements
Planned Changes
Proseware plans to implement the following changes on the network:
- Implement a backup solution for Active Directory.
- Relocate the sales department to the Madrid office.
- Implement System Center 2012 R2 components, as required.
- Protect email attachments sent to Fabrikam that contain PII data so
that the attachments cannot be printed.
- Implement System Center 2012 R2 Virtual Machine Manager (VMM) to manage
the virtual machine infrastructure. Proseware does not plan to use private
clouds in the near future.
- Deploy a new Hyper-V host named RESEARCH1 to the Berlin office.
RESEARCH1 will be financed by the research department. All of the virtual
machines deployed to RESEARCH1 will use VMM templates.
Technical Requirements
Proseware identifies the following virtualization requirements:
- The increased demand for virtual desktops must be met.
- Once System Center is deployed, all of the Hyper-V hosts must be managed
by using VMM.
- If any of the Hyper-V hosts exceeds a set number of virtual machines,
an administrator must be notified by email.
- Network administrators in each location must be responsible for managing
the Hyper-V hosts in their respective location. The management of the
hosts must be performed by using VMM.
- The network technicians in each office must be able to create virtual
machines in their respective office.
- The network technicians must be prevented from modifying the host server
settings.
- New virtual machines must be deployed to RESEARCH1 only if the virtual
machine template used to create the machine has a value specified for a
custom property named CostCenter' that matches Research'.
The web site configurations must be identical on all web servers.
Security Requirements
Proseware identifies the following security requirements:
- All email messages sent to and from Fabrikam must be encrypted by using
digital certificates issued to users by the respective CA of their company.
No other certificates must be trusted between the organizations.
- Microsoft Word documents attached to email messages sent from Proseware
to Fabrikam must be protected.
- Privileges must be minimized, whenever possible.
QUESTION 95
You need to recommend changes to the virtual desktop infrastructure (VDI) environment.
What should you recommend?
A. Implement Hyper-V replication between VDI1 and VDI2.
B. Create new VDI virtual machines that are Generation 2 virtual machines.
C. Convert the existing VHDs to .vhdx format.
D. Move the VHDs to a Cluster Shared Volume (CSV) and implement Data Deduplication on the
CSV.
Answer: D
QUESTION 96
You need to recommend changes to the existing environment to meet the web server requirement.
Which two actions should you recommend? Each Answer presents part of the solution.
A. On one web server, run the Start-DSCConfiguration cmdlet.
Create and run a configuration script.
B. On all of the web servers, install the Windows PowerShell Web Access feature,
and then run the Set-DscLocalConfigurationManager cmdlet.
C. On all of the web servers, configure the Local Configuration Manager settings,
and then run the Set-DscLocalConfigurationManager cmdlet.
D. On one web server, install the Windows PowerShell Desired State Configuration (DSC)
feature. Create and run a configuration script.
Answer: CD
QUESTION 97
You are evaluating the use of VMM to migrate APP1 for the sales users.
You need to identify the effects of the migration.
What should you identify?
A. The VHDs and the virtual machine configuration files will move.
The sales users' access to APP1 will be interrupted.
B. The VHDs will move but the virtual machine configuration files will remain in the original
location.
The sales users will continue to have uninterrupted access to APP1.
C. The virtual machine configuration files will move but the VHDs will remain in the original
location.
The sales users' access to APP1 will be interrupted.
D. The VHDs and the virtual machine configuration files will move.
The sales users will continue to have uninterrupted access to APP1.
Answer: D
QUESTION 98
You need to recommend changes to the existing environment to meet the PII requirement.
What should you recommend?
A. In the Default Domain Policy, configure auto-enrollment for the S/MIME certificates
from ProsewareCA.
B. Create an AD RMS cluster in Proseware, and then provision the user accounts in Proseware
for the Fabrikam users.
C. Configure Active Directory Federation Services (AD FS) in Fabrikam, and then install a
web application proxy in Proseware.
D. In the Default Domain Policy, configure auto-enrollment for the S/MIME certificates
from FabrikamCA.
Answer: B
QUESTION 99
You need to ensure that RESEARCH1 only contains the required virtual machines.
What should you do?
A. Create an availability set.
B. Create a custom placement rule.
C. Set RESEARCH1 as a possible owner.
D. Set RESEARCH1 as a preferred owner.
Answer: B
QUESTION 100
You need to recommend changes to the existing environment to meet the email requirement.
What should you recommend?
A. Implement a two-way forest trust that has selective authentication.
B. Implement qualified subordination.
C. Deploy the FabrikamCA root certificate to all of the client computers.
D. Deploy a user certificate from FabrikamCA to all of the users.
Answer: B
QUESTION 101
You need to implement a solution for the email attachments.
Both organizations exchange root CA certificates and install the certificates in the relevant stores.
You duplicate the Enrollment Agent certificate template and generate a certificate based on the
new template.
Which additional two actions should you perform? Each Answer presents part of the solution.
A. Request cross-certification authority certificates.
B. Create Capolicy.inf files.
C. Request subordinate CA certificates.
D. Create Policy.inf files.
Answer: AD
QUESTION 102
You need to recommend a design that meets the technical requirements for managing the Hyper-
V hosts by using VMM.
What should you recommend? To answer, select the appropriate options in the answer area.
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 103
You need to recommend a monitoring solution for Proseware.
Which three actions should you recommend performing in sequence? To answer, move the
appropriate actions from the list of actions to the answer area and arrange them in the correct order.
70-414.lead2pass.Premium.Exam.229q part2
Case Study 4: Northwind Traders (QUESTION 104 - QUESTION 114)
Overview
Northwind Traders is an IT services and hosting provider.
Northwind Traders has two main data centers in North America.
The data centers are located in the same city.
The data centers connect to each other by using high-bandwidth, low-latency WAN links.
Each data center connects directly to the Internet.
Northwind Traders also has a remote office in Asia that connects to both of the North American
data centers by using a WAN link.
The Asian office has 30 multipurpose servers.
Each North American data center contains two separate network segments.
One network segment is used to host the internal servers of Northwind Traders.
The other network segment is used for the hosted customer environments.
Existing Environment
Active Directory
The network contains an Active Directory forest named northwindtraders.com.
The forest contains a single domain.
All servers run Windows Server 2012 R2.
Server Environment
The network has the following technologies deployed:
- Service Provider Foundation
- Windows Azure Pack for Windows Server
- System Center 2012 R2 Virtual Machine Manager (VMM)
- An Active Directory Rights Management Services (AD RMS) cluster
- An Active Directory Certificate Services (AD CS) enterprise
certification authority (CA)
All newly deployed servers will include the following components:
- Dual 10-GbE Remote Direct Memory Access (RDMA)-capable network adapters
- Dual 1-GbE network adapters
- 128 GB of RAM
Requirements
Business Goals
Northwind Traders will provide hosting services to two customers named Customer1 and
Customer2.
The network of each customer is configured as shown in the following table.
70-414.lead2pass.Premium.Exam.229q part2
Planned Changes
Northwind Traders plans to implement the following changes:
- Deploy System Center 2012 R2 Operations Manager.
- Deploy Windows Server 2012 R2 iSCSI and SMB-based storage.
- Implement Hyper-V Recovery Manager to protect virtual machines.
- Deploy a certificate revocation list (CRL) distribution point (CDP) on
the internal network.
- For Customer 1, install server authentication certificates issued by
the CA of Northwind Traders on the virtual machine in the hosting networks.
General Requirements
Northwind Traders identifies the following requirements:
- Storage traffic must use dedicated adapters.
- All storage and network traffic must be load balanced.
- The amount of network traffic between the internal network and the
hosting network must be minimized.
- The publication of CRLs to CDPs must be automatic.
- Each customer must use dedicated Hyper-V hosts.
- Administrative effort must be minimized, whenever possible.
- All servers and networks must be monitored by using Operations Manager.
- Anonymous access to internal file shares from the hosting network must
be prohibited.
- All Hyper-V hosts must use Cluster Shared Volume (CSV) shared storage
to host virtual machines.
- All Hyper-V storage and network traffic must remain available if single
network adapter fails.
- The Hyper-V hosts connected to the SMB-based storage must be able to
make use of the RDMA technology.
- The number of servers and ports in the hosting environment to which the
customer has access must be minimized.
Customer1 Requirements
Northwind Traders identifies the following requirements for Customer1:
- Customer1 must use SMB-based storage exclusively.
- Customer1 must use App Controller to manage hosted virtual machines.
- The virtual machines of Customer1 must be recoverable if a single data
center fails.
- Customer1 must be able to delegate self-service roles in its hosted
environment to its users.
- Customer1 must be able to check for the revocation of certificates
issued by the CA of Northwind Traders.
- The users of Customer1 must be able to obtain use licenses for documents
protected by the AD RMS of Northwind Traders.
- Certificates issued to the virtual machines of Customer1 that reside on
the hosted networks must be renewed automatically.
Customer2 Requirements
Northwind Traders identifies the following requirements for Customer2:
- Customer2 must use iSCSI-based storage exclusively.
- All of the virtual machines of Customer2 must be migrated by using a
SAN transfer.
- None of the metadata from the virtual machines of Customer2 must be
stored in Windows Azure.
- The network configuration of the Hyper-V hosts for Customer2 must be
controlled by using logical switches.
- The only VMM network port profiles and classifications allowed by
Customer2 must be low-bandwidth, medium-bandwidth, or high-bandwidth.
- The users at Northwind Traders must be able to obtain use licenses for
documents protected by the AD RMS cluster of Customer2. Customer2 plans
to decommission its AD RMS cluster during the next year.
QUESTION 104
You need to recommend a monitoring solution for Northwind Traders.
What is the best approach to achieve the goal? More than one answer choice may achieve the
goal. Select the BEST answer.
A. Three Operations Manager management servers and two Operations Manager gateway
servers
B. One Operations Manager management server
C. Two Operations Manager management servers and three Operations Manager gateway
servers
D. Five Operations Manager management servers
Answer: C
QUESTION 105
You plan to implement a solution that meets the certificate requirements of Customer1.
You need to identify which role services must be deployed to the hosting environment.
Which two role services should you identify? Each Answer presents part of the solution.
A. Certification Authority Web Enrollment
B. Online Responder
C. Certificate Enrollment Policy Web Service
D. Certificate Enrollment Web Service
Answer: CD
QUESTION 106
You need to recommend changes to allow Customer1 to delegate permissions in its hosting
environment to its users.
Where should you recommend performing each task? To answer, select the appropriate location
for each task in the answer area.
70-414.lead2pass.Premium.Exam.229q part2
Answer:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 107
You need to recommend a solution that meets the AD RMS requirements of Customer1 and
Customer2.
Which actions should you recommend performing for each customer? To answer, select the
appropriate customer for each action in the answer area.
70-414.lead2pass.Premium.Exam.229q part2
Answer:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 108
You need to prepare for the migration of virtual machines across the Hyper-V hosts of Customer2.
Which three actions should you perform in sequence? To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.

70-414.lead2pass.Premium.Exam.229q part2
Answer:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 109
You need to recommend a network configuration for the newly deployed Hyper-V hosts used by
Customer1.
On which network adapter should you recommend performing each configuration? To answer,
select the appropriate network adapter for each configuration in the answer area.

70-414.lead2pass.Premium.Exam.229q part2
Answer:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 110
You need to recommend which setting must be applied to the virtualization infrastructure of
Northwind Traders to minimize the impact of multiple virtual machines starting concurrently.
What command should you recommend running? To answer, select the appropriate options in the
answer area.

70-414.lead2pass.Premium.Exam.229q part2
QUESTION 111
You need to prepare the required Hyper-V virtual network components for Customer2.
Which four objects should you create and configure in sequence? To answer, move the appropriate
objects from the list of objects to the answer area and arrange them in the correct order.
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 112
You need to implement a Hyper-V Recovery Manager solution in the hosting environment of
Northwind Traders.
Which four actions should you perform in sequence? To answer, move the appropriate actions from
the list of actions to the answer area and arrange them in the correct order.
70-414.lead2pass.Premium.Exam.229q part2
Answer:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 113
You need to recommend a configuration for the CA extensions of Northwind Traders that meets the

certificate revocation requirement of Customer1.
What should you recommend? To answer, select the appropriate prefix of the target location for the
each extension settings in the answer area.
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 114
Your network contains a main data center and a disaster recovery data center.
Each data center contains a Storage Area Network (SAN).
The main data center contains a two-node failover cluster named Cluster1 that hosts a Microsoft
SQL Server 2012 database named DB1.
The database files in DB1 are stored on the SAN in the main office.
The disaster recovery data center contains a server that runs SQL Server 2012.
You need to recommend a disaster recovery solution for the SQL Server database.
The solution must ensure that the database remains available if the main data center fails.
What should you recommend? More than one answer choice may achieve the goal. Select the
BEST answer.
A. Deploy Distributed File System (DFS) Replication.
B. Extend the failover cluster to the disaster recovery data center.
C. Implement a Cluster Shared Volume (CSV) and move the database files to the CSV.
D. Implement SQL Server database replication between the two data centers.
Answer: D
Explanation:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 115
Your Active Directory currently contains five virtualized domain controllers that run Windows Server
2012 R2.
The system state of each domain controller is backed up daily.
The backups are shipped to a remote location weekly.
Your company recently implemented a disaster recovery site that contains several servers.
The servers run Windows Server 2012 R2 and have the Hyper-V server role installed.
The disaster recovery site has a high-speed WAN link to the main office.
You need to create an Active Directory recovery plan that meets the following requirements:
- Restores the Active Directory if a catastrophe prevents all access to
the main office.
- Minimizes data loss.
What should you include in the plan?
A. Hyper-V replicas
B. Live migration
C. Virtual machine checkpoints
D. System state restores
Answer: A
QUESTION 116
Your network contains 500 client computers that run Windows 7 and a custom application named
App1.
App1 uses data stored in a shared folder.
You have a failover cluster named Cluster1 that contains two servers named Server1 and Server2.
Server1 and Server2 run Windows Server 2012 and are connected to an iSCSI Storage Area
Network (SAN).
You plan to move the shared folder to Cluster1.
You need to recommend which cluster resource must be created to ensure that the shared folder
can be accessed from Cluster1.
What should you recommend? More than one answer choice may achieve the goal. Select the
BEST answer.
A. The Generic Application cluster role
B. The DFS Namespace Server cluster role
C. The clustered File Server role of the File Server for general use type
D. The clustered File Server role of the File Server for scale-out application data type
Answer: C
QUESTION 117
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers.
You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server.
Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2.
All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
virtual machine to an NLB cluster.
The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual
machines.
Solution: From the properties of each virtual machine, you enable MAC address spoofing for the
existing virtual network adapter.
Does this meet the goal?
A. Yes
B. No
Answer: A
QUESTION 118
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers.
You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server.
Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2.
All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
virtual machine to an NLB cluster.
The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual
machines.
Solution: On each Hyper-V server, you create a new external virtual network switch.
From the properties of each virtual machine, you add a second virtual network adapter and connect
the new virtual network adapters to the new external virtual network switches.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 119
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers.
You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server.
Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the
identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
virtual machine to an NLB cluster.
The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual
machines.
Solution: On each Hyper-V server, you create a new private virtual network switch.
From the properties of each virtual machine, you add a second virtual network adapter and connect
the new virtual network adapters to the new private virtual network switches.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 120
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers.
You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server.
Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the
identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each
virtual machine to an NLB cluster.
The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual
machines.
Solution: From the properties of each virtual machine, you add a second virtual network adapter.
You connect the new virtual network adapters to the external virtual network switch and configure
the new virtual network adapters to use a VLAN identifier of 2.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 121
Your network contains an Active Directory domain named contoso.com.
The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template.
Service1 contains two virtual machines.
The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the
availability information of Service1.
You need to recommend a monitoring solution to ensure that an administrator can review the
availability information of Service1.
Solution: From Configuration Manager, you create a Collection and a Desired Configuration
Management baseline.
Does this meet the goal?
70-414.lead2pass.Premium.Exam.229q part2
A. Yes
B. No
Answer: B
QUESTION 122
Your network contains an Active Directory domain named contoso.com.
The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template.
Service1 contains two virtual machines.
The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the
availability information of Service1.
Solution: From Virtual Machine Manager (VMM), you modify the properties of the service template.
Does this meet the goal?
70-414.lead2pass.Premium.Exam.229q part2
A. Yes
B. No
Answer: B
QUESTION 123
Your network contains an Active Directory domain named contoso.com.
The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template.
Service1 contains two virtual machines.
The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the
availability information of Service1.
Solution: From Operations Manager, you create a Distributed Application and a Service Level
Tracking object.
Does this meet the goal?
70-414.lead2pass.Premium.Exam.229q part2
A. Yes
B. No
Answer: A
QUESTION 124
Your network contains an Active Directory domain named contoso.com.
The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template.
Service1 contains two virtual machines.
The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the
availability information of Service1.
Solution: From Operations Manager, you create a Distributed Application and a Monitor Override.
Does this meet the goal?
70-414.lead2pass.Premium.Exam.229q part2
A. Yes
B. No
Answer: B
QUESTION 125
Your network contains an Active Directory domain named contoso.com.
The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
- Ensure that the users can encrypt files by using Encrypting File System
(EFS).
- Ensure that all of the users reenroll for their certificate every six
months.
Solution: You create a copy of the User certificate template, and then you modify the extensions of
the copy.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 126
Your network contains an Active Directory domain named contoso.com.
The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
- Ensure that the users can encrypt files by using Encrypting File System
(EFS).
- Ensure that all of the users reenroll for their certificate every six
months.
Solution: From the properties of the Basic EFS template, you assign the Allow-Enroll permission to
the Authenticated Users group.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 127
Your network contains an Active Directory domain named contoso.com.
The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
- Ensure that the users can encrypt files by using Encrypting File System
(EFS).
- Ensure that all of the users reenroll for their certificate every six
months.
Solution: You create a copy of the Basic EFS certificate template, and then you modify the validity
period of the copy.
Does this meet the goal?
A. Yes
B. No
Answer: A
QUESTION 128
Your network contains an Active Directory domain named contoso.com.
The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
- Ensure that the users can encrypt files by using Encrypting File System
(EFS).
- Ensure that all of the users reenroll for their certificate every six
months.
Solution: From the properties of the User certificate template, you assign the Allow-Enroll
permission to the Authenticated Users group.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 129
Your network contains an Active Directory forest named contoso.com.
The forest contains multiple servers that run Windows Server 2012.
The network contains 1,000 client computers that run Windows 7.
Two hundred remote users have laptop computers and only work from home.
The network does not provide remote access to users.
You need to recommend a monitoring solution to meet the following requirements:
- Generate a list of updates that are applied successfully to all
computers.
- Minimize the amount of bandwidth used to download updates.
- An administrator must approve the installation of an update on any
client computer.
What should you include in the recommendation? (Each Answer presents part of the solution.
Choose all that apply.)
A. Microsoft Asset Inventory Service (AIS)
B. Windows InTune
C. Windows Server Update Services (WSUS)
D. Active Directory Federation Services (AD FS)
E. Microsoft System Center 2012 Service Manager
Answer: ABC
QUESTION 130
Your network contains an Active Directory domain named contoso.com.
The domain contains a System Center 2012 R2 Virtual Machine Manager (VMM) deployment.
The domain contains 20 Hyper-V hosts that run Windows Server 2012 R2. Currently, the computer
accounts of all of the Hyper-V hosts are in organizational unit (OU) named Virtualization.
You plan to create two private clouds by using VMM named Cloud1 and Cloud2.
The virtual machines for Cloud1 will be hosted on two Hyper-V hosts named Server1 and Server2.
The virtual machines for Cloud2 will be hosted on two Hyper-V hosts named Server3 and Server4.
You need to recommend an administrative model for Cloud1 and Cloud2.
Which technology best achieves the goal? More than one answer choice may achieve the goal.
Select the BEST answer.
A. Two sites and two Application Administrator (Self-Service User) user roles
B. Two host groups and two Application Administrator (Self-Service User) user roles
C. Two OUs and two Application Administrator (Self-Service User) user roles
D. Two logical units and two Tenant Administrator user roles
Answer: B
QUESTION 131
Your company has three offices.
The offices are located in Seattle, London, and Tokyo.
The network contains an Active Directory domain named northwindtraders.com.
Each office is configured as an Active Directory site.
System Center 2012 R2 Operations Manager is deployed to the domain.
The servers in all three sites are monitored by using Operations Manager.
The company has a web site for its customers.
The web site requires users to sign-in.
You need to recommend a solution to monitor the web site.
The solution must meet the following requirements:
- Monitor the availability of the web site from locations in North America,
Europe, Asia, and Australia.
- Monitor multi-step requests to the web site.
- Use a central console for monitoring.
What should you include in the recommendation?
A. Import the System Center Global Services Monitoring Management Pack and add the
Web Application Availability Monitoring monitoring type.
B. Add the Web Application Transaction monitoring type and configure watcher nodes.
C. Add the TCP Port monitoring type and configure watcher nodes.
D. Import the System Center Global Services Monitor Management Pack and add the Visual
Studio Web Test Monitoring monitoring type.
Answer: D
QUESTION 132
You have a System Center 2012 R2 Configuration Manager deployment.
All users have client computers that run Windows 8.1.
The users log on to their client computer as standard users.
An application named App1 is deployed to the client computers by using System Center.
You need to recommend a solution to validate a registry key used by App1.
If the registry key has an incorrect value, the value must be changed.
The registry key must be validated every day.
The solution must generate a report on non-compliant computers.
What is the best approach to achieve the goal? More than one answer choice may achieve the
goal. Select the BEST answer.
A. Group Policy preferences
B. A desired configuration baseline
C. The Windows PowerShell Desired State Configuration (DSC) feature
D. The Microsoft Baseline Security Analyzer (MBSA)
Answer: B
QUESTION 133
Your network contains an Active Directory forest named contoso.com.
Your company works with a partner company that has an Active Directory forest named
fabrikam.com.
Both forests contain domain controllers that run only Windows Server 2012 R2.
The certification authority (CA) infrastructure of both companies is configured as shown in the
following table.
You need to recommend a certificate solution that meets the following requirements:
- Server authentication certificates issued from fabrikam.com must be
trusted automatically by the
computers in contoso.com.
- The computers in contoso.com must not trust automatically any other
type of certificates issued from the CA hierarchy in fabrikam.com.
What should you include in the recommendation?
70-414.lead2pass.Premium.Exam.229q part2
A. Deploy a Group Policy object (GPO) that defines intermediate CAs.
Import a certificate that has an application policy object identifier (OID) of CA Encryption
Certificate.
B. Deploy a Group Policy object (GPO) that defines an enterprise trust.
Import a certificate that has an application policy object identifier (OID) of Microsoft Trust
List Signing.
C. Deploy a Group Policy object (GPO) that defines an enterprise trust.
Import a certificate that has an application policy object identifier (OID) of CA Encryption
Certificate.
D. Deploy a Group Policy object (GPO) that defines intermediate CAs.
Import a certificate that has an application policy object identifier (OID) of Microsoft Trust
List Signing.
Answer: B
QUESTION 134
Your network contains an Active Directory domain named contoso.com.
You plan to implement Network Load Balancing (NLB).
You need to identify which network services and applications can be load balanced by using NLB.
Which services and applications should you identify?
A. Microsoft SQL Server 2012 Reporting Services
B. A failover cluster
C. A DHCP server
D. A Microsoft Exchange Server 2010 Mailbox server
E. A file server
F. A Microsoft SharePoint Server 2010 front-end Web server
Answer: AF
QUESTION 135
Your network contains an Active Directory domain named contoso.com.
The domain contains multiple servers that run Windows Server 2012.
All client computers run Windows 7.
The network contains two data centers.
You plan to deploy one file server to each data center.
You need to recommend a solution to provide redundancy for shared folders if a single data center
fails.
What should you recommend? More than one answer choice may achieve the goal. Select the
BEST answer.
A. A Distributed File System (DFS) namespace and DFS Replication
B. Cluster Shared Volumes (CSVs)
C. The clustered File Server role of the File Server for general use type
D. The clustered File Server role of the File Server scale-out application data type
Answer: A
QUESTION 136
You have a Windows Server 2012 R2 failover cluster that contains four nodes.
Each node has four network adapters.
The network adapters on each node are configured as shown in the following table.
70-414.lead2pass.Premium.Exam.229q part2
NIC4 supports Remote Direct Memory Access (RDMA) and Receive Side Scaling (RSS).
The cluster networks are configured as shown in the following table.
70-414.lead2pass.Premium.Exam.229q part2
You need to ensure that ClusterNetwork4 is used for Cluster Shared Volume (CSV) redirected traffic.
What should you do?
A. Set the metric of ClusterNetwork4 to 90,000 and disable SMB Multichannel.
B. On each server, replace NIC4 with a 1-Gbps network adapter.
C. Set the metric of ClusterNetwork4 to 30,000 and disable SMB Multichannel.
D. On each server, enable RDMA on NIC4.
Answer: C
QUESTION 137
Your network contains an Active Directory domain named contoso.com.
The domain contains 200 servers that run either Windows Server 2012 R2, Windows Server 2012,
or Windows Server 2008 R2.
The servers run the following enterprise applications:
- Microsoft Exchange Server 2013
- Microsoft SQL Server 2014
System Center 2012 R2 Operations Manager is deployed to the domain.
Operations Manager monitors all of the servers in the domain.
Audit Collection Services (ACS) is installed.
You need to recommend a monitoring strategy for the domain that meets the following requirements:
- A group of administrators must be notified when an error is written to
the System log on the servers that run Exchange Server 2013.
- A group of administrators must be notified when a specific event is
written to The Application log on the servers that run SQL Server 2014.
What is the best approach to achieve the goal? More than one answer choice may achieve the
goal. Select the BEST answer.
A. From Operations Manager, enable audit collection.
B. From Operations Manager, implement two monitors.
C. From Computer Management, implement one event subscription.
D. From Operations Manager, implement two rules.
Answer: D
QUESTION 138
Your company has four offices.
The offices are located in Montreal, Seattle, New York, and Miami.
Users access all of the web-based resources by using web proxy servers.
The IP addresses of the web proxies at each office are configured as shown in the following table.
70-414.lead2pass.Premium.Exam.229q part2
The connections to the web proxies are balanced by using round-robin DNS.
The company plans to deploy a new application.
The new application has a farm of front-end web servers that connect to a back-end application
server.
When a session to a web server is established, the web server stores data until the session closes.
Once the session closes, the data is sent to the application server.
You need to ensure that the incoming sessions to the web server farm are distributed among the
web servers.
The solution must ensure that if a web server fails, the users are NOT directed to the failed server.
How should you configure the port rule? To answer, select the appropriate options in the answer
area.
70-414.lead2pass.Premium.Exam.229q part2
Answer:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 139
Your network contains an Active Directory domain named contoso.com.
The domain contains a Network Load Balancing (NLB) cluster named Cluster1 that contains four
nodes. Cluster1 hosts a web application named App1.
The session state information of App1 is stored in a Microsoft SQL Server 2012 database.
The network contains four subnets.
You discover that all of the users from a subnet named Subnet1 always connect to the same NLB
node.
You need to ensure that all of the users from each of the subnets connect equally across all of the
nodes in Cluster1.
What should you modify from the port settings? To answer, select the appropriate setting in the
answer area.
70-414.lead2pass.Premium.Exam.229q part2
Answer:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 140
Your network contains an Active Directory domain named contoso.com.
The domain contains two domain controllers named DC1 and DC2.
The domain contains a server named Server1.
Server1 is a certification authority (CA).
All servers run Windows Server 2012 R2.
You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers.
The unique identifier for your organization is set to Contoso.
You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data
recovery agent.
You must be able to perform the recovery from any administrative computer.
Which four actions should you perform in sequence? To answer, move the appropriate actions from
the list of actions to the answer area and arrange them in the correct order.
70-414.lead2pass.Premium.Exam.229q part2
Answer:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 141
You plan to deploy a certification authority (CA) infrastructure that contains the following servers:
- An offline standalone root CA named CA1
- An enterprise subordinate CA named CA2
On all of the computers, you import the root CA certificate from CA1 to the Trusted Root Certification
Authorities Certificates store.
You need to ensure that CA2 can issue certificates for the CA hierarchy.
What should you do? To answer, select the appropriate options in the answer area.
70-414.lead2pass.Premium.Exam.229q part2
Answer:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 142
Your network contains five physical servers.
The servers are configured as shown in the following table.
70-414.lead2pass.Premium.Exam.229q part2
All servers run Windows Server 2012 R2.
During the setup of VMM, you configure distributed key management.
You need to ensure that the entire VMM infrastructure can be restored.
What should you include in the backup plan? To answer, select the appropriate server to back up
for each backup content type in the answer.
70-414.lead2pass.Premium.Exam.229q part2
Answer:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 143
Your network contains an Active Directory domain named contoso.com.
All servers run Windows Server 2012 R2. System Center 2012 R2 Virtual Machine Manager (VMM)
is deployed to the domain.
In VMM, you create a host group named HostGroup1.
You add a 16-node Hyper-V failover cluster to HostGroup1.
From Windows PowerShell, you run the following commands:
70-414.lead2pass.Premium.Exam.229q part2
70-414.lead2pass.Premium.Exam.229q part2 
QUESTION 144
You are planning to set up a proof-of-concept network virtualization environment.
The environment will contain three servers.
The servers will be configured as shown in the following table.
70-414.lead2pass.Premium.Exam.229q part2 
You need to enable network connectivity between the virtual machines and Server3.
Which four actions should you perform in sequence? To answer, move the appropriate actions from
the list of actions to the answer area and arrange them in the correct order.

























70-414.lead2pass.Premium.Exam.229q part2
Answer:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 145
You have a System Center 2012 R2 Virtual Machine Manager (VMM) deployment.
You implement Hyper-V Recovery Manager for the deployment.
You create two new clouds named Cloud1 and Cloud2.
Metadata for both clouds is uploaded to Windows Azure.
You need to ensure that the virtual machines in Cloud1 are protected by using replicas in Cloud2.
Where should you perform each action? To answer, select the appropriate tool for each action in
the answer area.

70-414.lead2pass.Premium.Exam.229q part2
Answer:
70-414.lead2pass.Premium.Exam.229q part2
QUESTION 146
Your network contains an Active Directory forest named contoso.com.
All servers run Windows Server 2012 R2. The forest contains two servers.
The servers are configured as shown in the following table.

70-414.lead2pass.Premium.Exam.229q part2
You prepare the forest to support Workplace Join and you enable the Device Registration Service
(DRS) on Server1.
You need to ensure that Workplace Join meets the following requirements:
- Application access must be based on device claims.
- Users who attempt to join their device to the workplace through Server2
must be prevented from
locking out their Active Directory account due to invalid credentials.
Which cmdlet should you run to achieve each requirement? To answer, select the cmdlet for each
requirement in the answer area.
70-414.lead2pass.Premium.Exam.229q part2
Answer:
70-414.lead2pass.Premium.Exam.229q part2
  ES TK PS AT OB
 
Test King
Pass4sure
Actual Tests
Other Brands
Customer Reviews 5stars 1star 1star 1star 1star
 
$89.99
$124.99
$125.99
$189.00
$29.99~$49.99
Up-To-Dated Available NotAvailable NotAvailable NotAvailable NotAvailable
Real Questions & Answers Available NotAvailable NotAvailable NotAvailable NotAvailable
Correct All Error Available NotAvailable NotAvailable NotAvailable NotAvailable
Premium VCE Dumps Available NotAvailable NotAvailable NotAvailable NotAvailable
Free VCE Simulator Available NotAvailable NotAvailable NotAvailable NotAvailable
Unlimited After One Time Purchasing Available NotAvailable NotAvailable NotAvailable NotAvailable
Instant Download Available NotAvailable NotAvailable NotAvailable NotAvailable
Printable PDF Dumps Available NotAvailable NotAvailable NotAvailable NotAvailable
100% Pass Guarantee Available NotAvailable NotAvailable NotAvailable NotAvailable
100% Money Back Available NotAvailable NotAvailable NotAvailable NotAvailable

100% Pass:http://examsavior.com/

No comments:

Post a Comment