It is more faster and easier to pass the Microsoft 70-414 exam by using Tested Microsoft Implementing an Advanced Server Infrastructure questuins and answers. Immediate access to the Far out 70-414 Exam and find the same core area 70-414 questions with professionally verified answers, then PASS your exam with a high score now.
Q1. - (Topic 5)
You need to ensure that the developers can manage their own virtual machines.
Solution: You perform the following actions:
. In Virtual Machine Manager, you create a new user role named DevUsers that
uses the Application Administrator profile.
. You grant Checkpoint permissions to the DevUsers role.
. You distribute the Self-Service Portal URL to the developers.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q2. - (Topic 8)
You need to configure migration for HV-CLUSTER1. What should you do?
A. Use live migration between HV-Cluster1 and HV-Cluster3.
B. Configure a Hyper-V replica between HV-Cluster1 and HV-Cluster3.
C. Configure a Hyper-V replica between HV-Cluster1 and HV-Cluster4.
D. Use live migration between HV-Cluster1 and HV-Cluster4.
Answer: C
Q3. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
. Ensure that the users can encrypt files by using Encrypting File System (EFS). . Ensure that all of the users reenroll for their certificate every six months.
Solution: From the properties of the Basic EFS template, you assign the Allow - Enroll permission to the Authenticated Users group.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q4. - (Topic 8)
Your network contains a Hyper-V cluster named Cluster1.
You install Microsoft System Center 2012 Virtual Machine Manager (VMM).
You create a user account for another administrator named User1.
You plan to provide User1 with the ability to manage only the virtual machines that User1
creates.
You need to identify what must be created before you delegate the required permissions.
What should you identify?
A. A service template
B. A Delegated Administrator
C. A cloud
D. A host group
Answer: D
Q5. - (Topic 8)
Your network contains an Active Directory domain named contoso.com.
You plan to implement Microsoft System Center 2012.
You need to identify which solution automates the membership of security groups for
contoso.com. The solution must use workflows that provide administrators with the ability to
approve the addition of members to the security groups.
Which System Center 2012 roles should you identify?
A. Configuration Manager and Orchestrator
B. Service Manager and Virtual Machine Manager (VMM)
C. Orchestrator and Service Manager
D. Operations Manager and Orchestrator
Answer: C
Q6. - (Topic 8)
You have a Windows Server 2012 R2 failover cluster that contains four nodes. Each node has four network adapters. The network adapters on each node are configured as shown in the following table.
NIC4 supports Remote Direct Memory Access (RDMA) and Receive Side Scaling (RSS). The cluster networks are configured as shown in the following table.
You need to ensure that ClusterNetwork4 is used for Cluster Shared Volume (CSV) redirected traffic.
What should you do?
A. Set the metric of ClusterNetwork4 to 90,000 and disable SMB Multichannel.
B. On each server, replace NIC4 with a 1-Gbps network adapter.
C. Set the metric of ClusterNetwork4 to 30,000 and disable SMB Multichannel.
D. On each server, enable RDMA on NIC4.
Answer: C
Q7. - (Topic 8)
Your network contains multiple servers that run Windows Server 2012.
The network contains a Storage Area Network (SAN) that only supports Fibre Channel connections.
You have two failover clusters. The failover clusters are configured as shown in the following table.
Only the members of Cluster1 can connect to the SAN.
You plan to implement 15 highly available virtual machines on Cluster2. All of the virtual machines will be stored in a single shared folder.
You need to ensure that the VHD files of the virtual machines can be stored on the SAN.
What should you do? (Each correct answer presents a complete solution. Choose all that apply.)
A. From a node in Cluster2, create a Virtual Fibre Channel SAN.
B. From a node in Cluster1, create a Virtual Fibre Channel SAN.
C. From Cluster1, add the iSCSI Target Server cluster role.
D. From Cluster1, configure the clustered File Server role of the File Server for scale-out application data type.
Answer: A,D
Q8. - (Topic 5)
This question consists of two statements: One is named Assertion and the other is named Reason. Both of these statements may be true; both may be false; or one may be true, while the other may be false.
To answer this question, you must first evaluate whether each statement is true on its own. If both statements are true, then you must evaluate whether the Reason (the second statement) correctly explains the Assertion (the first statement). You will then select the answer from the list of answer choices that matches your evaluation of the two statements.
Assertion:
You must implement Azure site recovery between the New Delhi and Seattle offices to meet the backup requirements.
Reason:
Azure site recovery allows replication and failover of virtual machines on host servers that are located in the Virtual Machine Manager cloud.
Evaluate the Assertion and Reason statements and choose the correct answer option.
A. Both the Assertion and Reason are true, and the Reason is the correct explanation for the Assertion.
B. Both the Assertion and Reason are true, but the Reason is not the correct explanation for the Assertion.
C. The Assertion is true, but the Reason is false.
D. The Assertion is false, but the Reason is true.
E. Both the Assertion and the Reason are false.
Answer: B
Q9. HOTSPOT - (Topic 6)
You need to implement App1.
How should you configure the locations? To answer, select the appropriate option from each list in the answer area.
Answer:
Q10. - (Topic 8)
You need to change the HR application server environment. What should you do?
A. Use Microsoft Virtual Machine Converter 3.0 to convert DAL-APPSERVER2.
B. Use Virtual Machine Manager to convert DAL-APPSERVER2.
C. Use Microsoft Virtual Machine Converter 3.0 to convert DAL-APPSERVER1.
D. Use Virtual Machine Manager to convert DAL-APPSERVER1.
Answer: C
Q11. - (Topic 8)
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: On each Hyper-V server, you create a new external virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new external virtual network switches.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q12. - (Topic 2)
You need to recommend changes to the existing environment to meet the email requirement.
What should you recommend?
A. Implement a two-way forest trust that has selective authentication.
B. Implement qualified subordination.
C. Deploy the FabrikamCA root certificate to all of the client computers.
D. Deploy a user certificate from FabrikamCA to all of the users.
Answer: B
Q13. - (Topic 8)
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q14. - (Topic 8)
You need to ensure that the developers can manage their own virtual machines.
Solution: You perform the following actions:
. In Virtual Machine Manager, you create a new user role named DevUsers that uses the Application Administrator profile. . You create and publish a request offering that allows the DevUsers role to create
checkpoints.
. You grant Checkpoint permissions to the DevUsers role.
. You distribute the Self-Service portal to the developers.
Does this meet the goal?
A. Yes
B. No
Answer: A
Explanation: Virtual Machine Manager Self-Service Portal The VMM Self-Service Portal is an optional, Web-based component that a VMM administrator can install and configure to allow users to create and manage their own virtual machines within a controlled environment on a limited group of virtual machine hosts. The VMM administrator creates self-service user roles which determine the scope of the users' actions on their own virtual machines. To create, operate, and manage virtual machines, self-service users use the Virtual Machine Manager Self-Service Portal. The administrator determines which host groups self-service users can create virtual machines on. When a self-service user creates a virtual machine, the virtual machine is automatically placed on the most suitable host in the host group based on host ratings.
Reference: Overview of Virtual Machine Manager
https://technet.microsoft.com/en-us/library/cc764267.aspx
Q15. HOTSPOT - (Topic 8)
You have a System Center 2012 R2 Virtual Machine Manager (VMM) deployment.
You implement Hyper-V Recovery Manager for the deployment.
You create two new clouds named Cloud1 and Cloud2. Metadata for both clouds is uploaded to Windows Azure.
You need to ensure that the virtual machines in Cloud1 are protected by using replicas in Cloud2.
Where should you perform each action? To answer, select the appropriate tool for each action in the answer area.
Answer:
Q16. - (Topic 7)
You administer an Active Directory Domain Services environment. There are no certification authorities (CAs) in the environment.
You plan to implement a two-tier CA hierarchy with an offline root CA.
You need to ensure that the issuing CA is not used to create additional subordinate CAs.
What should you do?
A. In the CAPolicy.inf file for the issuing CA, enter the following constraint: PathLength=1
B. In the CAPolicy.inf file for the root CA, enter the following constraint: PathLength=1
C. In the CAPolicy.inf file for the root CA, enter the following constraint: PathLength=2
D. In the CAPolicy.inf file for the issuing CA, enter the following constraint: PathLength=2
Answer: B
Explanation: You can use the CAPolicy.inf file to define the PathLength constraint in the Basic Constraints extension of the root CA certificate. Setting the PathLength basic constraint allows you to limit the path length of the CA hierarchy by specifying how many tiers of subordinate CAs can exist beneath the root. A PathLength of 1 means there can be at most one tier of CAs beneath the root. These subordinate CAs will have a PathLength basic constraint of 0, which means that they cannot issue any subordinate CA certificates.
Reference: Windows Server 2008 R2 CAPolicy.inf Syntax
http://blogs.technet.com/b/askds/archive/2009/10/15/windows-server-2008-r2-capolicy-inf-syntax.aspx