aiotestking uk

70-414 Exam Questions - Online Test


70-414 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 8) 

You are an Active Directory administrator for Contoso, Ltd. You have a properly configured certification authority (CA) in the contoso.com Active Directory Domain Services (AD DS) domain. Contoso employees authenticate to the VPN by using a user certificate issued by the CA. 

Contoso acquires a company named Litware, Inc., and establishes a forest trust between contoso.com and litwareinc.com. No CA currently exists in the litwareinc.com AD DS domain. Litware employees do not have user accounts in contoso.com and will continue to use their litwareinc.com user accounts. 

Litware employees must be able to access Contoso's VPN and must authenticate by using a user certificate that is issued by Contoso's CA. 

You need to configure cross-forest certificate enrollment for Litware users. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Grant the litwareinc.com AD DS Domain Computers group permissions to enroll for the VPN template on the Contoso CA. 

B. Copy the VPN certificate template from contoso.com to litwareinc.com. 

C. Add Contoso's root CA certificate as a trusted root certificate to the Trusted Root Certification Authority in litware.com. 

D. Configure clients in litwareinc.com to use a Certificate Policy server URI that contains 

the location of Contoso's CA. 

Answer: A,C 

Q2. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. 

You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table. 

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. 

Solution: From Operations Manager, you create a Distributed Application and a Service Level Tracking object. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:

Q3. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains four servers on a test network. The servers are configured as shown in the following table. 

Server1 uses the storage shown in the following table. 

You perform the following tasks: 

On Server2, you create an advanced SMB share named Share2A and an 

applications SMB share named Share2B. 

On Server3, you create an advanced SMB share named Share3. 

On Server4, you create an applications SMB share named Share4. 

You add Server3 and Server4 to a new failover cluster named Clus1. 

On Clus1, you configure the File Server for general use role, you create a quick 

SMB share named Share5A, and then you create an applications SMB share 

named Share5B. 

You plan to create a failover cluster of two virtual machines hosted on Server1. The clustered virtual machines will use shared .vhdx files. 

You need to recommend a location to store the shared .vhdx files. 

Where should you recommend placing the virtual hard disk (VHD)? 

A. \\Server3\Share3 

B. \\Server2\Share2B 

C. \\Clus1\Share5B 

D. \\Server4\Share4 

Answer:

Q4. - (Topic 6) 

You need to enable virtual machine network health detection on all supported clusters. 

What should you do? 

A. On the virtual machine settings page for Cluster4, select the Protect network checkbox for each virtual machine on the cluster. 

B. On the virtual machine settings page for Cluster1, select the Protect network checkbox for each virtual machine on the cluster. 

C. On each guest virtual machine in Cluster4, configure protected access for the network interface card. 

D. On each guest virtual machine in Cluster3, configure protected access for the network interface card. 

E. On the virtual machine settings page for Cluster3, select the Protect network checkbox for each virtual machine on the cluster. 

F. On each guest virtual machine in Cluster1, configure protected access for the network interface card. 

Answer:

Q5. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. 

You need to issue a certificate to users to meet the following requirements: 

. Ensure that the users can encrypt files by using Encrypting File System (EFS). . Ensure that all of the users reenroll for their certificate every six months. 

Solution: From the properties of the Basic EFS template, you assign the Allow - Enroll permission to the Authenticated Users group. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:

Q6. - (Topic 4) 

You need to recommend a storage solution for the App1 VHDs. The solution must minimize downtime if a Hyper-V host fails. 

What should you include in the recommendation? 

A. Distributed File System (DFS) Replication 

B. A clustered file server of the File Server for scale-out application data type 

C. A clustered file server of the File Server for general use type 

D. A Distributed File System (DFS) namespace 

Answer:

Q7. HOTSPOT - (Topic 3) 

You need to recommend a network configuration for the newly deployed Hyper-V hosts used by Customer1. 

On which network adapter should you recommend performing each configuration? To answer, select the appropriate network adapter for each configuration in the answer area. 

Answer:  

Q8. - (Topic 8) 

Your company has a human resources department and a finance department. 

You are planning an administrative model for both departments to meet the following requirements: 

. Provide human resources managers with the ability to view the audit logs for the files of their department. . Ensure that only domain administrators can view the audit logs for the files of the finance department. 

You need to recommend a solution for the deployment of file servers for both departments. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Deploy one file server. Add the human resources managers to the local Administrators group. 

B. Deploy one file server. Add the human resources managers to the local Event Log Readers group. 

C. Deploy two file servers. Add the human resources managers to the local Administrators group on one of the servers. 

D. Deploy two file servers. Add the human resources managers to the local Event Log Readers group on one of the servers. 

Answer:

Q9. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. 

The corporate security policy states that when new user accounts, computer accounts, and contacts are added to an organizational unit (OU) named Secure, the addition must be audited. 

You need to recommend an auditing solution to meet the security policy. 

What should you include in the recommendation? (Each answer presents part of the solution. Choose all that apply.) 

A. From the Default Domain Controllers Policy, enable the Audit directory services setting. 

B. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit directory services setting. 

C. From the Secure OU, modify the Auditing settings. 

D. From the Default Domain Controllers Policy, enable the Audit object access setting. 

E. From the Secure OU, modify the Permissions settings. 

F. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit object access setting. 

Answer: A,B 

Q10. - (Topic 7) 

You need to automatically restart the appropriate web service on DETCRL01 and CHICRL01 if the web service is stopped. 

Solution: You create a recovery task in SCOM and configure it to start the World Wide Web publishing service. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: