70-414 yes no questions

download 70-414 yes no questions

of 20

description

yes no question

Transcript of 70-414 yes no questions

  • All YES/NO Exam 414 Questions

    NOTE:

    Remember YES/NO are 12++ Question in MIX & also In every case study there are 2 each YES/NO Question.

    Key to Success is Master them before you Hit The Exam ...!!!!

    QUESTION 1

    NOTE: Once you answer this question, you will NOT be able to return to it.

    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1.

    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.

    Solution: You configure preferred and possible owners for each business-critical VM.

    Does this meet the goal?

    B. No

    ----------------------------------------------------

    QUESTION 2

    NOTE: Once you answer this question, you will NOT be able to return to it.

    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1.

    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.

    Solution: You set the memory-weight threshold value to High for each business-critical VM.

  • Does this meet the goal?

    B. No ( i choose yes in exam )

    ----------------------------------------------------

    QUESTION 3

    NOTE: Once you answer this question, you will NOT be able to return to it.

    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1.

    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.

    Solution: You create an availability set and place each business-critical VM in the set.

    Does this meet the goal?

    B. No

    ----------------------------------------------------

    QUESTION 5

    NOTE: Once you answer this question, you will NOT be able to return to it.

    You manage a Hyper-V 2012 cluster by using system center Virtual machine manager 2012 SP1.

    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL server databases.

    Solutions: You create a custom placement rule and apply it to all business-critical VMs.

    Does this meet the goal?

    B. NO

  • ----------------------------------------------------

    You need to recommend a monitoring solution to ensure that an administratorcan review the availability information of Service1.

    Solution: From Virtual Machine Manager (VMM), you modify the properties of the service template.

    Does this meet the goal?

    B. No

    ----------------------------------------------------

    You need to recommend a monitoring solution to ensure that an administratorcan review the availability information of Service1.

    Solution: From Configuration Manager, you create a Collection and a Desired Configuration Management baseline.

    Does this meet the goal?

    B. No

    ----------------------------------------------------

    You need to recommend a monitoring solution to ensure that an administratorcan review the availability information of Service1.

    Solution: From Operations Manager, you create a Distributed Application and a Monitor Override.

    Does this meet the goal?

    B. No

    ----------------------------------------------------

  • You need to recommend a monitoring solution to ensure that an administratorcan review the availability information of Service1.

    Solution: From Operations Manager, you create a Distributed Application and a Service Level Tracking object.

    Does this meet the goal?

    A. Yes

    ----------------------------------------------------

    You plan to allow users to run internal applications from outside the company's network.

    You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed.

    You must secure on-premises resources by using multi-factor authentication (MFA).

    You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.

    Solution:You migrate the AD FS server to Microsoft Azure and connect it to theinternal Active Directory instance on the network.

    Then, you use the Workplace Join process to configure access for personal devices to the on-premises resources.

    Does this meet the goal?

    A. Yes

    ----------------------------------------------------

    You plan to allow users to run internal applications from outside the company's network.

    You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed.

  • You must secure on-premises resources by using multi-factor authentication (MFA).

    You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.

    Solution: You install a local instance of the MFA Server.

    You connect the instance to the Microsoft Azure MFA provider and then you use Microsoft Intune to manage personal devices.

    Does this meet the goal?

    A. Yes

    ----------------------------------------------------

    You plan to allow users to run internal applications from outside the company's network.

    You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed.

    You must secure on-premises resources by using multi-factor authentication (MFA).

    You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.

    Solution: You install a local instance of MFA Server and connect it your Microsoft Azure MFA provider.

    Then, you use the Workplace Join process to configure access for personal devices to the on-premises resources.

    Does this meet the goal?

    A. Yes

    ----------------------------------------------------

    An organization uses an Active Directory Rights Management Services (AD

  • RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled. Solution: You run the following command from an administrative command prompt: Chiper /a/d/s:

    A. NO

    ----------------------------------------------------

    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project . You uninstall AD RMS when the project is complete.

    You need to ensure that the protected content is still available after AD RMS is uninstalled. Solution: You run the following command from an administrative command prompt: Chiper /a/d/s:

    A. NO

    ----------------------------------------------------

    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project.

    You uninstall AD RMS when the project is complete.

    You need to ensure that the protected content is still available after AD RMS is uninstalled.

    Solution: You run the following Windows PowerShell command:

    Set-ItemProperty -Path :\ -Name IsDecommissioned -Value $true EnableDecommission

    Does this meet the goal?

    A. Yes

    ----------------------------------------------------

  • An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project.

    You uninstall AD RMS when the project is complete.

    You need to ensure that the protected content is still available after AD RMS is uninstalled.

    Solution: You add the backup service account to the SuperUsers group and back up the protected content.

    Then, you restore the content to a file server and apply the required NTFS permissions to the files.

    Does this meet the goal?

    B. No

    ----------------------------------------------------

    Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:

    Solution: You create a copy of the Basic EFS certificate template, and then you modify the validity period of the copy.

    A. Yes

    ----------------------------------------------------

    Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:

    Solution: From the properties of the Basic EFS template, you assign the Allow -Enroll permission to the Authenticated Users group.

    A. NO

  • ----------------------------------------------------

    The network has an Active Directory Certificate Services (AD CS) infrastructure.

    You need to issue a certificate to users to meet the following requirements:

    Solution: You create a copy of the User certificate template, and then you modify the extensions of the copy.

    Does this meet the goal?

    B. No

    ----------------------------------------------------

    Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:

    Solution: From the properties of the User certificate template, you assign the Allow -Enroll permission to the Authenticated Users group.

    Does this meet the goal?

    A. NO

    QUESTION

    NOTE: Once you answer this question, you will NOT be able to return to it.

    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1. You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.

    Solution: You configure preferred and possible owners for each business-critical VM.

  • No

    ---------------------------

    QUESTION

    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1.

    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.

    Solution: You set the memory-weight threshold value to High for each business-critical VM.

    B. No (But i answer Yes)

    ---------------------------

    QUESTION

    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1.

    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.

    Solution: You create an availability set and place each business-critical VM in the set.

    B. No

    ---------------------------

    QUESTION

    You manage a Hyper-V 2012 cluster by using system center Virtual machine manager 2012 SP1.

    You need to ensure high availability for business-critical virtual machines

  • (VMs) that host business-critical SQL server databases.

    Solutions: You create a custom placement rule and apply it to all business-critical VMs.

    NO

    ---------------------------

    QUESTION

    Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.

    You deploy a service named Service1 by using a service template.

    Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.

    You need to recommend a monitoring solution to ensure that an administratorcan review the availability information of Service1.

    Solution: From Virtual Machine Manager (VMM), you modify the properties of the service template.

    No

    ---------------------------

    QUESTION

    Your network contains an Active Directory domain named contoso.com.

    The domain contains a Microsoft System Center 2012 infrastructure. You deploy a service named Service1 by using a service template.

  • Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.

    You need to recommend a monitoring solution to ensure that an administratorcan review the availability information of Service1.

    Solution: From Configuration Manager, you create a Collection and a Desired Configuration Management baseline.

    B. No

    ---------------------------

    QUESTION

    Your network contains an Active Directory domain named contoso.com.

    The domain contains a Microsoft System Center 2012 infrastructure. You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.

    You need to recommend a monitoring solution to ensure that an administratorcan review the availability information of Service1.

    Solution: From Operations Manager, you create a Distributed Application and a Monitor Override.

    B. No

    ---------------------------

    QUESTION

    Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the

  • following table. You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.

    Solution: From Operations Manager, you create a Distributed Application and a Service Level Tracking object.

    A. Yes

    ---------------------------

    QUESTION

    You plan to allow users to run internal applications from outside the companys network. You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed. You must secure on-premises resources by using multi-factor authentication (MFA).

    You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.

    Solution: You migrate the AD FS server to Microsoft Azure and connect it to the internal Active Directory instance on the network. Then, you use the Workplace Join process to configure access for personal devices to the on-premises resources.

    A. Yes

    -----------------------------------------

    QUESTION

    You plan to allow users to run internal applications from outside the companys network. You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed. You must secure on-premises resources by using multi-factor authentication (MFA).

  • You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.

    Solution: You install a local instance of the MFA Server. You connect the instance to the Microsoft Azure MFA provider and then you use Microsoft Intune to manage personal devices.

    A. Yes

    -----------------------------------------

    QUESTION

    You plan to allow users to run internal applications from outside the companys network. You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed. You must secure on-premises resources by using multi-factor authentication (MFA). You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.

    Solution: You install a local instance of MFA Server and connect it your Microsoft Azure MFA provider. Then, you use the Workplace Join process to configure access for personal devices to the on-premises resources.

    Yes

    -----------------------------------------

    QUESTION

    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete.

    You need to ensure that the protected content is still available after AD RMS is uninstalled.

    Solution: You run the following Windows PowerShell command:

    cipher/a/d/s:

  • B. No

    -----------------------------------------

    QUESTION

    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete.

    You need to ensure that the protected content is still available after AD RMS is uninstalled.

    Solution: You add the backup service account to the SuperUsers group and back up the protected content. Then, you restore the content to a file server and apply the required NTFS permissions to the files.

    B. No

    -----------------------------------------

    QUESTION

    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled.

    Solution: You run the following command from an administrative command prompt:

  • Set-ItemProperty -Path :\ -Name IsDecommissioned -Value $true -EnableDecommission

    B. YES

    -----------------------------------------

    QUESTION

    Your network contains five servers that run Windows Server 2012 R2. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapterthat is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.

    You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.

    You need to ensure that the NLB feature can distribute connections across all of the virtual machines.

    Solution: From the properties of each virtual machine, you enable MAC address spoofing for the existing virtual network adapter.

    A. Yes

    ----------------------------------

    QUESTION

    Your network contains five servers that run Windows Server 2012 R2. You

  • install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapterthat is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.

    You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. You need to ensure that the NLB feature can distribute connections across all of the virtual machines.

    Solution: On each Hyper-V server, you create a new external virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new external virtual network switches.

    B. No

    ----------------------------------

    QUESTION

    Your network contains five servers that run Windows Server 2012 R2. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapterthat is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.

    You need to ensure that the NLB feature can distribute connections across all of the virtual machines.

  • Solution: On each Hyper-V server, you create a new private virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new private virtual network switches.

    No

    ----------------------------------

    QUESTION

    Your network contains five servers that run Windows Server 2012 R2. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapterthat is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.

    You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. You need to ensure that the NLB feature can distribute connections across all of the virtual machines.

    Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2.

    No

    ----------------------------------

    QUESTION

    Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:

  • Solution: You create a copy of the Basic EFS certificate template, and then you modify the validity period of the copy.

    Yes

    ----------------------------------

    QUESTION

    Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:

    Solution: From the properties of the Basic EFS template, you assign the Allow -Enroll permission to the Authenticated Users group.

    No

    ----------------------------------

    QUESTION

    Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:

    Solution: You create a copy of the User certificate template, and then you modify the extensions of the copy.

    B. No

    ----------------------------------

  • QUESTION

    Your network contains an Active Directory domain named contoso.com.

    The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:

    Solution: From the properties of the User certificate template, you assign the Allow -Enroll permission to the Authenticated Users group.

    No

    ----------------------------------

    Q

    You need to automatically restart the appropriate web service on DETCRL01 and CHICRL01 if the web service is stopped.

    Solution: You create a recovery task in SCOM and configure it to start the World Wide Web publishing service.

    Does this meet the goal?

    Yes

    ---------------------------

    Q

    You need to automatically restart the appropriate web service on DETCRL01 and CHICRL01 if the web service is stopped.

    Solution: You create a diagnostic task in SCOM and configure it to start the Server service.

    Does this meet the goal?

  • No

    ----------------------------------

    You need to automatically restart the appropriate web service on DETCRL01 and CHICRL01 if the web service is stopped.

    Solution: you Create a Windows Events monitor SCOM and configure it to monitor even related to the http.sys Service.

    NO

    ----------------------------------------------