[Free] Download Latest (March 2016) Microsoft 70-414 Real Exam 131-140

Ensurepass

QUESTION 131

Your company has three offices. The offices are located in Seattle, London, and Tokyo.

The network contains an Active Directory domain named northwindtraders.com. Each office is configured as an Active Directory site.

System Center 2012 R2 Operations Manager is deployed to the domain. The servers in all three sites are monitored by using Operations Manager.

The company has a web site for its customers. The web site requires users to sign-in.

You need to recommend a solution to monitor the web site.

The solution must meet the following requirements:

 

– Monitor the availability of the web site from locations in North America, Europe, Asia, and Australia.

– Monitor multi-step requests to the web site.

– Use a central console for monitoring.

 

What should you include in the recommendation?

 

A.

Import the System Center Global Services Monitorin
g Management Pack and add the Web Application Availability Monitoring monitoring type.

B.

Add the Web Application Transaction monitoring type and configure watcher nodes.

C.

Add the TCP Port monitoring type and configure watcher nodes.

D.

Import the System Center Global Services Monitor Management Pack and add the Visual Studio Web Test Monitoring monitoring type.

 

Correct Answer: D

 

 

QUESTION 132

You have a System Center 2012 R2 Configuration Manager deployment.

All users have client computers that run Windows 8.1. The users log on to their client computer as standard users.

An application named App1 is deployed to the client computers by using System Center. You need to recommend a solution to validate a registry key used by App1. If the re
gistry key has an incorrect value, the value must be changed. The registry key must be validated every day. The solution must generate a report on non-compliant computers.

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.

 

A.

Group Policy preferences

B.

A desired configuration baseline

C.

The Windows PowerShell Desired State Configuration (DSC) feature

D.

The Microsoft Baseline Security Analyzer (MBSA)

 

Correct Answer: B

 

 

QUESTION 133

Your network contains an Active Directory forest named contoso.com.

Your company works with a partner company that has an Active Directory forest named fabrikam.com. Both forests contain domain controllers that run only Windows Server 2012 R2.

The certification authority (CA) infrastructure of both companies is configured as shown in the following table.

 

clip_image002

 

You need to recommend a certificate solution that meets the following requirements:

 

– Server authentication certificates issued from fabrikam.com must be trusted automatically by the

computers in contoso.com.

– The computers in contoso.com must not trust automatically any other type of certificates issued from the CA hierarchy in fabrikam.com.

 

What should you include in the recommendation?

 

A.

Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate.

B.

Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing.

C.

Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate.

D.

Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing.

 

Correct Answer: B

 

 

QUESTION 134

Your network contains an Active Directory domain named contoso.com.

You plan to implement Network Load Balancing (NLB).

You need to identify which network services and applications can be load balanced by using NLB.

Which services and applications should you identify?

 

A.

Microsoft SQL Server 2012 Reporting Services

B.

A failover cluster

C.

A DHCP server

D.

A Microsoft Exchange Server 2010 Mailbox server

E.

A file server

F.

A Microsoft SharePoint Server 2010 front-end Web server

 

Correct Answer: AF

 

 

QUESTION 135

Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that run Windows Server 2012. All client computers run Windows 7.

The network contains two data centers.

You plan to deploy one file server to each data center.

You need to recommend a solution to provide redundancy for shared folders if a single data center fails.

What should you recommend?

More than one answer choice may achieve the goal. Select the BEST answer.

 

A.

A Distributed File System (DFS) namespace and DFS Replication

B.

Cluster Shared Volumes (CSVs)

C.

The clustered File Server role of the File Server for general use type

D.

The clustered File Server role of the File Server scale-out application data type

 

Correct Answer: A

 

 

QUESTION 136

You have a Windows Server 2012 R2 failover cluster that contains four nodes. Each node has four network adapters. The network adapters on each node are configured as shown in the following table.

 

clip_image004

 

NIC4 supports Remote Direct Memory Access (RDMA) and Receive Side Scaling (RSS). The cluster networks are configured as shown in the following table.

 

clip_image006

 

You need to ensure that ClusterNetwork4 is used for Cluster Shared Volume (CSV) redirected traffic.

What should you do?

 

A.

Set the metric of ClusterNetwork4 to 90,000 and disable SMB Multichannel.

B.

On each server, replace NIC4 with a 1-Gbps network adapter.

C.

Set the metric of ClusterNetwork4 to 30,000 and disable SMB Multichannel.

D.

On each server, enable RDMA on NIC4.

 

Correct Answer: C

 

 

QUESTION 137

Your network contains an Active Directory domain named contoso.com. The domain contains 200 servers that run either Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2. The servers run the following enterprise applications:

 

– Microsoft Exchange Server 2013

– Microsoft SQL Server 2014

 

Syst
em Center 2012 R2 Operations Manager is deployed to the domain.

Operations Manager monitors all of the servers in the domain. Audit Collection Services (ACS) is installed.

You need to recommend a monitoring strategy for the domain that meets the following requirements:

 

– A group of administrators must be notified when an error is written to the System log on the servers that run Exchange Server 2013.

– A group of administrators must be notified when a specific event is written to The Application log on the servers that run SQL Server 2014.

 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.

 

A.

From Operations Manager, enable audit collection.

B.

From Operations Manager, implement two monitors.

C.

From Computer Management, implement one event subscription.

D.

From Operations Manager, implement two rules.

 

Correct Answer: D

 

 

QUESTION 138

Your company has four offices. The offices are located in Montreal, Seattle, New York, and Miami.

Users access all of the web-based resources by using web proxy servers. The IP addresses of the web proxies at each office are configured as shown in the following table.

 

clip_image008

 

The connections to the web proxies are balanced by using round-robin DNS.

The company plans to deploy a new application. The new application has a farm of front-end web servers that connect to a back-end application server. When a session to a web server is established, the web server stores data until the session closes. Once the session closes, the data is sent to the application server.

You need to ensure that the incoming sessions to the web server farm a
re distributed among the web servers. The solution must ensure that if a web server fails, the users are NOT directed to the failed server.

How should you configure the port rule? To answer, select the appropriate options in the answer area.

 

clip_image010

 

Correct Answer:

clip_image012

 

 

QUESTION 139

Your network contains an Active Directory domain named contoso.com. The domain contains a Network Load Balancing (NLB) cluster named Cluster1 that contains four nodes. Cluster1 hosts a web application named App1. The session state information of App1 is stored in a Microsoft SQL Server 2012 database.

The network contains four subnets.

You discover that all of the users from a subnet named Subnet1 always connect to the same NLB node.

You need to ensure that all of the users from each of the subnets connect equally across all of the nodes in Cluster1.

What should you modify from the port settings?

To answer, select the appropriate setting in the answer area.

 

clip_image014

 

Correct Answer:

clip_image016

 

 

QUESTION 140

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. The domain contains a server named Server1.

Server1 is a certification authority (CA). All servers run Windows Server 2012 R2.

You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers. The unique identifier for your organization is set to Contoso. You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data recovery agent. You must be able to perform the recovery from any administrative computer.

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

 

clip_image018

 

Correct Answer:

clip_image020

 

Free VCE & PDF File for Microsoft 70-414 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…