[Free] Get all latest Microsoft 70-415 Actual Tests 61-70

Ensurepass

QUESTION 61

HOTSPOT

Your network contains an Active Directory domain named contoso.com.

 

You plan to implement Encrypting File System (EFS) to encrypt data on the client computer of each user.

 

You need to prevent EFS from generating self-signed certificates.

 

What should you use in Group Policy Management Editor?

 

To answer, select the appropriate Group Policy setting in the answer area.

 

clip_image001

 

Correct Answer:

clip_image002

 

 

QUESTION 62

You need to recommend a WSUS topology that meets the security requirements. What should you do?

 

A.

In the London office, install a WSUS server in replica mode. In the New York office, install a WSUS server in replica mode.

B.

In the London office, install a WSUS server in replica mode. In the New York office, install a WSUS server in autonomous mode.

C.

In the London office, install a WSUS server in autonomous mode. In the New York office, install a WSUS server in replica mode.

D.

In the London office, install a WSUS server in autonomous mode. In the New York office, install a WSUS server in autonomous mode.

 

Correct Answer: B

Explanation:

A WSUS server running in replica mode inherits the update approvals and computer groups created on its parent WSUS administration server.

You will typically have a single parent server with one or more downstream replica WSUS servers.

You approve updates and create computer groups on the parent server, which the replica servers will then mirror.

QUESTION 63

You are planning the virtual desktop migration of the desktop computers for the sales department. You need to recommend a solution that preserves the data stored on the sales users’ desktop computers during the migration to Windows 8. The solution must meet the sales department requirements and the technical requirements. What should you recommend?

 

A.

On the client computers that run Windows XP, run usmtutils.exe.

B.

From Configuration Manager, configure the User and Device Affinity.

C.

On the client computers that run Windows XP, run scanstate.exe.

D.

From Configuration Manager, create computer associations.

 

Correct Answer: D

Explanation:

The desktop computers of the sales users must be replaced by virtual desktops that run Windows 8:

A computer association creates a relationship between a source and destination computer for the side-by-side migration of user state data.

The source computer is an existing computer that is managed by Configuration Manager, and contains the user state data and settings that will be migrated to a specified destination computer. You can also create a computer association when importing new computers into the Configuration Manager database by using the Import Computer Information Wizard.

User device affinity in Microsoft System Center 2012 Configuration Manager is a method of associating a user with one or more specified devices.

User device affinity can eliminate the need to know the names of a user’s devices in order to deploy an application to that user.

Instead of deploying the application to all of the user’s devices, you deploy the application to the user.

Then, user device affinity automatically ensures that the application install on all devices that are associated with that user.

You can define primary devices. These are typically the devices that users use on a daily basis to perform their work.

When you create an affinity between a user and a device, you gain more software deployment options. For example, if a user requires Microsoft Office Visio, you can install it on the user’s primary device by using a Windows Installer deployment.

However, on a device that is not a primary device, you might deploy Microsoft Office Visio as a virtual application.

You can also use user device affinity to predeploy software on a user’s device when the user is not logged in.

Then, when the user logs on, the application is already installed and ready to run.

 

 

QUESTION 64

You need to recommend an image type to start the client computers in the London office. The solution must meet the migration requirements. Which image type should you recommend?

 

A.

capture

B.

boot

C.

install

D.

discover

 

Correct Answer: D

Explanation:

Ensure that the client computers in the London office that are not PXE-capable can download images from WDS.

Reformat the existing disks in the London office during the migration to Windows 8.

A discover image is a type of boot image that you can use to install an operating system on a computer that is not capable of network booting using the Pre-Boot Execution Environment (PXE). You may want to use a discover image in the following scenarios:

A client is not PXE-enabled.

A client is on a different subnet and you do not have method of getting PXE to the client (for example, IP helper tables or Dynamic Host Control Protocol (DHCP)).

You have many Windows Deployment Services servers and want to target a specific server.

 

 

QUESTION 65

DRAG DROP

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that have Microsoft Deployment Toolkit (MDT) 2012 installed. Server1 is used for testing and Server2 is used to deploy images to production computers.

 

On Server1, you have several deployments of Windows 7 and Windows 8.

 

You need to replicate only the content related to the Windows 8 deployments from Server1 to Server2.

 

What three actions should you perform from the Deployment Workbench?

 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

 

clip_image004

 

Correct Answer:

clip_image006

 

 

QUESTION 66

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain has Microsoft System Center 2012 Configuration Manager deployed.

 

All client computers run Windows XP.

 

Your company plans to replace all of the client computers with new computers that run Windows 8.

 

You need to recommend which Configuration Manager system role must be deployed to capture the local application data from the Windows XP computers, and then deploy the local application data to the Windows 8 computers.

 

Which system role should you recommend?

 

To answer, select the appropriate system role in the answer area.

 

clip_image008

 

Correct Answer:

clip_image010

QUESTION 67

Your network contains an Active Directory domain named contcsc.com. The domain contains a server named Gateway1 that has the Remote Desktop Gateway role service installed. You need to ensure that all of the users who connect to the Remote Desktop Session Host (RD Session Host) servers by using Gateway1 receive a custom logon message. The solution must prevent the message from appearing when the users connect to the RD Session Host servers directly. What should you configure from Remote Desktop Gateway Manager?

 

A.

The RD Gateway-managed computer groups

B.

The properties of Gateway1

C.

The Remote Desktop resource authorization policies (RD RAPs)

D.

The Remote Desktop connection authorization policies (RD CAPs)

 

Correct Answer: B

 

 

QUESTION 68

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that is a part of a Remote Desktops Services (RDS) deployment. The computer account of Server1 is in an organizational unit (OU) named Servers. All of the client computers are in an OU named OU1. Server1 has a session collection named Collection1 that contains multiple RemoteApp programs. You need to prevent users from using printer redirection when they connect to Server1 by using the Remote Desktop client. What should you do?

 

A.

Link a Group Policy object (GPO) to OU1. Configure the User Configuration settings of the GPO.

B.

Link a Group Policy object (GPO) to Servers. Configure the Computer Configuration settings of the GPO.

C.

Link a Group Policy object (GPO) to Servers. Configure the User Configuration settings of the GPO.

D.

Link a Group Policy object (GPO) to the Domain Controllers OU. Configure the Computer Configuration settings of the GPO.

 

Correct Answer: B

 

 

QUESTION 69

Your company has a main office and multiple branch offices. The network contains an Active Directory domain named contoso.com. All servers run Windows Server 2008 R2. All client computers run Windows 7. All users are configured to use roaming profiles and Folder Redirection. Each user has a personal laptop computer and a personal desktop computer, Users occasionally log on to other computers. The company introduces a new security policy, which requires that roaming profiles and redirected folders only be downloaded to the users’ personal laptop computer and desktop computer. You need to prepare the environment to meet the new security policy. You want to achieve this goal by using the minimum amount of administrative effort. What should you do? (Each correct answer presents part of the solution. Choose all that apply.)

 

A.

Upgrade the Active Directory schema to Windows Server 2012.

B.

Raise the domain functional level to Windows Server 2012.

C.

Upgrade all of the client computers to Windows 8.

D.

Raise the forest functional level to Windows Server 2012.

E.

Upgrade all of the domain controllers to Windows Server 2012.

 

Correct Answer: BE

Explanation:

First upgrade the domain controller to Windows Server 2012, then raise the domain functional level to 2012.

 

 

QUESTION 70

Your network contains an Active Directory domain named contoso.com. The domain contains a Virtual Desktop Infrastructure (VDI). You plan to create a pooled virtual desktop collection. You need to ensure that users of the pooled virtual desktop collection store their data on a separate VHD. What should you do before you create the virtual desktop collection?

 

A.

Create a shared folder and assign the users permission to the shared folder.

B.

Create a fixed-size VHD and assign the users permission to the VHD.

C.

Create a shared folder and assign the virtualization hosts permission to the shared folder.

D.

Create a fixed-size VHD and assign the virtualization hosts permission to the VHD.

 

Correct Answer: C

 

Instant Access to Download Testing Software & PDF File for Microsoft 70-415 Real Exam

Instant Access to Try Microsoft 70-415 Free Demo