Want to Pass 70-414 Exam In Next HOURS? Download Now →
January 11, 2018

Top 16 questions 70-414 for IT candidates (33 to 48)


Free Instant Download NEW 70-414 Exam Dumps (PDF & VCE):
Available on: https://www.certshared.com/exam/70-414/


Q33. - (Topic 8) 

You have a System Center 2012 R2 Configuration Manager deployment. 

All users have client computers that run Windows 8.1. The users log on to their client computer as standard users. 

An application named App1 is deployed to the client computers by using System Center. 

You need to recommend a solution to validate a registry key used by App1. If the registry key has an incorrect value, the value must be changed. The registry key must be validated every day. The solution must generate a report on non-compliant computers. 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. Group Policy preferences 

B. A desired configuration baseline 

C. The Windows PowerShell Desired State Configuration (DSC) feature 

D. The Microsoft Baseline Security Analyzer (MBSA) 

Answer:


Q34. HOTSPOT - (Topic 6) 

You need to implement App1. 

How should you configure the locations? To answer, select the appropriate option from each list in the answer area. 

Answer: 


Q35. HOTSPOT - (Topic 8) 

Your network contains five physical servers. The servers are configured as shown in the following table. 

All servers run Windows Server 2012 R2. 

During the setup of VMM, you configure distributed key management. 

You need to ensure that the entire VMM infrastructure can be restored. 

What should you include in the backup plan? To answer, select the appropriate server to 

back up for each backup content type in the answer. 

Answer: 


Q36. DRAG DROP - (Topic 3) 

You need to prepare the required Hyper-V virtual network components for Customer2. 

Which four objects should you create and configure in sequence? To answer, move the appropriate objects from the list of objects to the answer area and arrange them in the correct order. 

Answer: 


Q37. - (Topic 4) 

You need to recommend which Certificate Services role service must be deployed to the perimeter network. The solution must meet the security requirements. 

Which Certificate Services role services should you recommend? 

A. Online Responder and Network Device Enrollment Service 

B. Online Responder and Certificate Enrollment Web Service 

C. Certificate Enrollment Web Service and Certificate Enrollment Policy Web Service 

D. Certificate Enrollment Policy Web Service and Certification Authority Web Enrollment 

Answer:


Q38. - (Topic 7) 

Your network contains an Active Directory domain named contoso.com. 

You currently have an intranet web site that is hosted by two Web servers named Web1 and Web2. Web1 and Web2 run Windows Server 2012. 

Users use the name intranet.contoso.com to request the web site and use DNS round robin. 

You plan to implement the Network Load Balancing (NLB) feature on Web1 and Web2. 

You need to recommend changes to the DNS records for the planned implementation. 

What should you recommend? 

A. Delete one of the host (A) records named Intranet. Modify the remaining host (A) record named Intranet. 

B. Delete both host (A) records named Intranet. Create a pointer (PTR) record for each Web server. 

C. Create a new host (A) record named Intranet. Remove both host (A) records for Web1 and Web2. 

D. Create a service locator (SRV) record. Map the SRV record to Intranet. 

Answer:

Explanation: You must manually register the NLB cluster name in DNS by using a host (A) or (AAAA) record because DNS does not automatically register static IP addresses. 

Reference: How to Configure Network Load Balancing for Configuration Manager Site Systems 

https://technet.microsoft.com/en-us/library/bb633031.aspx 


Q39. - (Topic 8) 

Your network contains a Microsoft System Center 2012 infrastructure. 

You use Virtual Machine Manager (VMM) to manage 20 Hyper-V hosts. 

You deploy a Windows Server Update Services (WSUS) server. 

You need to automate the remediation of non-compliant Hyper-V hosts. The solution must minimize the amount of time that virtual machines are unavailable. 

What should you do first? 

A. Configure the Hyper-V hosts to download Windows updates from the WSUS server by using a Group Policy object (GPO). 

B. Install the WSUS Administration console on the VMM server, and then add the WSUS server to the fabric. 

C. Install the Virtual Machine Manager console on the WSUS server, and then add the WSUS server to the fabric. 

D. Configure the Hyper-V hosts to download Windows updates from the VMM server by using a Group Policy object (GPO). 

Answer:


Q40. - (Topic 8) 

You administer a group of servers that run Windows Server 2012 R2. 

You must install all updates. You must report on compliance with the update policy on a monthly basis. 

You need to configure updates and compliance reporting for new devices. 

What should you do? 

A. Deploy the Microsoft Baseline Security Analyzer. Scan the servers and specify the /apply switch. 

B. In Configuration Manager, deploy a new Desired Configuration Management baseline that includes all required updates. 

C. Configure a new group policy to install updates monthly. Deploy the group policy to all servers. 

D. In Operations Manager, create an override that enables the software updates management pack. Apply the new override to the servers. 

Answer:


Q41. - (Topic 7) 

Your network contains an Active Directory domain named contoso.com. The network contains two servers named Server1 and Server2. 

You deploy Active Directory Certificate Services (AD CS). The certification authority (CA) is configured as shown in the exhibit. (Click the Exhibit button). 

You need to ensure that you can issue certificates based on certificate templates. 

What should you do? 

A. Configure Server2 as a standalone subordinate CA. 

B. On Server1, install the Network Device Enrollment service role service. 

C. Configure Server2 as an enterprise subordinate CA. 

D. On Server1, run the Add-CATemplate cmdlet. 

Answer:

Explanation: The Add-CATemplate cmdlet adds a certificate template to the CA for issuing. Certificate templates allow for the customization of a certificate that can be issued by the CA. Example: Adds a CA template with the template display name Basic EFS and the template name EFS. Windows PowerShell C:\\PS>Add-CATemplate -Name EFS 


Q42. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. 

You need to issue a certificate to users to meet the following requirements: 

. Ensure that the users can encrypt files by using Encrypting File System (EFS). 

. Ensure that all of the users reenroll for their certificate every six months. Solution: From the properties of the User certificate template, you assign the Allow - Enroll permission to the Authenticated Users group. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q43. - (Topic 8) 

You have a Windows Server 2012 R2 failover cluster that contains four nodes. Each node has four network adapters. The network adapters on each node are configured as shown in the following table. 

NIC4 supports Remote Direct Memory Access (RDMA) and Receive Side Scaling (RSS). The cluster networks are configured as shown in the following table. 

You need to ensure that ClusterNetwork4 is used for Cluster Shared Volume (CSV) redirected traffic. 

What should you do? 

A. Set the metric of ClusterNetwork4 to 90,000 and disable SMB Multichannel. 

B. On each server, replace NIC4 with a 1-Gbps network adapter. 

C. Set the metric of ClusterNetwork4 to 30,000 and disable SMB Multichannel. 

D. On each server, enable RDMA on NIC4. 

Answer:


Q44. - (Topic 8) 

Your network contains five Active Directory forests. 

You plan to protect the resources in one of the forests by using Active Directory Rights 

Management Services (AD RMS). 

Users in all of the forests will access the protected resources. 

You need to identify the minimum number of AD RMS clusters required for the planned 

deployment. 

What should you identify? 

A. Five root clusters 

B. Five licensing clusters 

C. One licensing cluster and five root clusters 

D. One root cluster and five licensing clusters 

Answer:


Q45. - (Topic 4) 

You need to recommend a storage solution for the App1 VHDs. The solution must minimize downtime if a Hyper-V host fails. 

What should you include in the recommendation? 

A. Distributed File System (DFS) Replication 

B. A clustered file server of the File Server for scale-out application data type 

C. A clustered file server of the File Server for general use type 

D. A Distributed File System (DFS) namespace 

Answer:


Q46. - (Topic 2) 

You are evaluating the use of VMM to migrate APP1 for the sales users. You need to identify the effects of the migration. 

What should you identify? 

A. The VHDs and the virtual machine configuration files will move. The sales users' access to APP1 will be interrupted. 

B. The VHDs will move but the virtual machine configuration files will remain in the original location. The sales users will continue to have uninterrupted access to APP1. 

C. The virtual machine configuration files will move but the VHDs will remain in the original location. The sales users' access to APP1 will be interrupted. 

D. The VHDs and the virtual machine configuration files will move. The sales users will continue to have uninterrupted access to APP1. 

Answer:


Q47. - (Topic 4) 

You need to recommend which type of clustered file server and which type of file share must be used in the Hyper-V cluster that hosts App2. The solution must meet the technical requirements and the security requirements. 

Solution: You recommend a scale-out file server that uses an SMB share. Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q48. - (Topic 1) 

You are planning the delegation for the virtualization environment. The delegation must 

meet the virtualization requirements. 

Which user role profile should you select for Group2? 

A. Administrators 

B. Read-Only Administrator 

C. Self-Service User 

D. Delegated Administrator 

Answer: