★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-413 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-413-dumps.html
Act now and download your Microsoft 70-413 test today! Do not waste time for the worthless Microsoft 70-413 tutorials. Download Renovate Microsoft Designing and Implementing a Server Infrastructure exam with real questions and answers and begin to learn Microsoft 70-413 with a classic professional.
2021 Oct 70-413 free pdf:
Q31. - (Topic 8)
Your network contains 50 servers that run Windows Server 2003 and 50 servers that run Windows Server 2008.
You plan to implement Windows Server 2012 R2.
You need to create a report that includes the following information:
. The servers that run applications and services that can be moved to Windows Server 2012 R2
. The servers that have hardware that can run Windows Server 2012 R2 . The servers that are suitable to be converted to virtual machines hosted on Hyper-
V hosts that run Windows Server 2012 R2
Solution: From an existing server, you run the Microsoft Application Compatibility Toolkit (ACT).
Does this meet the goal?
A. Yes
B. No
Answer: B
Explanation: With the ACT, you can: Analyze your portfolio of applications, websites, and computers Evaluate operating system deployments, the impact of operating system updates, and your compatibility with websites Centrally manage compatibility evaluators and configuration settings Rationalize and organize applications, websites, and computers Prioritize application compatibility efforts with filtered reporting Add and manage issues and solutions for your enterprise-computing environment Deploy automated mitigations to known compatibility issues Send and receive compatibility information from the Microsoft Compatibility Exchange
Q32. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains three Active Directory sites. The Active Directory sites are configured as shown in the following table.
The sites connect to each other by using the site links shown in the following table.
Site link name Connected sites
You need to design the Active Directory site topology to meet the following requirements:
. Ensure that all replication traffic between Site2 and Site3 replicates through Site1 if a domain controller in Site1 is available.
. Ensure that the domain controllers between Site2 and Site3 can replicate if all of the domain controllers in Site1 are unavailable.
What should you do?
A. Delete Link1.
B. Delete Link2.
C. Delete Link3.
D. Disable site link bridging.
E. Create one site link bridge.
F. Modify the cost of Link2.
G. Create one SMTP site link between Site2 and Site3.
H. Create one SMTP site link between Site1 and Site3. Create one SMTP site link between Site1 and Site2.
Answer: F
Q33. - (Topic 8)
Your network contains an Active Directory forest named contoso.com.
You plan to deploy 200 Hyper-V hosts by using Microsoft System Center 2012 Virtual Machine Manager (VMM) Service Pack 1 (SP1).
You add a PXE server to the fabric.
You need to identify which objects must be added to the VMM library for the planned deployment.
What should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
A. A host profile
B. A capability profile
C. A hardware profile
D. A generalized image
E. A service template
Answer: A,D
Explanation: Templates and profiles are used to standardize the creation of virtual
machines and services.
These configurations are stored in the VMM database but are not represented by physical
configuration files.
(D)
There are several new types of templates and profiles in VMM, most of which are used for service creation.
(A)
There are also host profiles, used for deploying a Hyper-V host from a bare-metal computer, and capability profiles, used to specify the capabilities of virtual machines on each type of supported hypervisor when virtual machines are deployed to a private cloud.
Note:
* host profile:
A Virtual Machine Manager library resource that contains hardware and operating system
configuration settings to convert a bare-metal computer to a managed Hyper-V host.
*capability profile:
A Virtual Machine Manager library resource that defines which resources (for example,
number of processors or maximum memory) are available to a virtual machine that is
created in a private cloud.
Q34. - (Topic 1)
What method should you use to deploy servers?
A. WDS
B. AIK
C. ADK
D. EDT
Answer: A
Explanation: WDS is a server role that enables you to remotely deploy Windows operating systems. You can use it to set up new computers by using a network-based installation. This means that you do not have to install each operating system directly from a CD, USB drive, or DVD.
Reference: What's New in Windows Deployment Services in Windows Server
Q35. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
All client computers run either Windows 7 or Windows 8.
The corporate security policy states that all of the client computers must have the latest security updates installed.
You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.
Solution: You implement the DHCP Network Access Protection (NAP) enforcement method.
Does this meet the goal?
A. Yes
B. No
Answer: A
Explanation: Implementing DHCP NAP to Enforce WSUS Updates
Improve 70-413 skills measured:
Q36. HOTSPOT - (Topic 2)
You need to recommend a configuration for the DHCP infrastructure.
What should you recommend? To answer, select the appropriate options in the answer area.
Answer:
Q37. - (Topic 8)
You have a server named Server1 that runs Windows Server 2012. Server1 has the DNS Server server role installed.
You need to recommend changes to the DNS infrastructure to protect the cache from cache poisoning attacks.
What should you configure on Server1?
A. DNS cache locking
B. The global query block list
C. DNS Security Extensions (DNSSEC)
D. DNS devolution
Answer: A
Explanation: Ache locking is a new feature available if your DNS server is running Windows Server 2008 R2. When you enable cache locking, the DNS server will not allow cached records to be overwritten for the duration of the time to live (TTL) value. Cache locking provides for enhanced security against cache poisoning attacks.
Q38. - (Topic 7)
You need to limit the amount of disk space that is used on the client devices.
Which Windows PowerShell cmdlet or cmdlets should you run?
A. Add-BCDataCacheExtcnsion
B. Set-BCDataCacheEntryMaxAge
C. Disable-BC and Enablc-BCLocal
D. Set-BCCache
E. Clear-BCCache
Answer: D
Explanation:
Scenario: File shares
Each branch office connects to the New York data center to retrieve file shares.
BranchCache distributed mode is enabled in each branch office. The cache on each client
computer must be a single file.
Reference: Set-BCCache
Q39. - (Topic 8)
Your company, which is named Contoso, Ltd., has a main office and two branch offices. The main office is located in North America. The branch offices are located in Asia and Europe.
You plan to design an Active Directory forest and domain infrastructure.
You need to recommend an Active Directory design to meet the following requirements:
* The contact information of all the users in the Europe office must not be visible to the users in the other offices.
* The administrators in each office must be able to control the user settings and the computer settings of the users in their respective office.
The solution must use the least amount of administrative effort.
What should you include in the recommendation?
A. One forest that contains three domains
B. Three forests that each contain one domain
C. Two forests that each contain one domain
D. One forest that contains one domain
Answer: D
Explanation: * The most basic of all Active Directory structures is the single domain model; this type of domain structure comes with one major advantage over the other models: simplicity. A single security boundary defines the borders of the domain, and all objects are located within that boundary. The establishment of trust relationships between other domains is not necessary, and implementation of technologies such as Group Policies is made easier by the simple structure.
Q40. - (Topic 3)
You need to recommend an IPAM management solution for the Operators groups. The solution must meet the technical requirements.
What should you include in the recommendation?
A. Run the Invoke-IpamGpoProvisioningcmdlet in all three domains. Add the computers used by the members of the Operators group to the IPAM server.
B. Modify the membership of the IPAM Administrators group and the WinRMRemoteWMIUsers_ group on the IPAM server.
C. Run the Set-IpamConfigurationcmdlet and modify the membership of the WinRMRemoteWMRJsers_ group on the IPAM server.
D. Run the Set-IpamConfigurationcmdlet on the IPAM server. Run the Invoke-IpamGpoProvisioningcmdlet in all three domains.
Answer: B
Explanation:
Scenario: Ensure that the members of the Operators groups in all three domains can manage the IPAM server from their client computer.