★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-414 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-414-dumps.html


Cause all that matters here is passing the Microsoft 70-414 exam. Cause all that you need is a high score of 70-414 Implementing an Advanced Server Infrastructure exam. The only one thing you need to do is downloading Ucertify 70-414 exam study guides now. We will not let you down with our money-back guarantee.

2021 Nov 70-414 study book:

Q51. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. 

The corporate security policy states that when new user accounts, computer accounts, and contacts are added to an organizational unit (OU) named Secure, the addition must be audited. 

You need to recommend an auditing solution to meet the security policy. 

What should you include in the recommendation? (Each answer presents part of the solution. Choose all that apply.) 

A. From the Default Domain Controllers Policy, enable the Audit directory services setting. 

B. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit directory services setting. 

C. From the Secure OU, modify the Auditing settings. 

D. From the Default Domain Controllers Policy, enable the Audit object access setting. 

E. From the Secure OU, modify the Permissions settings. 

F. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit object access setting. 

Answer: A,B 


Q52. - (Topic 7) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The network contains a System Center 2012 R2 Data Protection Manager (DPM) deployment. 

The domain contains six servers. The servers are configured as shown in the following table. 

You install System Center 2012 R2 Virtual Machine Manager (VMM) on the nodes in Cluster2. 

You configure VMM to use a database in Cluster1. Server5 is the first node in the cluster. 

You need to back up the VMM encryption key. 

What should you back up? 

A. a system state backup of Server2 

B. a full system backup of Server6 

C. a system state backup of Server5 

D. a full system backup of Server3 

Answer:

Explanation: Encryption keys in Active Directory Domain Services: If distributed key management (DKM) is configured, then you are storing VMM-related encryption keys in Active Directory Domain Services (AD DS). To back up these keys, back up Active Directory on a regular basis. 

Reference: Back Up and Restore Virtual Machine Manager 

https://technet.microsoft.com/en-us/library/dn768227.aspx#BKMK_b_misc 


Q53. - (Topic 2) 

You need to recommend changes to the existing environment to meet the web server requirement. 

Which two actions should you recommend? Each correct answer presents part of the solution. 

A. On one web server, run the Start-DSCConfiguration cmdlet. Create and run a configuration script. 

B. On all of the web servers, install the Windows PowerShell Web Access feature, and then run the Set-DscLocalConfigurationManager cmdlet. 

C. On all of the web servers, configure the Local Configuration Manager settings, and then run the Set-DscLocalConfigurationManager cmdlet. 

D. On one web server, install the Windows PowerShell Desired State Configuration (DSC) feature. Create and run a configuration script. 

Answer: C,D 


Q54. - (Topic 7) 

You administer an Active Directory Domain Services environment. There are no certification authorities (CAs) in the environment. 

You plan to implement a two-tier CA hierarchy with an offline root CA. 

You need to ensure that the issuing CA is not used to create additional subordinate CAs. 

What should you do? 

A. In the CAPolicy.inf file for the issuing CA, enter the following constraint: PathLength=1 

B. In the CAPolicy.inf file for the root CA, enter the following constraint: PathLength=1 

C. In the CAPolicy.inf file for the root CA, enter the following constraint: PathLength=2 

D. In the CAPolicy.inf file for the issuing CA, enter the following constraint: PathLength=2 

Answer:

Explanation: You can use the CAPolicy.inf file to define the PathLength constraint in the Basic Constraints extension of the root CA certificate. Setting the PathLength basic constraint allows you to limit the path length of the CA hierarchy by specifying how many tiers of subordinate CAs can exist beneath the root. A PathLength of 1 means there can be at most one tier of CAs beneath the root. These subordinate CAs will have a PathLength basic constraint of 0, which means that they cannot issue any subordinate CA certificates. 

Reference: Windows Server 2008 R2 CAPolicy.inf Syntax 

http://blogs.technet.com/b/askds/archive/2009/10/15/windows-server-2008-r2-capolicy-inf-syntax.aspx 


Q55. HOTSPOT - (Topic 6) 

You need to implement App1. 

How should you configure the locations? To answer, select the appropriate option from each list in the answer area. 

Answer: 


Refresh cbt nuggets 70-414 download:

Q56. - (Topic 8) 

You need to configure migration for HV-CLUSTER1. What should you do? 

A. Use live migration between HV-Cluster1 and HV-Cluster3. 

B. Configure a Hyper-V replica between HV-Cluster1 and HV-Cluster3. 

C. Configure a Hyper-V replica between HV-Cluster1 and HV-Cluster4. 

D. Use live migration between HV-Cluster1 and HV-Cluster4. 

Answer:


Q57. DRAG DROP - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that are configured as Hyper-V hosts. 

You plan to implement four virtual machines. The virtual machines will be configured as shown in the following table. 

You need to identify which network must be added to each virtual machine. 

Which network types should you identify? 

To answer, drag the appropriate Network Type to the correct virtual machine in the answer area. Each Network Type may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q58. - (Topic 1) 

You need to recommend a solution for managing updates. The solution must meet the technical requirements. 

What should you include in the recommendation? 

A. A System Center 2012 Configuration Manager management point in the main office and a WSUS downstream server in each office 

B. A System Center 2012 Configuration Manager software update point in the main office and a System Center 2012 Configuration Manager distribution point in each office 

C. A System Center 2012 Configuration Manager management point in the main office and a System Center 2012 Configuration Manager distribution point in each office 

D. A WSUS upstream server in the main office and a WSUS downstream server in each office 

Answer:


Q59. - (Topic 7) 

This question consists of two statements: One is named Assertion and the other is named Reason. Both of these statements may be true; both may be false; or one may be true, while the other may be false. 

To answer this question, you must first evaluate whether each statement is true on its own. If both statements are true, then you must evaluate whether the Reason (the second statement) correctly explains the Assertion (the first statement). You will then select the answer from the list of answer choices that matches your evaluation of the two statements. 

Assertion: 

You can manage VMware ESX hosts and virtual machines by using a System Center Virtual Machine Manager (SCVMM) server. 

Reason: 

SCVMM automatically imports ESX hosts and virtual machines when you add the corresponding VMware vCenter to the SCVMM server. 

Evaluate the Assertion and Reason statements and choose the correct answer option. 

A. Both the Assertion and Reason are true, and the Reason is the correct explanation for the Assertion. 

B. Both the Assertion and Reason are true, but the Reason is not the correct explanation for the Assertion. 

C. The Assertion is true, but the Reason is false. 

D. The Assertion is false, but the Reason is true. 

E. Both the Assertion and the Reason are false. 

Answer:

Explanation: * Assertion: true Virtual Machine Manager (VMM) enables you to deploy and manage virtual machines and services across multiple hypervisor platforms, including VMware ESX and ESXi hosts. 

* Reason: False When you add a vCenter Server, VMM no longer imports, merges and synchronizes the VMware tree structure with VMM. Instead, after you add a vCenter Server, you can add selected ESX servers and hosts to any VMM host group. Therefore, there are fewer issues with synchronization. 

Reference: Managing VMware ESX Hosts in VMM Overview 

https://technet.microsoft.com/en-us/library/gg610683.aspx 


Q60. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains 200 servers that run either Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2. The servers run the following enterprise applications: 

. Microsoft Exchange Server 2013 

. Microsoft SQL Server 2014 

System Center 2012 R2 Operations Manager is deployed to the domain. Operations Manager monitors all of the servers in the domain. Audit Collection Services (ACS) is installed. 

You need to recommend a monitoring strategy for the domain that meets the following requirements: 

. A group of administrators must be notified when an error is written to the System log on the servers that run Exchange Server 2013. . A group of administrators must be notified when a specific event is written to The Application log on the servers that run SQL Server 2014. 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. From Operations Manager, enable audit collection. 

B. From Operations Manager, implement two monitors. 

C. From Computer Management, implement one event subscription. 

D. From Operations Manager, implement two rules. 

Answer: