70-413 Exam - Designing and Implementing a Server Infrastructure

certleader.com

Q1. DRAG DROP - (Topic 8) 

Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. 

You plan to decommission the fabrikam.com domain. 

You need to perform the following migration tasks: 

. Copy user accounts from the fabrikam.com domain to the contoso.com domain. 

. Move the client computers from fabrikam.com to contoso.com. 

The solution must ensure that all of the user profiles are associated to the migrated user accounts. 

Which tool should you use to perform each task? 

To answer, drag the appropriate tool to the correct migration task in the answer area. Each tool may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q2. - (Topic 8) 

Your network contains an Active Directory forest named contoso.com. The forest is managed by using Microsoft System Center 2012. 

You plan to create virtual machine templates to deploy servers by using the Virtual Machine 

Manager Self-service Portal (VMMSSP). 

To the Virtual Machine Manager (VMM) library, you add a VHD that has a generalized image of Windows Server 2012. 

You need to identify which VMM components must be associated with the image. 

Which components should you identify? (Each correct answer presents part of the solution. 

Choose all that apply.) 

A. A guest OS profile 

B. A hardware profile 

C. A capability profile 

D. A host profile 

Answer: A,B 

Explanation: 

Profiles 

VMM provides the following profiles: 

* (A) Guest operating system profile—A guest operating system profile defines operating system configured settings which will be applied to a virtual machine created from the template. It defines common operating system settings such as the type of operating system, the computer name, administrator password, domain name, product key, and time zone, answer file and run once file. 

* (B) Hardware profile—A hardware profile defines hardware configuration settings such as 

CPU, memory, network adapters, a video adapter, a DVD drive, a floppy drive, COM ports, 

and the priority given the virtual machine when allocating resources on a virtual machine 

host. 

NOTE: VMM also includes host profiles. Host profiles are not used for virtual machine 

creation. 

They are used during the conversion of a bare-metal computer to a Hyper-V host. 

Reference: Creating Profiles and Templates in VMM Overview 

Q3. - (Topic 8) 

Your network contains an Active Directory forest named contoso.com. The forest is 

managed by using Microsoft System Center 2012. 

Web developers must be able to use a self-service portal to request the deployment of 

virtual machines based on predefined templates. The requests must be approved by an 

administrator before the virtual machines are deployed. 

You need to recommend a solution to deploy the virtual machines. 

What should you include in the recommendation? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. A Virtual Machine Manager (VMM) service template, an Operations Manager dashboard, and an Orchestrator runbook 

B. A Service Manager service offering, an Orchestrator runbook, and an Operations Manager dashboard 

C. A Virtual Machine Manager (VMM) service template, a Service Manager service offering, and an Orchestrator runbook 

D. A Service Manager service offering, an Orchestrator runbook, and Configuration Managerpackages 

Answer:

Explanation: As a practical example, a user could initiate an Orchestrator runbook by requesting a service in a self-service portal. The runbook would then await approval by IT. Once approved, it would then automatically provision the necessary virtual machines through System Center Virtual Machine Manager, deploy the required software via Configuration Manager, arrange backup through System Center Data Protection Manager and integrate monitoring with a third-party system. 

Reference: Microsoft System Center Orchestrator 2012: Lead the System Center Band 

Q4. - (Topic 8) 

A company has offices in multiple geographic locations. The sites have high-latency, low-bandwidth connections. You need to implement a multisite Windows Deployment Services (WDS) topology for deploying standard client device images to all sites. 

Solution: At each site, you create a multicast deployment. You pre-stage the client images that you plan to deploy and point them to the local WDS server. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:

Q5. - (Topic 5) 

You need to perform the directory synchronization with Office 365. 

What should you do first? 

A. Set the domain functional level to Windows Server 2012. 

B. Upgrade the Office 365 licenses to Enterprise E4. 

C. Set the forest functional level to Windows Server 2012. 

D. Create a site-to-site VPN. 

E. Install the DirSync utility in the on-premises environment. 

Answer:

Q6. HOTSPOT - (Topic 8) 

You run the ldifde command and receive the following output: 

The command completes successfully. 

Use the drop-down menus to select the answer choice that completes each statement. 

Answer:  

Q7. DRAG DROP - (Topic 8) 

You manage a server named WAP01 that has the Web Application Proxy feature deployed. You deploy a web application named WebApp1 to a server named WEB01. WAP01 and WEB01 both run Microsoft Windows Server 2012 R2 and are members of the Active Directory Domain Services (AD DS) domain named corp.contoso.com. 

You have the following requirements: 

. WebApp1 must be available internally at URL https://webappl.corp.contoso.com by using Kerberos authentication. 

. WebApp1 must be available externally at URL https://webappl.contoso.net by using Active Directory Federation Services (AD FS) authentication. 

You need to configure computer accounts. 

How should you complete the relevant Windows PowerShell commands? To answer, drag the appropriate Windows PowerShell segment to the correct location. Each Windows PowerShell segment may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q8. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. 

You deploy several servers that have the Remote Desktop Session Host role service installed. 

You have two organizational units (OUs). The OUs are configured as shown in the following table. 

GPO1 contains the Folder Redirection settings for all of the users. 

You need to recommend a solution to prevent the sales users' folders from being redirected when the users log on to a Remote Desktop session. 

What should you include in the recommendation? 

A. FromGPO2, set the loopback processing mode. 

B. From GPO1, set the loopback processing mode. 

C. Configure security filtering for GPO1. 

D. Apply a WMI filter to GPO2. 

Answer:

Explanation: 

Group Policy applies to the user or computer in a manner that depends on where both the user and the computer objects are located in Active Directory. However, in some cases, users may need policy applied to them based on the location of the computer object alone. You can use the Group Policy loopback feature to apply Group Policy Objects (GPOs) that depend only on which computer the user logs on to. 

Reference: Loopback processing of Group Policy 

Q9. - (Topic 5) 

You need to plan the expansion of the Los Angeles office. 

What should you do? 

A. Install a read-only domain controller in Los Angeles. 

B. Install a domain controller in Los Angeles. 

C. Create and apply a filtered attribute set to the Los Angeles site. 

D. Create and apply a Group Policy object to the Los Angeles site. 

Answer:

Q10. - (Topic 8) 

You are designing an Active Directory forest for a company named Contoso, Ltd. Contoso identifies the following administration requirements for the design: 

. User account administration and Group Policy administration will be performed by 

network technicians. The technicians will be added to a group named OUAdmins. 

. IT staff who are responsible for backing up servers will have user accounts that are members of the Backup Operators group in the domain. 

. All user accounts will be located in an organizational unit (OU) named AllEmployees. 

You run the Delegation of Control Wizard and assign the OUAdmins group full control to all of the objects in the AllEmployeesOU. 

After delegating the required permissions, you discover that the user accounts of some of the IT staff have inconsistent permissions on the objects in AllEmployees. 

You need to recommend a solution to ensure that the members of OUAdmins can manage all of the objects in AllEmployees. 

What should you include in the recommendation? 

A. Remove the IT staff user accounts from Backup Operators and place them in a new group. Grant the new group the Backup files and directories user right and the Restore files and directories user right. Enforce permission inheritance on all of the objects in the AllEmployeesOU. 

B. Create separate administrator user accounts for the technicians. Enforce permission inheritance on all of the objects in the AllEmployeesOU. Delegate permissions to the new user accounts. 

C. Enforce permission inheritance on all of the objects in the AllEmployeesOU. Run the Delegation of Control Wizard. 

D. Move the user accounts of the technicians to a separate OU. Enforce permission inheritance on all of the objects in the AllEmployeesOU. Run the Delegation of Control Wizard on the AllEmployeesOU. 

Answer: