PrepAway - Latest Free Exam Questions & Answers

Category: 70-414 (v.4)

Exam 70-414: Implementing an Advanced Server Infrastructure (update February 24th, 2017)

Does this meet the goal?

You need to ensure that the developers can manage their own virtual machines.
Solution: You perform the following actions:

In Virtual Machine Manager, you create a new user role named DevUsers that uses the Application Administrator profile.
You create and publish a request offering that allows the DevUsers role to create checkpoints.
You grant Checkpoint permissions to the DevUsers role.
You distribute the Self-Service Portal to the developers.
Does this meet the goal?

Does this meet the goal?

An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when
the project is complete.
You need to ensure that the protected content is still available after AD RMS is uninstalled.
Solution: You enable the decommissioning service by using the AD RMS management console. You grant all users the Read & Execute permission to
the decommission pipeline.
Does this meet the goal?

Solution: You run the following Windows PowerShell comm…

An organization uses an Active Directory Rights Management Services (AD RMS) cluster names RMS1 to protect content for a project. You uninstall AD RMS when
the project is complete.
You need to ensure that the protected content is still available after AD RMS is uninstalled.
Solution: You run the following Windows PowerShell command:
Set-ItemProperty -Path <protected content>:\\ -Name IsDecommissioned -Value $true EnableDecommission
Does this meet the goal?

Does this meet the goal?

An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when
the project is complete.
You need to ensure that the protected content is still available after AD RMS is uninstalled.
Solution: You add the backup service account to the SuperUsers group and back up the protected content. Then, you restore the content to a file server
and apply the required NTFS permissions to the files.
Does this meet the goal?

Solution: You run the following command from an adminis…

An organization uses an Active Directory Rights Management Services (AD RMS) cluster names RMS1 to protect content for a project. You uninstall AD RMS when
the project is complete.
You need to ensure that the protected content is still available after AD RMS is uninstalled.
Solution: You run the following command from an administrative command prompt:

cipher /a/d/s:<protected share name>
Does this meet the goal?

Does this meet the goal?

Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers.
You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server.
Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2.
All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster.
The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the
external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2.
Does this meet the goal?

Does this meet the goal?

Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers.
You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server.
Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2.
All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster.
The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: On each Hyper-V server, you create a new private virtual network switch.
From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new private
virtual network switches.
Does this meet the goal?

Does this meet the goal?

Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers.
You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server.
Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2.
All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster.
The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you enable MAC address spoofing for the existing virtual network adapter.
Does this meet the goal?

Enable-AdfsDeviceRegistration Does this meet the goal?

You plan to allow users to run internal applications from outside the company’s network.
You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed.
You must secure on-premises resources by using multi-factor authentication (MFA).
You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.
Solution: You install a local instance of MFA Server. You connect the instance to the Microsoft Azure MFA provider, and then run the following Windows
PowerShell cmdlet. Enable-AdfsDeviceRegistration

Does this meet the goal?

Does this meet the goal?

You plan to allow users to run internal applications from outside the company’s network.
You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed.
You must secure on-premises resources by using multi-factor authentication (MFA).
You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.
Solution: You install a local instance of the MFA Server. You connect the instance to the Microsoft Azure MFA provider and then you use Microsoft
Intune to manage personal devices.
Does this meet the goal?


Page 1 of 2412345...1020...Last »