PrepAway - Latest Free Exam Questions & Answers

Tag: Exam 70-414 (v.1)

Exam 70-414: Implementing an Advanced Server Infrastructure (November 11th, 2014)

What should you recommend?

Your network contains an Active Directory domain named contoso.com.
You currently have an intranet web site that is hosted by two Web servers named Web1 and
Web2. Web1 and Web2 run Windows Server 2012.
Users use the name intranet.contoso.com to request the web site and use DNS round robin.
You plan to implement the Network Load Balancing (NLB) feature on Web1 and Web2.
You need to recommend changes to the DNS records for the planned implementation.
What should you recommend?

You need to ensure that App1 fails over automatically to another server if a single node in Cluster1 fails

Your company has a main office and a branch office.
You plan to implement a failover cluster named Cluster1 to host an application named App1.
The data of App1 will replicate to all of the nodes in Cluster1.
Cluster1 will contain two servers. The servers will be configured as shown in the following table.

The cluster nodes will not use shared storage.
The branch office contains two file servers named Server3 and Server4.
You need to ensure that App1 fails over automatically to another server if a single node in
Cluster1 fails.
What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.

Which five actions should you perform?

DRAG DROP
Your network contains servers that run Windows Server 2012. The network contains two
servers named Server1 and Server2 that are connected to a SAS storage device. The
device only supports two connected computers.
Server1 has the iSCSI Target Server role service installed. Ten application servers use their
iSCSI Initiator to connect to virtual disks in the SAS storage device via iSCSI targets on Server1.
Currently, Server2 is used only to run backup software.
You install the iSCSI Target Server role service on Server2.
You need to ensure that the iSCSI targets are available if Server1 fails.
Which five actions should you perform?
To answer, move the five appropriate actions from the list of actions to the answer area and
arrange them in the correct order.

How many disks should you identify?

DRAG DROP
Your network contains multiple servers that run Windows Server 2012.
You plan to implement three virtual disks. The virtual disks will be configured as shown in the
following table.

You need to identify the minimum number of physical disks required for each virtual disk.
How many disks should you identify?
To answer, drag the appropriate number of disks to the correct virtual disk in the answer
area. Each number of disks may be used once, more than once, or not at all. Additionally,
you may need to drag the split bar between panes or scroll to view content.

What should you include in the plan?

Your Active Directory currently contains five virtualized domain controllers that run Windows
Server 2012 R2.
The system state of each domain controller is backed up daily. The backups are shipped to
a remote location weekly.
Your company recently implemented a disaster recovery site that contains several servers.
The servers run Windows Server 2012 R2 and have the Hyper-V server role installed. The
disaster recovery site has a high-speed WAN link to the main office.
You need to create an Active Directory recovery plan that meets the following requirements:
Restores the Active Directory if a catastrophe prevents all access to the main office.
Minimizes data loss.
What should you include in the plan?

Which changes should you recommend?

Your network contains an Active Directory domain named contoso.com. The domain
contains several domain controllers. The domain controllers run either Windows Server 2012
or Windows Server 2008 R2.
The domain functional level is Windows Server 2008 R2. The forest functional level is
Windows Server 2008.

The corporate compliance policy states that all items deleted from Active Directory must be
recoverable from a Recycle Bin.
You need to recommend changes to the current environment to meet the compliance policy.
Which changes should you recommend? (Each correct answer presents part of the solution.
Choose all that apply.)

What should you recommend?

Your network contains 500 client computers that run Windows 7 and a custom application
named App1. App1 uses data stored in a shared folder.
You have a failover cluster named Cluster1 that contains two servers named Server1 and
Server2.
Server1 and Server2 run Windows Server 2012 and are connected to an iSCSI Storage
Area Network (SAN).
You plan to move the shared folder to Cluster1.
You need to recommend which cluster resource must be created to ensure that the shared
folder can be accessed from Cluster1.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.

How should you configure the port rule?

HOTSPOT
Your company has four offices. The offices are located in Montreal, Seattle, New York, and Miami.
Users access all of the web-based resources by using web proxy servers. The IP addresses
of the web proxies at each office are configured as shown in the following table.

The connections to the web proxies are balanced by using round-robin DNS.
The company plans to deploy a new application. The new application has a farm of front-end
web servers that connect to a back-end application server. When a session to a web server
is established, the web server stores data until the session closes. Once the session closes,
the data is sent to the application server.
You need to ensure that the incoming sessions to the web server farm are distributed among
the web servers. The solution must ensure that if a web server fails, the users are NOT
directed to the failed server.
How should you configure the port rule? To answer, select the appropriate options in the answer area.

What should you modify from the port settings?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain
contains a Network Load Balancing (NLB) cluster named Cluster1 that contains four nodes.
Cluster1 hosts a web application named App1. The session state information of App1 is
stored in a Microsoft SQL Server 2012 database.
The network contains four subnets.
You discover that all of the users from a subnet named Subnet1 always connect to the same
NLB node.
You need to ensure that all of the users from each of the subnets connect equally across all
of the nodes in Cluster1.
What should you modify from the port settings?
To answer, select the appropriate setting in the answer area.

Does this meet the goal?

Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network
switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will
have a virtual network adapter that is connected to the external virtual network switch and
that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run
the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and
join each virtual machine to an NLB cluster. The cluster will be configured to use unicast
only.
You need to ensure that the NLB feature can distribute connections across all of the virtual
machines.
Solution: From the properties of each virtual machine, you enable MAC address spoofing for
the existing virtual network adapter.
Does this meet the goal?


Page 2 of 1212345...10...Last »