Free Download Of Lead2pass Microsoft 70-414 VCE And PDF Dumps (131-140)

Lead2pass provides guarantee of Microsoft 70-414 exam because, Lead2pass is an authenticated IT certifications site and the high class of the products are developed due to extensive hiring of the experts staff. The 70-414 study guide is updated on 29 Nov, 14 with regular basis and the answers are rechecked of every exam.

QUESTION 131
Your company has three offices. The offices are located in Seattle, London, and Tokyo.
The network contains an Active Directory domain named northwindtraders.com. Each office is configured as an Active Directory site.

System Center 2012 R2 Operations Manager is deployed to the domain. The servers in all three sites are monitored by using Operations Manager.
The company has a web site for its customers. The web site requires users to sign-in.
You need to recommend a solution to monitor the web site.
The solution must meet the following requirements:
– Monitor the availability of the web site from locations in North America, Europe, Asia, and Australia.
– Monitor multi-step requests to the web site.
– Use a central console for monitoring.
What should you include in the recommendation?

A.    Import the System Center Global Services Monitoring Management Pack and add the Web Application Availability Monitoring monitoring type.
B.    Add the Web Application Transaction monitoring type and configure watcher nodes.
C.    Add the TCP Port monitoring type and configure watcher nodes.
D.    Import the System Center Global Services Monitor Management Pack and add the Visual Studio Web Test Monitoring monitoring type.

Answer: D

QUESTION 132
You have a System Center 2012 R2 Configuration Manager deployment.
All users have client computers that run Windows 8.1. The users log on to their client computer as standard users.
An application named App1 is deployed to the client computers by using System Center. You need to recommend a solution to validate a registry key used by App1. If the registry key has an incorrect value, the value must be changed. The registry key must be validated every day. The solution must generate a report on non-compliant computers.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.

A.    Group Policy preferences
B.    A desired configuration baseline
C.    The Windows PowerShell Desired State Configuration (DSC) feature
D.    The Microsoft Baseline Security Analyzer (MBSA)

Answer: B

QUESTION 133
Your network contains an Active Directory forest named contoso.com.
Your company works with a partner company that has an Active Directory forest named fabrikam.com. Both forests contain domain controllers that run only Windows Server 2012 R2.
The certification authority (CA) infrastructure of both companies is configured as shown in the following table.

image_thumb

You need to recommend a certificate solution that meets the following requirements:
– Server authentication certificates issued from fabrikam.com must be trusted automatically by the
computers in contoso.com.
– The computers in contoso.com must not trust automatically any other type of certificates issued from the CA hierarchy in fabrikam.com.
What should you include in the recommendation?

A.    Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate.
B.    Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing.
C.    Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate.
D.    Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing.

Answer: B

QUESTION 134
Your network contains an Active Directory domain named contoso.com.
You plan to implement Network Load Balancing (NLB).
You need to identify which network services and applications can be load balanced by using NLB.
Which services and applications should you identify?

A.    Microsoft SQL Server 2012 Reporting Services
B.    A failover cluster
C.    A DHCP server
D.    A Microsoft Exchange Server 2010 Mailbox server
E.    A file server
F.    A Microsoft SharePoint Server 2010 front-end Web server

Answer: AF

QUESTION 135
Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that run Windows Server 2012. All client computers run Windows 7.
The network contains two data centers.
You plan to deploy one file server to each data center.
You need to recommend a solution to provide redundancy for shared folders if a single data center fails.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.

A.    A Distributed File System (DFS) namespace and DFS Replication
B.    Cluster Shared Volumes (CSVs)
C.    The clustered File Server role of the File Server for general use type
D.    The clustered File Server role of the File Server scale-out application data type

Answer: A

QUESTION 136
You have a Windows Server 2012 R2 failover cluster that contains four nodes. Each node has four network adapters. The network adapters on each node are configured as shown in the following table.

image_thumb[1]

NIC4 supports Remote Direct Memory Access (RDMA) and Receive Side Scaling (RSS). The cluster networks are configured as shown in the following table.

image_thumb[2]

You need to ensure that ClusterNetwork4 is used for Cluster Shared Volume (CSV) redirected traffic.
What should you do?

A.    Set the metric of ClusterNetwork4 to 90,000 and disable SMB Multichannel.
B.    On each server, replace NIC4 with a 1-Gbps network adapter.
C.    Set the metric of ClusterNetwork4 to 30,000 and disable SMB Multichannel.
D.    On each server, enable RDMA on NIC4.

Answer: C

QUESTION 137
Your network contains an Active Directory domain named contoso.com. The domain contains 200 servers that run either Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2. The servers run the following enterprise applications:
– Microsoft Exchange Server 2013
– Microsoft SQL Server 2014
System Center 2012 R2 Operations Manager is deployed to the domain.
Operations Manager monitors all of the servers in the domain. Audit Collection Services (ACS) is installed.
You need to recommend a monitoring strategy for the domain that meets the following requirements:
– A group of administrators must be notified when an error is written to the System log on the servers that run Exchange Server 2013.
– A group of administrators must be notified when a specific event is written to The Application log on the servers that run SQL Server 2014.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.

A.    From Operations Manager, enable audit collection.
B.    From Operations Manager, implement two monitors.
C.    From Computer Management, implement one event subscription.
D.    From Operations Manager, implement two rules.

Answer: D

QUESTION 138
Your company has four offices. The offices are located in Montreal, Seattle, New York, and Miami.
Users access all of the web-based resources by using web proxy servers. The IP addresses of the web proxies at each office are configured as shown in the following table.

image_thumb[11]

The connections to the web proxies are balanced by using round-robin DNS.
The company plans to deploy a new application. The new application has a farm of front-end web servers that connect to a back-end application server. When a session to a web server is established, the web server stores data until the session closes. Once the session closes, the data is sent to the application server.
You need to ensure that the incoming sessions to the web server farm are distributed among the web servers. The solution must ensure that if a web server fails, the users are NOT directed to the failed server.
How should you configure the port rule? To answer, select the appropriate options in the answer area.
 image_thumb[4]

Answer:

image_thumb[5]

QUESTION 139
Your network contains an Active Directory domain named contoso.com. The domain contains a Network Load Balancing (NLB) cluster named Cluster1 that contains four nodes. Cluster1 hosts a web application named App1. The session state information of App1 is stored in a Microsoft SQL Server 2012 database.
The network contains four subnets.
You discover that all of the users from a subnet named Subnet1 always connect to the same NLB node.
You need to ensure that all of the users from each of the subnets connect equally across all of the nodes in Cluster1.
What should you modify from the port settings?
To answer, select the appropriate setting in the answer area.

image_thumb[6]

Answer:

image_thumb[7]

QUESTION 140
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. The domain contains a server named Server1.
Server1 is a certification authority (CA). All servers run Windows Server 2012 R2.
You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers. The unique identifier for your organization is set to Contoso. You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data recovery agent. You must be able to perform the recovery from any administrative computer.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

image_thumb[8]

Answer:

image_thumb[9]

Preparing for Microsoft exams of 70-414 is really a tough task to accomplish for a person busy with day jobs. Lead2pass Microsoft training material uses latest exam questions to get your targets achieved in a hassle free way.

www.lead2pass.com/70-414.html

admin
Author

admin