aiotestking uk

70-413 Exam Questions - Online Test


70-413 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 6) 

You need To configure the Group Policy for salespeople. 

Solution: You create a Group Policy Object (GPO) with an AppLocker policy. You link the 

GPO to the Computers OU for each location. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:

Q2. - (Topic 8) 

Your network contains an Active Directory domain. All servers run Windows Server 2012 R2. 

The domain contains the servers shown in the following table. 

You need to recommend which servers will benefit most from implementing data 

deduplication. 

Which servers should you recommend? 

A. Server1 and Server2 

B. Server1 and Server3 

C. Server1 and Server4 

D. Server2 and Server3 

E. Server2 and Server4 

F. Server3 and Server4 

Answer:

Explanation: * Server 2: Data deduplication involves finding and removing duplication within data without compromising its fidelity or integrity. The goal is to store more data in less space by segmenting files into small variable-sized chunks (32–128 KB), identifying duplicate chunks, and maintaining a single copy of each chunk. Redundant copies of the chunk are replaced by a reference to the single copy. The chunks are compressed and then organized into special container files in the System Volume Information folder 

* Server 3: In Windows Server 2012 R2, Data Deduplication can be installed on a scale-out file server and used to optimize live VHDs for VDI workloads. 

Reference: What's New in Data Deduplication in Windows Server 

Q3. - (Topic 8) 

Your network contains an Active Directory forest named contoso.com. The forest is managed by using Microsoft System Center 2012. 

You plan to create virtual machine templates to deploy servers by using the Virtual Machine 

Manager Self-service Portal (VMMSSP). 

To the Virtual Machine Manager (VMM) library, you add a VHD that has a generalized image of Windows Server 2012. 

You need to identify which VMM components must be associated with the image. 

Which components should you identify? (Each correct answer presents part of the solution. 

Choose all that apply.) 

A. A guest OS profile 

B. A hardware profile 

C. A capability profile 

D. A host profile 

Answer: A,B 

Explanation: 

Profiles 

VMM provides the following profiles: 

* (A) Guest operating system profile—A guest operating system profile defines operating system configured settings which will be applied to a virtual machine created from the template. It defines common operating system settings such as the type of operating system, the computer name, administrator password, domain name, product key, and time zone, answer file and run once file. 

* (B) Hardware profile—A hardware profile defines hardware configuration settings such as 

CPU, memory, network adapters, a video adapter, a DVD drive, a floppy drive, COM ports, 

and the priority given the virtual machine when allocating resources on a virtual machine 

host. 

NOTE: VMM also includes host profiles. Host profiles are not used for virtual machine 

creation. 

They are used during the conversion of a bare-metal computer to a Hyper-V host. 

Reference: Creating Profiles and Templates in VMM Overview 

Q4. - (Topic 8) 

You manage a server infrastructure for a software development company. There are 30 physical servers distributed across 4 subnets, and one Microsoft Hyper-V cluster that can run up to 100 virtual machines (VMs). You configure the servers to receive the IP address from a DHCP server named SERVER1 that runs Microsoft Windows Server 2012 R2. You assign a 30-day duration to all DHCP leases. 

Developers create VMs in the environment to test new software. They may create VMs several times each week. 

Developers report that some new VMs cannot acquire IP address. You observe that the DHCP scope is full and delete non-existent devices manually. All physical servers must keep their current DHCP lease configuration. 

You need to ensure that the DHCP lease duration for VMs is 8 hours. 

What should you configure? 

A. 4 server-level Allow filters 

B. 1 server-level DHCP policy 

C. 1 scope-level DHCP policy 

D. 4 scope-level exclusion ranges 

Answer:

Q5. - (Topic 3) 

You need to recommend a change to the Active Directory environment to support the company's planned changes. 

What should you include in the recommendation? 

A. Raise the functional level of the domain and the forest. 

B. Implement Administrator Role Separation. 

C. Upgrade the domain controllers that have the PDC emulator master role to Windows Server 2012. 

D. Upgrade the domain controller that has the domain naming master role to Windows Server 2012. 

Answer:

Explanation: 

* Scenario: 

The functional level of the domain and the forest is Windows Server 2008. 

Implement the Active Directory Recycle Bin. 

Q6. DRAG DROP - (Topic 8) 

Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. 

You plan to decommission the fabrikam.com domain. 

You need to perform the following migration tasks: 

. Copy user accounts from the fabrikam.com domain to the contoso.com domain. 

. Move the client computers from fabrikam.com to contoso.com. 

The solution must ensure that all of the user profiles are associated to the migrated user accounts. 

Which tool should you use to perform each task? 

To answer, drag the appropriate tool to the correct migration task in the answer area. Each tool may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q7. - (Topic 8) 

Your network contains an Active Directory forest named adatum.com. All domain controllers run Windows Server 2008 R2. The functional level of the domain and the forest is Windows Server 2008. 

You deploy a new Active Directory forest named contoso.com. All domain controllers run Windows Server 2012 R2. The functional level of the domain and the forest is Windows Server 2012 R2. 

You establish a two-way, forest trust between the forests. Both networks contain member servers that run either Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2 or Windows Server 2008. 

You plan to use the Active Directory Migration Tool 3.2 (ADMT 3.2) to migrate user accounts from adatum.com to contoso.com. SID history will be used in contoso.com and passwords will be migrated by using a Password Export Server (PES). 

You need to recommend which changes must be implemented to support the planned migration. 

Which two changes should you recommend? Each correct answer presents part of the solution. 

A. In the contoso.com forest, deploy a domain controller that runs Windows Server 2008 R2. 

B. In the adatum.com forest, upgrade the functional level of the forest and the domain. 

C. In the contoso.com forest, downgrade the functional level of the forest and the domain. 

D. In the adatum.com forest, deploy a domain controller that runs Windows Server 2012 R2. 

Answer: A,C 

Q8. - (Topic 8) 

Your company has a main office and 20 branch offices. All of the offices connect to each other by using a WAN link. 

The network contains an Active Directory forest named contoso.com. The forest contains a domain for each office. The forest root domain contains all of the server resources. 

Each branch office contains two domain controllers for the branch office domain and one domain controller for the contoso.com domain. 

Each branch office has a support technician who is responsible for managing the accounts of their respective office only. 

You recently updated all of the WAN links to high-speed WAN links. 

You need to recommend changes to the Active Directory infrastructure to meet the following requirements: 

. Reduce the administrative overhead of moving user accounts between the offices. 

. Ensure that the support technician in each office can manage the user accounts of their respective office. 

What should you include in the recommendation? More than one answer choice may achieve the goal. Select the BEST answer. 

A. Create a new child domain named corp.contoso.com. Create a shortcut trust between each child domain and corp.contoso.com. 

B. Create shortcut trusts between each child domain. In the main office, add a domain controller to each branch office domain. 

C. Move all of the user accounts of all the branch offices to the forest root domain. Decommission all of the child domains. 

D. Create a new forest root domain named contoso.local. Move all of the user accounts of all the branch offices to the new forest root domain. Decommission all of the child domains. 

Answer:

Explanation: The most basic of all Active Directory structures is the single domain model; this type of domain structure comes with one major advantage over the other models: simplicity. A single security boundary defines the borders of the domain, and all objects are located within that boundary. The establishment of trust relationships between other domains is not necessary, and implementation of technologies such as Group Policies is made easier by the simple structure. 

Q9. HOTSPOT - (Topic 8) 

You have a domain controller that hosts an Active Directory-integrated zone. 

On the domain controller, you run the following cmdlet: 

PS C:\> Get-DnsServerScavenging 

NoRefreshInterval:2.00:00:00 RefreshInterval:3.00:00:00 ScavengingInterval:4.00:00:00 ScavengingState:True LastScavengeTime:1/30/2014 9:10:36 AM 

Use the drop-down menus to select the answer choice that completes each statement. 

Answer:  

Q10. DRAG DROP - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 resides in the perimeter network and has the Remote Access server role installed. 

Some users have laptop computers that run Windows 7 and are joined to the domain. Some users work from home by using their home computers. The home computers run either Windows XP, Windows Vista/ Windows 7, or Windows 8. 

You need to configure the computers for remote access. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: