aiotestking uk

70-413 Exam Questions - Online Test


70-413 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 8) 

You have a virtual machine (VM) named VM-APP1 that hosts critical application named APP1. The VM has the following VHDX virtual disks: 

Both VHDX virtual disks are located on LUN1 of a Storage Area Network. 

Every time you perform Storage Live Migration for VM-APP1, it takes a few hours. 

You need to ensure that the storage supports Offloaded Data Transfer (ODX), and that 

ODX is enabled. 

Which two Windows PowerShell commands should you run? Each correct answer presents 

part of the solution. 

A. Set-ItemProperty HKLM:\system\currentcontrolset\control\filesystem -Name “FilterSupportedFeaturesMode” –Value 0 

B. Set-StorageSubSystem –InputObject (Get-StorageSubSystem) –ThrottleLimit 0 

C. Get-ItemProperty HKLM:\system\currentcontrolset\services\<FilterName> -Name “SupportedFeatures” 

D. Set-ItemProperty HKLM:\system\currentcontrolset\control\filesystem –Name “FilterSupportedFeatiresMode” –Value1 

Answer: A,C 

Q2. - (Topic 6) 

You need To configure the Group Policy for salespeople. 

Solution: You move all shared desktops to a separate organizational unit (OU). You create one Group Policy object (GPO) that has an AppLocker policy rule and enable loopback policy processing within the GPO. You link the GPO to the new OU. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:

Q3. - (Topic 8) 

Your company plans to hire 100 sales representatives who will work remotely. 

Each sales representative will be given a laptop that will run Windows 7. A corporate image of Windows 7 will be applied to each laptop. 

While the laptops are connected to the corporate network, they will be joined to the domain. The sales representatives will not be local administrators. 

Once the laptops are configured, each laptop will be shipped by courier to a sales representative. 

The sales representative will use a VPN connection to connect to the corporate network. 

You need to recommend a solution to deploy the VPN settings for the sales representatives. The solution must meet the following requirements: 

. Ensure that the VPN settings are the same for every sales representative. 

. Ensure that when a user connects to the VPN, an application named App1 starts. 

What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. VPN auto triggering 

B. The Add-VpnConnectioncmdlet 

C. The Connection Manager Administration Kit (CMAK) 

D. Group Policy preferences 

Answer:

Explanation: Connection Manager is a client network connection tool that allows a user to connect to a remote network, such as an Internet service provider (ISP), or a corporate network protected by a virtual private network (VPN) server. The Connection Manager Administration Kit (CMAK) is a tool that you can use to customize the remote connection experience for users on your network by creating predefined connections to remote servers and networks. To create and customize a connection for your users, you use the CMAK wizard. 

Reference: Connection Manager Administration Kit 

Q4. - (Topic 8) 

Your network contains an Active Directory forest that has two domains named contoso.com and europe.contoso.com. The forest contains five servers. The servers are configured as shown in the following table. 

You plan to manage the DHCP settings and the DNS settings centrally by using IP Address Management (IPAM). 

You need to ensure that you can use IPAM to manage the DHCP and DNS settings in both domains. The solution must use the minimum amount of administrative effort. 

What should you do? 

A. Upgrade DCE1 and DCE2 to Windows Server 2012, and then install the IP Address Management (IPAM) Server feature. Run the Set-IpamConfiguration cmdlet for each domain. 

B. Upgrade DCE1 and DCE2 to Windows Server 2012, and then install the IP Address Management (IPAM) Server feature. Run the Invoke-IpamGpoProvisioning cmdlet for each domain. 

C. Upgrade DC1 and DC2 to Windows Server 2012, and then install the IP Address Management (IPAM) Server feature. Run the Invoke-IpamGpoProvisioning cmdlet for each domain. 

D. Upgrade DC1 and DC2 to Windows Server 2012, and then install the IP Address Management (IPAM) Server feature. Run the Set-IpamConfiguration cmdlet for each domain. 

Answer:

Explanation: * Upgrade the Windows 2003 Servers. 

* Invoke-IpamGpoProvisioning Creates and links group policies in the specified domain for provisioning required access settings on the servers managed by the computer running the IP Address Management (IPAM) server. 

Incorrect: 

Set-IpamConfiguration 

Sets the configuration for the computer running the IP Address Management (IPAM) 

server, including the TCP port number over which the computer running the IPAM Remote 

Server Administration Tools (RSAT) client connects with the computer running the IPAM 

server. 

Q5. - (Topic 1) 

What method should you use to deploy servers? 

A. WDS 

B. AIK 

C. ADK 

D. EDT 

Answer:

Explanation: WDS is a server role that enables you to remotely deploy Windows operating systems. You can use it to set up new computers by using a network-based installation. This means that you do not have to install each operating system directly from a CD, USB drive, or DVD. 

Reference: What's New in Windows Deployment Services in Windows Server 

Q6. - (Topic 8) 

Your company has a main office that contains several servers and several users. The main office contains a file server named Server1 that runs Windows Server 2012. 

The users access a large report file that is created on Server1 each day. 

The company plans to open a new branch office. The branch office will contain only client computers. 

You need to implement a solution to reduce the amount of bandwidth used by the client computers in the branch office to download the report each day. 

What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Install the BranchCache for network files role service on Server1. Configure the client computers to use BranchCache in hosted cache mode. 

B. Configure the offline settings of the shared folder that contains the report. 

C. Install the BranchCache for network files role service on Server1. Configure the client computers to use Branchcache in distributed mode. 

D. Enable the Background Intelligent Transfer Service (BITS) feature on Server1 and on each client computer in the branch office. Move the report to a web folder. 

Answer:

Explanation: 

Distributed cache mode. In this mode, branch office client computers download content from the content servers in the main office and then cache the content for other computers in the same branch office. 

Distributed cache mode does not require a server computer in the branch office. Reference: BranchCache Deployment Guide 

Q7. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Server 2012. 

Your company uses IP Address Management (IPAM) to manage multiple DHCP servers. 

A user named User1 is a member of the IPAM Users group and is a member of the local Administrators group on each DHCP server. 

When User1 edits a DHCP scope by using IPAM, the user receives the error message shown in the exhibit. (Click the Exhibit button.) 

You need to prevent User1 from receiving the error message when editing DHCP scopes by using IPAM. 

What should you do? 

A. Add User1 to the DHCP Administrators group on each DHCP server. 

B. Add User1 to the IPAM Administrators group. 

C. Run the Set-IpamServerConfig cmdlet. 

D. Run the Invoke-IpamGpoProvisioning cmdlet. 

Answer:

Explanation: 

IPAM Administrators: IPAM Administrators have the privileges to view all IPAM data and perform all IPAM tasks. 

Reference: Walkthrough: Demonstrate IPAM in Windows Server 2012 

http://technet.microsoft.com/en-us/library/hh831622.aspx 

Q8. - (Topic 8) 

Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest named contoso.com. The forest contains a Microsoft Exchange Server 2010 organization. All of the domain controllers in contoso.com run Windows Server 2012. 

The perimeter network contains an Active Directory forest named litware.com. 

You deploy Microsoft Forefront Unified Access Gateway (UAG) to litware.com. All of the domain controllers in litware.com run Windows Server 2012. 

Some users connect from outside the network to use Outlook Web App. 

You need to ensure that external users can authenticate by using client certificates. 

What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. To the perimeter network, add an Exchange server that has the Client Access server role installed. 

B. Deploy UAG to contoso.com. 

C. Enable Kerberos delegation in litware.com. 

D. Enable Kerberos constrained delegation in litware.com. 

Answer:

Explanation: Forefront TMG provides support for Kerberos constrained delegation (often abbreviated as KCD) to enable published Web servers to authenticate users by Kerberos afterForefront TMG verifies their identity by using a non-Kerberos authentication method. When used in this way, Kerberos constrained delegation eliminates the need for requiring users to provide credentials twice. 

Reference: About Kerberos constrained delegation 

Q9. DRAG DROP - (Topic 6) 

You need to configure DNS for the Dublin office. 

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer:  

Q10. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites. You plan to deploy DirectAccess. 

The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network. 

You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirement. 

What should you include in the recommendation? 

A. Set the ISATAP State to state enabled. 

B. Enable split tunneling. 

C. Set the ISATAP State to state disabled. 

D. Enable force tunneling. 

Answer:

Explanation: 

You can configure DirectAccess clients to send all of their traffic through the tunnels to the DirectAccess server with force tunneling. When force tunneling is configured, DirectAccess clients that detect that they are on the Internet modify their IPv4 default route so that default route IPv4 traffic is not sent. With the exception of local subnet traffic, all traffic sent by the DirectAccess client is IPv6 traffic that goes through tunnels to the DirectAccess server.