Implementing an Advanced Server Infrastructure by

Implementing an Advanced Server Infrastructure by Tuurtje
Number: 70-414
Passing Score: 700
Time Limit: 180 min
File Version: 2.0
http://www.gratisexam.com/
70-414: Implementing an Advanced Server Infrastructure
Technology: Windows Server 2012
1-1-2013 Tuurtje
Updated some answers that where not correct imho
Q7
Q9
Q16
Q20
Q25
Exam A
QUESTION 1
Your network contains the following:
20 Hyper-V hosts
100 virtual machines
2,000 client computers
You need to recommend an update infrastructure design to meet the following requirements:
Deploy updates to of the all virtual machines and the client computers from a single console. Generate reports
that contain a list of the applied updates.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. One Windows Server update Services (WSUS) server integrated with Microsoft System Center 2012
Configuration Manager and a second WSUS server that is integrated with Microsoft System Center 2012
Virtual Machine Manager (VMM)
B. One Windows Server Update Services (WSUS) server integrated with Microsoft System Center 2012
Configuration Manager and Microsoft System Center 2012 Virtual Machine Manager (VMM)
C. One Windows Server Update Services (WSUS) server integrated with Microsoft System Center 2012 Virtual
Machine Manager (VMM)
D. One Windows Server Update Services (WSUS) server integrated with Microsoft System Center 2012
Configuration Manager, a second WSUS server integrated with Microsoft System Center 2012 Virtual
Machine Manager (VMM), and a third standalone WSUS server.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft
System Center 2012 infrastructure. You deploy a service named Service1 by using a service template. Service1
contains two virtual machines. The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the availability
information of Service1. What should you do?
A. From Configuration Manager, create a Collection and a Desired Configuration Management baseline.
B. From Virtual Machine Manager (VMM), modify the properties of the service template.
C. From Operations Manager, create a Distributed Application and a Monitor Override.
D. From Operations Manager, create a Distributed Application and a Service Level Tracking object.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Your network contains an Active Directory domain named contoso.com. You plan to implement Microsoft
System Center 2012. You need to identify which solution automates the membership of security groups for
contoso.com. The solution must use workflows that provide administrators with the ability to approve the
addition of members to the security groups. Which System Center 2012 roles should you identify?
A.
B.
C.
D.
Service Manager and Virtual Machine Manager (VMM)
Configuration Manager and Orchestrator
Operations Manager and Orchestrator
Orchestrator and Service Manager
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
Your network contains 10 servers that run Windows Server 2012. The servers have the Hyper-V server role
installed. The servers host a Virtual Desktop Infrastructure (VDI) that contains persistent virtual machines. Each
virtual machine is assigned to a specific user. Users can install software on their specific virtual machine. You
need to implement a solution to generate monthly reports that contain a list of all the installed software on the
virtual machines. The solution must NOT require the installation of additional software on the virtual machines.
Which solution should you implement?
A.
B.
C.
D.
A Microsoft System Center 2012 Configuration Manager software inventory
A Microsoft System Center 2012 Configuration Manager hardware inventory
Microsoft Assessment and Planning (MAP) Toolkit scans
Microsoft Audit Collection Services (ACS) audit logs
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
Your network contains 20 servers that run Windows Server 2012. The servers have the Hyper-V server role
installed. You plan to deploy a management solution. You need to recommend which Microsoft System Center
2012 roles must be deployed to meet the following requirements:
An administrator must be notified when an incident occurs, such as a serious error in the event log, on a HyperV host, or on a virtual machine. An administrator must be able to assign an incident to a specific administrator
for resolution. An incident that remains unresolved for more than 10 hours must be escalated automatically to
another administrator. Administrators must be able to generate reports that contain the details of incidents and
escalations. Which System Center 2012 roles should you recommend? More than one answer choice may
achieve the goal. Select the BEST answer.
A.
B.
C.
D.
Operations Manager and Service Manager
Service Manager and Virtual Machine Manager (VMM)
Configuration Manager and Service Manager
Operations Manager and Orchestrator
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
Your company has a human resources department, a finance department, a sales department, and an R&D
department. The company audits the access of documents that contain department-specific sensitive
information. You are planning an administrative model for the departments to meet the following requirements:
Provide R&D managers with the ability to back up all the files of their department only.
Provide finance managers with the ability to view the audit logs for the files of their department only.
Provide human resources managers with the ability to view the audit logs for the files of their department
only.
Provide sales managers with the ability to modify the permissions on all the shared folders of their
department only
http://www.gratisexam.com/
You need to identify the minimum amount of file servers required on the network to meet the requirements of
each department. How many file servers should you identify?
A.
B.
C.
D.
1
2
3
4
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
Your company has a main office and a branch office. Each office contains several hundred computers that run
Windows 2012. You plan to deploy two Windows Server Update Services (WSUS) servers. The WSUS servers
will be configured as shown in the following table.
You need to implement the WSUS infrastructure to meet the following requirements:
All updates must be approved from a server in the main office. All client computers must connect to a WSUS
server in their local office. What should you do? (Each correct answer presents part of the solution. Choose all
that apply.)
A.
B.
C.
D.
E.
F.
Deploy a Group Policy object (GPO) that has the update location set to Server1.
On Server2, configure WSUS in Replica mode.
On Server1, configure WSUS in Replica mode.
On Server2, configure WSUS in Autonomous mode.
Deploy a Group Policy object (GPO) that has the update location set to Server2.
On Server1, configure WSUS in Autonomous mode.
Correct Answer: ABE
Section: (none)
Explanation
Explanation/Reference:
Choose a Type of WSUS Deployment
Autonomous mode: An upstream WSUS server shares updates with its downstream server or servers
during synchronization, but not update approval status or computer group information. Downstream WSUS
servers must be administered separately. Autonomous servers can also synchronize updates for a set of
languages that is a subset of the set synchronized by their upstream server.
Replica mode: An upstream WSUS server shares updates, approval status, and computer groups with its
downstream server or servers. Downstream replica servers inherit update approvals and cannot be
administered apart from their upstream WSUS server.
QUESTION 8
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft
System center 2012 infrastructure. The domain contains the computers configured as shown in the following
table.
You need to implement a monitoring solution that gathers the security logs from all of the computers in the
domain. Which monitoring solution should you implement? More than one answer choice may achieve the goal.
Select the BEST answer.
A. Data Collector Sets (DCSs)
B. Event subscriptions
C. Desired Configuration Management in Configuration Manager
D. Audit Collection Services (ACS) in Operations Manager
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft
System Center 2012 infrastructure. All client computers have a custom application named App1 installed. App1
generates an Event ID 42 every time the application runs out of memory. Users report that when App1 runs out
of memory, their client computer runs slowly until they manually restart App1. You need to recommend a
solution that automatically restarts App1 when the application runs out of memory. What should you include in
the recommendation?
A.
B.
C.
D.
From
From
From
From
Configurations Manager, create a desired configuration management baseline,
Operations Manager, create an alert.
Windows System Resource Manager, create a resource allocation policy.
Event Viewer, attach a task to the event.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Run a Task in Response to a Given Event
QUESTION 10
Your network contains two clusters. The clusters are configured as shown in the following table.
All of the servers in both of the clusters run Windows Server 2012. You need to plan the application of Windows
updates to the nodes in the cluster. What should you include in the plan? More than one answer choice may
achieve the goal. Select the BEST answer.
A. Cluster-Aware Updating (CAU) self-updating and downloaded updates from Windows Server Update
Services (WSUS)
B. Microsoft System Center 2012 Service Manager integrated with Windows Server Update Service (WSUS)
C. A manual application of Windows updates on all of the cluster node
D. Microsoft System Center 2012 Configuration Manager integrated with Windows Server Update Service
(WSUS)
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
Your network contains an Active Directory domain named contoso.com. The domain contains 20 servers that
run Windows Server 2012. The domain contains a Microsoft System Center 2012 infrastructure. A web
application named WebApp1 is installed on the 20 servers. You plan to deploy a custom registry key for
WebApp1 on the 20 servers. You need to deploy the registry key to the 20 servers. The solution must ensure
that you can verify whether the registry key was applied successfully to the servers. What should you do? More
than one answer choice may achieve the goal. Select the BEST answer.
A.
B.
C.
D.
From
From
From
From
Operations Manager, create a monitor.
the Group Policy Management console, create a Group Policy object (GPO).
Configuration Manager, create a Compliance Settings.
Orchestrator Runbook Designer, create a runbook.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Introduction to Compliance Settings in Configuration Manager
Additionally, you can check for compliance with software updates, security settings, and mobile devices.
Configuration item settings of the type WMI, registry, script, and all mobile device settings in Configuration
Manager let you automatically remediate noncompliant settings when they are found.
QUESTION 12
Your network contains an Active Directory domain named contoso.com. The network contains a server named
Server1 that has the Hyper-V server role installed. Server1 hosts a virtual machine named VM1. You deploy a
new standalone server named Server2. You install the Hyper-V server role on Server2. Another administrator
named Admin1 plans to create a replica of VM1 on Server2. You need to ensure that Admin1 can configure
Server2 to receive a replica of VM1. To which group should you add Admin1?
A.
B.
C.
D.
Server Operators
Domain Admins
Hyper-V Administrators
Replicator
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
Your network contains the following roles and applications:
Microsoft SQL Server 2012
Distributed File System (DFS) Replication
Active Directory Domain Services (AD DS)
Active Directory Rights Management Services (AD RMS)
Active Directory Lightweight Directory Services (AD LDS)
You plan to deploy Active Directory Federation Services (AD FS). You need to identify which deployed services
or applications can be used as attribute stores for the planned AD FS deployment.
What should you identify? (Each correct answer presents a complete solution. Choose all that apply.)
A. DFS
B.
C.
D.
E.
AD RMS
Microsoft SQL Server 2012
AD LDS
AD DS
Correct Answer: CDE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
Your network contains an Active Directory domain named contoso.com. The network contains 15,000 client
computers. You plan to deploy an Active Directory Certificate Services (AD CS) infrastructure and issue
certificates to all of the network devices. You need to recommend a solution to minimize the amount of network
utilization caused by certificate revocation list (CRL) checking. What should you include in the
recommendation? More than one answer choice may achieve the goal. Select the BEST answer.
A.
B.
C.
D.
The Network Device Enrollment Service role service
An increase of the CRL validity period
A reduction of the CRL validity period
The Online Responder role service
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
Your network contains an Active Directory domain named contoso.com. You deploy Active Directory Certificate
Services (AD CS). You plan to deploy 100 external Web servers that will be publicly accessible and will require
Secure Sockets Layer (SSL) certificates. You also plan to deploy 50,000 certificates for secure email
exchanges with Internet-based recipients. You need to recommend a certificate services solution for the
planned deployment. What should you recommend? More than one answer choice may achieve the goal.
Select the BEST answer.
A.
B.
C.
D.
Deploy a certification authority (CA) that is subordinate to an external root CA.
Purchase 50,100 certificates from a trusted third-party root certification authority (CA).
Distribute a copy of the root certification authority (CA) certificate to external relying parties.
Instruct each user to request a Secure Email certificate from a trusted third-party root CA, and then
purchase 100 Web server certificates.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory
Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following
requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS). Ensure that all of the users
reenroll for their certificate every six months. What should you do first?
A. From the properties of the User certificate template, assign the Allow - Enroll permission to the
Authenticated Users group.
B. From the properties of the Basic EFS template, assign the Allow - Enroll permission to the Authenticated
Users group.
C. Create a copy of the User certificate template, and then modify the extensions of the copy.
D. Create a copy of the Basic EFS certificate template, and then modify the validity period of the copy.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
it makes more sense to use a user certificate
User Certificates
There are many certificate templates, but only the following three certificate types support EFS user operations:
User
Administrator
Basic EFS
When a user has a valid certificate of one of these types, EFS uses it for EFS operations.
QUESTION 17
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory
Certificate Services (AD CS) infrastructure. You deploy Active Directory Rights Management Services (AD
RMS) on the network. You provide several users on the network with the ability to protect content by using AD
RMS. You need to recommend a solution to provide the members of a group named Audit with the ability to
read and modify all of the AD RMS-protected content. What should you recommend?
A.
B.
C.
D.
Issue a CEP Encryption certificate to the members of the Audit group.
Issue a key recovery agent certificate to the members of the Audit group.
Add the Audit group as a member of the super users group.
Add the Audit group as a member of the Domain Admins group.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
AD RMS and Active Directory Objects
QUESTION 18
Your network contains an Active Directory domain named contoso.com. The network contains a perimeter
network. The perimeter network and the internal network are separated by a firewall. On the perimeter network,
you deploy a server named Server1 that runs Windows Server 2012. You deploy Active Directory Certificate
Services (AD CS). Each user is issued a smart card. Users report that when they work remotely, they are
unable to renew their smart card certificate. You need to recommend a solution to ensure that the users can
renew their smart card certificate from the Internet. What should you recommend implementing on Server1?
More than one answer choice may achieve the goal. Select the BEST answer.
A. The Certification Authority Web Enrollment role service and the Online Responder role service
B. The Active Directory Federation Services server role
C. The Certificate Enrollment Policy Web Service role service and the Certificate Enrollment Web Service role
service
D. An additional certification authority (CA) and the Online Responder role service
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
Your company, which is named Contoso, Ltd., has offices only in North America. The company has 2,000
users. The network contains an Active Directory domain named contoso.com. You plan to deploy an Active
Directory Certificate Services (AD CS) infrastructure and assign certificates to all client computers. You need to
recommend a PKI solution to protect the private key of the root certification authority (CA) from being accessed
by external users. What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A.
B.
C.
D.
An offline standalone root CA and an online enterprise issuing CA
An online enterprise root CA and an online enterprise issuing CA
An offline standalone root CA and an offline enterprise issuing CA
An online enterprise root CA, an online enterprise policy CA, and an online enterprise issuing CA
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory
Certificate Services (AD CS) infrastructure. You publish the certificate revocation list (CRL) to a farm of Web
servers. You are creating a disaster recovery plan for the AD CS infrastructure. You need to recommend which
actions must be performed to restore certificate revocation checking if a certification authority (CA) is offline for
an extended period of time. Which three actions should you recommend? To answer, move the three
appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
CA Maintenance
The old CRL may be re-signed without using the certification authority. This process assumes the availability of
the CA private key(s) outside of the CA to actually sign the CRL. To update an expiring CRL, the old CRL file
will need to be retrieved first.
certutil -sign <existing CRL file name> <resigned CRL file name>
QUESTION 21
Your network contains an Active Directory domain named contoso.com. The domain contains four servers
named Server1, Server2, Server3, and Server4 that run Windows Server 2012. Server1 and Server2 are
configured as file servers and are part of a failover cluster named Cluster1. Server3 and Server4 have
Microsoft SQL Server 2012 installed and are part of a failover cluster named Cluster2. You add a disk named
Disk1 to the nodes in Cluster1. Disk1 will be used to store the data files and log files used by SQL Server 2012.
You need to configure the environment so that access to Disk1 remains available when a node on Cluster1 fails
over or fails back. Which three actions should you perform? To answer, move the three appropriate actions
from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
http://blogs.technet.com/b/josebda/archive/2012/08/23/windows-server-2012-scale-out-file-server-for-sqlserver-2012-step-by-step-installation.aspx
QUESTION 22
Your network contains an Active Directory domain. The domain contains a site named Site1. All of the client
computers in Site1 use static IPv4 addresses on a single subnet. Site1 contains a Storage Area Network (SAN)
device and two servers named Server1 and Server2 that run Windows Server 2012. You plan to implement a
DHCP infrastructure that will contain Server1 and Server2. The infrastructure will contain several IP address
reservations. You need to recommend a solution for the DHCP infrastructure to ensure that clients can receive
IP addresses from a DHCP server if either Server1 or Server2 fails. What should you recommend? (Each
correct answer is a complete solution.
Choose all that apply.)
A. Configure all of the client computers to use IPv6 addresses, and then configure Server1 and Server2 to run
DHCP in stateless mode.
B. Configure Server1 and Server2 as members of a failover cluster, and then configure DHCP as a clustered
resource.
C. Configure a DHCP failover relationship that contains Server1 and Server2.
D. Create a scope for each server, and then configure each scope to contain half of the IP addresses.
Correct Answer: BCD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and
Server2 are connected to a Fibre Channel Storage Area Network (SAN). Server1 and Server2 are members of
a failover cluster named Cluster1. You plan to host the clustered File Server role on the nodes in Cluster1.
Cluster1 will store application databases in shared folders. You need to implement a storage solution for
Cluster1. The solution must minimize the amount of time the shared folders are unavailable during a failover.
What should you implement? More than one answer choice may achieve the goal. Select the BEST answer.
A.
B.
C.
D.
An iSCSI Target Server cluster role in Cluster1
The Multi Path I/O (MPIO) feature on Server1 and Server2
A Virtual Fibre Channel SAN on Server1 and Server2
A Cluster Shared Volume (CSV) in Cluster1
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
Your network contains servers that run Windows Server 2012. The network contains two servers named
Server1 and Server2 that are connected to a SAS storage device. The device only supports two connected
computers. Server1 has the iSCSI Target Server role service installed. Ten application servers use their iSCSI
Initiator to connect to virtual disks in the SAS storage device via iSCSI targets on Server1.
Currently, Server2 is used only to run backup software. You install the iSCSI Target Server role service on
Server2. You need to ensure that the iSCSItargets are available if Server1 fails. Which five actions should you
perform? To answer, move the five appropriate actions from the list of actions to the answer area and arrange
them in the correct order.
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
Your network contains multiple servers that run Windows Server 2012. You plan to implement three virtual
disks. The virtual disks will be configured as shown in the following table.
You need to identify the minimum number of physical disks required for each virtual disk. How many disks
should you identify? To answer, drag the appropriate number of disks to the correct virtual disk in the answer
area. Each number of disks may be used once, more than once, or not at all. Additionally, you may need to
drag the split bar between panes or scroll to view content.
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Two-way stores two copies of the data on two disks
three-way stores three copies of the data on three disks
Parity has a minimum of three disks
QUESTION 26
Your network contains five servers that run Windows Server 2012. You install the Hyper-V server role on the
servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines
to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the
external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows
Server 2012. All of the virtual machines will run the identical web application. You plan to install the Network
Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The
cluster will be configured to use unicast only. You need to ensure that the NLB feature can distribute
connections across all of the virtual machines. What should you do?
A. From the properties of each virtual machine, add a second virtual network adapter. Connect the new virtual
network adapters to the external virtual network switch. Configure the new virtual network adapters to use a
VLAN identifier of 2.
B. On each Hyper-V server, create a new private virtual network switch. From the properties of each virtual
machine, add a second virtual network adapter. Connect the new virtual network adapters to the new
private virtual network switches.
C. On each Hyper-V server, create a new external virtual network switch. From the properties of each virtual
machine, add a second virtual network adapter. Connect the new virtual network adapters to the new
external virtual network switches.
D. From the properties of each virtual machine, enable MAC address spoofing for the existing virtual network
adapter.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
Your network contains an Active Directory domain named contoso.com. You currently have an intranet web site
that is hosted by two Web servers named Web1 and Web2. Web1 and Web2 run Windows Server 2012. Users
use the name intranet.contoso.com to request the web site and use DNS round robin. You plan to implement
the Network Load Balancing (NLB) feature on Web1 and Web2. You need to recommend changes to the DNS
records for the planned implementation. What should you recommend?
A.
B.
C.
D.
Create one alias (CNAME) record named Intranet. Map the CNAME record to Intranet.
Delete both host (A) records named Intranet. Create a pointer (PTR) record for each Web server.
Create a new host (A) record named Intranet. Remove both host (A) records for Web1 and Web2.
Delete one of the host (A) records named Intranet. Modify the remaining host (A) record named Intranet.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28
Your network contains a server named Server1 that runs Windows Server 2012. Server1 is configured as a
Hyper-V host. Server1 hosts a virtual machine named VM1. VM1 is configured as a file server that runs
Windows Server 2012. VM1 connects to a shared storage device by using the iSCSI Initiator. You need to back
up the files and the folders in the shared storage used by VM1. The solution must ensure that open files are
included in the backup. What should you do?
A.
B.
C.
D.
From
From
From
From
Hyper-V Manager, create a snapshot of VM1.
Server1, perform a backup by using Windows Server Backup.
VM1, perform a backup by using Windows Server Backup.
Microsoft System Center 2012 Virtual Machine Manager (VMM), create a copy of VM1.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 29
Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and
Server2 are members of a failover cluster named Cluster1 and are connected to an iSCSI Storage Area
Network (SAN). You need to ensure that you can implement the clustered File Server role of the File Server for
scale-out application data type for Cluster1. What should you install?
A.
B.
C.
D.
The iSCSI Target Server cluster role
The Distributed Transaction Coordinator (DTC) cluster role
The DFS Namespace Server cluster role
A Cluster Shared Volume (CSV)
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
Your network contains a main data center and a disaster recovery data center. Each data center contains a
Storage Area Network (SAN). The main data center contains a two-node failover cluster named Cluster1 that
hosts a Microsoft SQL Server 2012 database named DB1. The database files in DB1 are stored on the SAN in
the main office. The disaster recovery data center contains a server that runs SQL Server 2012. You need to
recommend a disaster recovery solution for the SQL Server database. The solution must ensure that the
database remains available if the main data center fails. What should you recommend? More than one answer
choice may achieve the goal. Select the BEST answer.
A.
B.
C.
D.
Deploy Distributed File System (DFS) Replication.
Extend the failover cluster to the disaster recovery data center.
Implement a Cluster Shared Volume (CSV) and move the database files to the CSV.
Implement SQL Server database replication between the two data centers.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
Your network contains a Microsoft System Center 2012 Virtual Machine Manager (VMM) infrastructure. You
plan to provide self-service users with the ability to create virtual machines that run Windows Server 2012 and
have the following configurations:
8 GB of memory
The File Server server role
Windows Internal Database
A local Administrator password set to 'P@$$w0rd''
You have a VHD that contains a generalized version of Windows Server 2012. You need to ensure that the selfservice users can provision virtual machines that are based on the VHD. What should you create? (Each
correct answer presents part of the solution. Choose all that apply.)
A.
B.
C.
D.
E.
A Hardware Profile
An Application Profile
An Application Host Profile
A VM Template
A Guest OS Profile
Correct Answer: ADE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers
that are configured as Hyper-V hosts. You plan to implement four virtual machines. The virtual machines will be
configured as shown in the following table.
You need to identify which network must be added to each virtual machine. Which network types should you
identify? To answer, drag the appropriate Network Type to the correct virtual machine in the answer area. Each
Network Type may be used once, more than once, or not at all. Additionally, you may need to drag the split bar
between panes or scroll to view content.
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
Your network contains a Hyper-V cluster named Cluster1. You install Microsoft System Center 2012 Virtual
Machine Manager (VMM). You create a user account for another administrator named User1. You plan to
provide User1 with the ability to manage only the virtual machines that User1 creates. You need to identify what
must be created before you delegate the required permissions. What should you identify?
A.
B.
C.
D.
A cloud
A service template
A host group
A Delegated Administrator
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
Your network contains four servers, The servers are configured as shown in the following table.
You manage all of the servers and all of the clusters by using Microsoft System Center 2012 Virtual Machine
Manager (VMM). You plan to implement Dynamic Optimization for the virtual machines. You need to
recommend a configuration for the planned implementation. What should you recommend?
A. · Dynamic Optimization on Cluster3 and Cluster4 only · Virtual machines that are balanced across the
clusters
B. · Dynamic Optimization on all of the clusters
· Virtual machines that are balanced across the nodes in the clusters
C. · Dynamic Optimization on all of the clusters
· Virtual machines that are balanced across the clusters
D. · Dynamic Optimization on Cluster1 and Cluster2 only · Virtual machines that are balanced across the
nodes in the clusters
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
Your network contains two servers that run Windows Server 2012. The servers are members of a failover
cluster. Each server has 32 GB of RAM and has the Hyper-V server role installed. Each server hosts three
highly available virtual machines. All of the virtual machines have an application named App1 installed. Each of
the virtual machines is configured to have 4 GB of memory. During regular business hours, the virtual machines
use less than 2 GB of memory. Each night, App1 truncates its logs and uses almost 4 GB of memory. You plan
to add another three virtual machines to each host. The new virtual machines will run the same load as the
existing virtual machines. You need to ensure that all of the virtual machines can run on one of the Hyper-V
hosts if a single host fails. What should you do?
A. From the properties of each Hyper-V host, modify the Allow virtual machines to span NUMA nodes.
B. From the properties of each virtual machine, modify the NUMA Configuration - Maximum amount of
memory setting.
C. From the properties of each virtual machine, modify the Smart Paging File Location.
D. From the properties of each virtual machine, modify the Dynamic Memory settings.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and
Server2 have the Hyper-V server role installed and are members of a failover cluster. The network contains a
Storage Area Network (SAN) that has a LUN named LUN1. LUN1 is connected to a 12-TB disk on the SAN.
You plan to host three new virtual machines on the failover cluster. Each virtual machine will store up to 4 TB of
data on a single disk. The virtual machines will be backed up from the hosts by using the Volume Shadow Copy
Service (VSS). You need to ensure that Server1 and Server2 can store the new virtual machines on the SAN.
Which three actions should you perform? To answer, move the three appropriate actions from the list of actions
to the answer area and arrange them in the correct order.
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37
Your network contains an Active Directory domain named contoso.com. The domain contains a Hyper-V host
named Server1. Server1 has an offline virtual machine named VM1 that is stored on a virtual hard disk named
VMl.vhd. You plan to implement multiple virtual machines that have the same configurations as VM1. You need
to recommend a virtual hard disk solution for the planned implementation. The solution must meet the following
requirements:
Minimize the amount of time required to create the new virtual machines.
Minimize the amount of storage space required on Server1.
What should you include in the recommendation?
A.
B.
C.
D.
Differencing VHD disks
Dynamically expanding VHD disks
Dynamically expanding VHDX disks
Differencing VHDX disks
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 38
You plan to delegate the management of virtual machines to five groups by using Microsoft System Center
2012 Virtual Machine Manager (VMM). The network contains 20 Hyper-V hosts in a host group named
HostGroup1. You identify the requirements for each group as shown in the following table.
You need to identify which user role must be assigned to each group. Which user roles should you identify? To
answer, drag the appropriate user role to the correct group in the answer area. Each user role may be used
once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to
view content.
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
Your network contains three networks named LAN1, LAN2, and LAN3. You have a Hyper-V host named
Hyper1 that has Windows Server 2012 installed. Hyper1 has three network adapters. The network adapters are
configured as shown in the following table.
Hyper1 hosts 10 virtual machines. A virtual machine named VM1 runs a line-of-business application that is
used by all of the users of LAN1. All of the other virtual machines are connected to LAN2. You need to
implement a solution to ensure that users can access VM1 if either NIC1 or NIC2 fails. What should you do?
A. From the properties of each virtual network adapter, enable network adapter teaming, and then modify the
bandwidth management settings.
B. From the properties of each virtual network adapter, enable network adapter teaming, and then enable
virtual LAN identification.
C. From the properties of each physical network adapter, enable network adapter teaming, and then add a
second legacy network adapter to VM1.
D. From the properties of each physical network adapter, enable network adapter teaming, and then create a
virtual switch.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 40
Your network contains an Active Directory domain named contoso.com. You deploy Microsoft System Center
2012 Virtual Machine Manager (VMM). The network contains five physical servers. The servers are configured
as shown in the following table.
You plan to use VMM to convert the existing physical servers to virtual machines. You need to identify which
physical servers can be converted to virtual machines. Which servers should you identify? (Each correct
answer presents part of the solution. Choose all that apply.)
A.
B.
C.
D.
E.
Server1
Server2
Server3
Server4
Server5
Correct Answer: ADE
Section: (none)
Explanation
Explanation/Reference:
P2V Machines can not have any volumes larger than 2040 GB:
http://technet.microsoft.com/de-de/library/hh427293.aspx
Case Studies
QUESTION 1
You are planning the delegation for the virtualization environment. The delegation must meet the visualization
requirements. Which user role profile should you select for Group2?
Case Study No 1: Contoso Ltd (Case Study):
Overview
Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has
a main office and six branch offices. The main office is located in Miami. The branch offices are located in New
York, Seattle, Los Angeles, Montreal, Toronto, and Vancouver.
Existing Environment Network Infrastructure
The network contains one Active Directory domain named contoso.com.
The main office has the following servers:
· One file server that maintains multiples shares
· Two domain controllers configured as DNS servers
· One Windows Server Update Services (WSUS) server
· Two DHCP servers that each have a scope for all of the subnets
· Two servers that have Failover Clustering configured and are used as virtualization hosts
· One server that has Microsoft SQL Server 2012 installed and maintains a customer relationship management
(CRM) database
Each branch office has the following servers:
· One domain controller configured as a DNS server
· One DHCP server that has a single scope for its respective office Each office has a single subnet. The
network speed of the local area network (LAN) is 1 gigabit per second. All of the offices have a high-speed
connection to the Internet. The offices connect to each other by using VPN appliances.
Current Issues
Users report that it can take a long time to download files from network shares in the main office. A root cause
analysis identifies that network traffic peaks when the users experience this issue.
Requirements
Planned Changes
The company plans to implement the following changes:
· Replace all of the domain controllers with new servers that run Windows Server 2012.
· Upgrade the CRM application to use a web-based application that connects to the current CRM database.
The web application will store session data in the memory of each web server.
· Initially, deploy two front-end web servers to two virtual machines. Additional virtual web servers will be
deployed in the future.
· Monitor the availability of the CRM application and create alerts when the overall availability is less than 99
percent.
· Implement Microsoft System Center 2012 to manage the new environment.
Business Requirements
The company identifies the following business requirements:
· Minimize hardware costs and software costs whenever possible.
· Minimize the amount of network traffic over the VPN whenever possible.
· Ensure that the users in the branch offices can access files currently on the main office file server if an
Internet link fails.
Technical Requirements
The company identifies the following technical requirements:
· Provide a highly available DHCP solution.
· Maintain a central database that contains the security events from all of the servers.The database must be
encrypted.
· Ensure that an administrator in the main office can manage the approval of Windows updates and updates to
third-party applications for all of the users.
· Ensure that all of the domain controllers have the ReliableTimeSource registry value in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Param eters set to 1, even if an
administrator changes that value manually.
Virtualization Requirements
The company identifies the following virtualization requirements:
· Minimize the number of permissions and privileges assigned to users.
· Ensure that the members of a group named Group2 can add a WSUS server to the fabric.
· Ensure that a diagram view of the virtualization environment can be generated dynamically.
· Minimize the amount of administrative effort required to manage the virtualization environment.
· Prevent the failure of a front-end web server from affecting the availability of the CRM application.
· Ensure that the members of a group named Group1 can create new virtual machines in the Los Angeles
office only.
· Only create virtual machine templates by using objects that already exist in the System Center 2012 Virtual
Machine Manager (VMM) library.
· On the failover cluster in the main office, apply limited distribution release (LDR) updates to the virtualization
hosts without disrupting the virtual machines hosted on the virtualization hosts.
A.
B.
C.
D.
Delegated Administrator
Read-Only Administrator
Administrators
Self-Service User
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
You need to create a virtual machine template for the web servers used by the CRM application. The solution
must meet the virtualization requirements. What should you use?
Case Study No 1: Contoso Ltd (Case Study):
Overview
Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has
a main office and six branch offices. The main office is located in Miami. The branch offices are located in New
York, Seattle, Los Angeles, Montreal, Toronto, and Vancouver.
Existing Environment Network Infrastructure
The network contains one Active Directory domain named contoso.com.
The main office has the following servers:
· One file server that maintains multiples shares
· Two domain controllers configured as DNS servers
· One Windows Server Update Services (WSUS) server
· Two DHCP servers that each have a scope for all of the subnets
· Two servers that have Failover Clustering configured and are used as virtualization hosts
· One server that has Microsoft SQL Server 2012 installed and maintains a customer relationship management
(CRM) database
Each branch office has the following servers:
· One domain controller configured as a DNS server
· One DHCP server that has a single scope for its respective office Each office has a single subnet. The
network speed of the local area network (LAN) is 1 gigabit per second. All of the offices have a high-speed
connection to the Internet. The offices connect to each other by using VPN appliances.
Current Issues
Users report that it can take a long time to download files from network shares in the main office. A root cause
analysis identifies that network traffic peaks when the users experience this issue.
Requirements
Planned Changes
The company plans to implement the following changes:
· Replace all of the domain controllers with new servers that run Windows Server 2012.
· Upgrade the CRM application to use a web-based application that connects to the current CRM database.
The web application will store session data in the memory of each web server.
· Initially, deploy two front-end web servers to two virtual machines. Additional virtual web servers will be
deployed in the future.
· Monitor the availability of the CRM application and create alerts when the overall availability is less than 99
percent.
· Implement Microsoft System Center 2012 to manage the new environment.
Business Requirements
The company identifies the following business requirements:
· Minimize hardware costs and software costs whenever possible.
· Minimize the amount of network traffic over the VPN whenever possible.
· Ensure that the users in the branch offices can access files currently on the main office file server if an
Internet link fails.
Technical Requirements
The company identifies the following technical requirements:
· Provide a highly available DHCP solution.
· Maintain a central database that contains the security events from all of the servers.The database must be
encrypted.
· Ensure that an administrator in the main office can manage the approval of Windows updates and updates to
third-party applications for all of the users.
· Ensure that all of the domain controllers have the ReliableTimeSource registry value in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Param eters set to 1, even if an
administrator changes that value manually.
Virtualization Requirements
The company identifies the following virtualization requirements:
· Minimize the number of permissions and privileges assigned to users.
· Ensure that the members of a group named Group2 can add a WSUS server to the fabric.
· Ensure that a diagram view of the virtualization environment can be generated dynamically.
· Minimize the amount of administrative effort required to manage the virtualization environment.
· Prevent the failure of a front-end web server from affecting the availability of the CRM application.
· Ensure that the members of a group named Group1 can create new virtual machines in the Los Angeles
office only.
· Only create virtual machine templates by using objects that already exist in the System Center 2012 Virtual
Machine Manager (VMM) library.
· On the failover cluster in the main office, apply limited distribution release (LDR) updates to the virtualization
hosts without disrupting the virtual machines hosted on the virtualization hosts.
A.
B.
C.
D.
An .iso image
A virtual machine
A Windows PowerShell script
A virtual hard disk (VHD)
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
You are planning the deployment of System Center 2012 Virtual Machine Manager (VMM). You need to identify
which additional System Center 2012 product is required to meet the visualization requirements. What should
you include in the recommendation?
Case Study No 1: Contoso Ltd (Case Study):
Overview
Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has
a main office and six branch offices. The main office is located in Miami. The branch offices are located in New
York, Seattle, Los Angeles, Montreal, Toronto, and Vancouver.
Existing Environment Network Infrastructure
The network contains one Active Directory domain named contoso.com.
The main office has the following servers:
· One file server that maintains multiples shares
· Two domain controllers configured as DNS servers
· One Windows Server Update Services (WSUS) server
· Two DHCP servers that each have a scope for all of the subnets
· Two servers that have Failover Clustering configured and are used as virtualization hosts
· One server that has Microsoft SQL Server 2012 installed and maintains a customer relationship management
(CRM) database
Each branch office has the following servers:
· One domain controller configured as a DNS server
· One DHCP server that has a single scope for its respective office Each office has a single subnet. The
network speed of the local area network (LAN) is 1 gigabit per second. All of the offices have a high-speed
connection to the Internet. The offices connect to each other by using VPN appliances.
Current Issues
Users report that it can take a long time to download files from network shares in the main office. A root cause
analysis identifies that network traffic peaks when the users experience this issue.
Requirements
Planned Changes
The company plans to implement the following changes:
· Replace all of the domain controllers with new servers that run Windows Server 2012.
· Upgrade the CRM application to use a web-based application that connects to the current CRM database.
The web application will store session data in the memory of each web server.
· Initially, deploy two front-end web servers to two virtual machines. Additional virtual web servers will be
deployed in the future.
· Monitor the availability of the CRM application and create alerts when the overall availability is less than 99
percent.
· Implement Microsoft System Center 2012 to manage the new environment.
Business Requirements
The company identifies the following business requirements:
· Minimize hardware costs and software costs whenever possible.
· Minimize the amount of network traffic over the VPN whenever possible.
· Ensure that the users in the branch offices can access files currently on the main office file server if an
Internet link fails.
Technical Requirements
The company identifies the following technical requirements:
· Provide a highly available DHCP solution.
· Maintain a central database that contains the security events from all of the servers.The database must be
encrypted.
· Ensure that an administrator in the main office can manage the approval of Windows updates and updates to
third-party applications for all of the users.
· Ensure that all of the domain controllers have the ReliableTimeSource registry value in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Param eters set to 1, even if an
administrator changes that value manually.
Virtualization Requirements
The company identifies the following virtualization requirements:
· Minimize the number of permissions and privileges assigned to users.
· Ensure that the members of a group named Group2 can add a WSUS server to the fabric.
· Ensure that a diagram view of the virtualization environment can be generated dynamically.
· Minimize the amount of administrative effort required to manage the virtualization environment.
· Prevent the failure of a front-end web server from affecting the availability of the CRM application.
· Ensure that the members of a group named Group1 can create new virtual machines in the Los Angeles
office only.
· Only create virtual machine templates by using objects that already exist in the System Center 2012 Virtual
Machine Manager (VMM) library.
· On the failover cluster in the main office, apply limited distribution release (LDR) updates to the virtualization
hosts without disrupting the virtual machines hosted on the virtualization hosts.
A.
B.
C.
D.
Service Manager
Operations Manager
Configuration Manager
App Controller
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
You need to recommend a solution for updating the virtualization hosts. The solution must meet the
visualization requirements. What should you include in the recommendation?
Case Study No 1: Contoso Ltd (Case Study):
Overview
Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has
a main office and six branch offices. The main office is located in Miami. The branch offices are located in New
York, Seattle, Los Angeles, Montreal, Toronto, and Vancouver.
Existing Environment Network Infrastructure
The network contains one Active Directory domain named contoso.com.
The main office has the following servers:
· One file server that maintains multiples shares
· Two domain controllers configured as DNS servers
· One Windows Server Update Services (WSUS) server
· Two DHCP servers that each have a scope for all of the subnets
· Two servers that have Failover Clustering configured and are used as virtualization hosts
· One server that has Microsoft SQL Server 2012 installed and maintains a customer relationship management
(CRM) database
Each branch office has the following servers:
· One domain controller configured as a DNS server
· One DHCP server that has a single scope for its respective office Each office has a single subnet. The
network speed of the local area network (LAN) is 1 gigabit per second. All of the offices have a high-speed
connection to the Internet. The offices connect to each other by using VPN appliances.
Current Issues
Users report that it can take a long time to download files from network shares in the main office. A root cause
analysis identifies that network traffic peaks when the users experience this issue.
Requirements
Planned Changes
The company plans to implement the following changes:
· Replace all of the domain controllers with new servers that run Windows Server 2012.
· Upgrade the CRM application to use a web-based application that connects to the current CRM database.
The web application will store session data in the memory of each web server.
· Initially, deploy two front-end web servers to two virtual machines. Additional virtual web servers will be
deployed in the future.
· Monitor the availability of the CRM application and create alerts when the overall availability is less than 99
percent.
· Implement Microsoft System Center 2012 to manage the new environment.
Business Requirements
The company identifies the following business requirements:
· Minimize hardware costs and software costs whenever possible.
· Minimize the amount of network traffic over the VPN whenever possible.
· Ensure that the users in the branch offices can access files currently on the main office file server if an
Internet link fails.
Technical Requirements
The company identifies the following technical requirements:
· Provide a highly available DHCP solution.
· Maintain a central database that contains the security events from all of the servers.The database must be
encrypted.
· Ensure that an administrator in the main office can manage the approval of Windows updates and updates to
third-party applications for all of the users.
· Ensure that all of the domain controllers have the ReliableTimeSource registry value in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Param eters set to 1, even if an
administrator changes that value manually.
Virtualization Requirements
The company identifies the following virtualization requirements:
· Minimize the number of permissions and privileges assigned to users.
· Ensure that the members of a group named Group2 can add a WSUS server to the fabric.
· Ensure that a diagram view of the virtualization environment can be generated dynamically.
· Minimize the amount of administrative effort required to manage the virtualization environment.
· Prevent the failure of a front-end web server from affecting the availability of the CRM application.
· Ensure that the members of a group named Group1 can create new virtual machines in the Los Angeles
office only.
· Only create virtual machine templates by using objects that already exist in the System Center 2012 Virtual
Machine Manager (VMM) library.
· On the failover cluster in the main office, apply limited distribution release (LDR) updates to the virtualization
hosts without disrupting the virtual machines hosted on the virtualization hosts.
A.
B.
C.
D.
Cluster-Aware Updating
WSUS
System Center Updates Publisher 2011
System Center 2012 Configuration Manager
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
You need to ensure that Group1 can perform the required tasks. The solution must meet the visualization
requirements. What should you create?
Case Study No 1: Contoso Ltd (Case Study):
Overview
Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has
a main office and six branch offices. The main office is located in Miami. The branch offices are located in New
York, Seattle, Los Angeles, Montreal, Toronto, and Vancouver.
Existing Environment Network Infrastructure
The network contains one Active Directory domain named contoso.com.
The main office has the following servers:
· One file server that maintains multiples shares
· Two domain controllers configured as DNS servers
· One Windows Server Update Services (WSUS) server
· Two DHCP servers that each have a scope for all of the subnets
· Two servers that have Failover Clustering configured and are used as virtualization hosts
· One server that has Microsoft SQL Server 2012 installed and maintains a customer relationship management
(CRM) database
Each branch office has the following servers:
· One domain controller configured as a DNS server
· One DHCP server that has a single scope for its respective office Each office has a single subnet. The
network speed of the local area network (LAN) is 1 gigabit per second. All of the offices have a high-speed
connection to the Internet. The offices connect to each other by using VPN appliances.
Current Issues
Users report that it can take a long time to download files from network shares in the main office. A root cause
analysis identifies that network traffic peaks when the users experience this issue.
Requirements
Planned Changes
The company plans to implement the following changes:
· Replace all of the domain controllers with new servers that run Windows Server 2012.
· Upgrade the CRM application to use a web-based application that connects to the current CRM database.
The web application will store session data in the memory of each web server.
· Initially, deploy two front-end web servers to two virtual machines. Additional virtual web servers will be
deployed in the future.
· Monitor the availability of the CRM application and create alerts when the overall availability is less than 99
percent.
· Implement Microsoft System Center 2012 to manage the new environment.
Business Requirements
The company identifies the following business requirements:
· Minimize hardware costs and software costs whenever possible.
· Minimize the amount of network traffic over the VPN whenever possible.
· Ensure that the users in the branch offices can access files currently on the main office file server if an
Internet link fails.
Technical Requirements
The company identifies the following technical requirements:
· Provide a highly available DHCP solution.
· Maintain a central database that contains the security events from all of the servers.The database must be
encrypted.
· Ensure that an administrator in the main office can manage the approval of Windows updates and updates to
third-party applications for all of the users.
· Ensure that all of the domain controllers have the ReliableTimeSource registry value in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Param eters set to 1, even if an
administrator changes that value manually.
Virtualization Requirements
The company identifies the following virtualization requirements:
· Minimize the number of permissions and privileges assigned to users.
· Ensure that the members of a group named Group2 can add a WSUS server to the fabric.
· Ensure that a diagram view of the virtualization environment can be generated dynamically.
· Minimize the amount of administrative effort required to manage the virtualization environment.
· Prevent the failure of a front-end web server from affecting the availability of the CRM application.
· Ensure that the members of a group named Group1 can create new virtual machines in the Los Angeles
office only.
· Only create virtual machine templates by using objects that already exist in the System Center 2012 Virtual
Machine Manager (VMM) library.
· On the failover cluster in the main office, apply limited distribution release (LDR) updates to the virtualization
hosts without disrupting the virtual machines hosted on the virtualization hosts.
A.
B.
C.
D.
A collection
A host group
An organizational unit (OU)
A site
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
You need to recommend a solution for managing updates. The solution must meet the technical requirements.
What should you include in the recommendation?
Case Study No 1: Contoso Ltd (Case Study):
Overview
Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has
a main office and six branch offices. The main office is located in Miami. The branch offices are located in New
York, Seattle, Los Angeles, Montreal, Toronto, and Vancouver.
Existing Environment Network Infrastructure
The network contains one Active Directory domain named contoso.com.
The main office has the following servers:
· One file server that maintains multiples shares
· Two domain controllers configured as DNS servers
· One Windows Server Update Services (WSUS) server
· Two DHCP servers that each have a scope for all of the subnets
· Two servers that have Failover Clustering configured and are used as virtualization hosts
· One server that has Microsoft SQL Server 2012 installed and maintains a customer relationship management
(CRM) database
Each branch office has the following servers:
· One domain controller configured as a DNS server
· One DHCP server that has a single scope for its respective office Each office has a single subnet. The
network speed of the local area network (LAN) is 1 gigabit per second. All of the offices have a high-speed
connection to the Internet. The offices connect to each other by using VPN appliances.
Current Issues
Users report that it can take a long time to download files from network shares in the main office. A root cause
analysis identifies that network traffic peaks when the users experience this issue.
Requirements
Planned Changes
The company plans to implement the following changes:
· Replace all of the domain controllers with new servers that run Windows Server 2012.
· Upgrade the CRM application to use a web-based application that connects to the current CRM database.
The web application will store session data in the memory of each web server.
· Initially, deploy two front-end web servers to two virtual machines. Additional virtual web servers will be
deployed in the future.
· Monitor the availability of the CRM application and create alerts when the overall availability is less than 99
percent.
· Implement Microsoft System Center 2012 to manage the new environment.
Business Requirements
The company identifies the following business requirements:
· Minimize hardware costs and software costs whenever possible.
· Minimize the amount of network traffic over the VPN whenever possible.
· Ensure that the users in the branch offices can access files currently on the main office file server if an
Internet link fails.
Technical Requirements
The company identifies the following technical requirements:
· Provide a highly available DHCP solution.
· Maintain a central database that contains the security events from all of the servers.The database must be
encrypted.
· Ensure that an administrator in the main office can manage the approval of Windows updates and updates to
third-party applications for all of the users.
· Ensure that all of the domain controllers have the ReliableTimeSource registry value in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Param eters set to 1, even if an
administrator changes that value manually.
Virtualization Requirements
The company identifies the following virtualization requirements:
· Minimize the number of permissions and privileges assigned to users.
· Ensure that the members of a group named Group2 can add a WSUS server to the fabric.
· Ensure that a diagram view of the virtualization environment can be generated dynamically.
· Minimize the amount of administrative effort required to manage the virtualization environment.
· Prevent the failure of a front-end web server from affecting the availability of the CRM application.
· Ensure that the members of a group named Group1 can create new virtual machines in the Los Angeles
office only.
· Only create virtual machine templates by using objects that already exist in the System Center 2012 Virtual
Machine Manager (VMM) library.
· On the failover cluster in the main office, apply limited distribution release (LDR) updates to the virtualization
hosts without disrupting the virtual machines hosted on the virtualization hosts.
A. A System Center 2012 Configuration Manager management point in the main office and a System Center
2012 Configuration Manager distribution point in each office.
B. A System Center 2012 Configuration Manager management point in the main office and a WSUS
downstream server in each office.
C. A System Center 2012 Configuration Manager software update point in the main office and a System
Center 2012 Configuration Manager distribution point in each office.
D. A WSUS upstream server in and a WSUS downstream server in each office.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
You need to recommend an automated remediation solution for the ReliableTimeSource registry value. The
solution must meet the technical requirements. What should you include in the recommendation?
Case Study No 1: Contoso Ltd (Case Study):
Overview
Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has
a main office and six branch offices. The main office is located in Miami. The branch offices are located in New
York, Seattle, Los Angeles, Montreal, Toronto, and Vancouver.
Existing Environment Network Infrastructure
The network contains one Active Directory domain named contoso.com.
The main office has the following servers:
· One file server that maintains multiples shares
· Two domain controllers configured as DNS servers
· One Windows Server Update Services (WSUS) server
· Two DHCP servers that each have a scope for all of the subnets
· Two servers that have Failover Clustering configured and are used as virtualization hosts
· One server that has Microsoft SQL Server 2012 installed and maintains a customer relationship management
(CRM) database
Each branch office has the following servers:
· One domain controller configured as a DNS server
· One DHCP server that has a single scope for its respective office Each office has a single subnet. The
network speed of the local area network (LAN) is 1 gigabit per second. All of the offices have a high-speed
connection to the Internet. The offices connect to each other by using VPN appliances.
Current Issues
Users report that it can take a long time to download files from network shares in the main office. A root cause
analysis identifies that network traffic peaks when the users experience this issue.
Requirements
Planned Changes
The company plans to implement the following changes:
· Replace all of the domain controllers with new servers that run Windows Server 2012.
· Upgrade the CRM application to use a web-based application that connects to the current CRM database.
The web application will store session data in the memory of each web server.
· Initially, deploy two front-end web servers to two virtual machines. Additional virtual web servers will be
deployed in the future.
· Monitor the availability of the CRM application and create alerts when the overall availability is less than 99
percent.
· Implement Microsoft System Center 2012 to manage the new environment.
Business Requirements
The company identifies the following business requirements:
· Minimize hardware costs and software costs whenever possible.
· Minimize the amount of network traffic over the VPN whenever possible.
· Ensure that the users in the branch offices can access files currently on the main office file server if an
Internet link fails.
Technical Requirements
The company identifies the following technical requirements:
· Provide a highly available DHCP solution.
· Maintain a central database that contains the security events from all of the servers.The database must be
encrypted.
· Ensure that an administrator in the main office can manage the approval of Windows updates and updates to
third-party applications for all of the users.
· Ensure that all of the domain controllers have the ReliableTimeSource registry value in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Param eters set to 1, even if an
administrator changes that value manually.
Virtualization Requirements
The company identifies the following virtualization requirements:
· Minimize the number of permissions and privileges assigned to users.
· Ensure that the members of a group named Group2 can add a WSUS server to the fabric.
· Ensure that a diagram view of the virtualization environment can be generated dynamically.
· Minimize the amount of administrative effort required to manage the virtualization environment.
· Prevent the failure of a front-end web server from affecting the availability of the CRM application.
· Ensure that the members of a group named Group1 can create new virtual machines in the Los Angeles
office only.
· Only create virtual machine templates by using objects that already exist in the System Center 2012 Virtual
Machine Manager (VMM) library.
· On the failover cluster in the main office, apply limited distribution release (LDR) updates to the virtualization
hosts without disrupting the virtual machines hosted on the virtualization hosts.
A.
B.
C.
D.
A System
A System
A System
A System
Center 2102 Configuration Manager configuration baseline.
Center 2012 Operations Manager performance counter rule.
Center 2012 Configuration Manager maintenance task.
Center 2012 Operations Manager event rule.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
You need to recommend a solution that resolves the current file server issue. The solution must meet the
business requirements. What should you include in the recommendation?
Case Study No 1: Contoso Ltd (Case Study):
Overview
Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has
a main office and six branch offices. The main office is located in Miami. The branch offices are located in New
York, Seattle, Los Angeles, Montreal, Toronto, and Vancouver.
Existing Environment Network Infrastructure
The network contains one Active Directory domain named contoso.com.
The main office has the following servers:
· One file server that maintains multiples shares
· Two domain controllers configured as DNS servers
· One Windows Server Update Services (WSUS) server
· Two DHCP servers that each have a scope for all of the subnets
· Two servers that have Failover Clustering configured and are used as virtualization hosts
· One server that has Microsoft SQL Server 2012 installed and maintains a customer relationship management
(CRM) database
Each branch office has the following servers:
· One domain controller configured as a DNS server
· One DHCP server that has a single scope for its respective office Each office has a single subnet. The
network speed of the local area network (LAN) is 1 gigabit per second. All of the offices have a high-speed
connection to the Internet. The offices connect to each other by using VPN appliances.
Current Issues
Users report that it can take a long time to download files from network shares in the main office. A root cause
analysis identifies that network traffic peaks when the users experience this issue.
Requirements
Planned Changes
The company plans to implement the following changes:
· Replace all of the domain controllers with new servers that run Windows Server 2012.
· Upgrade the CRM application to use a web-based application that connects to the current CRM database.
The web application will store session data in the memory of each web server.
· Initially, deploy two front-end web servers to two virtual machines. Additional virtual web servers will be
deployed in the future.
· Monitor the availability of the CRM application and create alerts when the overall availability is less than 99
percent.
· Implement Microsoft System Center 2012 to manage the new environment.
Business Requirements
The company identifies the following business requirements:
· Minimize hardware costs and software costs whenever possible.
· Minimize the amount of network traffic over the VPN whenever possible.
· Ensure that the users in the branch offices can access files currently on the main office file server if an
Internet link fails.
Technical Requirements
The company identifies the following technical requirements:
· Provide a highly available DHCP solution.
· Maintain a central database that contains the security events from all of the servers.The database must be
encrypted.
· Ensure that an administrator in the main office can manage the approval of Windows updates and updates to
third-party applications for all of the users.
· Ensure that all of the domain controllers have the ReliableTimeSource registry value in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Param eters set to 1, even if an
administrator changes that value manually.
Virtualization Requirements
The company identifies the following virtualization requirements:
· Minimize the number of permissions and privileges assigned to users.
· Ensure that the members of a group named Group2 can add a WSUS server to the fabric.
· Ensure that a diagram view of the virtualization environment can be generated dynamically.
· Minimize the amount of administrative effort required to manage the virtualization environment.
· Prevent the failure of a front-end web server from affecting the availability of the CRM application.
· Ensure that the members of a group named Group1 can create new virtual machines in the Los Angeles
office only.
· Only create virtual machine templates by using objects that already exist in the System Center 2012 Virtual
Machine Manager (VMM) library.
· On the failover cluster in the main office, apply limited distribution release (LDR) updates to the virtualization
hosts without disrupting the virtual machines hosted on the virtualization hosts.
A.
B.
C.
D.
Distributed File System (DFS)
BranchCache in distributed cache mode
BranchCache in hosted cache mode
A storage pool
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
You need to create a service template for the web servers used by the CRM application. What should you
include in the service template?
Case Study No 1: Contoso Ltd (Case Study):
Overview
Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has
a main office and six branch offices. The main office is located in Miami. The branch offices are located in New
York, Seattle, Los Angeles, Montreal, Toronto, and Vancouver.
Existing Environment Network Infrastructure
The network contains one Active Directory domain named contoso.com.
The main office has the following servers:
· One file server that maintains multiples shares
· Two domain controllers configured as DNS servers
· One Windows Server Update Services (WSUS) server
· Two DHCP servers that each have a scope for all of the subnets
· Two servers that have Failover Clustering configured and are used as virtualization hosts
· One server that has Microsoft SQL Server 2012 installed and maintains a customer relationship management
(CRM) database
Each branch office has the following servers:
· One domain controller configured as a DNS server
· One DHCP server that has a single scope for its respective office Each office has a single subnet. The
network speed of the local area network (LAN) is 1 gigabit per second. All of the offices have a high-speed
connection to the Internet. The offices connect to each other by using VPN appliances.
Current Issues
Users report that it can take a long time to download files from network shares in the main office. A root cause
analysis identifies that network traffic peaks when the users experience this issue.
Requirements
Planned Changes
The company plans to implement the following changes:
· Replace all of the domain controllers with new servers that run Windows Server 2012.
· Upgrade the CRM application to use a web-based application that connects to the current CRM database.
The web application will store session data in the memory of each web server.
· Initially, deploy two front-end web servers to two virtual machines. Additional virtual web servers will be
deployed in the future.
· Monitor the availability of the CRM application and create alerts when the overall availability is less than 99
percent.
· Implement Microsoft System Center 2012 to manage the new environment.
Business Requirements
The company identifies the following business requirements:
· Minimize hardware costs and software costs whenever possible.
· Minimize the amount of network traffic over the VPN whenever possible.
· Ensure that the users in the branch offices can access files currently on the main office file server if an
Internet link fails.
Technical Requirements
The company identifies the following technical requirements:
· Provide a highly available DHCP solution.
· Maintain a central database that contains the security events from all of the servers.The database must be
encrypted.
· Ensure that an administrator in the main office can manage the approval of Windows updates and updates to
third-party applications for all of the users.
· Ensure that all of the domain controllers have the ReliableTimeSource registry value in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Param eters set to 1, even if an
administrator changes that value manually.
Virtualization Requirements
The company identifies the following virtualization requirements:
· Minimize the number of permissions and privileges assigned to users.
· Ensure that the members of a group named Group2 can add a WSUS server to the fabric.
· Ensure that a diagram view of the virtualization environment can be generated dynamically.
· Minimize the amount of administrative effort required to manage the virtualization environment.
· Prevent the failure of a front-end web server from affecting the availability of the CRM application.
· Ensure that the members of a group named Group1 can create new virtual machines in the Los Angeles
office only.
· Only create virtual machine templates by using objects that already exist in the System Center 2012 Virtual
Machine Manager (VMM) library.
· On the failover cluster in the main office, apply limited distribution release (LDR) updates to the virtualization
hosts without disrupting the virtual machines hosted on the virtualization hosts.
A.
B.
C.
D.
A VIP template
A host profile
Guest OS profile
A capability profile
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
You need to recommend a solution that meets the technical requirements for DHCP. What should you include
in the recommendation for each office?
Case Study No 1: Contoso Ltd (Case Study):
Overview
Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has
a main office and six branch offices. The main office is located in Miami. The branch offices are located in New
York, Seattle, Los Angeles, Montreal, Toronto, and Vancouver.
Existing Environment Network Infrastructure
The network contains one Active Directory domain named contoso.com.
The main office has the following servers:
· One file server that maintains multiples shares
· Two domain controllers configured as DNS servers
· One Windows Server Update Services (WSUS) server
· Two DHCP servers that each have a scope for all of the subnets
· Two servers that have Failover Clustering configured and are used as virtualization hosts
· One server that has Microsoft SQL Server 2012 installed and maintains a customer relationship management
(CRM) database
Each branch office has the following servers:
· One domain controller configured as a DNS server
· One DHCP server that has a single scope for its respective office Each office has a single subnet. The
network speed of the local area network (LAN) is 1 gigabit per second. All of the offices have a high-speed
connection to the Internet. The offices connect to each other by using VPN appliances.
Current Issues
Users report that it can take a long time to download files from network shares in the main office. A root cause
analysis identifies that network traffic peaks when the users experience this issue.
Requirements
Planned Changes
The company plans to implement the following changes:
· Replace all of the domain controllers with new servers that run Windows Server 2012.
· Upgrade the CRM application to use a web-based application that connects to the current CRM database.
The web application will store session data in the memory of each web server.
· Initially, deploy two front-end web servers to two virtual machines. Additional virtual web servers will be
deployed in the future.
· Monitor the availability of the CRM application and create alerts when the overall availability is less than 99
percent.
· Implement Microsoft System Center 2012 to manage the new environment.
Business Requirements
The company identifies the following business requirements:
· Minimize hardware costs and software costs whenever possible.
· Minimize the amount of network traffic over the VPN whenever possible.
· Ensure that the users in the branch offices can access files currently on the main office file server if an
Internet link fails.
Technical Requirements
The company identifies the following technical requirements:
· Provide a highly available DHCP solution.
· Maintain a central database that contains the security events from all of the servers.The database must be
encrypted.
· Ensure that an administrator in the main office can manage the approval of Windows updates and updates to
third-party applications for all of the users.
· Ensure that all of the domain controllers have the ReliableTimeSource registry value in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Param eters set to 1, even if an
administrator changes that value manually.
Virtualization Requirements
The company identifies the following virtualization requirements:
· Minimize the number of permissions and privileges assigned to users.
· Ensure that the members of a group named Group2 can add a WSUS server to the fabric.
· Ensure that a diagram view of the virtualization environment can be generated dynamically.
· Minimize the amount of administrative effort required to manage the virtualization environment.
· Prevent the failure of a front-end web server from affecting the availability of the CRM application.
· Ensure that the members of a group named Group1 can create new virtual machines in the Los Angeles
office only.
· Only create virtual machine templates by using objects that already exist in the System Center 2012 Virtual
Machine Manager (VMM) library.
· On the failover cluster in the main office, apply limited distribution release (LDR) updates to the virtualization
hosts without disrupting the virtual machines hosted on the virtualization hosts.
A.
B.
C.
D.
Network Load Balancing (NLB)
DHCP failover
DHCP server policies
IP Address Management (IPAM)
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
You need to recommend a solution for deploying the web servers for the CRM application. The solution must
meet the visualization requirements. What should you include in the recommendation?
http://www.gratisexam.com/
Case Study No 1: Contoso Ltd (Case Study):
Overview
Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has
a main office and six branch offices. The main office is located in Miami. The branch offices are located in New
York, Seattle, Los Angeles, Montreal, Toronto, and Vancouver.
Existing Environment Network Infrastructure
The network contains one Active Directory domain named contoso.com.
The main office has the following servers:
· One file server that maintains multiples shares
· Two domain controllers configured as DNS servers
· One Windows Server Update Services (WSUS) server
· Two DHCP servers that each have a scope for all of the subnets
· Two servers that have Failover Clustering configured and are used as virtualization hosts
· One server that has Microsoft SQL Server 2012 installed and maintains a customer relationship management
(CRM) database
Each branch office has the following servers:
· One domain controller configured as a DNS server
· One DHCP server that has a single scope for its respective office Each office has a single subnet. The
network speed of the local area network (LAN) is 1 gigabit per second. All of the offices have a high-speed
connection to the Internet. The offices connect to each other by using VPN appliances.
Current Issues
Users report that it can take a long time to download files from network shares in the main office. A root cause
analysis identifies that network traffic peaks when the users experience this issue.
Requirements
Planned Changes
The company plans to implement the following changes:
· Replace all of the domain controllers with new servers that run Windows Server 2012.
· Upgrade the CRM application to use a web-based application that connects to the current CRM database.
The web application will store session data in the memory of each web server.
· Initially, deploy two front-end web servers to two virtual machines. Additional virtual web servers will be
deployed in the future.
· Monitor the availability of the CRM application and create alerts when the overall availability is less than 99
percent.
· Implement Microsoft System Center 2012 to manage the new environment.
Business Requirements
The company identifies the following business requirements:
· Minimize hardware costs and software costs whenever possible.
· Minimize the amount of network traffic over the VPN whenever possible.
· Ensure that the users in the branch offices can access files currently on the main office file server if an
Internet link fails.
Technical Requirements
The company identifies the following technical requirements:
· Provide a highly available DHCP solution.
· Maintain a central database that contains the security events from all of the servers.The database must be
encrypted.
· Ensure that an administrator in the main office can manage the approval of Windows updates and updates to
third-party applications for all of the users.
· Ensure that all of the domain controllers have the ReliableTimeSource registry value in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Param eters set to 1, even if an
administrator changes that value manually.
Virtualization Requirements
The company identifies the following virtualization requirements:
· Minimize the number of permissions and privileges assigned to users.
· Ensure that the members of a group named Group2 can add a WSUS server to the fabric.
· Ensure that a diagram view of the virtualization environment can be generated dynamically.
· Minimize the amount of administrative effort required to manage the virtualization environment.
· Prevent the failure of a front-end web server from affecting the availability of the CRM application.
· Ensure that the members of a group named Group1 can create new virtual machines in the Los Angeles
office only.
· Only create virtual machine templates by using objects that already exist in the System Center 2012 Virtual
Machine Manager (VMM) library.
· On the failover cluster in the main office, apply limited distribution release (LDR) updates to the virtualization
hosts without disrupting the virtual machines hosted on the virtualization hosts.
A.
B.
C.
D.
Network Load Balancing (NLB) without affinity
Failover Clustering with one active node
Failover Clustering with two active nodes
Network Load Balancing (NLB) with client affinity
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
In adatum.com, you install and configure a server that has the Active Directory Federation Services server role
and all of the AD FS role services installed. You need to recommend which AD FS configurations must be
performed m adatum.com to meet the security requirements. Which configurations should you recommend
before creating a trust policy?
Case Study 2: A. Datum (Case Study):
Overview
A. Datum Corporation is an accounting company.
The company has a main office and two branch offices. The main office is located in Miami. The branch offices
are located in New York and Seattle.
Existing Environment
Network Infrastructure
The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008
R2.
The main office has the following servers and client computers:
· Two domain controllers configured as DNS servers and DHCP servers
· One file server that has multiples shares
· One thousand client computers that run Windows 7
· Each branch office has the following servers and client computers:
· One domain controller configured as a DNS server and a DHCP server
· Five hundred to 800 client computers that run Windows XP Each office has multiple subnets. The network
speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a
WAN link. The main office is connected to the Internet.
Current Issues
The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link
will not be replaced for another year.
Requirements
Application Requirements
The company is developing an application named Appl. App1 is a multi-tier application that will be sold as a
service to customers.
Each instance of App1 is comprised of the following three tiers:
· A web front end
· A middle tier that uses Windows Communication Foundation (WCF)
· A Microsoft SQL Server 2008 R2 database on the back end Each tier will be hosted on one or more virtual
machines. Multiple-tiers cannot coexist on the same virtual machine.
When customers purchase App1, they can select from one of the following service levels:
· Standard: Uses a single instance of each virtual machine required by Appl. If a virtual machine becomes
unresponsive, the virtual machine must be restarted.
· Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and
fault tolerance.
All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server
fails.
You plan to deploy an application named App2. App2 is comprised of the following two tiers:
· A web front end
· A dedicated SQL Server 2008 R2 database on the back end App2 will be hosted on a set of virtual machines
in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the
App2 virtual machines will be maintained in the Seattle office.
App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active
Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory
Federation Services server role and all of the Active Directory Federation Services (AD F5} role services
installed.
Planned Changes
A. Datum plans to implement the following changes:
· Replace all of the servers with new servers that run Windows Server 2012.
· Implement a private cloud by using Microsoft System Center 2012 to host instances of Appl.
· In the Miami office, deploy four new Hyper-V hosts to the perimeter network.
· In the Miami office, deploy two new Hyper-V hosts to the local network.
· In the Seattle office, deploy two new Hyper-V hosts. · In the Miami office, implement a System Center 2012
Configuration Manager primary site that has all of the system roles installed.
· Implement a public key infrastructure (PKI).
· Implement AD FS.
Notification Requirements
A. Datum identifies the following notification requirements:
· Help desk tickets must be created and assigned automatically when an instance of App1 becomes
unresponsive.
· Customers who select the Enterprise service level must receive an email notification each time a help desk
ticket for their instance of App1 is opened or closed.
Technical Requirements
A. Datum identifies the following technical requirements:
· Minimize costs whenever possible.
· Minimize the amount of WAN traffic.
· Minimize the amount of administrative effort whenever possible.
· Provide the fastest possible failover for the virtual machines hosting App2.
· Ensure that administrators can view a consolidated report about the software updates in all of the offices.
· Ensure that administrators in the Miami office can approve updates for the client computers in all of the
offices.
Security Requirements
A. Datum identifies the following security requirements:
· An offline root certification authority (CA) must be configured.
· Client computers must be issued certificates by a server in their local office.
· Changes to the CA configuration settings and the CA security settings must be logged.
· Client computers must be able to renew certificates automatically over the Internet.
· The number of permissions and privileges assigned to users must be minimized whenever possible.
· Users from a group named Group1 must be able to create new instances of App1 in the private cloud.
· Cent computers must be issued new certificates when the computers are connected to the local network only.
· The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker).
· Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com.
A. Export the server authentication certificate and provide the certificate to Trey Research. Import the tokensigning certificate from Trey Research.
B. Export the server authentication certificate and provide the certificate to Trey Research. Import the server
authentication certificate from Trey Research.
C. Export the token-signing certificate and provide the certificate to Trey Research. Import the server
authentication certificate from Trey Research.
D. Export the token-signing certificate and provide the certificate to Trey Research. Import the token- signing
certificate from Trey Research.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
You need to recommend which type of clustered file server and which type of file share must be used in the
Hyper-V cluster that hosts App2. The solution must meet the technical requirements and the security
requirements. What should you recommend?
Case Study 2: A. Datum (Case Study):
Overview
A. Datum Corporation is an accounting company.
The company has a main office and two branch offices. The main office is located in Miami. The branch offices
are located in New York and Seattle.
Existing Environment
Network Infrastructure
The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008
R2.
The main office has the following servers and client computers:
· Two domain controllers configured as DNS servers and DHCP servers
· One file server that has multiples shares
· One thousand client computers that run Windows 7
· Each branch office has the following servers and client computers:
· One domain controller configured as a DNS server and a DHCP server
· Five hundred to 800 client computers that run Windows XP Each office has multiple subnets. The network
speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a
WAN link. The main office is connected to the Internet.
Current Issues
The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link
will not be replaced for another year.
Requirements
Application Requirements
The company is developing an application named Appl. App1 is a multi-tier application that will be sold as a
service to customers.
Each instance of App1 is comprised of the following three tiers:
· A web front end
· A middle tier that uses Windows Communication Foundation (WCF)
· A Microsoft SQL Server 2008 R2 database on the back end Each tier will be hosted on one or more virtual
machines. Multiple-tiers cannot coexist on the same virtual machine.
When customers purchase App1, they can select from one of the following service levels:
· Standard: Uses a single instance of each virtual machine required by Appl. If a virtual machine becomes
unresponsive, the virtual machine must be restarted.
· Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and
fault tolerance.
All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server
fails.
You plan to deploy an application named App2. App2 is comprised of the following two tiers:
· A web front end
· A dedicated SQL Server 2008 R2 database on the back end App2 will be hosted on a set of virtual machines
in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the
App2 virtual machines will be maintained in the Seattle office.
App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active
Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory
Federation Services server role and all of the Active Directory Federation Services (AD F5} role services
installed.
Planned Changes
A. Datum plans to implement the following changes:
· Replace all of the servers with new servers that run Windows Server 2012.
· Implement a private cloud by using Microsoft System Center 2012 to host instances of Appl.
· In the Miami office, deploy four new Hyper-V hosts to the perimeter network.
· In the Miami office, deploy two new Hyper-V hosts to the local network.
· In the Seattle office, deploy two new Hyper-V hosts. · In the Miami office, implement a System Center 2012
Configuration Manager primary site that has all of the system roles installed.
· Implement a public key infrastructure (PKI).
· Implement AD FS.
Notification Requirements
A. Datum identifies the following notification requirements:
· Help desk tickets must be created and assigned automatically when an instance of App1 becomes
unresponsive.
· Customers who select the Enterprise service level must receive an email notification each time a help desk
ticket for their instance of App1 is opened or closed.
Technical Requirements
A. Datum identifies the following technical requirements:
· Minimize costs whenever possible.
· Minimize the amount of WAN traffic.
· Minimize the amount of administrative effort whenever possible.
· Provide the fastest possible failover for the virtual machines hosting App2.
· Ensure that administrators can view a consolidated report about the software updates in all of the offices.
· Ensure that administrators in the Miami office can approve updates for the client computers in all of the
offices.
Security Requirements
A. Datum identifies the following security requirements:
· An offline root certification authority (CA) must be configured.
· Client computers must be issued certificates by a server in their local office.
· Changes to the CA configuration settings and the CA security settings must be logged.
· Client computers must be able to renew certificates automatically over the Internet.
· The number of permissions and privileges assigned to users must be minimized whenever possible.
· Users from a group named Group1 must be able to create new instances of App1 in the private cloud.
· Cent computers must be issued new certificates when the computers are connected to the local network only.
· The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker).
· Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com.
A.
B.
C.
D.
A scale-out file server that uses a NFS share
A file server that uses a SMB share
A scale-out file server that uses a SMB share
A file server that uses a NFS share
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
You are configuring the Certification Authority role service. From the Certification Authority console, you enable
logging. You need to ensure that configuration changes to the certification authority (CA) are logged. Which
audit policy should you configure?
Case Study 2: A. Datum (Case Study):
Overview
A. Datum Corporation is an accounting company.
The company has a main office and two branch offices. The main office is located in Miami. The branch offices
are located in New York and Seattle.
Existing Environment
Network Infrastructure
The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008
R2.
The main office has the following servers and client computers:
· Two domain controllers configured as DNS servers and DHCP servers
· One file server that has multiples shares
· One thousand client computers that run Windows 7
· Each branch office has the following servers and client computers:
· One domain controller configured as a DNS server and a DHCP server
· Five hundred to 800 client computers that run Windows XP Each office has multiple subnets. The network
speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a
WAN link. The main office is connected to the Internet.
Current Issues
The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link
will not be replaced for another year.
Requirements
Application Requirements
The company is developing an application named Appl. App1 is a multi-tier application that will be sold as a
service to customers.
Each instance of App1 is comprised of the following three tiers:
· A web front end
· A middle tier that uses Windows Communication Foundation (WCF)
· A Microsoft SQL Server 2008 R2 database on the back end Each tier will be hosted on one or more virtual
machines. Multiple-tiers cannot coexist on the same virtual machine.
When customers purchase App1, they can select from one of the following service levels:
· Standard: Uses a single instance of each virtual machine required by Appl. If a virtual machine becomes
unresponsive, the virtual machine must be restarted.
· Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and
fault tolerance.
All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server
fails.
You plan to deploy an application named App2. App2 is comprised of the following two tiers:
· A web front end
· A dedicated SQL Server 2008 R2 database on the back end App2 will be hosted on a set of virtual machines
in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the
App2 virtual machines will be maintained in the Seattle office.
App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active
Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory
Federation Services server role and all of the Active Directory Federation Services (AD F5} role services
installed.
Planned Changes
A. Datum plans to implement the following changes:
· Replace all of the servers with new servers that run Windows Server 2012.
· Implement a private cloud by using Microsoft System Center 2012 to host instances of Appl.
· In the Miami office, deploy four new Hyper-V hosts to the perimeter network.
· In the Miami office, deploy two new Hyper-V hosts to the local network.
· In the Seattle office, deploy two new Hyper-V hosts. · In the Miami office, implement a System Center 2012
Configuration Manager primary site that has all of the system roles installed.
· Implement a public key infrastructure (PKI).
· Implement AD FS.
Notification Requirements
A. Datum identifies the following notification requirements:
· Help desk tickets must be created and assigned automatically when an instance of App1 becomes
unresponsive.
· Customers who select the Enterprise service level must receive an email notification each time a help desk
ticket for their instance of App1 is opened or closed.
Technical Requirements
A. Datum identifies the following technical requirements:
· Minimize costs whenever possible.
· Minimize the amount of WAN traffic.
· Minimize the amount of administrative effort whenever possible.
· Provide the fastest possible failover for the virtual machines hosting App2.
· Ensure that administrators can view a consolidated report about the software updates in all of the offices.
· Ensure that administrators in the Miami office can approve updates for the client computers in all of the
offices.
Security Requirements
A. Datum identifies the following security requirements:
· An offline root certification authority (CA) must be configured.
· Client computers must be issued certificates by a server in their local office.
· Changes to the CA configuration settings and the CA security settings must be logged.
· Client computers must be able to renew certificates automatically over the Internet.
· The number of permissions and privileges assigned to users must be minimized whenever possible.
· Users from a group named Group1 must be able to create new instances of App1 in the private cloud.
· Cent computers must be issued new certificates when the computers are connected to the local network only.
· The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker).
· Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com.
A.
B.
C.
D.
Audit policy change
Audit privilege use
Audit system events
Audit object access
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
You need to recommend a solution that meets the notification requirements. Which System Center 2012
components should you include in the recommendation?
Case Study 2: A. Datum (Case Study):
Overview
A. Datum Corporation is an accounting company.
The company has a main office and two branch offices. The main office is located in Miami. The branch offices
are located in New York and Seattle.
Existing Environment
Network Infrastructure
The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008
R2.
The main office has the following servers and client computers:
· Two domain controllers configured as DNS servers and DHCP servers
· One file server that has multiples shares
· One thousand client computers that run Windows 7
· Each branch office has the following servers and client computers:
· One domain controller configured as a DNS server and a DHCP server
· Five hundred to 800 client computers that run Windows XP Each office has multiple subnets. The network
speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a
WAN link. The main office is connected to the Internet.
Current Issues
The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link
will not be replaced for another year.
Requirements
Application Requirements
The company is developing an application named Appl. App1 is a multi-tier application that will be sold as a
service to customers.
Each instance of App1 is comprised of the following three tiers:
· A web front end
· A middle tier that uses Windows Communication Foundation (WCF)
· A Microsoft SQL Server 2008 R2 database on the back end Each tier will be hosted on one or more virtual
machines. Multiple-tiers cannot coexist on the same virtual machine.
When customers purchase App1, they can select from one of the following service levels:
· Standard: Uses a single instance of each virtual machine required by Appl. If a virtual machine becomes
unresponsive, the virtual machine must be restarted.
· Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and
fault tolerance.
All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server
fails.
You plan to deploy an application named App2. App2 is comprised of the following two tiers:
· A web front end
· A dedicated SQL Server 2008 R2 database on the back end App2 will be hosted on a set of virtual machines
in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the
App2 virtual machines will be maintained in the Seattle office.
App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active
Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory
Federation Services server role and all of the Active Directory Federation Services (AD F5} role services
installed.
Planned Changes
A. Datum plans to implement the following changes:
· Replace all of the servers with new servers that run Windows Server 2012.
· Implement a private cloud by using Microsoft System Center 2012 to host instances of Appl.
· In the Miami office, deploy four new Hyper-V hosts to the perimeter network.
· In the Miami office, deploy two new Hyper-V hosts to the local network.
· In the Seattle office, deploy two new Hyper-V hosts. · In the Miami office, implement a System Center 2012
Configuration Manager primary site that has all of the system roles installed.
· Implement a public key infrastructure (PKI).
· Implement AD FS.
Notification Requirements
A. Datum identifies the following notification requirements:
· Help desk tickets must be created and assigned automatically when an instance of App1 becomes
unresponsive.
· Customers who select the Enterprise service level must receive an email notification each time a help desk
ticket for their instance of App1 is opened or closed.
Technical Requirements
A. Datum identifies the following technical requirements:
· Minimize costs whenever possible.
· Minimize the amount of WAN traffic.
· Minimize the amount of administrative effort whenever possible.
· Provide the fastest possible failover for the virtual machines hosting App2.
· Ensure that administrators can view a consolidated report about the software updates in all of the offices.
· Ensure that administrators in the Miami office can approve updates for the client computers in all of the
offices.
Security Requirements
A. Datum identifies the following security requirements:
· An offline root certification authority (CA) must be configured.
· Client computers must be issued certificates by a server in their local office.
· Changes to the CA configuration settings and the CA security settings must be logged.
· Client computers must be able to renew certificates automatically over the Internet.
· The number of permissions and privileges assigned to users must be minimized whenever possible.
· Users from a group named Group1 must be able to create new instances of App1 in the private cloud.
· Cent computers must be issued new certificates when the computers are connected to the local network only.
· The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker).
· Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com.
A.
B.
C.
D.
Operations Manager, Service Manager and Orchestrator
Configuration Manager, Service Manager and Orchestrator
App Controller, Configuration Manager and Operations Manager
Service Manager, Orchestrator and App Controller
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
You need to recommend a solution to maintain a copy of App2. The solution must meet the application
requirements and must minimize additional hardware purchases. What should you include in the
recommendation?
Case Study 2: A. Datum (Case Study):
Overview
A. Datum Corporation is an accounting company.
The company has a main office and two branch offices. The main office is located in Miami. The branch offices
are located in New York and Seattle.
Existing Environment
Network Infrastructure
The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008
R2.
The main office has the following servers and client computers:
· Two domain controllers configured as DNS servers and DHCP servers
· One file server that has multiples shares
· One thousand client computers that run Windows 7
· Each branch office has the following servers and client computers:
· One domain controller configured as a DNS server and a DHCP server
· Five hundred to 800 client computers that run Windows XP Each office has multiple subnets. The network
speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a
WAN link. The main office is connected to the Internet.
Current Issues
The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link
will not be replaced for another year.
Requirements
Application Requirements
The company is developing an application named Appl. App1 is a multi-tier application that will be sold as a
service to customers.
Each instance of App1 is comprised of the following three tiers:
· A web front end
· A middle tier that uses Windows Communication Foundation (WCF)
· A Microsoft SQL Server 2008 R2 database on the back end Each tier will be hosted on one or more virtual
machines. Multiple-tiers cannot coexist on the same virtual machine.
When customers purchase App1, they can select from one of the following service levels:
· Standard: Uses a single instance of each virtual machine required by Appl. If a virtual machine becomes
unresponsive, the virtual machine must be restarted.
· Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and
fault tolerance.
All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server
fails.
You plan to deploy an application named App2. App2 is comprised of the following two tiers:
· A web front end
· A dedicated SQL Server 2008 R2 database on the back end App2 will be hosted on a set of virtual machines
in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the
App2 virtual machines will be maintained in the Seattle office.
App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active
Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory
Federation Services server role and all of the Active Directory Federation Services (AD F5} role services
installed.
Planned Changes
A. Datum plans to implement the following changes:
· Replace all of the servers with new servers that run Windows Server 2012.
· Implement a private cloud by using Microsoft System Center 2012 to host instances of Appl.
· In the Miami office, deploy four new Hyper-V hosts to the perimeter network.
· In the Miami office, deploy two new Hyper-V hosts to the local network.
· In the Seattle office, deploy two new Hyper-V hosts. · In the Miami office, implement a System Center 2012
Configuration Manager primary site that has all of the system roles installed.
· Implement a public key infrastructure (PKI).
· Implement AD FS.
Notification Requirements
A. Datum identifies the following notification requirements:
· Help desk tickets must be created and assigned automatically when an instance of App1 becomes
unresponsive.
· Customers who select the Enterprise service level must receive an email notification each time a help desk
ticket for their instance of App1 is opened or closed.
Technical Requirements
A. Datum identifies the following technical requirements:
· Minimize costs whenever possible.
· Minimize the amount of WAN traffic.
· Minimize the amount of administrative effort whenever possible.
· Provide the fastest possible failover for the virtual machines hosting App2.
· Ensure that administrators can view a consolidated report about the software updates in all of the offices.
· Ensure that administrators in the Miami office can approve updates for the client computers in all of the
offices.
Security Requirements
A. Datum identifies the following security requirements:
· An offline root certification authority (CA) must be configured.
· Client computers must be issued certificates by a server in their local office.
· Changes to the CA configuration settings and the CA security settings must be logged.
· Client computers must be able to renew certificates automatically over the Internet.
· The number of permissions and privileges assigned to users must be minimized whenever possible.
· Users from a group named Group1 must be able to create new instances of App1 in the private cloud.
· Cent computers must be issued new certificates when the computers are connected to the local network only.
· The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker).
· Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com.
A.
B.
C.
D.
Multi-site Failover Clustering
Hyper-V replicas
Single-site Failover Clustering
Distributed File System (DFS) Replication
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
You need to recommend a solution that meets the security requirements for Group1. To which System Center
2012 Virtual Machine Manager (VMM) group should you assign Group1?
Case Study 2: A. Datum (Case Study):
Overview
A. Datum Corporation is an accounting company.
The company has a main office and two branch offices. The main office is located in Miami. The branch offices
are located in New York and Seattle.
Existing Environment
Network Infrastructure
The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008
R2.
The main office has the following servers and client computers:
· Two domain controllers configured as DNS servers and DHCP servers
· One file server that has multiples shares
· One thousand client computers that run Windows 7
· Each branch office has the following servers and client computers:
· One domain controller configured as a DNS server and a DHCP server
· Five hundred to 800 client computers that run Windows XP Each office has multiple subnets. The network
speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a
WAN link. The main office is connected to the Internet.
Current Issues
The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link
will not be replaced for another year.
Requirements
Application Requirements
The company is developing an application named Appl. App1 is a multi-tier application that will be sold as a
service to customers.
Each instance of App1 is comprised of the following three tiers:
· A web front end
· A middle tier that uses Windows Communication Foundation (WCF)
· A Microsoft SQL Server 2008 R2 database on the back end Each tier will be hosted on one or more virtual
machines. Multiple-tiers cannot coexist on the same virtual machine.
When customers purchase App1, they can select from one of the following service levels:
· Standard: Uses a single instance of each virtual machine required by Appl. If a virtual machine becomes
unresponsive, the virtual machine must be restarted.
· Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and
fault tolerance.
All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server
fails.
You plan to deploy an application named App2. App2 is comprised of the following two tiers:
· A web front end
· A dedicated SQL Server 2008 R2 database on the back end App2 will be hosted on a set of virtual machines
in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the
App2 virtual machines will be maintained in the Seattle office.
App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active
Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory
Federation Services server role and all of the Active Directory Federation Services (AD F5} role services
installed.
Planned Changes
A. Datum plans to implement the following changes:
· Replace all of the servers with new servers that run Windows Server 2012.
· Implement a private cloud by using Microsoft System Center 2012 to host instances of Appl.
· In the Miami office, deploy four new Hyper-V hosts to the perimeter network.
· In the Miami office, deploy two new Hyper-V hosts to the local network.
· In the Seattle office, deploy two new Hyper-V hosts. · In the Miami office, implement a System Center 2012
Configuration Manager primary site that has all of the system roles installed.
· Implement a public key infrastructure (PKI).
· Implement AD FS.
Notification Requirements
A. Datum identifies the following notification requirements:
· Help desk tickets must be created and assigned automatically when an instance of App1 becomes
unresponsive.
· Customers who select the Enterprise service level must receive an email notification each time a help desk
ticket for their instance of App1 is opened or closed.
Technical Requirements
A. Datum identifies the following technical requirements:
· Minimize costs whenever possible.
· Minimize the amount of WAN traffic.
· Minimize the amount of administrative effort whenever possible.
· Provide the fastest possible failover for the virtual machines hosting App2.
· Ensure that administrators can view a consolidated report about the software updates in all of the offices.
· Ensure that administrators in the Miami office can approve updates for the client computers in all of the
offices.
Security Requirements
A. Datum identifies the following security requirements:
· An offline root certification authority (CA) must be configured.
· Client computers must be issued certificates by a server in their local office.
· Changes to the CA configuration settings and the CA security settings must be logged.
· Client computers must be able to renew certificates automatically over the Internet.
· The number of permissions and privileges assigned to users must be minimized whenever possible.
· Users from a group named Group1 must be able to create new instances of App1 in the private cloud.
· Cent computers must be issued new certificates when the computers are connected to the local network only.
· The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker).
· Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com.
A.
B.
C.
D.
Read-Only Administrator
Administrators
Delegated Administrator
Self-Service User
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
You need to recommend which Certificate Services role service must be deployed to the perimeter network.
The solution must meet the technical requirements. Which Certificate Services role services should you
recommend?
Case Study 2: A. Datum (Case Study):
Overview
A. Datum Corporation is an accounting company.
The company has a main office and two branch offices. The main office is located in Miami. The branch offices
are located in New York and Seattle.
Existing Environment
Network Infrastructure
The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008
R2.
The main office has the following servers and client computers:
· Two domain controllers configured as DNS servers and DHCP servers
· One file server that has multiples shares
· One thousand client computers that run Windows 7
· Each branch office has the following servers and client computers:
· One domain controller configured as a DNS server and a DHCP server
· Five hundred to 800 client computers that run Windows XP Each office has multiple subnets. The network
speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a
WAN link. The main office is connected to the Internet.
Current Issues
The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link
will not be replaced for another year.
Requirements
Application Requirements
The company is developing an application named Appl. App1 is a multi-tier application that will be sold as a
service to customers.
Each instance of App1 is comprised of the following three tiers:
· A web front end
· A middle tier that uses Windows Communication Foundation (WCF)
· A Microsoft SQL Server 2008 R2 database on the back end Each tier will be hosted on one or more virtual
machines. Multiple-tiers cannot coexist on the same virtual machine.
When customers purchase App1, they can select from one of the following service levels:
· Standard: Uses a single instance of each virtual machine required by Appl. If a virtual machine becomes
unresponsive, the virtual machine must be restarted.
· Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and
fault tolerance.
All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server
fails.
You plan to deploy an application named App2. App2 is comprised of the following two tiers:
· A web front end
· A dedicated SQL Server 2008 R2 database on the back end App2 will be hosted on a set of virtual machines
in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the
App2 virtual machines will be maintained in the Seattle office.
App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active
Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory
Federation Services server role and all of the Active Directory Federation Services (AD F5} role services
installed.
Planned Changes
A. Datum plans to implement the following changes:
· Replace all of the servers with new servers that run Windows Server 2012.
· Implement a private cloud by using Microsoft System Center 2012 to host instances of Appl.
· In the Miami office, deploy four new Hyper-V hosts to the perimeter network.
· In the Miami office, deploy two new Hyper-V hosts to the local network.
· In the Seattle office, deploy two new Hyper-V hosts. · In the Miami office, implement a System Center 2012
Configuration Manager primary site that has all of the system roles installed.
· Implement a public key infrastructure (PKI).
· Implement AD FS.
Notification Requirements
A. Datum identifies the following notification requirements:
· Help desk tickets must be created and assigned automatically when an instance of App1 becomes
unresponsive.
· Customers who select the Enterprise service level must receive an email notification each time a help desk
ticket for their instance of App1 is opened or closed.
Technical Requirements
A. Datum identifies the following technical requirements:
· Minimize costs whenever possible.
· Minimize the amount of WAN traffic.
· Minimize the amount of administrative effort whenever possible.
· Provide the fastest possible failover for the virtual machines hosting App2.
· Ensure that administrators can view a consolidated report about the software updates in all of the offices.
· Ensure that administrators in the Miami office can approve updates for the client computers in all of the
offices.
Security Requirements
A. Datum identifies the following security requirements:
· An offline root certification authority (CA) must be configured.
· Client computers must be issued certificates by a server in their local office.
· Changes to the CA configuration settings and the CA security settings must be logged.
· Client computers must be able to renew certificates automatically over the Internet.
· The number of permissions and privileges assigned to users must be minimized whenever possible.
· Users from a group named Group1 must be able to create new instances of App1 in the private cloud.
· Cent computers must be issued new certificates when the computers are connected to the local network only.
· The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker).
· Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com.
A.
B.
C.
D.
Certificate Enrollment Web Service and Certificate Enrollment Policy Web Service
Certificate Enrollment Policy Web Service and Certification Authority Web Enrollment
Online Responder and Network Device Enrollment Service
Online Responder and Certificate Enrollment Web Service
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
You have a service template to deploy Appl. You are evaluating the use of Network Load Balancing (NLB) for
the front-end servers used by Appl. You need to recommend which component must be added to the service
template. What should you recommend?
Case Study 2: A. Datum (Case Study):
Overview
A. Datum Corporation is an accounting company.
The company has a main office and two branch offices. The main office is located in Miami. The branch offices
are located in New York and Seattle.
Existing Environment
Network Infrastructure
The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008
R2.
The main office has the following servers and client computers:
· Two domain controllers configured as DNS servers and DHCP servers
· One file server that has multiples shares
· One thousand client computers that run Windows 7
· Each branch office has the following servers and client computers:
· One domain controller configured as a DNS server and a DHCP server
· Five hundred to 800 client computers that run Windows XP Each office has multiple subnets. The network
speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a
WAN link. The main office is connected to the Internet.
Current Issues
The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link
will not be replaced for another year.
Requirements
Application Requirements
The company is developing an application named Appl. App1 is a multi-tier application that will be sold as a
service to customers.
Each instance of App1 is comprised of the following three tiers:
· A web front end
· A middle tier that uses Windows Communication Foundation (WCF)
· A Microsoft SQL Server 2008 R2 database on the back end Each tier will be hosted on one or more virtual
machines. Multiple-tiers cannot coexist on the same virtual machine.
When customers purchase App1, they can select from one of the following service levels:
· Standard: Uses a single instance of each virtual machine required by Appl. If a virtual machine becomes
unresponsive, the virtual machine must be restarted.
· Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and
fault tolerance.
All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server
fails.
You plan to deploy an application named App2. App2 is comprised of the following two tiers:
· A web front end
· A dedicated SQL Server 2008 R2 database on the back end App2 will be hosted on a set of virtual machines
in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the
App2 virtual machines will be maintained in the Seattle office.
App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active
Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory
Federation Services server role and all of the Active Directory Federation Services (AD F5} role services
installed.
Planned Changes
A. Datum plans to implement the following changes:
· Replace all of the servers with new servers that run Windows Server 2012.
· Implement a private cloud by using Microsoft System Center 2012 to host instances of Appl.
· In the Miami office, deploy four new Hyper-V hosts to the perimeter network.
· In the Miami office, deploy two new Hyper-V hosts to the local network.
· In the Seattle office, deploy two new Hyper-V hosts. · In the Miami office, implement a System Center 2012
Configuration Manager primary site that has all of the system roles installed.
· Implement a public key infrastructure (PKI).
· Implement AD FS.
Notification Requirements
A. Datum identifies the following notification requirements:
· Help desk tickets must be created and assigned automatically when an instance of App1 becomes
unresponsive.
· Customers who select the Enterprise service level must receive an email notification each time a help desk
ticket for their instance of App1 is opened or closed.
Technical Requirements
A. Datum identifies the following technical requirements:
· Minimize costs whenever possible.
· Minimize the amount of WAN traffic.
· Minimize the amount of administrative effort whenever possible.
· Provide the fastest possible failover for the virtual machines hosting App2.
· Ensure that administrators can view a consolidated report about the software updates in all of the offices.
· Ensure that administrators in the Miami office can approve updates for the client computers in all of the
offices.
Security Requirements
A. Datum identifies the following security requirements:
· An offline root certification authority (CA) must be configured.
· Client computers must be issued certificates by a server in their local office.
· Changes to the CA configuration settings and the CA security settings must be logged.
· Client computers must be able to renew certificates automatically over the Internet.
· The number of permissions and privileges assigned to users must be minimized whenever possible.
· Users from a group named Group1 must be able to create new instances of App1 in the private cloud.
· Cent computers must be issued new certificates when the computers are connected to the local network only.
· The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker).
· Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com.
A.
B.
C.
D.
Guest OS profile
A host profile
A capability profile
A VIP template
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
You need to recommend a storage solution for the App1 VHDs. The solution must minimize downtime if a
Hyper-V host fails. What should you include in the recommendation?
Case Study 2: A. Datum (Case Study):
Overview
A. Datum Corporation is an accounting company.
The company has a main office and two branch offices. The main office is located in Miami. The branch offices
are located in New York and Seattle.
Existing Environment
Network Infrastructure
The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008
R2.
The main office has the following servers and client computers:
· Two domain controllers configured as DNS servers and DHCP servers
· One file server that has multiples shares
· One thousand client computers that run Windows 7
· Each branch office has the following servers and client computers:
· One domain controller configured as a DNS server and a DHCP server
· Five hundred to 800 client computers that run Windows XP Each office has multiple subnets. The network
speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a
WAN link. The main office is connected to the Internet.
Current Issues
The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link
will not be replaced for another year.
Requirements
Application Requirements
The company is developing an application named Appl. App1 is a multi-tier application that will be sold as a
service to customers.
Each instance of App1 is comprised of the following three tiers:
· A web front end
· A middle tier that uses Windows Communication Foundation (WCF)
· A Microsoft SQL Server 2008 R2 database on the back end Each tier will be hosted on one or more virtual
machines. Multiple-tiers cannot coexist on the same virtual machine.
When customers purchase App1, they can select from one of the following service levels:
· Standard: Uses a single instance of each virtual machine required by Appl. If a virtual machine becomes
unresponsive, the virtual machine must be restarted.
· Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and
fault tolerance.
All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server
fails.
You plan to deploy an application named App2. App2 is comprised of the following two tiers:
· A web front end
· A dedicated SQL Server 2008 R2 database on the back end App2 will be hosted on a set of virtual machines
in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the
App2 virtual machines will be maintained in the Seattle office.
App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active
Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory
Federation Services server role and all of the Active Directory Federation Services (AD F5} role services
installed.
Planned Changes
A. Datum plans to implement the following changes:
· Replace all of the servers with new servers that run Windows Server 2012.
· Implement a private cloud by using Microsoft System Center 2012 to host instances of Appl.
· In the Miami office, deploy four new Hyper-V hosts to the perimeter network.
· In the Miami office, deploy two new Hyper-V hosts to the local network.
· In the Seattle office, deploy two new Hyper-V hosts. · In the Miami office, implement a System Center 2012
Configuration Manager primary site that has all of the system roles installed.
· Implement a public key infrastructure (PKI).
· Implement AD FS.
Notification Requirements
A. Datum identifies the following notification requirements:
· Help desk tickets must be created and assigned automatically when an instance of App1 becomes
unresponsive.
· Customers who select the Enterprise service level must receive an email notification each time a help desk
ticket for their instance of App1 is opened or closed.
Technical Requirements
A. Datum identifies the following technical requirements:
· Minimize costs whenever possible.
· Minimize the amount of WAN traffic.
· Minimize the amount of administrative effort whenever possible.
· Provide the fastest possible failover for the virtual machines hosting App2.
· Ensure that administrators can view a consolidated report about the software updates in all of the offices.
· Ensure that administrators in the Miami office can approve updates for the client computers in all of the
offices.
Security Requirements
A. Datum identifies the following security requirements:
· An offline root certification authority (CA) must be configured.
· Client computers must be issued certificates by a server in their local office.
· Changes to the CA configuration settings and the CA security settings must be logged.
· Client computers must be able to renew certificates automatically over the Internet.
· The number of permissions and privileges assigned to users must be minimized whenever possible.
· Users from a group named Group1 must be able to create new instances of App1 in the private cloud.
· Cent computers must be issued new certificates when the computers are connected to the local network only.
· The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker).
· Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com.
A.
B.
C.
D.
Distributed File System (DFS) Replication
A clustered file server of the File Server for general use type
A Distributed File System (DFS) namespace
clustered file server of the File Server for scale-out application data type
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
You are evaluating the deployment of a multi-site Hyper-V failover cluster in the Miami office and the Seattle
office to host App2. You need to identify which changes must be made to support the use of the multi-site
cluster. Which changes should you identify?
Case Study 2: A. Datum (Case Study):
Overview
A. Datum Corporation is an accounting company.
The company has a main office and two branch offices. The main office is located in Miami. The branch offices
are located in New York and Seattle.
Existing Environment
Network Infrastructure
The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008
R2.
The main office has the following servers and client computers:
· Two domain controllers configured as DNS servers and DHCP servers
· One file server that has multiples shares
· One thousand client computers that run Windows 7
· Each branch office has the following servers and client computers:
· One domain controller configured as a DNS server and a DHCP server
· Five hundred to 800 client computers that run Windows XP Each office has multiple subnets. The network
speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a
WAN link. The main office is connected to the Internet.
Current Issues
The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link
will not be replaced for another year.
Requirements
Application Requirements
The company is developing an application named Appl. App1 is a multi-tier application that will be sold as a
service to customers.
Each instance of App1 is comprised of the following three tiers:
· A web front end
· A middle tier that uses Windows Communication Foundation (WCF)
· A Microsoft SQL Server 2008 R2 database on the back end Each tier will be hosted on one or more virtual
machines. Multiple-tiers cannot coexist on the same virtual machine.
When customers purchase App1, they can select from one of the following service levels:
· Standard: Uses a single instance of each virtual machine required by Appl. If a virtual machine becomes
unresponsive, the virtual machine must be restarted.
· Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and
fault tolerance.
All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server
fails.
You plan to deploy an application named App2. App2 is comprised of the following two tiers:
· A web front end
· A dedicated SQL Server 2008 R2 database on the back end App2 will be hosted on a set of virtual machines
in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the
App2 virtual machines will be maintained in the Seattle office.
App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active
Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory
Federation Services server role and all of the Active Directory Federation Services (AD F5} role services
installed.
Planned Changes
A. Datum plans to implement the following changes:
· Replace all of the servers with new servers that run Windows Server 2012.
· Implement a private cloud by using Microsoft System Center 2012 to host instances of Appl.
· In the Miami office, deploy four new Hyper-V hosts to the perimeter network.
· In the Miami office, deploy two new Hyper-V hosts to the local network.
· In the Seattle office, deploy two new Hyper-V hosts. · In the Miami office, implement a System Center 2012
Configuration Manager primary site that has all of the system roles installed.
· Implement a public key infrastructure (PKI).
· Implement AD FS.
Notification Requirements
A. Datum identifies the following notification requirements:
· Help desk tickets must be created and assigned automatically when an instance of App1 becomes
unresponsive.
· Customers who select the Enterprise service level must receive an email notification each time a help desk
ticket for their instance of App1 is opened or closed.
Technical Requirements
A. Datum identifies the following technical requirements:
· Minimize costs whenever possible.
· Minimize the amount of WAN traffic.
· Minimize the amount of administrative effort whenever possible.
· Provide the fastest possible failover for the virtual machines hosting App2.
· Ensure that administrators can view a consolidated report about the software updates in all of the offices.
· Ensure that administrators in the Miami office can approve updates for the client computers in all of the
offices.
Security Requirements
A. Datum identifies the following security requirements:
· An offline root certification authority (CA) must be configured.
· Client computers must be issued certificates by a server in their local office.
· Changes to the CA configuration settings and the CA security settings must be logged.
· Client computers must be able to renew certificates automatically over the Internet.
· The number of permissions and privileges assigned to users must be minimized whenever possible.
· Users from a group named Group1 must be able to create new instances of App1 in the private cloud.
· Cent computers must be issued new certificates when the computers are connected to the local network only.
· The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker).
· Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com.
A. Purchase a storage solution that replicates the virtual machines. Configure all of the virtual machines to use
dynamic memory.
B. Upgrade the WAN link between the Miami and Seattle offices. Purchase a storage solution that replicates
the virtual machines.
C. Configure all of the virtual machines to use dynamic memory. Implement Distributed File System (DFS)
Replication and store the virtual machine files in a replicated folder.
D. Implement Distributed File System (DFS) Replication and store the virtual machine files in a replicated
folder. Upgrade the WAN link between the Miami and Seattle offices.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
You need to recommend a software update solution that meets the technical requirements. What should you
recommend deploying to each branch office?
Case Study 2: A. Datum (Case Study):
Overview
A. Datum Corporation is an accounting company.
The company has a main office and two branch offices. The main office is located in Miami. The branch offices
are located in New York and Seattle.
Existing Environment
Network Infrastructure
The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008
R2.
The main office has the following servers and client computers:
· Two domain controllers configured as DNS servers and DHCP servers
· One file server that has multiples shares
· One thousand client computers that run Windows 7
· Each branch office has the following servers and client computers:
· One domain controller configured as a DNS server and a DHCP server
· Five hundred to 800 client computers that run Windows XP Each office has multiple subnets. The network
speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a
WAN link. The main office is connected to the Internet.
Current Issues
The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link
will not be replaced for another year.
Requirements
Application Requirements
The company is developing an application named Appl. App1 is a multi-tier application that will be sold as a
service to customers.
Each instance of App1 is comprised of the following three tiers:
· A web front end
· A middle tier that uses Windows Communication Foundation (WCF)
· A Microsoft SQL Server 2008 R2 database on the back end Each tier will be hosted on one or more virtual
machines. Multiple-tiers cannot coexist on the same virtual machine.
When customers purchase App1, they can select from one of the following service levels:
· Standard: Uses a single instance of each virtual machine required by Appl. If a virtual machine becomes
unresponsive, the virtual machine must be restarted.
· Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and
fault tolerance.
All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server
fails.
You plan to deploy an application named App2. App2 is comprised of the following two tiers:
· A web front end
· A dedicated SQL Server 2008 R2 database on the back end App2 will be hosted on a set of virtual machines
in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the
App2 virtual machines will be maintained in the Seattle office.
App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active
Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory
Federation Services server role and all of the Active Directory Federation Services (AD F5} role services
installed.
Planned Changes
A. Datum plans to implement the following changes:
· Replace all of the servers with new servers that run Windows Server 2012.
· Implement a private cloud by using Microsoft System Center 2012 to host instances of Appl.
· In the Miami office, deploy four new Hyper-V hosts to the perimeter network.
· In the Miami office, deploy two new Hyper-V hosts to the local network.
· In the Seattle office, deploy two new Hyper-V hosts. · In the Miami office, implement a System Center 2012
Configuration Manager primary site that has all of the system roles installed.
· Implement a public key infrastructure (PKI).
· Implement AD FS.
Notification Requirements
A. Datum identifies the following notification requirements:
· Help desk tickets must be created and assigned automatically when an instance of App1 becomes
unresponsive.
· Customers who select the Enterprise service level must receive an email notification each time a help desk
ticket for their instance of App1 is opened or closed.
Technical Requirements
A. Datum identifies the following technical requirements:
· Minimize costs whenever possible.
· Minimize the amount of WAN traffic.
· Minimize the amount of administrative effort whenever possible.
· Provide the fastest possible failover for the virtual machines hosting App2.
· Ensure that administrators can view a consolidated report about the software updates in all of the offices.
· Ensure that administrators in the Miami office can approve updates for the client computers in all of the
offices.
Security Requirements
A. Datum identifies the following security requirements:
· An offline root certification authority (CA) must be configured.
· Client computers must be issued certificates by a server in their local office.
· Changes to the CA configuration settings and the CA security settings must be logged.
· Client computers must be able to renew certificates automatically over the Internet.
· The number of permissions and privileges assigned to users must be minimized whenever possible.
· Users from a group named Group1 must be able to create new instances of App1 in the private cloud.
· Cent computers must be issued new certificates when the computers are connected to the local network only.
· The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker).
· Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com.
A. An endpoint protection point
B. A distribution point
C. A management point
D. An enrollment proxy point
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Download PDF
Similar pages
IT Projects - CHR Managed Services
iGo Miami
c421 Charging Instructions
User Manual
Why Upgrade to Windows Server 2012 R2
rtcon.doc
quick reference guide
11800473
11800472