Up to the minute Microsoft 70-414 - An Overview 91 to 99

We provide real 70-414 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft 70-414 Exam quickly & easily. The 70-414 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 70-414 dumps pdf and vce product and material, you can easily pass the 70-414 exam.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-414 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-414 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-414-exam-dumps.html

Q91. - (Topic 7) 

You administer an Active Directory Domain Services environment. There are no certification authorities (CAs) in the environment. 

You plan to implement a two-tier CA hierarchy with an offline root CA. 

You need to ensure that the issuing CA is not used to create additional subordinate CAs. 

What should you do? 

A. In the CAPolicy.inf file for the issuing CA, enter the following constraint: PathLength=1 

B. In the CAPolicy.inf file for the root CA, enter the following constraint: PathLength=1 

C. In the CAPolicy.inf file for the root CA, enter the following constraint: PathLength=2 

D. In the CAPolicy.inf file for the issuing CA, enter the following constraint: PathLength=2 

Answer:

Explanation: You can use the CAPolicy.inf file to define the PathLength constraint in the Basic Constraints extension of the root CA certificate. Setting the PathLength basic constraint allows you to limit the path length of the CA hierarchy by specifying how many tiers of subordinate CAs can exist beneath the root. A PathLength of 1 means there can be at most one tier of CAs beneath the root. These subordinate CAs will have a PathLength basic constraint of 0, which means that they cannot issue any subordinate CA certificates. 

Reference: Windows Server 2008 R2 CAPolicy.inf Syntax 

http://blogs.technet.com/b/askds/archive/2009/10/15/windows-server-2008-r2-capolicy-inf-syntax.aspx 


Q92. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. 

You deploy Active Directory Certificate Services (AD CS). 

Your company, which is named Contoso, Ltd., has a partner company named Fabrikam, Inc. Fabrikam also deploys AD CS. 

Contoso and Fabrikam plan to exchange signed and encrypted email messages. 

You need to ensure that the client computers in both Contoso and Fabrikam trust each other's email certificates. The solution must prevent other certificates from being trusted and minimize administrative effort. 

What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Implement an online responder in each company. 

B. Exchange the root certification authority (CA) certificates of both companies, and then deploy the certificates to the Enterprise Trust store by using Group Policy objects (GPOs). 

C. Implement cross-certification in each company. 

D. Exchange the root certification authority (CA) certificates of both companies, and then deploy the certificates to the Trusted Root Certification Authorities store by using Group Policy objects (GPOs). 

Answer:


Q93. - (Topic 7) 

This question consists of two statements: One is named Assertion and the other is named Reason. Both of these statements may be true; both may be false; or one may be true, while the other may be false. 

To answer this question, you must first evaluate whether each statement is true on its own. If both statements are true, then you must evaluate whether the Reason (the second statement) correctly explains the Assertion (the first statement). You will then select the answer from the list of answer choices that matches your evaluation of the two statements. 

Assertion: 

You can manage VMware ESX hosts and virtual machines by using a System Center Virtual Machine Manager (SCVMM) server. 

Reason: 

SCVMM automatically imports ESX hosts and virtual machines when you add the corresponding VMware vCenter to the SCVMM server. 

Evaluate the Assertion and Reason statements and choose the correct answer option. 

A. Both the Assertion and Reason are true, and the Reason is the correct explanation for the Assertion. 

B. Both the Assertion and Reason are true, but the Reason is not the correct explanation for the Assertion. 

C. The Assertion is true, but the Reason is false. 

D. The Assertion is false, but the Reason is true. 

E. Both the Assertion and the Reason are false. 

Answer:

Explanation: * Assertion: true Virtual Machine Manager (VMM) enables you to deploy and manage virtual machines and services across multiple hypervisor platforms, including VMware ESX and ESXi hosts. 

* Reason: False When you add a vCenter Server, VMM no longer imports, merges and synchronizes the VMware tree structure with VMM. Instead, after you add a vCenter Server, you can add selected ESX servers and hosts to any VMM host group. Therefore, there are fewer issues with synchronization. 

Reference: Managing VMware ESX Hosts in VMM Overview 

https://technet.microsoft.com/en-us/library/gg610683.aspx 


Q94. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. 

Your company has an enterprise root certification authority (CA) named CA1. 

You plan to deploy Active Directory Federation Services (AD FS) to a server named 

Server1. 

The company purchases a Microsoft Office 365 subscription. 

You plan to register the company's SMTP domain for Office 365 and to configure single sign-on for all users. 

You need to identify which certificate or certificates are required for the planned deployment. 

Which certificate or certificates should you identify? (Each correct answer presents a complete solution. Choose all that apply.) 

A. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name serverl.contoso.com 

B. a server authentication certificate that is issued by CA1 and that contains the subject name Server1 

C. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name Server1 

D. a server authentication certificate that is issued by CA1 and that contains the subject name serverl.contoso.com 

E. self-signed server authentication certificates for server1.contoso.com 

Answer: D,E 


Q95. - (Topic 8) 

Your network contains the following roles and applications: 

Microsoft SQL Server 2012 

Distributed File System (DFS) Replication 

Active Directory Domain Services (AD DS) 

Active Directory Rights Management Services (AD RMS) 

Active Directory Lightweight Directory Services (AD LDS) 

You plan to deploy Active Directory Federation Services (AD FS). 

You need to identify which deployed services or applications can be used as attribute stores for the planned AD FS deployment. 

What should you identify? (Each correct answer presents a complete solution. Choose all that apply.) 

A. DFS 

B. AD RMS 

C. Microsoft SQL Server 2012 

D. AD LDS 

E. AD DS 

Answer: C,D,E 


Q96. - (Topic 8) 

You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1. You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases. 

Solution: You set the memory-weight threshold value to High for each business-critical VM, Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q97. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. 

You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table. 

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. 

Solution: From Virtual Machine Manager (VMM), you modify the properties of the service template. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q98. - (Topic 8) 

NOTE: Once you answer this question, you will NOT be able to return to it. You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1. You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases. 

Solution: You configure preferred and possible owners for each business-critical VM. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q99. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. 

You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table. 

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. 

Solution: From Operations Manager, you create a Distributed Application and a Monitor Override. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: