Certification Exam Prep Questions For Designing and Implementing a Server Infrastructure (70-413)

QuickStart is now offering assessment questions for Designing and Implementing a Server Infrastructure (70-413). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take for Designing and Implementing a Server Infrastructure (70-413).



You have been asked to rename the domain from BCDTRAIN.COM to MEASUREUP.NET. You confirm that there are up-to-date backups of the domain, and then you create a new DNS zone for MEASUREUP.NET on the existing DNS servers. What is the next step you should do in the domain rename process?


You want to use the existing deployment of Microsoft System Center Virtual Machine Manager (SC VMM) 2012 to deploy a number of Virtual Guest machines that run Microsoft Windows Server 2012 R2. To do this, you want to create a Guest Operating System profile that includes Windows Server 2012 R2. What is the first thing you need to do to achieve this?


As part of expanding to an additional level in the building, the company wants to ensure that DHCP is correctly configured. You want to create a new DHCP scope that is similar to the current one. What tool should you use? (More than one answer choice may be correct. Choose the BEST answer.)

A. DHCP Management Console
C. PowerShell
D. IPAM Management Console

You determine that it is configured to use Active Directory credentials, and that the "Enable Windows 7 client computers to connect via DirectAccess option is selected. You need to ensure that all end user machines are able to connect to the network remotely. The cost and effort necessary to accomplish this must be kept to a minimum. What should you do? (More than one answer choice may be correct. Choose the BEST answer.)


You are the IT administrator for your company. You are planning an installation of the Microsoft Windows Server 2012 R2 IP Address Management (IPAM) Server. You want to use IPAM to monitor multiple DHCP servers on your network. You plan to deploy an IPAM server in each branch office, configured to manage the network in that office. You want to ensure that the loss of a single IPAM server does not prevent you from managing the network. What is the easiest, most cost-effective way to do this?


You are deploying a virtual machine (VM) on Azure IaaS. The deployment needs to support at least 500 GB of storage. What type of Azure storage is required?

A. Blob
B. Table
C. Queue
D. Raw

You are an administrator for your company's network. In order to meet projected use requirements, the company is migrating some of its server resources to Azure laaS. You deploy a computer running Microsoft Windows Server 2012 R2 with Routing and Remote Access Service (RRAS) installed and configured. You deploy the RRAS server outside your perimeter network. You configure traffic filters through the RRAS Setup Wizard. You want to support an L2TP/IPSec connection between the RRAS server and the perimeter network. You need to configure the firewall to support the connection. Which ports (inbound and outbound) need to be open on the firewall? (Each correct answer presents part of the solution. Choose all that apply.)

A. 47
B. 4500
C. 500
D. 1701

You manage an Active Directory Domain Services (AD DS) domain named example.com. All domain controllers are running Microsoft Windows Server 2012 R2. The forest functional level is Windows Server 2003. The domain functional level is Windows Server 2008. You plan to implement compound authentication for Dynamic Access Control. Which step should you perform first?


You manage the server infrastructure for your company. You are planning a Microsoft Windows Server 2012 R2 deployment. You need to prepare multiple Windows images for deployment on computers with different hardware configurations. You need to generalize the image as part of an unattended installation. What should you do?


You are the IT administrator for your company. You are planning a deployment of Network Access Protection (NAP) to ensure that computers have up to date protection when they connect to your network. As you are evaluating the various methods of NAP available to you, you decide that you want to make sure that all NAP-related communication is authenticated. You do not currently have a solution that authenticates traffic on your network. Which method of NAP enforcement would NOT be suitable?


You are one of several IT administrators at your company. You have been asked to design an organizational unit structure to support Group Policy. There are four departments in your company. You want to ensure that each user has a drive mapped to their departmental shared folder. You have created five Group Policy objects. One contains all of the common settings that should apply to all users. The other four Group Policy objects contain the specific drive mapping settings for each department. How should you assign the Group Policy objects to achieve the desired result?


You are an administrator for an Active Directory Domain Services (AD DS) domain that includes a main office and a branch office. The branch office connects to the main office and the Internet through a limited bandwidth connection through a perimeter network. Users in the branch office need access to data stored on a file server in the main office and in a cloud data center. Different users often need access to the same data. You need to minimize the bandwidth necessary to support data access in the branch office. What should you do?


You are setting up a host cluster on a computer running Microsoft Windows Server 2012 R2 with the Hyper-V role installed. You are using System Center 2012 R2 Virtual Machine Manager (VMM) to configure the host cluster. You are planning to use a file server running Windows Server 2012 R2 to store the operating system and shared storage files for the cluster virtual machines. You want to ensure that the .vhdx file used for shared storage is kept on an SSD disk and not moved to HDD storage. What should you do?


You manage your company's domain controllers. You want to monitor the replication status of your Active Directory Domain Services domain controllers. Which command-line tool can you use for this?

A. Vssadmin
B. DSQuery
C. Verifier
D. Repadmin

You are the IT administrator for your organization. Your company has recently opened a small branch office to support a new initiative, and five people work in the office. It is connected via a low speed connection. You have deployed a domain controller in the new office. However, when the WAN connection fails, users report that they are unable to log on to their machines. What can you do to enable users to log on when the WAN connection has failed?


You are deploying an IPSec enforcement method for a client. You are configuring the Health Registration Authority (HRA) server on the network. You want to ensure that all client computers are checked and issued certificates if they meet the health conditions, whether they are part of the Active Directory Domain Services domain or not. How should you achieve this?


You manage an Active Directory Domain Services (AD DS) domain named example.com. The domain functional level is Windows 2008. All domain controllers run a Server Core installation of Microsoft Windows Server 2012. You need to raise the domain functional level to Windows Server 2012. You need to perform this task locally on the domain controller. Which tool should you use?


You are an administrator for an Active Directory Domain Services (AD DS) domain. You recently acquired another company and have migrated its users and resources to your domain. You then decommissioned the acquired domain. The company you acquired included two servers running UNIX. You have physically relocated these servers to your main office and want to give them access to shared storage on a computer running Microsoft Windows Server 2012 configured as a file server named FSSrc. You install and configure Server for Network File System (NFS) on FSSrc. You configure NFS shares and identify the UNIX servers as belonging to an NFS client group that has access to the NFS shares. You need to configure the authentication type used when authenticating the UNIX servers. What should you do?


You are the IT administrator for your organization. You are designing a DHCP strategy. Which of the following options would you select for lease duration for laptop devices operating remotely from the corporate network?

A. 8 days
B. 4 hours
C. 6 months
D. 2 weeks

You are the IT administrator for your organization. Your security team alerts you to the fact that unauthorized devices are being connected to your network in one of your branch offices and are being given IP addresses by the DHCP server in the headquarters. They ask you to prevent this from happening. You confirm with your PC supplier that all devices have network interface cards from the same manufacturer. You determine that the unauthorized devices have network interface cards from other manufacturers. What should you do?


You are consulting for a local IT organization that is investigating the use of Windows Deployment Services (WDS) to build the servers in the company's datacenter. The organization has already deployed Microsoft Windows Server 2008 R2 Active Directory Domain Services (AD DS). The AD DS infrastructure also hosts the company's DNS. DHCP is delivered by its network hardware. What else does the organization need to do in order for WDS to work?


You manage the server infrastructure for your company. A server named Serverl runs Microsoft Windows Server 2008 R2 with Hyper-V role installed. You migrated the Hyper-V role from Server1 to a new server named Server2 that runs Microsoft Windows Server 2012 R2. After the migration you noticed that migrated virtual machines have no network connectivity. What is cause of this issue?


You manage the Active Directory Domain Services (AD DS) domain infrastructure for your company. The domain controller is a server named DC1 that runs Microsoft Windows Server 2012 R2. The network includes a workstation named Computer! that runs Microsoft Windows 8. You run the Search-ADAccount -LockedOut cmdlet from Computer1 to find all locked accounts in the domain. You receive the error message below: Search-ADAccount : The term 'Search-ADAccount is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again. At line:1 c hart Search-ADAccount -LockedOut ▪ Category Info : ObjectNotFound: (Searc h-ADAccount:String) CommandNotFoundException ▪ FullyQualifiedErrorld : CommandNotFoundException You need to search for locked accounts from Computer1. What should you do first to resolve the issue?


You manage the server infrastructure for your company. You plan to deploy DirectAccess using Microsoft Windows Server 2012 R2. You need to identify the requirements for using the IP-HTTPS protocol for IPv6 transition. Which of these statements is correct?


You are the IT administrator for your company. Your company purchases a single regional office of a competitor. You are tasked with merging the IT infrastructures of the two organizations. You are assigned as a system administrator for the company and want to plan how you will merge the two Active Directory Domain Services (AD DS) instances. What should you do to provide users in the newly-acquired office the ability to log on to your company's existing computer systems?


You are consulting with a large enterprise that is deploying a new Microsoft Windows Server 2012 R2 environment. The IT staff has decided that they want to use an exclusively IPv6 network. They have a single line-of-business application that currently relies on WINS for name resolution, since it does not support entering a FQDN in the configuration file. This application must be available in the new environment. What should you advise them to do to ensure that the application works in the new environment with as little manual administration as possible?


You are the IT administrator for your company. You are considering deploying Data Deduplication for your organization. Your file server has four drive letters, as follows: * The C: drive is the system drive. * The D: drive holds small (< 16KB) image files used on the company intranet. * The E: drive holds large Microsoft PowerPoint company presentations. * The F: drive holds encrypted company documents. Which drive(s) would benefit from being configured for Data Deduplication?

A. Drives E: and F:
B. Drives E: and F:
C. Only drive F:
D. Only drive E:

You are consulting for a small business. They are planning to upgrade their network to Microsoft Windows Server 2012. They do not currently have a good understanding of what servers and PCs have been deployed. All servers and PCs are located in the same building. Servers all run on one subnet and PCs are all on another subnet. DHCP is used to deliver IP addresses to PCs. Some PCs are joined to the corporate domain, but others have been purchased directly by business units and do not have a corporate build on them, so run in a workgroup mode. There is no management infrastructure in place. PCs and servers are supported by a team of helpdesk staff. You decide to use the Microsoft Assessment and Planning (MAP) toolkit to gather information about the environment. Which discovery method should you use?


You have deployed Network Access Protection (NAP) on a company network. All servers run Microsoft Windows Server 2012. All client computers run Microsoft Windows 8 or Windows 8.1. You need to configure a client computer by specifying a uniform resource locator (URL) of a Health Registration Authority (HRA). You need to accomplish this from the command line. Which command should you use?


You manage a server named Serverl, which runs Microsoft Windows Server 2012 R2 with the Dynamic Host Configuration Protocol (DHCP) server role installed. The client network consists of one IP subnet and contains both thin clients and voice over IP (VolP) phone devices. Thin client devices are automatically configured during the boot process by using the configuration file stored on the TFTP server. The TFTP server name is specified in the DHCP options. VolP administrators are planning to implement the same infrastructure to manage VoIP phones during the boot. During the testing they determined that VoIP phones are not compatible with the TFTP server used to configure thin clients. You need to recommend a solution that allows VoIP phones to receive a configuration from a separate TFTP server during the boot. The solution must use the least amount of administrative effort. What should you recommend?


Sample Question - Designing and Implementing a Server Infrastructure (70-413)


Learning Style

Practice Exam

Learning Style



1 Hour

Course Duration

Course Info

Download PDF


See Sample

Buy Individually
About Individual Course:
  • Individual course plan gives you access to this course
/ Each
0 Learners Have Enrolled For This Course

You have already taken demo for this course.

If you want to get access to demo again, feel free to contact our support at (855) 800-8240


More Information

More Information
Lab AccessNo
Learning StyleSelf-Paced Learning
Learning TypePractice Exam
Course Duration1 Hour


Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

This Subscription Includes:

Virtual instructor Led

Virtual Classroom Courses

Our virtual instructor-led courses give you access to live instructors training you with other live students in a virtual classroom environment.

200+ Virtual Classroom Courses

Online Self-Paced Courses

Take self-paced online courses at your convenience and own pace, with unlimited access to courses in various emerging technologies.

700+ Self-Paced Courses

E-books blogs, case studies, ariticles

As part of informal learning, our platform will recommend E-books, whitepapers, case studies, articles, and videos. This is AI curated content closely aligned with your learning objectives.

E-books blogs, case studies,...

College Accredited Courses

QuickStart courses are accredited by several top schools and universities, including Texas A&M and University of Phoenix. You can print out certificates and also apply them towards your degree plan with them.

College Accredited

Full Learning Dashboard & Analytics

Access all your enrolled, completed, course statistics, and community discussions from one centralized and intuitive learning dashboard with built in analytics, course tracking, time spent, and more.


QuickStart Discussions

Engage with other learners where you can directly chat, ask questions, and socialize with other learners experts and instructors on a course subject.

Community Access Community Access

Virtual Labs

Videos and lectures only go so far. Get real world, hands-on practice with virtual labs (not available for all courses).

Virtual Labs Virtual Labs
Live Instructor Support

Live Instructor Mentoring & Support

Get your IT problems solved through a community of mentors, experts and peers. Get live help from experts to answer questions on course material or guidance on a project.

Mentoring & Discussions Mentoring & Discussions

Career Paths

Start a learning pathway towards understanding and mastering your career. With QuickStart career paths, you can fully understanding and being the best in your field.

Learning Paths Learning Paths

Informal Learning

Access to AI curated content from various content publishers which can help in self-directed learning.

Informal Learning Informal Learning
click here