Certification Exam Prep Questions For Designing and Implementing a Server Infrastructure (70-413)


QuickStart is now offering assessment questions for Designing and Implementing a Server Infrastructure (70-413). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take for Designing and Implementing a Server Infrastructure (70-413).


Arrow
 

1

You work for a company where you are tasked to rename the domain from QSLEARN.COM to QUICKSTART.NET. It is confirmed by you that there are up-to-date backups of the domain. You then create a new DNS zone for QUICKSTART.NET on the existing DNS servers. Identify the next step of action in the domain rename process.

A. RENDOM /PREPARE
Incorrect.
B. RENDOM /LIST
Correct!
C. RENDOM /UPLOAD
Incorrect.
D. RENDOM /EXECUTE
Incorrect.
2

You want to deploy a number of Virtual Guest machines running Microsoft Windows Server 2012 R2 using the existing deployment of Microsoft System Center Virtual Machine Manager (SC VMM) 2012. To execute this smoothly, you must create a Guest Operating System profile that should include Windows Server 2012 R2. Identify your first step of action in order to execute the aforementioned task.

3

You work for a company that wants to make sure that DHCP is correctly configured, as part of expanding to an additional level in the building. Which of the following tools would you use if you are to create a new DHCP scope that is similar to the current one? (More than one answer might by correct. Opt for the BEST answer)

A. DHCP Management Console
Incorrect.
B. NETSH
Incorrect.
C. PowerShell
Incorrect.
D. IPAM Management Console
Correct!
4

You realize that the use of Active Directory credentials is configured, with the selected option as "Enable Windows 7 client computers to connect via DirectAccess”. You are required to make sure that end-users are all able to remotely connect to the network. What would be your step of action keeping in mind the cost and effort necessary to achieve this is kept to a minimum? (More than one answer might by correct. Opt for the BEST answer)

5

You work for a company as an IT administrator. The company has tasked you to carry an installation of the Microsoft Windows Server 2012 R2 IP Address Management (IPAM) Server. For the purpose of monitoring multiple DHCP servers on your network, you plan on using IPAM. You plan to deploy an IPAM server in each branch office, configured to manage the network in that office. It is required to be ensured that losing a single IPAM server must not prevent you from managing the network. Identify which of following options reflects the easiest, most cost-effective way to do this.

6

You work for a company that has tasked you to deploy a virtual machine (VM) on Azure IaaS. At least 500 GB of storage must be supported by the deployment. Identify the type of Azure storage required.

A. Blob
Correct!
B. Table
Incorrect.
C. Queue
Incorrect.
D. Raw
Incorrect.
7

You work for a company managing an Active Directory Domain Services (AD DS) domain. The domain name is example.com. Microsoft Windows Server 2012 R2 is run by all domain controllers. Windows Server 2003 is the forest functional level and Windows Server 2008 is the domain functional level. You plan to implement compound authentication for Dynamic Access Control. Identify from the options below the first step you would perform.

8

You work for an organization managing its server infrastructure. You are tasked to deploy a Microsoft Windows Server 2012 R2. There are computers with different hardware configurations, and you need multiple Windows images for deployment on those computers. You need to generalize the image as part of an unattended installation. What would be your step of action?

9

You are working for an organization as an IT administrator. You are tasked to deploy Network Access Protection (NAP) so that the workstations connecting to the network must have up-to-date protection. You have numerous methods of NAP available. While evaluating the methods, you decide to ensure that all NAP-related communication is authenticated. However, there is no solution currently, that can authenticate traffic on your network. Can you identify which one of these methods of NAP enforcement is NOT suitable?

10

You work for a company as an IT administrator. There are several other IT administrators at your company. The company asks you to design an organizational unit structure to support Group Policy. Your company has four departments and you must make sure every user has a drive mapped to their departmental shared folder. You come up with a solution to create five Group Policy objects. One contains all of the common settings that should apply to all users. The other four Group Policy objects contain the specific drive mapping settings for each department. Identify which of the following options best describe how you should assign the Group Policy objects and achieve the desired result.

11

You work for an organization as an administrator for an Active Directory Domain Services (AD DS) domain. The domain includes a head office and a branch office. There is a perimeter network with a limited bandwidth connection through which the branch office connects to the head office and the internet. There are users in the branch office who are required to access the file server and cloud data center in the head office for the stored data. Different users often need access to the same data. Wht would you do if you need to minimize the bandwidth necessary to support data access in the branch office?

12

You are working for a company and are tasked to set up a host cluster on a computer. The computer is running Microsoft Windows Server 2012 R2 with the Hyper-V role installed. To configure the host cluster, System Center 2012 R2 Virtual Machine Manager (VMM) is being used. You are planning to use a file server running Windows Server 2012 R2 to store the operating system and shared storage files for the cluster virtual machines. You do not want the .vhdx file used for shared storage to be moved to HDD storage, it should rather be kept on an SSD disk. What should you do?

13

You work for a company managing the company's domain controllers (DCs). Can you identify the command-line tool you can use to monitor the replication status of your Active Directory Domain Services domain controllers?

A. Vssadmin
Incorrect.
B. DSQuery
Incorrect.
C. Verifier
Incorrect.
D. Repadmin
Correct!
14

You work for a company as an IT administrator. A new office branch has been opened for a new business initiative by the company, and the office has five people working in it. There is a low speed connection in the new office where you have deployed a domain controller. However, the users report their failure to log on to their machines when the WAN connection fails. Identify which of the following would you do to enable users to log on in case the WAN connection has failed?

15

You have a client for which you deploy an IPSec enforcement method. You are configuring the Health Registration Authority (HRA) server on the network. You want to check the health of, and issue certificates to all the client computers that meet the health conditions, regardless of them being a part of the Active Directory Domain Services domain or not. Choose an option to achieve this.

16

You work for an organization managing an Active Directory Domain Services (AD DS) domain. The domain is called example.com. Windows 2008 is the domain functional level. All domain controllers run a Server Core installation of Microsoft Windows Server 2012. You are tasked to raise the domain functional level to Windows Server 2012 and you must do it on the local domain controller. Can you identify the tool you should use?

17

You work for an organization as an IT administrator who is planning to design a DHCP strategy. Can you choose the correct option reflecting the least duration for laptop devices operating remotely from the corporate network?

A. 8 days
Incorrect.
B. 4 hours
Correct!
C. 6 months
Incorrect.
D. 2 weeks
Incorrect.
18

You work for a company as an IT administrator. You find out from your security team that your network in a branch office has some unauthorized devices connected to it. Those devices are being given IP addresses by the DHCP server in the headquarters. You are required to stop this from aggravating further. You confirm with your PC supplier that all devices have network interface cards from the same manufacturer. With this fact in check, you realize that the network interface cards in the unauthorized devices are from other manufacturers. What would you do in this situation?

19

You are working as a consultant for a local IT organization. The organization is interested in knowing about the use of Windows Deployment Services (WDS) in building the servers in the company's datacenter. The organization has already deployed Microsoft Windows Server 2008 R2 Active Directory Domain Services (AD DS). The company’s DNS is hosted by the AD DS infrastructure. DHCP is delivered by its network hardware. The company wants the WDS to work. What else must it do?

20

You work for a company managing its server infrastructure. Server1 is a server running Microsoft Windows Server 2008 R2 with Hyper-V role installed. There is a new server called Server2. The Hyper-V role is migrated from Server1 to the new server, Server2. Server2 runs Microsoft Windows Server 2012 R2. Once the migration is complete, you realize there is no network connectivity in the virtual machines. After the migration you noticed that migrated virtual machines have no network connectivity. Can you identify the cause of this issue?

21

You work for an organization managing the server infrastructure for it. You are tasked to use Microsoft Windows Server 2012 R2 and deploy DirectAccess. Identify the correct statement that justify the requirements for using the IP-HTTPS protocol for IPv6 transition.

22

You work for a company as an IT administrator. Your company purchases a single regional office of a competitor. As an IT administrator, you are required to merge the IT infrastructures of the two organizations. The company assigns you as a systems administrator and you need to plan how you will merge the two Active Directory Domain Services (AD DS) instances. There are users in the acquired office whom you want to provide the ability to log on to your company's existing computer systems. How would you do that?

23

You are a consultant for a large enterprise. The enterprise is deploying a new Microsoft Windows Server 2012 R2 environment. An exclusively IPv6 network is decided to be used by the IT staff. There is a single line-of-business application currently relying on WINS for name resolution. The reason for this is its inability to support entering a FQDN in the configuration file. This application must be available in the new environment. Choose from the following options the advice you would give to the organization

24

You are the IT administrator for your company. You are considering deploying Data Deduplication for your organization. You work for a company as an IT administrator. The company wants to have Data Deduplication deployed, and you will take a charge of that. There are four drive letters in the file server:
-The C: drive is the system drive
-The D: drive holds small (< 16KB) image files. The files are used on the company intranet
-The E: drive contains MS PowerPoint presentations that are large in size
-The F: drive contains company documents that are sensitive and encrypted.
Which drive(s) would benefit from being configured for Data Deduplication?

A. Drives E: and F:
Incorrect.
B. Drives E: and F:
Incorrect.
C. Only drive F:
Incorrect.
D. Only drive E:
Correct!
25

You work for a company where you have recently deployed Network Access Protection (NAP) the network. Microsoft Windows Server 2012 is run on all servers. Microsoft Windows 8.1 or Windows 8 is run on all client computers. You need to configure a client computer by specifying a uniform resource locator (URL) of a Health Registration Authority (HRA). You must achieve this from the command line. Can you identify the correct command to use here?

Product Image

Sample Question - Designing and Implementing a Server Infrastructure (70-413)

Self-Paced

Learning Style

Practice Exam

Learning Style

Beginner

Difficulty

1 Hour

Course Duration

Course Info

Download PDF

Certificate

See Sample

Buy Individually Timezone
tab
About Individual Course:
  • Individual course plan gives you access to this course
$109.00
/ Each

You have already taken demo for this course.

If you want to get access to demo again, feel free to contact our support at (855) 800-8240

Outline

More Information

More Information
Lab Access No
Learning Style Self-Paced Learning
Learning Type Practice Exam
Difficulty Beginner
Course Duration 1 Hour
Language English

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

click here