FREE Microsoft Designing and Implementing a Server Infrastructure (70-413) Questions and Answers

0%

You work as the administrator for a sizable business. You want to set up environments on servers that don't require local hard drives. It would help if you suggested a storage option that is approved.
Which technologies ought you suggest?

Correct! Wrong!

There are three branch offices and a central office for your business. North America is where the main office is situated. The satellite offices are spread across Europe, Asia, and South America.
-You want to create a domain and forest infrastructure for Active Directory.
-The following specifications for an Active Directory design must be met:

-Users in the other offices must only be able to see the contact details of some users in the Europe office.
-The user and computer settings of the users in each office must be under the authority of the administrators in that office.
-A custom application with the name App1 must be deployable by the administrators at the Asia office. Active Directory has to be modified to accommodate App1.

The answer must involve the least amount of administrative work possible.
What should the recommendation contain?

Correct! Wrong!

An Active Directory forest with the domain contoso.com exists on your network. There are five domains in the woods. You must make sure that the global catalog replicates the CountryCode attribute.
What ought you to do?

Correct! Wrong!

Explanation:
To ensure that the CountryCode attribute is replicated to the global catalog in an Active Directory forest with multiple domains, you need to modify the schema partition.

An Active Directory domain with the name contoso.com is present on your network. There are numerous sites on the domain.
-You plan to deploy DirectAccess.
-According to the network security policy, all traffic destined for the Internet must be routed through the business network when client computers join the corporate network from the Internet.
-It would be best to suggest a solution that satisfies the security policy requirements for the intended DirectAccess implementation.
You changed the ISATAP state to disabled as a solution. Is the objective being met?

Correct! Wrong!

Explanation:
Disabling ISATAP state is not a solution that would meet the requirement of routing all client traffic destined for the Internet through the corporate network in a DirectAccess deployment.

An Active Directory domain with the name contoso.com is present on your network. All domain controllers use Windows Server 2012 R2. Windows Server 2012 is the functional level of the forest.
-Your business intends to roll out an application allowing employees access to a search interface. The employee-number attribute will be searched for in the application's global catalog.
-The program needs to be able to get the employee number value from the global catalog, so you must provide a fix.
What should the recommendation contain?

Correct! Wrong!

Explanation:
To ensure that the application can retrieve the Employee-Number attribute value from the global catalogue in an Active Directory domain, you can use the Ldifde command to export the schema for the worldwide record and then modify it to include the Employee-Number attribute.

Fifty servers are running Windows Server 2008 Service Pack 2 (SP2), and 50 are running Windows Server 2008 R2 on your network.

-You intend to use Windows Server 2012 R2.
-You must compile a report that has the following details:
-Application and service servers that can be switched to Windows Server 2012 R2
-The computers that contain Windows Server 2012 R2 hardware
-The servers that can be virtualized and are housed on Hyper-V hosts running Windows Server 2012 R2

The solution is to run the Windows Server Migration Tools after installing Windows Server 2012 R2 on a new server. Is the objective being met?

Correct! Wrong!

The domain adatum.com in Active Directory is present on your network.
-You intend to apply various security settings to several shared PCs in a public area. According to the company's security policy, the security settings should be implemented when any user logs on to public computers.
-You must suggest a Group Policy deployment strategy for the anticipated deployment.
What should the recommendation contain?

Correct! Wrong!

Explanation:
To apply security settings to public computers in a guest area whenever any user logs on to these computers, you can use loopback processing in Group Policy.

Premium Tests $49/mo
FREE Feb-2024