★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-413 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-413-dumps.html


Proper study guides for Improve Microsoft Designing and Implementing a Server Infrastructure certified begins with Microsoft 70-413 preparation products which designed to deliver the Precise 70-413 questions by making you pass the 70-413 test at your first time. Try the free 70-413 demo right now.

2021 Sep qa 70-413:

Q121. - (Topic 3) 

You need to recommend a server virtualization strategy that meets the technical requirements and the virtualization requirements. 

What should you include in the recommendation? 

A. Windows Server Backup 

B. The Microsoft Virtual Machine Converter 

C. Microsoft System Center 2012 Virtual Machine Manager (VMM) 

D. Disk2vhd 

Answer: C 

Explanation: 

* Scenario: 

Virtualize the application servers. 

Automatically distribute the new virtual machines to Hyper-V hosts based on the current 

resource us The main office has the following servers: 

Five physical Hyper-V hosts that run Windows Server 2012age of the Hyper-V hosts. 

* System Center Virtual Machine Manager 2012: VMM Gets Major Upgrade Expanded hypervisor support, virtual application support and a myriad of other upgrades are coming in the new VMM 2012. 

There's no doubt that Microsoft is making System Center Virtual Machine Manager (VMM) a key component of the System Center suite. The scope of the product is being expanded so much that it could be renamed "System Center Virtual Datacenter Manager." The new version of VMM is currently in beta and is scheduled for release in the second half of 2011. VMM can now do bare-metal installations on fresh hardware, create Hyper-V clusters instead of just managing them, and communicate directly with your SAN arrays to provision storage for your virtual machines (VMs). The list of supported hypervisors has also arown—it includes not only Hyper-V and VMware vSphere Hvpervisor, but 

Reference: System Center Virtual Machine Manager 2012: VMM Gets Major Upgrade 


Q122. - (Topic 8) 

Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites. 

You plan to deploy DirectAccess. 

The network security policy states that when client computers connect to the corporate 

network from the Internet, all of the traffic destined for the Internet must be routed through 

the corporate network. 

You need to recommend a solution for the planned DirectAccess deployment that meets 

the security policy requirement 

Solution: You set the ISATAP State to state disabled. 

Does this meet the goal? 

A. Yes 

B. No 

Answer: A 

Explanation: With NAT64 and DNS64, the DirectAccess server now has the ability to take those client IPv6 packets and spin them down into IPv4 packets, so you can simply leave your internal network all IPv4. So back in the beginning it was standard practice to enable ISATAP globally. Today, because of the known issues, it is recommended not to use ISATAP at all, unless you have a specific reason for needing it 

Note: ISATAP defines a method for generating a link-local IPv6 address from an IPv4 address, and a mechanism to perform Neighbor Discovery on top of IPv4. 

Reference: IS ISATAP REQUIRED FOR DIRECTACCESS? 


Q123. - (Topic 8) 

Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest named contoso.com. The forest contains a Microsoft Exchange Server 2010 organization. All of the domain controllers in contoso.com run Windows Server 2012. 

The perimeter network contains an Active Directory forest named litware.com. 

You deploy Microsoft Forefront Unified Access Gateway (UAG) to litware.com. All of the domain controllers in litware.com run Windows Server 2012. 

Some users connect from outside the network to use Outlook Web App. 

You need to ensure that external users can authenticate by using client certificates. 

What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. To the perimeter network, add an Exchange server that has the Client Access server role installed. 

B. Deploy UAG to contoso.com. 

C. Enable Kerberos delegation in litware.com. 

D. Enable Kerberos constrained delegation in litware.com. 

Answer: D 

Explanation: Forefront TMG provides support for Kerberos constrained delegation (often abbreviated as KCD) to enable published Web servers to authenticate users by Kerberos afterForefront TMG verifies their identity by using a non-Kerberos authentication method. When used in this way, Kerberos constrained delegation eliminates the need for requiring users to provide credentials twice. 

Reference: About Kerberos constrained delegation 


70-413 latest exam

Far out examcollection 70-413:

Q124. - (Topic 2) 

You need to recommend a solution for the RODC. 

Which attribute should you include in the recommendation? 

A. systemFlags 

B. searchFlags 

C. policy-Replication-Flags 

D. flags 

Answer: B 

Explanation: * Scenario: Deploy a read-only domain controller (RODC) to the London office 

* The read-only domain controller (RODC) filtered attribute set (FAS) is a set of attributes of the Active Directory schema that is not replicated to an RODC. If you have data that you do not want to be replicated to an RODC in case it is stolen, you can add these attributes to the RODC FAS. If you add the attributes to the RODC FAS before you deploy the first RODC, the attributes are never replicated to any RODC. 

/ To decide which attributes to add to the RODC FAS, review any schema extensions that have been performed in your environment and determine whether they contain credential-like data or not. In other words, you can exclude from consideration any attributes that are part of the base schema, and review all other attributes. Base schema attributes have the.systemFlags.attribute value 16 (0x10) set. 

Reference: Customize the RODC Filtered Attribute Set 


Q125. - (Topic 4) 

You need to recommend a solution for the sales reports. 

What should you include in the recommendation? 

A. BranchCache in distributed cache mode 

B. Offline files 

C. BranchCache in hosted cache mode 

D. Distributed File System (DFS) 

Answer: A 

Explanation: * Scenario: Server3 has a shared folder that contains sales reports. The sales reports are read frequently by the users in both offices. The reports are generated automatically once per week by an enterprise resource planning (ERP) system. 

* BranchCache is designed to reduce WAN link utilization and improve application responsiveness for branch office workers who access content from servers in remote locations. Branch office client computers use a locally maintained cache of data to reduce traffic over a WAN link. The cache can be distributed across client computers (Distributed Cache mode) or can be housed on a server in the branch (Hosted Cache mode). 

Reference: BranchCache Overview 


Q126. - (Topic 2) 

You run the Get-DNSServer cmdlet on DC01 and receive the following output: 


You need to recommend changes to DC01. Which attribute should you recommend modifying? 

A. EnablePollutionProtection 

B. isReadOnly 

C. Locking Percent 

D. ZoneType 

Answer: C 

Explanation: * Scenario: The DNS servers must be prevented from overwriting the existing DNS entries that have been stored in cache. 

* Cache locking is configured as a percent value. For example, if the cache locking value is set to 50, then the DNS server will not overwrite a cached entry for half of the duration of the TTL. By default, the cache locking percent value is 100. This means that cached entries will not be overwritten for the entire duration of the TTL. The cache locking value is stored in the CacheLockingPercent registry key. If the registry key is not present, then the DNS server will use the default cache locking value of 100. 

Reference: DNS Cache Locking