9 06 2014
2014 Latest Microsoft 70-415 Exam Dump Free Download(51-60)!
QUESTION 51
You need to recommend a WSUS topology that meets the security requirements. What should you do?
A. In the London office, install a WSUS server in replica mode.
In the New York office, install a WSUS server in replica mode.
B. In the London office, install a WSUS server in replica mode.
In the New York office, install a WSUS server in autonomous mode.
C. In the London office, install a WSUS server in autonomous mode.
In the New York office, install a WSUS server in replica mode
D. In the London office, install a WSUS server in autonomous mode.
In the New York office, install a WSUS server in autonomous mode.
Answer: B
Explanation:
A WSUS server running in replica mode inherits the update approvals and computer groups created on its parent WSUS administration server. You will typically have a single parent server with one or more downstream replica WSUS servers.
You approve updates and create computer groups on the parent server, which the replica servers will then mirror.
QUESTION 52
You need to recommend an image type to start the client computers in the London office. The solution must meet the migration requirements. Which image type should you recommend?
A. capture
B. boot
C. install
D. discover
Answer: D
Explanation:
– Ensure that the client computers in the London office that are not PXE-capable can download images from WDS.
– Reformat the existing disks in the London office during the migration to Windows 8. A discover image is a type of boot image that you can use to install an operating system on a computer that is not capable of network booting using the Pre-Boot Execution Environment (PXE). You may want to use a discover image in the following scenarios:
A client is not PXE-enabled.
A client is on a different subnet and you do not have method of getting PXE to the client (for example, IP helper tables or Dynamic Host Control Protocol (DHCP)). You have many Windows Deployment Services servers and want to target a specific server.
Case Study 2: Contoso, Ltd (Question 53 – Question63)
Overview
Contoso, Ltd., is a pharmaceutical company. The company has an office in Seattle.
Existing Environment
The network contains a single-domain Active Directory forest named contoso.com. The relevant servers in the network are configured as shown in the following table.
All client computers run Windows XP. All client computers are configured to receive automatic updates from SRV-WSUS. All users have desktop computers. Users in the sales department also have laptop computers. The laptop computers are used by the sales users to remotely access the internal network by using a VPN connection. The sales users use several line-of-business applications.
Requirements
Planned Changes
The company plans to deploy a Microsoft System Center 2012 Configuration Manager infrastructure that will contain two servers. The servers will be configured as shown in the following table.
The company plans to deploy a Remote Desktop Services (RDS) infrastructure that will contain the following servers:
– Two Remote Desktop Connection Broker (RD Connection Broker) servers configured for high-availability
– Two Remote Desktop Visualization Host (RD Virtualization Host) servers
– Two Remote Desktop Web Access (RD Web Access) servers
– Two Remote Desktop Gateway (RD Gateway) servers
Technical Requirements
The company identifies the following technical requirements:
– Configuration Manager must be used to deploy operating systems and patches.
– An existing virtual machine that runs Windows 8 must be used as the reference computer for the deployment of new client computers.
– To troubleshoot installation issues, technicians must be able to open a Command Prompt window during the deployment of Windows 8 to the new client computers.
Sales Department Requirements
The company identifies the following requirements for the sales users:
– All of the files on the laptop computers must be encrypted.
– The amount of administrative effort must be minimized whenever possible.
– Certificate warnings must not be displayed when connecting to virtual desktops.
– The availability of the virtual desktops must not be affected by a single server failure.
– The desktop computers of the sales users must be replaced by virtual desktops that run Windows 8.
– The contents of each sales user’s Documents folder must be the same on the virtual desktop and the laptop computer.
– The sales users must be able to connect to their virtual desktop from their laptop computer without using a VPN connection.
– The sales users must be able to configure their user settings independently on their virtual desktop and their laptop computer.
– The line-of-business applications must be installed on the virtual desktops only. The line-of-business applications require hardware acceleration to run.
QUESTION 53
You need to configure RDS to use certificates to meet the sales department requirements. What should you do?
A. On the RD Virtualization Host servers, install a certificate in the personal store of the local computer.
B. On the RD Web Access servers, edit the properties of the RDWeb website.
C. On the RD Connection Broker servers, edit the deployment properties.
D. On the RD Connection Broker servers, edit the collection properties.
Answer: C
Explanation:
The company identifies the following requirements for the sales users:
– All of the files on the laptop computers must be encrypted.
– The amount of administrative effort must be minimized whenever possible.
– Certificate warnings must not be displayed when connecting to virtual desktops.
– The availability of the virtual desktops must not be affected by a single server failure.
– The desktop computers of the sales users must be replaced by virtual desktops that run Windows 8.
– The contents of each sales user’s Documents folder must be the same on the virtual desktop and the laptop computer.
– The sales users must be able to connect to their virtual desktop from their laptop computer without using a VPN connection.
– The sales users must be able to configure their user settings independently on their virtual desktop and their laptop computer.
– The line-of-business applications must be installed on the virtual desktops only. The line- of-business applications require hardware acceleration to run. Once this certificate has been created it needs to be applied to the RD Gateway and RD Web Access servers.
This is done in the RDS Deployment Properties
QUESTION 54
You need to recommend a change to the network to ensure that you can perform a bare metal deployment of Windows 8. The solution must meet the technical requirements. What should you recommend?
A. On SRV-DP, enable PXE support for clients from the Configuration Manager console.
B. On SRV-DHCP, configure options 66 and 67.
C. On SRV-DHCP, install the Windows Deployment Services server role and configure option 60.
D. On SRV-DP, install the Windows Deployment Services server role and configure a PXE Response Policy
from the Windows Deployment Services console.
Answer: A
Explanation:
Enabling PXE support on the Distribution Point will achieve the technical requirements. If you enable the Checkbox for PXE Support, this will automatically install WDS transport. The appropriate ports UDP 67,68,69 and 4011 will be opened in the firewall.
Sorry for german screenshot.
QUESTION 55
You need to ensure that when the sales users connect to their virtual desktop by using RD Web Access, the users can select the Experience setting manually from the RD Web Access website. What should you include in the solution?
A. On the RD Connection Broker Host servers, install the Quality Windows Audio Video Experience feature.
B. On the RD Web Access servers, modify the Default.aspx file located in %SYSTEMROOT%\Web \RDWeb\Pages.
C. On the RD Virtualization Host servers, install the Quality Windows Audio Video Experience feature.
D. On the RD Web Access servers, modify the Web.config file located in %SYSTEMROOT%\Web\RDWeb\Pages.
Answer: D
Explanation:
The option is used for RemoteFX.
This is the same as the option connection type:i:6 in the properties of a RDP. By setting the values below we can choose whether to show this option or not. http://technet.microsoft.com/en-us/library/gg607274%28WS.10%29.aspx
QUESTION 56
You need to implement a solution to deploy patches to all of the client computers. The solution must meet the technical requirements. What should you do first?
A. Install the Windows Server Update Services Tools feature on SRV-PRI.
B. Install the Configuration Manager console on SRV-WSUS.
C. Install the Configuration Manager console on SRV-DP.
D. Install the Windows Server Update Services Tools feature on SRV-DP.
Answer: A
Explanation:
The company identifies the following technical requirements:
– Configuration Manager must be used to deploy operating systems and patches.
– An existing virtual machine that runs Windows 8 must be used as the reference computer for the deployment of new client computers.
– To troubleshoot installation issues, technicians must be able to open a Command Prompt window during the deployment of Windows 8 to the new client computers. There is already a WSUS (SRV-WSUS) server present in our network. We can continue to use it by integrating it with SCCM or replace it by transferring metadata and updates to our future Software Update Point on the SCCM primary site server. In order to achieve this WSUS SDK / Wsus management console -connected to the wsus- is a prerequisite on the primary Site server.
You need a SUP at every primary site – unlike other WSUS-based implementations, SCCM requires one at every site to function.
QUESTION 57
You need to recommend a configuration of the RD Gateway servers to allow the sales users to connect to their virtual desktop. The solution must meet the sales department requirements. What should you include in the recommendation?
A. SSL bridging by using HTTPS-HTTP bridging
B. SSL bridging by using HTTPS-HTTPS bridging
C. A Remote Desktop resource authorization policy (RD RAP) that uses an RD Gateway-managed
computer group
D. A Remote Desktop resource authorization policy (RD RAP) that uses a network resource group in
Active Directory Domain Services (AD DS)
Answer: C
Explanation:
An RD Gateway-managed group is a group of computers maintained by an RD Gateway, instead of Active Directory.
Most of the time, specifying Active Directory computer groups in RD RAPs will make the most sense.
If you have an RD Session Host farm, though, you’ll have to create an RD Gateway- managed group to control access to the farm via RD Gateway. Active Directory doesn’t have a way of identifying multiple RD Session Host servers by their farm name.
Requirements:
The availability of the virtual desktops must not be affected by a single server failure. See planned changes: 2 Virtualization host servers, 2 RD Web Access servers
QUESTION 58
You need to recommend a solution for protecting the files stored on the laptop computers of the sales users. The solution must meet the sales department requirements. What should you recommend?
A. BitLocker Drive Encryption (BitLocker) that uses a SID-based protector
B. BitLocker Drive Encryption (BitLocker) that uses a password protector
C. Encrypting File System (EFS) that uses certificates from a certification authority (CA)
D. Encrypting File System (EFS) that uses self-signed certificates
Answer: B
Explanation:
– All of the files on the laptop computers must be encrypted. Active Directory SID-based protector. This protector can be added to both operating system and data volumes, although it does not unlock operating system volumes in the pre-boot environment. The protector requires the SID for the domain account or group to link with the protector. BitLocker can protect a clusteraware disk by adding a SID-based protector for the Cluster Name Object (CNO) that lets the disk properly failover to and be unlocked by any member computer of the cluster.
The ADAccountOrGroup protector requires the use of an additional protector for use (such as TPM, PIN, or recovery key) when used on operating system volumes To add an ADAccountOrGroup protector to a volume requires either the actual domain SID or the group name preceded by the domain and a backslash. In the example below, the CONTOSO\Administrator account is added as a protector to the data volume G. Active Directory-based protectors are normally used to unlock Failover Cluster enabled volumes.
QUESTION 59
You need to ensure that the technicians can troubleshoot the operating system deployments. The solution must meet the technical requirements. Which properties should you modify?
A. Distribution point
B. Boot image
C. Install image
D. Operating system installer
Answer: B
Explanation:
– To troubleshoot installation issues, technicians must be able to open a Command Prompt window during the deployment of Windows 8 to the new client computers. Enable command line support (F8) on the boot image in SCCM.
QUESTION 60
You need to recommend a solution for managing the user state of the virtual desktops. The solution must meet the sales department requirements. What should you include in the recommendation?
A. Roaming profiles and home folders
B. Roaming profiles and Folder Redirection
C. User profile disks and Folder Redirection
D. User profile disks and roaming profiles
Answer: C
Explanation:
The sales users must be able to configure their user settings independently on their virtual desktop and their laptop computer.
The contents of each sales user’s Documents folder must be the same on the virtual desktop and the laptop computer.
User profile disks:
As the user logs on to different virtual machines within the pool or different hosts within the session collection, the User Profile Disk gets mounted, providing access to the complete profile.
Folder Redirection:
The contents of each sales user’s Documents folder must be the same on the virtual desktop and the laptop computer.
Passing Microsoft 70-415 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-415 Dump:http://www.braindump2go.com/70-415.html
2014 Latest Microsoft 70-415 Exam Dump Free Download(41-50)! Official 2014 Latest Cisco 400-101 Demo Free Download!
Comments are currently closed.