All YES/NO Exam 414 Questions

Discussion in '70-414' started by mecbeau, Dec 12, 2015.

  1. mecbeau

    mecbeau Member
    Member

    Joined:
    Nov 2, 2015
    Messages:
    345
    Likes Received:
    3
    NOTE:
    Remember YES/NO are 12++ Question in MIX & also In every case study there are 2 each YES/NO Question.
    Key to Success is Master them before you Hit The Exam ...!!!!



    QUESTION 1
    NOTE: Once you answer this question, you will NOT be able to return to it.
    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1.
    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.
    Solution: You configure preferred and possible owners for each business-critical VM.
    Does this meet the goal?
    B. No

    ----------------------------------------------------

    QUESTION 2
    NOTE: Once you answer this question, you will NOT be able to return to it.
    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1.
    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.
    Solution: You set the memory-weight threshold value to High for each business-critical VM.
    Does this meet the goal?
    B. No ( i choose yes in exam )

    ----------------------------------------------------

    QUESTION 3
    NOTE: Once you answer this question, you will NOT be able to return to it.
    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1.
    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.
    Solution: You create an availability set and place each business-critical VM in the set.
    Does this meet the goal?
    B. No

    ----------------------------------------------------

    QUESTION 5
    NOTE: Once you answer this question, you will NOT be able to return to it.
    You manage a Hyper-V 2012 cluster by using system center Virtual machine manager 2012 SP1.
    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL server databases.
    Solutions: You create a custom placement rule and apply it to all business-critical VMs.
    Does this meet the goal?
    B. NO

    ----------------------------------------------------

    You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
    Solution: From Virtual Machine Manager (VMM), you modify the properties of the service template.
    Does this meet the goal?
    B. No

    ----------------------------------------------------

    You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
    Solution: From Configuration Manager, you create a Collection and a Desired Configuration Management baseline.
    Does this meet the goal?
    B. No

    ----------------------------------------------------

    You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
    Solution: From Operations Manager, you create a Distributed Application and a Monitor Override.
    Does this meet the goal?
    B. No

    ----------------------------------------------------

    You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
    Solution: From Operations Manager, you create a Distributed Application and a Service Level Tracking object.
    Does this meet the goal?
    A. Yes

    ----------------------------------------------------

    You plan to allow users to run internal applications from outside the company's network.
    You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed.
    You must secure on-premises resources by using multi-factor authentication (MFA).
    You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.
    Solution:You migrate the AD FS server to Microsoft Azure and connect it to the internal Active Directory instance on the network.
    Then, you use the Workplace Join process to configure access for personal devices to the on-premises resources.
    Does this meet the goal?
    A. Yes

    ----------------------------------------------------

    You plan to allow users to run internal applications from outside the company's network.
    You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed.
    You must secure on-premises resources by using multi-factor authentication (MFA).
    You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.
    Solution: You install a local instance of the MFA Server.
    You connect the instance to the Microsoft Azure MFA provider and then you use Microsoft Intune to manage personal devices.
    Does this meet the goal?
    A. Yes

    ----------------------------------------------------

    You plan to allow users to run internal applications from outside the company's network.
    You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed.
    You must secure on-premises resources by using multi-factor authentication (MFA).
    You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.
    Solution: You install a local instance of MFA Server and connect it your Microsoft Azure MFA provider.
    Then, you use the Workplace Join process to configure access for personal devices to the on-premises resources.
    Does this meet the goal?
    A. Yes

    ----------------------------------------------------

    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled. Solution: You run the following command from an administrative command prompt: Chiper /a/d/s: <…. >
    A. NO

    ----------------------------------------------------

    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project . You uninstall AD RMS when the project is complete.
    You need to ensure that the protected content is still available after AD RMS is uninstalled. Solution: You run the following command from an administrative command prompt: Chiper /a/d/s:
    A. NO

    ----------------------------------------------------

    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project.
    You uninstall AD RMS when the project is complete.
    You need to ensure that the protected content is still available after AD RMS is uninstalled.
    Solution: You run the following Windows PowerShell command:
    Set-ItemProperty -Path <protected content>:\ -Name IsDecommissioned -Value $true EnableDecommission
    Does this meet the goal?
    A. Yes

    ----------------------------------------------------

    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project.
    You uninstall AD RMS when the project is complete.
    You need to ensure that the protected content is still available after AD RMS is uninstalled.
    Solution: You add the backup service account to the SuperUsers group and back up the protected content.
    Then, you restore the content to a file server and apply the required NTFS permissions to the files.
    Does this meet the goal?
    B. No

    ----------------------------------------------------

    Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:
    Solution: You create a copy of the Basic EFS certificate template, and then you modify the validity period of the copy.
    A. Yes

    ----------------------------------------------------

    Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:
    Solution: From the properties of the Basic EFS template, you assign the Allow -Enroll permission to the Authenticated Users group.
    A. NO

    ----------------------------------------------------

    The network has an Active Directory Certificate Services (AD CS) infrastructure.
    You need to issue a certificate to users to meet the following requirements:
    Solution: You create a copy of the User certificate template, and then you modify the extensions of the copy.
    Does this meet the goal?
    B. No

    ----------------------------------------------------

    Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:
    Solution: From the properties of the User certificate template, you assign the Allow -Enroll permission to the Authenticated Users group.
    Does this meet the goal?
    A. NO
     
  2. mecbeau

    mecbeau Member
    Member

    Joined:
    Nov 2, 2015
    Messages:
    345
    Likes Received:
    3
    QUESTION
    NOTE: Once you answer this question, you will NOT be able to return to it.
    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1. You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.

    Solution: You configure preferred and possible owners for each business-critical VM.
    No
    ---------------------------
    QUESTION

    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1.
    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.
    Solution: You set the memory-weight threshold value to High for each business-critical VM.

    B. No (But i answer Yes)

    ---------------------------
    QUESTION
    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1.
    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.

    Solution: You create an availability set and place each business-critical VM in the set.
    B. No

    ---------------------------
    QUESTION
    You manage a Hyper-V 2012 cluster by using system center Virtual machine manager 2012 SP1.
    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL server databases.

    Solutions: You create a custom placement rule and apply it to all business-critical VMs.
    NO

    ---------------------------

    QUESTION

    Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
    You deploy a service named Service1 by using a service template.
    Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.
    You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.

    Solution: From Virtual Machine Manager (VMM), you modify the properties of the service template.
    No

    ---------------------------

    QUESTION

    Your network contains an Active Directory domain named contoso.com.
    The domain contains a Microsoft System Center 2012 infrastructure. You deploy a service named Service1 by using a service template.
    Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.
    You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.

    Solution: From Configuration Manager, you create a Collection and a Desired Configuration Management baseline.
    B. No

    ---------------------------

    QUESTION

    Your network contains an Active Directory domain named contoso.com.
    The domain contains a Microsoft System Center 2012 infrastructure. You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.
    You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.

    Solution: From Operations Manager, you create a Distributed Application and a Monitor Override.
    B. No

    ---------------------------
    QUESTION
    Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table. You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.

    Solution: From Operations Manager, you create a Distributed Application and a Service Level Tracking object.

    A. Yes

    ---------------------------

    QUESTION
    You plan to allow users to run internal applications from outside the company’s network. You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed. You must secure on-premises resources by using multi-factor authentication (MFA).
    You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.

    Solution: You migrate the AD FS server to Microsoft Azure and connect it to the internal Active Directory instance on the network. Then, you use the Workplace Join process to configure access for personal devices to the on-premises resources.

    A. Yes
    -----------------------------------------
    QUESTION

    You plan to allow users to run internal applications from outside the company’s network. You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed. You must secure on-premises resources by using multi-factor authentication (MFA).
    You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.

    Solution: You install a local instance of the MFA Server. You connect the instance to the Microsoft Azure MFA provider and then you use Microsoft Intune to manage personal devices.
    A. Yes
    -----------------------------------------
    QUESTION

    You plan to allow users to run internal applications from outside the company’s network. You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed. You must secure on-premises resources by using multi-factor authentication (MFA). You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.

    Solution: You install a local instance of MFA Server and connect it your Microsoft Azure MFA provider. Then, you use the Workplace Join process to configure access for personal devices to the on-premises resources.
    Yes
    -----------------------------------------
    QUESTION
    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete.
    You need to ensure that the protected content is still available after AD RMS is uninstalled.
    Solution: You run the following Windows PowerShell command:

    cipher/a/d/s:

    B. No

    -----------------------------------------

    QUESTION

    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete.
    You need to ensure that the protected content is still available after AD RMS is uninstalled.

    Solution: You add the backup service account to the SuperUsers group and back up the protected content. Then, you restore the content to a file server and apply the required NTFS permissions to the files.

    B. No
    -----------------------------------------

    QUESTION

    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled.

    Solution: You run the following command from an administrative command prompt:

    Set-ItemProperty -Path <protected content>:\ -Name IsDecommissioned -Value $true -EnableDecommission

    B. YES

    -----------------------------------------

    QUESTION

    Your network contains five servers that run Windows Server 2012 R2. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
    You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.
    You need to ensure that the NLB feature can distribute connections across all of the virtual machines.

    Solution: From the properties of each virtual machine, you enable MAC address spoofing for the existing virtual network adapter.

    A. Yes

    ----------------------------------
    QUESTION

    Your network contains five servers that run Windows Server 2012 R2. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.

    You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. You need to ensure that the NLB feature can distribute connections across all of the virtual machines.

    Solution: On each Hyper-V server, you create a new external virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new external virtual network switches.

    B. No
     
  3. mecbeau

    mecbeau Member
    Member

    Joined:
    Nov 2, 2015
    Messages:
    345
    Likes Received:
    3
    ----------------------------------
    QUESTION

    Your network contains five servers that run Windows Server 2012 R2. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.
    You need to ensure that the NLB feature can distribute connections across all of the virtual machines.

    Solution: On each Hyper-V server, you create a new private virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new private virtual network switches.
    No
    ----------------------------------

    QUESTION

    Your network contains five servers that run Windows Server 2012 R2. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
    You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only. You need to ensure that the NLB feature can distribute connections across all of the virtual machines.

    Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2.
    No

    ----------------------------------

    QUESTION
    Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:

    Solution: You create a copy of the Basic EFS certificate template, and then you modify the validity period of the copy.
    Yes

    ----------------------------------

    QUESTION
    Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:

    Solution: From the properties of the Basic EFS template, you assign the Allow -Enroll permission to the Authenticated Users group.
    No

    ----------------------------------

    QUESTION
    Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:

    Solution: You create a copy of the User certificate template, and then you modify the extensions of the copy.
    B. No

    ----------------------------------

    QUESTION
    Your network contains an Active Directory domain named contoso.com.
    The network has an Active Directory Certificate Services (AD CS) infrastructure. You need to issue a certificate to users to meet the following requirements:

    Solution: From the properties of the User certificate template, you assign the Allow -Enroll permission to the Authenticated Users group.
    No
    ----------------------------------
     
  4. mecbeau

    mecbeau Member
    Member

    Joined:
    Nov 2, 2015
    Messages:
    345
    Likes Received:
    3
    Q

    You need to automatically restart the appropriate web service on DETCRL01 and CHICRL01 if the web service is stopped.

    Solution: You create a recovery task in SCOM and configure it to start the World Wide Web publishing service.
    Does this meet the goal?
    Yes
    ---------------------------
    Q

    You need to automatically restart the appropriate web service on DETCRL01 and CHICRL01 if the web service is stopped.

    Solution: You create a diagnostic task in SCOM and configure it to start the Server service.
    Does this meet the goal?
    No
    ----------------------------------

    You need to automatically restart the appropriate web service on DETCRL01 and CHICRL01 if the web service is stopped.

    Solution: you Create a Windows Events monitor SCOM and configure it to monitor even related to the http.sys Service.

    NO

    ----------------------------------------------
     
  5. Qu

    Queenb Member
    Member

    Joined:
    Dec 14, 2015
    Messages:
    23
    Likes Received:
    0
    thank , it make life easier to have all y/n questions in one file.
    Hope all stands true
     
  6. da

    dapenguin Member
    Member

    Joined:
    Oct 30, 2015
    Messages:
    120
    Likes Received:
    0
    looks like all answers here match new file, thanks mecbeau...u r da best
     
  7. as

    ashfoo Member
    Member

    Joined:
    Nov 23, 2015
    Messages:
    15
    Likes Received:
    0
    thx mecbeau is easy for me to study
     
  8. te

    techeart Member
    Member

    Joined:
    Nov 6, 2015
    Messages:
    79
    Likes Received:
    0
    what about this? is it confirmed?

    QUESTION 15
    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to
    protect content for a project.
    You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still
    available after AD RMS is uninstalled.
    Solution: You enable the decommissioning service by using the AD RMS management console.
    You grant all users the Read & Execute permission to the decommission pipeline.
    Does this meet the goal?
    A. Yes
    B. No
    Correct Answer: A
     
  9. da

    dapenguin Member
    Member

    Joined:
    Oct 30, 2015
    Messages:
    120
    Likes Received:
    0

    Dear visitor, you need to Register or Login to view links on Certify Chat.

    what about this? is it confirmed?

    QUESTION 15
    An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to
    protect content for a project.
    You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still
    available after AD RMS is uninstalled.
    Solution: You enable the decommissioning service by using the AD RMS management console.
    You grant all users the Read & Execute permission to the decommission pipeline.
    Does this meet the goal?
    A. Yes
    B. No
    Correct Answer: A
    Click to expand...
    think so, thats what im going with
     
  • lu

    lucasg4 Member
    Member

    Joined:
    Dec 16, 2015
    Messages:
    2
    Likes Received:
    0
    Another question

    QUESTION 23
    You plan to allow users to run internal applications from outside the company's network.
    You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role
    installed.
    You must secure on-premises resources by using multi-factor authentication (MFA).
    You need to design a solution to enforce different access levels for users with personal Windows
    8.1 or iOS 8 devices.
    Solution:You install a local instance of MFA Server.
    You connect the instance to the Microsoft Azure MFA provider, and then run the following Windows PowerShell cmdlet. Enable-AdfsDeviceRegistration
    Does this meet the goal?
    A. Yes
    B. No

    Correct Answer: B
     
  • rw

    rwolf82 Member
    Member

    Joined:
    Nov 19, 2015
    Messages:
    7
    Likes Received:
    0
    QUESTION 1
    NOTE: Once you answer this question, you will NOT be able to return to it.
    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1.
    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.
    Solution: You configure preferred and possible owners for each business-critical VM.
    Does this meet the goal?
    B. No

    ----------------------------------------------------

    QUESTION 3
    NOTE: Once you answer this question, you will NOT be able to return to it.
    You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1.
    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.
    Solution: You create an availability set and place each business-critical VM in the set.
    Does this meet the goal?
    B. No

    ----------------------------------------------------

    QUESTION 5
    NOTE: Once you answer this question, you will NOT be able to return to it.
    You manage a Hyper-V 2012 cluster by using system center Virtual machine manager 2012 SP1.
    You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL server databases.
    Solutions: You create a custom placement rule and apply it to all business-critical VMs.
    Does this meet the goal?
    B. NO

    For all the above questions the answer is NO, but in the VCE dump (70-414 CC Th3Puck) there is a question that shows the following information:

    ATT: This question is one of a series of similar questions where only the 'Solution" changes. The answer to this one appears to always be "No" unless the Solution involves the following:

    - Adding the VM's to an Availability set
    - Modifying the preferred and possible owners
    - Configuring Custom Placement rules

    In all the above questions they talk about the three items mentioned above, shouldn't the answer be YES to all these questions then?
     
    #11 rwolf82, Jan 19, 2016
    Last edited: Jan 19, 2016
  • op

    openbpart Member
    Member

    Joined:
    Dec 22, 2015
    Messages:
    68
    Likes Received:
    0
    you are right in this file there are mistake and some answer are wrong which needs to check and verify .

    or better to build a new cc file if possible Mr. Admin :(
     
  • cu

    Member

    Joined:
    Dec 22, 2015
    Messages:
    49
    Likes Received:
    1
    So it looks like in the business-critical SQL server databases question series, all of the answers are No.

    Configure preferred and possible owner = No
    Custom placement rule = No
    Availability set = No
    Memory-Weight = No

    And all the MFA related questions are all Yes, except the one with enable-adfsdeviceregistration which is a No.

    Seems easy enough! Hope I don't get screwed with new questions lol
     
  • coodyscoops

    coodyscoops Member
    Member

    Joined:
    Dec 15, 2015
    Messages:
    139
    Likes Received:
    7
    cupertinosucks, your name is freaking epic... :D
     
  • rw

    rwolf82 Member
    Member

    Joined:
    Nov 19, 2015
    Messages:
    7
    Likes Received:
    0

    Dear visitor, you need to Register or Login to view links on Certify Chat.

    So it looks like in the business-critical SQL server databases question series, all of the answers are No.

    Configure preferred and possible owner = No
    Custom placement rule = No
    Availability set = No
    Memory-Weight = No

    And all the MFA related questions are all Yes, except the one with enable-adfsdeviceregistration which is a No.

    Seems easy enough! Hope I don't get screwed with new questions lol
    Click to expand...
    In my opinion all the answers for the first three items should be YES, but in the dump the answer says NO.

    Configure preferred and possible owner = YES
    Custom placement rule = YES
    Availability set = YES

    Dear visitor, you need to Register or Login to view links on Certify Chat.

     
  • cu

    Member

    Joined:
    Dec 22, 2015
    Messages:
    49
    Likes Received:
    1

    Dear visitor, you need to Register or Login to view links on Certify Chat.

    cupertinosucks, your name is freaking epic... :D
    Click to expand...
    thanks! I had this since I was a kid for 15years or so lol. I'm still debating if I should buy this domain name... but it wouldn't be very professional.. haha
     
  • op

    openbpart Member
    Member

    Joined:
    Dec 22, 2015
    Messages:
    68
    Likes Received:
    0
    Q You need to automatically restart the appropriate web service on DETCRL01 and CHICRL01 if the web service is stopped.
    Solution: you create a basic service monitor in SCOM and configure it to monitor the World Wide Web publishing service.
    Does this meet the goal?

    A. YES
    B. No
     
  • pa

    papoea Member
    Member

    Joined:
    Apr 19, 2016
    Messages:
    4
    Likes Received:
    0
    Your network contains five servers that run Windows Server 2012 R2. You install the Hyper-V server role on the servers. You create an external virtual network switch on each server. You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1. Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application. You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.
    You need to ensure that the NLB feature can distribute connections across all of the virtual machines.

    Solution: On each Hyper-V server, you create a new private virtual network switch. From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new private virtual network switches.
    Yes

    Note: As best practice using unicast, use 1 outward facing NIC (connected to external network switch) and 1 inward facing NIC (attached to private network switch) for internal communications between NLB nodes. Otherwise you have to spoof the MAC on the VM.

    Reference: CBT Nuggets 70-412 -Configuring NLB
     
  • stickerbush1970

    Member

    Joined:
    Jan 13, 2016
    Messages:
    97
    Likes Received:
    1
    On the Yes/No questions, I went through and answered No on all, then I found the ones that were the Yes questions, about 9, and memorized those with key words. I had the Yes/No file memorized in about 20 mins.
     
  • ph

    phool4fool Member
    Member

    Joined:
    Sep 5, 2016
    Messages:
    44
    Likes Received:
    1

    Dear visitor, you need to Register or Login to view links on Certify Chat.

    In my opinion all the answers for the first three items should be YES, but in the dump the answer says NO.

    Configure preferred and possible owner = YES
    Custom placement rule = YES
    Availability set = YES

    Dear visitor, you need to Register or Login to view links on Certify Chat.

    Click to expand...
    In the Answer description, there is also mentioned that you select Yes when these are asked in solution but the answer in VCE is still NO

    anybody verify it please
     
  • Share This Page