Your network contains an Active Directory domain named contoso.com. The domain has Remote Desktop Services (RDS) deployes The deployment contains two Remote Desktop Web Access (RD Web Access) servers named Server1 and Server2 You need to implement a solution to ensure that users can access RD Web Access if a single RD Web Access server fails
Which solution should you implement?
A. Failover Clustering
B. Multipath I/O (MPIO)
C. DNS Round Robin
D. Network Load Balancer (NLB)
Your network contains an Active Directory domain named contoso.com You plan to deploy personal virtual desktops You create a standard desktop that contains multiple desktop shortcuts to line-of-business applications Administrators frequently update the desktop shortcuts You need to recommend a solution to prevent users from modifying the desktop shortcuts and from adding additional files to the desktop
What should you include in the recommendation?
A. mandatory profiles
B. Folder Redirection and NTFS permissions
C. roaming profiles and NTFS permissions
D. user profile disks
Your network contains an Active Directory domain named contoso.com The domain contains a server named Server1 that has Microsoft System Center 2012 Configuration Manager installed You have a client computer named computer1 that runs Windows 8. Computer1 is a Configuration Manager client You plan to use Computer1 as a reference computer, and then to deploy an image of the reference computer to the network You need to recommend which task must be performed before you capture the image
What should you recommend?
A. From Server1, add a capture image by using the Windows Deployment Services console
B. From Server1, create a build and capture a task sequence by using the Configuration Manager console
C. From Computer1, uninstall the Configuration Manager client
D. From Computer1, run sysprep.exe /generalize
Your network contains a Remote Desktop Services (RDS) session collection that is used by all users. Users in the sales department access the session collection by using a Remote Desktop Gateway (RD Gateway) server. Sales users ofter establish Remote Desktop connections to the internal network from offices. You need to prevent the sales users from copying files to the computers at their customers offices during the Remote Desktop sessions.
What should you configure?
A. the Remote Desktop resource authorization policies (RD RAPs) from Remote Desktop Gateway Manager
B. the Remote Desktop connection authorization policies (RD CAPs) from Remote Desktop Gateway Manager
C. a Group Policy object (GPO) linked to the organizational unit (OU) that contains the sales user accounts
D. a Group Policy object (GPO) linked to the organizational unit (OU) that contains the Remote Desktop Session Host (RD Session Host) server accounts
E. the properties of the collection from the Remote Desktop Services node in Server Manager
Your network contains an Active Directory domain named contoso.com. You have an image of Windows 8 Enterprise that you plan to use as a template to provision new client computers. You have an internally developed Windows Store line-of-business application named App1 that must be added to the image You need to include App1 in the image. The solution must ensure that users can run App1 after the image is deployed to their desktop computer.
What should you do before adding App1 to the image?
A. Join the users
B. Modify the AllowAllTrustedApps registry value
C. Sign the application by using a trusted certificate computers to the domain
D. Create an XAP file for App1
E. Create a Windows Installer package for App1
Your network contains a Remote Desktop Services (RDS) session collection named Collection1 You need to configure which users can connect to the Remote Desktop Session Host (RD Session Host) servers in Collection1
What should you configure from the properties of Collection1?
C. Client Settings
D. User Groups
Remote Desktop Services accelerates and extends desktop and application deployments to any device, improving remote worker efficiency, while helping to keep critical intellectual property secure and simplify regulatory compliance. Remote Desktop Services enables virtual desktop infrastructure (VDI), session-based desktops, and applications, allowing users to work anywhere.
Remote Desktop Services (RDS) – Session Collection There are basically two types of RDS collections, Virtual Machine and Session.
-A Virtual Desktop collection deals with managing pools of VM desktops that can be made available to users (or they can also be dedicated to specific users).
-A Session collection is the old Terminal Services model. In Windows Server 2008 R2, the RemoteApp feature was introduced which allowed for seamless published applications. RemoteApp is also part of RDS in 2012 (but much easier to manage).
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com The domain contains three servers that are part of a Remote Desktop Services (RDS) deployment The servers are configured as shown in the following table:
You install a server named Server4 that runs Windows Server 2012. You need to configure Server4 as a Remote Desktop Gateway (RD Gateway) server. The solution must ensure that a third-party certificate is used to encrypt connections to Server4. Which three actions should you perform from Server Manager on Server4? (To answer, move the appropiate actions from the list of actions to the answer area and arrange them in the correct order)
Box 1:Add an RD Gateway server to the RDS deployment.
Box 2: Add Server 3 to server pool.
Box 3: Select the third-party certificate.
* To configure RD Gateway settings
1. On the RD Connection Broker server, open Remote Desktop Connection Manager. To open Remote Desktop Connection Manager, click Start, point to Administrative Tools, point to Remote Desktop Services, and then click Remote Desktop Connection Manager.
2. (box 2) In the left pane, click RD Virtualization Host Servers, and then on the Action menu, click Properties.
3. In the Virtual Desktops Properties dialog box, on the RD Gateway Settings tab, configure the desired RD Gateway behavior. You can configure whether to automatically detect RD Gateway server settings, to use RD Gateway server settings that you specify, or to not use an RD Gateway server.
If you select Automatically detect RD Gateway server settings, the client tries to use Group Policy settings to determine the behavior of client connections to RD Gateway. If you select Use these RD Gateway server settings, do the following:
(box 3)The server name must match what is specified in the Secure Sockets Layer (SSL) certificate for the RD Gateway server.
*The server name must match what is specified in the Secure Sockets Layer (SSL) certificate for the RD Gateway server.
*You can specify whether users connect to virtual desktops by using Remote Desktop Gateway (RD Gateway). These settings are applied when a user connects to a virtual desktop pool or a personal virtual desktop through RemoteApp and Desktop Connection. The RD Gateway settings apply to both virtual desktop pools and personal virtual desktops.
Your network contains an Active Directory domain named contoso.com The domain contains a server named Server1 that is a part of a Remote Desktop Servcices (RDS) deployment The computer account of Server1 is in an organizational unit (OU) named Servers All of the client computers are in an OU named OU1 Server1 has a session collection named Collection1 that contains multiple RemoteApp programs.
You need to prevent users from using printer redirection when they connect to Server1 by using the Remote Desktop client
What should you do?
A. Link a Group Policy object (GPO) to Servers. Configure the User Configuration settings of the GPO
B. Link a Group Policy object (GPO) to the Domain Controllers OU. Configure the Computer Configuration settings of the GPO
C. Link a Group Policy object (GPO) to Servers. Configure the Computer Configuration settings of the GPO
D. Link a Group Policy object (GPO) to OU1. Configure the User Configuration settings of the GPO
Your network contains an Active Directory domain named contoso.com The domain contains two server named Server1 and Server2 that run Windows Server 2012 Server1 has the Windows Deployment Services server role and the Microsoft Deployment Toolkit (MDT) installed Server2 has Windows Server Update Services (WSUS) installed You have an image of Windows 8 that is deployed by using MDT 2012 You plan to deploy a new hardware device to all new client computers The new hardware requires additional device drivers that are unavailable from Microsoft Update You need to add the hardware drivers to the Windows 8 image
What should you do?
A. From Server1, mount the image, and then run the Add-WindowsPackage cmdlet
B. From Server1, install the Windows Internal Database, and then copy the drivers to C:\Windows \System32\DriverStore\Temp
C. From Server2, copy the drivers to the Selfupdate folder
D. From Server2, copy the drivers to the Inventory folder
E. From Server1, add the new drivers to Deployment Workbench, and then create a task squence
F. From Server1, mound the image and then run the Add-Drivers cmdlet
G. From Server1, add the new drivers to Deployment Workbench and the create a selection profile
H. From Server1, install Microsoft SQL Server 2012 Express and then copy the drivers to C:\Windows \System32\DriverStore
Your network contains a Virtual Desktop Infrastructure (VDI). The VDI contains four servers. The servers are configured as shown in the following table.
You create a virtual desktop collection. The virtual desktop collection supports 100 users. You need to identify how much processor time each virtual machine consumes. Which performance object should you monitor on Server1?
A. Hyper-V Hypervisor Virtual Processor
B. Terminal Services Session
D. Hyper-V Hypervisor Logical Processor
For a Hyper-V virtual machine, you cannot view the traditional % Processor Time metric to get a good understanding of that VM’s processing. Instead, the counter you’ll want to monitor is Hyper-V Hypervisor Virtual Processor \ % Guest Run Time (instanceName). This counter can be considered to be equivalent to % Processor Time, but for a specific VM as defined by its instance name.
While similar in name, this counter is different than Hyper-V Hypervisor Logical Processor. Whereas Hyper-V considers a “Virtual Processor” to be one that has been assigned as part of a VM’s configuration, a “Logical Processor” represents the total number of processors on a host system that are managed by Hyper-V. You get this number by multiplying the number of cores times sockets, doubling the result if hyperthreading is enabled.
Passing Microsoft 70-415 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-415 Dump:http://www.braindump2go.com/70-415.html