getcertified4sure.com

Tactics to 70 417 exam




Your success in Microsoft 70 417 pdf is our sole target and we develop all our exam 70 417 braindumps in a way that facilitates the attainment of this target. Not only is our 70 417 vce study material the best you can find, it is also the most detailed and the most updated. 70 417 vce Practice Exams for Microsoft 70 417 vce are written to the highest standards of technical accuracy.

Q171. You have a server named FS1 that runs Windows Server 2012 R2. 

You install the File and Storage Services server role on FS1. 

From Windows Explorer, you view the properties of a shared folder named Share1 and you 

discover that the Classification tab is missing. 

You need to ensure that you can assign classifications to Share1 from Windows Explorer manually. 

What should you do? 

A. Install the Enhanced Storage feature. 

B. From Folder Options, clear Use Sharing Wizard (Recommend). 

C. Install the File Server Resource Manager role service. 

D. From Folder Options, select Show hidden files, folders, and drives. 

Answer:


Q172. Your network contains an Active Directory domain named contoso.com.All user accounts in the marketing department reside in an organizational unit (OU) named OU1. 

You have a Group Policy object (GPO) named GPO1. GPO1 contains Folder Redirection settings. GPO1 has default permissions. 

You discover that the Folder Redirection settings are not applied to the users in the marketing department. 

You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that the Folder Redirection settings in GPO1 apply to the marketing users. 

What should you do? 

A. Modify the Delegation settings of GPO1 

B. Enable the link of GPO1 

C. Enforce GPO1 

D. Modify the link order of GPO1 

Answer:


Q173. Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory Federation Services server role installed.Server2 is a file server. 

Your company introduces a Bring Your Own Device (BYOD) policy. 

You need to ensure that users can use a personal device to access domain resources by using Single Sign-On (SSO) while they are connected to the internal network. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Enable the Device Registration Service in Active Directory. 

B. Publish the Device Registration Service by using a Web Application Proxy. 

C. Configure Active Directory Federation Services (AD FS) for the Device Registration Service. 

D. Install the Work Folders role service on Server2. 

E. Create and configure a sync share on Server2. 

Answer: A,C 

Explanation: *Prepare your Active Directory forest to support devices This is a one-time operation that you must run to prepare your Active Directory forest to support devices. To prepare the Active Directory forest On your federation server, open a Windows PowerShell command window and type: Initialize-ADDeviceRegistration *Enable Device Registration Service on a federation server farm node To enable Device Registration Service 1.On your federation server, open a Windows PowerShell command window and type: Enable-AdfsDeviceRegistration 2.Repeat this step on each federation farm node in your AD FS farm. 


Q174. OTSPOT 

Your network contains an Active Directory domain named corp.contoso.com. The domain contains two member servers named Server1 and Edge1. Both servers run Windows Server 2012 R2. Your company wants to implement a central location where the system events from all of the servers in the domain will be collected. 

From Server1, a network technician creates a collector-initiated subscription for Edge1. You discover that 

Server1 does not contain any events from Edge1. You view the runtime status of the subscription as shown in the exhibit. (Click the Exhibit button.) 

Exhibit: 

Hot Area: 

Answer: 


Q175. OTSPOT 

Your network contains a RADIUS server named Admin1. 

You install a new server named Server2 that runs Windows Server 2012 R2 and has 

Network Policy Server (NPS) installed. 

You need to ensure that all accounting requests for Server2 are forwarded to Admin1. 

On Server2, you create a new remote RADIUS server group named Group1 that contains 

Admin1. 

What should you configure next on Server2? 

To answer, select the appropriate node in the answer area. 

Answer: 

352. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. The domain contains a virtual machine named VM1. 

A developer wants to attach a debugger to VM1. 

You need to ensure that the developer can connect to VM1 by using a named pipe. 

Which virtual machine setting should you configure? 

A. BIOS 

B. Network Adapter 

C. COM 1 

D. Processor 

Answer:

Explanation: 

Named pipes can be used to connect to a virtual machine by configuring COM 1. 

References: http://support.microsoft.com/kb/819036 http://support.microsoft.com/kb/141709 


Q176. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 has the Remote Desktop Session Host role service installed. The computer account of Server1 resides in an organizational unit (OU) named OU1. 

You create and link a Group Policy object (GPO) named GPO1 to OU1. GPO1 is configured as shown in the exhibit. (Click the Exhibit button.) 

You need to prevent GPO1 from applying to your user account when you log on to Server1. GPO1 must apply to every other user who logs on to Server1. 

What should you configure? 

A. Item-level targeting 

B. Security Filtering 

C. Block Inheritance 

D. WMI Filtering 

Answer:

Explanation: Security filtering is a way of refining which users and computers will receive and apply the settings in a Group Policy object (GPO). Using security filtering, you can specify that only certain security principals within a container where the GPO is linked apply the GPO. Security group filtering determines whether the GPO as a whole applies to groups, users, or computers; it cannot be used selectively on different settings within a GPO. 


Q177. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 and a server named Server2 that runs Windows Server 2008 R2 Service Pack 1 (SP1). Both servers are member servers. 

On Server2, you install all of the software required to ensure that Server2 can be managed remotely from Server Manager. 

You need to ensure that you can manage Server2 from Server1 by using Server Manager. 

Which two tasks should you perform on Server2? (Each correct answer presents part of the solution. Choose two.) 

A. Run the Enable-PSRemotingcmdlet. 

B. Run the Configure-SMRemoting.psl script. 

C. Run the Enable-PSSessionConfigurationcmdlet. 

D. Run the Set-ExecutionPolicycmdlet. 

E. Run the systempropertiesremote.exe command. 

Answer: B,D 

Explanation: 

To configure Server Manager remote management by using Windows PowerShell 

On the computer that you want to manage remotely, open a Windows PowerShell session 

with elevated user rights. 

In the Windows PowerShell session, type the following, and then press Enter. 

Set-ExecutionPolicy –ExecutionPolicyRemoteSigned (D) 

Type the following, and then press Enter to enable all required firewall rule exceptions. 

Configure-SMRemoting.ps1 -force –enable (B) 


Q178. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

On Server1, an administrator creates a virtual machine named VM1. 

A user named User1 is the member of the local Administrators group on Server1. 

User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the Exhibit button.) 

You need to ensure that User1 can modify the settings of VM1 by running the Set-Vmcmdlet. 

What should you instruct User1 to do? 

A. Run Windows PowerShell with elevated privileges. 

B. Install the Integration Services on VM1. 

C. Modify the membership of the local Hyper-V Administrators group. 

D. Import the Hyper-V module. 

Answer:

Explanation: You can only use the PowerShell snap-in to modify the VM settings with the 

vmcmdlets when you are an Administrator. 

Thus best practices dictate that User1 run the Powershell with elevated privileges. 

References: 

http://technet.microsoft.com/en-us/library/jj713439.aspx 


Q179. DNS record types come in many forms, but which record type is being described below? 

Maps a domain name such as www.google.com to an IP address 

A. A 

B. CNAME 

C. MX 

D. PTR 

Answer:


Q180. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 is backed up daily. 

The domain has the Active Directory Recycle Bin enabled. 

During routine maintenance, you delete 500 inactive user accounts and 100 inactive groups. One of the deleted groups is named Group1. Some of the deleted user accounts are members of some of the deleted groups. 

For documentation purposes, you must provide a list of the members of Group1 before the group was deleted. 

You need to identify the names of the users who were members of Group1 prior to its deletion. You want to achieve this goal by using the minimum amount of administrative effort. 

What should you do first? 

A. Reactivate the tombstone of Group1. 

B. Use the Recycle Bin to restore Group1. 

C. Perform an authoritative restore of Group1. 

D. Mount the most recent Active Directory backup. 

Answer:

Explanation: 

You can use the Active Directory database mounting tool (Dsamain.exe) and a Lightweight Directory Access Protocol (LDAP) tool, such as Ldp.exe or Active Directory Users and Computers, to identify which backup has the last safe state of the forest. The Active Directory database mounting tool, which is included in Windows Server 2008 and later Windows Server operating systems, exposes Active Directory data that is stored in backups or snapshots as an LDAP server. Then, you can use an LDAP tool to browse the data. This approach has the advantage of not requiring you to restart any DC in Directory Services Restore Mode (DSRM) to examine the contents of the backup of AD DS.