getcertified4sure.com

Where to find exam 70 417




Exambible 70 417 dumps Questions are updated and all 70 417 exam answers are verified by experts. Once you have completely prepared with our 70 417 dumps exam prep kits you will be ready for the real 70 417 dumps exam without a problem. We have Refresh Microsoft 70 417 pdf dumps study guide. PASSED 70 417 exam First attempt! Here What I Did.

Q121. You have five servers that run Windows Server 2012 R2. The servers have the Failover Clustering feature installed. 

You deploy a new cluster named Cluster1. Cluster1 is configured as shown in the following table. 

Server1, Server2/ and Server3 are configured as the preferred owners of the cluster roles. Dynamic quorum management is disabled. 

You plan to perform hardware maintenance on Server3. 

You need to ensure that if the WAN link between Site1 and Site2 fails while you are performing maintenance on Server3, the cluster resource will remain available in Site1. 

What should you do? 

A. Remove the node vote for Server3. 

B. Enable DrainOnShutdown on Cluster1. 

C. Add a file share witness in Site1. 

D. Remove the node vote for Server4 and Server5. 

Answer:

Explanation: Exclude secondary site nodes. In general, do not give votes to WSFC (Windows Server Failover Clustering) nodes that reside at a secondary disaster recovery site. You do not want nodes in the secondary site to contribute to a decision to take the cluster offline when there is nothing wrong with the primary site. 


Q122. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has the Remote Access server role installed. 

DirectAccess is implemented on Server1 by using the default configuration. 

You discover that DirectAccess clients do not use DirectAccess when accessing websites on the Internet. 

You need to ensure that DirectAccess clients access all Internet websites by using their DirectAccess connection. 

What should you do? 

A. Configure a DNS suffix search list on the DirectAccess clients. 

B. Enable the Route all traffic through the internal network policy setting in the DirectAccess Server Settings Group Policy object (GPO). 

C. Configure DirectAccess to enable force tunneling. 

D. Disable the DirectAccess Passive Mode policy setting in the DirectAccess Client Settings Group Policy object (GPO). 

Answer:


Q123. You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2 Standard. You establish a Remote Desktop session to Server1. 

You need to identify which task can be performed on Server1 from within the Remote Desktop session. 

What should you identify? 

A. Install a feature by using Server Manager. 

B. Modify the network settings by using Sconfig. 

C. Disable services by using Msconfig. 

D. Join a domain by using the System Properties. 

Answer:

Explanation: In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must be a member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode. 

http://technet.microsoft.com/en-us/library/jj647766.aspx Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80 


Q124. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. Cluster1 hosts 10 virtual machines. All of the virtual machines run Windows Server 2012 R2 and are members of the domain. 

You need to ensure that the first time a service named Service1 fails on a virtual machine, the virtual machine is moved to a different node. 

You configure Service1 to be monitored from Failover Cluster Manager. 

What should you configure on the virtual machine? 

A. From the General settings, modify the Startup type. 

B. From the Recovery settings of Service1, set the First failure recovery action to Take No Action. 

C. From the Recovery settings of Service1, set the First failure recovery action to Restart the Service. 

D. From the General settings, modify the Service status. 

Answer:

Explanation: 

C. Configure the virtual machine to take no action through Hyper-V if the physical computer shuts down by modifying the Automatic Stop Action setting to None. Virtual machine state must be managed through the Failover Clustering feature. http://technet.microsoft.com/en-us/library/cc742396.aspx http://windowsitpro.com/windows-server-2012/enable-windows-server-2012-failover-cluster-hyper-v-vmmonitoring 


Q125. Which of the following situations would you use AD LDS? 

A. A DMZ 

B. Standard private network 

C. You require the use of Group Policy 

D. You require the use of Organizational Units 

Answer:

Explanation: 

A DMZ (Demilitarized Zone) such as a web server is usually the classic choice for using AD LDS (Active Directory Lightweight Directory Service) 


Q126. Which terminology is being described below: 

This trust is a manually created trust that shortens the trust path to improve the speed at which authentications, which occur between domain trees, are processed 

A. Shortcut Trust 

B. Quick Trust 

C. Easy Trust 

D. Simple Trust 

Answer:


Q127. OTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You need to identify whether the Company attribute replicates to the global catalog. 

Which part of the Active Directory partition should you view? 

To answer, select the appropriate Active Directory object in the answer area. 

Answer: 


Q128. You have a server named Corel that has a Server Core Installation of Windows Server 2012 R2. Corel has the Hyper-V server role installed. Corel has two network adapters from different third-party hardware vendors. 

You need to configure network traffic failover to prevent connectivity loss if a network adapter fails. 

What should you use? 

A. New-NetSwitchTeam 

B. Install-Feature 

C. Add-NetSwitchTeamMember 

D. Netsh.exe 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/jj553814.aspx Detailed Description The New-NetSwitchTeam cmdlet creates a new switch team. A switch team must have a name for the team and must be created with one or more members, or network adapters. The network switch team is a team that is controlled by a Hyper-V extensible switch forwarding extension. No other cmdlets can be used to manage a switch team and the NetSwitchTeam cmdlets must not be used to manage standard, or non-switch, network adapter teams. 


Q129. OTSPOT 

You have a Hyper-V host named HYPERV1. HYPERV1 hosts a virtual machine named 

DC1. 

You need to prevent the clock on DC1 from synchronizing from the clock on HYPERV1. 

What should you configure? To answer, select the appropriate object in the answer area. 

Answer: 

81. Your network contains an Active Directory domain named adatum.com. The domain contains three domain controllers. The domain controllers are configured as shown in the following table. 

DC3 loses network connectivity due to a hardware failure. You plan to remove DC3 from the domain. 

You log on to DC3. 

You need to identify which service location (SRV) records are registered by DC3. 

What should you do? 

A. Open the %windir%\system32\dns\backup\adatum.com.dns file. 

B. Open the %windir%\system32\config\netlogon.dns file. 

C. Run ipconfig /displaydns. 

D. Run dcdiag /test:dns. 

Answer:

Explanation: 

The netlogon.dns file contains all registrations. http://support.microsoft.com/kb/816587/en-us How to verify that SRV DNS records have been created for a domain controller The SRV record is a Domain Name System (DNS) resource record that is used to identify computers that host specific services. SRV resource records are used to locate domain controllers for Active Directory. To verify SRV locator resource records for a domain controller, use one of the following methods. DNS Manager After you install Active Directory on a server running the Microsoft DNS service, you can use the DNS Management Console to verify that the appropriate zones and resource records are created for each DNS zone. Active Directory creates its SRV records in the following folders, where Domain_Name is the name of your domain: Forward Lookup Zones/Domain_Name/_msdcs/dc/_sites/Default-First-Site-Name/_tcp Forward Lookup Zones/Domain_Name/_msdcs/dc/_tcp In these locations, an SRV record should appear for the following services: _kerberos _ldap Netlogon.dns If you are using non-Microsoft DNS servers to support Active Directory, you can verify SRV locator resource records by viewing Netlogon.dns. Netlogon.dns is located in the %systemroot%\System32\Config folder. You can use a text editor, such as Microsoft Notepad, to view this file. The first record in the file is the domain controller's Lightweight Directory Access Protocol (LDAP) SRV record. This record should appear similar to the following: _ldap._tcp.Domain_Name Nslookup Nslookup is a command-line tool that displays information you can use to diagnose Domain Name System (DNS) infrastructure. To use Nslookup to verify the SRV records, follow these steps: 

On your DNS, click Start, and then click Run. 

In the Open box, type cmd. 

Type nslookup, and then press ENTER. 

Type set type=all, and then press ENTER. 

Type _ldap._tcp.dc._msdcs.Domain_Name, where Domain_Name is the name of your 

domain, and then press ENTER. 

Nslookup returns one or more SRV service location records 


Q130. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

Cluster1 hosts an application named App1. 

You need to ensure that Server2 handles all of the client requests to the cluster for App1. The solution must ensure that if Server2 fails, Server1 becomes the active node for App1. 

What should you configure? 

A. Affinity - None 

B. Affinity - Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general u 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

The preferred owner in a 2 server cluster will always be the active node unless it is down. http:// www.sqlservercentral.com/Forums/Topic1174454-146-1.aspx#bm1174835 Difference between possible owners and preferred owners Possible owners are defined at the resource level and dictate which nodes in the Windows cluster are able to service this resource For instance, you have a 3 node cluster with Node A, Node B and Node C. You have a clustered disk resource "MyClusteredDisk", if you remove Node C from the possible owners of the clustered disk resource "MyClusteredDisk" then this disk will never be failed over to Node C. Preferred owners are defined at the resource group level and define the preferred node ownership within the Windows cluster For instance, you have a 3 node cluster with Node A, Node B and Node C. You have a cluster resource group "MyClusteredGroup" which contains various disk, IP, network name and service resources. Nodes A, B and C are all possible owners but Node B is set as the preferred owner and is currently the active node. The resource group fails over to Node C as Node B stops responding on the Public network due to a failed NIC. In the Resource group properties on the failback tab you have this set to immediate. You fix the NIC issue on Node B and bring it back up on the network. The resource group currently active on Node C will without warning immediately attempt to failback to Node B. Not a good idea if this is a Production SQL Server instance, so use caution when configuring preferred owners and failback http://support.microsoft.com/kb/299631/en-us Failover behavior on clusters of three or more nodes This article documents the logic by which groups fail from one node to another when there are 3 or more cluster node members. The movement of a group can be caused by an administrator who manually moves a group or by a node or resource failure. Where the group moves depends on how the move is initiated and whether the Preferred Owner list is set.