getcertified4sure.com

A Complete Guide to exam 70 417




Want to know Actualtests 70 417 dumps Exam practice test features? Want to lear more about Microsoft Upgrading Your Skills to MCSA Windows Server 2012 certification experience? Study Practical Microsoft 70 417 dumps answers to Rebirth microsoft 70 417 questions at Actualtests. Gat a success with an absolute guarantee to pass Microsoft 70 417 dumps (Upgrading Your Skills to MCSA Windows Server 2012) test on your first attempt.

Q101. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed. 

The network contains an enterprise certification authority (CA). All servers are enrolled automatically for a certificate-based on the Computer certificate template. 

On Server1, you have a virtual machine named VM1. VM1 is replicated to Server2. 

You need to encrypt the replication of VM1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On Server2, modify the Hyper-V Settings. 

B. On Server1, modify the settings of VM1. 

C. On Server2, modify the settings of VM1. 

D. On Server1, modify the settings of the virtual switch to which VM1 is connected. 

E. On Server1, modify the Hyper-V Settings. 

F. On Server2, modify the settings of the virtual switch to which VM1 is connected. 

Answer: A,B 

Explanation: Once you change the Hyper-V Settings of Server 2 to encrypt replications with a certificate, you then need to change the replication information of VM1 to use the secure connection. 

http://technet.microsoft.com/en-us/library/jj134240.aspx 


Q102. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the IP Address Management (IPAM) Server feature installed. 

You have a support technician named Tech1. Tech1 is a member of the IPAM Administrators group on Server1 and Server2. 

You need to ensure that Tech1 can use Server Manager on Server1 to manage IPAM on Server2. 

To which group on Server2 should you add Tech1? 

A. WinRMRemoteWMIUsers_ 

B. IPAM MSM Administrators 

C. Remote Management Users 

D. IPAM Administrators 

Answer:

Explanation: 

http://social.technet.microsoft.com/wiki/contents/articles/13444.windows-server-2012servermanagertroubleshooting-guide-part-ii-troubleshoot- manageability-status-errors-inserver- manager.aspx Windows Server 2012 Server Manager Troubleshooting Guide, Part II: Troubleshoot Manageability Status Errors in Server Manager Error <computer name>: Configuration refresh failed with the following error: The metadata failed to be retrieved from the server, due to the following error: Access is denied. The user is attempting to manage the remote server with a credential that has only standard user (not a member of the Administrators group) access rights on the target server, and the user has not enabled standard user remote management of the target server. By default, an account with standard user access rights is not a part of the WinRM remote WMI user's group, and can perform limited management tasks on a remote server in Server Manager. To allow standard users more management access rights on a target server, run the Enable-ServerManagerStandardUserRemotingcmdlet on the target server, in a Windows PowerShell session that has been opened with elevated user rights (Run as Administrator). For more information about how to use this cmdlet (and disable standard user management access when it is no longer needed), see the cmdlet Help topic for nableServerManagerStandardUserRemoting [This link is external to TechNet Wiki. It will open in a new window.] 


Q103. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 has access to four physical disks. The disks are configured as shown in the following table. 

You need to ensure that all of the disks can be added to a Cluster Shared Volume (CSV). 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Enable BitLocker on Disk4 

B. Disable BitLocker on Disk1 

C. Format Disk2 to use NTFS 

D. Format Disk3 to use NTFS 

Answer: C,D 

159. Your network contains a single Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

The domain contains 400 desktop computers that run Windows 8 and 200 desktop computers that run Windows XP Service Pack 3 (SP3). 

All new desktop computers that are added to the domain run Windows 8. All of the desktop computers are located in an organizational unit (OU) named OU1. 

You create a Group Policy object (GPO) named GPO1. GPO1 contains startup script settings. You link GPO1to OU1. You need to ensure that GPO1 is Applied only to computers that run Windows XP SP3. 

What should you do? 

A. Modify the Security settings of OU1. 

B. Run the Set-GPInheritancecmdlet and specify the -target parameter. 

C. Create and link a WMI filter to GPO1. 

D. Run the Set-GPLinkcmdlet and specify the -target parameter. 

Answer:

Explanation: 

WMI Filtering is used to get information of the system and apply the GPO on it with the condition is met.Security filtering: apply a GPO to a specific group (members of the group) 


Q104. You have a server named Server1 that runs Windows Server 2012 R2. 

You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the installation fails repeatedly. 

You need to ensure that the feature can be installed on Server1. 

What should you do? 

A. Run the Add-WindowsPackagecmdlet 

B. Disable User Account Control (UAC) 

C. Specify an alternate source path 

D. Install the Web Server (IIS) server role 

Answer:


Q105. You have a server named Server1 that runs Windows Server 2012 R2. 

You create a custom Data Collector Set (DCS) named DCS1. 

You need to configure Server1 to start DCS1 automatically when the network usage 

exceeds 70 percent. 

Which type of data collector should you create? 

A. A performance counter alert 

B. A performance counter data collector 

C. An event trace data collector 

D. A configuration data collector 

Answer:


Q106. OTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You have a failover cluster named Cluster1 that contains two nodes named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. 

You plan to create two virtual machines that will run an application named App1. App1 will store data on a virtual hard drive named App1data.vhdx. App1data.vhdx will be shared by both virtual machines. 

The network contains the following shared folders: 

An SMB file share named Share1 that is hosted on a Scale-Out File Server. An SMB file share named Share2 that is hosted on a standalone file server. An NFS share named Share3 that is hosted on a standalone file server. 

You need to ensure that both virtual machines can use App1data.vhdx simultaneously. 

What should you do? 

To answer, select the appropriate configurations in the answer area. 

... 

Answer: 


Q107. Your company deploys a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2. The forest contains a domain controller named DC10. 

On DC10, the disk that contains the SYSVOL folder fails. 

You replace the failed disk. You stop the Distributed File System (DFS) Replication service. You restore the SYSVOL folder. 

You need to perform a non-authoritative synchronization of SYSVOL on DC10. 

Which tool should you use before you start the DFS Replication service on DC10? 

A. Active Directory Sites and Services 

B. Dfsmgmt.msc 

C. Ldp 

D. Frsutil 

Answer:

Explanation: 

http://support.microsoft.com/kb/2218556 


Q108. Complete the missing word from the sentence below that is describing one of the new roles in Server 2008: 

By using__________ , you can augment an organization's security strategy by protecting information through persistent usage policies, which remain with the information, no matter where it is moved. 

A. AD FS 

B. AD RMS 

C. RODC 

D. AD LDS 

Answer:

Explanation: 

Active Directory Rights Management Services (AD RMS) 


Q109. OTSPOT 

Your network contains an Active Directory domain named fabrikam.com. You implement DirectAccess and an IKEv2 VPN. You need to view the properties of the VPN connection. Which connection properties should you view? To answer, select the appropriate connection properties in the answer area. 

Answer: 


Q110. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. One of the domain controllers is named DC1. 

The network contains a member server named Server1 that runs Windows Server 2012 R2. 

You need to promote Server1 to a domain controller by using install from media (IFM). 

What should you do first? 

A. Run the Active Directory Domain Services Installation Wizard on DC1. 

B. Upgrade DC1 to Windows Server 2012 R2. 

C. Run the Active Directory Domain Services Configuration Wizard on Server1. 

D. Create a system state backup of DC1. 

E. Create IFM media on DC1. 

Answer:

Explanation: This is the only valid option. You could install ADDS role on Server 1 and run ADDS configuration wizard and add DC to existing domain.