getcertified4sure.com

Ideas to microsoft 70 417




It is impossible to pass Microsoft microsoft 70 417 exam without any help in the short term. Come to Exambible soon and find the most advanced, correct and guaranteed Microsoft microsoft 70 417 practice questions. You will get a surprising result by our Improve Upgrading Your Skills to MCSA Windows Server 2012 practice guides.

Q91. RAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. 

You configure a new failover cluster named Cluster1. Server1 and Server2 are nodes in Cluster1. You need to configure the disk that will be used as a witness disk for Cluster1. 

How should you configure the witness disk? 

To answer, drag the appropriate configurations to the correct location or locations. Each configuration may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q92. RAG DROP 

You have a file server named Server1 that runs Windows Server 2012 R2. The folders on Server1 are configured as shown in the following table. 

A new corporate policy states that backups must use Microsoft Online Backup whenever possible. You need to identify which technology you must use to back up Server1. The solution must use Microsoft Online Backup whenever possible. What should you identify? To answer, drag the appropriate backup type to the correct location or locations. Each backup type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q93. In Windows Server 2012 R2, you can remove the Server Graphical Shell, resulting in the "Minimal Server Interface." This is similar to a Server with a GUI installation except that some features are not installed. 

Which of the following features is not installed in this scenario? 

A. MMC 

B. Windows Explorer 

C. Control Panel (subset) 

D. Server Manager 

Answer:

Explanation: 

When you choose the minimal server interface option Internet Explorer 10, Windows Explorer, the desktop, and the Start screen are not installed. Microsoft Management Console (MMC), Server Manager, and a subset of Control Panel are still present. 


Q94. You manage an environment that has many servers. The servers run Windows Server 2012 R2 and use iSCSI storage. Administrators report that it is difficult to locate available iSCSI resources on the network. You need to ensure that the administrators can locate iSCSI resources on the network by using a central repository. Which feature should you deploy? 

A. The iSNS Server service feature 

B. The iSCSI Target Storage Provider feature 

C. The Windows Standards-Based Storage Management feature 

D. The iSCSI Target Server role service 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc772568.aspx iSNS Server Overview Internet iStorage Name Service Server The Internet Storage Name Service (iSNS) protocol is used for interaction between iSNS servers and iSNS clients. iSNS clients are computers, also known as initiators, that are attempting to discover storage devices, also known as targets, on an Ethernet network. iSNS facilitates automated discovery, management, and configuration of iSCSI and Fibre Channel devices (using iFCP gateways) on a TCP/IP network. Note The Microsoft iSNS Server only supports the discovery of iSCSI devices, and not Fibre Channel devices. iSNS Server provides intelligent storage discovery and management services comparable to those found in Fibre Channel networks, allowing a commodity IP network to function in a similar capacity as a storage area network. iSNS facilitates a seamless integration of IP networks and manages iSCSI devices. iSNS thereby provides value in any storage network comprised of iSCSI devices. 

Features of iSNS Server iSNS Server is a repository of currently active iSCSI nodes, as well as their associated portals, entities, etc. Nodes can be initiators, targets, or management nodes. Typically, initiators and targets register with the iSNS server, and the initiators query the iSNS server for the list of available targets. 

A dynamic database of the iSCSI devices and related information that are currently available on the network: The database helps provide iSCSI target discovery functionality for the iSCSI initiators on the network. The database is kept dynamic by using the Registration Period and Entity Status Inquiry features of iSNS. Registration Period allows the server to automatically deregister stale entries. Entity Status Inquiry provides the server a functionality similar to ping to determine whether registered clients are still present on the network, and allows the server to automatically deregister those clients which are no longer present. State Change Notification Service: This allows registered clients to be made aware of changes to the database in the iSNS server. It allows the clients to maintain a dynamic picture of the iSCSI devices available on the network. 

Discovery Domain Service: This allows an administrator to assign iSCSI nodes and portals into one or more groups called discovery domains. Discovery domains provide a zoning functionality by which an iSCSI initiator can only discover those iSCSI targets who have at least one discovery domain in common with it. Benefits of iSNS Server in iSCSI Storage Area Networks Centralized management Easily scalable to large IP storage networks 

Extensible Asynchronous notification of changes in the iSCSI storage network Ability to monitor the status and availability of clients Microsoft-preferred discovery method for iSCSI Designed for Windows Logo Program requirement for iSCSI HBAs 


Q95. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. 

The disks on Server1 are configured as shown in the exhibit. (Click the Exhibit button.) 

You create a virtual machine on Server1. 

You need to ensure that you can configure a pass-through disk for the virtual machine. 

What should you do? 

A. Convert Disk 1 to a GPT disk. 

B. Convert Disk 1 to a dynamic disk. 

C. Delete partition E. 

D. Take Disk 1 offline. 

Answer:

Explanation: 

NB: added the missing exhibit http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-inhyper- v.aspx Passthrough Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspective. Additionally, this raw piece of storage is not limited in size so, hypothetically, it can be a multi terabyte LUN. 

After storage is mapped to the Hyper-V server, it will appear as a raw volume and will be in an Offline state (depending on the SAN Policy (Figure 1-1)) as seen in Figure 1. 

We stated earlier that a disk must be Offline from the Hyper-V servers' perspective in order for the Guest to have exclusive access. However, a raw volume must first be initialized before it can be used. To accomplish this in the Disk Management interface, the disk must first be brought Online. Once Online, the disk will show as being Not Initialized (Figure 2). 

Right-click on the disk and select Initialize Disk (Figure 3) 

Select either an MBR or GPT partition type (Figure 4). 

Once a disk is initialized, it can once again be placed in an Offline state. If the disk is not in an Offline state, it will not be available for selection when configuring the Guest's storage. In order to configure a Pass-through disk in a Guest, you must select Attach a virtual disk later in the New Virtual Machine Wizard (Figure 5). 

If the Pass-through disk will be used to boot the operating system, it must be attached to an 

IDE Controller. 

Data disks can take advantage of SCSI controllers. In Figure 6, a Passthrough disk is 

attached to IDE Controller 0. 

Note: If the disk does not appear in the drop down list, ensure the disk is Offline in the Disk Management interface (In Server CORE, use the diskpart.exe CLI). Once the Pass-through disk is configured, the Guest can be started and data can placed on the drive. If an operating system will be installed, the installation process will properly prepare the disk. If the disk will be used for data storage, it must be prepared in the Guest operating system before data can be placed on it. If a Pass- through disk, being used to support an operating system installation, is brought Online before the Guest is started, the Guest will fail to start. When using Pass-through disks to support an operating system installation, provisions must be made for storing the Guest configuration file in an alternate location. This is because the entire Pass-through disk is consumed by the operating system installation. An example would be to locate the configuration file on another internal drive in the Hyper-V server itself. Or, if it is a cluster, the configuration file can be hosted on a separate cluster providing highly available file services. Be aware that Pass-through disks cannot be dynamically expanded. Additionally, when using Pass-through disks, you lose the capability to take snapshots, and finally, you cannot use differencing disks with Pass-through disks. 


Q96. You have a print server named Print1 that runs Windows Server 2012 R2. Print1 has 10 shared printers. 

You need to change the location of the spool folder. What should you modify? 

A. The properties of the Print Spooler service 

B. The Print Server Properties 

C. The user environment variables 

D. The PrintQueue.inf file 

Answer:


Q97. OTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and configured. 

For all users, you are deploying smart cards for logon. You are using an enrollment agent to enroll the smart card certificates for the users. 

You need to configure the Contoso Smartcard Logon certificate template to support the use of the enrollment agent. 

Which setting should you modify? To answer, select the appropriate setting in the answer area. 

Answer: 

172. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1. 

You make a change to GPO1. 

You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solution must minimize administrative effort. 

Which tool should you use? 

A. The Set-AdComputercmdlet 

B. Group Policy Management Console (GPMC) 

C. Server Manager 

D. TheGpupdate command 

Answer:

Explanation: 

In the previous versions of Windows, this was accomplished by having the user run 

GPUpdate.exe on their computer. Starting with Windows Server? 2012 and Windows?8, 

you can now remotely refresh Group Policy settings for all computers in an OU from one 

central location through the Group Policy Management Console (GPMC). Or you can use 

the Invoke-GPUpdate cmdlet to refresh Group Policy for a set of computers, not limited to 

the OU structure, for example, if the computers are located in the default computers 

container. Note: Group Policy Management Console (GPMC) is a scriptable Microsoft 

Management Console (MMC) snap-in, providing a single administrative tool for managing 

Group Policy across the enterprise. GPMC is the standard tool for managing Group Policy. 

Incorrect: 

Not B: Secedit configures and analyzes system security by comparing your current 

configuration to at least one template. 

Reference: Force a Remote Group Policy Refresh (GPUpdate) 


Q98. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the Hyper-V server role installed. 

You plan to replicate virtual machines between Server1 and Server2. The replication will be encrypted by using Secure Sockets Layer (SSL). 

You need to request a certificate on Server1 to ensure that the virtual machine replication is encrypted. 

Which two intended purposes should the certificate for Server1 contain? (Each correct answer presents part of the solution. Choose two.) 

A. Client Authentication 

B. Kernel Mode Code Signing 

C. Server Authentication 

D. IP Security end system 

E. KDC Authentication 

Answer: A,C 

Explanation: 

http://blogs.technet.com/b/virtualization/archive/2012/03/13/hyper-v-replica-certificaterequirements.aspx 


Q99. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

HVServer1 hosts two virtual machines named Server1 and Server2. Both virtual machines connect to a virtual switch named Switch1. 

On Server2, you install a network monitoring application named App1. 

You need to capture all of the inbound and outbound traffic to Server1 by using App1. 

Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.) 

A. Get-VM "Server2" | Set-VMNetworkAdapter -IovWeight 1 

B. Get-VM "Server1" | Set-VMNetworkAdapter -Allow/Teaming On 

C. Get-VM "Server1" | Set-VMNetworkAdapter -PortMirroring Source 

D. Get-VM "Server2" | Set-VMNetworkAdapter -PortMirroring Destination 

E. Get-VM "Server1" | Set-VMNetworkAdapter -IovWeight 0 

F. Get-VM "Server2” | Set-VMNetworkAdapter-AllowTeaming On 

Answer: C,D 

Explanation: Note: 

*

 Get-VM will get the virtual machines from one or more Hyper-V hosts. 

-ComputerName<String[]> is used to specify one or more Hyper-V hosts from which virtual machines are to be retrieved. NetBIOS names, IP addresses, and fully-qualified domain names are allowable. The default is the local computer — use “localhost” or a dot (“.”) to specify the local computer explicitly. 

*

 Set-VMNetworkAdapter is used to configure features of the virtual network adapter in a virtual machine or the management operating system. 

-PortMirroring<VMNetworkAdapterPortMirroringMode> is used to specify the port mirroring mode for the network adapter to be configured. 

With Port Mirroring, traffic sent to or from a Hyper-V Virtual Switch port is copied and sent to a mirror port. There are a range of applications for port mirroring - an entire ecosystem of network visibility companies exist that have products designed to consume port mirror data for performance management, security analysis, and network diagnostics. With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch port that receives copies of all the traffic. 

References: http://technet.microsoft.com/en-us/library/jj679878.aspx 


Q100. RAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server3. The network contains a standalone server named Server2. All servers run Windows Server 2012 R2. The servers are configured as shown in the following table. 

Server3 hosts an application named App1. App1 is accessible internally by using the URL https://app1.contoso.com. App1 only supports Integrated Windows authentication. 

You need to ensure that all users from the Internet are pre-authenticated before they can access App1. 

What should you do? To answer, drag the appropriate servers to the correct actions. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: