getcertified4sure.com

Amazing 70 417 dumps secrets




Master the 70 417 exam Upgrading Your Skills to MCSA Windows Server 2012 content and be ready for exam day success quickly with this Ucertify 70 417 exam exam answers. We guarantee it!We make it a reality and give you real 70 417 pdf questions in our Microsoft 70 417 dumps braindumps.Latest 100% VALID Microsoft 70 417 vce Exam Questions Dumps at below page. You can use our Microsoft microsoft 70 417 braindumps and pass your exam.

Q141. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a Clustered Shared Volume (CSV). 

A developer creates an application named App1. App1 is NOT a cluster-aware application. App1 stores data in the file system. 

You need to ensure that App1 runs in Cluster1. The solution must minimize development effort. 

Which cmdlet should you run? 

A. Add-ClusterServerRole 

B. Add ClusterGenericApplicationRole 

C. Add-ClusterGenericServiceRole 

D. Add ClusterScaleOutFileServerRole 

Answer:


Q142. Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2012 R2. The domain contains a virtual machine named DC2. 

On DC2, you run Get-ADDCCloningExcludcdApplicationList and receive the output shown in the following table. 

You need to ensure that you can clone DC2. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

E. Option E 

Answer: A,E 

Explanation: 

Because domain controllers provide a distributed environment, you could not safely clone an Active Directory domain controller in the past. 

Before, if you cloned any server, the server would end up with the same domain or forest, which is unsupported with the same domain or forest. You would then have to run sysprep, which would remove the unique security information before cloning and then promote a domain controller manually. When you clone a domain controller, you perform safe cloning, which a cloned domain controller automatically runs a subset of the sysprep process and promotes the server to a domain controller automatically. 

The four primary steps to deploy a cloned virtualized domain controller are as follows: 

. Grant the source virtualized domain controller the permission to be cloned by 

adding the source virtualized domain controller to the Cloneable Domain 

Controllers group. 

. Run Get-ADDCCloningExcludedApplicationListcmdlet in Windows PowerShell to 

determine which services and applications on the domain controller are not compatible with the cloning. . Run New-ADDCCloneConfigFile to create the clone configuration file, which is stored in the C:\Windows\NTDS. . In Hyper-V, export and then import the virtual machine of the source domain controller. 

Run Get-ADDCCloningExcludedApplicationListcmdlet In this procedure, run the Get-ADDCCloningExcludedApplicationListcmdlet on the source virtualized domain controller to identify any programs or services that are not evaluated for cloning. You need to run the Get-ADDCCloningExcludedApplicationListcmdlet before the New-ADDCCloneConfigFilecmdlet because if the New-ADDCCloneConfigFilecmdlet detects an excluded application, it will not create a DCCloneConfig.xml file. To identify applications or services that run on a source domain controller which have not been evaluated for cloning Get-ADDCCloningExcludedApplicationList Get-ADDCCloningExcludedApplicationList -GenerateXml 

The clone domain controller will be located in the same site as the source domain controller unless a different site is specified in the DCCloneConfig.xml file. Note: The Get-ADDCCloningExcludedApplicationListcmdlet searches the local domain controller for programs and services in the installed programs database, the services control manager that are not specified in the default and user defined inclusion list. The applications in the resulting list can be added to the user defined exclusion list if they are determined to support cloning. If the applications are not cloneable, they should be removed from the source domain controller before the clone media is created. Any application that appears in cmdlet output and is not included in the user defined inclusion list will force cloning to fail. The Get-ADDCCloningExcludedApplicationListcmdlet needs to be run before the New-ADDCCloneConfigFilecmdlet is used because if the New-ADDCCloneConfigFilecmdlet detects an excluded application, it will not create a DCCloneConfig.xml file. DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways. 

The New-ADDCCloneConfigcmdlet in PowerShell By hand with an XML editor By editing an existing config file, again with an XML editor (Notepad is not an XML editor.) 

You can populate the XML file. . . . . doesn't need to be empty. . . . . 

http: //technet. microsoft. com/en-us/library/hh831734. aspx http: //blogs. dirteam. com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-cloning. aspx 


Q143. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

On Server1, an administrator creates a virtual machine named VM1. 

A user named User1 is the member of the local Administrators group on Server1. 

User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the 

Exhibit button.) 

You need to ensure that User1 can modify the settings of VM1 by running the Set-

Vmcmdlet. 

What should you instruct User1 to do? 

Exhibit: 

A. Run Windows PowerShell with elevated privileges 

B. Install the Integration Services on VM1 

C. Modify the membership of the local Hyper-V Administrators group 

D. Import the Hyper-V module. 

Answer:


Q144. OTSPOT 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2 and are configured as DNS servers. All DNS zones are Active Directory-integrated. Active Directory Recycle Bin is enabled. 

You need to modify the amount of time deleted objects are retained in the Active Directory Recycle Bin. 

Which naming context should you use? 

To answer, select the appropriate naming context in the answer area. 

Answer: 


Q145. Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named Server3 and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in a failover cluster named Cluster2. 

You need to move all of the applications and the services from Cluster1 to Cluster2. 

What should you do first from Failover Cluster Manager? 

A. On a server in Cluster1, configure Cluster-Aware Updating. 

B. On a server in Cluster2, configure Cluster-Aware Updating. 

C. On a server in Cluster1, click Migrate Roles. 

D. On a server in Cluster1, click Move Core Cluster Resources, and then click Select Node... 

Answer:

Explanation: 

http://blogs.msdn.com/b/clustering/archive/2012/06/25/10323434.aspx 


Q146. Your network contains an Active Directory domain named adatum.com. 

You have a standard primary zone named adatum.com. 

You need to provide a user named User1 the ability to modify records in the zone. 

Other users must be prevented from modifying records in the zone. 

What should you do first? 

A. Run the Zone Signing Wizard for the zone 

B. From the properties of the zone, change the zone type 

C. Run the new Delegation Wizard for the zone 

D. From the properties of the zone, modify the Start Of Authority (SOA) record 

Answer:


Q147. Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. 

You install the Network Load Balancing feature on the virtual machines. 

You need to configure the virtual machines to support Network Load Balancing (NLB). 

Which virtual machine settings should you configure? 

A. DHCP guard 

B. Port mirroring 

C. Router guard 

D. MAC address 

Answer:

Explanation: http://social.technet.microsoft.com/Forums/windowsserver/en-US/5b3a0a9d-26a2-49ba-bbbe- 29d11fcbb7ce/nlb-on-hyperv?forum=winserverhyperv 

For NLB to be configured you need to enable MAC address spoofing. 


Q148. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the 

Hyper-V server role installed. On Server1, you create a virtual machine named VM1. 

VM1 has a legacy network adapter. 

You need to assign a specific amount of available network bandwidth to VM1. 

What should you do first? 

A. Add a second legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet. 

B. Add a second legacy network adapter, and then configure network adapter teaming. 

C. Remove the legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet. 

D. Remove the legacy network adapter, and then add a network adapter. 

Answer:

95. Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table. 

You install Windows Server 2012 on VM2 by using Windows Deployment Services (WDS). 

You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE. 

Which virtual machine setting should you configure for VM2? 

A. NUMA topology 

B. Resource control 

C. Resource metering 

D. Virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer: G Explanation: 

G. Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from the network is first. 

References: http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p. 144 Training Guide: Installing and Configuring Windows Server 2012: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p. 335 


Q149. You have a server named File1 that runs Windows Server 2012 R2. File1 has the File Server role service installed. You plan to back up all shared folders by using Microsoft Online Backup. 

You download and install the Microsoft Online Backup Service Agent on File1. 

You need to ensure that you use Windows Server Backup to back up data to Microsoft Online Backup. 

What should you do? 

A. From Computer Management, add the File1 computer account to the Backup Operators group. 

B. From the Services console, modify the Log On settings of the Microsoft Online Backup Service Agent. 

C. From Windows Server Backup, run the Register Server Wizard. 

D. From a command prompt, run wbadmin.exe enable backup. 

Answer:

Explanation: 

Download and install the Windows Azure Online Backup Agent After you create an account on the Windows Azure Online Backup website, you can download the Windows Azure Online Backup Agent and install it locally. 

An Online Backup node then appears in the navigation pane of the Windows Server Backup console, as shown in Figure 12-

If you prefer, you can also configure online backups from the Windows Azure Online Backup console, which becomes available after you install the agent. The Windows Azure Online Backup console provides exactly the same set of options as the Online Backup node in the Windows Server Backup console. 

Register server The next step is to register your server. Registering a server enables you to perform backups from that same server only. (Remember this point for the exam.) To register the server, from the Actions menu, select Register Server. The Register Server Wizard includes two configuration steps. First, you are given an opportunity to specify a proxy server if desired. Second, you are asked to provide a passphrase that will be used to encrypt your backup data and a location to save this passphrase in a file. You need to provide this passphrase when you perform a restore operation, so it's essential that you don't lose it. (Microsoft doesn't maintain a copy of your passphrase.) A Generate Passphrase option creates the passphrase for you automatically. After you register a server, new options for Online Backup appear in the Actions pane, including Schedule Backup, Recover Data, Change Properties, and Unregister Server. 


Q150. Your network contains two Active Directory forests named contoso.com and corp.contoso.com 

User1 is a member of the DnsAdmins domain local group in contoso.com. 

User1 attempts to create a conditional forwarder to corp.contoso.com but receive an error message shown in the exhibit. (Click the Exhibit button.) 

You need to configure bi-directional name resolution between the two forests. 

What should you do first? 

A. Add User1 to the DnsUpdateProxy group. 

B. Configure the zone to be Active Directory-integrated 

C. Enable the Advanced view from DNS Manager 

D. Run the New Delegation Wizard 

Answer:

97. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. 

Server1 is the enterprise root certification authority (CA) for contoso.com. You need to enable CA role separation on Server1. 

Which tool should you use? 

A. The Certutil command 

B. The Authorization Manager console 

C. The Certsrv command 

D. The Certificates snap-in 

Answer: