getcertified4sure.com

10 tips on 70 417 exam




Act now and download your Microsoft 70 417 exam test today! Do not waste time for the worthless Microsoft 70 417 exam tutorials. Download Replace Microsoft Upgrading Your Skills to MCSA Windows Server 2012 exam with real questions and answers and begin to learn Microsoft 70 417 exam with a classic professional.

Q61. Which terminology is being described below? 

A _________ trust allows resources in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to be accessed more quickly by users in another domain (which is nested within another domain tree) in your forest. 

A. one-way, outgoing, shortcut 

B. two-way, incoming, shortcut 

C. one-way, outgoing, forest 

D. two-way, incoming, forest 

Answer:

Explanation: 

The direction of the trust is inverse of the direction of the authorization not forest as we're asked for a trust only between 2 domains. a forest trust would provide trust between every single domain of the forest. 


Q62. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. 

You log on to Server1. 

You need to retrieve a list of the active TCP connections on Server2. 

Which command should you run from Server1? 

A. netstat> server2 

B. winrm get server2 

C. winrs -r:server2netstat 

D. dsquery * -scope base -attrip,server2 

Answer:

Explanation: 

This command line tool enables administrators to remotely execute most Cmd.exe commands using the WSManagement protocol. 

References: http://msdn.microsoft.com/en-us/library/aa384291(v=vs.85).aspx 


Q63. Your network contains an Active Directory domain named contoso.com. The domain 

contains a domain controller named DC1 that runs Windows Server 2012 R2. 

You mount an Active Directory snapshot on DC1. 

You need to expose the snapshot as an LDAP server. 

Which tool should you use? 

A. Dsamain 

B. Ntdsutil 

C. Ldp 

D. ADSI Edit 

Answer:

Explanation: Dsamain.exe can you can use to expose the snapshot data as an LDAP server 


Q64. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. 

You have fixed-size VHD named Files.vhd. 

You need to make the contents in Files.vhd available to several virtual machines. The solution must meet the following requirements: 

. Ensure that if the contents are changed on any virtual machine, the changes are not reflected on the other virtual machines. . Minimize the amount of disk space used. 

What should you do? 

A. Create differencing VHD5 that use Files.vhd as the parent disk. 

B. Create a fixed-size VHDX. Transfer the information from Files.vhd to the new VHDX file. 

C. Convert Files.vhd to a dynamically expanding VHD. 

D. Create a dynamically expanding VHDX. Transfer the information from Files.vhd to the new VHDX file. 

Answer:


Q65. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has Microsoft SQL Server 2012 installed. You install the Active Directory Federation Services server role on Server2. You need to configure Server2 as the first Active Directory Federation Services (AD FS) server in the domain. The solution must ensure that the AD FS database is stored in a SQL Server database on Server1. What should you do on Server2? 

A. From Windows PowerShell, run Install-ADFSFarm. 

B. From Windows PowerShell, run Install-ADFSStandAlone. 

C. From the AD FS console, run the AD FS Federation Server Configuration Wizard and select the Stand-alone federation server option. 

D. From Server Manager, install the AD FS Web Agents. 

Answer:

Explanation: 

Install-ADFSFarm with the parameter -SQLConnectionString (thx @Nab from France) 

This is the only valid option. 

http://technet.microsoft.com/en-us/library/ee913579.aspx 

Not: Powershell Install-ADFSStandAlone 

We're not going for StandAlone which is no more for 2012 R2 btw. 

Not: Stand Alone federation. 

Not: ADFS Web Agents 

The Active Directory Federation Services (ADFS) Web Agent is a component of ADFS. It is 

used to consume security tokens and either allow or deny a user access to a Web 

application. To accomplish this, the Web server requires a relationship with a resource 

Federation Service so that it can direct the user to the Federation Service as needed. 


Q66. You have a server named SCI that runs a Server Core Installation of Windows Server 2012 

R2. 

Shadow copies are enabled on all volumes. 

You need to delete a specific shadow copy. The solution must minimize server downtime. 

Which tool should you use? 

A. Shadow 

B. Diskshadow 

C. Wbadmin 

D. Diskpart 

Answer:

Explanation: DiskShadow.exe is a tool that exposes the functionality offered by the 

Volume Shadow Copy Service (VSS). 

The diskshadow command delete shadows deletes shadow copies. 


Q67. You have a server named Server1 that runs Windows Server 2012 R2. 

You install the File and Storage Services server role on Server1. 

From Windows Explorer, you view the properties of a folder named Folder1 and you 

discover that the Classification tab is missing. 

You need to ensure that you can assign classifications to Folder1 from Windows Explorer 

manually. 

What should you do? 

A. Install the File Server Resource Manager role service. 

B. From Folder Options, clear Hide protected operating system files (Recommended). 

C. Install the Share and Storage Management Tools. 

D. From Folder Options, select the Always show menus. 

Answer:

Explanation: 

B. Classification Management is a feature of FSRM http://technet.microsoft.com/en-us/library/dd759252.aspx http://technet.microsoft.com/en-us/library/dd758759(v=WS.10).aspx 


Q68. A user from your organisation has reported to the IT helpdesk that they are receiving the following message: 

"Your account is configured to prevent you from using the computer. Please try another computer." 

What should you do to enable them to log on to their computer? 

A. Use the Dsmove command 

B. Click the Log On To button on the Account tab of her user account 

C. None of these 

D. Click the Allowed To Join Domain button in the New Computer dialog box 

Answer:

Explanation: 

The error message is about the user account configuration. This can be set here: 


Q69. Your network contains a perimeter network and an internal network. The internal network contains an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store. 

You plan to deploy a federation server proxy to a server named Server2 in the perimeter network. 

You need to identify which value must be included in the certificate that is deployed to Server2. 

What should you identify? 

A. The name of the Federation Service 

B. The name of the Active Directory domain 

C. The FQDN of the AD FS server 

D. The public IP address of Server2 

Answer:

Explanation: 

A. It must contain the FQDN http://technet.microsoft.com/en-us/library/cc776786(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc782620(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc759635(v=ws.10).aspx 


Q70. Your network contains a single Active Directory domain named contoso.com. All domain 

controllers run Windows Server 2012 R2. 

The domain contains 400 desktop computers that run Windows 8 and 200 desktop 

computers that run Windows Vista Service Pack 2(SP2). 

All of the desktop computers are located in an organizational unit (OU) named OU1. 

You create a Group Policy object (GPO) named GPO1. GPO1 contains startup script 

settings. 

You link GPO1 to OU1. 

You need to ensure that GPO1 is applied only to computers that run Windows 8. 

What should you do? 

A. Modify the Security settings of OU1. 

B. Create and link a WMI filter to GPO1. 

C. Run the Set-GPInheritancecmdlet and specify the -target parameter. 

D. Run the Set-GPLinkcmdlet and specify the -target parameter. 

Answer:

Explanation: 

WMI Filtering is used to get information of the system and apply the GPO on it with the condition is met.Security filtering: apply a GPO to a specific group (members of the group)