getcertified4sure.com

Ideas to 70 417 pdf




Your success in Microsoft microsoft 70 417 is our sole target and we develop all our 70 417 exam braindumps in a way that facilitates the attainment of this target. Not only is our exam 70 417 study material the best you can find, it is also the most detailed and the most updated. exam 70 417 Practice Exams for Microsoft 70 417 exam are written to the highest standards of technical accuracy.

Q161. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC4 that runs Windows Server 2012 R2. 

You create a DCCIoneConfig.xml file. You need to clone DC4. 

Where should you place DCCIoneConfig.xml on DC4? 

A. %Systemroot%\SYSVOL 

B. %Systemdrive% 

C. %Systemroot%\NTDS 

D. %Programdata%\Microsoft 

Answer:

Explanation: 

http://technet.microsoft.com/de-de/library/hh831734.aspx 


Q162. Your network contains three servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2. 

You need to ensure that Server1 can provide iSCSI storage for Server2 and Server3. What should you do on Server1? 

A. Install the iSCSI Target Server role service and configure iSCSI targets 

B. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties 

C. Install the iSNS Server service feature and create a Discovery Domain 

D. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties 

Answer:


Q163. Which of the following reasons justifies why you should audit failed events? 

A. To log resource access for reporting and billing 

B. To monitor for malicious attempts to access a resource which has been denied 

C. None of these 

D. To monitor access that would suggest users are performing actions greater than you had planned 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc778162%28v=ws.10%29.aspx Auditing Security Events Best practices If you decide to audit failure events in the policy change event category, you can see if unauthorized users or attackers are trying to change policy settings, including security policy settings. Although this can be helpful for intrusion detection, the increase in resources that is required and the possibility of a denial-of-service attack usually outweigh the benefits. 


Q164. Your network contains two servers named Server 1 and Server 2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed. Server 1 and Server 2 are located in different offices. The offices connect to each other by using a high-latency WAN link. 

Server 1 hosts a virtual machine named VM1. 

You need to ensure that you can start VM1 on Server 2 if Server 1 fails. The solution must minimize hardware costs. 

What should you do? 

A. From the Hyper-V Settings of Server2, modify the Replication Configuration settings. Enable replication for VM1. 

B. on Server 1, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1. 

C. on Server2, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1. 

D. From the Hyper-V Settings of Server1, modify the Replication Configuration settings. Enable replication for Vml. 

Answer:


Q165. RAG DROP 

Your network contains an Active Directory domain named contoso.com. All client computers run Windows 7. Group Policy objects (GPOs) are linked to the domain as shown in the exhibit. (Click the Exhibit button.) 

GPO2 contains user configurations only and GPO3 contains computer configurations only. 

You need to configure the GPOs to meet the following requirements: 

. Ensure that GPO2 only applies to the user accounts in OU2 that are members of a global group named Group2. 

. Ensure that GPO3 only applies to the computer accounts in OU3 that have more than 100 GB of free disk space. 

What should you do? 

To answer, drag the appropriate setting to the correct GPO. Each setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q166. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two organizational units (OUs) named OU1 and OU2 in the root of the domain. Two Group Policy objects (GPOs) named GPO1 and GP02 are created. GPO1 is linked to OU1. 

GPO2 is linked to OU2. OU1 contains a client computer named Computer1. OU2 contains a user named User1. You need to ensure that the GPOs Applied to Computer1areApplied to User1 when User1 logs on. 

What should you configure? 

A. The GPO Status 

B. WMI Filtering 

C. GPO links 

D. Item-level targeting 

Answer:


Q167. Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2. You need to create a custom Active Directory Application partition. 

Which tool should you use? 

A. Netdom 

B. Ntdsutil 

C. Dsmod 

D. Dsamain 

Answer:

Explanation: 

*

 To create or delete an application directory partition Open Command Prompt. Type:ntdsutil At the ntdsutil command prompt, type:domain management At the domain management command prompt, type:connection At the server connections command prompt, type:connect to server ServerName At the server connections command prompt, type:quit At the domain management command prompt, do one of the following: 

*

 partition management Manages directory partitions for Active Directory Domain Services (AD DS) or Active Directory Lightweight Directory Services (AD LDS). This is a subcommand of Ntdsutil and Dsmgmt. Ntdsutil and Dsmgmt are command-line tools that are built into Windows Server 2008 and Windows Server 2008 R2. / partition management create nc %s1 %s2 Creates the application directory partition with distinguished name %s1, on the Active Directory domain controller or AD LDS instance with full DNS name %s2. If you specify "NULL" for %s2, this command uses the currently connected Active Directory domain controller. Use this command only with AD DS. For AD LDS, use create nc %s1 %s2 %s3. Note: 

*

 An application directory partition is a directory partition that is replicated only to specific domain controllers. A domain controller that participates in the replication of a particular application directory partition hosts a replica of that partition. 


Q168. Your network contains a server named Server1 that runs Windows Server 2012. Server1 

has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

You plan to schedule a complete backup of Server1 by using Windows Server Backup. 

You need to ensure that the state of VM1 is saved before the backup starts. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. Resource metering 

D. Virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

http://www.altaro.com/hyper-v/vss-crash-consistent-vs-Application-consistent-vss-backupspost-2- of-2/ Backup Operations in Hyper-V No VSS Writer Available? In some cases, you need an Application-consistent backup but there is no VSS writer available. One example of this is MySQL. Hyper-V backups of virtual machines containing MySQL will always result in either a crashconsistent or an image-level backup. For MySQL, the latter is probably acceptable as MySQL doesn't perpetually expand the log file. However, if you're using MySQL within a VSS-aware VM, then a Hyper-Vbased backup tool is going to take a crash-consistent backup. MySQL (like any other database system) isn't always recoverable from a crash-consistent backup; tool is going to take a crash-consistent backup. MySQL (like any other database system) isn't always recoverable from a crash-consistent backup; even when recovery is possible, it may be painful. MySQL is just one example; any number of line-of-business Applications could tell a similar tale. In the case of MySQL, one solution is to find a guest-level backup Application that is MySQL- aware and can back it up properly. For Applications for which no backup Application has a plug-in, you may need to have pre-and post-backup scripts that stop services or close Applications. If brief downtime is acceptable, you can disable the Backup item in Hyper-V Integration Services, thereby forcing Hyper-V to save the state of the VM during backup. This technique results in an image-level backup and can 

be used on any Application that doesn't have a VSS writer. 


Q169. Your network contains two Hyper-V hosts named Host1 and Host2. Host1 contains a virtual machine named VM1. Host2 contains a virtual machine named VM2. VM1 and VM2 run Windows Server 2012 R2. 

You install the Network Load Balancing feature on VM1 and VM2. 

You need to ensure that the virtual machines are configured to support Network Load Balancing (NLB). 

Which virtual machine settings should you configure on VM1 and VM2? 

A. DHCP guard 

B. MAC address 

C. Router guard 

D. Port mirroring 

Answer:

Explanation: When MAC addresses are not assigned to virtual machines, it could cause network problems. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V virtualization, Lesson 1: Deploying and configuring Hyper-V hosts, p. 313-319 http://blogs.msdn.com/b/clustering/archive/2010/07/01/10033544.aspx 


Q170. Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2. 

Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. 

You create a checkpoint of VM1, and then you install an application on VM1. You verify 

that the application runs properly. 

You need to ensure that the current state of VM1 is contained in a single virtual hard disk 

file. 

The solution must minimize the amount of downtime on VM1. 

What should you do? 

A. From a command prompt run dism.exe and specify the /commit-image parameter. 

B. From a command prompt, run dism.exe and specify the /delete-image parameter. 

C. From Hyper-V Manager, delete the checkpoint. 

D. From Hyper-V Manager, inspect the virtual hard disk. 

Answer: