Master the 70 417 vce Upgrading Your Skills to MCSA Windows Server 2012 content and be ready for exam day success quickly with this Examcollection 70 417 dumps study guide. We guarantee it!We make it a reality and give you real 70 417 pdf questions in our Microsoft exam 70 417 braindumps.Latest 100% VALID Microsoft 70 417 vce Exam Questions Dumps at below page. You can use our Microsoft 70 417 vce braindumps and pass your exam.
Q221. You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has following hardware configurations: 16 GB of RAM A single quad-core CPU Three network teams that have two network adapters each
You add additional CPUs and RAM to Server1. You repurpose Server1 as a virtualization host. You install the Hyper-V server role on Server1. You need to create four external virtual switches in Hyper-V.
Which cmdlet should you run first?
A. Add-NetLbfoTeamNic
B. Set-NetAdapter
C. Remove- NetLbfoTeam
D. Add-VMNetworkAdapter
Answer: D
Explanation:
Here we're talking about hardware network adapters which belong to NIC teams Each external virtual switch must be connected to a NIC or a NIC team, so we need 4 NICs or NIC teams but currently only have 3 teams available. =>we need to break a team first and then connect the two last external virtual switches to each of the 2 "liberated" NIC (an other solution could be to add one physical NIC and connect the last external virtual switch to it or add several (two or more) NICs, create a NIC team containing them and connect the external virtual switch to the NIC team) http://technet.microsoft.com/en-us/library/jj130848.aspx NIC Teaming (NetLBFO) Cmdlets in Windows PowerShell Remove-NetLbfoTeam: Removes the specified NIC team from the host. http://technet.microsoft.com/en-us/library/hh831648.aspx NIC Teaming Overview NIC Teaming, also known as load balancing and failover (LBFO), allows multiple network adapters on a computer to be placed into a team for the following purposes: Bandwidth aggregation Traffic failover to prevent connectivity loss in the event of a network component failure This feature has been a requirement for independent hardware vendors (IHVs) to enter the server network adapter market, but until now NIC Teaming has not been included in Windows Server operating systems. Requirements NIC Teaming requires the presence of a single Ethernet network adapter, which can be used for separating traffic that is using VLANs. All modes that provide fault protection through failover require at least two Ethernet network adapters. Windows Server?2012 supports up to 32 network adapters in a team.
Q222. RAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2.
You configure a new failover cluster named Cluster1. Server1 and Server2 are nodes in Cluster1. You need to configure the disk that will be used as a witness disk for Cluster1.
How should you configure the witness disk?
To answer, drag the appropriate configurations to the correct location or locations. Each configuration may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Answer:
Q223. Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Host1. Host1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
Host1 hosts two virtual machines named VM5 and VM6. Both virtual machines connect to a virtual switch named Virtual1.
On VM5, you install a network monitoring application named Monitor1.
You need to capture all of the inbound and outbound traffic to VM6 by using Monitor1.
Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.)
A. Get-VM "VM6" | Set-VMNetworkAdapter-IovWeight 1
B. Get-VM "VM5" | Set-VMNetworkAdapter -IovWeight 0
C. Get-VM "VM6" | Set-VMNetworkAdapter -PortMirroring Source
D. Get-VM "VM6" | Set-VMNetworkAdapter -AllowTeaming On
E. Get-VM "VM5" | Set-VMNetworkAdapter -PortMirroring Destination
F. Get-VM "VM5" | Set-VMNetworkAdapter -AllowTeaming On
Answer: C,E
Explanation: -PortMirroring specifies the port mirroring mode for the network adapter. This can be set to None, Source, and Destination. . If set to Source, a copy of every network packet it sends or receives is forwarded to a virtual network adapter configured to receive the packets. . If set to Destination, it receives copied packets from the source virtual network adapter.
In this scenario, VM5 is the destination which must receive a copy of the network packets from VM6, which s the source.
Reference:
http://technet.microsoft.com/en-us/library/hh848457.aspx
Q224. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.
You add two additional nodes to Cluster1.
You have a folder named Folder1 on Server1 that contains application data.
You plan to provide continuously available access to Folder1.
You need to ensure that all of the nodes in Cluster1 can actively respond to the client requests for Folder1.
What should you configure?
A. Affinity - None
B. Affinity - Single
C. The cluster quorum settings
D. The failover settings
E. A file server for general u
F. The Handling priority
G. The host priority
H. Live migration
I. The possible owner
J. The preferred owner
K. Quick migration
L. The Scale-Out File Server
Answer: L
Explanation:
All of the nodes in Cluster1 can actively respond to the client requests for Folder1 => Scale-Out File Server http://technet.microsoft.com/en- us/library/hh831349.aspx Scale-Out File Server for Application data (Scale-Out File Server) This clustered file server is introduced in Windows Server 2012 R2 and lets you store server Application data, such as Hyper-V virtual machine files, on file shares, and obtain a similar level of reliability, availability, manageability, and high performance that you would expect from a storage area network. All file shares are online on all nodes simultaneously. File shares associated with this type of clustered file server are called scale-out file shares. This is sometimes referred to as active- active. For more information on how to deploy ScaleOut File Server: http://technet.microsoft.com/en-us/library/hh831359.aspx Deploy Scale-Out File Server
Q225. You have a server named Served that runs Windows Server 2012 R2. You connect three new hard disks to Server 1.
You need to create a storage space that contains the three disks.
The solution must meet the following requirements:
. Provide fault tolerance if a single disk fails.
. Maximize the amount of useable storage space.
What should you create?
A. A spanned volume
B. A simple space
C. A parity space
D. A mirrored space
Answer: C
Explanation:
Simple space does not provide fault tolerance, neither does spanned volumes, whereas parity & mirrored spaces do. So the question is parity space or mirrored space to maximize the amount of useable storage space? http://en.wikipedia.org/wiki/Spanned_volume Unlike RAID, spanned volumes have no fault- tolerance, so if any disk fails, the data on the whole volume could be lost. http://arstechnica.com/information-technology/2012/10/storage-spaces-explained-a-greatfeaturewhen-itworks/ Storage Spaces explained: a great feature, when it works Three-way mirroring gives you less usable space than two-way mirroring, but can tolerate the failure of up to two disks at once.
Parity mirroring gives more usable space than either mirroring mode (a 20GB storage space configured with two-way mirroring will require about 40GB of physical disk space, but a 20GB parity storage space requires only about 30GB) but comes with the aforementioned performance hit. http://technet.microsoft.com/en-us/library/jj822938.aspx
Q226. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled.
You install the DHCP server role on a virtual machine named Server1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope.
You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1.
You need to ensure that the virtual machines can use Server1 as a DHCP server.
What should you do?
A. Enable MAC address spoofing on Server1.
B. Enable single-root I/O visualization (SR-IOV) on Server1.
C. Disable the DHCP guard on Server1.
D. Disable the DHCP guard on all of the virtual machines that are DHCP clients.
Answer: C
Explanation: DHCP guard setting This setting stops the virtual machine from making DHCP offers over this network interface. To be clear – this does not affect the ability to receive a DHCP offer (i.e. if you need to use DHCP to acquire an IP address that will work) it only blocks the ability for the virtual machine to act as a DHCP server.
Q227. You have a server named Server1 that runs Windows Server 2012 R2. Server1 is located
in the perimeter network and has the DNS Server server role installed.
Server1 has a zone named contoso.com.
You apply a security template to Server1.
After you apply the template, users report that they can no longer resolve names from
contoso.com.
On Server1, you open DNS Manager as shown in the DNS exhibit. (Click the Exhibit button.)
On Server1, you open Windows Firewall with Advanced Security as shown in the Firewall exhibit. (Click the Exhibit button.)
You need to ensure that users can resolve contoso.com names.
What should you do?
A. From Windows Firewall with Advanced Security, disable the DNS (TCP, Incoming) rule and the DNS (UDP, Incoming) rule.
B. From DNS Manager, modify the Zone Transfers settings of the contoso.com zone.
C. From DNS Manager, unsign the contoso.com zone.
D. From DNS Manager, modify the Start of Authority (SOA) of the contoso.com zone.
E. From Windows Firewall with Advanced Security, modify the profiles of the DNS (TCP,
Incoming) rule and the DNS (UDP, Incoming) rule.
Answer: E
Q228. Your network contains two Active Directory forests named contoso.com and corp.contoso.com
User1 is a member of the DnsAdmins domain local group in contoso.com.
User1 attempts to create a conditional forwarder to corp.contoso.com but receive an error message shown in the exhibit. (Click the Exhibit button.)
You need to configure bi-directional name resolution between the two forests.
What should you do first?
A. Add User1 to the DnsUpdateProxy group.
B. Configure the zone to be Active Directory-integrated
C. Enable the Advanced view from DNS Manager
D. Run the New Delegation Wizard
Answer: B
97. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012.
Server1 is the enterprise root certification authority (CA) for contoso.com. You need to enable CA role separation on Server1.
Which tool should you use?
A. The Certutil command
B. The Authorization Manager console
C. The Certsrv command
D. The Certificates snap-in
Answer: A
Q229. OTSPOT
You have a server that runs Windows Server 2012 R2 and has the iSCSI Target Server role service installed.
You run the New-IscsiVirtualDisk cmdlet as shown in the New-IscsiVirtualDisk exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibits. Each correct selection is worth one point.
Answer:
Q230. OTSPOT
You have a server named Server1 that runs Windows Server 2012 R2. Server1 does not have Internet connectivity.
All roles are removed completely from Server1.
You mount a Windows Server 2012 R2 installation image to the C:\Source folder.
You need to install the DNS Server server role on Server1.
Which folder should you use as the source?
To answer, select the appropriate folder in the answer area.
Answer:
211. Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
DirectAccess is deployed to the network.
Remote users connect to the DirectAccess server by using a variety of network speeds.
The remote users report that sometimes their connection is very slow.
You need to minimize Group Policy processing across all wireless wide area network
(WWAN) connections.
Which Group Policy setting should you configure?
A. Configure Direct Access connections as a fast network connection.
B. Change Group Policy processing to run asynchronously when a slow network connection is detected.
C. Configure Group Policy slow link detection.
D. Configure wireless policy processing.
Answer: C