getcertified4sure.com

Super ways to 70 417 exam




Want to know Ucertify 70 417 pdf Exam practice test features? Want to lear more about Microsoft Upgrading Your Skills to MCSA Windows Server 2012 certification experience? Study Vivid Microsoft 70 417 pdf answers to Abreast of the times 70 417 dumps questions at Ucertify. Gat a success with an absolute guarantee to pass Microsoft 70 417 exam (Upgrading Your Skills to MCSA Windows Server 2012) test on your first attempt.

Q81. Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2. You need to create a custom Active Directory Application partition. 

Which tool should you use? 

A. Netdom 

B. Ntdsutil 

C. Dsmod 

D. Dsamain 

Answer:

Explanation: 

*

 To create or delete an application directory partition Open Command Prompt. Type:ntdsutil At the ntdsutil command prompt, type:domain management At the domain management command prompt, type:connection At the server connections command prompt, type:connect to server ServerName At the server connections command prompt, type:quit At the domain management command prompt, do one of the following: 

*

 partition management Manages directory partitions for Active Directory Domain Services (AD DS) or Active Directory Lightweight Directory Services (AD LDS). This is a subcommand of Ntdsutil and Dsmgmt. Ntdsutil and Dsmgmt are command-line tools that are built into Windows Server 2008 and Windows Server 2008 R2. / partition management create nc %s1 %s2 Creates the application directory partition with distinguished name %s1, on the Active Directory domain controller or AD LDS instance with full DNS name %s2. If you specify "NULL" for %s2, this command uses the currently connected Active Directory domain controller. Use this command only with AD DS. For AD LDS, use create nc %s1 %s2 %s3. Note: 

*

 An application directory partition is a directory partition that is replicated only to specific domain controllers. A domain controller that participates in the replication of a particular application directory partition hosts a replica of that partition. 


Q82. Your network contains a perimeter network and an internal network. The internal network contains an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store. 

You plan to deploy a federation server proxy to a server named Server2 in the perimeter network. 

You need to identify which value must be included in the certificate that is deployed to Server2. 

What should you identify? 

A. The name of the Federation Service 

B. The name of the Active Directory domain 

C. The FQDN of the AD FS server 

D. The public IP address of Server2 

Answer:

Explanation: 

A. It must contain the FQDN http://technet.microsoft.com/en-us/library/cc776786(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc782620(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc759635(v=ws.10).aspx 


Q83. Your network contains a domain controller named DC1 that runs Windows Server 2012 R2. You create a custom Data Collector Set (DCS) named DCS1. 

You need to configure DCS1 to collect the following information: 

. The amount of Active Directory data replicated between DC1 and the other domain controllers . The current values of several registry settings 

Which two should you configure in DCS1? (Each correct answer presents part of the solution. Choose two.) 

A. Event trace data 

B. A Performance Counter Alert 

C. System configuration information 

D. A performance counter 

Answer: C,D 


Q84. Sometimes its important to remove an RODC from your forest or domain. However, its important that you follow a simple rule whilst removing RODC's. What is this rule? 

A. All RODC's must be detached before removing a final writable domain controller 

B. All writable domain controllers must be removed before RODC's can be detached 

C. Your forest must only consist of RODC's if you want to remove them 

D. There are no rules for removing RODC's 

Answer:

Explanation: 

After researching this and using logic, we need a writable DC for a RODC to exist, therefore we have to remove all RODC's before removing the last writable DC. 


Q85. OTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You have a failover cluster named Cluster1 that contains two nodes named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. 

You plan to create two virtual machines that will run an application named App1. App1 will store data on a virtual hard drive named App1data.vhdx. App1data.vhdx will be shared by both virtual machines. 

The network contains the following shared folders: 

An SMB file share named Share1 that is hosted on a Scale-Out File Server. An SMB file share named Share2 that is hosted on a standalone file server. An NFS share named Share3 that is hosted on a standalone file server. 

You need to ensure that both virtual machines can use App1data.vhdx simultaneously. 

What should you do? 

To answer, select the appropriate configurations in the answer area. 

... 

Answer: 


Q86. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Server1 runs Windows Server 2012 R2. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server server role installed. You need to manage DHCP on Server2 by using the DHCP console on Server1. 

What should you do first? 

A. From a command prompt on Server2/ run winrm.exe. 

B. From Internet Explorer on Server2, download and install Windows Management Framework 3.0. 

C. From Server Manager on Server2, enable Windows Remote Management. 

D. From Windows PowerShell on Server1, run Install-WindowsFeature. 

Answer:


Q87. OTSPOT 

You have a file server named Server1 that runs Windows Server 2012 R2. 

Server1 contains a file share that must be accessed by only a limited number of users. 

You need to ensure that if an unauthorized user attempts to access the file share, a custom access-denied message appears, which contains a link to request access to the share. The message must not appear when the unauthorized user attempts to access other shares. 

Which two nodes should you configure in File Server Resource Manager? To answer, select the appropriate two nodes in the answer area. 

Answer: 


Q88. Your network contains an Active Directory domain named contoso.com. The domain 

contains a domain controller named DC1 that runs Windows Server 2012 R2. 

You mount an Active Directory snapshot on DC1. 

You need to expose the snapshot as an LDAP server. 

Which tool should you use? 

A. Dsamain 

B. Ntdsutil 

C. Ldp 

D. ADSI Edit 

Answer:

Explanation: Dsamain.exe can you can use to expose the snapshot data as an LDAP server 


Q89. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed.Server1 and Server2 are configured as Hyper-V replicas of each other. 

Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1. 

You need to verify whether the replica of VMS on Server1 is functional. The solution must ensure that VM5 remains accessible to clients. 

What should you do from Hyper-V Manager? 

A. On Server1, execute a Planned Failover. 

B. On Server1, execute a Test Failover. 

C. On Server2, execute a Planned Failover. 

D. On Server2,execute a Test Failover. 

Answer:

Explanation: Test Failover is an operation initiated on your replica virtual machine (here VM5 on Server1) which allows you to test the sanity of the virtualized workload without interrupting your production workload or ongoing replication. Note: At a high level, Hyper-V Replica supports three types of Failover: Test Failover Planned Failover Unplanned Failover 


Q90. You have a server named Server1 that runs Windows Server 2012 R2. 

You connect two new hard disks to Server1. 

You need to create a storage space that contains the two disks. 

The solution must meet the following requirements: 

. Provide fault tolerance if a single disk fails. 

. Maximize the amount of files that can be stored in the storage space. 

What should you create? 

A. a parity space 

B. a simple space 

C. a spanned volume 

D. a mirrored space 

Answer:

Explanation: 

References: http://social.technet.microsoft.com/wiki/contents/articles/15198.storage-spaces-overview.aspx http://technet.microsoft.com/en-us/library/cc772180.aspx Training Guide: Installing and Configuring Windows Server 2012: Chapter 8: File Services and Storage, p. 367-8