Exam Code: microsoft 70 417 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Upgrading Your Skills to MCSA Windows Server 2012
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70 417 exam Exam.
Q61. You have a server named Served that runs Windows Server 2012 R2. Server1 has five network adapters.
Three of the network adapters are connected to a network named LAN1. The two other network adapters are connected to a network named LAN2. You create a network adapter team named Team1 from two of the adapters connected to LAN1. You create a network adapter team named Team2 from the two adapters connected to LAN2. A company policy states that all server IP addresses must be assigned by using a reserved address in DHCP. You need to identify how many DHCP reservations you must create for Server1.
How many reservations should you identify?
A. 2
B. 3
C. 5
D. 7
Answer: B
Explanation: 1 reservation for the NIC team on LAN1 1 reservation for the stand-alone NIC on LAN1 1 reservation for the NIC team on LAN2 => 3 reservations.
Q62. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.
Active Directory Recycle Bin is enabled. You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago. You need to restore the membership of Group1.
What should you do?
A. Export and import data by using Dsamain.
B. Apply a virtual machine snapshot to VM1.
C. Recover the items by using Active Directory Recycle Bin.
D. Modify the isRecycled attribute of Group1.
Answer: A
Explanation:
As far as the benefits of the Windows 2012 Recycle Bin, they are the same as the Windows 2008 R2 recycle bin with the exception of the new user interface which makes it more user-friendly. These additional benefits include: All deleted AD object information including attributes, passwords and group membership can be selected in mass then undeleted from the user interface instantly or via Powershell User-friendly and intuitive interface to filter on AD objects and a time period • Can undelete containers with all child objects https://www.simple-talk.com/sysadmin/exchange/the-active-directory-recycle-bin-in-windows-server-2008-r2/ http://communities.quest.com/community/quest-itexpert/blog/2012/09/24/the-windows-server-2012-recycle-bin-and-recovery-manager-for-active- directory
Q63. RAG DROP
Your network contains three servers. The servers are configured as shown in the following tablE.
Your company plans to standardize all of the servers on Windows Server 2012 R2.
You need to recommend an upgrade path for each server.
The solution must meet the following requirements: . Upgrade the existing operating system whenever possible. . Minimize hardware purchases. Which upgrade path should you recommend for each server?
To answer, drag the appropriate upgrade path to each server in the answer area.Each upgrade path may be used once, more than once, or not at all.
Answer:
148. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
In a remote site, a support technician installs a server named DC10 that runs Windows Server 2012 R2. DC10 is currently a member of a workgroup.
You plan to promote DC10 to a read-only domain controller (RODC).
You need to ensure that a user named Contoso\User1 can promote DC10 to a RODC in the contoso.com domain.
The solution must minimize the number of permissions assigned to User1.
What should you do?
A. From Active Directory Administrative Center, pre-create an RODC computer account.
B. FromDsmgmt, run the local roles command.
C. Join DC10 to the domain. Modify the properties of the DC10 computer account.
D. Join DC10 to the domain. Run dsmod and specify the /server switch.
Answer: A
Explanation:
A staged read only domain controller (RODC) installation works in two discrete phases:
1.
Staging an unoccupied computer account
2.
Attaching an RODC to that account during promotion Reference: Install a Windows Server 2012 R2 Active Directory Read-Only Domain Controller (RODC)
Q64. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named CONT1 and CONT2. Both servers run Windows Server 2012
R2.
CONT1 has a shared printer named Printer1. CONT2 connects to Printer1 on CONT1.
When you attempt to remove Printer1 from CONT2, you receive the error message shown
in the exhibit. (Click the Exhibit button.)
You successfully delete the other printers installed on CONT2.
You need to identify what prevents you from deleting Printer1 on CONT2.
What should you identify?
A. Printer1 is deployed as part of a mandatory profile
B. Printer1 is deployed by using a Group Policy object (GPO)
C. Your user account is not a member of the Print Operators group on CONT2
D. Your user account is not a member of the Print Operators group on CONT1
Answer: B
Q65. Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and 10 web servers. All of the web servers are in an organizational unit (OU) named WebServers_OU. All of the servers run Windows Server 2012 R2.
On Server1, you need to collect the error events from all of the web servers. The solution must ensure that when new web servers are added to WebServers_OU, their error events are collected automatically on Server1.
What should you do?
A. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting.
B. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting.
C. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting.
D. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting.
Answer: D
Q66. Your network contains a server named Server1 that runs Windows Server 2012. Server1
has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You install a network monitoring application on VM2.
You need to ensure that all of the traffic sent to VM3 can be captured on VM2.
What should you configure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Answer: J
Explanation:
http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror What's New in Hyper-V Virtual Switch Port Mirroring With Port Mirroring, traffic sent to or from a Hyper-V Virtual Switch port is copied and sent to a mirror port. There are a range of applications for port mirroring an entire ecosystem of network visibility companies exist that have products designed to consume port mirror data for performance management, security analysis, and network diagnostics. With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch port that receives copies of all the traffic. The following examples configure port mirroring so that all traffic that is sent and received by both MyVM and MyVM2 is also sent to the VM named MonitorVM. Set-VMNetworkAdapter VMName MyVM PortMirroring Source Set-VMNetworkAdapter VMName MyVM2 PortMirroring Source Set-VMNetworkAdapter VMName MonitorVM PortMirroring Destination
Q67. Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.
Your company has users who work from home. Some of the home users have desktop computers. Other home users have laptop computers. All of the computers are joined to the domain.
All of the computer accounts are members of a group named Group1. Currently, the home users access the corporate network by using a PPTP VPN. You implement DirectAccess by using the default configuration and you specify Group1 as the DirectAccess client group.
The home users who have desktop computers report that they cannot use DirectAccess to access the corporate network.
The home users who have laptop computers report that they can use DirectAccess to access the corporate network.
You need to ensure that the home users who have desktop computers can access the network by using DirectAccess.
What should you modify?
A. The WMI filter for Direct Access Client Settings GPO
B. The conditions of the Connections to Microsoft Routing and Remote Access server policy
C. The membership of the RAS and IAS Servers group
D. The security settings of the computer accounts for the desktop computers
Answer: A
Explanation:
The default settings includes creating a GPO that has a WMI filter for laptops only.
Q68. Your network contains two servers named Server 1 and Server 2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed. Server 1 and Server 2 are located in different offices. The offices connect to each other by using a high-latency WAN link.
Server 1 hosts a virtual machine named VM1.
You need to ensure that you can start VM1 on Server 2 if Server 1 fails. The solution must minimize hardware costs.
What should you do?
A. From the Hyper-V Settings of Server2, modify the Replication Configuration settings. Enable replication for VM1.
B. on Server 1, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1.
C. on Server2, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1.
D. From the Hyper-V Settings of Server1, modify the Replication Configuration settings. Enable replication for Vml.
Answer: A
Q69. RAG DROP
You have a server named Server2 that runs Windows Server 2012 R2. You have storage provisioned on Server2 as shown in the exhibit. (Click the Exhibit button.)
You need to configure the storage so that it appears in Windows Explorer as a drive letter on Server1.
Which three actions should you perform in sequence? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q70. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed.
The network contains an enterprise certification authority (CA). All servers are enrolled automatically for a certificate-based on the Computer certificate template.
On Server1, you have a virtual machine named VM1. VM1 is replicated to Server2.
You need to encrypt the replication of VM1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. On Server2, modify the Hyper-V Settings.
B. On Server1, modify the settings of VM1.
C. On Server2, modify the settings of VM1.
D. On Server1, modify the settings of the virtual switch to which VM1 is connected.
E. On Server1, modify the Hyper-V Settings.
F. On Server2, modify the settings of the virtual switch to which VM1 is connected.
Answer: A,B
Explanation: Once you change the Hyper-V Settings of Server 2 to encrypt replications with a certificate, you then need to change the replication information of VM1 to use the secure connection.
http://technet.microsoft.com/en-us/library/jj134240.aspx