getcertified4sure.com

Secrets to testking 70-417




Our Microsoft Microsoft exam questions along with answers are presented in a pair of versions. One is Pdf formats that are printable and the other is Analyze Engine software thats downloadable. Both are free to suit your needs after buying. Stay at home and download the actual Microsoft test serp and understand them with your own pace. All the required practice materials within the Microsoft exam braindumps are valuable for you to prepare for your Microsoft 70-417 exam. Our team regarding certified experts study and create the actual Microsoft certification exam dumps according to the actual syllabus of the Microsoft actual test. The 70-417 practice questions are updated constantly and supplied on the Testking web site timely. You should visit the home site regularly in order to revise your current Microsoft Microsoft exam practice tests in moment.

2021 Dec trainsignal 70-417:

Q31. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server 2012 R2 and hosts a processor-intensive application named App1. 

Users report that App1 responds more slowly than expected. 

You need to monitor the processor usage on VM1 to identify whether changes must be made to the hardware settings of VM1. 

Which performance object should you monitor on Server1? 

A. Hyper-V Hypervisor Logical Processor 

B. Hyper-V Hypervisor Root Virtual Processor 

C. Processor 

D. Hyper-V Hypervisor Virtual Processor 

E. Process 

Answer:

Explanation: 

http://social.technet.microsoft.com/wiki/contents/articles/1234.hyper-v-concepts-vcpu-virtual-processor.aspx http://blogs.msdn.com/b/tvoellm/archive/2008/05/12/hyper-v-performance-counters-part-four-of-many-hyper-v-hypervisor-virtual-processor-and- hyper-v-hypervisor-root-virtual-processor-counter-set.aspx 


Q32. Your network contain an active directory domain named Contoso.com. The domain contains two servers named server1 and server2 that run Windows Server 2012 R2. You create a security template named template1 by using the security template snap-in. You need to apply template1 to server2. 

Which tool should you use? 

A. Security Configuration and Analysis 

B. Server Manager 

C. Security Template 

D. Computer management 

Answer:


Q33. Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers. The domain controllers are configured as shown in the following table. 

The network contains a server named Server1 that has the Hyper-V server role installed. DC6 is a virtual machine that is hosted on Server1. 

You need to ensure that you can clone DC6. 

What should you do? 

A. Transfer the PDC emulator to DC5 

B. Transfer the schema master to DC4 

C. Transfer the PDC emulator to DC2 

D. Transfer the schema master to DC6 

Answer:

Explanation: A Windows Server 2012 Server running the PDC emulator is required. 

The requirements for virtualized DC cloning include: 

*

 The PDC emulator must run Windows Server 2012. You can clone PDC emulator if it is virtualized. 

*

 The virtualized DC that is used as a source for cloning must run Windows Server 2012 and be a member of the Cloneable Domain Controllers group. 

Note: Using virtualized domain controller cloning in Windows Server 2012 to expedite forest recovery Virtualized domain controller (DC) cloning simplifies and expedites the process for installing additional virtualized DCs in a domain, especially in centralized locations such as datacenters where several DCs run on hypervisors. After you restore one virtual DC in each domain from backup, additional DCs in each domain can be rapidly brought online by using the virtualized DC cloning process. You can prepare the first virtualized DC that you recover, shut it down, and then copy that virtual hard disk as many times as is necessary in order to create cloned virtualized DCs to build out the domain. 

Reference: New Features, Assumptions, and Prerequisites for Using This Guide for Planning Active Directory Forest Recovery 


Q34. Your network contains an Active Directory forest named contoso.com. Users frequently access the website of an external partner company. The URL of the website is http://partners.adatum.com. 

The partner company informs you that it will perform maintenance on its Web server and that the IP addresses of the Web server will change. 

After the change is complete, the users on your internal network report that they fail to access the website. 

However, some users who work from home report that they can access the website. 

You need to ensure that your DNS servers can resolve partners.adatum.com to the correct IP address immediately. 

What should you do? 

A. Run dnscmd and specify the CacheLockingPercent parameter 

B. Run Set-DnsServerGlobalQueryBlockList 

C. Run ipconfig and specify the Renew parameter 

D. Run Set-DnsServerCache 

Answer:


Q35. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are configured as shown in the following table. 

You need to ensure that when new targets are added to Server1, the targets are registered on Server2 automatically. 

What should you do on Server1? 

A. Configure the Discovery settings of the iSCSI initiator 

B. Configure the security settings of the iSCSI target 

C. Run the Set-Wmilnstance cmdlet 

D. Run the Set-IscsiServerTarget cmdlet 

Answer:


Up to the immediate present test question 70-417:

Q36. You have a DNS server named DNS1 that runs Windows Server 2012 R2. 

On DNS1, you create a standard primary DNS zone named adatum.com. 

You need to change the frequency that secondary name servers will replicate the zone 

from DNS1. 

Which type of DNS record should you modify? 

A. Name server (NS) 

B. Start of authority (SOA) 

C. Host information (HINFO) 

D. Service location (SRV) 

Answer:

Explanation: 

The time to live is specified in the Start of Authority (SOA) record Note: TTL (time to live) - The number of seconds a domain name is cached locally before expiration and return to authoritative nameservers for updated information. 


Q37. You are a network administrator of an Active Directory domain named contoso.com. 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the 

DHCP Server server role and the Network Policy Server role service installed. 

You enable Network Access Protection (NAP) on all of the DHCP scopes on Server1. 

You need to create a DHCP policy that will apply to all of the NAP non-compliant DHCP 

clients. 

Which criteria should you specify when you create the DHCP policy? 

A. The user class 

B. The vendor class 

C. The client identifier 

D. The relay agent information 

Answer:


Q38. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1. Server1 has the IP Address Management (IPAM) Server feature installed. 

On DC1, you configure Windows Firewall to allow all of the necessary inbound ports for IPAM. 

On Server1, you open Server Manager as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can use IPAM on Server1 to manage DNS on DC1. 

What should you do? 

A. Add Server1 to the Remote Management Users group. 

B. Modify the outbound firewall rules on Server1. 

C. Add Server1 to the Event Log Readers group. 

D. Modify the inbound firewall rules on Server1. 

Answer:

Explanation: 

The exhibit shows (in the details tab) that firewall rules are OK for DNS management (DNS RPC Access Status Unblocked) But it shows too that Event log Access Status is blocked (which by the way blocks the IPAM Access Status) => We should solve this by adding the Server1 computer account to the Event Log Readers group Understand and Troubleshoot IP Address Management (IPAM) in Windows Server 8 Beta (download.microsoft.com) IPAM Access Monitoring 


Q39. RAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server3. The network contains a standalone server named Server2. All servers run Windows Server 2012 R2. The servers are configured as shown in the following table. 

Server3 hosts an application named App1. App1 is accessible internally by using the URL https://app1.contoso.com. App1 only supports Integrated Windows authentication. 

You need to ensure that all users from the Internet are pre-authenticated before they can access App1. 

What should you do? To answer, drag the appropriate servers to the correct actions. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q40. OTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 does not have Internet connectivity. 

All roles are removed completely from Server1. 

You mount a Windows Server 2012 R2 installation image to the C:\Source folder. 

You need to install the DNS Server server role on Server1. 

Which folder should you use as the source? 

To answer, select the appropriate folder in the answer area. 

Answer: 

211. Your network contains an Active Directory domain named contoso.com. All domain 

controllers run Windows Server 2012 R2. 

DirectAccess is deployed to the network. 

Remote users connect to the DirectAccess server by using a variety of network speeds. 

The remote users report that sometimes their connection is very slow. 

You need to minimize Group Policy processing across all wireless wide area network 

(WWAN) connections. 

Which Group Policy setting should you configure? 

A. Configure Direct Access connections as a fast network connection. 

B. Change Group Policy processing to run asynchronously when a slow network connection is detected. 

C. Configure Group Policy slow link detection. 

D. Configure wireless policy processing. 

Answer: