getcertified4sure.com

Getting Smart with: 70-417 cbt




Want to know Examcollection 70-417 Exam practice test features? Want to lear more about Microsoft Upgrading Your Skills to MCSA Windows Server 2012 certification experience? Study Tested Microsoft 70-417 answers to Most up-to-date 70-417 questions at Examcollection. Gat a success with an absolute guarantee to pass Microsoft 70-417 (Upgrading Your Skills to MCSA Windows Server 2012) test on your first attempt.

2021 Dec video training 70-417:

Q91. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC5. DC5 has a Server Core Installation of Windows Server 2012 R2. 

You need to uninstall Active Directory from DCS manually. 

Which tool should you use? 

A. The Remove-ADComputercmdlet 

B. The ntdsutil.exe command 

C. The dsamain.exe command 

D. The Remove-WindowsFeaturecmdlet 

Answer:

Explanation: 

Explanation 

*

 Ntdsutil.exe is a command-line tool that provides management facilities for Active 

Directory Domain Services (AD DS) and Active Directory Lightweight Directory Services 

(AD LDS). 

You can use the ntdsutil commands to perform database maintenance of AD DS, manage 

and control single master operations, and remove metadata left behind by domain 

controllers that were removed from the network without being properly uninstalled. 

*

 NTdsutil commands include: 

/ local roles 

Manages local administrative roles on an RODC. 

/ metadata cleanup 

Cleans up objects of decommissioned servers. 


Q92. In Windows Server 2012 R2, you can remove the Server Graphical Shell, resulting in the "Minimal Server Interface." This is similar to a Server with a GUI installation except that some features are not installed. 

Which of the following features is not installed in this scenario? 

A. MMC 

B. Windows Explorer 

C. Control Panel (subset) 

D. Server Manager 

Answer:

Explanation: 

When you choose the minimal server interface option Internet Explorer 10, Windows Explorer, the desktop, and the Start screen are not installed. Microsoft Management Console (MMC), Server Manager, and a subset of Control Panel are still present. 


Q93. RAG DROP 

Your network contains two Active Directory forests named contoso.com and adatum.com. All domain controllers run Windows Server 2012 R2. 

A federated trust exists between adatum.com and contoso.com. The trust provides adatum.com users with access to contoso.com resources. 

You need to configure Active Directory Federation Services (AD FS) claim rules for the federated trust. 

The solution must meet the following requirements: 

. In contoso.com, replace an incoming claim type named Group with an outgoing claim type named Role. . In adatum.com, allow users to receive their tokens for the relying party by using their Active Directory group membership as the claim type. 

The AD FS claim rules must use predefined templates. 

Which rule types should you configure on each side of the federated trust? 

To answer, drag the appropriate rule types to the correct location or locations. Each rule type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q94. Your company deploys a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2. The forest contains a domain controller named DC10. 

On DC10, the disk that contains the SYSVOL folder fails. 

You replace the failed disk. You stop the Distributed File System (DFS) Replication service. You restore the SYSVOL folder. 

You need to perform a non-authoritative synchronization of SYSVOL on DC10. 

Which tool should you use before you start the DFS Replication service on DC10? 

A. Active Directory Sites and Services 

B. Ultrasound 

C. Adsiedit.msc 

D. Frsutil 

Answer:

Explanation: 

How to perform a non-authoritative synchronization of DFSR-replicated SYSVOL 

(like "D2" for FRS) 

1.

 In theADSIEDIT.MSC tool modify the following distinguished name (DN) value and attribute on each of the domain controllers that you want to make non-authoritative:CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=<the server name>,OU=Domain Controllers,DC=<domain>msDFSR-Enabled=FALSE 

2.

 Force Active Directory replication throughout the domain. Etc 


Q95. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

You add two additional nodes to Cluster1. 

You have a folder named Folder1 on Server1 that contains application data. 

You plan to provide continuously available access to Folder1. 

You need to ensure that all of the nodes in Cluster1 can actively respond to the client requests for Folder1. 

What should you configure? 

A. Affinity - None 

B. Affinity - Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general u 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

All of the nodes in Cluster1 can actively respond to the client requests for Folder1 => Scale-Out File Server http://technet.microsoft.com/en- us/library/hh831349.aspx Scale-Out File Server for Application data (Scale-Out File Server) This clustered file server is introduced in Windows Server 2012 R2 and lets you store server Application data, such as Hyper-V virtual machine files, on file shares, and obtain a similar level of reliability, availability, manageability, and high performance that you would expect from a storage area network. All file shares are online on all nodes simultaneously. File shares associated with this type of clustered file server are called scale-out file shares. This is sometimes referred to as active- active. For more information on how to deploy ScaleOut File Server: http://technet.microsoft.com/en-us/library/hh831359.aspx Deploy Scale-Out File Server 


Renew microsoft exam 70-417:

Q96. Your network contains three servers named HV1, HV2, and Server1 that run Windows Server 2012 R2. HV1 and HV2 have the Hyper-V server role installed. Server1 is a file server that contains 3 TB of free disk space. 

HV1 hosts a virtual machine named VM1. The virtual machine configuration file for VM1 is stored in D:\VM and the virtual hard disk file is stored in E:\VHD. 

You plan to replace drive E with a larger volume. 

You need to ensure that VM1 remains available from HV1 while drive E is being replaced. You want to achieve this goal by using the minimum amount of administrative effort. 

What should you do? 

A. Perform a live migration to HV2. 

B. Add HV1 and HV2 as nodes in a failover cluster. Perform a storage migration to HV2. 

C. Add HV1 and HV2 as nodes in a failover cluster. Perform a live migration to HV2. 

D. Perform a storage migration to Server1. 

Answer:


Q97. Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named Server3 and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in a failover cluster named Cluster2. 

You need to move all of the applications and the services from Cluster1 to Cluster2. 

What should you do first from Failover Cluster Manager? 

A. On a server in Cluster1, configure Cluster-Aware Updating. 

B. On a server in Cluster2, configure Cluster-Aware Updating. 

C. On a server in Cluster1, click Migrate Roles. 

D. On a server in Cluster1, click Move Core Cluster Resources, and then click Select Node... 

Answer:

Explanation: 

http://blogs.msdn.com/b/clustering/archive/2012/06/25/10323434.aspx 


Q98. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. You create a user account named User1 in the domain. 

You need to ensure that User1 can use Windows Server Backup to back up Server1. 

The solution must minimize the number of administrative rights assigned to User1. 

What should you do? 

A. Assign User1 the Back up files and directories user right. 

B. Add User1 to the Backup Operators group. 

C. Add User1 to the Power Users group. 

D. Assign User1 the Back up files and directories user right and the Restore files and directories user right. 

Answer:

Explanation: 

Backup Operators have these permissions by default: 

However the question explicitly says we need to minimize administrative rights. Since the 

requirement is for backing up the data onlyno requirement to restore or shutdownthen assigning the "Back up files and directories user right" would be the correct. 


Q99. OTSPOT 

You have a server that runs Windows Server 2012 R2 and has the iSCSI Target Server role service installed. 

You run the New-IscsiVirtualDisk cmdlet as shown in the New-IscsiVirtualDisk exhibit. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibits. Each correct selection is worth one point. 

Answer: 


Q100. Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8. 

Your company has users who work from home. Some of the home users have desktop computers. Other home users have laptop computers. All of the computers are joined to the domain. 

All of the computer accounts are members of a group named Group1. Currently, the home users access the corporate network by using a PPTP VPN. You implement DirectAccess by using the default configuration and you specify Group1 as the DirectAccess client group. 

The home users who have desktop computers report that they cannot use DirectAccess to access the corporate network. 

The home users who have laptop computers report that they can use DirectAccess to access the corporate network. 

You need to ensure that the home users who have desktop computers can access the network by using DirectAccess. 

What should you modify? 

A. The WMI filter for Direct Access Client Settings GPO 

B. The conditions of the Connections to Microsoft Routing and Remote Access server policy 

C. The membership of the RAS and IAS Servers group 

D. The security settings of the computer accounts for the desktop computers 

Answer:

Explanation: 

The default settings includes creating a GPO that has a WMI filter for laptops only.