Proper study guides for Up to date Microsoft Upgrading Your Skills to MCSA Windows Server 2012 certified begins with Microsoft 70-417 preparation products which designed to deliver the Highest Quality 70-417 questions by making you pass the 70-417 test at your first time. Try the free 70-417 demo right now.
Q11. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
On all of the domain controllers, Windows is installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\.
All of the domain controllers have a third-party application installed.
The operating system fails to recognize that the application is compatible with domain controller cloning.
You verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning.
What should you do?
A. In C:\Windows\System32\Sysprep\Actionfiles\, add the Application information to an XML file named Respecialize.xml.
B. In D:\Windows\NTDS\, create an XML file named DCCloneConfig.xml and add the Application information to the file.
C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and add the Application information to the file.
D. In C:\Windows\, create an XML file named DCCloneConfig.xml and add the Application information to the file.
Answer: C
Explanation:
http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domainservices-in-windows-server-2012-part-13-domain-controller-cloning.aspx
Q12. Which feature is described below?
You can use the ___ to reduce the number of duplicate blocks of data in storage, you can store much more data in a given amount of storage capacity than was possible in previous releases that used Single Instance
Storage (SIS) or NTFS file system compression.
A. iSCSI Target Server
B. iSCSI Target Boot
C. Multiterabyte Volumes
D. Data Deduplication role service
Answer: D
Explanation:
By using Data Deduplication, general purpose file servers can typically reduce storage capacity utilization by a 2:1 ratio (for example, files that previously used 1 TB would use 500 GB after deduplication). Servers that host virtualization data (such as VHD files) often reduce storage capacity utilization by a 20:1 ratio, which reduces 1 TB of data to 50 GB.
Q13. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a file server role named FS1 and a generic service role named SVC1. Server1 is the preferred node for FS1. Server2 is the preferred node for SVC1.
You plan to run a disk maintenance tool on the physical disk used by FS1.
You need to ensure that running the disk maintenance tool does not cause a failover to occur.
What should you do before you run the tool?
A. Run Suspend-ClusterNode.
B. Run cluster.exe and specify the offline parameter.
C. Run Suspcnd-ClusterResource.
D. Run cluster.exe and specify the pause parameter.
Answer: D
Q14. Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as a standalone certification authority (CA).
You install a second server named Server2. You install the Online Responder role service on Server2.
You need to ensure that Server1 can issue an Online Certificate Status Protocol (OCSP) Response Signing certificate to Server2.
What should you run on Server1?
A. The certreq.exe command and specify the -policy parameter
B. The certutil.exe command and specify the -getkey parameter
C. The certutil.exe command and specify the -setreg parameter
D. The certreq.exe command and specify the -retrieve parameter
Answer: C
Q15. Managing Group Policy objects is a tiresome task. Which of the following Windows Server 2012 R2 features could you use to save time when creating GPO's with similar settings?
A. UAC
B. PXE boot
C. IFM
D. Starter GPO
Answer: D
Explanation:
Starter Group Policy objects derive from a Group Policy object (GPO), and provide the ability to store a collection of Administrative Template policy settings in a single object. You can import and export Starter GPOs, which makes them easy to distribute to other environments. When you create a new GPO from a Starter GPO, the new GPO has all of the Administrative Template policy settings and their values that were defined in the Starter GPO.
Q16. Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2008 R2.
The domain contains a file server named Server6 that runs Windows Server 2012 R2. Server6 contains a folder named Folder1. Folder1 is shared as Share1. The NTFS permissions on Folder1 are shown in the exhibit. (Click the Exhibit button.)
The domain contains two global groups named Group1 and Group2.
You need to ensure that only users who are members of both Group1 and Group2 are
denied access to Folder1.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. Remove the Deny permission for Group1 from Folder1.
B. Deny Group2 permission to Folder1.
C. Install a domain controller that runs Windows Server 2012 R2.
D. Create a conditional expression.
E. Deny Group2 permission to Share1.
F. Deny Group1 permission to Share1.
Answer: A,D
Explanation:
* Conditional Expressions for Permission Entries Windows Server 2008 R2 and Windows 7 enhanced Windows security descriptors by introducing a conditional access permission entry. Windows Server 2012 R2 takes advantage of conditional access permission entries by inserting user claims, device claims, and resource properties, into conditional expressions. Windows Server 2012 R2 security evaluates these expressions and allows or denies access based on results of the evaluation. Securing access to resources through claims is known as claims-based access control. Claims-based access control works with traditional access control to provide an additional layer of authorization that is flexible to the varying needs of the enterprise environment. http://social.technet.microsoft.com/wiki/contents/articles/14269.introducing-dynamicaccesscontrol-en-us.aspx
Q17. OTSPOT
You have a Hyper-V host named Server1 that runs Windows Server 2008 R2.All of the virtual machines on Server1 use VHDs.
You install the Hyper-V server role on a server named Server2 that runs Windows Server 2012 R2.Server2 has the same hardware configurations as Server1.
You plan to migrate the Hyper-V host from Server1 to Server2 by using the Windows Server Migration Tools.
In the table below, identify what can be migrated by using the Windows Server Migration Tools. Make only one selection in each row. Each correct selection is worth one point.
Answer:
Q18. OTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. The servers have the Hyper-V server role installed.
A certification authority (CA) is available on the network.
A virtual machine named vml.contoso.com is replicated from Server1 to Server2. A virtual
machine named vm2.contoso.com is replicated from Server2 to Server1.
You need to configure Hyper-V to encrypt the replication of the virtual machines.
Which common name should you use for the certificates on each server?
To answer, configure the appropriate common name for the certificate on each server in
the answer area.
Answer:
Q19. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Rights Management Services server role installed.
Your company works with a partner organization that does not have its own Active Directory Rights Management Services (AD RMS) implementation.
You need to create a trust policy for the partner organization.
The solution must meet the following requirements:
. Grant users in the partner organization access to protected content . Provide users in the partner organization with the ability to create protected content.
Which type of trust policy should you create?
A. A federated trust
B. Windows Live ID
C. A trusted publishing domain
D. A trusted user domain
Answer: A
Q20. RAG DROP
Your network contains a single Active Directory domain named contoso.com. The domain contains an Active Directory site named Site1 and an organizational unit (OU) named OU1.
The domain contains a client computer named Client1 that is located in OU1 and Site1.
You create five Group Policy objects (GPO). The GPOs are configured as shown in the following table.
You need to identify in which order the GPOs will be applied to Client1.
In which order should you arrange the listed GPOs?
To answer, move all GPOs from the list of GPOs to the answer area and arrange them in
the correct order.
Answer: