getcertified4sure.com

Super to microsoft 70-417




A Microsoft 70-417 accreditation can grant a certified owner a definite benefit. A 70-417 certified qualified provides testified for the value of this kind of accreditation. A 70-417 accreditation happen to be valuable business identified qualifications that the confirmed standard of understanding plus potential from the certified owner. Each active of the 70-417 Microsoft creates the brand new normal associated with standard competencies plus potential from the certified owner. This assists a customer to obtain the fine chances plus fine fork out through the IT group.

2021 Jan trainsignal 70-417:

Q21. Your network contains a server named Server1 that runs Windows Server 2012. Server1 

has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

You plan to schedule a complete backup of Server1 by using Windows Server Backup. 

You need to ensure that the state of VM1 is saved before the backup starts. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. Resource metering 

D. Virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

http://www.altaro.com/hyper-v/vss-crash-consistent-vs-Application-consistent-vss-backupspost-2- of-2/ Backup Operations in Hyper-V No VSS Writer Available? In some cases, you need an Application-consistent backup but there is no VSS writer available. One example of this is MySQL. Hyper-V backups of virtual machines containing MySQL will always result in either a crashconsistent or an image-level backup. For MySQL, the latter is probably acceptable as MySQL doesn't perpetually expand the log file. However, if you're using MySQL within a VSS-aware VM, then a Hyper-Vbased backup tool is going to take a crash-consistent backup. MySQL (like any other database system) isn't always recoverable from a crash-consistent backup; tool is going to take a crash-consistent backup. MySQL (like any other database system) isn't always recoverable from a crash-consistent backup; even when recovery is possible, it may be painful. MySQL is just one example; any number of line-of-business Applications could tell a similar tale. In the case of MySQL, one solution is to find a guest-level backup Application that is MySQL- aware and can back it up properly. For Applications for which no backup Application has a plug-in, you may need to have pre-and post-backup scripts that stop services or close Applications. If brief downtime is acceptable, you can disable the Backup item in Hyper-V Integration Services, thereby forcing Hyper-V to save the state of the VM during backup. This technique results in an image-level backup and can 

be used on any Application that doesn't have a VSS writer. 


Q22. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA). 

All users in the domain are issued a smart card and are required to log on to their domain-joined client computer by using their smart card. 

A user named User1 resigned and started to work for a competing company. You need to prevent User1 immediately from logging on to any computer in the domain. 

The solution must not prevent other users from logging on to the domain. 

Which tool should you use? 

A. Active Directory Users and Computers 

B. Certificate Templates 

C. The Security Configuration Wizard 

D. The Certificates snap-in 

Answer:


Q23. Your network contains an Active Directory domain named contoso.com. 

A previous administrator implemented a Proof of Concept installation of Active Directory 

Rights Management Services (AD RMS). 

After the proof of concept was complete, the Active Directory Rights Management Services 

server role was removed. 

You attempt to deploy AD RMS. 

During the configuration of AD RMS, you receive an error message indicating that an 

existing AD RMS Service 

Connection Point (SCP) was found. 

You need to remove the existing AD RMS SCP. 

Which tool should you use? 

A. Active Directory Users and Computers 

B. Active Directory Sites and Services 

C. Authorization Manager 

D. Active Directory Domains and Trusts 

Answer:


Q24. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

You create an external virtual switch named Switch1. Switch1 has the following configurations: 

. Connection type: External network 

. Single-root I/O virtualization (SR-IOV): Enabled 

Ten virtual machines connect to Switch1. 

You need to ensure that all of the virtual machines that connect to Switch1 are isolated from the external network and can connect to each other only. The solution must minimize network downtime for the virtual machines. 

What should you do? 

A. Remove Switch1 and recreate Switch1 as an internal network. 

B. Change the Connection type of Switch1 to Private network. 

C. Change the Connection type of Switch1 to Internal network. 

D. Remove Switch1 and recreate Switch1 as a private network. 

Answer:

Explanation: You can change the connection type of a virtual switch from the virtual switch manager without having to remove it. A private virtual network is isolated from all external network traffic on the virtualization server, as well any network traffic between the management operating system and the external network. This type of network is useful when you need to create an isolated networking environment, such as an isolated test domain. 

References: http://technet.microsoft.com/en-us/library/cc816585%28v=WS.10%29.aspx http://blogs.technet.com/b/jhoward/archive/2008/06/17/hyper-v-what-are-the-uses-for-different-types-of-virtual-networks.aspx 


Q25. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server 1. Server1 runs Windows Server 2012 R2. You need to create a 3-TB virtual hard disk (VHD) on Server1. Which tool should you use? 

A. New-StoragePool 

B. Diskpart 

C. File Server Resource Manager (FSRM) 

D. New-StorageSubsytemVirtualDisk 

Answer:

Explanation: 

Explanation You can create a VHD from either the Disk Management snap-in or the command line (diskpart). From the DiskPart command-line tool at an elevated command prompt, run the create vdisk command and specify the file (to name the file) and maximum (to set the maximum size in megabytes) parameters. The following code demonstrates how to create a VHD file at C:\vdisks\disk1.vdh with a maximum file size of 16 GB (or 16,000 MB). 


Updated examcollection 70-417:

Q26. Your network contains an Active Directory domain named contoso.com. Domain controllers run either Windows Server 2008, Windows Server 2008 R2, or Windows Server 2012 R2. 

You have a Password Settings object (PSOs) named PSO1. You need to view the settings of PSO1. Which tool should you use? 

A. Get-ADDomainControllerPasswordReplicationPolicy 

B. Get-ADDefaultDomainPasswordPolicy 

C. Server Manager 

D. Get-ADFineGrainedPasswordPolicy 

Answer:

Explanation: 

Explanation http://technet.microsoft.com/en-us/library/ee617231.aspx 


Q27. Your network contains an Active Directory domain named contoso.com. 

The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

You need to create an IPv6 scope on Server1. The scope must use an address space that is reserved for private networks. The addresses must be routable. 

Which IPV6 scope prefix should you use? 

A. 2001:123:4567:890A:: 

B. FE80:123:4567:: 

C. FF00:123:4567:890A:: 

D. FD00:123:4567:: 

Answer:


Q28. In an isolated test environment, you deploy a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. The test environment does not have Active Directory Domain Services (AD DS) installed. 

You install the Active Directory Domain Services server role on Server1. 

You need to configure Server1 as a domain controller. 

Which cmdlet should you run? 

A. Install-ADDSDomain 

B. Install-ADDSForest 

C. Install-ADDSDomainController 

D. Install-WindowsFeature 

Answer: B Explanation: 

Install-ADDSDomainController Installs a domain controller in Active Directory. Install-ADDSDomain Installs a new Active Directory domain configuration. Install-ADDSForest Installs a new Active Directory forest configuration. Install-WindowsFeature Installs one or more Windows Server roles, role services, or features on either thelocal or a specified remote server that is running Windows Server 2012 R2. This cmdlet is equivalent to andreplaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features. 

C:\PS>Install-ADDSForest -DomainName corp.contoso.com -CreateDNSDelegation DomainMode Win2008 -ForestMode Win2008R2 -DatabasePath "d:\NTDS" -SysvolPath "d:\SYSVOL" –LogPath "e:\Logs"Installs a new forest named corp.contoso.com, creates a DNS delegation in the contoso.com domain, setsdomain functional level to Windows Server 2008 R2 and sets forest functional level to Windows Server 2008,installs the Active Directory database and SYSVOL on the D:\ drive, installs the log files on the E:\ drive andhas the server automatically restart after AD DS installation is complete and prompts the user to provide andconfirm the Directory Services Restore Mode (DSRM) password. http://technet.microsoft.com/en-us/library/hh974720%28v=wps.620%29.aspx 


Q29. RAG DROP 

Your network contains four servers that run Windows Server 2012 R2. 

Each server has the Failover Clustering feature installed. Each server has three network 

adapters installed. An iSCSI SAN is available on the network. 

You create a failover cluster named Cluster1. You add the servers to the cluster. 

You plan to configure the network settings of each server node as shown in the following 

table. 

You need to configure the network settings for Cluster1. 

What should you do? 

To answer, drag the appropriate network communication setting to the correct cluster network or networks. Each network communication setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q30. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the IP Address Management (IPAM) Server feature installed. 

You have a support technician named Tech1. Tech1 is a member of the IPAM Administrators group on Server1 and Server2. 

You need to ensure that Tech1 can use Server Manager on Server1 to manage IPAM on Server2. 

To which group on Server2 should you add Tech1? 

A. WinRMRemoteWMIUsers_ 

B. IPAM MSM Administrators 

C. Remote Management Users 

D. IPAM Administrators 

Answer:

Explanation: 

http://social.technet.microsoft.com/wiki/contents/articles/13444.windows-server-2012servermanagertroubleshooting-guide-part-ii-troubleshoot- manageability-status-errors-inserver- manager.aspx Windows Server 2012 Server Manager Troubleshooting Guide, Part II: Troubleshoot Manageability Status Errors in Server Manager Error <computer name>: Configuration refresh failed with the following error: The metadata failed to be retrieved from the server, due to the following error: Access is denied. The user is attempting to manage the remote server with a credential that has only standard user (not a member of the Administrators group) access rights on the target server, and the user has not enabled standard user remote management of the target server. By default, an account with standard user access rights is not a part of the WinRM remote WMI user's group, and can perform limited management tasks on a remote server in Server Manager. To allow standard users more management access rights on a target server, run the Enable-ServerManagerStandardUserRemotingcmdlet on the target server, in a Windows PowerShell session that has been opened with elevated user rights (Run as Administrator). For more information about how to use this cmdlet (and disable standard user management access when it is no longer needed), see the cmdlet Help topic for nableServerManagerStandardUserRemoting [This link is external to TechNet Wiki. It will open in a new window.]