70-417 Exam Questions - Online Test


70-417 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Exam Code: 70 417 dumps (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Upgrading Your Skills to MCSA Windows Server 2012
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass exam 70 417 Exam.

Q11. You have a server named DNS1 that runs Windows Server 2012 R2. 

You discover that the DNS resolution is slow when users try to access the company intranet home page by using the URL http://companyhome. 

You need to provide single-label name resolution for CompanyHome that is not dependent on the suffix search order. 

Which three cmdlets should you run? (Each correct answer presents part of the solution. Choose three.) 

A. Add-DnsServerPrimaryZone 

B. Add-DnsServerResourceRecordCName 

C. Set-DnsServerDsSetting 

D. Set-DnsServerGlobalNameZone 

E. Set-DnsServerEDns 

F. Add-DnsServerDirectory Partition 

Answer: A,B,D 


Q12. You have 20 servers that run Windows Server 2012 R2. 

You need to create a Windows PowerShell script that registers each server in Microsoft Azure Backup and sets an encryption passphrase. 

Which two PowerShell cmdlets should you run in the script? (Each correct answer presents part of the solution. Choose two.) 

A. Set-OBMachineSetting 

B. Add-OBFileSpec 

C. Start-OBRegistration 

D. New OBPolicy 

E. New-OBRetentionPolicy 

Answer: A,C 

Explanation: 

D: Start-OBRegistration Registers the current computer with Windows Azure Online Backup using the credentials (username and password) created during enrollment. 

E: The Set-OBMachineSettingcmdlet sets aOBMachineSetting object for the server that includes proxy server settings for accessing the internet, network bandwidth throttling settings, and the encryption passphrase that is required to decrypt the files during recovery to another server. Incorrect: Not C: TheAdd-OBFileSpeccmdlet adds theOBFileSpecobject, which specifies the items to include or exclude from a backup, to the backup policy (OBPolicyobject). TheOBFileSpecobject can include or exclude multiple files, folders, or volumes. T http://technet.microsoft.com/en-us/library/hh770416(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh770425(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh770424.aspx http://technet.microsoft.com/en-us/library/hh770398.aspx http://technet.microsoft.com/en-us/library/hh770409.aspx 


Q13. Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as a standalone certification authority (CA). 

You install a second server named Server2. You install the Online Responder role service on Server2. 

You need to ensure that Server1 can issue an Online Certificate Status Protocol (OCSP) Response Signing certificate to Server2. 

What should you run on Server1? 

A. The certreq.exe command and specify the -policy parameter 

B. The certutil.exe command and specify the -getkey parameter 

C. The certutil.exe command and specify the -setreg parameter 

D. The certreq.exe command and specify the -retrieve parameter 

Answer:


Q14. RAG DROP 

Answer: 


Q15. Your network contains an Active Directory domain named contoso.com. The domain 

contains client computers that run Either Windows XP, Windows 7, or Windows 8. 

Network Policy Server (NPS) is deployed to the domain. 

You plan to create a system health validator (SHV). 

You need to identify which policy settings can be applied to all of the computers. 

Which three policy settings should you identify? (Each correct answer presents part of the 

solution. Choose three.) 

A. Automatic updating is enabled. 

B. A firewall is enabled for all network connections. 

C. An antispyware application is on. 

D. Antispyware is up to date. 

E. Antivirus is up to date. 

Answer: A,B,E 

Explanation: http://technet.microsoft.com/en-us/library/cc731260.aspx 

*

 System health agent (SHA) is a NAP component. 

*

 System health agent (SHA) A component that checks the state of the client computer to determine whether the settings monitored by the SHA are up-to-date and configured correctly. For example, the Windows Security Health Agent (WSHA) can monitor Windows Firewall, whether antivirus software is installed, enabled, and updated, whether antispyware software is installed, enabled, and updated, and whether Microsoft Update Services is enabled and the computer has the most recent security updates from Microsoft Update Services. There might also be SHAs (and corresponding system health validators) available from other companies that provide different functionality. 


Q16. Complete the missing word from the sentence below that is describing one of the new roles in Server 2008: 

By using__________ , you can augment an organization's security strategy by protecting information through persistent usage policies, which remain with the information, no matter where it is moved. 

A. AD FS 

B. AD RMS 

C. RODC 

D. AD LDS 

Answer:

Explanation: 

Active Directory Rights Management Services (AD RMS) 


Q17. Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed.Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

You need to configure VM4 to track the CPU, memory, and network usage. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. Resource metering 

D. Virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

http://blogs.technet.com/b/meamcs/archive/2012/05/28/hyper-v-resource-metering-in-windows-server-2012-server-8-beta.aspx Hyper-V Resource Metering in Windows Server 2012 R2 "Server 8 Beta" IT organizations need tools to charge back business units that they support while providing the business units with the right amount of resources to match their needs. For hosting providers, it is equally important to issue chargebacks based on the amount of usage by each customer. To implement advanced billing strategies that measure both the assigned capacity of a resource and its actual usage, earlier versions of Hyper-V required users to develop their own chargeback solutions that polled and aggregated performance counters. 

These solutions could be expensive to develop and sometimes led to loss of historical data. To assist with more accurate, streamlined chargebacks while protecting historical information, Hyper-V in Windows Server 2012 R2 "Server 8 Beta" introduces Resource Metering, a feature that allows customers to create cost-effective, usage-based billing solutions. With this feature, service providers can choose the best billing strategy for their business model, and independent software vendors can develop more reliable, end-to-end chargeback solutions on top of Hyper-V. Metrics collected for each virtual machine § Average CPU usage, measured in megahertz over a period of time. § Average physical memory usage, measured in megabytes. § Minimum memory usage (lowest amount of physical memory). § Maximum memory usage (highest amount of physical memory). § Maximum amount of disk space allocated to a virtual machine. § Total incoming network traffic, measured in megabytes, for a virtual network adapter. § Total outgoing network traffic, measured in megabytes, for a virtual network adapter To enable Hyper-V resource metering on hyper-v host HV01 run the following PowerShell commands: Get-VM -ComputerName HV01 | Enable-VMResourceMetering By default the collection interval for Hyper-v metering data is one hour to change this interval the following PowerShell command can be used "value used in the command below is one minute": Set-vmhost computername HV01 ResourceMeteringSaveInterval 00:01:00 To get all VMs metering data run the following PowerShell command: Get-VM -ComputerName HV01 | Measure-VM To get a particular VM "test01" metering data run the following PowerShell command: Get-VM -ComputerName HV01 -Name "test01" | Measure-VM 


Q18. Your network contains an Active Directory forest that contains two domains. The forest contains five domain controllers. 

The domain controllers are configured as shown in the following table. 

You need to configure DC5 as a global catalog server. 

Which tool should you use? 

A. Active Directory Administrative Center 

B. Active Directory Users and Computers 

C. Active Directory Sites and Services 

D. Active Directory Domains and Trusts 

Answer:

Explanation: 

Active Directory Sites and Services can be used to Add or remove the global catalog read-only directory partitions from a domain controller in the site. Confirm that all read-only directory partitions have been replicated to the new global catalog server. As well as verify that the global catalog server is being advertised in Domain Name System (DNS). 

References: http://technet.microsoft.com/en-us/library/cc730868.aspx http://technet.microsoft.com/en-us/library/cc770674.aspx 


Q19. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2. 

The domain contains two domain controllers. The domain controllers are configured as shown in the following table. 

Active Directory Recycle Bin is enabled. 

You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago. 

You need to restore the membership of Group1. 

What should you do? 

A. Perform an authoritative restore. 

B. Perform a non-authoritative restore. 

C. Recover the items by using Active Directory Recycle Bin. 

D. Apply a virtual machine snapshot to VM1. 

Answer:

Explanation: 

Authoritative restore allows the administrator to recover a domain controller, restore it to a specific point in time, and mark objects in Active Directory as being authoritative with respect to their replication partners. For example, you might need to perform an authoritative restore if an administrator inadvertently deletes an organizational unit containing a large number of users. If you restore the server from tape, the normal replication process would not restore the inadvertently deleted organizational unit. Authoritative restore allows you to mark the organizational unit as authoritative and force the replication process to restore it to all of the other domain controllers in the domain. Incorrect: Not C: A nonauthoritative restore returns the domain controller to its state at the time of backup and then allows normal replication to overwrite that state with any changes that occurred after the backup was taken. After you restore the system state, the domain controller queries its replication partners. The replication partners replicate any changes to the restored domain controller, ensuring that the domain controller has an accurate and updated copy of the Active Directory database. 

Reference: Performing an Authoritative Restore 

What should you do? 

A. Export and import data by using Dsamain. 

B. Apply a virtual machine snapshot to VM1. 

C. Recover the items by using Active Directory Recycle Bin. 

D. Modify the isRecycled attribute of Group1. Answer: A 


Q20. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1. Server1 has the IP Address Management (IPAM) Server feature installed. 

A technician performs maintenance on Server1. 

After the maintenance is complete, you discover that you cannot connect to the IPAM server on Server1. 

You open the Services console as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can connect to the IPAM server. 

Which service should you start? 

A. Windows Process Activation Service 

B. Windows Event Collector 

C. Windows Internal Database 

D. Windows Store Service (WSService) 

Answer: