+ All Categories
Home > Documents > Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

Date post: 02-Jun-2018
Category:
Upload: alexandreantunes
View: 219 times
Download: 0 times
Share this document with a friend

of 150

Transcript
  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    1/150

    Microsoft.Braindumps.70-417.v2014-06-10.by.PAULINEi.152q

    Number: 70-417Passing Score: 700Time Limit: 180 minFile Version: 22.5

    Exam Code: 70-417

    Exam Name: Upgrading Your Skill s to MCSA Windows Server 2012

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    2/150

    Mixed Questions (Exam A)

    QUESTION 1Your network contains an Active Directory domain named contoso.com. The domain contains a servernamed Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

    On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the

    following table.

    You plan to create a checkpoint of VM1.

    You need to recommend a solution to minimize the amount of disk space used for the checkpoint of VM1.

    What should you do before you create the checkpoint?

    A. Decrease the Maximum RAM.

    B. Convert disk1.vhd to a dynamically expanding disk.

    C. Run the Stop-VM cmdlet.

    D. Run the Resize-VHD cmdlet.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:VM's RAM won't be saved.

    QUESTION 2Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-Vserver role installed.

    Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

    "A Composite Solution With Just One Click" - Certification Guaranteed 2 Microsoft 70-417 : Practice TestServer1 is configured as shown in the following table.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    3/150

    You install a network monitoring application on VM2.

    You need to ensure that all of the traffic sent to VM3 can be captured on VM2.

    What should you configure?

    A. NUMA topology

    B. Resource control

    C. Resource metering

    D. Virtual Machine Chimney

    E. The VLAN ID

    F. Processor Compatibility

    G. The startup order

    H. Automatic Start ActionI. Integration Services

    J. Port mirroring

    K. Single-root I/O virtualization

    Correct Answer: JSection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as

    the switch port that receives copies of all the traffic. And since Port mirroring allows the network traffic ofa virtual machine to be monitored by copying the traffic and forwarding it to another virtual machine that isconfigured for monitoring, you should configure port mirroring on VM2.

    "A Composite Solution With Just One Click" - Certification Guaranteed 3 Microsoft 70-417 : Practice Test

    QUESTION 3Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-Vserver role installed.

    Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

    Server1 is configured as shown in the following table.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    4/150

    You plan to schedule a complete backup of Served by using Windows Server Backup.

    You need to ensure that the state of VM1 is saved before the backup starts.

    What should you configure?

    A. NUMA topology

    B. Resource control

    C. Resource metering

    D. Virtual Machine Chimney

    E. The VLAN ID

    F. Processor Compatibility

    G. The startup order

    H. Automatic Start ActionI. Integration Services

    J. Port mirroring

    K. Single-root I/O virtualization"A Composite Solution With Just One Click" - Certification Guaranteed 4 Microsoft 70-417 : PracticeTest

    Correct Answer: ISection: (none)Explanation

    Explanation/Reference:

    Explanation: Explanation/Reference:The Integration Services settings on virtual machines include services such as operating systemshutdown, time synchronization, data exchange, Heartbeat, and Backup (volume snapshot services). Thissnapshot will ensure that the state of VM1 is saved prior to backup.

    QUESTION 4Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-Vserver role installed.

    Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

    Server1 is configured as shown in the following table.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    5/150

    VM3 is used to test applications.

    You need to prevent VM3 from synchronizing its clock to Server1.

    What should you configure?

    A. NUMA topology

    B. Resource control"A Composite Solution With Just One Click" - Certification Guaranteed 5 Microsoft 70-417 : PracticeTest

    C. Resource metering

    D. Virtual Machine Chimney

    E. The VLAN ID

    F. Processor CompatibilityG. The startup order

    H. Automatic Start Action

    I. Integration Services

    J. Port mirroring

    K. Single-root I/O virtualization

    Correct Answer: ISection: (none)Explanation

    Explanation/Reference:

    Explanation: Explanation/Reference:Integration Services settings on virtual machines includes services such as operating system shutdown,time synchronization, data exchange, Heart beat, and Backup (volume snapshot services. Thus you shoulddisable the time synchronization using Integration Services.

    QUESTION 5Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-Vserver role installed.

    Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

    Server1 is configured as shown in the following table.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    6/150

    VM2 sends and receives large amounts of data over the network.

    You need to ensure that the network traffic of VM2 bypasses the virtual switches of the parent partition.

    What should you configure?

    A. NUMA topology

    B. Resource control

    C. Resource metering

    D. Virtual Machine Chimney

    E. The VLAN ID

    F. Processor Compatibility

    G. The startup order

    H. Automatic Start ActionI. Integration Services

    J. Port mirroring

    K. Single-root I/O virtualization

    Correct Answer: KSection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine to

    maximize network throughput while minimizing network latency and the CPU overhead required forprocessing network traffic.

    QUESTION 6You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.

    You need to add a graphical user interface (GUI) to Server1.

    Which tool should you use?

    A. The imagex.exe command

    B. The ocsetup.exe command

    C. The setup.exe commandD. The dism.exe command

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    7/150

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:http://technet.microsoft.com/en-us/library/hh825265.aspx

    DISM.exe /Online [/Get-Packages | /Get-PackageInfo | /Add-Package | /Remove-Package ] [/Get-Features | /Get-FeatureInfo | /Enable-Feature | /Disable-Feature ] [/Cleanup-Image]

    QUESTION 7You have a server named Server1 that runs Windows Server 2012 R2.

    You plan to create an image of Server1.

    You need to remove the source files for all server roles that are not installed on Server1.

    Which tool should you use?

    A. dism.exe

    B. servermanagercmd.exe

    C. ocsetup.exe

    D. imagex.exe

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:The Dism utility can be used to create and mount an image of Server1.

    QUESTION 8You have a server named Server1 that runs Windows Server 2012 R2. Server1 has following storagespaces:

    DataUsersBackupsPrimordial

    You add an additional hard disk to Server1.

    You need to identify which storage space contains the new hard disk.

    Which storage space contains the new disk?

    A. Primordial

    B. Data

    C. Backups

    D. Users

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:New Disks (Unallocated space) added to Primordial space.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    8/150

    QUESTION 9Your network contains an Active Directory domain named contoso.com. The domain contains a servernamed Server1. Server1 runs Windows Server 2012.

    You create a group Managed Service Account named gservice1.

    You need to configure a service named Service1 to run as the gservice1 account.

    How should you configure Service1?

    A. From a command prompt, run sc.exe and specify the config parameter.

    B. From a command prompt, run sc.exe and specify the sdset parameter.

    C. From the Services console, configure the General settings.

    D. From Windows PowerShell, run Set-Service and specify the -PassThrough parameter.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:Executing the sc.exe command with the config parameter will modify service configuration.

    QUESTION 10You have a server named Data1 that runs a Server Core Installation of Windows Server 2012 R2Standard.

    You need to configure Data1 to run a Server Core Installation of Windows Server 2012 R2 Datacenter.You want to achieve this goal by using the minimum amount of administrative

    effort.

    What should you perform?

    A. An online servicing by using Dism

    B. An offline servicing by using Dism

    C. An upgrade installation of Windows Server 2012 R2

    D. A clean installation of Windows Server 2012 R2

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:There are a couple of ways to install the GUI from the command prompt, although both use the same tool -DISM (Deployment Image Service Manager). When you are doing it for a single (local) server, thecommand is:DISM.exe /Online {/Get-CurrentEdition | /Get-TargetEditions | /Set-ProductKey: | /Set-Edition: {/GetEula:< path> | /AcceptEula/ProductKey:}}

    Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:...

    QUESTION 11Your network contains an Active Directory forest named contoso.com.

    The forest contains two domains named contoso.com and child.contoso.com and two sites named Site1and Site2. The domains and the sites are configured as shown in following table.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    9/150

    When the link between Site1 and Site2 fails, users fail to log on to Site2.

    You need to identify what prevents the users in Site2 from logging on to the child.contoso.com domain.

    What should you identify?

    A. The placement of the infrastructure master

    B. The placement of the global catalog server

    C. The placement of the domain naming master

    D. The placement of the PDC emulator

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:Correct explanation: NOT PDC Emulator. This role is not necessary to perform logon. PDC emulator needsto be available if user needs to change password or when he/she type incorrect one. Also timesynchronization (PDC is acting as time server) is not the issue. I don't think, that after link failure, everycomputer immediately gets wrong time (more than standard 5 minutes).

    Global catalog is the key here. There isn't one in Site2, so when link between sites fails, there is nopossibility to properly check group membership for particular user. That action is performed during logon

    process (proper Kerberos ticket containing information about group membership needs to be issued).

    QUESTION 12Your network contains an Active Directory forest that contains two domains. The forest contains fivedomain controllers.

    The domain controllers are configured as shown in the following table.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    10/150

    You need to configure DC5 as a global catalog server.

    Which tool should you use?

    A. Active Directory Administrative Center

    B. Active Directory Users and Computers

    C. Active Directory Sites and ServicesD. Active Directory Domains and Trusts

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:Active Directory Sites and Services can be used to Add or remove the global catalog read- only directorypartitions from a domain controller in the site. Confirm that all read-only directory partitions have beenreplicated to the new global catalog server. As well as verify that the global catalog server is beingadvertised in Domain Name System (DNS).

    References:http://technet.microsoft.com/en-us/library/cc730868.aspx http://technet.microsoft.com/en-us/library/cc770674.aspx

    QUESTION 13Your network contains an Active Directory forest. The forest contains a single domain namedcontoso.com. The domain contains four domain controllers.

    The domain controllers are configured as shown in the following table.

    All domain controllers are DNS servers.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    11/150

    You plan to deploy a new domain controller named DC5 in the contoso.com domain.

    You need to identify which domain controller must be online to ensure that DC5 can be promotedsuccessfully to a domain controller.

    Which domain controller should you identify?

    A. DC1

    B. DC2

    C. DC3

    D. DC4

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:

    To perform a domain controller promotion you need the Infrastructure master to be online. The schemamaster and the domain naming master are per-forest roles. Therefore, there is only one schema masterand one domain naming master per forest.

    The RID master, the PDC master, and the infrastructure master are per-domain roles. Each domain has itsown RID master, PDC master, and infrastructure master. Therefore, if a forest has three domains, thereare three RID masters, three PDC masters, and three infrastructures masters.

    QUESTION 14Your network contains an Active Directory forest named contoso.com. All domain controllers currently runWindows Server 2008 R2.

    You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2.

    The new domain controller will have the following configurations:

    Schema masterGlobal catalog serverDNS Server server roleActive Directory Certificate Services server role

    You need to identify which configurations cannot be fulfilled by using the Active Directory

    Domain Services Configuration Wizard.

    Which two configurations should you identify? (Each correct answer presents part of the solution. Choose

    two.)

    A. Enable the global catalog server.

    B. Transfer the schema master.

    C. Install the Active Directory Certificate Services role.

    D. Install the DNS Server role.

    Correct Answer: BCSection: (none)Explanation

    Explanation/Reference:

    Explanation:AD Installation Wizard will automatically install DNS and allows for the option to set it as a global catalogserver. ADCS and schema must be done separately.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    12/150

    QUESTION 15You have a server named Server1 that runs Windows Server 2012.

    You promote Server1 to a domain controller.

    You need to view the service location (SRV) records that Server1 registers in DNS.

    What should you do on Server1?

    A. Open the Netlogon.dns file.

    B. Run ipconfig /displaydns.

    C. Run Get-DnsServerDiagnostics.

    D. Open the SrC. sys file.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:Netlogon.dns - If you are using non-Microsoft DNS servers to support Active Directory, you can verifySRV locator resource records by viewing Netlogon.dns. Netlogon.dns is located in the %systemroot%\System32\Config folder. You can use a text editor, such as Microsoft Notepad, to view this file.The first record in the file is the domain controller's Lightweight Directory Access Protocol (LDAP) SRVrecord.

    QUESTION 16Your network contains an Active Directory domain named adatum.com. The domain contains a memberserver named Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2.

    On DC2, you open Server Manager and you add Server1 as another server to manage.

    From Server Manager on DC2, you right-click Server1 as shown in the exhibit. (Click the Exhibit button.)

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    13/150

    You need to ensure that when you right-click Server1, you see the option to run the DHCP console.

    What should you do?

    A. On DC2, install the Role Administration Tools.

    B. On DC2 and Server1, run winrmquickconfig.

    C. In the domain, add DC2 to the DHCP Administrators group.

    D. On Server1, install the Feature Administration Tools.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:Remote Server Administration Tools (Role Administration Tools) must be setup on DC2 to allow you to runthe DHCP console. In Windows Server 2012 R2 and Windows Server 2012, remote management isenabled by default. Before administrators can connect to a computer that is running Windows Server 2012

    R2 or Windows Server 2012 remotely by using Server Manager, Server Manager remote managementmust be enabled on the destination computer if it has been disabled.In PowerShell console (administrator) type the following, and then press Enter to enable all requiredfirewall rule exceptions.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    14/150

    Configure-SMRemoting.exe -enable

    QUESTION 17Your network contains an Active Directory domain named contoso.com. The domain contains threeservers named Server1, Server2, and Server3.

    You create a server group named ServerGroup1.

    You discover the error message shown in the following exhibit. (Click the Exhibit button.)

    You need to ensure that Server2 can be managed remotely by using Server Manager.

    What should you do?

    "A Composite Solution With Just One Click" - Certification Guaranteed 16 Microsoft 70-417 : PracticeTest

    A. On Server2, run the netdom.exe command.

    B. On Server2, run the net stop netlogon command, and then run the net start netlogon command.

    C. On DC1, run the Enable-PSSessionConfiguration cmdlet.

    D. On Server2, modify the membership of the Remote Management Users group.

    Correct Answer: C

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    15/150

    Section: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:The Enable-PSSessionConfiguration cmdlet calls the Set-WSManQuickConfig cmdlet. However, it shouldnot be used to enable remoting on the computer. Instead, use the more comprehensive cmdlet, Enable-

    PSRemoting.

    http://technet.microsoft.com/en-us/library/hh849710.aspx

    QUESTION 18Your network contains an Active Directory domain named contoso.com. All servers run Windows Server2012 R2. The domain contains a server named Server1.

    You install the Windows PowerShell Web Access gateway on Server1.

    You need to provide administrators with the ability to manage the servers in the domain by using theWindows PowerShell Web Access gateway.

    Which two cmdlets should you run on Server1? (Each correct answer presents part of the solution.Choose two.)

    A. Install-PswaWebApplication

    B. Add PswaAuthorizationRule

    C. Set-WSManlnstance

    D. Set-WSManQuickConfig

    E. Set-BCAuthentication

    Correct Answer: ABSection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:

    Install-PswaWebApplication cmdlet is a quick way to get Windows PowerShell Web Access configured.

    Add PswaAuthorizationRule - this authorization rule allows a specific user access to one computer on thenetwork to which they typically have access, with access to a specific session configuration that isscoped to the users typical scripting and cmdlet needs. Adds a new authorization rule to the WindowsPowerShell Web Access authorization rule set.

    QUESTION 19Your network contains an Active Directory domain named contoso.com. The domain contains a servernamed Server1 that runs Windows Server 2012 and a server named Server2 that runs Windows Server2008 R2 Service Pack 1 (SP1). Both servers are member servers.

    On Server2, you install all of the software required to ensure that Server2 can be managed remotely fromServer Manager.

    You need to ensure that you can manage Server2 from Server1 by using Server Manager.

    Which two tasks should you perform on Server2? (Each correct answer presents part of the solution.Choose two.)

    A. Run the Enable-PSRemotingcmdlet.B. Run the Configure-SMRemoting.ps1 script.

    C. Run the Enable-PSSessionConfigurationcmdlet.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    16/150

    D. Run the Set-ExecutionPolicycmdlet.

    E. Run the systempropertiesremote.exe command.

    Correct Answer: BDSection: (none)Explanation

    Explanation/Reference:Explanation:The output of this command indicates whether Server Manager Remoting is enabled or disabled on theserver. To configure Server Manager remote management by using Windows PowerShellOn the computer that you want to manage remotely, open a Windows PowerShell session with elevateduser rights. To do this, click Start, click All Programs, click Accessories, click

    Windows PowerShell, right-click the Windows PowerShell shortcut, and then click Run as administrator.In the Windows PowerShell session, type the following, and then press Enter.Set-ExecutionPolicy -ExecutionPolicyRemoteSignedType the following, and then press Enter to enable all required firewall rule exceptions.Configure-SMRemoting .ps1 -force enable

    QUESTION 20Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2 that run Windows Server 2012 R2.

    You log on to Server1.

    You need to retrieve the IP configurations of Server2.

    Which command should you run from Server1?

    A. winrm get server2

    B. dsquery -scope base -attrip/server2C. winrs -r:server2 ipconfig

    D. ipconfig> server2.ip

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:Windows Remote Management allows you to manage and execute programs remotely

    QUESTION 21Your network contains an Active Directory domain named contoso.com. The domain contains a servernamed Server1. Server1 has the DHCP Server server role and the Network Policy Server role serviceinstalled.

    Server1 contains three non-overlapping scopes named Scope1, Scope2, and Scope3. Server1 currentlyprovides the same Network Access Protection (NAP) settings to the three

    scopes.

    You modify the settings of Scope1 as shown in the exhibit. (Click the Exhibit button.)

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    17/150

    You need to configure Server1 to provide unique NAP enforcement settings to the NAP non-compliantDHCP clients from Scope1.

    What should you create?

    A. A network policy that has the MS-Service Class condition

    B. A connection request policy that has the Service Type condition

    C. A network policy that has the Identity Type condition

    D. A connection request policy that has the Identity Type condition "A Composite Solution With Just OneClick" - Certification Guaranteed 20 Microsoft 70-417 : Practice Test

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:

    Explanation: Explanation/Reference:MS-Service Class - Restricts the policy to clients that have received an IP address from a DHCP scopethat matches the specified DHCP profile name. This condition is used only when you are deploying NAPwith the DHCP enforcement method. To use the MS-Service Class attribute, in Specify the profile name

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    18/150

    that identifies your DHCP scope, type the name of an existing DHCP profile.http://technet.microsoft.com/en-us/library/cc731220(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/cc731560(v=ws.10).aspx

    QUESTION 22Your network contains an Active Directory domain named contoso.com. The domain contains a servernamed Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy Server role service

    installed.

    You plan to configure Server1 as a Network Access Protection (NAP) health policy server for VPNenforcement by using the Configure NAP wizard.

    You need to ensure that you can configure the VPN enforcement method on Server1 successfully.

    What should you install on Server1 before you run the Configure NAP wizard?

    A. A computer certificate

    B. A system health validator (SHV)

    C. The Remote Access server role

    D. The Host Credential Authorization Protocol (HCAP)

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:Host Credential Authorization Protocol (HCAP) allows you to integrate your Microsoft Network AccessProtection (NAP) solution with Cisco Network Admission Control

    System health validators (SHVs) define configuration requirements for NAP client computers.

    The NAP health policy server requires a computer certificate to perform PEAP-based user or computerauthentication. After this certificate is acquired, a connection to AD CS is not required for as long as thecertificate is valid.

    http://technet.microsoft.com/en-us/library/cc732681.aspx http://technet.microsoft.com/en-us/library/dd125396(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831416.aspx http://technet.microsoft .com/en-us/library/dd125301(v=ws.10).aspx

    QUESTION 23Your network contains an Active Directory domain named contoso.com. The domain contains clientcomputers that run Either Windows XP, Windows 7, or Windows 8.

    Network Policy Server (NPS) is deployed to the domain.

    You plan to create a system health validator (SHV).

    You need to identify which policy settings can be applied to all of the computers.

    Which three policy settings should you identify? (Each correct answer presents part of the solution.Choose three.)

    A. Automatic updating is enabled.

    B. A firewall is enabled for all network connections.

    C. An antispyware application is on.

    D. Antispyware is up to date.

    E. Antivirus is up to date.

    Correct Answer: ABE

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    19/150

    Section: (none)Explanation

    Explanation/Reference:You can only choose An antispyware application is on if the client computer is running Windows Vista orWindows 7. The WSHA on NAP client computers running Windows XP SP3 does not monitor the statusof antispyware applications.

    http://technet.microsoft.com/en-us/library/cc731260.aspx

    QUESTION 24Your network contains an Active Directory domain named adatum.com. The domain contains a servernamed Server1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server(NPS) server and as a DHCP server.

    The network contains two subnets named Subnet1 and Subnet2. Server1 has a DHCP scope for eachsubnet.

    You need to ensure that noncompliant computers on Subnet1 receive different network policies thannoncompliant computers on Subnet2.

    Which two settings should you configure? (Each correct answer presents part of the solution. Choosetwo.)

    A. The MS-Service Class conditions

    B. The Called Station ID constraints

    C. The NAP-Capable Computers conditions

    D. The NAS Port Type constraints

    E. The Health Policies conditions

    Correct Answer: ACSection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:The NAP health policy server uses the NPS role service with configured health policies and system healthvalidators (SHVs) to evaluate client health based on administrator- defined requirements. Based on resultsof this evaluation, NPS instructs the DHCP server to provide full access to compliant NAP clientcomputers and to restrict access to client computers that are noncompliant with health requirements.

    If policies are filtered by DHCP scope, then MS-Service Class is configured in policy conditions.

    QUESTION 25Your network contains a single Active Directory domain named contoso.com. All domain controllers runWindows Server 2012 R2.

    The domain contains 400 desktop computers that run Windows 8 and 200 desktop computers that runWindows Vista Service Pack 2(SP2).

    All of the desktop computers are located in an organizational unit (OU) named OU1.

    You create a Group Policy object (GPO) named GPO1. GPO1 contains startup script

    settings. You link GPO1 to OU1.

    You need to ensure that GPO1 is applied only to computers that run Windows 8.

    What should you do?

    A. Modify the Security settings of OU1.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    20/150

    B. Create and link a WMI filter to GPO1.

    C. Run the Set-GPInheritancecmdlet and specify the -target parameter.

    D. Run the Set-GPLinkcmdlet and specify the -target parameter.

    Correct Answer: BSection: (none)

    Explanation

    Explanation/Reference:Explanation: Explanation/Reference:WMI Filtering is used to get information of the system and apply the GPO on it with the condition is met.Security filtering: apply a GPO to a specific group (members of the group)

    QUESTION 26Your network contains an Active Directory domain named contoso.com. The domain contains a servernamed Server1 that runs Windows Server 2012. Server1 has the Remote Desktop Session Host roleservice installed. The computer account of Server1 resides in an organizational unit (OU) named OU1.

    You create and link a Group Policy object (GPO) named GPO1 to OU1. GPO1 is configured as shown in

    the exhibit. (Click the Exhibit button.)

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    21/150

    You need to prevent GPO1 from applying to your user account when you log on to Server1. GPO1 mustapply to every other user who logs on to Server1.

    What should you configure?

    A. Item-level targeting

    B. Security Filtering

    C. Block Inheritance

    D. WMI Filtering

    Correct Answer: B

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    22/150

    Section: (none)Explanation

    Explanation/Reference:Security Filtering: Set Deny for Read and/or Apply Group Policy (AGP).In order for the GPO to apply to a given user or computer, that user or computer must have both Read andApply Group Policy (AGP) permissions on the GPO, either explicitly, or effectively though group

    membership.

    http://technet.microsoft.com/en-us/library/cc781988(v=ws.10).aspx

    QUESTION 27Your network contains an Active Directory domain named contoso.com. All domain controllers runWindows Server 2012 R2.

    An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. AGroup Policy object (GPO) named GPO1 is linked to OU1.

    You make a change to GPO1.

    You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. Thesolution must minimize administrative effort.

    Which tool should you use?

    A. TheSecedit command

    B. The Invoke-GpUpdate cmdlet

    C. Group Policy Object Editor

    D. Server Manager

    Correct Answer: BSection: (none)

    Explanation

    Explanation/Reference:Invoke-GpUpdate - Schedule a remote Group Policy refresh (gpupdate) on the specified computer.

    http://technet.microsoft.com/en-us/library/hh967455.aspx

    QUESTION 28Your network contains an Active Directory domain named contoso.com. All domain controllers runWindows Server 2012.

    The domain contains an Edge Server named Server1. Server1 is configured as a DirectAccess server.Server1 has the following settings:

    Internal DNS name: Server1.contoso.com External DNS name:dal.contoso.comInternal IPv6 address: 2002:c1a8:6a:3333::1 External IPv4 address: 65.55.37.62

    Your company uses split-brain DNS for the contoso.com zone.

    You run the Remote Access Setup wizard as shown in the following exhibit. (Click the Exhibit button.)

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    23/150

    You need to ensure that client computers on the Internet can establish DirectAccess connections toServer1.

    Which additional name suffix entry should you add from the Remote Access Setup wizard?

    A. A Name Suffix value of Server1.contoso.com and a blank DNS Server Address value

    B. A Name Suffix value of dal.contoso.com and a blank DNS Server Address value

    C. A Name Suffix value of Server1.contoso.com and a DNS Server Address value of 65.55.37.62

    D. A Name Suffix value of dal.contoso.com and a DNS Server Address value of 65.55.37.62

    Correct Answer: A

    Section: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:For split-brain DNS deployments, you must list the FQDNs that are duplicated on the Internet and intranetand decide which resources the DirectAccess client should reach, the intranet version or the public(Internet) version. For each name that corresponds to a resource for which you want DirectAccess clientsto reach the public version, you must add the corresponding FQDN as an exemption rule to the NRPT foryour DirectAccess clients. Name suffixes that do not have corresponding DNS servers are treated asexemptions.

    http://technet.microsoft.com/en-us/library/ee382323(v=ws.10).aspx

    QUESTION 29

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    24/150

    Your network contains an Active Directory domain named contoso.com. The domain contains a servernamed Server1 that has the Remote Access server role installed.

    DirectAccess is implemented on Server1 by using the default configuration.

    You discover that DirectAccess clients do not use DirectAccess when accessing websites on the Internet.

    You need to ensure that DirectAccess clients access all Internet websites by using their DirectAccessconnection.

    What should you do?

    A. Configure a DNS suffix search list on the DirectAccess clients.

    B. Enable the Route all traffic through the internal network policy setting in the DirectAccess ServerSettings Group Policy object (GPO).

    C. Configure DirectAccess to enable force tunneling.

    D. Disable the DirectAccess Passive Mode policy setting in the DirectAccess Client Settings GroupPolicy object (GPO).

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:PowerShell: Set-DAClient ForceTunnel

    QUESTION 30Your network contains an Active Directory domain named contoso.com. The domain contains a Webserver named www.contoso.com. The Web server is available on the Internet.

    You implement DirectAccess by using the default configuration.

    You need to ensure that users never attempt to connect to www.contoso.com by using DirectAccess. Thesolution must not prevent the users from using DirectAccess to access other resources in contoso.com.

    Which settings should you configure in a Group Policy object (GPO)?

    A. DirectAccess Client Experience Settings

    B. Name Resolution Policy

    C. DNS Client

    D. Network Connections

    Correct Answer: BSection: (none)

    Explanation

    Explanation/Reference:Explanation: Explanation/Reference:For DirectAccess, the NRPT must be configured with the namespaces of your intranet with a leading dot(for example, .internal.contoso.com or .corp.contoso.com). For a DirectAccess client, any name requestthat matches one of these namespaces will be sent to the specified intranet Domain Name System (DNS)servers.

    Include all intranet DNS namespaces that you want DirectAccess client computers to access.There are no command line methods for configuring NRPT rules. You must use Group Policy settings. Toconfigure the NRPT through Group Policy, use the Group Policy add-in at Computer Configuration \Policies\Windows Settings\Name Resolution Policy in the Group Policy object for DirectAccess clients. You cancreate a new NRPT rule and edit or delete existing rules. For more information, see Configure the NRPTwith Group Policy.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    25/150

    QUESTION 31Your network contains an Active Directory domain named contoso.com. The domain contains a memberserver named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

    Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server 2012 R2 andhosts a processor-intensive application named App1.

    Users report that App1 responds more slowly than expected.

    You need to monitor the processor usage on VM1 to identify whether changes must be made to thehardware settings of VM1.

    Which performance object should you monitor on Server1?

    A. Hyper-V Hypervisor Logical Processor

    B. Hyper-V Hypervisor Root Virtual Processor

    C. Processor

    D. Hyper-V Hypervisor Virtual Processor

    E. Process

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:Processor - Traditionally, processor performance can be measured using the "\Processor(*)\% ProcessorTime" performance monitor counter. This is not an accurate counter for evaluating processor utilization ofa guest operating system though because Hyper-V B. Shows the percentage of time used by the virtualprocessor in guest code. This is used to determine the processor utilization of the virtualization stack onthe host server. C. Identifies how much of the physical processor is being used to run the virtualmachines. This counter does not identify the individual virtual machines or the amount consumed by eachvirtual machine.Process - This counter is a natural choice that will give use the amount of time that this particular processspends using the processor resource.Virtual Processor - Identifies how much of the virtual processor is being consumed by a virtual machine.

    http://msdn.microsoft.com/en-us/library/cc768535(v=bts.10).aspxhttp://technet.microsoft.com/en-us/library/cc742454.aspx http://technet.microsoft.com/en-us/library/ff367892(v=exchg.141).aspx

    QUESTION 32Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012R2. On Server1, you create a Data Collector Set (DCS) named Data1.

    You need to export Data1 to Server2.

    What should you do first?

    A. Right-click Data1 and click Save template...

    B. Right-click Data1 and click Export list...

    C. Right-click Data1 and click Data Manager...

    D. Right-click Data1 and click Properties.

    Correct Answer: ASection: (none)Explanation

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    26/150

    Explanation/Reference:To export a Data Collector Set you create as a template for use on other computers, open WindowsPerformance Monitor, expand Data Collector Sets, right-click the Data Collector Set you want to export,and click Save Template.

    http://technet.microsoft.com/en-us/library/cc766318.aspx

    QUESTION 33You have a server named Server1 that runs Windows Server 2012 R2.

    You discover that the performance of Server1 is poor.

    The results of a performance report generated on Server1 are shown in the following table.

    You need to identify the cause of the performance issue.

    What should you identify?

    A. Insufficient processors

    B. Excessive paging

    C. Driver malfunction

    D. Insufficient RAM

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:

    Explanation: Explanation/Reference:

    Processor: %DPC Time. Much like the other values, this counter shows the amount of time that the

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    27/150

    processor spends servicing DPC requests. DPC requests are more often than not associated with thenetwork interface.

    Processor: % Interrupt Time. This is the percentage of time that the processor is spending on handlingInterrupts. Generally, if this value exceeds 50% of the processor time you may have a hardware issue.Some components on the computer can force this issue and not really be a problem. For example aprogrammable I/O card like an old disk controller card, can take up to 40% of the CPU time. A NIC on a

    busy IIS server can likewise generate a large percentage of processor activity.

    Processor: % User Time. The value of this counter helps to determine the kind of processing that isaffecting the system. Of course the resulting value is the total amount of non-idle time that was spent onUser mode operations. This generally means application code.

    Processor: %Privilege Time. This is the amount of time the processor was busy with Kernel modeoperations. If the processor is very busy and this mode is high, it is usually an indication of some type ofNT service having difficulty, although user mode programs can make calls to the Kernel mode NTcomponents to occasionally cause this type of performance issue.

    Memory: Pages/sac This value is often confused with Page Faults/sec. The Pages/sec counter is acombination of Pages Input/sec and Pages Output/sec counters. Recall that Page Faults/sec is a

    combination of hard page faults and soft page faults. This counter, however, is a general indicator of howoften the system is using the hard drive to store or retrieve memory associated data.

    http://technet.microsoft.com/en-us/library/cc768048.aspx

    QUESTION 34Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012 R2.

    Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. Cluster1 hosts 10 virtual machines.All of the virtual machines run Windows Server 2012 R2 and are members of the domain.

    You need to ensure that the first time a service named Service1 fails on a virtual machine, the virtual

    machine is moved to a different node.

    You configure Service1 to be monitored from Failover Cluster Manager.

    What should you configure on the virtual machine?

    A. From the General settings, modify the Startup type.

    B. From the Recovery settings of Service1, set the First failure recovery action to Take No Action.

    C. From the Recovery settings of Service1, set the First failure recovery action to Restart the Service.

    D. From the General settings, modify the Service status.

    Correct Answer: B

    Section: (none)Explanation

    Explanation/Reference:

    Explanation: Explanation/Reference:Configure the virtual machine to take no action through Hyper-V if the physical computer shuts down bymodifying the Automatic Stop Action setting to None. Virtual machine state must be managed through theFailover Clustering feature. http://technet.microsoft.com/en-us/library/cc742396.aspx http://windowsitpro.com/windows-server-2012/enable-windows-server-2012-failover- cluster-hyper-v-vmmonitoring

    QUESTION 35You have a server named Server1 that runs Windows Server 2012 R2.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    28/150

    You need to configure Server1 to create an entry in an event log when the processor usage exceeds 60percent.

    Which type of data collector should you create?

    A. A performance counter data collector

    B. An event trace data collector

    C. A performance counter alert

    D. A configuration data collector

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 36Your network contains an Active Directory forest named contoso.com. All servers run Windows Server

    2012 R2.

    You need to create a custom Active Directory application partition.

    Which tool should you use?

    A. Eseutil

    B. Dsadd

    C. Dsmod

    D. Ntdsutil

    Correct Answer: D

    Section: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:* To create or delete an application directory partition Open Command Prompt.Type:ntdsutilAt the ntdsutil command prompt, type:domain management At the domain management command prompt,type:connection At the server connections command prompt, type:connect to server ServerName At theserver connections command prompt, type:quit At the domain management command prompt, do one ofthe following:

    * partition management

    Manages directory partitions for Active Directory Domain Services (AD DS) or Active DirectoryLightweight Directory Services (AD LDS). This is a subcommand of Ntdsutil and Dsmgmt. Ntdsutil andDsmgmt are command-line tools that are built into Windows Server 2008 and Windows Server 2008 R2./ partition management create nc %s1 %s2Creates the application directory partition with distinguished name %s1, on the Active Directory domaincontroller or AD LDS instance with full DNS name %s2. If you specify "NULL" for %s2, this command usesthe currently connected Active Directory domain controller.Use this command only with AD DS. For AD LDS, use createnc %s1 %s2 %s3.

    Note:

    * An application directory partition is a directory partition that is replicated only to specific domaincontrollers. A domain controller that participates in the replication of a particular application directorypartition hosts a replica of that partition.

    QUESTION 37

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    29/150

    Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC1.

    You run ntdsutil as shown in the exhibit. (Click the Exhibit button.)

    You need to ensure that you can access the contents of the mounted snapshot.

    What should you do?

    A. From a command prompt, run dsamain.exe -dbpathc:\$snap_201204131056_volumec$\windows\ntds\ntds.dit -Idapport 33389.

    B. From the snapshot context of ntdsutil, run mount {79f94f82-5926-4f44-8af0- 2f56d827a57d>.

    C. From the snapshot context of ntdsutil, run activate instance "NTDS".

    D. From a command prompt, run dsamain.exe -dbpath

    c:\$snap_201204131056_volumec$\windows\ntds\ntds.dit -Idapport 389.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:

    A.Custom port needs to be defined when mounting to allow access from ADUC B. 389 is used as thestandard ldap portC.Run prior to mount and after the mount run dsamain Sets NTDS or a specific AD LDS instance as theactive instance.

    B.mounts a specific snap shot as specified by guid, using the snapshot mounted you needs to run dsamainto start an instance of ADhttp://technet.microsoft.com/en-us/library/cc753609(v=ws.10).aspx

    QUESTION 38Your company deploys a new Active Directory forest named contoso.com. The first domain controller inthe forest runs Windows Server 2012 R2. The forest contains a domain controller named DC10.

    On DC10, the disk that contains the SYSVOL folder fails.

    You replace the failed disk. You stop the Distributed File System (DFS) Replication service.You restore the SYSVOL folder.

    You need to perform a non-authoritative synchronization of SYSVOL on DC10.

    Which tool should you use before you start the DFS Replication service on DC10?

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    30/150

    A. Active Directory Sites and Services

    B. Dfsmgmt.msc

    C. Ldp

    D. Frsutil

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:http://support.microsoft.com/kb/2218556Last anser was wrong: You cannot use the DFS Management snap-in (Dfsmgmt.msc) or theDfsradmin.exe command-line tool to achieve this.Document says about using ADSIEDIT.MSC, but we have't got that answer here, so we'll use LDP.EXEfor exchange.

    AD Sites and Services has nothing to do with it, Frsutil is not correct tool name.

    QUESTION 39Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC1 that runs Windows Server 2012 R2.

    You create an Active Directory snapshot of DC1 each day.

    You need to view the contents of an Active Directory snapshot from two days ago.

    What should you do first?

    A. Start the Volume Shadow Copy Service (VSS).

    B. Run the dsamain.exe command.

    C. Run the ntdsutil.exe command.D. Stop the Active Directory Domain Services (AD DS) service.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:1. ntdsutil.exe to mount the snapshot2. dsamain.exe to expose it as LDAP server3. ldp.exe to view content

    http://technet.microsoft.com/en-us/library/cc753609(v=ws.10).aspx

    http://www.petri.co.il/working-active-directory-snapshots-windows-server-2008.htm

    QUESTION 40Your network contains an Active Directory domain named contoso.com. The domain contains a servernamed Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed.

    An administrator installs the IP Address Management (IPAM) Server feature on a server named Server2.The administrator configures IPAM by using Group Policy based provisioning and starts server discovery.

    You plan to create Group Policies for IPAM provisioning.

    You need to identify which Group Policy object (GPO) name prefix must be used for IPAM Group Policies.

    What should you do on Server2?

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    31/150

    A. From Server Manager, review the IPAM overview.

    B. Run the Get-IpamConfigurationcmdlet.

    C. From Task Scheduler, review the IPAM tasks.

    D. Run the ipamgc.exe tool.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 41Your network contains an Active Directory forest named adatum.com. All servers run Windows Server2012 R2. The domain contains four servers.

    The servers are configured as shown in the following table.

    You need to deploy IP Address Management (IPAM) to manage DNS and DHCP.

    On which server should you install IPAM?

    A. Server1

    B. Server2

    C. Server3

    D. Server4

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:IPAM can't be deployed on DC.

    QUESTION 42You have a server named Server1.

    You install the IP Address Management (IPAM) Server feature on Server1.

    You need to provide a user named User1 with the ability to set the access scope of all the DHCP serversthat are managed by IPAM. The solution must use the principle of least privilege.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    32/150

    Which user role should you assign to User1?

    A. IP Address Record Administrator Role

    B. IPAM Administrator Role

    C. IPAM MSM Administrator Role

    D. IPAM DHCP Scope Administrator Role

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:IPAM ASM

    QUESTION 43Your network contains an Active Directory domain named contoso.com. The domain contains two serversnamed Server1 and Server2. Both servers have the IP Address Management (IPAM) Server featureinstalled.

    You have a support technician named Tech1. Tech1 is a member of the IPAM Administrators group onServer1 and Server2.

    You need to ensure that Tech1 can use Server Manager on Server1 to manage IPAM on Server2.

    To which group on Server2 should you add Tech1?

    A. WinRMRemoteWMIUsers_

    B. IPAM MSM Administrators

    C. Remote Management Users

    D. IPAM Administrators

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:

    IPAM MSM Administrators can't access remotely

    IPAM Administrators can't access remotely

    If you are accessing the IPAM server remotely using Server Manager IPAM client RSAT, then you mustbe a member of the WinRMRemoteWMIUsers group on the IPAM server, in addition to being a member ofthe appropriate IPAM security group (or local Administrators group).http://msdn.microsoft.com/en-us/library/windows/desktop/aa384295(v=vs.85).aspx http://www.microsoft.com/en-us/download/details.aspx? id=29012

    QUESTION 44Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012 R2.

    Server1 and Server2 have the Failover Clustering feature installed.The servers are configured as nodesin a failover cluster named Cluster1.

    You add two additional nodes in Cluster1.

    You have a folder named Folder1 on Server1 that hosts application data. Folder1 is a folder target in a

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    33/150

    Distributed File System (DFS) namespace.

    You need to provide highly available access to Folder1. The solution must support DFS Replication toFolder1.

    What should you configure?

    A. Affinity - NoneB. Affinity - Single

    C. The cluster quorum settings

    D. The failover settings

    E. A file server for general use

    F. The Handling priority

    G. The host priority

    H. Live migration

    I. The possible owner

    J. The preferred owner

    K. Quick migrationL. The Scale-Out File Server

    Correct Answer: ESection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:

    QUESTION 45

    Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012 R2.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    34/150

    Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodesin a failover cluster named Cluster1.

    You configure File Services and DHCP as clustered resources for Cluster1. Server1 is the active node forboth clustered resources.

    You need to ensure that if two consecutive heartbeat messages are missed between Server1 and

    Server2, Server2 will begin responding to DHCP requests. The solution must

    ensure that Server1 remains the active node for the File Services clustered resource for up to five missedheartbeat messages.

    What should you configure?

    A. Affinity - None

    B. Affinity - Single

    C. The cluster quorum settings

    D. The failover settings

    E. A file server for general use

    F. The Handling priority

    G. The host priority

    H. Live migration

    I. The possible owner

    J. The preferred owner

    K. Quick migration

    L. The Scale-Out File Server

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:A. The number of heartbeats that can be missed before failover occurs is known as the heartbeatthresholdhttp://technet.microsoft.com/en-us/library/dn265972.aspx http://technet.microsoft.com/en-us/library/dd197562(v=ws.10).aspx http://blogs.msdn.com/b/clustering/archive/2012/11/21/10370765.aspx

    QUESTION 46Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Bothservers have the Hyper-V server role installed.Server1 and Server2 are located in different offices. Theoffices connect to each other by using a high-latency WAN link.

    Server2 hosts a virtual machine named VM1.

    You need to ensure that you can start VM1 on Server1 if Server2 fails. The solution must minimizehardware costs.

    What should you do?

    A. From the Hyper-V Settings of Server2, modify the Replication Configuration settings.Enable replication for VM1.

    B. On Server1, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1.

    C. On Server2, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1.

    D. From the Hyper-V Settings of Server1, modify the Replication Configuration settings.

    Enable replication for VM1.

    Correct Answer: D

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    35/150

    Section: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:You first have to enable replication on the Replica server--Server1--by going to the server and modifyingthe "Replication Configuration" settings under Hyper-V settings. You then go to VM1--which presides on

    Server2-- and run the "Enable Replication" wizard on VM1.

    "A Composite Solution With Just One Click" - Certification Guaranteed 53 Microsoft 70-417 : PracticeTest

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    36/150

    QUESTION 47

    You have 20 servers that run Windows Server 2012 R2.

    You need to create a Windows PowerShell script that registers each server in Windows Azure Backupand sets an encryption passphrase.

    Which two PowerShell cmdlets should you run in the script? (Each correct answer presents part of thesolution. Choose two.)

    A. Set-OBMachineSetting

    B. Add-OBFileSpec

    C. Start-OBRegistration

    D. New OBPolicy

    E. New-OBRetentionPolicy

    Correct Answer: AC

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    37/150

    Section: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:

    Start-OBRegistration - Registers the current computer with Windows Azure Online Backup using thecredentials (username and password) created during enrollment.Set-OBMachineSettingcmdlet - sets aOBMachineSetting object for the server that includes proxy serversettings for accessing the internet, network bandwidth throttling settings, and the encryption passphrasethat is required to decrypt the files during recovery to another server.

    Incorrect:TheAdd-OBFileSpeccmdlet adds theOBFileSpecobject, which specifies the items to include or excludefrom a backup, to the backup policy (OBPolicyobject). TheOBFileSpecobject can include or excludemultiple files, folders, or volumes. T

    http://technet.microsoft.com/en-us/library/hh770416(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh770425(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh770424.aspx http://

    technet.microsoft.com/en-us/library/hh770398.aspx http://technet.microsoft.com/en-us/library/hh770409.aspx

    QUESTION 48You have a server named Server1 that runs Windows Server 2012 R2.

    Server1 is backed up by using Windows Server Backup. The backup configuration is shown in the exhibit.(Click the Exhibit button.)

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    38/150

    You discover that only the last copy of the backup is maintained.

    You need to ensure that multiple backup copies are maintained.

    What should you do?

    A. Configure the Optimize Backup Performance settings.

    B. Modify the Volume Shadow Copy Service (VSS) settings.

    C. Modify the backup times.

    D. Modify the backup destination.

    Correct Answer: DSection: (none)

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    39/150

    Explanation

    Explanation/Reference:Explanation:A, The destination in the exhibit shows a network share is used. If a network share is being used only thelatest copy will be savedhttp://windows.microsoft.com/en-us/windows7/where-should-i-save-my-backup

    "A Composite Solution With Just One Click" - Certification Guaranteed 56 Microsoft 70-417 : PracticeTest

    QUESTION 49

    You have five servers that run Windows Server 2012 R2. The servers have the Failover Clusteringfeature installed.

    You deploy a new cluster named Cluster1. Cluster1 is configured as shown in the following table.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    40/150

    Server1, Server2/ and Server3 are configured as the preferred owners of the cluster roles.Dynamic quorum management is disabled.

    You plan to perform hardware maintenance on Server3.

    You need to ensure that if the WAN link between Site1 and Site2 fails while you are performingmaintenance on Server3, the cluster resource will remain available in Site1.

    What should you do?

    A. Remove the node vote for Server3.

    B. Enable DrainOnShutdown on Cluster1.

    C. Add a file share witness in Site1.

    D. Remove the node vote for Server4 and Server5.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 50

    You have 30 servers that run Windows Server 2012 R2.

    All of the servers are backed up daily by using Windows Azure Backup.

    You need to perform an immediate backup of all the servers to Windows Azure Backup.

    Which Windows PowerShell cmdlets should you run on each server?

    A. Get-OBPolicy | Start-OBBackup

    B. Get-WBPolicy | Start-WBBackup

    C. Start-OBRegistration | Start-OBBackup

    D. Get-WBBackupTarget | Start-WBBackup

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Explanation:A. starts a backup job using a policyB. Not using Azure

    C. Registers the current computer to Windows Azure Backup.D. Not using Azure

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    41/150

    http://technet.microsoft.com/en-us/library/hh770406(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh770426.aspx http://technet.microsoft.com/en-us/library/hh770398.aspx

    QUESTION 51You have a server named Server1 that runs Windows Server 2012 R2.

    You install the File and Storage Services server role on Server1.

    From Windows Explorer, you view the properties of a folder named Folder1 and you discover that theClassification tab is missing.

    You need to ensure that you can assign classifications to Folder1 from Windows Explorer manually.

    What should you do?

    A. Install the File Server Resource Manager role service.

    B. From Folder Options, clear Hide protected operating system files (Recommended).

    C. Install the Share and Storage Management Tools.

    D. From Folder Options, select the Always show menus.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:Classification Management is a feature of FSRMhttp://technet.microsoft.com/en-us/library/dd759252.aspxhttp://technet.microsoft.com/en-us/library/dd758759(v=WS.10).aspx

    QUESTION 52Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows

    Server 2008 R2.

    The domain contains a file server named Server6 that runs Windows Server 2012 R2. Server6 contains afolder named Folder1. Folder1 is shared as Share1. The NTFS permissions on Folder1 are shown in theexhibit. (Click the Exhibit button.)

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    42/150

    The domain contains two global groups named Group1 and Group2.

    You need to ensure that only users who are members of both Group1 and Group2 are denied access toFolder1.

    Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

    A. Deny Group2 permission to Folder1.

    B. Remove the Deny permission for Group1 from Folder1.C. Deny Group1 permission to Share1.

    D. Deny Group2 permission to Share1.

    E. Install a domain controller that runs Windows Server 2012 R2

    F. Create a conditional expression.

    Correct Answer: EFSection: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:

    * Conditional Expressions for Permission EntriesWindows Server 2008 R2 and Windows 7 enhanced Windows security descriptors by introducing aconditional access permission entry. Windows Server 2012 takes advantage of conditional access

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    43/150

    permission entries by inserting user claims, device claims, and resource properties, into conditionalexpressions. Windows Server 2012 security evaluates these expressions and allows or denies accessbased on results of the evaluation. Securing access to resources through claims is known as claims-based access control.

    "A Composite Solution With Just One Click" - Certification Guaranteed 63 Microsoft 70-417 : PracticeTest

    Claims-based access control works with traditional access control to provide an additional layer ofauthorization that is flexible to the varying needs of the enterprise environment. http://social.technet.microsoft.com/wiki/contents/articles/14269.introducing-dynamic- access-control-en-us.aspx

    QUESTION 53Your network contains an Active Directory domain named contoso.com. The domain contains a file servernamed Server1 and a domain controller named DC1. All servers run Windows Server 2012 R2.

    A Group Policy object (GPO) named GPO1 is linked to the domain.

    Server1 contains a folder named Folder1. Folder1 is shared as Share1.

    You need to ensure that authenticated users can request assistance when they are denied access to theresources on Server1.

    Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

    A. Enable the Enable access-denied assistance on client for all file types policy setting for GPO1.

    B. Configure the Customize message for Access Denied errors policy setting of GPO1.

    C. Install the File Server Resource Manager role service on DC1.

    D. Install the File Server Resource Manager role service on Server1.

    E. Assign the Read Attributes NTFS permission on Folder1 to the Authenticated Users group.

    Correct Answer: BDSection: (none)Explanation

    Explanation/Reference:http://technet.microsoft.com/en-us/library/hh831402.aspx#BKMK_1http://4sysops.com/archives/access-denied-assistance-in-windows-server-2012/

    I think that it will rather be "Configure the Customize message for Access Denied errors policy setting ofGPO1" instead of "Enable the Enable access-denied assistance on client for all file types policy setting forGPO1". When custom message is not set, by default the standard Access Denied message appearswhich doesn't provide any of the functionality controlled by this policy setting (no links, so users can'trequest access).A or B? and D

    QUESTION 54Your network contains an Active Directory domain named contoso.com. The domain contains a file servernamed Server1. The File Server Resource Manager role service is installed on Server1. All servers runWindows Server 2012 R2.

    A Group Policy object (GPO) named GPO1 is linked to the organizational unit (OU) that contains Server1.The following graphic shows the configured settings in GPO1.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    44/150

    Server1 contains a folder named Folder1. Folder1 is shared as Share1.

    You attempt to configure access-denied assistance on Server1, but the Enable access- deniedassistance option cannot be selected from File Server Resource Manager.

    You need to ensure that you can configure access-denied assistance on Server1 manually by using FileServer Resource Manager.

    What should you do?

    A. Set the Customize message for Access Denied errors policy setting to Enabled for GPO1.

    B. Set the Enable access-denied assistance on client for all file types policy setting to Disabled forGPO1.

    C. Set the Enable access-denied assistance on client for all file types policy setting to Enabled for GPO1.D. Set the Customize message for Access Denied errors policy setting to Not Configured for GPO1.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:D. ensure that you can configure access-denied assistancehttp://technet.microsoft.com/en-us/library/hh831402.aspx#BKMK_1http://4sysops.com/archives/access-denied-assistance-in-windows-server-2012/

    QUESTION 55Your network contains an Active Directory domain named contoso.com. All servers run Windows Server2012 R2.

    You are creating a central access rule named Test Finance that will be used to audit members of theAuthenticated users group for access failure to shared folders in the finance department.

    You need to ensure that access requests are unaffected when the rule is published. What should you do?

    A. Set the Permissions to Use the following permissions as proposed permissions.

    B. Add a Resource condition to the current permissions entry for the Authenticated Users principal.

    C. Set the Permissions to Use following permissions as current permissions.

    D. Add a User condition to the current permissions entry for the Authenticated Users principal.

    Correct Answer: A

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    45/150

    Section: (none)Explanation

    Explanation/Reference:Explanation: Explanation/Reference:http://technet.microsoft.com/en-us/library/jj134043.aspx

    QUESTION 56DRAG DROP

    Your network contains an Active Directory domain named contoso.com. The domain contains a servernamed Server1 that runs Windows Server 2012 R2.

    You plan to install the Active Directory Federation Services server role on Server1 to allow for Workplace

    Join.You run nslookup enterpriseregistration and you receive the following results:

    You need to create a certificate request for Server1 to support the Active Directory Federation Services(AD FS) installation.

    How should you configure the certificate request? To answer, drag the appropriate names to the correctlocations. Each name may be used once, more than once, or not at all. You may need to drag the split barbetween panes or scroll to view content.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    46/150

    A. Adfs1.contoso.com, Adfs1.contoso.com, Enterpriseregistration.contoso.com

    B.

    C.

    D.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:"A Composite Solution With Just One Click" - Certification Guaranteed 69 Microsoft 70-417 : PracticeTest

    QUESTION 57You deploy an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure usesActive Directory as the attribute store.

    Some users report that they fail to authenticate to the AD FS infrastructure.

    You discover that only users who run third-party web browsers experience issues.

    You need to ensure that all of the users can authenticate to the AD FS infrastructure successfully.

    Which Windows PowerShell command should you run?

    A. Set-ADFSProperties -SSOLifetime 1:00:00

    B. Set-ADFSProperties -AddProxyAuthenticationRules None

    C. Set-ADFSProperties -ExtendedProtectionTokenCheck None

    D. Set-ADFSProperties -ProxyTrustTokenLifetime 1:00:00

    Correct Answer: CSection: (none)

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    47/150

    Explanation

    Explanation/Reference:Explanation: Explanation/Reference:A. Sets the valid token lifetime for proxy trust tokens (in minutes). This value is used by the federationserver proxy to authenticate with its associated federation server. B. Specifies a policy rule set that canbe used to establish authorization permissions for setting up trust proxies. The default value allows the AD

    FS 2.0 service user account or any member of BUILTIN\Administrators to register a federation serverproxy with the Federation Service.C. Specifies the duration of the single sign-on (SSO) experience for Web browser clients (in minutes).D. pacifies the level of extended protection for authentication supported by the federation server.Extended Protection for Authentication helps protect against man-in-the-middle

    (MITM) attacks, in which an attacker intercepts a client's credentials and forwards them to a server.http://technet.microsoft.com/zh-cn/library/ee892317.aspx

    QUESTION 58Your network contains an Active Directory domain named contoso.com. The domain contains serversnamed Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory

    Federation Services server role installed.Server2 is a file server.

    Your company introduces a Bring Your Own Device (BYOD) policy.

    You need to ensure that users can use a personal device to access domain resources by using SingleSign-On (SSO) while they are connected to the internal network.

    Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

    A. Enable the Device Registration Service in Active Directory.

    B. Publish the Device Registration Service by using a Web Application Proxy.

    C. Configure Active Directory Federation Services (AD FS) for the Device Registration Service.D. Install the Work Folders role service on Server2.

    E. Create and configure a sync share on Server2.

    Correct Answer: ACSection: (none)Explanation

    Explanation/Reference:http://blogs.technet.com/b/matthewms/archive/2013/11/01/why-windows-server-2012-r2-step-by-step-workplace-join-bringing-peace-of-mind-for-byod.aspxhttp://technet.microsoft.com/en-us/library/dn280945.aspx

    QUESTION 59Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2.Server1 and Server2 are nodes in a failover cluster named Cluster1. The network contains two serversnamed Server3 and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in afailover cluster named Cluster2.

    You need to move all of the applications and the services from Cluster1 to Cluster2.

    What should you do first from Failover Cluster Manager?

    A. On a server in Cluster2, click Migrate Roles.

    B. On a server in Cluster2, click Move Core Cluster Resources, and then click Select Node...

    C. On a server in Cluster1, configure Cluster-Aware Updating.D. On a server in Cluster2, click Move Core Cluster Resources, and then click Best Possible Node.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    48/150

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:Migrate Roles - for migrating cluster roles between clusters.

    http://technet.microsoft.com/en-us/library/dn530779.aspx

    Move Core Cluster Resources and select either Best Possible Node or select the node of your choice. - itis for moving resources between cluster nodes.Cluster-Aware Updating - nothing to do with this question

    QUESTION 60Your network contains two servers named HV1 and HV2. Both servers run Windows Server 2012 R2 andhave the Hyper-V server role installed.

    HV1 hosts 25 virtual machines. The virtual machine configuration files and the virtual hard disks are storedin D:\VM.

    You shut down all of the virtual machines on HV1.

    You copy D:\VM to D:\VM on HV2.

    You need to start all of the virtual machines on HV2. You want to achieve this goal by using the minimumamount of administrative effort.

    What should you do?

    A. From HV1, export all virtual machines to D:\VM. Copy D:\VM to D:\VM on HV2 and overwrite theexisting files. On HV2, run the New Virtual Machine wizard.

    B. From HV1, export all virtual machines to D:\VM. Copy D:\VM to D:\VM on HV2 and overwrite the

    existing files. On HV2, run the Import Virtual Machine wizard.C. Run the Import-VM InitialReplicationcmdlet.

    D. Run the Import-VM cmdlet.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    49/150

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:You can either Export and Import or Copy VM filder and Import.

    QUESTION 61Your network contains an Active Directory domain named contoso.com. The domain contains a servernamed Server1 that runs Windows Server 2012. Server1 has the Remote Access server role installed.

    You log on to Server1 by using a user account named User2.

    From the Remote Access Management Console, you run the Getting Started Wizard and you receive awarning message as shown in the exhibit. (Click the Exhibit button.)

    You need to ensure that you can configure DirectAccess successfully. The solution must minimize thenumber of permissions assigned to User2.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    50/150

    To which group should you add User2?

    A. Account Operators

    B. Enterprise Admins

    C. Domain Admins

    D. Server Operators

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 62Your network contains a Hyper-V host named Hyperv1. Hyperv1 runs Windows Server 2012 R2.

    Hyperv1 hosts four virtual machines named VM1, VM2, VM3, and VM4. All of the virtual machines run

    Windows Server 2008 R2.

    You need to view the amount of memory resources and processor resources that VM4 currently uses.

    Which tool should you use on Hyperv1?

    A. Task Manager

    B. Windows System Resource Manager (WSRM)

    C. Hyper-V Manager

    D. Resource Monitor

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 63You have a server named Server1 that runs Windows Server 2012 R2.

    You create a custom Data Collector Set (DCS) named DCS1.

    You need to configure Server1 to start DCS1 automatically when the network usage exceeds 70 percent.

    Which type of data collector should you create?

    A. A performance counter alert

    B. A performance counter data collector

    C. An event trace data collector

    D. A configuration data collector

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:http://technet.microsoft.com/en-us/library/cc722414.aspx

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    51/150

    QUESTION 64Your network contains an Active Directory domain named adatum.com. The domain contains a memberserver named Server1 and 10 web servers. All of the web servers are in an organizational unit (OU)named WebServers_OU. All of the servers run Windows Server 2012 R2.

    On Server1, you need to collect the error events from all of the web servers. The solution must ensurethat when new web servers are added to WebServers_OU, their error events are collected automatically

    on Server1.

    What should you do?

    A. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure theConfigure target Subscription Manager setting.

    B. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure theConfigure forwarder resource usage setting.

    C. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO),configure the Configure forwarder resource usage setting.

    D. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO),

    configure the Configure target Subscription Manager setting.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:http://msdn.microsoft.com/en-us/library/windows/desktop/bb870973(v=vs.85).aspx

    QUESTION 65You have a server named Server1 that runs Windows Server 2012 R2.

    You create a Data Collector Set (DCS) named DCS1.

    You need to configure DCS1 to log data to D:\logs.

    What should you do?

    A. Right-click DCS1 and click Properties.

    B. Right-click DCS1 and click Save template...

    C. Right-click DCS1 and click Export list...

    D. Right-click DCS1 and click Data Manager...

    Correct Answer: ASection: (none)

    Explanation

    Explanation/Reference:http://technet.microsoft.com/en-us/library/cc749267.aspx

    QUESTION 66Your network contains an Active Directory domain named contoso.com.

    Network Policy Server (NPS) is deployed to the domain.

    You plan to deploy Network Access Protection (NAP).

    You need to configure the requirements that are validated on the NPS client computers.

    What should you do?

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    52/150

    A. From the Network Policy Server console, configure a health policy.

    B. From the Network Policy Server console, configure a network policy.

    C. From a Group Policy object (GPO), configure the NAP Client Configuration security setting.

    D. From a Group Policy object (GPO), configure the Network Access Protection Administrative Templatessetting.

    E. From the Network Policy Server console, configure a Windows Security Health Validator (WSHV)

    policy.

    Correct Answer: ESection: (none)Explanation

    Explanation/Reference:http://technet.microsoft.com/en-us/library/cc731260(v=ws.10).aspx

    QUESTION 67Your network contains an Active Directory domain named contoso.com. All servers run Windows Server2012 R2. The domain contains two servers. The servers are configured as shown in the following table.

    All client computers run Windows 8 Enterprise.

    You plan to deploy Network Access Protection (NAP) by using IPSec enforcement.

    A Group Policy object (GPO) named GPO1 is configured to deploy a trusted server group to all of theclient computers.

    You need to ensure that the client computers can discover HRA servers automatically.

    Which three actions should you perform? (Each correct answer presents part of the solution. Choosethree.)

    A. On all of the client computers, configure the EnableDiscovery registry key.

    B. In a GPO, modify the Request Policy setting for the NAP Client Configuration.

    C. On Server2 configure the EnableDiscovery registry key.

    D. On DC1, create a service location (SRV) record.

    E. On DC1, create an alias (CNAME) record.

    Correct Answer: ABDSection: (none)Explanation

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    53/150

    Explanation/Reference:http://technet.microsoft.com/pl-PL/library/dd296901(v=ws.10).aspx

    The following requirements must be met in order to configure trusted server groups on NAP clientcomputers using HRA automatic discovery:

    Client computers must be running Windows Vista with Service Pack 1 (SP1) or Windows XP withService Pack 3 (SP3).

    The HRA server must be configured with a Secure Sockets Layer (SSL) certificate.The EnableDiscovery registry key must be configured on NAP client computers.DNS SRV records mu st be configu red.The trusted server group configuration in either local policy or Group Policy must be cleared.

    QUESTION 68Your network contains an Active Directory domain named adatum.com. The domain contains a servernamed Server1 that runs WindowsServer 2012 R2. Server1 is configured as a Network Policy Server(NPS) server and as a DHCP server.

    You need to ensure that only computers that send a statement of health are checked for Network AccessProtection (NAP) health requirements.

    Which two settings should you configure? (Each correct answer presents part of the solution. Choosetwo.)

    A. The NAS Port Type constraints

    B. The MS-Service Class conditions

    C. The Health Policies conditions

    D. The NAP-Capable Computers conditions

    E. The Called Station ID constraints

    Correct Answer: CDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 69Your network contains an Active Directory domain named contoso.com. All domain controllers runWindows Server 2012 R2.

    An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. AGroup Policy object (GPO) named GPO1 is linked to OU1.

    You make a change to GPO1.

    You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. Thesolution must minimize administrative effort.

    Which tool should you use?

    A. The Set-AdComputercmdlet

    B. Group Policy Management Console (GPMC)

    C. Server Manager

    D. TheGpupdate command

    Correct Answer: BSection: (none)Explanation

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    54/150

    Explanation/Reference:GPMC or Invoke-GPUpdate from PowerShellhttp://technet.microsoft.com/en-us/library/jj134201.aspx

    QUESTION 70Your network contains an Active Directory domain named contoso.com. All domain controllers runWindows Server 2012 R2.

    On all of the domain controllers, Windows is installed in C:\Windows and the Active Directory database islocated in D:\Windows\NTDS\.

    All of the domain controllers have a third-party application installed.

    The operating system fails to recognize that the application is compatible with domain controller cloning.

    You verify with the application vendor that the application supports domain controller cloning.

    You need to prepare a domain controller for cloning.

    What should you do?

    A. In C:\Windows\, create an XML file named DCCIoneConfig.xml and add the application information tothe file.

    B. In the root of a USB flash drive, add the application information to an XML file namedDefaultDCCIoneAllowList.xml.

    C. In D:\Windows\NTDS\, create an XML file named DCCIoneConfig.xml and add the applicationinformation to the file.

    D. In D:\Windows\NTDS\, create an XML file named CustomDCCIoneAllowList.xml and add the applicatioinformation to the file.

    Correct Answer: DSection: (none)

    Explanation

    Explanation/Reference:Explanation: Explanation/Reference:http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in- active-directory-domainservices-in-windows-server-2012-part-13-domain-controller- cloning.aspxPlace the CustomDCCloneAllowList.xml file in the same folder as the Active Directory database (ntds.dit)on the source Domain Controller.

    QUESTION 71Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC1 that runs Windows Server 2012 R2. DC1 is backed up daily.

    The domain has the Active Directory Recycle Bin enabled.

    During routine maintenance, you delete 500 inactive user accounts and 100 inactive groups. One of thedeleted groups is named Group1. Some of the deleted user accounts are members of some of the deletedgroups.

    For documentation purposes, you must provide a list of the members of Group1 before the group wasdeleted.

    You need to identify the names of the users who were members of Group1 prior to its deletion. You wantto achieve this goal by using the minimum amount of administrative effort.

    What should you do first?

    A. Reactivate the tombstone of Group1.

    B. Use the Recycle Bin to restore Group1.

  • 8/10/2019 Microsoft.braindumps.70 417.v2014!06!10.by.paulINE

    55/150

    C. Perform an authoritative restore of Group1.

    D. Mount the most recent Active Directory backup.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:You don't want to restore the group.

    QUESTION 72Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC1 that runs Windows Server 2012 R2.

    You mount an Active Directory snapshot on DC1.

    You need to expose the snapshot as an LDAP server.

    Which tool should you use?

    A. Dsamain

    B. Ntdsutil

    C. Ldp

    D. ADSI Edit

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Dsamain is used for exposing mounted (using ntdsutil) snapshot as LDAP server.

    QUESTION 73Your network contains an Active Directory domain named contoso.com. The domain

    contains a domain controller named DC1 and a member server named Server1. Server1 has


Recommended