Free 70-417 PDF

Free 70-417 PDF
Microsoft
70-417
Upgrading Your Skills to MCSA Windows Server 2012
http://killexams.com/exam-detail/70-417
DEMO
Find some pages taken from full version
Following pages are for demo purpose only. Demo pages are randomly taken from full version.
Full version can be different from the demo version.
You can request the updated Demo by contacting support@killexams.com.
For Details about Full version Click http://killexams.com/exam-detail/70-417
70-417
QUESTION: 118
You have five servers that run Windows Server 2012 R2. The servers have the Failover
Clustering feature installed. You deploy a new cluster named Cluster1. Cluster1 is configured
as shown in the following table.
Server1, Server2/ and Server3 are configured as the preferred owners of the cluster roles.
Dynamic quorum management is disabled. You plan to perform hardware maintenance on
Server3. You need to ensure that if the WAN link between Site1 and Site2 fails while you are
performing maintenance on Server3, the cluster resource will remain available in Site1. What
should you do?
A. Remove the node vote for Server3.
B. Enable DrainOnShutdown on Cluster1.
C. Add a file share witness in Site1.
D. Remove the node vote for Server4 and Server5.
Answer: D
Explanation:
Exclude secondary site nodes.
In general, do not give votes to WSFC (Windows Server Failover Clustering) nodes that
reside at a secondary disaster recovery site. You do not want nodes in the secondary site to
contribute to a decision to take the cluster offline when there is nothing wrong with the
primary site.
QUESTION: 119
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2. The domain contains a server named Server1. You install the
Windows PowerShell Web Access gateway on Server1. You need to provide administrators
with the ability to manage the servers in the domain by using the Windows PowerShell Web
Access gateway. Which two cmdlets should you run on Server1? (Each correct answer
presents part of the solution. Choose two.)
A. Install PswaWebApplication
B. Add PswaAuthorizationRule
102
103
http://www.troytec.com
70-417
C. Set-WSManlnstance
D. Set-WSManQuickConfig
E. Set-BCAuthentication
Answer: A, B
Explanation:
Configure PowerShell Web Access Gateway using the following PowerShell Cmdlet.
Install-PswaWebApplication –UseTestCertificate
Running the cmdlet installs the Windows PowerShell Web Access web application within the
IIS Default Web Site container. The cmdlet creates the infrastructure required to run
Windows PowerShell Web Access on the default website, https://<server_name>/pswa.
Add-PswaAuthorizationRule
Adds a new authorization rule to the Windows PowerShell Web Access authorization rule
set.
Parameters: ComputerGroupName ComputerName ConfigurationName RuleName
UserGroupName UserName
Credential (Windows Server 2012 R2 and later)
References:
http://technet.microsoft.com/en-us/library/hh849867.aspx
http://technet.microsoft.com/en-us/library/hh849875.aspx
http://technet.microsoft.com/en-us/library/jj592890(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/hh848404(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/jj592894(v=wps.620).aspx
QUESTION: 120
A user from your organisation has reported to the IT helpdesk that they are receiving the
following message: "Your account is configured to prevent you from using the computer.
Please try another computer." What should you do to enable them to log on to their
computer?
A. Use the Dsmove command
B. Click the Log On To button on the Account tab of her user account
C. None of these
D. Click the Allowed To Join Domain button in the New Computer dialog box
Answer: B
Explanation:
The error message is about the user account configuration.
This can be set here:
103
104
http://www.troytec.com
70-417
QUESTION: 121
You have a server named Served that runs Windows Server 2012 R2. Server1 has five
network adapters. Three of the network adapters are connected to a network named LAN1.
The two other network adapters are connected to a network named LAN2. You create a
network adapter team named Team1 from two of the adapters connected to LAN1. You
create a network adapter team named Team2 from the two adapters connected to LAN2. A
company policy states that all server IP addresses must be assigned by using a reserved
address in DHCP. You need to identify how many DHCP reservations you must create for
Server1. How many reservations should you identify?
A. 2
B. 3
C. 5
D. 7
Answer: B
Explanation:
1 reservation for the NIC team on LAN1 1 reservation for the stand-alone NIC on LAN1
1 reservation for the NIC team on LAN2
=> 3 reservations.
QUESTION: 122
Your network contains an Active Directory
domain named contoso.com. All domain
104
105
http://www.troytec.com
70-417
controllers run Windows Server 2012 R2. In a remote site, a support technician installs a
server named DC10 that runs Windows Server 2012 R2. DC10 is currently a member of a
workgroup. You plan to promote DC10 to a read-only domain controller (RODC). You need
to ensure that a user named Contoso\User1 can promote DC10 to a RODC in the
contoso.com domain. The solution must minimize the number of permissions assigned to
User1. What should you do?
A. From Active Directory Administrative Center, pre-create an RODC computer account.
B. FromDsmgmt, run the local roles command.
C. Join DC10 to the domain. Modify the properties of the DC10 computer account.
D. Join DC10 to the domain. Run dsmod and specify the /server switch.
Answer: A
Explanation:
A staged read only domain controller (RODC) installation works in two discrete phases:
1. Staging an unoccupied computer account
2. Attaching an RODC to that account during promotion
Reference: Install a Windows Server 2012 R2 Active Directory Read-Only Domain
Controller (RODC)
QUESTION: 123
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the
Hyper-V server role installed. On Server1, you create a virtual machine named VM1. VM1
has a legacy network adapter. You need to assign a specific amount of available network
bandwidth to VM1. What should you do first?
A. Add a second legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
B. Add a second legacy network adapter, and then configure network adapter teaming.
C. Remove the legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
D. Remove the legacy network adapter, and then add a network adapter.
Answer: D
QUESTION: 124
Server manager is a great tool for managing most of your server settings and configuration
all in one central place. Which one of the following Server manager Features is used for
Storage management, replication and searching?
A. Dynamic Host Configuration Server
B. Terminal Services
C. Domain Name Service
105
106
http://www.troytec.com
70-417
D. File Services
Answer: D
QUESTION: 125
Your network contains an Active Directory domain named contoso.com. The domain
contains a read-only domain controller (RODC) named RODC1. You create a global group
named RODC_Admins. You need to provide the members of RODC_Admins with the
ability to manage the hardware and the software on RODC1. The solution must not provide
RODC_Admins with the ability to manage Active Directory objects. What should you do?
A. From a command prompt, run the dsadd computer command.
B. From Active Directory Users and Computers, run the Delegation of Control Wizard.
C. From Active Directory Users and Computers, configure the Member Of settings of the
RODC1 account.
D. From a command prompt, run the dsmgmt local roles command.
Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/cc731885.aspx
http://technet.microsoft.com/en-us/library/cc732473.aspx
Manages Administrator Role Separation for a read-only domain controller (RODC).
Administrator role separation provides a nonadministrative user with the permissions to
install and administer an RODC, without granting that user permissions to do any other type
of domain administration.
QUESTION: 126
Your network contains an Active Directory domain named adatum.com. You have a standard
primary zone named adatum.com. You need to provide a user named User1 the ability to
modify records in the zone. Other users must be prevented from modifying records in the
zone. What should you do first?
A. Run the Zone Signing Wizard for the zone
B. From the properties of the zone, change the zone type
C. Run the new Delegation Wizard for the zone
D. From the properties of the zone, modify the Start Of Authority (SOA) record
Answer: C
QUESTION: 127
HOTSPOT
106
107
http://www.troytec.com
70-417
Your network contains an Active Directory domain named contoso.com. The domain
contains a DNS server named Server1. Server1 is configured to resolve single-label names
for DNS clients. You need to view the number of queries for single-label names that are
resolved by Server1. What command should you run? To answer, select the appropriate
options in the answer area.
Answer:
QUESTION: 128
Your network contains an Active Directory domain named contoso.com. The domain
contains client computers that run Either Windows XP, Windows 7, or Windows 8. Network
Policy Server (NPS) is deployed to the domain. You plan to create a system health validator
(SHV). You need to identify which policy settings can be applied to all of the computers.
Which three policy settings should you identify?
107 (Each correct answer presents part of the
108
http://www.troytec.com
70-417
solution. Choose three.)
A. Automatic updating is enabled.
B. A firewall is enabled for all network connections.
C. An antispyware application is on.
D. Antispyware is up to date.
E. Antivirus is up to date.
Answer: A, B, E
Explanation:
http://technet.microsoft.com/en-us/library/cc731260.aspx
* System health agent (SHA) is a NAP component.
* System health agent (SHA)
A component that checks the state of the client computer to determine whether the settings
monitored by the SHA are up-to-date and configured correctly. For example, the Windows
Security Health Agent (WSHA) can monitor Windows Firewall, whether antivirus software
is installed, enabled, and updated, whether antispyware software is installed, enabled, and
updated, and whether Microsoft Update Services is enabled and the computer has the most
recent security updates from Microsoft Update Services. There might also be SHAs (and
corresponding system health validators) available from other companies that provide
different functionality.
QUESTION: 129
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2. The domain contains two organizational units
(OUs) named OU1 and OU2 in the root of the domain. Two Group Policy objects (GPOs)
named GPO1 and GP02 are created. GPO1 is linked to OU1. GPO2 is linked to OU2. OU1
contains a client computer named Computer1. OU2 contains a user named User1. You need
to ensure that the GPOs Applied to Computer1areApplied to User1 when User1 logs on.
What should you configure?
A. The GPO Status
B. WMI Filtering
C. GPO links
D. Item-level targeting
Answer: C
QUESTION: 130
Your network contains an Active Directory domain named contoso.com. Network Policy
Server (NPS) is deployed to the domain. You plan to deploy Network Access Protection
(NAP). You need to configure the requirements that are validated on the NPS client
108
109
http://www.troytec.com
70-417
computers. What should you do?
A. From the Network Policy Server console, configure a health policy.
B. From the Network Policy Server console, configure a network policy.
C. From a Group Policy object (GPO), configure the NAP Client Configuration security
setting.
D. From a Group Policy object (GPO), configure the Network Access Protection
Administrative Templates setting.
E. From the Network Policy Server console, configure a Windows Security Health Validator
(WSHV) policy.
Answer: E
Explanation:
I feel the question is a bit unclear still.
http://technet.microsoft.com/en-us/library/cc731260.aspx
WSHV settings
If a client computer is noncompliant with one of the requirements of the WSHV, it is
considered noncompliant with the WSHV as a whole. If a computer is determined to be
noncompliant with the WSHV, the following actions might be taken:
I believe that the validation will take into account Health and Network, so it has to be both of
them.
I don't see A or D being a valid choice.
Leaving us with E. And, the site kinda confirm this.
QUESTION: 131
What should you do?
A. Export and import data by using Dsamain.
B. Apply a virtual machine snapshot to VM1.
C. Recover the items by using Active Directory Recycle Bin.
D. Modify the isRecycled attribute of Group1.
Answer: A
109
110
http://www.troytec.com
For More exams visit http://killexams.com
Kill your exam at First Attempt....Guaranteed!
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising