Microsoft 70-417 Upgrading Your Skills to MCSA Windows Server 2012 http://killexams.com/exam-detail/70-417 DEMO Find some pages taken from full version Following pages are for demo purpose only. Demo pages are randomly taken from full version. Full version can be different from the demo version. You can request the updated Demo by contacting email@example.com. For Details about Full version Click http://killexams.com/exam-detail/70-417 70-417 QUESTION: 118 You have five servers that run Windows Server 2012 R2. The servers have the Failover Clustering feature installed. You deploy a new cluster named Cluster1. Cluster1 is configured as shown in the following table. Server1, Server2/ and Server3 are configured as the preferred owners of the cluster roles. Dynamic quorum management is disabled. You plan to perform hardware maintenance on Server3. You need to ensure that if the WAN link between Site1 and Site2 fails while you are performing maintenance on Server3, the cluster resource will remain available in Site1. What should you do? A. Remove the node vote for Server3. B. Enable DrainOnShutdown on Cluster1. C. Add a file share witness in Site1. D. Remove the node vote for Server4 and Server5. Answer: D Explanation: Exclude secondary site nodes. In general, do not give votes to WSFC (Windows Server Failover Clustering) nodes that reside at a secondary disaster recovery site. You do not want nodes in the secondary site to contribute to a decision to take the cluster offline when there is nothing wrong with the primary site. QUESTION: 119 Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1. You install the Windows PowerShell Web Access gateway on Server1. You need to provide administrators with the ability to manage the servers in the domain by using the Windows PowerShell Web Access gateway. Which two cmdlets should you run on Server1? (Each correct answer presents part of the solution. Choose two.) A. Install PswaWebApplication B. Add PswaAuthorizationRule 102 103 http://www.troytec.com 70-417 C. Set-WSManlnstance D. Set-WSManQuickConfig E. Set-BCAuthentication Answer: A, B Explanation: Configure PowerShell Web Access Gateway using the following PowerShell Cmdlet. Install-PswaWebApplication –UseTestCertificate Running the cmdlet installs the Windows PowerShell Web Access web application within the IIS Default Web Site container. The cmdlet creates the infrastructure required to run Windows PowerShell Web Access on the default website, https://<server_name>/pswa. Add-PswaAuthorizationRule Adds a new authorization rule to the Windows PowerShell Web Access authorization rule set. Parameters: ComputerGroupName ComputerName ConfigurationName RuleName UserGroupName UserName Credential (Windows Server 2012 R2 and later) References: http://technet.microsoft.com/en-us/library/hh849867.aspx http://technet.microsoft.com/en-us/library/hh849875.aspx http://technet.microsoft.com/en-us/library/jj592890(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh848404(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj592894(v=wps.620).aspx QUESTION: 120 A user from your organisation has reported to the IT helpdesk that they are receiving the following message: "Your account is configured to prevent you from using the computer. Please try another computer." What should you do to enable them to log on to their computer? A. Use the Dsmove command B. Click the Log On To button on the Account tab of her user account C. None of these D. Click the Allowed To Join Domain button in the New Computer dialog box Answer: B Explanation: The error message is about the user account configuration. This can be set here: 103 104 http://www.troytec.com 70-417 QUESTION: 121 You have a server named Served that runs Windows Server 2012 R2. Server1 has five network adapters. Three of the network adapters are connected to a network named LAN1. The two other network adapters are connected to a network named LAN2. You create a network adapter team named Team1 from two of the adapters connected to LAN1. You create a network adapter team named Team2 from the two adapters connected to LAN2. A company policy states that all server IP addresses must be assigned by using a reserved address in DHCP. You need to identify how many DHCP reservations you must create for Server1. How many reservations should you identify? A. 2 B. 3 C. 5 D. 7 Answer: B Explanation: 1 reservation for the NIC team on LAN1 1 reservation for the stand-alone NIC on LAN1 1 reservation for the NIC team on LAN2 => 3 reservations. QUESTION: 122 Your network contains an Active Directory domain named contoso.com. All domain 104 105 http://www.troytec.com 70-417 controllers run Windows Server 2012 R2. In a remote site, a support technician installs a server named DC10 that runs Windows Server 2012 R2. DC10 is currently a member of a workgroup. You plan to promote DC10 to a read-only domain controller (RODC). You need to ensure that a user named Contoso\User1 can promote DC10 to a RODC in the contoso.com domain. The solution must minimize the number of permissions assigned to User1. What should you do? A. From Active Directory Administrative Center, pre-create an RODC computer account. B. FromDsmgmt, run the local roles command. C. Join DC10 to the domain. Modify the properties of the DC10 computer account. D. Join DC10 to the domain. Run dsmod and specify the /server switch. Answer: A Explanation: A staged read only domain controller (RODC) installation works in two discrete phases: 1. Staging an unoccupied computer account 2. Attaching an RODC to that account during promotion Reference: Install a Windows Server 2012 R2 Active Directory Read-Only Domain Controller (RODC) QUESTION: 123 You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1. VM1 has a legacy network adapter. You need to assign a specific amount of available network bandwidth to VM1. What should you do first? A. Add a second legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet. B. Add a second legacy network adapter, and then configure network adapter teaming. C. Remove the legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet. D. Remove the legacy network adapter, and then add a network adapter. Answer: D QUESTION: 124 Server manager is a great tool for managing most of your server settings and configuration all in one central place. Which one of the following Server manager Features is used for Storage management, replication and searching? A. Dynamic Host Configuration Server B. Terminal Services C. Domain Name Service 105 106 http://www.troytec.com 70-417 D. File Services Answer: D QUESTION: 125 Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named RODC1. You create a global group named RODC_Admins. You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on RODC1. The solution must not provide RODC_Admins with the ability to manage Active Directory objects. What should you do? A. From a command prompt, run the dsadd computer command. B. From Active Directory Users and Computers, run the Delegation of Control Wizard. C. From Active Directory Users and Computers, configure the Member Of settings of the RODC1 account. D. From a command prompt, run the dsmgmt local roles command. Answer: D Explanation: http://technet.microsoft.com/en-us/library/cc731885.aspx http://technet.microsoft.com/en-us/library/cc732473.aspx Manages Administrator Role Separation for a read-only domain controller (RODC). Administrator role separation provides a nonadministrative user with the permissions to install and administer an RODC, without granting that user permissions to do any other type of domain administration. QUESTION: 126 Your network contains an Active Directory domain named adatum.com. You have a standard primary zone named adatum.com. You need to provide a user named User1 the ability to modify records in the zone. Other users must be prevented from modifying records in the zone. What should you do first? A. Run the Zone Signing Wizard for the zone B. From the properties of the zone, change the zone type C. Run the new Delegation Wizard for the zone D. From the properties of the zone, modify the Start Of Authority (SOA) record Answer: C QUESTION: 127 HOTSPOT 106 107 http://www.troytec.com 70-417 Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. Server1 is configured to resolve single-label names for DNS clients. You need to view the number of queries for single-label names that are resolved by Server1. What command should you run? To answer, select the appropriate options in the answer area. Answer: QUESTION: 128 Your network contains an Active Directory domain named contoso.com. The domain contains client computers that run Either Windows XP, Windows 7, or Windows 8. Network Policy Server (NPS) is deployed to the domain. You plan to create a system health validator (SHV). You need to identify which policy settings can be applied to all of the computers. Which three policy settings should you identify? 107 (Each correct answer presents part of the 108 http://www.troytec.com 70-417 solution. Choose three.) A. Automatic updating is enabled. B. A firewall is enabled for all network connections. C. An antispyware application is on. D. Antispyware is up to date. E. Antivirus is up to date. Answer: A, B, E Explanation: http://technet.microsoft.com/en-us/library/cc731260.aspx * System health agent (SHA) is a NAP component. * System health agent (SHA) A component that checks the state of the client computer to determine whether the settings monitored by the SHA are up-to-date and configured correctly. For example, the Windows Security Health Agent (WSHA) can monitor Windows Firewall, whether antivirus software is installed, enabled, and updated, whether antispyware software is installed, enabled, and updated, and whether Microsoft Update Services is enabled and the computer has the most recent security updates from Microsoft Update Services. There might also be SHAs (and corresponding system health validators) available from other companies that provide different functionality. QUESTION: 129 Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two organizational units (OUs) named OU1 and OU2 in the root of the domain. Two Group Policy objects (GPOs) named GPO1 and GP02 are created. GPO1 is linked to OU1. GPO2 is linked to OU2. OU1 contains a client computer named Computer1. OU2 contains a user named User1. You need to ensure that the GPOs Applied to Computer1areApplied to User1 when User1 logs on. What should you configure? A. The GPO Status B. WMI Filtering C. GPO links D. Item-level targeting Answer: C QUESTION: 130 Your network contains an Active Directory domain named contoso.com. Network Policy Server (NPS) is deployed to the domain. You plan to deploy Network Access Protection (NAP). You need to configure the requirements that are validated on the NPS client 108 109 http://www.troytec.com 70-417 computers. What should you do? A. From the Network Policy Server console, configure a health policy. B. From the Network Policy Server console, configure a network policy. C. From a Group Policy object (GPO), configure the NAP Client Configuration security setting. D. From a Group Policy object (GPO), configure the Network Access Protection Administrative Templates setting. E. From the Network Policy Server console, configure a Windows Security Health Validator (WSHV) policy. Answer: E Explanation: I feel the question is a bit unclear still. http://technet.microsoft.com/en-us/library/cc731260.aspx WSHV settings If a client computer is noncompliant with one of the requirements of the WSHV, it is considered noncompliant with the WSHV as a whole. If a computer is determined to be noncompliant with the WSHV, the following actions might be taken: I believe that the validation will take into account Health and Network, so it has to be both of them. I don't see A or D being a valid choice. Leaving us with E. And, the site kinda confirm this. QUESTION: 131 What should you do? A. Export and import data by using Dsamain. B. Apply a virtual machine snapshot to VM1. C. Recover the items by using Active Directory Recycle Bin. D. Modify the isRecycled attribute of Group1. Answer: A 109 110 http://www.troytec.com For More exams visit http://killexams.com Kill your exam at First Attempt....Guaranteed!