Advanced Guide: microsoft 70 417

Exambible offers free demo for exam 70 417 exam. "Upgrading Your Skills to MCSA Windows Server 2012", also known as 70 417 vce exam, is a Microsoft Certification. This set of posts, Passing the Microsoft 70 417 dumps exam, will help you answer those questions. The 70 417 pdf Questions & Answers covers all the knowledge points of the real exam. 100% real Microsoft 70 417 dumps exams and revised by experts!


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-417 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-417 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-417-exam-dumps.html

Q1. OTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You need to identify whether the Company attribute replicates to the global catalog. 

Which part of the Active Directory partition should you view? 

To answer, select the appropriate Active Directory object in the answer area. 

Answer: 


Q2. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

Server1 has the IP Address Management (IPAM) Server feature installed. IPAM is configured currently for Group Policy-based provisioning. 

You need to change the IPAM provisioning method on Server1. 

What should you do? 

A. Run the ipamgc.exe command. 

B. Run the ipamgc.exe command. 

C. Run the Set-IPAMConfigurationcmdlet. 

D. Reinstall the IP Address Management (IPAM) Server feature. 

E. Delete IPAM Group Policy objects (GPOs) from the domain. 

Answer:

Explanation: 

You cannot change the provisioning method after completing the initial setup. When you install IPAM and configure either manual OR GPO, you receive the same message about not being able to change the provisioning method. As a matter of fact, I set it up in my lab and configured it as GPO. Here is a copy/paste of the message that is presently on the IPAM home page in server manager: 

"The access configuration mode cannot be modified after completing the IPAM provisioning wizard" Also, the help console in IPAM displays this when searching about provisioning methods: "The managed server provisioning method cannot be changed after you complete the IPAM provisioning wizard." 


Q3. RAG DROP 

Your network contains three servers. The servers are configured as shown in the following tablE. 

Your company plans to standardize all of the servers on Windows Server 2012 R2. 

You need to recommend an upgrade path for each server. 

The solution must meet the following requirements: . Upgrade the existing operating system whenever possible. . Minimize hardware purchases. Which upgrade path should you recommend for each server? 

To answer, drag the appropriate upgrade path to each server in the answer area.Each upgrade path may be used once, more than once, or not at all. 

Answer: 

148. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

In a remote site, a support technician installs a server named DC10 that runs Windows Server 2012 R2. DC10 is currently a member of a workgroup. 

You plan to promote DC10 to a read-only domain controller (RODC). 

You need to ensure that a user named Contoso\User1 can promote DC10 to a RODC in the contoso.com domain. 

The solution must minimize the number of permissions assigned to User1. 

What should you do? 

A. From Active Directory Administrative Center, pre-create an RODC computer account. 

B. FromDsmgmt, run the local roles command. 

C. Join DC10 to the domain. Modify the properties of the DC10 computer account. 

D. Join DC10 to the domain. Run dsmod and specify the /server switch. 

Answer:

Explanation: 

A staged read only domain controller (RODC) installation works in two discrete phases: 

1.

 Staging an unoccupied computer account 

2.

 Attaching an RODC to that account during promotion Reference: Install a Windows Server 2012 R2 Active Directory Read-Only Domain Controller (RODC) 


Q4. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed.Server1 and Server2 are configured as Hyper-V replicas of each other. 

Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1. 

You need to verify whether the replica of VMS on Server1 is functional. The solution must ensure that VM5 remains accessible to clients. 

What should you do from Hyper-V Manager? 

A. On Server1, execute a Planned Failover. 

B. On Server1, execute a Test Failover. 

C. On Server2, execute a Planned Failover. 

D. On Server2,execute a Test Failover. 

Answer:

Explanation: Test Failover is an operation initiated on your replica virtual machine (here VM5 on Server1) which allows you to test the sanity of the virtualized workload without interrupting your production workload or ongoing replication. Note: At a high level, Hyper-V Replica supports three types of Failover: Test Failover Planned Failover Unplanned Failover 


Q5. OTSPOT 

You have a server named DHCP1 that runs Windows Server 2012 R2. DHCP1 does not 

have access to the Internet. 

All roles are removed completely from DHCP 

You mount a Windows Server 2012 R2 installation image to the C:\Mount folder. 

You need to install the DHCP Server server role on DHCP1 by using Server Manager. 

Which folder should you specify as the alternate path for the source files? 

To answer, select the appropriate folder in the answer area. 

Answer: 

386. RAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2.Server1 and Server2 run a Server with a GUI installation of Windows Server 2012 R2. 

You remove the Graphical Management Tools and Infrastructure feature on Server2. 

You need to restart Server2. 

What should you do? (To answer, drag the appropriate tools to the correct statements. Each tool may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 

Answer: 


Q6. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. 

You install the DHCP Server server role on Server1 and Server2. You install the IP Address Management (IPAM) Server feature on Server1. 

You notice that you cannot discover Server1 or Server2 in IPAM.You need to ensure that you can use IPAM to discover the DHCP infrastructure. 

Which two actions should you perform? (Each correct answer presents part of the solution.(Choose two.) 

A. On Server2, create an IPv4 scope 

B. On Server1, run the Add-IpamServerInventory cmdlet 

C. On Server2, run the Add-DhcpServerInDc cmdlet 

D. On both Server1 and Server2, run the Add-DhcpServerv4Policy cmdlet 

E. On Server1, uninstall the DHCP Server server role. 

Answer: C,E 

169. Which terminology is being described below? 

Time synchronization is critical for the proper operation of many Windows services and line-of- business Applications. 

The __________ uses the Network Time Protocol (NTP) to synchronize computer clocks on the network so that an accurate clock value, or time stamp, can be assigned to network validation requests and resource access requests 

A. Network Services Shell (Netsh) 

B. Listsvc 

C. Fixmbr 

D. Windows Time service (W32time) 

Answer:


Q7. You have a server named Server1 that runs Windows Server 2012 R2. 

You need to configure Server1 to create an entry in an event log when the processor usage exceeds 60 percent. 

Which type of data collector should you create? 

A. A performance counter data collector 

B. An event trace data collector 

C. A performance counter alert 

D. A configuration data collector 

Answer:


Q8. RAG DROP 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. 

The domain contains an organizational unit (OU) named OU1. OU1 contains an OU named OU2. OU2 contains a user named User1. 

User1 is the member of a group named Group1. Group1 is in the Users container. 

You create five Group Policy objects (GPO). The GPOs are configured as shown in the following table. 

The Authenticated Users group is assigned the default permissions to all of the GPOs. 

There are no site-level GPOs. 

You need to identify which three GPOs will be applied to User1 and in which order the 

GPOs will be applied to User1. 

Which three GPOs should you identify in sequence? 

To answer, move the appropriate three GPOs from the list of GPOs to the answer area and 

arrange them in the correct order. 

Answer: 


Q9. Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1. Server1 runs Windows Server 2012. 

You create a group Managed Service Account named gservice1. 

You need to configure a service named Service1 to run as the gservice1 account. 

How should you configure Service1? 

A. From the Services console, configure the General settings. 

B. From a command prompt, run sc.exe and specify the config parameter. 

C. From the Services console, configure the Log On settings. 

D. From a command prompt, run sc.exe and specify the privs parameter. 

Answer:

Explanation: 

To specify a binary path for the NEWSERVICE service, type: 

sc config NewService binpath= "ntsd -d c:\windows\system32\NewServ.exe" 

Reference: Sc config https://technet.microsoft.com/en-us/library/cc990290.aspx 


Q10. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA). 

All users in the domain are issued a smart card and are required to log on to their domain-joined client computer by using their smart card. 

A user named User1 resigned and started to work for a competing company. You need to prevent User1 immediately from logging on to any computer in the domain. 

The solution must not prevent other users from logging on to the domain. 

Which tool should you use? 

A. Active Directory Users and Computers 

B. Certificate Templates 

C. The Security Configuration Wizard 

D. The Certificates snap-in 

Answer: