how to use microsoft 70 417

Validated of exam 70 417 answers materials and study guides for Microsoft certification for IT learners, Real Success Guaranteed with Updated 70 417 vce pdf dumps vce Materials. 100% PASS Upgrading Your Skills to MCSA Windows Server 2012 exam Today!


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-417 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-417 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-417-exam-dumps.html

Q231. Your network contains an Active directory forest named contoso.com. The forest contains two child domains named east.contoso.com and west.contoso.com. 

You install an Active Directory Rights Management Services (AD RMS) cluster in each child domain. 

You discover that all of the users in the contoso.com forest are directed to the AD RMS cluster in east.contoso.com. 

You need to ensure that the users in west.contoso.com are directed to the AD RMS cluster in west.contoso.com and that the users in east.contoso.com are directed to the AD RMS cluster in east.contoso.com. 

What should you do? 

A. Modify the Service Connection Point (SCP) 

B. Configure the Group Policy object (GPO) settings of the users in the west.contoso.com domain 

C. Configure the Group Policy object (GPO) settings of the users in the east.contoso.com domain 

D. Modify the properties of the AD RMS cluster in west.contoso.com 

Answer:


Q232. You have 3 servers that runs Windows Server 2012 R2. The server contains the disks configured as shown in the following table. 

You need to create a volume that can store up to 3 TB of user files. 

The solution must ensure that the user files are available if one of the disks in the volume fails. 

What should you create? 

A. A storage pool on Disk 2 and Disk 3 

B. A mirrored volume on Disk 2 and Disk 3 

C. A storage pool on Disk 1 and Disk 3 

D. A mirrored volume on Disk l and Disk 4 

E. Raid 5 Volume out of Disks 1, 2 and 3 

Answer:

Explanation: 

A. Storage pool can't use Dynamic disk 

B. Mirrored volume will be > 3Tb 

C. Storage pool can't use Dynamic disk 

D. is impossible, we need 3Tb of disk space 

E. Raid5 need to be on dynamic disk 


Q233. OTSPOT 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest contains two Active Directory sites named Site1 and Site2. 

You plan to deploy a read-only domain controller (RODC) named DC10 to Site2. You pre-create the DC10 domain controller account by using Active Directory Users and Computers. 

You need to identify which domain controller will be used for initial replication during the promotion of the RODC. 

Which tab should you use to identify the domain controller? 

To answer, select the appropriate tab in the answer area. 

Answer: 


Q234. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. Cluster1 hosts 10 virtual machines. All of the virtual machines run Windows Server 2012 R2 and are members of the domain. 

You need to ensure that the first time a service named Service1 fails on a virtual machine, the virtual machine is moved to a different node. 

You configure Service1 to be monitored from Failover Cluster Manager. 

What should you configure on the virtual machine? 

A. From the General settings, modify the Startup type. 

B. From the Recovery settings of Service1, set the First failure recovery action to Take No Action. 

C. From the Recovery settings of Service1, set the First failure recovery action to Restart the Service. 

D. From the General settings, modify the Service status. 

Answer:

Explanation: 

C. Configure the virtual machine to take no action through Hyper-V if the physical computer shuts down by modifying the Automatic Stop Action setting to None. Virtual machine state must be managed through the Failover Clustering feature. http://technet.microsoft.com/en-us/library/cc742396.aspx http://windowsitpro.com/windows-server-2012/enable-windows-server-2012-failover-cluster-hyper-v-vmmonitoring 


Q235. Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the DNS Server server role installed. On Server1, you create a standard primary zone named contoso.com. You need to ensure that Server2 can host a secondary zone for contoso.com. 

What should you do from Server1? 

A. Create a zone delegation that points to Server2. 

B. Create a trust anchor named Server2. 

C. Convert contoso.com to an Active Directory-integrated zone. 

D. Add Server2 as a name server. 

Answer:


Q236. Your network contains an Active Directory domain named contoso.com. The domain contains domain controllers that run Windows Server 2008, Windows Server 2008 R2 Windows Server 2012, and Windows Server 2012 R2. 

A domain controller named DC1 runs Windows Server 2012 R2. DC1 is backed up daily. 

During routine maintenance, you delete a group named Group1. 

You need to recover Group1 and identify the names of the users who were members of Group1 prior to its deletion. You want to achieve this goal by using the minimum amount of administrative effort. 

What should you do first? 

A. Perform an authoritative restore of Group1. 

B. Mount the most recent Active Directory backup. 

C. Use the Recycle Bin to restore Group1. 

D. Reactivate the tombstone of Group1. 

Answer:

Explanation: 

The Active Directory Recycle Bin does not have the ability to track simple changes to objects. If the object itself is not deleted, no element is moved to the Recycle Bin for possible recovery in the future. In other words, there is no rollback capacity for changes to object properties, or, in other words, to the values of these properties. There is another approach you should be aware of. Tombstone reanimation (which has nothing to do with zombies) provides the only way to recover deleted objects without taking a DC offline, and it's the only way to recover a deleted object's identity information, such as its objectGUID and objectSid attributes. It neatly solves the problem of recreating a deleted user or group and having to fix up all the old access control list (ACL) references, which contain the objectSid of the deleted object. Restores domain controllers to a specific point in time, and marks objects in Active Directory as being authoritative with respect to their replication partners. 


Q237. Your network contains an Active Directory domain named contoso.com. The domain contains three servers. The servers are configured as shown in the following table. 

You need to ensure that end-to-end encryption is used between clients and Server2 when the clients connect to the network by using DirectAccess. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From the Remote Access Management Console, reload the configuration. 

B. Add Server2 to a security group in Active Directory. 

C. Restart the IPSec Policy Agent service on Server2. 

D. From the Remote Access Management Console, modify the Infrastructure Servers settings. 

E. From the Remote Access Management Console, modify the Application Servers settings. 

Answer: B,E 

Explanation: 

Unsure about these answers: 

A public key infrastructure must be deployed. 

Windows Firewall must be enabled on all profiles. 

ISATAP in the corporate network is not supported. If you are using ISATAP, you 

should remove it and use native IPv6. 

Computers that are running the following operating systems are supported as 

... . 

DirectAccess clients: Windows Server. 2012 R2 Windows 8.1 Enterprise Windows Server. 2012 Windows 8 Enterprise Windows Server. 2008 R2 Windows 7 Ultimate Windows 7 Enterprise 

. Force tunnel configuration is not supported with KerbProxy authentication. . Changing policies by using a feature other than the DirectAccess management console or Windows PowerShell cmdlets is not supported. . Separating NAT64/DNS64 and IPHTTPS server roles on another server is not supported. 


Q238. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. 

You run ntdsutil as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can access the contents of the mounted snapshot. 

What should you do? 

A. From a command prompt, run dsamain.exe -dbpath c:$snap_201204131056_volumec$windowsntdsntds.dit -Idapport 33389. 

B. From the snapshot context of ntdsutil, run mount {79f94f82-5926-4f44-8af0-2f56d827a57d>. 

C. From the snapshot context of ntdsutil, run activate instance "NTDS". 

D. From a command prompt, run dsamain.exe -dbpath c:$snap_201204131056_volumec$windowsntdsntds.dit -Idapport 389. 

Answer:

Explanation: 

This is a live DC, so 389 is already in use; 33389 would not be so is a valid port. http://technet.microsoft.com/en-us/library/cc753609(v=ws.10).aspx 


Q239. You have a server named SCI that runs a Server Core Installation of Windows Server 2012 

R2. 

Shadow copies are enabled on all volumes. 

You need to delete a specific shadow copy. The solution must minimize server downtime. 

Which tool should you use? 

A. Shadow 

B. Diskshadow 

C. Wbadmin 

D. Diskpart 

Answer:

Explanation: DiskShadow.exe is a tool that exposes the functionality offered by the 

Volume Shadow Copy Service (VSS). 

The diskshadow command delete shadows deletes shadow copies. 


Q240. You can create a printing pool to automatically distribute print jobs to the next available 

printer. A printing pool is one logical printer connected to multiple printers through multiple 

ports of the print server. 

The printer that is idle receives the next document sent to the logical printer. 

All printers in a pool must use the same driver. Is the above statement true or false? 

A. True 

B. False 

Answer:

Explanation: 

Printer Pool requires identical hardware and drivers.