A Complete Guide to 70 417 dumps

Act now and download your Microsoft 70 417 dumps test today! Do not waste time for the worthless Microsoft exam 70 417 tutorials. Download Updated Microsoft Upgrading Your Skills to MCSA Windows Server 2012 exam with real questions and answers and begin to learn Microsoft 70 417 pdf with a classic professional.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-417 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-417 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-417-exam-dumps.html

Q81. Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts. Servers are restarted only occasionally. 

You need to identify which servers were restarted during the last two days. 

What should you do? 

A. Run dsquery computer and specify the -sra /epwc parameter. 

B. Run Get-ADComputer and specify the SearchScope parameter. 

C. Run dsquery server and specify the -o parameter. 

D. Run Get-ADComputer and specify the lastLogon property 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/ee617192.aspx 

SearchScope Specifies the scope of an Active Directory search. Possible values for this 

parameter are: 

Base or 0 

OneLevel or 1 

Subtree or 2 

A Base query searches only the current path or object. 

A OneLevel query searches the immediate children of that path or object. 

A Subtree query searches the current path or object and all children of that path or object. 

http://technet.microsoft.com/en-us/library/cc732885%28v=ws.10%29.aspx 

Dsquery server 

-o {dn | rdn} 

Specifies the format that dsquery uses to display the search results. A dn value displays 

the distinguished name of each entry. An rdn value displays the relative distinguished 

name of each entry. The default value is dn. 

NB: epwc doesn't exist for Dsquery computer so even if i'm not sure it's the best way, the 

only possible answer is using "Get-ADComputer and specify the lastLogon property" 


Q82. OTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

From Server2, you attempt to connect to Server1 by using Computer Management and you receive the following error message: "Computer \Server1 cannot be found. The network path was not found. " 

From Server1, you successfully connect to Server2 by using Server Manager. 

You need to ensure that you can manage Server1 remotely from Server2 by using Computer Management. 

What should you configure? 

To answer, select the appropriate option in the answer area. 

Answer: 


Q83. OTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a server named Server1. Both servers run Windows Server 2012 R2. 

You configure the classification of a share on Server1 as shown in the Share1 Properties exhibit. (Click the Exhibit button.) 

You configure the resource properties in Active Directory as shown in the Resource Properties exhibit. (Click the Exhibit button.) 

You need to ensure that the Impact classification can be assigned to Share1 immediately. 

Which cmdlet should you run on each server? 

To answer, select the appropriate cmdlet for each server in the answer area. 

Answer: 


Q84. Your network contains three servers named HV1, HV2, and Server1 that run Windows Server 2012 R2. HV1 and HV2 have the Hyper-V server role installed. Server1 is a file server that contains 3 TB of free disk space. 

HV1 hosts a virtual machine named VM1. The virtual machine configuration file for VM1 is stored in D:VM and the virtual hard disk file is stored in E:VHD. 

You plan to replace drive E with a larger volume. 

You need to ensure that VM1 remains available from HV1 while drive E is being replaced. You want to achieve this goal by using the minimum amount of administrative effort. 

What should you do? 

A. Perform a live migration to HV2. 

B. Add HV1 and HV2 as nodes in a failover cluster. Perform a storage migration to HV2. 

C. Add HV1 and HV2 as nodes in a failover cluster. Perform a live migration to HV2. 

D. Perform a storage migration to Server1. 

Answer:


Q85. Which of the following reasons justifies why you should audit failed events? 

A. To log resource access for reporting and billing 

B. To monitor for malicious attempts to access a resource which has been denied 

C. None of these 

D. To monitor access that would suggest users are performing actions greater than you had planned 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc778162%28v=ws.10%29.aspx Auditing Security Events Best practices If you decide to audit failure events in the policy change event category, you can see if unauthorized users or attackers are trying to change policy settings, including security policy settings. Although this can be helpful for intrusion detection, the increase in resources that is required and the possibility of a denial-of-service attack usually outweigh the benefits. 


Q86. You have a server named Server1. 

You install the IP Address Management (IPAM) Server feature on Server1. 

You need to provide a user named User1 with the ability to set the access scope of all the DHCP servers that are managed by IPAM. The solution must use the principle of least privilege. 

Which user role should you assign to User1? 

A. IP Address Record Administrator Role 

B. IPAM Administrator Role 

C. IPAM MSM Administrator Role 

D. IPAM DHCP Scope Administrator Role 

Answer:

Explanation: 

Explanation IPAM ASM Administrators IPAM ASM Administrators is a local security group on an IPAM server that is created when you install the IPAM feature. Members of this group have all the privileges of the IPAM Users security group, and can perform IP address space tasks in addition to IPAM common management tasks. Note: When you install IPAM Server, the following local role-based IPAM security groups are created: IPAM Users IPAM MSM Administrators IPAM ASM Administrators IPAM IP Audit Administrators IPAM Administrators Incorrect: not B: Too much privileges. IPAM Administrators IPAM Administrators is a local security group on an IPAM server that is created when you install the IPAM feature. Members of this group have privileges to view all IPAM data and perform all IPAM tasks. 


Q87. Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers. The domain controllers are configured as shown in the following table. 

The network contains a server named Server1 that has the Hyper-V server role installed. DC6 is a virtual machine that is hosted on Server1. 

You need to ensure that you can clone DC6. 

What should you do? 

A. Transfer the PDC emulator to DC5 

B. Transfer the schema master to DC4 

C. Transfer the PDC emulator to DC2 

D. Transfer the schema master to DC6 

Answer:

Explanation: A Windows Server 2012 Server running the PDC emulator is required. 

The requirements for virtualized DC cloning include: 

*

 The PDC emulator must run Windows Server 2012. You can clone PDC emulator if it is virtualized. 

*

 The virtualized DC that is used as a source for cloning must run Windows Server 2012 and be a member of the Cloneable Domain Controllers group. 

Note: Using virtualized domain controller cloning in Windows Server 2012 to expedite forest recovery Virtualized domain controller (DC) cloning simplifies and expedites the process for installing additional virtualized DCs in a domain, especially in centralized locations such as datacenters where several DCs run on hypervisors. After you restore one virtual DC in each domain from backup, additional DCs in each domain can be rapidly brought online by using the virtualized DC cloning process. You can prepare the first virtualized DC that you recover, shut it down, and then copy that virtual hard disk as many times as is necessary in order to create cloned virtualized DCs to build out the domain. 

Reference: New Features, Assumptions, and Prerequisites for Using This Guide for Planning Active Directory Forest Recovery 


Q88. Your network contains two Hyper-V hosts named Host1 and Host2. Host1 contains a virtual machine named VM1. Host2 contains a virtual machine named VM2. VM1 and VM2 run Windows Server 2012 R2. 

You install the Network Load Balancing feature on VM1 and VM2. 

You need to ensure that the virtual machines are configured to support Network Load Balancing (NLB). 

Which virtual machine settings should you configure on VM1 and VM2? 

A. DHCP guard 

B. MAC address 

C. Router guard 

D. Port mirroring 

Answer:

Explanation: When MAC addresses are not assigned to virtual machines, it could cause network problems. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V virtualization, Lesson 1: Deploying and configuring Hyper-V hosts, p. 313-319 http://blogs.msdn.com/b/clustering/archive/2010/07/01/10033544.aspx 


Q89. You have a failover cluster named Cluster1 that contains four nodes. All of the nodes run Windows Server 2012 R2. 

You need to schedule the installation of Windows updates on the cluster nodes. 

Which tool should you use? 

A. The Add-CauClusterRolecmdlet 

B. TheWuauclt command 

C. TheWusa command 

D. The Invoke-CauScancmdlet 

Answer:

Explanation: 

The Invoke-CauScancmdlet performs a scan of cluster nodes for applicable updates and returns a list of the initial set of updates that would be applied to each node in a specified cluster. 

http://technet.microsoft.com/en-us/library/hh847235(v=wps.620).aspx http://technet.microsoft.com/en-us/library/cc720477(v=ws.10).aspx http://support.microsoft.com/kb/934307 http://technet.microsoft.com/en-us/library/hh847228(v=wps.620).aspx 


Q90. RAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1. All servers in the domain run Windows Server 2012 R2. 

You need to create a new volume on File1. 

The new volume must have the following configurations: 

Have the drive letter T 

Have the FAT32 file system 

Be stored on a new virtual hard disk 

In which order should you run the Diskpart commands? 

To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the correct order. 

... 

Answer: