[Update] microsoft 70 417

Download of 70 417 dumps exam cram materials and Q&A for Microsoft certification for customers, Real Success Guaranteed with Updated 70 417 exam pdf dumps vce Materials. 100% PASS Upgrading Your Skills to MCSA Windows Server 2012 exam Today!


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-417 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-417 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-417-exam-dumps.html

Q11. Your network contains an Active Directory domain named contoso.com. The Active 

Directory Recycle bin is enabled for contoso.com. 

A support technician accidentally deletes a user account named User1. 

You need to restore the User1 account. 

Which tool should you use? 

A. Ldp 

B. Esentutl 

C. Active Directory Administrative Center 

D. Ntdsutil 

Answer:

Explanation: 

http://technet.microsoft.com/nl-nl/library/dd379509(v=ws.10).aspx#BKMK_2 http://technet.microsoft.com/en-us/magazine/2007.09.tombstones.aspx http://technet.microsoft.com/en-us/library/hh875546.aspx http://technet.microsoft.com/en-us/library/dd560651(v=ws.10).aspx 


Q12. Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named Server3 and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in a failover cluster named Cluster2. 

You need to move all of the applications and the services from Cluster1 to Cluster2. 

What should you do first from Failover Cluster Manager? 

A. On a server in Cluster2, click Migrate Roles. 

B. On a server in Cluster2, click Move Core Cluster Resources, and then click Select Node... 

C. On a server in Cluster1, configure Cluster-Aware Updating. 

D. On a server in Cluster2, click Move Core Cluster Resources, and then click Best Possible Node. 

Answer:

Explanation: 

http://blogs.msdn.com/b/clustering/archive/2012/06/25/10323434.aspx 


Q13. Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Server 2012 R2. All client computers run either Windows 7 or Windows 8. The domain contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the File and Storage Services server role installed. On Server1, you create a share named Share1. You need to ensure that users can use Previous Versions to restore the files in Share1. What should you configure on Server1? 

A. A data recovery agent 

B. The Shadow Copies settings 

C. The Recycle Bin properties 

D. A Windows Server Backup schedule 

Answer:


Q14. You have a Hyper-V host named Server1 that runs Windows Server 2012 R2 Datacenter. 

Server1 is located in an isolated network that cannot access the Internet. 

On Server1, you install a new virtual machine named VM1. VM1 runs Windows Server 

2012 R2 Essentials and connects to a private virtual network. 

After 30 days, you discover that VM1 shuts down every 60 minutes. 

You need to resolve the issue that causes VM1 to shut down every 60 minutes. 

What should you do? 

A. OnVM1, run slmgr.exe and specify the /ipk parameter. 

B. OnServer1, run slmgr.exe and specify the /rearm-sku parameter. 

C. Create a new internal virtual network and attach VM1 to the new virtual network. 

D. On Server1, run Add-WindowsFeatureVolumeActivation. 

Answer:


Q15. Which of the following situations would you use AD LDS? 

A. A DMZ 

B. Standard private network 

C. You require the use of Group Policy 

D. You require the use of Organizational Units 

Answer:

Explanation: 

A DMZ (Demilitarized Zone) such as a web server is usually the classic choice for using AD LDS (Active Directory Lightweight Directory Service) 


Q16. Your network contains two Active Directory forests named contoso.com and corp.contoso.com 

User1 is a member of the DnsAdmins domain local group in contoso.com. 

User1 attempts to create a conditional forwarder to corp.contoso.com but receive an error message shown in the exhibit. (Click the Exhibit button.) 

You need to configure bi-directional name resolution between the two forests. 

What should you do first? 

A. Add User1 to the DnsUpdateProxy group. 

B. Configure the zone to be Active Directory-integrated 

C. Enable the Advanced view from DNS Manager 

D. Run the New Delegation Wizard 

Answer:

97. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. 

Server1 is the enterprise root certification authority (CA) for contoso.com. You need to enable CA role separation on Server1. 

Which tool should you use? 

A. The Certutil command 

B. The Authorization Manager console 

C. The Certsrv command 

D. The Certificates snap-in 

Answer:


Q17. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 has access to four physical disks. The disks are configured as shown in the following table. 

You need to ensure that all of the disks can be added to a Cluster Shared Volume (CSV). 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Enable BitLocker on Disk4 

B. Disable BitLocker on Disk1 

C. Format Disk2 to use NTFS 

D. Format Disk3 to use NTFS 

Answer: C,D 

159. Your network contains a single Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

The domain contains 400 desktop computers that run Windows 8 and 200 desktop computers that run Windows XP Service Pack 3 (SP3). 

All new desktop computers that are added to the domain run Windows 8. All of the desktop computers are located in an organizational unit (OU) named OU1. 

You create a Group Policy object (GPO) named GPO1. GPO1 contains startup script settings. You link GPO1to OU1. You need to ensure that GPO1 is Applied only to computers that run Windows XP SP3. 

What should you do? 

A. Modify the Security settings of OU1. 

B. Run the Set-GPInheritancecmdlet and specify the -target parameter. 

C. Create and link a WMI filter to GPO1. 

D. Run the Set-GPLinkcmdlet and specify the -target parameter. 

Answer:

Explanation: 

WMI Filtering is used to get information of the system and apply the GPO on it with the condition is met.Security filtering: apply a GPO to a specific group (members of the group) 


Q18. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has the Remote Access server role installed. 

DirectAccess is implemented on Server1 by using the default configuration. 

You discover that DirectAccess clients do not use DirectAccess when accessing websites on the Internet. 

You need to ensure that DirectAccess clients access all Internet websites by using their DirectAccess connection. 

What should you do? 

A. Configure a DNS suffix search list on the DirectAccess clients. 

B. Enable the Route all traffic through the internal network policy setting in the DirectAccess Server Settings Group Policy object (GPO). 

C. Configure DirectAccess to enable force tunneling. 

D. Disable the DirectAccess Passive Mode policy setting in the DirectAccess Client Settings Group Policy object (GPO). 

Answer:


Q19. Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the IP Address Management (IPAM) Server feature installed. You install the IPAM client on Server2. 

You open Server Manager on Server2 as shown in the exhibit. (Click the Exhibit button.) 

You need to manage IPAM from Server2. 

What should you do first? 

A. On Server2, open Computer Management and connect to Server1. 

B. On Server1, add the Server2 computer account to the IPAM ASM Administrators group. 

C. On Server2, add Server1 to Server Manager. 

D. On Server1, add the Server2 computer account to the IPAM MSM Administrators group. 

Answer:


Q20. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

You are creating a central access rule named Test Finance that will be used to audit members of the Authenticated users group for access failure to shared folders in the finance department. 

You need to ensure that access requests are unaffected when the rule is published. 

What should you do? 

A. Set the Permissions to Use the following permissions as proposed permissions. 

B. Add a Resource condition to the current permissions entry for the Authenticated Users principal. 

C. Set the Permissions to Use following permissions as current permissions. 

D. Add a User condition to the current permissions entry for the Authenticated Users principal. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/jj134043.aspx