Your success in Microsoft 70 417 exam is our sole target and we develop all our 70 417 pdf braindumps in a way that facilitates the attainment of this target. Not only is our 70 417 pdf study material the best you can find, it is also the most detailed and the most updated. exam 70 417 Practice Exams for Microsoft 70 417 pdf are written to the highest standards of technical accuracy.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 70-417 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-417 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/70-417-exam-dumps.html
Q31. You have a server named Server1 that runs Windows Server 2012 R2. You create a custom Data Collector Set (DCS) named DCS1. You need to configure DCS1 to meet the following requirements:
Automatically run a program when the amount of total free disk space on Server1 drops below 10 percent of capacity.
Log the current values of several registry settings.
Which two should you configure in DCS1? (Each correct answer presents part of the solution. Choose two.)
A. System configuration information
B. A Performance Counter Alert
C. Event trace data
D. A performance counter
Answer: A,B
Q32. Your network contains an Active Directory domain named contoso.com. The network contains a file server named Server1 that runs Windows Server 2012 R2. You create a folder named Folder1. You share Folder1 as Share1.
The NTFS permissions on Folder1 are shown in the Folder1 exhibit. (Click the Exhibit button.)
The Everyone group has the Full control Share permission to Folder1.
You configure a central access policy as shown in the Central Access Policy exhibit. (Click the Exhibit button.)
Members of the IT group report that they cannot modify the files in Folder1. You need to
ensure that the IT group members can modify the files in Folder1. The solution must use central access policies to control the permissions. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. On the Security tab of Folder1, remove the permission entry for the IT group.
B. On the Classification tab of Folder1, set the classification to "Information Technology".
C. On the Security tab of Folder1, assign the Modify permission to the Authenticated Users group.
D. On Share1, assign the Change Share permission to the IT group.
E. On the Security tab of Folder1, add a conditional expression to the existing permission entry for the IT group.
Answer: B,C
Explanation:
A: On the Security tab of Folder1, remove the permission entry for the IT group. => tested => it failed of course, users don't even have read permissions anymore
D: On Share1, assign the Change share permission to the IT group =>Everyone already has the full control share permission => won't solve the problem which is about the NTFS Read permission
E: On the Security tab of Folder1, add a conditional expression to the existing permission entry for the IT group => how could a condition, added to a read permission, possibly transform a read to a modify permission? If they had said "modify the permission and add a conditional expression" => ok (even if that's stupid, it works) a condition is Applied to the existing permissions to filter existing access to only matching users or groups so if we Apply a condition to a read permission, the result will only be that less users (only them matching the conditions) will get those read permissions, which actually don't solve the problem neither so only one left:
C: On the Security tab of Folder1, assign the Modify permission to the Authenticated Users group => for sure it works and it's actually the only one which works, but what about security? well i first did not consider this method => "modify" permission for every single authenticated users? But now it looks very clear:
THE MORE RESTRICTIVE PERMISSION IS ALWAYS THE ONE APPLIED!! So "Modify" for Authenticated Users group and this will be filtered by the DAC who only allows IT group. and it matches the current settings that no other user (except admin, creator owner, etc...) can even read the folder. and this link confirms my theory:
http://autodiscover.wordpress.com/2012/09/12/configuring-dynamic-access-controls-andfileclassificationpart4-winservr-2012-dac-microsoft- mvpbuzz/
Configuring Dynamic Access Controls and File Classification
Note:
In order to allow DAC permissions to go into play, allow everyone NTFS full control
permissions and then DAC will overwrite it, if the user doesn't have NTFS permissions he
will be denied access even if DAC grants him access.
And if this can help, a little summary of configuring DAC:
Q33. You have a server named LON-DC1 that runs Windows Server 2012 R2. An iSCSI virtual disk named VirtualiSCSI1.vhd exists on LON-DC1 as shown in the exhibit. (Click the Exhibit button.)
You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt iSCSI target.
VirtualiSCSIl.vhd is removed from LON-DC1.
You need to assign VirtualiSCSI2.vhd a logical unit value of 0.
What should you do?
A. Modify the properties of the itgt ISCSI target.
B. Modify the properties of the VirtualiSCSI2.vhd iSCSI virtual disk
C. Run the Set-VirtualDisk cmdlet and specify the -Uniqueld parameter
D. Run the iscsicli command and specify the reportluns parameter
Answer: B
Q34. You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.
You need to add a graphical user interface (GUI) to Server1.
Which tool should you use?
A. The setup.exe command
B. The imagex.exe command
C. The Install-RoleServicecmdlet
D. The Add-WindowsFeaturecmdlet
Answer: D
Explanation:
From the MSPress book "Upgrading your skills to MCSA Windows Server 2012 R2" Converting a server with a GUI to or from Server Core You can switch between a Server Core installation and full installation in Windows Server 2012 R2 because the difference between these installation options is contained in two specific Windows features that can be added or removed. The first feature, Graphical Management Tools and Infrastructure (Server- Gui-Mgmt-Infra), provides a minimal server interface and server management tools such as Server Manager and the Microsoft Management Console (MMC). The second feature, Server Graphical Shell (Server-Gui-Shell), is dependent on the first feature and provides the rest of the GUI experience, including Windows Explorer. In Figure 1-9, you can see these two features in the Add Roles And Features Wizard, on the Select Features page, beneath User Interfaces And Infrastructure. To convert a full installation to a Server Core installation, just remove these two features in Server Manager. Note that removing the first feature will automatically remove the second, dependent feature. [...] You can also remove these graphical interface features in Windows PowerShell. If you have deployed a full installation of Windows Server 2012 R2 and want to convert it to a Server Core installation, run the following Windows PowerShell command: Uninstall-WindowsFeature Server-GUI-MgmtiInfra -restart Remember that you only need to specify Server-Gui-Mgmt-Infra for removal to remove both this feature and Server-Gui-Shell. Once the graphical management tools and graphical shell have been removed, the server restarts. When you log back on, you are presented with the Server Core user interface.
The process can be reversed by replacing both features. You can do this from a remote server by using the Add Roles And Features Wizard in Server Manager. You can also do it locally by running the following Windows PowerShell command: Install-WindowsFeature Server-Gui-Shell estart Note that when you install these two features from Windows PowerShell, you must specify them both.
To configure Minimal Server Interface, you can either start with a Server Core installation and add Graphical Management Tools and Infrastructure or start with a Server with a GUI and remove Server Graphical Shell.
The Graphical Management Tools and Infrastructure feature includes Server Manager and some other basic administrative tools, but it does notinclude (i.e among tohers) Windows Explorer. NB: http://technet.microsoft.com/en-us/library/jj205467.aspx Install-WindowsFeature Installs one or more Windows Server roles, role services, or features on either the local or a specified remote server that is running Windows Server 2012 R2.
This cmdlet is equivalent to and replaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features in Windows Server 2008 R2.http://blogs.technet.com/b/yungchou/archive/2012/07/18/windows-server-2012-installationoptions.aspx
Minimal Server Interface This is new. In Windows Server 2012 R2, with a Server with GUI installation one can remove the Server Graphical Shell (which provides full GUI for server) to set a full server installation with the so-called Minimal Server Interface option with the following PowerShell comlet. Unstall-WindowsFeature Server-Gui-Shell estart. This basically provides a Server with GUI, but without installing Internet Explorer 10, Windows Explorer, the desktop, and the Start screen. Additionally, Microsoft Management Console (MMC), Server Manager, and a subset of Control Panel are still in place. Minimal Server Interface requires 4 GB more disk space than Server Core alone
Q35. Your network contains a server named Server1 that runs Windows Server 2012. Server1
has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You plan to schedule a complete backup of Server1 by using Windows Server Backup.
You need to ensure that the state of VM1 is saved before the backup starts.
What should you configure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Answer: I
Explanation:
http://www.altaro.com/hyper-v/vss-crash-consistent-vs-Application-consistent-vss-backupspost-2- of-2/ Backup Operations in Hyper-V No VSS Writer Available? In some cases, you need an Application-consistent backup but there is no VSS writer available. One example of this is MySQL. Hyper-V backups of virtual machines containing MySQL will always result in either a crashconsistent or an image-level backup. For MySQL, the latter is probably acceptable as MySQL doesn't perpetually expand the log file. However, if you're using MySQL within a VSS-aware VM, then a Hyper-Vbased backup tool is going to take a crash-consistent backup. MySQL (like any other database system) isn't always recoverable from a crash-consistent backup; tool is going to take a crash-consistent backup. MySQL (like any other database system) isn't always recoverable from a crash-consistent backup; even when recovery is possible, it may be painful. MySQL is just one example; any number of line-of-business Applications could tell a similar tale. In the case of MySQL, one solution is to find a guest-level backup Application that is MySQL- aware and can back it up properly. For Applications for which no backup Application has a plug-in, you may need to have pre-and post-backup scripts that stop services or close Applications. If brief downtime is acceptable, you can disable the Backup item in Hyper-V Integration Services, thereby forcing Hyper-V to save the state of the VM during backup. This technique results in an image-level backup and can
be used on any Application that doesn't have a VSS writer.
Q36. You deploy an Active Directory Federation Services (AD FS) 2.1 infrastructure. The
infrastructure uses Active Directory as the attribute store.
Some users report that they fail to authenticate to the AD FS infrastructure.
You discover that only users who run third-party web browsers experience issues.
You need to ensure that all of the users can authenticate to the AD FS infrastructure
successfully.
Which Windows PowerShell command should you run?
A. Set-ADFSProperties -SSOLifetime 1:00:00
B. Set-ADFSProperties -AddProxyAuthenticationRules None
C. Set-ADFSProperties -ExtendedProtectionTokenCheck None
D. Set-ADFSProperties -ProxyTrustTokenLifetime 1:00:00
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/hh237448%28WS.10%29.aspx
Q37. OTSPOT
You have a server named Server1 that has the Web Server (IIS) server role installed. You obtain a Web Server certificate.
You need to configure a website on Server1 to use Secure Sockets Layer (SSL). To which store should you import the certificate?
To answer, select the appropriate store in the answer area.
Answer:
Q38. OTSPOT
Your network contains an Active Directory domain named contoso.com. The relevant servers in the domain are configured as shown in the following table.
You plan to create a shared folder on Server1 named Share1. Share1 must only be accessed by users who are using computers that are joined to the domain.
You need to identify which servers must be upgraded to support the requirements of Share1.
In the table below, identify which computers require an upgrade and which computers do not require an upgrade. Make only one selection in each row. Each correct selection is worth one point.
Answer:
Q39. Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named Server3 and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in a failover cluster named Cluster2.
You need to move all of the applications and the services from Cluster1 to Cluster2.
What should you do first from Failover Cluster Manager?
A. On a server in Cluster1, configure Cluster-Aware Updating.
B. On a server in Cluster2, configure Cluster-Aware Updating.
C. On a server in Cluster1, click Migrate Roles.
D. On a server in Cluster1, click Move Core Cluster Resources, and then click Select Node...
Answer: C
Explanation:
http://blogs.msdn.com/b/clustering/archive/2012/06/25/10323434.aspx
Q40. Your network contains an Active Directory domain named contoso.com. The domain contains a Web server named www.contoso.com. The Web server is available on the Internet.
You implement DirectAccess by using the default configuration.
You need to ensure that users never attempt to connect to www.contoso.com by using DirectAccess. The solution must not prevent the users from using DirectAccess to access other resources in contoso.com.
Which settings should you configure in a Group Policy object (GPO)?
A. DirectAccess Client Experience Settings
B. Name Resolution Policy
C. DNS Client
D. Network Connections
Answer: B
Explanation:
http://www.techrepublic.com/blog/10things/10-things-you-should-know-aboutdirectaccess/1371
