Foolproof 70 417 exam tips

Ucertify microsoft 70 417 Questions are updated and all 70 417 vce answers are verified by experts. Once you have completely prepared with our 70 417 vce exam prep kits you will be ready for the real exam 70 417 exam without a problem. We have Renew Microsoft exam 70 417 dumps study guide. PASSED 70 417 pdf First attempt! Here What I Did.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-417 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-417 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-417-exam-dumps.html

Q131. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are configured as shown in the following table. 

You need to ensure that when new targets are added to Server1, the targets are registered on Server2 automatically. 

What should you do on Server1? 

A. Configure the Discovery settings of the iSCSI initiator 

B. Configure the security settings of the iSCSI target 

C. Run the Set-Wmilnstance cmdlet 

D. Run the Set-IscsiServerTarget cmdlet 

Answer:


Q132. Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs WindowsServer 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server. 

You need to ensure that only computers that send a statement of health are checked for Network Access Protection (NAP) health requirements. 

Which two settings should you configure? (Each correct answer presents part of the solution. Choose two.) 

A. The NAS Port Type constraints 

B. The MS-Service Class conditions 

C. The Health Policies conditions 

D. The NAP-Capable Computers conditions 

E. The Called Station ID constraints 

Answer: C,D 

Explanation: 

Explanation The NAP-Capable ensures that the machine is able to send a statement of health, and the Health Policy tells it which policy to evaluate against. 


Q133. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2. 

The domain contains two domain controllers. The domain controllers are configured as shown in the following table. 

Active Directory Recycle Bin is enabled. 

You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago. 

You need to restore the membership of Group1. 

What should you do? 

A. Perform an authoritative restore. 

B. Perform a non-authoritative restore. 

C. Recover the items by using Active Directory Recycle Bin. 

D. Apply a virtual machine snapshot to VM1. 

Answer:

Explanation: 

Authoritative restore allows the administrator to recover a domain controller, restore it to a specific point in time, and mark objects in Active Directory as being authoritative with respect to their replication partners. For example, you might need to perform an authoritative restore if an administrator inadvertently deletes an organizational unit containing a large number of users. If you restore the server from tape, the normal replication process would not restore the inadvertently deleted organizational unit. Authoritative restore allows you to mark the organizational unit as authoritative and force the replication process to restore it to all of the other domain controllers in the domain. Incorrect: Not C: A nonauthoritative restore returns the domain controller to its state at the time of backup and then allows normal replication to overwrite that state with any changes that occurred after the backup was taken. After you restore the system state, the domain controller queries its replication partners. The replication partners replicate any changes to the restored domain controller, ensuring that the domain controller has an accurate and updated copy of the Active Directory database. 

Reference: Performing an Authoritative Restore 

What should you do? 

A. Export and import data by using Dsamain. 

B. Apply a virtual machine snapshot to VM1. 

C. Recover the items by using Active Directory Recycle Bin. 

D. Modify the isRecycled attribute of Group1. Answer: A 


Q134. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

HVServer1 hosts two virtual machines named Server1 and Server2. Both virtual machines connect to a virtual switch named Switch1. 

On Server2, you install a network monitoring application named App1. 

You need to capture all of the inbound and outbound traffic to Server1 by using App1. 

Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.) 

A. Get-VM "Server2" | Set-VMNetworkAdapter -IovWeight 1 

B. Get-VM "Server1" | Set-VMNetworkAdapter -Allow/Teaming On 

C. Get-VM "Server1" | Set-VMNetworkAdapter -PortMirroring Source 

D. Get-VM "Server2" | Set-VMNetworkAdapter -PortMirroring Destination 

E. Get-VM "Server1" | Set-VMNetworkAdapter -IovWeight 0 

F. Get-VM "Server2” | Set-VMNetworkAdapter-AllowTeaming On 

Answer: C,D 

Explanation: Note: 

*

 Get-VM will get the virtual machines from one or more Hyper-V hosts. 

-ComputerName<String[]> is used to specify one or more Hyper-V hosts from which virtual machines are to be retrieved. NetBIOS names, IP addresses, and fully-qualified domain names are allowable. The default is the local computer — use “localhost” or a dot (“.”) to specify the local computer explicitly. 

*

 Set-VMNetworkAdapter is used to configure features of the virtual network adapter in a virtual machine or the management operating system. 

-PortMirroring<VMNetworkAdapterPortMirroringMode> is used to specify the port mirroring mode for the network adapter to be configured. 

With Port Mirroring, traffic sent to or from a Hyper-V Virtual Switch port is copied and sent to a mirror port. There are a range of applications for port mirroring - an entire ecosystem of network visibility companies exist that have products designed to consume port mirror data for performance management, security analysis, and network diagnostics. With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch port that receives copies of all the traffic. 

References: http://technet.microsoft.com/en-us/library/jj679878.aspx 


Q135. OTSPOT 

Your network contains an Active Directory domain named fabrikam.com. You implement DirectAccess and an IKEv2 VPN. You need to view the properties of the VPN connection. Which connection properties should you view? To answer, select the appropriate connection properties in the answer area. 

Answer: 


Q136. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has following storage spaces: 

Data 

Users 

Backups 

Primordial 

.... 

You add an additional hard disk to Server1. 

You need to identify which storage space contains the new hard disk. 

Which storage space contains the new disk? 

A. Primordial 

B. Data 

C. Backups 

D. Users 

Answer:

Explanation: 

New Disks (Unallocated space) added to Primordial spacePrimordial Pool? All storage that meets acceptable criteria for Storage Spaces will be placed in the Primordial Pool. Thiscan be considered the default pool for devices from which any other pools will be created. Notice that there are no other virtual disks or pools at this point. The Primordial Pool will only consist of physical storage devices that do not belong to any other pools. 

http://blogs.technet.com/b/canitpro/archive/2012/12/13/storage-pools-dive-right-in.aspx http:// blogs.technet.com/b/askpfeplat/archive/2012/10/10/windows-server-2012-storagespaces-is- it for-youcould-be.aspx 


Q137. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled. 

You install the DHCP server role on a virtual machine named Server1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope. 

You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1. 

You need to ensure that the virtual machines can use Server1 as a DHCP server. 

What should you do? 

A. Enable MAC address spoofing on Server1. 

B. Enable single-root I/O visualization (SR-IOV) on Server1. 

C. Disable the DHCP guard on Server1. 

D. Disable the DHCP guard on all of the virtual machines that are DHCP clients. 

Answer:

Explanation: DHCP guard setting This setting stops the virtual machine from making DHCP offers over this network interface. To be clear – this does not affect the ability to receive a DHCP offer (i.e. if you need to use DHCP to acquire an IP address that will work) it only blocks the ability for the virtual machine to act as a DHCP server. 


Q138. Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. All of the DNS servers in both of the domains run Windows Server 2012 R2. 

The network contains two servers named Server1 and Server2. Server1 hosts an Active Directory-integrated zone for contoso.com. Server2 hosts an Active Directory-integrated zone for fabrikam.com. 

Server1 and Server2 connect to each other by using a WAN link. Client computers that connect to Server1 for name resolution cannot resolve names in fabrikam.com. 

You need to configure Server1 to support the resolution of names in fabrikam.com. The solution must ensure that users in contoso.com can resolve names in fabrikam.com if the WAN link fails. 

What should you do on Server1? 

A. Create a stub zone. 

B. Create a secondary zone. 

C. Add a forwarder. 

D. Create a conditional forwarder. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc771898(v=ws.10).aspx Stub zone doesn't host the records themselves Forwarder and conditional forwarders simply give instructions on where to forward DNS requests to. 


Q139. RAG DROP 

Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8. 

Group Policy objects (GPOs) are linked to the domain as shown in the exhibit. (Click the Exhibit button.) 

GPO2 contains computer configurations only and GPO3 contains user configurations only. 

You need to configure the GPOs to meet the following requirements: 

. Ensure that GPO2 only applies to the computer accounts in OU2 that have more than one processor. . Ensure that GPO3 only applies to the user accounts in OU3 that are members of a security group named SecureUsers. 

Which setting should you configure in each GPO? 

To answer, drag the appropriate setting to the correct GPO. Each setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q140. OTSPOT 

You have a Hyper-V host named Server1 that runs Windows Server 2008 R2.All of the virtual machines on Server1 use VHDs. 

You install the Hyper-V server role on a server named Server2 that runs Windows Server 2012 R2.Server2 has the same hardware configurations as Server1. 

You plan to migrate the Hyper-V host from Server1 to Server2 by using the Windows Server Migration Tools. 

In the table below, identify what can be migrated by using the Windows Server Migration Tools. Make only one selection in each row. Each correct selection is worth one point. 

Answer: