microsoft.actualtests.70 417.v2014!05!24.by.grace.148q (1)

146
Microsoft.Actualtests.70-417.v2014-05-24.by.GRACE.148q Number : 70-417 Passing Score : 700 Time Limit : 120 min File Version : 24.5 Exam Code: 70-417 Exam Name: Upgrading Your Skills to MCSA Windows Server 2012

Upload: ramona-ana

Post on 02-Feb-2016

16 views

Category:

Documents


0 download

DESCRIPTION

...

TRANSCRIPT

Page 1: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Microsoft.Actualtests.70-417.v2014-05-24.by.GRACE.148q

Number: 70-417Passing Score: 700Time Limit: 120 minFile Version: 24.5

Exam Code: 70-417

Exam Name: Upgrading Your Skills to MCSA Windows Server 2012

Page 2: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

A- Multiple Choice Questions

QUESTION 1Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the followingtable.

You plan to create a checkpoint of VM1.

You need to recommend a solution to minimize the amount of disk space used for the checkpoint of VM1.

What should you do before you create the checkpoint?

A. Decrease the Maximum RAM.

B. Convert diskl.vhd to a dynamically expanding disk.

C. Run the Stop-VM cmdlet.

D. Run the Resize-VHD cmdlet.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 2You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.

You need to add a graphical user interface (GUI) to Server1.

Which tool should you use?

A. The imagex.exe command

B. The ocsetup.exe command

C. The setup.exe command

D. The dism.exe command

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 3You have a server named Server1 that runs Windows Server 2012 R2.

Page 3: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You plan to create an image of Server1.

You need to remove the source files for all server roles that are not installed on Server1.

Which tool should you use?

A. dism.exe

B. servermanagercmd.exe

C. ocsetup.exe

D. imagex.exe

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation/Reference:The Dism utility can be used to create and mount an image of Server1.

Incorrect answers:A: This is the wrong tool.B. The imagex.exe command is used to create windows and to apply image to drive.D: The ocsetup command will execute a setup.

References:http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx http://technet.microsoft.com/en-us/library/dd744382(v=ws.10).aspx Training Guide: Installing and Configuring Windows Server 2012: Chapter 2:Deploying Servers, p. 44Exam Ref 70-410: Installing and Configuring Windows Server 2012: Chapter 1: Installing and ConfiguringServers, p. 19-22

QUESTION 4You have a server named Server1 that runs Windows Server 2012 R2. Server1 has following storage spaces:· Data· Users· Backups· Primordial

You add an additional hard disk to Server1.

You need to identify which storage space contains the new hard disk.

Which storage space contains the new disk?

A. Primordial

B. Data

C. Backups

D. Users

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation/Reference:New Disks (Unallocated space) added to Primordial space.

Page 4: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Incorrect answers:A: It cannot be in the Data storage space as it is a new disk that has just been added.C: It is a new disk that had been added and will thus not be found under the Users storage space.D: This is a new disk that has just been added, it does not contain Backups and will thus not be in this storagespace since it is not in the primordial storage space.

References:http://blogs.technet.com/b/canitpro/archive/2012/12/13/storage-pools-dive-right-in.aspx

QUESTION 5Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1. Server1 runs Windows Server 2012.

You create a group Managed Service Account named gservice1.

You need to configure a service named Service1 to run as the gservice1 account.

How should you configure Service1?

A. From a command prompt, run ss.exe and specify the config parameter.

B. From a command prompt, run ss.exe and specify the sdset parameter.

C. From the Services console, configure the General settings.

D. From Windows PowerShell, run Set-Service and specify the -PassThrough parameter.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation/Reference:Executing the ss.exe command with the config parameter will modify service configuration.

Incorrect answers:A. the General settings tab only allow you to stop, start and set type/parameters. B. Set-Service provides a wayfor you to change the Description, StartupType, or DisplayName of a service.D. Sets the response/action on service failure.References:http://windows.microsoft.com/en-us/windows-vista/using-system-configuration http://technet.microsoft.com/en-us/library/ee176963.aspx http://technet.microsoft.com/en-us/library/cc990290(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc738230(v=ws.10).aspx

QUESTION 6You have a server named Data1 that runs a Server Core Installation of Windows Server 2012 R2 Standard.

You need to configure Data1 to run a Server Core Installation of Windows Server 2012 R2 Datacenter. Youwant to achieve this goal by using the minimum amount of administrative effort.

What should you perform?

A. An online servicing by using Dism

B. An offline servicing by using Dism

C. An upgrade installation of Windows Server 2012 R2

D. A clean installation of Windows Server 2012 R2

Correct Answer: ASection: (none)Explanation

Page 5: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Explanation/Reference:Explanation/Reference:There are a couple of ways to install the GUI from the command prompt, although both use the same tool -DISM (Deployment Image Service Manager). When you are doing it for a single (local) server, the command is:

Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:...

Incorrect answers:A: This option involves too much administrative effort whereas you could just use a DISM command once.B: This should work, but not with the east amount of administrative effort.D: The DISM utility needs to be used online, not offline.

References:Training Guide: Installing and Configuring Windows Server 2012: Chapter 2: Deploying Servers, p. 44Exam Ref 70-410: Installing and Configuring Windows Server 2012: Chapter 1: Installing and ConfiguringServers, p. 19-22

QUESTION 7Your network contains an Active Directory forest named contoso.com.

The forest contains two domains named contoso.com and child.contoso.com and two sites named Site1 andSite2. The domains and the sites are configured as shown in following table.

When the link between Site1 and Site2 fails, users fail to log on to Site2.

You need to identify what prevents the users in Site2 from logging on to the child.contoso.com domain.

What should you identify?

A. The placement of the infrastructure master

B. The placement of the global catalog server

C. The placement of the domain naming master

D. The placement of the PDC emulator

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation/Reference:The exhibit shows that Site2 does not have a PDC emulator. This is important because of the close interaction

Page 6: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

between the RID operations master role and the PDC emulator role The PDC emulator processes passwordchanges from earlier-version clients and other domain controllers on a best-effort basis; handles passwordauthentication requests involving passwords that have recently changed and not yet been replicated throughoutthe domain; and, by default, synchronizes time. If this domain controller cannot connect to the PDC emulator,this domain controller cannot process authentication requests, it may not be able to synchronize time, andpassword updates cannot be replicated to it.

Incorrect answers:A: The global catalogue server role placement is not the issue.C: The PDC emulator role, not the infrastructure master role will process authentication requests that will allowlogging on for the Site2 users.D: The domain naming master role is not the role that prevents Site2 users from logging on to the child domain.

References:http://technet.microsoft.com/en-us/library/dd391870(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc773108(v=ws.10).aspx

QUESTION 8Your network contains an Active Directory forest that contains two domains. The forest contains five domaincontrollers.

The domain controllers are configured as shown in the following table.

You need to configure DC5 as a global catalog server.

Which tool should you use?

A. Active Directory Administrative Center

B. Active Directory Users and Computers

C. Active Directory Sites and Services

D. Active Directory Domains and Trusts

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation/Reference:Active Directory Sites and Services can be used to Add or remove the global catalog read-only directorypartitions from a domain controller in the site. Confirm that all read-only directory partitions have been replicatedto the new global catalog server. As well as verify that the global catalog server is being advertised in DomainName System (DNS).

References:http://technet.microsoft.com/en-us/library/cc730868.aspx http://technet.microsoft.com/en-us/library/cc770674.aspx

QUESTION 9

Page 7: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Your network contains an Active Directory forest. The forest contains a single domain named contoso.com. Thedomain contains four domain controllers.

The domain controllers are configured as shown in the following table.

All domain controllers are DNS servers.

You plan to deploy a new domain controller named DC5 in the contoso.com domain.

You need to identify which domain controller must be online to ensure that DC5 can be promoted successfullyto a domain controller.

Which domain controller should you identify?

A. DC1

B. DC2

C. DC3

D. DC4

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation/Reference:To perform a domain controller promotion you need the Infrastructure master to be online. The schema masterand the domain naming master are per-forest roles. Therefore, there is only one schema master and onedomain naming master per forest.

The RID master, the PDC master, and the infrastructure master are per-domain roles. Each domain has itsown RID master, PDC master, and infrastructure master. Therefore, if a forest has three domains, there arethree RID masters, three PDC masters, and three infrastructures masters.

Incorrect answers:A: The domain naming master Flexible Single Master Operations (FSMO) role holder is assigned to the domaincontroller that is responsible for making changes to the CN=Partitions, CN=Configuration, DC=domainconfiguration container in Active DirectoryB: Active Directory Users and Computers Snap-in will always contact the PDC when User Properties is openedD: very Exchange Server 5.5 site or Exchange 2000 Server Routing Group needs a Routing InformationDaemon (RID) master, or routing master. This RID master generates the routing table for the rest of the site (orRouting Group), which replicates to the entire Exchange Server organization. By default the RID master is thefirst Exchange Server computer in the site.

References:http://support.microsoft.com/kb/234790

Page 8: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

http://support.microsoft.com/kb/254809

QUESTION 10Your network contains an Active Directory forest named contoso.com. All domain controllers currently runWindows Server 2008 R2.

You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2.

The new domain controller will have the following configurations:· Schema master· Global catalog server· DNS Server server role· Active Directory Certificate Services server role

You need to identify which configurations cannot be fulfilled by using the Active Directory Domain ServicesConfiguration Wizard.

Which two configurations should you identify? (Each correct answer presents part of the solution. Choose two.)

A. Enable the global catalog server.

B. Transfer the schema master.

C. Install the Active Directory Certificate Services role.

D. Install the DNS Server role.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Explanation:AD Installation Wizard will automatically install DNS and allows for the option to set it as a global catalog server.ADCS and schema must be done separately.

Incorrect answers:A: The Global Catalogue server is automatically installed.C: The DNS server role is automatically installed.

References:http://technet.microsoft.com/en-us/library/hh831457.aspx Exam Ref 70-410: Installing and ConfiguringWindows Server 2012, Chapter 5: Install and administer Active Directory, Objective 5.1: Install domaincontrollers, p. 262

QUESTION 11You have a server named Server1 that runs Windows Server 2012.

You promote Server1 to a domain controller.

You need to view the service location (SRV) records that Server1 registers in DNS.

What should you do on Server1?

A. Open the Netlogon.dns file.

B. Run ipconfig /displaydns.

C. Run Get-DnsServerDiagnostics.

D. Open the SrC. sys file.

Correct Answer: ASection: (none)

Page 9: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Explanation

Explanation/Reference:Explanation/Reference:Netlogon.dns - If you are using non-Microsoft DNS servers to support Active Directory, you can verify SRVlocator resource records by viewing Netlogon.dns. Netlogon.dns is located in the %systemroot%\System32\Config folder. You can use a text editor, such as Microsoft Notepad, to view this file.The first record in the file is the domain controller's Lightweight Directory Access Protocol (LDAP) SRV record.

Incorrect answers:A: Server1 has been promoted to a domain controller and if you want to view the SRV records then you shouldopen the NetLogon.dns files.C: Server1's SRV records can only be viewed via the NetLogon.dns file.D: The Server1 SRV records should be viewed via the NetLogon.dns file.

References:http://support.microsoft.com/kb/816587/en-us

QUESTION 12Your network contains an Active Directory domain named adatum.com. The domain contains a member servernamed Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2.

On DC2, you open Server Manager and you add Server1 as another server to manage.

From Server Manager on DC2, you right-click Server1 as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that when you right-click Server1, you see the option to run the DHCP console.

Page 10: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

What should you do?

A. On DC2, install the Role Administration Tools.

B. On DC2 and Server1, run winrmquickconfig.

C. In the domain, add DC2 to the DHCP Administrators group.

D. On Server1, install the Feature Administration Tools.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation/Reference:Remote Mgmt must be setup on both servers to allow you to run the DHCP console.

Incorrect answers:A: To run the Server1 DHCP console from DC2 you must make sure that both those servers are remotemanagement enabled.B: The scenario only mentions a Server1 and DC2.D: You need both computers in the question to be set up for remote management.

References:http://technet.microsoft.com/en-us/library/ee441255(v=ws.10).aspx

QUESTION 13Your network contains an Active Directory domain named contoso.com. The domain contains three serversnamed Server1, Server2, and Server3.

You create a server group named ServerGroup1.

You discover the error message shown in the following exhibit. (Click the Exhibit button.)

Page 11: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to ensure that Server2 can be managed remotely by using Server Manager.What should you do?

A. On Server2, run the netdom.exe command.

B. On Server2, run the net stop netlogon command, and then run the net start netlogon command.

C. On DC1, run the Enable-PSSessionConfigurationcmdlet.

D. On Server2, modify the membership of the Remote Management Users group.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation/Reference:This is a security issue. To be able to access Server2 remotely through Server Manager the user need to be amember of the Remote Management Users group.

Incorrect:A: the Enable-PSSessionConfiguration. This is an advanced cmdlet that is designed to be used by systemadministrators to manage customized session configurations for their users.B: This command is used to create a server pool.D: You should make sure that Server2's Remote Management Users Group allows for remote management.

References:Training Guide: Installing and Configuring Windows Server 2012, Chapter 3 Server Remote Management,Lesson 1: Server Manager, p. 90-92

Page 12: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 14Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012R2. The domain contains a server named Server1.

You install the Windows PowerShell Web Access gateway on Server1.

You need to provide administrators with the ability to manage the servers in the domain by using the WindowsPowerShell Web Access gateway.

Which two cmdlets should you run on Server1? (Each correct answer presents part of the solution. Choosetwo.)

A. Install PswaWebApplication

B. Add PswaAuthorizationRule

C. Set-WSManlnstance

D. Set-WSManQuickConfig

E. Set-BCAuthentication

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation/Reference:C. Adds a new authorization rule to the Windows PowerShell® Web Access authorization rule set.E. Configures the Windows PowerShell®Web Access web application in IIS.

Incorrect answers:A. Configures the local computer for remote management.B. Modifies the management information that is related to a resource. D. Specifies the BranchCache computerauthentication mode.

References:http://technet.microsoft.com/en-us/library/hh849867.aspx http://technet.microsoft.com/en-us/library/hh849875.aspx http://technet.microsoft.com/en-us/library/jj592890(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh848404(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj592894(v=wps.620).aspx

QUESTION 15Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1 that runs Windows Server 2012 and a server named Server2 that runs Windows Server 2008 R2Service Pack 1 (SP1). Both servers are member servers.

On Server2, you install all of the software required to ensure that Server2 can be managed remotely fromServer Manager.

You need to ensure that you can manage Server2 from Server1 by using Server Manager.

Which two tasks should you perform on Server2? (Each correct answer presents part of the solution. Choosetwo.)

A. Run the Enable-PSRemotingcmdlet.

B. Run the Configure-SMRemoting.psl script.

C. Run the Enable-PSSessionConfigurationcmdlet.

D. Run the Set-ExecutionPolicycmdlet.

E. Run the systempropertiesremote.exe command.

Page 13: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:The output of this command indicates whether Server Manager Remoting is enabled or disabled on the server.To configure Server Manager remote management by using Windows PowerShell On the computer that youwant to manage remotely, open a Windows PowerShell session with elevated user rights. To do this, click Start,click All Programs, click Accessories, click Windows PowerShell, right-click the Windows PowerShell shortcut,and then click Run as administrator. In the Windows PowerShell session, type the following, and then pressEnter.Set-ExecutionPolicy -ExecutionPolicyRemoteSignedType the following, and then press Enter to enable all required firewall rule exceptions.Configure-SMRemoting.ps1 -force enable

Incorrect answers:A: The systempropertiesremote.exe command will not allow remote server management from Server1.B: You should run a powershell script that will enable remote Server management by runningthe %windir%\system32\Configure-SMRemoting.exe command-line tool from an elevated command prompt.C:Windows PowerShell remoting is primarily intended for remotely managing domain-joined computers

References:Training Guide: Installing and Configuring Windows Server 2012: Chapter 4: Deploying Domain Controllers,Lesson 3: Deploying domain controllers using Powershell, p. 165 http://technet.microsoft.com/en-us/library/dd759202.aspx

QUESTION 16Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2 that run Windows Server 2012 R2.You log on to Server1.

You need to retrieve the IP configurations of Server2.

Which command should you run from Server1?

A. winrm get server2

B. dsquery · -scope base -attrip/server2

C. winrs -r:server2ipconfig

D. ipconfig> server2.ip

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation/Reference:Windows Remote Management allows you to manage and execute programs remotely

Incorrect answers:B. winrm is the server side services for remote mgmtC. This command will not display the IP configurations.D. Would output server1 ipconfig info to server2.ip file

References:Exam Ref 70-410: Installing and Configuring Windows Server 2012: Objective 4.3: Deploy and Configure theDNS service, Chapter 4 Deploying and Configuring core network services, p. 246 http://technet.microsoft.com/en-us/library/dd349801(v=ws.10).aspx

Page 14: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 17Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1. Server1 has the DHCP Server server role and the Network Policy Server role service installed.

Server1 contains three non-overlapping scopes named Scope1, Scope2, and Scope3. Server1 currentlyprovides the same Network Access Protection (NAP) settings to the three scopes.

You modify the settings of Scope1 as shown in the exhibit. (Click the Exhibit button.)

You need to configure Server1 to provide unique NAP enforcement settings to the NAP non- compliant DHCPclients from Scope1.

What should you create?

A. A network policy that has the MS-Service Class condition

B. A connection request policy that has the Service Type condition

C. A network policy that has the Identity Type condition

D. A connection request policy that has the Identity Type condition

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Page 15: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Explanation/Reference:A. Restricts the policy to clients that have received an IP address from a DHCP scope that matches thespecified DHCP profile name. This condition is used only when you are deploying NAP with the DHCPenforcement method. To use the MS-Service Class attribute, in Specify the profile name that identifies yourDHCP scope, type the name of an existing DHCP profile. http://technet.microsoft.com/en-us/library/cc731220(v=ws.10).aspx

QUESTION 18Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1 that runs Windows Server 2012 R2. Server1 has the Network Policy Server role service installed.

You plan to configure Server1 as a Network Access Protection (NAP) health policy server for VPN enforcementby using the Configure NAPwizard.

You need to ensure that you can configure the VPN enforcement method on Server1 successfully.

What should you install on Server1 before you run the Configure NAP wizard?

A. A computer certificate

B. A system health validator (SHV)

C. The Remote Access server role

D. The Host Credential Authorization Protocol (HCAP)

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation/Reference:A. Host Credential Authorization Protocol (HCAP) allows you to integrate your Microsoft Network AccessProtection (NAP) solution with Cisco Network Admission Control B. System health validators (SHVs) defineconfiguration requirements for NAP client computers.

C.D. The NAP health policy server requires a computer certificate to perform PEAP-based user or computerauthentication. After this certificate is acquired, a connection to AD CS is not required for as long as thecertificate is valid.

http://technet.microsoft.com/en-us/library/cc732681.aspx http://technet.microsoft.com/en-us/library/dd125396(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831416.aspx http://technet.microsoft.com/en-us/library/dd125301(v=ws.10).aspx

QUESTION 19Your network contains an Active Directory domain named contoso.com. The domain contains client computersthat run Either Windows XP, Windows 7, or Windows 8.

Network Policy Server (NPS) is deployed to the domain.

You plan to create a system health validator (SHV).

You need to identify which policy settings can be applied to all of the computers.

Which three policy settings should you identify? (Each correct answer presents part of the solution. Choosethree.)

A. Automatic updating is enabled.

B. A firewall is enabled for all network connections.

C. An antispyware application is on.

Page 16: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

D. Antispyware is up to date.

E. Antivirus is up to date.

Correct Answer: ABESection: (none)Explanation

Explanation/Reference:

QUESTION 20Your network contains an Active Directory domain named adatum.com. The domain contains a server namedServer1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server (NPS) serverand as a DHCP server.

The network contains two subnets named Subnet1 and Subnet2. Server1 has a DHCP scope for each subnet.

You need to ensure that noncompliant computers on Subnet1 receive different network policies thannoncompliant computers on Subnet2.

Which two settings should you configure? (Each correct answer presents part of the solution.Choose two.)

A. The MS-Service Class conditions

B. The Called Station ID constraints

C. The NAP-Capable Computers conditions

D. The NAS Port Type constraints

E. The Health Policies conditions

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation/Reference:C: The NAP health policy server uses the NPS role service with configured health policies and system healthvalidators (SHVs) to evaluate client health based on administrator-defined requirements. Based on results ofthis evaluation, NPS instructs the DHCP server to provide full access to compliant NAP client computers and torestrict access to client computers that are noncompliant with health requirements.

D: If policies are filtered by DHCP scope, then MS-Service Class is configured in policy conditions.

QUESTION 21Your network contains a single Active Directory domain named contoso.com. All domain controllers runWindows Server 2012 R2.

The domain contains 400 desktop computers that run Windows 8 and 200 desktop computers that runWindows Vista Service Pack 2(SP2).

All of the desktop computers are located in an organizational unit (OU) named OU1.

You create a Group Policy object (GPO) named GPO1. GPO1 contains startup script settings.You link GPO1 to OU1.

You need to ensure that GPO1 is applied only to computers that run Windows 8.

What should you do?

Page 17: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

A. Modify the Security settings of OU1.

B. Create and link a WMI filter to GPO1.

C. Run the Set-GPInheritancecmdlet and specify the -target parameter.

D. Run the Set-GPLinkcmdlet and specify the -target parameter.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation/Reference:WMI Filtering is used to get information of the system and apply the GPO on it with the condition is met.Securityfiltering: apply a GPO to a specific group (members of the group)

QUESTION 22Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1 that runs Windows Server 2012. Server1 has the Remote Desktop Session Host role service installed.The computer account of Server1 resides in an organizational unit (OU) named OU1.

You create and link a Group Policy object (GPO) named GPO1 to OU1. GPO1 is configured as shown in theexhibit. (Click the Exhibit button.)

Page 18: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to prevent GPO1 from applying to your user account when you log on to Server1. GPO1 must applyto every other user who logs on to Server1.What should you configure?

A. Item-level targeting

B. Security Filtering

C. Block Inheritance

D. WMI Filtering

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 23

Page 19: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Your network contains an Active Directory domain named contoso.com. All domain controllers run WindowsServer 2012 R2.

An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A GroupPolicy object (GPO) named GPO1 is linked to OU1.

You make a change to GPO1.

You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solutionmust minimize administrative effort.

Which tool should you use?

A. TheSecedit command

B. The Invoke-GpUpdatecmdlet

C. Group Policy Object Editor

D. Server Manager

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 24Your network contains an Active Directory domain named contoso.com. All domain controllers run WindowsServer 2012.

The domain contains an Edge Server named Server1. Server1 is configured as a DirectAccess server. Server1has the following settings:· Internal DNS name: Server1.contoso.com External DNS name:· dal.contoso.com Internal IPv6 address: 2002:cla8:6a:3333::l · External IPv4 address: 65.55.37.62

Your company uses split-brain DNS for the contoso.com zone.

You run the Remote Access Setup wizard as shown in the following exhibit. (Click the Exhibit button.)

Page 20: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to ensure that client computers on the Internet can establish DirectAccess connections to Server1.

Which additional name suffix entry should you add from the Remote Access Setup wizard?

A. A Name Suffix value of Server1.contoso.com and a blank DNS Server Address value

B. A Name Suffix value of dal.contoso.com and a blank DNS Server Address value

C. A Name Suffix value of Server1.contoso.com and a DNS Server Address value of 65.55.37.62

D. A Name Suffix value of dal.contoso.com and a DNS Server Address value of 65.55.37.62

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation/Reference:For split-brain DNS deployments, you must list the FQDNs that are duplicated on the Internet and intranet anddecide which resources the DirectAccess client should reach, the intranet version or the public (Internet)version. For each name that corresponds to a resource for which you want DirectAccess clients to reach thepublic version, you must add the corresponding FQDN as an exemption rule to the NRPT for your DirectAccessclients. Name suffixes that do not have corresponding DNS servers are treated as exemptions. http://technet.microsoft.com/en-us/library/ee382323(v=ws.10).aspx

QUESTION 25Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1 that has the Remote Access server role installed.

DirectAccess is implemented on Server1 by using the default configuration.

You discover that DirectAccess clients do not use DirectAccess when accessing websites on the Internet.

You need to ensure that DirectAccess clients access all Internet websites by using their DirectAccess

Page 21: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

connection.

What should you do?

A. Configure a DNS suffix search list on the DirectAccess clients.

B. Enable the Route all traffic through the internal network policy setting in the DirectAccess Server SettingsGroup Policy object (GPO).

C. Configure DirectAccess to enable force tunneling.

D. Disable the DirectAccess Passive Mode policy setting in the DirectAccess Client Settings Group Policyobject (GPO).

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 26Your network contains an Active Directory domain named contoso.com. The domain contains a Web servernamed www.contoso.com. The Web server is available on the Internet.

You implement DirectAccess by using the default configuration.

You need to ensure that users never attempt to connect to www.contoso.com by using DirectAccess. Thesolution must not prevent the users from using DirectAccess to access other resources in contoso.com.

Which settings should you configure in a Group Policy object (GPO)?

A. DirectAccess Client Experience Settings

B. Name Resolution Policy

C. DNS Client

D. Network Connections

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation/Reference:For DirectAccess, the NRPT must be configured with the namespaces of your intranet with a leading dot (forexample, .internal.contoso.com or .corp.contoso.com). For a DirectAccess client, any name request thatmatches one of these namespaces will be sent to the specified intranet Domain Name System (DNS) servers.

Include all intranet DNS namespaces that you want DirectAccess client computers to access. There are nocommand line methods for configuring NRPT rules. You must use Group Policy settings. To configure theNRPT through Group Policy, use the Group Policy add-in at Computer Configuration \Policies\WindowsSettings\Name Resolution Policy in the Group Policy object for DirectAccess clients. You can create a newNRPT rule and edit or delete existing rules. For more information, see Configure the NRPT with Group Policy.

QUESTION 27Your network contains an Active Directory domain named contoso.com. The domain contains a member servernamed Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server 2012 R2 and hosts aprocessor-intensive application named App1.

Users report that App1 responds more slowly than expected. You need to monitor the processor usage on VM1

Page 22: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

to identify whether changes must be made to the hardware settings of VM1.

Which performance object should you monitor on Server1?

A. Hyper-V Hypervisor Logical Processor

B. Hyper-V Hypervisor Root Virtual Processor

C. Processor

D. Hyper-V Hypervisor Virtual Processor

E. Process

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation/Reference:A. Traditionally, processor performance can be measured using the "\Processor(*)\% Processor Time"performance monitor counter. This is not an accurate counter for evaluating processor utilization of a guestoperating system though because Hyper-V B. Shows the percentage of time used by the virtual processor inguest code. This is used to determine the processor utilization of the virtualization stack on the host server. C.Identifies how much of the physical processor is being used to run the virtual machines. This counter does notidentify the individual virtual machines or the amount consumed by each virtual machine.D. This counter is a natural choice that will give use the amount of time that this particular process spendsusing the processor resource.E. Identifies how much of the virtual processor is being consumed by a virtual machine. http://msdn.microsoft.com/en-us/library/cc768535(v=bts.10).aspx http://technet.microsoft.com/en-us/library/cc742454.aspx http://technet.microsoft.com/en-us/library/ff367892(v=exchg.141).aspx

QUESTION 28Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2.On Server1, you create a Data Collector Set (DCS) named Data1.

You need to export Data1 to Server2.

What should you do first?

A. Right-click Data1 and click Save template...

B. Right-click Data1 and click Export list...

C. Right-click Data1 and click Data Manager...

D. Right-click Data1 and click Properties.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 29You have a server named Server1 that runs Windows Server 2012 R2.

You discover that the performance of Server1 is poor.

The results of a performance report generated on Server1 are shown in the following table.

Page 23: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to identify the cause of the performance issue.

What should you identify?

A. Insufficient processors

B. Excessive paging

C. Driver malfunction

D. Insufficient RAM

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation/Reference:

Non-uniform memory access (NUMA) is a computer memory design used in multiprocessing, where thememory access time depends on the memory location relative to the processor. Under NUMA, aprocessor can access its own local memory faster than non-local memory (memory local to anotherprocessor or memory shared between processors). The benefits of NUMA are limited to particularworkloads, notably on servers where the data are often associated strongly with certain tasks or users.[1]

*NUMA architectures logically follow in scaling from symmetric multiprocessing (SMP) architectures.*System designers use non-uniform memory access (NUMA) to increase processor speed without increasing the load on the processor bus.

Processor: %DPC Time. Much like the other values, this counter shows the amount of time that the processorspends servicing DPC requests.DPC requests are more often than not associated with the network interface. Processor: % Interrupt Time. Thisis the percentage of time that the processor is spending on handling Interrupts. Generally, if this value exceeds50% of the processor time you may have a hardware issue. Some components on the computer can force thisissue and not really be a problem. For example a programmable I/O card like an old disk controller card, cantake up to 40% of the CPU time. A NIC on a busy IIS server can likewise generate a large percentage of

Page 24: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

processor activity.Processor: % User Time. The value of this counter helps to determine the kind of processing that is affectingthe system. Of course the resulting value is the total amount of non-idle time that was spent on User modeoperations. This generally means application code. Processor: %Privilege Time. This is the amount of time theprocessor was busy with Kernel mode operations. If the processor is very busy and this mode is high, it isusually an indication of some type of NT service having difficulty, although user mode programs can make callsto the Kernel mode NT components to occasionally cause this type of performance issue. Memory: Pages/sacThis value is often confused with Page Faults/sec. The Pages/sec counter is a combination of Pages Input/secand Pages Output/sec counters. Recall that Page Faults/sec is a combination of hard page faults and soft pagefaults. This counter, however, is a general indicator of how often the system is using the hard drive to store orretrieve memory associated data.http://technet.microsoft.com/en-us/library/cc768048.aspx

QUESTION 30Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. Cluster1 hosts 10 virtual machines. All ofthe virtual machines run Windows Server 2012 R2 and are members of the domain.

You need to ensure that the first time a service named Service1 fails on a virtual machine, the virtual machineis moved to a different node.

You configure Service1 to be monitored from Failover Cluster Manager.

What should you configure on the virtual machine?

A. From the General settings, modify the Startup type.

B. From the Recovery settings of Service1, set the First failure recovery action to Take No Action.

C. From the Recovery settings of Service1, set the First failure recovery action to Restart the Service.

D. From the General settings, modify the Service status.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation/Reference:C. Configure the virtual machine to take no action through Hyper-V if the physical computer shuts down bymodifying the Automatic Stop Action setting to None. Virtual machine state must be managed through theFailover Clustering feature.http://technet.microsoft.com/en-us/library/cc742396.aspx http://windowsitpro.com/windows-server-2012/enable-windows-server-2012-failover-cluster- hyper-v-vmmonitoring

QUESTION 31You have a server named Server1 that runs Windows Server 2012 R2.

You need to configure Server1 to create an entry in an event log when the processor usage exceeds 60percent.

Which type of data collector should you create?

A. A performance counter data collector

B. An event trace data collector

C. A performance counter alert

D. A configuration data collector

Correct Answer: C

Page 25: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Section: (none)Explanation

Explanation/Reference:

QUESTION 32Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012R2.

You need to create a custom Active Directory application partition.

Which tool should you use?

A. Eseutil

B. Dsadd

C. Dsmod

D. Ntdsutil

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation/Reference:* To create or delete an application directory partition1. Open Command Prompt.2. Type:

ntdsutil3. At the ntdsutil command prompt, type:

domain management4. At the domain management command prompt, type:

connection5. At the server connections command prompt, type:

connect to server ServerName6. At the server connections command prompt, type:

quit7. At the domain management command prompt, do one of the following:To create an application directory partition, type:o

create ncApplicationDirectoryPartitionDomainControllerTo delete an application directory partition, type:o

delete ncApplicationDirectoryPartition

* partition managementManages directory partitions for Active Directory Domain Services (AD DS) or Active Directory LightweightDirectory Services (AD LDS).This is a subcommand of Ntdsutil and Dsmgmt. Ntdsutil and Dsmgmt are command-line tools that are built intoWindows Server 2008 and Windows Server 2008 R2./ partition management create nc %s1 %s2Creates the application directory partition with distinguished name %s1, on the Active Directory domain

Page 26: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

controller or AD LDS instance with full DNS name %s2. If you specify "NULL" for %s2, this command uses thecurrently connected Active Directory domain controller. Use this command only with AD DS. For AD LDS, usecreatenc %s1 %s2 %s3.

Note:* An application directory partition is a directory partition that is replicated only to specific domain controllers. Adomain controller that participates in the replication of a particular application directory partition hosts a replicaof that partition.

QUESTION 33Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC1.

You run ntdsutil as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can access the contents of the mounted snapshot.

What should you do?

A. From a command prompt, run dsamain.exe -dbpath c:\$snap_201204131056_volumec$\windows\ntds\ntds.dit -Idapport 33389.

B. From the snapshot context of ntdsutil, run mount {79f94f82-5926-4f44-8af0-2f56d827a57d>.

C. From the snapshot context of ntdsutil, run activate instance "NTDS".

D. From a command prompt, run dsamain.exe -dbpath c:\$snap_201204131056_volumec$\windows\ntds\ntds.dit -Idapport 389.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation/Reference:Explanation:A. Custom port needs to be defined when mounting to allow access from ADUC B. 389 is used as the standardldap portC. Run prior to mount and after the mount run dsamain Sets NTDS or a specific AD LDS instance as the activeinstance.D. mounts a specific snap shot as specified by guid, using the snapshot mounted you needs to run dsamain tostart an instance of ADhttp://technet.microsoft.com/en-us/library/cc753609(v=ws.10).aspx

QUESTION 34Your company deploys a new Active Directory forest named contoso.com. The first domain controller in theforest runs Windows Server 2012 R2. The forest contains a domain controller named DC10.

Page 27: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

On DC10, the disk that contains the SYSVOL folder fails.

You replace the failed disk. You stop the Distributed File System (DFS) Replication service.You restore the SYSVOL folder.

You need to perform a non-authoritative synchronization of SYSVOL on DC10.

Which tool should you use before you start the DFS Replication service on DC10?

A. Active Directory Sites and Services

B. Dfsmgmt.msc

C. Ldp

D. Frsutil

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 35Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC1 that runs Windows Server 2012 R2.

You create an Active Directory snapshot of DC1 each day.

You need to view the contents of an Active Directory snapshot from two days ago.

What should you do first?

A. Start the Volume Shadow Copy Service (VSS).

B. Run the dsamain.exe command.

C. Run the ntdsutil.exe command.

D. Stop the Active Directory Domain Services (AD DS) service.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation/Reference:Mounting an Active Directory snapshotBefore connecting to the snapshot we need to mount it. By looking at the results of the List All command in step#8 above, identify the snapshot that you wish to mount, and note the number next to it.

In order to mount an Active Directory snapshot follow these steps:Log on as a member of the Domain Admins group to one of your Windows Server 2008 Domain Controllers.Open a Command Prompt window by clicking on the CMD shortcut in the Start menu, or by typing CMD andpressing Enter in the Run or Quick Search parts of the Start menu. Note: You must run NTDSUTIL from anelevated command prompt. To open an elevated command prompt, click Start, right-click Command Prompt,and then click Run as administrator.In the CMD window, type the following command:

ntdsutilIn the CMD window, type the following command:snapshot

Page 28: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

To view all available snapshots, in the CMD window, type the following command:list all The result should look like this:snapshot: List All1: 2008/10/25:03:14 {ec53ad62-8312-426f-8ad4-d47768351c9a}2: C: {15c6f880-cc5c-483b-86cf-8dc2d3449348}In this example we only have one snapshot available, one from 2008/10/25 at 03:14AM (yes, I write articles atthis time...). We'll mount this one.In the CMD window, type the following command:mount 2The result should look like this:snapshot: mount 2Snapshot {15c6f880-cc5c-483b-86cf-8dc2d3449348} mounted asC:'$SNAP_200810250314_VOLUMEC$'Next, you can leave the NTDSUTIL running, or you can quit by typing quit 2 times. Note: Like the abovecommand, the mounting process can also be run in one line. However, note thatNTDSUTIL requires that the "list all" command be run in the same session that you mount the snapshot. So inorder to mount the snapshot with a one-liner, you will need to run "list all" first.ntdsutil snapshot "list all" "mount 2" quit quitNote: You do not need to quit from the NTDSUTIL command, you can keep it open assuming that you'llprobably want to unmount the snapshot right after working with it.

QUESTION 36Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed.

An administrator installs the IP Address Management (IPAM) Server feature on a server named Server2. Theadministrator configures IPAM by using Group Policy based provisioning and starts server discovery.

You plan to create Group Policies for IPAM provisioning. You need to identify which Group Policy object (GPO)name prefix must be used for IPAM Group Policies.

What should you do on Server2?

A. From Server Manager, review the IPAM overview.

B. Run the Get-IpamConfigurationcmdlet.

C. From Task Scheduler, review the IPAM tasks.

D. Run the ipamgc.exe tool.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 37Your network contains an Active Directory forest named adatum.com. All servers run Windows Server 2012 R2.The domain contains four servers.

The servers are configured as shown in the following table.

Page 29: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to deploy IP Address Management (IPAM) to manage DNS and DHCP.

On which server should you install IPAM?

A. Server1

B. Server2

C. Server3

D. Server4

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 38You have a server named Server1.

You install the IP Address Management (IPAM) Server feature on Server1.

You need to provide a user named User1 with the ability to set the access scope of all the DHCP servers thatare managed by IPAM. The solution must use the principle of least privilege.

Which user role should you assign to User1?

A. IP Address Record Administrator Role

B. IPAM Administrator Role

C. IPAM MSM Administrator Role

D. IPAM DHCP Scope Administrator Role

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 39Your network contains an Active Directory domain named contoso.com. The domain contains two serversnamed Server1 and Server2. Both servers have the IP Address Management (IPAM) Server feature installed.

Page 30: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You have a support technician named Tech1. Tech1 is a member of the IPAM Administrators group on Server1and Server2.

You need to ensure that Tech1 can use Server Manager on Server1 to manage IPAM on Server2.To which group on Server2 should you add Tech1?

A. WinRMRemoteWMIUsers_

B. IPAM MSM Administrators

C. Remote Management Users

D. IPAM Administrators

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:A. IPAM MSM Administrators can't access remotelyB. IPAM Administrators can't access remotelyC. If you are accessing the IPAM server remotely using Server Manager IPAM client RSAT, then you must be amember of the WinRMRemoteWMIUsers group on the IPAM server, in addition to being a member of theappropriate IPAM security group (or local Administrators group).http://msdn.microsoft.com/en-us/library/windows/desktop/aa384295(v=vs.85).aspx http://www.microsoft.com/en-us/download/details.aspx? id=29012

QUESTION 40Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Bothservers have the Hyper-V server role installed.Server1 and Server2 are located in different offices. The officesconnect to each other by using a high-latency WAN link.

Server2 hosts a virtual machine named VM1.

You need to ensure that you can start VM1 on Server1 if Server2 fails. The solution must minimize hardwarecosts.

What should you do?

A. From the Hyper-V Settings of Server2, modify the Replication Configuration settings. Enable replication forVM1.

B. On Server1, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1.

C. On Server2, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1.

D. From the Hyper-V Settings of Server1, modify the Replication Configuration settings. Enable replication forVM1.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation/Reference:You first have to enable replication on the Replica server--Server1--by going to the server and modifying the"Replication Configuration" settings under Hyper-V settings. You then go to VM1--which presides on Server2--and run the "Enable Replication" wizard on VM1.

Page 31: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)
Page 32: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 41You have 20 servers that run Windows Server 2012 R2.

You need to create a Windows PowerShell script that registers each server in Windows Azure Backup and setsan encryption passphrase.

Which two PowerShell cmdlets should you run in the script? (Each correct answer presents part of the solution.Choose two.)

A. Set-OBMachineSetting

B. Add-OBFileSpec

C. Start-OBRegistration

D. New OBPolicy

E. New-OBRetentionPolicy

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation/Reference:

Page 33: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Registers the current computer with Windows Azure Online Backup using the credentials (username andpassword) created during enrollment.E: The Set-OBMachineSettingcmdlet sets aOBMachineSetting object for the server that includes proxy serversettings for accessing the internet, network bandwidth throttling settings, and the encryption passphrase that isrequired to decrypt the files during recovery to another server.

Incorrect:Not C: TheAdd-OBFileSpeccmdlet adds theOBFileSpecobject, which specifies the items to include or excludefrom a backup, to the backup policy (OBPolicyobject). TheOBFileSpecobject can include or exclude multiplefiles, folders, or volumes. T

http://technet.microsoft.com/en-us/library/hh770416(v=wps.620).aspx

http://technet.microsoft.com/en-us/library/hh770425(v=wps.620).aspx

http://technet.microsoft.com/en-us/library/hh770424.aspx

http://technet.microsoft.com/en-us/library/hh770398.aspx

http://technet.microsoft.com/en-us/library/hh770409.aspx

QUESTION 42You have a server named Server1 that runs Windows Server 2012 R2.

Server1 is backed up by using Windows Server Backup. The backup configuration is shown in the exhibit.(Click the Exhibit button.)

Page 34: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You discover that only the last copy of the backup is maintained.

You need to ensure that multiple backup copies are maintained.

What should you do?

A. Configure the Optimize Backup Performance settings.

B. Modify the Volume Shadow Copy Service (VSS) settings.

C. Modify the backup times.

D. Modify the backup destination.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:A, The destination in the exhibit shows a network share is useD. If a network share is being used only the latestcopy will be saved

Page 35: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

http://windows.microsoft.com/en-us/windows7/where-should-i-save-my-backup

QUESTION 43You have five servers that run Windows Server 2012 R2. The servers have the Failover Clustering featureinstalled.

You deploy a new cluster named Cluster1. Cluster1 is configured as shown in the following table.

Server1, Server2/ and Server3 are configured as the preferred owners of the cluster roles.Dynamic quorum management is disabled.

You plan to perform hardware maintenance on Server3.

You need to ensure that if the WAN link between Site1 and Site2 fails while you are performing maintenance onServer3, the cluster resource will remain available in Site1.What should you do?

Page 36: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

A. Remove the node vote for Server3.

B. Enable DrainOnShutdown on Cluster1.

C. Add a file share witness in Site1.

D. Remove the node vote for Server4 and Server5.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 44You have 30 servers that run Windows Server 2012 R2.

All of the servers are backed up daily by using Windows Azure Backup.

You need to perform an immediate backup of all the servers to Windows Azure Backup.

Which Windows PowerShell cmdlets should you run on each server?

A. Get-OBPolicy | Start-OBBackup

B. Get-WBPolicy | Start-WBBackup

C. Start-OBRegistration | Start-OBBackup

D. Get-WBBackupTarget | Start-WBBackup

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation/Explanation:A. starts a backup job using a policyB. Registers the current computer to Windows Azure Backup.C. Not using AzureD. Not using Azure

http://technet.microsoft.com/en-us/library/hh770406(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh770426.aspx http://technet.microsoft.com/en-us/library/hh770398.aspx

QUESTION 45You have a server named Server1 that runs Windows Server 2012 R2.

You install the File and Storage Services server role on Server1.

From Windows Explorer, you view the properties of a folder named Folder1 and you discover that theClassification tab is missing.

You need to ensure that you can assign classifications to Folder1 from Windows Explorer manually.

What should you do?

A. Install the File Server Resource Manager role service.

B. From Folder Options, clear Hide protected operating system files (Recommended).

C. Install the Share and Storage Management Tools.

Page 37: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

D. From Folder Options, select the Always show menus.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:B. Classification Management is a feature of FSRMhttp://technet.microsoft.com/en-us/library/dd759252.aspx http://technet.microsoft.com/en-us/library/dd758759(v=WS.10).aspx

QUESTION 46Your network contains an Active Directory domain named adatum.com. All domain controllers run WindowsServer 2008 R2.

The domain contains a file server named Server6 that runs Windows Server 2012 R2. Server6 contains afolder named Folder1. Folder1 is shared as Share1. The NTFS permissions on Folder1 are shown in theexhibit. (Click the Exhibit button.)

The domain contains two global groups named Group1 and Group2.

You need to ensure that only users who are members of both Group1 and Group2 are denied access toFolder1.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. Deny Group2 permission to Folder1.

Page 38: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

B. Remove the Deny permission for Group1 from Folder1.

C. Deny Group1 permission to Share1.

D. Deny Group2 permission to Share1.

E. Install a domain controller that runs Windows Server 2012 R2

F. Create a conditional expression.

Correct Answer: EFSection: (none)Explanation

Explanation/Reference:Explanation/Reference:* Conditional Expressions for Permission EntriesWindows Server 2008 R2 and Windows 7 enhanced Windows security descriptors by introducing a conditionalaccess permission entry. Windows Server 2012 takes advantage of conditional access permission entries byinserting user claims, device claims, and resource properties, into conditional expressions. Windows Server2012 security evaluates these expressions and allows or denies access based on results of the evaluation.Securing access to resources through claims is known as claims-based access control. Claims-based accesscontrol works with traditional access control to provide an additional layer of authorization that is flexible to thevarying needs of the enterprise environment. http://social.technet.microsoft.com/wiki/contents/articles/14269.introducing-dynamic-access- control-en-us.aspx

QUESTION 47Your network contains an Active Directory domain named contoso.com. The domain contains a file servernamed Server1 and a domain controller named DC1. All servers run Windows Server 2012 R2.

A Group Policy object (GPO) named GPO1 is linked to the domain.

Server1 contains a folder named Folder1. Folder1 is shared as Share1.

You need to ensure that authenticated users can request assistance when they are denied access to theresources on Server1.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. Enable the Enable access-denied assistance on client for all file types policy setting for GPO1.

B. Configure the Customize message for Access Denied errors policy setting of GPO1.

C. Install the File Server Resource Manager role service on DC1.

D. Install the File Server Resource Manager role service on Server1.

E. Assign the Read Attributes NTFS permission on Folder1 to the Authenticated Users group.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 48Your network contains an Active Directory domain named contoso.com. The domain contains a file servernamed Server1. The File Server Resource Manager role service is installed on Server1. All servers runWindows Server 2012 R2.

A Group Policy object (GPO) named GPO1 is linked to the organizational unit (OU) that contains Server1. Thefollowing graphic shows the configured settings in GPO1.

Page 39: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Server1 contains a folder named Folder1. Folder1 is shared as Share1.

You attempt to configure access-denied assistance on Server1, but the Enable access-denied assistanceoption cannot be selected from File Server Resource Manager.

You need to ensure that you can configure access-denied assistance on Server1 manually by using File ServerResource Manager.

What should you do?

A. Set the Customize message for Access Denied errors policy setting to Enabled for GPO1.

B. Set the Enable access-denied assistance on client for all file types policy setting to Disabled for GPO1.

C. Set the Enable access-denied assistance on client for all file types policy setting to Enabled for GPO1.

D. Set the Customize message for Access Denied errors policy setting to Not Configured for GPO1.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:D. ensure that you can configure access-denied assistance http://technet.microsoft.com/en-us/library/hh831402.aspx#BKMK_1

QUESTION 49Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012R2.

You are creating a central access rule named Test Finance that will be used to audit members of theAuthenticated users group for access failure to shared folders in the finance department.

You need to ensure that access requests are unaffected when the rule is published. What should you do?

A. Set the Permissions to Use the following permissions as proposed permissions.

B. Add a Resource condition to the current permissions entry for the Authenticated Users principal.

C. Set the Permissions to Use following permissions as current permissions.

D. Add a User condition to the current permissions entry for the Authenticated Users principal.

Correct Answer: ASection: (none)Explanation

Page 40: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Explanation/Reference:Explanation/Reference:

http://technet.microsoft.com/en-us/library/jj134043.aspx

QUESTION 50You deploy an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses ActiveDirectory as the attribute store.

Some users report that they fail to authenticate to the AD FS infrastructure.

You discover that only users who run third-party web browsers experience issues.

You need to ensure that all of the users can authenticate to the AD FS infrastructure successfully.

Which Windows PowerShell command should you run?

A. Set-ADFSProperties -SSOLifetime 1:00:00

B. Set-ADFSProperties -AddProxyAuthenticationRules None

C. Set-ADFSProperties -ExtendedProtectionTokenCheck None

D. Set-ADFSProperties -ProxyTrustTokenLifetime 1:00:00

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation/Reference:A. Sets the valid token lifetime for proxy trust tokens (in minutes). This value is used by the federation serverproxy to authenticate with its associated federation server. B. Specifies a policy rule set that can be used toestablish authorization permissions for setting up trust proxies. The default value allows the AD FS 2.0 serviceuser account or any member of BUILTIN\Administrators to register a federation server proxy with theFederation Service. C. Specifies the duration of the single sign-on (SSO) experience for Web browser clients(in minutes).D. pacifies the level of extended protection for authentication supported by the federation server. ExtendedProtection for Authentication helps protect against man-in-the-middle (MITM) attacks, in which an attackerintercepts a client's credentials and forwards them to a server. http://technet.microsoft.com/zh-cn/library/ee892317.aspx

QUESTION 51Your network contains a perimeter network and an internal network. The internal network contains an ActiveDirectory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the

Page 41: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

attribute store.

You plan to deploy a federation server proxy to a server named Server2 in the perimeter network.

You need to identify which value must be included in the certificate that is deployed to Server2.

What should you identify?

A. The name of the Federation Service

B. The name of the Active Directory domain

C. The FQDN of the AD FS server

D. The public IP address of Server2

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:A. It must contain the FQDNhttp://technet.microsoft.com/en-us/library/cc776786(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc782620(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc759635(v=ws.10).aspx

QUESTION 52Your network contains an Active Directory domain named contoso.com. The domain contains servers namedServer1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory Federation Servicesserver role installed.Server2 is a file server.

Your company introduces a Bring Your Own Device (BYOD) policy.

You need to ensure that users can use a personal device to access domain resources by using Single Sign-On(SSO) while they are connected to the internal network.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. Enable the Device Registration Service in Active Directory.

B. Publish the Device Registration Service by using a Web Application Proxy.

C. Configure Active Directory Federation Services (AD FS) for the Device Registration Service.

D. Install the Work Folders role service on Server2.

E. Create and configure a sync share on Server2.

Page 42: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:

QUESTION 53Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named Server3and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in a failover cluster namedCluster2.

You need to move all of the applications and the services from Cluster1 to Cluster2.

What should you do first from Failover Cluster Manager?

A. On a server in Cluster2, click Migrate Roles.

B. On a server in Cluster2, click Move Core Cluster Resources, and then click Select Node...

C. On a server in Cluster1, configure Cluster-Aware Updating.

D. On a server in Cluster2, click Move Core Cluster Resources, and then click Best Possible Node.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:In a Windows Server 2012 cluster, In FCM, right-click the Clustername, click on More Actions, Move CoreCluster Resources and select either Best Possible Node or select the node of your choice.

QUESTION 54Your network contains two servers named HV1 and HV2. Both servers run Windows Server 2012 R2 and havethe Hyper-V server role installed.

HV1 hosts 25 virtual machines. The virtual machine configuration files and the virtual hard disks are stored in

Page 43: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

D:\VM.

You shut down all of the virtual machines on HV1.

You copy D:\VM to D:\VM on HV2.

You need to start all of the virtual machines on HV2. You want to achieve this goal by using the minimumamount of administrative effort.

What should you do?

A. From HV1, export all virtual machines to D:\VM. Copy D:\VM to D:\VM on HV2 and overwrite the existingfiles. On HV2, run the New Virtual Machine wizard.

B. From HV1, export all virtual machines to D:\VM. Copy D:\VM to D:\VM on HV2 and overwrite the existingfiles. On HV2, run the Import Virtual Machine wizard.

C. Run the Import-VM InitialReplicationcmdlet.

D. Run the Import-VM cmdlet.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 55Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1 that runs Windows Server 2012. Server1 has the Remote Access server role installed.

You log on to Server1 by using a user account named User2.

From the Remote Access Management Console, you run the Getting Started Wizard and you receive a warningmessage as shown in the exhibit. (Click the Exhibit button.)

Page 44: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to ensure that you can configure DirectAccess successfully. The solution must minimize the numberof permissions assigned to User2.

To which group should you add User2?

A. Account Operators

B. Enterprise Admins

C. Domain Admins

D. Server Operators

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 56Your network contains a Hyper-V host named Hyperv1. Hyperv1 runs Windows Server 2012 R2.

Hyperv1 hosts four virtual machines named VM1, VM2, VM3, and VM4. All of the virtual machines runWindows Server 2008 R2.

Page 45: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to view the amount of memory resources and processor resources that VM4 currently uses.

Which tool should you use on Hyperv1?

A. Task Manager

B. Windows System Resource Manager (WSRM)

C. Hyper-V Manager

D. Resource Monitor

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 57You have a server named Server1 that runs Windows Server 2012 R2.

You create a custom Data Collector Set (DCS) named DCS1.

You need to configure Server1 to start DCS1 automatically when the network usage exceeds 70 percent.

Which type of data collector should you create?

A. A performance counter alert

B. A performance counter data collector

C. An event trace data collector

D. A configuration data collector

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 58Your network contains an Active Directory domain named adatum.com. The domain contains a member servernamed Server1 and 10 web servers. All of the web servers are in an organizational unit (OU) namedWebServers_OU. All of the servers run Windows Server 2012 R2.

On Server1, you need to collect the error events from all of the web servers. The solution must ensure thatwhen new web servers are added to WebServers_OU, their error events are collected automatically onServer1.

What should you do?

A. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure theConfigure target Subscription Manager setting.

B. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure theConfigure forwarder resource usage setting.

C. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configurethe Configure forwarder resource usage setting.

D. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure

Page 46: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

the Configure target Subscription Manager setting.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 59You have a server named Server1 that runs Windows Server 2012 R2.You create a Data Collector Set (DCS) named DCS1.You need to configure DCS1 to log data to D:\logs.

What should you do?

A. Right-click DCS1 and click Properties.

B. Right-click DCS1 and click Save template...

C. Right-click DCS1 and click Export list...

D. Right-click DCS1 and click Data Manager...

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 60Your network contains an Active Directory domain named contoso.com.

Network Policy Server (NPS) is deployed to the domain.

You plan to deploy Network Access Protection (NAP).

You need to configure the requirements that are validated on the NPS client computers.

What should you do?

A. From the Network Policy Server console, configure a health policy.

B. From the Network Policy Server console, configure a network policy.

C. From a Group Policy object (GPO), configure the NAP Client Configuration security setting.

D. From a Group Policy object (GPO), configure the Network Access Protection Administrative Templatessetting.

E. From the Network Policy Server console, configure a Windows Security Health Validator (WSHV) policy.

Correct Answer: ESection: (none)Explanation

Explanation/Reference:

QUESTION 61Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012R2. The domain contains two servers. The servers are configured as shown in the following table.

Page 47: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

All client computers run Windows 8 Enterprise.

You plan to deploy Network Access Protection (NAP) by using IPSec enforcement.

A Group Policy object (GPO) named GPO1 is configured to deploy a trusted server group to all of the clientcomputers.

You need to ensure that the client computers can discover HRA servers automatically.

Which three actions should you perform? (Each correct answer presents part of the solution.Choose three.)

A. On all of the client computers, configure the EnableDiscovery registry key.

B. In a GPO, modify the Request Policy setting for the NAP Client Configuration.

C. On Server2/ configure the EnableDiscovery registry key.

D. On DC1, create a service location (SRV) record.

E. On DC1, create an alias (CNAME) record.

Correct Answer: ABDSection: (none)Explanation

Explanation/Reference:

QUESTION 62Your network contains an Active Directory domain named adatum.com. The domain contains a server namedServer1 that runs WindowsServer 2012 R2. Server1 is configured as a Network Policy Server (NPS) server andas a DHCP server.

You need to ensure that only computers that send a statement of health are checked for Network AccessProtection (NAP) health requirements.

Which two settings should you configure? (Each correct answer presents part of the solution.Choose two.)

A. The NAS Port Type constraints

B. The MS-Service Class conditions

C. The Health Policies conditions

D. The NAP-Capable Computers conditions

E. The Called Station ID constraints

Page 48: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 63Your network contains an Active Directory domain named contoso.com. All domain controllers run WindowsServer 2012 R2.

An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A GroupPolicy object (GPO) named GPO1 is linked to OU1.

You make a change to GPO1.

You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solutionmust minimize administrative effort.

Which tool should you use?

A. The Set-AdComputercmdlet

B. Group Policy Management Console (GPMC)

C. Server Manager

D. TheGpupdate command

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 64Your network contains an Active Directory domain named contoso.com. All domain controllers run WindowsServer 2012 R2.

On all of the domain controllers, Windows is installed in C:\Windows and the Active Directory database islocated in D:\Windows\NTDS\.

All of the domain controllers have a third-party application installed.

The operating system fails to recognize that the application is compatible with domain controller cloning.

You verify with the application vendor that the application supports domain controller cloning.

You need to prepare a domain controller for cloning.

What should you do?

A. In C:\Windows\, create an XML file named DCCIoneConfig.xml and add the application information to thefile.

B. In the root of a USB flash drive, add the application information to an XML file namedDefaultDCCIoneAllowList.xml.

C. In D:\Windows\NTDS\, create an XML file named DCCIoneConfig.xml and add the application informationto the file.

Page 49: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

D. In D:\Windows\NTDS\, create an XML file named CustomDCCIoneAllowList.xml and add the applicationinformation to the file.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation/Reference:http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active- directory-domainservices-in-windows-server-2012-part-13-domain-controller-cloning.aspx Place theCustomDCCloneAllowList.xml file in the same folder as the Active Directory database (ntds.dit) on the sourceDomain Controller.

QUESTION 65Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC1 that runs Windows Server 2012 R2. DC1 is backed up daily. The domain has the ActiveDirectory Recycle Bin enabled. During routine maintenance, you delete 500 inactive user accounts and 100inactive groups. One of the deleted groups is named Group1. Some of the deleted user accounts are membersof some of the deleted groups.

For documentation purposes, you must provide a list of the members of Group1 before the group was deleted.

You need to identify the names of the users who were members of Group1 prior to its deletion. You want toachieve this goal by using the minimum amount of administrative effort.

What should you do first?

A. Reactivate the tombstone of Group1.

B. Use the Recycle Bin to restore Group1.

C. Perform an authoritative restore of Group1.

D. Mount the most recent Active Directory backup.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 66Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC1 that runs Windows Server 2012 R2.

You mount an Active Directory snapshot on DC1.

You need to expose the snapshot as an LDAP server.

Which tool should you use?

A. Dsamain

B. Ntdsutil

C. Ldp

D. ADSI Edit

Correct Answer: ASection: (none)

Page 50: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Explanation

Explanation/Reference:

QUESTION 67Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC1 and a member server named Server1. Server1 has the IP Address Management (IPAM)Server feature installed.

On DC1, you configure Windows Firewall to allow all of the necessary inbound ports for IPAM.

On Server1, you open Server Manager as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can use IPAM on Server1 to manage DNS on DC1.

What should you do?

A. Add Server1 to the Remote Management Users group.

B. Modify the outbound firewall rules on Server1.

C. Add Server1 to the Event Log Readers group.

D. Modify the inbound firewall rules on Server1.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation/Reference:

Page 51: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

http://technet.microsoft.com/en-us/library/jj878313.aspx

QUESTION 68Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012R2. The domain contains four servers. The servers are configured as shown in the following table.

You need to deploy IP Address Management (IPAM) to manage DNS and DHCP.

On which server should you install IPAM?

A. DC1

B. DC2

C. DC3

D. Server1

Correct Answer: DSection: (none)Explanation

Explanation/Reference:D. IPAM cannot be installed on Domain Controllers. All other servers have the DC role http://technet.microsoft.com/en-us/library/hh831353.aspx

Page 52: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 69Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2.

You install the DHCP Server server role on Server1 and Server2. You install the IP Address Management(IPAM) Server feature on Server1.

You notice that you cannot discover Server1 or Server2 in IPAM.

You need to ensure that you can use IPAM to discover the DHCP infrastructure.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. On Server2, run the Add-DhcpServer1nDc cmdlet

B. On Server1, uninstall the DHCP Server server role.

C. On Server1, run the Add-IpamServer1nventory cmdlet.

D. On both Server1 and Server2, run the Add-DhcpServerv4Policy cmdlet.

E. On Server2, create an IPv4 scope.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:

QUESTION 70Your network contains an Active Directory domain named contoso.com. The network contains a file servernamed Server1 that runs Windows Server 2012 R2.

You are configuring a central access policy for temporary employees.

You enable the Department resource property and assign the property a suggested value of Temp.

You need to configure a target resource condition for the central access rule that is scoped to resourcesassigned to Temp only.

Which condition should you use?

A. (Department.Value Equals "Temp")

B. (Resource.Department Equals "Temp")

C. (Temp.Resource Equals "Department")

D. (Resource.Temp Equals "Department")

Correct Answer: BSection: (none)Explanation

Page 53: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Explanation/Reference:

QUESTION 71You have a server named FS1 that runs Windows Server 2012 R2.

You install the File and Storage Services server role on FS1.

From Windows Explorer, you view the properties of a shared folder named Share1 and you discover that theClassification tab is missing.

You need to ensure that you can assign classifications to Share1 from Windows Explorer manually.

What should you do?

A. Install the Enhanced Storage feature.

B. From Folder Options, clear Use Sharing Wizard (Recommend).

C. Install the File Server Resource Manager role service.

D. From Folder Options, select Show hidden files, folders, and drives.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 72Your network contains an Active Directory domain named contoso.com. The domain contains two serversnamed Node1and Node2. Node1and Node2 run Windows Server 2012 R2. Node1and Node2 are configured asa two-node failover cluster named Cluster2.

The computer accounts for all of the servers reside in an organizational unit (OU) named Servers.

A user named User1 is a member of the local Administrators group on Node1and Node2.

User1 creates a new clustered File Server role named File1 by using the File Server for general use option. Areport is generated during the creation of File1 as shown in the exhibit. (Click the Exhibit button.)

Page 54: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

File1 fails to start.

You need to ensure that you can start File1.

What should you do?

A. Increase the value of the ms-DS-MachineAccountQuota attribute of the domain.

B. Assign the user account permissions of User1 to the Servers OU.

C. Assign the computer account permissions of Cluster2 to the Servers OU.

D. Recreate the clustered File Server role by using the File Server for scale-out application data option.

E. Log on to the domain by using the built-in Administrator for the domain, and then recreate the clustered FileServer role by using the File Server for general use option.

Correct Answer: ESection: (none)Explanation

Explanation/Reference:

Page 55: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 73Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in afailover cluster named Cluster1. Cluster1 contains a Clustered Shared Volume (CSV).

A developer creates an application named App1. App1 is NOT a cluster-aware application. App1 stores data inthe file system.

You need to ensure that App1 runs in Cluster1. The solution must minimize development effort.

Which cmdlet should you run?

A. Add-ClusterServerRole

B. Add-ClusterScaleOutFileServerRole

C. Add-ClusterGenericApplicationRole

D. Add-ClusterGenericServiceRole

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 74Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2 that run Windows Server 2012 R2. Both servers have the Hyper-V serverrole installed.

The network contains an enterprise certification authority (CA). All servers are enrolled automatically for acertificate-based on the Computer certificate template.

On Server1, you have a virtual machine named VM1. VM1 is replicated to Server2.

You need to encrypt the replication of VM1.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. On Server2, modify the Hyper-V Settings.

B. On Server1, modify the settings of VM1.

C. On Server2, modify the settings of VM1.

D. On Server1, modify the settings of the virtual switch to which VM1 is connected.

E. On Server1, modify the Hyper-V Settings.

F. On Server2, modify the settings of the virtual switch to which VM1 is connected.

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:A. Modify replication settings of VM1 after enabling Replica on Server2

F. Enable Server2 as Hyper-V replica server

Page 56: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

http://technet.microsoft.com/en-us/library/jj134240.aspx

Once you change the Hyper-V Settings of Server 2 to encrypt replications with a certificate, you then need tochange the replication information of VM1 to use the secure connection.

Page 57: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 75Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1and Server2 have the Hyper-V server role installed.Server1 and Server2 are configured as Hyper-V replicas ofeach other.

Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1.

You need to verify whether the replica of VMS on Server1 is functional. The solution must ensure that VM5remains accessible to clients.What should you do from Hyper-V Manager?

A. On Server1, execute a Planned Failover.

B. On Server1, execute a Test Failover.

C. On Server2, execute a Planned Failover.

D. On Server2,execute a Test Failover.

Page 58: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 76Your network contains two servers that run Windows Server 2012 R2 named Server1 and Server2. Bothservers have the File Server role service installed.

On Server2, you create a share named Backups.

From Windows Server Backup on Server1, you schedule a full backup to run every night. You set the backupdestination to \\Server2 \Backups.

After several weeks, you discover that \\Server2\Backups only contains the last backup that completed onServer1.

You need to ensure that multiple backups of Server1 are maintained.

What should you do?

A. Modify the properties of the Windows Store Service (WSService) service.

B. Change the backup destination.

C. Modify the Volume Shadow Copy Service (VSS) settings.

D. Configure the permission of the Backups share.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 77You have a server named Server1 that has a Server Core installation of Windows Server 2008 R2.

Server1 has the DHCP Server server role and the File Server server role installed.

You need to upgrade Server1 to Windows Server 2012 R2 with the graphical user interface (GUI).

The solution must meet the following requirements:· Preserve the server roles and their configurations.· Minimize administrative effort.

What should you do?

A. Start Server1 from the Windows Server 2012 R2 installation media and select Server Core Installation.When the installation is complete, add the Server Graphical Shell feature.

B. Start Server1 from the Windows Server 2012 R2 installation media and select Server with a GUI.

C. OnServer1, run setup.exe from the Windows Server 2012 R2 installation media and select Server CoreInstallation. When the installation is complete, add the Server Graphical Shell feature.

D. OnServer1, run setup.exe from the Windows Server 2012 R2 installation media and select Server with aGUI.

Correct Answer: C

Page 59: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Section: (none)Explanation

Explanation/Reference:Explanation:You should upgrade to 2012 and install GUI shell. Upgrades that switch from a Server Core installation to theServer with a GUI mode of Windows Server 2012 in one step (and vice versa) are not supported. However,after upgrade is complete, Windows Server 2012 allows you to switch freely between Server Core and Serverwith a GUI modes.

Incorrect answers:Server is on 2008 R2 core, must install 2012 core and then GUI This option should work, but it is not the leastadministrative effort. This option does not represent the least administrative effort even though it will have thesame end result.

References:http://technet.microsoft.com/en-us/library/jj574204.aspx .http://technet.microsoft.com/library/hh831786

QUESTION 78You have a server named Server1 that runs Windows Server 2012 R2. Server1 has six network adapters. Twoof the network adapters are connected to a network named LAN1, two of the network adapters are connectedto a network named LAN2, and two of the network adapters are connected to a network named LAN3.

You create a network adapter team named Team1 from the two adapters connected to LAN1.

You create a network adapter team named Team2 from the two adapters connected to LAN2.

A company policy states that all server IP addresses must be assigned by using a reserved address in DHCP.You need to identify how many DHCP reservations you must create for Server1.

How many reservations should you identify?

A. 3

B. 4

C. 6

D. 8

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation/Reference:2 Adapters = LAN1 = Team1 = 1 IP2 Adapters = LAN2 = Team2 = 1 IP2 Adapters = LAN3 = No Team = 2 IP1 + 1 + 2 = 4

References:Training Guide: Installing and Configuring Windows Server 2012: Chapter 6: Network Administration, Lesson 3:Managing Networking using Windows PowerShell, p. 253

QUESTION 79You have a server named Server1 that runs Windows Server 2012 R2.

You connect two new hard disks to Server1.

You need to create a storage space that contains the two disks.

Page 60: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

The solution must meet the following requirements:· Provide fault tolerance if a single disk fails.· Maximize the amount of files that can be stored in the storage space.

What should you create?

A. a parity space

B. a simple space

C. a spanned volume

D. a mirrored space

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:Fault tolerant and better space ratio. The data on volumes created on this type of virtual disk, together withparity information that can be used to facilitate automatic reconstruction of data in the event of a physical diskfailure, is striped across all physical disks in the pool. Parity virtual disks also provide resiliency to help protectyou from data loss arising from the failure 368 Chapter 8 File services and storage of a physical disk in thepool, but they perform better with large sequential disk writes than with random I/O.

Incorrect answers:A. A simple space stripes data across a set of pool disks, and is not resilient to any disk failures. B. A spannedvolume is a dynamic volume consisting of disk space on more than one physical disk and not fault tolerantC. Fault tolerant dependent on the amount of physical disks in the pool, but no max space for storagepurposes.

References:http://social.technet.microsoft.com/wiki/contents/articles/15198.storage-spaces-overview.aspx http://technet.microsoft.com/en-us/library/cc772180.aspx Training Guide: Installing and Configuring Windows Server2012: Chapter 8: File Services and Storage, p. 367-8

QUESTION 80Your network contains an Active Directory domain named adatum.com. The domain contains the serversshown in the following table.

You need to ensure that you can use Server Manager on DC1 to manage DC2.

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Install the Windows PowerShell 2.0 engine on DC1.

B. Install Microsoft .NET Framework 4 on DC2.

C. Install Windows Management Framework 3.0 on DC2.

D. Install Remote Server Administration Tools on DC1.

Page 61: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

E. Install Remote Server Administration Tools on DC2.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Explanation/Reference:In Windows Server 2012, you can use Server Manager to perform management tasks on remote servers.Remote management is enabled by default on servers that are running Windows Server 2012. To manage aserver remotely by using Server Manager, you add the server to the Server Manager server pool.You can use Server Manager to manage remote servers that are running Windows Server 2008 and WindowsServer 2008 R2, but the following updates are required to fully manage these older operating systems.Windows Management Framework 3.0 To use this release of Server Manager to access and manage remoteservers that are running Windows Server 2008 or Windows Server 2008 R2, you must first install .NETFramework 4.0, and then install Windows Management Framework 3.0 on those servers.Incorrect answers:B: To be able to access and manage remote servers that are configured with Windows Server 2008 or 2008 R2you need to install Microsoft.NET Framework4 as well as Windows Management Framework 3.0 to access andmanage remote server.C: With servers that run Windows Server 2008 and 2008 R2 you need to install Microsoft.NET Framework4 aswell as Windows Management Framework 3.0 to access and manage remote servers.Reference:Training Guide: Installing and Configuring Windows Server 2012, Chapter 2: Deploying servers, p. 80

QUESTION 81Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2 that run Windows Server 2012 R2.

You log on to Server1.

You need to retrieve a list of the active TCP connections on Server2.

Which command should you run from Server1?

A. netstat> server2

B. winrm get server2

C. winrs -r:server2netstat

D. dsquery * -scope base -attrip,server2

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation/Reference:This command line tool enables administrators to remotely execute most Cmd.exe commands using theWSManagement protocol.

Incorrect answers:A: The winrm.cmd commandline tool for system management is implemented in a Visual Basic ScriptingEdition file (Winrm.vbs) written using the WinRM scripting API. This tool enables an administrator to configureWinRM and to get data or manage resources.B: This command queries the directory by using search criteria that you specify. Each of the dsquerycommands finds objects of a specific object type, with the exception of dsquery*, which can query for any typeof object. It is available if you have the Active Directory Domain Services (AD DS) server role installed. To usedsquery, you must run the dsquery command from an elevated command prompt.D: Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing

Page 62: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6,TCP over IPv6, and UDP over IPv6 protocols). Used without parameters, netstat displays active TCPconnections. However, you must retrieve the list of active TCP connections on Server2 from Server1.

References:http://msdn.microsoft.com/en-us/library/aa384291(v=vs.85).aspx

QUESTION 82Your network contains an Active Directory domain named adatum.com. The domain contains a server namedServer1 that runs Windows Server 2012 R2.

On a server named Corel, you perform a Server Core Installation of Windows Server 2012 R2.You join Corel to the adatum.com domain.

You need to ensure that you can use Event Viewer on Server1 to view the event logs on Corel.

What should you do on Corel?

A. Run the Enable-NetFirewallRulecmdlet.

B. Run the Disable-NetFirewallRulecmdlet.

C. Install Remote Server Administration Tools (RSAT).

D. Install Windows Management Framework.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 83Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012.The domain contains a server named Server1.

You open Review Options in the Active Directory Domain Services Configuration Wizard, and then you clickView script.

You need to ensure that you can use the script to promote Server1 to a domain controller.

Which file extension should you use to save the script?

A. .bat

B. .ps1

C. .xml

D. .cmd

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:Creating a batch file would be best practice because the process involved to promote a server to a domaincontroller involves several commands that can be configured into a batch file in a script.

Incorrect answers:A: .pal file extensions will not be appropriate to save a script meant to promote a server to a domain controller.C: Group policy tool use xml based files by default. You need to create a script and save it as a batch file in this

Page 63: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

scenario.D: This is an inappropriate file extension to use under these circumstances.

References:Exam Ref 70-410: Installing and Configuring Windows Server 2012: Chapter 5: Install and Administer ActiveDirectory, Objective 5.1 Install Domain Controllers, p. 251-256 Exam Ref: 70-410: Installing and ConfiguringWindows Server 2012, Chapter 6: Create and manage Group Policy, Objective 6.3: Configure applicationrestriction policies, p.342 Training Guide: Installing and Configuring Windows Server 2012: Chapter 4:Deploying Domain Controllers, Lesson 2: Deploying domain controllers using Server Manager, p. 146

QUESTION 84In an isolated test environment, you deploy a server named Server1 that runs a Server Core Installation ofWindows Server 2012 R2. The test environment does not have Active Directory Domain Services (AD DS)installed.

You install the Active Directory Domain Services server role on Server1.

You need to configure Server1 as a domain controller.

Which cmdlet should you run?

A. Install-ADDSDomain

B. Install-ADDSForest

C. Install-ADDSDomainController

D. Install-WindowsFeature

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 85Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC5. DC5 has a Server Core Installation of Windows Server 2012 R2.

You need to uninstall Active Directory from DCS manually.Which tool should you use?

A. The Remove-ADComputercmdlet

B. The ntdsutil.exe command

C. The dsamain.exe command

D. The DCPromo \force Removal

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 86Your network contains an Active Directory domain named adatum.com. The domain contains three domaincontrollers. The domain controllers are configured as shown in the following table.

Page 64: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

DC3 loses network connectivity due to a hardware failure.

You plan to remove DC3 from the domain.

You log on to DC3.

You need to identify which service location (SRV) records are registered by DC3.

What should you do?

A. Open the %windir%\system32\dns\backup\adatum.com.dns file.

B. Open the %windir%\system32\config\netlogon.dns file.

C. Run ipconfig /displaydns.

D. Run dcdiag /test:dns.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation/Reference:A. Netlogon service creates a log file that contains all the locator resource records and places the log file in thefollowing location:Incorrect answers:B. Analyzes the state of domain controllers in a forest or enterprise and reports any problems to help introubleshooting.C. This is the dns backup file.D. This command is used to display current resolver cache content.

References:http://technet.microsoft.com/en-us/library/cc959303.aspx http://technet.microsoft.com/en-us/library/cc731968(v=ws.10).aspx

QUESTION 87Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1. Server1 runs Windows Server 2012 R2.

You need to create 3-TB virtual hard disk (VHD) on Server1.

Which tool should you use?

A. New-StorageSubsytemVirtualDisk

B. New-Virtual Disk ( Computer Management )

C. Server Manager

D. Computer Management

Correct Answer: DSection: (none)Explanation

Page 65: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Explanation/Reference:

QUESTION 88Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1and Server2 are part of a workgroup.

On Server1 and Server2, you create a local user account named Admin1. You add the account to the localAdministrators group. On both servers, Admin1 has the same password.

You log on to Server1 as Admin1. You open Computer Management and you connect to Server2.

When you attempt to create a scheduled task, view the event logs, and manage the shared folders, you receiveAccess Denied messages.You need to ensure that you can administer Server2 remotely from Server1 by using Computer Management.What should you configure on Server2?

A. From Local Users and Groups, modify the membership of the Remote Management Users group.

B. From Server Manager, modify the Remote Management setting.

C. From Windows Firewall, modify the Windows Management Instrumentation (WMI) firewall rule.

D. From Registry Editor, configure the LocalAccountTokenFilterPolicyresgistry value

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 89Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1 that runs Windows Server 2012 R2.

On a server named Server2, you perform a Server Core Installation of Windows Server 2012 R2.You join Server2 to the contoso.com domain.

You need to ensure that you can manage Server2 by using the Computer Management console on Server1.

What should you do on Server2?

A. Run sconfig.exe and configure remote management.

B. Run sconfig.exe and configure Remote Server Administration Tools (RSAT).

C. Install Windows Management Framework.

D. Install Remote Server Administration Tools (RSAT).

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation/Reference:In Windows Server 2012, you can use the Server Configuration tool (Sconfig.cmd) to configure and manageseveral common aspects of Server Core installations. You must be a member of the Administrators group touse the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode.

Incorrect answers:A: RSAT includes tools like Server manager, MMC snap-in and consoles, etC. but it will not allow you to

Page 66: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

manage Server2 from Server1. You need to enable remote management.B: Installing Windows Management Framework is used to configure remote management on Windows Server2008.D: RSAT includes tools like Server manager, MMC snap-in and consoles, etC. but it will not allow you tomanage Server2 from Server1. You need to enable remote management.

References:http://technet.microsoft.com/en-us/library/jj647766.aspx Training Guide: Installing and Configuring WindowsServer 2012, Chapter 2: Deploying servers, p. 80

QUESTION 90Your network contains an Active Directory domain named contoso.com. The domain contains two serversnamed Server1 and Server2. Server1 runs Windows Server 2012 R2. 5erver2 runs Windows Server 2008 R2Service Pack 1 (SP1) and has the DHCP Server server role installed.

You need to manage DHCP on Server2 by using the DHCP console on Server1.

What should you do first?

A. From the Microsoft Management Console on Server1, add a snap-in.

B. From Server Manager on Server2, enable Windows Remote Management.

C. From Windows PowerShell on Server2, run Enable-PSRemoting.

D. From Server Manager on Server1, install a feature.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 91Your network contains an Active Directory forest. The forest contains two domains named contoso.com andcorp.contoso.com. All domain controllers run Windows Server 2012 R2 and are configured as global catalogservers.

The corp.contoso.com domain contains a domain controller named DC1.

You need to disable the global catalog on DC1.

What should you do?

A. From Active Directory Users and Computers, modify the properties of the DC1 computer account.

B. From Active Directory Administrative Center, modify the properties of the DC1 computer account.

C. From Active Directory Domains and Trusts, modify the properties of the corp.contoso.com domain.

D. From Active Directory Sites and Services, modify the NTDS Settings of the DC1 server object.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation/Reference:When you navigate your way to the Active Directory Sites and Services\Sites\SiteName\Servers then in thedetails pane, right-click NTDS Settings of the selected server object, and then click Properties. There will youget access to the Global Catalog check box to add the global catalog, or clear the check box to remove theglobal catalog.

Page 67: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Incorrect answers:A: The Active Directory Users and Computers console does not allow you to remove the global catalogue.B: The Active Directory Administrative Center does not give to access to the NTDS settings that you need toaccess to remove the global catalogue.D: He Active Directory Domains and Trust console will not give you access to the NTDS settings that you needto disable the global catalogue.

References:http://technet.microsoft.com/en-us/library/cc755257.aspx

QUESTION 92You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. You attacha 4-TB disk to Server1.

The disk is configured as an MBR disk. You need to ensure that you can create a 4-TB volume on the disk.

Which Diskpart command should you use?

A. Automount

B. Convert

C. Expand

D. Attach

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation/Reference:You will need to convert the disk to a GPT since GPT disks allows for partitioning and not MBR disks.

Incorrect answers:A: This is the wrong command to use to create a 4TB volume on the disk.C: There is no need to expand the disk.D: This is not the appropriate Diskpart command to use.

References:Exam Ref 70-410: Installing and Configuring Windows Server 2012: Objective 3.2: Create and Configure virtualmachine storage, Chapter 3: p. 159Exam Ref 70-410: Installing and Configuring Server 2012: Objective 1.3: Installing and Configuring servers,Chapter 1: p. 42-43

QUESTION 93Your network contains a Windows Server 2012 R2 image named Server12.wim. Server12.wim contains theimages shown in the following table.

Server12.wim is located in C:\.

Page 68: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to enable the Windows Server Migration Tools feature in the Windows Server 2012 R2 Datacenterimage. You want to achieve this goal by using the minimum amount of administrative effort.

Which command should you run first?

A. imagex.exe /apply c:\server12.wim 4 c:\

B. dism.exe /image:c:\server12.wim /enable-feature /featurename:servermigration

C. imagex.exe /capture c: c:\Server12.wim "windows server 2012 r2 datacenter"

D. dism.exe /mount-wim /wimfile:c:\Server12.wim /index:4 /mountdir:c:\mount

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:This command will mount the image before making any changes.

Incorrect answers:B. The imagex /capture command is used to create windows images .wim C. You need to mount the imagefirst.D. The imagex /apply command is used to apply image to drive.

References:http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx http://technet.microsoft.com/en-us/library/dd744382(v=ws.10).aspx

QUESTION 94Your network contains an Active Directory domain named contoso.com. Network Access Protection (NAP) isdeployed to the domain.

You need to create NAP event trace log files on a client computer.What should you run?

A. Register-EngineEvent

B. Tracert

C. Register-ObjectEvent

D. Logman

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:Register-ObjectEvent: Monitor events generated from .Net Framework Object. Register-EngineEvent:Subscribes to events that are generated by the Windows PowerShell engine and by the New-Event cmdlet.

http://technet.microsoft.com/en-us/library/hh849967.aspx

tracert: Trace IP routelogman: Manages and schedules performance counter and event trace log collections on a local and remotesystems.http://technet.microsoft.com/en-us/library/bb490956.aspx

QUESTION 95

Page 69: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You are a network administrator of an Active Directory domain named contoso.com. You have a server namedServer1 that runs Windows Server 2012 R2. Server1 has the DHCP Server server role and the Network PolicyServer role service installed.

You enable Network Access Protection (NAP) on all of the DHCP scopes on Server1.

You need to create a DHCP policy that will apply to all of the NAP non-compliant DHCP clients.

Which criteria should you specify when you create the DHCP policy?

A. The user class

B. The vendor class

C. The client identifier

D. The relay agent information

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 96Your network contains a Hyper-V host named Server1 that hosts 20 virtual machines.

You need to view the amount of memory resources and processor resources each virtual machine usescurrently.

Which tool should you use on Server1?

A. Resource Monitor

B. Task Manager

C. Hyper-V Manager

D. Windows System Resource Manager (WSRM)

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 97Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. Alldomain controllers run Windows Server 2012 R2.

The domain contains two domain controllers. The domain controllers are configured as shown in the followingtable.

Page 70: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Active Directory Recycle Bin is enabled.

You discover that a support technician accidentally removed 100 users from an Active Directory group namedGroup1 an hour ago.

You need to restore the membership of Group1.What should you do?

A. Perform tombstone reanimation.

B. Export and import data by using Dsamain.

C. Perform a non-authoritative restore.

D. Recover the items by using Active Directory Recycle Bin.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 98Your network contains an Active Directory domain named contoso.com. The domain contains a read-onlydomain controller (RODC) named RODC1.

You create a global group named RODC_Admins.

You need to provide the members of RODC_Admins with the ability to manage the hardware and the softwareon RODC1. The solution must not provide RODC_Admins with the ability to manage Active Directory objects.

What should you do?

A. From Active Directory Users and Computers, configure the Managed By settings of the RODC1 account.

B. From Windows PowerShell, run the Set-ADAccountControlcmdlet.

C. From a command prompt, run the dsmgmt locals roles command.

D. From Active Directory Sites and Services, run the Delegation of Control Wizard.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 99Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows

Page 71: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Server 2012 R2.

In a remote site, a support technician installs a server named DC10 that runs Windows Server 2012 R2. DC10is currently a member of a workgroup.

You plan to promote DC10 to a read-only domain controller (RODC). You need to ensure that a user namedContoso\User1 can promote DC10 to a RODC in the contoso.com domain.

The solution must minimize the number of permissions assigned to User1.

What should you do?

A. From Active Directory Administrative Center, pre-create an RODC computer account.

B. FromDsmgmt, run the local roles command.

C. Join DC10 to the domain. Modify the properties of the DC10 computer account.

D. Join DC10 to the domain. Run dsmod and specify the /server switch.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 100Your network contains an Active Directory domain named contoso.com. All domain controllers run WindowsServer 2012 R2.

DirectAccess is deployed to the network.

Remote users connect to the DirectAccess server by using a variety of network speeds.

The remote users report that sometimes their connection is very slow.

You need to minimize Group Policy processing across all wireless wide area network (WWAN) connections.

Which Group Policy setting should you configure?

A. Configure Direct Access connections as a fast network connection.

B. Change Group Policy processing to run asynchronously when a slow network connection is detected.

C. Configure Group Policy slow link detection.

D. Configure wireless policy processing.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 101Your network contains an Active Directory domain named contoso.com. The domain contains a member servernamed Server1 that has the Active Directory Federation Services server role installed. All servers run WindowsServer 2012.

You complete the Active Directory Federation Services Configuration Wizard on Server1.

Page 72: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to ensure that client devices on the internal network can use Workplace Join.

Which two actions should you perform on Server1? (Each correct answer presents part of the solution. Choosetwo.)

A. Run Enable AdfsDeviceRegistration -PrepareActiveDirectory.

B. Edit the multi-factor authentication global authentication policy settings.

C. Edit the primary authentication global authentication policy settings.

D. Run Set-AdfsProxyPropertiesHttpPort 80.

E. Run Enable-AdfsDeviceRegistration.

Correct Answer: CESection: (none)Explanation

Explanation/Reference:

QUESTION 102Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012R2.

You need to create a custom Active Directory application partition.

Which tool should you use?

A. Eseutil

B. Netsh

C. Ntdsutil Or DSmgmt

D. Netdom

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation/Reference:* To create or delete an application directory partition1. Open Command Prompt.2. Type:

ntdsutil3. At the ntdsutil command prompt, type:

domain management4. At the domain management command prompt, type:

connection5. At the server connections command prompt, type:

connect to server ServerName6. At the server connections command prompt, type:

quit7. At the domain management command prompt, do one of the following:To create an application directory partition, type:o

Page 73: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

create ncApplicationDirectoryPartitionDomainControllerTo delete an application directory partition, type:o

delete ncApplicationDirectoryPartition

* partition managementManages directory partitions for Active Directory Domain Services (AD DS) or Active Directory LightweightDirectory Services (AD LDS).This is a subcommand of Ntdsutil and Dsmgmt. Ntdsutil and Dsmgmt are command-line tools that are built intoWindows Server 2008 and Windows Server 2008 R2./ partition management create nc %s1 %s2Creates the application directory partition with distinguished name %s1, on the Active Directory domaincontroller or AD LDS instance with full DNS name %s2. If you specify "NULL" for %s2, this command uses thecurrently connected Active Directory domain controller. Use this command only with AD DS. For AD LDS, usecreatenc %s1 %s2 %s3.

Note:* An application directory partition is a directory partition that is replicated only to specific domain controllers. Adomain controller that participates in the replication of a particular application directory partition hosts a replicaof that partition.

Page 74: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

B- Drag & Drop

QUESTION 1Your network contains an Active Directory domain named contoso.com. All domain controllers run WindowsServer 2012.

The domain contains an organizational unit (OU) named OU1. OU1 contains an OU named OU2. OU2 containsa user named User1.

User1 is the member of a group named Group1. Group1 is in the Users container.

You create five Group Policy objects (GPO). The GPOs are configured as shown in the following table.

The Authenticated Users group is assigned the default permissions to all of the GPOs.There are no site-level GPOs.

You need to identify which three GPOs will be applied to User1 and in which order the GPOs will be applied toUser1.

Which three GPOs should you identify in sequence?To answer, move the appropriate three GPOs from the list of GPOs to the answer area and arrange them in thecorrect order.

Select and Place:

Correct Answer:

Page 75: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Section: (none)Explanation

Explanation/Reference:Explanation:

Box 1: GPO1Box 2: GPO3Box 3: GPO5

Note:

* Box 1: Domain GPOs are applied before OU GPOs.

* Incorrect:

* NOT GPO2: GPO2 has Deny Apply Group Policy for Group1.

* Not GPO4. Group1 has Deny Read for this GPO.* When a Group Policy Object (GPO) is enforced it means the settings in the Group Policy Object on anOrganization Unit (which is shown as a folder within the Active Directory Users and Computers MMC) cannotbe overruled by a Group Policy Object (GPO) which is link enabled on an Organizational Unit below theOrganizational Unit with the enforced Group Policy Object (GPO). In Active Directory Users and ComputersMMC 'below' means it is a subfolder.

* Group Policy Objects are processed in the following order (from top to bottom):

1. Local- Any settings in the computer's local policy. Prior to Windows Vista, there was only one local grouppolicy stored per computer. Windows Vista and later Windows versions allow individual group policies per useraccounts.

2. Site- Any Group Policies associated with the Active Directorysitein which the computer resides. (An ActiveDirectory site is a logical grouping of computers that is meant to facilitate management of computers based ontheir physical proximity.) If multiple policies are linked to a site, they are processed in the order set by theadministrator.

3. Domain- Any Group Policies associated with the Windows domainin which the computer resides. If multiple

Page 76: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

policies are linked to a domain, they are processed in the order set by the administrator.

4. Organizational Unit- Group policies assigned to the Active Directory organizational unit (OU) in which thecomputer or user are placeD. (OUs are logical units that help organizing and managing a group of users,computers or other Active Directory objects.) If multiple policies are linked to an OU, they are processed in theorder set by the administrator.

QUESTION 2Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.

Group Policy objects (GPOs) are linked to the domain as shown in the exhibit. (Click the Exhibit button.)

GPO2 contains computer configurations only and GPO3 contains user configurations only.

You need to configure the GPOs to meet the following requirements:· Ensure that GPO2 only applies to the computer accounts in OU2 that have more than one processor.· Ensure that GPO3 only applies to the user accounts in OU3 that are members of a security group namedSecureUsers.

Which setting should you configure in each GPO?

To answer, drag the appropriate setting to the correct GPO. Each setting may be used once, more than once,or not at all. You may need to drag the split bar between panes or scroll to view content.

Select and Place:

Page 77: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Section: (none)Explanation

Explanation/Reference:

QUESTION 3Your network contains an Active Directory domain named contoso.com. The domain contains a server namedPrint1.

Your company implements DirectAccess.

A user named User1 frequently works at a customer's office. The customer's office contains a print servernamed Print1.

While working at the customer's office, User1 attempts to connect to Print1. User1 connects to the Print1 serverin contoso.com instead of the Print1 server at the customer's office.

You need to provide User1 with the ability to connect to the Print1 server in the customer's office.

Which Group Policy option should you configure?

To answer, select the appropriate option in the answer areA.

Point and Shoot:

Page 78: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Explanation:

Page 79: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 4Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. Theforest contains two Active Directory sites named Site1 and Site2.

You plan to deploy a read-only domain controller (RODC) named DC10 to Site2. You pre-create the DC10domain controller account by using Active Directory Users and Computers.

You need to identify which domain controller will be used for initial replication during the promotion of theRODC.

Which tab should you use to identify the domain controller?

To answer, select the appropriate tab in the answer area.

Point and Shoot:

Page 80: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Page 81: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Section: (none)Explanation

Explanation/Reference:Explanation:

Page 82: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 5Your network contains an Active Directory domain named contoso.com. The domain contains two DHCPservers named DHCP1 and DHCP2 that run Windows Server 2012.

You install the IP Address Management (IPAM) Server feature on a member server named Server1 and yourun the Run Invoke-IpamGpoProvisioningcmdlet.

You need to manage the DHCP servers by using IPAM on Server1.

Which three actions should you perform?

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them inthe correct order.

Select and Place:

Page 83: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Explanation:

Box 1: Provision the IPAM server.Box 2: Set the manageability status of the server.Box 3: Configure server discovery.

Explanation:http://technet.microsoft.com/zh-cn/library/jj878325.aspx

Note:* In IPAM, provisioning is the process of enabling required permissions, files shares, and access settings sothat the IPAM server can monitor and manage IP infrastructure servers (called managed servers) on thenetwork. Provisioning has two steps:1. Choose a provisioning methoD. (box 1)2. Configure managed server access settings. (box 2)* Invoke-IpamGpoProvisioningCreates and links group policies in the specified domain for provisioning required access settings on theservers managed by the computer running the IP Address Management (IPAM) server.* (box 3) After you have chosen a provisioning method, you can configure the scope of discovery and begin

Page 84: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

adding servers to manage with IPAM.* (incorrect) The IPAM client console is integrated with Server Manager. IPAM Client is installed by defaultwhen you install IPAM Server on a computer running Windows Server® 2012. The client automaticallyconnects to the local IPAM server after installation, but can also be used to manage a different IPAM server.

Reference: Getting Started with IPAM

QUESTION 6Your network contains an Active Directory domain named contoso.com.

You install the IP Address Management (IPAM) Server feature on a server named Server1 and select Manualas the provisioning method.

The IPAM database is located on a server named SQL1.

You need to configure IPAM to use Group Policy Based provisioning.

What command should you run first?To answer, select the appropriate options in the answer area.

Hot Area:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Explanation:

Page 85: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 7Your network contains an Active Directory domain named contoso.com. The domain contains two serversnamed Server1 and Server2 that run Windows Server 2012 R2. The servers have the Hyper-V server roleinstalled.

A certification authority (CA) is available on the network.

A virtual machine named vml.contoso.com is replicated from Server1 to Server2. A virtual machine namedvm2.contoso.com is replicated from Server2 to Server1. You need to configure Hyper-V to encrypt thereplication of the virtual machines.

Which common name should you use for the certificates on each server?

To answer, configure the appropriate common name for the certificate on each server in the answer area.

Hot Area:

Correct Answer:

Page 86: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 8You have a file server named Server1 that runs Windows Server 2012 R2.

Server1 contains a file share that must be accessed by only a limited number of users. You need to ensure thatif an unauthorized user attempts to access the file share, a custom access-denied message appears, whichcontains a link to request access to the share. The message must not appear when the unauthorized userattempts to access other shares.

Which two nodes should you configure in File Server Resource Manager? To answer, select the appropriatetwo nodes in the answer area.

Hot Area:

Page 87: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Explanation:

Page 88: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 9Your network contains two Active Directory forests named contoso.com and adatum.com. All domaincontrollers run Windows Server 2012 R2.

A federated trust exists between adatum.com and contoso.com. The trust provides adatum.com users withaccess to contoso.com resources.

You need to configure Active Directory Federation Services (AD FS) claim rules for the federated trust.

The solution must meet the following requirements:· In contoso.com, replace an incoming claim type named Group with an outgoing claim type named Role.· In adatum.com, allow users to receive their tokens for the relying party by using their Active Directory groupmembership as the claim type.

The AD FS claim rules must use predefined templates.

Which rule types should you configure on each side of the federated trust? To answer, drag the appropriate ruletypes to the correct location or locations. Each rule type may be used once, more than once, or not at all. Youmay need to drag the split bar between panes or scroll to view content.

Select and Place:

Page 89: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Explanation:

http://technet.microsoft.com/zh-cn/library/ee913586(v=WS.10).aspx

Page 90: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 10Your network contains an Active Directory domain named contoso.com. The domain contains two serversnamed Server1 and Server3. The network contains a standalone server named Server2. All servers runWindows Server 2012 R2. The servers are configured as shown in the following table.

Server3 hosts an application named App1. App1 is accessible internally by using the URL https://app1.contoso.com. App1 only supports Integrated Windows authentication.

You need to ensure that all users from the Internet are pre-authenticated before they can access App1.

What should you do? To answer, drag the appropriate servers to the correct actions. Each server may be usedonce, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Page 91: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Select and Place:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:

QUESTION 11Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1 that runs Windows Server 2012 R2.

You plan to install the Active Directory Federation Services server role on Server1 to allow for Workplace Join.

You run nslookupenterpriseregistration and you receive the following results:

Page 92: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to create a certificate request for Server1 to support the Active Directory Federation Services (ADFS) installation.

How should you configure the certificate request? To answer, drag the appropriate names to the correctlocations. Each name may be used once, more than once, or not at all. You may need to drag the split barbetween panes or scroll to view content.

Select and Place:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:

QUESTION 12Your network contains an Active Directory domain named contoso.com. The domain contains four memberservers named Server 1, Server2, Server3, and Server4. All servers run Windows Server 2012 R2.

Server1 and Server2 are located in a site named Site1. Server3 and Server4 are located in a site named Site2.The servers are configured as nodes in a failover cluster named Cluster1.

Cluster1 is configured to use the Node Majority quorum configuration.

You need to ensure that Server1 is the only server in Site1 that can vote to maintain quorum.

What should you run from Windows PowerShell?To answer, drag the appropriate commands to the correct location. Each command may be used once, morethan once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Select and Place:

Page 93: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Explanation/Reference:

http://technet.microsoft.com/en-us/library/ee460990.aspx

QUESTION 13Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Hyper-V server role installed. The servers are configured as shown in thefollowing table.

You add a third server named Server3 to the network. Server3 has Intel processors. You need to move VM3and VM6 to Server3. The solution must minimize downtime on the virtual machines.

Page 94: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Which method should you use to move each virtual machine? To answer, select the appropriate method foreach virtual machine in the answer area.

Hot Area:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Explanation:

Page 95: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Explanation:VM3: export/import is the only option due to different processor manufacturers VM6: Live migration can beused as both have Intel CPU's Live Storage Migration requires same processor manufacturers Live migrationrequires same processor manufacturersQuick migration has downtime

http://technet.microsoft.com/en-us/library/dd446679(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831656.aspx http://technet.microsoft.com/en-us/library/jj628158.aspx

QUESTION 14Your network contains an Active Directory domain named fabrikam.com.

You implement DirectAccess.

You need to view the properties of the DirectAccess connection.

Which connection properties should you view?To answer, select the appropriate connection properties in the answer area.

Point and Shoot:

Correct Answer:

Page 96: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Section: (none)Explanation

Explanation/Reference:Explanation:

Page 97: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 15Your network contains an Active Directory domain named adatum.com. The domain contains a server namedServer1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server (NPS) serverand as a DHCP server.

You need to log all DHCP clients that have Windows Firewall disabled.

Which three actions should you perform in sequence?To answer, move the three appropriate actions from the list of actions to the answer area and arrange them inthe correct order.

Select and Place:

Page 98: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Section: (none)Explanation

Explanation/Reference:

QUESTION 16Your network contains a single Active Directory domain named contoso.com. The domain contains an ActiveDirectory site named Site1 and an organizational unit (OU) named OU1.

The domain contains a client computer named Client1 that is located in OU1 and Site1.

You create five Group Policy objects (GPO). The GPOs are configured as shown in the following table.

Page 99: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to identify in which order the GPOs will be applied to Client1. In which order should you arrange thelisted GPOs?

To answer, move all GPOs from the list of GPOs to the answer area and arrange them in the correct order.

Select and Place:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Explanation:By default settings in Group Policy Objects (GPOs) get applied in the following order: Local system policies first,then policies on the Active Directory Domain level, then policies on the Active Directory Site level and then thepolicies for all the Organization Units the computer and user are members of, starting at the root of the domain.

Page 100: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

The settings that are last applied are the settings in effect.

QUESTION 17Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC1 and a member server named Server1. All servers run Windows Server 2012 R2.

You install the IP Address Management (IPAM) Server feature on Server1. From the Provision IPAM wizard,you select the Group Policy Based provisioning method and enter a GPO name prefix of IPAM1.

You need to provision IPAM by using Group Policy.

What command should you run on Server1 to complete the process? To answer, select the appropriate optionsin the answer area.

Hot Area:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 18Your network contains an Active Directory domain named contoso.com. All file servers in the domain run

Page 101: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Windows Server 2012 R2.

The computer accounts of the file servers are in an organizational unit (OU) named OU1. A Group Policy object(GPO) named GPO1 is linked to OU1.

You plan to modify the NTFS permissions for many folders on the file servers by using central access policies.

You need to identify any users who will be denied access to resources that they can currently access once thenew permissions are implemented.In which order should you perform the five actions?To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.

Select and Place:

Correct Answer:

Page 102: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Section: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/hh846167.aspx

QUESTION 19Your network contains an Active Directory domain named contoso.com. The domain contains a file servernamed Server1. All servers run Windows Server 2012 R2.

All domain user accounts have the Division attribute automatically populated as part of the user provisioningprocess. The Support for Dynamic Access Control and Kerberos armoring policy is enabled for the domain.

You need to control access to the file shares on Server1 based on the values in the Division attribute and theDivision resource property.

Which three actions should you perform in sequence?To answer, move the three appropriate actions from the list of actions to the answer area and arrange them inthe correct order.

Select and Place:

Page 103: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Explanation:

Page 104: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

http://technet.microsoft.com/de-de/library/hh846167.aspx First create a claim type for the property, then createa reference resource property that points back to the claim. Finally set the classification value on the folder.

QUESTION 20You plan to deploy a failover cluster that will contain two nodes that run Windows Server 2012 R2.

You need to configure a witness disk for the failover cluster.

How should you configure the witness disk?To answer, drag the appropriate configurations to the correct location or locations. Each configuration may beused once, more than once, or not at all. You may need to drag the split bar between panes or scroll to viewcontent.

Select and Place:

Correct Answer:

Page 105: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Section: (none)Explanation

Explanation/Reference:

QUESTION 21Your network contains four servers that run Windows Server 2012 R2.

Each server has the Failover Clustering feature installed. Each server has three network adapters installed. AniSCSI SAN is available on the network.

You create a failover cluster named Cluster1. You add the servers to the cluster.

You plan to configure the network settings of each server node as shown in the following table.

You need to configure the network settings for Cluster1.

What should you do?To answer, drag the appropriate network communication setting to the correct cluster network or networks.Each network communication setting may be used once, more than once, or not at all. You may need to drag

Page 106: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

the split bar between panes or scroll to view content.

Select and Place:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/cc787135(v=WS.10).aspx

QUESTION 22Your network contains an Active Directory domain named contoso.com.

You need to ensure that third-party devices can use Workplace Join to access domain resources on theInternet.

Which four actions should you perform in sequence?To answer, move the appropriate four actions from the list of actions to the answer area and arrange them inthe correct order.

Select and Place:

Page 107: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Note:

* Workplace Join is a self-service tool. When an end user downloads and installs the Workplace Join cli- ent ona device, the client asks the end user for a corporate email and password, which is sent to a Act- ive Directoryserver to be verified. The server then calls or texts the user at a pre-designated phone number and asks theuser to confirm that the device in question should be given "join" rights. Technic- ally, Workplace Join creates anew device object in Active Directory and installs a certificate on the device.

The Workplace Join app, which is free, only allows Windows and iOS devices to join the AD at this time. It isexpected that Android devices will be supported in the near future.

Page 108: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

* Workplace Join is made possible by the Device Registration Service (DRS) that is included with the Act- iveDirectory Federation Role in Windows Server 2012 R2. When a device is Workplace Joined, the DRSprovisions a device object in Active Directory and sets a certificate on the consumer device that is used torepresent the device identity. The DRS is meant to be both internal and external facing.

QUESTION 23You have a file server named Server1 that runs Windows Server 2012 R2. The folders on Server1 areconfigured as shown in the following table.

A new corporate policy states that backups must use Windows Azure Online Backup whenever possible.

You need to identify which technology you must use to back up Server1. The solution must use Windows AzureOnline Backup whenever possible.

What should you identify?To answer, drag the appropriate backup type to the correct location or locations. Each backup type may beused once, more than once, or not at all. You may need to drag the split bar between panes or scroll to viewcontent.

Select and Place:

Correct Answer:

Section: (none)Explanation

Page 109: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Explanation/Reference:

QUESTION 24You have a server named Server1 that runs Windows Server 2012 R2. The volumes on Server1 are configuredas shown in the following table.

A new corporate policy states that backups must use Windows Azure Backup whenever possible.

You need to identify which backup methods you must use to back up Server1. The solution must use WindowsAzure Backup whenever possible.

Which backup type should you identify for each volume?To answer, select the appropriate backup type for each volume in the answer area.

Hot Area:

Correct Answer:

Page 110: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Section: (none)Explanation

Explanation/Reference:Explanation:

Explanation:http://technet.microsoft.com/en-us/library/jj614621.aspx http://technet.microsoft.com/zh-cn/library/hh831419.aspx

QUESTION 25

Page 111: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You have a server named Server1 that runs Windows Server 2012 R2. Server1 does not have Internetconnectivity.

All roles are removed completely from Server1.

You mount a Windows Server 2012 R2 installation image to the C:\Source folder.

You need to install the DNS Server server role on Server1.

Which folder should you use as the source?To answer, select the appropriate folder in the answer area.

Point and Shoot:

Page 112: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Page 113: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Section: (none)Explanation

Explanation/Reference:Explanation:

Page 114: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 26Your network contains an Active Directory domain named contoso.com. The domain contains two serversnamed Server1 and Server2 that run Windows Server 2012 R2.

From Server2, you attempt to connect to Server1 by using Computer Management and you receive thefollowing error message: "Computer \\Server1 cannot be found. The network path was not found. "

From Server1, you successfully connect to Server2 by using Server Manager.

You need to ensure that you can manage Server1 remotely from Server2 by using Computer Management.What should you configure?To answer, select the appropriate option in the answer area.

Point and Shoot:

Page 115: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Page 116: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 27Your network contains an Active Directory domain named contoso.com.

Page 117: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to identify whether the Company attribute replicates to the global data.

Which part of the Active Directory partition should you view? To answer, select the appropriate Active Directoryobject in the answer area.

Point and Shoot:

Correct Answer:

Page 118: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Section: (none)Explanation

Explanation/Reference:Explanation/Reference:

Page 119: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Explanation:An Active Directory Lightweight Directory Services (AD LDS) schema defines, using object classes andattributes, the types of objects and data that can be created and stored in an AD LDS directory. The schemacan be extended with new classes and attributes, either by administrators or by the applications themselves. Inaddition, unneeded schema classes and attributes can be deactivated.

References:http://technet.microsoft.com/en-us/library/cc771975.aspx http://technet.microsoft.com/en-us/library/cc731547.aspx

QUESTION 28You have a server named DHCP1 that runs Windows Server 2012 R2. DHCP1 does not have access to theInternet.

All roles are removed completely from DHCP

You mount a Windows Server 2012 R2 installation image to the C:\Mount folder.

You need to install the DHCP Server server role on DHCP1 by using Server Manager.

Which folder should you specify as the alternate path for the source files? To answer, select the appropriatefolder in the answer area.

Point and Shoot:

Page 120: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Page 121: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Section: (none)Explanation

Explanation/Reference:Explanation:

Page 122: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

WinSxS, the side-by-side component store enables administrators to activate any of the features included withWindows Server 2012 without having to supply an installation medium.

References:http://blogs.technet.com/b/askpfeplat/archive/2013/02/24/how-to-reduce-the-size-of-the-winsxs- directory-andfree-up-disk-space-on-windows-server-2012-using-features-on-demand.aspx Exam Ref 70-410: Installingand configuring Windows Server 2012, Chapter 1: Installing and configuring servers, Objective 1.1: Installservers, p. 10

QUESTION 29

Page 123: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Your network contains an Active Directory domain named contoso.com. All client computers run Windows 7.Group Policy objects (GPOs) are linked to the domain as shown in the exhibit.(Click the Exhibit button.)

GPO2 contains user configurations only and GPO3 contains computer configurations only.

You need to configure the GPOs to meet the following requirements:· Ensure that GPO2 only applies to the user accounts in OU2 that are members of a global group namedGroup2.· Ensure that GPO3 only applies to the computer accounts in OU3 that have more than 100 GB of free diskspace.

What should you do?To answer, drag the appropriate setting to the correct GPO. Each setting may be used once, more than once,or not at all. You may need to drag the split bar between panes or scroll to view content.

Select and Place:

Page 124: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Section: (none)Explanation

Explanation/Reference:

QUESTION 30Your network contains an Active Directory forest named contoso.com.

Recently, all of the domain controllers that ran Windows Server 2003 were replaced by domain controllers thatrun Windows Server 2012 R2.

From Event Viewer, you discover SYSVOL journal wrap errors on a domain controller nameddclO.contoso.com.

You need to perform a non-authoritative synchronization of SYSVOL on DC10.

Which three actions should you perform on DC10?To answer, move the three appropriate actions from the list of actions to the answer area and arrange them inthe correct order.

Select and Place:

Page 125: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Note:

1. (step 1) For an Authoritative Restore you must stop the NTFRS services on all of your

DCs

2. (Step 2) In the registry location: HKEY_LOCAL_MACHINE\SYSTEM\CurrentCon-

Page 126: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

trolSet\Services\NtFrs\Parameters\Backup/Restore\Process

A.Set the BurFlags setting to HEX "D4" on a known DC that has a good SYSVOL (or

at this time restore SYSVOL data from backup then set the Burflag to D4)

B. (step 3) Then start NTFRS on this server.

C. You may want to rename the old folders with .old extensions prior to restoring good

data.

3. Clean up the folders on all the remaining servers (Policies, Scripts, etc) renamed

them with .old extensions.

4. Set the BurFlags to D2 on all remaining servers and then start NTFRS.

5. Wait for FRS to replicate.

6. Clean up the .old stuff if things look good.7. If the "D4 won't solve the problem try the "D2 value.

Page 127: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

C- New Questions (Accurate Answers)

QUESTION 1Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-Vserver role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

You install a network monitoring application on VM2.

You need to ensure that all of the traffic sent to VM3 can be captured on VM2.

What should you configure?

A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Correct Answer: JSection: (none)Explanation

Explanation/Reference:Explanation/Reference:With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as theswitch port that receives copies of all the traffic. And since Port mirroring allows the network traffic of a virtualmachine to be monitored by copying the traffic and forwarding it to another virtual machine that is configured formonitoring, you should configure port mirroring on VM2.

Incorrect answers:

A: NUMA spanning is a processor setting that works by projecting a virtual NUMA topology to the guest

Page 128: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

operating system in a way that is optimized to match the NUMA topology of the underlying physical hostmachine. The effect is to provide virtual machines with additional computing resources for high-performanceserver applications such as Microsoft SQL Server and modern server operating systems such as WindowsServer 2012 that include built-in NUMA optimizations.

B: Resource control in used in the event where you need to adjust the computing resources of a virtualmachine, you can reconfigure the resources to meet the changing needs. You can also specify resourcecontrols to automate how resources are allocated to virtual machines.

C: Resource metering includes:

· Total incoming network traffic, measured in megabytes, for a virtual network adapter.

· Total outgoing network traffic, measured in megabytes, for a virtual network adapter

In other words not capturing, just measuring traffic over the network adapters.

D: Virtual Machine Chimney or TCP Chimney Offload as it is also known, transfers Transmission ControlProtocol (TCP) traffic processing, such as packet segmentation and reassembly processing tasks, from acomputer's CPU to a network adapter that supports TCP Chimney Offload. Moving TCP/IP processing from theCPU to the network adapter can free the CPU to perform more application-level functions. TCP ChimneyOffload can offload the processing for both TCP/IPv4 and TCP/IPv6 connections if supported by the networkadapter.

E: VLAN ID is used to specify a segment of the VLAN or isolate network traffic for the virtual network adapter.

F: Processor settings is used to configure the number of virtual processors that the virtual machine uses,enable processor compatibility to allow live migrations to hosts having a different processor architecture, orconfigure the NUMA topology on a NUMA-capable host, not to monitor network traffic.

G: The Startup order is set in the BIOS of the computer and has no effect on network monitoring.

H: Automatic start action allows you to specify what the virtual machine should do when the host machine bootsup. The options you can choose from are to automatically start the virtual machine if it was running when theVMM service on the host stopped (the default), to always start the virtual machine automatically, or to donothing. You can also specify a startup delay in seconds to reduce resource content between different virtualmachines starting up on the host.I: Integration Services settings on virtual machines include services such as operating system shutdown, timesynchronization, data exchange, Heartbeat, and Backup (volume snapshot services not network monitoring.

K: Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine tomaximize network throughput while minimizing network latency and the CPU overhead required for processingnetwork traffic.

References:

http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror

QUESTION 2Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-Vserver role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

Page 129: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You plan to schedule a complete backup of Served by using Windows Server Backup.

You need to ensure that the state of VM1 is saved before the backup starts.

What should you configure?

A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Correct Answer: ISection: (none)Explanation

Explanation/Reference:Explanation/Reference:

The Integration Services settings on virtual machines include services such as operating system shutdown,time synchronization, data exchange, Heartbeat, and Backup (volume snapshot services). This snapshot willensure that the state of VM1 is saved prior to backup.

Incorrect answers:

A: NUMA spanning is a processor setting that works by projecting a virtual NUMA topology to the guestoperating system in a way that is optimized to match the NUMA topology of the underlying physical hostmachine. The effect is to provide virtual machines with additional computing resources for high-performanceserver applications such as Microsoft SQL Server and modern server operating systems such as WindowsServer 2012 that include built-in NUMA optimizations.

B: Resource control in used in the event where you need to adjust the computing resources of a virtualmachine, you can reconfigure the resources to meet the changing needs. You can also specify resourcecontrols to automate how resources are allocated to virtual machines.

C: Resource metering includes:

Page 130: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

· Average CPU usage, measured in megahertz over a period of time.

· Average physical memory usage, measured in megabytes.

· Minimum memory usage (lowest amount of physical memory).

· Maximum memory usage (highest amount of physical memory).

· Maximum amount of disk space allocated to a virtual machine.

· Total incoming network traffic, measured in megabytes, for a virtual network adapter.

· Total outgoing network traffic, measured in megabytes, for a virtual network adapter

D: Virtual Machine Chimney or TCP Chimney Offload as it is also known, transfers Transmission ControlProtocol (TCP) traffic processing, such as packet segmentation and reassembly processing tasks, from acomputer's CPU to a network adapter that supports TCP Chimney Offload. Moving TCP/IP processing from theCPU to the network adapter can free the CPU to perform more application-level functions. TCP ChimneyOffload can offload the processing for both TCP/IPv4 and TCP/IPv6 connections if supported by the networkadapter.

E: VLAN ID is used to specify a segment of the VLAN or isolate network traffic for the virtual network adapter.

F: Processor settings is used to configure the number of virtual processors that the virtual machine uses,enable processor compatibility to allow live migrations to hosts having a different processor architecture, orconfigure the NUMA topology on a NUMA-capable host.

G: The startup order is set in the BIOS of the computer. It has nothing to do with backups.

H: Automatic start action allows you to specify what the virtual machine should do when the host machine bootsup. The options you can choose from are to automatically start the virtual machine if it was running when theVMM service on the host stopped (the default), to always start the virtual machine automatically, or to donothing. You can also specify a startup delay in seconds to reduce resource content between different virtualmachines starting up on the host.

J: With Hyper-V Virtual Switch port mirroring you can monitor network traffic not configure backups.

K: Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine tomaximize network throughput while minimizing network latency and the CPU overhead required for processingnetwork traffic.

References:

http://msdn.microsoft.com/en-us/library/dd405549(v=vs.85).aspx

Exam Ref 70-410, Installing and Configuring Windows Server 2012, Chapter 3: Configure Hyper-V, Objective3.1: Create and Configure virtual machine settings, p. 144

QUESTION 3Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-Vserver role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

Page 131: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

VM3 is used to test applications.

You need to prevent VM3 from synchronizing its clock to Server1.

What should you configure?

A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Correct Answer: ISection: (none)Explanation

Explanation/Reference:Explanation/Reference:Integration Services settings on virtual machines includes services such as operating system shutdown, timesynchronization, data exchange, Heart beat, and Backup (volume snapshot services. Thus you should disablethe time synchronization using Integration Services.

Incorrect answers:A: NUMA spanning is a processor setting that works by projecting a virtual NUMA topology to the guestoperating system in a way that is optimized to match the NUMA topology of the underlying physical hostmachine. The effect is to provide virtual machines with additional computing resources for high-performanceserver applications such as Microsoft SQL Server and modern server operating systems such as WindowsServer 2012 that include built-in NUMA optimizations.B: Resource control in used in the event where you need to adjust the computing resources of a virtualmachine, you can reconfigure the resources to meet the changing needs. You can also specify resourcecontrols to automate how resources are allocated to virtual machines.C: Resource metering includes:·Average CPU usage, measured in megahertz over a period of time.·Average physical memory usage, measured in megabytes.·Minimum memory usage (lowest amount of physical memory). ·Maximum memory usage (highest amount ofphysical memory). ·Maximum amount of disk space allocated to a virtual machine. ·Total incoming network

Page 132: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

traffic, measured in megabytes, for a virtual network adapter. ·Total outgoing network traffic, measured inmegabytes, for a virtual network adapter

D: Virtual Machine Chimney or TCP Chimney Offload as it is also known, transfers Transmission ControlProtocol (TCP) traffic processing, such as packet segmentation and reassembly processing tasks, from acomputer's CPU to a network adapter that supports TCP Chimney Offload. Moving TCP/IP processing from theCPU to the network adapter can free the CPU to perform more application-level functions. TCP ChimneyOffload can offload the processing for both TCP/IPv4 and TCP/IPv6 connections if supported by the networkadapter.E: VLAN ID is used to specify a segment of the VLAN or isolate network traffic for the virtual network adapter.F: Processor settings is used to configure the number of virtual processors that the virtual machine uses,enable processor compatibility to allow live migrations to hosts having a different processor architecture, orconfigure the NUMA topology on a NUMA-capable host.G: The startup order is set in the BIOS of the computer, the question wants you do prevent time synchronizationinstead.H: Automatic start action allows you to specify what the virtual machine should do when the host machine bootsup. The options you can choose from are to automatically start the virtual machine if it was running when theVMM service on the host stopped (the default), to always start the virtual machine automatically, or to donothing. You can also specify a startup delay in seconds to reduce resource content between different virtualmachines starting up on the host.J: With Hyper-V Virtual Switch port mirroring you can monitor network traffic not prevent time synchronization.K: Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine tomaximize network throughput while minimizing network latency and the CPU overhead required for processingnetwork traffic.

References:http://blogs.technet.com/b/virtualization/archive/2008/08/29/backing-up-hyper-v-virtual- machines.aspxExam Ref 70-410, Installing and Configuring Windows Server 2012, Chapter 3: Configure Hyper-V, Objective3.1: Create and Configure virtual machine settings, p. 144

QUESTION 4Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-Vserver role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

VM2 sends and receives large amounts of data over the network.

You need to ensure that the network traffic of VM2 bypasses the virtual switches of the parent partition.

What should you configure?

A. NUMA topology

Page 133: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Correct Answer: KSection: (none)Explanation

Explanation/Reference:Explanation/Reference:Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine tomaximize network throughput while minimizing network latency and the CPU overhead required for processingnetwork traffic.

Incorrect answers:A: NUMA spanning is a processor setting that works by projecting a virtual NUMA topology to the guestoperating system in a way that is optimized to match the NUMA topology of the underlying physical hostmachine. The effect is to provide virtual machines with additional computing resources for high-performanceserver applications such as Microsoft SQL Server and modern server operating systems such as WindowsServer 2012 that include built-in NUMA optimizations.B: Resource control in used in the event where you need to adjust the computing resources of a virtualmachine, you can reconfigure the resources to meet the changing needs. You can also specify resourcecontrols to automate how resources are allocated to virtual machines.C: Resource metering includes:·Average CPU usage, measured in megahertz over a period of time.·Average physical memory usage, measured in megabytes.·Minimum memory usage (lowest amount of physical memory). ·Maximum memory usage (highest amount ofphysical memory). ·Maximum amount of disk space allocated to a virtual machine. ·Total incoming networktraffic, measured in megabytes, for a virtual network adapter. ·Total outgoing network traffic, measured inmegabytes, for a virtual network adapter·D: Virtual Machine Chimney or TCP Chimney Offload as it is also known, transfers Transmission ControlProtocol (TCP) traffic processing, such as packet segmentation and reassembly processing tasks, from acomputer's CPU to a network adapter that supports TCP Chimney Offload. Moving TCP/IP processing from theCPU to the network adapter can free the CPU to perform more application-level functions. TCP ChimneyOffload can offload the processing for both TCP/IPv4 and TCP/IPv6 connections if supported by the networkadapter.E: VLAN ID is used to specify a segment of the VLAN or isolate network traffic for the virtual network adapter.F: Processor settings is used to configure the number of virtual processors that the virtual machine uses,enable processor compatibility to allow live migrations to hosts having a different processor architecture, orconfigure the NUMA topology on a NUMA-capable host. G. Configure the BIOS of the computer to enable PXEboot, and set the boot order so that it is booting from the network is first.H: Automatic start action allows you to specify what the virtual machine should do when the host machine bootsup. The options you can choose from are to automatically start the virtual machine if it was running when theVMM service on the host stopped (the default), to always start the virtual machine automatically, or to donothing. You can also specify a startup delay in seconds to reduce resource content between different virtualmachines starting up on the host.I: Integration Services settings on virtual machines include services such as operating system shutdown, timesynchronization, data exchange, Heartbeat, and Backup (volume snapshot services.J: With Hyper-V Virtual Switch port mirroring you can monitor network traffic not modify the startup order.

Page 134: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

References:http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831410.aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012, Chapter 3: ConfigureHyper-V, Objective 3.1: Create and Configure virtual machine settings, p. 144 Training Guide: Installing andConfiguring Windows Server 2012: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuringvirtual machines, p. 335

QUESTION 5Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have theFailover Clustering feature installed.The servers are configured as nodes in a failover cluster named Cluster1.

You add two additional nodes in Cluster1.

You have a folder named Folder1 on Server1 that hosts application datA. Folder1 is a folder target in aDistributed File System (DFS) namespace.You need to provide highly available access to Folder1. The solution must support DFS Replication to Folder1.

What should you configure?

A. Affinity - None

B. Affinity - Single

C. The cluster quorum settings

D. The failover settings

E. A file server for general use

F. The Handling priority

G. The host priority

H. Live migration

I. The possible owner

J. The preferred owner

K. Quick migration

L. The Scale-Out File Server

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation/Reference:

Page 135: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 6Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in afailover cluster named Cluster1.

You configure File Services and DHCP as clustered resources for Cluster1. Server1 is the active node for bothclustered resources.

You need to ensure that if two consecutive heartbeat messages are missed between Server1 and Server2,Server2 will begin responding to DHCP requests. The solution must ensure that Server1 remains the activenode for the File Services clustered resource for up to five missed heartbeat messages.

What should you configure?

A. Affinity - None

B. Affinity - Single

C. The cluster quorum settings

D. The failover settings

E. A file server for general use

F. The Handling priority

G. The host priority

H. Live migration

I. The possible owner

J. The preferred owner

K. Quick migration

L. The Scale-Out File Server

Correct Answer: DSection: (none)Explanation

Page 136: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Explanation/Reference:Explanation/Reference:A. The number of heartbeats that can be missed before failover occurs is known as the heartbeat thresholdhttp://technet.microsoft.com/en-us/library/dn265972.aspx http://technet.microsoft.com/en-us/library/dd197562(v=ws.10).aspx http://blogs.msdn.com/b/clustering/archive/2012/11/21/10370765.aspx

QUESTION 7Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have theFailover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.You add two additional nodes to Cluster1.

You have a folder named Folder1 on Server1 that contains application data. You plan to provide continuouslyavailable access to Folder1.

You need to ensure that all of the nodes in Cluster1 can actively respond to the client requests for Folder1.

What should you configure?

A. Affinity - None

B. Affinity - Single

C. The cluster quorum settings

D. The failover settings

E. A file server for general u

F. The Handling priority

G. The host priority

H. Live migration

I. The possible owner

J. The preferred owner

K. Quick migration

L. The Scale-Out File Server

Correct Answer: LSection: (none)Explanation

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/hh831349.aspx

Scale-Out File Server for Application data (Scale-Out File Server) This clustered file server is introduced inWindows Server 2012 and lets you store server Application data, such as Hyper-V virtual machine files, on fileshares, and obtain a similar level of reliability, availability, manageability, and high performance that you wouldexpect from a storage area network. All file shares are online on all nodes simultaneously. File sharesassociated with this type of clustered file server are called scale-out file shares. This is sometimes referred toas active-active.

Page 137: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

QUESTION 8Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have theFailover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.

Cluster1 hosts an application named App1.

You need to ensure that Server2 handles all of the client requests to the cluster for Appl. The solution mustensure that if Server2 fails, Server1 becomes the active node for App1.

What should you configure?

A. Affinity - None

B. Affinity - Single

C. The cluster quorum settings

D. The failover settings

E. A file server for general u

F. The Handling priority

G. The host priority

H. Live migration

I. The possible owner

J. The preferred owner

K. Quick migration

L. The Scale-Out File Server

Correct Answer: JSection: (none)Explanation

Explanation/Reference:Explanation/Reference:http://blogs.msdn.com/b/clustering/archive/2008/10/14/9000092.aspx The preferred owner in a 2 server clusterwill always be the active node unless it is down.

QUESTION 9Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-Vserver role installed.Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

Page 138: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to configure VM4 to track the CPU, Memory, and network usage.

What should you configure?

A. NUMA topology

B. Resource control

C. Resource Metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:Metrics collected for each virtual machine using resource metering:· Average CPU usage, measured in megahertz over a period of time.· Average physical memory usage, measured in megabytes.· Minimum memory usage (lowest amount of physical memory). · Maximum memory usage (highest amount ofphysical memory). · Maximum amount of disk space allocated to a virtual machine. · Total incoming networktraffic, measured in megabytes, for a virtual network adapter.· Total outgoing network traffic, measured in megabytes, for a virtual network adapter

QUESTION 10Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-Vserver role installed.Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

Page 139: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs onServer1 are under a heavy load.

What should you configure?

A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:B. Resource controls provide you with several ways to control the way that Hyper-V allocates resources tovirtual machine. Resource control in used in the event where you need to adjust the computing resources of avirtual machine, you can reconfigure the resources to meet the changing needs. You can also specify resourcecontrols to automate how resources are allocated to virtual machines.Incorrect answers:A: NUMA spanning is a processor setting that works by projecting a virtual NUMA topology to the guestoperating system in a way that is optimized to match the NUMA topology of the underlying physical hostmachine. The effect is to provide virtual machines with additional computing resources for high-performanceserver applications such as Microsoft SQL Server and modern server operating systems such as WindowsServer 2012 that include built-in NUMA optimizations.C: Resource metering includes:· Average CPU usage, measured in megahertz over a period of time.· Average physical memory usage, measured in megabytes.· Minimum memory usage (lowest amount of physical memory). · Maximum memory usage (highest amount ofphysical memory). · Maximum amount of disk space allocated to a virtual machine. · Total incoming networktraffic, measured in megabytes, for a virtual network adapter.· Total outgoing network traffic, measured in megabytes, for a virtual network adapter· D: Virtual Machine Chimney or TCP Chimney Offload as it is also known, transfers Transmission ControlProtocol (TCP) traffic processing, such as packet segmentation and reassembly processing tasks, from a

Page 140: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

computer's CPU to a network adapter that supports TCP Chimney Offload. Moving TCP/IP processing from theCPU to the network adapter can free the CPU to perform more application-level functions. TCP ChimneyOffload can offload the processing for both TCP/IPv4 and TCP/IPv6 connections if supported by the networkadapter.E: VLAN ID is used to specify a segment of the VLAN or isolate network traffic for the virtual network adapter.F: Processor settings is used to configure the number of virtual processors that the virtual machine uses,enable processor compatibility to allow live migrations to hosts having a different processor architecture, orconfigure the NUMA topology on a NUMA-capable host. G. Configure the BIOS of the computer to enable PXEboot, and set the boot order so that it is booting from the network is first.H: Automatic start action allows you to specify what the virtual machine should do when the host machine bootsup. The options you can choose from are to automatically start the virtual machine if it was running when theVMM service on the host stopped (the default), to always start the virtual machine automatically, or to donothing. You can also specify a startup delay in seconds to reduce resource content between different virtualmachines starting up on the host.I: Integration Services settings on virtual machines include services such as operating system shutdown, timesynchronization, data exchange, Heartbeat, and Backup (volume snapshot services.J: With Hyper-V Virtual Switch port mirroring you can monitor network traffic not modify the startup order.K: Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine tomaximize network throughput while minimizing network latency and the CPU overhead required for processingnetwork traffic.References:http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831410.aspx http://technet.microsoft.com/en-us/library/cc742470.aspx Exam Ref 70-410, Installing andConfiguring Windows Server 2012, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtualmachine settings, p. 144 Training Guide: Installing and Configuring Windows Server 2012: Chapter 7: Hyper-VVirtualization, Lesson 2: Deploying and configuring virtual machines, p. 335

QUESTION 11Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-Vserver role installed.Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

You install Windows Server 2012 on VM2 by using Windows Deployment Services (WDS).

You need to ensure that the next time. VM2 restarts, you can connect to the WDS server by using PXE.

What should you configure?

A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

Page 141: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Correct Answer: GSection: (none)Explanation

Explanation/Reference:Explanation:G. Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from thenetwork is first.

Incorrect answers:A: NUMA spanning is a processor setting that works by projecting a virtual NUMA topology to the guestoperating system in a way that is optimized to match the NUMA topology of the underlying physical hostmachine. The effect is to provide virtual machines with additional computing resources for high-performanceserver applications such as Microsoft SQL Server and modern server operating systems such as WindowsServer 2012 that include built-in NUMA optimizations.B: Resource control in used in the event where you need to adjust the computing resources of a virtualmachine, you can reconfigure the resources to meet the changing needs. You can also specify resourcecontrols to automate how resources are allocated to virtual machines.C: Resource metering includes:· Average CPU usage, measured in megahertz over a period of time.· Average physical memory usage, measured in megabytes.· Minimum memory usage (lowest amount of physical memory). · Maximum memory usage (highest amount ofphysical memory). · Maximum amount of disk space allocated to a virtual machine. · Total incoming networktraffic, measured in megabytes, for a virtual network adapter.· Total outgoing network traffic, measured in megabytes, for a virtual network adapter· D: Virtual Machine Chimney or TCP Chimney Offload as it is also known, transfers Transmission ControlProtocol (TCP) traffic processing, such as packet segmentation and reassembly processing tasks, from acomputer's CPU to a network adapter that supports TCP Chimney Offload. Moving TCP/IP processing from theCPU to the network adapter can free the CPU to perform more application-level functions. TCP ChimneyOffload can offload the processing for both TCP/IPv4 and TCP/IPv6 connections if supported by the networkadapter.E: VLAN ID is used to specify a segment of the VLAN or isolate network traffic for the virtual network adapter.F: Processor settings is used to configure the number of virtual processors that the virtual machine uses,enable processor compatibility to allow live migrations to hosts having a different processor architecture, orconfigure the NUMA topology on a NUMA-capable host.H: Automatic start action allows you to specify what the virtual machine should do when the host machine bootsup. The options you can choose from are to automatically start the virtual machine if it was running when theVMM service on the host stopped (the default), to always start the virtual machine automatically, or to donothing. You can also specify a startup delay in seconds to reduce resource content between different virtualmachines starting up on the host.I: Integration Services settings on virtual machines include services such as operating system shutdown, timesynchronization, data exchange, Heartbeat, and Backup (volume snapshot services.J: With Hyper-V Virtual Switch port mirroring you can monitor network traffic not modify the startup order.K: Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine tomaximize network throughput while minimizing network latency and the CPU overhead required for processingnetwork traffic.

References:http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx Exam Ref 70-410, Installing andConfiguring Windows Server 2012, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual

Page 142: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

machine settings, p. 144 Training Guide: Installing and Configuring Windows Server 2012: Chapter 7: Hyper-VVirtualization, Lesson 2: Deploying and configuring virtual machines, p. 335

QUESTION 12Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-Vserver role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in thefollowing table.

You install Windows Server 2012 on VM2 by using Windows Deployment Services (WDS).

You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE.

Which virtual machine setting should you configure for VM2?

A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Correct Answer: GSection: (none)Explanation

Explanation/Reference:Explanation:G. Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from thenetwork is first.

Incorrect answers:A: NUMA spanning is a processor setting that works by projecting a virtual NUMA topology to the guestoperating system in a way that is optimized to match the NUMA topology of the underlying physical hostmachine. The effect is to provide virtual machines with additional computing resources for high-performanceserver applications such as Microsoft SQL Server and modern server operating systems such as Windows

Page 143: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Server 2012 that include built-in NUMA optimizations.B: Resource control in used in the event where you need to adjust the computing resources of a virtualmachine, you can reconfigure the resources to meet the changing needs. You can also specify resourcecontrols to automate how resources are allocated to virtual machines.C: Resource metering includes:· Average CPU usage, measured in megahertz over a period of time.· Average physical memory usage, measured in megabytes.· Minimum memory usage (lowest amount of physical memory). · Maximum memory usage (highest amount ofphysical memory). · Maximum amount of disk space allocated to a virtual machine. · Total incoming networktraffic, measured in megabytes, for a virtual network adapter.· Total outgoing network traffic, measured in megabytes, for a virtual network adapter· D: Virtual Machine Chimney or TCP Chimney Offload as it is also known, transfers Transmission ControlProtocol (TCP) traffic processing, such as packet segmentation and reassembly processing tasks, from acomputer's CPU to a network adapter that supports TCP Chimney Offload. Moving TCP/IP processing from theCPU to the network adapter can free the CPU to perform more application-level functions. TCP ChimneyOffload can offload the processing for both TCP/IPv4 and TCP/IPv6 connections if supported by the networkadapter.E: VLAN ID is used to specify a segment of the VLAN or isolate network traffic for the virtual network adapter.F: Processor settings is used to configure the number of virtual processors that the virtual machine uses,enable processor compatibility to allow live migrations to hosts having a different processor architecture, orconfigure the NUMA topology on a NUMA-capable host.H: Automatic start action allows you to specify what the virtual machine should do when the host machine bootsup. The options you can choose from are to automatically start the virtual machine if it was running when theVMM service on the host stopped (the default), to always start the virtual machine automatically, or to donothing. You can also specify a startup delay in seconds to reduce resource content between different virtualmachines starting up on the host.I: Integration Services settings on virtual machines include services such as operating system shutdown, timesynchronization, data exchange, Heartbeat, and Backup (volume snapshot services.J: With Hyper-V Virtual Switch port mirroring you can monitor network traffic not modify the startup order.K: Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine tomaximize network throughput while minimizing network latency and the CPU overhead required for processingnetwork traffic.

References:http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx Exam Ref 70-410, Installing andConfiguring Windows Server 2012, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtualmachine settings, p. 144 Training Guide: Installing and Configuring Windows Server 2012: Chapter 7: Hyper-VVirtualization, Lesson 2: Deploying and configuring virtual machines, p. 335

Page 144: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

C- New Questions (Not Accurate Answers)

QUESTION 1You have a server named Server1 that runs Windows Server 2012 R2.

You discover that the performance of Server1 is poor.

The results of a performance report generated on Server1 are shown in the following table.

You need to identify the cause of the performance issue.

What should you identify?

A. Non-uniform memory access (NUMA)

B. Excessive paging

C. Driver malfunction

D. Insufficient RAM

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation/Reference:

Non-uniform memory access (NUMA) is a computer memory design used in multiprocessing, where thememory access time depends on the memory location relative to the processor. Under NUMA, aprocessor can access its own local memory faster than non-local memory (memory local to anotherprocessor or memory shared between processors). The benefits of NUMA are limited to particularworkloads, notably on servers where the data are often associated strongly with certain tasks or users.[1]

*NUMA architectures logically follow in scaling from symmetric multiprocessing (SMP) architectures.*System designers use non-uniform memory access (NUMA) to increase processor speed without

Page 145: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

increasing the load on the processor bus.

Processor: %DPC Time. Much like the other values, this counter shows the amount of time that the processorspends servicing DPC requests.DPC requests are more often than not associated with the network interface. Processor: % Interrupt Time. Thisis the percentage of time that the processor is spending on handling Interrupts. Generally, if this value exceeds50% of the processor time you may have a hardware issue. Some components on the computer can force thisissue and not really be a problem. For example a programmable I/O card like an old disk controller card, cantake up to 40% of the CPU time. A NIC on a busy IIS server can likewise generate a large percentage ofprocessor activity.Processor: % User Time. The value of this counter helps to determine the kind of processing that is affectingthe system. Of course the resulting value is the total amount of non-idle time that was spent on User modeoperations. This generally means application code. Processor: %Privilege Time. This is the amount of time theprocessor was busy with Kernel mode operations. If the processor is very busy and this mode is high, it isusually an indication of some type of NT service having difficulty, although user mode programs can make callsto the Kernel mode NT components to occasionally cause this type of performance issue. Memory: Pages/sacThis value is often confused with Page Faults/sec. The Pages/sec counter is a combination of Pages Input/secand Pages Output/sec counters. Recall that Page Faults/sec is a combination of hard page faults and soft pagefaults. This counter, however, is a general indicator of how often the system is using the hard drive to store orretrieve memory associated data.http://technet.microsoft.com/en-us/library/cc768048.aspx

QUESTION 2Your company deploys a new Active Directory forest named contoso.com. The first domain controller in theforest runs Windows Server 2012 R2. The forest contains a domain controller named DC10.

On DC10, the disk that contains the SYSVOL folder fails.

You replace the failed disk. You stop the Distributed File System (DFS) Replication service.You restore the SYSVOL folder.

You need to perform a non-authoritative synchronization of SYSVOL on DC10.

Which tool should you use before you start the DFS Replication service on DC10?

A. Ultra Sound

B. Dfsgui.msc

C. Adsiedit.msc

D. Frsutil

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 3Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC5. DC5 has a Server Core Installation of Windows Server 2012 R2.

You need to uninstall Active Directory from DCS manually.Which tool should you use?

A. The Remove-AD Computer cmdlet

B. ntdsutil.exe

C. dsamain.exe

D. The Remove-Windows Feature cmdlet

Page 146: Microsoft.actualtests.70 417.v2014!05!24.by.gracE.148q (1)

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 4Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1. Server1 runs Windows Server 2012 R2.

You need to create 3-TB virtual hard disk (VHD) on Server1.

Which tool should you use?

A. File Server Resource Manager

B. Shared and Storage Management

C. New Storage Pool

D. Disk Part

Correct Answer: BSection: (none)Explanation

Explanation/Reference: