aiotestking uk

70-417 Exam Questions - Online Test


70-417 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 has 8 GB of RAM. 

Server1 hosts five virtual machines that run Windows Server 2012 R2. 

The settings of a virtual machine named Server3 are configured as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that when Server1 restarts, Server3 automatically resumes without intervention. The solution must prevent data loss. 

Which settings should you modify? 

A. BIOS 

B. Automatic Stop Action 

C. Automatic Start Action 

D. Integration Services 

Answer:

Explanation: The Automatic Stop Action setting should be modified because it will allow you to configure: “Save the virtual machine state” option instructs Hyper-V Virtual Machine Management Service to save the virtual machine state on the local disk when the Hyper-V Server shuts down. OR “Turn Off the virtual machine” is used by the Hyper-V Management Service (VMMS.exe) to gracefully turn off the virtual machine. 

OR “Shut down the guest operating system” is successful only if the “Hyper-V Shutdown” guest service is running in the virtual machine. The guest service is required to be running in the virtual machine as the Hyper-V VMMS.EXE process will trigger Windows Exit message which is received by the service. Once the message is received by the guest service, it takes the necessary actions to shut down the virtual machine. 

References: http://www.altaro.com/hyper-v/hyper-v-automatic-start-and-stop-action/ 

Q2. Your company's security policy states that all of the servers deployed to a branch office must not have the graphical user interface (GUI) installed. In a branch office, a support technician installs a server with a GUI installation of Windows Server 2012 R2 on a new server, and then configures the server as a DHCP server. 

You need to ensure that the new server meets the security policy. You want to achieve this goal by using the minimum amount of administrative effort. 

What should you do? 

A. From Server Manager, uninstall the User Interfaces and Infrastructure feature. 

B. Reinstall Windows Server 2012 R2on the server. 

C. From Windows PowerShell, run Uninstall-WindowsFeature Desktop-Experience. 

D. From Windows PowerShell, run Uninstall-WindowsFeature PowerShell-ISE. 

Answer:

Q3. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has the Remote Access server role installed. 

DirectAccess is implemented on Server1 by using the default configuration. 

You discover that DirectAccess clients do not use DirectAccess when accessing websites on the Internet. 

You need to ensure that DirectAccess clients access all Internet websites by using their DirectAccess connection. 

What should you do? 

A. Configure a DNS suffix search list on the DirectAccess clients. 

B. Enable the Route all traffic through the internal network policy setting in the DirectAccess Server Settings Group Policy object (GPO). 

C. Configure DirectAccess to enable force tunneling. 

D. Disable the DirectAccess Passive Mode policy setting in the DirectAccess Client Settings Group Policy object (GPO). 

Answer:

Q4. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

Cluster1 hosts an application named App1. 

You need to ensure that Server2 handles all of the client requests to the cluster for App1. The solution must ensure that if Server2 fails, Server1 becomes the active node for App1. 

What should you configure? 

A. Affinity - None 

B. Affinity - Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general u 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

The preferred owner in a 2 server cluster will always be the active node unless it is down. http:// www.sqlservercentral.com/Forums/Topic1174454-146-1.aspx#bm1174835 Difference between possible owners and preferred owners Possible owners are defined at the resource level and dictate which nodes in the Windows cluster are able to service this resource For instance, you have a 3 node cluster with Node A, Node B and Node C. You have a clustered disk resource "MyClusteredDisk", if you remove Node C from the possible owners of the clustered disk resource "MyClusteredDisk" then this disk will never be failed over to Node C. Preferred owners are defined at the resource group level and define the preferred node ownership within the Windows cluster For instance, you have a 3 node cluster with Node A, Node B and Node C. You have a cluster resource group "MyClusteredGroup" which contains various disk, IP, network name and service resources. Nodes A, B and C are all possible owners but Node B is set as the preferred owner and is currently the active node. The resource group fails over to Node C as Node B stops responding on the Public network due to a failed NIC. In the Resource group properties on the failback tab you have this set to immediate. You fix the NIC issue on Node B and bring it back up on the network. The resource group currently active on Node C will without warning immediately attempt to failback to Node B. Not a good idea if this is a Production SQL Server instance, so use caution when configuring preferred owners and failback http://support.microsoft.com/kb/299631/en-us Failover behavior on clusters of three or more nodes This article documents the logic by which groups fail from one node to another when there are 3 or more cluster node members. The movement of a group can be caused by an administrator who manually moves a group or by a node or resource failure. Where the group moves depends on how the move is initiated and whether the Preferred Owner list is set. 

Q5. Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

On a server named Corel, you perform a Server Core Installation of Windows Server 2012 R2. You join Corel to the adatum.com domain. 

You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1. 

What should you do on Core1? 

A. Run the Enable-NetFirewallRulecmdlet. 

B. Run the Disable-NetFirewallRulecmdlet. 

C. Install Remote Server Administration Tools (RSAT). 

D. Install Windows Management Framework. 

Answer:

Q6. Is the following statement about Hyper-V true or false? Hyper-V does not support wireless networks. 

A. True 

B. False 

Answer:

Explanation: 

Hyper-V 2012 supports wireless (one of my VM is currently connected to internet using the wifi card of my laptop...) True that in 2008R2 it was not supported (unless many customizations, i know it as i did it) 

Q7. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

On all of the domain controllers, Windows is installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\. 

All of the domain controllers have a third-party application installed. 

The operating system fails to recognize that the application is compatible with domain controller cloning. 

You verify with the application vendor that the application supports domain controller cloning. 

You need to prepare a domain controller for cloning. 

What should you do? 

A. In C:\Windows\, create an XML file named DCCIoneConfig.xml and add the application information to the file. 

B. In the root of a USB flash drive, add the application information to an XML file named DefaultDCCIoneAllowList.xml. 

C. In D:\Windows\NTDS\, create an XML file named DCCIoneConfig.xml and add the application information to the file. 

D. In D:\Windows\NTDS\, create an XML file named CustomDCCIoneAllowList.xml and add the application information to the file. 

Answer:

Explanation: 

http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domainservices-in-windows-server-2012-part-13-domain-controller-cloning.aspx Place the CustomDCCloneAllowList.xml file in the same folder as the Active Directory database (ntds.dit) on the source Domain Controller. 

Q8. OTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Federation Services server role installed. 

You need to make configuration changes to the Windows Token-based Agent role service. 

Which tool should you use? 

To answer, select the appropriate tool in the answer area. 

Answer:  

Q9. You have a server named Server1 that runs Windows Server 2012 R2. You create a custom Data Collector Set (DCS) named DCS1. 

You need to configure DCS1 to meet the following requirements: 

. Automatically run a program when the amount of total free disk space on Server1 drops below 10 percent of capacity. . Log the current values of several registry settings. 

Which two should you configure in DCS1? (Each correct answer presents part of the solution. Choose two.) 

A. Event trace data 

B. A Performance Counter Alert 

C. System configuration information 

D. A performance counter 

Answer: B,C 

Explanation: 

Automatically run a program when the amount of total free disk space on Server1 drops 

below 10 percent of capacity. 

You can also configure alerts to start applications and performance logs 

Log the current values of several registry settings. 

System configuration information allows you to record the state of, and changes to, registry 

keys. 

Total free disk space 

Registry settings 

Run a program on alert http: //technet. microsoft. com/en-us/library/cc766404. aspx 

Q10. Your network contains two Active Directory forests named contoso.com and adatum.com. 

Each forest contains one domain. Contoso.com has a two-way forest trust to adatum.com. 

Selective authentication is enabled on the forest trust. 

Contoso contains 10 servers that have the File Server role service installed. 

Users successfully access shared folders on the file servers by using permissions granted 

to the Authenticated Users group. 

You migrate the file servers to adatum.com. 

Contoso users report that after the migration, they are unable to access shared folders on 

the file servers. 

You need to ensure that the Contoso users can access the shared folders on the file 

servers. 

What should you do? 

A. Disable selective authentication on the existing forest trust 

B. Disable SID filtering on the existing forest trust 

C. Run netdom and specify the /quarantine attribute 

D. Replace the existing forest trust with an external trust. 

Answer: