aiotestking uk

70-417 Exam Questions - Online Test


70-417 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. You have a VHD that contains an image of Windows Server 2012 R2. You plan to Apply updates to the image. 

You need to ensure that only updates that can install without requiring a restart are installed. 

Which DISM option should you use? 

A. /Apply-Unattend 

B. /Add-ProvisionedAppxPackage 

C. /PreventPending 

D. /Cleanup-Image 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/hh825265.aspx 

Q2. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2. 

The domain contains two domain controllers. The domain controllers are configured as shown in the following table. 

Active Directory Recycle Bin is enabled. 

You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago. 

You need to restore the membership of Group1. 

What should you do? 

A. Perform an authoritative restore. 

B. Perform a non-authoritative restore. 

C. Recover the items by using Active Directory Recycle Bin. 

D. Apply a virtual machine snapshot to VM1. 

Answer:

Explanation: 

Authoritative restore allows the administrator to recover a domain controller, restore it to a specific point in time, and mark objects in Active Directory as being authoritative with respect to their replication partners. For example, you might need to perform an authoritative restore if an administrator inadvertently deletes an organizational unit containing a large number of users. If you restore the server from tape, the normal replication process would not restore the inadvertently deleted organizational unit. Authoritative restore allows you to mark the organizational unit as authoritative and force the replication process to restore it to all of the other domain controllers in the domain. Incorrect: Not C: A nonauthoritative restore returns the domain controller to its state at the time of backup and then allows normal replication to overwrite that state with any changes that occurred after the backup was taken. After you restore the system state, the domain controller queries its replication partners. The replication partners replicate any changes to the restored domain controller, ensuring that the domain controller has an accurate and updated copy of the Active Directory database. 

Reference: Performing an Authoritative Restore 

What should you do? 

A. Export and import data by using Dsamain. 

B. Apply a virtual machine snapshot to VM1. 

C. Recover the items by using Active Directory Recycle Bin. 

D. Modify the isRecycled attribute of Group1. Answer: A 

Q3. Your network contains multiple subnets. On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2. 

You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com. You need to ensure that client computers can resolve IP addresses to host names. 

What should you do first? 

A. Create a GlobalNames zone 

B. Convert the contoso.com zone to an Active Directory-integrated zone 

C. Configure dynamic updates for contoso.com 

D. Create a reverse lookup zone 

Answer:

Q4. Your network contains two servers named Server 1 and Server 2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed. Server 1 and Server 2 are located in different offices. The offices connect to each other by using a high-latency WAN link. 

Server 1 hosts a virtual machine named VM1. 

You need to ensure that you can start VM1 on Server 2 if Server 1 fails. The solution must minimize hardware costs. 

What should you do? 

A. From the Hyper-V Settings of Server2, modify the Replication Configuration settings. Enable replication for VM1. 

B. on Server 1, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1. 

C. on Server2, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1. 

D. From the Hyper-V Settings of Server1, modify the Replication Configuration settings. Enable replication for Vml. 

Answer:

Q5. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled. 

You install the DHCP server role on a virtual machine named Server1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope. 

You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1. 

You need to ensure that the virtual machines can use Server1 as a DHCP server. 

What should you do? 

A. Enable MAC address spoofing on Server1. 

B. Enable single-root I/O visualization (SR-IOV) on Server1. 

C. Disable the DHCP guard on Server1. 

D. Disable the DHCP guard on all of the virtual machines that are DHCP clients. 

Answer:

Explanation: DHCP guard setting This setting stops the virtual machine from making DHCP offers over this network interface. To be clear – this does not affect the ability to receive a DHCP offer (i.e. if you need to use DHCP to acquire an IP address that will work) it only blocks the ability for the virtual machine to act as a DHCP server. 

Q6. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 has the Remote Desktop Session Host role service installed. The computer account of Server1 resides in an organizational unit (OU) named OU1. 

You create and link a Group Policy object (GPO) named GPO1 to OU1. GPO1 is configured as shown in the exhibit. (Click the Exhibit button.) 

You need to prevent GPO1 from applying to your user account when you log on to Server1. GPO1 must apply to every other user who logs on to Server1. 

What should you configure? 

A. Item-level targeting 

B. Security Filtering 

C. Block Inheritance 

D. WMI Filtering 

Answer:

Explanation: Security filtering is a way of refining which users and computers will receive and apply the settings in a Group Policy object (GPO). Using security filtering, you can specify that only certain security principals within a container where the GPO is linked apply the GPO. Security group filtering determines whether the GPO as a whole applies to groups, users, or computers; it cannot be used selectively on different settings within a GPO. 

Q7. Your manager has asked you to create various user objects using Windows PowerShell. Which of the following must you do to accomplish this? 

A. Use the Create-User createUsert 

B. Use the objUser = new OUUser statement 

C. Use the AddUser method of ADSL 

D. Invoke the Create method of OU 

Answer:

Explanation: 

http://www.mysmallcorneroftheweb.co.uk/programming-softwaredevelopement/powershellcreatingconfiguring-a-active-directory-user The user is created by first defining the OU and then invoking the ou Create method. 

Q8. OTSPOT 

The settings for a virtual machine named VM2 are configured as shown in the VM2 exhibit.(Click the Exhibit button.) 

The settings for Disk1.vhdx are configured as shown in the Disk1.vhdx exhibit. (Click the Exhibit button.) 

The settings for Disk2.vhdx are configured as shown in the Disk2.vhdx exhibit.(Click the Exhibit button.) 

Select Yes if the statement can be shown to be true based on the available information; otherwise select No.Each correct selection is worth one point. 

Answer:  

Q9. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

Client computers run either Windows 7 or Windows 8. All of the client computers have an application named App1 installed. 

The domain contains a Group Policy object (GPO) named GPO1 that is applied to all of the client computers. 

You need to add a system variable named App1Data to all of the client computers. 

Which Group Policy preference should you configure? 

A. Ini Files 

B. Data Sources 

C. Services 

D. Environment 

Answer:

Explanation: Environment Variable preference items allow you to create, update, replace, and delete user and system environment variables or semicolon-delimited segments of the PATH variable. 

Note: Creating an Environment Variable item To create a new Environment Variable preference item 

. Open the.Group Policy Management Console.. Right-click the Group Policy object (GPO) that should contain the new preference item, and then click.Edit.. . In the console tree under.Computer Configuration.or.User Configuration., expand the.Preferences.folder, and then expand the.Windows Settings.folder. 

. Right-click the.Environment.node, point to.New., and select.Environment Variable.. . In the.New Environment Variable Properties.dialog box, select an.Action.for Group 

Policy to perform. (For more information, see "Actions" in this topic.) . Enter environment variable settings for Group Policy to configure or remove. . Click the.Common.tab, configure any options, and then type your comments in 

the.Description.box. 

. Click.OK.. The new preference item appears in the details pane. 

Reference: Configure an Environment Variable Item 

Q10. Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

You create a group Managed Service Account named gservice1. 

You need to configure a service named service1 to run as the gservice1 account. 

How should you configure service1? 

A. From Services Console configure the recovery settings 

B. From a command prompt ,run sc.exe and specify the config parameter 

C. From Windows PowerShell,run Set-Service and specify the -PassThrough parameter 

D. From a command prompt ,run sc.exe and specify the sdset parameter 

Answer:

Explanation: 

Executing the sc.exe command with the config parameter will modify service configuration.