aiotestking uk

70-417 Exam Questions - Online Test


70-417 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that runs Windows Server 2012 R2. 

On Server1, you create a work folder named Work1. A user named User1 connects to Work1 from a computer named Computer1. 

You need to identify the last time the documents in Work1 were synchronized successfully from Computer1. What should you do? 

A. From Windows PowerShell, run the Get-SyncShare cmdlet 

B. From Windows PowerShell, run the Get-SyncUserSettings cmdlet 

C. From Server Manager, review the properties of Computer1 

D. From Server Manager, review the properties of User1 

Answer:

Q2. Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2. You need to create a custom Active Directory Application partition. 

Which tool should you use? 

A. Netdom 

B. Ntdsutil 

C. Dsmod 

D. Dsamain 

Answer:

Explanation: 

*

 To create or delete an application directory partition Open Command Prompt. Type:ntdsutil At the ntdsutil command prompt, type:domain management At the domain management command prompt, type:connection At the server connections command prompt, type:connect to server ServerName At the server connections command prompt, type:quit At the domain management command prompt, do one of the following: 

*

 partition management Manages directory partitions for Active Directory Domain Services (AD DS) or Active Directory Lightweight Directory Services (AD LDS). This is a subcommand of Ntdsutil and Dsmgmt. Ntdsutil and Dsmgmt are command-line tools that are built into Windows Server 2008 and Windows Server 2008 R2. / partition management create nc %s1 %s2 Creates the application directory partition with distinguished name %s1, on the Active Directory domain controller or AD LDS instance with full DNS name %s2. If you specify "NULL" for %s2, this command uses the currently connected Active Directory domain controller. Use this command only with AD DS. For AD LDS, use create nc %s1 %s2 %s3. Note: 

*

 An application directory partition is a directory partition that is replicated only to specific domain controllers. A domain controller that participates in the replication of a particular application directory partition hosts a replica of that partition. 

Q3. Your network contains a single Active Directory domain named contoso.com. The domain contains a member server named Server1 that runs Windows Server 2012 R2. 

Server1 has the Windows Server Updates Services server role installed and is configured to download updates from the Microsoft Update servers. 

You need to ensure that Server1 downloads express installation files from the Microsoft Update servers. 

What should you do from the Update Services console? 

A. From the Products and Classifications options, configure the Products settings. 

B. From the Products and Classifications options, configure the Classifications settings. 

C. From the Update Files and Languages options, configure the Update Files settings. 

D. From the Automatic Approvals options, configure the Update Rules settings. 

Answer:

Q4. You have five servers that run Windows Server 2012 R2. The servers have the Failover Clustering feature installed. 

You deploy a new cluster named Cluster1. Cluster1 is configured as shown in the following table. 

Server1, Server2/ and Server3 are configured as the preferred owners of the cluster roles. Dynamic quorum management is disabled. 

You plan to perform hardware maintenance on Server3. 

You need to ensure that if the WAN link between Site1 and Site2 fails while you are performing maintenance on Server3, the cluster resource will remain available in Site1. 

What should you do? 

A. Remove the node vote for Server3. 

B. Enable DrainOnShutdown on Cluster1. 

C. Add a file share witness in Site1. 

D. Remove the node vote for Server4 and Server5. 

Answer:

Explanation: Exclude secondary site nodes. In general, do not give votes to WSFC (Windows Server Failover Clustering) nodes that reside at a secondary disaster recovery site. You do not want nodes in the secondary site to contribute to a decision to take the cluster offline when there is nothing wrong with the primary site. 

Q5. You have a server named SCI that runs a Server Core Installation of Windows Server 2012 

R2. 

Shadow copies are enabled on all volumes. 

You need to delete a specific shadow copy. The solution must minimize server downtime. 

Which tool should you use? 

A. Shadow 

B. Diskshadow 

C. Wbadmin 

D. Diskpart 

Answer:

Explanation: DiskShadow.exe is a tool that exposes the functionality offered by the 

Volume Shadow Copy Service (VSS). 

The diskshadow command delete shadows deletes shadow copies. 

Q6. Your network contains an Active Directory domain named contoso.com. The domain 

contains a domain controller named DC1 that runs Windows Server 2012 R2. 

You create an Active Directory snapshot of DC1 each day. 

You need to view the contents of an Active Directory snapshot from two days ago. 

What should you do first? 

A. Start the Volume Shadow Copy Service (VSS). 

B. Run the dsamain.exe command. 

C. Run the ntdsutil.exe command. 

D. Stop the Active Directory Domain Services (AD DS) service. 

Answer:

Explanation: 

Mounting an Active Directory snapshot 

Before connecting to the snapshot we need to mount it. By looking at the results of the List 

All command in step #8 above, identify the snapshot that you wish to mount, and note the 

number next to it. 

In order to mount an Active Directory snapshot follow these steps: 

Log on as a member of the Domain Admins group to one of your Windows Server 2008 

Domain Controllers. 

Open a Command Prompt window by clicking on the CMD shortcut in the Start menu, or by 

typing CMD and pressing Enter in the Run or Quick Search parts of the Start menu. 

Note: You must run NTDSUTIL from an elevated command prompt. To open an elevated 

command prompt, click Start, right-click Command Prompt, and then click Run as 

administrator. 

In the CMD window, type the following command: 

ntdsutil 

In the CMD window, type the following command: 

snapshot 

To view all available snapshots, in the CMD window, type the following command: 

list all The result should look like this: 

snapshot: List All 

1: 2008/10/25:03:14 {ec53ad62-8312-426f-8ad4-d47768351c9a} 

2: C: {15c6f880-cc5c-483b-86cf-8dc2d3449348} 

In this example we only have one snapshot available, one from 2008/10/25 at 03:14AM 

(yes, I write articles at this time…). We'll mount this one. 

In the CMD window, type the following command: 

mount 2 

The result should look like this: 

snapshot: mount 2 

Snapshot {15c6f880-cc5c-483b-86cf-8dc2d3449348} mounted as 

C:'$SNAP_200810250314_VOLUMEC$' 

Next, you can leave the NTDSUTIL running, or you can quit by typing quit 2 times. 

Note: Like the above command, the mounting process can also be run in one line. 

However, note that 

NTDSUTIL requires that the "list all" command be run in the same session that you mount 

the snapshot. So in order to mount the snapshot with a one-liner, you will need to run "list 

all" first. 

ntdsutil snapshot "list all" "mount 2" quit quit 

Note: You do not need to quit from the NTDSUTIL command, you can keep it open 

assuming that you'll probably want to unmount the snapshot right after working with it. 

Q7. RODC comes with a number of features that focus on heightened security with limited functionality to remote office users. 

Which of the following is (or are) feature(s) of RODC? 

A. All of these 

B. Filtered Attribute Sets 

C. Unidirectional Replication 

D. Read-only DNS 

Answer:

Q8. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DNS Server server role installed. 

The network contains client computers that run either Linux, Windows 7, or Windows 8. 

You have a zone named adatum.com as shown in the exhibit. (Click the Exhibit button.) 

You plan to configure Name Protection on all of the DHCP servers. 

You need to configure the adatum.com zone to support Name Protection. 

What should you do? 

A. Change the zone type. 

B. Sign the zone. 

C. Add a DNSKEY record. 

D. Configure Dynamic updates. 

Answer:

Q9. OTSPOT 

Your network contains an Active Directory domain named contoso.com. 

Technicians use Windows Deployment Services {WDS) to deploy Windows Server 2012 

R2. 

The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 

has the Hyper-V server role installed. 

You need to ensure that you can use WDS to deploy Windows Server 2012 R2 to a virtual machine named VM1. 

Which settings should you configure? 

To answer, select the appropriate settings in the answer area. 

Answer:  

Q10. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the IP Address Management (IPAM) Server feature installed. Server2 has the DHCP Server server role installed. A user named User1 is a member of the IPAM Users group on Server1. You need to ensure that User1 can use IPAM to modify the DHCP scopes on Server2. The solution must minimize the number of permissions assigned to User1. 

To which group should you add User1? 

A. IPAM ASM Administrators on Server1 

B. IPAMUG in Active Directory 

C. DHCP Administrators on Server2 

D. IPAM MSM Administrators on Server1 

Answer:

Explanation: 

Sever2 "DHCP Users" group membership is required to modify scopes on Server2 of course DHCP Administrators can proceed these tasks too. From the MSPress book "Upgrading your skills to MCSA Windows Server 2012 R2" IPAM Provisioning IPAM installation sets up various periodic data collection tasks to collect relevant data from managed DNS, DHCP, DC and NPS servers to enable address space management, multiserver management and monitoring and event catalog scenarios. All IPAM tasks launch under the Network Service account, which presents the local computer's credentials to remote servers. To accomplish this, administrators must enable read access and security permissions for the required resources over managed servers for the IPAM server's computer account. Further the relevant firewall ports need to be configured on these managed servers. IPAM Access Settings The following table provides a mapping of the IPAM functionality and managed server role type to access setting and FW rule required by IPAM periodic tasks 

IPAM Access Monitoring IPAM access monitoring tracks the provisioning state of the following statuses on the server roles, which are displayed in the details pane of the IPAM server inventory view