aiotestking uk

70-417 Exam Questions - Online Test


70-417 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. OTSPOT 

You have a server named Server1 that has the Web Server (IIS) server role installed. You obtain a Web Server certificate. 

You need to configure a website on Server1 to use Secure Sockets Layer (SSL). To which store should you import the certificate? 

To answer, select the appropriate store in the answer area. 

Answer:  

Q2. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. The domain contains a standalone server named Server2 that is located in a perimeter network. Both servers run the default installation of Windows Server 2012 R2. 

You need to manage Server2 remotely from Server1. 

What should you do? 

A. From Server1, run the Enable-PsRemotingcmdlet. 

B. From Server2, run the winrm command. 

C. From Server2/ run the Enable-PsRemotingcmdlet. 

D. From Server1, run the winrm command. 

Answer:

Q3. You have a DNS server named DNS1 that runs Windows Server 2012 R2. 

On DNS1, you create a standard primary DNS zone named adatum.com. 

You need to change the frequency that secondary name servers will replicate the zone 

from DNS1. 

Which type of DNS record should you modify? 

A. Name server (NS) 

B. Start of authority (SOA) 

C. Host information (HINFO) 

D. Service location (SRV) 

Answer:

Explanation: 

The time to live is specified in the Start of Authority (SOA) record Note: TTL (time to live) - The number of seconds a domain name is cached locally before expiration and return to authoritative nameservers for updated information. 

Q4. OTSPOT 

You deploy a Server with a GUI installation of Windows Server 2012 R2 Datacenter. 

From Windows PowerShell, you run the following command: 

Remove-WindowsFeature Server-Gui-Shell. 

In the table below, identify which tools are available on Server1 and which tools are 

unavailable on Server1. 

Make only one selection in each row. Each correct selection is worth one point. 

Answer:  

Q5. You have a server named Server1. 

You install the IP Address Management (IPAM) Server feature on Server1. 

You need to provide a user named User1 with the ability to set the access scope of all the DHCP servers that are managed by IPAM. The solution must use the principle of least privilege. 

Which user role should you assign to User1? 

A. IP Address Record Administrator Role 

B. IPAM Administrator Role 

C. IPAM MSM Administrator Role 

D. IPAM DHCP Scope Administrator Role 

Answer:

Explanation: IPAM ASM Administrators IPAM ASM Administrators is a local security group on an IPAM server that is created when you install the IPAM feature. Members of this group have all the privileges of the IPAM Users security group, and can perform IP address space tasks in addition to IPAM common management tasks. Note: When you install IPAM Server, the following local role-based IPAM security groups are created: IPAM Users IPAM MSM Administrators IPAM ASM Administrators IPAM IP Audit Administrators IPAM Administrators 

Q6. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. 

You log on to Server1. 

You need to retrieve the IP configurations of Server2. 

Which command should you run from Server1? 

A. winrm get server2 

B. dsquery . -scope base -attrip/server2 

C. winrs -r:server2ipconfig 

D. ipconfig> server2.ip 

Answer:

Explanation: 

Windows Remote Management allows you to manage and execute programs remotely References: Exam Ref 70-410: Installing and Configuring Windows Server 2012: Objective 4.3: Deploy and Configure the DNS service, Chapter 4 Deploying and Configuring core network services, p. 246 http://technet.microsoft.com/en-us/library/dd349801(v=ws.10).aspx 

Q7. RAG DROP 

Your network contains four servers that run Windows Server 2012 R2. 

Each server has the Failover Clustering feature installed. Each server has three network 

adapters installed. An iSCSI SAN is available on the network. 

You create a failover cluster named Cluster1. You add the servers to the cluster. 

You plan to configure the network settings of each server node as shown in the following 

table. 

You need to configure the network settings for Cluster1. 

What should you do? 

To answer, drag the appropriate network communication setting to the correct cluster network or networks. Each network communication setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q8. You have a server named Server1. 

You install the IP Address Management (IPAM) Server feature on Server1. 

You need to provide a user named User1 with the ability to set the access scope of all the DHCP servers that are managed by IPAM. The solution must use the principle of least privilege. 

Which user role should you assign to User1? 

A. IP Address Record Administrator Role 

B. IPAM Administrator Role 

C. IPAM MSM Administrator Role 

D. IPAM DHCP Scope Administrator Role 

Answer:

Explanation: 

Explanation IPAM ASM Administrators IPAM ASM Administrators is a local security group on an IPAM server that is created when you install the IPAM feature. Members of this group have all the privileges of the IPAM Users security group, and can perform IP address space tasks in addition to IPAM common management tasks. Note: When you install IPAM Server, the following local role-based IPAM security groups are created: IPAM Users IPAM MSM Administrators IPAM ASM Administrators IPAM IP Audit Administrators IPAM Administrators Incorrect: not B: Too much privileges. IPAM Administrators IPAM Administrators is a local security group on an IPAM server that is created when you install the IPAM feature. Members of this group have privileges to view all IPAM data and perform all IPAM tasks. 

Q9. Complete the missing word from the sentence below that is describing one of the new roles in Server 2008: 

By using__________ , you can augment an organization's security strategy by protecting information through persistent usage policies, which remain with the information, no matter where it is moved. 

A. AD FS 

B. AD RMS 

C. RODC 

D. AD LDS 

Answer:

Explanation: 

Active Directory Rights Management Services (AD RMS) 

Q10. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 has the Remote Access server role installed. 

You log on to Server1 by using a user account named User2. 

From the Remote Access Management Console, you run the Getting Started Wizard and you receive a warning message as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can configure DirectAccess successfully. The solution must minimize the number of permissions assigned to User2. 

To which group should you add User2? 

A. Account Operators 

B. Enterprise Admins 

C. Domain Admins 

D. Server Operators 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/hh918408.aspx#feedback