aiotestking uk

70-417 Exam Questions - Online Test


70-417 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Your network contains multiple subnets. On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2. 

You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com. You need to ensure that client computers can resolve IP addresses to host names. 

What should you do first? 

A. Create a GlobalNames zone 

B. Convert the contoso.com zone to an Active Directory-integrated zone 

C. Configure dynamic updates for contoso.com 

D. Create a reverse lookup zone 

Answer:

Q2. Your company deploys a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2. The forest contains a domain controller named DC10. 

On DC10, the disk that contains the SYSVOL folder fails. 

You replace the failed disk. You stop the Distributed File System (DFS) Replication service. You restore the SYSVOL folder. 

You need to perform a non-authoritative synchronization of SYSVOL on DC10. 

Which tool should you use before you start the DFS Replication service on DC10? 

A. Active Directory Sites and Services 

B. Ultrasound 

C. Adsiedit.msc 

D. Frsutil 

Answer:

Explanation: 

How to perform a non-authoritative synchronization of DFSR-replicated SYSVOL 

(like "D2" for FRS) 

1.

 In theADSIEDIT.MSC tool modify the following distinguished name (DN) value and attribute on each of the domain controllers that you want to make non-authoritative:CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=<the server name>,OU=Domain Controllers,DC=<domain>msDFSR-Enabled=FALSE 

2.

 Force Active Directory replication throughout the domain. Etc 

Q3. Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory Federation Services server role installed.Server2 is a file server. 

Your company introduces a Bring Your Own Device (BYOD) policy. 

You need to ensure that users can use a personal device to access domain resources by using Single Sign-On (SSO) while they are connected to the internal network. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Enable the Device Registration Service in Active Directory. 

B. Publish the Device Registration Service by using a Web Application Proxy. 

C. Configure Active Directory Federation Services (AD FS) for the Device Registration Service. 

D. Install the Work Folders role service on Server2. 

E. Create and configure a sync share on Server2. 

Answer: A,C 

Explanation: *Prepare your Active Directory forest to support devices This is a one-time operation that you must run to prepare your Active Directory forest to support devices. To prepare the Active Directory forest On your federation server, open a Windows PowerShell command window and type: Initialize-ADDeviceRegistration *Enable Device Registration Service on a federation server farm node To enable Device Registration Service 1.On your federation server, open a Windows PowerShell command window and type: Enable-AdfsDeviceRegistration 2.Repeat this step on each federation farm node in your AD FS farm. 

Q4. OTSPOT 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed. 

Server1 and Server2 have different processor models from the same manufacturer. 

On Server1, you plan to create a virtual machine named VM1. Eventually, VM1 will be exported to Server2. You need to ensure that when you import VM1 to Server2, you can start VM1 from saved 

snapshots. 

What should you configure on VM1? 

To answer, select the appropriate node in the answer area. 

Answer:  

Q5. You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. 

You need to add a graphical user interface (GUI) to Server1. 

Which tool should you use? 

A. The imagex.exe command 

B. The ocsetup.exe command 

C. The setup.exe command 

D. The dism.exe command 

Answer:

Explanation: The DISM command is called by the Add-WindowsFeature command. Here is the systax for DISM: Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:Server-Gui-Shell /featurename:Server-Gui-Mgmt 

Q6. OTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 does not have Internet connectivity. 

All roles are removed completely from Server1. 

You mount a Windows Server 2012 R2 installation image to the C:\Source folder. 

You need to install the DNS Server server role on Server1. 

Which folder should you use as the source? 

To answer, select the appropriate folder in the answer area. 

Answer:  

211. Your network contains an Active Directory domain named contoso.com. All domain 

controllers run Windows Server 2012 R2. 

DirectAccess is deployed to the network. 

Remote users connect to the DirectAccess server by using a variety of network speeds. 

The remote users report that sometimes their connection is very slow. 

You need to minimize Group Policy processing across all wireless wide area network 

(WWAN) connections. 

Which Group Policy setting should you configure? 

A. Configure Direct Access connections as a fast network connection. 

B. Change Group Policy processing to run asynchronously when a slow network connection is detected. 

C. Configure Group Policy slow link detection. 

D. Configure wireless policy processing. 

Q7. Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1. Server1 runs Windows Server 2012. 

You create a group Managed Service Account named gservice1. 

You need to configure a service named Service1 to run as the gservice1 account. 

How should you configure Service1? 

A. From the Services console, configure the General settings. 

B. From a command prompt, run sc.exe and specify the config parameter. 

C. From the Services console, configure the Log On settings. 

D. From a command prompt, run sc.exe and specify the privs parameter. 

Answer:

Explanation: 

To specify a binary path for the NEWSERVICE service, type: 

sc config NewService binpath= "ntsd -d c:\windows\system32\NewServ.exe" 

Reference: Sc config https://technet.microsoft.com/en-us/library/cc990290.aspx 

Q8. Your network contains an Active Directory domain named contoso.com. 

All user accounts reside in an organizational unit (OU) named OU1. 

All of the users in the marketing department are members of a group named Marketing. 

All of the users in the human resources department are members of a group named HR. 

You create a Group Policy object (GPO) named GPO1. 

You link GPO1 to OU1. 

You configure the Group Policy preferences of GPO1 to add two shortcuts named Link1 

and Link2 to the desktop of each user. 

You need to ensure that Link1 only appears on the desktop of the users in Marketing and 

that Link2 only appears on the desktop of the users in HR. 

What should you configure? 

A. Security Filtering 

B. WMI Filtering 

C. Group Policy Inheritance 

D. Item-level targeting 

Answer:

85. You have a laptop named Computer 1. Computer1 runs Windows 8 Enterprise. 

Computer1 has a wired network adapter and a wireless network adapter. Computer1 connects to a wireless network named Network1. 

For testing purposes, you install Windows Server 2012 R2 on Computer1 as a second operating system. You install the drivers for the wireless network adapter. 

You need to ensure that you can connect to Network1 from Windows Server 2012 R2. 

What should you do? 

A. From a local Group Policy object (GPO), configure the Wireless Network (IEEE 802.11) Policies settings. 

B. From Server Manager, install the Wireless LAN Service feature. 

C. Restart the WLAN AutoConfig service. 

D. From a local Group Policy object (GPO), configure the settings of Windows Connection Manager. 

Q9. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. 

The disks on Server1 are configured as shown in the exhibit. (Click the Exhibit button.) 

You create a virtual machine on Server1. 

You need to ensure that you can configure a pass-through disk for the virtual machine. 

What should you do? 

A. Convert Disk 1 to a GPT disk. 

B. Convert Disk 1 to a dynamic disk. 

C. Delete partition E. 

D. Take Disk 1 offline. 

Answer:

Explanation: 

NB: added the missing exhibit http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-inhyper- v.aspx Passthrough Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspective. Additionally, this raw piece of storage is not limited in size so, hypothetically, it can be a multi terabyte LUN. 

After storage is mapped to the Hyper-V server, it will appear as a raw volume and will be in an Offline state (depending on the SAN Policy (Figure 1-1)) as seen in Figure 1. 

We stated earlier that a disk must be Offline from the Hyper-V servers' perspective in order for the Guest to have exclusive access. However, a raw volume must first be initialized before it can be used. To accomplish this in the Disk Management interface, the disk must first be brought Online. Once Online, the disk will show as being Not Initialized (Figure 2). 

Right-click on the disk and select Initialize Disk (Figure 3) 

Select either an MBR or GPT partition type (Figure 4). 

Once a disk is initialized, it can once again be placed in an Offline state. If the disk is not in an Offline state, it will not be available for selection when configuring the Guest's storage. In order to configure a Pass-through disk in a Guest, you must select Attach a virtual disk later in the New Virtual Machine Wizard (Figure 5). 

If the Pass-through disk will be used to boot the operating system, it must be attached to an 

IDE Controller. 

Data disks can take advantage of SCSI controllers. In Figure 6, a Passthrough disk is 

attached to IDE Controller 0. 

Note: If the disk does not appear in the drop down list, ensure the disk is Offline in the Disk Management interface (In Server CORE, use the diskpart.exe CLI). Once the Pass-through disk is configured, the Guest can be started and data can placed on the drive. If an operating system will be installed, the installation process will properly prepare the disk. If the disk will be used for data storage, it must be prepared in the Guest operating system before data can be placed on it. If a Pass- through disk, being used to support an operating system installation, is brought Online before the Guest is started, the Guest will fail to start. When using Pass-through disks to support an operating system installation, provisions must be made for storing the Guest configuration file in an alternate location. This is because the entire Pass-through disk is consumed by the operating system installation. An example would be to locate the configuration file on another internal drive in the Hyper-V server itself. Or, if it is a cluster, the configuration file can be hosted on a separate cluster providing highly available file services. Be aware that Pass-through disks cannot be dynamically expanded. Additionally, when using Pass-through disks, you lose the capability to take snapshots, and finally, you cannot use differencing disks with Pass-through disks. 

Q10. Your network contains an Active Directory domain named adatum.com. The domain contains the servers shown in the following table. 

You need to ensure that you can use Server Manager on DC1 to manage DC2. 

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Install the Windows PowerShell 2.0 engine on DC1. 

B. Install Microsoft .NET Framework 4 on DC2. 

C. Install Windows Management Framework 3.0 on DC2. 

D. Install Remote Server Administration Tools on DC1. 

E. Install Remote Server Administration Tools on DC2. 

Answer: B,C 

Explanation: 

Explanation Windows Management Framework 3.0 To use this release of Server Manager to access and manage remote servers that are running Windows Server 2008 or Windows Server 2008 R2, you must first install .NET Framework 4.0, and then install Windows Management Framework 3.0 on those servers. Note: In Windows Server 2012 R2, you can use Server Manager to perform management tasks on remote servers. Remote management is enabled by default on servers that are running Windows Server 2012 R2. To manage a server remotely by using Server Manager, you add the server to the Server Manager server pool. You can use Server Manager to manage remote servers that are running Windows Server 2008 and Windows Server 2008 R2, but the following updates are required to fully manage these older operating systems (see above). 

Reference: Configure Remote Management in Server Manager