aiotestking uk

70-417 Exam Questions - Online Test


70-417 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. You have a server named Server1 that runs Windows Server 2012 R2. 

You plan to enable Hyper-V Network Virtualization on Server1. 

You need to install the Windows Network Virtualization Filter Driver on Server1. 

Which Windows PowerShell cmdlet should you run? 

A. Set-NetVirtualizationGlobal 

B. Enable-NetAdapterBinding 

C. Add - WindowsFeature 

D. Set-NetAdapterVmq 

Answer:

Explanation: Hyper-V Network Virtrtualization runs multiple virtual networks on a physical network. And each virtual network operates as if it is running as a physical network. The The Set-NetAdaptercmdlet sets the basic properties of a network adapter such as virtual LAN (VLAN) identifier (ID) and MAC address. Thus if you add the binding parameter to the command then you will be able to install the Windows Network Virtualization Filter Driver. Step one:Enable Windows Network Virtualization (WNV). This is a binding that is applied to the NIC that you External Virtual Switch is bound to. This can be a physical NIC, it can be an LBFO NIC team. Either way, it is the network adapter that your External Virtual Switch uses to exit the server.This also means that if you have multiple virtual networks or multiple interfaces that you can pick and choose and it is not some global setting.If you have one External Virtual Switch this is fairly easy: $vSwitch = Get-VMSwitch -SwitchType External# Check if Network Virtualization is bound# This could be done by checking for the binding and seeing if it is enabledForEach-Object -InputObject $vSwitch {if ((Get-NetAdapterBinding -ComponentID "ms_netwnv" -InterfaceDescription $_.NetAdapterInterfaceDescription).Enabled -eq $false){ # Lets enable itEnable-NetAdapterBinding -InterfaceDescription $_.NetAdapterInterfaceDescription -ComponentID "ms_netwnv"}} 

Q2. You have a server that runs Windows Server 2012 R2. 

The disks on the server are configured as shown in the exhibit. (Click the Exhibit button.) 

You need to create a storage pool that contains Disk 1 and Disk 2. What should you do first? 

A. Convert Disk 1 and Disk 2 to GPT disks 

B. Create a volume on Disk 2 

C. Convert Disk 1 and Disk 2 to dynamic disks 

D. Delete volume E 

Answer:

Explanation: 

Storage Pools use unallocated space thus you need to delete Volume E. 

References: 

http://technet.microsoft.com/en-us/library/ff399688.aspx 

Q3. You have a server named Server1. 

You install the IP Address Management (IPAM) Server feature on Server1. 

You need to provide a user named User1 with the ability to set the access scope of all the DHCP servers that are managed by IPAM. The solution must use the principle of least privilege. 

Which user role should you assign to User1? 

A. IP Address Record Administrator Role 

B. IPAM Administrator Role 

C. IPAM MSM Administrator Role 

D. IPAM DHCP Scope Administrator Role 

Answer:

Explanation: 

Explanation IPAM ASM Administrators IPAM ASM Administrators is a local security group on an IPAM server that is created when you install the IPAM feature. Members of this group have all the privileges of the IPAM Users security group, and can perform IP address space tasks in addition to IPAM common management tasks. Note: When you install IPAM Server, the following local role-based IPAM security groups are created: IPAM Users IPAM MSM Administrators IPAM ASM Administrators IPAM IP Audit Administrators IPAM Administrators Incorrect: not B: Too much privileges. IPAM Administrators IPAM Administrators is a local security group on an IPAM server that is created when you install the IPAM feature. Members of this group have privileges to view all IPAM data and perform all IPAM tasks. 

Q4. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

Cluster1 hosts an application named App1. 

You need to ensure that Server2 handles all of the client requests to the cluster for App1. The solution must ensure that if Server2 fails, Server1 becomes the active node for App1. 

What should you configure? 

A. Affinity - None 

B. Affinity - Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general u 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

The preferred owner in a 2 server cluster will always be the active node unless it is down. http:// www.sqlservercentral.com/Forums/Topic1174454-146-1.aspx#bm1174835 Difference between possible owners and preferred owners Possible owners are defined at the resource level and dictate which nodes in the Windows cluster are able to service this resource For instance, you have a 3 node cluster with Node A, Node B and Node C. You have a clustered disk resource "MyClusteredDisk", if you remove Node C from the possible owners of the clustered disk resource "MyClusteredDisk" then this disk will never be failed over to Node C. Preferred owners are defined at the resource group level and define the preferred node ownership within the Windows cluster For instance, you have a 3 node cluster with Node A, Node B and Node C. You have a cluster resource group "MyClusteredGroup" which contains various disk, IP, network name and service resources. Nodes A, B and C are all possible owners but Node B is set as the preferred owner and is currently the active node. The resource group fails over to Node C as Node B stops responding on the Public network due to a failed NIC. In the Resource group properties on the failback tab you have this set to immediate. You fix the NIC issue on Node B and bring it back up on the network. The resource group currently active on Node C will without warning immediately attempt to failback to Node B. Not a good idea if this is a Production SQL Server instance, so use caution when configuring preferred owners and failback http://support.microsoft.com/kb/299631/en-us Failover behavior on clusters of three or more nodes This article documents the logic by which groups fail from one node to another when there are 3 or more cluster node members. The movement of a group can be caused by an administrator who manually moves a group or by a node or resource failure. Where the group moves depends on how the move is initiated and whether the Preferred Owner list is set. 

Q5. Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed.Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

You need to configure VM4 to track the CPU, memory, and network usage. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. Resource metering 

D. Virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

http://blogs.technet.com/b/meamcs/archive/2012/05/28/hyper-v-resource-metering-in-windows-server-2012-server-8-beta.aspx Hyper-V Resource Metering in Windows Server 2012 R2 "Server 8 Beta" IT organizations need tools to charge back business units that they support while providing the business units with the right amount of resources to match their needs. For hosting providers, it is equally important to issue chargebacks based on the amount of usage by each customer. To implement advanced billing strategies that measure both the assigned capacity of a resource and its actual usage, earlier versions of Hyper-V required users to develop their own chargeback solutions that polled and aggregated performance counters. 

These solutions could be expensive to develop and sometimes led to loss of historical data. To assist with more accurate, streamlined chargebacks while protecting historical information, Hyper-V in Windows Server 2012 R2 "Server 8 Beta" introduces Resource Metering, a feature that allows customers to create cost-effective, usage-based billing solutions. With this feature, service providers can choose the best billing strategy for their business model, and independent software vendors can develop more reliable, end-to-end chargeback solutions on top of Hyper-V. Metrics collected for each virtual machine § Average CPU usage, measured in megahertz over a period of time. § Average physical memory usage, measured in megabytes. § Minimum memory usage (lowest amount of physical memory). § Maximum memory usage (highest amount of physical memory). § Maximum amount of disk space allocated to a virtual machine. § Total incoming network traffic, measured in megabytes, for a virtual network adapter. § Total outgoing network traffic, measured in megabytes, for a virtual network adapter To enable Hyper-V resource metering on hyper-v host HV01 run the following PowerShell commands: Get-VM -ComputerName HV01 | Enable-VMResourceMetering By default the collection interval for Hyper-v metering data is one hour to change this interval the following PowerShell command can be used "value used in the command below is one minute": Set-vmhost computername HV01 ResourceMeteringSaveInterval 00:01:00 To get all VMs metering data run the following PowerShell command: Get-VM -ComputerName HV01 | Measure-VM To get a particular VM "test01" metering data run the following PowerShell command: Get-VM -ComputerName HV01 -Name "test01" | Measure-VM 

Q6. RAG DROP 

Your network contains an Active Directory domain named contoso.com. All client computers run Windows 7. Group Policy objects (GPOs) are linked to the domain as shown in the exhibit. (Click the Exhibit button.) 

GPO2 contains user configurations only and GPO3 contains computer configurations only. 

You need to configure the GPOs to meet the following requirements: 

. Ensure that GPO2 only applies to the user accounts in OU2 that are members of a global group named Group2. 

. Ensure that GPO3 only applies to the computer accounts in OU3 that have more than 100 GB of free disk space. 

What should you do? 

To answer, drag the appropriate setting to the correct GPO. Each setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q7. Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs. 

You need to prevent all of the GPOs at the site level and at the domain level from being Applied to users and computers in an organizational unit (OU) named OU1. 

You want to achieve this goal by using the minimum amount of administrative effort. 

What should you use? 

A. Dcgpofix 

B. Get-GPOReport 

C. Gpfixup 

D. Gpresult 

E. Gptedit.msc 

F. Import-GPO 

G. Restore-GPO 

H. Set-GPInheritance 

I. Set-GPLink 

J. Set-GPPermission 

K. Gpupdate 

L. Add-ADGroupMember 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/ee461032.aspx 

Q8. RAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1. All servers in the domain run Windows Server 2012 R2. 

You need to create a new volume on File1. 

The new volume must have the following configurations: 

Have the drive letter T 

Have the FAT32 file system 

Be stored on a new virtual hard disk 

In which order should you run the Diskpart commands? 

To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the correct order. 

... 

Answer:  

Q9. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 has access to four physical disks. The disks are configured as shown in the following table. 

You need to ensure that all of the disks can be added to a Cluster Shared Volume (CSV). 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Enable BitLocker on Disk4 

B. Disable BitLocker on Disk1 

C. Format Disk2 to use NTFS 

D. Format Disk3 to use NTFS 

Answer: C,D 

159. Your network contains a single Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

The domain contains 400 desktop computers that run Windows 8 and 200 desktop computers that run Windows XP Service Pack 3 (SP3). 

All new desktop computers that are added to the domain run Windows 8. All of the desktop computers are located in an organizational unit (OU) named OU1. 

You create a Group Policy object (GPO) named GPO1. GPO1 contains startup script settings. You link GPO1to OU1. You need to ensure that GPO1 is Applied only to computers that run Windows XP SP3. 

What should you do? 

A. Modify the Security settings of OU1. 

B. Run the Set-GPInheritancecmdlet and specify the -target parameter. 

C. Create and link a WMI filter to GPO1. 

D. Run the Set-GPLinkcmdlet and specify the -target parameter. 

Q10. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. 

You log on to Server1. 

You need to retrieve the IP configurations of Server2. 

Which command should you run from Server1? 

A. winrm get server2 

B. dsquery . -scope base -attrip/server2 

C. winrs -r:server2ipconfig 

D. ipconfig> server2.ip 

Answer:

Explanation: 

Windows Remote Management allows you to manage and execute programs remotely References: Exam Ref 70-410: Installing and Configuring Windows Server 2012: Objective 4.3: Deploy and Configure the DNS service, Chapter 4 Deploying and Configuring core network services, p. 246 http://technet.microsoft.com/en-us/library/dd349801(v=ws.10).aspx