Point Checklist: 70 417 exam

Proper study guides for Up to the immediate present Microsoft Upgrading Your Skills to MCSA Windows Server 2012 certified begins with Microsoft exam 70 417 preparation products which designed to deliver the High value 70 417 exam questions by making you pass the 70 417 vce test at your first time. Try the free 70 417 dumps demo right now.

Q21. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DHCP Server server role installed. 

DHCP is configured as shown in the exhibit. (Click the Exhibit button.) 

You discover that client computers cannot obtain IPv4 addresses from DC1. 

You need to ensure that the client computers can obtain IPv4 addresses from DC1. 

What should you do? 

A. Disable the Deny filters. 

B. Authorize DC1. 

C. Activate the scope. 

D. Disable the Allow filters. 

Answer:


Q22. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. 

You install the DHCP Server server role on Server1 and Server2. You install the IP Address Management (IPAM) Server feature on Server1. 

You notice that you cannot discover Server1 or Server2 in IPAM.You need to ensure that you can use IPAM to discover the DHCP infrastructure. 

Which two actions should you perform? (Each correct answer presents part of the solution.(Choose two.) 

A. On Server2, create an IPv4 scope 

B. On Server1, run the Add-IpamServerInventory cmdlet 

C. On Server2, run the Add-DhcpServerInDc cmdlet 

D. On both Server1 and Server2, run the Add-DhcpServerv4Policy cmdlet 

E. On Server1, uninstall the DHCP Server server role. 

Answer: C,E 

169. Which terminology is being described below? 

Time synchronization is critical for the proper operation of many Windows services and line-of- business Applications. 

The __________ uses the Network Time Protocol (NTP) to synchronize computer clocks on the network so that an accurate clock value, or time stamp, can be assigned to network validation requests and resource access requests 

A. Network Services Shell (Netsh) 

B. Listsvc 

C. Fixmbr 

D. Windows Time service (W32time) 

Answer:


Q23. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. 

You run ntdsutil as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can access the contents of the mounted snapshot. 

What should you do? 

A. From a command prompt, run dsamain.exe -dbpath c:\\$snap_201204131056_volumec$\\windows\\ntds\\ntds.dit -Idapport 33389. 

B. From the snapshot context of ntdsutil, run mount {79f94f82-5926-4f44-8af0-2f56d827a57d>. 

C. From the snapshot context of ntdsutil, run activate instance "NTDS". 

D. From a command prompt, run dsamain.exe -dbpath c:\\$snap_201204131056_volumec$\\windows\\ntds\\ntds.dit -Idapport 389. 

Answer:

Explanation: 

This is a live DC, so 389 is already in use; 33389 would not be so is a valid port. http://technet.microsoft.com/en-us/library/cc753609(v=ws.10).aspx 


Q24. You manage an environment that has many servers. The servers run Windows Server 2012 R2 and use iSCSI storage. Administrators report that it is difficult to locate available iSCSI resources on the network. You need to ensure that the administrators can locate iSCSI resources on the network by using a central repository. Which feature should you deploy? 

A. The iSNS Server service feature 

B. The iSCSI Target Storage Provider feature 

C. The Windows Standards-Based Storage Management feature 

D. The iSCSI Target Server role service 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc772568.aspx iSNS Server Overview Internet iStorage Name Service Server The Internet Storage Name Service (iSNS) protocol is used for interaction between iSNS servers and iSNS clients. iSNS clients are computers, also known as initiators, that are attempting to discover storage devices, also known as targets, on an Ethernet network. iSNS facilitates automated discovery, management, and configuration of iSCSI and Fibre Channel devices (using iFCP gateways) on a TCP/IP network. Note The Microsoft iSNS Server only supports the discovery of iSCSI devices, and not Fibre Channel devices. iSNS Server provides intelligent storage discovery and management services comparable to those found in Fibre Channel networks, allowing a commodity IP network to function in a similar capacity as a storage area network. iSNS facilitates a seamless integration of IP networks and manages iSCSI devices. iSNS thereby provides value in any storage network comprised of iSCSI devices. 

Features of iSNS Server iSNS Server is a repository of currently active iSCSI nodes, as well as their associated portals, entities, etc. Nodes can be initiators, targets, or management nodes. Typically, initiators and targets register with the iSNS server, and the initiators query the iSNS server for the list of available targets. 

A dynamic database of the iSCSI devices and related information that are currently available on the network: The database helps provide iSCSI target discovery functionality for the iSCSI initiators on the network. The database is kept dynamic by using the Registration Period and Entity Status Inquiry features of iSNS. Registration Period allows the server to automatically deregister stale entries. Entity Status Inquiry provides the server a functionality similar to ping to determine whether registered clients are still present on the network, and allows the server to automatically deregister those clients which are no longer present. State Change Notification Service: This allows registered clients to be made aware of changes to the database in the iSNS server. It allows the clients to maintain a dynamic picture of the iSCSI devices available on the network. 

Discovery Domain Service: This allows an administrator to assign iSCSI nodes and portals into one or more groups called discovery domains. Discovery domains provide a zoning functionality by which an iSCSI initiator can only discover those iSCSI targets who have at least one discovery domain in common with it. Benefits of iSNS Server in iSCSI Storage Area Networks Centralized management Easily scalable to large IP storage networks 

Extensible Asynchronous notification of changes in the iSCSI storage network Ability to monitor the status and availability of clients Microsoft-preferred discovery method for iSCSI Designed for Windows Logo Program requirement for iSCSI HBAs 


Q25. OTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

From Server2, you attempt to connect to Server1 by using Computer Management and you receive the following error message: "Computer \\\\Server1 cannot be found. The network path was not found. " 

From Server1, you successfully connect to Server2 by using Server Manager. 

You need to ensure that you can manage Server1 remotely from Server2 by using Computer Management. 

What should you configure? 

To answer, select the appropriate option in the answer area. 

Answer: 


Q26. Your network contains a server named Server1 and 10 Web servers. All servers run Windows Server 2012 R2. 

You create a Windows PowerShell Desired State Configuration (DSC) to push the settings from Server1 to all of the Web servers. 

On Server1, you modify the file set for the Web servers.You need to ensure that all of the Web servers have the latest configurations. 

Which cmdlet should you run on Server1? 

A. Restore-DcsConfiguration 

B. Set DcsLocalConfigurationManager 

C. Start-DcsConfiguration 

D. Get-DcsConfiguration 

Answer:


Q27. You have a server named Server1. 

You install the IP Address Management (IPAM) Server feature on Server1. 

You need to provide a user named User1 with the ability to set the access scope of all the DHCP servers that are managed by IPAM. The solution must use the principle of least privilege. 

Which user role should you assign to User1? 

A. IP Address Record Administrator Role 

B. IPAM Administrator Role 

C. IPAM MSM Administrator Role 

D. IPAM DHCP Scope Administrator Role 

Answer:

Explanation: 

Explanation IPAM ASM Administrators IPAM ASM Administrators is a local security group on an IPAM server that is created when you install the IPAM feature. Members of this group have all the privileges of the IPAM Users security group, and can perform IP address space tasks in addition to IPAM common management tasks. Note: When you install IPAM Server, the following local role-based IPAM security groups are created: IPAM Users IPAM MSM Administrators IPAM ASM Administrators IPAM IP Audit Administrators IPAM Administrators Incorrect: not B: Too much privileges. IPAM Administrators IPAM Administrators is a local security group on an IPAM server that is created when you install the IPAM feature. Members of this group have privileges to view all IPAM data and perform all IPAM tasks. 


Q28. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

On Server1, an administrator creates a virtual machine named VM1. 

A user named User1 is the member of the local Administrators group on Server1. 

User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the Exhibit button.) 

You need to ensure that User1 can modify the settings of VM1 by running the Set-Vmcmdlet. 

What should you instruct User1 to do? 

A. Run Windows PowerShell with elevated privileges. 

B. Install the Integration Services on VM1. 

C. Modify the membership of the local Hyper-V Administrators group. 

D. Import the Hyper-V module. 

Answer:

Explanation: You can only use the PowerShell snap-in to modify the VM settings with the 

vmcmdlets when you are an Administrator. 

Thus best practices dictate that User1 run the Powershell with elevated privileges. 

References: 

http://technet.microsoft.com/en-us/library/jj713439.aspx 


Q29. Your network contains an Active Directory domain named contoso.com. The Active 

Directory Recycle bin is enabled for contoso.com. 

A support technician accidentally deletes a user account named User1. 

You need to restore the User1 account. 

Which tool should you use? 

A. Ldp 

B. Esentutl 

C. Active Directory Administrative Center 

D. Ntdsutil 

Answer:

Explanation: 

http://technet.microsoft.com/nl-nl/library/dd379509(v=ws.10).aspx#BKMK_2 http://technet.microsoft.com/en-us/magazine/2007.09.tombstones.aspx http://technet.microsoft.com/en-us/library/hh875546.aspx http://technet.microsoft.com/en-us/library/dd560651(v=ws.10).aspx 


Q30. Your company deploys a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2. The forest contains a domain controller named DC10. 

On DC10, the disk that contains the SYSVOL folder fails. 

You replace the failed disk. You stop the Distributed File System (DFS) Replication service. You restore the SYSVOL folder. 

You need to perform a non-authoritative synchronization of SYSVOL on DC10. 

Which tool should you use before you start the DFS Replication service on DC10? 

A. Dfsgui.msc 

B. Ultrasound 

C. Ldp 

D. Replmon 

Answer:

Explanation: Verify that replication is working as designed. Download the Ultrasound Monitoring and Troubleshooting Tool for File Replication Services from the Microsoft Download Center to verify the healgt of the current FRS environment. 


Microsoft 70-417 Certification Sample Questions and Answers: https://www.braindumpsall.net/70-417-dumps/

P.S. New 70-417 dumps PDF: http://www.4easydumps.com/70-417-dumps-download.html