70-417 Premium Bundle

70-417 Premium Bundle

Upgrading Your Skills to MCSA Windows Server 2012 Certification Exam

4.5 
(23955 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 70-417 Free Practice Questions

Q1. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the Hyper-V server role installed. 

You plan to replicate virtual machines between Server1 and Server2. The replication will be encrypted by using Secure Sockets Layer (SSL). 

You need to request a certificate on Server1 to ensure that the virtual machine replication is encrypted. 

Which two intended purposes should the certificate for Server1 contain? (Each correct answer presents part of the solution. Choose two.) 

A. Client Authentication 

B. Kernel Mode Code Signing 

C. Server Authentication 

D. IP Security end system 

E. KDC Authentication 

Answer: A,C 

Explanation: 

http://blogs.technet.com/b/virtualization/archive/2012/03/13/hyper-v-replica-certificaterequirements.aspx 

Q2. Your network contains two DNS servers named DNS1 and DNS2 that run Windows Server 2012 R2. DNS1 has a primary zone named contoso.com. DNS2 has a secondary copy of the contoso.com zone. 

You need to log the zone transfer packets sent between DNS1 and DNS2. 

What should you configure? 

A. debug logging from DNS Manager 

B. logging from Windows Firewall with Advanced Security 

C. monitoring from DNS Manager 

D. a Data Collector Set (DCS) from Performance Monitor 

Answer:

Explanation: Monitoring DNS with the DNS Console The DNS management console includes functionality that enables you to use the console to monitor DNS activity: 

*

 Event Logging tab: You can access the Event Logging tab located within the Properties dialog box of the DNS server to specify the DNS events that you want to monitor. Through the Event Logging tab, you can limit the events which are written to the DNS Events log. 

*

 Monitoring tab: The Monitoring tab is also located within the Properties dialog box of the DNS server. This tab allows you to test querying of the DNS server. 

Reference: Monitoring and Troubleshooting DNS 

Q3. OTSPOT 

Your network contains an Active Directory domain named contoso.com. 

Technicians use Windows Deployment Services {WDS) to deploy Windows Server 2012 

R2. 

The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 

has the Hyper-V server role installed. 

You need to ensure that you can use WDS to deploy Windows Server 2012 R2 to a virtual machine named VM1. 

Which settings should you configure? 

To answer, select the appropriate settings in the answer area. 

Answer:  

Q4. Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. On Server1, you create a Data Collector Set (DCS) named Data1. 

You need to export Data1 to Server2. 

What should you do first? 

A. Right-click Data1 and click Save template... 

B. Right-click Data1 and click Export list... 

C. Right-click Data1 and click Data Manager... 

D. Right-click Data1 and click Properties. 

Answer:

Explanation: Exporting Templates To export a Data Collector Set you create as a template for use on other computers, open Windows Performance Monitor, expand Data Collector Sets, right-click the Data Collector Set you want to export, and click Save Template . Select a directory in which to store the XML file and click Save . 

Reference: Create a Data Collector Set from a Template 

Q5. Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named Server3 and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in a failover cluster named Cluster2. 

You need to move all of the applications and the services from Cluster1 to Cluster2. 

What should you do first from Failover Cluster Manager? 

A. On a server in Cluster2, click Migrate Roles. 

B. On a server in Cluster2, click Move Core Cluster Resources, and then click Select Node... 

C. On a server in Cluster1, configure Cluster-Aware Updating. 

D. On a server in Cluster2, click Move Core Cluster Resources, and then click Best Possible Node. 

Answer:

Explanation: 

http://blogs.msdn.com/b/clustering/archive/2012/06/25/10323434.aspx 

Q6. You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2 Standard. You establish a Remote Desktop session to Server1. 

You need to identify which task can be performed on Server1 from within the Remote Desktop session. 

What should you identify? 

A. Install a feature by using Server Manager. 

B. Modify the network settings by using Sconfig. 

C. Disable services by using Msconfig. 

D. Join a domain by using the System Properties. 

Answer:

Explanation: In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must be a member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode. 

http://technet.microsoft.com/en-us/library/jj647766.aspx Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80 

Q7. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC5. DC5 has a Server Core Installation of Windows Server 2012 R2. 

You need to uninstall Active Directory from DCS manually. 

Which tool should you use? 

A. The Remove-ADComputercmdlet 

B. The ntdsutil.exe command 

C. The dsamain.exe command 

D. The Remove-WindowsFeaturecmdlet 

Answer:

Explanation: 

Explanation 

*

 Ntdsutil.exe is a command-line tool that provides management facilities for Active 

Directory Domain Services (AD DS) and Active Directory Lightweight Directory Services 

(AD LDS). 

You can use the ntdsutil commands to perform database maintenance of AD DS, manage 

and control single master operations, and remove metadata left behind by domain 

controllers that were removed from the network without being properly uninstalled. 

*

 NTdsutil commands include: 

/ local roles 

Manages local administrative roles on an RODC. 

/ metadata cleanup 

Cleans up objects of decommissioned servers. 

Q8. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2. 

You need to ensure that a user named User1 can install Windows features on VM1. The solution must minimize the number of permissions assigned to User1. 

To which group should you add User1? 

A. Server Operators on Server1 

B. Power Users on VM1 

C. Administrators on VM1 

D. Hyper-V Administrators on Server1 

Answer:

Explanation: * The Hyper-V role enables you to create and manage a virtualized computing environment by using virtualization technology that is built in to Windows Server 2012. Hyper-V virtualizes hardware to provide an environment in which you can run multiple operating systems at the same time on one physical computer, by running each operating system in its own virtual machine. 

* Simplified authorization 

The Hyper-V Administrators group is introduced in Windows Server 2012 and is 

implemented as a local security group. 

What value does this change add? 

This group can reduce the number of users that belong to the local Administrators group 

while providing users with access to Hyper-V. 

What works differently? 

The Hyper-V Administrators group is a new local security group. Add users to this group 

instead of the local Administrators group to provide them with access to Hyper-V. Members 

of the Hyper-V Administrators have complete and unrestricted access to all features of 

Hyper-V. 

Reference: What's New in Hyper-V for Windows Server 2012 

Q9. OTSPOT 

You have a server that runs Windows Server 2012 R2 and has the iSCSI Target Server role service installed. 

You run the New-IscsiVirtualDisk cmdlet as shown in the New-IscsiVirtualDisk exhibit. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibits. Each correct selection is worth one point. 

Answer:  

Q10. Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. All of the DNS servers in both of the domains run Windows Server 2012 R2. 

The network contains two servers named Server1 and Server2. Server1 hosts an Active Directory-integrated zone for contoso.com. Server2 hosts an Active Directory-integrated zone for fabrikam.com. 

Server1 and Server2 connect to each other by using a WAN link. Client computers that connect to Server1 for name resolution cannot resolve names in fabrikam.com. 

You need to configure Server1 to support the resolution of names in fabrikam.com. The solution must ensure that users in contoso.com can resolve names in fabrikam.com if the WAN link fails. 

What should you do on Server1? 

A. Create a stub zone. 

B. Create a secondary zone. 

C. Add a forwarder. 

D. Create a conditional forwarder. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc771898(v=ws.10).aspx Stub zone doesn't host the records themselves Forwarder and conditional forwarders simply give instructions on where to forward DNS requests to. 

Q11. Your network contains an Active Directory domain named contoso.com. The domain contains domain controllers that run Windows Server 2008, Windows Server 2008 R2 Windows Server 2012, and Windows Server 2012 R2. 

A domain controller named DC1 runs Windows Server 2012 R2. DC1 is backed up daily. 

During routine maintenance, you delete a group named Group1. 

You need to recover Group1 and identify the names of the users who were members of Group1 prior to its deletion. You want to achieve this goal by using the minimum amount of administrative effort. 

What should you do first? 

A. Perform an authoritative restore of Group1. 

B. Mount the most recent Active Directory backup. 

C. Use the Recycle Bin to restore Group1. 

D. Reactivate the tombstone of Group1. 

Answer:

Explanation: 

The Active Directory Recycle Bin does not have the ability to track simple changes to objects. If the object itself is not deleted, no element is moved to the Recycle Bin for possible recovery in the future. In other words, there is no rollback capacity for changes to object properties, or, in other words, to the values of these properties. There is another approach you should be aware of. Tombstone reanimation (which has nothing to do with zombies) provides the only way to recover deleted objects without taking a DC offline, and it's the only way to recover a deleted object's identity information, such as its objectGUID and objectSid attributes. It neatly solves the problem of recreating a deleted user or group and having to fix up all the old access control list (ACL) references, which contain the objectSid of the deleted object. Restores domain controllers to a specific point in time, and marks objects in Active Directory as being authoritative with respect to their replication partners. 

Q12. Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server. 

The network contains two subnets named Subnet1 and Subnet2. Server1 has a DHCP scope for each subnet. 

You need to ensure that noncompliant computers on Subnet1 receive different network policies than noncompliant computers on Subnet2. 

Which two settings should you configure? (Each correct answer presents part of the solution. Choose two.) 

A. The NAS Port Type constraints 

B. The Health Policies conditions 

C. The Called Station ID constraints 

D. The NAP-Capable Computers conditions 

E. The MS-Service Class conditions 

Answer: D,E 

Q13. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table. 

You plan to create a checkpoint of VM1. 

You need to recommend a solution to minimize the amount of disk space used for the checkpoint of VM1. 

What should you do before you create the checkpoint? 

A. Decrease the Maximum RAM. 

B. Convert Disk1.vhd to a dynamically expanding disk. 

C. Run the Stop-VM cmdlet. 

D. Run the Resize-VHD cmdlet. 

Answer:

Explanation: 

For checkpoints created when the virtual machine is stopped 

The checkpoint contains the state of the hard disks only. 

For checkpoints created when the virtual machine is running 

The checkpoint contains the state of the hard disks and the data in memory. 

Note: A checkpoint saves the state of each virtual hard disk that is attached to a virtual 

machine and all of the hard disk's contents, including application data files. For virtual 

machines on Hyper-V and VMware ESX Server hosts, a checkpoint also saves the 

hardware configuration information. By creating checkpoints for a virtual machine, you can 

restore the virtual machine to a previous state. 

Q14. You have a server named Server1 that runs Windows Server 2012 R2. You add a 4-TB disk named Disk 5 to Server1. 

You need to ensure that you can create a 3-TB volume on Disk 5. 

What should you do? 

A. Create a storage pool. 

B. Convert the disk to a GPT disk. 

C. Convert the disk to a dynamic disk. 

D. Create a VHD, and then attach the VHD. 

Answer:

Explanation: The exhibit shows Disk1 to be a basic disk. The disk must be GPT since GPT disks allows for partitioning. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File Services and Storage, Lesson 2: Provisioning and managing shared storage, p. 379-384 http://msdn.microsoft.com/en-us/library/windows/hardware/gg463525.aspx 

Q15. OTSPOT 

Your network contains an Active Directory domain named fabrikam.com. You implement DirectAccess and an IKEv2 VPN. You need to view the properties of the VPN connection. Which connection properties should you view? To answer, select the appropriate connection properties in the answer area. 

Answer:  

START 70-417 EXAM