70-417 Premium Bundle

70-417 Premium Bundle

Upgrading Your Skills to MCSA Windows Server 2012 Certification Exam

4.5 
(29385 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-417 Free Practice Questions

Q1. You manage an environment that has many servers. The servers run Windows Server 2012 R2 and use iSCSI storage. Administrators report that it is difficult to locate available iSCSI resources on the network. You need to ensure that the administrators can locate iSCSI resources on the network by using a central repository. Which feature should you deploy? 

A. The iSNS Server service feature 

B. The iSCSI Target Storage Provider feature 

C. The Windows Standards-Based Storage Management feature 

D. The iSCSI Target Server role service 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc772568.aspx iSNS Server Overview Internet iStorage Name Service Server The Internet Storage Name Service (iSNS) protocol is used for interaction between iSNS servers and iSNS clients. iSNS clients are computers, also known as initiators, that are attempting to discover storage devices, also known as targets, on an Ethernet network. iSNS facilitates automated discovery, management, and configuration of iSCSI and Fibre Channel devices (using iFCP gateways) on a TCP/IP network. Note The Microsoft iSNS Server only supports the discovery of iSCSI devices, and not Fibre Channel devices. iSNS Server provides intelligent storage discovery and management services comparable to those found in Fibre Channel networks, allowing a commodity IP network to function in a similar capacity as a storage area network. iSNS facilitates a seamless integration of IP networks and manages iSCSI devices. iSNS thereby provides value in any storage network comprised of iSCSI devices. 

Features of iSNS Server iSNS Server is a repository of currently active iSCSI nodes, as well as their associated portals, entities, etc. Nodes can be initiators, targets, or management nodes. Typically, initiators and targets register with the iSNS server, and the initiators query the iSNS server for the list of available targets. 

A dynamic database of the iSCSI devices and related information that are currently available on the network: The database helps provide iSCSI target discovery functionality for the iSCSI initiators on the network. The database is kept dynamic by using the Registration Period and Entity Status Inquiry features of iSNS. Registration Period allows the server to automatically deregister stale entries. Entity Status Inquiry provides the server a functionality similar to ping to determine whether registered clients are still present on the network, and allows the server to automatically deregister those clients which are no longer present. State Change Notification Service: This allows registered clients to be made aware of changes to the database in the iSNS server. It allows the clients to maintain a dynamic picture of the iSCSI devices available on the network. 

Discovery Domain Service: This allows an administrator to assign iSCSI nodes and portals into one or more groups called discovery domains. Discovery domains provide a zoning functionality by which an iSCSI initiator can only discover those iSCSI targets who have at least one discovery domain in common with it. Benefits of iSNS Server in iSCSI Storage Area Networks Centralized management Easily scalable to large IP storage networks 

Extensible Asynchronous notification of changes in the iSCSI storage network Ability to monitor the status and availability of clients Microsoft-preferred discovery method for iSCSI Designed for Windows Logo Program requirement for iSCSI HBAs 

Q2. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1. 

You make a change to GPO1. 

You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solution must minimize administrative effort. 

Which tool should you use? 

A. TheSecedit command 

B. The Invoke-GpUpdatecmdlet 

C. Group Policy Object Editor 

D. Server Manager 

Answer:

Q3. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a Clustered Shared Volume (CSV). 

A developer creates an application named App1. App1 is NOT a cluster-aware application. App1 stores data in the file system. 

You need to ensure that App1 runs in Cluster1. The solution must minimize development effort. 

Which cmdlet should you run? 

A. Add-ClusterServerRole 

B. Add ClusterGenericApplicationRole 

C. Add-ClusterGenericServiceRole 

D. Add ClusterScaleOutFileServerRole 

Answer:

Q4. Your network contains an Active Directory domain named contoso.com. The domain 

contains Server 2012 R2 and has the Hyper-V server role installed. 

You need to log the amount of system resources used by each virtual machine. 

What should you do? 

A. From Windows PowerShell, run the Enable-VMResourceMeteringcmdlet. 

B. From Windows System Resource Manager, enable Accounting. 

C. From Windows System Resource Manager, add a resource allocation policy. 

D. From Windows PowerShell, run the Measure-VM cmdlet. 

Answer:

Explanation: 

The Enable-VMResourceMeteringcmdlet collects resource utilization data for a virtual machine or resource pool. 

Q5. Your network contains an Active Directory domain named contoso.com. The domain 

contains a file server named File1 that runs a Server Core Installation of Windows Server 2012 R2. 

File1 has a volume named D that contains home folders. File1 creates a shadow copy of volume D twice a day. 

You discover that volume D is almost full. 

You add a new volume named H to File1. 

You need to ensure that the shadow copies of volume D are stored on volume H. 

Which command should you run? 

A. The Set-Volume cmdlet with the -driveletter parameter 

B. The vssadmin.exe create shadow command 

C. The Set-Volume cmdlet with the -path parameter 

D. The vssadmin.exe add shadowstorage command 

Answer:

Explanation: 

A. Sets or changes the file system label of an existing volume. -DriveLetter Specifies a letter used to identify a drive or volume in the system. 

B. Displays current volume shadow copy backups and all installed shadow copy writers and providers. Shadow Creates a new shadow copy of a specified volume. 

C. Sets or changes the file system label of an existing volume -Path Contains valid path information. 

D. Displays current volume shadow copy backups and all installed shadow copy writers and providers. AddShadowStroage Adds a shadow copy storage association for a specified volume. http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx 

Q6. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy Server role service installed. 

You plan to configure Server1 as a Network Access Protection (NAP) health policy server for VPN enforcement by using the Configure NAPwizard. 

You need to ensure that you can configure the VPN enforcement method on Server1 successfully. 

What should you install on Server1 before you run the Configure NAP wizard? 

A. A computer certificate 

B. A system health validator (SHV) 

C. The Remote Access server role 

D. The Host Credential Authorization Protocol (HCAP) 

Answer:

Explanation: 

http://technet.microsoft.com/fr-fr/library/dd314165%28v=ws.10%29.aspx 

Q7. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

Client computers run either Windows 7 or Windows 8. All of the client computers have an application named App1 installed. 

The domain contains a Group Policy object (GPO) named GPO1 that is applied to all of the client computers. 

You need to add a system variable named App1Data to all of the client computers. 

Which Group Policy preference should you configure? 

A. Ini Files 

B. Data Sources 

C. Services 

D. Environment 

Answer:

Explanation: Environment Variable preference items allow you to create, update, replace, and delete user and system environment variables or semicolon-delimited segments of the PATH variable. 

Note: Creating an Environment Variable item To create a new Environment Variable preference item 

. Open the.Group Policy Management Console.. Right-click the Group Policy object (GPO) that should contain the new preference item, and then click.Edit.. . In the console tree under.Computer Configuration.or.User Configuration., expand the.Preferences.folder, and then expand the.Windows Settings.folder. 

. Right-click the.Environment.node, point to.New., and select.Environment Variable.. . In the.New Environment Variable Properties.dialog box, select an.Action.for Group 

Policy to perform. (For more information, see "Actions" in this topic.) . Enter environment variable settings for Group Policy to configure or remove. . Click the.Common.tab, configure any options, and then type your comments in 

the.Description.box. 

. Click.OK.. The new preference item appears in the details pane. 

Reference: Configure an Environment Variable Item 

Q8. Which feature is described below? 

You can use the ___ to reduce the number of duplicate blocks of data in storage, you can store much more data in a given amount of storage capacity than was possible in previous releases that used Single Instance 

Storage (SIS) or NTFS file system compression. 

A. iSCSI Target Server 

B. iSCSI Target Boot 

C. Multiterabyte Volumes 

D. Data Deduplication role service 

Answer:

Explanation: 

By using Data Deduplication, general purpose file servers can typically reduce storage capacity utilization by a 2:1 ratio (for example, files that previously used 1 TB would use 500 GB after deduplication). Servers that host virtualization data (such as VHD files) often reduce storage capacity utilization by a 20:1 ratio, which reduces 1 TB of data to 50 GB. 

Q9. Your network contains an Active Directory domain named contoso.com.All user accounts in the marketing department reside in an organizational unit (OU) named OU1. 

You have a Group Policy object (GPO) named GPO1. GPO1 contains Folder Redirection settings. GPO1 has default permissions. 

You discover that the Folder Redirection settings are not applied to the users in the marketing department. 

You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that the Folder Redirection settings in GPO1 apply to the marketing users. 

What should you do? 

A. Modify the Delegation settings of GPO1 

B. Enable the link of GPO1 

C. Enforce GPO1 

D. Modify the link order of GPO1 

Answer:

Q10. You have a server named Corel that has a Server Core Installation of Windows Server 2012 R2. Corel has the Hyper-V server role installed. Corel has two network adapters from different third-party hardware vendors. 

You need to configure network traffic failover to prevent connectivity loss if a network adapter fails. 

What should you use? 

A. New-NetSwitchTeam 

B. Install-Feature 

C. Add-NetSwitchTeamMember 

D. Netsh.exe 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/jj553814.aspx Detailed Description The New-NetSwitchTeam cmdlet creates a new switch team. A switch team must have a name for the team and must be created with one or more members, or network adapters. The network switch team is a team that is controlled by a Hyper-V extensible switch forwarding extension. No other cmdlets can be used to manage a switch team and the NetSwitchTeam cmdlets must not be used to manage standard, or non-switch, network adapter teams. 

Q11. You have a server named Server1 that runs Windows Server 2012 R2. You create a custom Data Collector Set (DCS) named DCS1. You need to configure DCS1 to meet the following requirements: 

Automatically run a program when the amount of total free disk space on Server1 drops below 10 percent of capacity. 

Log the current values of several registry settings. 

Which two should you configure in DCS1? (Each correct answer presents part of the solution. Choose two.) 

A. System configuration information 

B. A Performance Counter Alert 

C. Event trace data 

D. A performance counter 

Answer: A,B 

Q12. You have a server named Server1 that runs Windows Server 2012 R2. 

Server1 is backed up by using Windows Server Backup. The backup configuration is shown in the exhibit. (Click the Exhibit button.) 

You discover that only the last copy of the backup is maintained. 

You need to ensure that multiple backup copies are maintained. 

What should you do? 

A. Configure the Optimize Backup Performance settings. 

B. Modify the Volume Shadow Copy Service (VSS) settings. 

C. Modify the backup times. 

D. Modify the backup destination. 

Answer:

Explanation: 

A, The destination in the exhibit shows a network share is useD. If a network share is being used only the latest copy will be saved http://windows.microsoft.com/en-us/windows7/where-should-i-save-my-backup 

Q13. You have a Hyper-V host named Server1 that runs Windows Server 2012 R2 Datacenter. 

Server1 is located in an isolated network that cannot access the Internet. 

On Server1, you install a new virtual machine named VM1. VM1 runs Windows Server 

2012 R2 Essentials and connects to a private virtual network. 

After 30 days, you discover that VM1 shuts down every 60 minutes. 

You need to resolve the issue that causes VM1 to shut down every 60 minutes. 

What should you do? 

A. OnVM1, run slmgr.exe and specify the /ipk parameter. 

B. OnServer1, run slmgr.exe and specify the /rearm-sku parameter. 

C. Create a new internal virtual network and attach VM1 to the new virtual network. 

D. On Server1, run Add-WindowsFeatureVolumeActivation. 

Answer:

Q14. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two organizational units (OUs) named OU1 and OU2 in the root of the domain. Two Group Policy objects (GPOs) named GPO1 and GP02 are created. GPO1 is linked to OU1. 

GPO2 is linked to OU2. OU1 contains a client computer named Computer1. OU2 contains a user named User1. You need to ensure that the GPOs Applied to Computer1areApplied to User1 when User1 logs on. 

What should you configure? 

A. The GPO Status 

B. WMI Filtering 

C. GPO links 

D. Item-level targeting 

Answer:

Q15. Your network contains three servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2. 

You need to ensure that Server1 can provide iSCSI storage for Server2 and Server3. What should you do on Server1? 

A. Install the iSCSI Target Server role service and configure iSCSI targets 

B. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties 

C. Install the iSNS Server service feature and create a Discovery Domain 

D. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties 

Answer:

START 70-417 EXAM