70-417 Premium Bundle

70-417 Premium Bundle

Upgrading Your Skills to MCSA Windows Server 2012 Certification Exam

4.5 
(13950 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-417 Free Practice Questions

Q1. You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. VM1 has several snapshots. You need to modify the snapshot file location of VM1. What should you do? 

A. Right-click VM1, and then click Export… 

B. Shut down VM1, and then modify the settings of VM1. 

C. Delete the existing snapshots, and then modify the settings of VM1. 

D. Pause VM1, and then modify the settings of VM1. 

Answer:

Explanation: 

Explanation You will need to navigate to the Hyper-V Management snap-in (C:\ProgramData\Microsoft\Windows\Hyper-V) and from there access the Snapshot file Location tab where you can change the settings for the VM1 snapshot file location. 

However, since there are already several snapshots in existence, you will need to delete them first because you will not be able to change the location of the snapshot file while there is an existing snapshot and you need to modify the snapshot file location of VM1. 

Q2. You have a server named FS1 that runs Windows Server 2012 R2. 

You install the File and Storage Services server role on FS1. 

From Windows Explorer, you view the properties of a shared folder named Share1 and you 

discover that the Classification tab is missing. 

You need to ensure that you can assign classifications to Share1 from Windows Explorer manually. 

What should you do? 

A. Install the Enhanced Storage feature. 

B. From Folder Options, clear Use Sharing Wizard (Recommend). 

C. Install the File Server Resource Manager role service. 

D. From Folder Options, select Show hidden files, folders, and drives. 

Answer:

Q3. You have a server named Server1 that runs Windows Server 2012 R2. 

You need to configure Server1 to create an entry in an event log when the processor usage exceeds 60 percent. 

Which type of data collector should you create? 

A. A performance counter data collector 

B. An event trace data collector 

C. A performance counter alert 

D. A configuration data collector 

Answer:

Q4. RAG DROP 

You have a server named Server2 that runs Windows Server 2012 R2. You have storage provisioned on Server2 as shown in the exhibit. (Click the Exhibit button.) 

You need to configure the storage so that it appears in Windows Explorer as a drive letter on Server1. 

Which three actions should you perform in sequence? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer:  

Q5. Your IT company is constantly changing, with new users coming and going throughout the year. One of your common tasks requires the deletion of user accounts for employees who have left the company. Which command can be used to delete user accounts? 

A. LDIFDE 

B. Dsmod 

C. Dspromo 

D. Netsh 

Answer:

Explanation: 

So far, dsmod modifies but cannot delete ldifde can 

Q6. Your network contains an Active Directory domain named adatum.com. The domain contains a server named CA1 that runs Windows Server 2012 R2. CA1 has the Active Directory Certificate Services server role installed and is configured to support key archival and recovery. 

You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory Certificate Services (AD CS) database. The solution must prevent User1 from retrieving the private keys from the AD CS database. 

What should you do? 

A. Assign User1 the Issue and Manage Certificates permission to CA1. 

B. Assign User1 the Read permission and the Write permission to all certificate templates. 

C. Provide User1 with access to a Key Recovery Agent certificate and a private key. 

D. Assign User1 the Manage CA permission to CA1. 

Answer:

Explanation: 

http://social.technet.microsoft.com/wiki/contents/articles/7573.active-directory-certificate-services-pki-keyarchival-and-management.aspx#Protecting_Key_Recovery_Agent_Keys 

Q7. OTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1. All servers run Windows Server 2012 R2. 

You install the IP Address Management (IPAM) Server feature on Server1. 

From the Provision IPAM wizard, you select the Group Policy Based provisioning method and enter a GPO name prefix of IPAM1. 

You need to provision IPAM by using Group Policy. 

What command should you run on Server1 to complete the process? To answer, select the appropriate options in the answer area. 

Answer:  

Q8. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that runs Windows Server 2012 R2. 

On Server1, you create a work folder named Work1. A user named User1 connects to Work1 from a computer named Computer1. 

You need to identify the last time the documents in Work1 were synchronized successfully from Computer1. What should you do? 

A. From Windows PowerShell, run the Get-SyncShare cmdlet 

B. From Windows PowerShell, run the Get-SyncUserSettings cmdlet 

C. From Server Manager, review the properties of Computer1 

D. From Server Manager, review the properties of User1 

Answer:

Q9. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 has 8 GB of RAM. 

Server1 hosts five virtual machines that run Windows Server 2012 R2. 

The settings of a virtual machine named Server3 are configured as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that when Server1 restarts, Server3 automatically resumes without intervention. The solution must prevent data loss. 

Which settings should you modify? 

A. BIOS 

B. Automatic Stop Action 

C. Automatic Start Action 

D. Integration Services 

Answer:

Explanation: The Automatic Stop Action setting should be modified because it will allow you to configure: “Save the virtual machine state” option instructs Hyper-V Virtual Machine Management Service to save the virtual machine state on the local disk when the Hyper-V Server shuts down. OR “Turn Off the virtual machine” is used by the Hyper-V Management Service (VMMS.exe) to gracefully turn off the virtual machine. 

OR “Shut down the guest operating system” is successful only if the “Hyper-V Shutdown” guest service is running in the virtual machine. The guest service is required to be running in the virtual machine as the Hyper-V VMMS.EXE process will trigger Windows Exit message which is received by the service. Once the message is received by the guest service, it takes the necessary actions to shut down the virtual machine. 

References: http://www.altaro.com/hyper-v/hyper-v-automatic-start-and-stop-action/ 

Q10. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 has the Remote Access server role installed. 

You log on to Server1 by using a user account named User2. 

From the Remote Access Management Console, you run the Getting Started Wizard and you receive a warning message as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can configure DirectAccess successfully. The solution must minimize the number of permissions assigned to User2. 

To which group should you add User2? 

A. Account Operators 

B. Enterprise Admins 

C. Domain Admins 

D. Server Operators 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/hh918408.aspx#feedback 

Q11. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. 

You log on to Server1. 

You need to retrieve the IP configurations of Server2. 

Which command should you run from Server1? 

A. winrm get server2 

B. dsquery . -scope base -attrip/server2 

C. winrs -r:server2ipconfig 

D. ipconfig> server2.ip 

Answer:

Explanation: 

Windows Remote Management allows you to manage and execute programs remotely References: Exam Ref 70-410: Installing and Configuring Windows Server 2012: Objective 4.3: Deploy and Configure the DNS service, Chapter 4 Deploying and Configuring core network services, p. 246 http://technet.microsoft.com/en-us/library/dd349801(v=ws.10).aspx 

Q12. Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

On a server named Corel, you perform a Server Core Installation of Windows Server 2012 R2. You join Corel to the adatum.com domain. 

You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1. 

What should you do on Core1? 

A. Run the Enable-NetFirewallRulecmdlet. 

B. Run the Disable-NetFirewallRulecmdlet. 

C. Install Remote Server Administration Tools (RSAT). 

D. Install Windows Management Framework. 

Answer:

Q13. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are configured as shown in the following table. 

You need to ensure that when new targets are added to Server1, the targets are registered on Server2 automatically. 

What should you do on Server1? 

A. Configure the Discovery settings of the iSCSI initiator 

B. Configure the security settings of the iSCSI target 

C. Run the Set-Wmilnstance cmdlet 

D. Run the Set-IscsiServerTarget cmdlet 

Answer:

Q14. RAG DROP 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. 

The domain contains an organizational unit (OU) named OU1. OU1 contains an OU named OU2. OU2 contains a user named User1. 

User1 is the member of a group named Group1. Group1 is in the Users container. 

You create five Group Policy objects (GPO). The GPOs are configured as shown in the following table. 

The Authenticated Users group is assigned the default permissions to all of the GPOs. 

There are no site-level GPOs. 

You need to identify which three GPOs will be applied to User1 and in which order the 

GPOs will be applied to User1. 

Which three GPOs should you identify in sequence? 

To answer, move the appropriate three GPOs from the list of GPOs to the answer area and 

arrange them in the correct order. 

Answer:  

Q15. RAG DROP 

Your network contains an Active Directory domain named adatum.com. The domain contains three servers. The servers are configured as shown in the following table. Server1 is configured as shown in the exhibit. (Click the Exhibit button.) 

Template1 contains custom cryptography settings that are required by the corporate security team. 

On Server2, an administrator successfully installs a certificate based on Template1. 

The administrator reports that Template1 is not listed in the Certificate Enrollment wizard on Server3, even after selecting the Show all templates check box. 

You need to ensure that you can install a server authentication certificate on Server3. The certificate must comply with the cryptography requirements. 

Which three actions should you perform in sequence? 

To answer, move the appropriate three actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer:  

START 70-417 EXAM