Are You Interested in Successfully Completing the Microsoft 70-417 Certification Then Start to Earning Salary? Braindump2go has Leading Edge Developed Microsoft Exam Questions that will Ensure You Pass this 70-417 Certification! Braindump2go Delivers you the Most Accurate, Current and Latest Updated 70-417 Certification Exam Questions Availabe with a 100% Money Back Guarantee Promise!
Vendor: Microsoft
Exam Code: 70-417
Exam Name: Upgrading Your Skills to MCSA Windows Server 2012 R2 Exam
QUESTION 31
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC5. DC5 has a Server Core Installation of Windows Server 2012 R2. You need to uninstall Active Directory from DC5 manually.
Which tool should you use?
A. The ntdsutil.exe command
B. The dcpromo.exe command
C. The Remove-WindowsFeaturecmdlet
D. The Remove-ADComputercmdlet
Answer: C
Explanation:
Explanation/Reference:
http://technet.microsoft.com/en-us/library/hh472163.aspx#BKMK_RemoveSM
http://technet.microsoft.com/en-us/library/cc732257.aspx#BKMK_powershell
QUESTION 32
Your network contains an Active Directory domain named adatum.com.
The domain contains several thousand member servers that run Windows Server 2012 R2.
All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts. Servers are restarted only occasionally.
You need to identify which servers were restarted during the last two days.
What should you do?
A. Run dsquery computer and specify the -sra /epwc parameter.
B. Run Get-ADComputer and specify the SearchScope parameter.
C. Run dsquery server and specify the -o parameter.
D. Run Get-ADComputer and specify the lastLogon property
Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/ee617192.aspx
SearchScope
Specifies the scope of an Active Directory search.
Possible values for this parameter are:
Base or 0
OneLevel or 1
Subtree or 2
A Base query searches only the current path or object.
A OneLevel query searches the immediate children of that path or object.
A Subtree query searches the current path or object and all children of that path or object.
=================
http://technet.microsoft.com/en-us/library/cc732885%28v=ws.10%29.aspx
Dsquery server
-o {dn | rdn}
Specifies the format that dsquery uses to display the search results. A dn value displays the distinguished name of each entry. An rdn value displays the relative distinguished name of each entry. The default value is dn.
NB : epwc doesn’t exist for Dsquery computer
=================
so even if i’m not sure it’s the best way, the only possible answer is using “Get-ADComputer and specify the lastLogon property”
QUESTION 33
Your network contains an Active Directory domain named adatum.com.
The domain contains three domain controllers.
The domain controllers are configured as shown in the following table.
DC3 loses network connectivity due to a hardware failure.
You plan to remove DC3 from the domain.
You log on to DC3.
You need to identify which service location (SRV) records are registered by DC3.
What should you do?
A. Open the %windir%\system32\dns\backup\adatum.com.dns file.
B. Run ipconfig /displaydn*.
C. Run dcdiag /test:dns,
D. Open the %windir%\system32\config\netlogon.dns file.
Answer: D
Explanation:
The netlogon.dns file contains all registrations.
http://support.microsoft.com/kb/816587/en-us
How to verify that SRV DNS records have been created for a domain controller
The SRV record is a Domain Name System (DNS) resource record that is used to identify computers that host specific services. SRV resource records are used to locate domain controllers for Active Directory. To verify SRV locator resource records for a domain controller, use one of the following methods. DNS Manager After you install Active Directory on a server running the Microsoft DNS service, you can use the DNS Management Console to verify that the appropriate zones and resource records are created for each DNS zone. Active Directory creates its SRV records in the following folders, where Domain_Name is the name of your domain:
Forward Lookup Zones/Domain_Name/_msdcs/dc/_sites/Default-First-Site-Name/_tcp
Forward Lookup Zones/Domain_Name/_msdcs/dc/_tcp
In these locations, an SRV record should appear for the following services:
_kerberos _ldap Netlogon.dns
If you are using non-Microsoft DNS servers to support Active Directory, you can verify SRV locator resource records by viewing Netlogon.dns. Netlogon.dns is located in the %systemroot%\System32\Config folder. You can use a text editor, such as Microsoft Notepad, to view this file. The first record in the file is the domain controller’s Lightweight Directory Access Protocol (LDAP) SRV record.
This record should appear similar to the following:
_ldap._tcp.Domain_Name
Nslookup
Nslookup is a command-line tool that displays information you can use to diagnose Domain Name System (DNS) infrastructure.
To use Nslookup to verify the SRV records, follow these steps:
On your DNS, click Start, and then click Run.
In the Open box, type cmd.
Type nslookup, and then press ENTER.
Type set type=all, and then press ENTER.
Type _ldap._tcp.dc._msdcs.Domain_Name, where Domain_Name is the name of your domain, and then press ENTER.
Nslookup returns one or more SRV service location records
QUESTION 34
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the HyperV server role installed. On Server1, you create a virtual machine named VM1.
VM1 has a legacy network adapter.
You need to assign a specific amount of available network bandwidth to VM1.
What should you do first?
A. Add a second legacy network adapter, and then configure network adapter teaming.
B. Remove the legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
C. Remove the legacy network adapter, and then add a network adapter.
D. Add a second legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
Answer: C
Explanation:
The legacy adapter doesn’t support bandwidth management (check screenshots below). and if we remove the legacy network adapter without adding a new one, what would we set with Set- VMNetworkAdapter? so the complete answer should be “Remove the legacy network adapter, then add a network adapter, and then run the Set-VMNetworkAdaptercmdlet” but we’re asked for what we should do FIRST…
(You’ll see in the next screenshot that for a “Network adapter, bandwidth is managed here) http://technet.microsoft.com/en-us/library/hh848457.aspx Set-VMNetworkAdapter Configures features of the virtual network adapter in a virtual machine or the management operating system.[…]
-MaximumBandwidth<Int64>Specifies the maximum bandwidth, in bits per second, for the virtual network adapter. The specified value is rounded to the nearest multiple of eight. Specify zero to disable the feature.
Bandwidth management
Bandwidth management is a new feature in Windows Server 2012 R2 Hyper-V that enables you to set both a minimum and maximum Mbps of throughput for any virtual network adapter. In Windows Server 2008 R2, you could configure a maximum bandwidth but not a minimum. Now you can configure both a minimum and a maximum for each virtual network adapter.
You enable and configure bandwidth management on a virtual network adapter in the settings of a VM, as shown in Figure 3-12. For either the Minimum Bandwidth or Maximum Bandwidth setting, configuring a value of 0 leaves that setting unrestricted.
You can also use the Set-VMNetworkAdapter to configure minimum and maximum bandwidth on a virtual network adapter. As an alternative to specifying a value for Mbps, you can use this cmdlet to specify a relative bandwidth weight between 0 and 100 relative to other virtual network adapters. To ensure that all virtual network adapters are given an equal minimum or maximum bandwidth, you can assign the same bandwidth weight to all adapters.
QUESTION 35
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has the HyperV server role installed.
The disks on Server1 are configured as shown in the exhibit. (Click the Exhibit button.)
You create a virtual machine on Server1.
You need to ensure that you can configure a pass-through disk for the virtual machine.
What should you do?
A. Convert Disk 1 to a dynamic disk.
B. Delete partition E.
C. Convert Disk 1 to a GPT disk.
D. Take Disk 1 offline.
Answer: D
Explanation:
NB: added the missing exhibit
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-inhyper- v.aspx
Pass-through Disk Configuration
Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspective.
Additionally, this raw piece of storage is not limited in size so, hypothetically, it can be a multi terabyte LUN.
After storage is mapped to the Hyper-V server, it will appear as a raw volume and will be in an Offline state (depending on the SAN Policy (Figure 1-1)) as seen in Figure 1.
we stated earlier that a disk must be Offline from the Hyper-V servers’ perspective in order for the Guest to have exclusive access. However, a raw volume must first be initialized before it can be used. To accomplish this in the Disk Management interface, the disk must first be brought Online. Once Online, the disk will show as being Not Initialized (Figure 2).
Right-click on the disk and select Initialize Disk (Figure 3)
Select either an MBR or GPT partition type (Figure 4).
Once a disk is initialized, it can once again be placed in an Offline state. If the disk is not in an Offline state, it will not be available for selection when configuring the Guest’s storage. In order to configure a Pass-through disk in a Guest, you must select Attach a virtual disk later in the New Virtual Machine Wizard (Figure 5).
If the Pass-through disk will be used to boot the operating system, it must be attached to an IDE Controller. Data disks can take advantage of SCSI controllers.
In Figure 6, a Passthrough disk is attached to IDE Controller 0.
Note: If the disk does not appear in the drop down list, ensure the disk is Offline in the Disk Management interface (In Server CORE, use the diskpart.exe CLI). Once the Pass-through disk is configured, the Guest can be started and data can placed on the drive. If an operating system will be installed, the installation process will properly prepare the disk. If the disk will be used for data storage, it must be prepared in the Guest operating system before data can be placed on it. If a Pass- through disk, being used to support an operating system installation, is brought Online before the Guest is started, the Guest will fail to start. When using Pass-through disks to support an operating system installation, provisions must be made for storing the Guest configuration file in an alternate location. This is because the entire Pass-through disk is consumed by the operating system installation. An example would be to locate the configuration file on another internal drive in the Hyper-V server itself. Or, if it is a cluster, the configuration file can be hosted on a separate cluster providing highly available file services. Be aware that Pass-through disks cannot be dynamically expanded. Additionally, when using Pass-through disks, you lose the capability to take snapshots, and finally, you cannot use differencing disks with Pass-through disks.
QUESTION 36
Your company’s security policy states that all of the servers deployed to a branch office must not have the graphical user interface (GUI) installed. In a branch office, a support technician installs a server with a GUI installation of Windows Server 2012 R2 on a new server, and then configures the server as a DHCP server.
You need to ensure that the new server meets the security policy.
You want to achieve this goal by using the minimum amount of administrative effort.
What should you do?
A. From Server Manager, uninstall the User Interfaces and Infrastructure feature.
B. Reinstall Windows Server 2012 R2on the server.
C. From Windows PowerShell, run Uninstall-WindowsFeature Desktop-Experience.
D. From Windows PowerShell, run Uninstall-WindowsFeature PowerShell-ISE.
Answer: A
Explanation:
QUESTION 37
You have 3 server that runs Windows Server 2012 R2.
The server contains the disks configured as shown in the following table.
You need to create a volume that can store up to 3 TB of user files.
The solution must ensure that the user files are available if one of the disks in the volume fails.
What should you create?
A. A storage pool on Disk 2 and Disk 3
B. A mirrored volume on Disk 2 and Disk 3
C. A storage pool on Disk 1 and Disk 3
D. A mirrored volume on Disk l and Disk 4
E. Raid 5 Volume out of Disks 1, 2 and 3
Answer: B
Explanation:
A. Storage pool can’t use Dynamic disk
B. Mirrored volume will be > 3Tb
C. Storage pool can’t use Dynamic disk
D. is impossible, we need 3Tb of disk space
E. Raid5 need to be on dynamic disk
QUESTION 38
You have a server named Corel that has a Server Core Installation of Windows Server 2012 R2. Corel has the Hyper-V server role installed.
Corel has two network adapters from different third-party hardware vendors.
You need to configure network traffic failover to prevent connectivity loss if a network adapter fails.
What should you use?
A. netsh.exe
B. Install-Feature
C. New-NetSwitchTeam
D. Add -Nets witchTeamMember
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/jj553814.aspx
QUESTION 39
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has five network adapters. Three of the network adapters are connected to a network named LAN1.
The two other network adapters are connected to a network named LAN2.
You need to create a network adapter team from the three network adapters connected to LAN1.
Which tool should you use?
A. Routing and Remote Access
B. Network Load Balancing Manager
C. Network and Sharing Center
D. Server Manager
Answer: D
Explanation:
QUESTION 40
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.
You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs on Server1 are under a heavy load. What should you configure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O visualization
Answer: B
Explanation:
Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual machine. Resource control in used in the event where you need to adjust the computing resources of a virtual machine, you can reconfigure the resources to meet the changing needs.
You can also specify resource controls to automate how resources are allocated to virtual machines.
Braindump2go Promise All 70-417 Questions and Answers are the Latest Updated,we aim to provide latest and guaranteed questions for all certifications.You just need to be braved in trying then we will help you arrange all left things! 100% Pass All Exams you want Or Full Money Back! Do yo want to have a try on passing 70-417?