|PDF Version||Software Version|
100% Guarantee on Products High Success Rate, supported by our 99.3% pass rate history and money back guarantee should you fail your exam.
Updated regularly Get hold of Updated Exam Materials Every time. Free updates without any extra charges to the actual exam.
70-417 PDF Questions & Answers Available in a universal Adobe PDF format. Portable and printable anywhere anytime.
Quality and Value Exact Exam Questions with Correct Answers, verified by Experts with years of Experience in IT Field.
Customizable Testing Engine Simulates a real world exam environment to prepare you for 70-417 Success.
Unlimited Practice 70-417 Exam Re-takes Practice Until you get it right. With options to Highlight missed questions, you can analyse your mistakes and prepare for Ultimate 70-417 Success.
Special Promotion More than 30% Discount for Royal Pack.
Youre going to get the actual detailed reason when you deal with troubles on your [productsort] research. Examcollection provide you the actual [productsort] Upgrading Your Skills to MCSA Windows Server 2012 tips legibly inside the [productsort] puts. These types of significantly preserving your own costs to get familiar with the actual Microsoft courses.
You have a Hyper-V host named HYPERV1. HYPERV1 hosts a virtual machine named
You need to prevent the clock on DC1 from synchronizing from the clock on HYPERV1.
What should you configure? To answer, select the appropriate object in the answer area.
81. Your network contains an Active Directory domain named adatum.com. The domain contains three domain controllers. The domain controllers are configured as shown in the following table.
DC3 loses network connectivity due to a hardware failure. You plan to remove DC3 from the domain.
You log on to DC3.
You need to identify which service location (SRV) records are registered by DC3.
What should you do?
A. Open the %windir%\\system32\\dns\\backup\\adatum.com.dns file.
B. Open the %windir%\\system32\\config\\netlogon.dns file.
C. Run ipconfig /displaydns.
D. Run dcdiag /test:dns.
The netlogon.dns file contains all registrations. http://support.microsoft.com/kb/816587/en-us How to verify that SRV DNS records have been created for a domain controller The SRV record is a Domain Name System (DNS) resource record that is used to identify computers that host specific services. SRV resource records are used to locate domain controllers for Active Directory. To verify SRV locator resource records for a domain controller, use one of the following methods. DNS Manager After you install Active Directory on a server running the Microsoft DNS service, you can use the DNS Management Console to verify that the appropriate zones and resource records are created for each DNS zone. Active Directory creates its SRV records in the following folders, where Domain_Name is the name of your domain: Forward Lookup Zones/Domain_Name/_msdcs/dc/_sites/Default-First-Site-Name/_tcp Forward Lookup Zones/Domain_Name/_msdcs/dc/_tcp In these locations, an SRV record should appear for the following services: _kerberos _ldap Netlogon.dns If you are using non-Microsoft DNS servers to support Active Directory, you can verify SRV locator resource records by viewing Netlogon.dns. Netlogon.dns is located in the %systemroot%\\System32\\Config folder. You can use a text editor, such as Microsoft Notepad, to view this file. The first record in the file is the domain controller's Lightweight Directory Access Protocol (LDAP) SRV record. This record should appear similar to the following: _ldap._tcp.Domain_Name Nslookup Nslookup is a command-line tool that displays information you can use to diagnose Domain Name System (DNS) infrastructure. To use Nslookup to verify the SRV records, follow these steps:
On your DNS, click Start, and then click Run.
In the Open box, type cmd.
Type nslookup, and then press ENTER.
Type set type=all, and then press ENTER.
Type _ldap._tcp.dc._msdcs.Domain_Name, where Domain_Name is the name of your
domain, and then press ENTER.
Nslookup returns one or more SRV service location records
Q72. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
On all of the domain controllers, Windows is installed in C:\\Windows and the Active Directory database is located in D:\\Windows\\NTDS\\.
All of the domain controllers have a third-party application installed.
The operating system fails to recognize that the application is compatible with domain controller cloning.
You verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning.
What should you do?
A. In C:\\Windows\\, create an XML file named DCCIoneConfig.xml and add the application information to the file.
B. In the root of a USB flash drive, add the application information to an XML file named DefaultDCCIoneAllowList.xml.
C. In D:\\Windows\\NTDS\\, create an XML file named DCCIoneConfig.xml and add the application information to the file.
D. In D:\\Windows\\NTDS\\, create an XML file named CustomDCCIoneAllowList.xml and add the application information to the file.
http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domainservices-in-windows-server-2012-part-13-domain-controller-cloning.aspx Place the CustomDCCloneAllowList.xml file in the same folder as the Active Directory database (ntds.dit) on the source Domain Controller.
Q73. You can create a printing pool to automatically distribute print jobs to the next available
printer. A printing pool is one logical printer connected to multiple printers through multiple
ports of the print server.
The printer that is idle receives the next document sent to the logical printer.
All printers in a pool must use the same driver. Is the above statement true or false?
Printer Pool requires identical hardware and drivers.
Your network contains two Hyper-V hosts that are configured as shown in the following table.
You create a virtual machine on Server1 named VM1.
You plan to export VM1 from Server1 and import VM1 to Server2.
You need to ensure that you can start the imported copy of VM1 from snapshots.
What should you configure on VM1?
To answer, select the appropriate node in the answer area.
19. You have a virtual machine named VM1 that runs on a host named Host1.
You configure VM1 to replicate to another host named Host2. Host2 is located in the same physical location as Host1.
You need to add an additional replica of VM1. The replica will be located in a different physical site.
What should you do?
A. From VM1 on Host2, click Extend Replication.
B. On Host1, configure the Hyper-V settings.
C. From VM1 on Host1, click Extend Replication.
D. On Host2, configure the Hyper-V settings.
http://blogs.technet.com/b/virtualization/archive/2013/12/10/hyper-v-replica-extend-replication.aspx Once that is done, go to replica site and from Hyper-V UI manager select the VM for which you want to extend the replication. Right click on VM and select “Replication->Extend Replication …”. This will open Extend Replication Wizard which is similar to Enable Replication Wizard. http://technet.microsoft.com/en-us/library/dn551365.aspx http://technet.microsoft.com/en-us/library/jj134240.aspx NOTE: You configure a server to receive replication with Hyper-V Manager, in this situation the replica site is assumed to be the Replica Server. Therefore you extend replication from VM1 on Host2.
Q75. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the Hyper-V server role installed.
You plan to replicate virtual machines between Server1 and Server2. The replication will be encrypted by using Secure Sockets Layer (SSL).
You need to request a certificate on Server1 to ensure that the virtual machine replication is encrypted.
Which two intended purposes should the certificate for Server1 contain? (Each correct answer presents part of the solution. Choose two.)
A. Client Authentication
B. Kernel Mode Code Signing
C. Server Authentication
D. IP Security end system
E. KDC Authentication
Q76. Your network contains an Active Directory domain named adatum.com. The domain
contains a member server named Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2.
On DC2, you open Server Manager and you add Server1 as another server to manage.
From Server Manager on DC2, you right-click Server1 as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that when you right-click Server1, you see the option to run the DHCP console.
What should you do?
A. On DC2, install the Role Administration Tools.
B. On DC2 and Server1, run winrmquickconfig.
C. In the domain, add DC2 to the DHCP Administrators group.
D. On Server1, install the Feature Administration Tools.
You need to install the feature administrations tools for the dhcp . Need to install DHCP management tools on DC2 then you will have access to dhcp management.
Q77. Complete the missing word from the sentence below that is describing one of the new roles in Server 2008:
By using__________ , you can augment an organization's security strategy by protecting information through persistent usage policies, which remain with the information, no matter where it is moved.
A. AD FS
B. AD RMS
D. AD LDS
Active Directory Rights Management Services (AD RMS)
Q78. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1.
You make a change to GPO1.
You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solution must minimize administrative effort.
Which tool should you use?
A. The Set-AdComputercmdlet
B. Group Policy Object Editor
C. Active Directory Users and Computers
D. Group Policy Management Console (GPMC)
In the previous versions of Windows, this was accomplished by having the user run
GPUpdate.exe on their computer. Starting with Windows Server? 2012 and Windows?8,
you can now remotely refresh Group Policy settings for all computers in an OU from one
central location through the Group Policy Management Console (GPMC). Or you can use
the Invoke-GPUpdate cmdlet to refresh Group Policy for a set of computers, not limited to
the OU structure, for example, if the computers are located in the default computers
container. Note: Group Policy Management Console (GPMC) is a scriptable Microsoft
Management Console (MMC) snap-in, providing a single administrative tool for managing
Group Policy across the enterprise. GPMC is the standard tool for managing Group Policy.
Not B: Secedit configures and analyzes system security by comparing your current
configuration to at least one template.
Reference: Force a Remote Group Policy Refresh (GPUpdate)
Q79. Your company has a main office and a branch office.
The network contains an Active Directory domain named contoso.com.
The main office contains a domain controller named DC1 that runs Windows Server 2012 R2.
DC1 is a DNS server and hosts a primary zone for contoso.com. The branch office contains a member server named Server1 that runs Windows Server 2012 R2. Server1 is a DNS server and hosts a secondary zone for contoso.com.
The main office connects to the branch office by using an unreliable WAN link.
You need to ensure that Server1 can resolve names in contoso.com if the WAN link in unavailable for three days.
Which setting should you modify in the start of authority (SOA) record?
A. Retry interval
B. Refresh interval
C. Expires after
D. Minimum (default) TTL
Explanation: Used by other DNS servers that are configured to load and host the zone to determine when zone data expires if it is not renewed
Q80. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2.
The domain contains two domain controllers. The domain controllers are configured as shown in the following table.
Active Directory Recycle Bin is enabled.
You discover that a support technician accidentally removed 100 users from an Active
Directory group named Group1 an hour ago.
You need to restore the membership of Group1.
What should you do?
A. Perform tombstone reanimation.
B. Export and import data by using Dsamain.
C. Perform a non-authoritative restore.
D. Recover the items by using Active Directory Recycle Bin.
As far as the benefits of the Windows 2012 Recycle Bin, they are the same as the Windows 2008 R2 recycle bin with the exception of the new user interface which makes it more user-friendly. These additional benefits include: • All deleted AD object information including attributes, passwords and group membership can be selected in mass then undeleted from the user interface instantly or via Powershell • User-friendly and intuitive interface to filter on AD objects and a time period • Can undelete containers with all child objects https://www.simple-talk.com/sysadmin/exchange/the-active-directory-recycle-bin-in-windows-server-2008-r2/ http://communities.quest.com/community/quest-itexpert/blog/2012/09/24/the-windows-server-2012-recycle-binand-recovery-manager-for-active-directory