★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-417 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-417-dumps.html
Passing the Microsoft 70-417 certification exam offers never been easier simply by yourself. Examcollection Microsoft 70-417 exam coaching course can be a cheaper along with quicker way towards 70-417 certification. If you are any busy worker but eager to have the Microsoft 70-417 certification, please consider actions correct now. The upgraded and genuine Microsoft 70-417 exam braindumps contain the stimulated questions together using correct answers. The free downloadable Pdf files along with test engine creates a nearly real 70-417 exam environment. You should have access in order to all the Microsoft 70-417 study materials after your payment. Youve no time in order to hesitate. Start before, do the actual Microsoft practice questions more, and acquire the Microsoft 70-417 certification more sure. Each of our dedicated instructors hunt the actual stimulation questions which may show up on the 70-417 genuine exam. The Examcollection Microsoft 70-417 practice Pdf questions are usually complete along with comprehensive guarantee for your Microsoft Microsoft exam preparation.
2021 Oct book for 70-417:
Q221. Your network contains a single Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
The domain contains 400 desktop computers that run Windows 8 and 200 desktop
computers that run Windows Vista Service Pack 2(SP2).
All of the desktop computers are located in an organizational unit (OU) named OU1.
You create a Group Policy object (GPO) named GPO1. GPO1 contains startup script
settings.
You link GPO1 to OU1.
You need to ensure that GPO1 is applied only to computers that run Windows 8.
What should you do?
A. Modify the Security settings of OU1.
B. Create and link a WMI filter to GPO1.
C. Run the Set-GPInheritancecmdlet and specify the -target parameter.
D. Run the Set-GPLinkcmdlet and specify the -target parameter.
Answer: B
Explanation:
WMI Filtering is used to get information of the system and apply the GPO on it with the condition is met.Security filtering: apply a GPO to a specific group (members of the group)
Q222. Which terminology is being described below?
A _________ trust allows resources in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to be accessed more quickly by users in another domain (which is nested within another domain tree) in your forest.
A. one-way, outgoing, shortcut
B. two-way, incoming, shortcut
C. one-way, outgoing, forest
D. two-way, incoming, forest
Answer: A
Explanation:
The direction of the trust is inverse of the direction of the authorization not forest as we're asked for a trust only between 2 domains. a forest trust would provide trust between every single domain of the forest.
Q223. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
On a server named Server2, you perform a Server Core Installation of Windows Server 2012 R2. You join Server2 to the contoso.com domain.
You need to ensure that you can manage Server2 by using the Computer Management console on Server1.
What should you do on Server2?
A. Run sconfig.exe and configure remote management.
B. Run sconfig.exe and configure Remote Server Administration Tools (RSAT).
C. Install Windows Management Framework.
D. Install Remote Server Administration Tools (RSAT).
Answer: A
Explanation:
In Windows Server 2012, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must be a member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode.
References: http://technet.microsoft.com/en-us/library/jj647766.aspx Training Guide: Installing and Configuring Windows Server 2012, Chapter 2: Deploying servers, p. 80
Q224. Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2012 R2. The domain contains a virtual machine named DC2.
On DC2, you run Get-ADDCCloningExcludcdApplicationList and receive the output shown in the following table.
You need to ensure that you can clone DC2.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
Answer: A,E
Explanation:
Because domain controllers provide a distributed environment, you could not safely clone an Active Directory domain controller in the past.
Before, if you cloned any server, the server would end up with the same domain or forest, which is unsupported with the same domain or forest. You would then have to run sysprep, which would remove the unique security information before cloning and then promote a domain controller manually. When you clone a domain controller, you perform safe cloning, which a cloned domain controller automatically runs a subset of the sysprep process and promotes the server to a domain controller automatically.
The four primary steps to deploy a cloned virtualized domain controller are as follows:
. Grant the source virtualized domain controller the permission to be cloned by
adding the source virtualized domain controller to the Cloneable Domain
Controllers group.
. Run Get-ADDCCloningExcludedApplicationListcmdlet in Windows PowerShell to
determine which services and applications on the domain controller are not compatible with the cloning. . Run New-ADDCCloneConfigFile to create the clone configuration file, which is stored in the C:\Windows\NTDS. . In Hyper-V, export and then import the virtual machine of the source domain controller.
Run Get-ADDCCloningExcludedApplicationListcmdlet In this procedure, run the Get-ADDCCloningExcludedApplicationListcmdlet on the source virtualized domain controller to identify any programs or services that are not evaluated for cloning. You need to run the Get-ADDCCloningExcludedApplicationListcmdlet before the New-ADDCCloneConfigFilecmdlet because if the New-ADDCCloneConfigFilecmdlet detects an excluded application, it will not create a DCCloneConfig.xml file. To identify applications or services that run on a source domain controller which have not been evaluated for cloning Get-ADDCCloningExcludedApplicationList Get-ADDCCloningExcludedApplicationList -GenerateXml
The clone domain controller will be located in the same site as the source domain controller unless a different site is specified in the DCCloneConfig.xml file. Note: The Get-ADDCCloningExcludedApplicationListcmdlet searches the local domain controller for programs and services in the installed programs database, the services control manager that are not specified in the default and user defined inclusion list. The applications in the resulting list can be added to the user defined exclusion list if they are determined to support cloning. If the applications are not cloneable, they should be removed from the source domain controller before the clone media is created. Any application that appears in cmdlet output and is not included in the user defined inclusion list will force cloning to fail. The Get-ADDCCloningExcludedApplicationListcmdlet needs to be run before the New-ADDCCloneConfigFilecmdlet is used because if the New-ADDCCloneConfigFilecmdlet detects an excluded application, it will not create a DCCloneConfig.xml file. DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways.
The New-ADDCCloneConfigcmdlet in PowerShell By hand with an XML editor By editing an existing config file, again with an XML editor (Notepad is not an XML editor.)
You can populate the XML file. . . . . doesn't need to be empty. . . . .
http: //technet. microsoft. com/en-us/library/hh831734. aspx http: //blogs. dirteam. com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-cloning. aspx
Q225. Server manager is a great tool for managing most of your server settings and configuration all in one central place. Which one of the following Server manager Features is used for Storage management, replication and searching?
A. Dynamic Host Configuration Server
B. Terminal Services
C. Domain Name Service
D. File Services
Answer: D
Most recent vce 70-417:
Q226. You have five servers that run Windows Server 2012 R2. The servers have the Failover Clustering feature installed.
You deploy a new cluster named Cluster1. Cluster1 is configured as shown in the following table.
Server1, Server2/ and Server3 are configured as the preferred owners of the cluster roles. Dynamic quorum management is disabled.
You plan to perform hardware maintenance on Server3.
You need to ensure that if the WAN link between Site1 and Site2 fails while you are performing maintenance on Server3, the cluster resource will remain available in Site1.
What should you do?
A. Remove the node vote for Server3.
B. Enable DrainOnShutdown on Cluster1.
C. Add a file share witness in Site1.
D. Remove the node vote for Server4 and Server5.
Answer: D
Explanation: Exclude secondary site nodes. In general, do not give votes to WSFC (Windows Server Failover Clustering) nodes that reside at a secondary disaster recovery site. You do not want nodes in the secondary site to contribute to a decision to take the cluster offline when there is nothing wrong with the primary site.
Q227. Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012.
You create a group Managed Service Account named gservice1.
You need to configure a service named Service1 to run as the gservice1 account.
How should you configure Service1?
A. From the Services console, configure the General settings.
B. From a command prompt, run sc.exe and specify the config parameter.
C. From the Services console, configure the Log On settings.
D. From a command prompt, run sc.exe and specify the privs parameter.
Answer: B
Explanation:
To specify a binary path for the NEWSERVICE service, type:
sc config NewService binpath= "ntsd -d c:\windows\system32\NewServ.exe"
Reference: Sc config https://technet.microsoft.com/en-us/library/cc990290.aspx
Q228. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
On all of the domain controllers, Windows is installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\.
All of the domain controllers have a third-party application installed.
The operating system fails to recognize that the application is compatible with domain controller cloning.
You verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning.
What should you do?
A. In C:\Windows\, create an XML file named DCCIoneConfig.xml and add the application information to the file.
B. In the root of a USB flash drive, add the application information to an XML file named DefaultDCCIoneAllowList.xml.
C. In D:\Windows\NTDS\, create an XML file named DCCIoneConfig.xml and add the application information to the file.
D. In D:\Windows\NTDS\, create an XML file named CustomDCCIoneAllowList.xml and add the application information to the file.
Answer: D
Explanation:
http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domainservices-in-windows-server-2012-part-13-domain-controller-cloning.aspx Place the CustomDCCloneAllowList.xml file in the same folder as the Active Directory database (ntds.dit) on the source Domain Controller.
Q229. You have a print server named Print1 that runs Windows Server 2012 R2. Print1 has 10 shared printers.
You need to change the location of the spool folder.What should you modify?
A. The properties of the Print Spooler service
B. The Print Server Properties
C. The user environment variables
D. The PrintQueue.inf file
Answer: A
Q230. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1. VM1 has a legacy network adapter. You need to assign a specific amount of available network bandwidth to VM1. What should you do first?
A. Add a second legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet
B. Add a second legacy network adapter, and then configure network adapter teaming.
C. Remove the legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
D. Remove the legacy network adapter, and then add a network adapter.
Answer: D
Explanation:
Explanation Add a New network adapter because the legacy network adapter doesn’t support bandwidth management. http://technet.microsoft.com/en-us/library/hh848457(v=wps.620).aspx