Pass4sure offers free demo for exam 70 417 exam. “Upgrading Your Skills to MCSA Windows Server 2012”, also known as 70 417 dumps exam, is a Microsoft Certification. This set of posts, Passing the Microsoft microsoft 70 417 exam, will help you answer those questions. The 70 417 pdf Questions & Answers covers all the knowledge points of the real exam. 100% real Microsoft 70 417 exam exams and revised by experts!
2017 NEW RECOMMEND
Free VCE & PDF File for Microsoft 70-417 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q211. RAG DROP
You have a server that runs Windows Server 2012 R2.
You create a new work folder named Share1.
You need to configure Share1 to meet the following requirements:
Ensure that all synchronized copies of Share1 are encrypted.
Ensure that clients synchronize to Share1 every 30 minutes.
Ensure that Share1 inherits the NTFS permissions of the parent folder.
Which cmdlet should you use to achieve each requirement?
To answer, drag the appropriate cmdlets to the correct requirements. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Q212. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
On Server1, an administrator creates a virtual machine named VM1.
A user named User1 is the member of the local Administrators group on Server1.
User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the Exhibit button.)
You need to ensure that User1 can modify the settings of VM1 by running the Set-Vmcmdlet.
What should you instruct User1 to do?
A. Run Windows PowerShell with elevated privileges.
B. Install the Integration Services on VM1.
C. Modify the membership of the local Hyper-V Administrators group.
D. Import the Hyper-V module.
Explanation: You can only use the PowerShell snap-in to modify the VM settings with the
vmcmdlets when you are an Administrator.
Thus best practices dictate that User1 run the Powershell with elevated privileges.
Q213. Your network contains an Active Directory forest named contoso.com.
The forest contains two domains named contoso.com and childl.contoso.com.
The domains contain three domain controllers.
The domain controllers are configured as shown in the following table.
You need to ensure that the KDC support for claims, compound authentication, and
Kerberos armoring setting is enforced in both domains.
Which two actions should you perform? (Each correct answer presents part of the solution.
A. Raise the domain functional level of contoso.com.
B. Raise the domain functional level ofchildl.contoso.com
C. Raise the forest functional level of contoso.com
D. Upgrade DC11 to Windows Server 2012 R2
E. Upgrade DC1 to Windows Server 2012 R2
You have a server named Server1 that runs Windows Server 2012 R2. Server1 does not have Internet connectivity.
All roles are removed completely from Server1.
You mount a Windows Server 2012 R2 installation image to the C:\\Source folder.
You need to install the DNS Server server role on Server1.
Which folder should you use as the source?
To answer, select the appropriate folder in the answer area.
211. Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
DirectAccess is deployed to the network.
Remote users connect to the DirectAccess server by using a variety of network speeds.
The remote users report that sometimes their connection is very slow.
You need to minimize Group Policy processing across all wireless wide area network
Which Group Policy setting should you configure?
A. Configure Direct Access connections as a fast network connection.
B. Change Group Policy processing to run asynchronously when a slow network connection is detected.
C. Configure Group Policy slow link detection.
D. Configure wireless policy processing.
Q215. Your network contains three servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2.
You need to ensure that Server1 can provide iSCSI storage for Server2 and Server3. What should you do on Server1?
A. Install the iSCSI Target Server role service and configure iSCSI targets
B. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties
C. Install the iSNS Server service feature and create a Discovery Domain
D. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties
Q216. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
HVServer1 hosts two virtual machines named Server1 and Server2. Both virtual machines connect to a virtual switch named Switch1.
On Server2, you install a network monitoring application named App1.
You need to capture all of the inbound and outbound traffic to Server1 by using App1.
Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.)
A. Get-VM "Server2" | Set-VMNetworkAdapter -IovWeight 1
B. Get-VM "Server1" | Set-VMNetworkAdapter -Allow/Teaming On
C. Get-VM "Server1" | Set-VMNetworkAdapter -PortMirroring Source
D. Get-VM "Server2" | Set-VMNetworkAdapter -PortMirroring Destination
E. Get-VM "Server1" | Set-VMNetworkAdapter -IovWeight 0
F. Get-VM "Server2â | Set-VMNetworkAdapter-AllowTeaming On
Get-VM will get the virtual machines from one or more Hyper-V hosts.
-ComputerName<String> is used to specify one or more Hyper-V hosts from which virtual machines are to be retrieved. NetBIOS names, IP addresses, and fully-qualified domain names are allowable. The default is the local computer â use âlocalhostâ or a dot (â.â) to specify the local computer explicitly.
Set-VMNetworkAdapter is used to configure features of the virtual network adapter in a virtual machine or the management operating system.
-PortMirroring<VMNetworkAdapterPortMirroringMode> is used to specify the port mirroring mode for the network adapter to be configured.
With Port Mirroring, traffic sent to or from a Hyper-V Virtual Switch port is copied and sent to a mirror port. There are a range of applications for port mirroring – an entire ecosystem of network visibility companies exist that have products designed to consume port mirror data for performance management, security analysis, and network diagnostics. With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch port that receives copies of all the traffic.
Your network contains an Active Directory domain named fabrikam.com. You implement DirectAccess.
You need to view the properties of the DirectAccess connection.
Which connection properties should you view?
To answer, select the appropriate connection properties in the answer area.
Q218. RAG DROP
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012.
The domain contains an organizational unit (OU) named OU1. OU1 contains an OU named OU2. OU2 contains a user named User1.
User1 is the member of a group named Group1. Group1 is in the Users container.
You create five Group Policy objects (GPO). The GPOs are configured as shown in the following table.
The Authenticated Users group is assigned the default permissions to all of the GPOs.
There are no site-level GPOs.
You need to identify which three GPOs will be applied to User1 and in which order the
GPOs will be applied to User1.
Which three GPOs should you identify in sequence?
To answer, move the appropriate three GPOs from the list of GPOs to the answer area and
arrange them in the correct order.
Q219. Your network contains an Active Directory domain named contoso.com.
Network Policy Server (NPS) is deployed to the domain.
You plan to deploy Network Access Protection (NAP).
You need to configure the requirements that are validated on the NPS client computers.
What should you do?
A. From the Network Policy Server console, configure a health policy.
B. From the Network Policy Server console, configure a network policy.
C. From a Group Policy object (GPO), configure the NAP Client Configuration security setting.
D. From a Group Policy object (GPO), configure the Network Access Protection Administrative Templates setting.
E. From the Network Policy Server console, configure a Windows Security Health Validator (WSHV) policy.
Answer: E Explanation:
I feel the question is a bit unclear still.
If a client computer is noncompliant with one of the requirements of the WSHV, it is
considered noncompliant with the WSHV as a whole. If a computer is determined to be
noncompliant with the WSHV, the following actions might be taken:
I believe that the validation will take into account Health and Network, so it has to be both
I don't see A or D being a valid choice.
Leaving us with E. And, the site kinda confirm this.
Q220. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1. Server1 has the IP Address Management (IPAM) Server feature installed.
On DC1, you configure Windows Firewall to allow all of the necessary inbound ports for IPAM.
On Server1, you open Server Manager as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can use IPAM on Server1 to manage DNS on DC1.
What should you do?
A. Add Server1 to the Remote Management Users group.
B. Modify the outbound firewall rules on Server1.
C. Add Server1 to the Event Log Readers group.
D. Modify the inbound firewall rules on Server1.