[Free] Download New Latest (November) Microsoft 70-417 Actual Tests 221-230

Ensurepass

QUESTION 221

You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. You attach a 4-TB disk to Server1.

 

The disk is configured as an MBR disk. You need to ensure that you can create a 4-TB volume on the disk.

 

Which Diskpart command should you use?

 

A.

Automount

B.

Convert

C.

Expand

D.

Attach

 

Correct Answer: B

Explanation:

You will need to convert the disk to a GPT since GPT disks allows for partitioning and not MBR disks.

 

References:

Exam Ref 70-410: Installing and Configuring Windows Server 2012: Objective 3.2: Create and Configure virtual machine storage, Chapter 3: p. 159

Exam Ref 70-410: Installing and Configuring Server 2012: Objective 1.3: Installing and Configuring servers, Chapter 1: p. 42-43

 

 

QUESTION 222

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC4 that runs Windows Server 2012 R2.

 

You create a DCCIoneConfig.xml file. You need to clone DC4.

 

Where should you place DCCIoneConfig.xml on DC4?

 

A.

%Systemroot%SYSVOL

B.

%Systemdrive%

C.

%Systemroot%NTDS

D.

%Programdata%Microsoft

 

Correct Answer: C

Explanation:

http://technet.microsoft.com/de-de/library/hh831734.aspx

clip_image002

QUESTION 223

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2.

 

You mount an Active Directory snapshot on DC1.

 

You need to expose the snapshot as an LDAP server.

 

Which tool should you use?

 

A.

Dsamain

B.

Ntdsutil

C.

Ldp

D.

ADSI Edit

 

Correct Answer: A

Explanation:

Dsamain.exe can you can use to expose the snapshot data as an LDAP server

 

 

QUESTION 224

HOTSPOT

Your network contains an Active Directory domain named contoso.com.

 

You have a Dynamic Access Control policy named Policy1.

 

You create a new Central Access Rule named Rule1.

 

You need to add Rule1 to Policy1.

 

What command should you run?

 

To answer, select the appropriate options in the answer area.

 

clip_image004

 

Correct Answer:

clip_image006

 

 

QUESTION 225

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012.

 

You create a group Managed Service Account named gservice1.

 

You need to configure a service named Service1 to run as the gservice1 account.

 

How should you configure Service1?

 

A.

From a command prompt, run sc.exe and specify the config parameter.

B.

From a command prompt, run sc.exe and specify the sdset parameter.

C.

From the Services console, configure the General settings.

D.

From Windows PowerShell, run Set-Service and specify the -PassThrough parameter.

 

Correct Answer: A

Explanation:

To specify a binary path for the NEWSERVICE service, type:

sc config NewService binpath= “ntsd -d c:windowssystem32NewServ.exe”

 

Reference:

Sc config

https://technet.microsoft.com/en-us/library/cc990290.aspx

http://technet.microsoft.com/en-us/library/cc738230(v=ws.10).aspx

 

 

QUESTION 226

Managing Group Policy objects is a tiresome task. Which of the following Windows Server 2012 R2 features could you use to save time when creating GPO’s with similar settings?

 

A.

UAC

B.

PXE boot

C.

IFM

D.

Starter GPO

 

Correct Answer: D

Explanation:

Starter Group Policy objects derive from a Group Policy object (GPO), and provide the ability to store a collection of Administrative Template policy settings in a single object. You can import and export Starter GPOs, which makes them easy to distribute to other environments. When you create a new GPO from a Starter GPO, the new GPO has all of the Administrative Template policy settings and their values that were defined in the Starter GPO.

 

 

QUESTION 227

You manage an environment that has many servers. The servers run Windows Server 2012 R2 and use iSCSI storage. Administrators report that it is difficult to locate available iSCSI resources on the network. You need to ensure that the administrators can locate iSCSI resources on the network by using a central repository. Which feature should you deploy?

 

A.

The iSNS Server service feature

B.

The iSCSI Target Storage Provider feature

C.

The Windows Standards-Based Storage Management feature

D.

The iSCSI Target Server role service

 

Correct Answer: A

Explanation:

http://technet.microsoft.com/en-us/library/cc772568.aspx

iSNS Server Overview

Internet iStorage Name Service Server

The Internet Storage Name Service (iSNS) protocol is used for interaction between iSNS servers and iSNS clients. iSNS clients are computers, also known as initiators, that are attempting to discover storage devices, also known as targets, on an Ethernet network. iSNS facilitates automated discovery, management, and configuration of iSCSI and Fibre Channel devices (using iFCP gateways) on a TCP/IP network. Note The Microsoft iSNS Server only supports the discovery of iSCSI devices, and not Fibre Channel devices. iSNS Server provides intelligent storage discovery and management services comparable to those found in Fibre Channel networks, allowing a commodity IP network to function in a similar capacity as a storage area network. iSNS facilitates a seamless integration of IP networks and manages iSCSI devices. iSNS thereby provides value in any storage network comprised of iSCSI devices.

 

Features of iSNS Server iSNS Server is a repository of currently active iSCSI nodes, as well as their associated portals, entities, etc. Nodes can be initiators, targets, or management nodes. Typically, initiators and targets register with the iSNS server, and the initiators query the iSNS server for the list of available targets.

 

A dynamic database of the iSCSI devices and related information that are currently available on the network: The database helps provide iSCSI target discovery functionality for the iSCSI initiators on the network. The database is kept dynamic by using the Registration Period and Entity Status Inquiry features of iSNS. Registration Period allows the server to automatically deregister stale entries. Entity Status Inquiry provides the server a functionality similar to ping to determine whether registered clients are still present on the network, and allows the server to automatically deregister those clients which are no longer present. State Change Notification Service: This allows registered clients to be made aware of changes to the database in the iSNS server. It allows the clients to maintain a dynamic picture of the iSCSI devices available on the network.

 

Discovery Domain Service: This allows an administrator to assign iSCSI nodes and portals into one or more groups called discovery domains. Discovery domains provide a zoning functionality by which an iSCSI initiator can only discover those iSCSI targets who have at least one discovery domain in common with it. Benefits of iSNS Server in iSCSI Storage Area Networks Centralized management Easily scalable to large IP storage networks

 

Extensible

Asynchronous notification of changes in the iSCSI storage network Ability to monitor the status and availability of clients Microsoft-preferred discovery method for iSCSI Designed for Windows Logo Program requirement for iSCSI HBAs

 

 

QUESTION 228

DNS record types come in many forms, but which record type is being described below?

 

Maps a domain name such as www.google.com to an IP address

 

A.

A

B.

CNAME

C.

MX

D.

PTR

 

Correct Answer: A

 

 

QUESTION 229

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1 that runs a Server Core Installation of Windows Server 2012 R2.

 

File1 has a volume named D that contains home folders. File1 creates a shadow copy of volume D twice a day.

 

You discover that volume D is almost full.

 

You add a new volume named H to File1.

 

You need to ensure that the shadow copies of volume D are stored on volume H.

 

Which command should you run?

 

A.

The Set-Volume cmdlet with the -driveletter parameter

B.

The vssadmin.exe create shadow command

C.

The Set-Volume cmdlet with the -path parameter

D.

The vssadmin.exe add shadowstorage command

 

Correct Answer: D

Explanation:

A.Sets or changes the file system label of an existing volume. -DriveLetter Specifies a letter used to identify a drive or volume in the system.

B.Displays current volume shadow copy backups and all installed shadow copy writers and providers. Shadow Creates a new shadow copy of a specified volume.

C.Sets or changes the file system label of an existing volume -Path Contains valid path information.

D.Displays current volume shadow copy backups and all installed shadow copy writers and providers.

AddShadowStroage Adds a shadow copy storage association for a specified volume.

http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx

http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx

 

 

 

 

 

 

QUESTION 230

DRAG DROP

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2.Server1 and Server2 run a Server with a GUI installation of Windows Server 2012 R2.

 

You remove the Graphical Management Tools and Infrastructure feature on Server2.

 

You need to restart Server2.

 

What should you do?

 

To answer, drag the appropriate tools to the correct statements. Each tool may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

 

clip_image008

 

Correct Answer:

clip_image010

 

Free VCE & PDF File for Microsoft 70-417 Actual Tests

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…