[Free] Download New Latest (November) Microsoft 70-417 Actual Tests 311-320

Ensurepass

QUESTION 311

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

 

HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled.

 

You install the DHCP server role on a virtual machine named Server1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope.

 

You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1.

 

You need to ensure that the virtual machines can use Server1 as a DHCP server.

 

What should you do?

 

A.

Enable MAC address spoofing on Server1.

B.

Enable single-root I/O visualization (SR-IOV) on Server1.

C.

Disable the DHCP guard on Server1.

D.

Disable the DHCP guard on all of the virtual machines that are DHCP clients.

 

Correct Answer: C

Explanation:

DHCP guard setting

This setting stops the virtual machine from making DHCP offers over this network interface. To be clear – this does not affect the ability to receive a DHCP offer (i.e. if you need to use DHCP to acquire an IP address that will work) it only blocks the ability for the virtual machine to act as a DHCP server.

 

 

QUESTION 312

Your network contains two Active Directory forests named contoso.com and dev.contoso.com. The contoso.com forest contains a domain controller named DO. The dev.contoso.com forest contains a domain controller named DC2. Each domain contains an organizational unit (OU) named OU1.

 

Dev.contoso.com has a Group Policy object (GPO) named GP01. GP01 contains 200 settings, including several settings that have network paths. GP01 is linked to OU1.

 

You need to copy GP01 from dev.contoso.com to contoso.com.

 

What should you do first on DC2?

 

A.

From the Group Policy Management console, right-click GPO1 and select Copy.

B.

Run the mtedit.exe command and specify the /Domaintcontoso.com /DC: DC 1 parameter.

C.

Run the Save-NetGpocmdlet.

D.

Run the Backup-Gpocmdlet.

 

Correct Answer: A

Explanation:

To copy a Group Policy object:

In the GPMC console tree, right-click the GPO that you want to copy, and then click Copy. To create a copy of the GPO in the same domain as the source GPO, right-click Group Policy objects, click Paste, specify permissions for the new GPO in the Copy GPO box, and then click OK .

For copy operations to another domain, you may need to specify a migration table.

 

The Migration Table Editor (MTE) is provided with Group Policy Management Console (GPMC) to facilitate the editing of migration tables. Migration tables are used for copying or importing Group Policy objects (GPOs) from one domain to another, in cases where the GPOs include domain-specific information that must be updated during copy or import.

 

Source WS2008R2: Backup the existing GPOs from the GPMC, you need to ensure that the “Group Policy Objects” container is selected for the “Backup Up All” option to be available.

 

Copy a Group Policy Object with the Group Policy Management Console (GPMC) You can copy a Group Policy object (GPO) either by using the drag-and-drop method or right-click method.

Applies To: Windows 8, Windows Server 2008 R2, Windows Server 2012

 

Ref:

http://technet.microsoft.com/en-us/library/cc785343(v=WS.10).aspx

http://technet.microsoft.com/en-us/library/cc733107.aspx

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 313

DRAG DROP

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. All servers run Windows Server 2012 R2.

 

All domain user accounts have the Division attribute automatically populated as part of the user provisioning process. The Support for Dynamic Access Control and Kerberos armoring policy is enabled for the domain.

 

You need to control access to the file shares on Server1 based on the values in the Division attribute and the Division resource property.

 

Which three actions should you perform in sequence?

 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

 

clip_image002

 

Correct Answer:

clip_image004

 

 

 

 

 

 

QUESTION 314

Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.

 

Your company has users who work from home. Some of the home users have desktop computers. Other home users have laptop computers. All of the computers are joined to the domain.

 

All of the computer accounts are members of a group named Group1. Currently, the home users access the corporate network by using a PPTP VPN. You implement DirectAccess by using the default configuration and you specify Group1 as the DirectAccess client group.

 

The home users who have desktop computers report that they cannot use DirectAccess to access the corporate network.

 

The home users who have laptop computers report that they can use DirectAccess to access the corporate network.

 

You need to ensure that the home users who have desktop computers can access the network by using DirectAccess.

 

What should you modify?

 

A.

The WMI filter for Direct Access Client Settings GPO

B.

The conditions of the Connections to Microsoft Routing and Remote Access server policy

C.

The membership of the RAS and IAS Servers group

D.

The security settings of the computer accounts for the desktop computers

 

Correct Answer: A

Explanation:

The default settings includes creating a GPO that has a WMI filter for laptops only.

 

clip_image006

 

QUESTION 315

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.

 

Cluster1 hosts an application named App1.

 

You need to ensure that Server2 handles all of the client requests to the cluster for App1. The solution must ensure that if Server2 fails, Server1 becomes the active node for App1.

 

What should you configure?

 

A.

Affinity – None

B.

Affinity – Single

C.

The cluster quorum settings

D.

The failover settings

E.

A file server for general u

F.

The Handling priority

G.

The host priority

H.

Live migration

I.

The possible owner

J.

The preferred owner

K.

Quick migration

L.

The Scale-Out File Server

 

Correct Answer: J

Explanation:

http://blogs.msdn.com/b/clustering/archive/2008/10/14/9000092.aspx

The preferred owner in a 2 server cluster will always be the active node unless it is down.

 

 

QUESTION 316

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has the Remote Access server role installed.

 

DirectAccess is implemented on Server1 by using the default configuration.

 

You discover that DirectAccess clients do not use DirectAccess when accessing websites on the Internet.

 

You need to ensure that DirectAccess clients access all Internet websites by using their DirectAccess connection.

 

What should you do?

 

A.

Configure a DNS suffix search list on the DirectAccess clients.

B.

Enable the Route all traffic through the internal network policy setting in the DirectAccess Server Settings Group Policy object (GPO).

C.

Configure DirectAccess to enable force tunneling.

D.

Disable the DirectAccess Passive Mode policy setting in the DirectAccess Client Settings Group Policy object (GPO).

 

Correct Answer: C

 

 

QUESTION 317

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has six network adapters. Two of the network adapters are connected to a network named LAN1, two of the network adapters are connected to a network named LAN2, and two of the network adapters are connected to a network named LAN3.

 

You create a network adapter team named Team1 from the two adapters connected to LAN1.

 

You create a network adapter team named Team2 from the two adapters connected to LAN2.

 

A company policy states that all server IP addresses must be assigned by using a reserved address in DHCP.

 

You need to identify how many DHCP reservations you must create for Server1.

 

How many reservations should you identify?

 

A.

3

B.

4

C.

6

D.

8

 

Correct Answer: B

Explanation:

2 Adapters = LAN1 = Team1 = 1 IP

2 Adapters = LAN2 = Team2 = 1 IP

2 Adapters = LAN3 = No Team = 2 IP

1 + 1 + 2 = 4

 

References:

Training Guide: Installing and Configuring Windows Server 2012: Chapter 6: Network Administration, Lesson 3: Managing Networking using Windows PowerShell, p. 253

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 318

You have a server named Server1 that runs Windows Server 2012 R2. From Server Manager, you install the Active Directory Certificate Services server role on Server1.

 

A domain administrator named Admin1 logs on to Server1. When Admin1 runs the Certification Authority console, Admin1 receive the following error message.

 

clip_image008

 

You need to ensure that when Admin1 opens the Certification Authority console on Server1, the error message does not appear.

 

What should you do?

 

A.

Install the Active Directory Certificate Services (AD CS) tools

B.

Configure the Active Directory Certificate Services server role from Server Manager

C.

Run the regsvr32.exe command

D.

Modify the PATH system variable

 

Correct Answer: B

 

 

QUESTION 319

You have a file server named Server1 that runs a Server Core Installation of Windows Server 2012 R2.

 

Server1 has a volume named D that contains user data. Server1 has a volume named E that is empty.

 

Server1 is configured to create a shadow copy of volume D every hour.

 

You need to configure the shadow copies of volume D to be stored on volume E.

 

What should you run?

 

A.

The Set-Volume cmdlet with the -driveletter parameter

B.

The Set-Volume cmdlet with the -path parameter

C.

The vssadmin.exe add shadowstorage command

D.

The vssadmin.exe create shadow command

 

Correct Answer: C

Explanation:

http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx

http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx

 

 

QUESTION 320

DRAG DROP

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server3. The network contains a standalone server named Server2. All servers run Windows Server 2012 R2. The servers are configured as shown in the following table.

 

clip_image010

 

Server3 hosts an application named App1. App1 is accessible internally by using the URL https://app1.contoso.com. App1 only supports Integrated Windows authentication.

 

You need to ensure that all users from the Internet are pre-authenticated before they can access App1.

 

What should you do?

 

To answer, drag the appropriate servers to the correct actions. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

 

clip_image012

 

Correct Answer:

clip_image014

 

Free VCE & PDF File for Microsoft 70-417 Actual Tests

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…