[Free] Download New Latest (November) Microsoft 70-417 Actual Tests 351-360

Ensurepass

QUESTION 351

You have a server named Server1 that runs Windows Server 2012 R2. You modify the properties of a system driver and you restart Server1.

 

You discover that Server1 continuously restarts without starting Windows Server 2012 R2.

 

You need to start Windows Server 2012 R2 on Server1 in the least amount of time.

 

The solution must minimize the amount of data loss.

 

Which Advanced Boot Option should you select?

 

A.

Repair Your Computer

B.

Disable Driver Signature Enforcement

C.

Last Know Good Configuration (advanced)

D.

Disable automatic restart on system failure

 

Correct Answer: C

Explanation:

Last known good configuration is used when a modification made to the registry base prevent the computer to restart normally (like after installing an Application for example, or a driver…).

 

 

QUESTION 352

Is the following statement true or false?

 

When a printer is installed on a network, default printer permissions are assigned that allow all users to print and change the status of documents sent to it.

 

A.

True

B.

False

 

Correct Answer: B

Explanation:

Initial answer = true => false the key is all users and change the status of documents. Change the status document refers to the “Manage Document” permission and it’s not a default permission for “all users”. By default, so far, a user can only modify status of the jobs that he initiated himself. but i tested to make sure. I installed 2 fake printers (one by the network, and one using LPT1) and here’s the default permissions i have got:

 

 

clip_image002

 

If we consider that Everyone can be used to designate “all users”, the above screenshot is enough. but just to be sure, i’ll add the “Domain Users” and “Authenticated Users” groups to the permissions to check which permission are assigned by default: exactly the same:

only the permission to print documents:

 

 

clip_image004

 

Now we can be sure the answer is “FALSE”.

NB: by default, only Administrators (and administrator) and “All Application Packages” have both permissions (print & manage documents)

http://technet.microsoft.com/en- us/library/cc773372%28v=ws.10%29.aspx

Assigning printer permissions When a printer is installed on a network, default printer permissions are assigned that allow all users to print, and allow select groups to manage the printer, the documents sent to it, or both.

 

Because the printer is available to all users on the network, you might want to limit access for some users by assigning specific printer permissions. For example, you could give all non administrative users in a department the Print permission and give all managers the Print and Manage Documents permissions. In this way, all users and managers can print documents, but managers can also change the print status of any document sent to the printer.

 

 

QUESTION 353

Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the DNS Server server role installed. On Server1, you create a standard primary zone named contoso.com. You need to ensure that Server2 can host a secondary zone for contoso.com. What should you do from Server1?

 

A.

Create a zone delegation that points to Server2.

B.

Create a trust anchor named Server2.

C.

Convert contoso.com to an Active Directory-integrated zone.

D.

Add Server2 as a name server.

 

Correct Answer: D

 

 

QUESTION 354

HOTSPOT

Your network contains an Active Directory domain named contoso.com.

 

You install the IP Address Management (IPAM) Server feature on a server named Server1 and select Manual as the provisioning method.

 

The IPAM database is located on a server named SQL1.

 

You need to configure IPAM to use Group Policy Based provisioning.

 

What command should you run first?

 

To answer, select the appropriate options in the answer area.

 

clip_image006

 

Correct Answer:

clip_image008

 

 

QUESTION 355

Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. All of the DNS servers in both of the domains run Windows Server 2012 R2.

 

The network contains two servers named Server1 and Server2. Server1 hosts an Active Directory-integrated zone for contoso.com. Server2 hosts an Active Directory-integrated zone for fabrikam.com.

 

Server1 and Server2 connect to each other by using a WAN link. Client computers that connect to Server1 for name resolution cannot resolve names in fabrikam.com.

 

You need to configure Server1 to support the resolution of names in fabrikam.com. The solution must ensure that users in contoso.com can resolve names in fabrikam.com if the WAN link fails.

 

What should you do on Server1?

 

A.

Create a stub zone.

B.

Create a secondary zone.

C.

Add a forwarder.

D.

Create a conditional forwarder.

 

Correct Answer: B

Explanation:

http://technet.microsoft.com/en-us/library/cc771898(v=ws.10).aspx

Stub zone doesn’t host the records themselves

Forwarder and conditional forwarders simply give instructions on where to forward DNS requests to.

 

 

QUESTION 356

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 has 8 GB of RAM.

 

Server1 hosts five virtual machines that run Windows Server 2012 R2.

 

The settings of a virtual machine named Server3 are configured as shown in the exhibit. (Click the Exhibit button.)

 

clip_image009

 

You need to ensure that when Server1 restarts, Server3 automatically resumes without intervention. The solution must prevent data loss.

 

Which settings should you modify?

 

A.

BIOS

B.

Automatic Stop Action

C.

Automatic Start Action

D.

Integration Services

 

Correct Answer: B

Explanation:

The Automatic Stop Action setting should be modified because it will allow you to configure:

“Save the virtual machine state” option instructs Hyper-V Virtual Machine Management Service to save the virtual machine state on the local disk when the Hyper-V Server shuts down.

OR “Turn Off the virtual machine” is used by the Hyper-V Management Service (VMMS.exe) to gracefully turn off the virtual machine.

OR “Shut down the guest operating system” is successful only if the “Hyper-V Shutdown” guest service is running in the virtual machine. The guest service is required to be running in the virtual machine as the Hyper-V VMMS.EXE process will trigger Windows Exit message which is received by the service. Once the message is received by the guest service, it takes the necessary actions to shut down the virtual machine.

 

References:

http://www.altaro.com/hyper-v/hyper-v-automatic-start-and-stop-action/

 

 

QUESTION 357

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.

 

The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA).

 

All users in the domain are issued a smart card and are required to log on to their domain- joined client computer by using their smart card.

 

A user named User1 resigned and started to work for a competing company. You need to prevent User1 immediately from logging on to any computer in the domain.

 

The solution must not prevent other users from logging on to the domain.

 

Which tool should you use?

 

A.

Active Directory Users and Computers

B.

Certificate Templates

C.

The Security Configuration Wizard

D.

The Certificates snap-in

 

Correct Answer: A

 

 

 

 

 

 

 

 

 

 

QUESTION 358

You create trusts in Windows Server 2008 with the New Trust Wizard. Which one of the following authentication types is being described below:

 

An authentication setting that permits unrestricted access by any users in the specified forest to all available shared resources that are located in any of the domains in the local forest.

 

A.

Domain-wide authentication

B.

None of these

C.

Selective authentication

D.

Forest-wide authentication

 

Correct Answer: D

 

 

QUESTION 359

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.

 

On all of the domain controllers, Windows is installed in C:Windows and the Active Directory database is located in D:WindowsNTDS.

 

All of the domain controllers have a third-party application installed.

 

The operating system fails to recognize that the application is compatible with domain controller cloning.

 

You verify with the application vendor that the application supports domain controller cloning.

 

You need to prepare a domain controller for cloning.

 

What should you do?

 

A.

In C:Windows, create an XML file named DCCIoneConfig.xml and add the application information to the file.

B.

In the root of a USB flash drive, add the application information to an XML file named DefaultDCCIoneAllowList.xml.

C.

In D:WindowsNTDS, create an XML file named DCCIoneConfig.xml and add the application information to the file.

D.

In D:WindowsNTDS, create an XML file named CustomDCCIoneAllowList.xml and add the application information to the file.

 

Correct Answer: D

Explanation:

http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domainservices-in-windows-server-2012-part-13-domain-controller-cloning.aspx

Place the CustomDCCloneAllowList.xml file in the same folder as the Active Directory database (ntds.dit) on the source Domain Controller.

 

 

 

 

 

 

 

QUESTION 360

You have a server named Server1 that runs Windows Server 2012 R2.

 

You discover that the performance of Server1 is poor.

 

The results of a performance report generated on Server1 are shown in the following table.

 

clip_image011

 

You need to identify the cause of the performance issue.

 

What should you identify?

 

A.

Insufficient processors

B.

Excessive paging

C.

Driver malfunction

D.

Insufficient RAM

 

Correct Answer: C

Explanation:

Processor: %DPC Time. Much like the other values, this counter shows the amount of time that the processor spends servicing DPC requests.

DPC requests are more often than not associated with the network interface. Processor: % Interrupt Time. This is the percentage of time that the processor is spending on handling Interrupts. Generally, if this value exceeds 50% of the processor time you may have a hardware issue. Some components on the computer can force this issue and not really be a problem. For example a programmable I/O card like an old disk controller card, can take up to 40% of the CPU time. A NIC on a busy IIS server can likewise generate a large percentage of processor activity.

Processor: % User Time. The value of this counter helps to determine the kind of processing that is affecting the system. Of course the resulting value is the total amount of non-idle time that was spent on User mode operations. This generally means application code.

Processor: %Privilege Time. This is the amount of time the processor was busy with Kernel mode operations. If the processor is very busy and this mode is high, it is usually an indication of some type of NT service having difficulty, although user mode programs can make calls to the Kernel mode NT components to occasionally cause this type of performance issue.

Memory: Pages/sac This value is often confused with Page Faults/sec. The Pages/sec counter is a combination of Pages Input/sec and Pages Output/sec counters. Recall that Page Faults/sec is a combination of hard page faults and soft page faults. This counter, however, is a general indicator of how often the system is using the hard drive to store or retrieve memory associated data. http://technet.microsoft.com/en-us/library/cc768048.aspx

 

Free VCE & PDF File for Microsoft 70-417 Actual Tests

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…