[Free] New Updated (October) Microsoft 70-417 Real Exam 271-280

Ensurepass

 

QUESTION 271

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the Hyper-V server role installed.

 

You plan to replicate virtual machines between Server1 and Server2. The replication will be encrypted by using Secure Sockets Layer (SSL).

 

You need to request a certificate on Server1 to ensure that the virtual machine replication is encrypted.

 

Which two intended purposes should the certificate for Server1 contain? (Each correct answer presents part of the solution. Choose two.)

 

A.

Client Authentication

B.

Kernel Mode Code Signing

C.

Server Authentication

D.

IP Security end system

E.

KDC Authentication

 

Correct Answer: AC

Explanation:

Replica Server Certificate Requirements

To enable a server to receive replication traffic, the certificate in the replica server must meet the following conditions

* Enhanced Key Usage must support both Client and Server authentication

Etc.

Reference: Hyper-V Replica – Prerequisites for certificate based deployments

 

 

QUESTION 272

Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts. Servers are restarted only occasionally. You need to identify which servers were restarted during the last two days. What should you do?

 

A.

Run dsquery c

omputer and specify the -sra /epwc parameter.

B.

Run Get-ADComputer and specify the SearchScope parameter.

C.

Run dsquery server and specify the -o parameter.

D.

Run Get-ADComputer and specify the lastLogon property

 

Correct Answer: D

Explanation:

http://technet.microsoft.com/en-us/library/ee617192.aspx

 

SearchScope Specifies the scope of an Active Directory search. Possible values for this parameter are:

 

Base or 0

OneLevel or 1

Subtree or 2

A Base query searches only the current path or object.

A OneLevel query searches the immediate children of that path or object.

A Subtree query searches the current path or object and all children of that path or object.

http://technet.microsoft.com/en-us/library/cc732885%28v=ws.10%29.aspx

Dsquery server o {dn | rdn}

Specifies the format that dsquery uses to display the search results. A dn value displays the distinguished name of each entry. An rdn value displays the relative distinguished name of each entry. The default value is dn.

NB: epwc doesn’t exist for Dsquery computer so even if i’m not sure it’s the best way, the only possible answer is using “Get-ADComputer and specify the lastLogon property”

 

 

QUESTION 273

DRAG DROP

Your network contains three servers. The servers are configured as shown in the following tablE.

 

clip_image001

 

Your company plans to standardize all of the servers on Windows Server 2012 R2.

 

You need to recommend an upgrade path for each server.

 

The solution must meet the following requirements:

 

clip_image003Upgrade the existing operating system whenever possible.

clip_image003[1]Minimize hardware purchases.

 

Which upgrade path should you recommend for each server?

 

To answer, drag the appropriate upgrade path to each server in the answer area.Each upgrade path may be used once, more than once, or not at all.

 

clip_image005

 

Correct Answer:

clip_image007

 

 

QUESTION 274

You have a server named Server1 that has a Server Core installation of Windows Server 2008 R2.

 

Server1 has the DHCP Server server role and the File Server server role installed.

 

You need to upgrade Server1 to Windows Server 2012 R2 with the graphical user interface (GUI).

 

The solution must meet the following requirements:

 

clip_image003[2]Preserve the server roles and their configurations.

clip_image003[3]Minimize administrative effort.

 

What should you do?

 

A.

On Server1, run setup.exe from the Windows Server 8 installation media and select Server with a GUI.

B.

Start Server1 from the Windows Server 8 installation media and select Server Core Installation.

When the installation is complete, add the Server Graphical Shell feature.

C.

Start Server1 from the Windows Server 8 installation media and select Server with a GUI.

D.

On Server1, run setup.exe from the Windows Server 8 installation media and select Server Core Installation.

When the installation is complete, add the Server Graphical Shell feature.

 

Correct Answer: D

Explanation:

A.Server is on 2008 R2 core, must install 2012 core and then GUI

B.Not least effort

C.Not least effort

D.Upgrade to 2012 and install GUI shell

http://technet.microsoft.com/en-us/library/jj574204.aspx

Upgrades that switch from a Server Core installation to the Server with a GUI mode of Windows Server 2012 R2 in one step (and vice versa) are not supported.

However, after upgrade is complete, Windows Server 2012 R2 allows you to switch freely between Server Core and Server with a GUI modes. For more information about these installation options, how to convert between them, and how to use the new Minimal Server Interface and Features on Demand, see http://technet.microsoft.com/library/hh831786.

 

 

 

 

 

 

QUESTION 275

HOTSPOT

You have a server named Server1 that runs Windows Server 2012 R2.

 

You are configuring a storage space on Server1.

 

You need to ensure that the storage space supports tiered storage.

 

Which settings should you configure?

 

To answer, select the appropriate options in the answer area.

 

clip_image008

 

Correct Answer:

clip_image009

 

 

 

 

 

 

 

QUESTION 276

You have a server named Server1 that runs Windows Server 2012 R2.

 

Server1 has three physical network adapters named NIC1, NIC2, and NIC3.

 

On Server1, you create a NIC team named Team1 by using NIC1 and NIC2. You configure Team1 to accept network traffic on VLAN 10.

 

You need to ensure that Server1 can accept network traffic on VLAN 10 and VLAN 11. The solution must ensure that the network traffic can be received on both VLANs if a network adapter fails.

 

What should you do?

 

A.

From Server Manager, change the load balancing mode of Team1.

B.

Run the New-NetLbfoTeamcmdlet.

C.

From Server Manager, add an interface to Team1.

D.

Run the Add-NetLbfoTeamMembercmdlet.

 

Correct Answer: C

 

 

QUESTION 277

Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed.

 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

 

Server1 is configured as shown in the following table.

 

clip_image010

 

You install a network monitoring application on VM2.

 

You need to ensure that all of the traffic sent to VM3 can be captured on VM2.

 

What should you configure?

 

A.

NUMA topology

B.

Resource control

C.

Resource metering

D.

Virtual Machine Chimney

E.

The VLAN ID

F.

Processor Compatibility

G.

The startup order

H.

Automatic Start Action

I.

Integration Services

J.

Port mirroring

K.

Single-root I/O virtualization

 

Correct Answer: J

Explanation:

With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch port that receives copies of all the traffic. And since Port mirroring allows the network traffic of a virtual machine to be monitored by copying the traffic and forwarding it to another virtual machine that is configured for monitoring, you should configure port mirroring on VM2.

References:

http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror

 

 

QUESTION 278

You have a server named Server1 that runs Windows Server 2012 R2.

 

You create a custom Data Collector Set (DCS) named DCS1.

 

You need to configure Server1 to start DCS1 automatically when the network usage exceeds 70 percent.

 

Which type of data collector should you create?

 

A.

A performance counter alert

B.

A performance counter data collector

C.

An event trace data collector

D.

A configuration data collector

 

Correct Answer: A

 

 

QUESTION 279

A user has locked his account (again!) and you need to unlock it so they can continue working normally. Which of the following is a possible way to unlock a User Account? (Choose three)

 

A.

Command Line

B.

None of these

C.

Windows PowerShell

D.

VBScript

 

Correct Answer: ACD

Explanation:

All 3 of these can be used to unlock accounts.

 

 

 

 

 

QUESTION 280

Your network contains an Active Directory domain named contoso.com. Network Access Protection (NAP) is deployed to the domain.

 

You need to create NAP event trace log files on a client computer.

 

What should you run?

 

A.

Register-EngineEvent

B.

Tracert

C.

Register-ObjectEvent

D.

Logman

 

Correct Answer: D

Explanation:

Register-ObjectEvent: Monitor events generated from .Net Framework Object. Register-EngineEvent: Subscribes to events that are generated by the Windows PowerShell engine and by the New-Event cmdlet.

 

http://technet.microsoft.com/en-us/library/hh849967.aspx

 

tracert: Trace IP route

logman: Manages and schedules performance counter and event trace log collections on a local and remote systems.

http://technet.microsoft.com/en-us/library/bb490956.aspx

Free VCE & PDF File for Microsoft 70-417 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…