QUESTION 11
You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2 Standard. You establish a Remote Desktop session to Server1.
You need to identify which task can be performed on Server1 from within the Remote Desktop session.
What should you identify?
A. |
Install a feature by using Server Manager. |
B. |
Modify the network settings by using Sconfig. |
C. |
Disable services by using Msconfig. |
D. |
Join a domain by using the System Properties. |
Correct Answer: B
Explanation:
In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must be a member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode.
http://technet.microsoft.com/en-us/library/jj647766.aspx
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80
QUESTION 12
Select the missing tool name from the sentence below:
You can use the __.exe tool to create installation media for additional domain controllers that you are creating in a domain. By using the Install from Media (IFM) option, you can minimize the replication of directory data over the network. This helps you install additional domain controllers in remote sites more efficiently.
A. |
Dsutil |
B. |
Ntfrsutl |
C. |
Mqtgsvc |
D. |
Ntdsutil |
Correct Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/cc770654(v=ws.10).aspx
QUESTION 13
Your manager has asked you to configure the company Windows Server 2008 domain controller. He wants all new computer accounts to be placed in the General OU, when computers join the domain. Which command should you use to accomplish this?
A. |
Netdom |
B. |
Dsmove |
C. |
None of these |
D. |
Redircmp |
Correct Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/cc770619(v=ws.10).aspx
QUESTION 14
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
The disks on Server1 are configured as shown in the exhibit. (Click the Exhibit button.)
You create a virtual machine on Server1.
You need to ensure that you can configure a pass-through disk for the virtual machine.
What should you do?
A. |
Convert Disk 1 to a GPT disk. |
B. |
Convert Disk 1 to a dynamic disk. |
C. |
Delete partition E. |
D. |
Take Disk 1 offline. |
Correct Answer: D
Explanation:
NB: added the missing exhibit
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-inhyper-v.aspx
Passthrough Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspective.
Additionally, this raw piece of storage is not limited in size so, hypothetically, it can be a multi terabyte LUN.
After storage is mapped to the Hyper-V server, it will appear as a raw volume and will be in an Offline state (depending on the SAN Policy (Figure 1-1)) as seen in Figure 1.
We stated earlier that a disk must be Offline from the Hyper-V servers’ perspective in order for the Guest to have exclusive access. However, a raw volume must first be initialized before it can be used. To accomplish this in the Disk Management interface, the disk must first be brought Online. Once Online, the disk will show as being Not Initialized (Figure 2).
Right-click on the disk and select Initialize Disk (Figure 3)
Select either an MBR or GPT partition type (Figure 4).
Once a disk is initialized, it can once again be placed in an Offline state. If the disk is not in an Offline state, it will not be available for selection when configuring the Guest’s storage. In order to configure a Pass-through disk in a Guest, you must select Attach a virtual disk later in the New Virtual Machine Wizard (Figure 5).
If the Pass-through disk will be used to boot the operating system, it must be attached to an IDE Controller.
Data disks can take advantage of SCSI controllers. In Figure 6, a Passthrough disk is attached to IDE Controller 0.
Note: If the disk does not appear in the drop down list, ensure the disk is Offline in the Disk Management interface (In Server CORE, use the diskpart.exe CLI). Once the Pass-through disk is configured, the Guest can be started and data can placed on the drive. If an operating system will be installed, the installation process will properly prepare the disk. If the disk will be used for data storage, it must be prepared in the Guest operating system before data can be placed on it. If a Pass- through disk, being used to support an operating system installation, is brought Online before the Guest is started, the Guest will fail to start. When using Pass-through disks to support an operating system installation, provisions must be made for storing the Guest configuration file in an alternate location. This is because the entire Pass-through disk is consumed by the operating system installation. An example would be to locate the configuration file on another internal drive in the Hyper-V server itself. Or, if it is a cluster, the configuration file can be hosted on a separate cluster providing highly available file services. Be aware that Pass-through disks cannot be dynamically expanded. Additionally, when using Pass-through disks, you lose the capability to take snapshots, and finally, you cannot use differencing disks with Pass-through disks.
QUESTION 15
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has Microsoft SQL Server 2012 installed. You install the Active Directory Federation Services server role on Server2. You need to configure Server2 as the first Active Directory Federation Services (AD FS) server in the domain. The solution must ensure that the AD FS database is stored in a SQL Server database on Server1. What should you do on Server2?
A. |
From Windows PowerShell, run Install-ADFSFarm. |
B. |
From Windows PowerShell, run Install-ADFSStandAlone. |
C. |
From the AD FS console, run the AD FS Federation Server Configuration Wizard and select the Stand-alone federation server option. |
D. |
From Server Manager, install the AD FS Web Agents. |
Correct Answer: A
Explanation:
Install-ADFSFarm with the parameter -SQLConnectionString (thx @Nab from France)
This is the only valid option.
http://technet.microsoft.com/en-us/library/ee913579.aspx
Not: Powershell Install-ADFSStandAlone
We’re not going for StandAlone which is no more for 2012 R2 btw.
Not: Stand Alone federation.
Not: ADFS Web Agents
The Active Directory Federation Services (ADFS) Web Agent is a component of ADFS. It is used to consume security tokens and either allow or deny a user access to a Web application. To accomplish this, the Web server requires a relationship with a resource Federation Service so that it can direct the user to the Federation Service as needed.
QUESTION 16
Your network contains an Active Directory domain named adatum.com. The domain contains a server named CA1 that runs Windows Server 2012 R2. CA1 has the Active Directory Certificate Services server role installed and is configured to support key archival and recovery.
You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory Certificate Services (AD CS) database. The solution must prevent User1 from retrieving the private keys from the AD CS database.
What should you do?
A. |
Assign User1 the Issue and Manage Certificates permission to CA1. |
B. |
Assign User1 the Read permission and the Write permission to all certificate templates. |
C. |
Provide User1 with access to a Key Recovery Agent certificate and a private key. |
D. |
Assign User1 the Manage CA permission to CA1. |
Correct Answer: C
Explanation:
http://social.technet.microsoft.com/wiki/contents/articles/7573.active-directory-certificate-services-pki-keyarchival-and-management.aspx#Protecting_Key_Recovery_Agent_Keys
QUESTION 17
Your network contains an Active Directory forest named adatum.com. All servers run Windows Server 2012 R2. The domain contains four servers.
The servers are configured as shown in the following table.
You need to deploy IP Address Management (IPAM) to manage DNS and DHCP.
On which server should you install IPAM?
A. |
Server1 |
B. |
Server2 |
C. |
Server3 |
D. |
Server4 |
Correct Answer: D
QUESTION 18
Your network contains an Active Directory forest. The forest contains two domains named contoso.com and corp.contoso.com. All domain controllers run Windows Server 2012 R2 and are configured as global catalog servers.
The corp.contoso.com domain contains a domain controller named DC1.
You need to disable the global catalog on DC1.
What should you do?
A. |
From Active Directory Users and Computers, modify the properties of the DC1 computer account. |
B. |
From Active Directory Administrative Center, modify the properties of the DC1 computer account. |
C. |
From Active Directory Domains and Trusts, modify the properties of the corp.contoso.com domain. |
D. |
From Active Directory Sites and Services, modify the NTDS Settings of the DC1 server object. |
Correct Answer: D
Explanation:
When you navigate your way to the Active Directory Sites and ServicesSitesSiteNameServers then in the details pane, right-click NTDS Se
ttings of the selected server object, and then click Properties. There will you get access to the Global Catalog check box to add the global catalog, or clear the check box to remove the global catalog.
References:
http://technet.microsoft.com/en-us/library/cc755257.aspx
QUESTION 19
Your network contains an Active Directory domain named contoso.com.
Network Policy Server (NPS) is deployed to the domain.
You plan to deploy Network Access Protection (NAP).
You need to configure the requirements that are validated on the NPS client computers.
What should you do?
A. |
From the Network Policy Server console, configure a health policy. |
B. |
From the Network Policy Server console, configure a network policy. |
C. |
From a Group Policy object (GPO), configure the NAP Client Configuration security setting. |
D. |
From a Group Policy object (GPO), configure the Network Access Protection Administrative Templates setting. |
E. |
From the Network Policy Server console, configure a Windows Security Health Validator (WSHV) policy. |
Correct Answer: E
Explanation:
I feel the question is a bit unclear still.
http://technet.microsoft.com/en-us/library/cc731260.aspx
WSHV settings
If a client computer is noncompliant with one of the requirements of the WSHV, it is considered noncompliant with the WSHV as a whole. If a computer is determined to be noncompliant with the WSHV, the following actions might be taken:
I believe that the validation will take into account Health and Network, so it has to be both of them.
I don’t see A or D being a valid choice.
QUESTION 20
HOTSPOT
Your network contains a RADIUS server named Admin1.
You install a new server named Server2 that runs Windows Server 2012 R2 and has Network Policy Server (NPS) installed.
You need to ensure that all accounting requests for Server2 are forwarded to Admin1.
On Server2, you create a new remote RADIUS server group named Group1 that contains Admin1.
What should you configure next on Server2?
To answer, select the appropriate node in the answer area.
Correct Answer:
Free VCE & PDF File for Microsoft 70-417 Real Exam
Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF