70-417 Exam - Upgrading Your Skills to MCSA Windows Server 2012

certleader.com

Q1. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 has access to four physical disks. The disks are configured as shown in the following table. 

You need to ensure that all of the disks can be added to a Cluster Shared Volume (CSV). 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Enable BitLocker on Disk4 

B. Disable BitLocker on Disk1 

C. Format Disk2 to use NTFS 

D. Format Disk3 to use NTFS 

Answer: C,D 

159. Your network contains a single Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

The domain contains 400 desktop computers that run Windows 8 and 200 desktop computers that run Windows XP Service Pack 3 (SP3). 

All new desktop computers that are added to the domain run Windows 8. All of the desktop computers are located in an organizational unit (OU) named OU1. 

You create a Group Policy object (GPO) named GPO1. GPO1 contains startup script settings. You link GPO1to OU1. You need to ensure that GPO1 is Applied only to computers that run Windows XP SP3. 

What should you do? 

A. Modify the Security settings of OU1. 

B. Run the Set-GPInheritancecmdlet and specify the -target parameter. 

C. Create and link a WMI filter to GPO1. 

D. Run the Set-GPLinkcmdlet and specify the -target parameter. 

Q2. You have a server named Server1 that runs Windows Server 2012 R2. Server1 is located 

in the perimeter network and has the DNS Server server role installed. 

Server1 has a zone named contoso.com. 

You apply a security template to Server1. 

After you apply the template, users report that they can no longer resolve names from 

contoso.com. 

On Server1, you open DNS Manager as shown in the DNS exhibit. (Click the Exhibit button.) 

On Server1, you open Windows Firewall with Advanced Security as shown in the Firewall exhibit. (Click the Exhibit button.) 

You need to ensure that users can resolve contoso.com names. 

What should you do? 

A. From Windows Firewall with Advanced Security, disable the DNS (TCP, Incoming) rule and the DNS (UDP, Incoming) rule. 

B. From DNS Manager, modify the Zone Transfers settings of the contoso.com zone. 

C. From DNS Manager, unsign the contoso.com zone. 

D. From DNS Manager, modify the Start of Authority (SOA) of the contoso.com zone. 

E. From Windows Firewall with Advanced Security, modify the profiles of the DNS (TCP, 

Incoming) rule and the DNS (UDP, Incoming) rule. 

Answer:

Q3. Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named Server3 and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in a failover cluster named Cluster2. 

You need to move all of the applications and the services from Cluster1 to Cluster2. 

What should you do first from Failover Cluster Manager? 

A. On a server in Cluster2, click Migrate Roles. 

B. On a server in Cluster2, click Move Core Cluster Resources, and then click Select Node... 

C. On a server in Cluster1, configure Cluster-Aware Updating. 

D. On a server in Cluster2, click Move Core Cluster Resources, and then click Best Possible Node. 

Answer:

Explanation: 

http://blogs.msdn.com/b/clustering/archive/2012/06/25/10323434.aspx 

Q4. Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed.Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

You need to configure VM4 to track the CPU, memory, and network usage. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. Resource metering 

D. Virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

http://blogs.technet.com/b/meamcs/archive/2012/05/28/hyper-v-resource-metering-in-windows-server-2012-server-8-beta.aspx Hyper-V Resource Metering in Windows Server 2012 R2 "Server 8 Beta" IT organizations need tools to charge back business units that they support while providing the business units with the right amount of resources to match their needs. For hosting providers, it is equally important to issue chargebacks based on the amount of usage by each customer. To implement advanced billing strategies that measure both the assigned capacity of a resource and its actual usage, earlier versions of Hyper-V required users to develop their own chargeback solutions that polled and aggregated performance counters. 

These solutions could be expensive to develop and sometimes led to loss of historical data. To assist with more accurate, streamlined chargebacks while protecting historical information, Hyper-V in Windows Server 2012 R2 "Server 8 Beta" introduces Resource Metering, a feature that allows customers to create cost-effective, usage-based billing solutions. With this feature, service providers can choose the best billing strategy for their business model, and independent software vendors can develop more reliable, end-to-end chargeback solutions on top of Hyper-V. Metrics collected for each virtual machine § Average CPU usage, measured in megahertz over a period of time. § Average physical memory usage, measured in megabytes. § Minimum memory usage (lowest amount of physical memory). § Maximum memory usage (highest amount of physical memory). § Maximum amount of disk space allocated to a virtual machine. § Total incoming network traffic, measured in megabytes, for a virtual network adapter. § Total outgoing network traffic, measured in megabytes, for a virtual network adapter To enable Hyper-V resource metering on hyper-v host HV01 run the following PowerShell commands: Get-VM -ComputerName HV01 | Enable-VMResourceMetering By default the collection interval for Hyper-v metering data is one hour to change this interval the following PowerShell command can be used "value used in the command below is one minute": Set-vmhost computername HV01 ResourceMeteringSaveInterval 00:01:00 To get all VMs metering data run the following PowerShell command: Get-VM -ComputerName HV01 | Measure-VM To get a particular VM "test01" metering data run the following PowerShell command: Get-VM -ComputerName HV01 -Name "test01" | Measure-VM 

Q5. Your network contains an Active Directory domain named adatum.com. The domain contains the servers shown in the following table. 

You need to ensure that you can use Server Manager on DC1 to manage DC2. 

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Install the Windows PowerShell 2.0 engine on DC1. 

B. Install Microsoft .NET Framework 4 on DC2. 

C. Install Windows Management Framework 3.0 on DC2. 

D. Install Remote Server Administration Tools on DC1. 

E. Install Remote Server Administration Tools on DC2. 

Answer: B,C 

Explanation: 

Explanation Windows Management Framework 3.0 To use this release of Server Manager to access and manage remote servers that are running Windows Server 2008 or Windows Server 2008 R2, you must first install .NET Framework 4.0, and then install Windows Management Framework 3.0 on those servers. Note: In Windows Server 2012 R2, you can use Server Manager to perform management tasks on remote servers. Remote management is enabled by default on servers that are running Windows Server 2012 R2. To manage a server remotely by using Server Manager, you add the server to the Server Manager server pool. You can use Server Manager to manage remote servers that are running Windows Server 2008 and Windows Server 2008 R2, but the following updates are required to fully manage these older operating systems (see above). 

Reference: Configure Remote Management in Server Manager 

Q6. You have a server named Server1 that runs Windows Server 2012 R2. 

On Server1, you configure a custom Data Collector Set (DCS) named DCS1. DCS1 is configured to store performance log data in C:\Logs. 

You need to ensure that the contents of C:\Logs are deleted automatically when the folder reaches 100 MB in size. 

What should you configure? 

A. A File Server Resource Manager (FSRM) file screen on the C:\Logs folder 

B. The Data Manager settings of DCS1 

C. A schedule for DCS1 

D. A File Server Resource Manager (FSRM) quota on the C:\Logs folder 

Answer:

Q7. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

An administrator installs the IP Address Management (IPAM) Server feature on a server named Server2. The administrator configures IPAM by using Group Policy based provisioning and starts server discovery. 

You plan to create Group Policies for IPAM provisioning. 

You need to identify which Group Policy object (GPO) name prefix must be used for IPAM Group Policies. 

What should you do on Server2? 

A. From Server Manager, review the IPAM overview. 

B. Run the Get-IpamConfigurationcmdlet. 

C. From Task Scheduler, review the IPAM tasks. 

D. Run the ipamgc.exe tool. 

Answer:

Q8. OTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. The volumes on Server1 are configured as shown in the following table. 

A new corporate policy states that backups must use Windows Azure Backup whenever possible. 

You need to identify which backup methods you must use to back up Server1. The solution must use Windows Azure Backup whenever possible. 

Which backup type should you identify for each volume? 

To answer, select the appropriate backup type for each volume in the answer area. 

Answer:  

57. Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2. 

Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains an application named App1 that is accessed by using the URL http://app1.contoso.com. 

You plan to perform maintenance on Server1. You need to ensure that all new connections to App1 are directed to Server2. 

The solution must not disconnect the existing connections to Server1. 

What should you run? 

A. The Set-NlbCluster cmdlet 

B. The Set-NlbClusterNode cmdlet 

C. The Stop-NlbCluster cmdlet 

D. The Stop-NlbClusterNode cmdlet 

Q9. RAG DROP 

You plan to deploy a failover cluster that will contain two nodes that run Windows Server 2012 R2. 

You need to configure a witness disk for the failover cluster. 

How should you configure the witness disk? 

To answer, drag the appropriate configurations to the correct location or locations. Each configuration may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

24. Your network contains an Active Directory forest. The forest contains a single domain named contoso.com and corp.contoso.com. The forest contains four domain controllers. 

The domain controllers are configured as shown in the following table. 

All domain controllers are DNS servers. 

In the corp.contoso.com domain, you plan to deploy a new domain controller named DC5. 

You need to identify which domain controller must be online to ensure that DC5 can be 

promoted successfully to a domain controller. 

Which domain controller identify which domain controller must be online to ensure that DC5 

can be promoted successfully to a domain controller. 

Which domain controller should you identify? 

A. DC1 

B. DC2 

C. DC3 

D. DC4 

Q10. Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3 that run Windows Server 2012 R2. All three servers have the Hyper-V server role installed and the Failover Clustering feature installed. 

Server1 and Server2 are nodes in a failover cluster named Cluster1. Several highly available virtual machines run on Cluster1. Cluster1 has that Hyper-V Replica Broker role installed. The Hyper-V Replica Broker currently runs on Server1. 

Server3 currently has no virtual machines. 

You need to configure Cluster1 to be a replica server for Server3 and Server3 to be a replica server for Cluster1. 

Which two tools should you use? {Each correct answer presents part of the solution. Choose two.) 

A. The Hyper-V Manager console connected to Server3 

B. The Failover Cluster Manager console connected to Server3 

C. The Hyper-V Manager console connected to Server1. 

D. The Failover Cluster Manager console connected to Cluster1 

E. The Hyper-V Manager console connected to Server2 

Answer: A,D 

Explanation: 

Steps: Install the Replica Broker Hyper-v "role" configure replication on Server 3 in Hyper-V manager and mention the cluster (that's why a replica broker is needed) configure replication on Cluster 1 using the failover cluster manager. Using Hyper-V Replica in a failover cluster The configuration steps previously described Apply to VMs that are not hosted in a failover cluster. However, you might want to provide an offsite replica VM for a clustered VM. In this scenario, you would provide two levels of fault tolerance. The failover cluster is used to provide local fault tolerance, for example, if a physical node fails within a functioning data center. The offsite replica VM, on the other hand, could be used to recover only from sitelevel failures, for example, in case of a power outage, weather emergency, or natural disaster. The steps to configure a replica VM for a clustered VM differ slightly from the normal configuration, but they aren't complicated. The first difference is that you begin by opening Failover Cluster Manager, not Hyper-V Manager. In Failover Cluster Manager, you then have to add a failover cluster role named Hyper-V Replica Broker to the cluster. (Remember, the word "role" is now used to describe a hosted service in a failover cluster.) To add the Hyper-V Replica Broker role, right-click the Roles node in Failover Cluster Manager and select Configure Role. This step opens the High Availability Wizard. In the High Availability Wizard, select Hyper-V Replica Broker