70-417 Exam - Upgrading Your Skills to MCSA Windows Server 2012

certleader.com

Q1. You have a file server named Server1 that runs a Server Core Installation of Windows 

Server 2012 R2. 

Server1 has a volume named D that contains user data. Server1 has a volume named E 

that is empty. 

Server1 is configured to create a shadow copy of volume D every hour. 

You need to configure the shadow copies of volume D to be stored on volume E. 

What should you run? 

A. The Set-Volume cmdlet with the -driveletter parameter 

B. The Set-Volume cmdlet with the -path parameter 

C. The vssadmin.exe add shadowstorage command 

D. The vssadmin.exe create shadow command 

Answer:

Explanation: http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx 

Q2. You manage an environment that has many servers. The servers run Windows Server 2012 R2 and use iSCSI storage. Administrators report that it is difficult to locate available iSCSI resources on the network. You need to ensure that the administrators can locate iSCSI resources on the network by using a central repository. Which feature should you deploy? 

A. The iSNS Server service feature 

B. The iSCSI Target Storage Provider feature 

C. The Windows Standards-Based Storage Management feature 

D. The iSCSI Target Server role service 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc772568.aspx iSNS Server Overview Internet iStorage Name Service Server The Internet Storage Name Service (iSNS) protocol is used for interaction between iSNS servers and iSNS clients. iSNS clients are computers, also known as initiators, that are attempting to discover storage devices, also known as targets, on an Ethernet network. iSNS facilitates automated discovery, management, and configuration of iSCSI and Fibre Channel devices (using iFCP gateways) on a TCP/IP network. Note The Microsoft iSNS Server only supports the discovery of iSCSI devices, and not Fibre Channel devices. iSNS Server provides intelligent storage discovery and management services comparable to those found in Fibre Channel networks, allowing a commodity IP network to function in a similar capacity as a storage area network. iSNS facilitates a seamless integration of IP networks and manages iSCSI devices. iSNS thereby provides value in any storage network comprised of iSCSI devices. 

Features of iSNS Server iSNS Server is a repository of currently active iSCSI nodes, as well as their associated portals, entities, etc. Nodes can be initiators, targets, or management nodes. Typically, initiators and targets register with the iSNS server, and the initiators query the iSNS server for the list of available targets. 

A dynamic database of the iSCSI devices and related information that are currently available on the network: The database helps provide iSCSI target discovery functionality for the iSCSI initiators on the network. The database is kept dynamic by using the Registration Period and Entity Status Inquiry features of iSNS. Registration Period allows the server to automatically deregister stale entries. Entity Status Inquiry provides the server a functionality similar to ping to determine whether registered clients are still present on the network, and allows the server to automatically deregister those clients which are no longer present. State Change Notification Service: This allows registered clients to be made aware of changes to the database in the iSNS server. It allows the clients to maintain a dynamic picture of the iSCSI devices available on the network. 

Discovery Domain Service: This allows an administrator to assign iSCSI nodes and portals into one or more groups called discovery domains. Discovery domains provide a zoning functionality by which an iSCSI initiator can only discover those iSCSI targets who have at least one discovery domain in common with it. Benefits of iSNS Server in iSCSI Storage Area Networks Centralized management Easily scalable to large IP storage networks 

Extensible Asynchronous notification of changes in the iSCSI storage network Ability to monitor the status and availability of clients Microsoft-preferred discovery method for iSCSI Designed for Windows Logo Program requirement for iSCSI HBAs 

Q3. You have decided to install Windows Server 2012 R2 by choosing the Service Core Installation option. 

If you want to install, configure or uninstall server roles remotely, what tool would you use? 

A. Windows PowerShell 

B. Any of these 

C. Server Manager 

D. Remote Server Administration Tools (RSAT) 

Answer:

Explanation: 

Initial Answer: Windows PowerShell (Only PowerShell can be used to manage server roles remotely to a server core installation.) => FALSE Since 2012, remote installations of server roles to a Core installation are allowed i've just done it, screenshots as proof: 

Then, i just had to use Enable-NetFirewallRule to allow remote management using MMC And i can see my FSRM role was correctly remotely installed on my Core Installation (and is remotely managed using FSRM MMC): 

Q4. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

Server1 has the IP Address Management (IPAM) Server feature installed. IPAM is configured currently for Group Policy-based provisioning. 

You need to change the IPAM provisioning method on Server1. 

What should you do? 

A. Run the ipamgc.exe command. 

B. Run the ipamgc.exe command. 

C. Run the Set-IPAMConfigurationcmdlet. 

D. Reinstall the IP Address Management (IPAM) Server feature. 

E. Delete IPAM Group Policy objects (GPOs) from the domain. 

Answer:

Explanation: 

You cannot change the provisioning method after completing the initial setup. When you install IPAM and configure either manual OR GPO, you receive the same message about not being able to change the provisioning method. As a matter of fact, I set it up in my lab and configured it as GPO. Here is a copy/paste of the message that is presently on the IPAM home page in server manager: 

"The access configuration mode cannot be modified after completing the IPAM provisioning wizard" Also, the help console in IPAM displays this when searching about provisioning methods: "The managed server provisioning method cannot be changed after you complete the IPAM provisioning wizard." 

Q5. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 and a server named Server2 that runs Windows Server 2008 R2 Service Pack 1 (SP1). Both servers are member servers. 

On Server2, you install all of the software required to ensure that Server2 can be managed remotely from Server Manager. 

You need to ensure that you can manage Server2 from Server1 by using Server Manager. 

Which two tasks should you perform on Server2? (Each correct answer presents part of the solution. Choose two.) 

A. Run the Enable-PSRemotingcmdlet. 

B. Run the Configure-SMRemoting.psl script. 

C. Run the Enable-PSSessionConfigurationcmdlet. 

D. Run the Set-ExecutionPolicycmdlet. 

E. Run the systempropertiesremote.exe command. 

Answer: B,D 

Explanation: 

To configure Server Manager remote management by using Windows PowerShell 

On the computer that you want to manage remotely, open a Windows PowerShell session 

with elevated user rights. 

In the Windows PowerShell session, type the following, and then press Enter. 

Set-ExecutionPolicy –ExecutionPolicyRemoteSigned (D) 

Type the following, and then press Enter to enable all required firewall rule exceptions. 

Configure-SMRemoting.ps1 -force –enable (B) 

Q6. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server 2012 R2 and hosts a processor-intensive application named App1. 

Users report that App1 responds more slowly than expected. 

You need to monitor the processor usage on VM1 to identify whether changes must be made to the hardware settings of VM1. 

Which performance object should you monitor on Server1? 

A. Hyper-V Hypervisor Logical Processor 

B. Hyper-V Hypervisor Root Virtual Processor 

C. Processor 

D. Hyper-V Hypervisor Virtual Processor 

E. Process 

Answer:

Explanation: 

http://social.technet.microsoft.com/wiki/contents/articles/1234.hyper-v-concepts-vcpu-virtual-processor.aspx http://blogs.msdn.com/b/tvoellm/archive/2008/05/12/hyper-v-performance-counters-part-four-of-many-hyper-v-hypervisor-virtual-processor-and- hyper-v-hypervisor-root-virtual-processor-counter-set.aspx 

Q7. OTSPOT 

Your network contains a RADIUS server named Admin1. 

You install a new server named Server2 that runs Windows Server 2012 R2 and has 

Network Policy Server (NPS) installed. 

You need to ensure that all accounting requests for Server2 are forwarded to Admin1. 

On Server2, you create a new remote RADIUS server group named Group1 that contains 

Admin1. 

What should you configure next on Server2? 

To answer, select the appropriate node in the answer area. 

Answer:  

352. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. The domain contains a virtual machine named VM1. 

A developer wants to attach a debugger to VM1. 

You need to ensure that the developer can connect to VM1 by using a named pipe. 

Which virtual machine setting should you configure? 

A. BIOS 

B. Network Adapter 

C. COM 1 

D. Processor 

Q8. Complete the missing word from the sentence below that is describing one of the new roles in Server 2008: 

By using__________ , you can augment an organization's security strategy by protecting information through persistent usage policies, which remain with the information, no matter where it is moved. 

A. AD FS 

B. AD RMS 

C. RODC 

D. AD LDS 

Answer:

Explanation: 

Active Directory Rights Management Services (AD RMS) 

Q9. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table. 

You plan to create a checkpoint of VM1. 

You need to recommend a solution to minimize the amount of disk space used for the checkpoint of VM1. 

What should you do before you create the checkpoint? 

A. Decrease the Maximum RAM. 

B. Convert Disk1.vhd to a dynamically expanding disk. 

C. Run the Stop-VM cmdlet. 

D. Run the Resize-VHD cmdlet. 

Answer:

Explanation: 

For checkpoints created when the virtual machine is stopped 

The checkpoint contains the state of the hard disks only. 

For checkpoints created when the virtual machine is running 

The checkpoint contains the state of the hard disks and the data in memory. 

Note: A checkpoint saves the state of each virtual hard disk that is attached to a virtual 

machine and all of the hard disk's contents, including application data files. For virtual 

machines on Hyper-V and VMware ESX Server hosts, a checkpoint also saves the 

hardware configuration information. By creating checkpoints for a virtual machine, you can 

restore the virtual machine to a previous state. 

Q10. RAG DROP 

You have a server named Server1 that runs Windows Server 2012 R2. You are asked to test Windows Azure Online Backup to back up Server1. You need to back up Server1 by using Windows Azure Online Backup. 

Which four actions should you perform in sequence? To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: