70-417 Exam - Upgrading Your Skills to MCSA Windows Server 2012

certleader.com

Q1. Dynamic memory is a great feature that allows you to manage the amount of memory that Hyper-V virtual machines consume. 

How would you identify the memory a virtual machine consumes when Dynamic Memory is not enabled? 

A. View the amount of RAM listed under Startup in the Memory page of the virtual machine 

B. View the amount of RAM listed under Static in the Memory page of the virtual machine 

C. None of these 

D. View the amount of RAM listed under Maximum in the Memory page of the virtual machine 

Answer:

Explanation: 

When dynamic memory is not enabled, the virtual machine is given a static amount of 

RAM. This value is located under the Startup section of the Memory page of the virtual 

machine settings. 

Notice in my screenshot it's enabled: 

Q2. Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1. Server1 runs Windows Server 2012. 

You create a group Managed Service Account named gservice1. 

You need to configure a service named Service1 to run as the gservice1 account. 

How should you configure Service1? 

A. From a command prompt, run sc.exe and specify the config parameter. 

B. From a command prompt, run sc.exe and specify the sdset parameter. 

C. From the Services console, configure the General settings. 

D. From Windows PowerShell, run Set-Service and specify the -PassThrough parameter. 

Answer:

Explanation: To specify a binary path for the NEWSERVICE service, type: sc config NewService binpath= "ntsd -d c:\windows\system32\NewServ.exe" Reference: Sc config https://technet.microsoft.com/en-us/library/cc990290.aspx 

http://technet.microsoft.com/en-us/library/cc738230(v=ws.10).aspx 

Q3. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 has the DHCP Server server role and the Network Policy Server role service installed. 

Server1 contains three non-overlapping scopes named Scope1, Scope2, and Scope3. Server1 currently provides the same Network Access Protection (NAP) settings to the three scopes. 

You modify the settings of Scope1 as shown in the exhibit. (Click the Exhibit button.) 

You need to configure Server1 to provide unique NAP enforcement settings to the NAP non-compliant DHCP clients from Scope1. 

What should you create? 

A. A network policy that has the MS-Service Class condition 

B. A connection request policy that has the Service Type condition 

C. A network policy that has the Identity Type condition 

D. A connection request policy that has the Identity Type condition 

Answer:

Explanation: 

A. Restricts the policy to clients that have received an IP address from a DHCP scope that matches the specified DHCP profile name. This condition is used only when you are 

deploying NAP with the DHCP enforcement method. To use the MS-Service Class attribute, in Specify the profile name that identifies your DHCP scope, type the name of an existing DHCP profile. http://technet.microsoft.com/en-us/library/cc731220(v=ws.10).aspx 

Q4. Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Host1. Host1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

Host1 hosts two virtual machines named VM5 and VM6. Both virtual machines connect to a virtual switch named Virtual1. 

On VM5, you install a network monitoring application named Monitor1. 

You need to capture all of the inbound and outbound traffic to VM6 by using Monitor1. 

Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.) 

A. Get-VM "VM6" | Set-VMNetworkAdapter-IovWeight 1 

B. Get-VM "VM5" | Set-VMNetworkAdapter -IovWeight 0 

C. Get-VM "VM6" | Set-VMNetworkAdapter -PortMirroring Source 

D. Get-VM "VM6" | Set-VMNetworkAdapter -AllowTeaming On 

E. Get-VM "VM5" | Set-VMNetworkAdapter -PortMirroring Destination 

F. Get-VM "VM5" | Set-VMNetworkAdapter -AllowTeaming On 

Answer: C,E 

Explanation: -PortMirroring specifies the port mirroring mode for the network adapter. This can be set to None, Source, and Destination. . If set to Source, a copy of every network packet it sends or receives is forwarded to a virtual network adapter configured to receive the packets. . If set to Destination, it receives copied packets from the source virtual network adapter. 

In this scenario, VM5 is the destination which must receive a copy of the network packets from VM6, which s the source. 

Reference: 

http://technet.microsoft.com/en-us/library/hh848457.aspx 

Q5. You are a network administrator of an Active Directory domain named contoso.com. 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the 

DHCP Server server role and the Network Policy Server role service installed. 

You enable Network Access Protection (NAP) on all of the DHCP scopes on Server1. 

You need to create a DHCP policy that will apply to all of the NAP non-compliant DHCP 

clients. 

Which criteria should you specify when you create the DHCP policy? 

A. The user class 

B. The vendor class 

C. The client identifier 

D. The relay agent information 

Answer:

Q6. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 has 8 GB of RAM. 

Server1 hosts five virtual machines that run Windows Server 2012 R2. 

The settings of a virtual machine named Server3 are configured as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that when Server1 restarts, Server3 automatically resumes without intervention. The solution must prevent data loss. 

Which settings should you modify? 

A. BIOS 

B. Automatic Stop Action 

C. Automatic Start Action 

D. Integration Services 

Answer:

Explanation: The Automatic Stop Action setting should be modified because it will allow you to configure: “Save the virtual machine state” option instructs Hyper-V Virtual Machine Management Service to save the virtual machine state on the local disk when the Hyper-V Server shuts down. OR “Turn Off the virtual machine” is used by the Hyper-V Management Service (VMMS.exe) to gracefully turn off the virtual machine. 

OR “Shut down the guest operating system” is successful only if the “Hyper-V Shutdown” guest service is running in the virtual machine. The guest service is required to be running in the virtual machine as the Hyper-V VMMS.EXE process will trigger Windows Exit message which is received by the service. Once the message is received by the guest service, it takes the necessary actions to shut down the virtual machine. 

References: http://www.altaro.com/hyper-v/hyper-v-automatic-start-and-stop-action/ 

Q7. Your network contains an Active Directory domain named contoso.com. The Active 

Directory Recycle bin is enabled for contoso.com. 

A support technician accidentally deletes a user account named User1. 

You need to restore the User1 account. 

Which tool should you use? 

A. Ldp 

B. Esentutl 

C. Active Directory Administrative Center 

D. Ntdsutil 

Answer:

Explanation: 

http://technet.microsoft.com/nl-nl/library/dd379509(v=ws.10).aspx#BKMK_2 http://technet.microsoft.com/en-us/magazine/2007.09.tombstones.aspx http://technet.microsoft.com/en-us/library/hh875546.aspx http://technet.microsoft.com/en-us/library/dd560651(v=ws.10).aspx 

Q8. You have a server named Server1. 

You install the IP Address Management (IPAM) Server feature on Server1. 

You need to provide a user named User1 with the ability to set the access scope of all the DHCP servers that are managed by IPAM. The solution must use the principle of least privilege. 

Which user role should you assign to User1? 

A. IP Address Record Administrator Role 

B. IPAM Administrator Role 

C. IPAM MSM Administrator Role 

D. IPAM DHCP Scope Administrator Role 

Answer:

Explanation: 

Explanation IPAM ASM Administrators IPAM ASM Administrators is a local security group on an IPAM server that is created when you install the IPAM feature. Members of this group have all the privileges of the IPAM Users security group, and can perform IP address space tasks in addition to IPAM common management tasks. Note: When you install IPAM Server, the following local role-based IPAM security groups are created: IPAM Users IPAM MSM Administrators IPAM ASM Administrators IPAM IP Audit Administrators IPAM Administrators Incorrect: not B: Too much privileges. IPAM Administrators IPAM Administrators is a local security group on an IPAM server that is created when you install the IPAM feature. Members of this group have privileges to view all IPAM data and perform all IPAM tasks. 

Q9. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 and a domain controller named DC1. All servers run Windows Server 2012 R2. 

A Group Policy object (GPO) named GPO1 is linked to the domain. 

Server1 contains a folder named Folder1. Folder1 is shared as Share1. 

You need to ensure that authenticated users can request assistance when they are denied access to the resources on Server1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Enable the Enable access-denied assistance on client for all file types policy setting for GPO1. 

B. Configure the Customize message for Access Denied errors policy setting of GPO1. 

C. Install the File Server Resource Manager role service on DC1. 

D. Install the File Server Resource Manager role service on Server1. 

E. Assign the Read Attributes NTFS permission on Folder1 to the Authenticated Users group. 

Answer: A,D 

Explanation: * To configure access-denied assistance by using Group Policy 

Open Group Policy Management. In Server Manager, click Tools, and then click Group 

Policy Management. 

Right-click the appropriate Group Policy, and then click Edit. 

Click Computer Configuration, click Policies, click Administrative Templates, click System, 

and then click Access-Denied Assistance. 

Right-click Customize message for Access Denied errors, and then click Edit. 

Select the Enabled option. 

Etc 

*You can configure access-denied assistance within a domain by using Group Policy, or 

you can configure the assistance individually on each file server by using the File Server 

Resource Manager console. 

Reference: Deploy Access-Denied Assistance 

Q10. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. The domain contains a standalone server named Server2 that is located in a perimeter network. Both servers run the default installation of Windows Server 2012 R2. 

You need to manage Server2 remotely from Server1. 

What should you do? 

A. From Server1, run the Enable-PsRemotingcmdlet. 

B. From Server2, run the winrm command. 

C. From Server2/ run the Enable-PsRemotingcmdlet. 

D. From Server1, run the winrm command. 

Answer: