Act now and download your Microsoft 70 417 dumps test today! Do not waste time for the worthless Microsoft microsoft 70 417 tutorials. Download Abreast of the times Microsoft Upgrading Your Skills to MCSA Windows Server 2012 exam with real questions and answers and begin to learn Microsoft 70 417 pdf with a classic professional.

Q51. You have a server named Server1 that runs Windows Server 2012 R2. 

You create a Data Collector Set (DCS) named DCS1. 

You need to configure DCS1 to log data to D:\\logs. 

What should you do? 

A. Right-click DCS1 and click Properties. 

B. Right-click DCS1 and click Save template... 

C. Right-click DCS1 and click Export list... 

D. Right-click DCS1 and click Data Manager... 

Answer:

Explanation: 

It is under the Directory tab from the DCS properties. http://technet.microsoft.com/en-us/library/cc749267.aspx 


Q52. ... 

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has following hardware configurations: 

16 GB of RAM 

A single quad-core CPU 

Three network teams that have two network adapters each 

You add additional CPUs and RAM to Server1. 

You repurpose Server1 as a visualization host. 

You install the Hyper-V server role on Server1. 

You need to create four external virtual switches in Hyper-V. 

Which cmdlet should you run first? 

A. Set-NetAdapter 

B. Add-NetLbfoTeamNic 

C. Add-VMNetworkAdapter 

D. Remove-NetLbfoTeam 

Answer:

Explanation: 

You need 4 virtual switches but currently only have 3 teams available. You would need to 

break a team first. 

The Remove-NetLbfoTeamcmdlet removes the specified NIC team from the host. 


Q53. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 is backed up daily. 

The domain has the Active Directory Recycle Bin enabled. 

During routine maintenance, you delete 500 inactive user accounts and 100 inactive groups. One of the deleted groups is named Group1. Some of the deleted user accounts are members of some of the deleted groups. 

For documentation purposes, you must provide a list of the members of Group1 before the group was deleted. 

You need to identify the names of the users who were members of Group1 prior to its deletion. You want to achieve this goal by using the minimum amount of administrative effort. 

What should you do first? 

A. Reactivate the tombstone of Group1. 

B. Use the Recycle Bin to restore Group1. 

C. Perform an authoritative restore of Group1. 

D. Mount the most recent Active Directory backup. 

Answer:

Explanation: 

You can use the Active Directory database mounting tool (Dsamain.exe) and a Lightweight Directory Access Protocol (LDAP) tool, such as Ldp.exe or Active Directory Users and Computers, to identify which backup has the last safe state of the forest. The Active Directory database mounting tool, which is included in Windows Server 2008 and later Windows Server operating systems, exposes Active Directory data that is stored in backups or snapshots as an LDAP server. Then, you can use an LDAP tool to browse the data. This approach has the advantage of not requiring you to restart any DC in Directory Services Restore Mode (DSRM) to examine the contents of the backup of AD DS. 


Q54. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy Server role service installed. 

You plan to configure Server1 as a Network Access Protection (NAP) health policy server for VPN enforcement by using the Configure NAPwizard. 

You need to ensure that you can configure the VPN enforcement method on Server1 successfully. 

What should you install on Server1 before you run the Configure NAP wizard? 

A. A computer certificate 

B. A system health validator (SHV) 

C. The Remote Access server role 

D. The Host Credential Authorization Protocol (HCAP) 

Answer:

Explanation: 

http://technet.microsoft.com/fr-fr/library/dd314165%28v=ws.10%29.aspx 


Q55. Which feature is described below? 

You can use the ___ to reduce the number of duplicate blocks of data in storage, you can store much more data in a given amount of storage capacity than was possible in previous releases that used Single Instance 

Storage (SIS) or NTFS file system compression. 

A. iSCSI Target Server 

B. iSCSI Target Boot 

C. Multiterabyte Volumes 

D. Data Deduplication role service 

Answer:

Explanation: 

By using Data Deduplication, general purpose file servers can typically reduce storage capacity utilization by a 2:1 ratio (for example, files that previously used 1 TB would use 500 GB after deduplication). Servers that host virtualization data (such as VHD files) often reduce storage capacity utilization by a 20:1 ratio, which reduces 1 TB of data to 50 GB. 


Q56. You have a server named Server1 that runs Windows Server 2012 R2. You create a custom Data Collector Set (DCS) named DCS1. 

You need to configure DCS1 to meet the following requirements: 

. Automatically run a program when the amount of total free disk space on Server1 drops below 10 percent of capacity. . Log the current values of several registry settings. 

Which two should you configure in DCS1? (Each correct answer presents part of the solution. Choose two.) 

A. Event trace data 

B. A Performance Counter Alert 

C. System configuration information 

D. A performance counter 

Answer: B,C 

Explanation: 

Automatically run a program when the amount of total free disk space on Server1 drops 

below 10 percent of capacity. 

You can also configure alerts to start applications and performance logs 

Log the current values of several registry settings. 

System configuration information allows you to record the state of, and changes to, registry 

keys. 

Total free disk space 

Registry settings 

Run a program on alert http: //technet. microsoft. com/en-us/library/cc766404. aspx 


Q57. Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

On a server named Corel, you perform a Server Core Installation of Windows Server 2012 R2. You join Corel to the adatum.com domain. 

You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1. 

What should you do on Core1? 

A. Run the Enable-NetFirewallRulecmdlet. 

B. Run the Disable-NetFirewallRulecmdlet. 

C. Install Remote Server Administration Tools (RSAT). 

D. Install Windows Management Framework. 

Answer:


Q58. Your company deploys a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2. The forest contains a domain controller named DC10. 

On DC10, the disk that contains the SYSVOL folder fails. 

You replace the failed disk. You stop the Distributed File System (DFS) Replication service. You restore the SYSVOL folder. 

You need to perform a non-authoritative synchronization of SYSVOL on DC10. 

Which tool should you use before you start the DFS Replication service on DC10? 

A. Dfsgui.msc 

B. Ultrasound 

C. Ldp 

D. Replmon 

Answer:

Explanation: Verify that replication is working as designed. Download the Ultrasound Monitoring and Troubleshooting Tool for File Replication Services from the Microsoft Download Center to verify the healgt of the current FRS environment. 


Q59. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has the Remote Access server role installed. 

DirectAccess is implemented on Server1 by using the default configuration. 

You discover that DirectAccess clients do not use DirectAccess when accessing websites on the Internet. 

You need to ensure that DirectAccess clients access all Internet websites by using their DirectAccess connection. 

What should you do? 

A. Configure a DNS suffix search list on the DirectAccess clients. 

B. Enable the Route all traffic through the internal network policy setting in the DirectAccess Server Settings Group Policy object (GPO). 

C. Configure DirectAccess to enable force tunneling. 

D. Disable the DirectAccess Passive Mode policy setting in the DirectAccess Client Settings Group Policy object (GPO). 

Answer:


Q60. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are configured as shown in the following table. 

You need to ensure that when new targets are added to Server1, the targets are registered on Server2 automatically. 

What should you do on Server1? 

A. Configure the Discovery settings of the iSCSI initiator 

B. Configure the security settings of the iSCSI target 

C. Run the Set-Wmilnstance cmdlet 

D. Run the Set-IscsiServerTarget cmdlet 

Answer: