Download Upgrading Your Skills to MCSA Windows Server 2012.70-417.CertDumps.2018-07-13.425q.vcex

Vendor: Microsoft
Exam Code: 70-417
Exam Name: Upgrading Your Skills to MCSA Windows Server 2012
Date: Jul 13, 2018
File Size: 38 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 
An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1. 
You make a change to GPO1. 
You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solution must minimize administrative effort. 
Which tool should you use?
  1. The Secedit command
  2. The Invoke-GpUpdate cmdlet
  3. Group Policy Object Editor
  4. Server Manager
Correct answer: B
Explanation:
References: https://technet.microsoft.com/en-us/library/jj134201.aspx
References: https://technet.microsoft.com/en-us/library/jj134201.aspx
Question 2
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. 
The domain contains an Edge Server named Server1. Server1 is configured as a DirectAccess server. Server1 has the following settings:
  • Internal DNS name: Server1.contoso.com
  • External DNS name: dal.contoso.com
  • Internal IPv6 address: 2002:cla8:6a:3333::1
  • External IPv4 address:65.55.37.62
Your company uses split-brain DNS for the contoso.com zone. 
You run the Remote Access Setup wizard as shown in the following exhibit. (Click the Exhibit button.) 
   
 
You need to ensure that client computers on the Internet can establish DirectAccess connections to Server1. 
Which additional name suffix entry should you add from the Remote Access Setup wizard?
  1. A Name Suffix value of Server1.contoso.com and a blank DNS Server Address value
  2. A Name Suffix value of dal.contoso.com and a blank DNS Server Address value
  3. A Name Suffix value of Server1.contoso.com and a DNS Server Address value of 65.55.37.62
  4. A Name Suffix value of dal.contoso.com and a DNS Server Address value of 65.55.37.62
Correct answer: A
Explanation:
* In a non-split-brain DNS environment, the Internet namespace is different from the intranet namespace. For example, the Contoso Corporation uses contoso.com on the Internet and corp.contoso.com on the intranet. Because all intranet resources use the corp.contoso.com DNS suffix, the NRPT rule for corp.contoso.com routes all DNS name queries for intranet resources to intranet DNS servers. DNS name queries for names with the contoso.com suffix do not match the corp.contoso.com intranet namespace rule in the NRPT and are sent to Internet DNS servers. * Split-brain DNS is a configuration method that enables proper resolution of names (e.g., example.com) from both inside and outside of your local network. Note: For split-brain DNS deployments, you must list the FQDNs that are duplicated on the Internet and intranet and decide which resources the DirectAccess client should reach, the intranet version or the public (Internet) version. For each name that corresponds to a resource for which you want DirectAccess clients to reach the public version, you must add the corresponding FQDN as an exemption rule to the NRPT for your DirectAccess clients. Name suffixes that do not have corresponding DNS servers are treated as exemptions.
* In a non-split-brain DNS environment, the Internet namespace is different from the intranet namespace. For example, the Contoso Corporation uses contoso.com on the Internet and corp.contoso.com on the intranet. Because all intranet resources use the corp.contoso.com DNS suffix, the NRPT rule for corp.contoso.com routes all DNS name queries for intranet resources to intranet DNS servers. DNS name queries for names with the contoso.com suffix do not match the corp.contoso.com intranet namespace rule in the NRPT and are sent to Internet DNS servers. 
* Split-brain DNS is a configuration method that enables proper resolution of names (e.g., example.com) from both inside and outside of your local network. 
Note: For split-brain DNS deployments, you must list the FQDNs that are duplicated on the Internet and intranet and decide which resources the DirectAccess client should reach, the intranet version or the public (Internet) version. For each name that corresponds to a resource for which you want DirectAccess clients to reach the public version, you must add the corresponding FQDN as an exemption rule to the NRPT for your DirectAccess clients. Name suffixes that do not have corresponding DNS servers are treated as exemptions.
Question 3
Your network contains an Active Directory domain named contoso.com. All user accounts reside in an organizational unit (OU) named OU1. All of the users in the marketing department are members of a group named Marketing. All of the users in the human resources department are members of a group named HR. 
You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU1. 
You configure the Group Policy preferences of GPO1 to add two shortcuts named Link1 and Link2 to the desktop of each user. 
You need to ensure that Link1 only appears on the desktop of client computers that have more than 80 GB of free disk space and Link2 only appears on the desktop of client computers that have less than 80 GB of free disk space. 
What should you configure?
  1. Group Policy Inheritance
  2. WMI Filtering
  3. Security Filtering
  4. Item-level targeting
Correct answer: B
Explanation:
References: https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc733022(v%3dws.11)
References: https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc733022(v%3dws.11)
Question 4
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has the Remote Access server role installed. 
DirectAccess is implemented on Server1 by using the default configuration. 
You discover that DirectAccess clients do not use DirectAccess when accessing websites on the Internet. 
You need to ensure that DirectAccess clients access all Internet websites by using their DirectAccess connection. 
What should you do?
  1. Configure a DNS suffix search list on the DirectAccess clients.
  2. Enable the Route all traffic through the internal network policy setting in the DirectAccess Server Settings Group Policy object (GPO).
  3. Configure DirectAccess to enable force tunneling.
  4. Disable the DirectAccess Passive Mode policy setting in the DirectAccess Client Settings Group Policy object (GPO).
Correct answer: C
Question 5
Your network contains an Active Directory domain named contoso.com. The domain contains a Web server named www.contoso.com. The Web server is available on the Internet. 
You implement DirectAccess by using the default configuration. 
You need to ensure that users never attempt to connect to www.contoso.com by using DirectAccess. The solution must not prevent the users from using DirectAccess to access other resources in contoso.com. 
Which settings should you configure in a Group Policy object (GPO)?
  1. DirectAccess Client Experience Settings
  2. Name Resolution Policy
  3. DNS Client
  4. Network Connections
Correct answer: B
Explanation:
       Notice this could have been Network connection:      BUT "The solution must not prevent the users from using DirectAccess to access other resources in contoso.com" References:http://www.techrepublic.com/blog/10things/10-things-you-should-know-aboutdirectaccess/1371
    
   
Notice this could have been Network connection:
   
   
BUT "The solution must not prevent the users from using DirectAccess to access other resources in contoso.com" 
References:
http://www.techrepublic.com/blog/10things/10-things-you-should-know-aboutdirectaccess/1371
Question 6
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 
Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server 2012 R2 and hosts a processor-intensive application named App1. 
Users report that App1 responds more slowly than expected.  
You need to monitor the processor usage on VM1 to identify whether changes must be made to the hardware settings of VM1. 
Which performance object should you monitor on Server1?
  1. Hyper-V Hypervisor Logical Processor
  2. Hyper-V Hypervisor Root Virtual Processor
  3. Processor
  4. Hyper-V Hypervisor Virtual Processor
  5. Process
Correct answer: D
Explanation:
The “Hyper-V Hypervisor Root Virtual Processor”and “Hyper-V Hypervisor Virtual Processor” are just slices of the LP counter and can help you understand how much total CPU the root and guests are using on the system. The goal here is to monitor VM1 through Server1. Hyper-V Hypervisor Virtual Processor will do that.    References:http://social.technet.microsoft.com/wiki/contents/articles/1234.hyper-v-concepts-vcpu-virtual-processor.aspxhttp://blogs.msdn.com/b/tvoellm/archive/2008/05/12/hyper-v-performance-counters-part-four-of-many-hyper-v-hypervisor-virtual-processor-and- hyper-v-hypervisor-root-virtual-processor-counter-set.aspx
The “Hyper-V Hypervisor Root Virtual Processor”and “Hyper-V Hypervisor Virtual Processor” are just slices of the LP counter and can help you understand how much total CPU the root and guests are using on the system. 
The goal here is to monitor VM1 through Server1. 
Hyper-V Hypervisor Virtual Processor will do that. 
   
References:
http://social.technet.microsoft.com/wiki/contents/articles/1234.hyper-v-concepts-vcpu-virtual-processor.aspx
http://blogs.msdn.com/b/tvoellm/archive/2008/05/12/hyper-v-performance-counters-part-four-of-many-hyper-v-hypervisor-virtual-processor-and- hyper-v-hypervisor-root-virtual-processor-counter-set.aspx
Question 7
Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. On Server1, you create a Data Collector Set (DCS) named Data1. 
You need to export Data1 to Server2. 
What should you do first?
  1. Right-click Data1 and click Save template...
  2. Right-click Data1 and click Export list...
  3. Right-click Data1 and click Data Manager...
  4. Right-click Data1 and click Properties.
Correct answer: A
Explanation:
Exporting Templates To export a Data Collector Set you create as a template for use on other computers, open Windows Performance Monitor, expand Data Collector Sets, right-click the Data Collector Set you want to export, and click Save Template. Select a directory in which to store theXML file and click Save.
Exporting Templates 
To export a Data Collector Set you create as a template for use on other computers, open Windows Performance Monitor, expand Data Collector Sets, right-click the Data Collector Set you want to export, and click Save Template. Select a directory in which to store theXML file and click Save.
Question 8
You have a server named Server1 that runs Windows Server 2012 R2. 
You discover that the performance of Server1 is poor. 
The results of a performance report generated on Server1 are shown in the following table. 
   
You need to identify the cause of the performance issue. 
What should you identify?
  1. Insufficient RAM
  2. Excessive paging
  3. NUMA fragmentation
  4. driver malfunction
Correct answer: D
Explanation:
Processor: %DPC Time. Much like the other values, this counter shows the amount of time that the processor spends servicing DPC requests.DPC requests are more often than not associated with the network interface. Processor: % Interrupt Time. This is the percentage of time that the processor is spending on handling Interrupts. Generally, if this value exceeds 50% of the processor time you may have a hardware issue. Some components on the computer can force this issue and not really be a problem. For example, a programmable I/O card like an old disk controller card, can take up to 40% of the CPU time. A NIC on a busy IIS server can likewise generate a large percentage of processor activity.Processor: % User Time. The value of this counter helps to determine the kind of processing that is affecting the system. Of course the resulting value is the total amount of non-idle time that was spent on User mode operations. This generally means application code.Processor: %Privilege Time. This is the amount of time the processor was busy with Kernel mode operations. If the processor is very busy and this mode is high, it is usually an indication of some type of NT service having difficulty, although user mode programs can make calls to the Kernel mode NT components to occasionally cause this type of performance issue.Memory: Pages/sac This value is often confused with Page Faults/sec.The Pages/sec counter is a combination of Pages Input/sec and Pages Output/sec counters. Recall that Page Faults/sec is a combination of hard page faults and soft page faults. This counter, however, is a general indicator of how often the system is using the hard drive to store or retrieve memory associated data. References:http://technet.microsoft.com/en-us/library/cc768048.aspx
Processor: %DPC Time. Much like the other values, this counter shows the amount of time that the processor spends servicing DPC requests.
DPC requests are more often than not associated with the network interface. 
Processor: % Interrupt Time. This is the percentage of time that the processor is spending on handling Interrupts. Generally, if this value exceeds 50% of the processor time you may have a hardware issue. Some components on the computer can force this issue and not really be a problem. For example, a programmable I/O card like an old disk controller card, can take up to 40% of the CPU time. A NIC on a busy IIS server can likewise generate a large percentage of processor activity.
Processor: % User Time. The value of this counter helps to determine the kind of processing that is affecting the system. Of course the resulting value is the total amount of non-idle time that was spent on User mode operations. This generally means application code.
Processor: %Privilege Time. This is the amount of time the processor was busy with Kernel mode operations. If the processor is very busy and this mode is high, it is usually an indication of some type of NT service having difficulty, although user mode programs can make calls to the Kernel mode NT components to occasionally cause this type of performance issue.
Memory: Pages/sac This value is often confused with Page Faults/sec.
The Pages/sec counter is a combination of Pages Input/sec and Pages 
Output/sec counters. Recall that Page Faults/sec is a combination of hard page faults and soft page faults. This counter, however, is a general indicator of how often the system is using the hard drive to store or retrieve memory associated data. 
References:
http://technet.microsoft.com/en-us/library/cc768048.aspx
Question 9
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 
Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. Cluster1 hosts 10 virtual machines. All of the virtual machines run Windows Server 2012 R2 and are members of the domain. 
You need to ensure that the first time a service named Service1 fails on a virtual machine, the virtual machine is moved to a different node. 
You configure Service1 to be monitored from Failover Cluster Manager.  
What should you configure on the virtual machine?
  1. From the General settings, modify the Startup type.
  2. From the Recovery settings of Service1, set the First failure recovery action to Take No Action.
  3. From the Recovery settings of Service1, set the First failure recovery action to Restart the Service.
  4. From the General settings, modify the Service status.
Correct answer: B
Explanation:
C. Configure the virtual machine to take no action through Hyper-V if the physical computer shuts down by modifying the Automatic Stop Action setting to None. Virtual machine state must be managed through the Failover Clustering feature. http://technet.microsoft.com/en-us/library/cc742396.aspxhttp://windowsitpro.com/windows-server-2012/enable-windows-server-2012-failover-cluster-hyper-v-vmmonitoring
C. Configure the virtual machine to take no action through Hyper-V if the physical computer shuts down by modifying the Automatic Stop Action setting to None. Virtual machine state must be managed through the Failover Clustering feature. 
http://technet.microsoft.com/en-us/library/cc742396.aspx
http://windowsitpro.com/windows-server-2012/enable-windows-server-2012-failover-cluster-hyper-v-vmmonitoring
Question 10
You have a server named Server1 that runs Windows Server 2012 R2. 
You need to configure Server1 to create an entry in an event log when the processor usage exceeds 60 percent. 
Which type of data collector should you create?
  1. A performance counter data collector
  2. An event trace data collector
  3. A performance counter alert
  4. A configuration data collector
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!