★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-417 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-417-dumps.html


It is more faster and easier to pass the Microsoft 70-417 exam by using Approved Microsoft Upgrading Your Skills to MCSA Windows Server 2012 questuins and answers. Immediate access to the Improve 70-417 Exam and find the same core area 70-417 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Aug 70-417 cbt nuggets download:

Q31. RAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. 

You configure a new failover cluster named Cluster1. Server1 and Server2 are nodes in Cluster1. You need to configure the disk that will be used as a witness disk for Cluster1. 

How should you configure the witness disk? 

To answer, drag the appropriate configurations to the correct location or locations. Each configuration may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q32. You have a server named Server1 that runs Windows Server 2012. 

You promote Server1 to a domain controller. 

You need to view the service location (SRV) records that Server1 registers in DNS. 

What should you do on Server1? 

A. Open the Netlogon.dns file. 

B. Run ipconfig /displaydns. 

C. Run Get-DnsServerDiagnostics. 

D. Open the SrC. sys file. 

Answer: A 

Explanation: 

Netlogon.dns - If you are using non-Microsoft DNS servers to support Active Directory, you can verify SRV locator resource records by viewing Netlogon.dns. Netlogon.dns is located in the %systemroot%\System32\Config folder. You can use a text editor, such as Microsoft Notepad, to view this file. The first record in the file is the domain controller's Lightweight Directory Access Protocol (LDAP) SRV record. References: 

http://support.microsoft.com/kb/816587/en-us 


Q33. You have a server named Server1 that runs Windows Server 2012 R2. 

You discover that the performance of Server1 is poor. 

The results of a performance report generated on Server1 are shown in the following table. 

You need to identify the cause of the performance issue. 

What should you identify? 

A. Insufficient processors 

B. Excessive paging 

C. Driver malfunction 

D. Insufficient RAM 

Answer: C 

Explanation: 

Processor: %DPC Time. Much like the other values, this counter shows the amount of time that the processor spends servicing DPC requests. DPC requests are more often than not associated with the network interface. Processor: % Interrupt Time. This is the percentage of time that the processor is spending on handling Interrupts. Generally, if this value exceeds 50% of the processor time you may have a hardware issue. Some components on the computer can force this issue and not really be a problem. For example a programmable I/O card like an old disk controller card, can take up to 40% of the CPU time. A NIC on a busy IIS server can likewise generate a large percentage of processor activity. Processor: % User Time. The value of this counter helps to determine the kind of processing that is affecting the system. Of course the resulting value is the total amount of non-idle time that was spent on User mode operations. This generally means application code. 

Processor: %Privilege Time. This is the amount of time the processor was busy with Kernel mode operations. If the processor is very busy and this mode is high, it is usually an indication of some type of NT service having difficulty, although user mode programs can make calls to the Kernel mode NT components to occasionally cause this type of performance issue. Memory: Pages/sac This value is often confused with Page Faults/sec. The Pages/sec counter is a combination of Pages Input/sec and Pages Output/sec counters. Recall that Page Faults/sec is a combination of hard page faults and soft page faults. This counter, however, is a general indicator of how often the system is using the hard drive to store or retrieve memory associated data. http://technet.microsoft.com/en-us/library/cc768048.aspx 


Q34. RAG DROP 

Answer: 


Q35. OTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You have a failover cluster named Cluster1 that contains two nodes named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. 

You plan to create two virtual machines that will run an application named App1. App1 will store data on a virtual hard drive named App1data.vhdx. App1data.vhdx will be shared by both virtual machines. 

The network contains the following shared folders: 

An SMB file share named Share1 that is hosted on a Scale-Out File Server. An SMB file share named Share2 that is hosted on a standalone file server. An NFS share named Share3 that is hosted on a standalone file server. 

You need to ensure that both virtual machines can use App1data.vhdx simultaneously. 

What should you do? 

To answer, select the appropriate configurations in the answer area. 

... 

Answer: 


70-417 real exam

Renovate 70-417 free study guide:

Q36. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. You create a user account named User1 in the domain. 

You need to ensure that User1 can use Windows Server Backup to back up Server1. 

The solution must minimize the number of administrative rights assigned to User1. 

What should you do? 

A. Assign User1 the Back up files and directories user right. 

B. Add User1 to the Backup Operators group. 

C. Add User1 to the Power Users group. 

D. Assign User1 the Back up files and directories user right and the Restore files and directories user right. 

Answer: A 

Explanation: 

Backup Operators have these permissions by default: 

However the question explicitly says we need to minimize administrative rights. Since the 

requirement is for backing up the data onlyno requirement to restore or shutdownthen assigning the "Back up files and directories user right" would be the correct. 


Q37. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server 1. Server1 runs Windows Server 2012 R2. You need to create a 3-TB virtual hard disk (VHD) on Server1. Which tool should you use? 

A. New-StoragePool 

B. Diskpart 

C. File Server Resource Manager (FSRM) 

D. New-StorageSubsytemVirtualDisk 

Answer: B 

Explanation: 

Explanation You can create a VHD from either the Disk Management snap-in or the command line (diskpart). From the DiskPart command-line tool at an elevated command prompt, run the create vdisk command and specify the file (to name the file) and maximum (to set the maximum size in megabytes) parameters. The following code demonstrates how to create a VHD file at C:\vdisks\disk1.vdh with a maximum file size of 16 GB (or 16,000 MB). 


Q38. Your network contains an Active Directory forest named contoso.com. 

The forest contains two domains named contoso.com and child.contoso.com and two sites named Site1 and Site2. The domains and the sites are configured as shown in following table. 

When the link between Site1 and Site2 fails, users fail to log on to Site2. 

You need to identify what prevents the users in Site2 from logging on to the child.contoso.com domain. 

What should you identify? 

A. The placement of the infrastructure master 

B. The placement of the global catalog server 

C. The placement of the domain naming master 

D. The placement of the PDC emulator 

Answer: D 

Explanation: The exhibit shows that Site2 does not have a PDC emulator. This is important because of the close interaction between the RID operations master role and the PDC emulator role The PDC emulator processes password changes from earlier-version clients and other domain controllers on a best-effort basis; handles password authentication requests involving passwords that have recently changed and not yet been replicated throughout the domain; and, by default, synchronizes time. If this domain controller cannot connect to the PDC emulator, this domain controller cannot process authentication requests, it may not be able to synchronize time, and password updates cannot be replicated to it. 


Q39. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed.Server1 and Server2 are located in different offices. The offices connect to each other by using a high-latency WAN link. 

Server2 hosts a virtual machine named VM1. 

You need to ensure that you can start VM1 on Server1 if Server2 fails. The solution must minimize hardware costs. 

What should you do? 

A. From the Hyper-V Settings of Server2, modify the Replication Configuration settings. Enable replication for VM1. 

B. On Server1, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1. 

C. On Server2, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1. 

D. From the Hyper-V Settings of Server1, modify the Replication Configuration settings. Enable replication for VM1. 

Answer: D 

Explanation: 

You first have to enable replication on the Replica server--Server1--by going to the server and modifying the "Replication Configuration" settings under Hyper-V settings. You then go to VM1--which presides on Server2-- and run the "Enable Replication" wizard on VM1. 


Q40. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 has the Remote Desktop Session Host role service installed. The computer account of Server1 resides in an organizational unit (OU) named OU1. 

You create and link a Group Policy object (GPO) named GPO1 to OU1. GPO1 is configured as shown in the exhibit. (Click the Exhibit button.) 

You need to prevent GPO1 from applying to your user account when you log on to Server1. GPO1 must apply to every other user who logs on to Server1. 

What should you configure? 

A. Item-level targeting 

B. Security Filtering 

C. Block Inheritance 

D. WMI Filtering 

Answer: B 

Explanation: Security filtering is a way of refining which users and computers will receive and apply the settings in a Group Policy object (GPO). Using security filtering, you can specify that only certain security principals within a container where the GPO is linked apply the GPO. Security group filtering determines whether the GPO as a whole applies to groups, users, or computers; it cannot be used selectively on different settings within a GPO.