(New Version) PassLeader Share New Real Microsoft 70-417 Exam Questions With Useful Microsoft 70-417 Study Guides (81-100)

ATTENTION PLEASE: The Following 70-417 Exam Questions And Answers Were Updated in Recent Days With The Change Of New 70-417 Exam, All New Exam Questions Are Available Now At PassLeader. Please Visit http://www.passleader.com/70-417.html And Get Valid 70-417 PDF And VCE Exam Dumps With Free New Version VCE Player.

QUESTION 81
Hotspot Question
You have a server named Server1 that has the Web Server (IIS) server role installed. You obtain a Web Server certificate. You need to configure a website on Server1 to use Secure Sockets Layer (SSL). To which store should you import the certificate? To answer, select the appropriate store in the answer area.

811_thumb

Answer:
812_thumb

QUESTION 82
You have a server named Served that runs Windows Server 2012 R2. On Server1, you configure a custom Data Collector Set (DCS) named DCS1. DCS1 is configured to store performance log data in C:\Logs. You need to ensure that the contents of C:\Logs are deleted automatically when the folder reaches 100 MB in size. What should you configure?

A.    A File Server Resource Manager (FSRM) file screen on the C:\Logs folder
B.    A schedule for DCS1
C.    The Data Manager settings of DCS1
D.    A File Server Resource Manager (FSRM) quota on the C:\Logs folder

Answer: C

QUESTION 83
You have a server named Server1 that runs Windows Server 2012 R2. You create a custom Data Collector Set (DCS) named DCS1. You need to configure DCS1 to meet the following requirements:
– Automatically run a program when the amount of total free disk space on Server1 drops below 10 percent of capacity.
– Log the current values of several registry settings.
Which two should you configure in DCS1? (Each correct answer presents part of the solution. Choose two.)

A.    System configuration information
B.    A Performance Counter Alert
C.    Event trace data
D.    A performance counter

Answer: AB

QUESTION 84
You have a VHD that contains an image of Windows Server 2012 R2. You plan to Apply updates to the image. You need to ensure that only updates that can install without requiring a restart are installed. Which DISM option should you use?

A.    /Apply-Unattend
B.    /Add-ProvisionedAppxPackage
C.    /PreventPending
D.    /Cleanup-Image

Answer: C

QUESTION 85
Hotspot Question
Your network contains an Active Directory domain named contoso.com. You have several Windows PowerShell scripts that execute when client computers start. When a client computer starts, you discover that it takes a long time before users are prompted to log on. You need to reduce the amount of time it takes for the client computers to start. The solution must not prevent scripts from completing successfully. Which setting should you configure? To answer, select the appropriate setting in the answer area.
851_thumb[1]

Answer:
852_thumb[1]

QUESTION 86
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the IP Address Management (IPAM) Server feature installed. Server2 has the DHCP Server server role installed. A user named User1 is a member of the IPAM Users group on Server1. You need to ensure that User1 can use IPAM to modify the DHCP scopes on Server2. The solution must minimize the number of permissions assigned to User1. To which group should you add User1?

A.    IPAM ASM Administrators on Server1
B.    IPAMUG in Active Directory
C.    DHCP Administrators on Server2
D.    IPAM MSM Administrators on Server1

Answer: C

QUESTION 87
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Print1. Your company implements DirectAccess. A user named User1 frequently works at a customer’s office. The customer’s office contains a print server named Print1. While working at the customer’s office, User1 attempts to connect to Print1. User1 connects to the Print1 server in contoso.com instead of the Print1 server at the customer’s office. You need to provide User1 with the ability to connect to the Print1 server in the customer’s office. Which Group Policy option should you configure? To answer, select the appropriate option in the answer area.
871_thumb[2]

Answer:
872_thumb[2]

QUESTION 88
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed. You log on to Server1 by using a user account named User2. From the Remote Access Management Console, you run the Getting Started wizard and you receive a warning message as shown in the exhibit. (Click the Exhibit button.)

881_thumb[1]
You need to ensure that you can configure DirectAccess successfully. The solution must minimize the number of permissions assigned to User2. To which group should you add User2?

A.    Enterprise Admins
B.    Server Operators
C.    Domain Admins
D.    Account Operators

Answer: C

QUESTION 89
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has the Remote Access server role installed. DirectAccess is implemented on Server1 by using the default configuration. You discover that DirectAccess clients do not use DirectAccess when accessing websites on the Internet. You need to ensure that DirectAccess clients access all Internet websites by using their DirectAccess connection. What should you do?

A.    Configure DirectAccess to enable force tunneling.
B.    Configure a DNS suffix search list on the DirectAccess clients.
C.    Disable the DirectAccess Passive Mode policy setting in the DirectAccess Client Settings Group Policy object (GPO).
D.    Enable the Route all traffic through the internal network policy setting in the DirectAccess Server Settings Group Policy object (GPO).

Answer: A

QUESTION 90
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. On all of the domain controllers, Windows is installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\. All of the domain controllers have a third-party Application installed. The operating system fails to recognize that the Application is compatible with domain controller cloning. You verify with the Application vendor that the Application supports domain controller cloning. You need to prepare a domain controller for cloning. What should you do?

A.    In C:\Windows\System32\Sysprep\Actionfiles\, add the Application information to an XML file named Respecialize.xml.
B.    In D:\Windows\NTDS\, create an XML file named DCCloneConfig.xml and add the Application information to the file.
C.    In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and add the Application information to the file.
D.    In C:\Windows\, create an XML file named DCCloneConfig.xml and add the Application information to the file.

Answer: C


http://www.passleader.com/70-417.html

QUESTION 91
You have a server named Server1 that runs Windows Server 2012 R2. You create a custom Data Collector Set (DCS) named DCS1. You need to configure Server1 to start DCS1 automatically when the network usage exceeds 70 percent. Which type of data collector should you create?

A.    A configuration data collector
B.    A performance counter data collector
C.    An event trace data collector
D.    A performance counter alert

Answer: D

QUESTION 92
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. You plan to install the Active Directory Federation Services server role on Server1 to allow for Workplace Join. You run nslookupenterpriseregistration and you receive the following results:
921_thumb[2]
You need to create a certificate request for Server1 to support the Active Directory Federation Services (AD FS) installation. How should you configure the certificate request? To answer, drag the appropriate names to the correct locations. Each name may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
922_thumb[1]

Answer:
923_thumb[2]

QUESTION 93
You have a server named Server1 that runs Windows Server 2012 R2. You discover that the performance of Server1 is poor. The results of a performance report generated on Server1 are shown in the following table.
931_thumb
You need to identify the cause of the performance issue. What should you identify?

A.    Insufficient RAM
B.    Driver malfunction
C.    Excessive paging
D.    Non-uniform memory access (NUMA)

Answer: D
Explanation:
Non-uniform memory access (NUMA) is a computer memory design used in multiprocessing, where the memory access time depends on the memory location relative to the processor. Under NUMA, a processor can access its own local memory faster than non-local memory (memory local to another processor or memory shared between processors). The benefits of NUMA are limited to particular workloads, notably on servers where the data are often associated strongly with certain tasks or users.
*NUMA architectures logically follow in scaling from symmetric multiprocessing (SMP) architectures.
*System designers use non-uniform memory access (NUMA) to increase processor speed without increasing the load on the processor bus.

QUESTION 94
Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and 10 web servers. All of the web servers are in an organizational unit (OU) named WebServers_OU. All of the servers run Windows Server 2012 R2. On Server1, you need to collect the error events from all of the web servers. The solution must ensure that when new web servers are added to WebServers_OU, their error events are collected automatically on Server1. What should you do?

A.    On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting.
B.    On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting.
C.    On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting.
D.    On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting.

Answer: D

QUESTION 95
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains an organizational unit (OU) named OU1. OU1 contains an OU named OU2. OU2 contains a user named User1. User1 is the member of a group named Group1. Group1 is in the Users container. You create five Group Policy objects (GPO). The GPOs are configured as shown in the following table.
951_thumb[1]
The Authenticated Users group is assigned the default permissions to all of the GPOs. There are no site-level GPOs. You need to identify which three GPOs will be Applied to User1 and in which order the GPOs will be Applied to User1. Which three GPOs should you identify in sequence? To answer, move the appropriate three GPOs from the list of GPOs to the answer area and arrange them in the correct order.
952_thumb[3]

Answer:
953_thumb[3]

QUESTION 96
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. DirectAccess is deployed to the network. Remote users connect to the DirectAccess server by using a variety of network speeds. The remote users report that sometimes their connection is very slow. You need to minimize Group Policy processing across all wireless wide area network (WWAN) connections. Which Group Policy setting should you configure?

A.    Configure Group Policy slow link detection.
B.    Configure wireless policy processing.
C.    Change Group Policy processing to run asynchronously when a slow network connection is detected.
D.    Configure Direct Access connections as a fast network connection.

Answer: A

QUESTION 97
Your network contains a single Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains 400 desktop computers that run Windows 8 and 10 desktop computers that run Windows XP Service Pack 3 (SP3). All new desktop computers that are added to the domain run Windows 8. All of the desktop computers are located in an organizational unit (OU) named OU1. You create a Group Policy object (GPO) named GPO1. GPO1 contains startup script settings. You link GPO1 to OU1. You need to ensure that GPO1 is Applied only to computers that run Windows XP SP3. What should you do?

A.    Modify the Security settings of OU1.
B.    Run the Set-GPInheritancecmdlet and specify the -target parameter.
C.    Create and link a WMI filter to GPO1.
D.    Run the Set-GPLinkcmdlet and specify the -target parameter.

Answer: C
Explanation:
WMI Filtering is used to get information of the system and apply the GPO on it with the condition is met.Security filtering: apply a GPO to a specific group (members of the group)

QUESTION 98
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com. All client computers run Windows 7. Group Policy objects (GPOs) are linked to the domain as shown in the exhibit. (Click the Exhibit button.)
981_thumb
GPO2 contains user configurations only and GPO3 contains computer configurations only. You need to configure the GPOs to meet the following requirements:
– Ensure that GPO2 only Applies to the user accounts in OU2 that are members of a global group named Group2.
– Ensure that GPO3 only Applies to the computer accounts in OU3 that have more than 100 GB of free disk space.
What should you do? To answer, drag the appropriate setting to the correct GPO. Each setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
982_thumb[2]

Answer:
983_thumb[2]

QUESTION 99
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two organizational units (OUs) named OU1 and OU2 in the root of the domain. Two Group Policy objects (GPOs) named GPO1 and GP02 are created. GPO1 is linked to OU1. GPO2 is linked to OU2. OU1 contains a client computer named Computer1. OU2 contains a user named User1. You need to ensure that the GPOs Applied to Computer1 are Applied to User1 when User1 logs on. What should you configure?

A.    The GPO Status
B.    WMI Filtering
C.    GPO links
D.    Item-level targeting

Answer: D

QUESTION 100
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the HyperV server role installed. On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table.
1001_thumb[3]
You plan to create a snapshot of VM1. You need to recommend a solution to minimize the amount of disk space used for the snapshot of VM1. What should you do before you create the snapshot?

A.    Run the Stop-VM cmdlet.
B.    Convert diskl.vhd to a dynamically expanding disk.
C.    Configure VM1 to have a smaller virtual disk.
D.    Decrease the Minimum RAM.

Answer: A
Explanation:
For checkpoints created when the virtual machine is stopped The checkpoint contains the state of the hard disks only. For checkpoints created when the virtual machine is running The checkpoint contains the state of the hard disks and the data in memory. Note: A checkpoint saves the state of each virtual hard disk that is attached to a virtual machine and all of the hard disk’s contents, including application data files. For virtual machines on Hyper-V and VMware ESX Server hosts, a checkpoint also saves the hardware configuration information. By creating checkpoints for a virtual machine, you can restore the virtual machine to a previous state.


http://www.passleader.com/70-417.html