Question No 29:
Your network contains two servers named HV1 and HV2. Both servers run Windows Server 2012 R2 and
have the Hyper-V server role installed.
HV1 hosts 25 virtual machines. The virtual machine configuration files and the virtual hard disks are stored
in D:\VM.
You shut down all of the virtual machines on HV1.
You copy D:\VM to D:\VM on HV2.
You need to start all of the virtual machines on HV2. You want to achieve this goal by using the minimum
amount of administrative effort.
What should you do?
A. From HV1, export all virtual machines to D:\VM. Copy D:\VM to D:\VM on HV2 and overwrite the
existing files. On HV2, run the New Virtual Machine wizard.
B. From HV1, export all virtual machines to D:\VM. Copy D:\VM to D:\VM on HV2 and overwrite the
existing files. On HV2, run the Import Virtual Machine wizard.
C. Run the Import-VM InitialReplicationcmdlet.
D. Run the Import-VM cmdlet.
Answer: D
Thursday, 29 October 2015
Wednesday, 21 October 2015
70-417 Exam Question No 28
Question No 28:
Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1
and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named
Server3 and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in a failover cluster
named Cluster2.
You need to move all of the applications and the services from Cluster1 to Cluster2.
What should you do first from Failover Cluster Manager?
A. On a server in Cluster2, click Migrate Roles.
B. On a server in Cluster2, click Move Core Cluster Resources, and then click Select Node...
C. On a server in Cluster1, configure Cluster-Aware Updating.
D. On a server in Cluster2, click Move Core Cluster Resources, and then click Best Possible Node.
Answer: A
Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1
and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named
Server3 and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in a failover cluster
named Cluster2.
You need to move all of the applications and the services from Cluster1 to Cluster2.
What should you do first from Failover Cluster Manager?
A. On a server in Cluster2, click Migrate Roles.
B. On a server in Cluster2, click Move Core Cluster Resources, and then click Select Node...
C. On a server in Cluster1, configure Cluster-Aware Updating.
D. On a server in Cluster2, click Move Core Cluster Resources, and then click Best Possible Node.
Answer: A
Thursday, 15 October 2015
70-417 Exam Question No 27
Question No 27:
Your network contains an Active Directory domain named contoso.com. The domain contains servers
named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory
Federation Services server role installed.Server2 is a file server. Your company introduces a Bring Your
Own Device (BYOD) policy.
You need to ensure that users can use a personal device to access domain resources by using Single
Sign-On (SSO) while they are connected to the internal network.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. Enable the Device Registration Service in Active Directory.
B. Publish the Device Registration Service by using a Web Application Proxy.
C. Configure Active Directory Federation Services (AD FS) for the Device Registration Service.
D. Install the Work Folders role service on Server2.
E. Create and configure a sync share on Server2.
Answer: A, C
Your network contains an Active Directory domain named contoso.com. The domain contains servers
named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory
Federation Services server role installed.Server2 is a file server. Your company introduces a Bring Your
Own Device (BYOD) policy.
You need to ensure that users can use a personal device to access domain resources by using Single
Sign-On (SSO) while they are connected to the internal network.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. Enable the Device Registration Service in Active Directory.
B. Publish the Device Registration Service by using a Web Application Proxy.
C. Configure Active Directory Federation Services (AD FS) for the Device Registration Service.
D. Install the Work Folders role service on Server2.
E. Create and configure a sync share on Server2.
Answer: A, C
Thursday, 8 October 2015
70-417 Exam Question No 26
Question No 26:
Your network contains a perimeter network and an internal network. The internal network contains an
Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as
the attribute store.
You plan to deploy a federation server proxy to a server named Server2 in the perimeter network.
You need to identify which value must be included in the certificate that is deployed to Server2.
What should you identify?
A. The name of the Federation Service
B. The name of the Active Directory domain
C. The FQDN of the AD FS server
D. The public IP address of Server2
Answer: C
Your network contains a perimeter network and an internal network. The internal network contains an
Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as
the attribute store.
You plan to deploy a federation server proxy to a server named Server2 in the perimeter network.
You need to identify which value must be included in the certificate that is deployed to Server2.
What should you identify?
A. The name of the Federation Service
B. The name of the Active Directory domain
C. The FQDN of the AD FS server
D. The public IP address of Server2
Answer: C
Thursday, 1 October 2015
70-417 Exam Question No 25
Question No 25:
You deploy an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses
Active Directory as the attribute store.
Some users report that they fail to authenticate to the AD FS infrastructure.
You discover that only users who run third-party web browsers experience issues.
You need to ensure that all of the users can authenticate to the AD FS infrastructure successfully.
Which Windows PowerShell command should you run?
A. Set-ADFSProperties -SSOLifetime 1:00:00
B. Set-ADFSProperties -AddProxyAuthenticationRules None
C. Set-ADFSProperties -ExtendedProtectionTokenCheck None
D. Set-ADFSProperties -ProxyTrustTokenLifetime 1:00:00
Answer: C
You deploy an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses
Active Directory as the attribute store.
Some users report that they fail to authenticate to the AD FS infrastructure.
You discover that only users who run third-party web browsers experience issues.
You need to ensure that all of the users can authenticate to the AD FS infrastructure successfully.
Which Windows PowerShell command should you run?
A. Set-ADFSProperties -SSOLifetime 1:00:00
B. Set-ADFSProperties -AddProxyAuthenticationRules None
C. Set-ADFSProperties -ExtendedProtectionTokenCheck None
D. Set-ADFSProperties -ProxyTrustTokenLifetime 1:00:00
Answer: C
Subscribe to:
Posts (Atom)