Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

70-417 Latest Certification Tests

Author: Monika Bergmann
by Monika Bergmann
Posted: Oct 20, 2016

Question: 1

You have a server named Server1 that runs Windows Server 2012 R2.

You plan to create an image of Server1.

You need to remove the source files for all server roles that are not installed on Server1.

Which tool should you use?

A. dism.exe

B. servermanagercmd.exe

C. ocsetup.exe

D. imagex.exe

Answer: A

Explanation:

servermanagercmd.exe The ServerManagerCmd.exe command-line tool has been deprecated in

WindowsServer 2008 R2. imagex.exe ImageX is a command-line tool in Windows Vista that you can use to create and manageWindows image (.wim) files. A.wim file contains one or more volume images, disk volumes that containimages of an installed Windows operating system. dism.exe Deployment Image Servicing and Management (DISM.exe) is a command-line tool that canbe used to service a Windows?image or to prepare a Windows Preinstallation Environment (WindowsPE) image. It replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg that were included inWindows Vista? The functionality that was included in these tools is

now consolidated in one tool(DISM.exe), and new functionality has been added to improve the experience for offline servicing. DISMcan Add, remove, and enumerate packages. ocsetup.exe The Ocsetup.exe tool is used as a wrapper for Package Manager (Pkgmgr.exe) and for WindowsInstaller (Msiexec.exe). Ocsetup.exe is a command-line utility that can be used to perform scripted installs andscripted uninstalls of Windows optional components. The Ocsetup.exe tool replaces the Sysocmgr.exe tool thatWindows XP and Windows Server

2003i use.

http://technet.microsoft.com/en-us/library/hh824822.aspx

http://blogs.technet.com/b/joscon/archive/2010/08/26/adding-features-with- dism.aspx

http://technet.microsoft.com/en-us/library/hh831809.aspx

http://technet.microsoft.com/en-us/library/hh825265.aspx

Question: 2

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has following storage spaces:

Data

Users

Backups

Primordial

You add an additional hard disk to Server1.

You need to identify which storage space contains the new hard disk.

Which storage space contains the new disk?

A. Primordial

B. Data

C. Backups

D. Users

Answer: A

Explanation:

New Disks (Unallocated space) added to Primordial spacePrimordial Pool? All storage that meets acceptable criteria for Storage Spaces will be placed in the Primordial Pool. Thiscan be considered the default pool for devices from which any other pools will be created. Notice that there are no other virtual disks or pools at this point. The Primordial Pool will only consist of physical storage devices that do not belong to any other pools.

http://blogs.technet.com/b/canitpro/archive/2012/12/13/storage-pools-dive-right-in.aspx http://

blogs.technet.com/b/askpfeplat/archive/2012/10/10/windows-server-2012-storagespaces-is- it for-youcould-be.aspx

Question: 3

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012.

You create a group Managed Service Account named gservice1.

You need to configure a service named Service1 to run as the gservice1 account.

How should you configure Service1?

A. From a command prompt, run sc.exe and specify the config parameter.

B. From a command prompt, run sc.exe and specify the sdset parameter.

C. From the Services console, configure the General settings.

D. From Windows PowerShell, run Set-Service and specify the -PassThrough parameter.

Answer: A

To specify a binary path for the NEWSERVICE service, type:

sc config NewService binpath= "ntsd -d c:\windows\system32\NewServ.exe"

Reference: Sc config

https://technet.microsoft.com/en-us/library/cc990290.aspx

http://technet.microsoft.com/en-us/library/cc738230(v=ws.10).aspx

Question: 4

You have a server named Data1 that runs a Server Core Installation of Windows Server 2012 R2 Standard.

You need to configure Data1 to run a Server Core Installation of Windows Server 2012 R2 Datacenter. You want to achieve this goal by using the minimum amount of administrative effort.

What should you perform?

A. An online servicing by using Dism

B. An offline servicing by using Dism

C. An upgrade installation of Windows Server 2012 R2

D. A clean installation of Windows Server 2012 R2

Answer: A

Explanation:

A. Not least effort

B. Not least effort

C. dism /online /set-edition

D. offline would be less ideal and more workex: DISM /online /Set-Edition:ServerEnterprise /

ProductKey:489J6-VHDMP-X63PK-3K798-CPX3YWindows Server 2008 R2/2012 contains a command-line utility called DISM (Deployment Image Servicing andManagement tool). This tool has many features, but one of those features is the ability to upgrade the edition ofWindows in use. Note that this process is for upgrades only and is irreversible. You cannot set a Windowsimage to a lower edition. The lowest edition will not appear when you run the /Get-TargetEditions option. If the server is running an evaluation version of Windows Server 2012

R2 Standard or Windows Server 2012 R2Datacenter, you can convert it to a retail version as follows:

If the server is a domain controller, you cannot convert it to a retail version. In this case, install an additionaldomain controller on a server that runs a retail version and remove AD DS from the domain controller thatruns on the evaluation version. From an elevated command prompt, determine the current edition name with the command DISM /online /Get-CurrentEdition. Make note of the edition ID, an abbreviated form of the edition name. Then run DISM /online /Set-Edition: /ProductKey:XXXXXXXXXX-XXXXX-XXXXXXXXXX

/AcceptEula,providing the edition ID and a retail product key.

The server will restart twice.

http://technet.microsoft.com/en-us/library/jj574204.aspx

http://technet.microsoft.com/en-us/library/dd744380%28v=ws.10%29.aspx http://blogs.technet.com/b/server_core/archive/2009/10/14/upgrading- windows-server2008-r2- without-media.aspx

http://communities.vmware.com/people/vmroyale/blog/2012/05/30/howto-upgradingwindows- edition-with-dism

Question: 5

Your network contains an Active Directory forest named contoso.com.

The forest contains two domains named contoso.com and child.contoso.com and two sites named Site1 and Site2. The domains and the sites are configured as shown in following table.

When the link between Site1 and Site2 fails, users fail to log on to Site2.

You need to identify what prevents the users in Site2 from logging on to the child.contoso.com domain.

What should you identify?

A. The placement of the infrastructure master

B. The placement of the global catalog server

C. The placement of the domain naming master

D. The placement of the PDC emulator

Answer: B

Question: 6

Your network contains an Active Directory forest that contains two domains. The forest contains five domain controllers.

The domain controllers are configured as shown in the following table.

You need to configure DC5 as a global catalog server.

Which tool should you use?

A. Active Directory Administrative Center

B. Active Directory Users and Computers

C. Active Directory Sites and Services

D. Active Directory Domains and Trusts

Answer: C

Explanation:

Active Directory Sites and Services can be used to Add or remove the global catalog read-only directory partitions from a domain controller in the site. Confirm that all read-only directory partitions have been replicated to the new global catalog server. As well as verify that the global catalog server is being advertised in Domain Name System (DNS).

References:

http://technet.microsoft.com/en-us/library/cc730868.aspx

http://technet.microsoft.com/en-us/library/cc770674.aspx

Question: 7

Your network contains an Active Directory forest. The forest contains a single domain named contoso.com. The domain contains four domain controllers.

The domain controllers are configured as shown in the following table.

All domain controllers are DNS servers.

You plan to deploy a new domain controller named DC5 in the contoso.com domain.

You need to identify which domain controller must be online to ensure that DC5 can be promoted successfully to a domain controller.

Which domain controller should you identify?

A. DC1

B. DC2

C. DC3

D. DC4

Answer: D

Question: 8

Your network contains an Active Directory forest named contoso.com. All domain controllers currently run Windows Server 2008 R2.

You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2.

The new domain controller will have the following configurations:

Schema master

Global catalog server

DNS Server server role

Active Directory Certificate Services server role

You need to identify which configurations cannot be fulfilled by using the Active Directory Domain Services Configuration Wizard.

Which two configurations should you identify? (Each correct answer presents part of the solution. Choose two.)

A. Enable the global catalog server.

B. Transfer the schema master.

C. Install the Active Directory Certificate Services role.

D. Install the DNS Server role.

Answer: B, C

Explanation:

AD Installation Wizard will automatically install DNS and allows for the option to set it as a global catalog server. ADCS and schema must be done separately.

Question: 9

You have a server named Server1 that runs Windows Server 2012.

You promote Server1 to a domain controller.

You need to view the service location (SRV) records that Server1 registers in DNS.

What should you do on Server1?

A. Open the Netlogon.dns file.

B. Run ipconfig /displaydns.

C. Run Get-DnsServerDiagnostics.

D. Open the SrC. sys file.

Answer: A

Explanation:

Netlogon.dns - If you are using non-Microsoft DNS servers to support Active Directory, you can verify SRV locator resource records by viewing Netlogon.dns. Netlogon.dns is located in the %systemroot%\System32\Config folder. You can use a text editor, such as Microsoft Notepad, to view this file.

The first record in the file is the domain controller's Lightweight Directory Access Protocol (LDAP) SRV record.

References:

http://support.microsoft.com/kb/816587/en-us

Question: 10

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2.

On DC2, you open Server Manager and you add Server1 as another server to manage.

From Server Manager on DC2, you right-click Server1 as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that when you right-click Server1, you see the option to run the DHCP console.

What should you do?

A. On DC2, install the Role Administration Tools.

B. On DC2 and Server1, run winrmquickconfig.

C. In the domain, add DC2 to the DHCP Administrators group.

D. On Server1, install the Feature Administration Tools.

Answer: A

Explanation:

You need to install the feature administrations tools for the dhcp. Need to install DHCP management tools on DC2 then you will have access to dhcp management.

Question: 11

Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3.

You create a server group named ServerGroup1.

You discover the error message shown in the following exhibit. (Click the Exhibit button.)

You need to ensure that Server2 can be managed remotely by using Server Manager.

What should you do?

A. On Server2, run the netdom.exe command.

B. On Server2, run the net stop netlogon command, and then run the net start netlogon command.

C. On DC1, run the Enable-PSSessionConfigurationcmdlet.

D. On Server2, modify the membership of the Remote Management Users group.

Answer: D

Explanation:

This is a security issue. To be able to access Server2 remotely through Server Manager the user need to be a member of the Remote Management Users group.

References:

Training Guide: Installing and Configuring Windows Server 2012, Chapter 3 Server Remote Management, Lesson 1: Server Manager, p. 90-92

Question: 12

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1.

You install the Windows PowerShell Web Access gateway on Server1.

You need to provide administrators with the ability to manage the servers in the domain by using the Windows PowerShell Web Access gateway.

Which two cmdlets should you run on Server1? (Each correct answer presents part of the solution. Choose two.)

A. Install PswaWebApplication

B. Add PswaAuthorizationRule

C. Set-WSManlnstance

D. Set-WSManQuickConfig

E. Set-BCAuthentication

Answer: A, B

Configure PowerShell Web Access Gateway using the following PowerShell Cmdlet.

Install-PswaWebApplication –UseTestCertificate

Running the cmdlet installs the Windows PowerShell Web Access web application within the IIS Default Web Site container. The cmdlet creates the infrastructure required to run Windows PowerShell Web Access on the default website, Error! Hyperlink reference not valid..

Add-PswaAuthorizationRule

Adds a new authorization rule to the Windows PowerShell Web Access authorization rule set.

Parameters:

ComputerGroupName

ComputerName

ConfigurationName

RuleName

UserGroupName

UserName

Credential (Windows Server 2012 R2 and later)

References:

http://technet.microsoft.com/en-us/library/hh849867.aspx

http://technet.microsoft.com/en-us/library/hh849875.aspx

http://technet.microsoft.com/en-us/library/jj592890(v=wps.620).aspx

http://technet.microsoft.com/en-us/library/hh848404(v=wps.620).aspx

http://technet.microsoft.com/en-us/library/jj592894(v=wps.620).aspx

Question: 13

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 and a server named Server2 that runs Windows Server 2008 R2 Service Pack 1 (SP1). Both servers are member servers.

On Server2, you install all of the software required to ensure that Server2 can be managed remotely from Server Manager.

You need to ensure that you can manage Server2 from Server1 by using Server Manager.

Which two tasks should you perform on Server2? (Each correct answer presents part of the solution. Choose two.)

A. Run the Enable-PSRemotingcmdlet.

B. Run the Configure-SMRemoting.psl script.

C. Run the Enable-PSSessionConfigurationcmdlet.

D. Run the Set-ExecutionPolicycmdlet.

E. Run the systempropertiesremote.exe command.

Answer: B, D

Explanation:

To configure Server Manager remote management by using Windows PowerShell

On the computer that you want to manage remotely, open a Windows PowerShell session with elevated user rights.

In the Windows PowerShell session, type the following, and then press Enter.

Set-ExecutionPolicy –ExecutionPolicyRemoteSigned (D)

Type the following, and then press Enter to enable all required firewall rule exceptions.

Configure-SMRemoting.ps1 -force –enable (B)

Question: 14

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2.

You log on to Server1.

You need to retrieve the IP configurations of Server2.

Which command should you run from Server1?

A. winrm get server2

B. dsquery • -scope base -attrip/server2

C. winrs -r:server2ipconfig

D. ipconfig> server2.ip

Answer: C

Explanation:

Windows Remote Management allows you to manage and execute programs remotely

References:

Exam Ref 70-410: Installing and Configuring Windows Server 2012: Objective 4.3: Deploy and Configure the DNS service, Chapter 4 Deploying and Configuring core network services, p. 246

http://technet.microsoft.com/en-us/library/dd349801(v=ws.10).aspx

Question: 15

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 has the DHCP Server server role and the Network Policy Server role service installed.

Server1 contains three non-overlapping scopes named Scope1, Scope2, and Scope3. Server1 currently provides the same Network Access Protection (NAP) settings to the three scopes.

You modify the settings of Scope1 as shown in the exhibit. (Click the Exhibit button.)

You need to configure Server1 to provide unique NAP enforcement settings to the NAP non-compliant DHCP clients from Scope1.

What should you create?

A. A network policy that has the MS-Service Class condition

B. A connection request policy that has the Service Type condition

C. A network policy that has the Identity Type condition

D. A connection request policy that has the Identity Type condition

Answer: A

Explanation:

A. Restricts the policy to clients that have received an IP address from a DHCP scope that matches the specified DHCP profile name. This condition is used only when you are deploying NAP with the DHCP enforcement method. To use the MS-Service Class attribute, in Specify the profile name that identifies your DHCP scope, type the name of an existing DHCP profile.

http://technet.microsoft.com/en-us/library/cc731220(v=ws.10).aspx

Question: 16

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy Server role service installed.

You plan to configure Server1 as a Network Access Protection (NAP) health policy server for VPN enforcement by using the Configure NAPwizard.

You need to ensure that you can configure the VPN enforcement method on Server1 successfully.

What should you install on Server1 before you run the Configure NAP wizard?

A. A computer certificate

B. A system health validator (SHV)

C. The Remote Access server role

D. The Host Credential Authorization Protocol (HCAP)

Answer: A

Explanation:

http://technet.microsoft.com/fr-fr/library/dd314165%28v=ws.10%29.aspx

Question: 17

Your network contains an Active Directory domain named contoso.com. The domain contains client computers that run Either Windows XP, Windows 7, or Windows 8.

Network Policy Server (NPS) is deployed to the domain.

You plan to create a system health validator (SHV).

You need to identify which policy settings can be applied to all of the computers.

Which three policy settings should you identify? (Each correct answer presents part of the solution. Choose three.)

A. Automatic updating is enabled.

B. A firewall is enabled for all network connections.

C. An antispyware application is on.

D. Antispyware is up to date.

E. Antivirus is up to date.

Answer: A, B, E

http://technet.microsoft.com/en-us/library/cc731260.aspx

Explanation:

  • System health agent (SHA) is a NAP component.
  • System health agent (SHA)

A component that checks the state of the client computer to determine whether the settings monitored by the SHA are up-to-date and configured correctly. For example, the Windows Security Health Agent (WSHA) can monitor Windows Firewall, whether antivirus software is installed, enabled, and updated, whether antispyware software is installed, enabled, and updated, and whether Microsoft Update Services is enabled and the computer has the most recent security updates from Microsoft Update Services. There might also be SHAs (and corresponding system health validators) available from other companies that provide different functionality.

Question: 18

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server.

The network contains two subnets named Subnet1 and Subnet2. Server1 has a DHCP scope for each subnet.

You need to ensure that noncompliant computers on Subnet1 receive different network policies than noncompliant computers on Subnet2.

Which two settings should you configure? (Each correct answer presents part of the solution. Choose two.)

A. The NAS Port Type constraints

B. The Health Policies conditions

C. The Called Station ID constraints

D. The NAP-Capable Computers conditions

E. The MS-Service Class conditions

Answer: B, E

Question: 19

Your network contains a single Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.

The domain contains 400 desktop computers that run Windows 8 and 200 desktop computers that run Windows Vista Service Pack 2(SP2).

All of the desktop computers are located in an organizational unit (OU) named OU1.

You create a Group Policy object (GPO) named GPO1. GPO1 contains startup script settings.

You link GPO1 to OU1.

You need to ensure that GPO1 is applied only to computers that run Windows 8.

What should you do?

A. Modify the Security settings of OU1.

B. Create and link a WMI filter to GPO1.

C. Run the Set-GPInheritancecmdlet and specify the -target parameter.

D. Run the Set-GPLinkcmdlet and specify the -target parameter.

Answer: B

Explanation:

WMI Filtering is used to get information of the system and apply the GPO on it with the condition is met.Security filtering: apply a GPO to a specific group (members of the group)

Question: 20

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 has the Remote Desktop Session Host role service installed. The computer account of Server1 resides in an organizational unit (OU) named OU1.

You create and link a Group Policy object (GPO) named GPO1 to OU1. GPO1 is configured as shown in the exhibit. (Click the Exhibit button.)

You need to prevent GPO1 from applying to your user account when you log on to Server1. GPO1 must apply to every other user who logs on to Server1.

What should you configure?

A. Item-level targeting

B. Security Filtering

C. Block Inheritance

D. WMI Filtering

Answer: B

Security filtering is a way of refining which users and computers will receive and apply the settings in a Group Policy object (GPO). Using security filtering, you can specify that only certain security principals within a container where the GPO is linked apply the GPO. Security group filtering determines whether the GPO as a whole applies to groups, users, or computers; it cannot be used selectively on different settings within a GPO.

Question: 21

DRAG DROP

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012.

The domain contains an organizational unit (OU) named OU1. OU1 contains an OU named OU2. OU2 contains a user named User1.

User1 is the member of a group named Group1. Group1 is in the Users container.

You create five Group Policy objects (GPO). The GPOs are configured as shown in the following table.

The Authenticated Users group is assigned the default permissions to all of the GPOs.

There are no site-level GPOs.

You need to identify which three GPOs will be applied to User1 and in which order the GPOs will be applied to User1.

Which three GPOs should you identify in sequence?

To answer, move the appropriate three GPOs from the list of GPOs to the answer area and arrange them in the correct order.

Answer:

Box 1: GPO1

Box 2: GPO3

Box 3: GPO5

Note:

  • Box 1: Domain GPOs are applied before OU GPOs.

Question: 22

DRAG DROP

Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.

Group Policy objects (GPOs) are linked to the domain as shown in the exhibit. (Click the Exhibit button.)

GPO2 contains computer configurations only and GPO3 contains user configurations only.

You need to configure the GPOs to meet the following requirements:

Ensure that GPO2 only applies to the computer accounts in OU2 that have more than one processor.

Ensure that GPO3 only applies to the user accounts in OU3 that are members of a security group named SecureUsers.

Which setting should you configure in each GPO?

To answer, drag the appropriate setting to the correct GPO. Each setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Answer:

Question: 23

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.

An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1.

You make a change to GPO1.

You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solution must minimize administrative effort.

Which tool should you use?

A. TheSecedit command

B. The Invoke-GpUpdatecmdlet

C. Group Policy Object Editor

D. Server Manager

Answer: B

Question: 24

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012.

The domain contains an Edge Server named Server1. Server1 is configured as a DirectAccess server. Server1 has the following settings:

Internal DNS name: Server1.contoso.com External DNS name:

dal.contoso.com Internal IPv6 address: 2002:cla8:6a:3333::l

External IPv4 address: 65.55.37.62

Your company uses split-brain DNS for the contoso.com zone.

You run the Remote Access Setup wizard as shown in the following exhibit. (Click the Exhibit button.)

You need to ensure that client computers on the Internet can establish DirectAccess connections to Server1.

Which additional name suffix entry should you add from the Remote Access Setup wizard?

A. A Name Suffix value of Server1.contoso.com and a blank DNS Server Address value

B. A Name Suffix value of dal.contoso.com and a blank DNS Server Address value

C. A Name Suffix value of Server1.contoso.com and a DNS Server Address value of 65.55.37.62

D. A Name Suffix value of dal.contoso.com and a DNS Server Address value of 65.55.37.62

Answer: B

Question: 25

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table.

You plan to create a checkpoint of VM1.

You need to recommend a solution to minimize the amount of disk space used for the checkpoint of VM1.

What should you do before you create the checkpoint?

A. Decrease the Maximum RAM.

B. Convert Disk1.vhd to a dynamically expanding disk.

C. Run the Stop-VM cmdlet.

D. Run the Resize-VHD cmdlet.

Answer: C

Explanation:

For checkpoints created when the virtual machine is stopped

The checkpoint contains the state of the hard disks only.

For checkpoints created when the virtual machine is running

The checkpoint contains the state of the hard disks and the data in memory.

Note: A checkpoint saves the state of each virtual hard disk that is attached to a virtual machine and all of the hard disk's contents, including application data files. For virtual machines on Hyper-V and VMware ESX Server hosts, a checkpoint also saves the hardware configuration information. By creating checkpoints for a virtual machine, you can restore the virtual machine to a previous state.

Question: 26

Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

You install a network monitoring application on VM2.

You need to ensure that all of the traffic sent to VM3 can be captured on VM2.

What should you configure?

A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Answer: J

Explanation:

http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror

What's New in Hyper-V Virtual Switch

Port Mirroring

With Port Mirroring, traffic sent to or from a Hyper-V Virtual Switch port is copied and sent to a mirror port.

There are a range of applications for port mirroring an entire ecosystem of network visibility companies exist that have products designed to consume port mirror data for performance management, security analysis, and network diagnostics. With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch port that receives copies of all the traffic.

The following examples configure port mirroring so that all traffic that is sent and received by both MyVM and

MyVM2 is also sent to the VM named MonitorVM.

Set-VMNetworkAdapter VMName MyVM PortMirroring Source

Set-VMNetworkAdapter VMName MyVM2 PortMirroring Source

Set-VMNetworkAdapter VMName MonitorVM PortMirroring Destination

Question: 27

Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

You plan to schedule a complete backup of Server1 by using Windows Server Backup.

You need to ensure that the state of VM1 is saved before the backup starts.

What should you configure?

A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Answer: I

Explanation:

http://www.altaro.com/hyper-v/vss-crash-consistent-vs-Application-consistent-vss-backupspost-2- of-2/ Backup

Operations in Hyper-V

No

VSS Writer Available?

In some cases, you need an Application-consistent backup but there is no VSS writer available. One example of this is MySQL. Hyper-V backups of virtual machines containing MySQL will always result in either a crashconsistent or an image-level backup. For MySQL, the latter is probably acceptable as MySQL doesn't perpetually expand the log file. However, if you're using MySQL within a VSS-aware VM, then a Hyper-Vbased backup tool is going to take a crash-consistent backup. MySQL (like any other database system) isn't always recoverable from a crash-consistent backup; tool is going to take a crash-consistent backup. MySQL (like any

other database system) isn't always recoverable from a crash-consistent backup; even when recovery is possible, it may be painful. MySQL is just one example; any number of line-of-business Applications could tell a similar tale. In the case of MySQL, one solution is to find a guest-level backup Application that is MySQL- aware and can back it up properly. For Applications for which no backup Application has a plug-in, you may need to have pre- and post-backup scripts that stop services or close Applications. If brief downtime is acceptable, you can disable the Backup item in Hyper-V Integration Services, thereby forcing Hyper-V to save

the state of the VM during backup. This technique results in an image-level backup and can be used on any Application that doesn't have a VSS writer.

Question: 28

Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

VM3 is used to test applications.

You need to prevent VM3 from synchronizing its clock to Server1.

What should you configure?

A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Answer: I

Explanation:

Integration Services settings on virtual machines includes services such as operating system shutdown, time synchronization, data exchange, Heart beat, and Backup (volume snapshot services. Thus you should disable the time synchronization using Integration Services.

References:

http://blogs.technet.com/b/virtualization/archive/2008/08/29/backing-up-hyper-v-virtual-machines.aspx

Exam Ref 70-410, Installing and Configuring Windows Server 2012, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p. 144

Question: 29

Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

VM2 sends and receives large amounts of data over the network.

You need to ensure that the network traffic of VM2 bypasses the virtual switches of the parent partition.

What should you configure?

A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Answer: K

Explanation:

Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine to maximize network throughput while minimizing network latency and the CPU overhead required for processing network traffic.

References:

http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx

http://technet.microsoft.com/en-us/library/hh831410.aspx

Exam Ref 70-410, Installing and Configuring Windows Server 2012, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p. 144

Training Guide: Installing and Configuring Windows Server 2012: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p. 335

Question: 30

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.

You need to add a graphical user interface (GUI) to Server1.

Which tool should you use?

A. The imagex.exe command

B. The ocsetup.exe command

C. The setup.exe command

D. The dism.exe command

Answer: D

The DISM command is called by the Add-WindowsFeature command. Here is the systax for DISM:

Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:Server- Gui-Shell /featurename:Server-Gui-Mgmt

About the Author

Ou can buy and download our downloadable 712-50 material for 712-50 EC-Council Certified CISO (CCISO) exam quite easily. Just add this study material to your cart, enter your billing information and once you have completed the purchase process

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Monika Bergmann

Monika Bergmann

Member since: Oct 13, 2016
Published articles: 44

Related Articles