2013 Latest MCSA 70-417 Exam Questions 81-85

Ensurepass

QUESTION 81
You have a server named Server1 that runs Windows Server 2012. Server1 has five network adapters.
Three of the network adapters are connected to a network named LAN1. The two other network adapters are connected to a network named LAN2.
You need to create a network adapter team from the three network adapters connected to LAN1. Which tool should you use?
A. Routing and Remote Access
B. Network Load Balancing Manager
C. Network and Sharing Center
D. Server Manager
Correct Ans ^ r: 0
5ection: Network (DN5 DHCP NIC teaming IPAM VPN NAP DirectAccess…) Explanation
Explanation/Reference:
ll a!ilerverI
ii AII Servers
File and Storage Servi ces 1>
Hype
Computer name
Workgroup
Wni dows Firewall Remote management Remote Desktop
NIC Te min
SERVERS
AII Servers 11 total
Status Server Type Teams
TEAMS
AII Teams 1 0 total
A
TeamStatus Teaming Modeload Balancing Ac

QUESTION 82
Your network contains a server named Server1 that runs Windows Server 2012
Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs on
Server1 are under a heavy load.
What should you configure? A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O visualization
Correct Answer: B Section: Hyper-V Explanation
Explanation/Reference:
nu-
4
FUPMU
:lI- MdE
G
Add nwnuUk”uu ware
Pr.r
BIOS
WHFbmu
Y u can modify the number of virtual pro?ssors ba d on the n
Bootfrom CD 3rLum
pr. ::essors on the physical oomputer.You can also modify other
gMemory
2048 MB
CiI Hard Drive
SLH
UWHU
nH6l
4
nu
i
Fb
ntrol settings.
Number of virtual pro?ssors:
Resour? ntrol
Y u can use resour?ntrols to balan? resour?s among vir ma?lines.
2012GUI2 EBB119D2-36… fi IDE Controller 1
DVD Drive
SRV 2012 – 9200.16384…. SCSI Controller
l!lJ Network Adapter
Priv1
Hardware A::eleration
Advan?d F tures
l!lJ Network Adapter
Intel(R) Centrino(R) VVlreless-…
COM 1
None
COM 2
None
9 Diskette Drive
None
Virtual ma?line reserve (per?ntage): Pernt of total system resour?s:
Virtual ma?line limit (per?ntage): Per?nt of total system ri() ur?s:
Relative weight
Some settings cannot be modified because the virtual mact running when this window was opened.To modify a settin? unavailableshut down the virtual ma?line and then reopel
::JI can!

QUESTION 83
Your network contains a server named Server1 that runsWindows Server 2012. Server1 has the Hyper-V
serv er role installed
Server1 hosts four virtual machines named VM1VM2VM3and VM4. Server1 is configured as shown in
You install a network monitoring application on VM2.
You need to ensure that all of the traffic sent to VM3 can be captured on VM2. What should you configure? A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Correct Answer: J Section: Hyper-V Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror
What’s New in Hyper-V Virtual Switch
Port Mirroring
With Port Mirroring, traffic sent to or from a Hyper-V Virtual Switch port is copied and sent to a mirror port. There are a range of applications for port mirroring – an entire ecosystem of network visibility companies exist that have products designed to consume port mirror data for performance management, security analysis, and network diagnostics. With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch port that receives copies of all the traffic.
The following examples configure port mirroring so that all traffic that is sent and received by both MyVM
and MyVM2 is also sent to the VM named MonitorVM.
Set-VMNetworkAdapter CVMName MyVM CPortMirroring Source
Set-VMNetworkAdapter CVMName MyVM2 CPortMirroring Source
Set-VMNetworkAdapter CVMName MonitorVM CPortMirroring Destination
==================
4
nu-
4
FUPMUH
HU”lt3lu
Hardware
G
Add HaKUrUUdware
d2R
Advan?d F tur
BIOS
hshmu
B tfrom CD l3ru
!!I Memory
2048 MB
gPro?ssor
nuu
4nH
nu-
i
4 Virtual procrs FU
13 1m IDE Controller 0
CiI Hard Drive
MAC address spoofing allows vi ual machines to change the
MAC address in outgoing packets to one thatnot signed
2012GUI2 EBB1l9D2-36…
13 I il IDE Controller 1
ANV O
Enable IAC addrspoofing
DVD Drive
SRV 2012 – 9200.16384…. SCSCI ontroller
DHCPogguard
DHCP guard drops DHCP server mes g from unauthorized machineCs pretending to be DHCP servers.
Enable DHCP guard
Intel(R) Centrino(R) Wireless-… COM 1
None
COM 2
None
9 Diskette Drive
Router guard
Router guard drops router advertisement and redireion me from unauthorized virtual machines pretending to be routers.
Enable router advert
Port mirroring
Port mirroring allows the network traffic of a virtual machine t
None
monitored by pylng In ming and outgoing packets and fo
the pl to another virtual machinenfigured for monitori
Mirroring mode:INone
NIC T mlng
You can establish NIC T ming in the gu t operating systerr aggregate bandwidth and provide r undancy.Thisusefuli
::JIcan!

QUESTION 84
Your network contains an Active Directory domain named contoso.com. AII file servers in the domain run
Vlindows Server 2012
The computer accounts of the file se IV ers are in an 0 rganizational unit (OU) named 0U1
A Group Policy object (GPO) named GP01 is linked to OU1.
You plan to modify the NTFS permissions for many folders on the file servers by using central access policies.
You need to identify any users who will be denied access to resources that they can currently access once the new permissions are implemented.
In which order should you perform the five actions?
To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
Correct Answer:
Section: Access Control & Dynamic Access Control
Explanation
Explanation/Reference:
initial answer :
=> FALSE
1) policy before rule => false
you should first create the rule and then integrate it to the policy :
=============
from the Microsoft.Press.Exam.Ref.70-417.Oct.2012 book :
Step 1: Create a central access policy that includes claims
This step consists of two parts, both of which you can perform in Active Directory Administrative Center.
First, you create one or more central access rules that include claims. Then, you add those rules to a central access policy.
EXAM TIP :
Normally youd want to create access rules and then create the central access policy to add them to.
=============
2) Then, we should modify the security settings of the folder after GPO1 is modified, as the CAP
settings in the GPO are configured to make the CAP appear in the advanced security configuration
(in the Central Policy tab).
so we should first configure the GPO and then, once everything is ok, go to the security settings of folder1 to point the Central Access Policy (now available thanks to the GPO)
=============
from Microsoft.Press.Exam.Ref.70-417.Oct.2012
[…]
In this step, you configure a policy setting at the domain level that will deliver chosen central access policies
to your file servers. Note that you cant actually enforce a central access policy by using Group Policy. You use Group Policy only to make desired central access policies available for selection in the Advanced Security Settings dialog box of all objects within the folder structure on file servers. The
policy must then be applied to the object (usually a folder) manually.
EXAM TIP :
As an alternative to step 3, you can leave selected the Use Following Permissions as Proposed
Permissions option, which you can see in Figure 11-15. This option is used to stage a policy rule.
Staging policies can be used to monitor the effects of a new policy entry before you enable it.
You can use this option with the Group Policy setting name Audit Central Access Policy Staging. For more information, see the procedure described at the following address: http://technet.microsoft.com/en-us/
library/hh846167.aspx#BKMK_1_2.
==============
http://technet.microsoft.com/en-us/library/hh846167.aspx#BKMK_1_2 (i only put a summary, please feel free to go check the link)
Deploy a Central Access Policy (Demonstration Steps)
1) Implement : Configure the components and policy :
Create claim types => Create resource properties => Configure a central access rule => Configure a central
access policy (CAP) => Target central access policy to the file server (by adding the CAP to the GPO to make it enable in the Advanced Security Settings of the folders) => Enable KDC Support for claims, compound authentication and Kerberos armoring)
2) Deploy the central access policy :
a) Assign the CAP to the appropriate shared folders on the file server
– gpupdate to apply the gpo settings
– update the global ressource properties from AD
– in the folder properties, in Classification tab, select (in this case) the department
– IN SECURITY SETTINGS => ADVANCED => CENTRAL POLICY TAB => SELECT THE ACCESS CONTROL POLICY
b) Verify that access is appropriately configured.
=============
a few screenshots… :
to make it appear in the “Central Policy” tab of the folder
to test the effect of the CAP
once the GPO is applied, and the CAP available to Folder1, we select it.

QUESTION 85
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V
server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You need to configure VM4 to track the CPU, memory, and network usage.
What should you configure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Correct Answer: C Section: Hyper-V Explanation
Explanation/Reference:
http://blogs.technet.com/b/meamcs/archive/2012/05/28/hyper-v-resource-metering-in-windows-server-
2012-server-8-beta.aspx
Hyper-V Resource Metering in Windows server 2012 Server 8 Beta
IT organizations need tools to charge back business units that they support while providing the business units with the right amount of resources to match their needs. For hosting providers, it is equally important to issue chargebacks based on the amount of usage by each customer.
To implement advanced billing strategies that measure both the assigned capacity of a resource and its actual usage, earlier versions of Hyper-V required users to develop their own chargeback solutions that polled and aggregated performance counters. These solutions could be expensive to develop and sometimes led to loss of historical data.
To assist with more accurate, streamlined chargebacks while protecting historical information, Hyper-V in Windows Server 2012 Server 8 Beta introduces Resource Metering, a feature that allows customers to create cost-effective, usage-based billing solutions. With this feature, service providers can choose the best billing strategy for their business model, and independent software vendors can develop more reliable, end- to-end chargeback solutions on top of Hyper-V.
Metrics collected for each virtual machine
Average CPU usage, measured in megahertz over a period of time.
Average physical memory usage, measured in megabytes.
Minimum memory usage (lowest amount of physical memory).
Maximum memory usage (highest amount of physical memory).
Maximum amount of disk space allocated to a virtual machine.
Total incoming network traffic, measured in megabytes, for a virtual network adapter.
Total outgoing network traffic, measured in megabytes, for a virtual network adapter
To enable Hyper-V resource metering on hyper-v host HV01 run the following PowerShell commands:
Get-VM -ComputerName HV01 Enable-VMResourceMetering
By default the collection interval for Hyper-v metering data is one hour to change this interval the following
PowerShell command can be used value used in the command below is one minute:
Set-vmhost Ccomputername HV01 CResourceMeteringSaveInterval 00:01:00
To get all VMs metering data run the following PowerShell command:
Get-VM -ComputerName HV01 Measure-VM
To get a particular VM test01 metering data run the following PowerShell command:
Get-VM -ComputerName HV01 -Name test01 Measure-VM

Download Ensurepass Latest 2013 MCSA 70-417 Real Exam Questions , help you to pass exam 100%.