70-417 and 70-412

412

Here is a list of my free training from Pluralsight;

 

TO Do List

Skills measured

This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

As of January 2014, this exam includes content covering Windows Server 2012 R2.

Configure and manage high availability (15–20%)
  • Configure Network Load Balancing (NLB)
    • Install NLB nodes, configure NLB prerequisites, configure affinity, configure port rules, configure cluster operation mode, upgrade an NLB cluster
  • Configure failover clustering
    • Configure quorum, configure cluster networking, restore single node or cluster configuration, configure cluster storage, implement Cluster-Aware Updating, upgrade a cluster, configure and optimize clustered shared volumes, configure clusters without network names, configure storage spaces
  • Manage failover clustering roles
    • Configure role-specific settings, including continuously available shares; configure virtual machine (VM) monitoring; configure failover and preference settings; configure guest clustering
  • Manage VM movement
    • Perform live migration; perform quick migration; perform storage migration; import, export, and copy VMs; configure VM network health protection; configure drain on shutdown
Configure file and storage solutions (15–20%)
  • Configure advanced file services
    • Configure Network File System (NFS) data store, configure BranchCache, configure File Classification Infrastructure (FCI) using File Server Resource Manager (FSRM), configure file access auditing
  • Implement Dynamic Access Control (DAC)
    • Configure user and device claim types, implement policy changes and staging, perform access-denied remediation, configure file classification, create and configure Central Access rules and policies, create and configure resource properties and lists
  • Configure and optimize storage
    • Configure iSCSI target and initiator, configure Internet Storage Name server (iSNS), implement thin provisioning and trim, manage server free space using Features on Demand, configure tiered storage
Implement business continuity and disaster recovery (15–20%)
  • Configure and manage backups
    • Configure Windows Server backups, configure Microsoft Azure backups, configure role-specific backups, manage VSS settings using VSSAdmin
  • Recover servers
    • Restore from backups, perform a Bare Metal Restore (BMR), recover servers using Windows Recovery Environment (Win RE) and safe mode, configure the Boot Configuration Data (BCD) store
  • Configure site-level fault tolerance
    • Configure Hyper-V Replica, including Hyper-V Replica Broker and VMs; configure multi-site clustering, including network settings, Quorum, and failover settings; configure Hyper-V Replica extended replication; configure Global Update Manager; recover a multi-site failover cluster
Configure Network Services (15–20%)
  • Implement an advanced Dynamic Host Configuration Protocol (DHCP) solution
    • Create and configure superscopes and multicast scopes; implement DHCPv6; configure high availability for DHCP, including DHCP failover and split scopes; configure DHCP Name Protection; configure DNS registration
  • Implement an advanced DNS solution
    • Configure security for DNS, including Domain Name System Security Extensions (DNSSEC), DNS Socket Pool, and cache locking; configure DNS logging; configure delegated administration; configure recursion; configure netmask ordering; configure a GlobalNames zone; analyze zone level statistics
  • Deploy and manage IP Address Management (IPAM)
    • Provision IPAM manually or by using Group Policy, configure server discovery, create and manage IP blocks and ranges, monitor utilization of IP address space, migrate to IPAM, delegate IPAM administration, manage IPAM collections, configure IPAM database storage
Configure the Active Directory infrastructure (15–20%)
  • Configure a forest or a domain
    • Implement multi-domain and multi-forest Active Directory environments, including interoperability with previous versions of Active Directory; upgrade existing domains and forests, including environment preparation and functional levels; configure multiple user principal name (UPN) suffixes
  • Configure trusts
    • Configure external, forest, shortcut, and realm trusts; configure trust authentication; configure SID filtering; configure name suffix routing
  • Configure sites
    • Configure sites and subnets, create and configure site links, manage site coverage, manage registration of SRV records, move domain controllers between sites
  • Manage Active Directory and SYSVOL replication
    • Configure replication to Read-Only Domain Controllers (RODCs), configure Password Replication Policy (PRP) for RODC, monitor and manage replication, upgrade SYSVOL replication to Distributed File System Replication (DFSR)
Configure Identity and Access Solutions (15–20%)
  • Implement Active Directory Federation Services (AD FS)
    • Install AD FS; implement claims-based authentication, including Relying Party Trusts; configure authentication policies; configure Workplace Join; configure multi-factor authentication
  • Install and configure Active Directory Certificate Services (AD CS)
    • Install an Enterprise Certificate Authority (CA), configure certificate revocation lists (CRL) distribution points, install and configure Online Responder, implement administrative role separation, configure CA backup and recovery
  • Manage certificates
    • Manage certificate templates; implement and manage certificate deployment, validation, and revocation; manage certificate renewal; manage certificate enrollment and renewal to computers and users using Group Policies; configure and manage key archival and recovery
  • Install and configure Active Directory Rights Management Services (AD RMS)
    • Install a licensing or certificate AD RMS server, manage AD RMS Service Connection Point (SCP), manage RMS templates, configure Exclusion Policies, back up and restore AD RMS

417

Exam 70-410

Install and configure servers (25‒30%)
  • Install servers
    • Plan for a server installation, plan for server roles, plan for a server upgrade, install Server Core, optimize resource utilization by using Features on Demand, migrate roles from previous versions of Windows Server
  • Configure servers
    • Configure Server Core, delegate administration, add and remove features in offline images, deploy roles on remote servers, convert Server Core to/from full GUI, configure services, configure NIC teaming, install and configure Windows PowerShell Desired State Configuration (DSC)
  • Configure local storage
    • Design storage spaces, configure basic and dynamic disks, configure Master Boot Record (MBR) and GUID Partition Table (GPT) disks, manage volumes, create and mount virtual hard disks (VHDs), configure storage pools and disk pools, create storage pools by using disk enclosures
Configure server roles and features (20‒25%)
  • Configure servers for remote management
    • Configure WinRM, configure down-level server management, configure servers for day-to-day management tasks, configure multi-server management, configure Server Core, configure Windows Firewall, manage non-domain joined servers
Configure Hyper-V (25‒30%)
  • Create and configure virtual machine (VM) settings
    • Configure dynamic memory, configure smart paging, configure Resource Metering, configure guest integration services, create and configure Generation 1 and 2 VMs, configure and use enhanced session mode, configure RemoteFX
  • Create and configure virtual machine storage
    • Create VHDs and VHDX, configure differencing drives, modify VHDs, configure pass-through disks, manage checkpoints, implement a virtual Fibre Channel adapter, configure storage Quality of Service
  • Create and configure virtual networks
    • Configure Hyper-V virtual switches, optimize network performance, configure MAC addresses, configure network isolation, configure synthetic and legacy virtual network adapters, configure NIC teaming in VMs
Install and administer Active Directory (25‒30%)
  • Install domain controllers
    • Add or remove a domain controller from a domain, upgrade a domain controller, install Active Directory Domain Services (AD DS) on a Server Core installation, install a domain controller from install from media (IFM), resolve Domain Name System (DNS) SRV record registration issues, configure a global catalog server, deploy Active Directory infrastructure as a service (IaaS) in Microsoft Azure

Exam 70-411

Deploy, manage, and maintain servers (20‒25%)
  • Monitor servers
    • Configure Data Collector Sets (DCS), configure alerts, monitor real-time performance, monitor VMs, monitor events, configure event subscriptions, configure network monitoring, schedule performance monitoring
Configure network services and access (20‒25%)
  • Configure DirectAccess
    • Implement server requirements, implement client configuration, configure DNS for DirectAccess, configure certificates for DirectAccess
Configure a network policy server infrastructure (15‒20%)
  • Configure Network Access Protection (NAP)
    • Configure System Health Validators (SHVs), configure health policies, configure NAP enforcement using Dynamic Host Configuration Protocol (DHCP) and VPN, configure isolation and remediation of non-compliant computers using DHCP and VPN, configure NAP client settings
Configure and manage Active Directory (20‒25%)
  • Configure domain controllers
    • Transfer and seize operations master roles, install and configure a read-only domain controller (RODC), configure domain controller cloning
  • Maintain Active Directory
    • Back up Active Directory and SYSVOL, manage Active Directory offline, optimize an Active Directory database, clean up metadata, configure Active Directory snapshots, perform object- and container-level recovery, perform Active Directory restore, configure and restore objects by using the Active Directory Recycle Bin
Configure and manage Group Policy (20‒25%)
  • Configure Group Policy processing
    • Configure processing order and precedence, configure blocking of inheritance, configure enforced policies, configure security filtering and WMI filtering, configure loopback processing, configure and manage slow-link processing and Group Policy caching, configure client-side extension (CSE) behavior, force Group Policy Update

ToDo

Cluster CSV

DISK2VHD

NETSH

DAC

VSSADMIN

 

 

Leave a Reply