getcertified4sure.com

Top Tips Of 70-412 item pool




2021 Apr 70-412 test

Q101. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two Active Directory sites named Site1 and Site2. 

You discover that when the account of a user in Site1 is locked out, the user can still log on to the servers in Site2 for up to 15 minutes by using Remote Desktop Services (RDS). 

You need to reduce the amount of time it takes to synchronize account lockout information across the domain. 

Which attribute should you modify? 

To answer, select the appropriate attribute in the answer area. 

Answer: 


Q102. You configure the nodes to use the port rule shown in the exhibit. (Click the Exhibit button.) 

You need to configure the NLB cluster to meet the following requirements: 

. HTTPS connections must be directed to Server1 if Serverl is available. . HTTP connections must be load balanced between the two nodes. 

Which three actions should you perform? {Each correct answer presents part of the solution. Choose three. 

A. From the host properties of Server2, set the Handling priority of the existing port rule to 2. 

B. Create a port rule for TCP port 80. Set the Filtering mode to Multiple host and set the Affinity to None. 

C. Create an additional port rule for TCP port 443. Set the Filtering mode to Multiple host and set the Affinity to Single. 

D. From the host properties of Server1, set the Handling priority of the existing port rule to 2. 

E. From the host properties of Server2, set the Priority (Unique host ID) value to 1. 

F. From the host properties of Server1, set the Handling priority of the existing port rule to 1. 

Answer: A,B,F 

Explanation: 

Multiple hosts. This parameter specifies that multiple hosts in the cluster handle network traffic for the associated port rule. This filtering mode provides scaled performance in addition to fault tolerance by distributing the network load among multiple hosts. You can specify that the load be equally distributed among the hosts or that each host handle a specified load weight. 

Note: Handling priority: When Single host filtering mode is being used, this parameter specifies the local host's priority for handling the networking traffic for the associated port rule. The host with the highest handling priority (lowest numerical value) for this rule among the current members of the cluster will handle all of the traffic for this rule. The allowed values range from 1, the highest priority, to the maximum number of hosts allowed (32). This value must be unique for all hosts in the cluster. 

Reference: Network Load Balancing parameters. 


Q103. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

Both servers have the Hyper-V server role installed. Server1 and Server2 are located in different offices. The offices connect to each other by using a high-latency WAN link. 

Server2 hosts a virtual machine named VM1. 

You need to ensure that you can start VM1 on Server1 if Server2 fails. The solution must minimize hardware costs. 

What should you do? 

A. On Server1, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1. 

B. From the Hyper-V Settings of Server2, modify the Replication Configuration settings. Enable replication for VM1. 

C. On Server2, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1. 

D. From the Hyper-V Settings of Server1, modify the Replication Configuration settings. Enable replication for VM1. 

Answer:

Explanation: 

You first have to enable replication on the Replica server--Server1--by going to the server and modifying the "Replication Configuration" settings under Hyper-V settings. You then go to VM1--which presides on Server2-- and run the "Enable Replication" wizard on VM1. 


Q104. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1. Server1 

has the IP Address Management (IPAM) Server feature installed. 

On Dc1, you configure Windows Firewall to allow all of the necessary inbound ports for 

IPAM. 

On Server1, you open Server Manager as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can use IPAM on Server1 to manage DNS on DC1. 

What should you do? 

A. Modify the outbound firewall rules on Server1. 

B. Modify the inbound firewall rules on Server1. 

C. Add Server1 to the Remote Management Users group. 

D. Add Server1 to the Event Log Readers group. 

Answer:

Explanation: 

To access configuration data and server event logs, the IPAM server must be a member of the domain IPAM Users Group (IPAMUG). The IPAM server must also be a member of the Event Log Readers security group. 

Note: The computer account of the IPAM server must be a member of the Event Log Readers security group. 

Reference: Manually Configure DC and NPS Access Settings. http://technet.microsoft.com/en-us/library/jj878317.aspx http://technet.microsoft.com/en-us/library/jj878313.aspx


Q105. You have 20 servers that run Windows Server 2012 R2. 

You need to create a Windows PowerShell script that registers each server in Windows Azure Backup and sets an encryption passphrase. 

Which two PowerShell cmdlets should you run in the script? (Each correct answer presents part of the solution. Choose two.) 

A. New-OBPolicy 

B. New-OBRetentionPolicy 

C. Add-OBFileSpec 

D. Start-OBRegistration 

E. Set OBMachineSetting 

Answer: D,E 

Explanation: 

D. Start-OBRegistration Registers the current computer with Windows Azure Online Backup using the credentials (username and password) created during enrollment. 

E. The Set-OBMachineSetting cmdlet sets a OBMachineSetting object for the server that includes proxy server settings for accessing the internet, network bandwidth throttling settings, and the encryption passphrase that is required to decrypt the files during recovery to another server. 

Incorrect: 

Not C. TheAdd-OBFileSpeccmdlet adds theOBFileSpecobject, which specifies the items to 

include or exclude from a backup, to the backup policy (OBPolicyobject). 

TheOBFileSpecobject can include or exclude multiple files, folders, or volumes. T Reference: Start-OBRegistration; Set OBMachineSetting http://technet.microsoft.com/en-us/library/hh770398.aspx http://technet.microsoft.com/en-us/library/hh770409.aspx 


Q106. DRAG DROP 

You have two failover clusters named Cluster1 and Cluster2. All of the nodes in both of the 

clusters run Windows Server 2012 R2. 

Cluster1 hosts two virtual machines named VM1 and VM2. 

You plan to configure VM1 and VM2 as nodes in a new failover cluster named Cluster3. 

You need to configure the witness disk for Cluster3 to be hosted on Cluster2. 

Which three actions should you perform in sequence? 

To answer, move the appropriate three actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer: 


Q107. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. 

Port rules are configured for all clustered Applications. 

You need to ensure that Server2 handles all client requests to the cluster that are NOT covered by a port rule. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

Host Priorities Each cluster host is assigned a unique host priority in the range of 1 to 32, where lower numbers denote higher priorities. The host with the highest host priority (lowest numeric value) is called the default host. It handles all client traffic for the virtual IP addresses that is not specifically intended to be load-balanced. This ensures that server applications not configured for load balancing only receive client traffic on a single host. If the default host fails, the host with the next highest priority takes over as default host. 

Reference: Network Load Balancing Technical Overview 

http://technet.microsoft.com/en-us/library/bb742455.aspx 


Q108. Your network contains an Active Directory forest named contoso.com. The forest contains 

a single domain. The forest functional level is Windows Server 2012 R2. 

You have a domain controller named DC1. 

On DC1, you create a new Group Policy object (GPO) named GPO1. You need to verify that GPO1 was replicated to all of the domain controllers. 

Which tool should you use? 

A. Group Policy Management 

B. Active Directory Sites and Services 

C. DFS Management 

D. Active Directory Administrative Center 

Answer:

Explanation: 

In Windows Server 2012, the Group Policy Management Console (GPMC) was enhanced to provide a report for the overall health state of the Group Policy infrastructure for a domain, or to scope the health view to a single GPO. 

Reference: Check Group Policy Infrastructure Status 

http://technet.microsoft.com/en-us/library/jj134176.aspx 


Q109. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains the two servers. 

The servers are configured as shown in the following table. 

You investigate a report about the potential compromise of a private key for a certificate issued to Server2. 

You need to revoke the certificate issued to Server2. The solution must ensure that the revocation can be reverted. 

Which reason code should you select? 

To answer, select the appropriate reason code in the answer area. 

Answer: 


Q110. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 has the IP Address Management (IPAM) Server feature installed. 

A technician performs maintenance on Server1. 

After the maintenance is complete, you discover that you cannot connect to the IPAM server on Server1. 

You open the Services console as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can connect to the IPAM server. 

Which service should you start? 

A. Windows Process Activation Service 

B. Windows Event Collector 

C. Windows Internal Database 

D. Windows Store Service (WSService) 

Answer:

Explanation: 

Explanation Windows Internal Database 

Windows Internal Database is a relational data store that can be used only by Windows 

roles and features. 

IPAM does not support external databases. Only a Windows Internal Database is 

supported. 

IPAM stores 3 years of forensics data (IP address leases, host MAC addresses, user 

login/logoff information) for 100,000 users in a Windows Internal Database. There is no 

database purge policy provided, and the administrator must purge data manually as 

needed. 

Incorrect: 

Not A. IPAM works even if the Windows Process Activation Service is not running. 

Not B. IPAM does not require the Windows Event Collector Service. It need to be running 

on the managed DC/DNS/DHCP computers. 

Not D. IPAM does not require the Windows Store Service. It provides infrastructure support 

for Windows Store.This service is started on demand and if disabled applications bought 

using Windows Store will not behave correctly. 

Reference: IPAM Deployment Planning