getcertified4sure.com

Tactics to 70 412 vce




Best Quality of 70 412 vce free draindumps materials and forum for Microsoft certification for IT specialist, Real Success Guaranteed with Updated microsoft 70 412 pdf dumps vce Materials. 100% PASS Configuring Advanced Windows Server 2012 Services exam Today!

Q31. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the IP Address Management (IPAM) Server feature installed. 

You have a support technician named Tech1. Tech1 is a member of the IPAM Administrators group on Server1 and Server2. You need to ensure that Tech1 can use Server Manager on Server1 to manage IPAM on Server2. To which group on Server2 should you add Tech1? To answer, select the appropriate group in the answer area. 

Answer: 


Q32. Your network contains an Active Directory domain named adatum.com. The domain contains two domain controllers that run Windows Server 2012 R2. The domain controllers are configured as shown in the following table. 

You log on to DC1 by using a user account that is a member of the Domain Admins group, and then you create a new user account named User1. 

You need to prepopulate the password for User1 on DC2. 

What should you do first? 

A. Connect to DC2 from Active Directory Users and Computers. 

B. Add DC2 to the Allowed RODC Password Replication Policy group. 

C. Add the User1 account to the Allowed RODC Password Replication Policy group. 

D. Run Active Directory Users and Computers as a member of the Enterprise Admins group. 

Answer:

Explanation: 

To prepopulate the password cache for an RODC by using Active Directory Users and Computers (see step 1 below). 

Administrative credentials: To prepopulate the password cache for an RODC, you must be a member of the Domain Admins group. 

Click Start, click Administrative Tools, and then click Active Directory Users and 

Computers. 

Ensure that Active Directory Users and Computers points to the writable domain 

controller that is running Windows Server 2008, and then click Domain Controllers. 

In the details pane, right-click the RODC computer account, and then click 

Properties. 

Click the Password Replication Policy tab. 

Click Advanced. 

Click Prepopulate Passwords. 

Type the name of the accounts whose passwords you want to prepopulate in the 

cache for the RODC, and then click OK. 

When you are asked if you want to send the passwords for the accounts to the 

RODC, click Yes. 

Note: You can prepopulate the password cache for an RODC with the passwords of user and computer accounts that you plan to authenticate to it. When you prepopulate the RODC password cache, you trigger the RODC to replicate and cache the passwords for users and computers before the accounts try to log on in the branch office. 

Incorrect: Not C. You don't need to add User1 to the Allowed RODC Password Replication Policy group. As a first step you should run Active.Directory Users and Computers as a member of the Domain/Enterprise Admins group.-

Reference: Password Replication Policy Administration 

http://technet.microsoft.com/en-us/library/cc753470(v=ws.10).aspx#BKMK_pre 


Q33. HOTSPOT 

Your network contains an Active Directory forest named contoso.com that contains a single 

domain. The forest contains three sites named Site1, Site2, and Site3. 

Domain controllers run either Windows Server 2008 R2 or Windows Server 2012 R2. 

Each site contains two domain controllers. Site1 and Site2 contain a global catalog server. 

You need to create a new site link between Site1 and Site2. The solution must ensure that 

the site link supports the replication of all the naming contexts. 

From which node should you create the site link? 

To answer, select the appropriate node in the answer area. 

Answer: 


Q34. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the 

DHCP Server server role installed. 

DHCP is configured as shown in the exhibit. (Click the Exhibit button.) 

You discover that client computers cannot obtain IPv4 addresses from DC1. 

You need to ensure that the client computers can obtain IPv4 addresses from DC1. 

What should you do? 

A. Activate the scope. 

B. Authorize DC1. 

C. Disable the Allow filters. 

D. Disable the Deny filters. 

Answer:

Explanation: 

You have enabled the Allow list but haven't entered any MAC addresses, thus everyone is denied. Either Disable the Allow filters or start adding MAC addresses to the Allow filter. 

Note: MAC address based filtering allows specific control over which clients have access to DHCP addresses. You can create a list of computers that are allowed to obtain DHCP addresses from the server by adding the client MAC address to the list of allowed client computers. By enabling the allow list, you automatically deny access to the DHCP server addresses to any client computer not on the list. 

Reference: DHCP: If the allow list is enabled, MAC address filtering should be populated https://technet.microsoft.com/en-us/library/ee956897(v=ws.10) 


Q35. HOTSPOT 

Your network contains three application servers that run Windows Server 2012 R2. The application servers have the Network Load Balancing (NLB) feature installed. 

You create an NLB cluster that contains the three servers. 

You plan to deploy an application named App1 to the nodes in the cluster. App1 uses TCP port 8080 and TCP port 8081. 

Clients will connect to App1 by using HTTP and HTTPS. When clients connect to App1 by using HTTPS, session state information will be retained locally by the cluster node that responds to the client request. 

You need to configure a port rule for Appl. 

Which port rule should you use? 

To answer, select the appropriate rule in the answer area. 

Answer: 


Q36. Your network contains an Active Directory forest named contoso.com. The forest contains four domains. All servers run Windows Server 2012 R2. 

Each domain has a user named User1. 

You have a file server named Server1 that is used to synchronize user folders by using the Work Folders role service. 

Server1 has a work folder named Sync1. 

You need to ensure that each user has a separate folder in Sync1. 

What should you do? 

A. From Windows Explorer, modify the Sharing properties of Sync1. 

B. Run the Set-SyncServerSetting cmdlet. 

C. From File and Storage Services in Server Manager, modify the properties of Sync1. 

D. Run the Set-SyncShare cmdlet. 

Answer:

Explanation: 

The Set-SyncShare cmdlet modifies the settings for a sync share. 

Example: Modify a sync share to add a user group 

This example modifies settings on the share named Share01, and enables the user group 

named ContosoEngGroup to access the share. 

The first command uses the Get-SyncShare cmdlet to retrieve the sync share for Share01, 

and assigns the results to the variable $Current. 

The second command uses the Set-SyncShare cmdlet to modify the sync share and add 

the current user and the ContosoEngGroup to the list of users allowed to access the share. 

PS C:\> $Current = Get-SyncShare Share01 

PS C:\> Set-SyncShare Share01 -User $Current.user,"ContosoEngGroup" 

PS C:\> Get-SyncShare Share01 // See %username below% !! 

ConflictResolutionPolicy : KeepLatest 

Description : 

DevicePolicy : Share01 

Enabled : True ExclusiveAccessToUser : False Name : Share01 Path : K:\Share01 StagingFolder : K:\EcsStagingArea\Share01 StagingQuota : 1099511627776 StagingQuotaPerUser : 10737418240 Type : User Data User : {HRGroup, EngGroup} UserFolderName : %username% // <-- This line!! PSComputerName 

Reference: Set-SyncShare 

http://technet.microsoft.com/en-US/library/dn296649.aspx 


Q37. You have a server named Server1 that runs Windows Server 2012 R2. The storage on Server1 is configured as shown in the following table. 

You plan to implement Data Deduplication on Server1. 

You need to identify on which drives you can enable Data Deduplication. 

Which three drives should you identify? (Each correct answer presents part of the solution. Choose three.) 

A. C 

B. D 

C. E 

D. F 

E. G 

Answer: B,D,E 

Explanation: 

Volumes that are candidates for deduplication must conform to the following requirements: 

* Must not be a system or boot volume. (not A) 

* Can be partitioned as a master boot record (MBR) or a GUID Partition Table (GPT), and must be formatted using the NTFS file system. (not C) 

* Can reside on shared storage, such as storage that uses a Fibre Channel or an SAS array, or when an iSCSI SAN and Windows Failover Clustering is fully supported. 

* Do not rely on Cluster Shared Volumes (CSVs). You can access data if a deduplication-enabled volume is converted to a CSV, but you cannot continue to process files for deduplication. 

* Do not rely on the Microsoft Resilient File System (ReFS). 

* Must be exposed to the operating system as non-removable drives. Remotely-mapped drives are not supported. 

Ref: Plan to Deploy Data Deduplication http://technet.microsoft.com/en-us/library/hh831700.aspx 


Q38. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed. Server1 and Server2 are configured as Hyper-V replicas of each other. 

Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1. 

You need to verify whether the replica of VM5 on Server1 is functional. The solution must ensure that VM5 remains accessible to clients. 

What should you do from Hyper-V Manager? 

A. On Server1, execute a Planned Failover. 

B. On Server1, execute a Test Failover. 

C. On Server2, execute a Planned Failover. 

D. On Server2, execute a Test Failover. 

Answer:

Explanation: 

Test Failover (TFO) is an operation initiated on your replica virtual machine (in this scenario on Server1) which allows you to test the sanity of the virtualized workload without interrupting your production workload or ongoing replication. 

TFO is performed on the replica virtual machine by right-clicking on the VM and choosing the Test Failover operation (either from the Hyper-V Manager or from the Failover Clustering Manager). 

Reference: Types of failover operations in Hyper-V Replica – Part I – Test Failover. 


Q39. Your network contains three servers named HV1, HV2, and Server1 that run Windows Server 2012 R2. HV1 and HV2 have the Hyper-V server role installed. Server1 is a file server that contains 3 TB of free disk space. 

HV1 hosts a virtual machine named VM1. The virtual machine configuration file for VM1 is stored in D:\VM and the virtual hard disk file is stored in E:\VHD. 

You plan to replace drive E with a larger volume. 

You need to ensure that VM1 remains available from HV1 while drive E is being replaced. You want to achieve this goal by using the minimum amount of administrative effort. 

What should you do? 

A. Perform a live migration to HV2. 

B. Add HV1 and HV2 as nodes in a failover cluster. Perform a storage migration to HV2. 

C. Add HV1 and HV2 as nodes in a failover cluster. Perform a live migration to HV2. 

D. Perform a storage migration to Server1. 

Answer:

Explanation: 

One of the great new features coming in Windows Server 2012 is Storage Migration for Hyper-V. Storage Migration allows an administrator to relocate the source files that make up a virtual machine to another location without any downtime. 

Storage Migration creates a copy of the file or files at the new location. Once that is finished, Server 2012 does a final replication of changes and then the virtual machine uses the files in the new location. 

Reference: Windows Server 2012 Hyper-V – Part 3: Storage Migration 


Q40. You have a server named Server1 that runs Windows Server 2012 R2. 

Windows Server 2012 R2 is installed on volume C. 

You need to ensure that Safe Mode with Networking loads the next time Server1 restarts. 

Which tool should you use? 

A. The Msconfig command 

B. The Bootcfg command 

C. The Restart-Computer cmdlet 

D. The Restart-Server cmdlet 

Answer:

Explanation: 

Use system config (Msconfig) to configure boot options. 

Reference: System Configuration – aka MSCONFIG.