getcertified4sure.com

A Complete Guide to 70 412 dumps




Want to know Actualtests examcollection 70 412 Exam practice test features? Want to lear more about Microsoft Configuring Advanced Windows Server 2012 Services certification experience? Study Simulation Microsoft examcollection 70 412 answers to Improve exam 70 412 questions at Actualtests. Gat a success with an absolute guarantee to pass Microsoft microsoft 70 412 (Configuring Advanced Windows Server 2012 Services) test on your first attempt.

Q1. You have a server named Server1 that runs Windows Server 2012 R2. 

Server1 is backed up by using Windows Server Backup. The backup configuration is shown in the exhibit. (Click the Exhibit button.) 

You discover that only the last copy of the backup is maintained. You need to ensure that multiple backup copies are maintained. What should you do? 

A. Modify the backup destination. 

B. Configure the Optimize Backup Performance settings. 

C. Modify the Volume Shadow Copy Service (VSS) settings. 

D. Modify the backup times. 

Answer:

Explanation: 

The destination in the exhibit shows a network share is used. If a network share is being used only the latest copy will be saved 

Reference: Where should I save my backup? http://windows.microsoft.com/en-us/windows7/where-should-i-save-my-backup 


Q2. HOTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. 

You are configuring a storage space on Server1. 

You need to ensure that the storage space supports tiered storage. 

Which settings should you configure? 

To answer, select the appropriate options in the answer area. 

Answer: 


Q3. Your network contains one Active Directory forest named contoso.com. The forest contains two child domains and six domain controllers. The domain controllers are configured as shown in the following table. 

You need to prevent administrators from accidentally deleting any of the sites in the forest. What should you use? 

A. Set-ADSite 

B. Set-ADReplicationSite 

C. Set-ADDomain 

D. Set-ADReplicationSiteLink 

E. Set-ADGroup 

F. Set-ADForest 

G. Netdom 

Answer:

Explanation: The Set-ADReplicationSite sets the replication properties for an Active 

Directory site. 

Parameter: -ProtectedFromAccidentalDeletion<Boolean> 

Specifies whether to prevent the object from being deleted. When this property is set to 

$True, you cannot delete the corresponding object without changing the value of the 

property. The acceptable values for this parameter are: 

-- $False or 0 

-- $True or 1 

Reference: Technet, Set-ADReplicationSite 

https://technet.microsoft.com/en-us/library/hh852305(v=wps.630).aspx 


Q4. Your network contains two Active Directory forests named contoso.com and adatum.com. All of the domain controllers in both of the forests run Windows Server 2012 R2. The adatum.com domain contains a file server named Servers. 

Adatum.com has a one-way forest trust to contoso.com. 

A contoso.com user name User10 attempts to access a shared folder on Servers and receives the error message shown in the exhibit. (Click the Exhibit button.) 

You verify that the Authenticated Users group has Read permissions to the Data folder. 

You need to ensure that User10 can read the contents of the Data folder on Server5 in the 

adatum.com domain. 

What should you do? 

A. Grant the Other Organization group Read permissions to the Data folder. 

B. Modify the list of logon workstations of the contoso\User10 user account. 

C. Enable the Netlogon Service (NP-In) firewall rule on Server5. 

D. Modify the permissions on the Server5 computer object in Active Directory. 

Answer:

Explanation: 

* To resolve the issue, I had to open up AD Users and Computers --> enable Advanced Features --> Select the Computer Object --> Properties --> Security --> Add the Group I want to allow access to the computer (in this case, DomainA\Domain users) and allow "Allowed to Authenticate". Once I did that, everything worked: 

* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest. 

Reference: Grant the Allowed to Authenticate Permission on Computers in the Trusting Domain or Forest. 

http://technet.microsoft.com/en-us/library/cc816733(v=ws.10).aspx 


Q5. You have a failover cluster named Cluster1 that contains four nodes. All of the nodes run Windows Server 2012 R2. 

You need to force every node in Cluster1 to contact immediately the Windows Server Update Services (WSUS) server on your network for updates. 

Which tool should you use? 

A. The Add-CauClusterRole cmdlet 

B. The Wuauclt command 

C. The Wusa command 

D. The Invoke-CauScan cmdlet 

Answer:

Explanation: 

The Add-CauClusterRole cmdlet adds the Cluster-Aware Updating (CAU) clustered role 

that provides the self-updating functionality to the specified cluster. When the CAU 

clustered role has been added to a cluster, the failover cluster can update itself on the 

schedule that is specified by the user, without requiring an external computer to coordinate 

the cluster updating process. 

Incorrect: 

Not B. The wuauclt utility allows you some control over the functioning of the Windows 

Update Agent. It is updated as part of Windows Update. 

The following are the command line for wuauclt. 

OptionDescription 

/a /ResetAuthorization 

Initiates an asynchronous background search for applicable updates. If Automatic Updates 

is disabled, this option has no effect. 

/r /ReportNow 

Sends all queued reporting events to the server asynchronously. 

/? /h /help 

Shows this help information. 

Not D. 

The Invoke-CauScan cmdlet performs a scan of cluster nodes for applicable updates and 

returns a list of the initial set of updates that would be applied to each node in a specified 

cluster. 

Note: The Invoke-CauRun cmdlet performs a scan of cluster nodes for applicable updates 

and installs those updates via an Updating Run on the specified cluster. 

Reference: Add-CauClusterRole 

http://technet.microsoft.com/en-us/library/hh847235(v=wps.620).aspx 


Q6. Your network contains two Active Directory forests named contoso.com and adatum.com. 

Contoso.com contains one domain. Adatum.com contains a child domain named child.adatum.com. 

Contoso.com has a one-way forest trust to adatum.com. Selective authentication is enabled on the forest trust. 

Several user accounts are migrated from child.adatum.com to adatum.com. 

Users report that after the migration, they fail to access resources in contoso.com. The users successfully accessed the resources in contoso.com before the accounts were migrated. 

You need to ensure that the migrated users can access the resources in contoso.com. 

What should you do? 

A. Replace the existing forest trust with an external trust. 

B. Run netdom and specify the /quarantine attribute. 

C. Disable SID filtering on the existing forest trust. 

D. Disable selective authentication on the existing forest trust. 

Answer:

Explanation: 

Security Considerations for Trusts Need to gain access to the resources in contoso.com 

Disabling SID Filter Quarantining on External Trusts Although it reduces the security of your forest (and is therefore not recommended), you can disable SID filter quarantining for an external trust by using the Netdom.exe tool. You should consider disabling SID filter quarantining only in the following situations: 

* Users have been migrated to the trusted domain with their SID histories preserved, and 

you want to grant them access to resources in the trusting domain based on the SID history 

attribute. 

Etc. 

Incorrect: 

Not B. Enables administrators to manage Active Directory domains and trust relationships 

from the command prompt, /quarantine Sets or clears the domain quarantine. 

Not D. Selective authentication over a forest trust restricts access to only those users in a 

trusted forest who have been explicitly given authentication permissions to computer 

objects (resource computers) that reside in the trusting forest. 

Reference: Security Considerations for Trusts 

http://technet.microsoft.com/en-us/library/cc755321(v=ws.10).aspx 


Q7. Your company recently deployed a new Active Directory forest named contoso.com. The forest contains two Active Directory sites named Site1 and Site2. The first domain controller in the forest runs Windows Server 2012 R2. 

You need to force the replication of the SYSVOL folder from Site1 to Site2. 

Which tool should you use? 

A. Active Directory Sites and Services 

B. DFS Management 

C. Repadmin 

D. Dfsrdiag 

Answer:

Explanation: 

In Windows Server 2012 R2, Windows Server 2008 R2, or Windows Server 2008, you can force replication immediately by using DFS Management, as described in Edit Replication Schedules. You can also force replication by using the Dfsrdiag SyncNow command. You can force polling by using the Dfsrdiag PollAD command. 

Reference: DFS Replication: Frequently Asked Questions (FAQ) 

http://technet.microsoft.com/en-us/library/cc773238(v=ws.10).aspx#BKMK_072 


Q8. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. 

Server1 is the enterprise root certification authority (CA) for contoso.com. 

You need to enable CA role separation on Server1. 

Which tool should you use? 

A. The Certutil command 

B. The Authorization Manager console 

C. The Certsrv command 

D. The Certificates snap-in 

Answer:

Explanation: 

To enable role separation 

. Open Command Prompt. 

. Type: certutil -setreg ca\RoleSeparationEnabled 1 Etc. 

Reference: Enable role separation 


Q9. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Hyper-V server role installed. The servers are configured as shown in the following table. 

You add a third server named Server3 to the network. Server3 has Intel processors. 

You need to move VM3 and VM6 to Server3. The solution must minimize downtime on the 

virtual machines. 

Which method should you use to move each virtual machine? 

To answer, select the appropriate method for each virtual machine in the answer area. 

Answer: 


Q10. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

Cluster1 hosts an Application named App1. 

You need to ensure that Server2 handles all of the client requests to the cluster for App1. The solution must ensure that if Server2 fails, Server1 becomes the active node for App1. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. the Scale-Out File Server 

Answer:

Explanation: 

The preferred owner in a two-server cluster will always be the active node unless it is down. 

Reference: Preferred Owners in a Cluster 

http://blogs.msdn.com/b/clustering/archive/2008/10/14/9000092.aspx