getcertified4sure.com

[Up to the minute] 70 412 vce




Examcollection 70 412 exam dumps Questions are updated and all 70 412 vce answers are verified by experts. Once you have completely prepared with our 70 412 vce exam prep kits you will be ready for the real 70 412 dumps exam without a problem. We have Leading Microsoft examcollection 70 412 dumps study guide. PASSED mcsa 70 412 First attempt! Here What I Did.

Q121. Your network contains one Active Directory domain. The domain contains two Hyper-V 

hosts named Host1 and Host2 that run Windows Server 2012 R2. 

Host1 contains a virtual machine named VM1. 

You plan to move VM1 to Host2. 

You need to generate a report that lists any configuration issues on Host2 that will prevent 

VM1 from being moved successfully. 

Which cmdlet should you use? 

A. Move-VM 

B. Test-VHD 

C. Debug-VM 

D. Compare-VM 

Answer:

Reference: Technet, Compare-VM https://technet.microsoft.com/en-us/library/hh848612(v=wps.630).aspx 


Q122. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. 

Port rules are configured for all clustered Applications. 

You need to ensure that Server2 handles all client requests to the cluster that are NOT covered by a port rule. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

Host Priorities Each cluster host is assigned a unique host priority in the range of 1 to 32, where lower numbers denote higher priorities. The host with the highest host priority (lowest numeric value) is called the default host. It handles all client traffic for the virtual IP addresses that is not specifically intended to be load-balanced. This ensures that server applications not configured for load balancing only receive client traffic on a single host. If the default host fails, the host with the next highest priority takes over as default host. 

Reference: Network Load Balancing Technical Overview 

http://technet.microsoft.com/en-us/library/bb742455.aspx 


Q123. You have a server named Server1 that runs Windows Server 2012 R2. 

You start Server1 by using Windows RE. 

You need to repair the Boot Configuration Data (BCD) store on Server1. 

Which tool should you use? 

A. Bootim 

B. Bootsect 

C. Bootrec 

D. Bootcfg 

Answer: C


Q124. You have a server named Server1 that runs Windows Server 2012 R2. Server1 is located in the perimeter network and has the DNS Server server role installed. 

Server1 has a zone named contoso.com. 

You App1y a security template to Server1. 

After you App1y the template, users report that they can no longer resolve names from contoso.com. 

On Server1, you open DNS Manager as shown in the DNS exhibit. (Click the Exhibit button.) 

On Server1, you open Windows Firewall with Advanced Security as shown in the Firewall exhibit. (Click the Exhibit button.) 

You need to ensure that users can resolve contoso.com names. 

What should you do? 

A. From Windows Firewall with Advanced Security, disable the DNS (TCP, Incoming) rule and the DNS (UDP, Incoming) rule. 

B. From DNS Manager, modify the Zone Transfers settings of the contoso.com zone. 

C. From DNS Manager, unsign the contoso.com zone. 

D. From DNS Manager, modify the Start of Authority (SOA) of the contoso.com zone. 

E. From Windows Firewall with Advanced Security, modify the profiles of the DNS (TCP, Incoming) rule and the DNS (UDP, Incoming) rule. 

Answer:

Explanation: 

To configure Windows Firewall on a managed DNS server . On the Server Manager menu, click Tools and then click Windows Firewall with Advanced Security. . Right-click Inbound Rules, and then click New Rule. The New Inbound Rule Wizard will launch. . In Rule Type, select Predefined, choose DNS Service from the list, and then click Next. . In Predefined Rules, under Rules, select the checkboxes next to the following 

rules: . Click Next, choose Allow the connection, and then click Finish. . Right-click Inbound Rules, and then click New Rule. The New Inbound Rule 

Wizard will launch. etc. 

Reference: Manually Configure DNS Access Settings 


Q125. HOTSPOT 

Your company has a main office and a branch office. The main office is located in Detroit. The branch office is located in Seattle. 

The network contains an Active Directory domain named adatum.com. Client computers run either Windows 7 Enterprise or Windows 8 Enterprise. 

The main office contains 1,000 client computers and 50 servers. The branch office contains 20 client computers. 

All computer accounts for the branch office are located in an organizational unit (OU) named SeattleComputers. A Group Policy object (GPO) named GPO1 is linked to the SeattleComputers OU. 

You need to configure BranchCache for the branch office. 

Answer: 


Q126. Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as a standalone certification authority (CA). 

You install a second server named Server2. You install the Online Responder role service on Server2. 

You need to ensure that Server1 can issue an Online Certificate Status Protocol (OCSP) Response Signing certificate to Server2. 

What should you run on Server1? 

A. The certreq.exe command and specify the -policy parameter 

B. The certutil.exe command and specify the -getkey parameter 

C. The certutil.exe command and specify the -setreg parameter 

D. The certreq.exe command and specify the -retrieve parameter 

Answer:

Explanation: To prepare a computer running Windows Server to issue OCSP Response Signing certificates 

On the server hosting the CA, open a command prompt, and type: certutil -v -setreg policy\EnableRequestExtensionList +1.3.6.1.5.5.7.48.1.5 Stop and restart the CA. You can do this at a command prompt by running the following commands: net stop certsvc 

net start certsvc 

Reference: Configure a CA to Support OCSP Responders 

https://technet.microsoft.com/en-us/library/cc732526.aspx 


Q127. Your network contains an Active Directory domain named adatum.com. You create a new 

Group Policy object (GPO) named GPO1. 

You need to verify that GPO1 was replicated to all of the domain controllers. 

Which tool should you use? 

A. Gpupdate 

B. Gpresult 

C. Group Policy Management 

D. Active Directory Sites and Services 

Answer:

Explanation: 

In Windows Server 2012, the Group Policy Management Console (GPMC) was enhanced to provide a report for the overall health state of the Group Policy infrastructure for a domain, or to scope the health view to a single GPO. 

Reference: Check Group Policy Infrastructure Status 

http://technet.microsoft.com/en-us/library/jj134176.aspx 


Q128. HOTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. 

Server1 has access to disks that connect to a RAID controller, iSCSI disks, and disks 

connected to a SCSI controller. 

You plan to use a tiered storage space on Server1. 

You need to identify which storage controller and volume type you must use for the tiered 

storage space. 

Which storage components should you use? 

To answer, select the appropriate options in the answer area. 

Answer: 


Q129. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server3 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

DHCP is configured as shown in the exhibit. (Click the Exhibit button.) 

Scope1, Scope2, and Scope3 are configured to assign the IP addresses of two DNS servers to DHCP clients. The remaining scopes are NOT configured to assign IP addresses of DNS servers to DHCP clients. 

You need to ensure that only Scope1, Scope3, and Scopes assign the IP addresses of the DNS servers to the DHCP clients. The solution must minimize administrative effort. 

What should you do? 

A. Create a superscope and a filter. 

B. Create a superscope and scope-level policies. 

C. Configure the Server Options. 

D. Configure the Scope Options. 

Answer:

Explanation: 

Scope options are applied to any clients that obtain a lease within that particular scope. 

Active scope option types always apply to all computers obtaining a lease in a given scope 

unless they are overridden by class or reserved client settings for the option type. 

Incorrect: 

Not A, not B. A superscope allows a DHCP server to provide leases from more than one 

scope to clients on a single physical network. It is not applicable here. 

Not C. If we configure the Server Options and set the DNS Servers then all DHCP clients 

would be assigned a DNS server. 

Reference: Managing DHCP Options 

https://technet.microsoft.com/en-us/library/cc958929.aspx 


Q130. Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers. 

The domain controllers are configured as shown in the following table. 

You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in the child1.contoso.com domain. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Upgrade DC1 to Windows Server 2012 R2. 

B. Upgrade DC11 to Windows Server 2012 R2. 

C. Raise the domain functional level of childl.contoso.com. 

D. Raise the domain functional level of contoso.com. 

E. Raise the forest functional level of contoso.com. 

Answer: A,D 

Explanation: 

The root domain in the forest must be at Windows Server 2012 level. First upgrade DC1 to this level (A), then raise the contoso.com domain functional level to Windows Server 2012 (D). 

* (A) To support resources that use claims-based access control, the principal’s domains will need to be running one of the following: / All Windows Server 2012 domain controllers / Sufficient Windows Server 2012 domain controllers to handle all the Windows 8 device authentication requests / Sufficient Windows Server 2012 domain controllers to handle all the Windows Server 

2012 resource protocol transition requests to support non-Windows 8 devices. Reference: What's New in Kerberos Authentication http://technet.microsoft.com/en-us/library/hh831747.aspx.