getcertified4sure.com

Ultimate Guide: 70 412 exam




Cause all that matters here is passing the Microsoft 70 412 vce exam. Cause all that you need is a high score of 70 412 pdf Configuring Advanced Windows Server 2012 Services exam. The only one thing you need to do is downloading Ucertify mcsa 70 412 exam study guides now. We will not let you down with our money-back guarantee.

Q11. DRAG DROP 

You have a file server named Server1 that runs Windows Server 2012 R2. The folders on Server1 are configured as shown in the following table. 

A new corporate policy states that backups must use Windows Azure Online Backup whenever possible. 

You need to identify which technology you must use to back up Server1. The solution must use Windows Azure Online Backup whenever possible. 

What should you identify? 

To answer, drag the appropriate backup type to the correct location or locations. Each backup type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q12. You have 30 servers that run Windows Server 2012 R2. 

All of the servers are backed up daily by using Windows Azure Online Backup. 

You need to perform an immediate backup of all the servers to Windows Azure Online 

Backup. 

Which Windows PowerShell cmdlets should you run on each server? 

A. Get-OBPolicy | StartOBBackup 

B. Start-OBRegistration | StartOBBackup 

C. Get-WBPolicy | Start-WBBackup 

D. Get-WBBackupTarget | Start-WBBackup 

Answer:

Explanation: 

This example starts a backup job using a policy. 

Windows PowerShell 

PS C:\> Get-OBPolicy | Start-OBBackup 

Incorrect: 

Not B. Registers the current computer to Windows Azure Backup. 

Not C. Not using Azure 

Not D. Not using Azure 

Reference: Start-OBBackup 

http://technet.microsoft.com/en-us/library/hh770406(v=wps.620).aspx 


Q13. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012. 

Server1 and Server2 have the Hyper-V server role and the Failover Clustering feature installed. 

Server1 and Server2 are members of a cluster named Cluster1. Cluster1 hosts 10 virtual machines. 

When you try to migrate a running virtual machine from one server to another, you receive the following error message: "There was an error checking for virtual machine compatibility on the target node." 

You need to ensure that the virtual machines can be migrated from one node to another. 

From which node should you perform the configuration? 

To answer, select the appropriate node in the answer area. 

Answer: 


Q14. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1 that runs a Server Core Installation of Windows Server 2012 R2. 

File1 has a volume named D that contains home folders. File1 creates a shadow copy of volume D twice a day. 

You discover that volume D is almost full. 

You add a new volume named H to File1. 

You need to ensure that the shadow copies of volume D are stored on volume H. 

Which command should you run? 

A. The Set-Volume cmdlet with the -driveletter parameter 

B. The vssadmin.exe create shadow command 

C. The Set-Volume cmdlet with the -path parameter 

D. The vssadmin.exe add shadowstorage command 

Answer:

Explanation: 

Add ShadowStorage 

Adds a shadow copy storage association for a specified volume. 

Incorrect: 

Not A. Sets or changes the file system label of an existing volume. -DriveLetter Specifies a 

letter used to identify a drive or volume in the system. 

Not B. Create Shadow 

Creates a new shadow copy of a specified volume. 

Not C. Sets or changes the file system label of an existing volume -Path Contains valid 

path information. 

Reference: Vssadmin; Set-Volume 

http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx 

http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx 


Q15. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the 

DHCP Server server role installed. 

DHCP is configured as shown in the exhibit. (Click the Exhibit button.) 

You discover that client computers cannot obtain IPv4 addresses from DC1. 

You need to ensure that the client computers can obtain IPv4 addresses from DC1. 

What should you do? 

A. Activate the scope. 

B. Authorize DC1. 

C. Disable the Allow filters. 

D. Disable the Deny filters. 

Answer:

Explanation: 

You have enabled the Allow list but haven't entered any MAC addresses, thus everyone is denied. Either Disable the Allow filters or start adding MAC addresses to the Allow filter. 

Note: MAC address based filtering allows specific control over which clients have access to DHCP addresses. You can create a list of computers that are allowed to obtain DHCP addresses from the server by adding the client MAC address to the list of allowed client computers. By enabling the allow list, you automatically deny access to the DHCP server addresses to any client computer not on the list. 

Reference: DHCP: If the allow list is enabled, MAC address filtering should be populated https://technet.microsoft.com/en-us/library/ee956897(v=ws.10) 


Q16. Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named Server3 and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in a failover cluster named Cluster2. 

You need to move all of the applications and the services from Cluster1 to Cluster2. 

What should you do first from Failover Cluster Manager? 

A. On a server in Cluster2, configure Cluster-Aware Updating. 

B. On a server in Cluster2, click Move Core Cluster Resources, and then click Best Possible Node. 

C. On a server in Cluster1, click Move Core Cluster Resources, and then click Best Possible Node. 

D. On a server in Cluster1, click Migrate Roles. 

Answer:

Explanation: 

Incorrect: 

Not A. Cluster Aware Updating can greatly simplify the process of applying operating 

system patches to Windows Server 2012 or 2012 R2 failover cluster nodes. 

Not B. Not C. Move Core Cluster Resources is used to resources from one node to another 

within the same cluster. 

Reference: Migrating Clustered Services and Applications to Windows Server 2012, 

Migration Between Two Multi-Node Clusters 

https://technet.microsoft.com/en-us/library/dn486774.aspx#BKMK_Steps_for_migrating 


Q17. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

Both servers have the Hyper-V server role installed. Server1 and Server2 are located in different offices. The offices connect to each other by using a high-latency WAN link. 

Server2 hosts a virtual machine named VM1. 

You need to ensure that you can start VM1 on Server1 if Server2 fails. The solution must minimize hardware costs. 

What should you do? 

A. On Server1, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1. 

B. From the Hyper-V Settings of Server2, modify the Replication Configuration settings. Enable replication for VM1. 

C. On Server2, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1. 

D. From the Hyper-V Settings of Server1, modify the Replication Configuration settings. Enable replication for VM1. 

Answer:

Explanation: 

You first have to enable replication on the Replica server--Server1--by going to the server and modifying the "Replication Configuration" settings under Hyper-V settings. You then go to VM1--which presides on Server2-- and run the "Enable Replication" wizard on VM1. 


Q18. You have a server named Server1 that runs Windows Server 2012 R2. 

Each day, Server1 is backed up fully to an external disk. 

On Server1, the disk that contains the operating system fails. 

You replace the failed disk. 

You need to perform a bare-metal recovery of Server1 by using the Windows Recovery 

Environment (Windows RE). 

What should you use? 

A. The Wbadmin.exe command 

B. The Repair-bde.exe command 

C. The Get-WBBareMetalRecovery cmdlet 

D. The Start-WBVolumeRecovery cmdlet 

Answer:

Explanation: 

Wbadmin enables you to back up and restore your operating system, volumes, files, folders, and applications from a command prompt. 

Wbadmin start sysrecovery runs a recovery of the full system (at least all the volumes that contain the operating system's state). This subcommand is only available if you are using the Windows Recovery Environment. 

* Wbadmin start sysrecovery -backupTarget Specifies the storage location that contains the backup or backups that you want to recover. This parameter is useful when the storage location is different from where backups of this computer 

Incorrect: 

Not B. Accesses encrypted data on a severely damaged hard disk if the drive was 

encrypted by using BitLocker. Repair-bde can reconstruct critical parts of the drive and 

salvage recoverable data as long as a valid recovery password or recovery key is used to 

decrypt the data. 

Not C. Gets the value that indicates whether the ability to perform bare metal recoveries 

from backups has been added to the backup policy (WBPolicy object). 

Not D. Starts a volume recovery operation. 

Reference: Wbadmin start sysrecovery 

http://technet.microsoft.com/en-us/library/cc742118.aspx 


Q19. Your network contains two Active Directory forests named contoso.com and litwareinc.com. A two-way forest trusts exists between the forest. Selective authentication is enabled on 

the trust. 

The contoso.com forest contains a server named Server1. 

You need to ensure that users in litwareinc.com can access resources on Server1. 

What should you do? 

A. Install Active Directory Rights Management Services on a domain controller in contoso.com. 

B. Modify the permission on the Server1 computer account. 

C. Install Active Directory Rights Management Services on a domain controller in litwareinc.com. 

D. Configure SID filtering on the trust. 

Answer:

Explanation: 

Selective authentication between forests If you decide to set selective authentication on an incoming forest trust, you need to manually assign permissions on each computer in the domain as well as the resources to which you want users in the second forest to have access. To do this, set a control access right Allowed to authenticate on the computer object that hosts the resource in Active Directory Users and Computers in the second forest. Then, allow user or group access to the particular resources you want to share. 

Reference: Accessing resources across forests 


Q20. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC2 that runs Windows Server 2012 R2. DC2 has the DHCP Server server role installed. 

DHCP is configured as shown in the exhibit. (Click the Exhibit button.) 

You discover that client computers cannot obtain IPv4 addresses from DC2. 

You need to ensure that the client computers can obtain IPv4 addresses from DC2. 

What should you do? 

A. Disable the Deny filters. 

B. Enable the Allow filters. 

C. Authorize DC2. 

D. Restart the DHCP Server service 

Answer:

Explanation: 

From the exhibit we see a red marker on the IPv4 server icon. The DHCP server is not 

authorized. 

Authorize DHCP Server 

The final step is to authorize the server. 

Right-click your FQDN and select Authorize. 

Refresh the view by right-clicking your FQDN and selecting Refresh. 

You should now see green check mark next to IPv4. 

Example: 

Reference: Server 2012 DHCP Server Role