getcertified4sure.com

How to win with 70 412 study guide




It is more faster and easier to pass the Microsoft 70-412 exam by using Tested Microsoft Configuring Advanced Windows Server 2012 Services questuins and answers. Immediate access to the Refresh 70-412 Exam and find the same core area 70-412 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Jul cbt nuggets 70-412 download:

Q111. Your company has a main office and a branch office. 

The main office contains a file server named Server1. Server1 has the BranchCache for 

Network Files role service installed. The branch office contains a server named Server2. 

Server2 is configured as a BranchCache hosted cache server. 

You need to preload the data from the file shares on Server1 to the cache on Server2. 

What should you run first? 

A. Publish-BCFileContent 

B. Add- BCDataCacheExtension 

C. Set-BCCache 

D. Export-BCCachePackage 

Answer: A 

Explanation: 

See step 2 below. 

To prehash content and preload the content on hosted cache servers . Log on to the file or Web server that contains the data that you wish to preload, and identify the folders and files that you wish to load on one or more remote hosted cache servers. . Run Windows PowerShell as an Administrator. For each folder and file, run either the Publish-BCFileContent command or the Publish-BCWebContent command, depending on the type of content server, to trigger hash generation and to add data to a data package. . After all the data has been added to the data package, export it by using the Export-BCCachePackage command to produce a data package file. . Move the data package file to the remote hosted cache servers by using your choice of file transfer technology. FTP, SMB, HTTP, DVD and portable hard disks are all viable transports. . Import the data package file on the remote hosted cache servers by using the Import-BCCachePackage command. 

Reference: Prehashing and Preloading Content on Hosted Cache Servers (Optional) 


Q112. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the 

DHCP Server server role installed. 

DHCP is configured as shown in the exhibit. (Click the Exhibit button.) 


You discover that client computers cannot obtain IPv4 addresses from DC1. 

You need to ensure that the client computers can obtain IPv4 addresses from DC1. 

What should you do? 

A. Activate the scope. 

B. Authorize DC1. 

C. Disable the Allow filters. 

D. Disable the Deny filters. 

Answer: C 

Explanation: 

You have enabled the Allow list but haven't entered any MAC addresses, thus everyone is denied. Either Disable the Allow filters or start adding MAC addresses to the Allow filter. 

Note: MAC address based filtering allows specific control over which clients have access to DHCP addresses. You can create a list of computers that are allowed to obtain DHCP addresses from the server by adding the client MAC address to the list of allowed client computers. By enabling the allow list, you automatically deny access to the DHCP server addresses to any client computer not on the list. 

Reference: DHCP: If the allow list is enabled, MAC address filtering should be populated https://technet.microsoft.com/en-us/library/ee956897(v=ws.10) 


Q113. Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2. 

Server1 and Seiver2 are nodes in a Network Load Balancing (NLB) cluster. The NIB cluster contains an application named App1 that is accessed by using the URL http://app1.contoso.com. 

You plan to perform maintenance on Server1. 

You need to ensure that all new connections to App1 are directed to Server2. The solution must not disconnect the existing connections to Server1. 

What should you run? 

A. The Stop-NlbCluster cmdlet 

B. The nlb.exe stop command 

C. The Suspend-NlbCluster cmdlet 

D. The nlb.exe suspend command 

Answer: A 

Explanation: 

The Stop-NlbClusterNode cmdlet stops a node in an NLB cluster. When you use the stop the nodes in the cluster, client connections that are already in progress are interrupted. To avoid interrupting active connections, consider using the -drain parameter, which allows the node to continue servicing active connections but disables all new traffic to that node. 


Q114. You have a server named Server1 that runs Windows Server 2012 R2. 

Each day, Server1 is backed up fully to an external disk. 

On Server1, the disk that contains the operating system fails. 

You replace the failed disk. 

You need to perform a bare-metal recovery of Server1 by using the Windows Recovery 

Environment (Windows RE). 

What should you do? 

A. Run the Start-WBVolumeRecovery cmdlet and specify the -backupset parameter. 

B. Run the Get-WBBareMetalRecovery cmdlet and specify the -policy parameter. 

C. Run the wbadmin.exe start recovery command and specify the -recoverytarget parameter. 

D. Run the wbadmin.exe start sysrecovery command and specify the -backuptarget parameter. 

Answer: D 

Explanation: 

Performs a system recovery (bare metal recovery). This subcommand can be run only from the Windows Recovery Environment. 

* -backupTarget Specifies the storage location that contains the backup or backups that you want to recover. This parameter is useful when the storage location is different from where backups of this computer are usually stored. 

Reference: Wbadmin start sysrecovery 

http://technet.microsoft.com/en-us/library/cc742118.aspx 


Q115. You have a server named Server1 that runs Windows Server 2012 R2 and is used for testing. 

A developer at your company creates and installs an unsigned kernel-mode driver on Server1. The developer reports that Server1 will no longer start. 

You need to ensure that the developer can test the new driver. The solution must minimize the amount of data loss. 

Which Advanced Boot Option should you select? 

A. Disable Driver Signature Enforcement 

B. Disable automatic restart on system failure 

C. Last Know Good Configuration (advanced) 

D. Repair Your Computer 

Answer: A 

Explanation: 

A. By default, 64-bit versions of Windows Vista and later versions of Windows will load a kernel-mode driver only if the kernel can verify the driver signature. However, this default behavior can be disabled to facilitate early driver development and non-automated testing. 


Incorrect: 

Not B. specifies that Windows automatically restarts your computer when a failure occurs. 

Not C. Developer would not be able to test the driver as needed. 

Not D. Removes or repairs critical windows files, Developer would not be able to test the 

driver as needed and some file loss. 

Reference: Installing Windows Server 2012. 

http://technet.microsoft.com/en-us/library/jj134246.aspx 

http://msdn.microsoft.com/en-us/library/windows/hardware/ff547565(v=vs.85).aspx 


70-412 download

Regenerate cbt nuggets 70-412 download:

Q116. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. 

You need to store the contents of all the DNS queries received by Server1. 

What should you configure? 

A. Logging from Windows Firewall with Advanced Security 

B. Debug logging from DNS Manager 

C. A Data Collector Set (DCS) from Performance Monitor 

D. Monitoring from DNS Manager 

Answer: B 

Explanation: 

Debug logging allows you to log the packets sent and received by a DNS server. Debug logging is disabled by default, and because it is resource intensive, you should only activate it temporarily when you need more specific detailed information about server performance. 

Reference: Active Directory 2008: DNS Debug Logging Facts… 


Q117. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. Server1 is a BranchCache hosted cache server that is located in a branch office. 

The network contains client computers that run either Windows 7 or Windows 8. 

For the branch office, all of the user accounts and the client computer accounts are located in an organizational unit (OU) named Branch1. A Group Policy object (GPO) named GPO1 is linked to Branch 1. GPO1 contains the BranchCache settings. 

You discover that users in the branch office who have client computers that run Windows 7 do not access cached content from Server1. Users in the branch office who have Windows 8 computers access cached content from Server1. 

You need to configure the Windows 7 computers to use BranchCache on Server1. Which setting should you configure in GPO1? 

To answer, select the appropriate setting in the answer area. 


Answer: 



Q118. Your network contains an Active Directory domain named adatum.com. The domain contains a server named CA1 that runs Windows Server 2012 R2. CA1 has the Active Directory Certificate Services server role installed and is configured to support key archival and recovery. 

You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory Certificate Services (AD CS) database. The solution must prevent User1 from retrieving the private keys from the AD CS database. 

What should you do? 

A. Assign User1 the Issue and Manage Certificates permission to CA1. 

B. Assign User1 the Read permission and the Write permission to all certificate templates. 

C. Provide User1 with access to a Key Recovery Agent certificate and a private key. 

D. Assign User1 the Manage CA permission to CA1. 

Answer: C 

Explanation: 

Understanding the Key Recovery Agent Role KRAs are Information Technology (IT) administrators who can decrypt users’ archived private keys. An organization can assign KRAs by issuing KRA certificates to designated administrators and configure them on the CA. The KRA role is not one of the default roles defined by the Common Criteria specifications but a virtual role that can provide separation between Certificate Managers and the KRAs. This allows the separation between the Certificate Manager, who can retrieve the encrypted key from the CA database but not decrypt it, and the KRA, who can decrypt private keys but not retrieve them from the CA database. 

Reference: Understanding User Key Recovery 


Q119. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server3 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

DHCP is configured as shown in the exhibit. (Click the Exhibit button.) 


You need to ensure that only Scope1, Scope3, and Scope5 assign the same DNS servers to DHCP clients. The solution must minimize administrative effort. 

What should you do? 

A. Create a superscope and scope-level policies. 

B. Configure the Scope Options. 

C. Create a superscope and a filter. 

D. Configure the Server Options. 

Answer: B 

Explanation: 

Any DHCP scope options can be configured for assignment to DHCP clients, such as DNS 

server. 

Reference: Configuring a DHCP Scope. 

http://technet.microsoft.com/en-us/library/dd759218.aspx 


Q120. You have a virtual machine named VM1 that runs on a host named Host1. 

You configure VM1 to replicate to another host named Host2. Host2 is located in the same physical location as Host1. 

You need to add an additional replica of VM1. The replica will be located in a different physical site. 

What should you do? 

A. From VM1 on Host2, click Extend Replication. 

B. On Host1, configure the Hyper-V settings. 

C. From VM1 on Host1, click Extend Replication. 

D. On Host2, configure the Hyper-V settings. 

Answer: A 

Explanation: 

Extend Replication through UI: 

Before you Extend Replication to third site, you need to establish the replication between a primary server and replica server. Once that is done, go to replica site and from Hyper-V UI manager select the VM for which you want to extend the replication. Right click on VM and select “Replication->Extend Replication …”. This will open Extend Replication Wizard which is similar to Enable Replication Wizard. 

NOTE: You configure a server to receive replication with Hyper-V Manager, in this situation the replica site is assumed to be the Replica Server. Therefore you extend replication from VM1 on Host2. 

Note 2: With Hyper-V Extend Replication feature in Windows Server 2012 R2, customers can have multiple copies of data to protect them from different outage scenarios. For example, as a customer I might choose to keep my second DR site in the same campus or a few miles away while I want to keep my third copy of data across the continents to give added protection for my workloads. Hyper-V Replica Extend replication exactly addresses this problem by providing one more copy of workload at an extended site apart from replica site. 

Reference: Hyper-V Replica: Extend Replication 

http://blogs.technet.com/b/virtualization/archive/2013/12/10/hyper-v-replica-extend-replication.aspx