getcertified4sure.com

Ultimate Guide: pdf 70-412




With the aid of Examcollection 70-412 puts, you can obtain a excellent outcome simply that will make an individual move Microsoft test. Furthermore, if you failed in the 70-412 exam the very first time of utilizing the goods, almost all funds you pay is going to be refund. You only need to deliver the 70-412 report log because any pdf file to all of us. Following confirming your details, we will refund the cash and also give it back to your consideration at the earliest opportunity.

2021 Jul 70 412 study guide:

Q11. You have a server named Server1 that runs Windows Server 2012 R2. 

Server1 fails. 

You identify that the master boot record (MBR) is corrupt. 

You need to repair the MBR. 

Which tool should you use? 

A. Bcdedit 

B. Bcdboot 

C. Bootrec 

D. Fixmbr 

Answer: C 

Explanation: 

Repairing an unbootable Windows installation with bootrec.exe If the boot/recovery partition is corrupted or lost, you can modify your Windows OS partition to boot. 

. Boot from your Windows Vista/7/Server2008/R2/2012 media and choose the 

"Repair Windows" option. . Open the command prompt. . Using diskpart, mark your Windows partition as bootable. . If your windows partition does not have it, copy the "boot" folder from the 

installation media. 

. Run the following commands: >c: >cd boot >attrib bcd -s -h -r >ren c:\boot\bcd bcd.old >bootrec /RebuildBcd Reboot and Windows should boot normally. If not, return to the command prompt and run: >bootrec /FixMBR >bootrec /FixBoot 

Incorrect: Not A. BCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows Not B. The BCDboot tool is a command-line tool that enables you to manage system partition files Not D. Fixmbr is not a tool. Fixmbr is an option when using the bootrec tool. 

Reference: Windows BCD Store 

http://www.itsgotme.com/wiki/Windows_BCD 


Q12. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 has access to four physical disks. The disks are configured as shown in the following table. 


You need to ensure that all of the disks can be added to a Cluster Shared Volume (CSV). 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Format Disk2 to use NTFS. 

B. Format Disk3 to use NTFS. 

C. Enable BitLocker on Disk4. 

D. Disable BitLocker on Disk1. 

Answer: A,D 

Explanation: 

A. In Windows Server 2012 R2, a disk or storage space for a CSV volume must be a basic disk that is partitioned with NTFS or ReFS, but you cannot use a disk for a CSV that is formatted with FAT or FAT32. 

D. CSV supports bitlocker, but you would have to enable it on all nodes in the cluster. Therefore we need to disable bitlocker on Disk1. 

Incorrect: 

Not B. ReFS would work fine. In Windows Server 2012 R2, a disk or storage space for a 

CSV volume must be a basic disk that is partitioned with NTFS or ReFS. 

Not C. Bitlocker must be enabled on all disks for it to work for a CSV. 

Reference: Use Cluster Shared Volumes in a Failover Cluster 

https://technet.microsoft.com/en-us/library/jj612868.aspx 

Reference: How to Configure BitLocker Encrypted Clustered Disks in Windows Server 

2012 

http://blogs.msdn.com/b/clustering/archive/2012/07/20/10332169.aspx 


Q13. You have a server named FS1 that runs Windows Server 2012 R2. 

You install the File and Storage Services server role on FS1. 

From Windows Explorer, you view the properties of a shared folder named Share1 and you 

discover that the Classification tab is missing. 

You need to ensure that you can assign classifications to Share1 from Windows Explorer 

manually. 

What should you do? 

A. From Folder Options, select Show hidden files, folders, and drives. 

B. From Folder Options, clear Use Sharing Wizard (Recommend). 

C. Install the File Server Resource Manager role service. 

D. Install the Enhanced Storage feature. 

Answer: C 

Explanation: 

On the Classification tab of the file properties in Windows Server 2012, File Classification Infrastructure adds the ability to manually classify files. You can also classify folders so that any file added to the classified folder will inherit the classifications of the parent folder. 

Reference: What's New in File Server Resource Manager in Windows Server 


Q14. You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2. 

You fail to start VM1 and you suspect that the boot files on VM1 are corrupt. 

On Server1, you attach the virtual hard disk (VHD) of VM1 and you assign the VHD a drive 

letter of F. 

You need to repair the corrupt boot files on VM1. What should you run? 

A. bootrec.exe /rebuildbcd 

B. bootrec.exe /scanos 

C. bcdboot.exe f:\windows /s c: 

D. bcdboot.exe c:\windows /s f: 

Answer: D 

Explanation: 

Enables you to quickly set up a system partition, or to repair the boot environment located on the system partition. The system partition is set up by copying a simple set of Boot Configuration Data (BCD) files to an existing empty partition. 


Reference: BCDboot Command-Line Options 


Q15. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. The servers have the Hyper-V server role installed. 

A certification authority (CA) is available on the network. 

A virtual machine named vml.contoso.com is replicated from Server1 to Server2. A virtual 

machine named vm2.contoso.com is replicated from Server2 to Server1. 

You need to configure Hyper-V to encrypt the replication of the virtual machines. 

Which common name should you use for the certificates on each server? 

To answer, configure the appropriate common name for the certificate on each server in 

the answer area. 



Answer: 



70-412 actual exam

Most recent cbt nuggets 70-412 download:

Q16. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

An administrator installs the IP Address Management (IPAM) Server feature on a server named Server2. The administrator configures IPAM by using Group Policy based provisioning and starts server discovery. 

You plan to create Group Policies for IPAM provisioning. 

You need to identify which Group Policy object (GPO) name prefix must be used for IPAM Group Policies. 

What should you do on Server2? 

A. From Server Manager, review the IPAM overview. 

B. Run the ipamgc.exe tool. 

C. From Task Scheduler, review the IPAM tasks. 

D. Run the Get-IpamConfiguration cmdlet. 

Answer: D 

Explanation: 

Example: 


http://i.imgur.com/YcHLXhr.jpg 


Q17. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has an enterprise root certification authority (CA) for contoso.com. 

You deploy another member server named Server2 that runs Windows Server 2012 R2 and has the Web Server (IIS) server role installed. 

You need to designate a website on Server1 as the certificate revocation list (CRL) distribution point for the CA. The solution must ensure that CRLs are published automatically to Server2. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Create an http:// CRL distribution point (CDP) entry. 

B. Configure a CA exit module. 

C. Create a file:// CRL distribution point (CDP) entry. 

D. Configure a CA policy module. 

E. Configure an enrollment agent. 

Answer: A,D 

Explanation: 

A. To specify CRL distribution points in issued certificates Open the Certification Authority snap-in. In the console tree, click the name of the CA. On the Action menu, click Properties , and then click the Extensions tab. Confirm that Select extension is set to CRL Distribution Point (CDP) .

. Do one or more of the following. (The list of CRL distribution points is in the Specify locations from which users can obtain a certificate revocation list (CRL) box.) 

/ To indicate that you want to use a URL as a CRL distribution point Click the CRL distribution point, select the Include in the CDP extension of issued certificates check box, and then click OK . 

. Click Yes to stop and restart Active Directory Certificate Services (AD CS). 

D. You can specify CRL Distribution Points (CDPs) in CAPolicy.inf. Note that any CDP in CAPolicy.inf will take precedence for certificate verifiers over the CDP's specified in the CA policy module. 

Note: 

CRLDistributionPoint 

You can specify CRL Distribution Points (CDPs) for a root CA certificate in the CAPolicy.inf. 

This section does not configure the CDP for the CA itself. After the CA has been installed 

you can configure the CDP URLs that the CA will include in each certificate that it issues. 

The URLs specified in this section of the CAPolicy.inf file are included in the root CA 

certificate itself. 

Example: 

[CRLDistributionPoint] 

URL=http://pki.wingtiptoys.com/cdp/WingtipToysRootCA.crl 


Q18. HOTSPOT 

Your network contains one Active Directory domain. 

The domain contains an enterprise certification authority (CA). 

You need to ensure that members of a group named Group1 can issue certificates for the 

User certificate template only. 

Which two tabs should you use to perform the configuration? To answer, select the 

appropriate tabs in the answer area. 


Answer: 



Q19. Your network contains 20 iSCSI storage appliances that will provide storage for 50 Hyper-V hosts running Windows Server 2012 R2. 

You need to configure the storage for the Hyper-V hosts. The solution must minimize administrative effort. 

What should you do first? 

A. Install the iSCSI Target Server role service and configure iSCSI targets. 

B. Install the iSNS Server service feature and create a Discovery Domain. 

C. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties. 

D. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties. 

Answer: A 

Explanation: 

Windows Server 2012 includes an iSCSI Target role that, along with Failover Clustering, 

allows it to become a cost-effective and highly-available iSCSI Storage Array. We can connect from our Hyper-V host to the iSCSI target on the storage array with the following PowerShell command line: 

New-IscsiTargetPortal –TargetPortalAddress <IP_Address or FQDN of storage array> 

$target = Get-IscsiTarget 

Connect-IscsiTarget –NodeAddress $target.NodeAddress 

Incorrect: 

Not B. Discovery Domains in an iSCSI fabric, like zones in a Fibre Channel fabric, enable you to partition the storage resources in your storage area network (SAN). By creating and managing Discovery Domains, you can control the iSCSI targets that each iSCSI initiator can see and log on to. 

Reference: Configure iSCSI Target Server Role on Windows Server 2012 


Q20. Your network contains an Active Directory forest named adatum.com. The forest contains an Active Directory Rights Management Services (AD RMS) cluster. 

A partner company has an Active Directory forest named litwareinc.com. The partner company does not have AD RMS deployed. 

You need to ensure that users in litwareinc.com can consume rights-protected content from adatum.com. 

Which type of trust policy should you create? 

A. At federated trust 

B. A trusted user domain 

C. A trusted publishing domain 

D. Windows Live ID 

Answer: A 

Explanation: 

In AD RMS rights can be assigned to users who have a federated trust with Active Directory Federation Services (AD FS). This enables an organization to share access to rights-protected content with another organization without having to establish a separate Active Directory trust or Active Directory Rights Management Services (AD RMS) infrastructure. 

Reference: AD RMS and AD FS Considerations 

http://technet.microsoft.com/en-us/library/dd772651(v=WS.10).aspx