Mar 2016 updated: Examcollection Microsoft 70-412 study guide 76-90

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-412 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-412-dumps.html


70-412 Product Description:
Exam Number/Code: 70-412 vce
Exam name: Configuring Advanced Windows Server 2012 Services
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: Microsoft 70-412 Configuring Advanced Windows Server 2012 Services

70-412 examcollection

Question No. 76

You have a server named Server1 that runs Windows Server 2012 R2. 

You have a subscription to Windows Azure. 

You need to register the Microsoft Azure Backup Agent on Server1. 

What should you do first? 

A. Install the Microsoft System Center 2012 Data Protection Manager (DPM) agent. 

B. Create a backup vault. 

C. Create Site Recovery vault. 

D. Configure a passphrase for the Azure Backup Agent. 

Answer:

Explanation: To back up files and data from your Windows Server to Azure, you must create a backup vault in the geographic region where you want to store the data. The main steps include: 

* the creation of the vault you will use to store backups 

* downloading a vault credential 

* the installation of a backup agent 

Reference: Configure Azure Backup to quickly and easily back up Windows Server 

https://azure.microsoft.com/sv-se/documentation/articles/backup-configure-vault/ 


Question No. 77

Your network contains one Active Directory forest named contoso.com. The forest contains two child domains and six domain controllers. The domain controllers are configured as shown in the following table. 


For the contoso.com domain, a company policy states that administrators must be able to retrieve a list of all the users who have not logged on to the network in the last seven days from any domain controller. 

You need to ensure that the users’ last logon information from the last seven days is replicated to all of the domain controllers. 

What should you use? 

A. Set-ADSite 

B. Set-ADReplicationSite 

C. Set-ADDomain 

D. Set-ADReplicationSiteLink 

E. Set-ADGroup 

F. Set-ADForest 

G. Netdom 

Answer:

Reference: Technet, Set-ADDomain 

https://technet.microsoft.com/en-us/library/ee617212.aspx 


Question No. 78

Your network contains an Active Directory domain named contoso.com. The domain contains an IP Address Management (IPAM) server that uses a Windows Internal Database. 

You install a Microsoft SQL Server 2012 instance on a new server. 

You need to migrate the IPAM database to the SQL Server instance. 

Which cmdlet should you run? 

A. Disable-IpamCapability 

B. Set-IpamConfiguration 

C. Update-IpamServer 

D. Move-IpamDatabase 

Answer:

Explanation: 

The Move-IpamDatabase cmdlet migrates the IP Address Management (IPAM) database to a Microsoft SQL Server database. You can migrate from Windows Internal Database (WID) or from a SQL Server database. The cmdlet creates a new IPAM schema and copies all data from the existing IPAM database. After the cmdlet completes copying data, it changes IPAM configuration settings to refer to the new database as the IPAM database. 

Reference: Move-IpamDatabase 


Question No. 79

You have a server named Server1 that runs Windows Server 2012 R2. 

Each day, Server1 is backed up fully to an external disk. 

On Server1, the disk that contains the operating system fails. 

You replace the failed disk. 

You need to perform a bare-metal recovery of Server1 by using the Windows Recovery 

Environment (Windows RE). 

What should you use? 

A. The Wbadmin.exe command 

B. The Repair-bde.exe command 

C. The Get-WBBareMetalRecovery cmdlet 

D. The Start-WBVolumeRecovery cmdlet 

Answer:

Explanation: 

Wbadmin enables you to back up and restore your operating system, volumes, files, folders, and applications from a command prompt. 

Wbadmin start sysrecovery runs a recovery of the full system (at least all the volumes that contain the operating system's state). This subcommand is only available if you are using the Windows Recovery Environment. 

* Wbadmin start sysrecovery -backupTarget Specifies the storage location that contains the backup or backups that you want to recover. This parameter is useful when the storage location is different from where backups of this computer 

Incorrect: 

Not B. Accesses encrypted data on a severely damaged hard disk if the drive was 

encrypted by using BitLocker. Repair-bde can reconstruct critical parts of the drive and 

salvage recoverable data as long as a valid recovery password or recovery key is used to 

decrypt the data. 

Not C. Gets the value that indicates whether the ability to perform bare metal recoveries 

from backups has been added to the backup policy (WBPolicy object). 

Not D. Starts a volume recovery operation. 

Reference: Wbadmin start sysrecovery 

http://technet.microsoft.com/en-us/library/cc742118.aspx 


Question No. 80

Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers. 

The domain controllers are configured as shown in the following table. 


You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in the child1.contoso.com domain. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Upgrade DC1 to Windows Server 2012 R2. 

B. Upgrade DC11 to Windows Server 2012 R2. 

C. Raise the domain functional level of childl.contoso.com. 

D. Raise the domain functional level of contoso.com. 

E. Raise the forest functional level of contoso.com. 

Answer: A,D 

Explanation: 

The root domain in the forest must be at Windows Server 2012 level. First upgrade DC1 to this level (A), then raise the contoso.com domain functional level to Windows Server 2012 (D). 

* (A) To support resources that use claims-based access control, the principal’s domains will need to be running one of the following: / All Windows Server 2012 domain controllers / Sufficient Windows Server 2012 domain controllers to handle all the Windows 8 device authentication requests / Sufficient Windows Server 2012 domain controllers to handle all the Windows Server 

2012 resource protocol transition requests to support non-Windows 8 devices. Reference: What's New in Kerberos Authentication http://technet.microsoft.com/en-us/library/hh831747.aspx. 


Question No. 81

You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard. You discover that the new virtual disk has a write-back cache of 1 GB. 

You need to ensure that the virtual disk has a write-back cache of 5 GB. 

What should you do? 

A. Detach the virtual disk, and then run the Resize-VirtualDisk cmdlet. 

B. Detach the virtual disk, and then run the Set-VirtualDisk cmdlet. 

C. Delete the virtual disk, and then run the New-StorageSubSystemVirtualDisk cmdlet. 

D. Delete the virtual disk, and then run the New-VirtualDisk cmdlet. 

Answer:

Explanation: 

So what about changing the cache size? Well, you can't modify the cache size, but you can specify it at the time that you create a new virtual hard disk. In order to do so, you have to use Windows PowerShell. 

New-VirtualDisk –StoragePoolFriendlyName "<storage pool name>" –FriendlyName "<v 

Reference: Using Windows Server 2012's SSD Write-Back Cache 


Question No. 82

You have a server named Server1 that runs Windows Server 2012 R2. The storage on Server1 is configured as shown in the following table. 


You plan to implement Data Deduplication on Server1. 

You need to identify on which drives you can enable Data Deduplication. 

Which three drives should you identify? (Each correct answer presents part of the solution. Choose three.) 

A. C 

B. D 

C. E 

D. F 

E. G 

Answer: B,D,E 

Explanation: 

Volumes that are candidates for deduplication must conform to the following requirements: 

* Must not be a system or boot volume. (not A) 

* Can be partitioned as a master boot record (MBR) or a GUID Partition Table (GPT), and must be formatted using the NTFS file system. (not C) 

* Can reside on shared storage, such as storage that uses a Fibre Channel or an SAS array, or when an iSCSI SAN and Windows Failover Clustering is fully supported. 

* Do not rely on Cluster Shared Volumes (CSVs). You can access data if a deduplication-enabled volume is converted to a CSV, but you cannot continue to process files for deduplication. 

* Do not rely on the Microsoft Resilient File System (ReFS). 

* Must be exposed to the operating system as non-removable drives. Remotely-mapped drives are not supported. 

Ref: Plan to Deploy Data Deduplication http://technet.microsoft.com/en-us/library/hh831700.aspx 


Question No. 83

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. 

You need to deploy a certification authority (CA) to Server1. The CA must support the auto-enrollment of certificates. 

Which two cmdlets should you run? (Each correct answer presents part of the solution. 

Choose two.) 

A. Add-CAAuthoritylnformationAccess 

B. Install-AdcsCertificationAuthority 

C. Add-WindowsFeature 

D. Install-AdcsOnlineResponder 

E. Install-AdcsWebEnrollment 

Answer: B,E 

Explanation: 

Explanation 

B. The Install-AdcsCertificationAuthority cmdlet performs installation and configuration of 

the AD CS CA role service. It can be used to install a root CA. 

Example: 

Install-AdcsCertificationAuthority –CAType StandaloneRootCA –CACommonName 

"ContosoRootCA" –KeyLength 2048 –HashAlgorithm SHA1 –CryptoProviderName 

"RSA#Microsoft Software Key Storage Provider" 

E: The Install-AdcsWebEnrollment cmdlet performs initial installation and configuration of 

the Certification Authority Web Enrollment role service. 

Note: Prior to the availability of Certificate Enrollment Web Services, AD CS required that client computers configured for certificate auto-enrollment be connected directly to the corporate network. Certificate Enrollment Web Services allows organizations to enable AD CS using a perimeter network. This allows users and computers outside the corporate network to enroll for certificates. 


Certificate Enrollment web service 

Reference: Deploying AD CS Using Windows PowerShell 


Question No. 84

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

You add two additional nodes to Cluster1. You need to ensure that Cluster1 stops running if three nodes fail. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. the Scale-Out File Server 

Answer:

Explanation: 

The quorum configuration in a failover cluster determines the number of failures that the cluster can sustain. 

Reference: Understanding Quorum Configurations in a Failover Cluster 

http://technet.microsoft.com/en-us/library/cc731739.aspx 


Question No. 85

HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012. 

Server1 and Server2 have the Hyper-V server role and the Failover Clustering feature installed. 

Server1 and Server2 are members of a cluster named Cluster1. Cluster1 hosts 10 virtual machines. 

When you try to migrate a running virtual machine from one server to another, you receive the following error message: "There was an error checking for virtual machine compatibility on the target node." 

You need to ensure that the virtual machines can be migrated from one node to another. 

From which node should you perform the configuration? 

To answer, select the appropriate node in the answer area. 


Answer: 



Question No. 86

DRAG DROP 

You have a server named Server2 that runs Windows Server 2012 R2. You have storage provisioned on Server2 as shown in the exhibit. (Click the Exhibit button.) 


You need to configure the storage so that it appears in Windows Explorer as a drive letter on Server1. 

Which three actions should you perform in sequence? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



Question No. 87

Your network contains an Active Directory domain named contoso.com. 

You deploy a server named Server1 that runs Windows Server 2012 R2. 

A local administrator installs the Active Directory Rights Management Services server role 

on Server1. 

You need to ensure that AD RMS clients can discover the AD RMS cluster automatically. 

What should you do? 

A. Run the Active Directory Rights Management Services console by using an account that is a member of the Schema Admins group, and then configure the proxy settings. 

B. Run the Active Directory Rights Management Services console by using an account that is a member of the Schema Admins group, and then register the Service Connection Point (SCP). 

C. Run the Active Directory Rights Management Services console by using an account that is a member of the Enterprise Admins group, and then register the Service Connection Point (SCP). 

D. Run the Active Directory Rights Management Services console by using an account that is a member of the Enterprise Admins group, and then configure the proxy settings. 

Answer:

Explanation: 

* The Active Directory Rights Management Services (AD RMS) Service Connection Point (SCP) is an object in Active Directory that holds the web address of the AD RMS certification cluster. AD RMS-enabled applications use the SCP to discover the AD RMS service; it is the first connection point for users to discover the AD RMS web services. 

* To register the SCP you must be a member of the local AD RMS Enterprise Administrators group and the Active Directory Domain Services (AD DS) Enterprise Admins group, or you must have been given the appropriate authority. 

Reference: The AD RMS Service Connection Point 


Question No. 88

HOTSPOT 

Your network contains one Active Directory forest named contoso.com. The forest contains the domain controllers configured as shown in the following table. 


You perform the following actions: 

. Create a file named File1.txt in the SYSVOL folder on DC1. 

. Create a user named User1 on DC4. You need to identify on which domain controller or controllers a copy of each object is stored. 

What should you identify? To answer, select the appropriate options in the answer area. 


Answer: 



Question No. 89

HOTSPOT 

Your network contains three Active Directory forests. The forests are configured as shown in the following table. 



A two-way forest trust exists between contoso.com and divisionl.contoso.com. A two-way forest trust also exists between contoso.com and division2.contoso.com. 

You plan to create a one-way forest trust from divisionl.contoso.com to division2.contoso.com. 

You need to ensure that any cross-forest authentication requests are sent to the domain controllers in the appropriate forest after the trust is created. 

How should you configure the existing forest trust settings? 

In the table below, identify which configuration must be performed in each forest. Make only one selection in each column. Each correct selection is worth one point. 


Answer: 



Question No. 90

Your company has a main office and a remote office. The remote office is used for disaster recovery. 

The network contains an Active Directory domain named contoso.com. The domain contains member servers named Server1, Server2, Server3, and Server4. All servers run Windows Server 2012 R2. 

Server1 and Server2 are located in the main office. Server3 and Server4 are located in the remote office. 

All servers have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Storage is replicated between the main office and the remote site. 

You need to ensure that Cluster1 is available if two nodes in the same office fail. 

What are two possible quorum configurations that achieve the goal? (Each correct answer presents a complete solution. Choose two.) 

A. No Majority: Disk Only 

B. Node Majority 

C. Node and File Share Majority 

D. Node and Disk Majority 

Answer: A,B 

Explanation: 

Depending on the quorum configuration option that you choose and your specific settings, the cluster will be configured in one of the following quorum modes: 

* (A) No majority (disk witness only) 

* (B) Node majority (no witness) 

* Node majority with witness (disk or file share) 

Reference: Configure and Manage the Quorum in a Windows Server 2012 R2 Failover Cluster