All About Download 70-412 Test Question

Testking 70-412 Questions are updated and all 70-412 answers are verified by experts. Once you have completely prepared with our 70-412 exam prep kits you will be ready for the real 70-412 exam without a problem. We have Avant-garde Microsoft 70-412 dumps study guide. PASSED 70-412 First attempt! Here What I Did.

Free demo questions for Microsoft 70-412 Exam Dumps Below:

Page: 1 / 37
Total 453 questions Full Exam Access
Question 1
Which of the following is the minimum domain functional level required before you can promote a member server running Windows Server 2012 R2 so that it functions as a domain controller?
My answer: -
Reference answer: A
Reference analysis:

None

Question 2
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.
Cluster1 hosts an Application named App1.
You need to ensure that Server2 handles all of the client requests to the cluster for App1. The solution must ensure that if Server2 fails, Server1 becomes the active node for App1.
What should you configure?
My answer: -
Reference answer: J
Reference analysis:

The preferred owner in a two-server cluster will always be the active node unless it is down.
Reference: Preferred Owners in a Cluster http://blogs.msdn.com/b/clustering/archive/2008/10/14/9000092.aspx

Question 3
HOTSPOTYour network contains an Active Directory forest. You implement Dynamic Access Control in the forest.
You have the claim types shown in the Claim Types exhibit. (Click the Exhibit button.)
70-412 dumps exhibit
The properties of a user named User1 are configured as shown in the User1 exhibit. (Click the Exhibit button.)
70-412 dumps exhibit
The output of Whoami /claims for a user named User2 is shown in the Whoami exhibit. (Click the Exhibit button.)
70-412 dumps exhibit
Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.
70-412 dumps exhibit
Solution:
70-412 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 4
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
Both servers have the Hyper-V server role installed.
The servers have the hardware configurations shown in the following table.
70-412 dumps exhibit
Server1 hosts five virtual machines that run Windows Server 2012 R2. You need to move the virtual machines from Server1 to Server2.
The solution must minimize downtime.
What should you do for each virtual machine?
My answer: -
Reference answer: A
Reference analysis:

None of these migration options will work between different Processors ( AMD/Intel). The only option remaining is to export and re-import the VMs

Question 5
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
Server1 and Server2 have the Hyper-V server role installed.
Server1 and Server2 are configured as Hyper-V replicas of each other.
Server1 hosts a virtual machine named VM1. VM1 is replicated to Server2. You need to verify whether the replica of VM1 on Server2 is functional. The solution must ensure that VM1 remains accessible to clients.
What should you do from Hyper-V Manager?
My answer: -
Reference answer: B
Reference analysis:

None

Question 6
You have a server named Server1 that runs Windows Server 2012 R2. You have a subscription to Windows Azure.
You need to register the Microsoft Azure Backup Agent on Server1. What should you do first?
My answer: -
Reference answer: B
Reference analysis:

To back up files and data from your Windows Server to Azure, you must create a backup vault in the geographic region where you want to store the data.
The main steps include:
* the creation of the vault you will use to store backups
* downloading a vault credential
* the installation of a backup agent
https://azure.microsoft.com/sv-se/documentation/articles/backup-configure-vault/

Question 7
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Hyper-V server role installed. The servers are configured as shown in the following table.
70-412 dumps exhibit
You add a third server named Server3 to the network. Server3 has Intel processors.
You need to move VM3 and VM6 to Server3. The solution must minimize downtime on the virtual machines.
Which method should you use to move each virtual machine?
To answer, select the appropriate method for each virtual machine in the answer area.
70-412 dumps exhibit
70-412 dumps exhibit
Solution:
VM3: export/import is the only option due to different processor manufacturers VM6: Live migration can be used as both have Intel CPU's Live Storage Migration requires same processor manufacturers Live migration requires same processor manufacturers
Incorrect:
Quick migration has downtime

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 8
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed.
You need to store the contents of all the DNS queries received by Server1.
What should you configure?
My answer: -
Reference answer: B
Reference analysis:

Debug logging allows you to log the packets sent and received by a DNS server. Debug logging is disabled by default, and because it is resource intensive, you should only activate it temporarily when you need more specific detailed information about server performance.
Reference: Active Directory 2008: DNS Debug Logging Facts…

Question 9
DRAG DROP
Your network contains one Active Directory domain. The domain contains two Hyper-V hosts named Host1 and Host2 that run Windows Server 2012 R2. Host1 contains a virtual machine named DC5. DC5 is a domain controller that runs Windows Server 2012 R2.
You configure Active Directory to support domain controller cloning for DC5, and then you shut down DC5.
You need to create a clone of DC5 on Host2.
What should you run on each Hyper-V host? To answer, drag the appropriate commands or cmdlets to the correct Hyper-v hosts. Each command or cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
70-412 dumps exhibit
Solution:
Host1: Export-VM Host2: Import-VM
Use import and export feature, when you want to create a new virtual machine with the same configuration of an existing machine in Hyper-V.
The Export-VM cmdlet exports a virtual machine to disk. The Import-VM cmdlet imports a virtual machine from a file.

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 10
Your network contains an Active Directory forest named contoso.com. The forest contains three domains. All domain controllers run Windows Server 2012 R2.
The forest has a two-way realm trust to a Kerberos realm named adatum.com.
You discover that users in adatum.com can only access resources in the root domain of contoso.com.
You need to ensure that the adatum.com users can access the resources in all of the domains in the forest.
What should you do in the forest?
My answer: -
Reference answer: D
Reference analysis:

* A one-way, outgoing realm trust allows resources in your Windows Server domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to be accessed by users in the Kerberos realm.
* You can establish a realm trust between any non-Windows Kerberos version 5 (V5) realm and an Active Directory domain. This trust relationship allows cross-platform interoperability with security services that are based on other versions of the Kerberos V5 protocol, for example, UNIX and MIT implementations. Realm trusts can switch from nontransitive to transitive and back. Realm trusts can also be either one-way or two-way.
Reference: Create a One-Way, Outgoing, Realm Trust

Question 11
Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers. The domain controllers are configured as shown in the following table.
70-412 dumps exhibit
You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in both domains.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
My answer: -
Reference answer: AE
Reference analysis:

The root domain in the forest must be at Windows Server 2012 level. First upgrade DC1 to this level (E), then raise the contoso.com domain functional level to Windows Server 2012 (A).
* (E) To support resources that use claims-based access control, the principal’s domains will need to be running one of the following:
/ All Windows Server 2012 domain controllers.
/ Sufficient Windows Server 2012 domain controllers to handle all the Windows 8 device authentication requests.
/ Sufficient Windows Server 2012 domain controllers to handle all the Windows Server 2012 resource protocol transition requests to support non-Windows 8 devices.
Reference: What\'s New in Kerberos Authentication http://technet.microsoft.com/en-us/library/hh831747.aspx.

Question 12
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2.
You create a user account named User1 in the domain.
You need to ensure that User1 can use Windows Server Backup to back up Server1. The solution must minimize the number of administrative rights assigned to User1.
What should you do?
My answer: -
Reference answer: D
Reference analysis:

Backup Operators have these permissions by default:
\"70-412
However the question explicitly says we need to minimize administrative rights. Since the requirement is for backing up the data only--no requirement to restore or shutdown--then assigning the "Back up files and directories user right" would be the correct answer.
\"70-412
Reference: Default local groups
http://technet.microsoft.com/en-us/library/cc787956(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc756898(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc771990.aspx

Question 13
You have a file server named Server1 that runs a Server Core Installation of Windows Server 2012 R2.
You need to ensure that users can access previous versions of files that are shared on Server1 by using the Previous Versions tab.
Which tool should you use?
My answer: -
Reference answer: C
Reference analysis:

\\A. Enables you to back up and restore your operating system, volumes, files, folders, and applications from a command prompt.
\\B. DiskPart is a text-mode command interpreter that enables you to manage objects (disks, partitions, volumes, or virtual hard disks) by using scripts or direct input from a command prompt.
\\C. The storrept command is installed with File Server Resource Manager and includes subcommands for creating and managing storage reports and storage report tasks, as well as for configuring general administrative options for File Server Resource Manager.
\\D. Displays current volume shadow copy backups and all installed shadow copy writers and providers. To view the command syntax for any of the commands in the following table, click the command name.
http://technet.microsoft.com/en-us/library/cc754015(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc770877(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc753567(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc754968.aspx
\"70-412

Question 14
Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed.
Server1 has a scope named Scope1. A policy named Policy1 is configured for Scope1. Policy1 is configured to provide Hyper-V virtual machines a one-day lease.
All other computers receive an eight-day lease.
You implement an additional DHCP server named Server2 that runs Windows Server 2012 R2.
On Server1, you configure Scopel for DHCP failover.
You discover that virtual machines that receive IP addresses from Server2 have a lease duration of eight days.
You need to ensure that when Server2 assigns IP addresses to the Hyper-V virtual machines, the lease duration is one day.
The solution must ensure that other computers that receive IP addresses from Server2 have a lease duration of eight days.
What should you do?
My answer: -
Reference answer: B
Reference analysis:

Scope 1 has been set up for DHCP failover. Now we need to replicate it from Server1 to Server2.
http://technet.microsoft.com/en-us/library/dd183579(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc772101.aspx

Question 15
Your network contains one Active Directory forest named contoso.com. The forest contains two child domains and six domain controllers. The domain controllers are configured as shown in the following table.
70-412 dumps exhibit
You create a trust between contoso.com and a domain in another forest at a partner company.
You need to prevent the sales.contoso.com and the manufacturing.contoso.com names from being used in authentication requests across the forest trust.
What should you use?
My answer: -
Reference answer: G
Reference analysis:

The Netdom trust command establishes, verifies, or resets a trust relationship between domains.
Parameters include /RemoveTLNEX:
Removes the specified top level name exclusion (DNS Name Suffix) from the forest trust info from the specified trust. Valid only for a forest transitive non-Windows realm trust and can only be performed on the root domain for a forest.
Reference: Netdom trust
https://technet.microsoft.com/sv-se/library/Cc835085(v=WS.10).aspx

Question 16
Your network contains one Active Directory forest named contoso.com. The forest contains two child domains and six domain controllers. The domain controllers are configured as shown in the following table.
70-412 dumps exhibit
You need to prevent administrators from accidentally deleting any of the sites in the forest. What should you use?
My answer: -
Reference answer: B
Reference analysis:

The Set-ADReplicationSite sets the replication properties for an Active Directory site. Parameter: -ProtectedFromAccidentalDeletion<Boolean>
Specifies whether to prevent the object from being deleted. When this property is set to
$True, you cannot delete the corresponding object without changing the value of the property. The acceptable values for this parameter are:
-- $False or 0
-- $True or 1
Reference: Technet, Set-ADReplicationSite https://technet.microsoft.com/en-us/library/hh852305(v=wps.630).aspx

Question 17
Your network contains an Active Directory forest named adatum.com. The forest contains an Active Directory Rights Management Services (AD RMS) cluster.
A partner company has an Active Directory forest named litwareinc.com. The partner company does not have AD RMS deployed.
You need to ensure that users in litwareinc.com can consume rights-protected content from adatum.com.
Which type of trust policy should you create?
My answer: -
Reference answer: A
Reference analysis:

In AD RMS rights can be assigned to users who have a federated trust with Active Directory Federation Services (AD FS). This enables an organization to share access to rights-protected content with another organization without having to establish a separate Active Directory trust or Active Directory Rights Management Services (AD RMS) infrastructure.
Reference: AD RMS and AD FS Considerations http://technet.microsoft.com/en-us/library/dd772651(v=WS.10).aspx

Question 18
You are employed as a senior network administrator at contoso.com. Contoso.com has a single Active Directory Domain named contoso.com.
All servers on the contoso.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior network administrator.
You are currently discussing the Dnslint.exe tool.
Which of the following should this tool be used for ? (Choose all that apply)
My answer: -
Reference answer: ADE
Reference analysis:

http://support.microsoft.com/kb/321045
\"70-412

Question 19
Which permission should you assign on a CA to a group of users that you want to be able to respond to certificate requests but you do not want to provide them with the ability to change CA security settings?
My answer: -
Reference answer: B
Reference analysis:

None

Question 20
You have a server named LON-DC1 that runs Windows Server 2012 R2. An iSCSI virtual disk named VirtualiSCSI1.vhd exists on LON-DC1 as shown in the exhibit. (Click the Exhibit button.)
70-412 dumps exhibit
You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt iSCSI target.
VirtualiSCSIl.vhd is removed from LON-DC1.
You need to assign VirtualiSCSI2.vhd a logical unit value of 0. What should you do?
My answer: -
Reference answer: C
Reference analysis:

The Add-IscsiVirtualDiskTargetMapping cmdlet assigns a virtual disk to an iSCSI target. Once a virtual disk has been assigned to a target, and after the iSCSi initiator connects to that target, the iSCSI initiator can access the virtual disk. All of the virtual disks assigned to the same iSCSI target will be accessible by the connected iSCSI initiator.
Parameter include: -Lun<Int32>
Specifies the logical unit number (LUN) associated with the virtual disk. By default, the lowest available LUN number will be assigned.
Reference: Add-IscsiVirtualDiskTargetMapping https://technet.microsoft.com/en-us/library/jj612800(v=wps.630).aspx

Question 21
You have a server named Server1 that runs Windows Server 2012 R2. Each day, Server1 is backed up fully to an external disk.
On Server1, the disk that contains the operating system fails. You replace the failed disk.
You need to perform a bare-metal recovery of Server1 by using the Windows Recovery Environment (Windows RE).
What should you do?
My answer: -
Reference answer: D
Reference analysis:

Performs a system recovery (bare metal recovery). This subcommand can be run only from the Windows Recovery Environment.
* -backupTarget
Specifies the storage location that contains the backup or backups that you want to recover. This parameter is useful when the storage location is different from where backups of this computer are usually stored.
Reference: Wbadmin start sysrecovery http://technet.microsoft.com/en-us/library/cc742118.aspx

Question 22
You have a failover cluster named Cluster1 that contains four nodes. All of the nodes run Windows Server 2012 R2.
You need to force every node in Cluster1 to contact immediately the Windows Server Update Services (WSUS) server on your network for updates.
Which tool should you use?
My answer: -
Reference answer: A
Reference analysis:

The Add-CauClusterRole cmdlet adds the Cluster-Aware Updating (CAU) clustered role that provides the self-updating functionality to the specified cluster. When the CAU clustered role has been added to a cluster, the failover cluster can update itself on the schedule that is specified by the user, without requiring an external computer to coordinate the cluster updating process.
Incorrect:
Not B. The wuauclt utility allows you some control over the functioning of the Windows Update Agent. It is updated as part of Windows Update.
The following are the command line for wuauclt.
OptionDescription
/a /ResetAuthorization
Initiates an asynchronous background search for applicable updates. If Automatic Updates is disabled, this option has no effect.
/r /ReportNow
Sends all queued reporting events to the server asynchronously.
/? /h /help
Shows this help information.
Not D.
The Invoke-CauScan cmdlet performs a scan of cluster nodes for applicable updates and returns a list of the initial set of updates that would be applied to each node in a specified cluster.
Note: The Invoke-CauRun cmdlet performs a scan of cluster nodes for applicable updates and installs those updates via an Updating Run on the specified cluster.
Reference: Add-CauClusterRole
http://technet.microsoft.com/en-us/library/hh847235(v=wps.620).aspx

Question 23
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.
The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA).
All users in the domain are issued a smart card and are required to log on to their domain- joined client computer by using their smart card.
A user named User1 resigned and started to work for a competing company.
You need to prevent User1 immediately from logging on to any computer in the domain. The solution must not prevent other users from logging on to the domain.
Which tool should you use?
My answer: -
Reference answer: A
Reference analysis:

To disable or enable a user account using Active Directory Administrative Center
1. To open Active Directory Administrative Center, clickStart, clickAdministrative Tools, and then clickActive Directory Administrative Center.
To open Active Directory Users and Computers in Windows Server 2012, clickStart, typedsac.exe.
2. In the navigation pane, select the node that contains the user account whose status you want to change.
3. In the management list, right-click the user whose status you want to change.
4. Depending on the status of the user account, do one of the following:
uk.co.certification.simulator.questionpool.PList@d5b8510
Reference: Disable or Enable a User Account

Question 24
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.
You add two additional nodes to Cluster1.
You have a folder named Folder1 on Server1 that contains Application data. You plan to provide continuously available access to Folder1.
You need to ensure that all of the nodes in Cluster1 can actively respond to the client requests for Folder1.
What should you configure?
My answer: -
Reference answer: L
Reference analysis:

Scale-Out File Server is a feature that is designed to provide scale-out file shares that are continuously available for file-based server application storage. Scale-out file shares provides the ability to share the same folder from multiple nodes of the same cluster.
Note: You can deploy and configure a clustered file server by using either of the following methods:
* Scale-Out File Server for Application data (Scale-Out File Server)
* File Server for general use
Scale-Out File Server for Application data (Scale-Out File Server) This clustered file server is introduced in Windows Server 2012 R2 and lets you store server Application data, such as Hyper-V virtual machine files, on file shares, and obtain a similar level of reliability, availability, manageability, and high performance that you would expect from a storage area network. All file shares are online on all nodes simultaneously. File shares associated with this type of clustered file server are called scale-out file shares. This is sometimes referred to as active-active.
Reference: Scale-Out File Server for Application Data Overview http://technet.microsoft.com/en-us/library/hh831349.aspx

Question 25
Your network contains an Active Directory domain named contoso.com.
The domain contains a domain controller named Dc1. DC1 has the DNS Server server role installed.
The network has two sites named Site1 and Site2. Site1 uses 10.10.0.0/16 IP addresses and Site2 uses 10.11.0.0/16 IP addresses.
All computers use DC1 as their DNS server. The domain contains four servers named Server1, Server2, Server3, and Server4.
All of the servers run a service named Service1. DNS host records are configured as shown in the exhibit. (Click the Exhibit button.)
70-412 dumps exhibit
You discover that computers from the 10.10.1.0/24 network always resolve Service1 to the [P address of Server1.
You need to configure DNS on DC1 to distribute computers in Site1 between Server1 and Server2 when the computers attempt to resolve Service1.
What should run on DC1?
My answer: -
Reference answer: C
Reference analysis:

\\A. Specifies use of fast transfer format used by legacy Berkeley Internet Name Domain (BIND) servers. 1 enables
\\B. Disables netmask ordering.
\\C. You can use the Dnscmd /Config /LocalNetPriorityNetMask 0x0000FFFF command to use class B ( or 16 bit) for netmask ordering for DNS round robin
\\D. Disables round robin rotation.
http://technet.microsoft.com/en-us/library/cc737355(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc738473(v=ws.10).aspx http://support.microsoft.com/kb/842197 http://technet.microsoft.com/en-us/library/cc779169(v=ws.10).aspx

Question 26
You are emloyed as a network administrator at ABC.com.
Abc.com has an Active directory domain named ABC.com all servers on the ABC.com network have Windows Server 2012 R2.
The ABC.com domain has two Active Directory sites configured.
You want to make use of change notification configure replication between these Active Directory Sites.
You have opened DEFAULTIPSITELINK Properties to configure the necessary attribute. Which of the following is the attribute that needs to be configured?
My answer: -
Reference answer: B
Reference analysis:

None

Question 27
Your network contains servers that run Windows Server 2012 R2.
The network contains a large number of iSCSI storage locations and iSCSI clients.
You need to deploy a central repository that can discover and list iSCSI resources on the network automatically.
Which feature should you deploy?
My answer: -
Reference answer: D
Reference analysis:

\\A. Windows Server 2012 R2 enables storage management that is comprehensive and fully scriptable, and administrators can manage it remotely.
A WMI-based interface provides a single mechanism through which to manage all storage, including non-Microsoft intelligent storage subsystems and virtualized local storage (known as Storage Spaces). Additionally, management applications can use a single Windows API to manage different storage types by using standards- based protocols such as Storage Management Initiative Specification (SMI-S).
\\B. Targets are created in order to manage the connections between an iSCSI device and the servers that need to access it. A target defines the portals (IP addresses) that can be used to connect to the iSCSI device, as well as the security settings (if any) that the iSCSI device requires in order to authenticate the servers that are requesting access to its resources.
\\C. iSCSI Target Storage Provider enables applications on a server that is connected to an iSCSI target to perform volume shadow copies of data on iSCSI virtual disks. It also enables you to manage iSCSI virtual disks by using older applications that require a Virtual Disk Service (VDS) hardware provider, such as the Diskraid command.
\\D. The Internet Storage Name Service (iSNS) protocol is used for interaction between iSNS servers and iSNS clients. iSNS clients are computers, also known as initiators, that are attempting to discover storage devices, also known as targets, on an Ethernet network.
http://technet.microsoft.com/en-us/library/cc726015.aspx http://technet.microsoft.com/en-us/library/cc772568.aspx
\"70-412

Question 28
You have a server named Server1 that runs Windows Server 2012 R2. A Microsoft Azure Backup of Server1 is created automatically every day. You need to view the items that are included in the backup.
Which cmdlet should you run?
My answer: -
Reference answer: C
Reference analysis:

The Get-OBPolicy cmdlet gets the current backup policy that is set for the server, including the details about scheduling backups, files included in the backup, and retention policy.
Reference: Technet, Get-OBPolicy
https://technet.microsoft.com/en-us/library/hh770406(v=wps.630).aspx

Question 29
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Windows Deployment Services server role installed.
You back up Server1 each day by using Windows Server Backup. The disk array on Server1 fails.
You replace the disk array.
You need to restore Server1 as quickly as possible. What should you do?
My answer: -
Reference answer: A
Reference analysis:

A. Recovery of the OS uses the Windows Setup Disc http://technet.microsoft.com/en-us/library/cc753920.aspx http://www.windowsnetworking.com/articles_tutorials/Restoring-Windows-Server- BareMetal.html

Page: 1 / 37
Total 453 questions Full Exam Access