This page was exported from All The Latest MCTS Exam Questions And Answers For Free Share [ https://www.mctsdump.com ] Export date:Thu Nov 21 15:55:04 2024 / +0000 GMT ___________________________________________________ Title: (New Version) Free Passleader Microsoft 70-412 PDF Dumps With New Update Exam Questions (21-40) --------------------------------------------------- How To 100% Pass 70-412 Exam: Exam 70-412 have been changed with many new questions, if you want to pass exam easily, you should take the new 70-412 346q exam questions into your heart, and we PassLeader now are offering the latest and updated 70-412 346q braindumps with VCE and PDF format, we have added all the new eaxm questions into our files and will help you 100% passing 70-412 exam. QUESTION 21Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed. The network contains an enterprise certification authority (CA). All servers are enrolled automatically for a certificate-based on the Computer certificate template. On Server1, you have a virtual machine named VM1. VM1 is replicated to Server2. You need to encrypt the replication of VM1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A.    On Server1, modify the settings of VM1.B.    On Server2, modify the settings of VM1.C.    On Server2, modify the Hyper-V Settings.D.    On Server1, modify the Hyper-V Settings.E.    On Server1, modify the settings of the virtual switch to which VM1 is connected.F.    On Server2, modify the settings of the virtual switch to which VM1 is connected. Answer: ACExplanation:Answer is A and C, not A and F. Virtual Switch has nothing to do with this scenario based many sites I've visited even TechNet. And added a couple examples with Enterprise CA as well.C. - Is Server 2, modify settings of Hyper-V=>Replica Server. then all the Encryption Reqs. TCP-443/SSL. QUESTION 22Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. You create a user account named User1 in the domain. You need to ensure that User1 can use Windows Server Backup to back up Server1. The solution must minimize the number of administrative rights assigned to User1. What should you do? A.    Add User1 to the Backup Operators group.B.    Add User1 to the Power Users group.C.    Assign User1 the Backup files and directories user right and the Restore files and directories user right.D.    Assign User1 the Backup files and directories user right. Answer: D QUESTION 23You have a server named Server1 that runs Windows Server 2012 R2 and is used for testing. A developer at your company creates and installs an unsigned kernel-mode driver on Server1. The developer reports that Server1 will no longer start. You need to ensure that the developer can test the new driver. The solution must minimize the amount of data loss. Which Advanced Boot Option should you select? A.    Disable Driver Signature EnforcementB.    Disable automatic restart on system failureC.    Last Know Good Configuration (advanced)D.    Repair Your Computer Answer: AExplanation:A. By default, 64-bit versions of Windows Vista and later versions of Windows will load a kernel- mode driver only if the kernel can verify the driver signature. However, this default behavior can be disabled to facilitate early driver development and non-automated testing. B. specifies that Windows automatically restarts your computer when a failure occurs.C. Developer would not be able to test the driver as needed.D. Removes or repairs critical windows files, Developer would not be able to test the driver as needed and some file loss.http://technet.microsoft.com/en-us/library/jj134246.aspx http://msdn.microsoft.com/en-us/library/windows/hardware/ff547565(v=vs.85).aspx QUESTION 24Hotspot QuestionYour network contains an Active Directory domain named contoso.com. You have a Dynamic Access Control policy named Policy1. You create a new Central Access Rule named Rule1. You need to add Rule1 to Policy1. What command should you run? To answer, select the appropriate options in the answer area. Answer: QUESTION 25Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. You add two additional nodes in Cluster1. You have a folder named Folder1 on Server1 that hosts application data. Folder1 is a folder target in a Distributed File System (DFS) namespace. You need to provide highly available access to Folder1. The solution must support DFS Replication to Folder1. What should you configure? A.    Affinity-NoneB.    Affinity-SingleC.    The cluster quorum settingsD.    The failover settingsE.    A file server for general useF.    The Handling priorityG.    The host priorityH.    Live migrationI.    The possible ownerJ.    The preferred ownerK.    Quick migrationL.    The Scale-Out File Server Answer: E QUESTION 26Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. Port rules are configured for all clustered applications. You need to ensure that Server2 handles all client requests to the cluster that are NOT covered by a port rule. What should you configure? A.    Affinity-NoneB.    Affinity-SingleC.    The cluster quorum settingsD.    The failover settingsE.    A file server for general useF.    The Handling priorityG.    The host priorityH.    Live migrationI.    The possible ownerJ.    The preferred ownerK.    Quick migrationL.    The Scale-Out File Server Answer: GExplanation:http://technet.microsoft.com/en-us/library/bb742455.aspx QUESTION 27Hotspot QuestionYour network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2. Server1 and 5erver2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains an application named App1 that is accessed by using the name appl.contoso.com. The NLB cluster has the port rules configured as shown in the exhibit. (Click the Exhibit button.)To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. Answer: QUESTION 28Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. The functional level of the forest is Windows Server 2003. You have a domain outside the forest named adatum.com. You need to configure an access solution to meet the following requirements:- Users in adatum.com must be able to access resources in contoso.com. - Users in adatum.com must be prevented from accessing resources in fabrikam.com. - Users in both contoso.com and fabrikam.com must be prevented from accessing resources in adatum.com.What should you create? A.    a one-way realm trust from contoso.com to adatum.comB.    a one-way realm trust from adatum.com to contoso.comC.    a one-way external trust from contoso.com to adatum.comD.    a one-way external trust from adatum.com to contoso.com Answer: CExplanation:domain names were changed, so understand the question well.You need to make trust relationship where domain contoso.com trusts adatum.com.http://technet.microsoft.com/en-us/library/cc728024(v=ws.10).aspx QUESTION 29Your network contains an Active Directory domain named contoso.com. The domain contains a main office and a branch office. An Active Directory site exists for each office. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers. DC1 hosts an Active Directory- integrated zone for contoso.com. You add the DNS Server server role to DC2. You discover that the contoso.com DNS zone fails to replicate to DC2. You verify that the domain, schema, and configuration naming contexts replicate from DC1 to DC2. You need to ensure that DC2 replicates the contoso.com zone by using Active Directory replication. Which tool should you use? A.    DnscmdB.    DnslintC.    RepadminD.    NtdsutilE.    DNS ManagerF.    Active Directory Sites and ServicesG.    Active Directory Domains and TrustsH.    Active Directory Users and Computers Answer: FExplanation:http://technet.microsoft.com/en-us/library/cc739941(v=ws.10).aspx If you see question about AD Replication, First preference is AD sites and services, then Repadmin and then DNSLINT. QUESTION 30Your network contains an Active Directory forest named contoso.com. The forest contains four domains. All servers run Windows Server 2012 R2. Each domain has a user named User1. You have a file server named Server1 that is used to synchronize user folders by using the Work Folders role service. Server1 has a work folder named Sync1. You need to ensure that each user has a separate folder in Sync1. What should you do? A.    From Windows Explorer, modify the Sharing properties of Sync1.B.    Run the Set-SyncServerSetting cmdlet.C.    From File and Storage Services in Server Manager, modify the properties of Sync1.D.    Run the Set-SyncShare cmdlet. Answer: DExplanation:http://technet.microsoft.com/en-US/library/dn296649.aspxPS C:> Set-SyncShare Share01 -User "ContosoGroup" http://www.passleader.com/70-412.html QUESTION 31You have a server named Server1 that runs Windows Server 2012 R2. From Server Manager, you install the Active Directory Certificate Services server role on Server1. A domain administrator named Admin1 logs on to Server1. When Admin1 runs the Certification Authority console, Admin1 receive the following error message.You need to ensure that when Admin1 opens the Certification Authority console on Server1, the error message does not appear. What should you do? A.    Run the Install-AdcsCertificationAuthority cmdlet.B.    Install the Active Directory Certificate Services (AD CS) tools.C.    Modify the PATH system variable.D.    Add Admin1 to the Cert Publishers group. Answer: B QUESTION 32Hotspot QuestionYour network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a server named Server1. Both servers run Windows Server 2012 R2. You configure the classification of a share on Server1 as shown in the Share1 Properties exhibit. (Click the Exhibit button.) You configure the resource properties in Active Directory as shown in the Resource Properties exhibit. (Click the Exhibit button.)You need to ensure that the Impact classification can be assigned to Share1 immediately. Which cmdlet should you run on each server? To answer, select the appropriate cmdlet for each server in the answer area. Answer: QUESTION 33Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DHCP Server server role installed. DHCP is configured as shown in the exhibit. (Click the Exhibit button.)You discover that client computers cannot obtain IPv4 addresses from DC1. You need to ensure that the client computers can obtain IPv4 addresses from DC1. What should you do? A.    Activate the scope.B.    Authorize DC1.C.    Disable the Allow filters.D.    Disable the Deny filters. Answer: CExplanation:There is no items in the deny List. So it means that client computers MAC addresses is not listed in the allow list. So we have to disable the "Allow Filters" http://technet.microsoft.com/en-us/library/ee956897(v=ws.10).aspx QUESTION 34Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 and a domain controller named DC1. All servers run Windows Server 2012 R2. A Group Policy object (GPO) named GPO1 is linked to the domain. Server1 contains a folder named Folder1. Folder1 is shared as Share1. You need to ensure that authenticated users can request assistance when they are denied access to the resources on Server1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A.    Assign the Read Attributes NTFS permission on Folder1 to the Authenticated Users group.B.    Install the File Server Resource Manager role service on Server1.C.    Configure the Customize message for Access Denied errors policy setting of GPO1.D.    Enable the Enable access-denied assistance on client for all file types policy setting for GPO1.E.    Install the File Server Resource Manager role service on DC1. Answer: BDExplanation:http://technet.microsoft.com/en-us/library/hh831402.aspx#BKMK_1 QUESTION 35Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2008 R2. The domain contains a file server named Server6 that runs Windows Server 2012 R2. Server6 contains a folder named Folder1. Folder1 is shared as Share1. The NTFS permissions on Folder1 are shown in the exhibit. (Click the Exhibit button.)The domain contains two global groups named Group1 and Group2. You need to ensure that only users who are members of both Group1 and Group2 are denied access to Folder1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A.    Remove the Deny permission for Group1 from Folder1.B.    Deny Group2 permission to Folder1.C.    Install a domain controller that runs Windows Server 2012 R2.D.    Create a conditional expression.E.    Deny Group2 permission to Share1.F.    Deny Group1 permission to Share1. Answer: CDExplanation:* Conditional Expressions for Permission Entries Windows Server 2008 R2 and Windows 7 enhanced Windows security descriptors by introducing a conditional access permission entry. Windows Server 2012 R2 takes advantage of conditional access permission entries by inserting user claims, device claims, and resource properties, into conditional expressions. Windows Server 2012 R2 security evaluates these expressions and allows or denies access based on results of the evaluation. Securing access to resources through claims is known as claims-based access control. Claims-based access control works with traditional access control to provide an additional layer of authorization that is flexible to the varying needs of the enterprise environment. http://social.technet.microsoft.com/wiki/contents/articles/14269.introducing-dynamicaccess-control-en-us.aspx QUESTION 36Drag and Drop QuestionYour network contains an Active Directory forest. The forest contains a single domain named contoso.com. The forest contains two Active Directory sites named Main and Branch1. The sites connect to each other by using a site link named Main-Branch1. There are no other site links. Each site contains several domain controllers. All domain controllers run Windows Server 2012 R2. Your company plans to open a new branch site named Branch2. The new site will have a WAN link that connects to the Main site only. The site will contain two domain controllers that run Windows Server 2012 R2. You need to create a new site and a new site link for Branch2. The solution must ensure that the domain controllers in Branch2 only replicate to the domain controllers in Branch1 if all of the domain controllers in Main are unavailable. Which three actions should you perform? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. Answer: QUESTION 37Drag and Drop QuestionYour network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server3. The network contains a standalone server named Server2. All servers run Windows Server 2012 R2. The servers are configured as shown in the following table.Server3 hosts an application named App1. App1 is accessible internally by using the URL https://appl.contoso.com. App1 only supports Integrated Windows authentication. You need to ensure that all users from the Internet are pre-authenticated before they can access App1. What should you do? To answer, drag the appropriate servers to the correct actions. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. Answer: QUESTION 38Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed. Server1 and Server2 are configured as Hyper-V replicas of each other. Server1 hosts a virtual machine named VM1. VM1 is replicated to Server2. You need to verify whether the replica of VM1 on Server2 is functional. The solution must ensure that VM1 remains accessible to clients. What should you do from Hyper-V Manager? A.    On Server1, execute a Planned Failover.B.    On Server1, execute a Test Failover.C.    On Server2, execute a Planned Failover.D.    On Server2, execute a Test Failover. Answer: B QUESTION 39You have a failover cluster named Cluster1 that contains four nodes. All of the nodes run Windows Server 2012 R2. You need to force every node in Cluster1 to contact immediately the Windows Server Update Services (WSUS) server on your network for updates. Which tool should you use? A.    The Add-CauClusterRole cmdletB.    The Wuauclt commandC.    The Wusa commandD.    The Invoke-CauScan cmdlet Answer: DExplanation:A. Adds the Cluster-Aware Updating (CAU) clustered role that provides the self-updating functionality to the specified cluster.B. The wuauclt utility allows you some control over the functioning of the Windows Update Agent C. The Wusa.exe file is in the %windir%System32 folder. The Windows Update Standalone Installer uses the Windows Update Agent API to install update packages. Update packages have an .msu file name extension. The .msu file name extension is associated with the Windows Update Standalone Installer.D. Performs a scan of cluster nodes for applicable updates and returns a list of the initial set of updates that would be applied to each node in a specified cluster. http://technet.microsoft.com/en-us/library/hh847235(v=wps.620).aspx http://technet.microsoft.com/en-us/library/cc720477(v=ws.10).aspx http://support.microsoft.com/kb/934307http://technet.microsoft.com/en-us/library/hh847228(v=wps.620).aspx QUESTION 40Your network contains an Active Directory domain named contoso.com. The network contains a file server named Server1 that runs Windows Server 2012 R2. You are configuring a central access policy for temporary employees. You enable the Department resource property and assign the property a suggested value of Temp. You need to configure a target resource condition for the central access rule that is scoped to resources assigned to Temp only. Which condition should you use? A.    (Temp.Resource Equals "Department")B.    (Resource.Temp Equals "Department")C.    (Resource.Department Equals "Temp")D.    (Department.Value Equals "Temp") Answer: CExplanation:http://technet.microsoft.com/fr-fr/library/hh846167.aspx http://www.passleader.com/70-412.html --------------------------------------------------- Images: http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/PassLeader-70-412-Exam-Dumps16.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/241_thumb_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/242_thumb_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/271_thumb_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/272_thumb1_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/273_thumb1_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/PassLeader-70-412-Exam-Dumps25.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/311_thumb_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/321_thumb1_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/322_thumb2_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/323_thumb2_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/331_thumb1_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/351_thumb1_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/361_thumb1_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/362_thumb4_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/371_thumb2_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/372_thumb1_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/373_thumb2_thumb.jpg http://www.itexamquiz.com/passleader/plimages/ec6047c1ed87_F7FA/PassLeader-70-412-Exam-Dumps26.jpg --------------------------------------------------- --------------------------------------------------- Post date: 2015-01-15 09:40:24 Post date GMT: 2015-01-15 09:40:24 Post modified date: 2015-01-15 09:40:24 Post modified date GMT: 2015-01-15 09:40:24 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com