Validated 70-412 Dumps Questions 2021

Want to know 70 412 dumps features? Want to lear more about microsoft 70 412 experience? Study 70 412 vce. Gat a success with an absolute guarantee to pass Microsoft 70-412 (Configuring Advanced Windows Server 2012 Services) test on your first attempt.

Microsoft 70-412 Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest functional level is Windows Server 2012 R2.
You have a domain controller named DC1.
On DC1, you create a new Group Policy object (GPO) named GPO1. You need to verify that GPO1 was replicated to all of the domain controllers.
Which tool should you use?

  • A. Group Policy Management
  • B. Active Directory Sites and Services
  • C. DFS Management
  • D. Active Directory Administrative Center

Answer: A

Explanation: In Windows Server 2012, the Group Policy Management Console (GPMC) was enhanced to provide a report for the overall health state of the Group Policy infrastructure for a domain, or to scope the health view to a single GPO.
Reference: Check Group Policy Infrastructure Status http://technet.microsoft.com/en-us/library/jj134176.aspx

NEW QUESTION 2
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.
You add two additional nodes in Cluster1.
You have a folder named Folder1 on Server1 that hosts Application data. Folder1 is a folder target in a Distributed File System (DFS) namespace.
You need to provide highly available access to Folder1. The solution must support DFS Replication to Folder1.
What should you configure?

  • A. Affinity-None
  • B. Affinity-Single
  • C. The cluster quorum settings
  • D. The failover settings
  • E. A file server for general use
  • F. The Handling priority
  • G. The host priority
  • H. Live migration
  • I. The possible owner
  • J. The preferred owner
  • K. Quick migration
  • L. The Scale-Out File Server

Answer: E

Explanation: File Server for general use
70-412 dumps exhibit
Note: You can deploy and configure a clustered file server by using either of the following methods:
* File Server for general use.
This is the continuation of the clustered file server that has been supported in Windows Server since the introduction of Failover Clustering. This type of clustered file server, and therefore all the shares associated with the clustered file server, is online on one node at a time. This is sometimes referred to as active-passive or dual-active. File shares associated with this type of clustered file server are called clustered file shares. This is the recommended file server type when deploying information worker scenarios.
* Scale-Out File Server for application data
This clustered file server feature was introduced in Windows Server 2012, and it lets you store server application data, such as Hyper-V virtual machine files, on file shares, and obtain a similar level of reliability, availability, manageability, and high performance that you would expect from a storage area network. All file shares are simultaneously online on all nodes. File shares associated with this type of clustered file server are called scale-out file shares. This is sometimes referred to as active-active. This is the recommended file server type when deploying either Hyper-V over Server Message Block (SMB) or Microsoft SQL Server over SMB.
Reference: Scale-Out File Server for Application Data Overview

NEW QUESTION 3
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are configured as shown in the following table.
70-412 dumps exhibit
You need to ensure that when new targets are added to Server1, the targets are registered on Server2 automatically.
What should you do on Server1?

  • A. Configure the Discovery settings of the iSCSI initiator.
  • B. Configure the security settings of the iSCSI target.
  • C. Run the Set-WmiInstance cmdlet.
  • D. Run the Set-IscsiServerTarget cmdlet.

Answer: C

Explanation: Explanation/Reference:
Manage iSNS server registration
The iSNS server registration can be done using the following cmdlets, which manages the WMI objects.
To add an iSNS server:
Set-WmiInstance -Namespace rootwmi -Class WT_iSNSServer –Arguments
@{ServerName="ISNSservername"}
Note: The Set-WmiInstance cmdlet creates or updates an instance of an existing WMI class. The created or updated instance is written to the WMI repository.
Reference: iSCSI Target cmdlet reference http://blogs.technet.com/b/filecab/archive/2012/06/08/iscsi-target-cmdlet-reference.aspx

NEW QUESTION 4
Your network contains an Active Directory domain named contoso.com. The domain contains an IP Address Management (IPAM) server that uses a Windows Internal Database.
You install a Microsoft SQL Server 2012 instance on a new server. You need to migrate the IPAM database to the SQL Server instance. Which cmdlet should you run?

  • A. Disable-IpamCapability
  • B. Set-IpamConfiguration
  • C. Update-IpamServer
  • D. Move-IpamDatabase

Answer: D

Explanation: The Move-IpamDatabase cmdlet migrates the IP Address Management (IPAM) database to a Microsoft SQL Server database. You can migrate from Windows Internal Database (WID) or from a SQL Server database. The cmdlet creates a new IPAM schema and copies all data from the existing IPAM database. After the cmdlet completes copying data, it changes IPAM configuration settings to refer to the new database as the IPAM database.
Reference: Move-IpamDatabase

NEW QUESTION 5
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2.
You configure a new failover cluster named Cluster1. Server1 and Server2 are nodes in Cluster1. You need to configure the disk that will be used as a witness disk for Cluster1.
How should you configure the witness disk?
To answer, drag the appropriate configurations to the correct location or locations. Each configuration may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
70-412 dumps exhibit

    Answer:

    Explanation: Disk witness requirements include:
    * Basic disk with a single volume
    * Can be formatted with NTFS or ReFS

    NEW QUESTION 6
    Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1 that runs a Server Core Installation of Windows Server 2012 R2.
    File1 has a volume named D that contains home folders. File1 creates a shadow copy of volume D twice a day.
    You discover that volume D is almost full. You add a new volume named H to File1.
    You need to ensure that the shadow copies of volume D are stored on volume H. Which command should you run?

    • A. The Set-Volume cmdlet with the -driveletter parameter
    • B. The vssadmin.exe create shadow command
    • C. The Set-Volume cmdlet with the -path parameter
    • D. The vssadmin.exe add shadowstorage command

    Answer: D

    Explanation: Add ShadowStorage
    Adds a shadow copy storage association for a specified volume.
    Incorrect:
    Not A. Sets or changes the file system label of an existing volume. -DriveLetter Specifies a letter used to identify a drive or volume in the system.
    Not B. Create Shadow
    Creates a new shadow copy of a specified volume.
    Not C. Sets or changes the file system label of an existing volume -Path Contains valid path information.
    Reference: Vssadmin; Set-Volume
    http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx

    NEW QUESTION 7
    Your network contains two servers named HV1 and HV2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed.
    HV1 hosts 25 virtual machines. The virtual machine configuration files and the virtual hard disks are stored in D:VM.
    You shut down all of the virtual machines on HV1. You copy D:VM to D:VM on HV2.
    You need to start all of the virtual machines on HV2. You want to achieve this goal by using the minimum amount of administrative effort.
    What should you do?

    • A. Run the Import-VMInitialReplication cmdlet.
    • B. From HV1, export all virtual machines to D:V
    • C. Copy D:VM to D:VM on HV2 and overwrite the existing file
    • D. On HV2, run the Import Virtual Machine wizard.
    • E. From HV1, export all virtual machines to D:V
    • F. Copy D:VM to D:VM on HV2 and overwrite the existing file
    • G. On HV2, run the New Virtual Machine wizard.
    • H. Run the Import-VM cmdlet.

    Answer: D

    Explanation: Import-VM
    Imports a virtual machine from a file.
    Example
    Imports the virtual machine from its configuration file. The virtual machine is registered in- place, so its files are not copied.
    Windows PowerShell
    PS C:> Import-VM –Path 'D:TestVirtualMachines5AE40946-3A98-428E-8C83- 081A3C6BD18C.XML'
    Reference: Import-VM

    NEW QUESTION 8
    Your network contains one Active Directory domain named contoso.com.
    From the Group Policy Management console, you view the details of a Group Policy object (GPO) named GPO1 as shown in the exhibit. (Click theExhibitbutton.)
    You need to ensure that the comments field of GPO1 contains a detailed description of GPO1.
    What should you do? Exhibit: * Missing*

    • A. From Group Policy Management, click View, and then click Customize.
    • B. From Active Directory Users and Computers, edit the properties of contoso.com/System/Policies/{229DCD27-9D98-ACC2-A6AE –ED765F065FF5}.
    • C. Open GPO1 in the Group Policy Management Editor, and then modify the properties of GPO1.
    • D. From Notepad, edit \contoso.comSYSVOLcontoso.comPolicies{229DCD27-9D98- ACC2-A6AE –ED765F065FF5}gpt.ini.

    Answer: C

    Explanation: You can include comments for each Group Policy object. You can use this space to document the Group Policy object and why its implementation is important to your environment. Commenting GPOs allows you to later use keyword filter to help you quickly find GPOs with matching keywords.
    Adding a comment to a Group Policy object
    ✑ Open the Group Policy Management Console. Expand the Group Policy Objects node.
    ✑ Right-click the Group Policy object you want to comment and then click Edit .
    ✑ In the console tree, right-click the name of the Group Policy object and then click Properties .
    ✑ Click the Comment tab.
    ✑ Type your comments in the Comment box.
    ✑ Click OK
    Reference: Comment a Group Policy Object https://technet.microsoft.com/en-us/library/cc770974.aspx

    NEW QUESTION 9
    HOTSPOT
    Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a server named Server1. Both servers run Windows Server 2012 R2.
    You configure the classification of a share on Server1 as shown in the Share1 Properties exhibit. (Click the Exhibit button.)
    70-412 dumps exhibit
    You configure the resource properties in Active Directory as shown in the Resource Properties exhibit. (Click the Exhibit button.)
    70-412 dumps exhibit
    You need to ensure that the Impact classification can be assigned to Share1 immediately.
    Which cmdlet should you run on each server?
    To answer, select the appropriate cmdlet for each server in the answer area.
    70-412 dumps exhibit
    70-412 dumps exhibit

      Answer:

      Explanation: * Set-AdResourceProperty
      The Set-ADResourceProperty cmdlet can be used to modify a resource property in Active Directory.
      * Update-FsrmClassificationPropertyDefinition
      The Update-FsrmClassificationPropertyDefinition cmdlet synchronizes the classification property definitions on the server with the Resource property definitions in Active Directory Domain Service (AD DS).

      NEW QUESTION 10
      HOTSPOT
      Your network contains an Active Directory domain named contoso.com. The domain contains the two servers.
      The servers are configured as shown in the following table.
      70-412 dumps exhibit
      You investigate a report about the potential compromise of a private key for a certificate issued to Server2.
      You need to revoke the certificate issued to Server2. The solution must ensure that the revocation can be reverted.
      Which reason code should you select?
      To answer, select the appropriate reason code in the answer area.
      70-412 dumps exhibit

        Answer:

        Explanation: If you specify "Certificate Hold" as the reason for revoking the certificate, it typically means that you may want to unrevoke the certificate at a future time. Only certificates that have been revoked with the reason of "Certificate Hold" can be unrevoked.

        NEW QUESTION 11
        A user named User1 is a member of the local Administrators group on Node1 and Node2.
        User1 creates a new clustered File Server role named File1 by using the File Server for general use option.
        A report is generated during the creation of File1 as shown in the exhibit. (Click the Exhibit button.)
        70-412 dumps exhibit
        File1 fails to start.
        You need to ensure that you can start File1. What should you do?

        • A. Log on to the domain by using the built-in Administrator for the domain, and then recreate the clustered File Server role by using the File Server for general use option.
        • B. Assign the user account permissions of User1 to the Servers OU.
        • C. Assign the computer account permissions of Cluster2 to the Servers OU.
        • D. Increase the value of the ms-DS-MachineAccountQuota attribute of the domain.
        • E. Recreate the clustered File Server role by using the File Server for scale-out application data option.

        Answer: B

        Explanation: Scenario: You have created a Windows Server 2012 Scale-Out File Server. The cluster, including the network and storage, pass the cluster validation test. Everything looks and is good. You create a File Server role for application data (SOFS) but it fails to start.
        Problem: Basically, the cluster needs permissions to create a computer object (for the SOFS) in the same Active Directory OU that the cluster object (Demo-FSC1) is stored in.
        Resolution: Reconfigure the permissions on the Servers OU.
        In this case we assign the user account permissions of User1 to the Servers OU.
        Reference: Scale-Out File Server Role Fails To Start With Event IDs 1205, 1069, and 1194 http://www.aidanfinn.com/?p=14142

        NEW QUESTION 12
        Your network contains two Active Directory forests named contoso.com and adatum.com.
        A two-way forest trust exists between the forests. The contoso.com forest contains an enterprise certification authority (CA) named Server1.
        You implement cross-forest certificate enrollment between the contoso.com forest and the adatum.com forest.
        On Server1, you create a new certificate template named Template1.
        You need to ensure that users in the adatum.com forest can request certificates that are based on Template1.
        Which tool should you use?

        • A. DumpADO.ps1
        • B. Repadmin
        • C. Add-CATemplate
        • D. Certutil
        • E. PKISync.ps1

        Answer: E

        Explanation: B. Repadmin.exe helps administrators diagnose Active Directory replication problems between domain controllers running Microsoft Windows operating systems.
        C. Adds a certificate template to the CA.
        D. Use Certutil.exe to dump and display certification authority (CA) configuration information, configure Certificate Services, backup and restore CA components, and verify certificates, key pairs, and certificate chains.
        E. PKISync.ps1 copies objects in the source forest to the target forest http://technet.microsoft.com/en-us/library/ff955845(v=ws.10).aspx#BKMK_Consolidating http://technet.microsoft.com/en-us/library/cc770963(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh848372.aspx http://technet.microsoft.com/library/cc732443.aspx
        http://technet.microsoft.com/en-us/library/ff961506(v=ws.10).aspx
        70-412 dumps exhibit

        NEW QUESTION 13
        Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
        Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. Cluster1 hosts 10 virtual machines. All of the virtual machines run Windows Server 2012 R2 and are members of the domain.
        You need to ensure that the first time a service named Service1 fails on a virtual machine, the virtual machine is moved to a different node.
        You configure Service1 to be monitored from Failover Cluster Manager. What should you configure on the virtual machine?

        • A. From the Recovery settings of Service1, set the First failure recovery action to Take No Action.
        • B. From the General settings, modify the Startup type.
        • C. From the Recovery settings of Service1, set the First failure recovery action to Restart the Service.
        • D. From the General settings, modify the Service status.

        Answer: A

        Explanation: When a monitored service fails the Recovery features of the service will take action. Example:
        70-412 dumps exhibit
        Service Recovery
        In this case for the first failure the service will be restarted by the Service Control Manager inside the guest operating system, if the service fails for a second time the service will again be restarted via guest operating system. In case of a third failure the Service Control Manager will take no action and the Cluster service running on the Hyper-V host will take over recovery actions.
        Reference: How to configure VM Monitoring in Windows Server 2012

        NEW QUESTION 14
        HOTSPOT
        You have a file server named Server1 that runs Windows Server 2012 R2.
        Server1 contains a file share that must be accessed by only a limited number of users.
        You need to ensure that if an unauthorized user attempts to access the file share, a custom access-denied message appears, which contains a link to request access to the share. The message must not appear when the unauthorized user attempts to access other shares.
        Which two nodes should you configure in File Server Resource Manager? To answer, select the appropriate two nodes in the answer area.
        70-412 dumps exhibit

          Answer:

          Explanation: * Configure access-denied assistance
          To configure access-denied assistance by using File Server Resource Manager
          1. Open File Server Resource Manager. In Server Manager, click Tools, and then click File Server Resource Manager.
          2. Right-click File Server Resource Manager (Local), and then click Configure Options. etc.
          * To specify a separate access-denied message for a shared folder by using File Server Resource Manager
          1. Open File Server Resource Manager. In Server Manager, click Tools, and then click File Server Resource Manager.
          2. Expand File Server Resource Manager (Local), and then click Classification Management.
          3. Right-click Classification Properties, and then click Set Folder Management Properties. Etc

          NEW QUESTION 15
          Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC2 that runs Windows Server 2012 R2. DC2 has the DHCP Server server role installed.
          DHCP is configured as shown in the exhibit. (Click the Exhibit button.)
          70-412 dumps exhibit
          You discover that client computers cannot obtain IPv4 addresses from DC2.
          You need to ensure that the client computers can obtain IPv4 addresses from DC2. What should you do?

          • A. Disable the Deny filters.
          • B. Enable the Allow filters.
          • C. Authorize DC2.
          • D. Restart the DHCP Server service

          Answer: C

          Explanation: From the exhibit we see a red marker on the IPv4 server icon. The DHCP server is not authorized.
          Authorize DHCP Server
          The final step is to authorize the server. Right-click your FQDN and select Authorize.
          Refresh the view by right-clicking your FQDN and selecting Refresh. You should now see green check mark next to IPv4.
          Example:
          70-412 dumps exhibit
          Reference: Server 2012 DHCP Server Role

          NEW QUESTION 16
          Your network contains an Active Directory forest.
          The forest contains two domains named contoso.com and fabrikam.com. The functional level of the forest is Windows Server 2003.
          You have a domain outside the forest named litwareinc.com.
          You need to configure an access solution to meet the following requirements:
          ✑ Users in litwareinc.com must be able to access resources on a server named Server1 in contoso.com.
          ✑ Users in the contoso.com forest must be prevented from accessing any resources
          in litwareinc.com.
          ✑ Users in litwareinc.com must be prevented from accessing any other resources in the contoso.com forest.
          Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

          • A. Configure SID filtering on the trust.
          • B. Configure forest-wide authentication on the trust.
          • C. Create a one-way forest trust.
          • D. Create a one-way external trust
          • E. Modify the permission on the Server1 object.
          • F. Configure selective authentication on the trust.

          Answer: DEF

          NEW QUESTION 17
          Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
          Both servers have the Hyper-V server role installed.
          The servers have the hardware configurations shown in the following table.
          70-412 dumps exhibit
          Server1 hosts five virtual machines that run Windows Server 2012 R2. You need to move the virtual machines from Server1 to Server2.
          The solution must minimize downtime.
          What should you do for each virtual machine?

          • A. Export the virtual machines from Server1 and import the virtual machines to Server2.
          • B. Perform a live migration.
          • C. Perform a quick migration.
          • D. Perform a storage migration.

          Answer: A

          Explanation: None of these migration options will work between different Processors ( AMD/Intel). The only option remaining is to export and re-import the VMs

          Recommend!! Get the Full 70-412 dumps in VCE and PDF From Certleader, Welcome to Download: https://www.certleader.com/70-412-dumps.html (New 435 Q&As Version)