★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-412 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-412-dumps.html


Downloadable of 70 412 dumps free question materials and practice for Microsoft certification for IT candidates, Real Success Guaranteed with Updated 70 412 exam pdf dumps vce Materials. 100% PASS Configuring Advanced Windows Server 2012 Services exam Today!

Q91. Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. The functional level of the forest is Windows Server 2003. 

You have a domain outside the forest named adatum.com. 

You need to configure an access solution to meet the following requirements: 

* Users in adatum.com must be able to access resources in contoso.com. 

* Users in adatum.com must be prevented from accessing resources in fabrikam.com. 

* Users in both contoso.com and fabrikam.com must be prevented from accessing resources in adatum.com. 

What should you create? 

A. a one-way realm trust from contoso.com to adatum.com 

B. a one-way realm trust from adatum.com to contoso.com 

C. a one-way external trust from contoso.com to adatum.com 

D. a one-way external trust from adatum.com to contoso.com 

Answer:

Explanation: 

The contoso domain must trust the adatum domain. 

Note: In a One-way: incoming trust, users in your (trusted) domain can be authenticated in 

the other (trusting) domain. Users in the other domain cannot be authenticated in your 

domain. 

Incorrect: 

Not A, not B. Use realm trusts to form a trust relationship between a non-Windows 

Kerberos realm and a Windows Server domain. 

Not D. The resources that are to be shared are in the contoso domain. 

Reference: Trust types 


Q92. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 

You are creating a file management task as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that the Include all folders that store the following kinds of data list displays an entry named Corporate Data. 

What should you do? 

A. Create a new file group. 

B. Create a new classification property. 

C. Modify the properties of the System Files file group. 

D. Modify the Folder Usage classification property. 

Answer:

Explanation: 

Classification properties are used to assign values to files. Reference: Working with File Classification 


Q93. HOTSPOT 

Your network contains two Hyper-V hosts that are configured as shown in the following table. 

You create a virtual machine on Server1 named VM1. 

You plan to export VM1 from Server1 and import VM1 to Server2. 

You need to ensure that you can start the imported copy of VM1 from snapshots. 

What should you configure on VM1? 

To answer, select the appropriate node in the answer area. 

Answer: 


Q94. Your network contains an Active Directory forest named adatum.com. The forest contains a single domain. The domain contains four servers. The servers are configured as shown in the following table. 

You need to update the schema to support a domain controller that will run Windows Server 2012 R2. 

On which server should you run adprep.exe? 

A. Server1 

B. DC3 

C. DC2 

D. DC1 

Answer:

Explanation: 

We must use the Windows Server 2008 R2 Server. 

Upgrade Domain Controllers to Windows Server 2012 R2 and Windows Server 2012 

You can use adprep.exe on domain controllers that run 64-bit versions of Windows Server 2008 or Windows Server 2008 R2 to upgrade to Windows Server 2012. You cannot upgrade domain controllers that run Windows Server 2003 or 32-bit versions of Windows Server 2008. To replace them, install domain controllers that run a later version of Windows Server in the domain, and then remove the domain controllers that Windows Server 2003. 

Reference: Upgrade Domain Controllers to Windows Server 2012 R2 and Windows Server 2012, Supported in-place upgrade paths. 

http://technet.microsoft.com/en-us/library/hh994618.aspx#BKMK_UpgradePaths 


Q95. DRAG DROP 

Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains an Active Directory Rights Management Services (AD RMS) root cluster. All servers run Windows Server 2012 R2. 

You need to ensure that the rights account certificates issued in adatum.com are accepted by the AD RMS root cluster in contoso.com. 

What should you do in each forest? 

To answer, drag the appropriate actions to the correct forests. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q96. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

You are creating a central access rule named TestFinance that will be used to grant members of the Authenticated users group access to a folder stored on a Microsoft SharePoint Server 2013 server. 

You need to ensure that the permissions are granted when the rule is published. 

What should you do? 

A. Set the Permissions to Use the following permissions as proposed permissions. 

B. Set the Permissions to Use following permissions as current permissions. 

C. Add a Resource condition to the current permissions entry for the Authenticated Users principal. 

D. Add a User condition to the current permissions entry for the Authenticated Users principal. 

Answer:

Explanation: 

To create a central access rule (see step 5 below): In the left pane of the Active Directory Administrative Center, click Tree View, select Dynamic Access Control, and then click Central Access Rules. Right-click Central Access Rules, click New, and then click Central Access Rule. In the Name field, type Finance Documents Rule. In the Target Resources section, click Edit, and in the Central Access Rule dialog box, click Add a condition. Add the following condition: [Resource] [Department] [Equals] [Value] [Finance], and then click OK. In the Permissions section, select Use following permissions as current permissions, click Edit, and in the Advanced Security Settings for Permissions dialog box click Add. 

Note (not A): Use the following permissions as proposed permissions option lets you create the policy in staging. 

6. In the Permission entry for Permissions dialog box, click Select a principal, type Authenticated Users, and then click OK. 

Etc. 

Incorrect: 

Not A. Proposed permissions enable an administrator to more accurately model the impact 

of potential changes to access control settings without actually changing them. 

Reference: Deploy a Central Access Policy (Demonstration Steps) 

https://technet.microsoft.com/en-us/library/hh846167.aspx 


Q97. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. Cluster1 hosts 10 virtual machines. All of the virtual machines run Windows Server 2012 R2 and are members of the domain. 

You need to ensure that the first time a service named Service1 fails on a virtual machine, the virtual machine is moved to a different node. 

You configure Service1 to be monitored from Failover Cluster Manager. 

What should you configure on the virtual machine? 

A. From the Recovery settings of Service1, set the First failure recovery action to Take No Action. 

B. From the General settings, modify the Startup type. 

C. From the Recovery settings of Service1, set the First failure recovery action to Restart the Service. 

D. From the General settings, modify the Service status. 

Answer:

Explanation: 

When a monitored service fails the Recovery features of the service will take action. 

Example: 

Service Recovery 

In this case for the first failure the service will be restarted by the Service Control Manager inside the guest operating system, if the service fails for a second time the service will again be restarted via guest operating system. In case of a third failure the Service Control Manager will take no action and the Cluster service running on the Hyper-V host will take over recovery actions. 

Reference: How to configure VM Monitoring in Windows Server 2012 


Q98. You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2. 

You fail to start VM1 and you suspect that the boot files on VM1 are corrupt. 

On Server1, you attach the virtual hard disk (VHD) of VM1 and you assign the VHD a drive 

letter of F. 

You need to repair the corrupt boot files on VM1. What should you run? 

A. bootrec.exe /rebuildbcd 

B. bootrec.exe /scanos 

C. bcdboot.exe f:\windows /s c: 

D. bcdboot.exe c:\windows /s f: 

Answer:

Explanation: 

Enables you to quickly set up a system partition, or to repair the boot environment located on the system partition. The system partition is set up by copying a simple set of Boot Configuration Data (BCD) files to an existing empty partition. 

Reference: BCDboot Command-Line Options 


Q99. Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as a standalone certification authority (CA). 

You install a second server named Server2. You install the Online Responder role service on Server2. 

You need to ensure that Server1 can issue an Online Certificate Status Protocol (OCSP) Response Signing certificate to Server2. 

What should you run on Server1? 

A. The certreq.exe command and specify the -policy parameter 

B. The certutil.exe command and specify the -getkey parameter 

C. The certutil.exe command and specify the -setreg parameter 

D. The certreq.exe command and specify the -retrieve parameter 

Answer:

Explanation: To prepare a computer running Windows Server to issue OCSP Response Signing certificates 

On the server hosting the CA, open a command prompt, and type: certutil -v -setreg policy\EnableRequestExtensionList +1.3.6.1.5.5.7.48.1.5 Stop and restart the CA. You can do this at a command prompt by running the following commands: net stop certsvc 

net start certsvc 

Reference: Configure a CA to Support OCSP Responders 

https://technet.microsoft.com/en-us/library/cc732526.aspx 


Q100. Your network contains an Active Directory domain named contoso.com. The domain contains an IP Address Management (IPAM) server that uses a Windows Internal Database. 

You install a Microsoft SQL Server 2012 instance on a new server. 

You need to migrate the IPAM database to the SQL Server instance. 

Which cmdlet should you run? 

A. Disable-IpamCapability 

B. Set-IpamConfiguration 

C. Update-IpamServer 

D. Move-IpamDatabase 

Answer:

Explanation: 

The Move-IpamDatabase cmdlet migrates the IP Address Management (IPAM) database to a Microsoft SQL Server database. You can migrate from Windows Internal Database (WID) or from a SQL Server database. The cmdlet creates a new IPAM schema and copies all data from the existing IPAM database. After the cmdlet completes copying data, it changes IPAM configuration settings to refer to the new database as the IPAM database. 

Reference: Move-IpamDatabase