It is more faster and easier to pass the Microsoft 70-412 exam by using Downloadable Microsoft Configuring Advanced Windows Server 2012 Services questuins and answers. Immediate access to the Most up-to-date 70-412 Exam and find the same core area 70-412 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Mar 70-412 rapidshare

Q51. You have a datacenter that contains six servers. Each server has the Hyper-V server role installed and runs Windows Server 2012 R2. The servers are configured as shown in the following table. 

Host4 and Host5 are part of a cluster named Cluster1. Cluster1 hosts a virtual machine named VM1. 

You need to move VM1 to another Hyper-V host. The solution must minimize the downtime of VM1. 

To which server and by which method should you move VM1? 

A. To Host3 by using a storage migration 

B. To Host6 by using a storage migration 

C. To Host2 by using a live migration 

D. To Host1 by using a quick migration 

Answer:

Explanation: 

With Hyper-V live migration, you can move running VMs from one Hyper-V physical host to 

another without any disruption of service or perceived downtime. 

Host3 has an Intel processer, as does Host4 and Host5 in Cluster1, so the migration will 

work fine. 

Incorrect: 

Not B, not C. The migration of a virtual machine between physical computers is only 

supported on computers that have the same processor steppings or are from the same 

vendor. Therefore you cannot move a virtual machine from a Hyper-V host on an Intel-

based server to a Hyper-V Host on an AMD-based server. 

Not D. Quick Migration saves, moves and restores VMs, which results in some downtime. 

Reference: Hyper-V Migration Guide 

http://technet.microsoft.com/en-us/library/ee849855(v=WS.10).aspx 

Reference: Virtual Machine Storage Migration Overview 

http://technet.microsoft.com/en-us/library/hh831656.aspx 

Reference: Windows Server 2008 R2 & Microsoft Hyper-V Server 2008 R2 - Hyper-V Live 

Migration Overview & Architecture (http://www.microsoft.com/en-us/download/details.aspx?id=12601) 


Q52. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains domain controllers that run either Windows Server 2003, Windows Server 2008 R2, or Windows Server 2012 R2. 

You plan to implement a new Active Directory forest. The new forest will be used for testing and will be isolated from the production network. 

In the test network, you deploy a server named Server1 that runs Windows Server 2012 R2. 

You need to configure Server1 as a new domain controller in a new forest named contoso.test. 

The solution must meet the following requirements: 

. The functional level of the forest and of the domain must be the same as that of contoso.com. . Server1 must provide name resolution services for contoso.test. 

What should you do? 

To answer, configure the appropriate options in the answer area. 

Answer: 


Q53. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the Hyper-V server role installed. 

You plan to replicate virtual machines between Server1 and Server2. The replication will be encrypted by using Secure Sockets Layer (SSL). 

You need to request a certificate on Server1 to ensure that the virtual machine replication is encrypted. 

Which two intended purposes should the certificate for Server1 contain? (Each correct answer presents part of the solution. Choose two.) 

A. Client Authentication 

B. Kernel Mode Code Signing 

C. Server Authentication 

D. IP Security end system 

E. KDC Authentication 

Answer: A,C 

Explanation: 

You need to use certificate-based authentication if you want transmitted data to be encrypted. 

Replica Server Certificate Requirements 

To enable a server to receive replication traffic, the certificate in the replica server must meet the following conditions 

* Enhanced Key Usage must support both Client and Server authentication 

Etc. 

Reference: Hyper-V Replica - Prerequisites for certificate based deployments 

http://blogs.technet.com/b/virtualization/archive/2012/03/13/hyper-v-replica-certificate-requirements.aspx 


Q54. You have a failover cluster named Cluster1 that contains four nodes. All of the nodes run Windows Server 2012 R2. 

You need to force every node in Cluster1 to contact immediately the Windows Server Update Services (WSUS) server on your network for updates. 

Which tool should you use? 

A. The Add-CauClusterRole cmdlet 

B. The Wuauclt command 

C. The Wusa command 

D. The Invoke-CauScan cmdlet 

Answer:

Explanation: 

The Add-CauClusterRole cmdlet adds the Cluster-Aware Updating (CAU) clustered role 

that provides the self-updating functionality to the specified cluster. When the CAU 

clustered role has been added to a cluster, the failover cluster can update itself on the 

schedule that is specified by the user, without requiring an external computer to coordinate 

the cluster updating process. 

Incorrect: 

Not B. The wuauclt utility allows you some control over the functioning of the Windows 

Update Agent. It is updated as part of Windows Update. 

The following are the command line for wuauclt. 

OptionDescription 

/a /ResetAuthorization 

Initiates an asynchronous background search for applicable updates. If Automatic Updates 

is disabled, this option has no effect. 

/r /ReportNow 

Sends all queued reporting events to the server asynchronously. 

/? /h /help 

Shows this help information. 

Not D. 

The Invoke-CauScan cmdlet performs a scan of cluster nodes for applicable updates and 

returns a list of the initial set of updates that would be applied to each node in a specified 

cluster. 

Note: The Invoke-CauRun cmdlet performs a scan of cluster nodes for applicable updates 

and installs those updates via an Updating Run on the specified cluster. 

Reference: Add-CauClusterRole 

http://technet.microsoft.com/en-us/library/hh847235(v=wps.620).aspx 


Q55. Your network contains an Active Directory domain named corp.contoso.com. 

You deploy Active Directory Rights Management Services (AD RMS). 

You have a rights policy template named Template1. Revocation is disabled for the template. 

A user named User1 can open content that is protected by Template1 while the user is connected to the corporate network. 

When User1 is disconnected from the corporate network, the user cannot open the protected content even if the user previously opened the content. 

You need to ensure that the content protected by Template1 can be opened by users who are disconnected from the corporate network. 

What should you modify? 

A. The User Rights settings of Template1 

B. The templates file location of the AD RMS cluster 

C. The Extended Policy settings of Template1 

D. The exclusion policies of the AD RMS cluster 

Answer:

Explanation: 

* The extended rights policy of a template controls how content licenses are to be implemented. The extended rights policy template settings are specified by using the Active Directory Rights Management Services (AD RMS) administration site. The available settings control persistence of author rights, whether trusted browsers are supported, license persistence within the content, and enforcement of any application-specific data. 

* You can add trust policies so that AD RMS can process licensing requests for content that was rights protected. 

Reference: Extended Policy Template Information; AD RMS and Server Design 

http://technet.microsoft.com/en-us/library/ee221071(v=ws.10).aspx 


Most recent 70-412 free practice exam:

Q56. DRAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server3. The network contains a standalone server named Server2. 

All servers run Windows Server 2012 R2. The servers are configured as shown in the following table. 

Server3 hosts an application named App1. App1 is accessible internally by using the URL https://app1.contoso.com. App1 only supports Integrated Windows authentication. 

You need to ensure that all users from the Internet are pre-authenticated before they can access App1. 

What should you do? 

To answer, drag the appropriate servers to the correct actions. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q57. DRAG DROP 

Your network contains an Active Directory domain named contoso.com. All file servers in the domain run Windows Server 2012 R2. 

The computer accounts of the file servers are in an organizational unit (OU) named OU1. A Group Policy object (GPO) named GPO1 is linked to OU1. 

You plan to modify the NTFS permissions for many folders on the file servers by using central access policies. 

You need to identify any users who will be denied access to resources that they can currently access once the new permissions are implemented. 

In which order should you Perform the five actions? 

Answer: 


Q58. HOTSPOT 

Your network contains one Active Directory forest named contoso.com. The forest contains the domain controllers configured as shown in the following table. 

You perform the following actions: 

. Create a file named File1.txt in the SYSVOL folder on DC1. 

. Create a user named User1 on DC4. You need to identify on which domain controller or controllers a copy of each object is stored. 

What should you identify? To answer, select the appropriate options in the answer area. 

Answer: 


Q59. You have a server named Server1 that runs Windows Server 2012 R2. Server1 is located in the perimeter network and has the DNS Server server role installed. 

Server1 has a zone named contoso.com. 

You App1y a security template to Server1. 

After you App1y the template, users report that they can no longer resolve names from contoso.com. 

On Server1, you open DNS Manager as shown in the DNS exhibit. (Click the Exhibit button.) 

On Server1, you open Windows Firewall with Advanced Security as shown in the Firewall exhibit. (Click the Exhibit button.) 

You need to ensure that users can resolve contoso.com names. 

What should you do? 

A. From Windows Firewall with Advanced Security, disable the DNS (TCP, Incoming) rule and the DNS (UDP, Incoming) rule. 

B. From DNS Manager, modify the Zone Transfers settings of the contoso.com zone. 

C. From DNS Manager, unsign the contoso.com zone. 

D. From DNS Manager, modify the Start of Authority (SOA) of the contoso.com zone. 

E. From Windows Firewall with Advanced Security, modify the profiles of the DNS (TCP, Incoming) rule and the DNS (UDP, Incoming) rule. 

Answer:

Explanation: 

To configure Windows Firewall on a managed DNS server . On the Server Manager menu, click Tools and then click Windows Firewall with Advanced Security. . Right-click Inbound Rules, and then click New Rule. The New Inbound Rule Wizard will launch. . In Rule Type, select Predefined, choose DNS Service from the list, and then click Next. . In Predefined Rules, under Rules, select the checkboxes next to the following 

rules: . Click Next, choose Allow the connection, and then click Finish. . Right-click Inbound Rules, and then click New Rule. The New Inbound Rule 

Wizard will launch. etc. 

Reference: Manually Configure DNS Access Settings 


Q60. HOTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. 

Server1 has access to disks that connect to a RAID controller, iSCSI disks, and disks 

connected to a SCSI controller. 

You plan to use a tiered storage space on Server1. 

You need to identify which storage controller and volume type you must use for the tiered 

storage space. 

Which storage components should you use? 

To answer, select the appropriate options in the answer area. 

Answer: