It is more faster and easier to pass the Microsoft 70 412 exam dumps exam by using Best Quality Microsoft Configuring Advanced Windows Server 2012 Services questuins and answers. Immediate access to the Improve exam 70 412 Exam and find the same core area exam 70 412 questions with professionally verified answers, then PASS your exam with a high score now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-412 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-412 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-412-exam-dumps.html

Q11. You have a server named Server1 that runs Windows Server 2012 R2. 

A Microsoft Azure Backup of Server1 is created automatically every day. 

You need to view the items that are included in the backup. 

Which cmdlet should you run? 

A. Get-OBPolicyState 

B. Get-OBJob 

C. Get-OBPolicy 

D. Get-WBSummary 

Answer:

Reference: Technet, Get-OBPolicy 

https://technet.microsoft.com/en-us/library/hh770406(v=wps.630).aspx 


Q12. Your network contains 20 iSCSI storage appliances that will provide storage for 50 Hyper-V hosts running Windows Server 2012 R2. 

You need to configure the storage for the Hyper-V hosts. The solution must minimize administrative effort. 

What should you do first? 

A. Install the iSCSI Target Server role service and configure iSCSI targets. 

B. Install the iSNS Server service feature and create a Discovery Domain. 

C. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties. 

D. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties. 

Answer:

Explanation: 

Windows Server 2012 includes an iSCSI Target role that, along with Failover Clustering, 

allows it to become a cost-effective and highly-available iSCSI Storage Array. We can connect from our Hyper-V host to the iSCSI target on the storage array with the following PowerShell command line: 

New-IscsiTargetPortal –TargetPortalAddress <IP_Address or FQDN of storage array> 

$target = Get-IscsiTarget 

Connect-IscsiTarget –NodeAddress $target.NodeAddress 

Incorrect: 

Not B. Discovery Domains in an iSCSI fabric, like zones in a Fibre Channel fabric, enable you to partition the storage resources in your storage area network (SAN). By creating and managing Discovery Domains, you can control the iSCSI targets that each iSCSI initiator can see and log on to. 

Reference: Configure iSCSI Target Server Role on Windows Server 2012 


Q13. HOTSPOT 

Your network contains three application servers that run Windows Server 2012 R2. The application servers have the Network Load Balancing (NLB) feature installed. 

You create an NLB cluster that contains the three servers. 

You plan to deploy an application named App1 to the nodes in the cluster. App1 uses TCP port 8080 and TCP port 8081. 

Clients will connect to App1 by using HTTP and HTTPS. When clients connect to App1 by using HTTPS, session state information will be retained locally by the cluster node that responds to the client request. 

You need to configure a port rule for Appl. 

Which port rule should you use? 

To answer, select the appropriate rule in the answer area. 

Answer: 


Q14. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

You need to create an IPv6 scope on Server1. The scope must use an address space that is reserved for private networks. The addresses must be routable. 

Which IPV6 scope prefix should you use? 

A. 2001:123:4567:890A:: 

B. FE80:123:4567:: 

C. FF00:123:4567:890A:: 

D. FD00:123:4567:: 

Answer: D Explanation: 

Explanation/Reference: 

* A unique local address (ULA) is an IPv6 address in the block fc00::/7, defined in RFC 

4193. It is the approximate IPv6 counterpart of the IPv4 private address. 

The address block fc00::/7 is divided into two /8 groups: 

/ The block fc00::/8 has not been defined yet. 

/ The block fd00::/8 is defined for /48 prefixes, formed by setting the 40 least-significant bits 

of the prefix to a randomly generated bit string. 

* Prefixes in the fd00::/8 range have similar properties as those of the IPv4 private address 

ranges: 

/ They are not allocated by an address registry and may be used in networks by anyone 

without outside involvement. 

/ They are not guaranteed to be globally unique. 

/ Reverse Domain Name System (DNS) entries (under ip6.arpa) for fd00::/8 ULAs cannot 

be delegated in the global DNS. 

Reference: RFC 4193 


Q15. Your network contains an Active Directory domain named adatum.com. The domain contains two domain controllers that run Windows Server 2012 R2. The domain controllers are configured as shown in the following table. 

You log on to DC1 by using a user account that is a member of the Domain Admins group, and then you create a new user account named User1. 

You need to prepopulate the password for User1 on DC2. 

What should you do first? 

A. Connect to DC2 from Active Directory Users and Computers. 

B. Add DC2 to the Allowed RODC Password Replication Policy group. 

C. Add the User1 account to the Allowed RODC Password Replication Policy group. 

D. Run Active Directory Users and Computers as a member of the Enterprise Admins group. 

Answer:

Explanation: 

To prepopulate the password cache for an RODC by using Active Directory Users and Computers (see step 1 below). 

Administrative credentials: To prepopulate the password cache for an RODC, you must be a member of the Domain Admins group. 

Click Start, click Administrative Tools, and then click Active Directory Users and 

Computers. 

Ensure that Active Directory Users and Computers points to the writable domain 

controller that is running Windows Server 2008, and then click Domain Controllers. 

In the details pane, right-click the RODC computer account, and then click 

Properties. 

Click the Password Replication Policy tab. 

Click Advanced. 

Click Prepopulate Passwords. 

Type the name of the accounts whose passwords you want to prepopulate in the 

cache for the RODC, and then click OK. 

When you are asked if you want to send the passwords for the accounts to the 

RODC, click Yes. 

Note: You can prepopulate the password cache for an RODC with the passwords of user and computer accounts that you plan to authenticate to it. When you prepopulate the RODC password cache, you trigger the RODC to replicate and cache the passwords for users and computers before the accounts try to log on in the branch office. 

Incorrect: Not C. You don't need to add User1 to the Allowed RODC Password Replication Policy group. As a first step you should run Active.Directory Users and Computers as a member of the Domain/Enterprise Admins group.-

Reference: Password Replication Policy Administration 

http://technet.microsoft.com/en-us/library/cc753470(v=ws.10).aspx#BKMK_pre 


Q16. Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2. 

Server1 and Seiver2 are nodes in a Network Load Balancing (NLB) cluster. The NIB cluster contains an application named App1 that is accessed by using the URL http://app1.contoso.com. 

You plan to perform maintenance on Server1. 

You need to ensure that all new connections to App1 are directed to Server2. The solution must not disconnect the existing connections to Server1. 

What should you run? 

A. The Stop-NlbCluster cmdlet 

B. The nlb.exe stop command 

C. The Suspend-NlbCluster cmdlet 

D. The nlb.exe suspend command 

Answer:

Explanation: 

The Stop-NlbClusterNode cmdlet stops a node in an NLB cluster. When you use the stop the nodes in the cluster, client connections that are already in progress are interrupted. To avoid interrupting active connections, consider using the -drain parameter, which allows the node to continue servicing active connections but disables all new traffic to that node. 


Q17. A user named User1 is a member of the local Administrators group on Node1 and Node2. 

User1 creates a new clustered File Server role named File1 by using the File Server for general use option. 

A report is generated during the creation of File1 as shown in the exhibit. (Click the Exhibit button.) 

File1 fails to start. 

You need to ensure that you can start File1. 

What should you do? 

A. Log on to the domain by using the built-in Administrator for the domain, and then recreate the clustered File Server role by using the File Server for general use option. 

B. Assign the user account permissions of User1 to the Servers OU. 

C. Assign the computer account permissions of Cluster2 to the Servers OU. 

D. Increase the value of the ms-DS-MachineAccountQuota attribute of the domain. 

E. Recreate the clustered File Server role by using the File Server for scale-out application data option. 

Answer:

Explanation: 

Scenario: You have created a Windows Server 2012 Scale-Out File Server. The cluster, 

including the network and storage, pass the cluster validation test. Everything looks and is 

good. You create a File Server role for application data (SOFS) but it fails to start. 

Problem: Basically, the cluster needs permissions to create a computer object (for the 

SOFS) in the same Active Directory OU that the cluster object (Demo-FSC1) is stored in. 

Resolution: Reconfigure the permissions on the Servers OU. 

In this case we assign the user account permissions of User1 to the Servers OU. 

Reference: Scale-Out File Server Role Fails To Start With Event IDs 1205, 1069, and 1194 

http://www.aidanfinn.com/?p=14142 


Q18. HOTSPOT 

Your network contains one Active Directory forest named contoso.com and one Active Directory forest named adatum.com. Each forest contains a single domain. 

You have the domain controllers configured as shown in the following table. 

You perform the following three actions: 

Create a user named User1 on DC3. 

Create a file named File1.txt in the SYSVOL folder on DC1. 

Create a Group Policy object (GPO) named GPO1 on DC1 and link GPO1 to 

Site2. 

You need to identify on which domain controller or controllers each object is stored. 

What should you identify? To answer, select the appropriate options in the answer area. 

Answer: 


Q19. HOTSPOT 

Your network contains one Active Directory domain. 

The domain contains an enterprise certification authority (CA). 

You need to ensure that members of a group named Group1 can issue certificates for the 

User certificate template only. 

Which two tabs should you use to perform the configuration? To answer, select the 

appropriate tabs in the answer area. 

Answer: 


Q20. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1 that runs a Server Core Installation of Windows Server 2012 R2. 

File1 has a volume named D that contains home folders. File1 creates a shadow copy of volume D twice a day. 

You discover that volume D is almost full. 

You add a new volume named H to File1. 

You need to ensure that the shadow copies of volume D are stored on volume H. 

Which command should you run? 

A. The Set-Volume cmdlet with the -driveletter parameter 

B. The vssadmin.exe create shadow command 

C. The Set-Volume cmdlet with the -path parameter 

D. The vssadmin.exe add shadowstorage command 

Answer:

Explanation: 

Add ShadowStorage 

Adds a shadow copy storage association for a specified volume. 

Incorrect: 

Not A. Sets or changes the file system label of an existing volume. -DriveLetter Specifies a 

letter used to identify a drive or volume in the system. 

Not B. Create Shadow 

Creates a new shadow copy of a specified volume. 

Not C. Sets or changes the file system label of an existing volume -Path Contains valid 

path information. 

Reference: Vssadmin; Set-Volume 

http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx 

http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx