10 Tips For Rebirth 70-412 pdf

70-412 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library! Try it Free Today!

https://www.exambible.com/70-412-exam/

Product Description:
Exam Number/Code: 70-412
Exam name: Configuring Advanced Windows Server 2012 Services
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Free Certification Real IT 70-412 Exam pdf Collection

we provide Realistic Microsoft 70 412 exam dumps free practice test which are the best for clearing microsoft 70 412 test, and to get certified by Microsoft Configuring Advanced Windows Server 2012 Services. The 70 412 pdf Questions & Answers covers all the knowledge points of the real mcsa 70 412 exam. Crack your Microsoft microsoft 70 412 Exam with latest dumps, guaranteed!

Q131. DRAG DROP 

You have a server named Server2 that runs Windows Server 2012 R2. You have storage provisioned on Server2 as shown in the exhibit. (Click the Exhibit button.) 

You need to configure the storage so that it appears in Windows Explorer as a drive letter on Server1. 

Which three actions should you perform in sequence? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q132. You have a server named Server1 that runs Windows Server 2012 R2. 

Windows Server 2012 R2 is installed on volume C. 

You need to ensure that Safe Mode with Command Prompt loads the next time Server1 

restarts. 

Which tool should you use? 

A. The Restart-Server cmdlet 

B. The Bootcfg command 

C. The Restart-Computer cmdlet 

D. The Bcdedit command 

Answer:

Explanation: 

How To Force Windows To Restart in Safe Mode 

1. Open Advanced Startup Options in Windows 8 

2. Open Command Prompt. 

3. With Command Prompt open, execute the correct bcdedit command as shown below based on which Safe Mode option you'd like to start: 

Safe Mode: 

bcdedit /set {default} safeboot minimal 

http://pcsupport.about.com/od/repair-recovery/a/force-or-stop-safe-mode-windows.htm 


Q133. You have a server named FS1 that runs Windows Server 2012 R2. 

You install the File and Storage Services server role on FS1. 

From Windows Explorer, you view the properties of a shared folder named Share1 and you 

discover that the Classification tab is missing. 

You need to ensure that you can assign classifications to Share1 from Windows Explorer 

manually. 

What should you do? 

A. From Folder Options, select Show hidden files, folders, and drives. 

B. From Folder Options, clear Use Sharing Wizard (Recommend). 

C. Install the File Server Resource Manager role service. 

D. Install the Enhanced Storage feature. 

Answer:

Explanation: 

On the Classification tab of the file properties in Windows Server 2012, File Classification Infrastructure adds the ability to manually classify files. You can also classify folders so that any file added to the classified folder will inherit the classifications of the parent folder. 

Reference: What's New in File Server Resource Manager in Windows Server 


Q134. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

You install the DHCP Server server role on both servers. 

On Server1, you have the DHCP scope configured as shown in the exhibit. (Click the Exhibit button.) 

You need to configure the scope to be load-balanced across Server1 and Server2. 

What Windows PowerShell cmdlet should you run on Server1? To answer, select the appropriate options in the answer area. 

Answer: 


Q135. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

You need to create an IPv6 scope on Server1. The scope must use an address space that is reserved for private networks. The addresses must be routable. 

Which IPV6 scope prefix should you use? 

A. 2001:123:4567:890A:: 

B. FE80:123:4567:: 

C. FF00:123:4567:890A:: 

D. FD00:123:4567:: 

Answer: D Explanation: 

Explanation/Reference: 

* A unique local address (ULA) is an IPv6 address in the block fc00::/7, defined in RFC 

4193. It is the approximate IPv6 counterpart of the IPv4 private address. 

The address block fc00::/7 is divided into two /8 groups: 

/ The block fc00::/8 has not been defined yet. 

/ The block fd00::/8 is defined for /48 prefixes, formed by setting the 40 least-significant bits 

of the prefix to a randomly generated bit string. 

* Prefixes in the fd00::/8 range have similar properties as those of the IPv4 private address 

ranges: 

/ They are not allocated by an address registry and may be used in networks by anyone 

without outside involvement. 

/ They are not guaranteed to be globally unique. 

/ Reverse Domain Name System (DNS) entries (under ip6.arpa) for fd00::/8 ULAs cannot 

be delegated in the global DNS. 

Reference: RFC 4193 


Q136. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the Hyper-V server role installed. 

You plan to replicate virtual machines between Server1 and Server2. The replication will be encrypted by using Secure Sockets Layer (SSL). 

You need to request a certificate on Server1 to ensure that the virtual machine replication is encrypted. 

Which two intended purposes should the certificate for Server1 contain? (Each correct answer presents part of the solution. Choose two.) 

A. Client Authentication 

B. Kernel Mode Code Signing 

C. Server Authentication 

D. IP Security end system 

E. KDC Authentication 

Answer: A,C 

Explanation: 

You need to use certificate-based authentication if you want transmitted data to be encrypted. 

Replica Server Certificate Requirements 

To enable a server to receive replication traffic, the certificate in the replica server must meet the following conditions 

* Enhanced Key Usage must support both Client and Server authentication 

Etc. 

Reference: Hyper-V Replica - Prerequisites for certificate based deployments 

http://blogs.technet.com/b/virtualization/archive/2012/03/13/hyper-v-replica-certificate-requirements.aspx 


Q137. You have a file server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. 

Server1 has a volume named D that contains user data. Server1 has a volume named E that is empty. 

Server1 is configured to create a shadow copy of volume D every hour. You need to configure the shadow copies of volume D to be stored on volume E. 

What should you run? 

A. The Set-Volume cmdlet with the -driveletter parameter 

B. The Set-Volume cmdlet with the -path parameter 

C. The vssadmin.exe add shadowstorage command 

D. The vssadmin.exe create shadow command 

Answer:

Explanation: 

Add ShadowStorage 

Adds a shadow copy storage association for a specified volume. 

Incorrect: 

Not A. Sets or changes the file system label of an existing volume. -DriveLetter Specifies a 

letter used to identify a drive or volume in the system. 

Not B. Create Shadow 

Creates a new shadow copy of a specified volume. 

Not C. Sets or changes the file system label of an existing volume -Path Contains valid 

path information. 

Reference: Vssadmin; Set-Volume 

http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx 

http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx 


Q138. Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Rights Management Services server role installed. 

Your company works with a partner organization that does not have its own Active Directory Rights Management Services (AD RMS) implementation. 

You need to create a trust policy for the partner organization. 

The solution must meet the following requirements: 

. Grant users in the partner organization access to protected content. . Provide users in the partner organization with the ability to create protected content. 

Which type of trust policy should you create? 

A. A federated trust 

B. Windows Live ID 

C. A trusted publishing domain 

D. A trusted user domain 

Answer:

Explanation: 

In AD RMS rights can be assigned to users who have a federated trust with Active 

Directory Federation Services (AD FS). This enables an organization to share access to 

rights-protected content with another organization without having to establish a separate 

Active Directory trust or Active Directory Rights Management Services (AD RMS) 

infrastructure. 

Incorrect: 

Not C. Trusted publishing domains allow one AD RMS server to issue use licenses that 

correspond with a publishing license issued by another AD RMS server, but in this scenario 

the partner organization does not have any Active Directory. 

Not D. A trusted user domain, often referred as a TUD, is a trust between AD RMS 

clusters, but in this scenario the partner organization does not have any Active Directory. 

Reference: AD RMS and AD FS Considerations 

http://technet.microsoft.com/en-us/library/dd772651(v=WS.10).aspx 


Q139. Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as a standalone certification authority (CA). 

You install a second server named Server2. You install the Online Responder role service on Server2. 

You need to ensure that Server1 can issue an Online Certificate Status Protocol (OCSP) Response Signing certificate to Server2. 

What should you run on Server1? 

A. The certreq.exe command and specify the -policy parameter 

B. The certutil.exe command and specify the -getkey parameter 

C. The certutil.exe command and specify the -setreg parameter 

D. The certreq.exe command and specify the -retrieve parameter 

Answer:

Explanation: To prepare a computer running Windows Server to issue OCSP Response Signing certificates 

On the server hosting the CA, open a command prompt, and type: certutil -v -setreg policy\\EnableRequestExtensionList +1.3.6.1.5.5.7.48.1.5 Stop and restart the CA. You can do this at a command prompt by running the following commands: net stop certsvc 

net start certsvc 

Reference: Configure a CA to Support OCSP Responders 

https://technet.microsoft.com/en-us/library/cc732526.aspx 


Q140. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two DHCP servers named Server1 and Server2. Both servers have multiple IPv4 scopes. 

Server1 and Server2 are used to assign IP addresses for the network IDs of 172.20.0.0/16 and 131.107.0.0/16. 

You install the IP Address Management (IPAM) Server feature on a server named IPAM1 and configure IPAM1 to manage Server1 and Server2. 

Some users from the 172.20.0.0 network report that they occasionally receive an IP address conflict error message. 

You need to identify whether any scopes in the 172.20.0.0 network ID conflict with one another. 

What Windows PowerShell cmdlet should you run? 

To answer, select the appropriate options in the answer area. 

Answer: