web analytics

[2016-New] GreatExam Provides Latest Exam 70-412 Dumps VCE For Free Downloading (281-300)

There is no need to hassle if you are stuck in the 70-412 exam difficulties, GreatExam will assist you right through 70-412 exam with 70-412 PDF and VCE dumps. GreatExam delivers the most comprehensive 70-412 exam preparation material, covering each and every aspect of 70-412 exam curriculum. We ensure you 100% success in 70-412 exam.

QUESTION 281
You have a server named Server1.
You install the IP Address Management (IPAM) Server feature on Server1.
You need to provide a user named User1 with the ability to set the access scope of all the DHCP servers that are managed by IPAM. The solution must use the principle of least privilege.
Which user role should you assign to User1?

A.    DNS Record Administrator Role
B.    IPAM DHCP Reservations Administrator Role
C.    IPAM Administrator Role
D.    IPAM DHCP Administrator Role

 

Answer: D
Explanation:
The IPAM DHCP administrator role completely manages DHCP servers.

QUESTION 282
Your network contains an Active Directory forest named contoso.com.
Users frequently access the website of an external partner company.
The URL of the website is http://partners.adatum.com.
The partner company informs you that it will perform maintenance on its Web server and that the IP addresses of the Web server will change.
After the change is complete, the users on your internal network report that they fail to access the website. However, some users who work from home report that they can access the website.
You need to ensure that your DNS servers can resolve partners.adatum.com to the correct IP address immediately.
What should you do?

A.    Run dnscmd and specify the CacheLockingPercent parameter.
B.    Run Set-DnsServerGlobalQueryBlockList.
C.    Run ipconfig and specify the Renew parameter.
D.    Run Set-DnsServerCache.

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/jj649852.aspx
Run Set-DnsServerCache with the -LockingPercent switch. dnscmd technically works also.

QUESTION 283
You have a virtual machine named VM1 that runs on a host named Host1.
You configure VM1 to replicate to another host named Host2.
Host2 is located in the same physical location as Host1.
You need to add an additional replica of VM1. The replica will be located in a different physical site.
What should you do?

A.    From VM1 on Host2, click Extend Replication.
B.    On Host1, configure the Hyper-V settings.
C.    From VM1 on Host1, click Extend Replication.
D.    On Host2, configure the Hyper-V settings.

Answer: A
Explanation:
http://blogs.technet.com/b/virtualization/archive/2013/12/10/hyper-v-replica-extend-replication.aspx
Once that is done, go to replica site and from Hyper-V UI manager select the VM for which you want to extend the replication. Right click on VM and select “Replication->Extend Replication”.
This will open Extend Replication Wizard which is similar to Enable Replication Wizard.
http://technet.microsoft.com/en-us/library/dn551365.aspx
http://technet.microsoft.com/en-us/library/jj134240.aspx
NOTE: You configure a server to receive replication with Hyper-V Manager, in this situation the replica site is assumed to be the Replica Server.
Therefore you extend replication from VM1 on Host2.

QUESTION 284
Hotspot Question
You have a file server named Server1 that runs Windows Server 2012 R2.
You need to ensure that you can use the NFS Share – Advanced option from the New Share Wizard in Server Manager.
Which two role services should you install? To answer, select the appropriate two role services in the answer area.
2841
Answer:
2842

QUESTION 285
Your network contains 20 iSCSI storage appliances that will provide storage for 50 Hyper-V hosts running Windows Server 2012 R2.
You need to configure the storage for the Hyper-V hosts.
The solution must minimize administrative effort.
What should you do first?

A.    Install the iSCSI Target Server role service and configure iSCSI targets.
B.    Install the iSNS Server service feature and create a Discovery Domain.
C.    Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties.
D.    Install the Multipath I/O (MPIO) feature and configure the MPIO Properties.

Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/cc753442.aspx
http://technet.microsoft.com/en-us/library/cc772568.aspx

QUESTION 286
Drag and Drop Question
You have a server that runs Windows Server 2012 R2.
You create a new work folder named Share1.
You need to configure Share1 to meet the following requirements:
– Ensure that all synchronized copies of Share1 are encrypted.
– Ensure that clients synchronize to Share1 every 30 minutes.
– Ensure that Share1 inherits the NTFS permissions of the parent folder.
Which cmdlet should you use to achieve each requirement? To answer, drag the appropriate cmdlets to the correct requirements. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
2861
Answer:
2862

QUESTION 287
You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard.
You discover that the new virtual disk has a write-back cache of 1 GB.
You need to ensure that the virtual disk has a write-back cache of 5 GB.
What should you do?

A.    Detach the virtual disk, and then run the Resize-VirtualDisk cmdlet.
B.    Detach the virtual disk, and then run the Set-VirtualDisk cmdlet.
C.    Delete the virtual disk, and then run the New-StorageSubSystemVirtualDisk cmdlet.
D.    Delete the virtual disk, and then run the New-VirtualDisk cmdlet.

Answer: D
Explanation:
You must set the write-back cache during the initial new disk creation.
This setting is not configurable once the VHD has been created.

QUESTION 288
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server1 that runs Windows Server 2012 R2.
You plan to install the Active Directory Federation Services server role on Server1 to allow for Workplace Join.
You run nslookup enterprise registration and you receive the following results:
2881
You need to create a certificate request for Server1 to support the Active Directory Federation Services (AD FS) installation.
How should you configure the certificate request?
To answer, drag the appropriate names to the correct locations. Each name may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
2882
Answer:
2883

QUESTION 289
Your network contains an Active Directory domain named contoso.com.
The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2.
Server1 has the Active Directory Federation Services server role installed.
Server2 is a file server.
Your company introduces a Bring Your Own Device (BYOD) policy.
You need to ensure that users can use a personal device to access domain resources by using Single Sign-On (SSO) while they are connected to the internal network.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A.    Enable the Device Registration Service in Active Directory.
B.    Publish the Device Registration Service by using a Web Application Proxy.
C.    Configure Active Directory Federation Services (AD FS) for the Device Registration Service.
D.    Create and configure a sync share on Server2.
E.    Install the Work Folders role service on Server2.

Answer: AC
Explanation:
* Workplace Join leverages a feature included in the Active Directory Federation Services (AD FS) Role in Windows Server 2012 R2, called Device Registration Service (DRS). DRS provisions a device object in Active Directory when a device is Workplace Joined. Once the device object is in Active Directory, attributes of that object can be retrieved and used to provide conditional access to resources and applications. The device identity is represented by a certificate which is set on the personal device by DRS when the device is Workplace Joined.
* In Windows Server 2012 R2, AD FS and Active Directory Domain Services have been extended to comprehend the most popular mobile devices and provide conditional access to enterprise resources based on user+device combinations and access policies. With these policies in place, you can control access based on users, devices, locations, and access times.

QUESTION 290
Drag and Drop Question
You have two failover clusters named Cluster1 and Cluster2.
All of the nodes in both of the clusters run Windows Server 2012 R2.
Cluster1 hosts two virtual machines named VM1 and VM2.
You plan to configure VM1 and VM2 as nodes in a new failover cluster named Cluster3.
You need to configure the witness disk for Cluster3 to be hosted on Cluster2.
Which three actions should you perform in sequence? To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.
2901
Answer:
2902

QUESTION 291
Hotspot Question
Your network contains two Web servers named Server1 and Server2.
Both servers run Windows Server 2012 R2.
Server1 and 5erver2 are nodes in a Network Load Balancing (NLB) cluster.
The NLB cluster contains an application named App1 that is accessed by using the URL
http://app1.contoso.com.
You deploy a new server named Server3 that runs Windows Server 2012 R2.
The contoso.com DNS zone contains the records shown in the following table.
2911
You need to add Server3 to the NLB cluster.
What command should you run? To answer, select the appropriate options in the answer area.
2912
Answer:
2913

QUESTION 292
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com.
The domain contains four member servers named Server1, Server2, Server3, and Server4.
All servers run Windows Server 2012 R2.
Server1 and Server3 are located in a site named Site1.
Server2 and Server4 are located in a site named Site2.
The servers are configured as nodes in a failover cluster named Cluster1.
Dynamic quorum management is disabled.
Cluster1 is configured to use the Node Majority quorum configuration.
You need to ensure that users in Site2 can access Cluster1 if the network connection between the two sites becomes unavailable.
What should you run from Windows PowerShell? To answer, drag the appropriate commands to the correct location. Each command may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
2921
Answer:
2922

QUESTION 293
Hotspot Question
Your network contains an Active Directory domain named contoso.com.
All domain controllers run Windows Server 2012 R2.
The network has the physical sites and TCP/IP subnets configured as shown in the following table.
2931
You have a web application named App1 that is hosted on six separate Web servers.
DNS has the host names and IP addresses registered as shown in the following table.
2932
You discover that when users connect to app1.contoso.com, they are connected frequently to a server that is not on their local subnet.
You need to ensure that when the users connect to app1.contoso.com, they connect to a server on their local subnet.
The connections must be distributed across the servers that host app1.contoso.com on their subnet.
Which two settings should you configure? To answer, select the appropriate two settings in the answer area.
2933
Answer:
2934

QUESTION 294
Hotspot Question
Your network contains an Active Directory domain named contoso.com.
The domain contains a domain controller named DC1 and a member server named Server1.
All servers run Windows Server 2012 R2.
You install the IP Address Management (IPAM) Server feature on Server1.
From the Provision IPAM wizard, you select the Group Policy Based provisioning method and enter a GPO name prefix of IPAM1.
You need to provision IPAM by using Group Policy.
What command should you run on Server1 to complete the process? To answer, select the appropriate options in the answer area.
2941
Answer:
2942

QUESTION 295
Your network contains an Active Directory domain named contoso.com.
The domain contains two member servers named Server1 and Server2.
You install the DHCP Server server role on Server1 and Server2.
You install the IP Address Management (IPAM) Server feature on Server1.
You notice that you cannot discover Server1 or Server2 in IPAM.
You need to ensure that you can use IPAM to discover the DHCP infrastructure.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A.    On Server2, create an IPv4 scope.
B.    On Server1, run the Add-IpamServerInventory cmdlet.
C.    On Server2, run the Add-DhcpServerInDc cmdlet
D.    On both Server1 and Server2, run the Add-DhcpServerv4Policy cmdlet.
E.    On Server1, uninstall the DHCP Server server role.

Answer: CE
Explanation:
https://technet.microsoft.com/en-us/library/jj878313.aspx
IPAM discovers DHCP servers that are authorized in the Active Directory domains you specify and that respond to a DHCPInform message.
https://technet.microsoft.com/en-us/library/jj590712%28v=wps.630%29.aspx
Add-DhcpServerInDC
Adds the computer running the DHCP server service to the list of authorized Dynamic Host Configuration Protocol (DHCP) server services in Active Directory (AD).
https://technet.microsoft.com/en-us/library/jj878312.aspx
IPAM must be installed on a domain member computer.
You cannot install IPAM on a domain controller. If IPAM is installed on the same server with DHCP, then DHCP server discovery will be disabled.

QUESTION 296
Your network contains two Active Directory forests named contoso.com and corp.contoso.com.
2961
User1 is a member of the DnsAdmins domain local group in contoso.com.
User1 attempts to create a conditional forwarder to corp.contoso.com but receive an error message shown in the exhibit. (Click the Exhibit button.)
2962
You need to configure bi-directional name resolution between the two forests.
What should you do first?

A.    Add User1 to the DnsUpdateProxy group.
B.    Configure the zone to be Active Directory-integrated.
C.    Enable the Advanced view from DNS Manager.
D.    Run the New Delegation Wizard.

Answer: D
Explanation:
– DNS namespace Parent -> DNS namespace child : delegation
– DNS namespace child -> DNS namespace Parent : nothing to do with contiguous DNS namespace (or conditional forwarder for non-contiguous DNS namespace)

QUESTION 297
Your network contains two Active Directory forests named contoso.com and adatum.com.
Each forest contains one domain. Contoso.com has a two-way forest trust to adatum.com. Selective authentication is enabled on the forest trust.
Contoso contains 10 servers that have the File Server role service installed.
Users successfully access shared folders on the file servers by using permissions granted to the Authenticated Users group.
You migrate the file servers to adatum.com.
Contoso users report that after the migration, they are unable to access shared folders on the file servers.
You need to ensure that the Contoso users can access the shared folders on the file servers.
What should you do?

A.    Disable selective authentication on the existing forest trust.
B.    Disable SID filtering on the existing forest trust.
C.    Run netdom and specify the /quarantine attribute.
D.    Replace the existing forest trust with an external trust.

Answer: A
Explanation:
http://technet.microsoft.com/nl-nl/library/cc755321%28v=ws.10%29.aspx
Impact of Selective Authentication
Because all verification of incoming interforest authentication requests is done locally on the receiving domain controller in the trusting forest, access to resources in the trusting forest is likely to be extremely limited for a broad set of users on the network (which is the purpose of this security setting). Consequently, implementing selective authentication might require user education, particularly due to the following reasons:
Users browsing network resources through My Network Places to resources located in a trusting forest might get access denied messages when attempting to access those resources.
Resources in the trusting forest that were once available to users in a trusted forest might no longer be available.

QUESTION 298
You have a server named FS1 that runs Windows Server 2012 R2.
You install the File and Storage Services server role on FS1.
From Windows Explorer, you view the properties of a shared folder named Share1 and you discover that the Classification tab is missing.
You need to ensure that you can assign classifications to Share1 from Windows Explorer manually.
What should you do?

A.    From Folder Options, select Show hidden files, folders, and drives.
B.    From Folder Options, clear Use Sharing Wizard (Recommend).
C.    Install the File Server Resource Manager role service.
D.    Install the Enhanced Storage feature.

Answer: C

QUESTION 299
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are configured as shown in the following table.
2991
You need to ensure that when new targets are added to Server1, the targets are registered on Server2 automatically.
What should you do on Server1?

A.    Configure the Discovery settings of the iSCSI initiator.
B.    Configure the security settings of the iSCSI target.
C.    Run the Set-Wmilnstance cmdlet.
D.    Run the Set-IscsiServerTarget cmdlet.

Answer: C
Explanation:
http://blogs.technet.com/b/filecab/archive/2012/06/08/iscsi-target-cmdlet-reference.aspx
11.Manage iSNS server registration
The iSNS server registration can be done using the following cmdlets, which manages the WMI objects.
To add an iSNS server:
Set-WmiInstance -Namespace root\wmi -Class WT_iSNSServer –Arguments
@{ServerName=”ISNSservername”}

QUESTION 300
Hotspot Question
You have a file server named Server1 that runs Windows Server 2012 R2.
Server1 contains a file share that must be accessed by only a limited number of users.
You need to ensure that if an unauthorized user attempts to access the file share, a custom access-denied message appears, which contains a link to request access to the share.
The message must not appear when the unauthorized user attempts to access other shares.
Which two nodes should you configure in File Server Resource Manager? To answer, select the appropriate two nodes in the answer area.
3001
Answer:
3002
Explanation:
http://technet.microsoft.com/en-us/library/hh831402.aspx#BKMK_1

We highly recommend our 70-412 dumps. Comparing with others’, GreatExam is the most credible and authentic source of information on 70-412 exam and we strive to keep our 70-412 dumps up-to-date and reliable on a consistent basis. Our exam preparation material is rich in variety. We offer 70-412 PDF format and 70-412 practice test with free VCE player. That’s the reason why many candidates choose GreatExam.

http://www.greatexam.com/70-412-exam-questions.html