Proper study guides for Improved Microsoft Configuring Advanced Windows Server 2012 Services certified begins with Microsoft microsoft 70 412 preparation products which designed to deliver the Exact microsoft 70 412 questions by making you pass the 70 412 pdf test at your first time. Try the free 70 412 exam dumps demo right now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-412 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-412 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-412-exam-dumps.html

Q41. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

You install the DHCP Server server role on both servers. 

On Server1, you have the DHCP scope configured as shown in the exhibit. (Click the Exhibit button.) 

You need to configure the scope to be load-balanced across Server1 and Server2. 

What Windows PowerShell cmdlet should you run on Server1? To answer, select the appropriate options in the answer area. 

Answer: 


Q42. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers. 

The domain controllers are configured as shown in the following table. 

You configure a user named User1 as a delegated administrator of DC10. 

You need to ensure that User1 can log on to DC10 if the network link between the Main site and the Branch site fails. 

What should you do? 

A. Add User1 to the Domain Admins group. 

B. On DC10, modify the User Rights Assignment in Local Policies. 

C. Run repadmin and specify the /prp parameter. 

D. On DC10, run ntdsutil and configure the settings in the Roles context. 

Answer:

Explanation: 

repadmin /prp will allow the password caching of the local administrator to the RODC. 

This command lists and modifies the Password Replication Policy (PRP) for read-only domain controllers (RODCs). Reference: RODC Administration https://technet.microsoft.com/en-us/library/cc755310%28v=ws.10%29.aspx 


Q43. Your network contains an Active directory forest named contoso.com. The forest contains two child domains named east.contoso.com and west.contoso.com. 

You install an Active Directory Rights Management Services (AD RMS) cluster in each child domain. 

You discover that all of the users in the contoso.com forest are directed to the AD RMS cluster in east.contoso.com. 

You need to ensure that the users in west.contoso.com are directed to the AD RMS cluster in west.contoso.com and that the users in east.contoso.com are directed to the AD RMS cluster in east.contoso.com. 

What should you do? 

A. Modify the Service Connection Point (SCP). 

B. Configure the Group Policy object (GPO) settings of the users in the west.contoso.com domain. 

C. Configure the Group Policy object (GPO) settings of the users in the east.contoso.com domain. 

D. Modify the properties of the AD RMS cluster in west.contoso.com. 

Answer:

Explanation: 

The west.contoso.com are the ones in trouble that need to be redirected to the west.contoso.com not the east.contoso.com. 

Note: It is recommended that you use GPO to deploy AD RMS client settings and that you only deploy settings as needed. 

Reference: AD RMS Best Practices Guide 


Q44. HOTSPOT 

Your network contains one Active Directory domain. 

The domain contains an enterprise certification authority (CA). 

You need to ensure that members of a group named Group1 can issue certificates for the 

User certificate template only. 

Which two tabs should you use to perform the configuration? To answer, select the 

appropriate tabs in the answer area. 

Answer: 


Q45. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. 

You create a user account named User1 in the domain. 

You need to ensure that User1 can use Windows Server Backup to back up Server1. The solution must minimize the number of administrative rights assigned to User1. 

What should you do? 

A. Add User1 to the Backup Operators group. 

B. Add User1 to the Power Users group. 

C. Assign User1 the Backup files and directories user right and the Restore files and directories user right. 

D. Assign User1 the Backup files and directories user right. 

Answer:

Explanation: 

Backup Operators have these permissions by default: 

However the question explicitly says we need to minimize administrative rights. Since the requirement is for backing up the data only--no requirement to restore or shutdown--then assigning the "Back up files and directories user right" would be the correct answer. 

Reference: Default local groups 

http://technet.microsoft.com/en-us/library/cc787956(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc756898(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc771990.aspx 


Q46. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1 that runs a Server Core Installation of Windows Server 2012 R2. 

File1 has a volume named D that contains home folders. File1 creates a shadow copy of volume D twice a day. 

You discover that volume D is almost full. 

You add a new volume named H to File1. 

You need to ensure that the shadow copies of volume D are stored on volume H. 

Which command should you run? 

A. The Set-Volume cmdlet with the -driveletter parameter 

B. The vssadmin.exe create shadow command 

C. The Set-Volume cmdlet with the -path parameter 

D. The vssadmin.exe add shadowstorage command 

Answer:

Explanation: 

Add ShadowStorage 

Adds a shadow copy storage association for a specified volume. 

Incorrect: 

Not A. Sets or changes the file system label of an existing volume. -DriveLetter Specifies a 

letter used to identify a drive or volume in the system. 

Not B. Create Shadow 

Creates a new shadow copy of a specified volume. 

Not C. Sets or changes the file system label of an existing volume -Path Contains valid 

path information. 

Reference: Vssadmin; Set-Volume 

http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx 

http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx 


Q47. Your network contains two Active Directory forests named contoso.com and litwareinc.com. A two-way forest trusts exists between the forest. Selective authentication is enabled on 

the trust. 

The contoso.com forest contains a server named Server1. 

You need to ensure that users in litwareinc.com can access resources on Server1. 

What should you do? 

A. Install Active Directory Rights Management Services on a domain controller in contoso.com. 

B. Modify the permission on the Server1 computer account. 

C. Install Active Directory Rights Management Services on a domain controller in litwareinc.com. 

D. Configure SID filtering on the trust. 

Answer:

Explanation: 

Selective authentication between forests If you decide to set selective authentication on an incoming forest trust, you need to manually assign permissions on each computer in the domain as well as the resources to which you want users in the second forest to have access. To do this, set a control access right Allowed to authenticate on the computer object that hosts the resource in Active Directory Users and Computers in the second forest. Then, allow user or group access to the particular resources you want to share. 

Reference: Accessing resources across forests 


Q48. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

Server1 is an enterprise root certification authority (CA) for contoso.com. 

You need to ensure that the members of a group named Group1 can request code signing certificates. The certificates must be issued automatically to the members. 

Which two actions should you perform? (Each correct answer presents part of the solution. 

Choose two.) 

A. From Certificate Templates, modify the certificate template. 

B. From Certification Authority, add a certificate template to be issued. 

C. From Certificate Authority, modify the CA properties. 

D. From Certificate Templates, duplicate a certificate template. 

E. From Certificate Authority, stop and start the Active Directory Certificate Services (AD CS) service. 

Answer: A,D 

Explanation: 

Explanation/Reference: 

Best Practices include: Duplicate new templates from existing templates closest in function 

to the intended template. 

New certificate templates are duplicated from existing templates. Many settings are copied 

from the original template. Because of this, duplicating one template to another of a totally 

different type may carry over some unintended settings. When duplicating a template, 

examine the subject type of the original template and ensure that you duplicate one that 

has a similar function to that of the intended template. Although most settings for certificate 

templates can be edited once the template is duplicated, the subject type cannot be 

changed. 

Reference: Deploying Certificate Templates 

https://technet.microsoft.com/en-us/library/cc770794%28v=ws.10%29.aspx 


Q49. DRAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. All servers run Windows Server 2012 R2. 

All domain user accounts have the Division attribute automatically populated as part of the user provisioning process. The Support for Dynamic Access Control and Kerberos armoring policy is enabled for the domain. 

You need to control access to the file shares on Server1 based on the values in the Division attribute and the Division resource property. 

Which three actions should you perform in sequence? 

Answer: 


Q50. DRAG DROP 

Your network contains an Active Directory domain named contoso.com. All file servers in the domain run Windows Server 2012 R2. 

The computer accounts of the file servers are in an organizational unit (OU) named OU1. A Group Policy object (GPO) named GPO1 is linked to OU1. 

You plan to modify the NTFS permissions for many folders on the file servers by using central access policies. 

You need to identify any users who will be denied access to resources that they can currently access once the new permissions are implemented. 

In which order should you Perform the five actions? 

Answer: