How to pass Microsoft 70-412 Real Exam in 24 Hours [free question 46-60]

Question No. 46

You have a server named Server1 that runs Windows Server 2012 R2. 

From Server Manager, you install the Active Directory Certificate Services server role on Server1. 

A domain administrator named Admin1 logs on to Server1. 

When Admin1 runs the Certification Authority console, Admin1 receive the following error message. 


You need to ensure that when Admin1 opens the Certification Authority console on Server1, the error message does not appear. 

What should you do? 

A. Install the Active Directory Certificate Services (AD CS) tools. 

B. Run the regsvr32.exe command. 

C. Modify the PATH system variable. 

D. Configure the Active Directory Certificate Services server role from Server Manager. 

Answer:

Explanation: 

The error message is related to missing role configuration. 

* Cannot Manage Active Directory Certificate Services Resolution: configure the two Certification Authority and Certification Authority Web Enrollment Roles: 


image 

Reference: Cannot manage Active Directory Certificate Services in Server 2012 Error 0x800070002 


Question No. 47

You have a server named LON-DC1 that runs Windows Server 2012 R2. An iSCSI virtual disk named VirtualiSCSI1.vhd exists on LON-DC1 as shown in the exhibit. (Click the Exhibit button.) 


You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt iSCSI target. 

VirtualiSCSIl.vhd is removed from LON-DC1. 

You need to assign VirtualiSCSI2.vhd a logical unit value of 0. 

What should you do? 

A. Modify the properties of the itgt ISCSI target. 

B. Modify the properties of the VirtualiSCSI2.vhd iSCSI virtual disk. 

C. Run the Set-VirtualDisk cmdlet and specify the -Uniqueld parameter. 

D. Run the iscsicli command and specify the reportluns parameter. 

Answer:

Explanation: 

The virtual disk has the option to change the lun ID, no other option available in the answers appear to allow this change. 

Note: Logical unit numbers (LUNs) created on an iSCSI disk storage subsystem are not directly assigned to a server. For iSCSI, LUNs are assigned to logical entities called targets. 


Question No. 48

Your network contains one Active Directory forest named contoso.com. The forest contains two child domains and six domain controllers. The domain controllers are configured as shown in the following table. 


You need to enable universal group membership caching for the Europe office and Asia office sites. 

What should you use? 

A. Set-ADSite 

B. Set-ADReplicationSite 

C. Set-ADDomain 

D. Set-ADReplicationSiteLink 

E. Set-ADGroup 

F. Set-ADForest 

G. Netdom 

Answer:

Explanation: 

https://technet.microsoft.com/en-us/library/hh852305(v=wps.630).aspx 


Question No. 49

HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

You install the DHCP Server server role on both servers. 

On Server1, you have the DHCP scope configured as shown in the exhibit. (Click the Exhibit button.) 

You need to configure the scope to be load-balanced across Server1 and Server2. 

What Windows PowerShell cmdlet should you run on Server1? To answer, select the appropriate options in the answer area. 



Answer: 



Question No. 50

Your network contains an Active Directory forest named contoso.com. The forest contains 

a single domain. The forest functional level is Windows Server 2012 R2. 

You have a domain controller named DC1. 

On DC1, you create a new Group Policy object (GPO) named GPO1. You need to verify that GPO1 was replicated to all of the domain controllers. 

Which tool should you use? 

A. Group Policy Management 

B. Active Directory Sites and Services 

C. DFS Management 

D. Active Directory Administrative Center 

Answer:

Explanation: 

In Windows Server 2012, the Group Policy Management Console (GPMC) was enhanced to provide a report for the overall health state of the Group Policy infrastructure for a domain, or to scope the health view to a single GPO. 

Reference: Check Group Policy Infrastructure Status 

http://technet.microsoft.com/en-us/library/jj134176.aspx 


70-412 exam price

Question No. 51

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed. 

The network contains an enterprise certification authority (CA). All servers are enrolled automatically for a certificate-based on the Computer certificate template. 

On Server1, you have a virtual machine named VM1. VM1 is replicated to Server2. 

You need to encrypt the replication of VM1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On Server1, modify the Hyper-V Settings. 

B. On Server2, modify the settings of VM1. 

C. On Server2, modify the Hyper-V Settings. 

D. On Server1, modify the settings of VM1. 

E. On Server1, modify the settings of the virtual switch to which VM1 is connected. 

F. On Server2, modify the settings of the virtual switch to which VM1 is connected. 

Answer: B,C 

Explanation: 

B. Each virtual machine that is to be replicated must be enabled for replication (on the replica server – Server2). 

C. To configure the Replica server (here Server2) In Hyper-V Manager, click Hyper-V Settings in the Actions pane. In the Hyper-V Settings dialog, click Replication Configuration. In the Details pane, select Enable this computer as a Replica server. In the Authentication and ports section, select the authentication method. For either authentication method, specify the port to be used (the default ports are 80 for Kerberos over HTTP and 443 for certificate-based authentication over HTTPS). If you are using certificate-based authentication, click Select Certificate and provide the request certificate information. 

Etc 

Reference: Deploy Hyper-V Replica Step 2: Enable Replication 


Question No. 52

Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Rights Management Services server role installed. 

Your company works with a partner organization that does not have its own Active Directory Rights Management Services (AD RMS) implementation. 

You need to create a trust policy for the partner organization. 

The solution must meet the following requirements: 

. Grant users in the partner organization access to protected content. . Provide users in the partner organization with the ability to create protected content. 

Which type of trust policy should you create? 

A. A federated trust 

B. Windows Live ID 

C. A trusted publishing domain 

D. A trusted user domain 

Answer:

Explanation: 

In AD RMS rights can be assigned to users who have a federated trust with Active 

Directory Federation Services (AD FS). This enables an organization to share access to 

rights-protected content with another organization without having to establish a separate 

Active Directory trust or Active Directory Rights Management Services (AD RMS) 

infrastructure. 

Incorrect: 

Not C. Trusted publishing domains allow one AD RMS server to issue use licenses that 

correspond with a publishing license issued by another AD RMS server, but in this scenario 

the partner organization does not have any Active Directory. 

Not D. A trusted user domain, often referred as a TUD, is a trust between AD RMS 

clusters, but in this scenario the partner organization does not have any Active Directory. 

Reference: AD RMS and AD FS Considerations 

http://technet.microsoft.com/en-us/library/dd772651(v=WS.10).aspx 


Question No. 53

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

You need to create an IPv6 scope on Server1. The scope must use an address space that is reserved for private networks. The addresses must be routable. 

Which IPV6 scope prefix should you use? 

A. 2001:123:4567:890A:: 

B. FE80:123:4567:: 

C. FF00:123:4567:890A:: 

D. FD00:123:4567:: 

Answer: D Explanation: 

Explanation/Reference: 

* A unique local address (ULA) is an IPv6 address in the block fc00::/7, defined in RFC 

4193. It is the approximate IPv6 counterpart of the IPv4 private address. 

The address block fc00::/7 is divided into two /8 groups: 

/ The block fc00::/8 has not been defined yet. 

/ The block fd00::/8 is defined for /48 prefixes, formed by setting the 40 least-significant bits 

of the prefix to a randomly generated bit string. 

* Prefixes in the fd00::/8 range have similar properties as those of the IPv4 private address 

ranges: 

/ They are not allocated by an address registry and may be used in networks by anyone 

without outside involvement. 

/ They are not guaranteed to be globally unique. 

/ Reverse Domain Name System (DNS) entries (under ip6.arpa) for fd00::/8 ULAs cannot 

be delegated in the global DNS. 

Reference: RFC 4193 


Question No. 54

You have a server named Server1 that runs Windows Server 2012 R2. 

Each day, Server1 is backed up fully to an external disk. 

On Server1, the disk that contains the operating system fails. 

You replace the failed disk. 

You need to perform a bare-metal recovery of Server1 by using the Windows Recovery 

Environment (Windows RE). 

What should you do? 

A. Run the Start-WBVolumeRecovery cmdlet and specify the -backupset parameter. 

B. Run the Get-WBBareMetalRecovery cmdlet and specify the -policy parameter. 

C. Run the wbadmin.exe start recovery command and specify the -recoverytarget parameter. 

D. Run the wbadmin.exe start sysrecovery command and specify the -backuptarget parameter. 

Answer:

Explanation: 

Performs a system recovery (bare metal recovery). This subcommand can be run only from the Windows Recovery Environment. 

* -backupTarget Specifies the storage location that contains the backup or backups that you want to recover. This parameter is useful when the storage location is different from where backups of this computer are usually stored. 

Reference: Wbadmin start sysrecovery 

http://technet.microsoft.com/en-us/library/cc742118.aspx 


Question No. 55

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. The File Server Resource Manager role service is installed on Server1. All servers run Windows Server 2012 R2. 

A Group Policy object (GPO) named GPO1 is linked to the organizational unit (OU) that contains Server1. The following graphic shows the configured settings in GPO1. 


Server1 contains a folder named Folder1. Folder1 is shared as Share1. 

You attempt to configure access-denied assistance on Server1, but the Enable access-denied assistance option cannot be selected from File Server Resource Manager. 

You need to ensure that you can configure access-denied assistance on Server1 manually by using File Server Resource Manager. 

Which two actions should you perform? 

A. Set the Enable access-denied assistance on client for all file types policy setting to Disabled for GPO1. 

B. Set the Customize message for Access Denied errors policy setting to Not Configured for GPO1. 

C. Set the Enable access-denied assistance on client for all file types policy setting to Enabled for GPO1. 

D. Set the Customize message for Access Denied errors policy setting to Enabled for GPO1. 

Answer: C,D 

Explanation: 

C. To configure access-denied assistance for all file types by using Group Policy . Open Group Policy Management. In Server Manager, click Tools, and then click 

Group Policy Management. . Right-click the appropriate Group Policy, and then click Edit. . Click Computer Configuration, click Policies, click Administrative Templates, click 

System, and then click Access-Denied Assistance. 

Right-click Enable access-denied assistance on client for all file types, and then 

click Edit. 

Click Enabled, and then click OK. 

D. To configure access-denied assistance by using Group Policy (see step 5) 

Open Group Policy Management. In Server Manager, click Tools, and then click 

Group Policy Management. 

Right-click the appropriate Group Policy, and then click Edit. 

Click Computer Configuration, click Policies, click Administrative Templates, click 

System, and then click Access-Denied Assistance. 

Right-click Customize message for Access Denied errors, and then click Edit. 

Select the Enabled option. 

Etc Reference: Deploy Access-Denied Assistance (Demonstration Steps) http://technet.microsoft.com/en-us/library/hh831402.aspx 


70-412 sample question

Question No. 56

Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows Server 2012 R2. All servers have the Hyper-V server role and the Failover Clustering feature installed. 


You need to replicate virtual machines from Cluster1 to Cluster2. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. From Hyper-V Manager on a node in Cluster2, create three virtual machines. 

B. From Cluster2, add and configure the Hyper-V Replica Broker role. 

C. From Failover Cluster Manager on Cluster1, configure each virtual machine for replication. 

D. From Cluster1, add and configure the Hyper-V Replica Broker role. 

E. From Hyper-V Manager on a node in Cluster2 modify the Hyper-V settings. 

Answer: C,D,E 

Explanation: 

D. You must configure the Hyper-V Replica Broker for cluster1. 

E. We must configure configure the Replica server to receive replication from primary servers: In Hyper-V Manager, click Hyper-V Settings in the Actions pane. 

In the Hyper-V Settings dialog, click Replication Configuration. 

In the Details pane, select Enable this computer as a Replica server. 

C. Enable virtual machine replication. 

Once the hosting server is configured for Replica, you can enable replication for each 

virtual machine that you want to be replicated. 

Reference: Deploy Hyper-V Replica 

https://technet.microsoft.com/en-us/library/jj134207.aspx 


Question No. 57

HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains domain controllers that run either Windows Server 2003, Windows Server 2008 R2, or Windows Server 2012 R2. 

You plan to implement a new Active Directory forest. The new forest will be used for testing and will be isolated from the production network. 

In the test network, you deploy a server named Server1 that runs Windows Server 2012 R2. 

You need to configure Server1 as a new domain controller in a new forest named contoso.test. 

The solution must meet the following requirements: 

. The functional level of the forest and of the domain must be the same as that of contoso.com. . Server1 must provide name resolution services for contoso.test. 

What should you do? 

To answer, configure the appropriate options in the answer area. 



Answer: 



Question No. 58

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Guster1. Cluster1 contains a file server role named FS1 and a generic service role named SVC1. Server1 is the preferred node for FS1. Server 2 is the preferred node for SVC1. 

You plan to run a disk maintenance tool on the physical disk used by FS1. 

You need to ensure that running the disk maintenance tool does not cause a failover to occur. 

What should you do before you run the tool? 

A. Run Suspend-ClusterResource. 

B. Run Suspend-GusterNode. 

C. Run cluster.exe and specify the pause parameter. 

D. Run cluster.exe and specify the offline parameter. 

Answer:


Question No. 59

You have a server named Server1 that runs Windows Server 2012 R2. 

Windows Server 2012 R2 is installed on volume C. 

You need to ensure that Safe Mode with Networking loads the next time Server1 restarts. 

Which tool should you use? 

A. The Msconfig command 

B. The Bootcfg command 

C. The Restart-Computer cmdlet 

D. The Restart-Server cmdlet 

Answer:

Explanation: 

Use system config (Msconfig) to configure boot options. 


Reference: System Configuration – aka MSCONFIG. 


Question No. 60

DRAG DROP 

Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains an Active Directory Rights Management Services (AD RMS) root cluster. All servers run Windows Server 2012 R2. 

You need to ensure that the rights account certificates issued in adatum.com are accepted by the AD RMS root cluster in contoso.com. 

What should you do in each forest? 

To answer, drag the appropriate actions to the correct forests. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 


Answer: