[FREE NEW UPDATED] Braindump2go Microsoft Exam 70-412 Updated For Free Download (236-245)

Braindump2go Guarantees Your Microsoft 70-412 Exam 100% Success with Our Unique Official 70-412 Exam Questions Resources! Braindump2go’s 70-412 Braindumps are Developed by Experiences IT Certifications Professionals Working in Today’s Prospering Companies and Data Centers! Braindump2go 70-412 Exam Dumps are Checked by Our Experts Team every day to ensure you have the Latest Updated Exam Dumps!

Vendor: Microsoft
Exam Code: 70-412
Exam Name: Configuring Advanced Windows Server 2012 R2 Services

1[10]

QUESTION 236
Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server1 that runs a Server Core installation of Windows Server 2012 R2.
You need to deploy a certification authority (CA) to Server1.
The CA must support the auto- enrollment of certificates.
Which two cmdlets should you run? (Each correct answer presents part of the solution.
Choose two.)

A.    Add-CAAuthoritylnformationAccess
B.    Install-AdcsCertificationAuthority
C.    Add-WindowsFeature
D.    Install-AdcsOnlineResponder
E.    Install-AdcsWebEnrollment

Answer: BC
Explanation:
It seems B and C.
You must install the CA role before you run Install-AdcsCertificationAuthority.
http://technet.microsoft.com/en-us/library/hh848389.aspx
“Detailed Description
The Install-AdcsCertificationAuthority cmdlet performs installation and configuration of the AD CS CA role service.
To remove the certification authority role service use the Uninstall-AdcsCertificationAuthority cmdlet.
You can import the cmdlet by running the following commands from Windows PowerShell:
Import-Module ServerManager
Add-WindowsFeature Adcs-Cert-Authority”

QUESTION 237
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has the DNS Server server role installed.
You need to store the contents of all the DNS queries received by Server1.
What should you configure?

A.    Logging from Windows Firewall with Advanced Security
B.    Debug logging from DNS Manager
C.    A Data Collector Set (DCS) from Performance Monitor
D.    Monitoring from DNS Manager

Answer: B
Explanation:
Debug logging allows you to log the packets sent and received by a DNS server. Debug logging is disabled by default, and because it is resource intensive, you should only activate it temporarily when you need more specific detailed information about server performance.

QUESTION 238
You have a server named LON-DC1 that runs Windows Server 2012 R2. An iSCSI virtual disk named VirtuahSCSIl.vhd exists on LON-DC1 as shown in the exhibit. (Click the Exhibit button.)

wps60D4.tmp_thumb

You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt iSCSI target. VirtuahSCSI1.vhd is removed from LON-DC1.
You need to assign VirtualiSCSI2.vhd a logical unit value of 0.
What should you do?

A.    Run the Set-IscsiVirtualDisk cmdlet and specify the -DevicePath parameter.
B.    Run the iscsicpl command and specify the virtualdisklun parameter.
C.    Modify the properties of the itgt ISCSI target.
D.    Run the Set-VirtualDisk cmdlet and specify the -Uniqueld parameter.

Answer: D
Explanation:
Set-VirtualDisk
Modifies the attributes of an existing virtual disk.
Applies To: Windows Server 2012 R2
-UniqueId<String>
Specifies an ID used to uniquely identify a Disk object in the system.
The ID persists through restarts.
Note: Logical unit numbers (LUNs) created on an iSCSI disk storage subsystem are not directly assigned to a server. For iSCSI, LUNs are assigned to logical entities called targets.
Incorrect:
Not A: Set-IscsiVirtualDisk
Modifies the settings for the specified iSCSI virtual disk.
-Path<String> (alias: DevicePath)
Specifies the path of the virtual hard disk (VHD) file that is associated with the iSCSI virtual disk. Filter the iSCSI Virtual Disk object using this parameter.
Not B: iscsicpl.exe could is the Microsoft iSCSI Initiator Configuration Tool.
Microsoft Internet iSCSI Initiator enables you to connect a host computer that is running Windows 7 or Windows Server 2008 R2 to an external iSCSI-based storage array through an Ethernet network adapter.

QUESTION 239
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2.
You fail to start VM1 and you suspect that the boot files on VM1 are corrupt.
On Server1, you attach the virtual hard disk (VHD) of VM1 and you assign the VHD a drive letter of F.
You need to repair the corrupt boot files on VM1. What should you run?

A.    bootrec.exe /rebuildbcd
B.    bootrec.exe /scanos
C.    bcdboot.exe f:\windows /s c:
D.    bcdboot.exe c:\windows /s f:

Answer: D
Explanation:
Bcdboot
Enables you to quickly set up a system partition, or to repair the boot environment located on the system partition. The system partition is set up by copying a simple set of Boot Configuration Data (BCD) files to an existing empty partition.

wps94B0.tmp_thumb

wpsE447.tmp_thumb

QUESTION 240
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DNS Server server role installed. Server1 has a zone named contoso.com.
The zone is configured as shown in the exhibit. (Click the Exhibit button.)

wps215.tmp_thumb

You need to assign a user named User1 permission to add and delete records from the
contoso.com zone only.
What should you do first?

A.    Enable the Advanced view from DNS Manager.
B.    Add User1 to the DnsUpdateProxy group.
C.    Run the New Delegation Wizard.
D.    Configure the zone to be Active Directory-integrated.

Answer: D

QUESTION 241
Your network contains an Active Directory forest named contoso.com.
The forest contains two domains named contoso.com and childl.contoso.com.
The domains contain three domain controllers.
The domain controllers are configured as shown in the following table.

wps2B18.tmp_thumb

You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in both domains.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A.    Raise the domain functional level of contoso.com.
B.    Raise the domain functional level of child1.contoso.com.
C.    Raise the forest functional level of contoso.com.
D.    Upgrade DC11 to Windows Server 2012 R2.
E.    Upgrade DC1 to Windows Server 2012 R2.

Answer: AE
Explanation:
To use claims-based authorization, you need the following:
• Windows Server 2012 must be installed on the file server that hosts the resources that DAC protects.
• At least one Windows Server 2012 domain controller must be accessible by the requesting client.
• If you use claims across a forest, you must have a Windows Server 2012 domain controller in each domain.
• If you use device claims, clients must run Windows 8.
A question in the same book indicates:
Identify the minimum domain function level (2003, 2008, 2008 R2, or 2012) for the specified feature…
KDC support for claims – 2012
So the answer is A and E.
E because you must upgrade the domain controller to 2012 R2 to raise the functional level of the domain to the necessary level, and A because 2012 domain functional level is required for KDC support for claims.
Upgrading dc11.child1.contoso.com is not necessary because there is already a Server 2012 R2 server in the child domain (dc10).

QUESTION 242
Your network contains two servers named HV1 and HV2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. HV1 hosts 25 virtual machines.
The virtual machine configuration files and the virtual hard disks are stored in D:\VM.
You shut down all of the virtual machines on HV1.
You copy D:\VM to D:\VM on HV2.
You need to start all of the virtual machines on HV2.
You want to achieve this goal by using the minimum amount of administrative effort.
What should you do?

A.    Run the Import-VMInitialReplication cmdlet.
B.    From HV1, export all virtual machines to D:\VM.
Copy D:\VM to D:\VM on HV2 and overwrite the existing files.
On HV2, run the Import Virtual Machine wizard.
C.    From HV1, export all virtual machines to D:\VM.
Copy D:\VM to D:\VM on HV2 and overwrite the existing files.
On HV2, run the New Virtual Machine wizard.
D.    Run the Import-VM cmdlet.

Answer: D
Explanation:

wps5969.tmp_thumb

QUESTION 243
Your company recently deployed a new Active Directory forest named contoso.com.
The first domain controller in the forest runs Windows Server 2012 R2.
You need to identify the time-to-live (TTL) value for domain referrals to the NETLOGON and SYSVOL shared folders.
Which tool should you use?

A.    Ultrasound
B.    Replmon
C.    Dfsdiag
D.    Frsutil

Answer: C
Explanation:
http://blogs.technet.com/b/josebda/archive/2009/07/15/five-ways-to-check-your-dfs-namespaces-dfs-n-configuration-with-the-dfsdiag-exe-tool.aspx

wps72D4.tmp_thumb

QUESTION 244
Your network contains three servers named Server1, Server2, and Server3.
All servers run Windows Server 2012 R2.
You need to ensure that Server1 can provide iSCSI storage for Server2 and Server3.
What should you do on Server1?

A.    Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties.
B.    Install the iSNS Server service feature and create a Discovery Domain.
C.    Install the Multipath I/O (MPIO) feature and configure the MPIO Properties.
D.    Install the iSCSI Target Server role service and configure iSCSI targets.

Answer: D
Explanation:
iSCSI: it is an industry standard protocol allow sharing block storage over the Ethernet. The server shares the storage is called iSCSI Target. The server (machine) consumes the storage is called iSCSI initiator. Typically, the iSCSI initiator is an application server.
For example, iSCSI Target provides storage to a SQL server, the SQL server will be the iSCSI initiator in this deployment.
Target: It is an object which allows the iSCSI initiator to make a connection.
The Target keeps track of the initiators which are allowed to be connected to it.
The Target also keeps track of the iSCSI virtual disks which are associated with it.
Once the initiator establishes the connection to the Target, all the iSCSI virtual disks associated with the Target will be accessible by the initiator.
iSCSI Target Server:
The server runs the iSCSI Target. It is also the iSCSI Target role name in Windows Server 2012.

wps9987.tmp_thumb

http://blogs.technet.com/b/filecab/archive/2012/05/21/introduction-of-iscsi-target-in-windows-server-2012.aspx

QUESTION 245
Your network contains two servers that run Windows Server 2012 R2 named Server1 and Server2. Both servers have the File Server role service installed. On Server2, you create a share named Backups. From Windows Server Backup on Server1, you schedule a full backup to run every night. You set the backup destination to \\Server2 \Backups.
After several weeks, you discover that \\Server2\Backups only contains the last backup that completed on Server1.
You need to ensure that multiple backups of Server1 are maintained.
What should you do?

A.    Modify the Volume Shadow Copy Service (VSS) settings.
B.    Modify the properties of the Windows Store Service (WSService) service.
C.    Change the backup destination,
D.    Configure the permission of the Backups share.

Answer: C
Explanation:

wpsB938.tmp_thumb


100% 70-412 Complete Success & Money Back Guarantee!
By utilizing Braindump2go high quality Microsoft 70-412 pExam Dumps Products, You can surely pass 70-412 certification 100%! Braindump2go also offers 100% money back guarantee to individuals in case they fail to pass Microsoft70-412 in one attempt.

1[10]

http://www.braindump2go.com/70-412.html