aiotestking uk

70-412 Exam Questions - Online Test


70-412 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

The network has the physical sites and TCP/IP subnets configured as shown in the following table. 

You have a web application named App1 that is hosted on six separate Web servers. DNS has the host names and IP addresses registered as shown in the following table. 

You discover that when users connect to appl.contoso.com, they are connected frequently to a server that is not on their local subnet. 

You need to ensure that when the users connect to appl.contoso.com, they connect to a server on their local subnet. The connections must be distributed across the servers that host appl.contoso.com on their subnet. 

Which two settings should you configure? 

To answer, select the appropriate two settings in the answer area. 

Answer:  

Q2. DRAG DROP 

Your network contains an Active Directory domain named contoso.com. 

You need to ensure that third-party devices can use Workplace Join to access domain resources on the Internet. 

Which four actions should you perform in sequence? 

To answer, move the appropriate four actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer:  

Q3. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA). 

All users in the domain are issued a smart card and are required to log on to their domain-joined client computer by using their smart card. 

A user named User1 resigned and started to work for a competing company. 

You need to prevent User1 immediately from logging on to any computer in the domain. The solution must not prevent other users from logging on to the domain. 

Which tool should you use? 

A. Active Directory Users and Computers 

B. Server Manager 

C. The Certificates snap-in 

D. Active Directory Administrative Center 

Answer:

Explanation: 

To disable or enable a user account using Active Directory Administrative Center 

1. To open Active Directory Administrative Center, click Start , click Administrative Tools , 

and then click Active Directory Administrative Center . 

To open Active Directory Users and Computers in Windows Server 2012, click Start , type 

dsac.exe. 

2. In the navigation pane, select the node that contains the user account whose status you 

want to change. 

3. In the management list, right-click the user whose status you want to change. 

4. Depending on the status of the user account, do one of the following: . uk.co.certification.simulator.questionpool.PList@ef38f20 

Reference: Disable or Enable a User Account 

Q4. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

You are creating a central access rule named TestFinance that will be used to grant members of the Authenticated users group access to a folder stored on a Microsoft SharePoint Server 2013 server. 

You need to ensure that the permissions are granted when the rule is published. 

What should you do? 

A. Set the Permissions to Use the following permissions as proposed permissions. 

B. Set the Permissions to Use following permissions as current permissions. 

C. Add a Resource condition to the current permissions entry for the Authenticated Users principal. 

D. Add a User condition to the current permissions entry for the Authenticated Users principal. 

Answer:

Explanation: 

To create a central access rule (see step 5 below): In the left pane of the Active Directory Administrative Center, click Tree View, select Dynamic Access Control, and then click Central Access Rules. Right-click Central Access Rules, click New, and then click Central Access Rule. In the Name field, type Finance Documents Rule. In the Target Resources section, click Edit, and in the Central Access Rule dialog box, click Add a condition. Add the following condition: [Resource] [Department] [Equals] [Value] [Finance], and then click OK. In the Permissions section, select Use following permissions as current permissions, click Edit, and in the Advanced Security Settings for Permissions dialog box click Add. 

Note (not A): Use the following permissions as proposed permissions option lets you create the policy in staging. 

6. In the Permission entry for Permissions dialog box, click Select a principal, type Authenticated Users, and then click OK. 

Etc. 

Incorrect: 

Not A. Proposed permissions enable an administrator to more accurately model the impact 

of potential changes to access control settings without actually changing them. 

Reference: Deploy a Central Access Policy (Demonstration Steps) 

https://technet.microsoft.com/en-us/library/hh846167.aspx 

Q5. HOTSPOT 

Your network contains three Active Directory forests. The forests are configured as shown in the following table. 

A two-way forest trust exists between contoso.com and divisionl.contoso.com. A two-way forest trust also exists between contoso.com and division2.contoso.com. 

You plan to create a one-way forest trust from divisionl.contoso.com to division2.contoso.com. 

You need to ensure that any cross-forest authentication requests are sent to the domain controllers in the appropriate forest after the trust is created. 

How should you configure the existing forest trust settings? 

In the table below, identify which configuration must be performed in each forest. Make only one selection in each column. Each correct selection is worth one point. 

Answer:  

Q6. You have a server named Server1 that runs Windows Server 2012 R2. 

Windows Server 2012 R2 is installed on volume C. 

You need to ensure that Safe Mode with Command Prompt loads the next time Server1 

restarts. 

Which tool should you use? 

A. The Restart-Server cmdlet 

B. The Bootcfg command 

C. The Restart-Computer cmdlet 

D. The Bcdedit command 

Answer:

Explanation: 

How To Force Windows To Restart in Safe Mode 

1. Open Advanced Startup Options in Windows 8 

2. Open Command Prompt. 

3. With Command Prompt open, execute the correct bcdedit command as shown below based on which Safe Mode option you'd like to start: 

Safe Mode: 

bcdedit /set {default} safeboot minimal 

http://pcsupport.about.com/od/repair-recovery/a/force-or-stop-safe-mode-windows.htm 

Q7. HOTSPOT 

Your network contains three application servers that run Windows Server 2012 R2. The application servers have the Network Load Balancing (NLB) feature installed. 

You create an NLB cluster that contains the three servers. 

You plan to deploy an application named App1 to the nodes in the cluster. App1 uses TCP port 8080 and TCP port 8081. 

Clients will connect to App1 by using HTTP and HTTPS. When clients connect to App1 by using HTTPS, session state information will be retained locally by the cluster node that responds to the client request. 

You need to configure a port rule for Appl. 

Which port rule should you use? 

To answer, select the appropriate rule in the answer area. 

Answer:  

Q8. HOTSPOT 

Your network contains one Active Directory forest named adatum.com. The forest contains a single domain. 

The forest contains the domain controllers configured as shown in the following table. 

Recently, a domain controller named DC4 was deployed to adatum.com. DC4 is in the Default-First-Site-Name site. 

The adatum.com site links are configured as follows. 

The schedule for SiteLink1 is shown in the SiteLink1 exhibit. (Click the Exhibit button.) 

The schedule for SiteLink2 is shown in the SiteLink2 exhibit. (Click the Exhibit button.) 

For each of the following statements, select Yes if the statement is true. Otherwise, select No. 

Answer:  

Q9. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

You add two additional nodes in Cluster1. 

You have a folder named Folder1 on Server1 that hosts Application data. Folder1 is a folder target in a Distributed File System (DFS) namespace. 

You need to provide highly available access to Folder1. The solution must support DFS Replication to Folder1. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

File Server for general use 

Note: You can deploy and configure a clustered file server by using either of the following methods: 

* File Server for general use. This is the continuation of the clustered file server that has been supported in Windows Server since the introduction of Failover Clustering. This type of clustered file server, and therefore all the shares associated with the clustered file server, is online on one node at a time. This is sometimes referred to as active-passive or dual-active. File shares associated with this type of clustered file server are called clustered file shares. This is the recommended file server type when deploying information worker scenarios. 

* Scale-Out File Server for application data This clustered file server feature was introduced in Windows Server 2012, and it lets you store server application data, such as Hyper-V virtual machine files, on file shares, and obtain a similar level of reliability, availability, manageability, and high performance that you would expect from a storage area network. All file shares are simultaneously online on all nodes. File shares associated with this type of clustered file server are called scale-out file shares. This is sometimes referred to as active-active. This is the recommended file server type when deploying either Hyper-V over Server Message Block (SMB) or Microsoft SQL Server over SMB. 

Reference: Scale-Out File Server for Application Data Overview 

Q10. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. Server1 is configured to resolve single-label names for DNS clients. 

You need to view the number of queries for single-label names that are resolved by Server1. 

What command should you run? 

To answer, select the appropriate options in the answer area. 

Answer: