aiotestking uk

70-412 Exam Questions - Online Test


70-412 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

Both servers have the Hyper-V server role installed. Server1 and Server2 are located in different offices. The offices connect to each other by using a high-latency WAN link. 

Server2 hosts a virtual machine named VM1. 

You need to ensure that you can start VM1 on Server1 if Server2 fails. The solution must minimize hardware costs. 

What should you do? 

A. On Server1, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1. 

B. From the Hyper-V Settings of Server2, modify the Replication Configuration settings. Enable replication for VM1. 

C. On Server2, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1. 

D. From the Hyper-V Settings of Server1, modify the Replication Configuration settings. Enable replication for VM1. 

Answer:

Explanation: 

You first have to enable replication on the Replica server--Server1--by going to the server and modifying the "Replication Configuration" settings under Hyper-V settings. You then go to VM1--which presides on Server2-- and run the "Enable Replication" wizard on VM1. 

Q2. You have a cluster named Cluster1 that contains two nodes. Both nodes run Windows Server 2012 R2. Cluster1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. 

You configure a custom service on VM1 named Service1. 

You need to ensure that VM1 will be moved to a different node if Service1 fails. 

Which cmdlet should you run on Cluster1? 

A. Add-ClusterVmMonitoredItem 

B. Set-ClusterResourceDependency 

C. Enable- VmResourceMetering 

D. Add-ClusterGenericServiceRole 

Answer:

Explanation: 

* The Add-ClusterVMMonitoredItem cmdlet configures monitoring for a service or an Event Tracing for Windows (ETW) event so that it is monitored on a virtual machine. If the service fails or the event occurs, then the system responds by taking an action based on the failover configuration for the virtual machine resource. For example, the configuration might specify that the virtual machine be restarted or failover. 

* The decision on whether to failover or restart on the same node is configurable and determined by the failover properties for the virtual machine. 

Reference: Add-ClusterVMMonitoredItem 

Q3. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1. Server1 

has the IP Address Management (IPAM) Server feature installed. 

On Dc1, you configure Windows Firewall to allow all of the necessary inbound ports for 

IPAM. 

On Server1, you open Server Manager as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can use IPAM on Server1 to manage DNS on DC1. 

What should you do? 

A. Modify the outbound firewall rules on Server1. 

B. Modify the inbound firewall rules on Server1. 

C. Add Server1 to the Remote Management Users group. 

D. Add Server1 to the Event Log Readers group. 

Answer:

Explanation: 

To access configuration data and server event logs, the IPAM server must be a member of the domain IPAM Users Group (IPAMUG). The IPAM server must also be a member of the Event Log Readers security group. 

Note: The computer account of the IPAM server must be a member of the Event Log Readers security group. 

Reference: Manually Configure DC and NPS Access Settings. http://technet.microsoft.com/en-us/library/jj878317.aspx http://technet.microsoft.com/en-us/library/jj878313.aspx

Q4. DRAG DROP 

Your network contains an Active Directory domain named adatum.com. The domain contains three servers. The servers are configured as shown in the following table. 

Server1 is configured as shown in the exhibit. (Click the Exhibit button.) 

Template1 contains custom cryptography settings that are required by the corporate security team. 

On Server2, an administrator successfully installs a certificate based on Template1. 

The administrator reports that Template1 is not listed in the Certificate Enrollment wizard on Server3, even after selecting the Show all templates check box. 

You need to ensure that you can install a server authentication certificate on Server3. The certificate must comply with the cryptography requirements. 

Which three actions should you perform in sequence? 

To answer, move the appropriate three actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer:  

Q5. Your network contains an Active Directory domain named contoso.com. The domain 

contains a certification authority (CA). 

You suspect that a certificate issued to a Web server is compromised. 

You need to minimize the likelihood that users will trust the compromised certificate. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Stop the Certificate Propagation service. 

B. Modify the validity period of the Web Server certificate template. 

C. Run certutil and specify the -revoke parameter. 

D. Run certutil and specify the -deny parameter. 

E. Publish the certificate revocation list (CRL). 

Answer: C,E 

Explanation: First revoke the certificate, then publish the CRL. 

Q6. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 is a file server that has the Hyper-V server role installed. 

Server1 hosts several virtual machines. The virtual machine configuration files are stored on drive D and the VHD files are stored on drive E. 

You plan to replace drive E with a larger volume. 

You need to ensure that the virtual machines on Server1 remain available while drive E is being replaced. 

What should you do? 

A. Perform a quick migration. 

B. Add Server1 and Server2 as nodes in a failover cluster. 

C. Perform a live migration. 

D. Perform a storage migration. 

Answer:

Explanation: 

Hyper-V in Windows Server 2012 R2 introduces support for moving virtual machine storage without downtime by making it possible to move the storage while the virtual machine remains running. 

Reference: Virtual Machine Storage Migration Overview 

http://technet.microsoft.com/en-us/library/hh831656.aspx 

Q7. Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows Server 2012 R2. All servers have the Hyper-V server role and the Failover Clustering feature installed. 

You need to replicate virtual machines from Cluster1 to Cluster2. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. From Hyper-V Manager on a node in Cluster2, create three virtual machines. 

B. From Cluster2, add and configure the Hyper-V Replica Broker role. 

C. From Failover Cluster Manager on Cluster1, configure each virtual machine for replication. 

D. From Cluster1, add and configure the Hyper-V Replica Broker role. 

E. From Hyper-V Manager on a node in Cluster2 modify the Hyper-V settings. 

Answer: C,D,E 

Explanation: 

D. You must configure the Hyper-V Replica Broker for cluster1. 

E. We must configure configure the Replica server to receive replication from primary servers: In Hyper-V Manager, click Hyper-V Settings in the Actions pane. 

In the Hyper-V Settings dialog, click Replication Configuration. 

In the Details pane, select Enable this computer as a Replica server. 

C. Enable virtual machine replication. 

Once the hosting server is configured for Replica, you can enable replication for each 

virtual machine that you want to be replicated. 

Reference: Deploy Hyper-V Replica 

https://technet.microsoft.com/en-us/library/jj134207.aspx 

Q8. Your network contains 20 iSCSI storage appliances that will provide storage for 50 Hyper-V hosts running Windows Server 2012 R2. 

You need to configure the storage for the Hyper-V hosts. The solution must minimize administrative effort. 

What should you do first? 

A. Install the iSCSI Target Server role service and configure iSCSI targets. 

B. Install the iSNS Server service feature and create a Discovery Domain. 

C. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties. 

D. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties. 

Answer:

Explanation: 

Windows Server 2012 includes an iSCSI Target role that, along with Failover Clustering, 

allows it to become a cost-effective and highly-available iSCSI Storage Array. We can connect from our Hyper-V host to the iSCSI target on the storage array with the following PowerShell command line: 

New-IscsiTargetPortal –TargetPortalAddress <IP_Address or FQDN of storage array> 

$target = Get-IscsiTarget 

Connect-IscsiTarget –NodeAddress $target.NodeAddress 

Incorrect: 

Not B. Discovery Domains in an iSCSI fabric, like zones in a Fibre Channel fabric, enable you to partition the storage resources in your storage area network (SAN). By creating and managing Discovery Domains, you can control the iSCSI targets that each iSCSI initiator can see and log on to. 

Reference: Configure iSCSI Target Server Role on Windows Server 2012 

Q9. You have a server named SCI that runs a Server Core Installation of Windows Server 2012 R2. Shadow copies are enabled on all volumes. 

You need to delete a specific shadow copy. The solution must minimize server downtime. 

Which tool should you use? 

A. Shadow 

B. Diskshadow 

C. Wbadmin 

D. Diskpart 

Answer:

Explanation: 

DiskShadow.exe is a tool that exposes the functionality offered by the Volume Shadow 

Copy Service (VSS). 

The diskshadow command delete shadows deletes shadow copies. 

Reference: Technet, Diskshadow 

Q10. DRAG DROP 

You have a file server named Server1 that runs Windows Server 2012 R2. The folders on Server1 are configured as shown in the following table. 

A new corporate policy states that backups must use Windows Azure Online Backup whenever possible. 

You need to identify which technology you must use to back up Server1. The solution must use Windows Azure Online Backup whenever possible. 

What should you identify? 

To answer, drag the appropriate backup type to the correct location or locations. Each backup type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: