[Free] 2018(May) EnsurePass Examcollection Microsoft 70-412 Dumps with VCE and PDF 81-90

Ensurepass.com : Ensure you pass the IT Exams
2018 May Microsoft Official New Released 70-412
100% Free Download! 100% Pass Guaranteed!

Configuring Advanced Windows Server 2012 R2 Services

Question No: 81 – (Topic 2)

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a Clustered Shared Volume (CSV).

A developer creates an application named App1. App1 is NOT a cluster-aware application. App1 stores data in the file system.

You need to ensure that App1 runs in Cluster1. The solution must minimize development effort.

Which cmdlet should you run?

  1. Add-ClusterServerRole

  2. Add-ClusterGenericServiceRole

  3. Add ClusterScaleOutFileServerRole

  4. Add ClusterGenericApplicationRole

Answer: D Explanation:

Add-ClusterGenericApplicationRole

Configure high availability for an application that was not originally designed to run in a failover cluster.

If you run an application as a Generic Application, the cluster software will start the application, then periodically query the operating system to see whether the application appears to be running. If so, it is presumed to be online, and will not be restarted or failed over.

EXAMPLE 1.

Command Prompt: C:\PSgt;

Add-ClusterGenericApplicationRole -CommandLine NewApplication.exe Name OwnerNode State

— —– —

cluster1GenApp node2 Online Description

——

This command configures NewApplication.exe as a generic clustered application. A default name will be used for client access and this application requires no storage.

Reference: Add-ClusterGenericApplicationRole http://technet.microsoft.com/en-us/library/ee460976.aspx

Question No: 82 – (Topic 2)

You have a datacenter that contains six servers. Each server has the Hyper-V server role installed and runs Windows Server 2012 R2. The servers are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

Host4 and Host5 are part of a cluster named Cluster1. Cluster1 hosts a virtual machine named VM1.

You need to move VM1 to another Hyper-V host. The solution must minimize the downtime of VM1.

To which server and by which method should you move VM1?

  1. To Host3 by using a storage migration

  2. To Host6 by using a storage migration

  3. To Host2 by using a live migration

  4. To Host1 by using a quick migration

Answer: A Explanation:

With Hyper-V live migration, you can move running VMs from one Hyper-V physical host to another without any disruption of service or perceived downtime.

Host3 has an Intel processer, as does Host4 and Host5 in Cluster1, so the migration will work fine.

Incorrect:

Not B, not C. The migration of a virtual machine between physical computers is only supported on computers that have the same processor steppings or are from the same vendor. Therefore you cannot move a virtual machine from a Hyper-V host on an Intel- based server to a Hyper-V Host on an AMD-based server.

Not D. Quick Migration saves, moves and restores VMs, which results in some downtime.

Reference: Hyper-V Migration Guide http://technet.microsoft.com/en-us/library/ee849855(v=WS.10).aspx

Reference: Virtual Machine Storage Migration Overview http://technet.microsoft.com/en-us/library/hh831656.aspx

Reference: Windows Server 2008 R2 amp; Microsoft Hyper-V Server 2008 R2 – Hyper-V Live Migration Overview amp; Architecture (http://www.microsoft.com/en- us/download/details.aspx?id=12601)

Question No: 83 – (Topic 2)

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1 that runs a Server Core Installation of Windows Server 2012 R2.

File1 has a volume named D that contains home folders. File1 creates a shadow copy of

volume D twice a day.

You discover that volume D is almost full. You add a new volume named H to File1.

You need to ensure that the shadow copies of volume D are stored on volume H. Which command should you run?

  1. The Set-Volume cmdlet with the -driveletter parameter

  2. The vssadmin.exe create shadow command

  3. The Set-Volume cmdlet with the -path parameter

  4. The vssadmin.exe add shadowstorage command

Answer: D Explanation:

Add ShadowStorage

Adds a shadow copy storage association for a specified volume.

Incorrect:

Not A. Sets or changes the file system label of an existing volume. -DriveLetter Specifies a letter used to identify a drive or volume in the system.

Not B. Create Shadow

Creates a new shadow copy of a specified volume.

Not C. Sets or changes the file system label of an existing volume -Path Contains valid path information.

Reference: Vssadmin; Set-Volume

http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx

Question No: 84 – (Topic 2)

Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2.

The domain contains four servers. The servers are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

You need to deploy IP Address Management (IPAM) to manage DNS and DHCP. On which server should you install IPAM?

  1. DC1

  2. DC2

  3. DC3

  4. Server1

Answer: D Explanation: Explanaton:

IPAM cannot be installed on Domain Controllers. All servers, except Server1, have the DC role

Reference: IP Address Management (IPAM) Overview http://technet.microsoft.com/en-us/library/hh831353.aspx

Question No: 85 – (Topic 2)

Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. The functional level of the forest is Windows Server 2003.

You have a domain outside the forest named adatum.com.

You need to configure an access solution to meet the following requirements:

  • Users in adatum.com must be able to access resources in contoso.com.

  • Users in adatum.com must be prevented from accessing resources in fabrikam.com.

  • Users in both contoso.com and fabrikam.com must be prevented from accessing resources in adatum.com.

What should you create?

  1. a one-way realm trust from contoso.com to adatum.com

  2. a one-way realm trust from adatum.com to contoso.com

  3. a one-way external trust from contoso.com to adatum.com

  4. a one-way external trust from adatum.com to contoso.com

Answer: C Explanation:

The contoso domain must trust the adatum domain.

Note: In a One-way: incoming trust, users in your (trusted) domain can be authenticated in the other (trusting) domain. Users in the other domain cannot be authenticated in your domain.

Incorrect:

Not A, not B. Use realm trusts to form a trust relationship between a non-Windows Kerberos realm and a Windows Server domain.

Not D. The resources that are to be shared are in the contoso domain. Reference: Trust types

Question No: 86 – (Topic 2)

Your network contains an Active Directory forest named contoso.com. The contoso.com domain only contains domain controllers that run Windows Server 2012 R2.

The forest contains a child domain named child.contoso.com. The child.contoso.com domain only contains domain controllers that run Windows Server 2008 R2. The child.contoso.com domain contains a member server named Server1 that runs Windows Server 2012 R2.

You have access to four administrative user accounts in the forest. The administrative user accounts are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

You need to ensure that you can add a domain controller that runs Windows Server 2012 R2 to the child.contoso.com domain.

Which account should you use to run adprep.exe?

  1. Admin1

  2. Admin2

  3. Admin3

  4. Admin4

Answer: C Explanation:

Adprep.exe performs operations that must be completed on the domain controllers that run in an existing Active Directory environment before you can add a domain controller that runs that version of Windows Server.

Preparing to run adprep /domainprep(see step 2 below).

To help ensure that theadprep /domainprepcommand runs successfully, complete these steps before you run the command on the infrastructure operations master role holder in each domain:

->Make sure that the schema updates thatadprep /forestprepperforms replicated

throughout the forest or that they at least replicated to the infrastructure master for

the domain where you plan to runadprep /domainprep.

->Make sure that you can log on to the infrastructure master with an account that is a member of the Domain Admins group.

->Verify that the domain functional level isappropriate.

Reference: Running Adprep.exe

http://technet.microsoft.com/en-us/library/dd464018(v=ws.10).aspx

Question No: 87 HOTSPOT – (Topic 2)

Your company has a main office and a branch office. The main office is located in Detroit. The branch office is located in Seattle.

The network contains an Active Directory domain named adatum.com. Client computers run either Windows 7 Enterprise or Windows 8 Enterprise.

The main office contains 1,000 client computers and 50 servers. The branch office contains 20 client computers.

All computer accounts for the branch office are located in an organizational unit (OU) named SeattleComputers. A Group Policy object (GPO) named GPO1 is linked to the SeattleComputers OU.

You need to configure BranchCache for the branch office.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Ensurepass 2018 PDF and VCE

* BranchCache is disabled by default on client computers. Take the following steps to enable BranchCache on client computers:

->Turn on BranchCache.

->Enable either Distributed Cache mode or Hosted Cache mode.

->Configure the client firewall to enable BranchCache protocols.

* Distributed Cache mode

If client computers are configured to use Distributed Cache mode, the cached content is distributed among client computers on the branch office network. No infrastructure or services are required in the branch office beyond client computers running Windows 7.

Hosted Cache mode

In hosted cache mode, cached content is maintained on a computer running Windows Server 2008 R2 on the branch office network.

Question No: 88 – (Topic 2)

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. Server1 has an IPv6 scope named Scope1.

You implement an additional DHCP server named Server2 that runs Windows Server 2012 R2.

You need to provide high availability for Scope1. The solution must minimize administrative effort.

What should you do?

  1. Install and configure Network Load Balancing (NLB) on Server1 and Server2.

  2. Create a scope on Server2.

  3. Configure DHCP failover on Server1.

  4. Install and configure Failover Clustering on Server1 and Server2.

    Answer: C Explanation:

    Overview: Configure DHCP failover using the DHCP console

    To configure DHCP failover using the DHCP console, right-click a DHCP scope or right- click IPv4 and then click Configure Failover.

    Ensurepass 2018 PDF and VCE

    Configure Failover

    TheConfigure Failoverwizard guides you through configuring DHCP failover on the selected scope.

    Note: The DHCP server failover feature, available in Windows Server 2012 and later,

    provides the ability to have two DHCP servers provide IP addresses and option configuration to the same subnet or scope, providing for continuous availability of DHCP service to clients.

    Incorrect:

    Not A. NLB is not related to DHCP scope availability. Not B. DHCP failover requirements include:

    DHCP Scopes requirement:

    At least one IPv4 DHCP scope must be configured on the primary DHCP server.

    The same DHCP scope ID, or an overlapping scope, must not be configured on the failover partner.

    Not D. Failover clustering is possibly, but would not minimize administration. Reference: Deploy DHCP Failover

    Question No: 89 HOTSPOT – (Topic 2)

    Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2.

    Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains an application named App1 that is accessed by using the URL http://app1.contoso.com.

    You deploy a new server named Server3 that runs Windows Server 2012 R2. The contoso.com DNS zone contains the records shown in the following table.

    Ensurepass 2018 PDF and VCE

    You need to add Server3 to the NLB cluster.

    What command should you run?

    To answer, select the appropriate options in the answer area.

    Ensurepass 2018 PDF and VCE

    Ensurepass 2018 PDF and VCE

    Answer:

    Ensurepass 2018 PDF and VCE

    Explanation:

    Ensurepass 2018 PDF and VCE

    • The Add-NlbClusterNode cmdlet adds a new node to the NLB cluster. Once the new node settings are circulated through all of the NLB cluster node, the new cluster node will be in a running state in the cluster.

    • The Get-NlbClusterNode cmdlet retrieves information about a node in the NLB cluster.

    • EXAMPLE: This command adds host node2 to the cluster on node1. C:\PSgt;

    Get-NlbCluster node1 | Add-NlbClusterNode -NewNodeName node2 -NewNodeInterface vlan-3

    Name State Interface HostID

    — — —– —

    node2 Converged vlan-3 2

    Question No: 90 HOTSPOT – (Topic 2)

    You have a file server named Server1 that runs Windows Server 2012 R2.

    Server1 contains a file share that must be accessed by only a limited number of users.

    You need to ensure that if an unauthorized user attempts to access the file share, a custom

    access-denied message appears, which contains a link to request access to the share. The message must not appear when the unauthorized user attempts to access other shares.

    Which two nodes should you configure in File Server Resource Manager? To answer, select the appropriate two nodes in the answer area.

    Ensurepass 2018 PDF and VCE

    Answer:

    Ensurepass 2018 PDF and VCE

    Explanation:

    Ensurepass 2018 PDF and VCE

    • Configure access-denied assistance

      To configure access-denied assistance by using File Server Resource Manager

      1. Open File Server Resource Manager. In Server Manager, click Tools, and then click File Server Resource Manager.

      2. Right-click File Server Resource Manager (Local), and then click Configure Options. etc.

  • To specify a separate access-denied message for a shared folder by using File Server Resource Manager

  1. Open File Server Resource Manager. In Server Manager, click Tools, and then click File Server Resource Manager.

  2. Expand File Server Resource Manager (Local), and then click Classification Management.

  3. Right-click Classification Properties, and then click Set Folder Management Properties. Etc

    100% Ensurepass Free Download!
    Download Free Demo:70-412 Demo PDF
    100% Ensurepass Free Guaranteed!
    Download 2018 EnsurePass 70-412 Full Exam PDF and VCE

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *