Pass4sure 70 412 exam dumps Questions are updated and all 70 412 dumps answers are verified by experts. Once you have completely prepared with our 70 412 dumps exam prep kits you will be ready for the real mcsa 70 412 exam without a problem. We have Leading Microsoft 70 412 exam dumps dumps study guide. PASSED 70 412 dumps First attempt! Here What I Did.

Q1. Your network contains four Active Directory forests. Each forest contains an Active 

Directory Rights Management Services (AD RMS) root cluster. 

All of the users in all of the forests must be able to access protected content from any of 

the forests. 

You need to identify the minimum number of AD RMS trusts required. How many trusts should you identify? 

A. 3 

B. 6 

C. 12 

D. 16 

Answer:

Explanation: 

The number of AD RMS trusts required to interact between all AD RMS forests can be 

defined by using the following formula: N*(N-1). 

Here N=4, so the number of trust is 12 (4*3). 

Reference: AD RMS Prerequisites, Important considerations for installing AD RMS in a 

multi-forest environment 


Q2. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DNS Server server role installed. 

The network contains client computers that run either Linux, Windows 7, or Windows 8. 

You have a zone named adatum.com as shown in the exhibit. (Click the Exhibit button.) 

You plan to configure Name Protection on all of the DHCP servers. 

You need to configure the adatum.com zone to support Name Protection. 

What should you do? 

A. Change the zone type. 

B. Sign the zone. 

C. Add a DNSKEY record. 

D. Configure Dynamic updates. 

Answer:

Explanation: 

Name protection requires secure update to work. Without name protection DNS names may be hijacked. 

You can use the following procedures to allow only secure dynamic updates for a zone. Secure dynamic update is supported only for Active Directory–integrated zones. If the zone type is configured differently, you must change the zone type and directory-integrate the zone before securing it for Domain Name System (DNS) dynamic updates. 

Enable secure dynamic updates: 

Reference: DHCP: Secure DNS updates should be configured if Name Protection is 

enabled on any IPv4 scope http://technet.microsoft.com/en-us/library/ee941152(v=ws.10).aspx 


Q3. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Federation Services (AD FS) server role installed. 

Adatum.com is a partner organization. 

You are helping the administrator of adatum.com set up a federated trust between adatum.com and contoso.com. The administrator of adatum.com asks you to provide a file containing the federation metadata of contoso.com. 

You need to identify the location of the federation metadata file. Which node in the AD FS 

console should you select? 

To answer, select the appropriate node in the answer area. 

Answer: 


Q4. Your company recently deployed a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2. 

You need to identify the time-to-live (TTL) value for domain referrals to the NETLOGON and SYSVOL shared folders. 

Which tool should you use? 

A. Ultrasound 

B. Replmon 

C. Dfsdiag 

D. Frsutil 

Answer:

Explanation: 

Explanation/Reference: 

DFSDIAG can check your configuration in five different ways: 

Checking referral responses (DFSDIAG /TestReferral) 

Checking domain controller configuration 

Checking site associations 

Checking namespace server configuration 

Checking individual namespace configuration and integrity 

Reference: Five ways to check your DFS-Namespaces (DFS-N) configuration with the 

DFSDIAG.EXE tool 


Q5. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. Server1 is a BranchCache hosted cache server that is located in a branch office. 

The network contains client computers that run either Windows 7 or Windows 8. 

For the branch office, all of the user accounts and the client computer accounts are located in an organizational unit (OU) named Branch1. A Group Policy object (GPO) named GPO1 is linked to Branch 1. GPO1 contains the BranchCache settings. 

You discover that users in the branch office who have client computers that run Windows 7 do not access cached content from Server1. Users in the branch office who have Windows 8 computers access cached content from Server1. 

You need to configure the Windows 7 computers to use BranchCache on Server1. Which setting should you configure in GPO1? 

To answer, select the appropriate setting in the answer area. 

Answer: 


Q6. Your network contains an Active Directory domain named corp.contoso.com. 

You deploy Active Directory Rights Management Services (AD RMS). 

You have a rights policy template named Template1. Revocation is disabled for the template. 

A user named User1 can open content that is protected by Template1 while the user is connected to the corporate network. 

When User1 is disconnected from the corporate network, the user cannot open the protected content even if the user previously opened the content. 

You need to ensure that the content protected by Template1 can be opened by users who are disconnected from the corporate network. 

What should you modify? 

A. The User Rights settings of Template1 

B. The templates file location of the AD RMS cluster 

C. The Extended Policy settings of Template1 

D. The exclusion policies of the AD RMS cluster 

Answer:

Explanation: 

* The extended rights policy of a template controls how content licenses are to be implemented. The extended rights policy template settings are specified by using the Active Directory Rights Management Services (AD RMS) administration site. The available settings control persistence of author rights, whether trusted browsers are supported, license persistence within the content, and enforcement of any application-specific data. 

* You can add trust policies so that AD RMS can process licensing requests for content that was rights protected. 

Reference: Extended Policy Template Information; AD RMS and Server Design 

http://technet.microsoft.com/en-us/library/ee221071(v=ws.10).aspx 


Q7. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Rights Management Services server role installed. 

The domain contains a domain local group named Group1. 

You create a rights policy template named Template1. You assign Group1 the rights to Template1. 

You need to ensure that all the members of Group1 can use Template1. 

What should you do? 

A. Configure the email address attribute of Group1. 

B. Convert the scope of Group1 to global. 

C. Convert the scope of Group1 to universal. 

D. Configure the email address attribute of all the users who are members of Group1. 

Answer:

Explanation: 

Explanation/Reference: When a user or group is created in Active Directory, the mail attribute is an optional attribute that can be set to include a primary email address for the user or group. For AD RMS to work properly, this attribute must be set because all users must have an email attribute to protect and consume content. 

Reference: AD RMS Troubleshooting Guide http://social.technet.microsoft.com/wiki/contents/articles/13130.ad-rms-troubleshooting-guide.aspx 


Q8. HOTSPOT 

Your company has a main office and a branch office. An Active Directory site exists for each office. 

The network contains an Active Directory forest named contoso.com. The contoso.com domain contains three member servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2. 

In the main office, you configure Server1 as a file server that uses BranchCache. 

In the branch office, you configure Server2 and Server3 as BranchCache hosted cache servers. 

You are creating a Group Policy for the branch office site. 

Which two Group Policy settings should you configure? 

To answer, select the appropriate two settings in the answer area. 

Answer: 


Q9. Your network contains three servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2. 

You need to ensure that Server1 can provide iSCSI storage for Server2 and Server3. 

What should you do on Server1? 

A. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties. 

B. Install the iSNS Server service feature and create a Discovery Domain. 

C. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties. 

D. Install the iSCSI Target Server role service and configure iSCSI targets. 

Answer:

Explanation: 

iSCSI Target Server: The server runs the iSCSI Target. It is also the iSCSI Target role name in Windows Server 2012. 

Note: iSCSI: it is an industry standard protocol allow sharing block storage over the Ethernet. The server shares the storage is called iSCSI Target. The server (machine) consumes the storage is called iSCSI initiator. Typically, the iSCSI initiator is an application server. For example, iSCSI Target provides storage to a SQL server, the SQL server will be the iSCSI initiator in this deployment. 

Target: It is an object which allows the iSCSI initiator to make a connection. The Target keeps track of the initiators which are allowed to be connected to it. The Target also keeps track of the iSCSI virtual disks which are associated with it. Once the initiator establishes the connection to the Target, all the iSCSI virtual disks associated with the Target will be accessible by the initiator. 


Q10. You have a server named LON-DC1 that runs Windows Server 2012 R2. An iSCSI virtual disk named VirtualiSCSI1.vhd exists on LON-DC1 as shown in the exhibit. (Click the Exhibit button.) 

You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt iSCSI target. 

VirtualiSCSIl.vhd is removed from LON-DC1. 

You need to assign VirtualiSCSI2.vhd a logical unit value of 0. 

What should you do? 

A. Modify the properties of the itgt ISCSI target. 

B. Modify the properties of the VirtualiSCSI2.vhd iSCSI virtual disk. 

C. Run the Set-VirtualDisk cmdlet and specify the -Uniqueld parameter. 

D. Run the iscsicli command and specify the reportluns parameter. 

Answer:

Explanation: 

The virtual disk has the option to change the lun ID, no other option available in the answers appear to allow this change. 

Note: Logical unit numbers (LUNs) created on an iSCSI disk storage subsystem are not directly assigned to a server. For iSCSI, LUNs are assigned to logical entities called targets. 


Q11. You deploy an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store. 

Some users report that they fail to authenticate to the AD FS infrastructure. 

You discover that only users who run third-party web browsers experience issues. 

You need to ensure that all of the users can authenticate to the AD FS infrastructure successfully. 

Which Windows PowerShell command should you run? 

A. Set-ADFSProperties -ProxyTrustTokenLifetime 1:00:00 

B. Set-ADFSProperties -AddProxyAuthenticationRules None 

C. Set-ADFSProperties -SSOLifetime 1:00:00 

D. Set-ADFSProperties -ExtendedProtectionTokenCheck None 

Answer:

Explanation: 

Explanation/Reference: Certain client browser software, such as Firefox, Chrome, and Safari, do not support the Extended Protection for Authentication capabilities that can be used across the Windows platform to protect against man-in-the-middle attacks. To prevent this type of attack from occurring over secure AD FS communications, AD FS 2.0 enforces (by default) that all communications use a channel binding token (CBT) to mitigate against this threat. 

Note: Disable the extended Protection for authentication To disable the Extended Protection for Authentication feature in AD FS 2.0 

. On a federation server, login using the Administrator account, open the Windows PowerShell command prompt, and then type the following command: Set-ADFSProperties –ExtendedProtectionTokenCheck None . Repeat this step on each federation server in the farm. 

Reference: Configuring Advanced Options for AD FS 2.0 


Q12. You have a file server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. 

Server1 has a volume named D that contains user data. Server1 has a volume named E that is empty. 

Server1 is configured to create a shadow copy of volume D every hour. You need to configure the shadow copies of volume D to be stored on volume E. 

What should you run? 

A. The Set-Volume cmdlet with the -driveletter parameter 

B. The Set-Volume cmdlet with the -path parameter 

C. The vssadmin.exe add shadowstorage command 

D. The vssadmin.exe create shadow command 

Answer:

Explanation: 

Add ShadowStorage 

Adds a shadow copy storage association for a specified volume. 

Incorrect: 

Not A. Sets or changes the file system label of an existing volume. -DriveLetter Specifies a 

letter used to identify a drive or volume in the system. 

Not B. Create Shadow 

Creates a new shadow copy of a specified volume. 

Not C. Sets or changes the file system label of an existing volume -Path Contains valid 

path information. 

Reference: Vssadmin; Set-Volume 

http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx 

http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx 


Q13. Your network contains one Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. All domain computers have certificates that are issued by a certification authority (CA) named Contoso CA. 

A user named User1 performs daily backups of the data on Server1 to a backup vault named Vault1. A user named User2 performs daily backups of the data on Server2 to a vault named Vault2. 

You have the administrative credentials for Server2. 

You need to restore the data from that last backup of Server1 to Server2. 

Which two pieces of information do you require to complete the task? Each correct answer presents part of the solution. 

A. the Microsoft Azure subscription credentials 

B. the Vault2 credentials 

C. the User1 credentials 

D. the Vault1 credentials 

E. the Server1 certificate 

F. the Server2 certificate 

G. the Server1 passphrase 

H. the Server2 passphrase 

Answer: D,G 

Explanation: We need the Vault1 credentials to be able to access the data in Vault1. We need the passphrase of Server1 to access the backup that was made on Server1. 

Reference: Microsoft Azure - Cloud Backup and Recovery 

http://blogs.technet.com/b/rmurphy/archive/2014/12/02/microsoft-azure-backup.aspx 


Q14. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two Active Directory sites named Site1 and Site2. 

You need to configure the replication between the sites to occur by using change notification. 

Which attribute should you modify? 

Answer: 


Q15. You have an Active Directory Rights Management Services (AD RMS) cluster. 

You need to prevent users from encrypting new content. The solution must ensure that the users can continue to decrypt content that was encrypted already. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From the Active Directory Rights Management Services console, enable decommissioning. 

B. From the Active Directory Rights Management Services console, create a user exclusion policy. 

C. Modify the NTFS permissions of %systemdrive%\\inetpub\\wwwroot\\_wmcs\\licensing. 

D. Modify the NTFS permissions of %systemdrive%\\inetpub\\wwwroot\\_wmcs\\decommission. 

E. From the Active Directory Rights Management Services console, modify the rights policy templates. 

Answer: A,D 

Explanation: 

* Decommissioning refers to the entire process of removing the AD RMS cluster and its 

associated databases from an organization. This process allows you to save rights-

protected files as ordinary files before you remove AD RMS from your infrastructure so that 

you do not lose access to these files. 

Decommissioning an AD RMS cluster is achieved by doing the following: 

/ Enable the decommissioning service. (A) 

/ Modify permissions on the decommissioning pipeline. 

/ Configure the AD RMS-enabled application to use the decommissioning pipeline. 

* To modify the permissions on the decommissioning pipeline 

1. Log on to ADRMS-SRV as cpandl\\administrator. 

2. Click Start, type %systemdrive%\\inetpub\\wwwroot\\_wmcs in the Start Search box, and 

then press ENTER. 

3. Right-click the decommission folder, and then click Properties. 

4. Click the Security tab, click Edit, and then click Add. (D) 

Etc. 

Reference: Step 1: Decommission AD RMS Root Cluster 


Q16. Your network contains an Active Directory forest named contoso.com. 

Users frequently access the website of an external partner company. The URL of the website is http://partners.adatum.com. 

The partner company informs you that it will perform maintenance on its Web server and that the IP addresses of the Web server will change. 

After the change is complete, the users on your internal network report that they fail to access the website. However, some users who work from home report that they can access the website. 

You need to ensure that your DNS servers can resolve partners.adatum.com to the correct IP address immediately. 

What should you do? 

A. Run ipconfig and specify the FlushDns parameter. 

B. Run ipconfig and specify the Renew parameter. 

C. Run dnscmd and specify the ClearCache parameter. 

D. Run Set-DnsServerResourceRecordAging. 

Answer:

Explanation: We cane clear the DNS cache on the DNS server with either Dnscmd /ClearCache (from command prompt) or Clear-DnsServerCache (from Windows PowerShell). 

Reference: Technet, Dnscmd 

https://technet.microsoft.com/en-us/library/cc772069.aspx