It is more faster and easier to pass the Microsoft 70-412 exam by using Simulation Microsoft Configuring Advanced Windows Server 2012 Services questuins and answers. Immediate access to the Far out 70-412 Exam and find the same core area 70-412 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Dec 70-412 test question

Q101. Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. The functional level of the forest is Windows Server 2003. 

You have a domain outside the forest named adatum.com. 

You need to configure an access solution to meet the following requirements: 

* Users in adatum.com must be able to access resources in contoso.com. 

* Users in adatum.com must be prevented from accessing resources in fabrikam.com. 

* Users in both contoso.com and fabrikam.com must be prevented from accessing resources in adatum.com. 

What should you create? 

A. a one-way realm trust from contoso.com to adatum.com 

B. a one-way realm trust from adatum.com to contoso.com 

C. a one-way external trust from contoso.com to adatum.com 

D. a one-way external trust from adatum.com to contoso.com 

Answer:

Explanation: 

The contoso domain must trust the adatum domain. 

Note: In a One-way: incoming trust, users in your (trusted) domain can be authenticated in 

the other (trusting) domain. Users in the other domain cannot be authenticated in your 

domain. 

Incorrect: 

Not A, not B. Use realm trusts to form a trust relationship between a non-Windows 

Kerberos realm and a Windows Server domain. 

Not D. The resources that are to be shared are in the contoso domain. 

Reference: Trust types 


Q102. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

You add two additional nodes to Cluster1. You need to ensure that Cluster1 stops running if three nodes fail. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. the Scale-Out File Server 

Answer:

Explanation: 

The quorum configuration in a failover cluster determines the number of failures that the cluster can sustain. 

Reference: Understanding Quorum Configurations in a Failover Cluster 

http://technet.microsoft.com/en-us/library/cc731739.aspx 


Q103. Your company has a main office and a branch office. 

The main office contains a file server named Server1. Server1 has the BranchCache for 

Network Files role service installed. The branch office contains a server named Server2. 

Server2 is configured as a BranchCache hosted cache server. 

You need to preload the data from the file shares on Server1 to the cache on Server2. 

What should you run first? 

A. Publish-BCFileContent 

B. Add- BCDataCacheExtension 

C. Set-BCCache 

D. Export-BCCachePackage 

Answer:

Explanation: 

See step 2 below. 

To prehash content and preload the content on hosted cache servers . Log on to the file or Web server that contains the data that you wish to preload, and identify the folders and files that you wish to load on one or more remote hosted cache servers. . Run Windows PowerShell as an Administrator. For each folder and file, run either the Publish-BCFileContent command or the Publish-BCWebContent command, depending on the type of content server, to trigger hash generation and to add data to a data package. . After all the data has been added to the data package, export it by using the Export-BCCachePackage command to produce a data package file. . Move the data package file to the remote hosted cache servers by using your choice of file transfer technology. FTP, SMB, HTTP, DVD and portable hard disks are all viable transports. . Import the data package file on the remote hosted cache servers by using the Import-BCCachePackage command. 

Reference: Prehashing and Preloading Content on Hosted Cache Servers (Optional) 


Q104. You have five servers that run Windows Server 2012 R2. The servers have the Failover Clustering feature installed. You deploy a new cluster named Cluster1. Cluster1 is configured as shown in the following table. 

Server1, Server2, and Server3 are configured as the preferred owners of the cluster roles. Dynamic quorum management is disabled. 

You plan to perform hardware maintenance on Server3. 

You need to ensure that if the WAN link between Site1 and Site2 fails while you are performing maintenance on Server3, the cluster resource will remain available in Site1. 

What should you do? 

A. Add a file share witness in Site1. 

B. Enable DrainOnShutdown on Cluster1. 

C. Remove the node vote for Server4 and Server5. 

D. Remove the node vote for Server3. 

Answer:

Explanation: 

Recommended Adjustments to Quorum Voting When enabling or disabling a given WSFC (Windows Server Failover Clustering) node’s vote, follow these guidelines: 

* Exclude secondary site (here site2) nodes (here server4 and server5). In general, do not give votes to WSFC nodes that reside at a secondary disaster recovery site. You do not want nodes in the secondary site to contribute to a decision to take the cluster offline when there is nothing wrong with the primary site. 

Reference: WSFC Quorum Modes and Voting Configuration (SQL Server) 


Q105. Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers. 

The domain controllers are configured as shown in the following table. 

You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in the child1.contoso.com domain. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Upgrade DC1 to Windows Server 2012 R2. 

B. Upgrade DC11 to Windows Server 2012 R2. 

C. Raise the domain functional level of childl.contoso.com. 

D. Raise the domain functional level of contoso.com. 

E. Raise the forest functional level of contoso.com. 

Answer: A,D 

Explanation: 

The root domain in the forest must be at Windows Server 2012 level. First upgrade DC1 to this level (A), then raise the contoso.com domain functional level to Windows Server 2012 (D). 

* (A) To support resources that use claims-based access control, the principal’s domains will need to be running one of the following: / All Windows Server 2012 domain controllers / Sufficient Windows Server 2012 domain controllers to handle all the Windows 8 device authentication requests / Sufficient Windows Server 2012 domain controllers to handle all the Windows Server 

2012 resource protocol transition requests to support non-Windows 8 devices. Reference: What's New in Kerberos Authentication http://technet.microsoft.com/en-us/library/hh831747.aspx. 


Updated 70-412 test engine:

Q106. You have a server named DNS1 that runs Windows Server 2012 R2. 

You discover that the DNS resolution is slow when users try to access the company intranet home page by using the URL http://companyhome. 

You need to provide single-label name resolution for CompanyHome that is not dependent on the suffix search order. 

Which three cmdlets should you run? (Each correct answer presents part of the solution. Choose three.) 

A. Add-DnsServerPrimaryZone 

B. Add-DnsServerResourceRecordCName 

C. Set-DnsServerDsSetting 

D. Set-DnsServerGlobalNameZone 

E. Set-DnsServerEDns 

F. Add-DnsServerDirectory Partition 

Answer: A,B,D 

Explanation: 

You can use this task to create a GlobalNames zone to maintain a set of single-label, Domain Name System (DNS) names that Windows Server 2008 DNS servers can resolve on behalf of DNS clients throughout a single forest in Active Directory Domain Services 

(AD DS). 

Deploying a GlobalNames zone in a single forest requires that you perform the following 

steps: 

. (A) Create a zone named GlobalNames that replicates to all domain controllers in the forest. 

. (B) Add an alias (CNAME) record to the zone for each host for which you want to provide single-label name resolution. For example, if you want DNS clients to be able to access a server whose fully qualified domain name (FQDN) is cweb.itgroup.contoso.com, add an alias (CNAME) resource record that maps the name cweb to cweb.igroup.contoso.com. 

Note: 

A. The Add-DnsServerPrimaryZone cmdlet adds a specified primary zone on a Domain Name System (DNS) server. 

B. The Add-DnsServerResourceRecordCName cmdlet adds a canonical name (CNAME) resource record to a specified Domain Name System (DNS) zone. A CNAME record allows you to use more than one resource record to refer to a single host 

D. The Set-DnsServerGlobalNameZone cmdlet enables or disables single-label Domain Name System (DNS) queries. It also changes configuration settings for a GlobalNames zone. The GlobalNames zone supports short, easy-to-use names instead of fully qualified domain names (FQDNs) without using Windows Internet Name Service (WINS) technology. For instance, DNS can query SarahJonesDesktop instead of SarahJonesDesktop.contoso.com. 

Reference: Adding a GlobalNames zone to a forest 

https://technet.microsoft.com/en-us/library/cc816717(v=ws.10).aspx 


Q107. HOTSPOT 

Your network contains two Hyper-V hosts that are configured as shown in the following table. 

You create a virtual machine on Server1 named VM1. 

You plan to export VM1 from Server1 and import VM1 to Server2. 

You need to ensure that you can start the imported copy of VM1 from snapshots. 

What should you configure on VM1? 

To answer, select the appropriate node in the answer area. 

Answer: 


Q108. Your network contains 20 iSCSI storage appliances that will provide storage for 50 Hyper-V hosts running Windows Server 2012 R2. 

You need to configure the storage for the Hyper-V hosts. The solution must minimize administrative effort. 

What should you do first? 

A. Install the iSCSI Target Server role service and configure iSCSI targets. 

B. Install the iSNS Server service feature and create a Discovery Domain. 

C. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties. 

D. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties. 

Answer:

Explanation: 

Windows Server 2012 includes an iSCSI Target role that, along with Failover Clustering, 

allows it to become a cost-effective and highly-available iSCSI Storage Array. We can connect from our Hyper-V host to the iSCSI target on the storage array with the following PowerShell command line: 

New-IscsiTargetPortal –TargetPortalAddress <IP_Address or FQDN of storage array> 

$target = Get-IscsiTarget 

Connect-IscsiTarget –NodeAddress $target.NodeAddress 

Incorrect: 

Not B. Discovery Domains in an iSCSI fabric, like zones in a Fibre Channel fabric, enable you to partition the storage resources in your storage area network (SAN). By creating and managing Discovery Domains, you can control the iSCSI targets that each iSCSI initiator can see and log on to. 

Reference: Configure iSCSI Target Server Role on Windows Server 2012 


Q109. You have a server named SCI that runs a Server Core Installation of Windows Server 2012 R2. Shadow copies are enabled on all volumes. 

You need to delete a specific shadow copy. The solution must minimize server downtime. 

Which tool should you use? 

A. Shadow 

B. Diskshadow 

C. Wbadmin 

D. Diskpart 

Answer:

Explanation: 

DiskShadow.exe is a tool that exposes the functionality offered by the Volume Shadow 

Copy Service (VSS). 

The diskshadow command delete shadows deletes shadow copies. 

Reference: Technet, Diskshadow 


Q110. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DNS Server server role installed. 

The network contains client computers that run either Linux, Windows 7, or Windows 8. 

You have a zone named adatum.com as shown in the exhibit. (Click the Exhibit button.) 

You plan to configure Name Protection on all of the DHCP servers. 

You need to configure the adatum.com zone to support Name Protection. 

What should you do? 

A. Change the zone type. 

B. Sign the zone. 

C. Add a DNSKEY record. 

D. Configure Dynamic updates. 

Answer:

Explanation: 

Name protection requires secure update to work. Without name protection DNS names may be hijacked. 

You can use the following procedures to allow only secure dynamic updates for a zone. Secure dynamic update is supported only for Active Directory–integrated zones. If the zone type is configured differently, you must change the zone type and directory-integrate the zone before securing it for Domain Name System (DNS) dynamic updates. 

Enable secure dynamic updates: 

Reference: DHCP: Secure DNS updates should be configured if Name Protection is 

enabled on any IPv4 scope http://technet.microsoft.com/en-us/library/ee941152(v=ws.10).aspx