It is impossible to pass Microsoft 70-412 exam without any help in the short term. Come to Ucertify soon and find the most advanced, correct and guaranteed Microsoft 70-412 practice questions. You will get a surprising result by our Up to date Configuring Advanced Windows Server 2012 Services practice guides.

2021 Mar 70-412 exam price

Q101. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 

You attempt to delete a classification property and you receive the error message as shown in the exhibit. (Click the Exhibit button.) 

You need to delete the isConfidential classification property. 

What should you do? 

A. Delete the classification rule that is assigned the isConfidential classification property. 

B. Disable the classification rule that is assigned the isConfidential classification property. 

C. Set files that have an isConfidential classification property value of Yes to No. 

D. Clear the isConfidential classification property value of all files. 

Answer:

Explanation: 

You would have to delete the classification rule in order to delete the classification property. 


Q102. HOTSPOT 

Your network contains an Active Directory forest. 

You implement Dynamic Access Control in the forest. 

You have the claim types shown in the Claim Types exhibit. (Click the Exhibit button.) 

The properties of a user named User1 are configured as shown in the User1 exhibit. (Click the Exhibit button.) 

The output of Whoami /claims for a user named User2 is shown in the Whoami exhibit. (Click the Exhibit button.) 

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point. 

Answer: 


Q103. You have 20 servers that run Windows Server 2012 R2. 

You need to create a Windows PowerShell script that registers each server in Windows Azure Backup and sets an encryption passphrase. 

Which two PowerShell cmdlets should you run in the script? (Each correct answer presents part of the solution. Choose two.) 

A. New-OBPolicy 

B. New-OBRetentionPolicy 

C. Add-OBFileSpec 

D. Start-OBRegistration 

E. Set OBMachineSetting 

Answer: D,E 

Explanation: 

D. Start-OBRegistration Registers the current computer with Windows Azure Online Backup using the credentials (username and password) created during enrollment. 

E. The Set-OBMachineSetting cmdlet sets a OBMachineSetting object for the server that includes proxy server settings for accessing the internet, network bandwidth throttling settings, and the encryption passphrase that is required to decrypt the files during recovery to another server. 

Incorrect: 

Not C. TheAdd-OBFileSpeccmdlet adds theOBFileSpecobject, which specifies the items to 

include or exclude from a backup, to the backup policy (OBPolicyobject). 

TheOBFileSpecobject can include or exclude multiple files, folders, or volumes. T Reference: Start-OBRegistration; Set OBMachineSetting http://technet.microsoft.com/en-us/library/hh770398.aspx http://technet.microsoft.com/en-us/library/hh770409.aspx 


Q104. DRAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains two DHCP servers named DHCP1 and DHCP2 that run Windows Server 2012 R2. 

You install the IP Address Management (IPAM) Server feature on a member server named Server1 and you run the Run Invoke-IpamGpoProvisioning cmdlet. 

You need to manage the DHCP servers by using IPAM on Server1. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer: 


Q105. Your network contains an Active directory forest named contoso.com. The forest contains two child domains named east.contoso.com and west.contoso.com. 

You install an Active Directory Rights Management Services (AD RMS) cluster in each child domain. 

You discover that all of the users in the contoso.com forest are directed to the AD RMS cluster in east.contoso.com. 

You need to ensure that the users in west.contoso.com are directed to the AD RMS cluster in west.contoso.com and that the users in east.contoso.com are directed to the AD RMS cluster in east.contoso.com. 

What should you do? 

A. Modify the Service Connection Point (SCP). 

B. Configure the Group Policy object (GPO) settings of the users in the west.contoso.com domain. 

C. Configure the Group Policy object (GPO) settings of the users in the east.contoso.com domain. 

D. Modify the properties of the AD RMS cluster in west.contoso.com. 

Answer:

Explanation: 

The west.contoso.com are the ones in trouble that need to be redirected to the west.contoso.com not the east.contoso.com. 

Note: It is recommended that you use GPO to deploy AD RMS client settings and that you only deploy settings as needed. 

Reference: AD RMS Best Practices Guide 


Up to date 70-412 free download:

Q106. HOTSPOT 

You have a file server named Server1 that runs Windows Server 2012 R2. 

You need to ensure that you can use the NFS Share - Advanced option from the New 

Share Wizard in Server Manager. 

Which two role services should you install? 

To answer, select the appropriate two role services in the answer area. 

Answer: 


Q107. DRAG DROP 

Your network contains two Active Directory forests named contoso.com and adatum.com. All domain controllers run Windows Server 2012 R2. 

A federated trust exists between adatum.com and contoso.com. The trust provides adatum.com users with access to contoso.com resources. 

You need to configure Active Directory Federation Services (AD FS) claim rules for the federated trust. 

The solution must meet the following requirements: 

. In contoso.com, replace an incoming claim type named Group with an outgoing claim type named Role. . In adatum.com, allow users to receive their tokens for the relying party by using their Active Directory group membership as the claim type. 

The AD FS claim rules must use predefined templates. 

Which rule types should you configure on each side of the federated trust? 

To answer, drag the appropriate rule types to the correct location or locations. Each rule type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q108. HOTSPOT 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed. 

Server1 and Server2 have different processor models from the same manufacturer. 

On Server1, you plan to create a virtual machine named VM1. Eventually, VM1 will be 

exported to Server2. 

You need to ensure that when you import VM1 to Server2, you can start VM1 from saved 

snapshots. 

What should you configure on VM1? 

To answer, select the appropriate node in the answer area. 

Answer: 


Q109. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You have a failover cluster named Cluster1 that contains two nodes named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. 

You plan to create two virtual machines that will run an application named App1. App1 will store data on a virtual hard drive named App1data.vhdx. App1data.vhdx will be shared by both virtual machines. 

The network contains the following shared folders: 

An SMB file share named Share1 that is hosted on a Scale-Out File Server. An SMB file share named Share2 that is hosted on a standalone file server. An NFS share named Share3 that is hosted on a standalone file server. 

You need to ensure that both virtual machines can use App1data.vhdx simultaneously. 

What should you do? 

To answer, select the appropriate configurations in the answer area. 

Answer: 


Q110. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed. 

The network contains an enterprise certification authority (CA). All servers are enrolled automatically for a certificate-based on the Computer certificate template. 

On Server1, you have a virtual machine named VM1. VM1 is replicated to Server2. 

You need to encrypt the replication of VM1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On Server1, modify the Hyper-V Settings. 

B. On Server2, modify the settings of VM1. 

C. On Server2, modify the Hyper-V Settings. 

D. On Server1, modify the settings of VM1. 

E. On Server1, modify the settings of the virtual switch to which VM1 is connected. 

F. On Server2, modify the settings of the virtual switch to which VM1 is connected. 

Answer: B,C 

Explanation: 

B. Each virtual machine that is to be replicated must be enabled for replication (on the replica server – Server2). 

C. To configure the Replica server (here Server2) In Hyper-V Manager, click Hyper-V Settings in the Actions pane. In the Hyper-V Settings dialog, click Replication Configuration. In the Details pane, select Enable this computer as a Replica server. In the Authentication and ports section, select the authentication method. For either authentication method, specify the port to be used (the default ports are 80 for Kerberos over HTTP and 443 for certificate-based authentication over HTTPS). If you are using certificate-based authentication, click Select Certificate and provide the request certificate information. 

Etc 

Reference: Deploy Hyper-V Replica Step 2: Enable Replication