Pass4sure exam 70 412 Questions are updated and all 70 412 exam answers are verified by experts. Once you have completely prepared with our mcsa 70 412 exam prep kits you will be ready for the real 70 412 exam exam without a problem. We have Update Microsoft examcollection 70 412 dumps study guide. PASSED microsoft 70 412 First attempt! Here What I Did.

Q111. HOTSPOT 

Your network contains one Active Directory forest named contoso.com. The forest contains the domain controllers configured as shown in the following table. 

You perform the following actions: 

. Create a file named File1.txt in the SYSVOL folder on DC1. 

. Create a user named User1 on DC4. You need to identify on which domain controller or controllers a copy of each object is stored. 

What should you identify? To answer, select the appropriate options in the answer area. 

Answer: 


Q112. You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard. You discover that the new virtual disk has a write-back cache of 1 GB. 

You need to ensure that the virtual disk has a write-back cache of 5 GB. 

What should you do? 

A. Detach the virtual disk, and then run the Resize-VirtualDisk cmdlet. 

B. Detach the virtual disk, and then run the Set-VirtualDisk cmdlet. 

C. Delete the virtual disk, and then run the New-StorageSubSystemVirtualDisk cmdlet. 

D. Delete the virtual disk, and then run the New-VirtualDisk cmdlet. 

Answer:

Explanation: 

So what about changing the cache size? Well, you can't modify the cache size, but you can specify it at the time that you create a new virtual hard disk. In order to do so, you have to use Windows PowerShell. 

New-VirtualDisk –StoragePoolFriendlyName "<storage pool name>" –FriendlyName "<v 

Reference: Using Windows Server 2012's SSD Write-Back Cache 


Q113. Your network contains an Active Directory domain named contoso.com. 

A previous administrator implemented a Proof of Concept installation of Active Directory Rights Management Services (AD RMS) on a server named Server1. 

After the proof of concept was complete, the Active Directory Rights Management Services server role was removed. 

You attempt to deploy AD RMS. 

During the configuration of AD RMS, you receive an error message indicating that an existing AD RMS Service Connection Point (SCP) was found. 

You need to ensure that clients will only attempt to establish connections to the new AD RMS deployment. 

Which should you do? 

A. From DNS, remove the records for Server1. 

B. From DNS, increase the priority of the DNS records for the new deployment of AD RMS. 

C. From Active Directory, remove the computer object for Server1. 

D. From Active Directory, remove the SCP. 

Answer:

Explanation: The Active Directory Rights Management Services (AD RMS) Service Connection Point (SCP) is an object in Active Directory that holds the web address of the AD RMS certification cluster. AD RMS-enabled applications use the SCP to discover the AD RMS service; it is the first connection point for users to discover the AD RMS web services. 

Only one SCP can exist in your Active Directory forest. If you try to install AD RMS and an SCP already exists in your forest from a previous AD RMS installation that was not properly deprovisioned, the new SCP will not install properly. It must be removed before you can establish the new SCP. 

Reference: The AD RMS Service Connection Point 

http://social.technet.microsoft.com/wiki/contents/articles/710.the-ad-rms-service-connection-point.aspx 


Q114. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. 

You need to deploy a certification authority (CA) to Server1. The CA must support the auto-enrollment of certificates. 

Which two cmdlets should you run? (Each correct answer presents part of the solution. 

Choose two.) 

A. Add-CAAuthoritylnformationAccess 

B. Install-AdcsCertificationAuthority 

C. Add-WindowsFeature 

D. Install-AdcsOnlineResponder 

E. Install-AdcsWebEnrollment 

Answer: B,E 

Explanation: 

Explanation 

B. The Install-AdcsCertificationAuthority cmdlet performs installation and configuration of 

the AD CS CA role service. It can be used to install a root CA. 

Example: 

Install-AdcsCertificationAuthority –CAType StandaloneRootCA –CACommonName 

"ContosoRootCA" –KeyLength 2048 –HashAlgorithm SHA1 –CryptoProviderName 

"RSA#Microsoft Software Key Storage Provider" 

E: The Install-AdcsWebEnrollment cmdlet performs initial installation and configuration of 

the Certification Authority Web Enrollment role service. 

Note: Prior to the availability of Certificate Enrollment Web Services, AD CS required that client computers configured for certificate auto-enrollment be connected directly to the corporate network. Certificate Enrollment Web Services allows organizations to enable AD CS using a perimeter network. This allows users and computers outside the corporate network to enroll for certificates. 

Certificate Enrollment web service 

Reference: Deploying AD CS Using Windows PowerShell 


Q115. You have a file server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. 

Server1 has a volume named D that contains user data. Server1 has a volume named E that is empty. 

Server1 is configured to create a shadow copy of volume D every hour. You need to configure the shadow copies of volume D to be stored on volume E. 

What should you run? 

A. The Set-Volume cmdlet with the -driveletter parameter 

B. The Set-Volume cmdlet with the -path parameter 

C. The vssadmin.exe add shadowstorage command 

D. The vssadmin.exe create shadow command 

Answer:

Explanation: 

Add ShadowStorage 

Adds a shadow copy storage association for a specified volume. 

Incorrect: 

Not A. Sets or changes the file system label of an existing volume. -DriveLetter Specifies a 

letter used to identify a drive or volume in the system. 

Not B. Create Shadow 

Creates a new shadow copy of a specified volume. 

Not C. Sets or changes the file system label of an existing volume -Path Contains valid 

path information. 

Reference: Vssadmin; Set-Volume 

http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx 

http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx 


Q116. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. 

Server1 is the enterprise root certification authority (CA) for contoso.com. 

You need to enable CA role separation on Server1. 

Which tool should you use? 

A. The Certutil command 

B. The Authorization Manager console 

C. The Certsrv command 

D. The Certificates snap-in 

Answer:

Explanation: 

To enable role separation 

. Open Command Prompt. 

. Type: certutil -setreg ca\RoleSeparationEnabled 1 Etc. 

Reference: Enable role separation 


Q117. Your network contains one Active Directory domain named contoso.com. The domain contains three users named User1, User2, and User3. 

You need to ensure that the users can log on to the domain by using the user principal names (UPNs) shown in the following table. 

What should you use? 

A. the Set-ADDomain cmdlet 

B. the Add-DNSServerSecondaryZone cmdlet 

C. the Setspn command 

D. the Set-ADUser cmdlet 

Answer:

Reference: Technet, Set-ADUser https://technet.microsoft.com/en-us/library/ee617215.aspx 


Q118. Your network contains an Active Directory domain named corp.contoso.com. 

You deploy Active Directory Rights Management Services (AD RMS). 

You have a rights policy template named Template1. Revocation is disabled for the template. 

A user named User1 can open content that is protected by Template1 while the user is connected to the corporate network. 

When User1 is disconnected from the corporate network, the user cannot open the protected content even if the user previously opened the content. 

You need to ensure that the content protected by Template1 can be opened by users who are disconnected from the corporate network. 

What should you modify? 

A. The User Rights settings of Template1 

B. The templates file location of the AD RMS cluster 

C. The Extended Policy settings of Template1 

D. The exclusion policies of the AD RMS cluster 

Answer:

Explanation: 

* The extended rights policy of a template controls how content licenses are to be implemented. The extended rights policy template settings are specified by using the Active Directory Rights Management Services (AD RMS) administration site. The available settings control persistence of author rights, whether trusted browsers are supported, license persistence within the content, and enforcement of any application-specific data. 

* You can add trust policies so that AD RMS can process licensing requests for content that was rights protected. 

Reference: Extended Policy Template Information; AD RMS and Server Design 

http://technet.microsoft.com/en-us/library/ee221071(v=ws.10).aspx 


Q119. A user named User1 is a member of the local Administrators group on Node1 and Node2. 

User1 creates a new clustered File Server role named File1 by using the File Server for general use option. 

A report is generated during the creation of File1 as shown in the exhibit. (Click the Exhibit button.) 

File1 fails to start. 

You need to ensure that you can start File1. 

What should you do? 

A. Log on to the domain by using the built-in Administrator for the domain, and then recreate the clustered File Server role by using the File Server for general use option. 

B. Assign the user account permissions of User1 to the Servers OU. 

C. Assign the computer account permissions of Cluster2 to the Servers OU. 

D. Increase the value of the ms-DS-MachineAccountQuota attribute of the domain. 

E. Recreate the clustered File Server role by using the File Server for scale-out application data option. 

Answer:

Explanation: 

Scenario: You have created a Windows Server 2012 Scale-Out File Server. The cluster, 

including the network and storage, pass the cluster validation test. Everything looks and is 

good. You create a File Server role for application data (SOFS) but it fails to start. 

Problem: Basically, the cluster needs permissions to create a computer object (for the 

SOFS) in the same Active Directory OU that the cluster object (Demo-FSC1) is stored in. 

Resolution: Reconfigure the permissions on the Servers OU. 

In this case we assign the user account permissions of User1 to the Servers OU. 

Reference: Scale-Out File Server Role Fails To Start With Event IDs 1205, 1069, and 1194 

http://www.aidanfinn.com/?p=14142 


Q120. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

You add two additional nodes to Cluster1. 

You have a folder named Folder1 on Server1 that contains Application data. 

You plan to provide continuously available access to Folder1. 

You need to ensure that all of the nodes in Cluster1 can actively respond to the client requests for Folder1. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

Scale-Out File Server is a feature that is designed to provide scale-out file shares that are continuously available for file-based server application storage. Scale-out file shares provides the ability to share the same folder from multiple nodes of the same cluster. 

Note: You can deploy and configure a clustered file server by using either of the following methods: 

* Scale-Out File Server for Application data (Scale-Out File Server) 

* File Server for general use 

Scale-Out File Server for Application data (Scale-Out File Server) This clustered file server is introduced in Windows Server 2012 R2 and lets you store server Application data, such as Hyper-V virtual machine files, on file shares, and obtain a similar level of reliability, availability, manageability, and high performance that you would expect from a storage area network. All file shares are online on all nodes simultaneously. File shares associated with this type of clustered file server are called scale-out file shares. This is sometimes referred to as active-active. 

Reference: Scale-Out File Server for Application Data Overview 

http://technet.microsoft.com/en-us/library/hh831349.aspx