Our pass rate is high to 98.9% and the similarity percentage between our 70 412 dumps study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Microsoft 70 412 pdf exam in just one try? I am currently studying for the Microsoft 70 412 exam dumps exam. Latest Microsoft 70 412 pdf Test exam practice questions and answers, Try Microsoft exam 70 412 Brain Dumps First.

Q71. HOTSPOT 

Your network contains three application servers that run Windows Server 2012 R2. The application servers have the Network Load Balancing (NLB) feature installed. 

You create an NLB cluster that contains the three servers. 

You plan to deploy an application named App1 to the nodes in the cluster. App1 uses TCP port 8080 and TCP port 8081. 

Clients will connect to App1 by using HTTP and HTTPS. When clients connect to App1 by using HTTPS, session state information will be retained locally by the cluster node that responds to the client request. 

You need to configure a port rule for Appl. 

Which port rule should you use? 

To answer, select the appropriate rule in the answer area. 

Answer: 


Q72. You have a server named Server1 that runs Windows Server 2012 R2. The storage on Server1 is configured as shown in the following table. 

You plan to implement Data Deduplication on Server1. 

You need to identify on which drives you can enable Data Deduplication. 

Which three drives should you identify? (Each correct answer presents part of the solution. Choose three.) 

A. C 

B. D 

C. E 

D. F 

E. G 

Answer: B,D,E 

Explanation: 

Volumes that are candidates for deduplication must conform to the following requirements: 

* Must not be a system or boot volume. (not A) 

* Can be partitioned as a master boot record (MBR) or a GUID Partition Table (GPT), and must be formatted using the NTFS file system. (not C) 

* Can reside on shared storage, such as storage that uses a Fibre Channel or an SAS array, or when an iSCSI SAN and Windows Failover Clustering is fully supported. 

* Do not rely on Cluster Shared Volumes (CSVs). You can access data if a deduplication-enabled volume is converted to a CSV, but you cannot continue to process files for deduplication. 

* Do not rely on the Microsoft Resilient File System (ReFS). 

* Must be exposed to the operating system as non-removable drives. Remotely-mapped drives are not supported. 

Ref: Plan to Deploy Data Deduplication http://technet.microsoft.com/en-us/library/hh831700.aspx 


Q73. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the 

DHCP Server server role installed. 

DHCP is configured as shown in the exhibit. (Click the Exhibit button.) 

You discover that client computers cannot obtain IPv4 addresses from DC1. 

You need to ensure that the client computers can obtain IPv4 addresses from DC1. 

What should you do? 

A. Activate the scope. 

B. Authorize DC1. 

C. Disable the Allow filters. 

D. Disable the Deny filters. 

Answer:

Explanation: 

You have enabled the Allow list but haven't entered any MAC addresses, thus everyone is denied. Either Disable the Allow filters or start adding MAC addresses to the Allow filter. 

Note: MAC address based filtering allows specific control over which clients have access to DHCP addresses. You can create a list of computers that are allowed to obtain DHCP addresses from the server by adding the client MAC address to the list of allowed client computers. By enabling the allow list, you automatically deny access to the DHCP server addresses to any client computer not on the list. 

Reference: DHCP: If the allow list is enabled, MAC address filtering should be populated https://technet.microsoft.com/en-us/library/ee956897(v=ws.10) 


Q74. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You install the IP Address Management (IPAM) Server feature on a server named Server1 

and select Manual as the provisioning method. 

The IPAM database is located on a server named SQL1. 

You need to configure IPAM to use Group Policy Based provisioning. 

What command should you run first? 

To answer, select the appropriate options in the answer area. 

Answer: 


Q75. You have a server named Server1 that runs Windows Server 2012 R2. 

Server1 has a single volume that is encrypted by using BitLocker Drive Encryption 

(BitLocker). 

BitLocker is configured to save encryption keys to a Trusted Platform Module (TPM). 

Server1 is configured to perform a daily system image backup. 

The motherboard on Server1 is upgraded. 

After the upgrade, Windows Server 2012 R2 on Server1 fails to start. 

You need to start the operating system on Server1 as soon as possible. 

What should you do? 

A. Start Server1 from the installation media. Run startrec.exe. 

B. Move the disk to a server that has a model of the old motherboard. Start the server from the installation media. Run bcdboot.exe. 

C. Move the disk to a server that has a model of the old motherboard. Start the server. Run tpm.msc. 

D. Start Server1 from the installation media. Perform a system image recovery. 

Answer:

Explanation: 

By moving the hard drive to server with that has a model of the old motherboard the system 

would be able to start. As BitLocker was configured to save encryption keys to a Trusted 

Platform Module (TPM), we can use tpm.msc to access the TPM settings. 

Note: After you replaced the motherboard, you need to repopulate the TPM with new 

information regarding the encryption of the hard disk. 

We use these commands to repopulate the information in the TPM (without PIN): 

manage-bde –delete -protectors C: -type TPM 

manage-bde –protectors –add C: -tpm 

Incorrect: 

Not D. After the system image recovery you would still have the new motherboard installed. 

The problem would return. 

Reference: BitLocker - New motherboard replacement 


Q76. You have a server named Server1 that runs Windows Server 2012 R2. 

You start Server1 by using Windows RE. 

You need to repair the Boot Configuration Data (BCD) store on Server1. 

Which tool should you use? 

A. Bootim 

B. Bootsect 

C. Bootrec 

D. Bootcfg 

Answer: C


Q77. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are configured as shown in the following table. 

You need to ensure that when new targets are added to Server1, the targets are registered on Server2 automatically. 

What should you do on Server1? 

A. Configure the Discovery settings of the iSCSI initiator. 

B. Configure the security settings of the iSCSI target. 

C. Run the Set-WmiInstance cmdlet. 

D. Run the Set-IscsiServerTarget cmdlet. 

Answer:

Explanation: 

Explanation/Reference: 

Manage iSNS server registration 

The iSNS server registration can be done using the following cmdlets, which manages the 

WMI objects. 

To add an iSNS server: 

Set-WmiInstance -Namespace root\wmi -Class WT_iSNSServer –Arguments 

@{ServerName="ISNSservername"} 

Note: The Set-WmiInstance cmdlet creates or updates an instance of an existing WMI 

class. The created or updated instance is written to the WMI repository. 

Reference: iSCSI Target cmdlet reference 

http://blogs.technet.com/b/filecab/archive/2012/06/08/iscsi-target-cmdlet-reference.aspx 


Q78. Your network contains an Active Directory forest named adatum.com. The forest contains an Active Directory Rights Management Services (AD RMS) cluster. 

A partner company has an Active Directory forest named litwareinc.com. The partner company does not have AD RMS deployed. 

You need to ensure that users in litwareinc.com can consume rights-protected content from adatum.com. 

Which type of trust policy should you create? 

A. At federated trust 

B. A trusted user domain 

C. A trusted publishing domain 

D. Windows Live ID 

Answer:

Explanation: 

In AD RMS rights can be assigned to users who have a federated trust with Active Directory Federation Services (AD FS). This enables an organization to share access to rights-protected content with another organization without having to establish a separate Active Directory trust or Active Directory Rights Management Services (AD RMS) infrastructure. 

Reference: AD RMS and AD FS Considerations 

http://technet.microsoft.com/en-us/library/dd772651(v=WS.10).aspx 


Q79. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

You add two additional nodes in Cluster1. 

You have a folder named Folder1 on Server1 that hosts Application data. Folder1 is a folder target in a Distributed File System (DFS) namespace. 

You need to provide highly available access to Folder1. The solution must support DFS Replication to Folder1. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

File Server for general use 

Note: You can deploy and configure a clustered file server by using either of the following methods: 

* File Server for general use. This is the continuation of the clustered file server that has been supported in Windows Server since the introduction of Failover Clustering. This type of clustered file server, and therefore all the shares associated with the clustered file server, is online on one node at a time. This is sometimes referred to as active-passive or dual-active. File shares associated with this type of clustered file server are called clustered file shares. This is the recommended file server type when deploying information worker scenarios. 

* Scale-Out File Server for application data This clustered file server feature was introduced in Windows Server 2012, and it lets you store server application data, such as Hyper-V virtual machine files, on file shares, and obtain a similar level of reliability, availability, manageability, and high performance that you would expect from a storage area network. All file shares are simultaneously online on all nodes. File shares associated with this type of clustered file server are called scale-out file shares. This is sometimes referred to as active-active. This is the recommended file server type when deploying either Hyper-V over Server Message Block (SMB) or Microsoft SQL Server over SMB. 

Reference: Scale-Out File Server for Application Data Overview 


Q80. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Hyper-V server role installed. The servers are configured as shown in the following table. 

You add a third server named Server3 to the network. Server3 has Intel processors. 

You need to move VM3 and VM6 to Server3. The solution must minimize downtime on the 

virtual machines. 

Which method should you use to move each virtual machine? 

To answer, select the appropriate method for each virtual machine in the answer area. 

Answer: