[Free] Download New Updated Microsoft 70-412 Actual Tests 51-60

Ensurepass

 

QUESTION 51

You have a server named LON-DC1 that runs Windows Server 2012 R2. An iSCSI virtual disk named VirtualiSCSI1.vhd exists on LON-DC1 as shown in the exhibit. (Click the Exhibit button.)

 

clip_image002

 

You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt iSCSI target.

 

VirtualiSCSIl.vhd is removed from LON-DC1.

 

You need to assign VirtualiSCSI2.vhd a logical unit value of 0.

 

What should you do?

 

A.

Modify the properties of the itgt ISCSI target.

B.

Modify the properties of the VirtualiSCSI2.vhd iSCSI virtual disk.

C.

Run the Set-VirtualDisk cmdlet and specify the -Uniqueld parameter.

D.

Run the iscsicli command and specify the reportluns parameter.

Correct Answer: B

Explanation:

The virtual disk has the option to change the lun ID, no other option available in the answers appear to allow this change.

 

Note:

Logical unit numbers (LUNs) created on an iSCSI disk storage subsystem are not directly assigned to a server. For iSCSI, LUNs are assigned to logical entities called targets.

 

 

QUESTION 52

HOTSPOT

You have a file server named Server1 that runs Windows Server 2012 R2.

 

You need to ensure that you can use the NFS Share – Advanced option from the New Share Wizard in Server Manager.

 

Which two role services should you install?

 

To answer, select the appropriate two role services in the answer area.

 

clip_image004

 

Correct Answer:

clip_image006

 

 

QUESTION 53

DRAG DROP

Your network contains an Active Directory domain named contoso.com. All file servers in the domain run Windows Server 2012 R2.

 

The computer accounts of the file servers are in an organizational unit (OU) named OU1. A Group Policy object (GPO) named GPO1 is linked to OU1.

 

You plan to modify the NTFS permissions for many folders on the file servers by using central access policies.

 

You need to identify any users who will be denied access to resources that they can currently access once the new permissions are implemented.

 

In which order should you Perform the five actions?

 

clip_image008

 

Correct Answer:

clip_image010

 

 

QUESTION 54

Your network contains 20 iSCSI storage appliances that will provide storage for 50 Hyper-V hosts running Windows Server 2012 R2. You need to configure the storage for the Hyper-V hosts. The solution must minimize administrative effort. What should you do first?

 

A.

Install the iSCSI Target Server role service and configure iSCSI targets.

B.

Install the iSNS Server service feature and create a Discovery Domain.

C.

Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties.

D.

Install the Multipath I/O (MPIO) feature and configure the MPIO Properties.

 

Correct Answer: B

Explanation:

http://technet.microsoft.com/en-us/library/cc753442.aspx

http://technet.microsoft.com/en-us/library/cc772568.aspx

 

 

 

 

 

 

QUESTION 55

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. All client computers run Windows 8. You need to configure a custom Access Denied message that will be displayed to users when they are denied access to folders or files on Server1. What should you configure?

 

A.

A classification property

B.

The File Server Resource Manager Options

C.

A file management task

D.

A file screen template

 

Correct Answer: B

 

 

QUESTION 56

DRAG DROP

You have a server that runs Windows Server 2012 R2.

 

You create a new work folder named Share1.

 

You need to configure Share1 to meet the following requirements:

 

Ensure that all synchronized copies of Share1 are encrypted.

Ensure that clients synchronize to Share1 every 30 minutes.

Ensure that Share1 inherits the NTFS permissions of the parent folder.

 

Which cmdlet should you use to achieve each requirement?

 

To answer, drag the appropriate cmdlets to the correct requirements. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

 

clip_image012

 

Correct Answer:

clip_image014

 

 

QUESTION 57

HOTSPOT

Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8 Enterprise.

 

You have a remote site that only contains client computers. All of the client computer accounts are located in an organizational unit (CU) named Remote1. A Group Policy object (GPO) named GPO1 is linked to the Remote1 OU.

 

You need to configure BranchCache for the remote site.

 

Which two settings should you configure in GPO1?

 

To answer, select the two appropriate settings in the answer area.

 

clip_image016

 

Correct Answer:

clip_image018

 

 

QUESTION 58

You have a server named Server1 that runs Windows Server 2012 R2. The storage on Server1 is configured as shown in the following table.

 

clip_image019

 

You plan to implement Data Deduplication on Server1.

 

You need to identify on which drives you can enable Data Deduplication.

 

Which three drives should you identify? (Each correct answer presents part of the solution. Choose three.)

 

A.

C

B.

D

C.

E

D.

F

E.

G

 

Correct Answer: BDE

Explanation:

Volumes that are candidates for deduplication must conform to the following requirements:

* Must not be a system or boot volume.

* Can be partitioned as a master boot record (MBR) or a GUID Partition Table (GPT), and must be formatted using the NTFS file system.

* Can reside on shared storage, such as storage that uses a Fibre Channel or an SAS array, or when an iSCSI SAN and Windows Failover Clustering is fully supported.

* Do not rely on Cluster Shared Volumes (CSVs). You can access data if a deduplication- enabled volume is converted to a CSV, but you cannot continue to process files for deduplication.

* Do not rely on the Microsoft Resilient File System (ReFS).

* Must be exposed to the operating system as non-removable drives. Remotely-mapped drives are not supported.

 

Ref: http://technet.microsoft.com/en-us/library/hh831700.aspx

 

 

QUESTION 59

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. You are creating a central access rule named TestFinance that will be used to audit members of the Authenticated Users group for access failure to shared folders in the finance department. You need to ensure that access requests are unaffected when the rule is published. What should you do?

 

A.

Add a User condition to the current permissions entry for the Authenticated Users principal.

B.

Set the Permissions to Use the following permissions as proposed permissions.

C.

Add a Resource condition to the current permissions entry for the Authenticated Users principal.

D.

Set the Permissions to Use following permissions as current permissions.

 

Correct Answer: B

Explanation:

http://technet.microsoft.com/en-us/library/jj134043.aspx

 

clip_image021

 

 

QUESTION 60

You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard. You discover that the new virtual disk has a write-back cache of 1 GB. You need to ensure that the virtual disk has a write-back cache of 5 GB. What should you do?

 

A.

Detach the virtual disk, and then run the Resize-VirtualDisk cmdlet.

B.

Detach the virtual disk, and then run the Set-VirtualDisk cmdlet.

C.

Delete the virtual disk, and then run the New-StorageSubSystemVirtualDisk cmdlet.

D.

Delete the virtual disk, and then run the New-VirtualDisk cmdlet.

 

Correct Answer: D

 

 

Free VCE & PDF File for Microsoft 70-412 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP… Instant Access to Free PDF Files: MCSE|MCSA|MCITP…