[Free] Get all latest Microsoft 70-412 Actual Tests 131-140

Ensurepass

QUESTION 131

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed. Server1 and Server2 are configured

as Hyper-V replicas of each other. Server2 hosts a virtual machine named VM5. VM5 is replicated

to Server1. You need to verify whether the replica of VM5 on Server1 is functional. The solution

must ensure that VM5 remains accessible to clients. What should you do from Hyper-V Manager?

 

A.      On Server1, execute a Planned Failover.

B.      On Server1, execute a Test Failover.

C.      On Server2, execute a Planned Failover.

D.      On Server2, execute a Test Failover.

 

Correct Answer: B

 

QUESTION 132

Your network contains an Active Directory domain named adatum.com. The domain contains two

sites named Site1 and Site2 and two domain controllers named DC1 and DC2. DC1 is located in

Site1 and DC2 is located in Site2. You install an additional domain controller named DC3 in Site1

and you ship DC3 to Site2. A technician connects DC3 to Site2. You discover that users in Site2 are

authenticated only by DC2. You need to ensure that the users in Site2 are authenticated by both

DC2 and DC3. What should you do?

 

A.      In Active Directory Users and Computers, configure the msDS-PrimaryComputer attribute for

DC3.

B.      In Active Directory Users and Computers, configure the msDS-Site-Affinity attribute for DC3.

C.      From Active Directory Sites and Services, move DC3.

D.      From Active Directory Sites and Services, modify the site link between Site1 and Site2.

 

Correct Answer: C

 

 

QUESTION 133

Your network contains an Active Directory domain named contoso.com. The domain contains a

file server named Server1 that runs Windows Server 2012 R2. All client computers run Windows

8. You need to configure a custom Access Denied message that will be displayed to users when

they are denied access to folders or files on Server1. What should you configure?

 

A.      A classification property.

B.      The File Server Resource Manager Options.

C.      A file management task.

D.      A file screen template.

 

Correct Answer: B

 

 

QUESTION 134

You have a file server named Server1 that runs a Server Core Installation of Windows Server 2012

R2. Server1 has a volume named D that contains user data. Server1 has a volume named E that is

empty. Server1 is configured to create a shadow copy of volume D every hour. You need to

configure the shadow copies of volume D to be stored on volume E. What should you run?

 

A.      The Set-Volume cmdlet with the -driveletter parameter.

B.      The Set-Volume cmdlet with the -path parameter.

C.      The vssadmin.exe add shadowstorage command.

D.      The vssadmin.exe create shadow command.

 

Correct Answer: C

 

QUESTION 135

You have a server named Server1 that runs Windows Server 2012 R2. Server1 is backed up by

using Windows Server Backup. The backup configuration is shown in the exhibit.

 

clip_image002

 

You discover that only the last copy of the backup is maintained. You need to ensure that multiple

backup copies are maintained. What should you do?

 

A.      Modify the backup destination.

B.      Configure the Optimize Backup Performance settings.

C.      Modify the Volume Shadow Copy Service (VSS) settings.

D.      Modify the backup times.

 

Correct Answer: A

 

 

 

 

 

QUESTION 136

Your network contains an Active Directory forest named contoso.com. All servers run Windows

Server 2012 R2. The domain contains four servers. The servers are configured as shown in the

following table.

 

clip_image003

 

You need to deploy IP Address Management (IPAM) to manage DNS and DHCP. On which server

should you install IPAM?

 

A.      DC1

B.      DC2

C.      DC3

D.      Server1

 

Correct Answer: D

 

 

QUESTION 137

You have a server named Server1 that runs Windows Server 2012 R2. The storage on Server1 is

configured as shown in the following table.

 

clip_image004

 

You plan to implement Data Deduplication on Server1. You need to identify on which drives you

can enable Data Deduplication. Which three drives should you identify? (Each correct answer

presents part of the solution. Choose two.)

A.      C

B.      D

C.      E

D.      F

E.       G

 

Correct Answer: BDE

 

 

QUESTION 138

You have a server named Server1 that runs Windows Server 2012 R2. Server1 is located in the

perimeter network and has the DNS Server server role installed. Server1 has a zone named

contoso.com. You App1y a security template to Server1. After you App1y the template, users

report that they can no longer resolve names from contoso.com. On Server1, you open DNS

Manager as shown in the DNS exhibit.

 

clip_image005

 

On Server1, you open Windows Firewall with Advanced Security as shown in the Firewall exhibit.

 

clip_image007

 

You need to ensure that users can resolve contoso.com names. What should you do?

 

A.      From Windows Firewall with Advanced Security, disable the DNS (TCP, Incoming) rule and the

DNS (UDP, Incoming) rule.

B.      From DNS Manager, modify the Zone Transfers settings of the contoso.com zone.

C.      From DNS Manager, unsign the contoso.com zone.

D.      From DNS Manager, modify the Start of Authority (SOA) of the contoso.com zone.

E.       From Windows Firewall with Advanced Security, modify the profiles of the DNS (TCP,

Incoming) rule and the DNS (UDP, Incoming) rule.

 

Correct Answer: E

 

 

QUESTION 139

Your network contains an Active Directory domain named corp.contoso.com. You deploy Active

Directory Rights Management Services (AD RMS). You have a rights policy template named

Template1. Revocation is disabled for the template. A user named User1 can open content that is

protected by Template1 while the user is connected to the corporate network. When User1 is

disconnected from the corporate network, the user cannot open the protected content even if

the user previously opened the content. You need to ensure that the content protected by

Template1 can be opened by users who are disconnected from the corporate network. What

should you modify?

 

A.      The User Rights settings of Template1.

B.      The templates file location of the AD RMS cluster.

C.      The Extended Policy settings of Template1.

D.      The exclusion policies of the AD RMS cluster.

 

Correct Answer: C

 

 

QUESTION 140

Your network contains an Active Directory domain named contoso.com. The domain contains a

server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role

installed. You need to create an IPv6 scope on Server1. The scope must use an address space that

is reserved for private networks. The addresses must be routable. Which IPV6 scope prefix should

you use?

 

A.      FF00::

B.      FE80:123:4567::

C.      FD00:123:4567::

D.      FF00:123:4567:890A::

 

Correct Answer: C