Latest Real 70-412 Tests Dumps and VCE Exam Questions 81-90
You are employed as a senior network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have windows server 2012 installed. The ABC.com domain has an Active Directory site configured in London, and an Active Directory site in New York. You have been instructed to make sure that the synchronization of account lockout data happens quicker.
A. You should consider editing the options attribute from WANLINK properties
B. You should consider editing the options attribute from LANLIK properties
C. You should consider editing the options attribute from the DEFAULTSITELINK properties
D. You should consider editing the proxyAddressess attribute from the DEFAULTIPSITELINK properties.
Correct Answer: C
You are employed as a senior network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have windows server 2012 installed. ABC.com has two servers, named SERVER1 and SERVER2 which are configured in a two-node failover cluster. Server1 includes a folder, named ABCAppData, which is configured as a Distributed File System (DFS) name space folder target. After configuring another two nodes in the failover cluster, you are instructed to make sure that access to ABCAppData is highly available. You also have to make sure that application data is replicated to ABCAppData via DFS replication.
Which following actions should you take?
A. You should consider configuring a scale-out File Server
B. You should consider configuring the replication settings for the cluster
C. You should consider configuring a file server for general use
D. You should consider configuring the Quorum settings
Correct Answer: A
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012. Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. Port rules are configured for all clustered applications. You need to ensure that Server2 handles all client requests to the cluster that are NOT covered by a port rule. What should you configure?
C. The cluster quorum settings
D. The failover settings
E. A file server for general use
F. The Handling priority
G. The host priority
H. Live migration
I. The possible owner
J. The preferred owner
K. Quick migration
L. The Scale-Out File Server
Correct Answer: G
Your network contains an Active Directory domain named contoso.com. A previous administrator implemented a Proof of Concept installation of Active Directory Rights Management Services (AD RMS). After the proof of concept was complete, the Active Directory Rights Management Services server role was removed. You attempt to deploy AD RMS. During the configuration of AD RMS, you receive an error message indicating that an existing AD RMS Service Connection Point (SCP) was found. You need to remove the existing AD RMS SCP. Which tool should you use?
A. ADSI Edit
B. Active Directory Users and Computers
C. Active Directory Domains and Trusts
D. Active Directory Sites and Services
F. Authorization Manager
G. TPM Management
H. Certification Authority
Correct Answer: AD
Your network contains an Active Directory domain named contoso.com. The domain contains a main office and a branch office. An Active Directory site exists for each office. All domain controllers run Windows Server 2012. The domain contains two domain controllers. DC1 hosts an Active Directory-integrated zone for contoso.com. You add the DNS Server role to DC2. You discover that the contoso.com DNS zone fails to replicate to DC2. You verify that the domain, schema, and configuration naming contexts replicate from DC1 to DC2. You need to ensure that DC2 replicates the contoso.com zone by using Active Directory replication. Which tool should you use?
E. DNS Manager
F. Active Directory Sites and Services
G. Active Directory Domains and Trusts
H. Active Directory Users and Computers
Correct Answer: C
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012. The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA). All users in the domain are issued a smart card and are required to log on to their domain joined client computer by using their smart card. A user named User1 resigned and started to work for a competing company. You need to prevent User1 immediately from logging on to any computer in the domain. The solution must not prevent other users from logging on to the domain. Which tool should you use?
A. Active Directory Administrative Center
B. Active Directory Sites and Services
C. Active Directory Users and Computers
D. the Certification Authority console
E. the Certificates snap-in
F. Certificate Templates
G. Server Manager
H. the Security Configuration Wizard
Correct Answer: AC
Your network contains two Active Directory forests named contoso.com and adatum.com. Both forests contain multiple domains. All domain controllers run Windows Server 2012. Contoso.com has a one-way forest trust to adatum.com. A domain named paris.eu.contoso.com hosts several legacy applications that use NTLM authentication. Users in a domain named
london.europe.adatum.com report that it takes a long time to be authenticated when they attempt to access the legacy applications hosted in paris.eu.contoso.com. You need to reduce how long it takes for the london.europe.adatum.com users to be authenticated in
paris.eu.contoso.com. What should you do?
A. Create a shortcut trust.
B. Create an external trust between the forest root domains.
C. Disable SID filtering on the existing trust.
D. Create an external trust.
Correct Answer: A
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012. You are creating a central access rule named TestFinance that will be used to audit members of the Authenticated Users group for access failure to shared folders in the finance department. You need to ensure that access requests are unaffected when the rule is published. What should you do?
A. Add a User condition to the current permissions entry for the Authenticated Users principal.
B. Set the Permissions to Use the following permissions as proposed permissions.
C. Add a Resource condition to the current permissions entry for the Authenticated Users principal.
D. Set the Permissions to Use following permissions as current permissions.
Correct Answer: B
You have a server named Server1 that runs Windows Server 2012. Windows Server 2012 is installed on volume C. You need to ensure that Safe Mode with Command Prompt loads the next time Server1 restarts. Which tool should you use?
A. The Restart-Server cmdlet
B. The Bootcfg command
C. The Restart-Computer cmdlet
D. The Bcdedit command
Correct Answer: D
You have a server named Server1 that runs a Server Core Installation of Windows Server 2012. Shadows copies are enabled on all volumes. You need to delete a specific shadow copy. The solution must minimize server downtime. Which tool should you use?
Correct Answer: A