Latest Real 70-412 Tests Dumps and VCE Exam Questions 91-100

Ensurepass

QUESTION 91

Your network contains two Active Directory forests named contoso.com and litwareinc.com. A two-way forest trusts exists between the forest. Selective authentication is enabled on the trust. The contoso.com forest contains a server named Server1. You need to ensure that users in litwareinc.com can access resources on Server1. What should you do?

 

A.      Install Active Directory Rights Management Services on a domain controller in contoso.com.

B.      Modify the permission on the Server1 computer account.

C.      Install Active Directory Rights Management Services on a domain controller in

litwareinc.com.

D.      Configure SID filtering on the trust.

 

Correct Answer: B

 

 

QUESTION 92

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 and a domain controller named DC1. All servers run Windows Server 2012. A Group Policy object (GPO) named GPO1 is linked to the domain. Server1 contains a folder named Folder1. Folder1 is shared as Share1. You need to ensure that authenticated users can request assistance when they are denied access to the resources on Server1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

 

A.      Assign the Read Attributes NTFS permission on Folder1 to the Authenticated Users group.

B.      Install the File Server Resource Manager role service on Server1.

C.      Configure the Customize message for Access Denied errors policy setting of GPO1.

D.      Enable the Enable access-denied assistance on client for all file types policy setting for GPO1.

E.       Install the File Server Resource Manager role service on DC1.

 

Correct Answer: BD

 

 

QUESTION 93

Your network contains two Web servers named Server1 and Server2. Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. You configure the nodes to use the port rule shown in the exhibit.

 

clip_image001

 

You need to configure the NLB cluster to meet the following requirements:

 

Ÿ   HTTPS connections must be directed to Server1 if Server1 is available.

Ÿ   HTTP connections must be load balanced between the two nodes.

 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

 

A.      From the host properties of Server1, set the Handling priority of the existing port rule to 2.

B.      From the host properties of Server1, set the Handling priority of the existing port rule to 1.

C.      From the host properties of Server2, set the Priority (Unique host ID) value to 1.

D.      Create a port rule for TCP port 80. Set the Filtering mode to Multiple host and set the Affinity to None.

E.       From the host properties of Server2, set the Handling priority of the existing port rule to 2.

F.       Create an additional port rule for TCP port 443. Set the Filtering mode to Multiple host and set the Affinity to Single.

 

Correct Answer: BDE

 

 

QUESTION 94

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012. DC1 has the DHCP Server role installed. DHCP is configured as shown in the exhibit.

 

clip_image002

 

You discover that client computers cannot obtain IPv4 addresses from DC1. You need to ensure that the client computers can obtain IPv4 addresses from DC1. What should you do?

 

A.      Activate the scope.

B.      Authorize DC1.

C.      Disable the Allow filters.

D.      Disable the Deny filters.

 

Correct Answer: C

 

 

QUESTION 95

Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2008 R2. The domain contains a file server named Server6 that runs Windows Server 2012. Server6 contains a folder named Folder1. Folder1 is shared as Share1. The NTFS permissions on Folder1 are shown in the exhibit.

 

clip_image004

 

The domain contains two global groups named Group1 and Group2. You need to ensure that only users who are members of both Group1 and Group2 are denied access to Folder1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

 

A.      Remove the Deny permission for Group1 from Folder1.

B.      Deny Group2 permission to Folder1.

C.      Install a domain controller that runs Windows Server 2012.

D.      Create a conditional expression.

E.       Deny Group2 permission to Share1.

F.       Deny Group1 permission to Share1.

 

Correct Answer: CD

 

 

QUESTION 96

You have a server named Server1 that runs Windows Server 2012. Server1 has a single volume that is encrypted by using BitLocker Drive Encryption (sicplBitLocker). BitLocker is configured to save encryption keys to a Trusted Platform Module (TPM). Server1 is configured to perform a daily system image backup. The motherboard on Server1 is upgraded. After the upgrade, Windows Server 2012 on Server1 fails to start. You need to start the operating system on Server1 as soon as possible. What should you do?

 

A.      Start Server1 from the installation media. Run startrec.exe.

B.      Move the disk to a server that has a model of the old motherboard. Start the server from the installation media. Run bcdboot.exe.

C.      Move the disk to a server that has a model of the old motherboard. Start the server. Run tpm.msc.

D.      Start Server1 from the installation media. Perform a system image recovery.

 

Correct Answer: D

 

 

QUESTION 97

You have 3 server named LON-DC1 that runs Windows Server 2012. An iSCSI virtual disk named VirtualiSCSI1.vhd exists on LON-DC1 as shown in the exhibit.

 

clip_image006

 

You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt iSCSI target. VirtualiSCSI1.vhd is removed from LON-DC1. You need to assign VirtualiSCSI2.vhd a logical unit value of 0. What should you do?

 

A.      Modify the properties of the VirtualiSCSI2.vhd iSCSI virtual disk.

B.      Run the Add-IscsiVirtualDiskTargetMapping cmdlet and specify the -Lun parameter.

C.      Run the iscsicli command and specify the reportluns parameter.

D.      Run the iscsicpl command and specify the virtualdisklun parameter.

 

Correct Answer: B

 

 

QUESTION 98

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest contains three Active Directory sites named SiteA, SiteB, and SiteC. The sites contain four domain controllers. The domain controllers are configured as shown in the following table.

 

clip_image007

 

An IP site link exits between each site. You discover that the users in SiteC are authenticated by the domain controllers in SiteA and SiteB. You need to ensure that the SiteC users are authenticated by the domain controllers in SiteB, unless all of the domain controllers in SiteB are unavailable. What should you do?

 

A.      Create a site link bridge.

B.      Create additional connection objects for DC3 and DC4.

C.      Create additional connection objects for DC1 and DC2.

D.      Increase the cost of the site link between SiteA and SiteC.

 

Correct Answer: D

 

 

QUESTION 99

Your network contains an Active Directory domain named contoso.com. A previous administrator implemented a Proof of Concept installation of Active Directory Rights Management Services (AD RMS). After the proof of concept was complete, the Active Directory Rights Management Services server role was removed. You attempt to deploy AD RMS. During the configuration of AD RMS, you receive an error message indicating that an existing AD RMS Service Connection Point (SCP) was found. You need to remove the existing AD RMS SCP. Which tool should you use?

 

A.      Authorization Manager

B.      TPM Management

C.      Active Directory Sites and Services

D.      Services

 

Correct Answer: C

 

 

QUESTION 100

You have a server named Server1 that runs Windows Server 2012. Windows Server 2012 is installed on volume C. You need to ensure that Safe Mode with Networking loads the next time Server1 restarts. Which tool should you use?

 

A.      The Msconfig command

B.      The Restart-Server cmdlet

C.      The Restart-Computer cmdlet

D.      The Bootcfg command

 

Correct Answer: A