[Free] 2018(Aug) Dumps4cert Microsoft 70-412 Dumps with VCE and PDF Download 161-170

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug Microsoft Official New Released 70-412
100% Free Download! 100% Pass Guaranteed!

Configuring Advanced Windows Server 2012 R2 Services

Question No: 161 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain

contains two servers named Server1 and Server2. Both servers have the IP Address Management (IPAM) Server feature installed.

You have a support technician named Tech1. Tech1 is a member of the IPAM Administrators group on Server1 and Server2.

You need to ensure that Tech1 can use Server Manager on Server1 to manage IPAM on Server2.

To which group on Server2 should you add Tech1?

  1. IPAM MSM Administrators

  2. IPAM Administrators

  3. winRMRemoteWMIUsers_

  4. Remote Management Users

Answer: C Explanation:

If you are accessing the IPAM server remotely using Server Manager IPAM client RSAT, then you must be a member of the WinRMRemoteWMIUsers group on the IPAM server, in addition to being a member of the appropriate IPAM security group (or local Administrators group).

Reference: IPAM Deployment Planning, IPAM specifications

Question No: 162 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. You deploy a server named Server1 that runs Windows Server 2012 R2.

A local administrator installs the Active Directory Rights Management Services server role on Server1.

You need to ensure that AD RMS clients can discover the AD RMS cluster automatically.

What should you do?

  1. Run the Active Directory Rights Management Services console by using an account that is a member of the Schema Admins group, and then configure the proxy settings.

  2. Run the Active Directory Rights Management Services console by using an account that is a member of the Schema Admins group, and then register the Service Connection Point (SCP).

  3. Run the Active Directory Rights Management Services console by using an account that is a member of the Enterprise Admins group, and then register the Service Connection Point (SCP).

  4. Run the Active Directory Rights Management Services console by using an account that is a member of the Enterprise Admins group, and then configure the proxy settings.

Answer: C Explanation:

  • The Active Directory Rights Management Services (AD RMS) Service Connection Point (SCP) is an object in Active Directory that holds the web address of the AD RMS certification cluster. AD RMS-enabled applications use the SCP to discover the AD RMS service; it is the first connection point for users to discover the AD RMS web services.

  • To register the SCP you must be a member of the local AD RMS Enterprise Administrators group and the Active Directory Domain Services (AD DS) Enterprise Admins group, or you must have been given the appropriate authority.

  • Reference: The AD RMS Service Connection Point

    Question No: 163 – (Topic 3)

    Your network contains an Active Directory forest named adatum.com. All servers run Windows Server 2012 R2. The domain contains four servers. The servers are configured as shown in the following table.

    Dumps4Cert 2018 PDF and VCE

    You need to deploy IP Address Management (IPAM) to manage DNS and DHCP. On which server should you install IPAM?

    1. Server1

    2. Server2

    3. Server3

    4. Server4

    Answer: D Explanation:

    An IPAM server is intended as a single-purpose server. It is not recommended to collocate other network infrastructure roles such as DNS or DHCP on the same server. IPAM installation is not supported on a domain controller, and discovery of DHCP servers will be disabled if you install IPAM on a server that is also running the DHCP Server service. The following features and tools are automatically installed when you install IPAM Server.

    Reference: IPAM Deployment Planning

    Question No: 164 – (Topic 3)

    You have a server named Server1 that runs Windows Server 2012 R2. You modify the properties of a system driver and you restart Server1.

    You discover that Server1 continuously restarts without starting Windows Server 2012 R2.

    You need to start Windows Server 2012 R2 on Server1 in the least amount of time. The solution must minimize the amount of data loss.

    Which Advanced Boot Option should you select?

    1. Repair Your Computer

    2. Last Known Good Configuration (advanced)

    3. Disable Driver Signature Enforcement

    4. Disable automatic restart on system failure

    Answer: B Explanation:

    Try using Last Known Good Configuration if you can#39;t start Windows, but it started correctly the last time you turned on the computer.

    Reference: Using Last Known Good Configuration

    Question No: 165 – (Topic 3)

    Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the Hyper-V server role installed.

    You plan to replicate virtual machines between Server1 and Server2. The replication will be encrypted by using Secure Sockets Layer (SSL).

    You need to request a certificate on Server1 to ensure that the virtual machine replication is encrypted.

    Which two intended purposes should the certificate for Server1 contain? (Each correct answer presents part of the solution. Choose two.)

    1. Client Authentication

    2. Kernel Mode Code Signing

    3. Server Authentication

    4. IP Security end system

    5. KDC Authentication

    Answer: A,C Explanation:

    You need to use certificate-based authentication if you want transmitted data to be encrypted.

    Replica Server Certificate Requirements

    To enable a server to receive replication traffic, the certificate in the replica server must meet the following conditions

    * Enhanced Key Usage must support both Client and Server authentication Etc.

    Reference: Hyper-V Replica – Prerequisites for certificate based deployments

    http://blogs.technet.com/b/virtualization/archive/2012/03/13/hyper-v-replica-certificate- requirements.aspx

    Question No: 166 – (Topic 3)

    Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Rights Management Services server role installed.

    Your company works with a partner organization that does not have its own Active Directory Rights Management Services (AD RMS) implementation.

    You need to create a trust policy for the partner organization. The solution must meet the following requirements:

    ->Grant users in the partner organization access to protected content.

    ->Provide users in the partner organization with the ability to create protected content.

    Which type of trust policy should you create?

    1. A federated trust

    2. Windows Live ID

    3. A trusted publishing domain

    4. A trusted user domain

    Answer: A Explanation:

    In AD RMS rights can be assigned to users who have a federated trust with Active Directory Federation Services (AD FS). This enables an organization to share access to rights-protected content with another organization without having to establish a separate Active Directory trust or Active Directory Rights Management Services (AD RMS) infrastructure.

    Incorrect:

    Not C. Trusted publishing domains allow one AD RMS server to issue use licenses that correspond with a publishing license issued by another AD RMS server, but in this scenario the partner organization does not have any Active Directory.

    Not D. A trusted user domain, often referred as a TUD, is a trust between AD RMS clusters, but in this scenario the partner organization does not have any Active Directory.

    Reference: AD RMS and AD FS Considerations http://technet.microsoft.com/en-us/library/dd772651(v=WS.10).aspx

    Question No: 167 DRAG DROP – (Topic 3)

    You have a server named Server2 that runs Windows Server 2012 R2. You have storage provisioned on Server2 as shown in the exhibit. (Click the Exhibit button.)

    Dumps4Cert 2018 PDF and VCE

    You need to configure the storage so that it appears in Windows Explorer as a drive letter on Server1.

    Which three actions should you perform in sequence? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

    Dumps4Cert 2018 PDF and VCE

    Answer:

    Dumps4Cert 2018 PDF and VCE

    Explanation:

    Dumps4Cert 2018 PDF and VCE

    Step 1 (on Server2): Target: It is an object which allows the iSCSI initiator to make a connection. The Target keeps track of the initiators which are allowed to be connected to it. The Target also keeps track of the iSCSI virtual disks which are associated with it. Once the initiator establishes the connection to the Target, all the iSCSI virtual disks associated with the Target will be accessible by the initiator.

    Step 2 (on server 1): Configure iSCSI initiator to logon the Target

    Once the iSCSI Virtual disk is created and assigned, it is ready for the initiator to logon.

    Note: Typically, the iSCSI initiator and iSCSI Target are on different machines (physical or virtual). You will need to provide the iSCSI Target server IP or host name to the initiator, and the initiator will be able to do a discovery of the iSCSI Target.

    Step 3 (on server1): Create new volume

    Once the connection is established, the iSCSI virtual disk will be presented to the initiator as a disk. By default, this disk will be offline. For typical usage, you want to create a volume, format the volume and assign with a drive letter so it can be used just like a local hard disk.

    Question No: 168 HOTSPOT – (Topic 3)

    Your network contains an Active Directory forest. You implement Dynamic Access Control in the forest.

    You have the claim types shown in the Claim Types exhibit. (Click the Exhibit button.)

    Dumps4Cert 2018 PDF and VCE

    The properties of a user named User1 are configured as shown in the User1 exhibit. (Click the Exhibit button.)

    Dumps4Cert 2018 PDF and VCE

    The output of Whoami /claims for a user named User2 is shown in the Whoami exhibit. (Click the Exhibit button.)

    Dumps4Cert 2018 PDF and VCE

    Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.

    Dumps4Cert 2018 PDF and VCE

    Answer:

    Dumps4Cert 2018 PDF and VCE

    Question No: 169 – (Topic 3)

    You have a server named Server1 that runs Windows Server 2012 R2. Server1 fails.

    You identify that the master boot record (MBR) is corrupt. You need to repair the MBR.

    Which tool should you use?

    1. Bcdedit

    2. Bcdboot

    3. Bootrec

    4. Fixmbr

    Answer: C Explanation:

    Repairing an unbootable Windows installation with bootrec.exe

    If the boot/recovery partition is corrupted or lost, you can modify your Windows OS partition to boot.

    gt;c:

    ->Boot from your Windows Vista/7/Server2008/R2/2012 media and choose the quot;Repair Windowsquot; option.

    ->Open the command prompt.

    ->Using diskpart, mark your Windows partition as bootable.

    ->If your windows partition does not have it, copy the quot;bootquot; folder from the installation media.

    ->Run the following commands:

    gt;cd boot

    gt;attrib bcd -s -h -r

    gt;ren c:\boot\bcd bcd.old

    gt;bootrec /RebuildBcd

    Reboot and Windowsshouldboot normally. If not, return to the command prompt and run:

    gt;bootrec /FixMBR

    gt;bootrec /FixBoot

    Incorrect:

    Not A. BCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows

    Not B. The BCDboot tool is a command-line tool that enables you to manage system partition files

    Not D. Fixmbr is not a tool. Fixmbr is an option when using the bootrec tool.

    Reference: Windows BCD Store http://www.itsgotme.com/wiki/Windows_BCD

    Question No: 170 HOTSPOT – (Topic 3)

    Your network contains an Active Directory domain named contoso.com.

    You install the IP Address Management (IPAM) Server feature on a server named Server1 and select Manual as the provisioning method.

    The IPAM database is located on a server named SQL1.

    You need to configure IPAM to use Group Policy Based provisioning. What command should you run first?

    To answer, select the appropriate options in the answer area.

    Dumps4Cert 2018 PDF and VCE

    Dumps4Cert 2018 PDF and VCE

    Answer:

    Dumps4Cert 2018 PDF and VCE

    Explanation:

    Dumps4Cert 2018 PDF and VCE

    The choice of a provisioning method is permanent for the current installation of IPAM Server. To change the provisioning method, you must uninstall and reinstall IPAM Server.

    100% Dumps4cert Free Download!
    70-412 PDF
    100% Dumps4cert Pass Guaranteed!
    70-412 Dumps

    Dumps4cert ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No