Updated 70-412 Bootcamp 2021

2024 Microsoft Official New Released 70-412 ♥♥
https://www.certleader.com/70-412-dumps.html


We provide real 70-412 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft 70-412 Exam quickly & easily. The 70-412 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 70-412 dumps pdf and vce product and material, you can easily pass the 70-412 exam.

Free demo questions for Microsoft 70-412 Exam Dumps Below:

NEW QUESTION 1
Your network contains one Active Directory forest named contoso.com. The forest contains two child domains and six domain controllers.
The domain controllers are configured as shown in the following table.
70-412 dumps exhibit
You need to add an additional UPN Suffix. What should you use?

  • A. Set-ADSite
  • B. Set-ADReplicationSite
  • C. Set-ADDomain
  • D. Set-ADReplicationSiteLink
  • E. Set-ADGroup
  • F. Set-ADForest
  • G. Netdom

Answer: F

Explanation:
https://technet.microsoft.com/en-us/library/dd391925(v=ws.10).aspx

NEW QUESTION 2
DRAG DROP
Your network contains two Active Directory forests named contoso.com and adatum.com. All domain controllers run Windows Server 2012 R2.
A federated trust exists between adatum.com and contoso.com. The trust provides adatum.com users with access to contoso.com resources.
You need to configure Active Directory Federation Services (AD FS) claim rules for the federated trust.
The solution must meet the following requirements:
✑ In contoso.com, replace an incoming claim type named Group with an outgoing claim type named Role.
✑ In adatum.com, allow users to receive their tokens for the relying party by using
their Active Directory group membership as the claim type. The AD FS claim rules must use predefined templates.
Which rule types should you configure on each side of the federated trust?
To answer, drag the appropriate rule types to the correct location or locations. Each rule type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
70-412 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
* Acceptance transform rule set
A set of claim rules that you use on a particular claims provider trust to specify the incoming claims that will be accepted from the claims provider organization and the outgoing claims that will be sent to the relying party trust.
Used on: Claims provider trusts
* Issuance Authorization Rule Set
A set of claim rules that you use on a relying party trust to specify the claims that will be issued to the relying party.
Used on: Relying party trusts

NEW QUESTION 3
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as an enterprise certification authority (CA).
You need to ensure that all of the users in the domain are issued a certificate that can be used for the following purposes:
✑ Email security
✑ Client authentication
✑ Encrypting File System (EFS)
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  • A. From a Group Policy, configure the Certificate Services Client – Auto-Enrollmentsettings.
  • B. From a Group Policy, configure the Certificate Services Client – Certificate Enrollment Policy settings.
  • C. Modify the properties of the User certificate template, and then publish the template.
  • D. Duplicate the User certificate template, and then publish the template.
  • E. From a Group Policy, configure the Automatic Certificate Request Settings settings.

Answer: AD

Explanation:
The default user template supports all of the requirements EXCEPT auto enroll as shown below:
70-412 dumps exhibit
However a duplicated template from users has the ability to autoenroll:
70-412 dumps exhibit
The Automatic Certificate Request Settings GPO setting is only available to Computer, not user.
70-412 dumps exhibit
Reference: Manage Certificate Enrollment Policy by Using Group Policy. http://technet.microsoft.com/en-us/library/dd851772.aspx

NEW QUESTION 4
Your network contains an Active Directory domain named contoso.com.
The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
DC1 and DC2 fail to replicate Active Directory information. You confirm that DC1 and DC2 have network connectivity.
The NTDS Settings of DC2 are configured as shown in the NTDS Settings exhibit. (Click tie Exhibit button.)
70-412 dumps exhibit
DNS is configured as shown in the DNS exhibit. (Click the Exhibit button.)
70-412 dumps exhibit
You need to ensure that DC1 and DC2 can replicate immediately.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  • A. From DC1, restart the Netlogon service
  • B. From DC2, run nltest.exe /sync
  • C. From DC1, run ipconfig /flushdns
  • D. From DC1, run repadmin /syncall
  • E. From DC2, run ipconfig /registerdns
  • F. From DC2, restart the Netlogon service

Answer: DF

Explanation:
The figure of the DNS configuration can be seen that the alias (CNAME) entry that identifies DC2 as a domain controller of the domain certbase.de missing. While ipconfig / registerdns ensures that the IP address of a DNS client in DNS is registered, is restarting the Netlogon service on a domain controller ensures that all entries for the service location (Service Resource Records, SRVs) be the domain controller registered or renewed. After the service location records for DC2 completed or modified, can on one of the two domain controller with a call from repadmin / syncall immediate replication of the Active Directory database are introduced.

NEW QUESTION 5
Your network contains two Active Directory forests named contoso.com and adatum.com. All of the domain controllers in both of the forests run Windows Server 2012 R2. The adatum.com domain contains a file server named Servers.
Adatum.com has a one-way forest trust to contoso.com.
A contoso.com user name User10 attempts to access a shared folder on Servers and receives the error message shown in the exhibit. (Click the Exhibit button.)
70-412 dumps exhibit
You verify that the Authenticated Users group has Read permissions to the Data folder. You need to ensure that User10 can read the contents of the Data folder on Server5 in the
adatum.com domain. What should you do?

  • A. Grant the Other Organization group Read permissions to the Data folder.
  • B. Modify the list of logon workstations of the contosoUser10 user account.
  • C. Enable the Netlogon Service (NP-In) firewall rule on Server5.
  • D. Modify the permissions on the Server5 computer object in Active Directory.

Answer: D

Explanation:
* To resolve the issue, I had to open up AD Users and Computers --> enable Advanced Features --> Select the Computer Object --> Properties --> Security --> Add the Group I want to allow access to the computer (in this case, DomainADomain users) and allow "Allowed to Authenticate". Once I did that, everything worked:
* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the
trusting domain or forest.
Reference: Grant the Allowed to Authenticate Permission on Computers in the Trusting Domain or Forest.
http://technet.microsoft.com/en-us/library/cc816733(v=ws.10).aspx

NEW QUESTION 6
HOTSPOT
Your network contains three application servers that run Windows Server 2012 R2. The application servers have the Network Load Balancing (NLB) feature installed.
You create an NLB cluster that contains the three servers.
You plan to deploy an application named App1 to the nodes in the cluster. App1 uses TCP port 8080 and TCP port 8081.
Clients will connect to App1 by using HTTP and HTTPS. When clients connect to App1 by using HTTPS, session state information will be retained locally by the cluster node that responds to the client request.
You need to configure a port rule for Appl. Which port rule should you use?
To answer, select the appropriate rule in the answer area.
70-412 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
* Filtering Mode: Multiple hosts
The Multiple hosts parameter specifies that multiple hosts in the cluster will handle network traffic for the associated port rule. This filtering mode provides scaled performance and fault tolerance by distributing the network load among multiple hosts. You can specify that the load be equally distributed among the hosts or that each host will handle a specified load weight.
* Affinity
Select Affinity Single or Network to ensure that all network traffic from a particular client is directed to the same host.

NEW QUESTION 7
Which of the following revocation statuses can you change to alter the status of a certificate from revoked to valid?

  • A. Certificate Hold
  • B. CA Compromise
  • C. Key Compromise
  • D. Change Of Affiliation

Answer: A

NEW QUESTION 8
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1.
Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. Server1 hosts 10 virtual machines.
A virtual machine named VM1 runs Windows Server 2012 R2 and hosts a processor- intensive Application named App1.
Users report that App1 responds more slowly than expected.
You need to monitor the processor usage on VM1 to identify whether changes must be made to the hardware settings of VM1.
Which performance object should you monitor on Server1?

  • A. Hyper-V Hypervisor Logical Processor
  • B. Processor
  • C. Hyper-V Hypervisor Root Virtual Processor
  • D. Process
  • E. Hyper-V Hypervisor Virtual Processor

Answer: E

NEW QUESTION 9
HOTSPOT
Your network contains an Active Directory domain named adatum.com. All servers run Windows Server 2012 R2. All domain controllers have the DNS Server server role installed.
You have a domain controller named DC1.
On DC1, you create an Active Directory-integrated zone named adatum.com and you sign the zone by using DNSSEC.
You deploy a new read-only domain controller (RODC) named RODC1. You need to ensure that the contoso.com zone replicates to RODC1. What should you configure on DC1?
To answer, select the appropriate tab in the answer area.
70-412 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
For additional servers to host a zone, zone transfers are required to replicate and synchronize all copies of the zone used at each server configured to host the zone.
70-412 dumps exhibit

NEW QUESTION 10

Your company has offices in Montreal and Seattle.
The network contains an Active Directory forest. The forest contains one domain and two sites named Montreal and Seattle. The Seattle office contains two domain controllers named DC4 and DC5.
You physically relocate DC5 from the Seattle office to the Montreal office. You discover that DC5 continues to authenticate users in the Seattle office.
You need to ensure that the Seattle office users are authenticated by DC4, unless DC4 is unavailable. What should you do first?

  • A. From Active Directory Users and Computers, modify the NTDS Settings for the computer account of DC5.
  • B. From Active Directory Users and Computers, move the computer account of DC5.
  • C. From Active Directory Sites and Services, modify the NTDS Site Settings for the Seattle office.
  • D. From Active Directory Sites and Services, move the DC5 server object.

Answer: C

NEW QUESTION 11
Your network contains an Active Directory domain named contoso.com.
The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
Server1 has the IP Address Management (IPAM) Server feature installed. Server2 has the DHCP Server server role installed.
A user named User1 is a member of the IPAM Users group on Server1.
You need to ensure that User1 can use IPAM to modify the DHCP scopes on Server2. The solution must minimize the number of permissions assigned to User1.
To which group should you add User1?

  • A. DHCP Administrators on Server2
  • B. IPAM ASM Administrators on Server1
  • C. IPAMUG in Active Directory
  • D. IPAM MSM Administrators on Server1

Answer: A

Explanation:
The user need rights to change DHCP not IPAM
C. Members of the DHCP Administrators group can view and modify any data at the DHCP server.
http://technet.microsoft.com/en-us/library/jj878348.aspx http://technet.microsoft.com/en-us/library/cc737716(v=ws.10).aspx

NEW QUESTION 12
Your network contains an Active Directory forest named adatum.com. All servers run Windows Server 2012 R2. The domain contains four servers. The servers are configured as shown in the following table.
70-412 dumps exhibit
You need to deploy IP Address Management (IPAM) to manage DNS and DHCP. On which server should you install IPAM?

  • A. Server1
  • B. Server2
  • C. Server3
  • D. Server4

Answer: D

Explanation:
An IPAM server is intended as a single-purpose server. It is not recommended to collocate other network infrastructure roles such as DNS or DHCP on the same server. IPAM installation is not supported on a domain controller, and discovery of DHCP servers will be disabled if you install IPAM on a server that is also running the DHCP Server service. The following features and tools are automatically installed when you install IPAM Server.
Reference: IPAM Deployment Planning

NEW QUESTION 13
Your network contains an Active Directory domain named contoso.com. The domain contains two sites named Site1 and Site2 and two domain controllers named DC1 and DC2. Both domain controllers are located in Site1.
You install an additional domain controller named DC3 in Site1 and you ship DC3 to Site2. A technician connects DC3 to Site2.
You discover that users in Site2 are authenticated by all three domain controllers.
You need to ensure that the users in Site2 are authenticated by DC1 or DC2 only if DC3 is unavailable.
What should you do?

  • A. From Network Connections, modify the IP address of DC3.
  • B. In Active Directory Sites and Services, modify the Query Policy of DC3.
  • C. From Active Directory Sites and Services, move DC3.
  • D. In Active Directory Users and Computers, configure the insDS-PrimaryComputer attribute for the users in Site2.

Answer: C

Explanation:
DC3 needs to be moved to Site2 in AD DS Incorrect:
Not A. Modifying IP will not affect authentication
Not B. A query policy prevents specific Lightweight Directory Access Protocol (LDAP) operations from adversely impacting the performance of the domain controller and also makes the domain controller more resilient to denial-of-service attacks.
Reference: Move a domain controller between sites http://technet.microsoft.com/en-us/library/cc759326(v=ws.10).aspx

NEW QUESTION 14
Your network contains an Active Directory domain named adatum.com. The domain contains a server named CA1 that runs Windows Server 2012 R2. CA1 has the Active Directory Certificate Services server role installed and is configured to support key archival and recovery.
You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory Certificate Services (AD CS) database. The solution must prevent User1 from retrieving the private keys from the AD CS database.
What should you do?

  • A. Assign User1 the Issue and Manage Certificates permission to CA1.
  • B. Assign User1 the Read permission and the Write permission to all certificate templates.
  • C. Provide User1 with access to a Key Recovery Agent certificate and a private key.
  • D. Assign User1 the Manage CA permission to CA1.

Answer: C

Explanation:
Understanding the Key Recovery Agent Role
KRAs are Information Technology (IT) administrators who can decrypt users’ archived private keys. An organization can assign KRAs by issuing KRA certificates to designated administrators and configure them on the CA. The KRA role is not one of the default roles defined by the Common Criteria specifications but a virtual role that can provide separation between Certificate Managers and the KRAs. This allows the separation between the Certificate Manager, who can retrieve the encrypted key from the CA database but not decrypt it, and the KRA, who can decrypt private keys but not retrieve them from the CA database.
Reference: Understanding User Key Recovery

NEW QUESTION 15
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured to support key archival and recovery.
You create a new Active Directory group named Group1.
You need to ensure that the members of Group1 can request a Key Recovery Agent certificate.
The solution must minimize the permissions assigned to Group1.
Which two permissions should you assign to Group1? (Each correct answer presents part of the solution. Choose two.)

  • A. Read
  • B. Auto enroll
  • C. Write
  • D. Enroll
  • E. Full control

Answer: AD

Explanation:
See step 6 below.
To configure the Key Recovery Agent certificate template
✑ Open the Certificate Templates snap-in.
✑ In the console tree, right-click theKey Recovery Agentcertificate template.
✑ ClickDuplicate Template.
✑ InTemplate, type a new template display name, and then modify any other optional properties as needed.
✑ On theSecuritytab, clickAdd, type the name of the users you want to issue the key recovery agent certificates to, and then clickOK.
✑ UnderGroup or user names, select the user names that you just added.
UnderPermissions, select theReadandEnrollcheck boxes, and then clickOK. Reference: Identify a Key Recovery Agent

NEW QUESTION 16
Your network contains one Active Directory forest named contoso.com. The forest contains two child domains and six domain controllers. The domain controllers are configured as shown in the following table.
70-412 dumps exhibit
You need to ensure that all Active Directory changes are replicated to all of the domain controllers in the forest within 30 minutes.
What should you use?

  • A. Set-ADSite
  • B. Set-ADReplicationSite
  • C. Set-ADDomain
  • D. Set-ADReplicationSiteLink
  • E. Set-ADGroup
  • F. Set-ADForest
  • G. Netdom

Answer: B

Explanation:
The Set-ADReplicationSite cmdlet is used to set the properties for an Active Directory site that is being used for replication. Sites are used in Active Directory to either enable clients to discover network resources (published shares, domain controllers) close to the physical location of a client computer or to reduce network traffic over wide area network (WAN) links. Sites can also be used to optimize replication between domain controllers.
The parameter -ReplicationSchedule<ActiveDirectorySchedule> specifies the default replication schedule for connections within this site (intra-site replication).
Reference: Technet, Set-ADReplicationSite https://technet.microsoft.com/en-us/library/hh852305(v=wps.630).aspx

NEW QUESTION 17
Your network contains an Active Directory domain named contoso.com.
The network contains a file server named Server1 that runs Windows Server 2012 R2. You create a folder named Folder1.
You share Folder1 as Share1.
The NTFS permissions on Folder1 are shown in the Folder1 exhibit. (Click the Exhibit button.)
70-412 dumps exhibit
The Everyone group has the Full control Share permission to Folder1.
You configure a central access policy as shown in the Central Access Policy exhibit. (Click the Exhibit button.)
70-412 dumps exhibit
Members of the IT group report that they cannot modify the files in Folder1.
You need to ensure that the IT group members can modify the files in Folder1. The solution must use central access policies to control the permissions.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  • A. On the Classification tab of Folder1, set the classification to Information Technology.
  • B. On the Security tab of Folder1, add a conditional expression to the existing permission entry for the IT group.
  • C. On Share1, assign the Change Share permission to the IT group.
  • D. On the Security tab of Folder1, remove the permission entry for the IT group.
  • E. On the Security tab of Folder1, assign the Modify permission to the Authenticated Users group.

Answer: AE

Explanation:
Central access policies for files enable organizations to centrally deploy and manage authorization policies that include conditional expressions that use user groups, user claims, device claims, and resource properties. (Claims are assertions about the attributes of the object with which they are associated). For example, to access high-business-impact (HBI) data, a user must be a full-time employee, obtain access from a managed device, and log on with a smart card. These policies are defined and hosted in Active Directory Domain Services (AD DS).
http://technet.microsoft.com/en- us/library/hh846167.aspx
70-412 dumps exhibit
70-412 dumps exhibit
70-412 dumps exhibit

NEW QUESTION 18
Which of the following must you back up or have a copy of to be able to ensure that you can restore an AD RMS cluster in the event that a single server hosting all AD RMS components suffers complete data loss? (Choose three answers.)

  • A. Cluster key password
  • B. Trusted publishing domain
  • C. Trusted user domain
  • D. AD RMS databases

Answer: ABD

NEW QUESTION 19
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has an enterprise root certification authority (CA) for contoso.com.
You deploy another member server named Server2 that runs Windows Server 2012 R2 and has the Web Server (IIS) server role installed.
You need to designate a website on Server1 as the certificate revocation list (CRL) distribution point for the CA. The solution must ensure that CRLs are published automatically to Server2.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

  • A. Create an http:// CRL distribution point (CDP) entry.
  • B. Configure a CA exit module.
  • C. Create a file:// CRL distribution point (CDP) entry.
  • D. Configure a CA policy module.
  • E. Configure an enrollment agent.

Answer: AD

Explanation:
A. To specify CRL distribution points in issued certificates
✑ Open the Certification Authority snap-in.
✑ In the console tree, click the name of the CA.
✑ On theActionmenu, clickProperties, and then click theExtensionstab. Confirm thatSelect extensionis set toCRL Distribution Point (CDP).
✑ Do one or more of the following. (The list of CRL distribution points is in theSpecify locations from which users can obtain a certificate revocation list (CRL)box.)
/ To indicate that you want to use a URL as a CRL distribution point
Click the CRL distribution point, select theInclude in the CDP extension of issued certificatescheck box, and then clickOK.
✑ ClickYesto stop and restart Active Directory Certificate Services (AD CS).
D. You can specify CRL Distribution Points (CDPs) in CAPolicy.inf. Note that any CDP in CAPolicy.inf will take precedence for certificate verifiers over the CDP's specified in the CA policy module.
Note: CRLDistributionPoint
You can specify CRL Distribution Points (CDPs) for a root CA certificate in the CAPolicy.inf. This section does not configure the CDP for the CA itself. After the CA has been installed you can configure the CDP URLs that the CA will include in each certificate that it issues. The URLs specified in this section of the CAPolicy.inf file are included in the root CA certificate itself.
Example: [CRLDistributionPoint]
URL=http://pki.wingtiptoys.com/cdp/WingtipToysRootCA.crl

NEW QUESTION 20
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Guster1. Cluster1 contains a file server role named FS1 and a generic service role named SVC1. Server1 is the preferred node for FS1. Server 2 is the preferred node for SVC1.
You plan to run a disk maintenance tool on the physical disk used by FS1.
You need to ensure that running the disk maintenance tool does not cause a failover to occur.
What should you do before you run the tool?

  • A. Run Suspend-ClusterResource.
  • B. Run Suspend-GusterNode.
  • C. Run cluster.exe and specify the pause parameter.
  • D. Run cluster.exe and specify the offline parameter.

Answer: D

NEW QUESTION 21
Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2008 R2.
The domain contains a file server named Server6 that runs Windows Server 2012 R2. Server6 contains a folder named Folder1. Folder1 is shared as Share1.
The NTFS permissions on Folder1 are shown in the exhibit. (Click the Exhibit button.)
70-412 dumps exhibit
The domain contains two global groups named Group1 and Group2.
You need to ensure that only users who are members of both Group1 and Group2 are denied access to Folder1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  • A. Remove the Deny permission for Group1 from Folder1.
  • B. Deny Group2 permission to Folder1.
  • C. Install a domain controller that runs Windows Server 2012 R2.
  • D. Create a conditional expression.
  • E. Deny Group2 permission to Share1.
  • F. Deny Group1 permission to Share1.

Answer: CD

Explanation:
* Conditional Expressions for Permission Entries Windows Server 2008 R2 and Windows 7 enhanced Windows security descriptors by introducing a conditional access permission entry. Windows Server 2012 R2 takes advantage of conditional access permission entries by inserting user claims, device claims, and resource properties, into conditional expressions. Windows Server 2012 R2 security evaluates these expressions and allows or denies access based on results of the evaluation. Securing access to resources through claims is known as claims-based access control. Claims-based access control works with
traditional access control to provide an additional layer of authorization that is flexible to the varying needs of the enterprise environment.
http://social.technet.microsoft.com/wiki/contents/articles/14269.introducing-dynamicaccess-control-en-us.aspx

NEW QUESTION 22
Your network contains two servers that run Windows Server 2012 R2 named Server1 and Server2. Both servers have the File Server role service installed.
On Server2, you create a share named Backups.
From Windows Server Backup on Server1, you schedule a full backup to run every night. You set the backup destination to \Server2 Backups.
After several weeks, you discover that \Server2Backups only contains the last backup that completed on Server1.
You need to ensure that multiple backups of Server1 are maintained. What should you do?

  • A. Modify the Volume Shadow Copy Service (VSS) settings.
  • B. Modify the properties of the Windows Store Service (WSService) service.
  • C. Change the backup destination.
  • D. Configure the permission of the Backups share.

Answer: C

Explanation:

The destination in the exhibit shows a network share is used. If a network share is being used only the latest copy will be saved.
70-412 dumps exhibit
Reference: Where should I save my backup?
http://windows.microsoft.com/en-us/windows7/where-should-i-save-my-backup

NEW QUESTION 23
Which group policy item should you configure to enable automatic reenrollment of certificates?

  • A. Certificate Path Validation Settings
  • B. Certificate Services Client - Certificate Enrollment Policy
  • C. Certificate Services Client - Auto-Enrollment
  • D. Trusted Root Certification Authorities

Answer: C

NEW QUESTION 24
Your network contains an Active Directory domain named contoso.com.
All servers run Windows Server 2012 R2. The domain contains a server named Server1. You open Review Options in the Active Directory Domain Services Configuration Wizard,
and then you click View script.
You need to ensure that you can use the script to promote Server1 to a domain controller. Which file extension should you use to save the script?

  • A. .xml
  • B. .ps1
  • C. .bat
  • D. .cmd

Answer: B

Explanation:
The View Script button is used to view the corresponding PowerShell script The PowerShell script extension is .ps1.
The Answer could logically be either a .cmd file or a .bat file. According to http://www.fileinfo.com/:
PAL - Settings file created by Corel Painter or Palette of colors used by Dr. Halo bitmap images
BAT - DOS batch file used to execute commands with the Windows Command Prompt (cmd.exe); contains aseries of line commands that typically might be entered at the DOS command prompt; most commonly used tostart programs and run maintenance utilities within Windows.
XML - XML (Extensible Markup Language) data file that uses tags to define objects and object attributes;formatted much like an .HTML document, but uses custom tags to define objects and the data within eachobject; can be thought of as a text-based database. CMD - Batch file that contains a series of commands executed in order; introduced with Windows NT, but canbe run by DOS or Windows NT systems; similar to a .BAT file, but is run by CMD.EXE instead of COMMAND.COM.
70-412 dumps exhibit

NEW QUESTION 25
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 is a file server that has the Hyper-V server role installed.
Server1 hosts several virtual machines. The virtual machine configuration files are stored on drive D and the VHD files are stored on drive E.
You plan to replace drive E with a larger volume.
You need to ensure that the virtual machines on Server1 remain available while drive E is being replaced.
What should you do?

  • A. Perform a quick migration.
  • B. Add Server1 and Server2 as nodes in a failover cluster.
  • C. Perform a live migration.
  • D. Perform a storage migration.

Answer: D

Explanation:
Hyper-V in Windows Server 2012 R2 introduces support for moving virtual machine storage without downtime by making it possible to move the storage while the virtual machine remains running.
Reference: Virtual Machine Storage Migration Overview http://technet.microsoft.com/en-us/library/hh831656.aspx

NEW QUESTION 26
......

P.S. DumpSolutions now are offering 100% pass ensure 70-412 dumps! All 70-412 exam questions have been updated with correct answers: https://www.dumpsolutions.com/70-412-dumps/ (453 New Questions)