Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug Microsoft Official New Released 70-412
100% Free Download! 100% Pass Guaranteed!

Configuring Advanced Windows Server 2012 R2 Services

Question No: 141 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed.

You attempt to delete a classification property and you receive the error message as shown in the exhibit. (Click the Exhibit button.)

Dumps4Cert 2018 PDF and VCE

You need to delete the isConfidential classification property. What should you do?

  1. Delete the classification rule that is assigned the isConfidential classification property.

  2. Disable the classification rule that is assigned the isConfidential classification property.

  3. Set files that have an isConfidential classification property value of Yes to No.

  4. Clear the isConfidential classification property value of all files.

Answer: A Explanation:

You would have to delete the classification rule in order to delete the classification property.

Question No: 142 HOTSPOT – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains two Active Directory sites named Site1 and Site2.

You discover that when the account of a user in Site1 is locked out, the user can still log on to the servers in Site2 for up to 15 minutes by using Remote Desktop Services (RDS).

You need to reduce the amount of time it takes to synchronize account lockout information across the domain.

Which attribute should you modify?

To answer, select the appropriate attribute in the answer area.

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

C:\Users\Chaudhry\Desktop\1.jpg

Explanation/Reference:

Enabling reciprocal replication between two sites involves modifying the options attribute value on the site link object. With this attribute set on the site link, the KCC creates the connections across the link with the appropriate setting that is in effect. Use ADSI Edit to enable reciprocal replication.

Question No: 143 – (Topic 3)

Your network contains one Active Directory forest named contoso.com. The forest contains

two child domains and six domain controllers. The domain controllers are configured as shown in the following table.

Dumps4Cert 2018 PDF and VCE

You need to ensure that all Active Directory changes are replicated to all of the domain controllers in the forest within 30 minutes.

What should you use?

  1. Set-ADSite

  2. Set-ADReplicationSite

  3. Set-ADDomain

  4. Set-ADReplicationSiteLink

  5. Set-ADGroup

  6. Set-ADForest

  7. Netdom

Answer: B Explanation:

The Set-ADReplicationSite cmdlet is used to set the properties for an Active Directory site that is being used for replication. Sites are used in Active Directory to either enable clients to discover network resources (published shares, domain controllers) close to the physical location of a client computer or to reduce network traffic over wide area network (WAN) links. Sites can also be used to optimize replication between domain controllers.

The parameter -ReplicationSchedulelt;ActiveDirectorySchedulegt; specifies the default replication schedule for connections within this site (intra-site replication).

Reference: Technet, Set-ADReplicationSite https://technet.microsoft.com/en-us/library/hh852305(v=wps.630).aspx

Question No: 144 – (Topic 3)

Your network contains one Active Directory domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1.

The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on Hyper-V host that runs Windows Server 2012 R2.

You need to identify which domain controller must be online when cloning a domain controller.

Which cmdlet should you use?

  1. Get-ADGroupMember

  2. Get-ADDomainControllerPasswordReplicationPolicy

  3. Get-ADDomainControllerPasswordReplicationPolicyUsage

  4. Get-ADDomain

  5. Get-ADOptionalFeature

Answer: D Explanation:

A prerequisite to clone a domain controller is that an existing Windows Server 2012 DC that hosts the PDC emulator role is online.

The output of the Get-ADDomain command includes a line indicating which domain controller acts as a PDC emulator.

For example:PDCEmulator : Fabrikam-DC1.Fabrikam.com

Reference: Step-by-Step: Domain Controller Cloning

http://blogs.technet.com/b/canitpro/archive/2013/06/12/step-by-step-domain-controller- cloning.aspx

Reference: Get-ADDomain https://technet.microsoft.com/en-us/library/ee617224.aspx

Question No: 145 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. Cluster1 hosts 10 virtual machines. All of the virtual machines run Windows Server 2012 R2 and are members of the domain.

You need to ensure that the first time a service named Service1 fails on a virtual machine, the virtual machine is moved to a different node.

You configure Service1 to be monitored from Failover Cluster Manager. What should you configure on the virtual machine?

  1. From the Recovery settings of Service1, set the First failure recovery action to Take No Action.

  2. From the General settings, modify the Startup type.

  3. From the Recovery settings of Service1, set the First failure recovery action to Restart the Service.

  4. From the General settings, modify the Service status.

Answer: A Explanation:

When a monitored service fails the Recovery features of the service will take action. Example:

Dumps4Cert 2018 PDF and VCE

Service Recovery

In this case for the first failure the service will be restarted by the Service Control Manager inside the guest operating system, if the service fails for a second time the service will again be restarted via guest operating system. In case of a third failure the Service Control Manager will take no action and the Cluster service running on the Hyper-V host will take over recovery actions.

Reference: How to configure VM Monitoring in Windows Server 2012

Question No: 146 HOTSPOT – (Topic 3)

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.

The domain contains two domain controllers. The domain controllers are configured as shown in the following table.

Dumps4Cert 2018 PDF and VCE

On DC1, you create an Active Directory-integrated zone named Zone1. You verify that Zone1 replicates to DC2.

You use DNSSEC to sign Zone1.

You discover that the updates to Zone1 fail to replicate to DC2. You need to ensure that Zone1 replicates to DC2.

What should you configure on DC1?

To answer, select the appropriate tab in the answer area.

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

We most allow and configure zone transfers.

To modify zone transfer settings using the Windows interface

->Open DNS Manager.

->Right-click a DNS zone, and then clickProperties.

->On theZone Transferstab, do one of the following:

->If you allowed zone transfers, do one of the following:

Question No: 147 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. The File Server Resource Manager role service is installed on Server1. All servers run Windows Server 2012 R2.

A Group Policy object (GPO) named GPO1 is linked to the organizational unit (OU) that contains Server1. The following graphic shows the configured settings in GPO1.

Dumps4Cert 2018 PDF and VCE

Server1 contains a folder named Folder1. Folder1 is shared as Share1.

You attempt to configure access-denied assistance on Server1, but the Enable access- denied assistance option cannot be selected from File Server Resource Manager.

You need to ensure that you can configure access-denied assistance on Server1 manually by using File Server Resource Manager.

Which two actions should you perform?

  1. Set the Enable access-denied assistance on client for all file types policy setting to Disabled for GPO1.

  2. Set the Customize message for Access Denied errors policy setting to Not Configured for GPO1.

  3. Set the Enable access-denied assistance on client for all file types policy setting to Enabled for GPO1.

  4. Set the Customize message for Access Denied errors policy setting to Enabled for GPO1.

Answer: C,D Explanation:

C.To configure access-denied assistance for all file types by using Group Policy

->Open Group Policy Management. In Server Manager, clickTools, and then clickGroup Policy Management.

->Right-click the appropriate Group Policy, and then clickEdit.

->ClickComputer Configuration, clickPolicies, clickAdministrative Templates, clickSystem, and then clickAccess-Denied Assistance.

->Right-clickEnable access-denied assistance on client for all file types, and then clickEdit.

->ClickEnabled, and then clickOK.

D.To configure access-denied assistance by using Group Policy(see step 5)

->Open Group Policy Management. In Server Manager, clickTools, and then clickGroup Policy Management.

->Right-click the appropriate Group Policy, and then clickEdit.

->ClickComputer Configuration, clickPolicies, clickAdministrative Templates, clickSystem, and then clickAccess-Denied Assistance.

->Right-clickCustomize message for Access Denied errors, and then clickEdit.

->Select theEnabledoption.

Etc

Reference: Deploy Access-Denied Assistance (Demonstration Steps) http://technet.microsoft.com/en-us/library/hh831402.aspx

Question No: 148 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed.

The network contains an enterprise certification authority (CA). All servers are enrolled automatically for a certificate-based on the Computer certificate template.

On Server1, you have a virtual machine named VM1. VM1 is replicated to Server2. You need to encrypt the replication of VM1.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. On Server1, modify the Hyper-V Settings.

  2. On Server2, modify the settings of VM1.

  3. On Server2, modify the Hyper-V Settings.

  4. On Server1, modify the settings of VM1.

  5. On Server1, modify the settings of the virtual switch to which VM1 is connected.

  6. On Server2, modify the settings of the virtual switch to which VM1 is connected.

Answer: B,C Explanation:

B. Each virtual machine that is to be replicated must be enabled for replication (on the replica server – Server2).

C.To configure the Replica server(here Server2)

->In Hyper-V Manager, clickHyper-V Settingsin theActionspane.

->In theHyper-V Settingsdialog, clickReplication Configuration.

->In the Details pane, selectEnable this computer as a Replica server.

->In theAuthentication and portssection, select the authentication method. For either authentication method, specify the port to be used (the default ports are 80 for Kerberos over HTTP and 443 for certificate-based authentication over HTTPS).

->If you are using certificate-based authentication, clickSelect Certificateand provide the request certificate information.

Etc

Reference: Deploy Hyper-V Replica Step 2: Enable Replication

Question No: 149 HOTSPOT – (Topic 3)

Your network contains 25 Web servers that run Windows Server 2012 R2. You need to configure auditing policies that meet the following requirements:

->Generate an event each time a new process is created.

->Generate an event each time a user attempts to access a file share.

Which two auditing policies should you configure?

To answer, select the appropriate two auditing policies in the answer area.

Answer Area

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

  • Audit object access

    Determines whether to audit the event of a user accessing an object (for example, file, folder, registry key, printer, and so forth) which has its own system access control list (SACL) specified.

  • Audit process tracking

This security setting determines whether to audit detailed tracking information for events such as program activation, process exit, handle duplication, and indirect object access.

Question No: 150 – (Topic 3)

Your network contains one Active Directory domain named contoso.com.

From the Group Policy Management console, you view the details of a Group Policy object (GPO) named GPO1 as shown in the exhibit. (Click theExhibitbutton.)

You need to ensure that the comments field of GPO1 contains a detailed description of GPO1.

What should you do? Exhibit: * Missing*

  1. From Group Policy Management, click View, and then click Customize.

  2. From Active Directory Users and Computers, edit the properties of contoso.com/System/Policies/{229DCD27-9D98-ACC2-A6AE -ED765F065FF5}.

  3. Open GPO1 in the Group Policy Management Editor, and then modify the properties of GPO1.

  4. From Notepad, edit \\contoso.com\SYSVOL\contoso.com\Policies\{229DCD27-9D98- ACC2-A6AE -ED765F065FF5}\gpt.ini.

    Answer: C Explanation:

    You can include comments for each Group Policy object. You can use this space to document the Group Policy object and why its implementation is important to your environment. Commenting GPOs allows you to later use keyword filter to help you quickly find GPOs with matching keywords.

    Adding a comment to a Group Policy object

    ->Open the Group Policy Management Console. Expand the Group Policy Objects node.

    ->Right-click the Group Policy object you want to comment and then click Edit .

    ->In the console tree, right-click the name of the Group Policy object and then click Properties .

    ->Click the Comment tab.

    ->Type your comments in the Comment box.

    ->Click OK

    Reference: Comment a Group Policy Object https://technet.microsoft.com/en-us/library/cc770974.aspx

    100% Dumps4cert Free Download!
    70-412 PDF
    100% Dumps4cert Pass Guaranteed!
    70-412 Dumps

    Dumps4cert ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No