Ensurepass

QUESTION 61

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. You configure File Services and DHCP as clustered resources for Cluster1. Server1 is the active node for both clustered resources. You need to ensure that if two consecutive heartbeat messages are missed between Server1 and Server2, Server2 will begin responding to DHCP requests. The solution must ensure that Server1 remains the active node for the File Services clustered resource for up to five missed heartbeat messages. What should you configure?

 

A.

Affinity-None

B.

Affinity-Single

C.

The cluster quorum settings

D.

The failover settings

E.

A file server for general use

F.

The Handling priority

G.

The host priority

H.

Live migration

I.

The possible owner

J.

The preferred owner

K.

Quick migration

L.

the Scale-Out File Server

 

Correct Answer: D

Explanation:

A. The number of heartbeats that can be missed before failover occurs is known as the heartbeat threshold

http://technet.microsoft.com/en-us/library/dn265972.aspx

http://technet.microsoft.com/en-us/library/dd197562(v=ws.10).aspx

http://blogs.msdn.com/b/clustering/archive/2012/11/21/10370765.aspx

 

 

QUESTION 62

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. You add two additional nodes to Cluster1. You need to ensure that Cluster1 stops running if three nodes fail. What should you configure?

 

A.

Affinity-None

B.

Affinity-Single

C.

The cluster quorum settings

D.

The failover settings

E.

A file server for general use

F.

The Handling priority

G.

The host priority

H.

Live migration

I.

The possible owner

J.

The preferred owner

K.

Quick migration

L.

the Scale-Out File Server

Correct Answer: C

Explanation:

C. The quorum configuration in a failover cluster determines the number of failures that the cluster can sustain.

http://technet.microsoft.com/en-us/library/cc731739.aspx

 

clip_image002

 

 

QUESTION 63

Information and details provided in a question App1y only to that question. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. Cluster1 hosts a secure web Application named WebApp1. WebApp1 saves user state information locally on each node. You need to ensure that when users connect to WebApp1, their session state is maintained. What should you configure?

 

A.

Affinity
-None

B.

Affinity-Single

C.

The cluster quorum settings

D.

The failover settings

E.

A file server for general use

F.

The Handling priority

G.

The host priority

H.

Live migration

I.

The possible owner

J.

The preferred owner

K.

Quick migration

L.

the Scale-Out File Server

 

Correct Answer: B

Explanation:

http://technet.microsoft.com/en-us/library/bb687542.aspx

 

clip_image004

 

 

 

 

 

 

 

 

 

 

 

QUESTION 64

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. You add two additional nodes in Cluster1. You have a folder named Folder1 on Server1 that hosts Application data. Folder1 is a folder target in a Distributed File System (DFS) namespace. You need to provide highly available access to Folder1. The solution must support DFS Replication to Folder1. What should you configure?

 

A.

Affinity-None

B.

Affinity-Single

C.

The cluster quorum settings

D.

The failover settings

E.

A file server for general use

F.

The Handling priority

G.

The host priority

H.

Live migration

I.

The possible owner

J.

The preferred owner

K.

Quick migration

L.

The Scale-Out File Server

 

Correct Answer: E

 

 

QUESTION 65

Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3 that run Windows Server 2012 R2. All three servers have the Hyper-V server role installed and the Failover Clustering feature installed. Server1 and Server2 are nodes in a failover cluster named Cluster1. Several highly available virtual machines run on Cluster1. Cluster1 has the Hyper-V Replica Broker role installed. The Hyper-V Replica Broker currently runs on Server1. Server3 currently has no virtual machines. You need to configure Cluster1 to be a replica server for Server3 and Server3 to be a replica server for Cluster1. Which two tools should you use? (Each correct answer presents part of the solution. Choose two.)

 

A.

The Hyper-V Manager console connected to Server3

B.

The Failover Cluster Manager console connected to Server3

C.

The Hyper-V Manager console connected to Server1.

D.

The Failover Cluster Manager console connected to Cluster1

E.

The Hyper-V Manager console connected to Server2

 

Correct Answer: AD

Explanation:

http://technet.microsoft.com/en-us/library/jj134240.aspx

 

clip_image006

clip_image008

 

 

QUESTION 66

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1 that runs a Server Core Installation of Windows Server 2012 R2. File1 has a volume named D that contains home folders. File1 creates a shadow copy of volume D twice a day. You discover that volume D is almost full. You add a new volume named H to File1. You need to ensure that the shadow copies of volume D are stored on volume H. Which command should you run?

 

A.

The Set-Volume cmdlet with the -driveletter parameter

B.

The vssadmin.exe create shadow command

C.

The Set-Volume cmdlet with the -path parameter

D.

The vssadmin.exe add shadowstorage command

 

Correct Answer: D

Explanation:

A.Sets or changes the file system label of an existing volume. -DriveLetter Specifies a letter used to identify a drive or volume in the system.

B.Displays current volume shadow copy backups and all installed shadow copy writers and providers. Shadow Creates a new shadow copy of a specified volume.

C.Sets or changes the file system label of an existing volume -Path Contains valid path information.

D.Displays current volume shadow copy backups and all installed shadow copy writers and providers.

AddShadowStroage Adds a shadow copy storage association for a specified volume.

http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx

http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx

 

 

QUESTION 67

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has a single volume that is encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker is configured to save encryption keys to a Trusted Platform Module (TPM). Server1 is configured to perform a daily system image backup. The motherboard on Server1 is upgraded. After the upgrade, Windows Server 2012 R2 on Server1 fails to start. You need to start the operating system on Server1 as soon as possible. What should you do?

 

A.

Start Server1 from the installation media. Run startrec.exe.

B.

Move the disk to a server that has a model of the old motherboard. Start the server from the installation media. Run bcdboot.exe.

C.

Move the disk to a server that has a model of the old motherboard. Start the server. Run tpm.msc.

D.

Start Server1 from the installation media. Perform a syst
em image recovery.

 

Correct Answer: D

Explanation:

http://technet.microsoft.com/en-us/library/jj131725.aspx

 

 

QUESTION 68

Your network contains two servers that run Windows Server 2012 R2 named Server1 and Server2. Both servers have the File Server role service installed. On Server2, you create a share named Backups. From Windows Server Backup on Server1, you schedule a full backup to run every night. You set the backup destination to \Server2 Backups. After several weeks, you discover that \Server2Backups only contains the last backup that completed on Server1. You need to ensure that multiple backups of Server1 are maintained. What should you do?

 

A.

Modify the Volume Shadow Copy Service (VSS) settings.

B.

Modify the properties of the Windows Store Service (WSService) service.

C.

Change the backup destination.

D.

Configure the permission of the Backups share.

 

Correct Answer: C

Explanation:

 clip_image009

 

 

 

 

 

QUESTION 69

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed. Server1 and Server2 are configured as Hyper-V replicas of each other. Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1. You need to verify whether the replica of VM5 on Server1 is functional. The solution must ensure that VM5 remains accessible to clients. What should you do from Hyper-V Manager?

 

A.

On Server1, execute a Planned Failover.

B.

On Server1, execute a Test Failover.

C.

On Server2, execute a Planned Failover.

D.

On Server2, execute a Test Failover.

 

Correct Answer: B

Explanation:

 clip_image010

 

 

 

 

 

 

 

 

QUESTION 70

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. The servers have the Hyper-V server role installed.

 

A certification authority (CA) is available on the network.

 

A virtual machine named vml.contoso.com is replicated from Server1 to Server2. A virtual machine named vm2.contoso.com is replicated from Server2 to Server1.

 

You need to configure Hyper-V to encrypt the replication of the virtual machines.

 

Which common name should you use for the certificates on each server?

 

To answer, configure the appropriate common name for the certificate on each server in the answer area.

 

clip_image012

 

Correct Answer:

clip_image014

 

Free VCE & PDF File for Microsoft 70-412 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…