Thursday 31 March 2016

70-412 Exam Question No 48

Question No 48:

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a Clustered Shared Volume (CSV). A developer creates an application named App1. App1 is NOT a cluster-aware application. App1 stores data in the file system. You need to ensure that App1 runs in Cluster1. The solution must minimize development effort. Which cmdlet should you run?

A.
Add-ClusterServerRole
B.
Add-ClusterGenericServiceRole
C.
Add ClusterScaleOutFileServerRole
D.
Add ClusterGenericApplicationRole

Answer: D

Thursday 24 March 2016

70-412 Exam Question No 47


Question No 47:



You have a datacenter that contains six servers. Each server has the Hyper-V server role installed and runs Windows Server 2012 R2. The servers are configured as shown in the following table.

 

Host4 and Host5 are part of a cluster named Cluster1. Cluster1 hosts a virtual machine named VM1. You need to move VM1 to another Hyper-V host. The solution must minimize the downtime of VM1. To which server and by which method should you move VM1?

A.
To Host3 by using a storage migration
B.
To Host6 by using a storage migration
C.
To Host2 by using a live migration
D.
To Host1 by using a quick migration

Answer: A

Thursday 17 March 2016

70-412 Exam Question No 46

Question No 46:

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA). All users in the domain are issued a smart card and are required to log on to their domain-joined client computer by using their smart card.
A user named User1 resigned and started to work for a competing company.
You need to prevent User1 immediately from logging on to any computer in the domain. The solution must not prevent other users from logging on to the domain. Which tool should you use?

A.
Active Directory Users and Computers
B.
Certificate Templates
C.
The Security Configuration Wizard
D.
The Certificates snap-in

Answer: D

Thursday 10 March 2016

70-412 Exam Question No 45

Question No 45:

Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory Federation Services server role installed. Server2 is a file server. Your company introduces a Bring Your Own Device (BYOD) policy. You need to ensure that users can use a personal device to access domain resources by using Single Sign-On (SSO) while they are connected to the internal network. Which two actions should you perform?
(Each correct answer presents part of the solution. (Choose two.)
 

A. Enable the Device Registration Service in Active Directory.
B.
Publish the Device Registration Service by using a Web Application Proxy.
C.
Configure Active Directory Federation Services (AD FS) for the Device Registration Service.
D.
Create and configure a sync share on Server2.
E.
Install the Work Folders role service on Server2.

Answer: A, C

Thursday 3 March 2016

70-412 Exam Question No 44

Question No 44:

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is an enterprise root certification authority (CA) for contoso.com. Your user account is assigned the certificate manager role and the auditor role on the contoso.com CA. Your account is a member of the local Administrators group on Server1. You enable CA role separation on Server1.
You need to ensure that you can manage the certificates on the CA. What should you do?

A.
Remove your user account from the local Administrators group.
B.
Assign the CA administrator role to your user account.
C.
Assign your user account the Bypass traverse checking user right.
D.
Remove your user account from the Manage auditing and security log user right.

Answer: D