Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

70-412.

vce

Passing Score: 800


Time Limit: 120 min
File Version: 43.0

Sections
1. Volume A
2. Volume B
3. Volume C

BD6DBD063F5AB7394879E3C08781CD72
Exam A

QUESTION 1
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server3 that runs Windows Server 2012 R2 and has the DHCP Server server role installed.

DHCP is configured as shown in the exhibit. (Click the Exhibit button.)

Scope1, Scope2, and Scope3 are configured to assign the IP addresses of two DNS servers to DHCP clients.
The remaining scopes are NOT configured to assign IP addresses of DNS servers to DHCP clients.

You need to ensure that only Scope1, Scope3, and Scope5 assign the same IP addresses of the DNS servers
to DHCP clients. The solution must minimize administrative effort.

What should you do?

A. Create a superscope and scope-level policies.


B. Configure the Scope Options.
C. Create a superscope and a filter.
D. Configure the Server Options.

Correct Answer: B
Section: Volume A
Explanation

BD6DBD063F5AB7394879E3C08781CD72
Explanation/Reference:
Explanation:
Any DHCP scope options can be configured for assignment to DHCP clients, such as DNS server.

References:
https://technet.microsoft.com/en-us/library/dd759218.aspx

QUESTION 2
Your network contains an Active Directory forest. The forest contains two domains named contoso.com and
fabrikam.com. The functional level of the forest is Windows Server 2003.

You have a domain outside the forest named adatum.com.

You need to configure an access solution to meet the following requirements:


Users in adatum.com must be able to access resources in contoso.com.
Users in adatum.com must be prevented from accessing resources in fabrikam.com.
Users in both contoso.com and fabrikam.com must be prevented from accessing resources in adatum.com.

What should you create?

A. a one-way realm trust from contoso.com to adatum.com


B. a one-way realm trust from adatum.com to contoso.com
C. a one-way external trust from contoso.com to adatum.com
D. a one-way external trust from adatum.com to contoso.com

Correct Answer: C
Section: Volume B
Explanation

Explanation/Reference:
Explanation:
The contoso domain must trust the adatum domain.

Note: In a One-way: incoming trust, users in your (trusted) domain can be authenticated in the other (trusting)
domain. Users in the other domain cannot be authenticated in your domain.

Incorrect Answers:
A, B: Use realm trusts to form a trust relationship between a non-Windows Kerberos realm and a Windows
Server domain.
D: The resources that are to be shared are in the contoso domain.

References: Trust types

QUESTION 3
Your network contains an Active Directory domain named contoso.com. The network contains a file server
named Server1 that runs Windows Server 2012 R2.

You are configuring a central access policy for temporary employees.

You enable the Department resource property and assign the property a suggested value of Temp.

You need to configure a target resource condition for the central access rule that is scoped to resources
assigned to Temp only.

Which condition should you use?

A. (Temp.Resource Equals "Department")

BD6DBD063F5AB7394879E3C08781CD72
B. (Resource.Temp Equals "Department")
C. (Resource.Department Equals "Temp")
D. (Department.Value Equals "Temp")

Correct Answer: C
Section: Volume B
Explanation

Explanation/Reference:
Explanation:
Example:
Targeting: Resource.Department Contains Finance
Access rule: Allow read User.Country=Resource.Country AND User.department = Resource.Department

Reference: Deploy a Central Access Policy (Demonstration Steps)

QUESTION 4
HOTSPOT
You need to configure Server1 to meet the following requirements:
Ensure that old files in folder named Folder1 are archived automatically to a folder named Archive1.
Ensure that JPG files can always be saved to a local computer, even when a file screen exists.

Which two nodes should you configure?

Hot Area:

Correct Answer:

BD6DBD063F5AB7394879E3C08781CD72
Section: Volume C
Explanation

Explanation/Reference:
Explanation:
Node 1: File expiration tasks are used to automatically move all files that match certain criteria to a specified
expiration directory, where an administrator can then back those files up and delete them.
To create a file expiration task
Click the File Management Tasks node.
Right-click File Management Tasks, and then click Create File Management Task (or click Create File
Management Task in the Actionspane). This opens the Create File Management Task dialog box.
In the Exception path text box, type or select the path that the exception will apply to. The exception will
apply to the selected folder and all of its subfolders.
Etc.

Node 2:
Occasionally, you need to allow exceptions to file screening. For example, you might want to block video files
from a file server, but you need to allow your training group to save the video files for their computer-based
training. To allow files that other file screens are blocking, create a file screen exception.
You assign file groups to determine which file types will be allowed in the file screen exception.
To create a file screen exception
InFile Screening Management, click the File Screens node.
Right-click File Screens, and click Create File Screen Exception (or select Create File Screen
Exception from the Actions pane). This opens the Create File Screen Exception dialog box.
Etc
Note: On the File Screening Management node of the File Server Resource Manager MMC snap-in, you can
perform the following tasks:
Create file screens to control the types of files that users can save, and generate notifications when users
attempt to save unauthorized files.
Define file screening templates that can be applied to new volumes or folders and that can be used across
an organization.
Create file screening exceptions that extend the flexibility of the file screening rules.

Reference: Create a File Expiration Task

BD6DBD063F5AB7394879E3C08781CD72
https://technet.microsoft.com/en-us/library/dd759233.aspx

QUESTION 5
Your network contains two servers named Server1 and Server2 that run Windows Server 2012

R2. Both servers have the Hyper-V server role installed.

The servers have the hardware configurations shown in the following table.

Server1 hosts five virtual machines that run Windows Server 2012 R2.

You need to move the virtual machines from Server1 to Server2.

The solution must minimize downtime.

What should you do for each virtual machine?

A. Export the virtual machines from Server1 and import the virtual machines to Server2.
B. Perform a live migration.
C. Perform a quick migration.
D. Perform a storage migration.

Correct Answer: A
Section: Volume C
Explanation

Explanation/Reference:
Explanation:

None of these migration options will work between different Processors ( AMD/Intel).
The only optionremaining is to export and re-import the VMs

BD6DBD063F5AB7394879E3C08781CD72

You might also like