Microsoft.certdumps.70 412.

download Microsoft.certdumps.70 412.

If you can't read please download the document

description

information

Transcript of Microsoft.certdumps.70 412.

  • Microsoft.Certdumps.70-412.v2014-04-02.by.WENDY.289q

    Number: 70-412Passing Score: 800Time Limit: 120 minFile Version: 14.5

    Exam Code: 70-412

    Exam Name: Configuring Advanced Windows Server 2012 Services

  • Configure and manage high availability

    QUESTION 1* You have a datacenter that contains six servers. Each server has the Hyper-V server role installed and runsWindows Server 2012. The servers are configured as shown in the following table.

    Host4 and Host5 are part of a cluster named Cluster1. Cluster1 hosts a virtual machine named VM1.

    You need to move VM1 to another Hyper-V host. The solution must minimize the downtime of VM1.

    To which server and by which method should you move VM1?

    A. To Host3 by using a storage migrationB. To Host6 by using a storage migrationC. To Host2 by using a live migrationD. To Host1 by using a quick migration

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Cluster Shared Volumes (CSV) is a feature of Failover Clustering first introduced in Windows Server 2008 R2for use with the Hyper-V role. A Cluster Shared Volume is a shared disk containing an NTFS volume that ismade accessible for read and write operations by all nodes within a Windows Server Failover Cluster.

    While CSV is not required for Live Migration of VMs, it reduces the potential disconnection period at the end ofthe migration since the NTFS file system does not have to be unmounted/mounted as is the case with atraditional cluster disk. This helps ensure seamless live migration since the physical disk resource does notneed to be moved between nodes. CSV increases the chance that a live migration will complete within the TCPreconnect window and ensure a seamless operation to clients.

    Host3 is the only option to allow minimum downtime and has same processor manufacturers.

    http://en.wikipedia.org/wiki/Cluster_Shared_Volumeshttp://technet.microsoft.com/en-us/library/dd446679(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/hh831656.aspxhttp://technet.microsoft.com/en-us/library/jj628158.aspx

    QUESTION 2* Your network contains an Active Directory domain named contoso.com. The domain contains three servers

  • named Server1, Server2, and Server3 that run Windows Server 2012. All three servers have the Hyper-Vserver role installed and the Failover Clustering feature installed.

    Server1 and Server2 are nodes in a failover cluster named Cluster1. Several highly available virtual machinesrun on Cluster1. Cluster1 has the Hyper-V Replica Broker role installed. The Hyper-V Replica Broker currentlyruns on Server1.

    Server3 currently has no virtual machines.

    You need to configure Cluster1 to be a replica server for Server3 and Server3 to be a replica server forCluster1.

    Which two tools should you use? (Each correct answer presents part of the solution.Choose two.)

    A. The Hyper-V Manager console connected to Server3B. The Failover Cluster Manager console connected to Server3C. The Hyper-V Manager console connected to Server1.D. The Failover Cluster Manager console connected to Cluster1E. The Hyper-V Manager console connected to Server2

    Correct Answer: ADSection: (none)Explanation

    Explanation/Reference:http://technet.microsoft.com/en-us/library/jj134240.aspx

  • QUESTION 3* You have a failover cluster named Cluster1 that contains four nodes. All of the nodes run Windows Server2012.

    You need to schedule the installation of Windows updates on the cluster nodes.

    Which tool should you use?

    A. The Wusa commandB. The Invoke-CauScan cmdletC. The Add-CauClusterRole cmdletD. The Wuauclt command

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Add-CauClusterRoleAdds the Cluster-Aware Updating (CAU) clustered role that provides the self-updating functionality to thespecified cluster.

    For many clustered roles (formerly called clustered applications and services) in the cluster, the automaticupdate process triggers a planned failover, and it can cause a transient service interruption for connectedclients. However, in the case of continuously available workloads such as Hyper-V with live migration or fileserver with SMB Transparent Failover, CAU can coordinate cluster updates with no impact to the serviceavailability.

    The CAU feature is only compatible with Windows Server 2012 R2 and Windows Server 2012 failover clustersand the clustered roles that are supported on those versions.

    http://technet.microsoft.com/en-us/library/hh831694.aspxhttp://technet.microsoft.com/en-us/library/hh847235.aspx

  • QUESTION 4* You have a failover cluster named Cluster1 that contains four nodes. All of the nodes run Windows Server2012.

    You need to force every node in Cluster1 to contact immediately the Windows Server Update Services (WSUS)server on your network for updates.

    Which tool should you use?

    A. The Add-CauClusterRole cmdletB. The Wuauclt commandC. The Wusa commandD. The Invoke-CauScan cmdlet

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Invoke-CauScan

    Performs a scan of cluster nodes for applicable updates and returns a list of the initial set of updates that wouldbe applied to each node in a specified cluster.

    http://technet.microsoft.com/en-us/library/hh847228.aspx

    QUESTION 5* You have four servers that run Windows Server 2012. The servers have the Failover Clustering featureinstalled. You deploy a new cluster named Cluster1. Cluster1 is configured as shown in the following table.

    Site2 is a disaster recovery site.

    Server1, Server2, and Server3 are configured as the preferred owners of the cluster roles.Dynamic quorum management is disabled.

    You plan to perform hardware maintenance on Server3. You need to ensure that if the WAN link between Site1and Site2 fails while you are performing maintenance on Server3, the cluster resource will remain available inSite1.

    What should you do?

  • A. Enable dynamic quorum management.B. Remove the node vote for Server3.C. Add a file share witness in Site1.D. Remove the node vote for Server4 and Server5.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    http://msdn.microsoft.com/en-us/library/hh270280.aspx#VotingandNonVotingNodes

    QUESTION 6* Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2 that run Windows Server 2012.

    You configure a new failover cluster named Cluster1. Server1 and Server2 are nodes in Cluster1.

    You need to configure the disk that will be used as a witness disk for Cluster1.

    How should you configure the witness disk?

    To answer, drag the appropriate configurations to the correct location or locations. Each configuration may beused once, more than once, or not at all. You may need to drag the split bar between panes or scroll to viewcontent.

    Select and Place:

  • Correct Answer:

    Section: (none)Explanation

    Explanation/Reference:

  • http://technet.microsoft.com/en-us/library/jj612870.aspx#BKMK_witness

    QUESTION 7Your network contains an Active Directory domain named contoso.com. The domain contains four memberservers named Server1, Server2, Server3, and Server4.

    Server1 and Server2 run Windows Server 2008 R2. Server1 and Server2 have the Hyper-V server role and theFailover Clustering feature installed.

    Failover Clustering is configured to provide highly available virtual machines by using a cluster named Cluster1.

    Cluster1 hosts 10 virtual machines. Server3 and Server4 run Windows Server 2012.

    You install the Hyper-V server role and the Failover Clustering feature on Server3 and Server4. You create acluster named Cluster2.

    You need to migrate cluster resources from Cluster1 to Cluster2. The solution must minimize downtime on thevirtual machines.

    Which five actions should you perform?

  • To answer, move the appropriate five actions from the list of actions to the answer area and arrange them inthe correct order.

    Select and Place:

    Correct Answer:

  • Section: (none)Explanation

    Explanation/Reference:After the migration, you will need to take the virtual machines offline on the old cluster, follow your plans tomask the volumes that contain the virtual machines to the old cluster and unmask the volumes to the newcluster, and then bring the virtual machines online on the new cluster.

    There will be a brief service interruption during the migration. To minimize the effects on users, schedule themigration during a maintenance window. We also recommend that you pretest and verify the migration beforeyou migrate the virtual machines in your production environment.

    NOTE: You cannot use live migration to migrate a highly available virtual machine to a new failover cluster.

    http://technet.microsoft.com/en-us/library/dn486772.aspx

  • http://blogs.msdn.com/b/clustering/archive/2012/06/25/10323434.aspx

    *(Shut down VM cluster 1Unmask Cluster 2Mask Cluster 1Start VM Cluster 2From failover cluster 1 run migrate)

    QUESTION 8* Your network contains an Active Directory domain named contoso.com. The domain contains four memberservers named Server1, Server2, Servers, and Server4. All servers run Windows Server 2012.

    Server1 and Server2 are located in a site named Site1. Server3 and Server4 are located in a site named Site2.The servers are configured as nodes in a failover cluster named Cluster1.

    Cluster1 is configured to use the Node Majority quorum configuration.

    You need to ensure that Server1 is the only server in Site1 that can vote to maintain quorum.What should you run from Windows PowerShell?

    To answer, drag the appropriate commands to the correct location. Each command may be used once, morethan once, or not at all. You may need to drag the split bar between panes or scroll to view content.

    Select and Place:

  • Correct Answer:

    Section: (none)Explanation

    Explanation/Reference:Get-ClusterNodeGet information about one or more nodes (servers) in a failover cluster.

  • http://technet.microsoft.com/en-us/library/hh270281.aspxhttp://technet.microsoft.com/en-us/library/ee460990.aspx

    QUESTION 9* Your company has a main office and a remote office. The remote office is used for disaster recovery.

    The network contains an Active Directory domain named contoso.com. The domain contains member serversnamed Server1, Server2, Server3, and Server4. All servers run Windows Server 2012.

    Server1 and Server2 are located in the main office. Server3 and Server4 are located in the remote office.

    All servers have the Failover Clustering feature installed. The servers are configured as nodes in a failovercluster named Cluster1. Storage is replicated between the main office and the remote site.

    You need to ensure that Cluster1 is available if two nodes in the same office fail.

    What are two possible quorum configurations that achieve the goal? (Each correct answer presents a completesolution. Choose two.)

    A. Node MajorityB. No Majority: Disk OnlyC. Node and File Share MajorityD. Node and Disk Majority

    Correct Answer: AB

  • Section: (none)Explanation

    Explanation/Reference:Explanation: Depending on the quorum configuration option that you choose and your specific settings, thecluster will be configured in one of the following quorum modes:* (A) Node majority (no witness)Only nodes have votes. No quorum witness is configured. The cluster quorum is the majority of voting nodes inthe active cluster membership.* (B) No majority (disk witness only)No nodes have votes. Only a disk witness has a vote. The cluster quorum is determined by the state of the diskwitness.The cluster has quorum if one node is available and communicating with a specific disk in the cluster storage.Generally, this mode is not recommended, and it should not be selected because it creates a single point offailure for the cluster.* Node majority with witness (disk or file share)Nodes have votes. In addition, a quorum witness has a vote. The cluster quorum is the majority of voting nodesin the active cluster membership plus a witness vote. A quorum witness can be a designated disk witness or adesignated file share witness.

    Note:* Quorum in Windows 2008 R2 referred to a consensus , that is, a majority of votes is required in order to reachquorum and maintain stability of the cluster. A new option created in Windows Server 2012 which was alsoback ported to Windows Server 2008 R2 SP1 was the ability to stop a node being able to participate in thevoting process.* Dynamic quorum is the ability of the cluster to recalculate quorum on the fly and still maintain a workingcluster. This is a huge improvement as we are now able to continue to run a cluster even if the number ofnodes remaining in the cluster is less than 50%. This was not possible before but the dynamic quorum conceptnow allows us to do this. In fact we can reduce the cluster down to the last node (known as last man standing)and still maintain quorum.Reference: Configure and Manage the Quorum in a Windows Server 2012 Failover Cluster

    QUESTION 10* Your network contains an Active Directory domain named contoso.com. The domain contains four serversnamed Server1, Server2, Server3, and Server4 that run Windows Server 2012. All servers have the Hyper-Vserver role and the Failover Clustering feature installed.

    The servers are configured as shown in the following table.

    You must set up Cluster2 as a replica of Cluster1.

    Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

    A. From Hyper-V Manager on a node in Cluster2, create three virtual machines.B. From Hyper-V Manager on a node in Cluster2, modify the Hyper-V settings.C. From Failover Cluster Manager on Cluster1, configure each virtual machine for replication.

  • D. From Cluster1, add and configure the Hyper-V Replica Broker role.E. From Cluster2, add and configure the Hyper-V Replica Broker role.

    Correct Answer: ACESection: (none)Explanation

    Explanation/Reference:Explanation: A: Need to have same number of replicated VMs in the replicated site.C: Once the hosting server is configured for Replica, you can enable replication for each virtual machine thatyou want to be replicated.

    E: The Hyper-V Replica Broker is placed in the replicated cluster Note:* Each node of the failover cluster that is involved in Replica must have the Hyper-V server role installed.* Windows Server 2012 Hyper-V Replica is a built-in mechanism for replicating Virtual Machines (VMs). It canreplicate selected VMs in real-time or asynchronously from a primary site to a designated replica site acrossLAN/WAN. Here a replica site hosts a replicated VM while an associated primary site is where the source VMruns. And either a replica site or a primary site can be a Windows Server 2012 Hyper-V host or a WindowsServer 2012 Failover Cluster.

    QUESTION 11* Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012.

    Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in afailover cluster named Cluster1. Cluster1 has access to four physical disks. The disks are configured as shownin the following table.

    You need to ensure that all of the disks can be added to a Cluster Shared Volume (CSV).

    Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

    A. Enable BitLocker on Disk4.B. Format Disk3 to use NTFS.C. Format Disk2 to use NTFS.D. Disable BitLocker on Disk1.

    Correct Answer: BCSection: (none)Explanation

    Explanation/Reference:You cannot use a disk for a CSV that is formatted with FAT, FAT32, or Resilient File System (ReFS).

    Cluster Shared Volumes (CSV) is a feature of Failover Clustering first introduced in Windows Server 2008 R2

  • for use with the Hyper-V role. A Cluster Shared Volume is a shared disk containing an NTFS volume that ismade accessible for read and write operations by all nodes within a Windows Server Failover Cluster.

    While CSV is not required for Live Migration of VMs, it reduces the potential disconnection period at the end ofthe migration since the NTFS file system does not have to be unmounted/mounted as is the case with atraditional cluster disk. This helps ensure seamless live migration since the physical disk resource does notneed to be moved between nodes. CSV increases the chance that a live migration will complete within the TCPreconnect window and ensure a seamless operation to clients.

    http://en.wikipedia.org/wiki/Cluster_Shared_Volumeshttp://technet.microsoft.com/en-us/library/dd446679(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/hh831656.aspxhttp://technet.microsoft.com/en-us/library/jj628158.aspx

    QUESTION 12* Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012.

    Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in afailover cluster named Cluster1. Cluster1 contains a Clustered Shared Volume (CSV).

    A developer creates an Application named App1. App1 is NOT a cluster-aware Application.App1 stores data in the file system.

    You need to ensure that App1 runs in Cluster1. The solution must minimize development effort.

    Which cmdlet should you run?

    A. Add-ClusterGenericServiceRoleB. Add-ClusterServerRoleC. Add-ClusterGenericApplicationRoleD. Add-ClusterScaleOutFileServerRole

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Add-ClusterGenericApplicationRoleConfigure high availability for an application that was not originally designed to run in a failover cluster.

    If you run an application as a Generic Application, the cluster software will start the application, then periodicallyquery the operating system to see whether the application appears to be running. If so, it is presumed to beonline, and will not be restarted or failed over.

  • http://technet.microsoft.com/en-us/library/ee460976.aspx

    QUESTION 13Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012.

    Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in afailover cluster named Cluster1. Cluster1 contains a file server role named FS1 and a generic service rolenamed SVC1. Server1 is the preferred node for FS1. Server2 is the preferred node for SVC1.

    You plan to run a disk maintenance tool on the physical disk used by FS1.

    You need to ensure that running the disk maintenance tool does not cause a failover to occur.

    What should you do before you run the tool?

    A. Run cluster.exe and specify the pause parameter.B. Run cluster.exe and specify the offline parameter.C. Run Suspend-ClusterResourceD. Run Suspend-ClusterNode.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Sometimes during maintenance or diagnosis that involves a service or application in a failover cluster, youmight need to bring that service or application online or take it offline. Bringing an application online or taking itoffline does not trigger failover, although the Cluster service handles the process in an orderly fashion. Forexample, if a particular disk is required by a particular clustered application, the Cluster service ensures that thedisk is available before the application starts.

    The Cluster.exe command-line tool is deprecated, but it can be optionally installed with the Failover Clusteringtools.

    Suspend-ClusterResource: Turn on maintenance for a disk resource or Cluster Shared Volume so that youcan run a disk maintenance tool without triggering failover .

    http://technet.microsoft.com/en-us/library/cc755234.aspxhttp://technet.microsoft.com/en-us/library/cc723245.aspx

  • QUESTION 14* You are employed as a network administrator at contoso.com. contoso.com has a single Active Directorydomain named contoso.com. All servers on the Contoso.com network have Windows server 2012 installed.

    Contoso.com has two servers, named server1 and server2 which are configured in a two-node fail over cluster.

    You are currently configuration the quorum settings for the cluster. You want to make use of a quorum modethat allows each node to vote if it is available and in communication.

    Which of the following is the mode you should use?

    A. Node MajorityB. Node and Disk MajorityC. Node and File Share MajorityD. No Majority:Disk Only

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Node Majority: Allows each node to vote

    http://technet.microsoft.com/en-us/library/cc770620(v=ws.10).aspx

    QUESTION 15* Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012.

    Server1 and Server2 have the Hyper-V server role and the Failover Clustering feature installed.

    Server1 and Server2 are members of a cluster named Cluster1. Cluster1 hosts 10 virtual machines.

    When you try to migrate a running virtual machine from one server to another, you receive the following errormessage: "There was an error checking for virtual machine compatibility on the target node."

    You need to ensure that the virtual machines can be migrated from one node to another.

    From which node should you perform the configuration?

    To answer, select the appropriate node in the answer area.

  • Hot Area:

    Correct Answer:

  • Section: (none)Explanation

    Explanation/Reference:

  • http://download.microsoft.com/download/F/2/1/F2146213-4AC0-4C50-B69A-12428FF0B077/VM%20processor%20compatibility%20mode.dochttp://support.microsoft.com/kb/2003737http://www.shogan.co.uk/vmware/live-migrating-a-vm-on-a-hyper-v-failover-cluster-fails-processor-specific-features-not-supported/

    QUESTION 16* Your network contains four servers that run Windows Server 2012.

    Each server has the Failover Clustering feature installed. Each server has three network adapters installed. AniSCSI SAN is available on the network.

    You create a failover cluster named Cluster1. You add the servers to the cluster.

    You plan to configure the network settings of each server node as shown in the following table.

  • You need to configure the network settings for Cluster1.

    What should you do?

    To answer, drag the appropriate network communication setting to the correct cluster network. Each networkcommunication setting may be used once, more than once, or not at all. You may need to drag the split barbetween panes or scroll to view content.

    Select and Place:

    Correct Answer:

    Section: (none)Explanation

    Explanation/Reference:

  • http://technet.microsoft.com/en-us/library/cc725775.aspxDo not allow cluster network communication on this network

    Select this option if you are using a network only for iSCSI (communication with storage) or only for backup.(These are among the most common reasons for selecting this option.)

    QUESTION 17* Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012.

    Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in afailover cluster named Cluster1.

    Cluster1 hosts an Application named App1.

    You need to ensure that Server2 handles all of the client requests to the cluster for App1. The solution mustensure that if Server2 fails, Server1 becomes the active node for App1.

    What should you configure?

    A. Affinity-NoneB. Affinity-SingleC. The cluster quorum settingsD. The failover settingsE. A file server for general useF. The Handling priorityG. The host priorityH. Live migrationI. The possible ownerJ. The preferred ownerK. Quick migrationL. the Scale-Out File Server

    Correct Answer: JSection: (none)Explanation

    Explanation/Reference:Preferred Owners For a given VM (technically any cluster Group) you can configure the preference for nodeorder on failover. So lets say that this VM normally runs on NodeA and you always want it next to go to NodeCif it is available, then preferred owners is a way for you to define a preference of first go to this node, then nextgo to this other node, then go to this next node. Its a priority list, and clustering will walk that list in where toplace the VM. This will override the default behavior of selecting the node currently hosting the least VMs Idescribed above, and gives you explicit control of where VMs go.

    http://blogs.msdn.com/b/clustering/archive/2008/10/14/9000092.aspxFailover behavior on clusters of three or more nodes

    The preferred owner in a 2 server cluster will always be the active node unless it is down.

    QUESTION 18* Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012.

    Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in afailover cluster named Cluster1.

  • You add two additional nodes to Cluster1.

    You need to ensure that Cluster1 stops running if three nodes fail.

    What should you configure?

    A. Affinity-NoneB. Affinity-SingleC. The cluster quorum settingsD. The failover settingsE. A file server for general useF. The Handling priorityG. The host priorityH. Live migrationI. The possible ownerJ. The preferred ownerK. Quick migrationL. the Scale-Out File Server

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:How the quorum configuration affects the clusterThe quorum configuration in a failover cluster determines the number of failures that the cluster can sustain. Ifan additional failure occurs, the cluster must stop running. The relevant failures in this context are failures ofnodes or, in some cases, of a disk witness (which contains a copy of the cluster configuration) or file sharewitness. It is essential that the cluster stop running if too many failures occur or if there is a problem withcommunication between the cluster nodes.

    The quorum configuration in a failover cluster determines the number of failures that the cluster can sustain.

  • http://technet.microsoft.com/en-us/library/cc731739.aspx

    QUESTION 19* Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012.

    Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in afailover cluster named Cluster1.

    You configure File Services and DHCP as clustered resources for Cluster1. Server1 is the active node for bothclustered resources.

    You need to ensure that if two consecutive heartbeat messages are missed between Server1 and Server2,Server2 will begin responding to DHCP requests. The solution must ensure that Server1 remains the activenode for the File Services clustered resource for up to five missed heartbeat messages.

    What should you configure?

    A. Affinity-NoneB. Affinity-SingleC. The cluster quorum settingsD. The failover settingsE. A file server for general useF. The Handling priorityG. The host priorityH. Live migrationI. The possible owner

  • J. The preferred ownerK. Quick migrationL. the Scale-Out File Server

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Virtual Server provides a service where a user can be notified if a virtual machine is not responding. This iscalled the virtual machine heartbeat. There are two situations under which a virtual machine might not send itsheartbeat. One is because the virtual machine has crashed - and no programs are running any longer. Theother is because another program on the virtual machine may be using all of the CPU resources and notleaving enough CPU time for our code to be able to send a heartbeat message.

    Think of it like your cell phone, when the other end goes silent how long are you willing to sit there going Hello?... Hello?... Hello? before you hang-up the phone and call the person back. When the other end goes silent,you dont know when or even if they will come back.

    http://blogs.msdn.com/b/virtual_pc_guy/archive/2006/02/20/534836.aspx

    The number of heartbeats that can be missed before failover occurs is known as the heartbeat threshold.

    http://technet.microsoft.com/en-us/library/dd197562(v=ws.10).aspxhttp://blogs.msdn.com/b/clustering/archive/2012/11/21/10370765.aspx

    QUESTION 20* Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012.

  • Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in afailover cluster named Cluster1.

    You add two additional nodes to Cluster1.

    You have a folder named Folder1 on Server1 that contains Application data.

    You plan to provide continuously available access to Folder1.

    You need to ensure that all of the nodes in Cluster1 can actively respond to the client requests for Folder1.

    What should you configure?

    A. Affinity-NoneB. Affinity-SingleC. The cluster quorum settingsD. The failover settingsE. A file server for general useF. The Handling priorityG. The host priorityH. Live migrationI. The possible ownerJ. The preferred ownerK. Quick migrationL. the Scale-Out File Server

    Correct Answer: LSection: (none)Explanation

    Explanation/Reference:You can actually use the Windows Server 2012 Scale-Out File Server and Server Message Block to create alevel of fault-tolerant storage.

    http://technet.microsoft.com/en-us/library/hh831349.aspxhttp://technet.microsoft.com/en-us/magazine/jj992578.aspx

    Scale-Out File Server for Application data (Scale-Out File Server) This clustered file server is introduced inWindows Server 2012 and lets you store server Application data, such as Hyper-V virtual machine files, on fileshares, and obtain a similar level of reliability, availability, manageability, and high performance that you wouldexpect from a storage area network. All file shares are online on all nodes simultaneously. File sharesassociated with this type of clustered file server are called scale-out file shares. This is sometimes referred toas active-active.

  • QUESTION 21* Information and details provided in a question Apply only to that question.

    Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012.

    Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured asnodes in an NLB cluster named Cluster1.

    Cluster1 hosts a secure web Application named WebApp1. WebApp1 saves user state information locally oneach node.

    You need to ensure that when users connect to WebApp1, their session state is maintained.What should you configure?

    A. Affinity-NoneB. Affinity-SingleC. The cluster quorum settingsD. The failover settingsE. A file server for general useF. The Handling priorityG. The host priorityH. Live migrationI. The possible ownerJ. The preferred ownerK. Quick migrationL. the Scale-Out File Server

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:http://technet.microsoft.com/en-us/library/bb687542.aspxhttp://www.microsoft.com/technet/prodtechnol/WindowsServer2003/Library/IIS/77cb4318-75f8-4310-a05f-3605b5768007.mspx

    Use the client affinity feature. When client affinity is enabled, Network Load Balancing directs all TCPconnections to the same cluster host. This allows session state to be maintained in host memory. You canenable client affinity in the Add/Edit Port Rules dialog box in Network Load Balancing Manager. Choose eitherSingle or Class C affinity to ensure that only one cluster host will handle all connections that are part of the

  • same client session. This is important if the server application running on the cluster host maintains sessionstate (such as server cookies) between connections.

    QUESTION 22* Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012.

    Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured asnodes in an NLB cluster named Cluster1.

    Port rules are configured for all clustered Applications.

    You need to ensure that Server2 handles all client requests to the cluster that are NOT covered by a port rule.

    What should you configure?

    A. Affinity-None

  • B. Affinity-SingleC. The cluster quorum settingsD. The failover settingsE. A file server for general useF. The Handling priorityG. The host priorityH. Live migrationI. The possible ownerJ. The preferred ownerK. Quick migrationL. The Scale-Out File Server

    Correct Answer: GSection: (none)Explanation

    Explanation/Reference:

  • http://technet.microsoft.com/en-us/library/bb742455.aspxhttp://technet.microsoft.com/en-us/library/cc771709.aspx

    QUESTION 23Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named Server3and Server4 that run Windows Server 2012. Server3 and Server4 are nodes in a failover cluster namedCluster2.

    You need to move all of the applications and the services from Cluster1 to Cluster2.

    What should you do first from Failover Cluster Manager?

    A. On a server in Cluster2, configure Cluster-Aware Updating.B. On a server in Cluster2, click Move Core Cluster Resources, and then click Best Possible Node.C. On a server in Cluster1, click Move Core Cluster Resources, and then click Select NodeD. On a server in Cluster1, click Migrate Roles.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

  • http://blogs.technet.com/b/hugofe/archive/2012/12/06/best-practices-for-migration-of-cluster-windows-2008-r2-2012-as-melhores-praticas-para-migrar-um-cluster-de-windows-2008-para-windows-2012.aspx

    QUESTION 24* Your network contains three Application servers that run Windows Server 2012. The Application servers havethe Network Load Balancing (NLB) feature installed.

    You create an NLB cluster that contains the three servers.

    You plan to deploy an Application named App1 to the nodes in the cluster. App1 uses TCP port 8080 and TCPport 8081.NLB cluster that contains the three serversClients will connect to App1 by using HTTP and HTTPS. When clients connect to App1 by using HTTPS,session state information will be retained locally by the cluster node that responds to the client request.

    You need to configure a port rule for App1.

    Which port rule should you use?

    To answer, select the appropriate rule in the answer area.

    Hot Area:

  • Correct Answer:

  • Section: (none)Explanation

    Explanation/Reference:

    QUESTION 25* Your network contains two servers named Server1 and Server2 that run Windows Server 2012.

    Server1 and Server2 have the Hyper-V server role installed. Server1 and Server2 are configured as Hyper-Vreplicas of each other.

    Server1 hosts a virtual machine named VM1. VM1 is replicated to Server2.

    You need to verify whether the replica of VM1 on Server2 is functional. The solution must ensure that VM1remains accessible to clients.

    What should you do from Hyper-V Manager?

    A. On Server1, execute a Planned Failover.B. On Server1, execute a Test Failover.C. On Server2, execute a Planned Failover.D. On Server2, execute a Test Failover.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Have you ever wonder I have enabled replication and it looks like everything is in progress, but how do I knowthat I am truly protected,?

    At a high level, Hyper-V Replica supports three types of Failover:

    Test Failover Planned Failover Unplanned Failover

  • http://blogs.technet.com/b/virtualization/archive/2012/07/31/types-of-failover-operations-in-hyper-v-replica-partii-planned-failover.aspxhttp://blogs.technet.com/b/virtualization/archive/2012/07/26/types-of-failover-operations-in-hyper-v-replica.aspx

    QUESTION 26* Your network contains two Web servers named Server1 and Server2.

    Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster.

    You configure the nodes to use the port rule shown in the exhibit. (Click the Exhibit button.)

    You need to configure the NLB cluster to meet the following requirements:

    HTTPS connections must be directed to Server1 if Server1 is available. HTTP connections must be loadbalanced between the two nodes.

    Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

    Exhibit:

  • A. From the host properties of Server1, set the Handling priority of the existing port rule to 2.B. From the host properties of Server1, set the Handling priority of the existing port rule to 1.C. From the host properties of Server2, set the Priority (Unique host ID) value to 1.D. Create a port rule for TCP port 80. Set the Filtering mode to Multiple host and set the Affinity to None.E. From the host properties of Server2, set the Handling priority of the existing port rule to 2.F. Create an additional port rule for TCP port 443. Set the Filtering mode to Multiple host and set the Affinity to

    Single.

    Correct Answer: BDESection: (none)Explanation

    Explanation/Reference:Explanation: Handling priority: When Single host filtering mode is being used, this parameter specifies the localhosts priority for handling the networking traffic for the associated port rule. The host with the highest handlingpriority (lowest numerical value) for this rule among the current members of the cluster will handle all of thetraffic for this rule. The allowed values range from 1, the highest priority, to the maximum number of hostsallowed (32). This value must be unique for all hosts in the cluster.E (not C): Lower priority (2) for Server 2.D: HTTP is port 80.Multiple hosts. This parameter specifies that multiple hosts in the cluster handle network traffic for theassociated port rule. This filtering mode provides scaled performance in addition to fault tolerance bydistributing the network load among multiple hosts. You can specify that the load be equally distributed amongthe hosts or that each host handle a specified load weight.

  • Reference: Network Load Balancing parameters

    QUESTION 27* Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012.

    Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in afailover cluster named Cluster1.

    You add two additional nodes in Cluster1.

    You have a folder named Folder1 on Server1 that hosts Application data. Folder1 is a folder target in aDistributed File System (DFS) namespace.

    You need to provide highly available access to Folder1. The solution must support DFS Replication to Folder1.

    What should you configure?

    A. Affinity-NoneB. Affinity-SingleC. The cluster quorum settingsD. The failover settingsE. A File Server for General UseF. The Handling priorityG. The host priorityH. Live migrationI. The possible ownerJ. The preferred ownerK. Quick migrationL. The Scale-Out File Server

    Correct Answer: ESection: (none)Explanation

    Explanation/Reference:

    Although a Scale-Out File Server supports DFS Namespace Folder Target it does NOT support DFSReplication as per the question. Hence, A File Server for General Use.

    Continuously Available File Shares (CAFS) is an important new technology in Windows Server 2012. At its

  • basic level, Server 2012s CAFS feature takes Windows file sharing capabilities and scales them using aServer 2012 cluster. CAFS takes advantage of new Server Message Block (SMB) 3.0 capabilities to increasethe availability of Windows Server file shares used for document storage and application support. Some of thenew SMB 3.0 features that enable CAFS include SMB Scale-Out, SMB Direct, and SMB Multichannel.

    The CAFS feature addresses problems that occurred in earlier implementations of highly available file serverson Windows Server failover clusters. Previous implementations provided high availability for file shares butwere hampered by brief periods of downtime and a momentary loss of connectivity in the event of a failover.Such brief outages were usually acceptable for Microsoft Office-type applications that perform frequent fileopens and closes, because these apps could reconnect and save changes after the failover completed.However, these same outages werent acceptable for applications like Hyper-V or SQL Server, which hold filesopen for extended periods of time, and outages would result in data loss. Before the advent of Server 2012,Microsoft didnt support these types of server installations on file shares. Providing application support was oneof Microsofts primary design points for CAFS. While you can use CAFS for simple client file sharing, CAFS isreally targeted at supporting server applications. CAFS gives you the ability to take advantage of WindowsServers low-cost storage capabilities for mission-critical applications. CAFS provides continuous access to fileshares with almost zero downtime.

    Choose an Implementation

    There are essentially two ways to implement CAFS:General Purpose File Server Very much like the highly available file server support in Windows Server

    2008 R2, the CAFS general use file server implementation allows a file share to be supported on a failovercluster. CAFS improves the availability and performance of this implementation with the new higherperformance SMB 3.0 client access.

    Scale-Out File Server The scale-out file server implementation is the new CAFS option for supportingapplications like Hyper-V and SQL Server with no downtime. This implementation is limited to four servers.

  • http://windowsitpro.com/windows-server-2012/windows-server-2012-implement-continuously-available-file-shares

    QUESTION 28Your network contains an Active Directory domain named contoso.com. The domain contains two serversnamed Node1 and Node2. Node1 and Node2 run Windows Server 2012. Node1 and Node2 are configured asa two-node failover cluster named Cluster2.

    The computer accounts for all of the servers reside in an organizational unit (OU) named Servers.

    A user named User1 is a member of the local Administrators group on Node1 and Node2.

    User1 creates a new clustered File Server role named File1 by using the File Server for general use option. Areport is generated during the creation of File1 as shown in the exhibit. (Click the Exhibit button.)

    File1 fails to start. You need to ensure that you can start File1.

    What should you do?

    Exhibit:

  • A. Log on to the domain by using the built-in Administrator for the domain, and then recreate the clustered FileServer role by using the File Server for general use option.

    B. Recreate the clustered File Server role by using the File Server for scale-out Application data option.C. Assign the computer account permissions of Cluster2 to the Servers OU.D. Assign the user account permissions of User1 to the Servers OU.E. Increase the value of the ms-DS-MachineAccountQuota attribute of the domain.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Scale-Out File Server for Application Data

  • When using the failover cluster manager changes you make are not being done as the user but as the clustermachine account.

    You have created a Windows Server 2012 Scale-Out File Server. The cluster, including the network andstorage, pass the cluster validation test.Everything looks and is good. You create a File Server role for application data (SOFS) but it fails to start:

    The fix is in:

    1) Open Active Directory Users And Computers.2) Enable Advanced view if not enabled.3) Edit the properties of the OU containing the cluster computer object4) Open the Security tab and click Advanced5) Click Add (opens Permission Entry dialog), click Select A Principal, Click Object Types and selectComputers. Enter the name of the cluster computer object.

    6) Back in the Permission Entry dialog, scroll down, and select Create Computer Objects.

    7) OK everything, (you might need to wait for your DCs to replicate if you have site links to deal with) return toFailover Cluster Manager, right-click on the SOFS role, and click Start Role. It should now start up.

    http://www.aidanfinn.com/?p=14142

  • http://technet.microsoft.com/en-us/library/hh831349.aspx

    QUESTION 29Your network contains an Active Directory domain named contoso.com. The domain contains four serversnamed Server1, Server2, Server3, and Server4 that run Windows Server 2012. All servers have the Hyper-Vserver role and the Failover Clustering feature installed.

    You need to replicate virtual machines from Cluster1 to Cluster2.

    Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

    A. From Hyper-V Manager on a node in Cluster2, create three virtual machines.B. From Cluster2, add and configure the Hyper-V Replica Broker role.C. From Failover Cluster Manager on Cluster1, configure each virtual machine for replication.D. From Cluster1, add and configure the Hyper-V Replica Broker role.E. From Hyper-V Manager on a node in Cluster2, modify the Hyper-V settings.

    Correct Answer: BCDSection: (none)Explanation

    Explanation/Reference:What Is Hyper-V Replica?Hyper-V Replica is new functionality added to the Hyper-V Role in Windows Server "8" Beta. Hyper-V Replicaenables organizations to implement an affordable Business Continuity and Disaster Recovery (BCDR) solutionfor virtualized workloads. This allows virtual machines running at a primary site to be efficiently replicated tosecondary location (Replica site) across a WAN link.

  • Failover Replication Broker ArchitectureThe Hyper-V Replica Broker runs in a Replica cluster and provides a Replica server name (connection point(a.k.a. Client Access Point (CAP))) for initial virtual machine placement when contacted by a Primary server.After a virtual machine is initially replicated to the Replica Cluster, the Hyper-V Replica Broker provides thevirtual machine to Replica Server (cluster node) mapping to ensure the Primary server can replicate data for thevirtual machine to the correct node in the cluster in support of mobility scenarios on the Replica side (e.g. Live\Quick Migration, or Storage Migration).

    The Hyper-V Replica Broker role tracks the movement of Replica virtual machines hosted in a Failover Cluster.As part of virtual machine mobility scenarios, virtual machines can be migrated between nodes in the cluster.The Hyper-V Replica Broker Manager provides information that ensures proper, continued replication of virtualmachines.

    http://technet.microsoft.com/en-us/library/jj134153.aspx#BKMK_1_2http://download.microsoft.com/download/F/F/1/FF1FA6DE-E82A-48EF-BDCC-612C2D588BFE/Understand%20and%20Troubleshoot%20Guide%20Hyper-V%20Replica%20in%20Windows%20Server%208%20Beta.docx

    http://technet.microsoft.com/en-us/library/jj134240.aspxA Replica virtual machine is created on the Replica server. If you elected to send the initial copy over thenetwork, the transmission begins either immediately or at the time you configured. If you elected to use externalmedia for the initial copy, the necessary files are copied to a local location. Copy the files to the media you willuse to transfer the initial copy and then send the media to the Replica site.

  • QUESTION 30Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012.

    Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured asnodes in an NLB cluster named Cluster1. Both servers connect to the same switch.

    Cluster1 hosts a secure web Application named WebApp1. WebApp1 saves user state information in a centraldatabase.

    You need to ensure that the connections to WebApp1 are distributed evenly between the nodes. The solutionmust minimize port flooding.

    What should you configure? To answer, configure the appropriate affinity and the appropriate mode forCluster1 in the answer area.

    Hot Area:

    Correct Answer:

    Section: (none)Explanation

    Explanation/Reference:

  • http://technet.microsoft.com/en-us/library/cc771709.aspx

    QUESTION 31Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012R2.

    Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains anapplication named App1 that is accessed by using the URL http://app1.contoso.com.

    You plan to perform maintenance on Server1.

    You need to ensure that all new connections to App1 are directed to Server2. The solution must not disconnectthe existing connections to Server1.

    What should you run?

    A. The Set-NlbCluster cmdletB. The Set-NlbClusterNode cmdletC. The Stop-NlbCluster cmdletD. The Stop-NlbClusterNode cmdlet

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Stop-NlbClusterNode can be used if the -drain switch is used to drain active connections without disconnectingexisting connections:Detailed DescriptionThe Stop-NlbClusterNode cmdlet stops a node in an NLB cluster. When you use the stop the nodes in thecluster, client connections that are already in progress are interrupted. To avoid interrupting active connections,consider using the -drain parameter, which allows the node to continue servicing active connections butdisables all new traffic to that node.

    If there is a Suspend-NlbClusterNode option that is the correct answer.http://technet.microsoft.com/en-us/library/ee817114.aspxDetailed DescriptionThe Suspend-NlbClusterNode cmdlet suspends a specific node in an NLB cluster. You might need to suspenda node in a cluster to override any remote control commands that are issued or for maintenance work.

    QUESTION 32* You have two failover clusters named Cluster1 and Cluster2. All of the nodes in both of the clusters runWindows Server 2012 R2.

    Cluster1 hosts two virtual machines named VM1 and VM2.

    You plan to configure VM1 and VM2 as nodes in a new failover cluster named Cluster3.

    You need to configure the witness disk for Cluster3 to be hosted on Cluster2.

    Which three actions should you perform in sequence?

    To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in

  • the correct order.

    Hot Area:

    Correct Answer:

  • Section: (none)Explanation

    Explanation/Reference:

    QUESTION 33* Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012R2.

    Server1 and 5erver2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains anapplication named App1 that is accessed by using the name appl.contoso.com.

    The NLB cluster has the port rules configured as shown in the exhibit. (Click the Exhibit

    Guaranteed success with TestInsides practice guides 367 Microsoft 70-412 : Practice Testbutton.)

  • To answer, complete each statement according to the information presented in the exhibit.Each correct selection is worth one point.

    Guaranteed success with TestInsides practice guides 368 Microsoft 70-412 : Practice Test

  • Hot Area:

    Correct Answer:

  • Section: (none)Explanation

    Explanation/Reference:

    QUESTION 34* Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named Server3and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in a failover cluster namedCluster2.

    You need to move all of the applications and the services from Cluster1 to Cluster2.

    What should you do first from Failover Cluster Manager?

    A. On a server in Cluster1, click Move Core Cluster Resources, and then click Select NodeB. On a server in Cluster2, configure Cluster-Aware UpdatingC. On a server in Cluster1, configure Cluster-Aware UpdatingD. On a server in Cluster1, click Migrate Roles.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:http://technet.microsoft.com/en-us/library/dn530789.aspxCluster roles: Migrate the cluster roles Use the Copy Cluster Roles Wizard in Failover Cluster Manager tomigrate the cluster roles to the new cluster.

    QUESTION 35* Your network contains an Active Directory domain named contoso.com. The domain contains two serversnamed Node1 and Node2. Node1 and Node2 run Windows Server 2012 R2. Node1 and Node2 are configuredas a two-node failover cluster named Cluster2.

    The computer accounts for all of the servers reside in an organizational unit (OU) named Servers.

  • A user named User1 is a member of the local Administrators group on Node1 and Node2.

    User1 creates a new clustered File Server role named File1 by using the File Server for general use option. Areport is generated during the creation of File1 as shown in the exhibit. (Click the Exhibit button.)

    File1 fails to start.

    You need to ensure that you can start File1.

    What should you do?

    A. Log on to the domain by using the built-in Administrator for the domain, and then recreate the clustered FileServer role by using the File Server for general use option.

    B. Recreate the clustered File Server role by using the File Server for scale-out Application data option

  • C. Assign the computer account permissions of Cluster2 to the Servers OUD. Assign the user account permissions of User1 to the Servers OUE. Increase the value of the ms-DS-MachineAccountQuota attribute of the domain.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 36*Your network contains an Active Directory domain named contoso.com. The domain contains four memberservers named Server1, Server2, Server3, and Server4. All servers run Windows Server 2012 R2.

    Server1 and Server3 are located in a site named Site1. Server2 and Server4 are located in a site named Site2.The servers are configured as nodes in a failover cluster named Cluster1.

    Dynamic quorum management is disabled.

    Cluster1 is configured to use the Node Majority quorum configuration.

    You need to ensure that users in Site2 can access Cluster1 if the network connection between the two sitesbecomes unavailable.

    What should you run from Windows PowerShell?

    To answer, drag the appropriate commands to the correct location. Each command may be used once, morethan once, or not at all. You may need to drag the split bar between panes or scroll to view content.

    Guaranteed success with TestInsides practice guides 325 Microsoft 70-412 : Practice Test

    Hot Area:

  • Correct Answer:

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 37* Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012R2.

    Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains anapplication named App1 that is accessed by using the URL http://app1.contoso.com.

    You deploy a new server named Server3 that runs Windows Server 2012 R2. The contoso.com DNS zonecontains the records shown in the following table.

    Guaranteed success with TestInsides practice guides 323 Microsoft 70-412 : Practice Test

    You need to add Server3 to the NLB cluster.

    What command should you run?

    To answer, select the appropriate options in the answer area.

  • Hot Area:

    Correct Answer:

  • Section: (none)Explanation

    Explanation/Reference:

  • Configure file and storage solutions

    QUESTION 1* Your company has a main office and a branch office.

    The main office contains a file server named Server1. Server1 has the BranchCache for Network Files roleservice installed. The branch office contains a server named Server2. Server2 is configured as a BranchCachehosted cache server.

    You need to preload the data from the file shares on Server1 to the cache on Server2.

    You generate hashes for the file shares on Server1.

    Which cmdlet should you run next?

    A. Add-BCDataCacheExtensionB. Set-BCCacheC. Publish-BCFileContentD. Export-BCCachePackage

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:BranchCache is a wide area network (WAN) bandwidth optimization technology that is included in someeditions of the Windows Server 2012 and Windows 8 operating systems, as well as in some editions ofWindows Server 2008 R2 and Windows 7. To optimize WAN bandwidth when users access content onremote servers, BranchCache copies content from your main office or hosted cloud content servers and cachesthe content at branch office locations, allowing client computers at branch offices to access the content locallyrather than over the WAN.

    At branch offices, content is stored either on servers that are configured to host the cache or, when no server isavailable in the branch office, on client computers that are running Windows 8 or Windows 7. After a clientcomputer requests and receives content from the main office and the content is cached at the branch office,other computers at the same branch office can obtain the content locally rather than downloading the contentfrom the content server over the WAN link.

    When subsequent requests for the same content are made by client computers, the clients download contentinformation from the server instead of the actual content. Content information consists of hashes that arecalculated using chunks of the original content, and are extremely small compared to the content in the originaldata. Client computers then use the content information to locate the content from a cache in the branch office,whether the cache is located on a client computer or on a server. Client computers and servers also usecontent information to secure cached content so that it cannot be accessed by unauthorized users.

    You can use this procedure to force the creation of content information also called hashes - on BranchCache-enabled Web and file servers. You can also gather the data on file and web servers into packages that can betransferred to remote hosted cache servers. This provides you with the ability to preload content on remotehosted cache servers so that data is available for the first client access.

    http://technet.microsoft.com/en-us/library/jj572970.aspx

  • QUESTION 2* You manage an environment that has many servers. The servers run Windows Server 2012 and use iSCSIstorage.

    Administrators report that it is difficult to locate available iSCSI resources on the network.

    You need to ensure that the administrators can locate iSCSI resources on the network by using a centralrepository.

    Which feature should you deploy?

    A. The iSCSI Target Server role serviceB. The iSNS Server service featureC. The Windows Standards-Based Storage Management featureD. The iSCSI Target Storage Provider feature

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Internet iStorage Name Service Server (iSNS Server)The Internet Storage Name Service (iSNS) protocol is used for interaction between iSNS servers and iSNSclients. iSNS clients are computers, also known as initiators, that are attempting to discover storage devices,also known as targets, on an Ethernet network. iSNS facilitates automated discovery, management, andconfiguration of iSCSI and Fibre Channel devices (using iFCP gateways) on a TCP/IP network.

  • http://technet.microsoft.com/en-us/library/cc772568.aspx

    QUESTION 3* Your network contains an Active Directory domain named contoso.com. The network contains a file servernamed Server1 that runs Windows Server 2012.

    You create a folder named Folder1. You share Folder1 as Share1. The NTFS permissions on Folder1 areshown in the Folder1 exhibit. (Click the Exhibit button.)

    The Everyone group has the Full control Share permission to Folder1.

    You configure a central access policy as shown in the Central Access Policy exhibit. (Click the Exhibit button.)

    Members of the IT group report that they cannot modify the files in Folder1. You need to ensure that the ITgroup members can modify the files in Folder1. The solution must use central access policies to control thepermissions.

    Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

    NTFS permissions on Folder1 (exhibit):

  • central access policy (exhibit):

  • A. On the Classification tab of Folder1, set the classification to Information Technology.B. On the Security tab of Folder1, add a conditional expression to the existing permission entry for the IT

    group.C. On Share1, assign the Change Share permission to the IT group.D. On the Security tab of Folder1, remove the permission entry for the IT group.E. On the Security tab of Folder1, assign the Modify permission to the Authenticated Users group.

    Correct Answer: AESection: (none)Explanation

  • Explanation/Reference:Central access policies for files enable organizations to centrally deploy and manage authorization policies thatinclude conditional expressions that use user groups, user claims, device claims, and resource properties.

    (Claims are assertions about the attributes of the object with which they are associated). For example, toaccess high-business-impact (HBI) data, a user must be a full-time employee, obtain access from a manageddevice, and log on with a smart card. These policies are defined and hosted in Active Directory DomainServices (AD DS).

    http://technet.microsoft.com/en-us/library/hh846167.aspx

  • QUESTION 4* Your network contains an Active Directory domain named contoso.com. You are creating a custom WindowsRecovery Environment (Windows RE) image.

    You need to ensure that when a server starts from the custom Windows RE image, a drive is mappedautomatically to a network share.

    What should you modify in the image?

    A. startnet.cmdB. Xsl-mappings.xml

  • C. Win.iniD. smb.types.ps1xml

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:The best way to define what to start is using starnet.cmdConnecting to your network is done in the startnet.cmd. Your basic commands:

    wpeinitwpeutil initializenetworking(add a ping command here if experiencing hardware delays)net use z: \\server\share password /user:userprogram.exe

    http://technet.microsoft.com/en-us/library/cc766521(v=ws.10).aspx

    QUESTION 5* You have a file server named FS1 that runs Windows Server 8.

    Data Deduplication is enabled on FS1.

    You need to configure Data Deduplication to run at a normal priority from 20:00 to 06:00 daily.

    What should you configure?

    A. File and Storage Services in Server ManagerB. The Data Deduplication process in Task ManagerC. Disk Management in Computer ManagementD. The properties of drive C

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Data Deduplication is designed to be installed on primary data volumes without adding additional dedicatedhardware. This means that you can install and use the feature without impacting the primary workload on the

  • server. The default settings are nonintrusive because they allow data to age for five days before processing aparticular file, and has a default minimum file size of 32 KB. The implementation is designed for low memoryand CPU usage, and if memory utilization becomes high, deduplication will wait for available resources.Administrators can schedule more aggressive deduplication based on the type of data that is involved and thefrequency and volume of changes that occur to the volume or particular file types.

  • http://technet.microsoft.com/en-us/library/hh831700.aspx

    QUESTION 6* Your network contains an Active Directory domain named contoso.com. All file servers in the domain runWindows Server 2012.

    The computer accounts of the file servers are in an organizational unit (OU) named OU1. A Group Policy object(GPO) named GPO1 is linked to OU1.

  • You plan to modify the NTFS permissions for many folders on the file servers by using central access policies.

    You need to identify any users who will be denied access to resources that they can currently access once thenew permissions are implemented.

    In which order should you Perform the five actions?

    Select and Place:

    Correct Answer:

  • Section: (none)Explanation

    Explanation/Reference:The need to control the information in enterprise-level organizations for compliance and business regulations isone of the drivers in the consolidation trend where large amounts of information from users desktops anddepartmental file shares are moved into centrally managed file servers.

    Configure a Central Access RuleAdd Central Access Rule to Central Access PolicyPublish the Central Access Policy Using Group PolicyConfigure a Windows Server 2012 File Server to work with Dynamic Access Control

    http://technet.microsoft.com/de-de/library/hh831366.aspxhttp://www.petri.co.il/dynamic-access-control-dac-configure-deploy-central-access-policy.htmhttp://technet.microsoft.com/de-de/library/hh846167.aspx

    QUESTION 7* Your company has a main office and a branch office. An Active Directory site exists for each office.

    The network contains an Active Directory forest named contoso.com. The contoso.com domain contains threemember servers named Server1, Server2, and Server3. All servers run Windows Server 2012.

    In the main office, you configure Server1 as a file server that uses BranchCache.

    In the branch office, you configure Server2 and Server3 as BranchCache hosted cache servers.

    You are creating a Group Policy for the branch office site. In the branch office, you need to configure the clientcomputers that run Windows 8 to use Server2 and Server3 as BranchCache.

  • Hot Area:

    Correct Answer:

    Section: (none)Explanation

    Explanation/Reference:BranchCache uses peer-to-peer networking across LANs to reduce file sharing and HTTP traffic across theWAN. When you enable BranchCache, client computers running Windows 7 keep a local cached copy of datathat they copy from a file or Web server running Windows Server 2008 R2. If another computer runningWindows 7 on the same LAN or branch office needs the same data, that client can copy the data directly fromthe local cache, reducing WAN bandwidth usage and potentially improving performance.

  • http://technet.microsoft.com/en-us/magazine/gg619377.aspxhttp://blogs.technet.com/b/tnmag/archive/2011/02/09/use-group-policy-to-configure-branchcache-on-windows-7-clients.aspx

    QUESTION 8* You have a server named Server1 that runs Windows Server 2012. Server1 has the File Server ResourceManager role service installed.

    You attempt to delete a classification property and you receive the error message as shown in the exhibit. (Clickthe Exhibit button.)

    You need to delete the isConfidential classification property.

    What should you do?

    A. Delete the classification rule that is assigned the isConfidential classification property.B. Disable the classification rule that is assigned the isConfidential classification property.C. Set files that have an isConfidential classification property value of Yes to No.D. Clear the isConfidential classification property value of all files.

    Correct Answer: A

  • Section: (none)Explanation

    Explanation/Reference:What is the File Classification Infrastructure?

    The Windows Server 2008 R2 File Classification Infrastructure (FCI) automates classification processes so thatyou can manage your data more effectively. You can save money and reduce risk by storing and retaining filesbased on their business value or impact. The built-in solution for file classification provides expiration, customtasks, and reporting. The extensible infrastructure enables you to meet additional customer classification needsby building rich end-to-end classification solutions that are built on the classification foundation of WindowsServer in a consistent and supported way and within the existing Windows file serving platforms.

    QUESTION 9* You have a server named Server2 that runs Windows Server 2012. You have storage provisioned on Server2as shown in the exhibit. (Click the Exhibit button.)

    You need to configure the storage so that it appears in Windows Explorer as a drive letter on Server1.

    Which three actions should you perform in sequence? To answer, move the three appropriate actions from thelist of actions to the answer area and arrange them in the correct order.

    Exhibit:

  • Select and Place:

    Correct Answer:

  • Section: (none)Explanation

    Explanation/Reference:Microsoft Internet iSCSI Initiator enables you to connect a host computer that is running Windows 7 orWindows Server 2008 R2 to an external iSCSI-based storage array through an Ethernet network adapter. Youcan use Microsoft iSCSI Initiator in your existing network infrastructure to enable block-based storage areanetworks (SANs). SANs provide iSCSI target functionality without investing in additional hardware, and theyenable the use of iSCSI storage devices in home and small offices.

    Microsoft iSCSI Initiator is installed natively on Windows Server 2012, Windows Server 2008 R2, Windows 7,Windows Server 2008, and Windows Vista. On these operating systems, no installation steps are required.

    http://technet.microsoft.com/en-us/library/cc772367.aspxhttp://technet.microsoft.com/en-us/library/ee338480%28v=ws.10%29.aspx

    QUESTION 10* Your network contains an Active Directory domain named contoso.com. All servers run Windows Server2012.

    You are creating a central access rule named TestFinance that will be used to audit members of theAuthenticated Users group for access failure to shared folders in the finance department.

    You need to ensure that access requests are unaffected when the rule is published.

    What should you do?

    A. Add a User condition to the current permissions entry for the Authenticated Users principal.B. Set the Permissions to Use the following permissions as proposed permissions.C. Add a Resource condition to the current permissions entry for the Authenticated Users principal.D. Set the Permissions to Use following permissions as current permissions.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:You can set proposed permissions in a Central Access Rule as well as actually set permissions.

    http://technet.microsoft.com/en-us/library/jj134043.aspx

  • QUESTION 11* You have a server named Server1 that runs a Server Core Installation of Windows Server 2012. Shadowscopies are enabled on all volumes.

    You need to delete a specific shadow copy. The solution must minimize server downtime.Which tool should you use?

    A. VssadminB. DiskpartC. WbadminD. Shadow

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Vssadmin delete shadowsDeletes shadow copies of a specified volume.

    http://technet.microsoft.com/en-us/library/cc754968%28v=ws.10%29.aspx

    http://technet.microsoft.com/en-us/library/cc788026(v=ws.10).aspx

    QUESTION 12

  • * Your network contains an Active Directory domain named adatum.com. All domain controllers run WindowsServer 2008 R2.The domain contains a file server named Server6 that runs Windows Server 2012. Server6 contains a foldernamed Folder1. Folder1 is shared as Share1.

    The NTFS permissions on Folder1 are shown in the exhibit. (Click the Exhibit button.)

    The domain contains two global groups named Group1 and Group2.

    You need to ensure that only users who are members of both Group1 and Group2 are denied access toFolder1.

    Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

    Exhibit:

    A. Remove the Deny permission for Group1 from Folder1.B. Deny Group2 permission to Folder1.C. Install a domain controller that runs Windows Server 2012.D. Create a conditional expression.E. Deny Group2 permission to Share1.

  • F. Deny Group1 permission to Share1.

    Correct Answer: CDSection: (none)Explanation

    Explanation/Reference:"ensure that only users who are members of both Group1 and Group2 are denied access to Folder1"

    Conditional Expressions for Permission Entries Windows Server 2008 R2 and Windows 7 enhanced Windowssecurity descriptors by introducing a conditional access permission entry.

    Access Control and Authorization Overview

    In Windows Server 2012 and Windows 8, helps control the use of system and network resources through theinterrelated mechanisms of authentication and authorization. After a user is authenticated, Windows Server2012 and Windows 8 use Windows authorization and access control technologies to implement the secondphase of protecting resources: determining if an authenticated user has the correct permissions to access aresource.

    Windows Server 2012 takes advantage of conditional access permission entries by inserting user claims,device claims, and resource properties, into conditional expressions. Windows Server 2012 security evaluatesthese expressions and allows or denies access based on results of the evaluation. Securing access toresources through claims is known as claims-based access control. Claims-based access control works withtraditional access control to provide an additional layer of authorization that is flexible to the varying needs ofthe enterprise environment.

  • http://technet.microsoft.com/en-us/library/jj134043.aspxhttp://social.technet.microsoft.com/wiki/contents/articles/14269.introducing-dynamic- access-control-en-us.aspx

    QUESTION 13* Your network contains an Active Directory domain named contoso.com. The network contains a file servernamed Server1 that runs Windows Server 2012.

    You are configuring a central access policy for temporary employees.

    You enable the Department resource property and assign the property a suggested value of Temp.

    You need to configure a target resource condition for the central access rule that is scoped to resourcesassigned to Temp only.

    Which condition should you use?

    A. (Temp.Resource Equals "Department")B. (Resource.Temp Equals "Department")C. (Resource.Department Equals "Temp")D. (Department.Value Equals "Temp")

    Correct Answer: C

  • Section: (none)Explanation

    Explanation/Reference:

    http://technet.microsoft.com/fr-fr/library/hh846167.aspx

    QUESTION 14* Your network contains an Active Directory domain named contoso.com. The domain contains a file servernamed Server1 that runs Windows Server 2012. All client computers run Windows 8.

    You need to configure a custom Access Denied message that will be displayed to users when they are deniedaccess to folders or files on Server1.

    What should you configure?

    A. A classification propertyB. The File Server Resource Manager OptionsC. A file management taskD. A file screen template

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:File Server Resource Manager is a suite of tools that allows administrators to understand, control, and managethe quantity and type of data stored on their servers. By using File Server Resource Manager, administratorscan place quotas on folders and volumes, actively screen files, and generate comprehensive storage reports.This set of advanced instruments not only helps the administrator to efficiently monitor existing storage

  • resources but it also aids in the planning and implementation of future policy changes.

    http://technet.microsoft.com/en-us/library/cc755603%28v=ws.10%29.aspx

    QUESTION 15* You have a file server named Server1 that runs a Server Core Installation of Windows Server 2012.

    Server1 has a volume named D that contains user data. Server1 has a volume named E that is empty.

    Server1 is configured to create a shadow copy of volume D every hour.

    You need to configure the shadow copies of volume D to be stored on volume E.

    What should you run?

    A. The Set-Volume cmdlet with the -driveletter parameterB. The Set-Volume cmdlet with the -path parameterC. The vssadmin.exe add shadowstorage commandD. The vssadmin.exe create shadow command

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Vssadmin add shadowstorageAdds a shadow copy storage association for a specified volume.

    http://technet.microsoft.com/en-us/library/cc788051%28v=ws.10%29.aspx

    QUESTION 16* Your network contains an Active Directory domain named contoso.com. The domain contains a file servernamed File1 that runs a Server Core Installation of Windows Server 2012.

    File1 has a volume named D that contains home folders. File1 creates a shadow copy of volume D twice a day.

    You discover that volume D is almost full.

    You add a new volume named H to File1.

    You need to ensure that the shadow copies of volume D are stored on volume H.

    Which command should you run?

    A. The Set-Volume cmdlet with the -driveletter parameterB. The vssadmin.exe create shadow commandC. The Set-Volume cmdlet with the -path parameterD. The vssadmin.exe add shadowstorage command

    Correct Answer: D

  • Section: (none)Explanation

    Explanation/Reference:Vssadmin add shadowstorageAdds a shadow copy storage association for a specified volume.

    http://technet.microsoft.com/en-us/library/cc788051%28v=ws.10%29.aspx

    QUESTION 17* Your network contains an Active Directory domain named contoso.com. All servers run Windows Server2012. The domain contains a file server named Server1. The domain contains a domain controller named DC1.Server1 contains three shared folders. The folders are configured as shown in the following table.

    Folder2 has a conditional expression of User.Department= = MMarketing".

    You discover that a user named User1 cannot access \\Server1\folder2. User1 can access \\Server1\folderl and\\Server1\folder3.

    You verify the group membership of User1 as shown in the Member Of exhibit. (Click the Exhibit button.)

  • You verify the organization information of User1 as shown in the Organization exhibit.

  • You verify the general properties of User1 as shown in the General exhibit. (Click the Exhibit button.)

  • You need to ensure that User1 can access the contents of \\Server1\folder2.

    What should you do?

    A. From a Group Policy object (GPO), set the Support for Dynamic Access Control and Kerberos armoringsetting to Always provide claims.

    B. Change the department attribute of User1.C. Grant the Full Control NTFS permissions on Folder2 to User1.D. Remove User11from the Accounting global group.

  • Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:B. Conditional Expression and users Department must match http://technet.microsoft.com/en-us/library/jj134043.aspx

    QUESTION 18* You have a server named Server1 that runs Windows Server 2012.

    You install the File and Storage Services server role on Server1.

    From Windows Explorer, you view the properties of a folder named Folder1 and you discover that theClassification tab is missing.

    You need to ensure that you can assign classifications to Folder1 from Windows Explorer manually.

    What should you do?

    A. From Folder Options, clear Hide protected operating system files (Recommended).B. Install the File Server Resource Manager role service.C. From Folder Options, select the Always show menus.D. Install the Share and Storage Management Tools.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Classification properties are used to categorize files and can be used to select files for scheduled filemanagement tasks.

    http://technet.microsoft.com/en-us/library/dd759252.aspxhttp://technet.microsoft.com/en-us/library/dd758759(v=WS.10).aspx

    QUESTION 19* (diff question - A) Your network contains three servers named Server1, Server2, and Server3. All servers runWindows Server 2012.

    You need to ensure that Server1 can provide iSCSI storage for Server2 and Server3.

    What should you do on Server1?

    A. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties.

  • B. Install the iSNS Server service feature and create a Discovery Domain.C. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties.D. Install the iSCSI Target Server role service and configure iSCSI targets.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:iSCSI: it is an industry standard protocol allow sharing block storage over the Ethernet. The server shares thestorage is called iSCSI Target. The server (machine) consumes the storage is called iSCSI initiator. Typically,the iSCSI initiator is an application server. For example, iSCSI Target provides storage to a SQL server, theSQL server will be the iSCSI initiator in this deployment.

    Target: It is an object which allows the iSCSI initiator to make a connection. The Target keeps track of theinitiators which are allowed to be connected to it. The Target also keeps track of the iSCSI virtual disks whichare associated with it. Once the initiator establishes the connection to the Target, all the iSCSI virtual disksassociated with the Target will be accessible by the initiator.

    iSCSI Target Server: The server runs the iSCSI Target. It is also the iSCSI Target role name in WindowsServer 2012.

    http://blogs.technet.com/b/filecab/archive/2012/05/21/introduction-of-iscsi-target-in-windows-server-2012.aspx

    QUESTION 20* (different question 2 fois) Your company has a main office and a branch office. The main office is located inDetroit. The branch office is located in Seattle.

    The network contains an Active Directory domain named adatum.com. Client computers run either Windows 7Enterprise or Windows 8 Enterprise.

    The main office contains 1,000 client computers and 50 servers. The branch office contains 20 clientcomputers.

    All computer accounts for the branch office are located in an organizational unit (OU) namedSeattleComputers. A Group Policy object (GPO) named GPO1 is linked to the SeattleComputers OU.

    You need to configure BranchCache for the branch office.

    Hot Area:

  • Correct Answer:

    Section: (none)Explanation

    Explanation/Reference:BranchCache uses peer-to-peer networking across LANs to reduce file sharing and HTTP traffic across theWAN. When you enable BranchCache, client computers running Windows 7 keep a local cached copy of datathat they copy from a file or Web server running Windows Server 2008 R2. If another computer runningWindows 7 on the same LAN or branch office needs the same data, that client can copy the data directly fromthe local cache, reducing WAN bandwidth usage and potentially improving performance.

  • http://technet.microsoft.com/en-us/magazine/gg619377.aspxhttp://blogs.technet.com/b/tnmag/archive/2011/02/09/use-group-policy-to-configure-branchcache-on-windows-7-clients.aspx

    QUESTION 21* Your network contains an Active Directory domain named contoso.com. The domain contains a file servernamed Server1. The File Server Resource Manager role service is installed on Server1. All servers runWindows Server 2012.

    A Group Policy object (GPO) named GPO1 is linked to the organizational unit (OU) that contains Server1. Thefollowing graphic shows the configured settings in GPO1.

  • Server1 contains a folder named Folder1. Folder1 is shared as Share1.

    You attempt to configure access-denied assistance on Server1, but the Enable access-denied assistanceoption cannot be selected from File Server Resource Manager.

    You need to ensure that you can configure access-denied assistance on Server1 manually by using File ServerResource Manager.

    Which two actions should you perform?

    A. Set the Enable access-denied assistance on client for all file types policy setting to Disabled for GPO1.B. Set the Customize message for Access Denied errors policy setting to Not Configured for GPO1.C. Set the Enable access-denied assistance on client for all file types policy setting to Enabled for GPO1.D. Set the Customize message for Access Denied errors policy setting to Enabled for GPO1.

    Correct Answer: CDSection: (none)Explanation

    Explanation/Reference:

  • http://technet.microsoft.com/en-us/library/hh831402.aspx

    QUESTION 22* You have a server named Server1 that runs Windows Server 2012. Server1 has the File Server ResourceManager role service installed.

    You are creating a file management task as shown in the exhibit. (Click the Exhibit button.)

    You need to ensure that the Include all folders that store the following kinds of data list displays an entry namedCorporate Data.

    What should you do?

    Exhibit:

  • A. Modify the properties of the System Files file group.B. Create a new classification property.C. Create a new file group.D. Modify the Folder Usage classification property.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:In Windows Server 2008 R2 Microsoft has added some new automating features to file classification. The FileClassification Infrastructure makes it possible to automatically assign classification information to files on fileservers and apply policy to them based on that information.Classifying data can help make data more accessible (or less accessible) to the users in your environment whoneed it.

  • http://technet.microsoft.com/en-us/library/dd464014%28WS.10%29.aspx

    QUESTION 23* You have 3 server named LON-DC1 that runs Windows Server 2012.

    An iSCSI virtual disk named VirtualiSCSIl.vhd exists on LON-DC1 as shown in the exhibit.

    You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt iSCSI target.

    VirtualiSCSIl.vhd is removed from LON-DC1.

    You need to assign VirtualiSCSI2.vhd a logical unit value of 0.

    What should you do?

    Exhibit:

  • A. Modify the properties of the VirtualiSCSI2.vhd iSCSI virtual disk.B. Run the Add-IscsiVirtualDiskTargetMapping cmdlet and specify the -Lun parameter.C. Run the iscsicli command and specify the reportluns parameter.D. Run the iscsicpl command and specify the virtualdisklun parameter.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Add-IscsiVirtualDiskTargetMapping - Assigns a virtual disk to an iSCSI target.

  • http://technet.microsoft.com/en-us/library/jj612800(v=wps.620).aspx

    QUESTION 24* You have a server named Server1 that runs Windows Server 2012. The storage on Server1 is configured asshown in the following table.

    You plan to implement Data Deduplication on Server1.

    You need to identify on which drives you can enable Data Deduplication.

    Which three drives should you identify? (Each correct answer presents part of the solution. Choose two.)

    A. CB. DC. ED. FE. G

    Correct Answer: BDESection: (none)Explanation

    Explana