70-412 Windows 2012

Card Set Information

Author:
h100rr
ID:
299248
Filename:
70-412 Windows 2012
Updated:
2015-03-26 14:23:19
Tags:
70412
Folders:

Description:
70-412
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user h100rr on FreezingBlue Flashcards. What would you like to do?


  1. add-dhcpsever4failover
    adds a new IPv4 failover relationship on the DHCP server services

    *** add-dhcpserver4failover -partnerserver2 -scopeid 10.0.0.0
  2. add-dhcpServerinDC
    adds the computer running the DHCP server service to the list of authorized DHCP server services in AD
  3. Single-label name resolution rather than using suffix search
    • Add-dsnprimaryzone
    • add-dnsserverrosourcerecord cname
    • set-dnsserverglobalnamezone
  4. zone transfers
    • Definition of a Zone Transfer: A Zone Transfer is the term used to refer to the process by which the contents of a DNS Zone file are copied from a primary DNS server to a secondary DNS server.
    • A Zone transfer will occur during any of the following scenarios:
    • When starting the DNS Service on the secondary DNS server.
    • When the refresh time expires.
    • When changes are saved to the Primary Zone file and there is a Notify List.
    • Zone Transfers are always initiated by the secondary DNS server. The primary DNS server simply answers the request for a Zone Transfer.
  5. Outside Forest access
    • Create a one-way forest trust
    • Modify the permission on the server1 object
    • configure selective authentication on the trust
  6. DNSCEC
    increase security by authenticating the origin of DNS data.
  7. Dynamic Access Control
    enables administrators to apply access-control permissions and restrictions based on well-defined rules that can include the sensitivity of the resources, the job or role of the user, and the configuration of the device that is used to access these resources.

    For example, a user might have different permissions when they access a resource from their office computer versus when they are using a portable computer over a virtual private network. Or access may be allowed only if a device meets the security requirements that are defined by the network administrators. When Dynamic Access Control is used, a user’s permissions change dynamically without additional administrator intervention if the user’s job or role changes (resulting in changes to the user’s account attributes in AD DS).
  8. Dynamic Access Control
    • Central Access Polices
    • Central Access Rules
    • Claim Types
    • Resource Properties
    • Resource Property Lists
  9. Manual Failover
    • Shutdown all of the virtual machines in Cluster1
    • mask the shared storage to prevent the storage from being accessed by cluster1
    • Unmask the shared storage to present the storage to cluster 2
    • from failover cluster manager in cluster2, run the migrate a cluster wizard
    • start the vitual machines in cluster2
  10. Third party certificate
    • install a certificate obtained from a trusted third-party CA
    • install and configure active directory federation
    • services (AD FS)
    • Enable the device registration service
    • install and configure a web application proxy
  11. IPAM Manual provisioning method can not be changed
    uninstall-windows feature -Name -IPAM
  12. Add-addsreadonlydomaincontrolleraccount
    creates a read-only domain controller RODC account that can be used to install an RODC in AD.
  13. certreq-setreg
    ensure that server1 can issue an Online Certificate Status Protocol
  14. Prevent users from encrypting new content in AD RMS
    • from the Active directory rights management services console, create a user exclusion policy
    • from the active directory rights management services console, modify the rights policy templates
  15. Deploy a certification authority
    • install-adcscertificationauthority
    • install-adcswebenrollment

What would you like to do?

Home > Flashcards > Print Preview