70-412 Premium Bundle

70-412 Premium Bundle

Configuring Advanced Windows Server 2012 Services Certification Exam

4.5 
(21615 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-412 Free Practice Questions

Q1. Your network contains an Active Directory domain named adatum.com. The domain contains two sites named Site1 and Site2 and two domain controllers named DC1 and DC2. DC1 is located in Site1 and DC2 is located in Site2. 

You install an additional domain controller named DC3 in Site1 and you ship DC3 to Site2. 

A technician connects DC3 to Site2. 

You discover that users in Site2 are authenticated only by DC2. 

You need to ensure that the users in Site2 are authenticated by both DC2 and DC3. 

What should you do? 

A. In Active Directory Users and Computers, configure the msDS-PrimaryComputer attribute for DC3. 

B. In Active Directory Users and Computers, configure the msDS-Site-Affinity attribute for DC3. 

C. From Active Directory Sites and Services, move DC3. 

D. From Active Directory Sites and Services, modify the site link between Site1 and Site2. 

Answer:

Explanation: 

DC3 needs to be moved to Site2 in AD DS 

Reference: Move a domain controller between sites 

http://technet.microsoft.com/en-us/library/cc759326(v=ws.10).aspx 

Q2. You have a server named SCI that runs a Server Core Installation of Windows Server 2012 R2. Shadow copies are enabled on all volumes. 

You need to delete a specific shadow copy. The solution must minimize server downtime. 

Which tool should you use? 

A. Shadow 

B. Diskshadow 

C. Wbadmin 

D. Diskpart 

Answer:

Explanation: 

DiskShadow.exe is a tool that exposes the functionality offered by the Volume Shadow 

Copy Service (VSS). 

The diskshadow command delete shadows deletes shadow copies. 

Reference: Technet, Diskshadow 

Q3. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are configured as shown in the following table. 

You need to ensure that when new targets are added to Server1, the targets are registered on Server2 automatically. 

What should you do on Server1? 

A. Configure the Discovery settings of the iSCSI initiator. 

B. Configure the security settings of the iSCSI target. 

C. Run the Set-WmiInstance cmdlet. 

D. Run the Set-IscsiServerTarget cmdlet. 

Answer:

Explanation: 

Explanation/Reference: 

Manage iSNS server registration 

The iSNS server registration can be done using the following cmdlets, which manages the 

WMI objects. 

To add an iSNS server: 

Set-WmiInstance -Namespace root\wmi -Class WT_iSNSServer –Arguments 

@{ServerName="ISNSservername"} 

Note: The Set-WmiInstance cmdlet creates or updates an instance of an existing WMI 

class. The created or updated instance is written to the WMI repository. 

Reference: iSCSI Target cmdlet reference 

http://blogs.technet.com/b/filecab/archive/2012/06/08/iscsi-target-cmdlet-reference.aspx 

Q4. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the 

DHCP Server server role installed. 

DHCP is configured as shown in the exhibit. (Click the Exhibit button.) 

You discover that client computers cannot obtain IPv4 addresses from DC1. 

You need to ensure that the client computers can obtain IPv4 addresses from DC1. 

What should you do? 

A. Activate the scope. 

B. Authorize DC1. 

C. Disable the Allow filters. 

D. Disable the Deny filters. 

Answer:

Explanation: 

You have enabled the Allow list but haven't entered any MAC addresses, thus everyone is denied. Either Disable the Allow filters or start adding MAC addresses to the Allow filter. 

Note: MAC address based filtering allows specific control over which clients have access to DHCP addresses. You can create a list of computers that are allowed to obtain DHCP addresses from the server by adding the client MAC address to the list of allowed client computers. By enabling the allow list, you automatically deny access to the DHCP server addresses to any client computer not on the list. 

Reference: DHCP: If the allow list is enabled, MAC address filtering should be populated https://technet.microsoft.com/en-us/library/ee956897(v=ws.10) 

Q5. HOTSPOT 

Your company has a main office and a branch office. An Active Directory site exists for each office. 

The network contains an Active Directory forest named contoso.com. The contoso.com domain contains three member servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2. 

In the main office, you configure Server1 as a file server that uses BranchCache. 

In the branch office, you configure Server2 and Server3 as BranchCache hosted cache servers. 

You are creating a Group Policy for the branch office site. 

Which two Group Policy settings should you configure? 

To answer, select the appropriate two settings in the answer area. 

Answer:  

Q6. HOTSPOT 

Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2. 

Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains an application named App1 that is accessed by using the name appl.contoso.com. 

The NLB cluster has the port rules configured as shown in the exhibit. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. 

Answer:  

Q7. Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Rights Management Services server role installed. 

Your company works with a partner organization that does not have its own Active Directory Rights Management Services (AD RMS) implementation. 

You need to create a trust policy for the partner organization. 

The solution must meet the following requirements: 

. Grant users in the partner organization access to protected content. . Provide users in the partner organization with the ability to create protected content. 

Which type of trust policy should you create? 

A. A federated trust 

B. Windows Live ID 

C. A trusted publishing domain 

D. A trusted user domain 

Answer:

Explanation: 

In AD RMS rights can be assigned to users who have a federated trust with Active 

Directory Federation Services (AD FS). This enables an organization to share access to 

rights-protected content with another organization without having to establish a separate 

Active Directory trust or Active Directory Rights Management Services (AD RMS) 

infrastructure. 

Incorrect: 

Not C. Trusted publishing domains allow one AD RMS server to issue use licenses that 

correspond with a publishing license issued by another AD RMS server, but in this scenario 

the partner organization does not have any Active Directory. 

Not D. A trusted user domain, often referred as a TUD, is a trust between AD RMS 

clusters, but in this scenario the partner organization does not have any Active Directory. 

Reference: AD RMS and AD FS Considerations 

http://technet.microsoft.com/en-us/library/dd772651(v=WS.10).aspx 

Q8. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Hyper-V server role installed. The servers are configured as shown in the following table. 

You add a third server named Server3 to the network. Server3 has Intel processors. 

You need to move VM3 and VM6 to Server3. The solution must minimize downtime on the 

virtual machines. 

Which method should you use to move each virtual machine? 

To answer, select the appropriate method for each virtual machine in the answer area. 

Answer:  

Q9. DRAG DROP 

You have two failover clusters named Cluster1 and Cluster2. All of the nodes in both of the 

clusters run Windows Server 2012 R2. 

Cluster1 hosts two virtual machines named VM1 and VM2. 

You plan to configure VM1 and VM2 as nodes in a new failover cluster named Cluster3. 

You need to configure the witness disk for Cluster3 to be hosted on Cluster2. 

Which three actions should you perform in sequence? 

To answer, move the appropriate three actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer:  

Q10. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

You install the DHCP Server server role on both servers. 

On Server1, you have the DHCP scope configured as shown in the exhibit. (Click the Exhibit button.) 

You need to configure the scope to be load-balanced across Server1 and Server2. 

What Windows PowerShell cmdlet should you run on Server1? To answer, select the appropriate options in the answer area. 

Answer:  

Q11. HOTSPOT 

Your network contains two application servers that run Windows Server 2012 R2. The application servers have the Network Load Balancing (NLB) feature installed. 

You create an NLB cluster that contains the two servers. 

You plan to deploy an application named App1 to the nodes in the cluster. App1 uses TCP port 8080 and TCP port 8081. 

Clients will connect to App1 by using HTTP and HTTPS via a single reverse proxy. App1 does not use session state information. 

You need to configure a port rule for Appl. The solution must ensure that connections to App1 are distributed evenly between the nodes. 

Which port rule should you use? 

To answer, select the appropriate rule in the answer area. 

Answer:  

Q12. DRAG DROP 

You plan to deploy a failover cluster that will contain two nodes that run Windows Server 

2012 R2. 

You need to configure a witness disk for the failover cluster. 

How should you configure the witness disk? 

To answer, drag the appropriate configurations to the correct location or locations. Each configuration may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q13. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two Active Directory sites named Site1 and Site2. 

You need to configure the replication between the sites to occur by using change notification. 

Which attribute should you modify? 

Answer:  

Q14. You have 30 servers that run Windows Server 2012 R2. 

All of the servers are backed up daily by using Windows Azure Online Backup. 

You need to perform an immediate backup of all the servers to Windows Azure Online 

Backup. 

Which Windows PowerShell cmdlets should you run on each server? 

A. Get-OBPolicy | StartOBBackup 

B. Start-OBRegistration | StartOBBackup 

C. Get-WBPolicy | Start-WBBackup 

D. Get-WBBackupTarget | Start-WBBackup 

Answer:

Explanation: 

This example starts a backup job using a policy. 

Windows PowerShell 

PS C:\> Get-OBPolicy | Start-OBBackup 

Incorrect: 

Not B. Registers the current computer to Windows Azure Backup. 

Not C. Not using Azure 

Not D. Not using Azure 

Reference: Start-OBBackup 

http://technet.microsoft.com/en-us/library/hh770406(v=wps.620).aspx 

Q15. Your network contains an Active Directory domain named contoso.com. 

A previous administrator implemented a Proof of Concept installation of Active Directory 

Rights Management Services (AD RMS). 

After the proof of concept was complete, the Active Directory Rights Management Services 

server role was removed. 

You attempt to deploy AD RMS. 

During the configuration of AD RMS, you receive an error message indicating that an 

existing AD RMS Service Connection Point (SCP) was found. 

You need to remove the existing AD RMS SCP. 

Which tool should you use? 

A. Active Directory Users and Computers 

B. Authorization Manager 

C. Active Directory Domains and Trusts 

D. Active Directory Sites and Services 

E. Active Directory Rights Management Services 

Answer:

Explanation: 

ADRMS will registered the Service Connection Point (SCP) in Active Directory and you will need to unregister first before you remove the ADRMS server role. 

If your ADRMS server is still alive, you can easily manually remove the SCP by below: 

http://www.rickygao.com/wp-content/uploads/2013/08/080513_1308_Howtomanual1.png 

http://www.rickygao.com/wp-content/uploads/2013/08/080513_1308_Howtomanual2.png Reference: How to manually remove or reinstall ADRMS 

Q16. Your network contains one Active Directory forest named contoso.com. The forest contains two child domains and six domain controllers. The domain controllers are configured as shown in the following table. 

You need to prevent administrators from accidentally deleting any of the sites in the forest. What should you use? 

A. Set-ADSite 

B. Set-ADReplicationSite 

C. Set-ADDomain 

D. Set-ADReplicationSiteLink 

E. Set-ADGroup 

F. Set-ADForest 

G. Netdom 

Answer:

Explanation: The Set-ADReplicationSite sets the replication properties for an Active 

Directory site. 

Parameter: -ProtectedFromAccidentalDeletion<Boolean> 

Specifies whether to prevent the object from being deleted. When this property is set to 

$True, you cannot delete the corresponding object without changing the value of the 

property. The acceptable values for this parameter are: 

-- $False or 0 

-- $True or 1 

Reference: Technet, Set-ADReplicationSite 

https://technet.microsoft.com/en-us/library/hh852305(v=wps.630).aspx 

START 70-412 EXAM