70-412 Premium Bundle

70-412 Premium Bundle

Configuring Advanced Windows Server 2012 Services Certification Exam

4.5 
(27495 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-412 Free Practice Questions

Q1. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. Cluster1 hosts 10 virtual machines. All of the virtual machines run Windows Server 2012 R2 and are members of the domain. 

You need to ensure that the first time a service named Service1 fails on a virtual machine, the virtual machine is moved to a different node. 

You configure Service1 to be monitored from Failover Cluster Manager. 

What should you configure on the virtual machine? 

A. From the Recovery settings of Service1, set the First failure recovery action to Take No Action. 

B. From the General settings, modify the Startup type. 

C. From the Recovery settings of Service1, set the First failure recovery action to Restart the Service. 

D. From the General settings, modify the Service status. 

Answer:

Explanation: 

When a monitored service fails the Recovery features of the service will take action. 

Example: 

Service Recovery 

In this case for the first failure the service will be restarted by the Service Control Manager inside the guest operating system, if the service fails for a second time the service will again be restarted via guest operating system. In case of a third failure the Service Control Manager will take no action and the Cluster service running on the Hyper-V host will take over recovery actions. 

Reference: How to configure VM Monitoring in Windows Server 2012 

Q2. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. 

You need to configure Server1 to resolve queries for single-label DNS names. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Run the Set-DNSServerGlobalNameZone cmdlet. 

B. Modify the DNS suffix search list setting. 

C. Modify the Primary DNS Suffix Devolution setting. 

D. Create a zone named “.”. 

E. Create a zone named GlobalNames. 

F. Run the Set-DNSServerRootHint cmdlet. 

Answer: A,E 

Explanation: 

Deploying a GlobalNames zone 

The specific steps for deploying a GlobalNames zone can vary somewhat, depending on 

the AD DS topology of your network. 

Step 1: Create the GlobalNames zone (E) 

Step 2: Enable GlobalNames zone support (A) 

The Set-DnsServerGlobalNameZone cmdlet enables or disables single-label Domain 

Name System (DNS) queries. It also changes configuration settings for a GlobalNames 

zone. 

Etc. 

Reference: Deploying a GlobalNames Zone; Set-DnsServerGlobalNameZone 

http://technet.microsoft.com/en-us/library/cc731744.aspx 

http://technet.microsoft.com/en-us/library/jj649907(v=wps.620).aspx 

Q3. Your company has two offices. The offices are located in Seattle and Montreal. 

The network contains an Active Directory domain named contoso.com. The domain contains two DHCP servers named Server1 and Server2. Server1 is located in the Seattle office. Server2 is located in the Montreal office. All servers run Windows Server 2012 R2. 

You need to create a DHCP scope for video conferencing in the Montreal office. The scope must be configured as shown in the following table. 

Which Windows PowerShell cmdlet should you run? 

A. Add-DhcpServerv4SuperScope 

B. Add-DhcpServerv4MulticastScope 

C. Add-DHCPServerv4Policy 

D. Add-DchpServerv4Scope 

Answer:

Explanation: 

The Add-DhcpServerv4MulticastScope cmdlet adds a multicast scope on the Dynamic Host Configuration Protocol (DHCP) server. 

Note: IPv4 multicast addresses are defined by the leading address bits of 1110, originating from the classful network design of the early Internet when this group of addresses was designated as Class D. The Classless Inter-Domain Routing (CIDR) prefix of this group is 224.0.0.0/4. The group includes the addresses from 224.0.0.0 to 239.255.255.255. 

Reference: Add-DhcpServerv4MulticastScope 

Q4. You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard. You discover that the new virtual disk has a write-back cache of 1 GB. 

You need to ensure that the virtual disk has a write-back cache of 5 GB. 

What should you do? 

A. Detach the virtual disk, and then run the Resize-VirtualDisk cmdlet. 

B. Detach the virtual disk, and then run the Set-VirtualDisk cmdlet. 

C. Delete the virtual disk, and then run the New-StorageSubSystemVirtualDisk cmdlet. 

D. Delete the virtual disk, and then run the New-VirtualDisk cmdlet. 

Answer:

Explanation: 

So what about changing the cache size? Well, you can't modify the cache size, but you can specify it at the time that you create a new virtual hard disk. In order to do so, you have to use Windows PowerShell. 

New-VirtualDisk –StoragePoolFriendlyName "<storage pool name>" –FriendlyName "<v 

Reference: Using Windows Server 2012's SSD Write-Back Cache 

Q5. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured to support key archival and recovery. 

You create a new Active Directory group named Group1. 

You need to ensure that the members of Group1 can request a Key Recovery Agent certificate. 

The solution must minimize the permissions assigned to Group1. 

Which two permissions should you assign to Group1? (Each correct answer presents part of the solution. Choose two.) 

A. Read 

B. Auto enroll 

C. Write 

D. Enroll 

E. Full control 

Answer: A,D 

Explanation: 

See step 6 below. To configure the Key Recovery Agent certificate template Open the Certificate Templates snap-in. In the console tree, right-click the Key Recovery Agent certificate template. Click Duplicate Template. In Template, type a new template display name, and then modify any other optional properties as needed. On the Security tab, click Add, type the name of the users you want to issue the key recovery agent certificates to, and then click OK. Under Group or user names, select the user names that you just added. Under Permissions, select the Read and Enroll check boxes, and then click OK. 

Reference: Identify a Key Recovery Agent 

Q6. Your company has a main office and a branch office. 

The main office contains a file server named Server1. Server1 has the BranchCache for 

Network Files role service installed. The branch office contains a server named Server2. 

Server2 is configured as a BranchCache hosted cache server. 

You need to preload the data from the file shares on Server1 to the cache on Server2. 

What should you run first? 

A. Publish-BCFileContent 

B. Add- BCDataCacheExtension 

C. Set-BCCache 

D. Export-BCCachePackage 

Answer:

Explanation: 

See step 2 below. 

To prehash content and preload the content on hosted cache servers . Log on to the file or Web server that contains the data that you wish to preload, and identify the folders and files that you wish to load on one or more remote hosted cache servers. . Run Windows PowerShell as an Administrator. For each folder and file, run either the Publish-BCFileContent command or the Publish-BCWebContent command, depending on the type of content server, to trigger hash generation and to add data to a data package. . After all the data has been added to the data package, export it by using the Export-BCCachePackage command to produce a data package file. . Move the data package file to the remote hosted cache servers by using your choice of file transfer technology. FTP, SMB, HTTP, DVD and portable hard disks are all viable transports. . Import the data package file on the remote hosted cache servers by using the Import-BCCachePackage command. 

Reference: Prehashing and Preloading Content on Hosted Cache Servers (Optional) 

Q7. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. All client 

computers run Windows 8 Enterprise. 

You have a remote site that only contains client computers. All of the client computer 

accounts are located in an organizational unit (OU) named Remote1. A Group Policy object 

(GPO) named GPO1 is linked to the Remote1 OU. 

You need to configure BranchCache for the remote site. 

Which two settings should you configure in GPO1? 

To answer, select the two appropriate settings in the answer area. 

Answer:  

Q8. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012. 

Server1 and Server2 have the Hyper-V server role and the Failover Clustering feature installed. 

Server1 and Server2 are members of a cluster named Cluster1. Cluster1 hosts 10 virtual machines. 

When you try to migrate a running virtual machine from one server to another, you receive the following error message: "There was an error checking for virtual machine compatibility on the target node." 

You need to ensure that the virtual machines can be migrated from one node to another. 

From which node should you perform the configuration? 

To answer, select the appropriate node in the answer area. 

Answer:  

Q9. Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers. The domain controllers are configured as shown in the following table. 

You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in both domains. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Raise the domain functional level of contoso.com. 

B. Raise the domain functional level ofchildl.contoso.com. 

C. Raise the forest functional level of contoso.com. 

D. Upgrade DC11 to Windows Server 2012 R2. 

E. Upgrade DC1 to Windows Server 2012 R2. 

Answer: A,E 

Explanation: 

The root domain in the forest must be at Windows Server 2012 level. First upgrade DC1 to this level (E), then raise the contoso.com domain functional level to Windows Server 2012 (A). 

* (E) To support resources that use claims-based access control, the principal’s domains 

will need to be running one of the following: 

/ All Windows Server 2012 domain controllers. 

/ Sufficient Windows Server 2012 domain controllers to handle all the Windows 8 device 

authentication requests. 

/ Sufficient Windows Server 2012 domain controllers to handle all the Windows Server 

2012 resource protocol transition requests to support non-Windows 8 devices. 

Reference: What's New in Kerberos Authentication 

http://technet.microsoft.com/en-us/library/hh831747.aspx. 

Q10. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

Cluster1 hosts an Application named App1. 

You need to ensure that Server2 handles all of the client requests to the cluster for App1. The solution must ensure that if Server2 fails, Server1 becomes the active node for App1. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. the Scale-Out File Server 

Answer:

Explanation: 

The preferred owner in a two-server cluster will always be the active node unless it is down. 

Reference: Preferred Owners in a Cluster 

http://blogs.msdn.com/b/clustering/archive/2008/10/14/9000092.aspx 

Q11. Your company has offices in Montreal, New York, and Amsterdam. 

The network contains an Active Directory forest named contoso.com. An Active Directory site exists for each office. All of the sites connect to each other by using the DEFAULTIPSITELINK site link. 

You need to ensure that only between 20:00 and 08:00, the domain controllers in the Montreal office replicate the Active Directory changes to the domain controllers in the Amsterdam office. 

The solution must ensure that the domain controllers in the Montreal and the New York offices can replicate the Active Directory changes any time of day. 

What should you do? 

A. Create a new site link that contains Montreal and Amsterdam. Remove Amsterdam from DEFAULTIPSITE1INK. Modify the schedule of DEFAULTIPSITELINK. 

B. Create a new site link that contains Montreal and Amsterdam. Create a new site link bridge. Modify the schedule of DEFAULTIPSITELINK. 

C. Create a new site link that contains Montreal and Amsterdam. Remove Amsterdam from DEFAULTIPSITELINK. Modify the schedule of the new site link. 

D. Create a new site link that contains Montreal and Amsterdam. Create a new site link bridge. Modify the schedule of the new site link. 

Answer:

Explanation: 

We create a new site link between Montreal and Amsterdam and schedule it only between 

20:00 and 08:00. To ensure that traffic between Montreal and Amsterdam only occurs at this time we also remove Amsterdam from the DEFAULTIPSITELINK. 

Reference: How Active Directory Replication Topology Works 

http://technet.microsoft.com/en-us/library/cc755994(v=ws.10).aspx 

Q12. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1 that runs a Server Core Installation of Windows Server 2012 R2. 

File1 has a volume named D that contains home folders. File1 creates a shadow copy of volume D twice a day. 

You discover that volume D is almost full. 

You add a new volume named H to File1. 

You need to ensure that the shadow copies of volume D are stored on volume H. 

Which command should you run? 

A. The Set-Volume cmdlet with the -driveletter parameter 

B. The vssadmin.exe create shadow command 

C. The Set-Volume cmdlet with the -path parameter 

D. The vssadmin.exe add shadowstorage command 

Answer:

Explanation: 

Add ShadowStorage 

Adds a shadow copy storage association for a specified volume. 

Incorrect: 

Not A. Sets or changes the file system label of an existing volume. -DriveLetter Specifies a 

letter used to identify a drive or volume in the system. 

Not B. Create Shadow 

Creates a new shadow copy of a specified volume. 

Not C. Sets or changes the file system label of an existing volume -Path Contains valid 

path information. 

Reference: Vssadmin; Set-Volume 

http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx 

http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx 

Q13. DRAG DROP 

Your network contains an Active Directory domain named adatum.com. The domain contains three servers. The servers are configured as shown in the following table. 

Server1 is configured as shown in the exhibit. (Click the Exhibit button.) 

Template1 contains custom cryptography settings that are required by the corporate security team. 

On Server2, an administrator successfully installs a certificate based on Template1. 

The administrator reports that Template1 is not listed in the Certificate Enrollment wizard on Server3, even after selecting the Show all templates check box. 

You need to ensure that you can install a server authentication certificate on Server3. The certificate must comply with the cryptography requirements. 

Which three actions should you perform in sequence? 

To answer, move the appropriate three actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer:  

Q14. You have a server named Server1 that runs Windows Server 2012 R2. 

Server1 fails. 

You identify that the master boot record (MBR) is corrupt. 

You need to repair the MBR. 

Which tool should you use? 

A. Bcdedit 

B. Bcdboot 

C. Bootrec 

D. Fixmbr 

Answer:

Explanation: 

Repairing an unbootable Windows installation with bootrec.exe If the boot/recovery partition is corrupted or lost, you can modify your Windows OS partition to boot. 

. Boot from your Windows Vista/7/Server2008/R2/2012 media and choose the 

"Repair Windows" option. . Open the command prompt. . Using diskpart, mark your Windows partition as bootable. . If your windows partition does not have it, copy the "boot" folder from the 

installation media. 

. Run the following commands: >c: >cd boot >attrib bcd -s -h -r >ren c:\boot\bcd bcd.old >bootrec /RebuildBcd Reboot and Windows should boot normally. If not, return to the command prompt and run: >bootrec /FixMBR >bootrec /FixBoot 

Incorrect: Not A. BCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows Not B. The BCDboot tool is a command-line tool that enables you to manage system partition files Not D. Fixmbr is not a tool. Fixmbr is an option when using the bootrec tool. 

Reference: Windows BCD Store 

http://www.itsgotme.com/wiki/Windows_BCD 

Q15. Your network contains one Active Directory forest named contoso.com. The forest contains two child domains and six domain controllers. The domain controllers are configured as shown in the following table. 

For the contoso.com domain, a company policy states that administrators must be able to retrieve a list of all the users who have not logged on to the network in the last seven days from any domain controller. 

You need to ensure that the users’ last logon information from the last seven days is replicated to all of the domain controllers. 

What should you use? 

A. Set-ADSite 

B. Set-ADReplicationSite 

C. Set-ADDomain 

D. Set-ADReplicationSiteLink 

E. Set-ADGroup 

F. Set-ADForest 

G. Netdom 

Answer:

Reference: Technet, Set-ADDomain 

https://technet.microsoft.com/en-us/library/ee617212.aspx 

Q16. Your network contains 20 iSCSI storage appliances that will provide storage for 50 Hyper-V hosts running Windows Server 2012 R2. 

You need to configure the storage for the Hyper-V hosts. The solution must minimize administrative effort. 

What should you do first? 

A. Install the iSCSI Target Server role service and configure iSCSI targets. 

B. Install the iSNS Server service feature and create a Discovery Domain. 

C. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties. 

D. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties. 

Answer:

Explanation: 

Windows Server 2012 includes an iSCSI Target role that, along with Failover Clustering, 

allows it to become a cost-effective and highly-available iSCSI Storage Array. We can connect from our Hyper-V host to the iSCSI target on the storage array with the following PowerShell command line: 

New-IscsiTargetPortal –TargetPortalAddress <IP_Address or FQDN of storage array> 

$target = Get-IscsiTarget 

Connect-IscsiTarget –NodeAddress $target.NodeAddress 

Incorrect: 

Not B. Discovery Domains in an iSCSI fabric, like zones in a Fibre Channel fabric, enable you to partition the storage resources in your storage area network (SAN). By creating and managing Discovery Domains, you can control the iSCSI targets that each iSCSI initiator can see and log on to. 

Reference: Configure iSCSI Target Server Role on Windows Server 2012 

START 70-412 EXAM