70-412 Premium Bundle

70-412 Premium Bundle

Configuring Advanced Windows Server 2012 Services Certification Exam

4.5 
(28095 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 70-412 Free Practice Questions

Q1. Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. The functional level of the forest is Windows Server 2003. 

You have a domain outside the forest named adatum.com. 

You need to configure an access solution to meet the following requirements: 

* Users in adatum.com must be able to access resources in contoso.com. 

* Users in adatum.com must be prevented from accessing resources in fabrikam.com. 

* Users in both contoso.com and fabrikam.com must be prevented from accessing resources in adatum.com. 

What should you create? 

A. a one-way realm trust from contoso.com to adatum.com 

B. a one-way realm trust from adatum.com to contoso.com 

C. a one-way external trust from contoso.com to adatum.com 

D. a one-way external trust from adatum.com to contoso.com 

Answer:

Explanation: 

The contoso domain must trust the adatum domain. 

Note: In a One-way: incoming trust, users in your (trusted) domain can be authenticated in 

the other (trusting) domain. Users in the other domain cannot be authenticated in your 

domain. 

Incorrect: 

Not A, not B. Use realm trusts to form a trust relationship between a non-Windows 

Kerberos realm and a Windows Server domain. 

Not D. The resources that are to be shared are in the contoso domain. 

Reference: Trust types 

Q2. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest contains three Active Directory sites named SiteA, SiteB, and SiteC. The sites contain four domain controllers. The domain controllers are configured as shown in the following table. 

An IP site link exits between each site. 

You discover that the users in SiteC are authenticated by the domain controllers in SiteA and SiteB. 

You need to ensure that the SiteC users are authenticated by the domain controllers in SiteB, unless all of the domain controllers in SiteB are unavailable. 

What should you do? 

A. Create an SMTP site link between SiteB and SiteC. 

B. Crate additional connection objects for DC1 and DC2. 

C. Decrease the cost of the site link between SiteB and SiteC. 

D. Create additional connection objects for DC3 and DC4. 

Answer:

Explanation: 

By decreasing the site link cost between SiteB and SiteC the SiteC users would be authenticated by SiteB rather than by SiteA. 

Q3. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two Active Directory sites named Site1 and Site2. 

You discover that when the account of a user in Site1 is locked out, the user can still log on to the servers in Site2 for up to 15 minutes by using Remote Desktop Services (RDS). 

You need to reduce the amount of time it takes to synchronize account lockout information across the domain. 

Which attribute should you modify? 

To answer, select the appropriate attribute in the answer area. 

Answer:  

Q4. Your network contains an Active Directory forest named contoso.com. 

Users frequently access the website of an external partner company. The URL of the website is http://partners.adatum.com. 

The partner company informs you that it will perform maintenance on its Web server and that the IP addresses of the Web server will change. 

After the change is complete, the users on your internal network report that they fail to access the website. However, some users who work from home report that they can access the website. 

You need to ensure that your DNS servers can resolve partners.adatum.com to the correct IP address immediately. 

What should you do? 

A. Run Set-DnsServerScavenging. 

B. Run ipconfig and specify the FlushDns parameter. 

C. RunSet-DnsServerResourceReeordAging. 

D. Run dnscmd and specify the ClearCache parameter. 

Answer:

Explanation: 

Clear the DNS cache on the DNS server with either Dnscmd /ClearCache (from command prompt) or Clear-DnsServerCache (from Windows PowerShell). 

Reference: Technet, Dnscmd 

Q5. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the Hyper-V server role installed. 

You plan to replicate virtual machines between Server1 and Server2. The replication will be encrypted by using Secure Sockets Layer (SSL). 

You need to request a certificate on Server1 to ensure that the virtual machine replication is encrypted. 

Which two intended purposes should the certificate for Server1 contain? (Each correct answer presents part of the solution. Choose two.) 

A. Client Authentication 

B. Kernel Mode Code Signing 

C. Server Authentication 

D. IP Security end system 

E. KDC Authentication 

Answer: A,C 

Explanation: 

You need to use certificate-based authentication if you want transmitted data to be encrypted. 

Replica Server Certificate Requirements 

To enable a server to receive replication traffic, the certificate in the replica server must meet the following conditions 

* Enhanced Key Usage must support both Client and Server authentication 

Etc. 

Reference: Hyper-V Replica - Prerequisites for certificate based deployments 

http://blogs.technet.com/b/virtualization/archive/2012/03/13/hyper-v-replica-certificate-requirements.aspx 

Q6. Your network contains an Active Directory forest named adatum.com. All servers run Windows Server 2012 R2. The domain contains four servers. The servers are configured as shown in the following table. 

You need to deploy IP Address Management (IPAM) to manage DNS and DHCP. 

On which server should you install IPAM? 

A. Server1 

B. Server2 

C. Server3 

D. Server4 

Answer:

Explanation: 

An IPAM server is intended as a single-purpose server. It is not recommended to collocate 

other network infrastructure roles such as DNS or DHCP on the same server. IPAM installation is not supported on a domain controller, and discovery of DHCP servers will be disabled if you install IPAM on a server that is also running the DHCP Server service. The following features and tools are automatically installed when you install IPAM Server. 

Reference: IPAM Deployment Planning 

Q7. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Federation Services (AD FS) server role installed. 

Adatum.com is a partner organization. 

You are helping the administrator of adatum.com set up a federated trust between adatum.com and contoso.com. The administrator of adatum.com asks you to provide a file containing the federation metadata of contoso.com. 

You need to identify the location of the federation metadata file. Which node in the AD FS 

console should you select? 

To answer, select the appropriate node in the answer area. 

Answer:  

Q8. Your network contains an Active Directory domain named contoso.com. The network contains a file server named Server1 that runs Windows Server 2012 R2. 

You are configuring a central access policy for temporary employees. 

You enable the Department resource property and assign the property a suggested value of Temp. 

You need to configure a target resource condition for the central access rule that is scoped to resources assigned to Temp only. 

Which condition should you use? 

A. (Temp.Resource Equals "Department") 

B. (Resource.Temp Equals "Department") 

C. (Resource.Department Equals "Temp") 

D. (Department.Value Equals "Temp") 

Answer:

Explanation: 

Example: 

Targeting: Resource.Department Contains Finance 

Access rule: Allow read User.Country=Resource.Country AND User.department = 

Resource.Department 

Reference: Deploy a Central Access Policy (Demonstration Steps) 

Q9. Your network contains two Active Directory forests named contoso.com and adatum.com. 

Contoso.com contains one domain. Adatum.com contains a child domain named child.adatum.com. 

Contoso.com has a one-way forest trust to adatum.com. Selective authentication is enabled on the forest trust. 

Several user accounts are migrated from child.adatum.com to adatum.com. 

Users report that after the migration, they fail to access resources in contoso.com. The users successfully accessed the resources in contoso.com before the accounts were migrated. 

You need to ensure that the migrated users can access the resources in contoso.com. 

What should you do? 

A. Replace the existing forest trust with an external trust. 

B. Run netdom and specify the /quarantine attribute. 

C. Disable SID filtering on the existing forest trust. 

D. Disable selective authentication on the existing forest trust. 

Answer:

Explanation: 

Security Considerations for Trusts Need to gain access to the resources in contoso.com 

Disabling SID Filter Quarantining on External Trusts Although it reduces the security of your forest (and is therefore not recommended), you can disable SID filter quarantining for an external trust by using the Netdom.exe tool. You should consider disabling SID filter quarantining only in the following situations: 

* Users have been migrated to the trusted domain with their SID histories preserved, and 

you want to grant them access to resources in the trusting domain based on the SID history 

attribute. 

Etc. 

Incorrect: 

Not B. Enables administrators to manage Active Directory domains and trust relationships 

from the command prompt, /quarantine Sets or clears the domain quarantine. 

Not D. Selective authentication over a forest trust restricts access to only those users in a 

trusted forest who have been explicitly given authentication permissions to computer 

objects (resource computers) that reside in the trusting forest. 

Reference: Security Considerations for Trusts 

http://technet.microsoft.com/en-us/library/cc755321(v=ws.10).aspx 

Q10. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

An administrator installs the IP Address Management (IPAM) Server feature on a server named Server2. The administrator configures IPAM by using Group Policy based provisioning and starts server discovery. 

You plan to create Group Policies for IPAM provisioning. 

You need to identify which Group Policy object (GPO) name prefix must be used for IPAM Group Policies. 

What should you do on Server2? 

A. From Server Manager, review the IPAM overview. 

B. Run the ipamgc.exe tool. 

C. From Task Scheduler, review the IPAM tasks. 

D. Run the Get-IpamConfiguration cmdlet. 

Answer:

Explanation: 

Example: 

http://i.imgur.com/YcHLXhr.jpg 

Q11. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. The servers have the Hyper-V server role installed. 

A certification authority (CA) is available on the network. 

A virtual machine named vml.contoso.com is replicated from Server1 to Server2. A virtual 

machine named vm2.contoso.com is replicated from Server2 to Server1. 

You need to configure Hyper-V to encrypt the replication of the virtual machines. 

Which common name should you use for the certificates on each server? 

To answer, configure the appropriate common name for the certificate on each server in 

the answer area. 

Answer:  

Q12. Your network contains two DNS servers named DNS1 and DNS2 that run Windows Server 2012 R2. 

DNS1 has a primary zone named contoso.com. DNS2 has a secondary copy of the contoso.com zone. 

You need to log the zone transfer packets sent between DNS1 and DNS2. 

What should you configure? 

A. Monitoring from DNS Manager 

B. Logging from Windows Firewall with Advanced Security 

C. A Data Collector Set (DCS) from Performance Monitor 

D. Debug logging from DNS Manager 

Answer:

Explanation: 

Debug logging allows you to log the packets sent and received by a DNS server. Debug logging is disabled by default, and because it is resource intensive, you should only activate it temporarily when you need more specific detailed information about server performance. 

Reference: Active Directory 2008: DNS Debug Logging Facts. 

Q13. You have a server named Server1 that runs Windows Server 2012 R2. 

You modify the properties of a system driver and you restart Server1. 

You discover that Server1 continuously restarts without starting Windows Server 2012 R2. 

You need to start Windows Server 2012 R2 on Server1 in the least amount of time. The 

solution must minimize the amount of data loss. 

Which Advanced Boot Option should you select? 

A. Repair Your Computer 

B. Last Known Good Configuration (advanced) 

C. Disable Driver Signature Enforcement 

D. Disable automatic restart on system failure 

Answer:

Explanation: 

Try using Last Known Good Configuration if you can't start Windows, but it started correctly the last time you turned on the computer. 

Reference: Using Last Known Good Configuration 

Q14. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. 

You need to deploy a certification authority (CA) to Server1. The CA must support the auto-enrollment of certificates. 

Which two cmdlets should you run? (Each correct answer presents part of the solution. 

Choose two.) 

A. Add-CAAuthoritylnformationAccess 

B. Install-AdcsCertificationAuthority 

C. Add-WindowsFeature 

D. Install-AdcsOnlineResponder 

E. Install-AdcsWebEnrollment 

Answer: B,E 

Explanation: 

Explanation 

B. The Install-AdcsCertificationAuthority cmdlet performs installation and configuration of 

the AD CS CA role service. It can be used to install a root CA. 

Example: 

Install-AdcsCertificationAuthority –CAType StandaloneRootCA –CACommonName 

"ContosoRootCA" –KeyLength 2048 –HashAlgorithm SHA1 –CryptoProviderName 

"RSA#Microsoft Software Key Storage Provider" 

E: The Install-AdcsWebEnrollment cmdlet performs initial installation and configuration of 

the Certification Authority Web Enrollment role service. 

Note: Prior to the availability of Certificate Enrollment Web Services, AD CS required that client computers configured for certificate auto-enrollment be connected directly to the corporate network. Certificate Enrollment Web Services allows organizations to enable AD CS using a perimeter network. This allows users and computers outside the corporate network to enroll for certificates. 

Certificate Enrollment web service 

Reference: Deploying AD CS Using Windows PowerShell 

Q15. Your network contains an Active Directory domain named adatum.com. The domain contains a server named CA1 that runs Windows Server 2012 R2. CA1 has the Active Directory Certificate Services server role installed and is configured to support key archival and recovery. 

You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory Certificate Services (AD CS) database. The solution must prevent User1 from retrieving the private keys from the AD CS database. 

What should you do? 

A. Assign User1 the Issue and Manage Certificates permission to CA1. 

B. Assign User1 the Read permission and the Write permission to all certificate templates. 

C. Provide User1 with access to a Key Recovery Agent certificate and a private key. 

D. Assign User1 the Manage CA permission to CA1. 

Answer:

Explanation: 

Understanding the Key Recovery Agent Role KRAs are Information Technology (IT) administrators who can decrypt users’ archived private keys. An organization can assign KRAs by issuing KRA certificates to designated administrators and configure them on the CA. The KRA role is not one of the default roles defined by the Common Criteria specifications but a virtual role that can provide separation between Certificate Managers and the KRAs. This allows the separation between the Certificate Manager, who can retrieve the encrypted key from the CA database but not decrypt it, and the KRA, who can decrypt private keys but not retrieve them from the CA database. 

Reference: Understanding User Key Recovery 

Q16. DRAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server3. The network contains a standalone server named Server2. 

All servers run Windows Server 2012 R2. The servers are configured as shown in the following table. 

Server3 hosts an application named App1. App1 is accessible internally by using the URL https://app1.contoso.com. App1 only supports Integrated Windows authentication. 

You need to ensure that all users from the Internet are pre-authenticated before they can access App1. 

What should you do? 

To answer, drag the appropriate servers to the correct actions. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

START 70-412 EXAM