70-412 Premium Bundle

70-412 Premium Bundle

Configuring Advanced Windows Server 2012 Services Certification Exam

4.5 
(28410 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 70-412 Free Practice Questions

Q1. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed. Server1 and Server2 are configured as Hyper-V replicas of each other. 

Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1. 

You need to verify whether the replica of VM5 on Server1 is functional. The solution must ensure that VM5 remains accessible to clients. 

What should you do from Hyper-V Manager? 

A. On Server1, execute a Planned Failover. 

B. On Server1, execute a Test Failover. 

C. On Server2, execute a Planned Failover. 

D. On Server2, execute a Test Failover. 

Answer:

Explanation: 

Test Failover (TFO) is an operation initiated on your replica virtual machine (in this scenario on Server1) which allows you to test the sanity of the virtualized workload without interrupting your production workload or ongoing replication. 

TFO is performed on the replica virtual machine by right-clicking on the VM and choosing the Test Failover operation (either from the Hyper-V Manager or from the Failover Clustering Manager). 

Reference: Types of failover operations in Hyper-V Replica – Part I – Test Failover. 

Q2. Your network contains three servers named HV1, HV2, and Server1 that run Windows Server 2012 R2. HV1 and HV2 have the Hyper-V server role installed. Server1 is a file server that contains 3 TB of free disk space. 

HV1 hosts a virtual machine named VM1. The virtual machine configuration file for VM1 is stored in D:\VM and the virtual hard disk file is stored in E:\VHD. 

You plan to replace drive E with a larger volume. 

You need to ensure that VM1 remains available from HV1 while drive E is being replaced. You want to achieve this goal by using the minimum amount of administrative effort. 

What should you do? 

A. Perform a live migration to HV2. 

B. Add HV1 and HV2 as nodes in a failover cluster. Perform a storage migration to HV2. 

C. Add HV1 and HV2 as nodes in a failover cluster. Perform a live migration to HV2. 

D. Perform a storage migration to Server1. 

Answer:

Explanation: 

One of the great new features coming in Windows Server 2012 is Storage Migration for Hyper-V. Storage Migration allows an administrator to relocate the source files that make up a virtual machine to another location without any downtime. 

Storage Migration creates a copy of the file or files at the new location. Once that is finished, Server 2012 does a final replication of changes and then the virtual machine uses the files in the new location. 

Reference: Windows Server 2012 Hyper-V – Part 3: Storage Migration 

Q3. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

The network has the physical sites and TCP/IP subnets configured as shown in the following table. 

You have a web application named App1 that is hosted on six separate Web servers. DNS has the host names and IP addresses registered as shown in the following table. 

You discover that when users connect to appl.contoso.com, they are connected frequently to a server that is not on their local subnet. 

You need to ensure that when the users connect to appl.contoso.com, they connect to a server on their local subnet. The connections must be distributed across the servers that host appl.contoso.com on their subnet. 

Which two settings should you configure? 

To answer, select the appropriate two settings in the answer area. 

Answer:  

Q4. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two DHCP servers named Server1 and Server2. Both servers have multiple IPv4 scopes. 

Server1 and Server2 are used to assign IP addresses for the network IDs of 172.20.0.0/16 and 131.107.0.0/16. 

You install the IP Address Management (IPAM) Server feature on a server named IPAM1 and configure IPAM1 to manage Server1 and Server2. 

Some users from the 172.20.0.0 network report that they occasionally receive an IP address conflict error message. 

You need to identify whether any scopes in the 172.20.0.0 network ID conflict with one another. 

What Windows PowerShell cmdlet should you run? 

To answer, select the appropriate options in the answer area. 

Answer:  

Q5. HOTSPOT 

You have a file server named Server1 that runs Windows Server 2012 R2. 

Server1 contains a file share that must be accessed by only a limited number of users. 

You need to ensure that if an unauthorized user attempts to access the file share, a custom access-denied message appears, which contains a link to request access to the share. The message must not appear when the unauthorized user attempts to access other shares. 

Which two nodes should you configure in File Server Resource Manager? To answer, select the appropriate two nodes in the answer area. 

Answer:  

Q6. You have a server named Server1 that runs Windows Server 2012 R2. 

You install the File and Storage Services server role on Server1. 

From Windows Explorer, you view the properties of a folder named Folder1 and you discover that the Classification tab is missing. 

You need to ensure that you can assign classifications to Folder1 from Windows Explorer manually. 

What should you do? 

A. From Folder Options, clear Hide protected operating system files (Recommended). 

B. Install the File Server Resource Manager role service. 

C. From Folder Options, select the Always show menus. 

D. Install the Share and Storage Management Tools. 

Answer:

Explanation: 

On the Classification tab of the file properties in Windows Server 2012, File Classification Infra-structure adds the ability to manually classify files. You can also classify folders so that any file added to the classified folder will inherit the classifications of the parent folder. 

Reference: What's New in File Server Resource Manager in Windows Server. 

Q7. DRAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains two DHCP servers named DHCP1 and DHCP2 that run Windows Server 2012 R2. 

You install the IP Address Management (IPAM) Server feature on a member server named Server1 and you run the Run Invoke-IpamGpoProvisioning cmdlet. 

You need to manage the DHCP servers by using IPAM on Server1. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer:  

Q8. HOTSPOT 

You run Get-ISCSIServerTarget and you receive the following output. 

Use the drop-down menus to select the answer choice that completes each statement. 

Answer:  

Q9. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed. 

The network contains an enterprise certification authority (CA). All servers are enrolled automatically for a certificate-based on the Computer certificate template. 

On Server1, you have a virtual machine named VM1. VM1 is replicated to Server2. 

You need to encrypt the replication of VM1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On Server1, modify the Hyper-V Settings. 

B. On Server2, modify the settings of VM1. 

C. On Server2, modify the Hyper-V Settings. 

D. On Server1, modify the settings of VM1. 

E. On Server1, modify the settings of the virtual switch to which VM1 is connected. 

F. On Server2, modify the settings of the virtual switch to which VM1 is connected. 

Answer: B,C 

Explanation: 

B. Each virtual machine that is to be replicated must be enabled for replication (on the replica server – Server2). 

C. To configure the Replica server (here Server2) In Hyper-V Manager, click Hyper-V Settings in the Actions pane. In the Hyper-V Settings dialog, click Replication Configuration. In the Details pane, select Enable this computer as a Replica server. In the Authentication and ports section, select the authentication method. For either authentication method, specify the port to be used (the default ports are 80 for Kerberos over HTTP and 443 for certificate-based authentication over HTTPS). If you are using certificate-based authentication, click Select Certificate and provide the request certificate information. 

Etc 

Reference: Deploy Hyper-V Replica Step 2: Enable Replication 

Q10. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

You add two additional nodes in Cluster1. 

You have a folder named Folder1 on Server1 that hosts Application data. Folder1 is a folder target in a Distributed File System (DFS) namespace. 

You need to provide highly available access to Folder1. The solution must support DFS Replication to Folder1. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

File Server for general use 

Note: You can deploy and configure a clustered file server by using either of the following methods: 

* File Server for general use. This is the continuation of the clustered file server that has been supported in Windows Server since the introduction of Failover Clustering. This type of clustered file server, and therefore all the shares associated with the clustered file server, is online on one node at a time. This is sometimes referred to as active-passive or dual-active. File shares associated with this type of clustered file server are called clustered file shares. This is the recommended file server type when deploying information worker scenarios. 

* Scale-Out File Server for application data This clustered file server feature was introduced in Windows Server 2012, and it lets you store server application data, such as Hyper-V virtual machine files, on file shares, and obtain a similar level of reliability, availability, manageability, and high performance that you would expect from a storage area network. All file shares are simultaneously online on all nodes. File shares associated with this type of clustered file server are called scale-out file shares. This is sometimes referred to as active-active. This is the recommended file server type when deploying either Hyper-V over Server Message Block (SMB) or Microsoft SQL Server over SMB. 

Reference: Scale-Out File Server for Application Data Overview 

Q11. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Guster1. Cluster1 contains a file server role named FS1 and a generic service role named SVC1. Server1 is the preferred node for FS1. Server 2 is the preferred node for SVC1. 

You plan to run a disk maintenance tool on the physical disk used by FS1. 

You need to ensure that running the disk maintenance tool does not cause a failover to occur. 

What should you do before you run the tool? 

A. Run Suspend-ClusterResource. 

B. Run Suspend-GusterNode. 

C. Run cluster.exe and specify the pause parameter. 

D. Run cluster.exe and specify the offline parameter. 

Answer:

Q12. Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2. 

The domain contains four servers. The servers are configured as shown in the following table. 

You need to deploy IP Address Management (IPAM) to manage DNS and DHCP. 

On which server should you install IPAM? 

A. DC1 

B. DC2 

C. DC3 

D. Server1 

Answer:

Explanation: 

Explanaton: IPAM cannot be installed on Domain Controllers. All servers, except Server1, have the DC role 

Reference: IP Address Management (IPAM) Overview http://technet.microsoft.com/en-us/library/hh831353.aspx 

Q13. You have a server named Server1 that runs Windows Server 2012 R2. 

Server1 has a single volume that is encrypted by using BitLocker Drive Encryption 

(BitLocker). 

BitLocker is configured to save encryption keys to a Trusted Platform Module (TPM). 

Server1 is configured to perform a daily system image backup. 

The motherboard on Server1 is upgraded. 

After the upgrade, Windows Server 2012 R2 on Server1 fails to start. 

You need to start the operating system on Server1 as soon as possible. 

What should you do? 

A. Start Server1 from the installation media. Run startrec.exe. 

B. Move the disk to a server that has a model of the old motherboard. Start the server from the installation media. Run bcdboot.exe. 

C. Move the disk to a server that has a model of the old motherboard. Start the server. Run tpm.msc. 

D. Start Server1 from the installation media. Perform a system image recovery. 

Answer:

Explanation: 

By moving the hard drive to server with that has a model of the old motherboard the system 

would be able to start. As BitLocker was configured to save encryption keys to a Trusted 

Platform Module (TPM), we can use tpm.msc to access the TPM settings. 

Note: After you replaced the motherboard, you need to repopulate the TPM with new 

information regarding the encryption of the hard disk. 

We use these commands to repopulate the information in the TPM (without PIN): 

manage-bde –delete -protectors C: -type TPM 

manage-bde –protectors –add C: -tpm 

Incorrect: 

Not D. After the system image recovery you would still have the new motherboard installed. 

The problem would return. 

Reference: BitLocker - New motherboard replacement 

Q14. You have a server named Server1 that runs Windows Server 2012 R2. The storage on Server1 is configured as shown in the following table. 

You plan to implement Data Deduplication on Server1. 

You need to identify on which drives you can enable Data Deduplication. 

Which three drives should you identify? (Each correct answer presents part of the solution. Choose three.) 

A. C 

B. D 

C. E 

D. F 

E. G 

Answer: B,D,E 

Explanation: 

Volumes that are candidates for deduplication must conform to the following requirements: 

* Must not be a system or boot volume. (not A) 

* Can be partitioned as a master boot record (MBR) or a GUID Partition Table (GPT), and must be formatted using the NTFS file system. (not C) 

* Can reside on shared storage, such as storage that uses a Fibre Channel or an SAS array, or when an iSCSI SAN and Windows Failover Clustering is fully supported. 

* Do not rely on Cluster Shared Volumes (CSVs). You can access data if a deduplication-enabled volume is converted to a CSV, but you cannot continue to process files for deduplication. 

* Do not rely on the Microsoft Resilient File System (ReFS). 

* Must be exposed to the operating system as non-removable drives. Remotely-mapped drives are not supported. 

Ref: Plan to Deploy Data Deduplication http://technet.microsoft.com/en-us/library/hh831700.aspx 

Q15. Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows Server 2012 R2. All servers have the Hyper-V server role and the Failover Clustering feature installed. 

You need to replicate virtual machines from Cluster1 to Cluster2. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. From Hyper-V Manager on a node in Cluster2, create three virtual machines. 

B. From Cluster2, add and configure the Hyper-V Replica Broker role. 

C. From Failover Cluster Manager on Cluster1, configure each virtual machine for replication. 

D. From Cluster1, add and configure the Hyper-V Replica Broker role. 

E. From Hyper-V Manager on a node in Cluster2 modify the Hyper-V settings. 

Answer: C,D,E 

Explanation: 

D. You must configure the Hyper-V Replica Broker for cluster1. 

E. We must configure configure the Replica server to receive replication from primary servers: In Hyper-V Manager, click Hyper-V Settings in the Actions pane. 

In the Hyper-V Settings dialog, click Replication Configuration. 

In the Details pane, select Enable this computer as a Replica server. 

C. Enable virtual machine replication. 

Once the hosting server is configured for Replica, you can enable replication for each 

virtual machine that you want to be replicated. 

Reference: Deploy Hyper-V Replica 

https://technet.microsoft.com/en-us/library/jj134207.aspx 

Q16. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a cluster disk resource. 

A developer creates an application named App1. App1 is NOT a cluster-aware application. App1 runs as a service. App1 stores date on the cluster disk resource. 

You need to ensure that App1 runs in Cluster1. The solution must minimize development effort. 

Which cmdlet should you run? 

A. Add-ClusterGenericServiceRole 

B. Add-ClusterGenericApplicationRole 

C. Add-ClusterScaleOutFileServerRole 

D. Add-ClusterServerRole 

Answer:

Explanation: 

Add-ClusterGenericApplicationRole 

Configure high availability for an application that was not originally designed to run in a 

failover cluster. 

If you run an application as a Generic Application, the cluster software will start the 

application, then periodically query the operating system to see whether the application 

appears to be running. If so, it is presumed to be online, and will not be restarted or failed 

over. 

EXAMPLE 1. 

Command Prompt: C:\PS> 

Add-ClusterGenericApplicationRole -CommandLine NewApplication.exe 

Name OwnerNode State 

cluster1GenApp node2 Online Description 

This command configures NewApplication.exe as a generic clustered application. A default name will be used for client access and this application requires no storage. 

Reference: Add-ClusterGenericApplicationRole 

http://technet.microsoft.com/en-us/library/ee460976.aspx 

START 70-412 EXAM