70-412 Premium Bundle

70-412 Premium Bundle

Configuring Advanced Windows Server 2012 Services Certification Exam

4.5 
(31200 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 70-412 Free Practice Questions

Q1. HOTSPOT 

Your network contains two Hyper-V hosts that are configured as shown in the following table. 

You create a virtual machine on Server1 named VM1. 

You plan to export VM1 from Server1 and import VM1 to Server2. 

You need to ensure that you can start the imported copy of VM1 from snapshots. 

What should you configure on VM1? 

To answer, select the appropriate node in the answer area. 

Answer:  

Q2. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. Server1 has an IPv6 scope named Scope1. 

You implement an additional DHCP server named Server2 that runs Windows Server 2012 R2. 

You need to provide high availability for Scope1. The solution must minimize administrative effort. 

What should you do? 

A. Install and configure Network Load Balancing (NLB) on Server1 and Server2. 

B. Create a scope on Server2. 

C. Configure DHCP failover on Server1. 

D. Install and configure Failover Clustering on Server1 and Server2. 

Answer:

Explanation: 

Overview: Configure DHCP failover using the DHCP console To configure DHCP failover using the DHCP console, right-click a DHCP scope or right-click IPv4 and then click Configure Failover. 

Configure Failover 

The Configure Failover wizard guides you through configuring DHCP failover on the 

selected scope. 

Note: The DHCP server failover feature, available in Windows Server 2012 and later, 

provides the ability to have two DHCP servers provide IP addresses and option 

configuration to the same subnet or scope, providing for continuous availability of DHCP 

service to clients. 

Incorrect: 

Not A. NLB is not related to DHCP scope availability. 

Not B. DHCP failover requirements include: 

DHCP Scopes requirement: 

At least one IPv4 DHCP scope must be configured on the primary DHCP server. 

The same DHCP scope ID, or an overlapping scope, must not be configured on the failover 

partner. 

Not D. Failover clustering is possibly, but would not minimize administration. 

Reference: Deploy DHCP Failover 

Q3. You have 20 servers that run Windows Server 2012 R2. 

You need to create a Windows PowerShell script that registers each server in Windows Azure Backup and sets an encryption passphrase. 

Which two PowerShell cmdlets should you run in the script? (Each correct answer presents part of the solution. Choose two.) 

A. New-OBPolicy 

B. New-OBRetentionPolicy 

C. Add-OBFileSpec 

D. Start-OBRegistration 

E. Set OBMachineSetting 

Answer: D,E 

Explanation: 

D. Start-OBRegistration Registers the current computer with Windows Azure Online Backup using the credentials (username and password) created during enrollment. 

E. The Set-OBMachineSetting cmdlet sets a OBMachineSetting object for the server that includes proxy server settings for accessing the internet, network bandwidth throttling settings, and the encryption passphrase that is required to decrypt the files during recovery to another server. 

Incorrect: 

Not C. TheAdd-OBFileSpeccmdlet adds theOBFileSpecobject, which specifies the items to 

include or exclude from a backup, to the backup policy (OBPolicyobject). 

TheOBFileSpecobject can include or exclude multiple files, folders, or volumes. T Reference: Start-OBRegistration; Set OBMachineSetting http://technet.microsoft.com/en-us/library/hh770398.aspx http://technet.microsoft.com/en-us/library/hh770409.aspx 

Q4. DRAG DROP 

You have two failover clusters named Cluster1 and Cluster2. All of the nodes in both of the 

clusters run Windows Server 2012 R2. 

Cluster1 hosts two virtual machines named VM1 and VM2. 

You plan to configure VM1 and VM2 as nodes in a new failover cluster named Cluster3. 

You need to configure the witness disk for Cluster3 to be hosted on Cluster2. 

Which three actions should you perform in sequence? 

To answer, move the appropriate three actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer:  

Q5. Your network contains an Active Directory domain named adatum.com. The domain contains two sites named Site1 and Site2 and two domain controllers named DC1 and DC2. DC1 is located in Site1 and DC2 is located in Site2. 

You install an additional domain controller named DC3 in Site1 and you ship DC3 to Site2. 

A technician connects DC3 to Site2. 

You discover that users in Site2 are authenticated only by DC2. 

You need to ensure that the users in Site2 are authenticated by both DC2 and DC3. 

What should you do? 

A. In Active Directory Users and Computers, configure the msDS-PrimaryComputer attribute for DC3. 

B. In Active Directory Users and Computers, configure the msDS-Site-Affinity attribute for DC3. 

C. From Active Directory Sites and Services, move DC3. 

D. From Active Directory Sites and Services, modify the site link between Site1 and Site2. 

Answer:

Explanation: 

DC3 needs to be moved to Site2 in AD DS 

Reference: Move a domain controller between sites 

http://technet.microsoft.com/en-us/library/cc759326(v=ws.10).aspx 

Q6. HOTSPOT 

Your network contains an Active Directory forest. 

You implement Dynamic Access Control in the forest. 

You have the claim types shown in the Claim Types exhibit. (Click the Exhibit button.) 

The properties of a user named User1 are configured as shown in the User1 exhibit. (Click the Exhibit button.) 

The output of Whoami /claims for a user named User2 is shown in the Whoami exhibit. (Click the Exhibit button.) 

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point. 

Answer:  

Q7. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the IP Address Management (IPAM) Server feature installed. 

You have a support technician named Tech1. Tech1 is a member of the IPAM Administrators group on Server1 and Server2. You need to ensure that Tech1 can use Server Manager on Server1 to manage IPAM on Server2. To which group on Server2 should you add Tech1? To answer, select the appropriate group in the answer area. 

Answer:  

Q8. Your network contains two Active Directory forests named contoso.com and adatum.com. All of the domain controllers in both of the forests run Windows Server 2012 R2. The adatum.com domain contains a file server named Servers. 

Adatum.com has a one-way forest trust to contoso.com. 

A contoso.com user name User10 attempts to access a shared folder on Servers and receives the error message shown in the exhibit. (Click the Exhibit button.) 

You verify that the Authenticated Users group has Read permissions to the Data folder. 

You need to ensure that User10 can read the contents of the Data folder on Server5 in the 

adatum.com domain. 

What should you do? 

A. Grant the Other Organization group Read permissions to the Data folder. 

B. Modify the list of logon workstations of the contoso\User10 user account. 

C. Enable the Netlogon Service (NP-In) firewall rule on Server5. 

D. Modify the permissions on the Server5 computer object in Active Directory. 

Answer:

Explanation: 

* To resolve the issue, I had to open up AD Users and Computers --> enable Advanced Features --> Select the Computer Object --> Properties --> Security --> Add the Group I want to allow access to the computer (in this case, DomainA\Domain users) and allow "Allowed to Authenticate". Once I did that, everything worked: 

* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest. 

Reference: Grant the Allowed to Authenticate Permission on Computers in the Trusting Domain or Forest. 

http://technet.microsoft.com/en-us/library/cc816733(v=ws.10).aspx 

Q9. Your network contains two Active Directory forests named contoso.com and adatum.com. 

Contoso.com contains one domain. Adatum.com contains a child domain named child.adatum.com. 

Contoso.com has a one-way forest trust to adatum.com. Selective authentication is enabled on the forest trust. 

Several user accounts are migrated from child.adatum.com to adatum.com. 

Users report that after the migration, they fail to access resources in contoso.com. The users successfully accessed the resources in contoso.com before the accounts were migrated. 

You need to ensure that the migrated users can access the resources in contoso.com. 

What should you do? 

A. Replace the existing forest trust with an external trust. 

B. Run netdom and specify the /quarantine attribute. 

C. Disable SID filtering on the existing forest trust. 

D. Disable selective authentication on the existing forest trust. 

Answer:

Explanation: 

Security Considerations for Trusts Need to gain access to the resources in contoso.com 

Disabling SID Filter Quarantining on External Trusts Although it reduces the security of your forest (and is therefore not recommended), you can disable SID filter quarantining for an external trust by using the Netdom.exe tool. You should consider disabling SID filter quarantining only in the following situations: 

* Users have been migrated to the trusted domain with their SID histories preserved, and 

you want to grant them access to resources in the trusting domain based on the SID history 

attribute. 

Etc. 

Incorrect: 

Not B. Enables administrators to manage Active Directory domains and trust relationships 

from the command prompt, /quarantine Sets or clears the domain quarantine. 

Not D. Selective authentication over a forest trust restricts access to only those users in a 

trusted forest who have been explicitly given authentication permissions to computer 

objects (resource computers) that reside in the trusting forest. 

Reference: Security Considerations for Trusts 

http://technet.microsoft.com/en-us/library/cc755321(v=ws.10).aspx 

Q10. You have a server named SCI that runs a Server Core Installation of Windows Server 2012 R2. Shadow copies are enabled on all volumes. 

You need to delete a specific shadow copy. The solution must minimize server downtime. 

Which tool should you use? 

A. Shadow 

B. Diskshadow 

C. Wbadmin 

D. Diskpart 

Answer:

Explanation: 

DiskShadow.exe is a tool that exposes the functionality offered by the Volume Shadow 

Copy Service (VSS). 

The diskshadow command delete shadows deletes shadow copies. 

Reference: Technet, Diskshadow 

Q11. HOTSPOT 

Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2. 

Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains an application named App1 that is accessed by using the name appl.contoso.com. 

The NLB cluster has the port rules configured as shown in the exhibit. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. 

Answer:  

Q12. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest contains three Active Directory sites named SiteA, SiteB, and SiteC. The sites contain four domain controllers. The domain controllers are configured as shown in the following table. 

An IP site link exits between each site. 

You discover that the users in SiteC are authenticated by the domain controllers in SiteA and SiteB. 

You need to ensure that the SiteC users are authenticated by the domain controllers in SiteB, unless all of the domain controllers in SiteB are unavailable. 

What should you do? 

A. Create an SMTP site link between SiteB and SiteC. 

B. Create additional connection objects for DC3 and DC4. 

C. Decrease the cost of the site link between SiteB and SiteC. 

D. Create additional connection objects for DC1 and DC2. 

Answer:

Explanation: 

By decreasing the site link cost between SiteB and SiteC the SiteC users would be authenticated by SiteB rather than by SiteA. 

Q13. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

You configure File Services and DHCP as clustered resources for Cluster1. Server1 is the active node for both clustered resources. 

You need to ensure that if two consecutive heartbeat messages are missed between Server1 and Server2, Server2 will begin responding to DHCP requests. The solution must ensure that Server1 remains the active node for the File Services clustered resource for up to five missed heartbeat messages. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. the Scale-Out File Server 

Answer:

Explanation: 

The number of heartbeats that can be missed before failover occurs is known as the heartbeat threshold. Heartbeat threshold is failover clustering setting. 

Reference: Tuning Failover Cluster Network Thresholds 

http://technet.microsoft.com/en-us/library/dn265972.aspx 

http://technet.microsoft.com/en-us/library/dd197562(v=ws.10).aspx 

http://blogs.msdn.com/b/clustering/archive/2012/11/21/10370765.aspx 

Q14. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You have a failover cluster named Cluster1 that contains two nodes named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. 

You plan to create two virtual machines that will run an application named App1. App1 will store data on a virtual hard drive named App1data.vhdx. App1data.vhdx will be shared by both virtual machines. 

The network contains the following shared folders: 

An SMB file share named Share1 that is hosted on a Scale-Out File Server. An SMB file share named Share2 that is hosted on a standalone file server. An NFS share named Share3 that is hosted on a standalone file server. 

You need to ensure that both virtual machines can use App1data.vhdx simultaneously. 

What should you do? 

To answer, select the appropriate configurations in the answer area. 

Answer:  

Q15. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA). 

All users in the domain are issued a smart card and are required to log on to their domain-joined client computer by using their smart card. 

A user named User1 resigned and started to work for a competing company. 

You need to prevent User1 immediately from logging on to any computer in the domain. The solution must not prevent other users from logging on to the domain. 

Which tool should you use? 

A. Active Directory Administrative Center 

B. Certificate Templates 

C. The Security Configuration Wizard 

D. The Certificates snap-in 

Answer:

Explanation: 

To disable or enable a user account using Active Directory Administrative Center 

1. To open Active Directory Administrative Center, click Start , click Administrative Tools , 

and then click Active Directory Administrative Center . 

To open Active Directory Users and Computers in Windows Server 2012, click Start , type 

dsac.exe . 

2. In the navigation pane, select the node that contains the user account whose status you 

want to change. 

3. In the management list, right-click the user whose status you want to change. 

4. Depending on the status of the user account, do one of the following: . uk.co.certification.simulator.questionpool.PList@ed88a30 

Reference: Disable or Enable a User Account 

Q16. HOTSPOT 

Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2. 

Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains an application named App1 that is accessed by using the name appl.contoso.com. 

The NLB cluster has the port rules configured as shown in the exhibit. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. 

Answer:  

START 70-412 EXAM