70-412 Premium Bundle

70-412 Premium Bundle

Configuring Advanced Windows Server 2012 Services Certification Exam

4.5 
(36000 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-412 Free Practice Questions

Q1. Your network contains four Active Directory forests. Each forest contains an Active 

Directory Rights Management Services (AD RMS) root cluster. 

All of the users in all of the forests must be able to access protected content from any of 

the forests. 

You need to identify the minimum number of AD RMS trusts required. How many trusts should you identify? 

A. 3 

B. 6 

C. 12 

D. 16 

Answer:

Explanation: 

The number of AD RMS trusts required to interact between all AD RMS forests can be 

defined by using the following formula: N*(N-1). 

Here N=4, so the number of trust is 12 (4*3). 

Reference: AD RMS Prerequisites, Important considerations for installing AD RMS in a 

multi-forest environment 

Q2. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. The File Server Resource Manager role service is installed on Server1. All servers run Windows Server 2012 R2. 

A Group Policy object (GPO) named GPO1 is linked to the organizational unit (OU) that contains Server1. The following graphic shows the configured settings in GPO1. 

Server1 contains a folder named Folder1. Folder1 is shared as Share1. 

You attempt to configure access-denied assistance on Server1, but the Enable access-denied assistance option cannot be selected from File Server Resource Manager. 

You need to ensure that you can configure access-denied assistance on Server1 manually by using File Server Resource Manager. 

Which two actions should you perform? 

A. Set the Enable access-denied assistance on client for all file types policy setting to Disabled for GPO1. 

B. Set the Customize message for Access Denied errors policy setting to Not Configured for GPO1. 

C. Set the Enable access-denied assistance on client for all file types policy setting to Enabled for GPO1. 

D. Set the Customize message for Access Denied errors policy setting to Enabled for GPO1. 

Answer: C,D 

Explanation: 

C. To configure access-denied assistance for all file types by using Group Policy . Open Group Policy Management. In Server Manager, click Tools, and then click 

Group Policy Management. . Right-click the appropriate Group Policy, and then click Edit. . Click Computer Configuration, click Policies, click Administrative Templates, click 

System, and then click Access-Denied Assistance. 

Right-click Enable access-denied assistance on client for all file types, and then 

click Edit. 

Click Enabled, and then click OK. 

D. To configure access-denied assistance by using Group Policy (see step 5) 

Open Group Policy Management. In Server Manager, click Tools, and then click 

Group Policy Management. 

Right-click the appropriate Group Policy, and then click Edit. 

Click Computer Configuration, click Policies, click Administrative Templates, click 

System, and then click Access-Denied Assistance. 

Right-click Customize message for Access Denied errors, and then click Edit. 

Select the Enabled option. 

Etc Reference: Deploy Access-Denied Assistance (Demonstration Steps) http://technet.microsoft.com/en-us/library/hh831402.aspx 

Q3. You have a datacenter that contains six servers. Each server has the Hyper-V server role installed and runs Windows Server 2012 R2. The servers are configured as shown in the following table. 

Host4 and Host5 are part of a cluster named Cluster1. Cluster1 hosts a virtual machine named VM1. 

You need to move VM1 to another Hyper-V host. The solution must minimize the downtime of VM1. 

To which server and by which method should you move VM1? 

A. To Host3 by using a storage migration 

B. To Host6 by using a storage migration 

C. To Host2 by using a live migration 

D. To Host1 by using a quick migration 

Answer:

Explanation: 

With Hyper-V live migration, you can move running VMs from one Hyper-V physical host to 

another without any disruption of service or perceived downtime. 

Host3 has an Intel processer, as does Host4 and Host5 in Cluster1, so the migration will 

work fine. 

Incorrect: 

Not B, not C. The migration of a virtual machine between physical computers is only 

supported on computers that have the same processor steppings or are from the same 

vendor. Therefore you cannot move a virtual machine from a Hyper-V host on an Intel-

based server to a Hyper-V Host on an AMD-based server. 

Not D. Quick Migration saves, moves and restores VMs, which results in some downtime. 

Reference: Hyper-V Migration Guide 

http://technet.microsoft.com/en-us/library/ee849855(v=WS.10).aspx 

Reference: Virtual Machine Storage Migration Overview 

http://technet.microsoft.com/en-us/library/hh831656.aspx 

Reference: Windows Server 2008 R2 & Microsoft Hyper-V Server 2008 R2 - Hyper-V Live 

Migration Overview & Architecture (http://www.microsoft.com/en-us/download/details.aspx?id=12601) 

Q4. Your network contains an Active Directory domain named adatum.com. The domain contains a server named CA1 that runs Windows Server 2012 R2. CA1 has the Active Directory Certificate Services server role installed and is configured to support key archival and recovery. 

You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory Certificate Services (AD CS) database. The solution must prevent User1 from retrieving the private keys from the AD CS database. 

What should you do? 

A. Assign User1 the Issue and Manage Certificates permission to CA1. 

B. Assign User1 the Read permission and the Write permission to all certificate templates. 

C. Provide User1 with access to a Key Recovery Agent certificate and a private key. 

D. Assign User1 the Manage CA permission to CA1. 

Answer:

Explanation: 

Understanding the Key Recovery Agent Role KRAs are Information Technology (IT) administrators who can decrypt users’ archived private keys. An organization can assign KRAs by issuing KRA certificates to designated administrators and configure them on the CA. The KRA role is not one of the default roles defined by the Common Criteria specifications but a virtual role that can provide separation between Certificate Managers and the KRAs. This allows the separation between the Certificate Manager, who can retrieve the encrypted key from the CA database but not decrypt it, and the KRA, who can decrypt private keys but not retrieve them from the CA database. 

Reference: Understanding User Key Recovery 

Q5. Information and details provided in a question App1y only to that question. 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. 

Cluster1 hosts a secure web Application named WebApp1. WebApp1 saves user state information locally on each node. 

You need to ensure that when users connect to WebApp1, their session state is maintained. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. the Scale-Out File Server 

Answer:

Explanation: 

Client Affinity NLB offers three types of client affinity to minimize response time to clients and provide generic support for preserving session state. Each affinity specifies a different method for distributing client requests. 

Affinity Single: Single Multiple requests from the same client must access the same member; useful for clusters 

within an intranet. 

This affinity provides the best support for clients that use sessions on an intranet. These 

clients cannot use No affinity because their sessions could be disrupted. 

Incorrect: 

Not A. Affinity none: Multiple requests from the same client can access any member; useful 

for clusters that do not store session state information on individual members. 

Reference: Using NLB 

http://technet.microsoft.com/en-us/library/bb687542.aspx 

Q6. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. 

You need to configure Server1 to resolve queries for single-label DNS names. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Run the Set-DNSServerGlobalNameZone cmdlet. 

B. Modify the DNS suffix search list setting. 

C. Modify the Primary DNS Suffix Devolution setting. 

D. Create a zone named “.”. 

E. Create a zone named GlobalNames. 

F. Run the Set-DNSServerRootHint cmdlet. 

Answer: A,E 

Explanation: 

Deploying a GlobalNames zone 

The specific steps for deploying a GlobalNames zone can vary somewhat, depending on 

the AD DS topology of your network. 

Step 1: Create the GlobalNames zone (E) 

Step 2: Enable GlobalNames zone support (A) 

The Set-DnsServerGlobalNameZone cmdlet enables or disables single-label Domain 

Name System (DNS) queries. It also changes configuration settings for a GlobalNames 

zone. 

Etc. 

Reference: Deploying a GlobalNames Zone; Set-DnsServerGlobalNameZone 

http://technet.microsoft.com/en-us/library/cc731744.aspx 

http://technet.microsoft.com/en-us/library/jj649907(v=wps.620).aspx 

Q7. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

The network has the physical sites and TCP/IP subnets configured as shown in the following table. 

You have a web application named App1 that is hosted on six separate Web servers. DNS has the host names and IP addresses registered as shown in the following table. 

You discover that when users connect to appl.contoso.com, they are connected frequently to a server that is not on their local subnet. 

You need to ensure that when the users connect to appl.contoso.com, they connect to a server on their local subnet. The connections must be distributed across the servers that host appl.contoso.com on their subnet. 

Which two settings should you configure? 

To answer, select the appropriate two settings in the answer area. 

Answer:  

Q8. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Federation Services (AD FS) server role installed. 

Adatum.com is a partner organization. 

You are helping the administrator of adatum.com set up a federated trust between adatum.com and contoso.com. The administrator of adatum.com asks you to provide a file containing the federation metadata of contoso.com. 

You need to identify the location of the federation metadata file. Which node in the AD FS 

console should you select? 

To answer, select the appropriate node in the answer area. 

Answer:  

Q9. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the Hyper-V server role installed. 

You plan to replicate virtual machines between Server1 and Server2. The replication will be encrypted by using Secure Sockets Layer (SSL). 

You need to request a certificate on Server1 to ensure that the virtual machine replication is encrypted. 

Which two intended purposes should the certificate for Server1 contain? (Each correct answer presents part of the solution. Choose two.) 

A. Client Authentication 

B. Kernel Mode Code Signing 

C. Server Authentication 

D. IP Security end system 

E. KDC Authentication 

Answer: A,C 

Explanation: 

You need to use certificate-based authentication if you want transmitted data to be encrypted. 

Replica Server Certificate Requirements 

To enable a server to receive replication traffic, the certificate in the replica server must meet the following conditions 

* Enhanced Key Usage must support both Client and Server authentication 

Etc. 

Reference: Hyper-V Replica - Prerequisites for certificate based deployments 

http://blogs.technet.com/b/virtualization/archive/2012/03/13/hyper-v-replica-certificate-requirements.aspx 

Q10. Your network contains three servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2. 

You need to ensure that Server1 can provide iSCSI storage for Server2 and Server3. 

What should you do on Server1? 

A. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties. 

B. Install the iSNS Server service feature and create a Discovery Domain. 

C. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties. 

D. Install the iSCSI Target Server role service and configure iSCSI targets. 

Answer:

Explanation: 

iSCSI Target Server: The server runs the iSCSI Target. It is also the iSCSI Target role name in Windows Server 2012. 

Note: iSCSI: it is an industry standard protocol allow sharing block storage over the Ethernet. The server shares the storage is called iSCSI Target. The server (machine) consumes the storage is called iSCSI initiator. Typically, the iSCSI initiator is an application server. For example, iSCSI Target provides storage to a SQL server, the SQL server will be the iSCSI initiator in this deployment. 

Target: It is an object which allows the iSCSI initiator to make a connection. The Target keeps track of the initiators which are allowed to be connected to it. The Target also keeps track of the iSCSI virtual disks which are associated with it. Once the initiator establishes the connection to the Target, all the iSCSI virtual disks associated with the Target will be accessible by the initiator. 

Q11. You have a server named Server1 that runs Windows Server 2012 R2 and is used for testing. 

A developer at your company creates and installs an unsigned kernel-mode driver on Server1. The developer reports that Server1 will no longer start. 

You need to ensure that the developer can test the new driver. The solution must minimize the amount of data loss. 

Which Advanced Boot Option should you select? 

A. Disable Driver Signature Enforcement 

B. Disable automatic restart on system failure 

C. Last Know Good Configuration (advanced) 

D. Repair Your Computer 

Answer:

Explanation: 

A. By default, 64-bit versions of Windows Vista and later versions of Windows will load a kernel-mode driver only if the kernel can verify the driver signature. However, this default behavior can be disabled to facilitate early driver development and non-automated testing. 

Incorrect: 

Not B. specifies that Windows automatically restarts your computer when a failure occurs. 

Not C. Developer would not be able to test the driver as needed. 

Not D. Removes or repairs critical windows files, Developer would not be able to test the 

driver as needed and some file loss. 

Reference: Installing Windows Server 2012. 

http://technet.microsoft.com/en-us/library/jj134246.aspx 

http://msdn.microsoft.com/en-us/library/windows/hardware/ff547565(v=vs.85).aspx 

Q12. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA). 

All users in the domain are issued a smart card and are required to log on to their domain-joined client computer by using their smart card. 

A user named User1 resigned and started to work for a competing company. 

You need to prevent User1 immediately from logging on to any computer in the domain. The solution must not prevent other users from logging on to the domain. 

Which tool should you use? 

A. Active Directory Users and Computers 

B. Server Manager 

C. The Certificates snap-in 

D. Active Directory Administrative Center 

Answer:

Explanation: 

To disable or enable a user account using Active Directory Administrative Center 

1. To open Active Directory Administrative Center, click Start , click Administrative Tools , 

and then click Active Directory Administrative Center . 

To open Active Directory Users and Computers in Windows Server 2012, click Start , type 

dsac.exe. 

2. In the navigation pane, select the node that contains the user account whose status you 

want to change. 

3. In the management list, right-click the user whose status you want to change. 

4. Depending on the status of the user account, do one of the following: . uk.co.certification.simulator.questionpool.PList@ef38f20 

Reference: Disable or Enable a User Account 

Q13. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a Clustered Shared Volume (CSV). 

A developer creates an application named App1. App1 is NOT a cluster-aware application. App1 stores data in the file system. 

You need to ensure that App1 runs in Cluster1. The solution must minimize development effort. 

Which cmdlet should you run? 

A. Add-ClusterServerRole 

B. Add-ClusterGenericServiceRole 

C. Add ClusterScaleOutFileServerRole 

D. Add ClusterGenericApplicationRole 

Answer:

Explanation: 

Add-ClusterGenericApplicationRole 

Configure high availability for an application that was not originally designed to run in a 

failover cluster. 

If you run an application as a Generic Application, the cluster software will start the 

application, then periodically query the operating system to see whether the application 

appears to be running. If so, it is presumed to be online, and will not be restarted or failed 

over. 

EXAMPLE 1. 

Command Prompt: C:\PS> 

Add-ClusterGenericApplicationRole -CommandLine NewApplication.exe 

Name OwnerNode State 

cluster1GenApp node2 Online Description 

This command configures NewApplication.exe as a generic clustered application. A default name will be used for client access and this application requires no storage. 

Reference: Add-ClusterGenericApplicationRole 

http://technet.microsoft.com/en-us/library/ee460976.aspx 

Q14. Your network contains one Active Directory forest named contoso.com. The forest contains two child domains and six domain controllers. The domain controllers are configured as shown in the following table. 

You need to enable universal group membership caching for the Europe office and Asia office sites. 

What should you use? 

A. Set-ADSite 

B. Set-ADReplicationSite 

C. Set-ADDomain 

D. Set-ADReplicationSiteLink 

E. Set-ADGroup 

F. Set-ADForest 

G. Netdom 

Answer:

Explanation: 

https://technet.microsoft.com/en-us/library/hh852305(v=wps.630).aspx 

Q15. Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains one domain. Contoso.com has a two-way forest trust to adatum.com. Selective authentication is enabled on the forest trust. 

Contoso contains 10 servers that have the File Server role service installed. Users successfully access shared folders on the file servers by using permissions granted to the Authenticated Users group. 

You migrate the file servers to adatum.com. 

Contoso users report that after the migration, they are unable to access shared folders on the file servers. 

You need to ensure that the Contoso users can access the shared folders on the file servers. 

What should you do? 

A. Disable selective authentication on the existing forest trust. 

B. Disable SID filtering on the existing forest trust. 

C. Run netdom and specify the /quarantine attribute. 

D. Replace the existing forest trust with an external trust. 

Answer:

Explanation: 

Although it is not recommended, you can use this procedure to disable security identifier (SID) filter quarantining for an external trust with the Netdom.exe tool. You should consider disabling SID filter quarantining only in the following situations: 

* Users have been migrated to the trusted domain with their SID histories preserved, and you want to grant those users access to resources in the trusting domain (the former domain of the migrated users) based on the sIDHistory attribute. 

Etc. 

Reference: Disabling SID filter quarantining 

http://technet.microsoft.com/en-us/library/cc794713(v=ws.10).aspx 

Q16. You have a server named Server1 that runs Windows Server 2012 R2. 

Windows Server 2012 R2 is installed on volume C. 

You need to ensure that Safe Mode with Networking loads the next time Server1 restarts. 

Which tool should you use? 

A. The Msconfig command 

B. The Bootcfg command 

C. The Restart-Computer cmdlet 

D. The Restart-Server cmdlet 

Answer:

Explanation: 

Use system config (Msconfig) to configure boot options. 

Reference: System Configuration – aka MSCONFIG. 

START 70-412 EXAM