70-412 Premium Bundle

70-412 Premium Bundle

Configuring Advanced Windows Server 2012 Services Certification Exam

4.5 
(7650 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 70-412 Free Practice Questions

Q1. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The relevant servers in the domain are configured as shown in the following table. 

You plan to create a shared folder on Server1 named Share1. Share1 must only be accessed by users who are using computers that are joined to the domain. 

You need to identify which servers must be upgraded to support the requirements of Share1. 

In the table below, identify which computers require an upgrade and which computers do not require an upgrade. Make only one selection in each row. Each correct selection is worth one point. 

Answer:  

Q2. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. 

Port rules are configured for all clustered Applications. 

You need to ensure that Server2 handles all client requests to the cluster that are NOT covered by a port rule. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

Host Priorities Each cluster host is assigned a unique host priority in the range of 1 to 32, where lower numbers denote higher priorities. The host with the highest host priority (lowest numeric value) is called the default host. It handles all client traffic for the virtual IP addresses that is not specifically intended to be load-balanced. This ensures that server applications not configured for load balancing only receive client traffic on a single host. If the default host fails, the host with the next highest priority takes over as default host. 

Reference: Network Load Balancing Technical Overview 

http://technet.microsoft.com/en-us/library/bb742455.aspx 

Q3. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. 

You need to configure Server1 to resolve queries for single-label DNS names. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Run the Set-DNSServerGlobalNameZone cmdlet. 

B. Modify the DNS suffix search list setting. 

C. Modify the Primary DNS Suffix Devolution setting. 

D. Create a zone named “.”. 

E. Create a zone named GlobalNames. 

F. Run the Set-DNSServerRootHint cmdlet. 

Answer: A,E 

Explanation: 

Deploying a GlobalNames zone 

The specific steps for deploying a GlobalNames zone can vary somewhat, depending on 

the AD DS topology of your network. 

Step 1: Create the GlobalNames zone (E) 

Step 2: Enable GlobalNames zone support (A) 

The Set-DnsServerGlobalNameZone cmdlet enables or disables single-label Domain 

Name System (DNS) queries. It also changes configuration settings for a GlobalNames 

zone. 

Etc. 

Reference: Deploying a GlobalNames Zone; Set-DnsServerGlobalNameZone 

http://technet.microsoft.com/en-us/library/cc731744.aspx 

http://technet.microsoft.com/en-us/library/jj649907(v=wps.620).aspx 

Q4. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. Both servers connect to the same switch. 

Cluster1 hosts a secure web Application named WebApp1. WebApp1 saves user state information in a central database. 

You need to ensure that the connections to WebApp1 are distributed evenly between the nodes. The solution must minimize port flooding. 

What should you configure? To answer, configure the appropriate affinity and the appropriate mode for Cluster1 in the answer area. 

Answer:  

Q5. Your network contains an Active Directory domain named contoso.com. 

A previous administrator implemented a Proof of Concept installation of Active Directory 

Rights Management Services (AD RMS). 

After the proof of concept was complete, the Active Directory Rights Management Services 

server role was removed. 

You attempt to deploy AD RMS. 

During the configuration of AD RMS, you receive an error message indicating that an 

existing AD RMS Service Connection Point (SCP) was found. 

You need to remove the existing AD RMS SCP. 

Which tool should you use? 

A. Active Directory Users and Computers 

B. Authorization Manager 

C. Active Directory Domains and Trusts 

D. Active Directory Sites and Services 

E. Active Directory Rights Management Services 

Answer:

Explanation: 

ADRMS will registered the Service Connection Point (SCP) in Active Directory and you will need to unregister first before you remove the ADRMS server role. 

If your ADRMS server is still alive, you can easily manually remove the SCP by below: 

http://www.rickygao.com/wp-content/uploads/2013/08/080513_1308_Howtomanual1.png 

http://www.rickygao.com/wp-content/uploads/2013/08/080513_1308_Howtomanual2.png Reference: How to manually remove or reinstall ADRMS 

Q6. Your network contains one Active Directory forest named contoso.com. The forest contains two child domains and six domain controllers. The domain controllers are configured as shown in the following table. 

You need to prevent administrators from accidentally deleting any of the sites in the forest. What should you use? 

A. Set-ADSite 

B. Set-ADReplicationSite 

C. Set-ADDomain 

D. Set-ADReplicationSiteLink 

E. Set-ADGroup 

F. Set-ADForest 

G. Netdom 

Answer:

Explanation: The Set-ADReplicationSite sets the replication properties for an Active 

Directory site. 

Parameter: -ProtectedFromAccidentalDeletion<Boolean> 

Specifies whether to prevent the object from being deleted. When this property is set to 

$True, you cannot delete the corresponding object without changing the value of the 

property. The acceptable values for this parameter are: 

-- $False or 0 

-- $True or 1 

Reference: Technet, Set-ADReplicationSite 

https://technet.microsoft.com/en-us/library/hh852305(v=wps.630).aspx 

Q7. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are configured as shown in the following table. 

You need to ensure that when new targets are added to Server1, the targets are registered on Server2 automatically. 

What should you do on Server1? 

A. Configure the Discovery settings of the iSCSI initiator. 

B. Configure the security settings of the iSCSI target. 

C. Run the Set-WmiInstance cmdlet. 

D. Run the Set-IscsiServerTarget cmdlet. 

Answer:

Explanation: 

Explanation/Reference: 

Manage iSNS server registration 

The iSNS server registration can be done using the following cmdlets, which manages the 

WMI objects. 

To add an iSNS server: 

Set-WmiInstance -Namespace root\wmi -Class WT_iSNSServer –Arguments 

@{ServerName="ISNSservername"} 

Note: The Set-WmiInstance cmdlet creates or updates an instance of an existing WMI 

class. The created or updated instance is written to the WMI repository. 

Reference: iSCSI Target cmdlet reference 

http://blogs.technet.com/b/filecab/archive/2012/06/08/iscsi-target-cmdlet-reference.aspx 

Q8. Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers. The domain controllers are configured as shown in the following table. 

You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in both domains. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Raise the domain functional level of contoso.com. 

B. Raise the domain functional level ofchildl.contoso.com. 

C. Raise the forest functional level of contoso.com. 

D. Upgrade DC11 to Windows Server 2012 R2. 

E. Upgrade DC1 to Windows Server 2012 R2. 

Answer: A,E 

Explanation: 

The root domain in the forest must be at Windows Server 2012 level. First upgrade DC1 to this level (E), then raise the contoso.com domain functional level to Windows Server 2012 (A). 

* (E) To support resources that use claims-based access control, the principal’s domains 

will need to be running one of the following: 

/ All Windows Server 2012 domain controllers. 

/ Sufficient Windows Server 2012 domain controllers to handle all the Windows 8 device 

authentication requests. 

/ Sufficient Windows Server 2012 domain controllers to handle all the Windows Server 

2012 resource protocol transition requests to support non-Windows 8 devices. 

Reference: What's New in Kerberos Authentication 

http://technet.microsoft.com/en-us/library/hh831747.aspx. 

Q9. You have a datacenter that contains six servers. Each server has the Hyper-V server role installed and runs Windows Server 2012 R2. The servers are configured as shown in the following table. 

Host4 and Host5 are part of a cluster named Cluster1. Cluster1 hosts a virtual machine named VM1. 

You need to move VM1 to another Hyper-V host. The solution must minimize the downtime of VM1. 

To which server and by which method should you move VM1? 

A. To Host3 by using a storage migration 

B. To Host6 by using a storage migration 

C. To Host2 by using a live migration 

D. To Host1 by using a quick migration 

Answer:

Explanation: 

With Hyper-V live migration, you can move running VMs from one Hyper-V physical host to 

another without any disruption of service or perceived downtime. 

Host3 has an Intel processer, as does Host4 and Host5 in Cluster1, so the migration will 

work fine. 

Incorrect: 

Not B, not C. The migration of a virtual machine between physical computers is only 

supported on computers that have the same processor steppings or are from the same 

vendor. Therefore you cannot move a virtual machine from a Hyper-V host on an Intel-

based server to a Hyper-V Host on an AMD-based server. 

Not D. Quick Migration saves, moves and restores VMs, which results in some downtime. 

Reference: Hyper-V Migration Guide 

http://technet.microsoft.com/en-us/library/ee849855(v=WS.10).aspx 

Reference: Virtual Machine Storage Migration Overview 

http://technet.microsoft.com/en-us/library/hh831656.aspx 

Reference: Windows Server 2008 R2 & Microsoft Hyper-V Server 2008 R2 - Hyper-V Live 

Migration Overview & Architecture (http://www.microsoft.com/en-us/download/details.aspx?id=12601) 

Q10. DRAG DROP 

You have a server named Server2 that runs Windows Server 2012 R2. You have storage provisioned on Server2 as shown in the exhibit. (Click the Exhibit button.) 

You need to configure the storage so that it appears in Windows Explorer as a drive letter on Server1. 

Which three actions should you perform in sequence? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer:  

Q11. You have an Active Directory Rights Management Services (AD RMS) cluster. 

You need to prevent users from encrypting new content. The solution must ensure that the users can continue to decrypt content that was encrypted already. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From the Active Directory Rights Management Services console, enable decommissioning. 

B. From the Active Directory Rights Management Services console, create a user exclusion policy. 

C. Modify the NTFS permissions of %systemdrive%\inetpub\wwwroot\_wmcs\licensing. 

D. Modify the NTFS permissions of %systemdrive%\inetpub\wwwroot\_wmcs\decommission. 

E. From the Active Directory Rights Management Services console, modify the rights policy templates. 

Answer: A,D 

Explanation: 

* Decommissioning refers to the entire process of removing the AD RMS cluster and its 

associated databases from an organization. This process allows you to save rights-

protected files as ordinary files before you remove AD RMS from your infrastructure so that 

you do not lose access to these files. 

Decommissioning an AD RMS cluster is achieved by doing the following: 

/ Enable the decommissioning service. (A) 

/ Modify permissions on the decommissioning pipeline. 

/ Configure the AD RMS-enabled application to use the decommissioning pipeline. 

* To modify the permissions on the decommissioning pipeline 

1. Log on to ADRMS-SRV as cpandl\administrator. 

2. Click Start, type %systemdrive%\inetpub\wwwroot\_wmcs in the Start Search box, and 

then press ENTER. 

3. Right-click the decommission folder, and then click Properties. 

4. Click the Security tab, click Edit, and then click Add. (D) 

Etc. 

Reference: Step 1: Decommission AD RMS Root Cluster 

Q12. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. 

You need to store the contents of all the DNS queries received by Server1. 

What should you configure? 

A. Logging from Windows Firewall with Advanced Security 

B. Debug logging from DNS Manager 

C. A Data Collector Set (DCS) from Performance Monitor 

D. Monitoring from DNS Manager 

Answer:

Explanation: 

Debug logging allows you to log the packets sent and received by a DNS server. Debug logging is disabled by default, and because it is resource intensive, you should only activate it temporarily when you need more specific detailed information about server performance. 

Reference: Active Directory 2008: DNS Debug Logging Facts… 

Q13. Your network contains one Active Directory domain named contoso.com. The domain contains three users named User1, User2, and User3. 

You need to ensure that the users can log on to the domain by using the user principal names (UPNs) shown in the following table. 

What should you use? 

A. the Set-ADDomain cmdlet 

B. the Add-DNSServerSecondaryZone cmdlet 

C. the Setspn command 

D. the Set-ADUser cmdlet 

Answer:

Reference: Technet, Set-ADUser https://technet.microsoft.com/en-us/library/ee617215.aspx 

Q14. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. 

You create a user account named User1 in the domain. 

You need to ensure that User1 can use Windows Server Backup to back up Server1. The solution must minimize the number of administrative rights assigned to User1. 

What should you do? 

A. Add User1 to the Backup Operators group. 

B. Add User1 to the Power Users group. 

C. Assign User1 the Backup files and directories user right and the Restore files and directories user right. 

D. Assign User1 the Backup files and directories user right. 

Answer:

Explanation: 

Backup Operators have these permissions by default: 

However the question explicitly says we need to minimize administrative rights. Since the requirement is for backing up the data only--no requirement to restore or shutdown--then assigning the "Back up files and directories user right" would be the correct answer. 

Reference: Default local groups 

http://technet.microsoft.com/en-us/library/cc787956(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc756898(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc771990.aspx 

Q15. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured to support key archival and recovery. 

You create a new Active Directory group named Group1. 

You need to ensure that the members of Group1 can request a Key Recovery Agent certificate. 

The solution must minimize the permissions assigned to Group1. 

Which two permissions should you assign to Group1? (Each correct answer presents part of the solution. Choose two.) 

A. Read 

B. Auto enroll 

C. Write 

D. Enroll 

E. Full control 

Answer: A,D 

Explanation: 

See step 6 below. To configure the Key Recovery Agent certificate template Open the Certificate Templates snap-in. In the console tree, right-click the Key Recovery Agent certificate template. Click Duplicate Template. In Template, type a new template display name, and then modify any other optional properties as needed. On the Security tab, click Add, type the name of the users you want to issue the key recovery agent certificates to, and then click OK. Under Group or user names, select the user names that you just added. Under Permissions, select the Read and Enroll check boxes, and then click OK. 

Reference: Identify a Key Recovery Agent 

Q16. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the IP Address Management (IPAM) Server feature installed. 

You have a support technician named Tech1. Tech1 is a member of the IPAM Administrators group on Server1 and Server2. You need to ensure that Tech1 can use Server Manager on Server1 to manage IPAM on Server2. To which group on Server2 should you add Tech1? To answer, select the appropriate group in the answer area. 

Answer:  

START 70-412 EXAM