70-412 Premium Bundle

70-412 Premium Bundle

Configuring Advanced Windows Server 2012 Services Certification Exam

4.5 
(12105 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-412 Free Practice Questions

Q1. Your network contains an Active Directory domain named contoso.com. The domain 

contains three servers named Server1, Server2, and Server3 that run Windows Server 2012 R2. All three servers have the Hyper-V server role installed and the Failover Clustering feature installed. 

Server1 and Server2 are nodes in a failover cluster named Cluster1. Several highly available virtual machines run on Cluster1. Cluster1 has the Hyper-V Replica Broker role installed. The Hyper-V Replica Broker currently runs on Server1. 

Server3 currently has no virtual machines. 

You need to configure Cluster1 to be a replica server for Server3 and Server3 to be a replica server for Cluster1. 

Which two tools should you use? (Each correct answer presents part of the solution. Choose two.) 

A. The Hyper-V Manager console connected to Server3 

B. The Failover Cluster Manager console connected to Server3 

C. The Hyper-V Manager console connected to Server1. 

D. The Failover Cluster Manager console connected to Cluster1 

E. The Hyper-V Manager console connected to Server2 

Answer: A,D 

Explanation: 

A. To configure the Replica server [on a server that is not part of a cluster which in this case is Server3] In Hyper-V Manager, click Hyper-V Settings in the Actions pane. In the Hyper-V Settings dialog, click Replication Configuration. 

In the Details pane, select Enable this computer as a Replica server. Etc. 

D. To configure a Replica server that is part of a failover cluster. 

1. In Server Manager, open Failover Cluster Manager. 

2. In the left pane, connect to the cluster, and while the cluster name is highlighted, click Roles in the Navigate category of the Details pane. 

3. Right-click the role and choose Replication Settings. 

4. In the Details pane, select Enable this cluster as a Replica server. Etc. 

Reference: Deploy Hyper-V Replica , Step 2: Enable Replication 

http://technet.microsoft.com/en-us/library/jj134240.aspx 

Q2. Your network contains one Active Directory domain named contoso.com. The domain contains an IP Address Management (IPAM) server named Server1. Server1 manages several DHCP and DNS servers. 

From Server Manager on Server1, you create a custom role for IPAM. 

You need to assign the role to a group named IP_Admins. 

What should you do? 

A. From Windows PowerShell, run the Add-Member cmdlet. 

B. From Server Manager, create an access policy. 

C. From Windows PowerShell, run the Set-IpamConfiguration cmdlet. 

D. From Server Manager, create an access scope. 

Answer:

Explanation: A role is a collection of IPAM operations. You can associate a role with a user or group in Windows using an access policy. Several built-in roles are provided, but you can also create customized roles to meet your business requirements. 

Reference: Manage IPAM, Access Control 

https://technet.microsoft.com/en-us/library/dn741281.aspx 

Q3. Your network contains an Active Directory forest named adatum.com. The forest contains an Active Directory Rights Management Services (AD RMS) cluster. 

A partner company has an Active Directory forest named litwareinc.com. The partner company does not have AD RMS deployed. 

You need to ensure that users in litwareinc.com can consume rights-protected content from adatum.com. 

Which type of trust policy should you create? 

A. At federated trust 

B. A trusted user domain 

C. A trusted publishing domain 

D. Windows Live ID 

Answer:

Explanation: 

In AD RMS rights can be assigned to users who have a federated trust with Active Directory Federation Services (AD FS). This enables an organization to share access to rights-protected content with another organization without having to establish a separate Active Directory trust or Active Directory Rights Management Services (AD RMS) infrastructure. 

Reference: AD RMS and AD FS Considerations 

http://technet.microsoft.com/en-us/library/dd772651(v=WS.10).aspx 

Q4. You have a server named LON-DC1 that runs Windows Server 2012 R2. An iSCSI virtual disk named VirtualiSCSI1.vhd exists on LON-DC1 as shown in the exhibit. (Click the Exhibit button.) 

You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt iSCSI target. 

VirtualiSCSIl.vhd is removed from LON-DC1. 

You need to assign VirtualiSCSI2.vhd a logical unit value of 0. 

What should you do? 

A. Modify the properties of the itgt ISCSI target. 

B. Modify the properties of the VirtualiSCSI2.vhd iSCSI virtual disk. 

C. Run the Set-VirtualDisk cmdlet and specify the -Uniqueld parameter. 

D. Run the iscsicli command and specify the reportluns parameter. 

Answer:

Explanation: 

The virtual disk has the option to change the lun ID, no other option available in the answers appear to allow this change. 

Note: Logical unit numbers (LUNs) created on an iSCSI disk storage subsystem are not directly assigned to a server. For iSCSI, LUNs are assigned to logical entities called targets. 

Q5. You have a server named Server1 that runs Windows Server 2012 R2. 

From Server Manager, you install the Active Directory Certificate Services server role on Server1. 

A domain administrator named Admin1 logs on to Server1. 

When Admin1 runs the Certification Authority console, Admin1 receive the following error message. 

You need to ensure that when Admin1 opens the Certification Authority console on Server1, the error message does not appear. 

What should you do? 

A. Install the Active Directory Certificate Services (AD CS) tools. 

B. Run the regsvr32.exe command. 

C. Modify the PATH system variable. 

D. Configure the Active Directory Certificate Services server role from Server Manager. 

Answer:

Explanation: 

The error message is related to missing role configuration. 

* Cannot Manage Active Directory Certificate Services Resolution: configure the two Certification Authority and Certification Authority Web Enrollment Roles: 

image 

Reference: Cannot manage Active Directory Certificate Services in Server 2012 Error 0x800070002 

Q6. You have a failover cluster named Cluster1 that contains four nodes. All of the nodes run Windows Server 2012 R2. 

You need to force every node in Cluster1 to contact immediately the Windows Server Update Services (WSUS) server on your network for updates. 

Which tool should you use? 

A. The Add-CauClusterRole cmdlet 

B. The Wuauclt command 

C. The Wusa command 

D. The Invoke-CauScan cmdlet 

Answer:

Explanation: 

The Add-CauClusterRole cmdlet adds the Cluster-Aware Updating (CAU) clustered role 

that provides the self-updating functionality to the specified cluster. When the CAU 

clustered role has been added to a cluster, the failover cluster can update itself on the 

schedule that is specified by the user, without requiring an external computer to coordinate 

the cluster updating process. 

Incorrect: 

Not B. The wuauclt utility allows you some control over the functioning of the Windows 

Update Agent. It is updated as part of Windows Update. 

The following are the command line for wuauclt. 

OptionDescription 

/a /ResetAuthorization 

Initiates an asynchronous background search for applicable updates. If Automatic Updates 

is disabled, this option has no effect. 

/r /ReportNow 

Sends all queued reporting events to the server asynchronously. 

/? /h /help 

Shows this help information. 

Not D. 

The Invoke-CauScan cmdlet performs a scan of cluster nodes for applicable updates and 

returns a list of the initial set of updates that would be applied to each node in a specified 

cluster. 

Note: The Invoke-CauRun cmdlet performs a scan of cluster nodes for applicable updates 

and installs those updates via an Updating Run on the specified cluster. 

Reference: Add-CauClusterRole 

http://technet.microsoft.com/en-us/library/hh847235(v=wps.620).aspx 

Q7. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 has the IP Address Management (IPAM) Server feature installed. 

A technician performs maintenance on Server1. 

After the maintenance is complete, you discover that you cannot connect to the IPAM server on Server1. 

You open the Services console as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can connect to the IPAM server. 

Which service should you start? 

A. Windows Process Activation Service 

B. Windows Event Collector 

C. Windows Internal Database 

D. Windows Store Service (WSService) 

Answer:

Explanation: 

Explanation Windows Internal Database 

Windows Internal Database is a relational data store that can be used only by Windows 

roles and features. 

IPAM does not support external databases. Only a Windows Internal Database is 

supported. 

IPAM stores 3 years of forensics data (IP address leases, host MAC addresses, user 

login/logoff information) for 100,000 users in a Windows Internal Database. There is no 

database purge policy provided, and the administrator must purge data manually as 

needed. 

Incorrect: 

Not A. IPAM works even if the Windows Process Activation Service is not running. 

Not B. IPAM does not require the Windows Event Collector Service. It need to be running 

on the managed DC/DNS/DHCP computers. 

Not D. IPAM does not require the Windows Store Service. It provides infrastructure support 

for Windows Store.This service is started on demand and if disabled applications bought 

using Windows Store will not behave correctly. 

Reference: IPAM Deployment Planning 

Q8. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1 that has the Active Directory Federation Services server role installed. All servers run Windows Server 2012. 

You complete the Active Directory Federation Services Configuration Wizard on Server1. You need to ensure that client devices on the internal network can use Workplace Join. Which two actions should you perform on Server1? (Each correct answer presents part of the solution. Choose two.) 

A. Run Enable-AdfsDeviceRegistration -PrepareActiveDirectory. 

B. Edit the multi-factor authentication global authentication policy settings. 

C. Run Enable-AdfsDeviceRegistration. 

D. Run Set-AdfsProxyProperties HttpPort 80. 

E. Edit the primary authentication global authentication policy settings. 

Answer: C,E 

Explanation: 

C. To enable Device Registration Service 

On your federation server, open a Windows PowerShell command window and type: 

Enable-AdfsDeviceRegistration 

Repeat this step on each federation farm node in your AD FS farm. 

E. Enable seamless second factor authentication 

Seamless second factor authentication is an enhancement in AD FS that provides an 

added level of access protection to corporate resources and applications from external 

devices that are trying to access them. When a personal device is Workplace Joined, it 

becomes a ‘known’ device and administrators can use this information to drive conditional 

access and gate access to resources. 

To enable seamless second factor authentication, persistent single sign-on (SSO) and 

conditional access for Workplace Joined devices. 

In the AD FS Management console, navigate to Authentication Policies. Select Edit Global 

Primary Authentication. Select the check box next to Enable Device Authentication, and 

then click OK. 

Reference: Configure a federation server with Device Registration Service. 

Q9. You have a server named Server1 that runs Windows Server 2012 R2. 

A Microsoft Azure Backup of Server1 is created automatically every day. 

You need to view the items that are included in the backup. 

Which cmdlet should you run? 

A. Get-OBPolicyState 

B. Get-OBJob 

C. Get-OBPolicy 

D. Get-WBSummary 

Answer:

Reference: Technet, Get-OBPolicy 

https://technet.microsoft.com/en-us/library/hh770406(v=wps.630).aspx 

Q10. Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2. 

Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains an application named App1 that is accessed by using the URL http://app1.contoso.com. 

You plan to perform maintenance on Server1. 

You need to ensure that all new connections to App1 are directed to Server2. The solution must not disconnect the existing connections to Server1. 

What should you run? 

A. The Set-NlbCluster cmdlet 

B. The Set-NlbClusterNode cmdlet 

C. The Stop-NlbCluster cmdlet 

D. The Stop-NlbClusterNode cmdlet 

Answer:

Explanation: 

The Stop-NlbClusterNode cmdlet stops a node in an NLB cluster. When you use the stop 

the nodes in the cluster, client connections that are already in progress are interrupted. To 

avoid interrupting active connections, consider using the -drain parameter, which allows the 

node to continue servicing active connections but disables all new traffic to that node. 

-Drain <SwitchParameter> 

Drains existing traffic before stopping the cluster node. If this parameter is omitted, existing 

traffic will be dropped. 

Reference: Stop-NlbClusterNode 

Q11. Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers. 

The domain controllers are configured as shown in the following table. 

You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in the child1.contoso.com domain. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Upgrade DC1 to Windows Server 2012 R2. 

B. Upgrade DC11 to Windows Server 2012 R2. 

C. Raise the domain functional level of childl.contoso.com. 

D. Raise the domain functional level of contoso.com. 

E. Raise the forest functional level of contoso.com. 

Answer: A,D 

Explanation: 

The root domain in the forest must be at Windows Server 2012 level. First upgrade DC1 to this level (A), then raise the contoso.com domain functional level to Windows Server 2012 (D). 

* (A) To support resources that use claims-based access control, the principal’s domains will need to be running one of the following: / All Windows Server 2012 domain controllers / Sufficient Windows Server 2012 domain controllers to handle all the Windows 8 device authentication requests / Sufficient Windows Server 2012 domain controllers to handle all the Windows Server 

2012 resource protocol transition requests to support non-Windows 8 devices. Reference: What's New in Kerberos Authentication http://technet.microsoft.com/en-us/library/hh831747.aspx. 

Q12. Your network contains three servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2. 

You need to ensure that Server1 can provide iSCSI storage for Server2 and Server3. 

What should you do on Server1? 

A. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties. 

B. Install the iSNS Server service feature and create a Discovery Domain. 

C. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties. 

D. Install the iSCSI Target Server role service and configure iSCSI targets. 

Answer:

Explanation: 

iSCSI Target Server: The server runs the iSCSI Target. It is also the iSCSI Target role name in Windows Server 2012. 

Note: iSCSI: it is an industry standard protocol allow sharing block storage over the Ethernet. The server shares the storage is called iSCSI Target. The server (machine) consumes the storage is called iSCSI initiator. Typically, the iSCSI initiator is an application server. For example, iSCSI Target provides storage to a SQL server, the SQL server will be the iSCSI initiator in this deployment. 

Target: It is an object which allows the iSCSI initiator to make a connection. The Target keeps track of the initiators which are allowed to be connected to it. The Target also keeps track of the iSCSI virtual disks which are associated with it. Once the initiator establishes the connection to the Target, all the iSCSI virtual disks associated with the Target will be accessible by the initiator. 

Q13. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1. Server1 

has the IP Address Management (IPAM) Server feature installed. 

On Dc1, you configure Windows Firewall to allow all of the necessary inbound ports for 

IPAM. 

On Server1, you open Server Manager as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can use IPAM on Server1 to manage DNS on DC1. 

What should you do? 

A. Modify the outbound firewall rules on Server1. 

B. Modify the inbound firewall rules on Server1. 

C. Add Server1 to the Remote Management Users group. 

D. Add Server1 to the Event Log Readers group. 

Answer:

Explanation: 

To access configuration data and server event logs, the IPAM server must be a member of the domain IPAM Users Group (IPAMUG). The IPAM server must also be a member of the Event Log Readers security group. 

Note: The computer account of the IPAM server must be a member of the Event Log Readers security group. 

Reference: Manually Configure DC and NPS Access Settings. http://technet.microsoft.com/en-us/library/jj878317.aspx http://technet.microsoft.com/en-us/library/jj878313.aspx

Q14. You have a server named Server1 that runs Windows Server 2012 R2. The storage on Server1 is configured as shown in the following table. 

You plan to implement Data Deduplication on Server1. 

You need to identify on which drives you can enable Data Deduplication. 

Which three drives should you identify? (Each correct answer presents part of the solution. Choose three.) 

A. C 

B. D 

C. E 

D. F 

E. G 

Answer: B,D,E 

Explanation: 

Volumes that are candidates for deduplication must conform to the following requirements: 

* Must not be a system or boot volume. (not A) 

* Can be partitioned as a master boot record (MBR) or a GUID Partition Table (GPT), and must be formatted using the NTFS file system. (not C) 

* Can reside on shared storage, such as storage that uses a Fibre Channel or an SAS array, or when an iSCSI SAN and Windows Failover Clustering is fully supported. 

* Do not rely on Cluster Shared Volumes (CSVs). You can access data if a deduplication-enabled volume is converted to a CSV, but you cannot continue to process files for deduplication. 

* Do not rely on the Microsoft Resilient File System (ReFS). 

* Must be exposed to the operating system as non-removable drives. Remotely-mapped drives are not supported. 

Ref: Plan to Deploy Data Deduplication http://technet.microsoft.com/en-us/library/hh831700.aspx 

Q15. DRAG DROP 

Your network contains an Active Directory domain named adatum.com. The domain contains three servers. The servers are configured as shown in the following table. 

Server1 is configured as shown in the exhibit. (Click the Exhibit button.) 

Template1 contains custom cryptography settings that are required by the corporate security team. 

On Server2, an administrator successfully installs a certificate based on Template1. 

The administrator reports that Template1 is not listed in the Certificate Enrollment wizard on Server3, even after selecting the Show all templates check box. 

You need to ensure that you can install a server authentication certificate on Server3. The certificate must comply with the cryptography requirements. 

Which three actions should you perform in sequence? 

To answer, move the appropriate three actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer:  

Q16. Your network contains an Active Directory domain named adatum.com. The domain contains a file server named FS1 that runs Windows Server 2012 R2 and has the File Server Resource Manager role service installed. All client computers run Windows 8. 

File classification and Access-Denied Assistance are enabled on FS1. 

You need to ensure that if users receive an Access Denied message, they can request assistance by email from the Access Denied dialog box. 

What should you configure? 

A. A file management task 

B. A classification property 

C. The File Server Resource Manager Options 

D. A report task 

Answer:

Explanation: 

You can configure access-denied assistance individually on each file server by using the File Server Resource Manager console. 

Note: 

To configure access-denied assistance by using File Server Resource Manager 

Open File Server Resource Manager. In Server Manager, click Tools, and then 

click File Server Resource Manager. 

Right-click File Server Resource Manager (Local), and then click Configure 

Options. 

Click the Access-Denied Assistance tab. 

Select the Enable access-denied assistance check box. 

In the Display the following message to users who are denied access to a folder or 

file box, type a message that users will see when they are denied access to a file 

or folder. 

You can add macros to the message that will insert customized text. 

Click Configure email requests, select the Enable users to request assistance 

check box, and then click OK. 

Click Preview if you want to see how the error message will look to the user. 

Click OK. 

Reference: Deploy Access-Denied Assistance (Demonstration Steps) 

START 70-412 EXAM