getcertified4sure.com

Top Tips Of 70-412 study guides




Exam Code: 70-412 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Configuring Advanced Windows Server 2012 Services
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-412 Exam.

2021 Apr 70-412 pdf exam

Q1. Your network contains one Active Directory forest named contoso.com. The forest contains two child domains and six domain controllers. The domain controllers are configured as shown in the following table. 

You need to enable universal group membership caching for the Europe office and Asia office sites. 

What should you use? 

A. Set-ADSite 

B. Set-ADReplicationSite 

C. Set-ADDomain 

D. Set-ADReplicationSiteLink 

E. Set-ADGroup 

F. Set-ADForest 

G. Netdom 

Answer:

Explanation: 

https://technet.microsoft.com/en-us/library/hh852305(v=wps.630).aspx 


Q2. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

You add two additional nodes to Cluster1. 

You have a folder named Folder1 on Server1 that contains Application data. 

You plan to provide continuously available access to Folder1. 

You need to ensure that all of the nodes in Cluster1 can actively respond to the client requests for Folder1. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

Scale-Out File Server is a feature that is designed to provide scale-out file shares that are continuously available for file-based server application storage. Scale-out file shares provides the ability to share the same folder from multiple nodes of the same cluster. 

Note: You can deploy and configure a clustered file server by using either of the following methods: 

* Scale-Out File Server for Application data (Scale-Out File Server) 

* File Server for general use 

Scale-Out File Server for Application data (Scale-Out File Server) This clustered file server is introduced in Windows Server 2012 R2 and lets you store server Application data, such as Hyper-V virtual machine files, on file shares, and obtain a similar level of reliability, availability, manageability, and high performance that you would expect from a storage area network. All file shares are online on all nodes simultaneously. File shares associated with this type of clustered file server are called scale-out file shares. This is sometimes referred to as active-active. 

Reference: Scale-Out File Server for Application Data Overview 

http://technet.microsoft.com/en-us/library/hh831349.aspx 


Q3. You have an Active Directory Rights Management Services (AD RMS) cluster. 

You need to prevent users from encrypting new content. The solution must ensure that the users can continue to decrypt content that was encrypted already. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From the Active Directory Rights Management Services console, enable decommissioning. 

B. From the Active Directory Rights Management Services console, create a user exclusion policy. 

C. Modify the NTFS permissions of %systemdrive%\inetpub\wwwroot\_wmcs\licensing. 

D. Modify the NTFS permissions of %systemdrive%\inetpub\wwwroot\_wmcs\decommission. 

E. From the Active Directory Rights Management Services console, modify the rights policy templates. 

Answer: A,D 

Explanation: 

* Decommissioning refers to the entire process of removing the AD RMS cluster and its 

associated databases from an organization. This process allows you to save rights-

protected files as ordinary files before you remove AD RMS from your infrastructure so that 

you do not lose access to these files. 

Decommissioning an AD RMS cluster is achieved by doing the following: 

/ Enable the decommissioning service. (A) 

/ Modify permissions on the decommissioning pipeline. 

/ Configure the AD RMS-enabled application to use the decommissioning pipeline. 

* To modify the permissions on the decommissioning pipeline 

1. Log on to ADRMS-SRV as cpandl\administrator. 

2. Click Start, type %systemdrive%\inetpub\wwwroot\_wmcs in the Start Search box, and 

then press ENTER. 

3. Right-click the decommission folder, and then click Properties. 

4. Click the Security tab, click Edit, and then click Add. (D) 

Etc. 

Reference: Step 1: Decommission AD RMS Root Cluster 


Q4. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest contains three Active Directory sites named SiteA, SiteB, and SiteC. The sites contain four domain controllers. The domain controllers are configured as shown in the following table. 

An IP site link exits between each site. 

You discover that the users in SiteC are authenticated by the domain controllers in SiteA and SiteB. You need to ensure that the SiteC users are authenticated by the domain controllers in 

SiteB, unless all of the domain controllers in SiteB are unavailable. What should you do? 

A. Create an SMTP site link between SiteB and SiteC. 

B. Decrease the cost of the site link between SiteB and SiteC. 

C. Disable site link bridging. 

D. Create additional connection objects for DC1 and DC2. 

Answer:

Explanation: 

By decreasing the site link cost between SiteB and SiteC the SiteC users would be authenticated by SiteB rather than by SiteA. 


Q5. Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers. 

The domain controllers are configured as shown in the following table. 

You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in the child1.contoso.com domain. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Upgrade DC1 to Windows Server 2012 R2. 

B. Upgrade DC11 to Windows Server 2012 R2. 

C. Raise the domain functional level of childl.contoso.com. 

D. Raise the domain functional level of contoso.com. 

E. Raise the forest functional level of contoso.com. 

Answer: A,D 

Explanation: 

The root domain in the forest must be at Windows Server 2012 level. First upgrade DC1 to this level (A), then raise the contoso.com domain functional level to Windows Server 2012 (D). 

* (A) To support resources that use claims-based access control, the principal’s domains will need to be running one of the following: / All Windows Server 2012 domain controllers / Sufficient Windows Server 2012 domain controllers to handle all the Windows 8 device authentication requests / Sufficient Windows Server 2012 domain controllers to handle all the Windows Server 

2012 resource protocol transition requests to support non-Windows 8 devices. Reference: What's New in Kerberos Authentication http://technet.microsoft.com/en-us/library/hh831747.aspx. 


Abreast of the times 70-412 exam price:

Q6. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as an enterprise certification authority (CA). 

You need to ensure that all of the users in the domain are issued a certificate that can be used for the following purposes: 

Email security 

Client authentication 

Encrypting File System (EFS) 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From a Group Policy, configure the Certificate Services Client – Auto-Enrollment settings. 

B. From a Group Policy, configure the Certificate Services Client – Certificate Enrollment Policy settings. 

C. Modify the properties of the User certificate template, and then publish the template. 

D. Duplicate the User certificate template, and then publish the template. 

E. From a Group Policy, configure the Automatic Certificate Request Settings settings. 

Answer: A,D 

Explanation: 

The default user template supports all of the requirements EXCEPT auto enroll as shown below: 

However a duplicated template from users has the ability to autoenroll: 

The Automatic Certificate Request Settings GPO setting is only available to Computer, not user. 

Reference: Manage Certificate Enrollment Policy by Using Group Policy. http://technet.microsoft.com/en-us/library/dd851772.aspx 


Q7. Your network contains an Active Directory domain named contoso.com. 

A previous administrator implemented a Proof of Concept installation of Active Directory 

Rights Management Services (AD RMS). 

After the proof of concept was complete, the Active Directory Rights Management Services 

server role was removed. 

You attempt to deploy AD RMS. 

During the configuration of AD RMS, you receive an error message indicating that an 

existing AD RMS Service Connection Point (SCP) was found. 

You need to remove the existing AD RMS SCP. 

Which tool should you use? 

A. Active Directory Users and Computers 

B. Authorization Manager 

C. Active Directory Domains and Trusts 

D. Active Directory Sites and Services 

E. Active Directory Rights Management Services 

Answer:

Explanation: 

ADRMS will registered the Service Connection Point (SCP) in Active Directory and you will need to unregister first before you remove the ADRMS server role. 

If your ADRMS server is still alive, you can easily manually remove the SCP by below: 

http://www.rickygao.com/wp-content/uploads/2013/08/080513_1308_Howtomanual1.png 

http://www.rickygao.com/wp-content/uploads/2013/08/080513_1308_Howtomanual2.png Reference: How to manually remove or reinstall ADRMS 


Q8. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. The servers have the Hyper-V server role installed. 

A certification authority (CA) is available on the network. 

A virtual machine named vml.contoso.com is replicated from Server1 to Server2. A virtual 

machine named vm2.contoso.com is replicated from Server2 to Server1. 

You need to configure Hyper-V to encrypt the replication of the virtual machines. 

Which common name should you use for the certificates on each server? 

To answer, configure the appropriate common name for the certificate on each server in 

the answer area. 

Answer: 


Q9. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

You add two additional nodes in Cluster1. 

You have a folder named Folder1 on Server1 that hosts Application data. Folder1 is a folder target in a Distributed File System (DFS) namespace. 

You need to provide highly available access to Folder1. The solution must support DFS Replication to Folder1. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

File Server for general use 

Note: You can deploy and configure a clustered file server by using either of the following methods: 

* File Server for general use. This is the continuation of the clustered file server that has been supported in Windows Server since the introduction of Failover Clustering. This type of clustered file server, and therefore all the shares associated with the clustered file server, is online on one node at a time. This is sometimes referred to as active-passive or dual-active. File shares associated with this type of clustered file server are called clustered file shares. This is the recommended file server type when deploying information worker scenarios. 

* Scale-Out File Server for application data This clustered file server feature was introduced in Windows Server 2012, and it lets you store server application data, such as Hyper-V virtual machine files, on file shares, and obtain a similar level of reliability, availability, manageability, and high performance that you would expect from a storage area network. All file shares are simultaneously online on all nodes. File shares associated with this type of clustered file server are called scale-out file shares. This is sometimes referred to as active-active. This is the recommended file server type when deploying either Hyper-V over Server Message Block (SMB) or Microsoft SQL Server over SMB. 

Reference: Scale-Out File Server for Application Data Overview 


Q10. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. 

You need to deploy a certification authority (CA) to Server1. The CA must support the auto-enrollment of certificates. 

Which two cmdlets should you run? (Each correct answer presents part of the solution. 

Choose two.) 

A. Add-CAAuthoritylnformationAccess 

B. Install-AdcsCertificationAuthority 

C. Add-WindowsFeature 

D. Install-AdcsOnlineResponder 

E. Install-AdcsWebEnrollment 

Answer: B,E 

Explanation: 

Explanation 

B. The Install-AdcsCertificationAuthority cmdlet performs installation and configuration of 

the AD CS CA role service. It can be used to install a root CA. 

Example: 

Install-AdcsCertificationAuthority –CAType StandaloneRootCA –CACommonName 

"ContosoRootCA" –KeyLength 2048 –HashAlgorithm SHA1 –CryptoProviderName 

"RSA#Microsoft Software Key Storage Provider" 

E: The Install-AdcsWebEnrollment cmdlet performs initial installation and configuration of 

the Certification Authority Web Enrollment role service. 

Note: Prior to the availability of Certificate Enrollment Web Services, AD CS required that client computers configured for certificate auto-enrollment be connected directly to the corporate network. Certificate Enrollment Web Services allows organizations to enable AD CS using a perimeter network. This allows users and computers outside the corporate network to enroll for certificates. 

Certificate Enrollment web service 

Reference: Deploying AD CS Using Windows PowerShell