70-412 Exam - Configuring Advanced Windows Server 2012 Services

certleader.com

Q1. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You have a failover cluster named Cluster1 that contains two nodes named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. 

You plan to create two virtual machines that will run an application named App1. App1 will store data on a virtual hard drive named App1data.vhdx. App1data.vhdx will be shared by both virtual machines. 

The network contains the following shared folders: 

An SMB file share named Share1 that is hosted on a Scale-Out File Server. An SMB file share named Share2 that is hosted on a standalone file server. An NFS share named Share3 that is hosted on a standalone file server. 

You need to ensure that both virtual machines can use App1data.vhdx simultaneously. 

What should you do? 

To answer, select the appropriate configurations in the answer area. 

Answer:  

Q2. Your network contains one Active Directory forest named contoso.com. The forest contains two child domains and six domain controllers. The domain controllers are configured as shown in the following table. 

You need to prevent administrators from accidentally deleting any of the sites in the forest. What should you use? 

A. Set-ADSite 

B. Set-ADReplicationSite 

C. Set-ADDomain 

D. Set-ADReplicationSiteLink 

E. Set-ADGroup 

F. Set-ADForest 

G. Netdom 

Answer:

Explanation: The Set-ADReplicationSite sets the replication properties for an Active 

Directory site. 

Parameter: -ProtectedFromAccidentalDeletion<Boolean> 

Specifies whether to prevent the object from being deleted. When this property is set to 

$True, you cannot delete the corresponding object without changing the value of the 

property. The acceptable values for this parameter are: 

-- $False or 0 

-- $True or 1 

Reference: Technet, Set-ADReplicationSite 

https://technet.microsoft.com/en-us/library/hh852305(v=wps.630).aspx 

Q3. DRAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains four member servers named Server1, Server2, Server3, and Server4. Server1 and Server2 run Windows Server 2008 R2. 

Server1 and Server2 have the Hyper-V server role and the Failover Clustering feature installed. Failover 

Clustering is configured to provide highly available virtual machines by using a cluster 

named Cluster1. 

Cluster1 hosts 10 virtual machines. 

Server3 and Server4 run Windows Server 2012 R2. 

You install the Hyper-V server role and the Failover Clustering feature on Server3 and Server4. You create a cluster named Cluster2. 

You need to migrate cluster resources from Cluster1 to Cluster2. The solution must minimize downtime on the virtual machines. 

Which five actions should you perform? 

To answer, move the appropriate five actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer:  

Q4. HOTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. The volumes on Server1 are configured as shown in the following table. 

A new corporate policy states that backups must use Windows Azure Online Backup whenever possible. 

You need to identify which backup methods you must use to back up Server1. The solution must use Windows Azure Online Backup whenever possible. 

Which backup type should you identify for each volume? 

To answer, select the appropriate backup type for each volume in the answer area. 

Answer:  

Q5. You have a server named Server1 that runs Windows Server 2012 R2. 

Each day, Server1 is backed up fully to an external disk. 

On Server1, the disk that contains the operating system fails. 

You replace the failed disk. 

You need to perform a bare-metal recovery of Server1 by using the Windows Recovery 

Environment (Windows RE). 

What should you use? 

A. The Wbadmin.exe command 

B. The Repair-bde.exe command 

C. The Get-WBBareMetalRecovery cmdlet 

D. The Start-WBVolumeRecovery cmdlet 

Answer:

Explanation: 

Wbadmin enables you to back up and restore your operating system, volumes, files, folders, and applications from a command prompt. 

Wbadmin start sysrecovery runs a recovery of the full system (at least all the volumes that contain the operating system's state). This subcommand is only available if you are using the Windows Recovery Environment. 

* Wbadmin start sysrecovery -backupTarget Specifies the storage location that contains the backup or backups that you want to recover. This parameter is useful when the storage location is different from where backups of this computer 

Incorrect: 

Not B. Accesses encrypted data on a severely damaged hard disk if the drive was 

encrypted by using BitLocker. Repair-bde can reconstruct critical parts of the drive and 

salvage recoverable data as long as a valid recovery password or recovery key is used to 

decrypt the data. 

Not C. Gets the value that indicates whether the ability to perform bare metal recoveries 

from backups has been added to the backup policy (WBPolicy object). 

Not D. Starts a volume recovery operation. 

Reference: Wbadmin start sysrecovery 

http://technet.microsoft.com/en-us/library/cc742118.aspx 

Q6. HOTSPOT 

Your network contains two application servers that run Windows Server 2012 R2. The application servers have the Network Load Balancing (NLB) feature installed. 

You create an NLB cluster that contains the two servers. 

You plan to deploy an application named App1 to the nodes in the cluster. App1 uses TCP port 8080 and TCP port 8081. 

Clients will connect to App1 by using HTTP and HTTPS via a single reverse proxy. App1 does not use session state information. 

You need to configure a port rule for Appl. The solution must ensure that connections to App1 are distributed evenly between the nodes. 

Which port rule should you use? 

To answer, select the appropriate rule in the answer area. 

Answer:  

Q7. DRAG DROP 

You have a server named Server2 that runs Windows Server 2012 R2. You have storage provisioned on Server2 as shown in the exhibit. (Click the Exhibit button.) 

You need to configure the storage so that it appears in Windows Explorer as a drive letter on Server1. 

Which three actions should you perform in sequence? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer:  

Q8. DRAG DROP 

You have a server that runs Windows Server 2012 R2. 

You create a new work folder named Share1. 

You need to configure Share1 to meet the following requirements: 

Ensure that all synchronized copies of Share1 are encrypted. 

Ensure that clients synchronize to Share1 every 30 minutes. 

Ensure that Share1 inherits the NTFS permissions of the parent folder. 

Which cmdlet should you use to achieve each requirement? 

To answer, drag the appropriate cmdlets to the correct requirements. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q9. HOTSPOT 

You build a test environment. The test environment contains one Active Directory forest. The forest contains a single domain named contoso.com. The domain contains the servers configured as shown in the following table. 

You run the following commands. 

New-ADReplicationSite Site1 New-ADReplicationSite Site2 New-ADReplicationSubnet -Name “192.168.1.0/24” -Site Site1 New-ADReplicationSubnet -Name “192.168.2.0/24” -Site Site2 New-ADReplicationSiteLink -Name “SiteLink1” –SitesIncluded Site1,Site2 -Cost 100 -

ReplicationFrequencyInMinutes 15 

You promote Server3 and Server4 to domain controllers by using the default options. 

Use the drop-down menus to select the answer choice that completes each statement. 

Answer:  

Q10. Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers. 

The domain controllers are configured as shown in the following table. 

You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in the child1.contoso.com domain. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Upgrade DC1 to Windows Server 2012 R2. 

B. Upgrade DC11 to Windows Server 2012 R2. 

C. Raise the domain functional level of childl.contoso.com. 

D. Raise the domain functional level of contoso.com. 

E. Raise the forest functional level of contoso.com. 

Answer: A,D 

Explanation: 

The root domain in the forest must be at Windows Server 2012 level. First upgrade DC1 to this level (A), then raise the contoso.com domain functional level to Windows Server 2012 (D). 

* (A) To support resources that use claims-based access control, the principal’s domains will need to be running one of the following: / All Windows Server 2012 domain controllers / Sufficient Windows Server 2012 domain controllers to handle all the Windows 8 device authentication requests / Sufficient Windows Server 2012 domain controllers to handle all the Windows Server 

2012 resource protocol transition requests to support non-Windows 8 devices. Reference: What's New in Kerberos Authentication http://technet.microsoft.com/en-us/library/hh831747.aspx.