70-412 Exam - Configuring Advanced Windows Server 2012 Services

certleader.com

Q1. Your network contains an Active Directory domain named contoso.com. 

A previous administrator implemented a Proof of Concept installation of Active Directory Rights Management Services (AD RMS) on a server named Server1. 

After the proof of concept was complete, the Active Directory Rights Management Services server role was removed. 

You attempt to deploy AD RMS. 

During the configuration of AD RMS, you receive an error message indicating that an existing AD RMS Service Connection Point (SCP) was found. 

You need to ensure that clients will only attempt to establish connections to the new AD RMS deployment. 

Which should you do? 

A. From DNS, remove the records for Server1. 

B. From DNS, increase the priority of the DNS records for the new deployment of AD RMS. 

C. From Active Directory, remove the computer object for Server1. 

D. From Active Directory, remove the SCP. 

Answer:

Explanation: The Active Directory Rights Management Services (AD RMS) Service Connection Point (SCP) is an object in Active Directory that holds the web address of the AD RMS certification cluster. AD RMS-enabled applications use the SCP to discover the AD RMS service; it is the first connection point for users to discover the AD RMS web services. 

Only one SCP can exist in your Active Directory forest. If you try to install AD RMS and an SCP already exists in your forest from a previous AD RMS installation that was not properly deprovisioned, the new SCP will not install properly. It must be removed before you can establish the new SCP. 

Reference: The AD RMS Service Connection Point 

http://social.technet.microsoft.com/wiki/contents/articles/710.the-ad-rms-service-connection-point.aspx 

Q2. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DNS Server server role installed. 

The network contains client computers that run either Linux, Windows 7, or Windows 8. 

You have a standard primary zone named adatum.com as shown in the exhibit. (Click the Exhibit button.) 

You plan to configure Name Protection on all of the DHCP servers. 

You need to configure the adatum.com zone to support Name Protection. 

Which two configurations should you perform from DNS Manager? (Each correct answer presents part of the solution. Choose two.) 

A. Sign the zone. 

B. Store the zone in Active Directory. 

C. Modify the Security settings of the zone. 

D. Configure Dynamic updates. 

E. Add a DNS key record 

Answer: B,D 

Explanation:

Name protection requires secure update to work. Without name protection DNS names may be hijacked.

You can use the following procedures to allow only secure dynamic updates for a zone.

Secure dynamic update is supported only for Active Directory–integrated zones. If the zone type is configured differently, you must change the zone type and directory-integrate the zone before securing it for Domain Name System (DNS) dynamic updates.

1. (B) Convert primary DNS server to Active Directory integrated primary

2. (D) Enable secure dynamic updates

Reference: DHCP: Secure DNS updates should be configured if Name Protection is enabled on any IPv4 scope

http://technet.microsoft.com/en-us/library/ee941152(v=ws.10).aspx

Q3. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. Server1 is configured to resolve single-label names for DNS clients. 

You need to view the number of queries for single-label names that are resolved by Server1. 

What command should you run? 

To answer, select the appropriate options in the answer area. 

Answer:  

Q4. Your network contains an Active Directory forest named contoso.com. 

Users frequently access the website of an external partner company. The URL of the website is http://partners.adatum.com. 

The partner company informs you that it will perform maintenance on its Web server and that the IP addresses of the Web server will change. 

After the change is complete, the users on your internal network report that they fail to access the website. However, some users who work from home report that they can access the website. 

You need to ensure that your DNS servers can resolve partners.adatum.com to the correct IP address immediately. 

What should you do? 

A. Run Set-DnsServerScavenging. 

B. Run ipconfig and specify the FlushDns parameter. 

C. RunSet-DnsServerResourceReeordAging. 

D. Run dnscmd and specify the ClearCache parameter. 

Answer:

Explanation: 

Clear the DNS cache on the DNS server with either Dnscmd /ClearCache (from command prompt) or Clear-DnsServerCache (from Windows PowerShell). 

Reference: Technet, Dnscmd 

Q5. Your network contains an Active Directory forest named adatum.com. The forest contains an Active Directory Rights Management Services (AD RMS) cluster. 

A partner company has an Active Directory forest named litwareinc.com. The partner company does not have AD RMS deployed. 

You need to ensure that users in litwareinc.com can consume rights-protected content from adatum.com. 

Which type of trust policy should you create? 

A. At federated trust 

B. A trusted user domain 

C. A trusted publishing domain 

D. Windows Live ID 

Answer:

Explanation: 

In AD RMS rights can be assigned to users who have a federated trust with Active Directory Federation Services (AD FS). This enables an organization to share access to rights-protected content with another organization without having to establish a separate Active Directory trust or Active Directory Rights Management Services (AD RMS) infrastructure. 

Reference: AD RMS and AD FS Considerations 

http://technet.microsoft.com/en-us/library/dd772651(v=WS.10).aspx 

Q6. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. All client computers run Windows 8. 

You need to configure a custom Access Denied message that will be displayed to users when they are denied access to folders or files on Server1. 

What should you configure? 

A. A classification property 

B. The File Server Resource Manager Options 

C. A file management task 

D. A file screen template 

Answer:

Explanation: 

Access-denied assistance can be configured by using the File Server Resource Manager console on the file server. 

Note: Access-denied assistance is a new feature in Windows Server 2012, which provides the following ways to troubleshoot issues that are related to access to files and folders: 

* Self-assistance. If a user can determine the issue and remediate the problem so that they can get the requested access, the impact to the business is low, and no special exceptions are needed in the central access policy. Access-denied assistance provides an access-denied message that file server administrators can customize with information specific to their organizations. For example, an administrator could set the message so that users can request access from a data owner without involving the file server administrator. 

Reference: Scenario: Access-Denied Assistance 

Q7. You have a virtual machine named VM1 that runs on a host named Host1. 

You configure VM1 to replicate to another host named Host2. Host2 is located in the same physical location as Host1. 

You need to add an additional replica of VM1. The replica will be located in a different physical site. 

What should you do? 

A. From VM1 on Host2, click Extend Replication. 

B. On Host1, configure the Hyper-V settings. 

C. From VM1 on Host1, click Extend Replication. 

D. On Host2, configure the Hyper-V settings. 

Answer:

Explanation: 

Extend Replication through UI: 

Before you Extend Replication to third site, you need to establish the replication between a primary server and replica server. Once that is done, go to replica site and from Hyper-V UI manager select the VM for which you want to extend the replication. Right click on VM and select “Replication->Extend Replication …”. This will open Extend Replication Wizard which is similar to Enable Replication Wizard. 

NOTE: You configure a server to receive replication with Hyper-V Manager, in this situation the replica site is assumed to be the Replica Server. Therefore you extend replication from VM1 on Host2. 

Note 2: With Hyper-V Extend Replication feature in Windows Server 2012 R2, customers can have multiple copies of data to protect them from different outage scenarios. For example, as a customer I might choose to keep my second DR site in the same campus or a few miles away while I want to keep my third copy of data across the continents to give added protection for my workloads. Hyper-V Replica Extend replication exactly addresses this problem by providing one more copy of workload at an extended site apart from replica site. 

Reference: Hyper-V Replica: Extend Replication 

http://blogs.technet.com/b/virtualization/archive/2013/12/10/hyper-v-replica-extend-replication.aspx

Q8. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC2 that runs Windows Server 2012 R2. DC2 has the DHCP Server server role installed. 

DHCP is configured as shown in the exhibit. (Click the Exhibit button.) 

You discover that client computers cannot obtain IPv4 addresses from DC2. 

You need to ensure that the client computers can obtain IPv4 addresses from DC2. 

What should you do? 

A. Disable the Deny filters. 

B. Enable the Allow filters. 

C. Authorize DC2. 

D. Restart the DHCP Server service 

Answer:

Explanation: 

From the exhibit we see a red marker on the IPv4 server icon. The DHCP server is not 

authorized. 

Authorize DHCP Server 

The final step is to authorize the server. 

Right-click your FQDN and select Authorize. 

Refresh the view by right-clicking your FQDN and selecting Refresh. 

You should now see green check mark next to IPv4. 

Example: 

Reference: Server 2012 DHCP Server Role 

Q9. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. 

You need to store the contents of all the DNS queries received by Server1. 

What should you configure? 

A. Logging from Windows Firewall with Advanced Security 

B. Debug logging from DNS Manager 

C. A Data Collector Set (DCS) from Performance Monitor 

D. Monitoring from DNS Manager 

Answer:

Explanation: 

Debug logging allows you to log the packets sent and received by a DNS server. Debug logging is disabled by default, and because it is resource intensive, you should only activate it temporarily when you need more specific detailed information about server performance. 

Reference: Active Directory 2008: DNS Debug Logging Facts… 

Q10. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. 

You need to deploy a certification authority (CA) to Server1. The CA must support the auto-enrollment of certificates. 

Which two cmdlets should you run? (Each correct answer presents part of the solution. 

Choose two.) 

A. Add-CAAuthoritylnformationAccess 

B. Install-AdcsCertificationAuthority 

C. Add-WindowsFeature 

D. Install-AdcsOnlineResponder 

E. Install-AdcsWebEnrollment 

Answer: B,E 

Explanation: 

Explanation 

B. The Install-AdcsCertificationAuthority cmdlet performs installation and configuration of 

the AD CS CA role service. It can be used to install a root CA. 

Example: 

Install-AdcsCertificationAuthority –CAType StandaloneRootCA –CACommonName 

"ContosoRootCA" –KeyLength 2048 –HashAlgorithm SHA1 –CryptoProviderName 

"RSA#Microsoft Software Key Storage Provider" 

E: The Install-AdcsWebEnrollment cmdlet performs initial installation and configuration of 

the Certification Authority Web Enrollment role service. 

Note: Prior to the availability of Certificate Enrollment Web Services, AD CS required that client computers configured for certificate auto-enrollment be connected directly to the corporate network. Certificate Enrollment Web Services allows organizations to enable AD CS using a perimeter network. This allows users and computers outside the corporate network to enroll for certificates. 

Certificate Enrollment web service 

Reference: Deploying AD CS Using Windows PowerShell