70-412 Exam - Configuring Advanced Windows Server 2012 Services

certleader.com

Q1. HOTSPOT 

Your network contains one Active Directory domain. 

The domain contains an enterprise certification authority (CA). 

You need to ensure that members of a group named Group1 can issue certificates for the 

User certificate template only. 

Which two tabs should you use to perform the configuration? To answer, select the 

appropriate tabs in the answer area. 

Answer:  

Q2. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the IP Address Management (IPAM) Server feature installed. 

You have a support technician named Tech1. Tech1 is a member of the IPAM Administrators group on Server1 and Server2. You need to ensure that Tech1 can use Server Manager on Server1 to manage IPAM on Server2. To which group on Server2 should you add Tech1? To answer, select the appropriate group in the answer area. 

Answer:  

Q3. You have a server named Server1 that runs Windows Server 2012 R2. 

Windows Server 2012 R2 is installed on volume C. 

You need to ensure that Safe Mode with Command Prompt loads the next time Server1 

restarts. 

Which tool should you use? 

A. The Restart-Server cmdlet 

B. The Bootcfg command 

C. The Restart-Computer cmdlet 

D. The Bcdedit command 

Answer:

Explanation: 

How To Force Windows To Restart in Safe Mode 

1. Open Advanced Startup Options in Windows 8 

2. Open Command Prompt. 

3. With Command Prompt open, execute the correct bcdedit command as shown below based on which Safe Mode option you'd like to start: 

Safe Mode: 

bcdedit /set {default} safeboot minimal 

http://pcsupport.about.com/od/repair-recovery/a/force-or-stop-safe-mode-windows.htm 

Q4. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

You need to create an IPv6 scope on Server1. The scope must use an address space that is reserved for private networks. The addresses must be routable. 

Which IPV6 scope prefix should you use? 

A. 2001:123:4567:890A:: 

B. FE80:123:4567:: 

C. FF00:123:4567:890A:: 

D. FD00:123:4567:: 

Answer: D Explanation: 

Explanation/Reference: 

* A unique local address (ULA) is an IPv6 address in the block fc00::/7, defined in RFC 

4193. It is the approximate IPv6 counterpart of the IPv4 private address. 

The address block fc00::/7 is divided into two /8 groups: 

/ The block fc00::/8 has not been defined yet. 

/ The block fd00::/8 is defined for /48 prefixes, formed by setting the 40 least-significant bits 

of the prefix to a randomly generated bit string. 

* Prefixes in the fd00::/8 range have similar properties as those of the IPv4 private address 

ranges: 

/ They are not allocated by an address registry and may be used in networks by anyone 

without outside involvement. 

/ They are not guaranteed to be globally unique. 

/ Reverse Domain Name System (DNS) entries (under ip6.arpa) for fd00::/8 ULAs cannot 

be delegated in the global DNS. 

Reference: RFC 4193 

Q5. DRAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server3. The network contains a standalone server named Server2. 

All servers run Windows Server 2012 R2. The servers are configured as shown in the following table. 

Server3 hosts an application named App1. App1 is accessible internally by using the URL https://app1.contoso.com. App1 only supports Integrated Windows authentication. 

You need to ensure that all users from the Internet are pre-authenticated before they can access App1. 

What should you do? 

To answer, drag the appropriate servers to the correct actions. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q6. Your company has a main office and a branch office. 

The main office contains a file server named Server1. Server1 has the BranchCache for 

Network Files role service installed. The branch office contains a server named Server2. 

Server2 is configured as a BranchCache hosted cache server. 

You need to preload the data from the file shares on Server1 to the cache on Server2. 

What should you run first? 

A. Publish-BCFileContent 

B. Add- BCDataCacheExtension 

C. Set-BCCache 

D. Export-BCCachePackage 

Answer:

Explanation: 

See step 2 below. 

To prehash content and preload the content on hosted cache servers . Log on to the file or Web server that contains the data that you wish to preload, and identify the folders and files that you wish to load on one or more remote hosted cache servers. . Run Windows PowerShell as an Administrator. For each folder and file, run either the Publish-BCFileContent command or the Publish-BCWebContent command, depending on the type of content server, to trigger hash generation and to add data to a data package. . After all the data has been added to the data package, export it by using the Export-BCCachePackage command to produce a data package file. . Move the data package file to the remote hosted cache servers by using your choice of file transfer technology. FTP, SMB, HTTP, DVD and portable hard disks are all viable transports. . Import the data package file on the remote hosted cache servers by using the Import-BCCachePackage command. 

Reference: Prehashing and Preloading Content on Hosted Cache Servers (Optional) 

Q7. You have a datacenter that contains six servers. Each server has the Hyper-V server role installed and runs Windows Server 2012 R2. The servers are configured as shown in the following table. 

Host4 and Host5 are part of a cluster named Cluster1. Cluster1 hosts a virtual machine named VM1. 

You need to move VM1 to another Hyper-V host. The solution must minimize the downtime of VM1. 

To which server and by which method should you move VM1? 

A. To Host3 by using a storage migration 

B. To Host6 by using a storage migration 

C. To Host2 by using a live migration 

D. To Host1 by using a quick migration 

Answer:

Explanation: 

With Hyper-V live migration, you can move running VMs from one Hyper-V physical host to 

another without any disruption of service or perceived downtime. 

Host3 has an Intel processer, as does Host4 and Host5 in Cluster1, so the migration will 

work fine. 

Incorrect: 

Not B, not C. The migration of a virtual machine between physical computers is only 

supported on computers that have the same processor steppings or are from the same 

vendor. Therefore you cannot move a virtual machine from a Hyper-V host on an Intel-

based server to a Hyper-V Host on an AMD-based server. 

Not D. Quick Migration saves, moves and restores VMs, which results in some downtime. 

Reference: Hyper-V Migration Guide 

http://technet.microsoft.com/en-us/library/ee849855(v=WS.10).aspx 

Reference: Virtual Machine Storage Migration Overview 

http://technet.microsoft.com/en-us/library/hh831656.aspx 

Reference: Windows Server 2008 R2 & Microsoft Hyper-V Server 2008 R2 - Hyper-V Live 

Migration Overview & Architecture (http://www.microsoft.com/en-us/download/details.aspx?id=12601) 

Q8. You have a server named LON-DC1 that runs Windows Server 2012 R2. An iSCSI virtual disk named VirtualiSCSI1.vhd exists on LON-DC1 as shown in the exhibit. (Click the Exhibit button.) 

You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt 

iSCSI target. 

VirtualiSCSIl.vhd is removed from LON-DC1. 

You need to assign VirtualiSCSI2.vhd a logical unit value of 0. 

What should you do? 

A. Run the Set-VirtualDisk cmdlet and specify the -Uniqueld parameter. 

B. Run the Add-IscsiVirtualDiskTargetMapping cmdlet and specify the –Lun parameter. 

C. Run the iscsicli command and specify the reportluns parameter. 

D. Run the Set-IscsiVirtualDisk cmdlet and specify the –DevicePath parameter. 

Answer:

Explanation: The Add-IscsiVirtualDiskTargetMapping cmdlet assigns a virtual disk to an 

iSCSI target. Once a virtual disk has been assigned to a target, and after the iSCSi initiator 

connects to that target, the iSCSI initiator can access the virtual disk. All of the virtual disks 

assigned to the same iSCSI target will be accessible by the connected iSCSI initiator. 

Parameter include: -Lun<Int32> 

Specifies the logical unit number (LUN) associated with the virtual disk. By default, the 

lowest available LUN number will be assigned. 

Reference: Add-IscsiVirtualDiskTargetMapping 

https://technet.microsoft.com/en-us/library/jj612800(v=wps.630).aspx 

Q9. HOTSPOT 

Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2. 

Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains an application named App1 that is accessed by using the URL http://app1.contoso.com. 

You deploy a new server named Server3 that runs Windows Server 2012 R2. The contoso.com DNS zone contains the records shown in the following table. 

You need to add Server3 to the NLB cluster. 

What command should you run? 

To answer, select the appropriate options in the answer area. 

Answer:  

Q10. Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains one domain. Contoso.com has a two-way forest trust to adatum.com. Selective authentication is enabled on the forest trust. 

Contoso contains 10 servers that have the File Server role service installed. Users successfully access shared folders on the file servers by using permissions granted to the Authenticated Users group. 

You migrate the file servers to adatum.com. 

Contoso users report that after the migration, they are unable to access shared folders on the file servers. 

You need to ensure that the Contoso users can access the shared folders on the file servers. 

What should you do? 

A. Disable selective authentication on the existing forest trust. 

B. Disable SID filtering on the existing forest trust. 

C. Run netdom and specify the /quarantine attribute. 

D. Replace the existing forest trust with an external trust. 

Answer:

Explanation: 

Although it is not recommended, you can use this procedure to disable security identifier (SID) filter quarantining for an external trust with the Netdom.exe tool. You should consider disabling SID filter quarantining only in the following situations: 

* Users have been migrated to the trusted domain with their SID histories preserved, and you want to grant those users access to resources in the trusting domain (the former domain of the migrated users) based on the sIDHistory attribute. 

Etc. 

Reference: Disabling SID filter quarantining 

http://technet.microsoft.com/en-us/library/cc794713(v=ws.10).aspx