70-412 Exam - Configuring Advanced Windows Server 2012 Services

certleader.com

Q1. Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory Federation Services server role installed. Server2 is a file server. 

Your company introduces a Bring Your Own Device (BYOD) policy. 

You need to ensure that users can use a personal device to access domain resources by using Single Sign-On (SSO) while they are connected to the internal network. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Enable the Device Registration Service in Active Directory. 

B. Publish the Device Registration Service by using a Web Application Proxy. 

C. Configure Active Directory Federation Services (AD FS) for the Device Registration Service. 

D. Create and configure a sync share on Server2. 

E. Install the Work Folders role service on Server2. 

Answer: A,C 

Explanation: 

* Workplace Join leverages a feature included in the Active Directory Federation Services (AD FS) Role in Windows Server 2012 R2, called Device Registration Service (DRS). DRS provisions a device object in Active Directory when a device is Workplace Joined. Once the device object is in Active Directory, attributes of that object can be retrieved and used to provide conditional access to resources and applications. The device identity is represented by a certificate which is set on the personal device by DRS when the device is Workplace Joined. 

* In Windows Server 2012 R2, AD FS and Active Directory Domain Services have been extended to comprehend the most popular mobile devices and provide conditional access to enterprise resources based on user+device combinations and access policies. With these policies in place, you can control access based on users, devices, locations, and access times. 

Reference: BYOD Basics: Enabling the use of Consumer Devices using Active Directory in Windows Server 2012 R2 

Q2. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1. All servers run Windows Server 2012 R2. 

You install the IP Address Management (IPAM) Server feature on Server1. 

From the Provision IPAM wizard, you select the Group Policy Based provisioning method and enter a GPO name prefix of IPAM1. 

You need to provision IPAM by using Group Policy. 

What command should you run on Server1 to complete the process? To answer, select the appropriate options in the answer area. 

Answer:  

Q3. Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers. The domain controllers are configured as shown in the following table. 

You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in both domains. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Raise the domain functional level of contoso.com. 

B. Raise the domain functional level ofchildl.contoso.com. 

C. Raise the forest functional level of contoso.com. 

D. Upgrade DC11 to Windows Server 2012 R2. 

E. Upgrade DC1 to Windows Server 2012 R2. 

Answer: A,E 

Explanation: 

The root domain in the forest must be at Windows Server 2012 level. First upgrade DC1 to this level (E), then raise the contoso.com domain functional level to Windows Server 2012 (A). 

* (E) To support resources that use claims-based access control, the principal’s domains 

will need to be running one of the following: 

/ All Windows Server 2012 domain controllers. 

/ Sufficient Windows Server 2012 domain controllers to handle all the Windows 8 device 

authentication requests. 

/ Sufficient Windows Server 2012 domain controllers to handle all the Windows Server 

2012 resource protocol transition requests to support non-Windows 8 devices. 

Reference: What's New in Kerberos Authentication 

http://technet.microsoft.com/en-us/library/hh831747.aspx. 

Q4. Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Rights Management Services server role installed. 

Your company works with a partner organization that does not have its own Active Directory Rights Management Services (AD RMS) implementation. 

You need to create a trust policy for the partner organization. 

The solution must meet the following requirements: 

. Grant users in the partner organization access to protected content. . Provide users in the partner organization with the ability to create protected content. 

Which type of trust policy should you create? 

A. A federated trust 

B. Windows Live ID 

C. A trusted publishing domain 

D. A trusted user domain 

Answer:

Explanation: 

In AD RMS rights can be assigned to users who have a federated trust with Active 

Directory Federation Services (AD FS). This enables an organization to share access to 

rights-protected content with another organization without having to establish a separate 

Active Directory trust or Active Directory Rights Management Services (AD RMS) 

infrastructure. 

Incorrect: 

Not C. Trusted publishing domains allow one AD RMS server to issue use licenses that 

correspond with a publishing license issued by another AD RMS server, but in this scenario 

the partner organization does not have any Active Directory. 

Not D. A trusted user domain, often referred as a TUD, is a trust between AD RMS 

clusters, but in this scenario the partner organization does not have any Active Directory. 

Reference: AD RMS and AD FS Considerations 

http://technet.microsoft.com/en-us/library/dd772651(v=WS.10).aspx 

Q5. HOTSPOT 

Your network contains two Hyper-V hosts that are configured as shown in the following table. 

You create a virtual machine on Server1 named VM1. 

You plan to export VM1 from Server1 and import VM1 to Server2. 

You need to ensure that you can start the imported copy of VM1 from snapshots. 

What should you configure on VM1? 

To answer, select the appropriate node in the answer area. 

Answer:  

Q6. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

Server1 is an enterprise root certification authority (CA) for contoso.com. 

You need to ensure that the members of a group named Group1 can request code signing certificates. The certificates must be issued automatically to the members. 

Which two actions should you perform? (Each correct answer presents part of the solution. 

Choose two.) 

A. From Certificate Templates, modify the certificate template. 

B. From Certification Authority, add a certificate template to be issued. 

C. From Certificate Authority, modify the CA properties. 

D. From Certificate Templates, duplicate a certificate template. 

E. From Certificate Authority, stop and start the Active Directory Certificate Services (AD CS) service. 

Answer: A,D 

Explanation: 

Explanation/Reference: 

Best Practices include: Duplicate new templates from existing templates closest in function 

to the intended template. 

New certificate templates are duplicated from existing templates. Many settings are copied 

from the original template. Because of this, duplicating one template to another of a totally 

different type may carry over some unintended settings. When duplicating a template, 

examine the subject type of the original template and ensure that you duplicate one that 

has a similar function to that of the intended template. Although most settings for certificate 

templates can be edited once the template is duplicated, the subject type cannot be 

changed. 

Reference: Deploying Certificate Templates 

https://technet.microsoft.com/en-us/library/cc770794%28v=ws.10%29.aspx 

Q7. Your network contains an Active Directory domain named contoso.com. 

A previous administrator implemented a Proof of Concept installation of Active Directory 

Rights Management Services (AD RMS). 

After the proof of concept was complete, the Active Directory Rights Management Services 

server role was removed. 

You attempt to deploy AD RMS. 

During the configuration of AD RMS, you receive an error message indicating that an 

existing AD RMS Service Connection Point (SCP) was found. 

You need to remove the existing AD RMS SCP. 

Which tool should you use? 

A. Active Directory Users and Computers 

B. Authorization Manager 

C. Active Directory Domains and Trusts 

D. Active Directory Sites and Services 

E. Active Directory Rights Management Services 

Answer:

Explanation: 

ADRMS will registered the Service Connection Point (SCP) in Active Directory and you will need to unregister first before you remove the ADRMS server role. 

If your ADRMS server is still alive, you can easily manually remove the SCP by below: 

http://www.rickygao.com/wp-content/uploads/2013/08/080513_1308_Howtomanual1.png 

http://www.rickygao.com/wp-content/uploads/2013/08/080513_1308_Howtomanual2.png Reference: How to manually remove or reinstall ADRMS 

Q8. Your company has a main office and a remote office. The remote office is used for disaster recovery. 

The network contains an Active Directory domain named contoso.com. The domain contains member servers named Server1, Server2, Server3, and Server4. All servers run Windows Server 2012 R2. 

Server1 and Server2 are located in the main office. Server3 and Server4 are located in the remote office. 

All servers have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Storage is replicated between the main office and the remote site. 

You need to ensure that Cluster1 is available if two nodes in the same office fail. 

What are two possible quorum configurations that achieve the goal? (Each correct answer presents a complete solution. Choose two.) 

A. No Majority: Disk Only 

B. Node Majority 

C. Node and File Share Majority 

D. Node and Disk Majority 

Answer: A,B 

Explanation: 

Depending on the quorum configuration option that you choose and your specific settings, the cluster will be configured in one of the following quorum modes: 

* (A) No majority (disk witness only) 

* (B) Node majority (no witness) 

* Node majority with witness (disk or file share) 

Reference: Configure and Manage the Quorum in a Windows Server 2012 R2 Failover Cluster 

Q9. HOTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. 

You are configuring a storage space on Server1. 

You need to ensure that the storage space supports tiered storage. 

Which settings should you configure? 

To answer, select the appropriate options in the answer area. 

Answer:  

Q10. Your network contains an Active Directory domain named contoso.com. The network contains a file server named Server1 that runs Windows Server 2012 R2. 

You are configuring a central access policy for temporary employees. 

You enable the Department resource property and assign the property a suggested value of Temp. 

You need to configure a target resource condition for the central access rule that is scoped to resources assigned to Temp only. 

Which condition should you use? 

A. (Temp.Resource Equals "Department") 

B. (Resource.Temp Equals "Department") 

C. (Resource.Department Equals "Temp") 

D. (Department.Value Equals "Temp") 

Answer:

Explanation: 

Example: 

Targeting: Resource.Department Contains Finance 

Access rule: Allow read User.Country=Resource.Country AND User.department = 

Resource.Department 

Reference: Deploy a Central Access Policy (Demonstration Steps)