70-412 Exam - Configuring Advanced Windows Server 2012 Services

certleader.com

Q1. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA). 

All users in the domain are issued a smart card and are required to log on to their domain-joined client computer by using their smart card. 

A user named User1 resigned and started to work for a competing company. 

You need to prevent User1 immediately from logging on to any computer in the domain. The solution must not prevent other users from logging on to the domain. 

Which tool should you use? 

A. Active Directory Users and Computers 

B. Server Manager 

C. The Certificates snap-in 

D. Active Directory Administrative Center 

Answer:

Explanation: 

To disable or enable a user account using Active Directory Administrative Center 

1. To open Active Directory Administrative Center, click Start , click Administrative Tools , 

and then click Active Directory Administrative Center . 

To open Active Directory Users and Computers in Windows Server 2012, click Start , type 

dsac.exe. 

2. In the navigation pane, select the node that contains the user account whose status you 

want to change. 

3. In the management list, right-click the user whose status you want to change. 

4. Depending on the status of the user account, do one of the following: . uk.co.certification.simulator.questionpool.PList@ef38f20 

Reference: Disable or Enable a User Account 

Q2. Your network contains two servers named HV1 and HV2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. 

HV1 hosts 25 virtual machines. The virtual machine configuration files and the virtual hard disks are stored in D:\VM. 

You shut down all of the virtual machines on HV1. 

You copy D:\VM to D:\VM on HV2. 

You need to start all of the virtual machines on HV2. You want to achieve this goal by using the minimum amount of administrative effort. 

What should you do? 

A. Run the Import-VMInitialReplication cmdlet. 

B. From HV1, export all virtual machines to D:\VM. Copy D:\VM to D:\VM on HV2 and overwrite the existing files. On HV2, run the Import Virtual Machine wizard. 

C. From HV1, export all virtual machines to D:\VM. Copy D:\VM to D:\VM on HV2 and overwrite the existing files. On HV2, run the New Virtual Machine wizard. 

D. Run the Import-VM cmdlet. 

Answer:

Explanation: 

Import-VM 

Imports a virtual machine from a file. 

Example 

Imports the virtual machine from its configuration file. The virtual machine is registered in-

place, so its files are not copied. 

Windows PowerShell 

PS C:\> Import-VM –Path 'D:\Test\VirtualMachines\5AE40946-3A98-428E-8C83-081A3C6BD18C.XML' 

Reference: Import-VM 

Q3. You have a cluster named Cluster1 that contains two nodes. Both nodes run Windows Server 2012 R2. Cluster1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. 

You configure a custom service on VM1 named Service1. 

You need to ensure that VM1 will be moved to a different node if Service1 fails. 

Which cmdlet should you run on Cluster1? 

A. Add-ClusterVmMonitoredItem 

B. Set-ClusterResourceDependency 

C. Enable- VmResourceMetering 

D. Add-ClusterGenericServiceRole 

Answer:

Explanation: 

* The Add-ClusterVMMonitoredItem cmdlet configures monitoring for a service or an Event Tracing for Windows (ETW) event so that it is monitored on a virtual machine. If the service fails or the event occurs, then the system responds by taking an action based on the failover configuration for the virtual machine resource. For example, the configuration might specify that the virtual machine be restarted or failover. 

* The decision on whether to failover or restart on the same node is configurable and determined by the failover properties for the virtual machine. 

Reference: Add-ClusterVMMonitoredItem 

Q4. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. 

You add two additional nodes to Cluster1. 

You have a folder named Folder1 on Server1 that contains Application data. 

You plan to provide continuously available access to Folder1. 

You need to ensure that all of the nodes in Cluster1 can actively respond to the client requests for Folder1. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer:

Explanation: 

Scale-Out File Server is a feature that is designed to provide scale-out file shares that are continuously available for file-based server application storage. Scale-out file shares provides the ability to share the same folder from multiple nodes of the same cluster. 

Note: You can deploy and configure a clustered file server by using either of the following methods: 

* Scale-Out File Server for Application data (Scale-Out File Server) 

* File Server for general use 

Scale-Out File Server for Application data (Scale-Out File Server) This clustered file server is introduced in Windows Server 2012 R2 and lets you store server Application data, such as Hyper-V virtual machine files, on file shares, and obtain a similar level of reliability, availability, manageability, and high performance that you would expect from a storage area network. All file shares are online on all nodes simultaneously. File shares associated with this type of clustered file server are called scale-out file shares. This is sometimes referred to as active-active. 

Reference: Scale-Out File Server for Application Data Overview 

http://technet.microsoft.com/en-us/library/hh831349.aspx 

Q5. Your network contains one Active Directory domain named contoso.com. The domain contains three users named User1, User2, and User3. 

You need to ensure that the users can log on to the domain by using the user principal names (UPNs) shown in the following table. 

What should you use? 

A. the Set-ADDomain cmdlet 

B. the Add-DNSServerSecondaryZone cmdlet 

C. the Setspn command 

D. the Set-ADUser cmdlet 

Answer:

Reference: Technet, Set-ADUser https://technet.microsoft.com/en-us/library/ee617215.aspx 

Q6. HOTSPOT 

You have a file server named Server1 that runs Windows Server 2012 R2. 

Server1 contains a file share that must be accessed by only a limited number of users. 

You need to ensure that if an unauthorized user attempts to access the file share, a custom access-denied message appears, which contains a link to request access to the share. The message must not appear when the unauthorized user attempts to access other shares. 

Which two nodes should you configure in File Server Resource Manager? To answer, select the appropriate two nodes in the answer area. 

Answer:  

Q7. You have a server named Server1 that runs Windows Server 2012 R2. 

Server1 has a single volume that is encrypted by using BitLocker Drive Encryption 

(BitLocker). 

BitLocker is configured to save encryption keys to a Trusted Platform Module (TPM). 

Server1 is configured to perform a daily system image backup. 

The motherboard on Server1 is upgraded. 

After the upgrade, Windows Server 2012 R2 on Server1 fails to start. 

You need to start the operating system on Server1 as soon as possible. 

What should you do? 

A. Start Server1 from the installation media. Run startrec.exe. 

B. Move the disk to a server that has a model of the old motherboard. Start the server from the installation media. Run bcdboot.exe. 

C. Move the disk to a server that has a model of the old motherboard. Start the server. Run tpm.msc. 

D. Start Server1 from the installation media. Perform a system image recovery. 

Answer:

Explanation: 

By moving the hard drive to server with that has a model of the old motherboard the system 

would be able to start. As BitLocker was configured to save encryption keys to a Trusted 

Platform Module (TPM), we can use tpm.msc to access the TPM settings. 

Note: After you replaced the motherboard, you need to repopulate the TPM with new 

information regarding the encryption of the hard disk. 

We use these commands to repopulate the information in the TPM (without PIN): 

manage-bde –delete -protectors C: -type TPM 

manage-bde –protectors –add C: -tpm 

Incorrect: 

Not D. After the system image recovery you would still have the new motherboard installed. 

The problem would return. 

Reference: BitLocker - New motherboard replacement 

Q8. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 has the IP Address Management (IPAM) Server feature installed. 

A technician performs maintenance on Server1. 

After the maintenance is complete, you discover that you cannot connect to the IPAM server on Server1. 

You open the Services console as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can connect to the IPAM server. 

Which service should you start? 

A. Windows Process Activation Service 

B. Windows Event Collector 

C. Windows Internal Database 

D. Windows Store Service (WSService) 

Answer:

Explanation: 

Explanation Windows Internal Database 

Windows Internal Database is a relational data store that can be used only by Windows 

roles and features. 

IPAM does not support external databases. Only a Windows Internal Database is 

supported. 

IPAM stores 3 years of forensics data (IP address leases, host MAC addresses, user 

login/logoff information) for 100,000 users in a Windows Internal Database. There is no 

database purge policy provided, and the administrator must purge data manually as 

needed. 

Incorrect: 

Not A. IPAM works even if the Windows Process Activation Service is not running. 

Not B. IPAM does not require the Windows Event Collector Service. It need to be running 

on the managed DC/DNS/DHCP computers. 

Not D. IPAM does not require the Windows Store Service. It provides infrastructure support 

for Windows Store.This service is started on demand and if disabled applications bought 

using Windows Store will not behave correctly. 

Reference: IPAM Deployment Planning 

Q9. Your network contains two Active Directory forests named contoso.com and corp.contoso.com. 

User1 is a member of the DnsAdmins domain local group in contoso.com. 

User1 attempts to create a conditional forwarder to corp.contoso.com but receive an error message shown in the exhibit. (Click the Exhibit button.) 

You need to configure bi-directional name resolution between the two forests. 

What should you do first? 

A. Add User1 to the DnsUpdateProxy group. 

B. Configure the zone to be Active Directory-integrated. 

C. Enable the Advanced view from DNS Manager. 

D. Run the New Delegation Wizard. 

Answer:

Explanation: 

The zone must be Active Directory-integrated. 

Q10. Your company recently deployed a new Active Directory forest named contoso.com. The forest contains two Active Directory sites named Site1 and Site2. The first domain controller in the forest runs Windows Server 2012 R2. 

You need to force the replication of the SYSVOL folder from Site1 to Site2. 

Which tool should you use? 

A. Active Directory Sites and Services 

B. DFS Management 

C. Repadmin 

D. Dfsrdiag 

Answer:

Explanation: 

In Windows Server 2012 R2, Windows Server 2008 R2, or Windows Server 2008, you can force replication immediately by using DFS Management, as described in Edit Replication Schedules. You can also force replication by using the Dfsrdiag SyncNow command. You can force polling by using the Dfsrdiag PollAD command. 

Reference: DFS Replication: Frequently Asked Questions (FAQ) 

http://technet.microsoft.com/en-us/library/cc773238(v=ws.10).aspx#BKMK_072