Download Configuring Advanced Windows Server 2012 Services.70-412.ExamsKey.2019-02-05.272q.vcex

Vendor: Microsoft
Exam Code: 70-412
Exam Name: Configuring Advanced Windows Server 2012 Services
Date: Feb 05, 2019
File Size: 20 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains one domain. Contoso.com has a two-way forest trust to adatum.com. Selective authentication is enabled on the forest trust. 
Contoso contains 10 servers that have the File Server role service installed. Users successfully access shared folders on the file servers by using permissions granted to the Authenticated Users group. 
You migrate the file servers to adatum.com. 
Contoso users report that after the migration, they are unable to access shared folders on the file servers. 
You need to implement a temporary fix to ensure that the Contoso users can access the shared folders on the file servers. 
What should you do?
  1. Disable selective authentication on the existing forest trust.
  2. Disable SID filtering on the existing forest trust.
  3. Run netdom and specify the /quarantine attribute.
  4. Replace the existing forest trust with an external trust.
Correct answer: B
Explanation:
Although it is not recommended, you can use this procedure to disable security identifier (SID) filter quarantining for an external trust with the Netdom.exe tool. You should consider disabling SID filter quarantining only in the following situations:Users have been migrated to the trusted domain with their SID histories preserved, and you want to grant those users access to resources in the trusting domain (the former domain of the migrated users) based on the sIDHistory attribute. Etc. References: Disabling SID filter quarantininghttps://technet.microsoft.com/en-us/library/cc794713(v=ws.10).aspx
Although it is not recommended, you can use this procedure to disable security identifier (SID) filter quarantining for an external trust with the Netdom.exe tool. You should consider disabling SID filter quarantining only in the following situations:
  • Users have been migrated to the trusted domain with their SID histories preserved, and you want to grant those users access to resources in the trusting domain (the former domain of the migrated users) based on the sIDHistory attribute. 
Etc. 
References: Disabling SID filter quarantining
https://technet.microsoft.com/en-us/library/cc794713(v=ws.10).aspx
Question 2
Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. The functional level of the forest is Windows Server 2003. 
You have a domain outside the forest named adatum.com. 
You need to configure an access solution to meet the following requirements:
  • Users in adatum.com must be able to access resources in contoso.com. 
  • Users in adatum.com must be prevented from accessing resources in fabrikam.com. 
  • Users in both contoso.com and fabrikam.com must be prevented from accessing resources in adatum.com. 
What should you create?
  1. a one-way realm trust from contoso.com to adatum.com
  2. a one-way realm trust from adatum.com to contoso.com
  3. a one-way external trust from contoso.com to adatum.com
  4. a one-way external trust from adatum.com to contoso.com
Correct answer: C
Explanation:
The contoso domain must trust the adatum domain. Note: In a One-way: incoming trust, users in your (trusted) domain can be authenticated in the other (trusting) domain. Users in the other domain cannot be authenticated in your domain.Incorrect Answers:A, B: Use realm trusts to form a trust relationship between a non-Windows Kerberos realm and a Windows Server domain.D: The resources that are to be shared are in the contoso domain.References: Trust types
The contoso domain must trust the adatum domain. 
Note: In a One-way: incoming trust, users in your (trusted) domain can be authenticated in the other (trusting) domain. Users in the other domain cannot be authenticated in your domain.
Incorrect Answers:
A, B: Use realm trusts to form a trust relationship between a non-Windows Kerberos realm and a Windows Server domain.
D: The resources that are to be shared are in the contoso domain.
References: Trust types
Question 3
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest functional level is Windows Server 2012 R2. 
You have a domain controller named DC1. 
On DC1, you create a new Group Policy object (GPO) named GPO1. You need to verify that GPO1 was replicated to all of the domain controllers. 
Which tool should you use?
  1. Group Policy Management
  2. Active Directory Sites and Services
  3. DFS Management
  4. Active Directory Administrative Center
Correct answer: A
Explanation:
In Windows Server 2012, the Group Policy Management Console (GPMC) was enhanced to provide a report for the overall health state of the Group Policy infrastructure for a domain, or to scope the health view to a single GPO. Reference: Check Group Policy Infrastructure Statushttp://technet.microsoft.com/en-us/library/jj134176.aspx
In Windows Server 2012, the Group Policy Management Console (GPMC) was enhanced to provide a report for the overall health state of the Group Policy infrastructure for a domain, or to scope the health view to a single GPO. 
Reference: Check Group Policy Infrastructure Status
http://technet.microsoft.com/en-us/library/jj134176.aspx
Question 4
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. 
You need to deploy a certification authority (CA) to Server1. The CA must support the auto-enrollment of certificates. 
Which two cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)
  1. Add-CAAuthoritylnformationAccess
  2. Install-AdcsCertificationAuthority
  3. Add-WindowsFeature
  4. Install-AdcsOnlineResponder
  5. Install-AdcsWebEnrollment
Correct answer: BE
Explanation:
B. The Install-AdcsCertificationAuthority cmdlet performs installation and configuration of the AD CS CA role service. It can be used to install a root CA. Example:Install-AdcsCertificationAuthority –CAType StandaloneRootCA –CACommonName "ContosoRootCA" –KeyLength 2048 –HashAlgorithm SHA1–CryptoProviderName "RSA#Microsoft Software Key Storage Provider" E: The Install-AdcsWebEnrollment cmdlet performs initial installation and configuration of the Certification Authority Web Enrollment role service.Note: Prior to the availability of Certificate Enrollment Web Services, AD CS required that client computers configured for certificate auto-enrollment be connected directly to the corporate network. Certificate Enrollment Web Services allows organizations to enable AD CS using a perimeter network. This allows users and computers outside the corporate network to enroll for certificates.    Certificate Enrollment web service Reference: Deploying AD CS Using Windows PowerShell
B. The Install-AdcsCertificationAuthority cmdlet performs installation and configuration of the AD CS CA role service. It can be used to install a root CA. 
Example:
Install-AdcsCertificationAuthority –CAType StandaloneRootCA –CACommonName "ContosoRootCA" –KeyLength 2048 –HashAlgorithm SHA1–CryptoProviderName "RSA#Microsoft Software Key Storage Provider" 
E: The Install-AdcsWebEnrollment cmdlet performs initial installation and configuration of the Certification Authority Web Enrollment role service.
Note: Prior to the availability of Certificate Enrollment Web Services, AD CS required that client computers configured for certificate auto-enrollment be connected directly to the corporate network. Certificate Enrollment Web Services allows organizations to enable AD CS using a perimeter network. This allows users and computers outside the corporate network to enroll for certificates.
  
Certificate Enrollment web service 
Reference: Deploying AD CS Using Windows PowerShell
Question 5
Your company recently deployed a new Active Directory forest named contoso.com. The forest contains two Active Directory sites named Site1 and Site2. The first domain controller in the forest runs Windows Server 2012 R2. 
You need to force the replication of the SYSVOL folder from Site1 to Site2. 
Which tool should you use?
  1. Active Directory Sites and Services
  2. DFS Management
  3. Repadmin
  4. Dfsrdiag
Correct answer: D
Explanation:
In Windows Server 2012 R2, Windows Server 2008 R2, or Windows Server 2008, you can force replication immediately by using DFS Management, as described in Edit Replication Schedules. You can also force replication by using the Dfsrdiag SyncNow command. You can force polling by using the Dfsrdiag PollAD command. Reference: DFS Replication: Frequently Asked Questions (FAQ) http://technet.microsoft.com/en-us/library/cc773238(v=ws.10).aspx#BKMK_072
In Windows Server 2012 R2, Windows Server 2008 R2, or Windows Server 2008, you can force replication immediately by using DFS Management, as described in Edit Replication Schedules. You can also force replication by using the Dfsrdiag SyncNow command. You can force polling by using the Dfsrdiag PollAD command. 
Reference: DFS Replication: Frequently Asked Questions (FAQ) 
http://technet.microsoft.com/en-us/library/cc773238(v=ws.10).aspx#BKMK_072
Question 6
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest contains three Active Directory sites named SiteA, SiteB, and SiteC. The sites contain four domain controllers. The domain controllers are configured as shown in the following table. 
  
An IP site link exits between each site. 
You discover that the users in SiteC are authenticated by the domain controllers in SiteA and SiteB. 
You need to ensure that the SiteC users are authenticated by the domain controllers in SiteB, unless all of the domain controllers in SiteB are unavailable. 
What should you do?
  1. Create an SMTP site link between SiteB and SiteC.
  2. Create additional connection objects for DC3 and DC4.
  3. Decrease the cost of the site link between SiteB and SiteC.
  4. Create additional connection objects for DC1 and DC2.
Correct answer: C
Explanation:
By decreasing the site link cost between SiteB and SiteC the SiteC users would be authenticated by SiteB rather than by SiteA. References: https://technet.microsoft.com/en-us/library/dd277430.aspx#XSLTsection126121120120
By decreasing the site link cost between SiteB and SiteC the SiteC users would be authenticated by SiteB rather than by SiteA. 
References: https://technet.microsoft.com/en-us/library/dd277430.aspx#XSLTsection126121120120
Question 7
Your network contains an Active Directory forest. The forest contains one domain named adatum.com. The domain contains four domain controllers. The domain controllers are configured as shown in the following table. 
  
DC2 has all of the domain-wide operations master roles. DC3 has all of the forest-wide operation master roles. 
You need to ensure that you can use Password Settings objects (PSOs) in the domain. 
What should you do first?
  1. Uninstall Active Directory from DC1.
  2. Change the domain functional level.
  3. Transfer the domain-wide operations master roles.
  4. Transfer the forest-wide operations master roles.
Correct answer: A
Explanation:
In Windows Server 2008 and later, you can use fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. Note: In Microsoft Windows 2000 and Windows Server 2003 Active Directory domains, you could apply only one password and account lockout policy, which is specified in the domain's Default Domain Policy, to all users in the domain. As a result, if you wanted different password and account lockout settings for different sets of users, you had to either create a password filter or deploy multiple domains. Both options were costly for different reasons.Reference: AD DS Fine-Grained Password and Account Lockout Policy Step-by-Step Guide
In Windows Server 2008 and later, you can use fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. 
Note: In Microsoft Windows 2000 and Windows Server 2003 Active Directory domains, you could apply only one password and account lockout policy, which is specified in the domain's Default Domain Policy, to all users in the domain. As a result, if you wanted different password and account lockout settings for different sets of users, you had to either create a password filter or deploy multiple domains. Both options were costly for different reasons.
Reference: AD DS Fine-Grained Password and Account Lockout Policy Step-by-Step Guide
Question 8
You have a server named FS1 that runs Windows Server 2012 R2. 
You install the File and Storage Services server role on FS1. 
From Windows Explorer, you view the properties of a shared folder named Share1 and you discover that the Classification tab is missing. 
You need to ensure that you can assign classifications to Share1 from Windows Explorer manually. 
What should you do?
  1. From Folder Options, select Show hidden files, folders, and drives.
  2. From Folder Options, clear Use Sharing Wizard (Recommend).
  3. Install the File Server Resource Manager role service.
  4. Install the Enhanced Storage feature.
Correct answer: C
Explanation:
On the Classification tab of the file properties in Windows Server 2012, File Classification Infrastructure adds the ability to manually classify files. You can also classify folders so that any file added to the classified folder will inherit the classifications of the parent folder. Reference: What's New in File Server Resource Manager in Windows Server
On the Classification tab of the file properties in Windows Server 2012, File Classification Infrastructure adds the ability to manually classify files. You can also classify folders so that any file added to the classified folder will inherit the classifications of the parent folder. Reference: What's New in File Server Resource Manager in Windows Server
Question 9
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are configured as shown in the following table. 
  
You need to ensure that when new targets are added to Server1, the targets are registered on Server2 automatically. 
What should you do on Server1?
  1. Configure the Discovery settings of the iSCSI initiator.
  2. Configure the security settings of the iSCSI target.
  3. Run the Set-WmiInstance cmdlet.
  4. Run the Set-IscsiServerTarget cmdlet.
Correct answer: C
Explanation:
Manage iSNS server registration The iSNS server registration can be done using the following cmdlets, which manages the WMI objects. To add an iSNS server:Set-WmiInstance -Namespace root\wmi -Class WT_iSNSServer Arguments @{ServerName="ISNSservername"} Note: The Set-WmiInstance cmdlet creates or updates an instance of an existing WMI class. The created or updated instance is written to the WMI repository.Reference: iSCSI Target cmdlet referencehttp://blogs.technet.com/b/filecab/archive/2012/06/08/iscsi-target-cmdlet-reference.aspx
Manage iSNS server registration 
The iSNS server registration can be done using the following cmdlets, which manages the WMI objects. 
To add an iSNS server:
Set-WmiInstance -Namespace root\wmi -Class WT_iSNSServer Arguments @{ServerName="ISNSservername"} 
Note: The Set-WmiInstance cmdlet creates or updates an instance of an existing WMI class. The created or updated instance is written to the WMI repository.
Reference: iSCSI Target cmdlet reference
http://blogs.technet.com/b/filecab/archive/2012/06/08/iscsi-target-cmdlet-reference.aspx
Question 10
You have a file server named Server1 that runs Windows Server 2012 R2. 
Server1 contains a file share that must be accessed by only a limited number of users. 
You need to ensure that if an unauthorized user attempts to access the file share, a custom access-denied message appears, which contains a link to request access to the share. The message must not appear when the unauthorized user attempts to access other shares. 
Which two nodes should you configure in File Server Resource Manager? 
To answer, select the appropriate two nodes in the answer area. 
Correct answer: To display the answer, ProfExam Simulator is required.
Explanation:
* Configure access-denied assistance To configure access-denied assistance by using File Server Resource Manager 1. Open File Server Resource Manager. In Server Manager, click Tools, and then click File Server Resource Manager. 2. Right-click File Server Resource Manager (Local), and then click Configure Options. etc. * To specify a separate access-denied message for a shared folder by using File Server Resource Manager 1. Open File Server Resource Manager. In Server Manager, click Tools, and then click File Server Resource Manager. 2. Expand File Server Resource Manager (Local), and then click Classification Management. 3. Right-click Classification Properties, and then click Set Folder Management Properties. Etc Reference: Deploy Access-Denied Assistance (Demonstration Steps)
* Configure access-denied assistance 
To configure access-denied assistance by using File Server Resource Manager 
1. Open File Server Resource Manager. In Server Manager, click Tools, and then click File Server Resource Manager. 
2. Right-click File Server Resource Manager (Local), and then click Configure Options. 
etc. 
* To specify a separate access-denied message for a shared folder by using File Server Resource Manager 
1. Open File Server Resource Manager. In Server Manager, click Tools, and then click File Server Resource Manager. 
2. Expand File Server Resource Manager (Local), and then click Classification Management. 
3. Right-click Classification Properties, and then click Set Folder Management Properties. 
Etc 
Reference: Deploy Access-Denied Assistance (Demonstration Steps)
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!