Download Configuring Advanced Windows Server 2012 Services.70-412.SelfTestEngine.2019-04-02.270q.vcex

Vendor: Microsoft
Exam Code: 70-412
Exam Name: Configuring Advanced Windows Server 2012 Services
Date: Apr 02, 2019
File Size: 17 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Your company recently deployed a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2. 
You need to identify the time-to-live (TTL) value for domain referrals to the NETLOGON and SYSVOL shared folders. 
Which tool should you use?
  1. Ultrasound
  2. Replmon
  3. Dfsdiag
  4. Frsutil
Correct answer: C
Explanation:
DFSDIAG can check your configuration in five different ways:Checking referral responses (DFSDIAG /TestReferral) Checking domain controller configuration Checking site associations Checking namespace server configuration Checking individual namespace configuration and integrity References: https://blogs.technet.microsoft.com/josebda/2009/07/15/five-ways-to-check-your-dfs-namespaces-dfs-n-configuration-with-the-dfsdiag-exe-tool/
DFSDIAG can check your configuration in five different ways:
  • Checking referral responses (DFSDIAG /TestReferral) 
  • Checking domain controller configuration 
  • Checking site associations 
  • Checking namespace server configuration 
  • Checking individual namespace configuration and integrity 
References: https://blogs.technet.microsoft.com/josebda/2009/07/15/five-ways-to-check-your-dfs-namespaces-dfs-n-configuration-with-the-dfsdiag-exe-tool/
Question 2
Your network contains two Active Directory forests named contoso.com and adatum.com. Contoso.com contains one domain. Adatum.com contains a child domain named child.adatum.com. 
Contoso.com has a one-way forest trust to adatum.com. Selective authentication is enabled on the forest trust. 
Several user accounts are migrated from child.adatum.com to adatum.com. Users report that after the migration, they fail to access resources in contoso.com. The users successfully accessed the resources in contoso.com before the accounts were migrated. 
You need to ensure that the migrated users can access the resources in contoso.com. 
What should you do?
  1. Replace the existing forest trust with an external trust.
  2. Run netdom and specify the /quarantine attribute.
  3. Disable SID filtering on the existing forest trust.
  4. Disable selective authentication on the existing forest trust.
Correct answer: C
Explanation:
Security Considerations for Trusts Need to gain access to the resources in contoso.com Disabling SID Filter Quarantining on External Trusts Although it reduces the security of your forest (and is therefore not recommended), you can disable SID filter quarantining for an external trust by using the Netdom.exe tool. You should consider disabling SID filter quarantining only in the following situations:* Users have been migrated to the trusted domain with their SID histories preserved, and you want to grant them access to resources in the trusting domain based on the SID history attribute. Etc. Incorrect Answers:B. Enables administrators to manage Active Directory domains and trust relationships from the command prompt, /quarantine Sets or clears the domain quarantine. D. Selective authentication over a forest trust restricts access to only those users in a trusted forest who have been explicitly given authentication permissions to computer objects (resource computers) that reside in the trusting forest. References: Security Considerations for Trustshttps://technet.microsoft.com/en-us/library/cc755321(v=ws.10).aspx
Security Considerations for Trusts 
Need to gain access to the resources in contoso.com 
Disabling SID Filter Quarantining on External Trusts 
Although it reduces the security of your forest (and is therefore not recommended), you can disable SID filter quarantining for an external trust by using the Netdom.exe tool. You should consider disabling SID filter quarantining only in the following situations:
* Users have been migrated to the trusted domain with their SID histories preserved, and you want to grant them access to resources in the trusting domain based on the SID history attribute. 
Etc. 
Incorrect Answers:
B. Enables administrators to manage Active Directory domains and trust relationships from the command prompt, /quarantine Sets or clears the domain quarantine. 
D. Selective authentication over a forest trust restricts access to only those users in a trusted forest who have been explicitly given authentication permissions to computer objects (resource computers) that reside in the trusting forest. 
References: Security Considerations for Trusts
https://technet.microsoft.com/en-us/library/cc755321(v=ws.10).aspx
Question 3
Your network contains an Active Directory forest named contoso.com. The forest contains three domains. All domain controllers run Windows Server 2012 R2. 
The forest has a two-way realm trust to a Kerberos realm named adatum.com. 
You discover that users in adatum.com can only access resources in the root domain of contoso.com. 
You need to ensure that the adatum.com users can access the resources in all of the domains in the forest. 
What should you do in the forest?
  1. Delete the realm trust and create a forest trust.
  2. Delete the realm trust and create three external trusts.
  3. Modify the incoming realm trust.
  4. Modify the outgoing realm trust.
Correct answer: D
Explanation:
A one-way, outgoing realm trust allows resources in your Windows Server domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to be accessed by users in the Kerberos realm. You can establish a realm trust between any non-Windows Kerberos version 5 (V5) realm and an Active Directory domain. This trust relationship allows cross-platform interoperability with security services that are based on other versions of the Kerberos V5 protocol, for example, UNIX and MIT implementations. Realm trusts can switch from nontransitive to transitive and back. Realm trusts can also be either one-way or two-way. Reference: Create a One-Way, Outgoing, Realm Trust
  • A one-way, outgoing realm trust allows resources in your Windows Server domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to be accessed by users in the Kerberos realm. 
  • You can establish a realm trust between any non-Windows Kerberos version 5 (V5) realm and an Active Directory domain. This trust relationship allows cross-platform interoperability with security services that are based on other versions of the Kerberos V5 protocol, for example, UNIX and MIT implementations. Realm trusts can switch from nontransitive to transitive and back. Realm trusts can also be either one-way or two-way. 
Reference: Create a One-Way, Outgoing, Realm Trust
Question 4
Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers. 
The domain controllers are configured as shown in the following table. 
  
You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in the child1.contoso.com domain. 
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
  1. Upgrade DC1 to Windows Server 2012 R2.
  2. Upgrade DC11 to Windows Server 2012 R2.
  3. Raise the domain functional level of childl.contoso.com.
  4. Raise the domain functional level of contoso.com.
  5. Raise the forest functional level of contoso.com.
Correct answer: AD
Explanation:
The root domain in the forest must be at Windows Server 2012level. First upgrade DC1 to this level (A), then raise the contoso.com domain functional level to Windows Server 2012 (D). (A) To support resources that use claims-based access control, the principal’s domains will need to be running one of the following:All Windows Server 2012 domain controllers Sufficient Windows Server 2012domain controllers to handle all the Windows 8 device authentication requests Sufficient Windows Server 2012 domain controllers to handle all the Windows Server 2012 resource protocol transition requests to support non-Windows 8 devices. References: What's New in Kerberos Authenticationhttps://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831747(v=ws.11)
The root domain in the forest must be at Windows Server 2012level. First upgrade DC1 to this level (A), then raise the contoso.com domain functional level to Windows Server 2012 (D). 
(A) To support resources that use claims-based access control, the principal’s domains will need to be running one of the following:
  • All Windows Server 2012 domain controllers 
  • Sufficient Windows Server 2012domain controllers to handle all the Windows 8 device authentication requests 
  • Sufficient Windows Server 2012 domain controllers to handle all the Windows Server 2012 resource protocol transition requests to support non-Windows 8 devices. 
References: What's New in Kerberos Authentication
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831747(v=ws.11)
Question 5
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers. 
The domain controllers are configured as shown in the following table. 
  
You configure a user named User1 as a delegated administrator of DC10. 
You need to ensure that User1 can log on to DC10 if the network link between the Main site and the Branch site fails. 
What should you do?
  1. Add User1 to the Domain Admins group.
  2. On DC10, modify the User Rights Assignment in Local Policies.
  3. Run repadmin and specify the /prp parameter.
  4. On DC10, run ntdsutil and configure the settings in the Roles context.
  5. Run repadmin and specify /replsingleobject parameter.
  6. On DC1, modify the User Rights Assignment in Default Controllers Group Policy object (GPO).
Correct answer: C
Explanation:
repadmin /prp will allow the password caching of the local administrator to the RODC. This command lists and modifies the Password Replication Policy (PRP) for read-only domain controllers (RODCs). References: RODC Administrationhttps://technet.microsoft.com/en-us/library/cc755310%28v=ws.10%29.aspx
repadmin /prp will allow the password caching of the local administrator to the RODC. 
This command lists and modifies the Password Replication Policy (PRP) for read-only domain controllers (RODCs). 
References: RODC Administration
https://technet.microsoft.com/en-us/library/cc755310%28v=ws.10%29.aspx
Question 6
Your company has offices in Montreal, New York, and Amsterdam. 
The network contains an Active Directory forest named contoso.com. An Active Directory site exists for each office. All of the sites connect to each other by using the DEFAULTIPSITELINK site link. 
You need to ensure that only between 20:00 and 08:00, the domain controllers in the Montreal office replicate the Active Directory changes to the domain controllers in the Amsterdam office.
The solution must ensure that the domain controllers in the Montreal and the New York offices can replicate the Active Directory changes any time of day. 
What should you do?
  1. Create a new site link that contains Montreal and Amsterdam. Remove Amsterdam from DEFAULTIPSITE1INK. Modify the schedule of DEFAULTIPSITELINK.
  2. Create a new site link that contains Montreal and Amsterdam. Create a new site link bridge. Modify the schedule of DEFAULTIPSITELINK.
  3. Create a new site link that contains Montreal and Amsterdam. Remove Amsterdam from DEFAULTIPSITELINK. Modify the schedule of the new site link.
  4. Create a new site link that contains Montreal and Amsterdam. Create a new site link bridge. Modify the schedule of the new site link.
Correct answer: C
Explanation:
We create a new site link between Montreal and Amsterdam and schedule it only between 20:00 and08:00. To ensure that traffic between Montreal and Amsterdam only occurs at this time we also remove Amsterdam from the DEFAULTIPSITELINK.Reference: How Active Directory Replication Topology Works http://technet.microsoft.com/en-us/library/cc755994(v=ws.10).aspx
We create a new site link between Montreal and Amsterdam and schedule it only between 20:00 and
08:00. To ensure that traffic between Montreal and Amsterdam only occurs at this time we also remove Amsterdam from the DEFAULTIPSITELINK.
Reference: How Active Directory Replication Topology Works http://technet.microsoft.com/en-us/library/cc755994(v=ws.10).aspx
Question 7
Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2. 
Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains an application named App1 that is accessed by using the URL http://app1.contoso.com.
You plan to perform maintenance on Server1. 
You need to ensure that all new connections to App1 are directed to Server2. The solution must not disconnect the existing connections to Server1. 
What should you run?
  1. The Set-NlbCluster cmdlet
  2. The Set-NlbClusterNode cmdlet
  3. The Stop-NlbCluster cmdlet
  4. The Stop-NlbClusterNode cmdlet
  5. The Suspend-NlbClusterNode cmdlet
  6. The nlb.exe suspend command
Correct answer: D
Explanation:
The Stop-NlbClusterNode cmdlet stops a node in an NLB cluster. When you use the stop the nodes in the cluster, client connections that are already in progress are interrupted. To avoid interrupting active connections, consider using the -drain parameter, which allows the node to continue servicing active connections but disables all new traffic to that node. -Drain <SwitchParameter> Drains existing traffic before stopping the cluster node. If this parameter is omitted, existing traffic will be dropped. References: Stop-NlbClusterNode
The Stop-NlbClusterNode cmdlet stops a node in an NLB cluster. When you use the stop the nodes in the cluster, client connections that are already in progress are interrupted. To avoid interrupting active connections, consider using the -drain parameter, which allows the node to continue servicing active connections but disables all new traffic to that node. 
-Drain <SwitchParameter> 
Drains existing traffic before stopping the cluster node. If this parameter is omitted, existing traffic will be dropped. 
References: Stop-NlbClusterNode
Question 8
Your network contains two servers named HV1 and HV2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. 
HV1 hosts 25 virtual machines. The virtual machine configuration files and the virtual hard disks are stored in D:\VM.
You shut down all of the virtual machines on HV1. 
You copy D:\VM to D:\VM on HV2.
You need to start all of the virtual machines on HV2. You want to achieve this goal by using the minimum amount of administrative effort. 
What should you do?
  1. Run the Import-VMInitialReplication cmdlet.
  2. From HV1, export all virtual machines to D:\VM. Copy D:\VM to D:\VM on HV2 and overwrite the existing files. On HV2, run the Import Virtual Machine wizard.
  3. From HV1, export all virtual machines to D:\VM. Copy D:\VM to D:\VM on HV2 and overwrite the existing files. On HV2, run the New Virtual Machine wizard.
  4. Run the Import-VM cmdlet.
Correct answer: D
Explanation:
Import-VM Imports a virtual machine from a file. Example Imports the virtual machine from its configuration file. The virtual machine is registered in-place, so its files are not copied. Windows PowerShell PS C:\> Import-VM Path 'D:\Test\VirtualMachines\5AE40946-3A98-428E-8C83- 081A3C6BD18C.XML'Reference: Import-VM
Import-VM 
Imports a virtual machine from a file. 
Example 
Imports the virtual machine from its configuration file. The virtual machine is registered in-place, so its files are not copied. 
Windows PowerShell 
PS C:\> Import-VM Path 'D:\Test\VirtualMachines\5AE40946-3A98-428E-8C83- 081A3C6BD18C.XML'
Reference: Import-VM
Question 9
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a cluster disk resource. 
A developer creates an application named App1. App1 is NOT a cluster-aware application. App1 runs as a service. App1 stores data on the cluster disk resource. 
You need to ensure that App1 runs in Cluster1. The solution must minimize development effort. 
Which cmdlet should you run?
  1. Add-ClusterGenericServiceRole
  2. Add-ClusterGenericApplicationRole
  3. Add-ClusterScaleOutFileServerRole
  4. Add-ClusterServerRole
Correct answer: B
Explanation:
Add-ClusterGenericApplicationRole Configure high availability for an application that was not originally designed to run in a failover cluster. If you run an application as a Generic Application, the cluster software will start the application, then periodically query the operating system to see whether the application appears to be running. If so, it is presumed to be online, and will not be restarted or failed over. EXAMPLE 1. Command Prompt: C:\PS>Add-ClusterGenericApplicationRole -CommandLine NewApplication.exe  Name                       OwnerNode                           State  ----                       ---------                           -----  cluster1GenApp             node2                              Online Description ----------- This command configures NewApplication.exe as a generic clustered application. A default name will be used for client access and this application requires no storage. Reference: Add-ClusterGenericApplicationRolehttp://technet.microsoft.com/en-us/library/ee460976.aspx
Add-ClusterGenericApplicationRole 
Configure high availability for an application that was not originally designed to run in a failover cluster. 
If you run an application as a Generic Application, the cluster software will start the application, then periodically query the operating system to see whether the application appears to be running. If so, it is presumed to be online, and will not be restarted or failed over. 
EXAMPLE 1. 
Command Prompt: C:\PS>
Add-ClusterGenericApplicationRole -CommandLine NewApplication.exe  
Name                       OwnerNode                           State  
----                       ---------                           -----  
cluster1GenApp             node2                              Online 
Description 
----------- 
This command configures NewApplication.exe as a generic clustered application. A default name will be used for client access and this application requires no storage. 
Reference: Add-ClusterGenericApplicationRole
http://technet.microsoft.com/en-us/library/ee460976.aspx
Question 10
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. The system properties of Server1 are shown in the exhibit. 
  
You need to configure Server1 as an enterprise subordinate certification authority (CA). 
What should you do first?
  1. Add RAM to the server.
  2. Set the Startup Type of the Certificate Propagation service to Automatic.
  3. Install the Certification Authority Web Enrollment role service.
  4. Join Server1 to the contoso.com domain.
Correct answer: D
Explanation:
Enterprise CAs must be domain members. From the exhibit we see that it is only a Workgroup member. Note:A new CA can be the root CA of a new PKI or subordinate to another in an existing PKI. Enterprise subordinate certification authority. An enterprise subordinate CA must get a CA certificate from an enterprise root CA but can then issue certificates to all users and computers in the enterprise. These types of CAs are often used for load balancing of an enterprise root CA.     Reference: Install a Subordinate Certification Authority
Enterprise CAs must be domain members. From the exhibit we see that it is only a Workgroup member. 
Note:
A new CA can be the root CA of a new PKI or subordinate to another in an existing PKI. 
Enterprise subordinate certification authority. 
An enterprise subordinate CA must get a CA certificate from an enterprise root CA but can then issue certificates to all users and computers in the enterprise. These types of CAs are often used for load balancing of an enterprise root CA. 
  
Reference: Install a Subordinate Certification Authority
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!