Practice Test for MCSA Exam 70-412 Configuring Advanced Windows Server 2012 Services
Below are 10 sample questions for MCSA Exam 70-412 – Configuring Advanced Windows Server 2012 Services.
The correct answers are bolded.
1. When configuring port rules for NLB clusters, which option in this list will you NOT configure for a port rule?
- The TCP or UDP port(s) the rule should apply to
- The filtering mode
- The protocols that this rule should apply to
- The node IP address the rule should apply to
EXPLANATION: When you configure the port rules configure the following: – The virtual IP address that the rule should apply to – The TCP or UDP port range that this rule should apply to – The protocols that this rule should apply to, including TCP, UDP, or both – The filtering mode that specifies how the cluster handles traffic, which is described by the port range and the protocols.
2. A Windows Server 2012 Cluster Shared Volume offers faster throughput when integrated with which of the following?
- Server Message Block (SMB) Multichannel
- Remote Direct Memory Access (RDMA)
- BitLocker volume encryption
- Storage Spaces
EXPLANATION: CSV in Windows Server 2012 offers multisubnet support for CSVs so you can achieve faster throughput when integrated with Server Message Block (SMB) Multichannel and it allows the network adapters to support Remote Direct Memory Access (RDMA).
3. What does the priority value for the cluster role specify?
- How critical it is to keep that role operational.
- The order in which roles are started up.
- The order in which roles are shut down.
- The percentage of resources that should be allocated to the role.
EXPLANATION: If a cluster has multiple roles, you can categorize the priority for each role. Roles with higher priorities are started before roles with lower priorities. If you don’t want a role to start, you select No Auto Start.
4. Which of the following is a distributed file system protocol used to access files over the network that works with UNIX and Linux file server clients?
EXPLANATION: Network File System (NFS) is a distributed file system protocol that is used to access files over a network, similar to accessing a file using a shared folder in Windows (which uses Server Message Block (SMB). It is used with both UNIX and Linux file server clients as well as VMware.
5. Which one of the following features can help determine why a user cannot access a folder or a file?
- Access Request Wizard
- Permissions Analysis Assistance
- Request Access Wizard
- Access-Denied Assistance
EXPLANATION: When a user is denied access to a shared folder or file Access-Denied Assistance helps users determine why they cannot access the folder or file and directs the users to resolve the issue without additional intervention.
6. What is the name of the high-availability technology that establishes multiple sessions or connections to the Fibre Channel storage array by using redundant path components such as switches, adapters, and cables?
- iSCSI Multipath
- Multipath I/O
- Multiple Connection Session
- Network adapter bonding
EXPLANATION: Multipath (I/O) is a multipath solution that supports iSCSI, Fibre Channel, and serial attached storage (SAS) SAN connectivity by establishing multiple sessions or connections to the storage array. Multipathing solutions use redundancy path components including adapters, cables, and switches to create logical paths between the server and the storage device.
7. Which Windows feature captures and stores copies of folders and files at specific points in time, allowing users or administrators to recover accidentally deleted or overwritten files and compare different versions of the same file?
- Version Management Copies
- Shadow Copy Version Control
- Shadow Copies for Shared Volumes
- Version Control Shadow Copy Provider
EXPLANATION: Shadow Copies for Shared Volumes (SCSV) uses the capabilities of the VSS to capture and store copies of folders and files (located on shared network resources) at a specific point in time. When SCSV is implemented on a volume, both end users and administrators can recover accidentally deleted or overwritten files as well as compare different versions of the same file. Because end users can restore their own files, implementing SCSV can dramatically reduce not only the time but the associated costs of having to recover their folder and files via the IT support desk.
8. What is used to encrypt replication traffic for Hyper-V replica?
EXPLANATION: To encrypt the replication traffic use certificate-based authentication (HTTPS) then use an existing X.509v3 certificate or create a self-signed certificate.
9. Which of the following is the default Global Update Manager mode?
- All write and local read
- Majority read and write
- Majority write and local read
- Minority local read
EXPLANATION: In the Global Update Manager or the 0 = All (write) and Local (read) mode is the default setting in Windows Server 2012 R2 for all workloads besides Hyper-V.
10. What is the name given to the configurable entities in DHCP that contain the range of IP addresses that can be allocated to clients?
- DHCP options
- DHCP ranges
- DHCP scopes
- DHCP leases
EXPLANATION: DHCP scopes are a range of IP addresses that can be allocated to clients. A scope consists of a name and description, range of addresses, and a subnet mask.