70-411 Exam Questions - Online Test


70-411 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Act now and download your Microsoft 70 411 exam questions test today! Do not waste time for the worthless Microsoft examcollection 70 411 tutorials. Download Refresh Microsoft Administering Windows Server 2012 exam with real questions and answers and begin to learn Microsoft exam ref 70 411 administering windows server 2012 r2 pdf with a classic professional.

Q1. Your network contains an Active Directory forest named contoso.com. The forest functional level is Windows Server 2012 R2. The forest contains a single domain. 

You create a Password Settings object (PSO) named PSO1. 

You need to delegate the rights to apply PSO1 to the Active Directory objects in an organizational unit named OU1. 

What should you do? 

A. From Active Directory Users and Computers, run the Delegation of Control Wizard. 

B. From Active Directory Administrative Center, modify the security settings of PSO1. 

C. From Group Policy Management, create a Group Policy object (GPO) and link the GPO to OU1. 

D. From Active Directory Administrative Center, modify the security settings of OU1. 

Answer:

Explanation: 

PSOs cannot be applied to organizational units (OUs) directly. If your users are organized into OUs, consider creating global security groups that contain the users from these OUs and then applying the newly defined finegrained password and account lockout policies to them. If you move a user from one OU to another, you must update user memberships in the corresponding global security groups. Go ahead and hit "OK" and then close out of all open windows. Now that you have created a password policy, we need to apply it to a user/group. In order to do so, you must have "write" permissions on the PSO object. We're doing this in a lab, so I'm Domain Admin. Write permissions are not a problem 

1. Open Active Directory Users and Computers (Start, point to Administrative Tools, and then click Active Directory Users and Computers). 

2. On the View menu, ensure that Advanced Features is checked. 

3. In the console tree, expand Active Directory Users and Computers\yourdomain\System\Password Settings Container 

4. In the details pane, right-click the PSO, and then click Properties. 

5. Click the Attribute Editor tab. 

6. Select the msDS-PsoAppliesTo attribute, and then click Edit. 


Q2. You have a group Managed Service Account named Service01. Three servers named Server01, Server02, and Server03 currently use the Service01 service account. 

You plan to decommission Server01. 

You need to remove the cached password of the Service01 service account from Server01. The solution must ensure that Server02 and Server 03 continue to use Service01. 

Which cmdlet should you run? 

A. Set-ADServiceAccount 

B. Remove-ADServiceAccount 

C. Uninstall-ADServiceAccount 

D. Reset-ADServiceAccountPassword 

Answer:

Explanation: The Remove-ADServiceAccount cmdlet removes an Active Directory service account. This cmdlet does not make changes to any computers that use the service account. After this operation, the service account is no longer hosted on the target computer but still exists in the directory. 

Incorrect: 

Not C: The Uninstall-ADServiceAccount cmdlet removes an Active Directory service 

account on the computer on which the cmdlet is run. The specified service account must be installed on the computer. 

Reference: Remove-ADServiceAccount 

https://technet.microsoft.com/en-us/library/ee617190.aspx 


Q3. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 

Server1 has a folder named Folder1 that is used by the human resources department. 

You need to ensure that an email notification is sent immediately to the human resources manager when a user copies an audio file or a video file to Folder1. 

What should you configure on Server1? 

A. a storage report task 

B. a file screen exception 

C. a file screen 

D. a file group 

Answer:

Explanation: 

Create file screens to control the types of files that users can save, and generate notifications when users attempt to save unauthorized files. 

With File Server Resource Manager (FSRM) you can create file screens that prevent users 

from saving unauthorized files on volumes or folders. 

File Screen Enforcement: 

You can create file screens to prevent users from saving unauthorized files on volumes or 

folders. There are two types of file screen enforcement: active and passive enforcement. 

Active file screen enforcement does not allow the user to save an unauthorized file. 

Passive file screen enforcement allows the user to save the file, but notifies the user that 

the file is not an authorized file. You can configure notifications, such as events logged to 

the event log or e-mails sent to users and administrators, as part of active and passive file 

screen enforcement. 


Q4. HOTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has two network adapters and is located in a perimeter network. 

You need to install the RIP version 2 routing protocol on Server1. 

Which node should you use to add the RIP version 2 routing protocol? 

To answer, select the appropriate node in the answer area. 

Answer: 


Q5. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. All client computers are configured as DHCP clients. 

You link a Group Policy object (GPO) named GPO1 to an organizational unit (OU) that contains all of the client computer accounts. 

You need to ensure that Network Access Protection (NAP) compliance is evaluated on all of the client computers. 

Which two settings should you configure in GPO1? 

To answer, select the appropriate two settings in the answer area. 

Answer: 


Q6. Your network contains a single Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

The domain contains 400 desktop computers that run Windows 8 and 10 desktop computers that run Windows XP Service Pack 3 (SP3). All new desktop computers that are added to the domain run Windows 8. 

All of the desktop computers are located in an organizational unit (OU) named OU1. 

You create a Group Policy object (GPO) named GPO1. GPO1 contains startup script settings. You link GPO1 to OU1. 

You need to ensure that GPO1 is applied only to computers that run Windows XP SP3. 

What should you do? 

A. Create and link a WML filter to GPO1 

B. Run the Set-GPInheritance cmdlet and specify the -target parameter. 

C. Run the Set-GPLink cmdlet and specify the -target parameter. 

D. Modify the Security settings of OU1. 

Answer:

Explanation: 

WMI Filtering is used to get information of the system and apply the GPO on it with the condition is met. 

Security filtering: apply a GPO to a specific group (members of the group) 


Q7. Your network contains four Network Policy Server (NPS) servers named Server1, Server2, Servers, and Server4. 

Server1 is configured as a RADIUS proxy that forwards connection requests to a remote RADIUS server group named Group1. 

You need to ensure that Server2 and Server3 receive connection requests. Server4 must only receive connection requests if both Server2 and Server3 are unavailable. 

How should you configure Group1? 

A. Change the Weight of Server4 to 10. 

B. Change the Weight of Server2 and Server3 to 10. 

C. Change the Priority of Server2 and Server3 to 10. 

D. Change the Priority of Server4 to 10. 

Answer:

Explanation: 

During the NPS proxy configuration process, you can create remote RADIUS server groups and then add RADIUS servers to each group. To configure load balancing, you must have more than one RADIUS server per remote RADIUS server group. While adding group members, or after creating a RADIUS server as a group member, you can access the Add RADIUS server dialog box to configure the following items on the Load Balancing tab: 

Priority. Priority specifies the order of importance of the RADIUS server to the NPS proxy server. Priority level must be assigned a value that is an integer, such as 1, 2, or 3. The lower the number, the higher priority the NPS proxy gives to the RADIUS server. For example, if the RADIUS server is assigned the highest priority of 1, the NPS proxy sends connection requests to the RADIUS server first; if servers with priority 1 are not available, NPS then sends connection requests to RADIUS servers with priority 2, and so on. You can assign the same priority to multiple RADIUS servers, and then use the Weight setting to load balance between them. 

Weight. NPS uses this Weight setting to determine how many connection requests to send to each group member when the group members have the same priority level. Weight setting must be assigned a value between 1 and 100, and the value represents a percentage of 100 percent. For example, if the remote RADIUS server group contains two members that both have a priority level of 1 and a weight rating of 50, the NPS proxy forwards 50 percent of the connection requests to each RADIUS server. 

Advanced settings. These failover settingsprovide a way for NPS to determine whether the remote RADIUS server is unavailable. If NPS determines that a RADIUS server is unavailable, it can start sending connection requests to other group members. With these settings you can configure the number of seconds that the NPS proxy waits for a response from the RADIUS server before it considers the request dropped; the maximum number of dropped requests before the NPS proxy identifies the RADIUS server as unavailable; and the number of seconds that can elapse between requests before the NPS proxy identifies the RADIUS server as unavailable. 

The default priority is 1 and can be changed from 1 to 65535. So changing server 2 and 3 to priority 10 is not the way to go. 

Reference: http: //technet. microsoft. com/en-us/library/dd197433(WS. 10). aspx 


Q8. You have a server named Server1 that runs Windows Server 2012 R2. 

You need to configure Server1 to create an entry in an event log when the processor usage exceeds 60 percent. 

Which type of data collector should you create? 

A. An event trace data collector 

B. A performance counter alert 

C. A performance counter data collector 

D. A configuration data collector 

Answer:

Explanation: 

Performance alerts notify you when a specified performance counter exceeds your configured threshold by logging an event to the event log. But rather than notifying you immediately when the counter exceeds the threshold, you can configure a time period over which the counter needs to exceed the threshold, to avoid unnecessary alerts. 


Q9. Your network contains an Active Directory domain named adatum.com. The domain contains five servers. The servers are configured as shown in the following table. 

All desktop computers in adatum.com run Windows 8 and are configured to use BitLocker Drive Encryption (BitLocker) on all local disk drives. 

You need to deploy the Network Unlock feature. The solution must minimize the number of features and server roles installed on the network. 

To which server should you deploy the feature? 

A. Server3 

B. Server1 

C. DC2 

D. Server2 

E. DC1 

Answer:

Explanation: 

The BitLocker-NetworkUnlock feature must be installed on a Windows Deployment Server (which does not have to be configured--the WDSServer service just needs to be running). 


Q10. Your network contains an Active Directory domain named contoso.com. All domain controllers run either Windows Server 2008 or Windows Server 2008 R2. You deploy a new domain controller named DC1 that runs Windows Server 2012 R2. 

You log on to DC1 by using an account that is a member of the Domain Admins group. You discover that you cannot create Password Settings objects (PSOs) by using Active Directory Administrative Center. 

You need to ensure that you can create PSOs from Active Directory Administrative Center. 

What should you do? 

A. Modify the membership of the Group Policy Creator Owners group. 

B. Transfer the PDC emulator operations master role to DC1. 

C. Upgrade all of the domain controllers that run Window Server 2008. 

D. Raise the functional level of the domain. 

Answer:

Explanation: 

Fine-grained password policies allow you to specify multiple password policies within a single domain so that you can apply different restrictions for password and account lockout policies to different sets of users in a domain. To use a fine-grained password policy, your domain functional level must be at least Windows Server 2008. To enable fine-grained password policies, you first create a Password Settings Object (PSO). You then configure the same settings that you configure for the password and account lockout policies. You can create and apply PSOs in the Windows Server 2012 environment by using the Active Directory Administrative Center (ADAC) or Windows PowerShell. 

Step 1: Create a PSO Applies To: Windows Server 2008, Windows Server 2008 R2 

Reference: 

http: //technet. microsoft. com/en-us//library/cc754461%28v=ws. 10%29. aspx