getcertified4sure.com

What to do with exam ref 70 411




Master the exam 70 411 Administering Windows Server 2012 content and be ready for exam day success quickly with this Pass4sure exam ref 70 411 exam answers. We guarantee it!We make it a reality and give you real 70 411 administering windows server 2012 r2 pdf questions in our Microsoft microsoft 70 411 braindumps.Latest 100% VALID Microsoft 70 411 exam dumps Exam Questions Dumps at below page. You can use our Microsoft 70 411 exam dumps pdf braindumps and pass your exam.

Q31. HOTSPOT 

Your network contains a DNS server named Server1. Server1 hosts a DNS zone for contoso.com. 

You need to ensure that DNS clients cache records from contoso.com for a maximum of one hour. 

Which value should you modify in the Start of Authority (SOA) record? To answer, select the appropriate setting in the answer area. 

Answer: 


Q32. Your network has a router named Router1 that provides access to the Internet. You have a server named Server1 that runs Windows Server 2012 R2. Server1 to use Router1 as the default gateway. 

A new router named Router2 is added to the network. Router2 provides access to the Internet. The IP address of the internal interface on Router2 is 10.1.14.2S4. 

You need to configure Server1 to use Router2 to connect to the Internet if Router1 fails. 

What should you do on Server1? 

A. Add a route for 10.1.14.0/24 that uses 10.1.14.254 as the gateway and set the metric to 1. 

B. Add 10.1.14.254 as a gateway and set the metric to 1. 

C. Add a route for 10.1.14.0/24 that uses 10.1.14.254 as the gateway and set the metric to 500. 

D. Add 10.1.14.254 as a gateway and set the metric to 500. 

Answer:

Explanation: 

To configure the Automatic Metric feature: 

1. In Control Panel, double-click Network Connections. 

2. Right-click a network interface, and then click Properties. 

3. Click Internet Protocol (TCP/IP), and then click Properties. 

4. On the General tab, click Advanced. 

5. To specify a metric, on the IP Settings tab, click to clear the Automatic metric check box, and then enter the metric that you want in the Interface Metric field. 

To manually add routes for IPv4 

Open the Command Prompt window by clicking the Start button Picture of the Start button. 

In the search box, type Command Prompt, and then, in the list of results, click Command Prompt. 

At the command prompt, type route -p add [destination] [mask <netmask>] [gateway] 

[metric <metric>] [if <interface>]. 


Q33. Your company has a main office and two branch offices. The main office is located in New York. The branch offices are located in Seattle and Chicago. 

The network contains an Active Directory domain named contoso.com. An Active Directory site exists for each office. Active Directory site links exist between the main office and the branch offices. All servers run Windows Server 2012 R2. 

The domain contains three file servers. The file servers are configured as shown in the following table. 

You implement a Distributed File System (DFS) replication group named ReplGroup. 

ReplGroup is used to replicate a folder on each file server. ReplGroup uses a hub and spoke topology. NYC-SVR1 is configured as the hub server. 

You need to ensure that replication can occur if NYC-SVR1 fails. 

What should you do? 

A. Create an Active Directory site link bridge. 

B. Create an Active Directory site link. 

C. Modify the properties of Rep1Group. 

D. Create a connection in Rep1Group. 

Answer:

Explanation: 

Unsure about this answer. 

D: 

A: 

The Bridge all site links option in Active Directory must be enabled. (This option is available in the Active Directory Sites and Services snap-in.) Turning off Bridge all site links can affect the ability of DFS to refer client computers to target computers that have the least expensive connection cost. An Intersite Topology Generator that is running Windows Server 2003 relies on the Bridge all site links option being enabled to generate the intersite cost matrix that DFS requires for its site-costing functionality. If you turn off this option, you must create site links between the Active Directory sites for which you want DFS to calculate accurate site costs. Any sites that are not connected by site links will have the maximum possible cost. For more information about site link bridging, see “Active Directory Replication Topology Technical Reference.” 

Reference: 

http: //faultbucket. ca/2012/08/fixing-a-dfsr-connection-problem/ 

http: //faultbucket. ca/2012/08/fixing-a-dfsr-connection-problem/ 

http: //technet. microsoft. com/en-us/library/cc771941. aspx 


Q34. Your network contains two Active Directory forests named adatum.com and contoso.com. The network contains three servers. The servers are configured as shown in the following table. 

You need to ensure that connection requests from adatum.com users are forwarded to Server2 and connection requests from contoso.com users are forwarded to Server3. 

Which two should you configure in the connection request policies on Server1? (Each correct answer presents part of the solution. Choose two.) 

A. The Authentication settings 

B. The Standard RADIUS Attributes settings 

C. The Location Groups condition 

D. The Identity Type condition 

E. The User Name condition 

Answer: A,E 

Explanation: 

The User Name attribute group contains the User Name attribute. By using this attribute, you can designate the user name, or a portion of the user name, that must match the user name supplied by the access client in the RADIUS message. This attribute is a character string that typically contains a realm name and a user account name. You can use pattern-matching syntax to specify user names. 

By using this setting, you can override the authentication settings that are configured in all network policies and you can designate the authentication methods and types that are required to connect to your network. Forward requests to the following remote RADIUS server group . By using this setting, NPS forwards connection requests to the remote RADIUS server group that you specify. If the NPS server receives a valid Access-Accept message that corresponds to the Access-Request message, the connection attempt is considered authenticated and authorized. In this case, the NPS server acts as a RADIUS proxy 

Connection request policies are sets of conditions and profile settings that give network administrators flexibility in configuring how incoming authentication and accounting request messages are handled by the IAS server. With connection request policies, you can create a series of policies so that some RADIUS request messages sent from RADIUS clients are processed locally (IAS is being used as a RADIUS server) and other types of messages are forwarded to another RADIUS server (IAS is being used as a RADIUS proxy). This capability allows IAS to be deployed in many new RADIUS scenarios. 

With connection request policies, you can use IAS as a RADIUS server or as a RADIUS proxy, based on the time of day and day of the week, by the realm name in the request, by the type of connection being requested, by the IP address of the RADIUS client, and so on. 

References: http: //technet. microsoft. com/en-us/library/cc757328. aspx 

http: //technet. microsoft. com/en-us/library/cc753603. aspx 


Q35. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You have several Windows PowerShell scripts that execute when client computers start. 

When a client computer starts, you discover that it takes a long time before users are prompted to log on. 

You need to reduce the amount of time it takes for the client computers to start. The solution must not prevent scripts from completing successfully. 

Which setting should you configure? To answer, select the appropriate setting in the answer area. 

Answer: 


Q36. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

A local account named Admin1 is a member of the Administrators group on Server1. 

You need to generate an audit event whenever Admin1 is denied access to a file or folder. 

What should you run? 

A. auditpol.exe /set /userradmin1 /failure: enable 

B. auditpol.exe /set /user: admin1 /category: "detailed tracking" /failure: enable 

C. auditpol.exe /resourcesacl /set /type: file /user: admin1 /failure 

D. auditpol.exe /resourcesacl /set /type: key /user: admin1 /failure /access: ga 

Answer:

Explanation: 

http: //technet. microsoft. com/en-us/library/ff625687. aspx 

To set a global resource SACL to audit successful and failed attempts by a user to perform 

generic read and write functions on files or folders: 

auditpol /resourceSACL /set /type: File /user: MYDOMAINmyuser /success /failure /access: 

FRFW 

http: //technet.microsoft.com/en-us/library/ff625687%28v=ws.10%29.aspx 

Syntax 

auditpol /resourceSACL 

[/set /type: <resource> [/success] [/failure] /user: <user> [/access: <access flags>]] 

[/remove /type: <resource> /user: <user> [/type: <resource>]] 

[/clear [/type: <resource>]] 

[/view [/user: <user>] [/type: <resource>]] 

References: 

http: //technet. microsoft. com/en-us/library/ff625687%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/ff625687%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/ff625687. aspx 

http: //technet. microsoft. com/en-us/library/ff625687%28v=ws. 10%29. aspx 


Q37. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

You create a central store for Group Policy. 

You receive a custom administrative template named Template1.admx. 

You need to ensure that the settings in Template1.admx appear in all new Group Policy objects (GPOs). 

What should you do? 

A. From the Default Domain Controllers Policy, add Template1.admx to the Administrative Templates. 

B. From the Default Domain Policy, add Template1.admx to the Administrative Templates. 

C. Copy Template1.admx to \\Contoso.com\SYSVOL\Contoso.com\Policies\PolicyDefinitions\. 

D. Copy Template1.admx to \\Contoso.com\NETLOGON. 

Answer:

Explanation: 

Unlike ADM files, ADMX files are not stored in individual GPOs. For domain-based enterprises, administrators can create a central store location of ADMX files that is accessible by anyone with permission to create or edit GPOs. 


Q38. HOTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed. 

You need to configure the ports on Server1 to ensure that client computers can establish VPN connections to Server1 by using TCP port 443. 

What should you modify? To answer, select the appropriate object in the answer area. 

Answer: 


Q39. You have a failover cluster that contains five nodes. All of the nodes run Windows Server 2012 R2. All of the nodes have BitLocker Drive Encryption (BitLocker) enabled. 

You enable BitLocker on a Cluster Shared Volume (CSV). 

You need to ensure that all of the cluster nodes can access the CSV. 

Which cmdlet should you run next? 

A. Unblock-Tpm 

B. Add-BitLockerKeyProtector 

C. Remove-BitLockerKeyProtector 

D. Enable BitLockerAutoUnlock 

Answer:

Explanation: 

4. Add an Active Directory Security Identifier (SID) to the CSV disk using the Cluster Name Object (CNO) The Active Directory protector is a domain security identifier (SID) based protector for protecting clustered volumes held within the Active Directory infrastructure. It can be bound to a user account, machine account or group. When an unlock request is made for a protected volume, the BitLocker service interrupts the request and uses the BitLocker protect/unprotect APIs to unlock or deny the request. For the cluster service to selfmanage BitLocker enabled disk volumes, an administrator must add the Cluster Name Object (CNO), which is the Active Directory identity associated with the Cluster Network name, as a BitLocker protector to the target disk volumes. Add-BitLockerKeyProtector <drive letter or CSV mount point> -ADAccountOrGroupProtector – ADAccountOrGroup $cno 


Q40. Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1 that runs Windows Server 2008 R2. 

You plan to test Windows Server 2012 R2 by using native-boot virtual hard disks (VHDs). 

You attach a new VHD to Server1. 

You need to install Windows Server 2012 R2 in the VHD. 

What should you do? 

A. Run imagex.exe and specify the /append parameter. 

B. Run dism.exe and specify the /apply-image parameter. 

C. Run imagex.exe and specify the /export parameter. 

D. Run dism.exe and specify the /append-image parameter. 

Answer:

Explanation: 

On the destination computer, you will create a structure for the partitions where you apply your images. The partition structure on the destination computer must match the partition structure of the reference computer. If you apply an image to a volume with an existing Windows installation, files from the previous installation may not be deleted. Format the volume by using a tool such as DiskPart before applying the new image.