getcertified4sure.com

Where to find 70 411 exam dumps




Examcollection 70 411 exam Questions are updated and all 70 411 exam answers are verified by experts. Once you have completely prepared with our 70 411 exam dumps pdf exam prep kits you will be ready for the real 70 411 pdf exam without a problem. We have Most recent Microsoft 70 411 administering windows server 2012 r2 pdf dumps study guide. PASSED 70 411 dumps First attempt! Here What I Did.

Q21. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You need to create a certificate template for the BitLocker Drive Encryption (BitLocker) Network Unlock feature. 

Which Cryptography setting of the certificate template should you modify? To answer, select the appropriate setting in the answer area. 

Answer: 


Q22. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 P.2. Server1 has the Network Policy and Access Services server role installed. 

You plan to deploy 802. lx authentication to secure the wireless network. 

You need to identify which Network Policy Server (NPS) authentication method supports certificate-based mutual authentication for the 802.1x deployment. 

Which authentication method should you identify? 

A. MS-CHAP 

B. PEAP-MS-CHAPv2 

C. EAP-TLS 

D. MS-CHAP v2 

Answer:

Explanation: 

802.1X uses EAP, EAP-TLS, EAP-MS-CHAP v2, and PEAP authentication methods: 

. EAP (Extensible Authentication Protocol) uses an arbitrary authentication method, such as certificates, smart cards, or credentials. 

. EAP-TLS (EAP-Transport Layer Security) is an EAP type that is used in certificate-based security environments, and it provides the strongest authentication and key determination method. 

. EAP-MS-CHAP v2 (EAP-Microsoft Challenge Handshake Authentication Protocol version 2) is a mutual authentication method that supports password-based user or computer authentication. 

. PEAP (Protected EAP) is an authentication method that uses TLS to enhance the security of other EAP authentication protocols. 


Q23. Your network contains an Active Directory domain named contoso.com. The domain contains a virtual machine named Server1 that runs Windows Server 2012 R2. 

Server1 has a dynamically expanding virtual hard disk that is mounted to drive E. 

You need to ensure that you can enable BitLocker Drive Encryption (BitLocker) on drive E. 

Which command should you run? 

A. manage-bde -protectors -add c: -startup e: 

B. manage-bde -lock e: 

C. manage-bde -protectors -add e: -startupkey c: 

D. manage-bde -on e: 

Answer:

Explanation: 

Manage-bde: on 

Encrypts the drive and turns on BitLocker. 

Example: 

The following example illustrates using the -on command to turn on BitLocker for drive C and add a recovery password to the drive. 

manage-bde –on C: -recoverypassword 


Q24. Your network contains one Active Directory domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1. 

The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2. 

You need to identify which security principals are authorized to have their password cached on RODC1. 

Which cmdlet should you use? 

A. Get-ADGroupMember 

B. Get-ADDomainControllerPasswordReplicationPolicy 

C. Get-ADDomainControllerPasswordReplicationPolicyUsage 

D. Get-ADDomain 

E. Get-ADOptionalFeature 

F. Get-ADAccountAuthorizationGroup 

Answer:


Q25. Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.1. 

The network contains a shared folder named FinancialData that contains five files. 

You need to ensure that the FinancialData folder and its contents are copied to all of the client computers. 

Which two Group Policy preferences should you configure? (Each correct answer presents part of the solution. Choose two.) 

A. Shortcuts 

B. Network Shares 

C. Environment 

D. Folders 

E. Files 

Answer: D,E 

Explanation: 

Folder preference items allow you to create, update, replace, and delete folders and their contents. (To configure individual files rather than folders, see Files Extension.) Before you create a Folder preference item, you should review the behavior of each type of action possible with this extension. File preference items allow you to copy, modify the attributes of, replace, and delete files. (To configure folders rather than individual files, see Folders Extension.) Before you create a File preference item, you should review the behavior of each type of action possible with this extension. 


Q26. You have a failover cluster that contains five nodes. All of the nodes run Windows Server 2012 R2. All of the nodes have BitLocker Drive Encryption (BitLocker) enabled. 

You enable BitLocker on a Cluster Shared Volume (CSV). 

You need to ensure that all of the cluster nodes can access the CSV. 

Which cmdlet should you run next? 

A. Unblock-Tpm 

B. Add-BitLockerKeyProtector 

C. Remove-BitLockerKeyProtector 

D. Enable BitLockerAutoUnlock 

Answer:

Explanation: 

4. Add an Active Directory Security Identifier (SID) to the CSV disk using the Cluster Name Object (CNO) The Active Directory protector is a domain security identifier (SID) based protector for protecting clustered volumes held within the Active Directory infrastructure. It can be bound to a user account, machine account or group. When an unlock request is made for a protected volume, the BitLocker service interrupts the request and uses the BitLocker protect/unprotect APIs to unlock or deny the request. For the cluster service to selfmanage BitLocker enabled disk volumes, an administrator must add the Cluster Name Object (CNO), which is the Active Directory identity associated with the Cluster Network name, as a BitLocker protector to the target disk volumes. Add-BitLockerKeyProtector <drive letter or CSV mount point> -ADAccountOrGroupProtector – ADAccountOrGroup $cno 


Q27. HOTSPOT 

You have a server named Server1 that has the Network Policy and Access Services server role installed. 

You plan to configure Network Policy Server (NPS) on Server1 to use certificate-based authentication for VPN connections. 

You obtain a certificate for NPS. 

You need to ensure that NPS can perform certificate-based authentication. 

To which store should you import the certificate? 

To answer, select the appropriate store in the answer area. 

Answer: 


Q28. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 

Server1 has a folder named Folder1 that is used by the human resources department. 

You need to ensure that an email notification is sent immediately to the human resources manager when a user copies an audio file or a video file to Folder1. 

What should you configure on Server1? 

A. a storage report task 

B. a file screen exception 

C. a file screen 

D. a file group 

Answer:

Explanation: 

Create file screens to control the types of files that users can save, and generate notifications when users attempt to save unauthorized files. 

With File Server Resource Manager (FSRM) you can create file screens that prevent users 

from saving unauthorized files on volumes or folders. 

File Screen Enforcement: 

You can create file screens to prevent users from saving unauthorized files on volumes or 

folders. There are two types of file screen enforcement: active and passive enforcement. 

Active file screen enforcement does not allow the user to save an unauthorized file. 

Passive file screen enforcement allows the user to save the file, but notifies the user that 

the file is not an authorized file. You can configure notifications, such as events logged to 

the event log or e-mails sent to users and administrators, as part of active and passive file 

screen enforcement. 


Q29. DRAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

You generalize Server2. 

You install the Windows Deployment Services (WDS) server role on Server1. 

You need to capture an image of Server2 on Server1. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q30. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. All servers run Windows Server 2012 R2. 

You need to collect the error events from all of the servers on Server1. The solution must ensure that when new servers are added to the domain, their error events are collected automatically on Server1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On Server1, create a collector initiated subscription. 

B. On Server1, create a source computer initiated subscription. 

C. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting. 

D. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting. 

Answer: B,C 

Explanation: 

To set up a Source-Initiated Subscription with Windows Server 2003/2008 so that events of interest from the Security event log of several domain controllers can be forwarded to an administrative workstation. 

* Group Policy The forwarding computer needs to be configured with the address of the server to which the events are forwarded. This can be done with the following group policy setting: 

Computer configuration-Administrative templates-Windows components-Event forwarding-Configure the server address, refresh interval, and issue certificate authority of a target subscription manager. 

* Edit the GPO and browse to Computer Configuration | Policies | Administrative Templates | Windows Components | Event Forwarding - Configure the server address, refresh interval, and issuer certificate authority of a target Subscription Manager.