server 2012 exam 70-411 (49 to 60)


♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-411 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-411 Exam Dumps (PDF & VCE):
Available on: http://www.certleader.com/70-411-dumps.html


70-411 Product Description:
Exam Number/Code: 70-411 vce
Exam name: Administering Windows Server 2012
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: Microsoft 70-411 Administering Windows Server 2012

70-411 examcollection

Actual of 70-411 exams materials and testing bible for Microsoft certification for consumer, Real Success Guaranteed with Updated 70-411 pdf dumps vce Materials. 100% PASS Administering Windows Server 2012 exam Today!

2016 May 70-411 Study Guide Questions:

Q49. HOTSPOT 

Your network contains 25 Web servers that run Windows Server 2012 R2. 

You need to configure auditing policies that meet the following requirements: 

. Generate an event each time a new process is created. 

. Generate an event each time a user attempts to access a file share. 

Which two auditing policies should you configure? To answer, select the appropriate two auditing policies in the answer area. 


Answer: 



Q50. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. 

All client computers run Windows 8 Enterprise. 

DC1 contains a Group Policy object (GPO) named GPO1. 

You need to deploy a VPN connection to all users. 

What should you configure from User Configuration in GPO1? 

A. Policies/Administrative Templates/Network/Windows Connect Now 

B. Policies/Administrative Templates/Network/Network Connections 

C. Policies/Administrative Templates/Windows Components/Windows Mobility Center 

D. Preferences/Control Panel Settings/Network Options 

Answer: D 

Explanation: 

1. Open the Group Policy Management Console. Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit. 

2. In the console tree under Computer Configuration or User Configuration, expand the Preferences folder, and then expand the Control Panel Settings folder. 

3. Right-click the Network Options node, point to New, and select VPN Connection. 

The Network Options extension allows you to centrally create, modify, and delete dial-up networking and virtual private network (VPN) connections. Before you create a network option preference item, you should review the behavior of each type of action possible with the extension. 

Reference: http: //technet.microsoft.com/en-us/library/cc772449.aspx 


Q51. Your network contains an Active Directory domain named contoso.com. Domain controllers run either Windows Server 2003, Windows Server 2008 R2, or Windows Server 2012 R2. 

A support technician accidentally deletes a user account named User1. 

You need to use tombstone reanimation to restore the User1 account. 

Which tool should you use? 

A. Active Directory Administrative Center 

B. Ntdsutil 

C. Ldp 

D. Esentutl 

Answer: C 

Explanation: 

Use Ldp.exe to restore a single, deleted Active Directory object This feature takes advantage of the fact that Active Directory keeps deleted objects in the database for a period of time before physically removing them. use Ldp.exe to restore a single, deleted Active Directory object 

The LPD.exe tool, included with Windows Server 2012, allows users to perform operations against any LDAP-compatible directory, including Active Directory. LDP is used to view objects stored in Active Directory along with their metadata, such as security descriptors and replication metadata. 

References: 

http: //www. petri. co. il/manually-undeleting-objects-windows-active-directory-ad. htm 

http: //www. petri. co. il/manually-undeleting-objects-windows-active-directory-ad. htm 

http: //technet. microsoft. com/en-us/magazine/2007. 09. tombstones. aspx 

http: //technet. microsoft. com/nl-nl/library/dd379509(v=ws. 10). aspx#BKMK_2 

http: //technet. microsoft. com/en-us/library/hh875546. aspx 

http: //technet. microsoft. com/en-us/library/dd560651(v=ws. 10). aspx 


Q52. HOTSPOT 

Your network contains one Active Directory domain named contoso.com. The domain contains 10 file servers that run Windows Server 2012 R2. 

You plan to enable BitLocker Drive Encryption (BitLocker) for the operating system drives of the file servers. 

You need to configure BitLocker policies for the file servers to meet the following requirements: 

. Ensure that all of the servers use a startup PIN for operating system drives encrypted with BitLocker. 

. Ensure that the BitLocker recovery key and recovery password are stored in Active 

Directory. Which two Group Policy settings should you configure? To answer, select the appropriate settings in the answer area. 


Answer: 



70-411  exams

Renew cbt nuggets 70-411:

Q53. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains 30 user accounts that are used for network administration. The user accounts are members of a domain global group named Group1. 

You identify the security requirements for the 30 user accounts as shown in the following table. 


You need to identify which settings must be implemented by using a Password Settings object (PSO) and which settings must be implemented by modifying the properties of the user accounts. 

What should you identify? To answer, configure the appropriate settings in the dialog box in the answer area. 



Answer: 



Q54. DRAG DROP 

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server. 

You need to log all DHCP clients that have windows Firewall disabled. 

Which three actions should you perform in sequence? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



Q55. Your network contains an Active Directory domain named adatum.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. 

All client computers run Windows 7. 

You need to ensure that user settings are saved to \\Server1\Users\. 

What should you do? 

A. From the properties of each user account, configure the Home folder settings. 

B. From a Group Policy object (GPO), configure the Folder Redirection settings. 

C. From the properties of each user account, configure the User profile settings. 

D. From a Group Policy object (GPO), configure the Drive Maps preference. 

Answer: C 

Explanation: 

If a computer is running Windows 2000 Server or later on a network, users can store their profiles on the server. These profiles are called roaming user profiles. 


Q56. Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs. 

The domain is renamed to adatum.com. 

Group Policies no longer function correctly. 

You need to ensure that the existing GPOs are applied to users and computers. You want to achieve this goal by using the minimum amount of administrative effort. 

What should you use? 

A. Dcgpofix 

B. Get-GPOReport 

C. Gpfixup 

D. Gpresult 

E. Gpedit. msc 

F. Import-GPO 

G. Restore-GPO 

H. Set-GPInheritance 

I. Set-GPLink 

J. Set-GPPermission 

K. Gpupdate 

L. Add-ADGroupMember 

Answer: C 

Explanation: 

You can use the gpfixup command-line tool to fix the dependencies that Group Policy objects (GPOs) and Group Policy links in Active Directory Domain Services (AD DS) have on Domain Name System (DNS) and NetBIOS names after a domain rename operation. 

Reference: http: //technet. microsoft. com/en-us/library/hh852336(v=ws. 10). aspx 


70-411  exams

Vivid exam ref 70-411 administering windows server 2012 pdf:

Q57. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. Both servers have the File and Storage Services server role, the DFS Namespace role service, and the DFS Replication role service installed. 

Server1 and Server2 are part of a Distributed File System (DFS) Replication group named Group1. Server1 and Server2 are connected by using a high-speed LAN connection. 

You need to minimize the amount of processor resources consumed by DFS Replication. 

What should you do? 

A. Modify the replication schedule. 

B. Modify the staging quota. 

C. Disable Remote Differential Compression (RDC). 

D. Reduce the bandwidth usage. 

Answer: C 

Explanation: 

Because disabling RDC can help conserve disk input/output (I/O) and CPU resources, you might want to disable RDC on a connection if the sending and receiving members are in a local area network (LAN), and bandwidth use is not a concern. However, in a LAN environment where bandwidth is contended, RDC can be beneficial when transferring large files. 

Question tells it uses a high-speed LAN connection. 

References: http: //technet. microsoft. com/en-us/library/cc758825%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc754229. aspx 


Q58. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy Server server role installed. 

You need to allow connections that use 802.1x. 

What should you create? 

A. A network policy that uses Microsoft Protected EAP (PEAP) authentication 

B. A network policy that uses EAP-MSCHAP v2 authentication 

C. A connection request policy that uses EAP-MSCHAP v2 authentication 

D. A connection request policy that uses MS-CHAP v2 authentication 

Answer: C 

Explanation: 

802.1X uses EAP, EAP-TLS, EAP-MS-CHAP v2, and PEAP authentication methods: 

EAP (Extensible Authentication Protocol) uses an arbitrary authentication method, such as certificates, smart cards, or credentials. 

EAP-TLS (EAP-Transport Layer Security) is an EAP type that is used in certificate-based security environments, and it provides the strongest authentication and key determination method. 

EAP-MS-CHAP v2 (EAP-Microsoft Challenge Handshake Authentication Protocol version 2) is a mutual authentication method that supports password-based user or computer authentication. 

PEAP (Protected EAP) is an authentication method that uses TLS to enhance the security of other EAP authentication protocols. 

Connection request policies are sets of conditions and settings that allow network administrators to designate which Remote Authentication Dial-In User Service (RADIUS) servers perform the authentication and authorization of connection requests that the server running Network Policy Server (NPS) receives from RADIUS clients. Connection request policies can be configured to designate which RADIUS servers are used for RADIUS accounting. With connection request policies, you can use NPS as a RADIUS server or as a RADIUS proxy, based on factors such as the following: 

The time of day and day of the week 

The realm name in the connection request 

The type of connection being requested 

The IP address of the RADIUS client 


Q59. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Windows Deployment Services server role installed. 

Server1 contains two boot images and four install images. 

You need to ensure that when a computer starts from PXE, the available operating system 

images appear in a specific order. 

What should you do? 

A. Modify the properties of the boot images. 

B. Create a new image group. 

C. Modify the properties of the install images. 

D. Modify the PXE Response Policy. 

Answer: C 


Q60. Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1 that runs Windows Server 2008 R2. 

You plan to test Windows Server 2012 R2 by using native-boot virtual hard disks (VHDs). 

You have a Windows image file named file1.wim. 

You need to add an image of a volume to file1.wim. 

What should you do? 

A. Run imagex.exe and specify the /append parameter. 

B. Run imagex.exe and specify the /export parameter. 

C. Run dism.exe and specify the /image parameter. 

D. Run dism.exe and specify the /append-image parameter. 

Answer: D 

Explanation: The Deployment Image Servicing and Management (DISM) tool is a command-line tool that enables the creation of Windows image (.wim) files for deployment in a manufacturing or corporate IT environment. The /Append-Image option appends a volume image to an existing .wim file allowing you to store many customized Windows images in a fraction of the space. When you combine two or more Windows image files into a single .wim, any files that are duplicated between the images are only stored once. 

Incorrect: 

Not A, Not B: Imagex has been retired and replaced by dism. 

Reference: Append a Volume Image to an Existing Image Using DISM 

https://technet.microsoft.com/en-us/library/hh824916.aspx 



see more Administering Windows Server 2012