[Verified] 70-411 Microsoft free download 121-132 (Apr 2016)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-411 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-411-dumps.html


70-411 Product Description:
Exam Number/Code: 70-411 vce
Exam name: Administering Windows Server 2012
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: Microsoft 70-411 Administering Windows Server 2012

70-411 examcollection

Download of 70-411 training materials and training tools for Microsoft certification for client, Real Success Guaranteed with Updated 70-411 pdf dumps vce Materials. 100% PASS Administering Windows Server 2012 exam Today!

2016 Apr 70-411 Study Guide Questions:

Q121. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2. You enable the EventLog-Application event trace session. 

You need to set the maximum size of the log file used by the trace session to 10 MB. From which tab should you perform the configuration? To answer, select the appropriate tab in the answer area. 


Answer: 



Q122. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server that runs Windows Server 2012 R2 and has the Windows Deployment Services (WDS) server role installed. 

You create a new multicast session in WDS and connect 50 client computers to the session. 

When you open the Windows Deployment Services console, you discover that all of the computers are listed as pending devices. 

You need to ensure that any of the computers on the network can join a multicast transmission without requiring administrator approval. 

What should you configure? 

To answer, select the appropriate tab in the answer area. 


Answer: 



Q123. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

A domain controller named DO has the ADMX Migrator tool installed. You have a custom Administrative Template file on DC1 named Template1.adm. 

You need to add a custom registry entry to Template1.adm by using the ADMX Migrator tool. 

Which action should you run first? 

A. Load Template 

B. New Policy Setting 

C. Generate ADMX from ADM 

D. New Category 

Answer: C 

Explanation: 

The ADMX Migrator provides two conversion methods — through the editor or through a command-line program. From the ADMX Editor, choose the option to Generate ADMX from ADM. Browse to your ADM file, and the tool quickly and automatically converts it. You then can open the converted file in the editor to examine its values and properties and modify it if you wish. The ADMX Migrator Command Window is a little more complicated; it requires you to type a lengthy command string at a prompt to perform the conversions. However, it includes some options and flexibility not available in the graphical editor. 


References: http: //technet. microsoft. com/pt-pt/magazine/2008. 02. utilityspotlight%28en-us%29. aspx http: //technet. microsoft. com/pt-pt/magazine/2008. 02. utilityspotlight%28en-us%29. aspx 


Q124. Your company has a main office and a branch office. The main office is located in Seattle. The branch office is located in Montreal. Each office is configured as an Active Directory site. 

The network contains an Active Directory domain named adatum.com. The Seattle office contains a file server named Server1. The Montreal office contains a file server named Server2. 

The servers run Windows Server 2012 R2 and have the File and Storage Services server role, the DFS Namespaces role service, and the DFS Replication role service installed. 

Server1 and Server2 each have a share named Share1 that is replicated by using DFS Replication. 

You need to ensure that users connect to the replicated folder in their respective office when they connect to \\contoso.com\Share1. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. Create a replication connection. 

B. Create a namespace. 

C. Share and publish the replicated folder. 

D. Create a new topology. 

E. Modify the Referrals settings. 

Answer: B,C,E 

Explanation: 

To share a replicated folder and publish it to a DFS namespace Click Start, point to Administrative Tools, and then click DFS Management. In the console tree, under the Replication node, click the replication group that contains the replicated folder you want to share. In the details pane, on the Replicated Folders tab, right-click the replicated folder that you want to share, and then click Share and Publish in Namespace. In the Share and Publish Replicated Folder Wizard, click Share and publish the replicated folder in a 

namespace, and then follow the steps in the wizard. 

Note that: If you do not have an existing namespace, you can create one in the 

Namespace Path page in the Share and Publish Replicated Folder Wizard. To create the namespace, in the Namespace Path page, click Browse, and then click New Namespace. 

To create a namespace 

Click Start, point to Administrative Tools, and then click DFS Management. 

In the console tree, right-click the Namespaces node, and then click New Namespace. 

Follow the instructions in the New Namespace Wizard. 

To create a stand-alone namespace on a failover cluster, specify the name of a clustered file server instance on the Namespace Server page of the New Namespace Wizard. 

Important 

Do not attempt to create a domain-based namespace using the Windows Server 2008 mode unless the forest functional level is Windows Server 2003 or higher. Doing so can result in a namespace for which you cannot delete DFS folders, yielding the following error message: “The folder cannot be deleted. Cannot complete this function.” 

To share a replicated folder and publish it to a DFS namespace 

1. Click Start, point to Administrative Tools, and then click DFS Management. 

2. In the console tree, under the Replication node, click the replication group that contains the replicated folder you want to share. 

3. In the details pane, on the Replicated Folders tab, right-click the replicated folder that you want to share, and then click Share and Publish in Namespace. 

4. In the Share and Publish Replicated Folder Wizard, click Share and publish the replicated folder in a namespace, and then follow the steps in the wizard. 


"You need to ensure that users connect to the replicated folder in their respective office when they connect to \\contoso.com\Share1." 



Reference: http: //technet. microsoft. com/en-us/library/cc731531. aspx 

http: //technet. microsoft. com/en-us/library/cc772778%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc732414. aspx 

http: //technet. microsoft. com/en-us/library/cc772379. aspx 

http: //technet. microsoft. com/en-us/library/cc732863%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc725830. aspx 

http: //technet. microsoft. com/en-us/library/cc771978. aspx 


70-411 training

Up to the minute 70-411 test engine:

Q125. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. You implement DirectAccess. 

You need to view the properties of the DirectAccess connection. 

Which connection properties should you view? To answer, select the appropriate connection properties in the answer area. 


Answer: 



Q126. Your network contains one Active Directory domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1. 

The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2. 

You need to identify which domain controller must be online when cloning a domain controller. 

Which cmdlet should you use? 

A. Get-ADGroupMember 

B. Get-ADDomainControllerPasswordReplicationPolicy 

C. Get-ADDomainControllerPasswordReplicationPolicyUsage 

D. Get-ADDomain 

E. Get-ADOptionalFeature 

F. Get-ADAccountAuthorizationGroup 

Answer: D 

Explanation: One requirement for cloning a domain controller is an existing Windows Server 2012 DC that hosts the PDC emulator role. You can run the Get-ADDomain and retrieve which server has the PDC emulator role. 

Example: Command Prompt: C:\PS> 

Get-ADDomain 

Output wouldinclude a line such as: PDCEmulator : Fabrikam-DC1.Fabrikam.com 

Incorrect: 

Not A: The Get-ADGroupMember cmdlet gets the members of an Active Directory group. 

Members can be users, groups, and computers. 

Not E: The Get-ADOptionalFeature cmdlet gets an optional feature or performs a search to retrieve multiple optional features from an Active Directory. 

Not F: The Get-ADAuthorizationGroup cmdlet gets the security groups from the specified user, computer or service accounts token. 

Reference: Step-by-Step: Domain Controller Cloning 

http://blogs.technet.com/b/canitpro/archive/2013/06/12/step-by-step-domain-controller-cloning.aspx 

Reference: Get-ADDomain https://technet.microsoft.com/en-us/library/ee617224.aspx 


Q127. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server 2012 R2 and hosts a processor-intensive application named App1. 

Users report that App1 responds more slowly than expected. 

You need to monitor the processor usage on VM1 to identify whether changes must be made to the hardware settings of VM1. 

Which performance object should you monitor on Server1? 

A. Processor 

B. Hyper-V Hypervisor Virtual Processor 

C. Hyper-V Hypervisor Logical Processor 

D. Hyper-V Hypervisor Root Virtual Processor 

E. Process 

Answer: C 

Explanation: 

In the simplest way of thinking the virtual processor time is cycled across the available logical processors in a round-robin type of fashion. Thus all the processing power gets used over time, and technically nothing ever sits idle. To accurately measure the processor utilization of a guest operating system, use the “\Hyper-V Hypervisor Logical Processor (Total)\% Total Run Time” performance monitor counter on the Hyper-V host operating system. 


Q128. You have a server named Server1 that runs Windows Server 2012 R2. 

You discover that the performance of Server1 is poor. 

The results of a performance report generated on Server1 are shown in the following table. 


You need to identify the cause of the performance issue. 

What should you identify? 

A. Driver malfunction 

B. Insufficient RAM 

C. Excessive paging 

D. NUMA fragmentation 

Answer: A 

Explanation: 

Processor: %DPC Time. Much like the other values, this counter shows the amount of time that the processor spends servicing DPC requests. DPC requests are more often than not associated with the network interface. 

Processor: % Interrupt Time. This is the percentage of time that the processor is spending on handling Interrupts. Generally, if this value exceeds 50% of the processor time you may have a hardware issue. Some components on the computer can force this issue and not really be a problem. For example a programmable I/O card like an old disk controller card, can take up to 40% of the CPU time. A NIC on a busy IIS server can likewise generate a large percentage of processor activity. 

Processor: % User Time. The value of this counter helps to determine the kind of processing that is affecting the system. Of course the resulting value is the total amount of non-idle time that was spent on User mode operations. This generally means application code. 

Processor: %Privilege Time. This is the amount of time the processor was busy with Kernel mode operations. If the processor is very busy and this mode is high, it is usually an indication of some type of NT service having difficulty, although user mode programs can make calls to the Kernel mode NT components to occasionally cause this type of performance issue. 

Memory: Pages/sec. This value is often confused with Page Faults/sec. The Pages/sec counter is a combination of Pages Input/sec and Pages Output/sec counters. Recall that 

Page Faults/sec is a combination of hard page faults and soft page faults. This counter, however, is a general indicator of how often the system is using the hard drive to store or retrieve memory associated data. 

References: 

http: //technet. microsoft. com/en-us/library/cc768048. aspx 


70-411 training tools

Real 70-411 bundle:

Q129. Your network contains an Active Directory forest named contoso.com. The functional level of the forest is Windows Server 2008 R2. 

All of the user accounts in the marketing department are members of a group named Contoso\MarketingUsers. All of the computer accounts in the marketing department are members of a group named Contoso\MarketingComputers. 

A domain user named User1 is a member of the Contoso\MarketingUsers group. A computer named Computer1 is a member of the Contoso\MarketingComputers group. 

You have five Password Settings objects (PSOs). The PSOs are defined as shown in the following table. 


When User1 logs on to Computer1 and attempts to change her password, she receives an error message indicating that her password is too short. 

You need to tell User1 what her minimum password length is. 

What should you tell User1? 

A. 10 

B. 11 

C. 12 

D. 14 

Answer: A 

Explanation: 

One PSO has a precedence value of 2 and the other PSO has a precedence value of 4. In this case, the PSO that has the precedence value of 2 has a higher rank and, hence, is applied to the object. 


Q130. Your company has a main office and a branch office. 

The main office contains a server that hosts a Distributed File System (DFS) replicated folder. 

You plan to implement a new DFS server in the branch office. 

You need to recommend a solution that minimizes the amount of network bandwidth used to perform the initial synchronization of the folder to the branch office. You recommend using the Export-DfsrClone and Import-DfsrClonecmdlets. Which additional command or cmdlet should you include in the recommendation? 

A. Robocopy.exe 

B. Synchost.exe 

C. Export-BcCachePackage 

D. Sync-DfsReplicationGroup 

Answer: A 

Explanation: 

By preseeding files before you set up DFS Replication, add a new replication partner, or replace a server, you can speed up initial synchronization and enable cloning of the DFS Replication database in Windows Server 2012 R2. The Robocopy method is one of several preceding methods 


Q131. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

Server1 has the following role services installed: 

. DirectAccess and VPN (RRAS) 

. Network Policy Server 

Remote users have client computers that run either Windows XP, Windows 7, or Windows 8. 

You need to ensure that only the client computers that run Windows 7 or Windows 8 can establish VPN connections to Server1. 

What should you configure on Server1? 

A. A condition of a Network Policy Server (NPS) network policy 

B. A constraint of a Network Policy Server (NPS) network policy 

C. a condition of a Network Policy Server (NPS) connection request policy 

D. A vendor-specific RADIUS attribute of a Network Policy Server (NPS) connection request policy 

Answer: A 

Explanation: 

If you want to configure the Operating System condition, click Operating System, and then click Add. In Operating System Properties, click Add, and then specify the operating system settings that are required to match the policy. 

The Operating System condition specifies the operating system (operating system version or service pack number), role (client or server), and architecture (x86, x64, or ia64) required for the computer configuration to match the policy. 


Q132. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 

Server1 has a folder named Folder1 that is used by the human resources department. 

You need to ensure that an email notification is sent immediately to the human resources manager when a user copies an audio file or a video file to Folder1. 

What should you configure on Server1? 

A. a storage report task 

B. a file screen exception 

C. a file screen 

D. a file group 

Answer: C 

Explanation: 

Create file screens to control the types of files that users can save, and generate notifications when users attempt to save unauthorized files. 

With File Server Resource Manager (FSRM) you can create file screens that prevent users 

from saving unauthorized files on volumes or folders. 

File Screen Enforcement: 

You can create file screens to prevent users from saving unauthorized files on volumes or 

folders. There are two types of file screen enforcement: active and passive enforcement. 

Active file screen enforcement does not allow the user to save an unauthorized file. 

Passive file screen enforcement allows the user to save the file, but notifies the user that 

the file is not an authorized file. You can configure notifications, such as events logged to 

the event log or e-mails sent to users and administrators, as part of active and passive file 

screen enforcement. 



see more 70-411 dumps