70 411 administering windows server 2012 r2 pdf : May 2021 Edition

Your success in Microsoft 70 411 exam questions is our sole target and we develop all our microsoft 70 411 braindumps in a way that facilitates the attainment of this target. Not only is our 70 411 exam dumps study material the best you can find, it is also the most detailed and the most updated. 70 411 dumps Practice Exams for Microsoft Windows Server 70 411 exam are written to the highest standards of technical accuracy.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-411 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-411 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-411-exam-dumps.html

Q81. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Windows Server Update Services server role installed. 

You need to configure Windows Server Update Services (WSUS) to support Secure Sockets Layer (SSL). 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. From Internet Information Services (IIS) Manager, modify the connection strings of the WSUS website. 

B. Install a server certificate. 

C. Run the wsusutil.exe command. 

D. Run the iisreset.exe command. 

E. From Internet Information Services (IIS) Manager, modify the bindings of the WSUS website. 

Answer: B,C,E 

Explanation: 

Certificate needs to be installed to IIS, Bindings modifies and wsusutil run. 

1. First we need to request a certificate for the WSUS web site, so open IIS, click the server 

name, then open Server Certificates. 

On the Actions pane click Create Domain Certificate. 

2. To add the signing certificate to the WSUS Web site in IIS 7.0 

On the WSUS server, open Internet Information Services (IIS) Manager. 

Expand Sites, right-click the WSUS Web site, and then click Edit Bindings. 

In the Site Binding dialog box, select the https binding, and click Edit to open the Edit Site 

Binding dialog box. 

Select the appropriate Web server certificate in the SSL certificate box, and then click OK. 

Click Close to exit the Site Bindings dialog box, and then click OK to close Internet 

Information Services (IIS) Manager. 

3. WSUSUtil.exe configuressl<FQDN of the software update point site system> (the name 

in your certificate) 

WSUSUtil.exe configuressl<Intranet FQDN of the software update point site system>. 

4. The next step is to point your clients to the correct url, by modifying the existing GPO or 

creating a new one. Open the policy Specify intranet Microsoft update service location and 

type the new url in the form https: //YourWSUSserver. 

The gpupdate /force command will just download all the GPO’s and re-apply them to the client, it won’t force the client to check for updates. For that you need to use wuauclt /resetautorization /detectnow followed by wuauclt /reportnow 

References: 

http: //technet. microsoft. com/en-us/library/bb680861. aspx 

http: //technet. microsoft. com/en-us/library/bb633246. aspx 

http: //www. vkernel. ro/blog/configure-wsus-to-use-ssl 


Q82. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. You implement DirectAccess. 

You need to view the properties of the DirectAccess connection. 

Which connection properties should you view? To answer, select the appropriate connection properties in the answer area. 

Answer: 


Q83. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains the users shown in the following table. 

You have a Network Policy Server (NPS) server that has the network policies shown in the following table. 

User1, User2, and User3 plan to connect to the network by using a VPN. You need to identify which network policy will apply to each user. 

What should you identify? 

To answer, select the appropriate policy for each user in the answer area. 

Answer: 


Q84. DRAG DROP 

Your network contains an Active Directory forest named contoso.com. The forest contains a Network Policy Server (NPS) server named NPS1 and a VPN server named VPN1. VPN1 forwards all authentication requests to NPS1. 

A partner company has an Active Directory forest named adatum.com. The adatum.com forest contains an NPS server named NPS2. 

You plan to grant users from adatum.com VPN access to your network. 

You need to authenticate the users from adatum.com on VPN1. 

What should you create on each NPS server? 

To answer, drag the appropriate objects to the correct NPS servers. Each object may be 

used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q85. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. Cluster1 hosts 10 virtual machines. All of the virtual machines run Windows Server 2012 R2 and are members of the domain. 

You need to ensure that the first time a service named Service1 fails on a virtual machine, the virtual machine is moved to a different node. 

You configure Service1 to be monitored from Failover Cluster Manager. 

What should you configure on the virtual machine? 

A. From the General settings, modify the Startup type. 

B. From the General settings, modify the Service status. 

C. From the Recovery settings of Service1, set the First failure recovery action to Take No Action. 

D. From the Recovery settings of Service1, set the First failure recovery action to Restart the Service. 

Answer:

Explanation: 

Configure the virtual machine to take no action through Hyper-V if the physical computer shuts down by modifying the Automatic Stop Action setting to None. Virtual machine state must be managed through the Failover Clustering feature. 

Virtual machine application monitoring and management 

In clusters running Windows Server 2012, administrators can monitor services on clustered virtual machines that are also running Windows Server 2012. This functionality extends the high-level monitoring of virtual machines that is implemented in Windows Server 2008 R2 failover clusters. If a monitored service in a virtual machine fails, the service can be restarted, or the clustered virtual machine can be restarted or moved to another node (depending on service restart settings and cluster failover settings). This feature increases the uptime of high availability services that are running on virtual machines within a failover cluster. 

Windows Server 2012 Failover Cluster introduces a new capability for Hyper-V virtual machines (VMs), which is a basic monitoring of a service within the VM which causes the VM to be rebooted should the monitored service fail three times. For this feature to work the following must be configured: 

. Both the Hyper-V servers must be Windows Server 2012 and the guest OS 

running in the VM must be Windows Server 2012. 

. The host and guest OSs are in the same or at least trusting domains. 

. The Failover Cluster administrator must be a member of the local administrator's group inside the VM. Ensure the service being monitored is set to Take No Action (see screen shot below) within the guest VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab of the service properties within the Services application (services. msc). 

Within the guest VM, ensure the Virtual Machine Monitoring firewall exception is enabled for the Domain network by using the Windows Firewall with Advanced Security application or by using the Windows PowerShell command below: Set-NetFirewallRule -DisplayGroup "Virtual Machine Monitoring" -Enabled True. 

After the above is true, enabling the monitoring is a simple process: Launch the Failover Cluster Manager tool. Navigate to the cluster - Roles. Right click on the virtual machine role you wish to enable monitoring for and under More Actions select Configure Monitoring. 

. The services running inside the VM will be gathered and check the box for the services that should be monitored and click OK. 

You are done! 

Monitoring can also be enabled using the Add-ClusterVMMonitoredItemcmdlet and -VirtualMachine, with the -Service parameters, as the example below shows: PS C:Windowssystem32> Add-ClusterVMMonitoredItem -VirtualMachine savdaltst01 -Service spooler 

References: 

http: //sportstoday. us/technology/windows-server-2012---continuous-availability-%28part-4%29---failover-clustering-enhancements---virtual-machine-monitoring-. aspx 

http: //windowsitpro. com/windows-server-2012/enable-windows-server-2012-failover-cluster-hyper-v-vm-monitoring 

http: //technet. microsoft. com/en-us/library/cc742396. aspx 


Q86. Your network contains two Active Directory forests named contoso.com and dev.contoso.com. The contoso.com forest contains a domain controller named DC1. The dev.contoso.com forest contains a domain controller named DC2. Each domain contains an organizational unit (OU) named OU1. 

Dev.contoso.com has a Group Policy object (GPO) named GPO1. GPO1 contains 200 settings, including several settings that have network paths. GPO1 is linked to OU1. 

You need to copy GPO1 from dev.contoso.com to contoso.com. 

What should you do first on DC2? 

A. From the Group Policy Management console, right-click GPO1 and select Copy. 

B. Run the mtedit.exe command and specify the /Domaintcontoso.com /DC: DC 1 parameter. 

C. Run the Save-NetGpocmdlet. 

D. Run the Backup-Gpocmdlet. 

Answer:

Explanation: 

To copy a Group Policy object: 

In the GPMC console tree, right-click the GPO that you want to copy, and then click Copy. 

To create a copy of the GPO in the same domain as the source GPO, right-click Group Policy objects, click Paste, specify permissions for the new GPO in the Copy GPO box, and then click OK. 

For copy operations to another domain, you may need to specify a migration table. 

The Migration Table Editor (MTE) is provided with Group Policy Management Console (GPMC) to facilitate the editing of migration tables. Migration tables are used for copying or importing Group Policy objects (GPOs) from one domain to another, in cases where the GPOs include domain-specific information that must be updated during copy or import. 

Source WS2008R2: Backup the existing GPOs from the GPMC, you need to ensure that the “Group Policy Objects” container is selected for the “Backup Up All” option to be available. 

Copy a Group Policy Object with the Group Policy Management Console (GPMC) 

You can copy a Group Policy object (GPO) either by using the drag-and-drop method or right-click method. 

Applies To: Windows 8, Windows Server 2008 R2, Windows Server 2012 

References: 

http://technet.microsoft.com/en-us/library/cc785343(v=WS.10).aspx 

http://technet.microsoft.com/en-us/library/cc733107.aspx 


Q87. HOTSPOT 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest contains two Active Directory sites named Site1 and Site2. 

You plan to deploy a read-only domain controller (RODC) named DC10 to Site2. You pre-create the DC10 domain controller account by using Active Directory Users and Computers. 

You need to identify which domain controller will be used for initial replication during the promotion of the RODC. 

Which tab should you use to identify the domain controller? 

To answer, select the appropriate tab in the answer area. 

Answer: 


Q88. Your network contains an Active Directory domain named contoso.com. All domain controllers run either Windows Server 2008 or Windows Server 2008 R2. You deploy a new domain controller named DC1 that runs Windows Server 2012 R2. 

You log on to DC1 by using an account that is a member of the Domain Admins group. You discover that you cannot create Password Settings objects (PSOs) by using Active Directory Administrative Center. 

You need to ensure that you can create PSOs from Active Directory Administrative Center. 

What should you do? 

A. Modify the membership of the Group Policy Creator Owners group. 

B. Transfer the PDC emulator operations master role to DC1. 

C. Upgrade all of the domain controllers that run Window Server 2008. 

D. Raise the functional level of the domain. 

Answer:

Explanation: 

Fine-grained password policies allow you to specify multiple password policies within a single domain so that you can apply different restrictions for password and account lockout policies to different sets of users in a domain. To use a fine-grained password policy, your domain functional level must be at least Windows Server 2008. To enable fine-grained password policies, you first create a Password Settings Object (PSO). You then configure the same settings that you configure for the password and account lockout policies. You can create and apply PSOs in the Windows Server 2012 environment by using the Active Directory Administrative Center (ADAC) or Windows PowerShell. 

Step 1: Create a PSO Applies To: Windows Server 2008, Windows Server 2008 R2 

Reference: 

http: //technet. microsoft. com/en-us//library/cc754461%28v=ws. 10%29. aspx 


Q89. Your network contains an Active Directory domain named adatum.com. 

You have a standard primary zone named adatum.com. 

You need to provide a user named User1 the ability to modify records in the zone. Other users must be prevented from modifying records in the zone. 

What should you do first? 

A. Run the Zone Signing Wizard for the zone. 

B. From the properties of the zone, modify the start of authority (SOA) record. 

C. From the properties of the zone, change the zone type. 

D. Run the New Delegation Wizard for the zone. 

Answer:

Explanation: 

The Zone would need to be changed to a AD integrated zone When you use directory-integrated zones, you can use access control list (ACL) editing to secure a dnsZone object container in the directory tree. This feature provides detailed access to either the zone or a specified resource record in the zone. For example, an ACL for a zone resource record can be restricted so that dynamic updates are allowed only for a specified client computer or a secure group, such as a domain administrators group. This security feature is not available with standard primary zones. 

DNS update security is available only for zones that are integrated into Active Directory. After you integrate a zone, you can use the access control list (ACL) editing features that are available in the DNS snap-in to add or to remove users or groups from the ACL for a specific zone or for a resource record. 

Standard (not an Active Directory integrated zone) has no Security settings: 

You need to firstly change the "Standard Primary Zone" to AD Integrated Zone: 

Now there's Security tab: 

References: http: //technet. microsoft. com/en-us/library/cc753014. aspx 

http: //technet. microsoft. com/en-us/library/cc726034. aspx 

http: //support. microsoft. com/kb/816101 


Q90. Your network contains an Active Directory domain named contoso.com. The domain contains a virtual machine named Server1 that runs Windows Server 2012 R2. 

Server1 has a dynamically expanding virtual hard disk that is mounted to drive E. 

You need to ensure that you can enable BitLocker Drive Encryption (BitLocker) on drive E. 

Which command should you run? 

A. manage-bde -protectors -add c: -startup e: 

B. manage-bde -lock e: 

C. manage-bde -protectors -add e: -startupkey c: 

D. manage-bde -on e: 

Answer:

Explanation: 

Manage-bde: on 

Encrypts the drive and turns on BitLocker. 

Example: 

The following example illustrates using the -on command to turn on BitLocker for drive C and add a recovery password to the drive. 

manage-bde –on C: -recoverypassword