Getting Smart with: examcollection 70 411

We provide real exam ref 70 411 administering windows server 2012 r2 pdf exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft 70 411 vce Exam quickly & easily. The 70 411 exam dumps pdf PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft mcp 70 411 dumps pdf and vce product and material, you can easily pass the 70 411 pdf exam.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-411 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-411 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-411-exam-dumps.html

Q121. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy Server server role installed. 

You need to allow connections that use 802.1x. 

What should you create? 

A. A network policy that uses Microsoft Protected EAP (PEAP) authentication 

B. A network policy that uses EAP-MSCHAP v2 authentication 

C. A connection request policy that uses EAP-MSCHAP v2 authentication 

D. A connection request policy that uses MS-CHAP v2 authentication 

Answer:

Explanation: 

802.1X uses EAP, EAP-TLS, EAP-MS-CHAP v2, and PEAP authentication methods: 

EAP (Extensible Authentication Protocol) uses an arbitrary authentication method, such as certificates, smart cards, or credentials. 

EAP-TLS (EAP-Transport Layer Security) is an EAP type that is used in certificate-based security environments, and it provides the strongest authentication and key determination method. 

EAP-MS-CHAP v2 (EAP-Microsoft Challenge Handshake Authentication Protocol version 2) is a mutual authentication method that supports password-based user or computer authentication. 

PEAP (Protected EAP) is an authentication method that uses TLS to enhance the security of other EAP authentication protocols. 

Connection request policies are sets of conditions and settings that allow network administrators to designate which Remote Authentication Dial-In User Service (RADIUS) servers perform the authentication and authorization of connection requests that the server running Network Policy Server (NPS) receives from RADIUS clients. Connection request policies can be configured to designate which RADIUS servers are used for RADIUS accounting. With connection request policies, you can use NPS as a RADIUS server or as a RADIUS proxy, based on factors such as the following: 

The time of day and day of the week 

The realm name in the connection request 

The type of connection being requested 

The IP address of the RADIUS client 


Q122. Your network contains an Active Directory domain named adatum.com. The domain contains 10 domain controllers that run Windows Server 2012 R2. 

You plan to create a new Active Directory-integrated zone named contoso.com. 

You need to ensure that the new zone will be replicated to only four of the domain controllers. 

What should you do first? 

A. Create an application directory partition. 

B. Create an Active Directory connection object. 

C. Create an Active Directory site link. 

D. Change the zone replication scope. 

Answer:

Explanation: 

Application directory partitions An application directory partition is a directory partition that is replicated only to specific domain controllers. A domain controller that participates in the replication of a particular application directory partition hosts a replica of that partition. Only domain controllers running Windows Server 2003 can host a replica of an application directory partition. 


Q123. Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named RODC1. 

You create a global group named RODC_Admins. 

You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on R0DC1. The solution must not provide RODC_Admins with the ability to manage Active Directory objects. 

What should you do? 

A. From Active Directory Site and Services, configure the Security settings of the RODC1 server object. 

B. From Windows PowerShell, run the Set-ADAccountControlcmdlet. 

C. From a command prompt, run the dsmgmt local roles command. 

D. From Active Directory Users and Computers, configure the Member Of settings of the RODC1 account. 

Answer:

Explanation: 

RODC: using the dsmgmt.exe utility to manage local administrators One of the benefits of RODC is that you can add local administrators who do not have full access to the domain administration. This gives them the ability to manage the server but not add or change active directory objects unless those roles are delegated. Adding this type of user is done using the dsmdmt.exe utility at the command prompt. 


Q124. Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers. The domain controllers are configured as shown in the following table. 

The network contains a server named Server1 that has the Hyper-v server role installed. DC6 is a virtual machine that is hosted on Server1. 

You need to ensure that you can clone DC6. 

Which FSMO role should you transfer to DC2? 

A. Rid master 

B. Domain naming master 

C. PDC emulator 

D. Infrastructure master 

Answer:

Explanation: 

The clone domain controller uses the security context of the source domain controller (the domain controller whose copy it represents) to contact the Windows Server 2012 R2 Primary Domain Controller (PDC) emulator operations master role holder (also known as flexible single master operations, or FSMO). The PDC emulator must be running Windows 

Server 2012 R2, but it does not have to be running on a hypervisor. 

Reference: 

http: //technet. microsoft. com/en-us/library/hh831734. aspx 


Q125. HOTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed. 

You have a client named Client1 that is configured as an 802. IX supplicant. 

You need to configure Server1 to handle authentication requests from Client1. The solution must minimize the number of authentication methods enabled on Server1. 

Which authentication method should you enable? To answer, select the appropriate authentication method in the answer area. 

Answer: 


Q126. Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs. 

A network administrator accidentally deletes the Default Domain Policy GPO. 

You do not have a backup of any of the GPOs. 

You need to recreate the Default Domain Policy GPO. 

What should you use? 

A. Dcgpofix 

B. Get-GPOReport 

C. Gpfixup 

D. Gpresult 

E. Gpedit. msc 

F. Import-GPO 

G. Restore-GPO 

H. Set-GPInheritance 

I. Set-GPLink 

J. Set-GPPermission 

K. Gpupdate 

L. Add-ADGroupMember 

Answer:

Explanation: 

Dcgpofix Restores the default Group Policy objects to their original state (that is, the default state after initial installation). 

Reference: http: //technet. microsoft. com/en-us/library/hh875588(v=ws. 10). aspx 


Q127. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

The network contains several group Managed Service Accounts that are used by four member servers. 

You need to ensure that if a group Managed Service Account resets a password of a domain user account, an audit entry is created. 

You create a Group Policy object (GPO) named GPO1. 

What should you do next? 

A. In GPO1, configure the Advanced Audit Policy Configuration settings for Audit User Account Management. Link GPO1 to the Domain Controllers organizational unit (OU). 

B. In GPO1, configure the Advanced Audit Policy Configuration settings for Audit User Account Management. Move the member servers to a new organizational unit (OU). Link GPO1 to the new OU. 

C. In GPO1, configure the Advanced Audit Policy Configuration settings for Audit Sensitive Privilege Use. Link GPO1 to the Domain Controllers organizational unit (OU). 

D. In GPO1, configure the Advanced Audit Policy Configuration settings for Audit Sensitive Privilege Use. Move the member servers to a new organizational unit (OU). Link GPO1 to the new OU. 

Answer:

Explanation: 

Audit User Account Management This security policy setting determines whether the operating system generates audit events when the following user account management tasks are performed: 

. A user account is created, changed, deleted, renamed, disabled, enabled, locked out, or unlocked. 

A user account password is set or changed. 

Security identifier (SID) history is added to a user account. 

The Directory Services Restore Mode password is set. 

Permissions on accounts that are members of administrators groups are changed. 

Credential Manager credentials are backed up or restored. 

This policy setting is essential for tracking events that involve provisioning and managing user accounts. 


Q128. Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server. 

You need to ensure that only computers that send a statement of health are checked for Network Access Protection (NAP) health requirements. 

Which two settings should you configure? (Each correct answer presents part of the solution. Choose two.) 

A. The Called Station ID constraints 

B. The MS-Service Class conditions 

C. The Health Policies conditions 

D. The NAS Port Type constraints 

E. The NAP-Capable Computers conditions 

Answer: C,E 

Reference: 

http://technet.microsoft.com/en-us/library/cc753603.aspx 

http://technet.microsoft.com/en-us/library/cc731220(v=ws.10).aspx 

http://technet.microsoft.com/en-us/library/cc731560.aspx 


Q129. HOTSPOT 

You have a server named Servers that runs Windows Server 2012 R2. Servers has the Windows Deployment Services server role installed. 

Server5 contains several custom images of Windows 8. 

You need to ensure that when 32-bit client computers start by using PXE, the computers automatically install an image named Image 1. 

What should you configure? 

To answer, select the appropriate tab in the answer area. 

Answer: 


Q130. Your company has a main office and two branch offices. The main office is located in Seattle. The two branch offices are located in Montreal and Miami. Each office is configured as an Active Directory site. 

The network contains an Active Directory domain named contoso.com. Network traffic is not routed between the Montreal office and the Miami office. 

You implement a Distributed File System (DFS) namespace named \\contoso.com\public. The namespace contains a folder named Folder1. Folder1 has a folder target in each office. 

You need to configure DFS to ensure that users in the branch offices only receive referrals to the target in their respective office or to the target in the main office. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Set the Ordering method of \\contoso.com\public to Random order. 

B. Set the Advanced properties of the folder target in the Seattle office to Last among all targets. 

C. Set the Advanced properties of the folder target in the Seattle office to First among targets of equal cost. 

D. Set the Ordering method of \\contoso.com\public to Exclude targets outside of the client's site. 

E. Set the Advanced properties of the folder target in the Seattle office to Last among targets of equal cost. 

F. Set the Ordering method of \\contoso.com\public to Lowest cost. 

Answer: C,D 

Explanation: 

Exclude targets outside of the client's site In this method, the referral contains only the targets that are in the same site as the client. These same-site targets are listed in random order. If no same-site targets exist, the client does not receive a referral and cannot access that portion of the namespace. Note: Targets that have target priority set to "First among all targets" or "Last among all targets" are still listed in the referral, even if the ordering method is set to Exclude targets outside of the client's site. Note 2: Set the Ordering Method for Targets in Referrals A referral is an ordered list of targets that a client computer receives from a domain controller or namespace server when the user accesses a namespace root or folder with targets. After the client receives the referral, the client attempts to access the first target in the list. If the target is not available, the client attempts to access the next target.