70-411 Premium Bundle

70-411 Premium Bundle

Administering Windows Server 2012 Certification Exam

4.5 
(2175 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 70-411 Free Practice Questions

Q1. Your network contains an Active Directory domain named contoso.com. The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy and Access Services server role installed. 

You plan to deploy additional servers that have the Network Policy and Access Services server role installed. You must standardize as many settings on the new servers as possible. 

You need to identify which settings can be standardized by using Network Policy Server (NPS) templates. 

Which three settings should you identify? (Each correct answer presents part of the solution. Choose three.) 

A. IP filters 

B. shared secrets 

C. health policies 

D. network policies 

E. connection request policies 

Answer: A,B,C 

Q2. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

The domain contains an Edge Server named Server1. Server1 is configured as a DirectAccess server. Server1 has the following settings: 

You run the Remote Access Setup wizard as shown in the following exhibit. (Click the Exhibit button.) 

You need to ensure that client computers on the Internet can establish DirectAccess connections to Server1. 

Which additional name suffix entry should you add from the Remote Access Setup wizard? 

A. A Name Suffix value of dal.contoso.com and a blank DNS Server Address value 

B. A Name Suffix value of Server1.contoso.com and a DNS Server Address value of 65.55.37.62 

C. A Name Suffix value of dal.contoso.com and a DNS Server Address value of 

65.55.37.62 

D. A Name Suffix value of Server1.contoso.com and a blank DNS Server Address value 

Answer:

Explanation: 

Split-brain DNS is the use of the same DNS domain for both Internet and intranet resources. For example, the Contoso Corporation is using split brain DNS; contoso.com is the domain name for intranet resources and Internet resources. Internet users use http: //www.contoso.com to access Contoso’s public Web site and Contoso employees on the Contoso intranet use http: //www.contoso.com to access Contoso’s intranet Web site. A Contoso employee with their laptop that is not a DirectAccess client on the intranet that 

accesses http: //www.contoso.com sees the intranet Contoso Web site. When they take their laptop to the local coffee shop and access that same URL, they will see the public Contoso Web site. 

When a DirectAccess client is on the Internet, the Name Resolution Policy Table (NRPT) sends DNS name queries for intranet resources to intranet DNS servers. A typical NRPT for DirectAccess will have a rule for the namespace of the organization, such as contoso.com for the Contoso Corporation, with the Internet Protocol version 6 (IPv6) addresses of intranet DNS servers. With just this rule in the NRPT, when a user on a DirectAccess client on the Internet attempts to access the uniform resource locator (URL) for their Web site (such as http: //www.contoso.com), they will see the intranet version. 

Because of this rule, they will never see the public version of this URL when they are on the Internet. 

For split-brain DNS deployments, you must list the FQDNs that are duplicated on the Internet and intranet and decide which resources the DirectAccess client should reach, the intranet version or the public (Internet) version. For each name that corresponds to a resource for which you want DirectAccess clients to reach the public version, you must add the corresponding FQDN as an exemption rule to the NRPT for your DirectAccess clients. 

Name suffixes that do not have corresponding DNS servers are treated as exemptions. 

References: 

http: //technet. microsoft. com/en-us/library/ee382323(v=ws. 10). aspx 

Q3. Your network contains an Active Directory domain named contoso.com. The Active Directory Recycle bin is enabled for contoso.com. 

A support technician accidentally deletes a user account named User1. You need to restore the User1 account. 

Which tool should you use? 

A. Ldp 

B. Esentutl 

C. Active Directory Administrative Center 

D. Ntdsutil 

Answer:

Q4. Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server. 

You need to ensure that only computers that send a statement of health are checked for Network Access Protection (NAP) health requirements. 

Which two settings should you configure? (Each correct answer presents part of the solution. Choose two.) 

A. The Called Station ID constraints 

B. The MS-Service Class conditions 

C. The Health Policies conditions 

D. The NAS Port Type constraints 

E. The NAP-Capable Computers conditions 

Answer: C,E 

Reference: 

http://technet.microsoft.com/en-us/library/cc753603.aspx 

http://technet.microsoft.com/en-us/library/cc731220(v=ws.10).aspx 

http://technet.microsoft.com/en-us/library/cc731560.aspx 

Q5. DRAG DROP 

You are a network administrator of an Active Directory domain named contoso.com. 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Web Server (IIS) server role installed. 

Server1 will host a web site at URL https: //secure.contoso.com. The application pool identity account of the web site will be set to a domain user account named AppPool1. 

You need to identify the setspn.exe command that you must run to configure the appropriate Service Principal Name (SPN) for the web site. 

What should you run? 

To answer, drag the appropriate objects to the correct location. Each object may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q6. You have a DNS server named Server1. 

Server1 has a primary zone named contoso.com. 

Zone Aging/Scavenging is configured for the contoso.com zone. 

One month ago, an administrator removed a server named Server2 from the network. 

You discover that a static resource record for Server2 is present in contoso.com. Resource records for decommissioned client computers are removed automatically from contoso.com. 

You need to ensure that the static resource records for all of the servers are removed automatically from contoso.com. 

What should you modify? 

A. The Expires after value of contoso.com 

B. The Record time stamp value of the static resource records 

C. The time-to-live (TTL) value of the static resource records 

D. The Security settings of the static resource records 

Answer:

Explanation: 

Reset and permit them to use a current (non-zero) time stamp value. This enables these records to become aged and scavenged. 

You can use this procedure to change how a specific resource record is scavenged. 

A stale record is a record where both the No-Refresh Interval and Refresh Interval have passed without the time stamp updating. 

DNS->View->Advanced 

Depending on the how the resource record was originally added to the zone, do one of the following: If the record was added dynamically using dynamic update, clear the Delete this record when it becomes stale check box to prevent its aging or potential removal during the scavenging process. If dynamic updates to this record continue to occur, the Domain Name System (DNS) server will always reset this check box so that the dynamically updated record can be deleted. 

If you added the record statically, select the Delete this record when it becomes stale check box to permit its aging or potential removal during the scavenging process. 

References: http: //technet. microsoft. com/en-us/library/cc759204%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc759204%28v=ws. 10%29. aspx 

Typically, stale DNS records occur when a computer is permanently removed from the network. Mobile users who abnormally disconnect from the network can also cause stale DNS records. To help manage stale records, Windows adds a time stamp to dynamically added resource records in primary zones where aging and scavenging are enabled. Manually added records are time stamped with a value of 0, and they are automatically excluded from the aging and scavenging process. 

To enable aging and scavenging, you must do the following: 

Resource records must be either dynamically added to zones or manually modified to be used in aging and scavenging operations. 

Scavenging and aging must be enabled both at the DNS server and on the zone. 

Scavenging is disabled by default. 

DNS scavenging depends on the following two settings: 

No-refresh interval: The time between the most recent refresh of a record time stamp and the moment when the time stamp can be refreshed again. When scavenging is enabled, this is set to 7 days by default. 

Refresh interval: The time between the earliest moment when a record time stamp can be refreshed and the earliest moment when the record can be scavenged. The refresh interval must be longer than the maximum record refresh period. When scavenging is enabled, this is set to 7 days by default. 

A DNS record becomes eligible for scavenging after both the no-refresh and refresh intervals have elapsed. If the default values are used, this is a total of 14 days. 

References: http: //technet. microsoft. com/en-us/library/cc759204%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc759204%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc771570. aspx 

http: //technet. microsoft. com/en-us/library/cc771677. aspx 

http: //technet. microsoft. com/en-us/library/cc758321(v=ws. 10). aspx 

Q7. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

You need to audit successful and failed attempts to read data from USB drives on the servers. 

Which two objects should you configure? To answer, select the appropriate two objects in the answer area. 

Answer:  

Q8. Your network contains an Active Directory domain named contoso.com. 

Network Policy Server (NPS) is deployed to the domain. 

You plan to deploy Network Access Protection (NAP). 

You need to configure the requirements that are validated on the NPS client computers. 

What should you do? 

A. From the Network Policy Server console, configure a network policy. 

B. From the Network Policy Server console, configure a health policy. 

C. From the Network Policy Server console, configure a Windows Security Health Validator (WSHV) policy. 

D. From a Group Policy object (GPO), configure the NAP Client Configuration security setting. 

E. From a Group Policy object (GPO), configure the Network Access Protection Administrative Templates setting. 

Answer:

Q9. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Server1 has the Network Policy Server server role installed. Server2 has the DHCP Server server role installed. Both servers run Windows Server 2012 R2. 

You are configuring Network Access Protection (NAP) to use DHCP enforcement. 

You configure a DHCP scope as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that non-compliant NAP clients receive different DHCP options than compliant NAP clients. 

What should you configure on each server? To answer, select the appropriate options for each server in the answer area. 

Answer:  

Q10. Your company has a main office and a branch office. The main office is located in Seattle. The branch office is located in Montreal. Each office is configured as an Active Directory site. 

The network contains an Active Directory domain named adatum.com. The Seattle office contains a file server named Server1. The Montreal office contains a file server named Server2. 

The servers run Windows Server 2012 R2 and have the File and Storage Services server role, the DFS Namespaces role service, and the DFS Replication role service installed. 

Server1 and Server2 each have a share named Share1 that is replicated by using DFS Replication. 

You need to ensure that users connect to the replicated folder in their respective office when they connect to \\contoso.com\Share1. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. Create a replication connection. 

B. Create a namespace. 

C. Share and publish the replicated folder. 

D. Create a new topology. 

E. Modify the Referrals settings. 

Answer: B,C,E 

Explanation: 

To share a replicated folder and publish it to a DFS namespace Click Start, point to Administrative Tools, and then click DFS Management. In the console tree, under the Replication node, click the replication group that contains the replicated folder you want to share. In the details pane, on the Replicated Folders tab, right-click the replicated folder that you want to share, and then click Share and Publish in Namespace. In the Share and Publish Replicated Folder Wizard, click Share and publish the replicated folder in a 

namespace, and then follow the steps in the wizard. 

Note that: If you do not have an existing namespace, you can create one in the 

Namespace Path page in the Share and Publish Replicated Folder Wizard. To create the namespace, in the Namespace Path page, click Browse, and then click New Namespace. 

To create a namespace 

Click Start, point to Administrative Tools, and then click DFS Management. 

In the console tree, right-click the Namespaces node, and then click New Namespace. 

Follow the instructions in the New Namespace Wizard. 

To create a stand-alone namespace on a failover cluster, specify the name of a clustered file server instance on the Namespace Server page of the New Namespace Wizard. 

Important 

Do not attempt to create a domain-based namespace using the Windows Server 2008 mode unless the forest functional level is Windows Server 2003 or higher. Doing so can result in a namespace for which you cannot delete DFS folders, yielding the following error message: “The folder cannot be deleted. Cannot complete this function.” 

To share a replicated folder and publish it to a DFS namespace 

1. Click Start, point to Administrative Tools, and then click DFS Management. 

2. In the console tree, under the Replication node, click the replication group that contains the replicated folder you want to share. 

3. In the details pane, on the Replicated Folders tab, right-click the replicated folder that you want to share, and then click Share and Publish in Namespace. 

4. In the Share and Publish Replicated Folder Wizard, click Share and publish the replicated folder in a namespace, and then follow the steps in the wizard. 

"You need to ensure that users connect to the replicated folder in their respective office when they connect to \\contoso.com\Share1." 

Reference: http: //technet. microsoft. com/en-us/library/cc731531. aspx 

http: //technet. microsoft. com/en-us/library/cc772778%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc732414. aspx 

http: //technet. microsoft. com/en-us/library/cc772379. aspx 

http: //technet. microsoft. com/en-us/library/cc732863%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc725830. aspx 

http: //technet. microsoft. com/en-us/library/cc771978. aspx 

Q11. Your network contains an Active Directory domain named contoso.com. 

All user accounts reside in an organizational unit (OU) named OU1. 

You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU1. You 

configure the Group Policy preference of GPO1 to add a shortcut named Link1 to the desktop of each user. 

You discover that when a user deletes Link1, the shortcut is removed permanently from the desktop. 

You need to ensure that if a user deletes Link1, the shortcut is added to the desktop again. What should you do? 

A. Enforce GPO1. 

B. Modify the Link1 shortcut preference of GPO1. 

C. Enable loopback processing in GPO1. 

D. Modify the Security Filtering settings of GPO1. 

Answer:

Explanation: 

Replace Delete and recreate a shortcut for computers or users. The net result of the Replace action is to overwrite the existing shortcut. If the shortcut does not exist, then the Replace action creates a new shortcut. 

This type of preference item provides a choice of four actions: Create, Replace, Update, and Delete. The behavior of the preference item varies with the action selected and whether the shortcut already exists. 

Refernces: http: //technet.microsoft.com/en-us/library/cc753580.aspx http: //technet.microsoft.com/en-us/library/cc753580.aspx 

Q12. You have a file server that has the File Server Resource Manager role service installed. 

You open the File Server Resource Manager console as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that all of the folders in Folder1 have a 100-MB quota limit. 

What should you do? 

A. Run the Update FsrmQuotacmdlet. 

B. Run the Update-FsrmAutoQuotacmdlet. 

C. Create a new quota for Folder1. 

D. Modify the quota properties of Folder1. 

Answer:

Explanation: 

By using auto apply quotas, you can assign a quota template to a parent volume or folder. Then File Server Resource Manager automatically generates quotas that are based on that template. Quotas are generated for each of the existing subfolders and for subfolders that you create in the future. 

Ref: http://technet.microsoft.com/en-us/library/cc731577.aspx 

Q13. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012. 

You have a Group Policy object (GPO) named GPO1 that contains several custom Administrative templates. 

You need to filter the GPO to display only settings that will be removed from the registry when the GPO falls out of scope. The solution must only display settings that are either enabled or disabled and that have a comment. 

How should you configure the filter? 

To answer, select the appropriate options below. Select three. 

A. Set Managed to: Yes 

B. Set Managed to: No 

C. Set Managed to: Any 

D. Set Configured to: Yes 

E. Set Configured to: No 

F. Set Configured to: Any 

G. Set Commented to: Yes 

H. Set Commented to: No 

I. Set Commented to: Any 

Answer: A,F,G 

Q14. HOTSPOT 

You have a server named Server4 that runs Windows Server 2012 R2. Server4 has the Windows Deployment Services server role installed. 

Server4 is configured as shown in the exhibit. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. 

Answer:  

Q15. HOTSPOT 

You have a server named Server1 that has the Network Policy and Access Services server role installed. 

You plan to configure Network Policy Server (NPS) on Server1 to use certificate-based authentication for VPN connections. 

You obtain a certificate for NPS. 

You need to ensure that NPS can perform certificate-based authentication. 

To which store should you import the certificate? 

To answer, select the appropriate store in the answer area. 

Answer:  

START 70-411 EXAM