70-411 Premium Bundle

70-411 Premium Bundle

Administering Windows Server 2012 Certification Exam

4.5 
(22665 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-411 Free Practice Questions

Q1. You manage a server that runs Windows Server 2012 R2. The server has the Windows Deployment Services server role installed. 

You start a virtual machine named VM1 as shown in the exhibit. (Click the Exhibit button.) 

You need to configure a pre-staged device for VM1 in the Windows Deployment Services console. 

Which two values should you assign to the device ID? (Each correct answer presents a complete solution. Choose two.) 

A. 979708BFC04B45259FE0C4150BB6C618 

B. 979708BF-C04B-4525-9FE0-C4150BB6C618 

C. 00155D000F1300000000000000000000 

D. 0000000000000000000000155D000F13 

E. 00000000-0000-0000-0000-C4150BB6C618 

Answer: B,D 

Explanation: 

Use client computer's media access control (MAC) address preceded with twenty zeros or the globally unique identifier (GUID) in the format: {XXXXXXXX-XXXX-XXXX-XXX-XXXXXXXXXXXX}. 

Reference: http: //technet. microsoft. com/en-us/library/cc754469. aspx 

Q2. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 has the DHCP Server server role and the Network Policy Server role service installed. 

Server1 contains three non-overlapping scopes named Scope1, Scope2, and Scope3. Server1 currently provides the same Network Access Protection (NAP) settings to the three scopes. 

You modify the settings of Scope1 as shown in the exhibit. (Click the Exhibit button.) 

You need to configure Server1 to provide unique NAP enforcement settings to the NAP non-compliant DHCP clients from Scope1. 

What should you create? 

A. A connection request policy that has the Service Type condition 

B. A connection request policy that has the Identity Type condition 

C. A network policy that has the Identity Type condition 

D. A network policy that has the MS-Service Class condition 

Answer:

Explanation: 

MS-Service Class 

Restricts the policy to clients that have received an IP address from a DHCP scope that matches the specified DHCP profile name. This condition is used only when you are deploying NAP with the DHCP enforcement method. To use the MS-Service Class attribute, in Specify the profile name that identifies your DHCP scope, type the name of an existing DHCP profile. 

Open the NPS console, double-click Policies, click Network Policies, and then double-click the policy you want to configure. 

In policy Properties, click the Conditions tab, and then click Add. In Select condition, scroll to the Network Access Protection group of conditions. 

If you want to configure the Identity Type condition, click Identity Type, and then click Add. 

In Specify the method in which clients are identified in this policy, select the items appropriate for your deployment, and then click OK. 

The Identity Type condition is used for the DHCP and Internet Protocol security (IPsec) enforcement methods to allow client health checks when NPS does not receive an Access-Request message that contains a value for the User-Name attribute; in this case, client health checks are performed, but authentication and authorization are not performed. 

If you want to configure the MS-Service Class condition, click MS-Service Class, and then click Add. In Specify the profile name that identifies your DHCP scope, type the name of an existing DHCP profile, and then click Add. 

The MS-Service Class condition restricts the policy to clients that have received an IP address from a DHCP scope that matches the specified DHCP profile name. This condition is used only when you are deploying NAP with the DHCP enforcement method. 

References: http: //technet. microsoft. com/en-us/library/cc731560(v=ws. 10). aspx 

http: //technet. microsoft. com/en-us/library/cc731220(v=ws. 10). aspx 

Q3. HOTSPOT 

Your network contains a DNS server named Server1 that runs Windows Server 2012 R2. Server1 has a zone named contoso.com. The network contains a server named Server2 that runs Windows Server 2008 R2. Server1 and Server2 are members of an Active Directory domain named contoso.com. 

You change the IP address of Server2. 

Several hours later, some users report that they cannot connect to Server2. 

On the affected users' client computers, you flush the DNS client resolver cache, and the users successfully connect to Server2. 

You need to reduce the amount of time that the client computers cache DNS records from contoso.com. 

Which value should you modify in the Start of Authority (SOA) record? To answer, select the appropriate setting in the answer area. 

Answer:  

Q4. Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. All of the DNS servers in both of the domains run Windows Server 2012 R2. 

The network contains two servers named Server1 and Server2. Server1 hosts an Active Directory-integrated zone for contoso.com. Server2 hosts an Active Directory-integrated zone for fabrikam.com. Server1 and Server2 connect to each other by using a WAN link. 

Client computers that connect to Server1 for name resolution cannot resolve names in fabnkam.com. 

You need to configure Server1 to support the resolution of names in fabnkam.com. The solution must ensure that users in contoso.com can resolve names in fabrikam.com if the WAN link fails. 

What should you do on Server1? 

A. Create a stub zone. 

B. Add a forwarder. 

C. Create a secondary zone. 

D. Create a conditional forwarder. 

Answer:

Explanation: 

http: //technet. microsoft. com/en-us/library/cc771898. aspx 

When a zone that this DNS server hosts is a secondary zone, this DNS server is a secondary source for information about this zone. The zone at this server must be obtained from another remote DNS server computer that also hosts the zone. 

With secondary, you have ability to resolve records from the other domain even if its DNS servers are temporarily unavailable. 

While secondary zones contain copies of all the resource records in the corresponding zone on the master name server, stub zones contain only three kinds of resource records: 

A copy of the SOA record for the zone. 

Copies of NS records for all name servers authoritative for the zone. 

Copies of A records for all name servers authoritative for the zone. 

References: 

http: //www. windowsnetworking. com/articles-tutorials/windows-2003/DNS_Stub_Zones. html 

http: //technet. microsoft. com/en-us/library/cc771898. aspx 

http: //redmondmag. com/Articles/2004/01/01/The-Long-and-Short-of-Stub-Zones. aspx?Page=2 

Q5. HOTSPOT 

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1. 

Your company implements DirectAccess. 

A user named User1 works at a customer's office. The customer's office contains a server named Server1. 

When User1 attempts to connect to Server1, User1 connects to Server1 in adatum.com. You need to provide User1 with the ability to connect to Server1 in the customer's office. Which Group Policy option should you configure? To answer, select the appropriate option in the answer area. 

Answer:  

Q6. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 

Each time a user receives an access-denied message after attempting to access a folder on Server1, an email notification is sent to a distribution list named DLL. 

You create a folder named Folder1 on Server1, and then you configure custom NTFS permissions for Folder1. 

You need to ensure that when a user receives an access-denied message while attempting to access Folder1, an email notification is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving notifications about other access-denied messages. 

What should you do? 

A. From the File Server Resource Manager console, create a local classification property. 

B. From Server Manager, run the New Share Wizard to create a share for Folder1 by selecting the SMB Share - Applications option. 

C. From the File Server Resource Manager console, modify the Access-Denied Assistance settings. 

D. From the File Server Resource Manager console, set a folder management property. 

Answer:

Q7. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains three member servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2 and have the Windows Server Update Services (WSUS) server role installed. 

Server1 and Server2 are configured as replica servers that use Server3 as an upstream server. 

You remove Servers from the network. 

You need to ensure that WSUS on Server2 retrieves updates from Server1. The solution must ensure that Server1 and Server2 have the latest updates from Microsoft. 

Which command should you run on each server? To answer, select the appropriate command to run on each server in the answer area. 

Answer:  

Q8. You have Windows Server 2012 R2 installation media that contains a file named Install.wim. You need to identify the permissions of the mounted images in Install.wim. 

What should you do? 

A. Run dism.exe and specify the /get-mountedwiminfo parameter. 

B. Run imagex.exe and specify the /verify parameter. 

C. Run imagex.exe and specify the /ref parameter. 

D. Run dism.exe and specify the/get-imageinfo parameter. 

Answer:

Explanation: 

/Get-MountedWimInfo Lists the images that are currently mounted and information about the mounted image such as read/write permissions, mount location, mounted file path, and mounted image index. 

References: 

 http: //technet. microsoft. com/en-us/library/cc749447(v=ws. 10). aspx 

http: //technet. microsoft. com/en-us/library/dd744382(v=ws. 10). aspx 

http: //technet. microsoft. com/en-us/library/hh825224. aspx 

Q9. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

Administrators use client computers that run Windows 8 to perform all management tasks. 

A central store is configured on a domain controller named DC1. 

You have a custom administrative template file named App1.admx. App1.admx contains application settings for an application named Appl. 

From a client computer named Computer1, you create a new Group Policy object (GPO) named GPO1. 

You discover that the application settings for App1 fail to appear in GPO1. 

You need to ensure that the App1 settings appear in all of the new GPOs that you create. 

What should you do? 

A. From the Default Domain Controllers Policy, add App1.admx to the Administrative Templates. 

B. Copy App1.admx to \\Contoso.com\SYSVOL\Contoso.com\Policies\PolicyDefinitions\. 

C. From the Default Domain Policy, add App1.admx to the Administrative Templates. 

D. Copy App1.admx to \\Contoso.com\SYSVOL\Contoso.com\StarterGPOs. 

Answer:

Explanation: 

To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain. 

Q10. Your company deploys a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2. The forest contains a domain controller named DC10. 

On DC10, the disk that contains the SYSVOL folder fails. 

You replace the failed disk. You stop the Distributed File System (DFS) Replication service. You restore the SYSVOL folder. 

You need to perform a non-authoritative synchronization of SYSVOL on DC10. 

Which tool should you use before you start the DFS Replication service on DC10? 

A. Dfsgui.msc 

B. Dfsmgmt.msc 

C. Adsiedit.msc 

D. Ldp 

Answer:

Explanation: 

How to perform a non-authoritative synchronization of DFSR-replicated SYSVOL (like "D2" for FRS) 

. In the ADSIEDIT. MSC tool modify the following distinguished name (DN) value and attribute on each of the domain controllers that you want to make non-authoritative: 

CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=<the server name>,OU=Domain Controllers,DC=<domain> msDFSR-Enabled=FALSE 

. Force Active Directory replication throughout the domain. 

. Run the following command from an elevated command prompt on the same servers that you set as non-authoritative: 

DFSRDIAG POLLAD 

. You will see Event ID 4114 in the DFSR event log indicating SYSVOL is no longer being replicated. 

. On the same DN from Step 1, set: 

msDFSR-Enabled=TRUE 

. Force Active Directory replication throughout the domain. 

. Run the following command from an elevated command prompt on the same servers that you set as non-authoritative: 

DFSRDIAG POLLAD 

. You will see Event ID 4614 and 4604 in the DFSR event log indicating SYSVOL has been initialized. That domain controller has now done a “D2” of SYSVOL. 

Note: Active Directory Service Interfaces Editor (ADSI Edit) is a Lightweight Directory Access Protocol (LDAP) editor that you can use to manage objects and attributes in Active Directory. ADSI Edit (adsiedit. msc) provides a view of every object and attribute in an Active Directory forest. You can use ADSI Edit to query, view, and edit attributes that are not exposed through other Active Directory Microsoft Management Console (MMC) snap-ins: Active Directory Users and Computers, Active Directory Sites and Services, Active Directory Domains and Trusts, and Active Directory Schema. 

Q11. Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2012 R2. The domain contains a virtual machine named DC2. 

On DC2, you run Get-ADDCCIoningExcludedApplicationList and receive the output shown in the following table. 

You need to ensure that you can clone DC2. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

E. Option E 

Answer: A,E 

Explanation: 

Because domain controllers provide a distributed environment, you could not safely clone an Active Directory domain controller in the past. 

Before, if you cloned any server, the server would end up with the same domain or forest, which is unsupported with the same domain or forest. You would then have to run sysprep, which would remove the unique security information before cloning and then promote a domain controller manually. When you clone a domain controller, you perform safe cloning, which a cloned domain controller automatically runs a subset of the sysprep process and promotes the server to a domain controller automatically. 

The four primary steps to deploy a cloned virtualized domain controller are as follows: 

. Grant the source virtualized domain controller the permission to be cloned by 

adding the source virtualized domain controller to the Cloneable Domain 

Controllers group. 

. Run Get-ADDCCloningExcludedApplicationListcmdlet in Windows PowerShell to determine which services and applications on the domain controller are not compatible with the cloning. 

. Run New-ADDCCloneConfigFile to create the clone configuration file, which is stored in the C:\Windows\NTDS. 

. In Hyper-V, export and then import the virtual machine of the source domain controller. 

Run Get-ADDCCloningExcludedApplicationListcmdlet In this procedure, run the Get-ADDCCloningExcludedApplicationListcmdlet on the source virtualized domain controller to identify any programs or services that are not evaluated for cloning. You need to run the Get-ADDCCloningExcludedApplicationListcmdlet before the New-ADDCCloneConfigFilecmdlet because if the New-ADDCCloneConfigFilecmdlet detects an excluded application, it will not create a DCCloneConfig.xml file. To identify applications or services that run on a source domain controller which have not been evaluated for cloning. 

Get-ADDCCloningExcludedApplicationList 

Get-ADDCCloningExcludedApplicationList -GenerateXml 

The clone domain controller will be located in the same site as the source domain controller unless a different site is specified in the DCCloneConfig.xml file. 

Note: 

. The Get-ADDCCloningExcludedApplicationListcmdlet searches the local domain controller for programs and services in the installed programs database, the services control manager that are not specified in the default and user defined inclusion list. The applications in the resulting list can be added to the user defined exclusion list if they are determined to support cloning. If the applications are not cloneable, they should be removed from the source domain controller before the clone media is created. Any application that appears in cmdlet output and is not included in the user defined inclusion list will force cloning to fail. 

. The Get-ADDCCloningExcludedApplicationListcmdlet needs to be run before the New- ADDCCloneConfigFilecmdlet is used because if the New-ADDCCloneConfigFilecmdlet detects an excluded application, it will not create a DCCloneConfig.xml file. 

. DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways. 

The New-ADDCCloneConfigcmdlet in PowerShell 

By hand with an XML editor 

By editing an existing config file, again with an XML editor (Notepad is not an XML editor.) 

You can populate the XML file. . . . . doesn't need to be empty. . . . . 

References: http: //technet. microsoft. com/en-us/library/hh831734. aspx 

http: //blogs. dirteam. com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-cloning. aspx 

Q12. Your network is configured as shown in the exhibit. (Click the Exhibit button.) 

Server1 regularly accesses Server2. 

You discover that all of the connections from Server1 to Server2 are routed through Routerl. 

You need to optimize the connection path from Server1 to Server2. 

Which route command should you run on Server1? 

A. Route add -p 192.168.2.0 MASK 255.255.255.0 192.168.2.1 METRIC 50 

B. Route add -p 192.168.2.12 MASK 255.255.255.0 192.168.2.1 METRIC 100 

C. Route add -p 192.168.2.12 MASK 255.255.255.0 192.168.2.0 METRIC 50 

D. Route add -p 192.168.2.0 MASK 255.255.255.0 192.168.1.2 METRIC 100 

Answer:

Q13. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

Server1 has the following role services installed: 

. DirectAccess and VPN (RRAS) 

. Network Policy Server 

Remote users have client computers that run either Windows XP, Windows 7, or Windows 8. 

You need to ensure that only the client computers that run Windows 7 or Windows 8 can establish VPN connections to Server1. 

What should you configure on Server1? 

A. A condition of a Network Policy Server (NPS) network policy 

B. A constraint of a Network Policy Server (NPS) network policy 

C. a condition of a Network Policy Server (NPS) connection request policy 

D. A vendor-specific RADIUS attribute of a Network Policy Server (NPS) connection request policy 

Answer:

Explanation: 

If you want to configure the Operating System condition, click Operating System, and then click Add. In Operating System Properties, click Add, and then specify the operating system settings that are required to match the policy. 

The Operating System condition specifies the operating system (operating system version or service pack number), role (client or server), and architecture (x86, x64, or ia64) required for the computer configuration to match the policy. 

Q14. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains two servers. The servers are configured as shown in the following table. 

All client computers run Windows 8 Enterprise. 

You plan to deploy Network Access Protection (NAP) by using IPSec enforcement. 

A Group Policy object (GPO) named GPO1 is configured to deploy a trusted server group to all of the client computers. 

You need to ensure that the client computers can discover HRA servers automatically. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. On all of the client computers, configure the EnableDiscovery registry key. 

B. In a GPO, modify the Request Policy setting for the NAP Client Configuration. 

C. On Server2, configure the EnableDiscovery registry key. 

D. On DC1, create an alias (CNAME) record. 

E. On DC1, create a service location (SRV) record. 

Answer: A,B,E 

Explanation: 

Requirements for HRA automatic discovery 

The following requirements must be met in order to configure trusted server groups on NAP client computers using HRA automatic discovery: 

Client computers must be running Windows Vista. with Service Pack 1 (SP1) or Windows XP with Service Pack 3 (SP3). 

The HRA server must be configured with a Secure Sockets Layer (SSL) certificate. 

The EnableDiscovery registry key must be configured on NAP client computers. 

DNS SRV records must be configured. 

The trusted server group configuration in either local policy or Group Policy must be cleared. 

http: //technet. microsoft. com/en-us/library/dd296901. aspx 

Q15. Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers. The domain controllers are configured as shown in the following table. 

The network contains a server named Server1 that has the Hyper-v server role installed. DC6 is a virtual machine that is hosted on Server1. 

You need to ensure that you can clone DC6. 

Which FSMO role should you transfer to DC2? 

A. Rid master 

B. Domain naming master 

C. PDC emulator 

D. Infrastructure master 

Answer:

Explanation: 

The clone domain controller uses the security context of the source domain controller (the domain controller whose copy it represents) to contact the Windows Server 2012 R2 Primary Domain Controller (PDC) emulator operations master role holder (also known as flexible single master operations, or FSMO). The PDC emulator must be running Windows 

Server 2012 R2, but it does not have to be running on a hypervisor. 

Reference: 

http: //technet. microsoft. com/en-us/library/hh831734. aspx 

START 70-411 EXAM