70-411 Premium Bundle

70-411 Premium Bundle

Administering Windows Server 2012 Certification Exam

4.5 
(6450 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-411 Free Practice Questions

Q1. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. You plan to use fine-grained password policies to customize the password policy settings ofcontoso.com. 

You need to identify to which Active Directory object types you can directly apply the fine-grained password policies. 

Which two object types should you identify? (Each correct answer presents part of the solution. Choose two.) 

A. Users 

B. Global groups 

C. computers 

D. Universal groups 

E. Domain local groups 

Answer: A,B 

Explanation: 

First off, your domain functional level must be at Windows Server 2008. Second, Fine-grained password policies ONLY apply to user objects, and global security groups. Linking them to universal or domain local groups is ineffective. I know what you’re thinking, what about OU’s? Nope, Fine-grained password policy cannot be applied to an organizational unit (OU) directly. The third thing to keep in mind is, by default only members of the Domain Admins group can set fine-grained password policies. However, you can delegate this ability to other users if needed. 

Fine-grained password policies apply only to user objects (or inetOrgPerson objects if they are used instead of user objects) and global security groups. 

You can apply Password Settings objects (PSOs) to users or global security groups: 

References: 

http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc770848%28v=ws. 10%29. aspx 

http: //www. brandonlawson. com/active-directory/creating-fine-grained-password-policies/ 

Q2. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Network Policy Server role service installed. 

An administrator creates a RADIUS client template named Template1. 

You create a RADIUS client named Client1 by using Template 1. 

You need to modify the shared secret for Client1. 

What should you do first? 

A. Configure the Advanced settings of Template1. 

B. Set the Shared secret setting of Template1 to Manual. 

C. Clear Enable this RADIUS client for Client1. 

D. Clear Select an existing template for Client1. 

Answer:

Explanation: 

Clear checkmark for Select an existing template in the new client wizard. 

In New RADIUS Client, in Shared secret, do one of the following: 

Bullet Ensure that Manual is selected, and then in Shared secret, type the strong password that is also entered on the RADIUS client. Retype the shared secret in Confirm shared secret. 

Q3. You have a server named Server1 that runs Windows Server 2012 R2. You create a Data Collector Set (DCS) named DCS1. 

You need to configure DCS1 to log data to D:\logs. 

What should you do? 

A. Right-click DCS1 and click Properties. 

B. Right-click DCS1 and click Export list. 

C. Right-click DCS1 and click Data Manager. 

D. Right-click DCS1 and click Save template. 

Answer:

Explanation: 

The Root Directory will contain data collected by the Data Collector Set. Change this setting if you want to store your Data Collector Set data in a different location than the default. Browse to and select the directory, or type the directory name. 

To view or modify the properties of a Data Collector Set after it has been created, you can: 

* Select the Open properties for this data collector set check box at the end of the Data 

Collector Set Creation Wizard. 

* Right-click the name of a Data Collector Set, either in the MMC scope tree or in the 

console window, and click Properties in the context menu. 

Directory tab: 

In addition to defining a root directory for storing Data Collector Set data, you can specify a 

single Subdirectory or create a Subdirectory name format by clicking the arrow to the right 

of the text entry field. 

Q4. You have a failover cluster that contains five nodes. All of the nodes run Windows Server 2012 R2. All of the nodes have BitLocker Drive Encryption (BitLocker) enabled. 

You enable BitLocker on a Cluster Shared Volume (CSV). 

You need to ensure that all of the cluster nodes can access the CSV. 

Which cmdlet should you run next? 

A. Unblock-Tpm 

B. Add-BitLockerKeyProtector 

C. Remove-BitLockerKeyProtector 

D. Enable BitLockerAutoUnlock 

Answer:

Explanation: 

4. Add an Active Directory Security Identifier (SID) to the CSV disk using the Cluster Name Object (CNO) The Active Directory protector is a domain security identifier (SID) based protector for protecting clustered volumes held within the Active Directory infrastructure. It can be bound to a user account, machine account or group. When an unlock request is made for a protected volume, the BitLocker service interrupts the request and uses the BitLocker protect/unprotect APIs to unlock or deny the request. For the cluster service to selfmanage BitLocker enabled disk volumes, an administrator must add the Cluster Name Object (CNO), which is the Active Directory identity associated with the Cluster Network name, as a BitLocker protector to the target disk volumes. Add-BitLockerKeyProtector <drive letter or CSV mount point> -ADAccountOrGroupProtector – ADAccountOrGroup $cno 

Q5. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 

Each time a user receives an access-denied message after attempting to access a folder on Server1, an email notification is sent to a distribution list named DL1. 

You create a folder named Folder1 on Server1, and then you configure custom NTFS permissions for Folder 1. 

You need to ensure that when a user receives an access-denied message while attempting to access Folder1, an email notification is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving notifications about other access-denied messages. 

What should you do? 

A. From File Explorer, modify the Classification tab of Folder1. 

B. From the File Server Resource Manager console, modify the Email Notifications settings. 

C. From the File Server Resource Manager console, set a folder management property. 

D. From File Explorer, modify the Customize tab of Folder1. 

Answer:

Explanation: 

When using the email model each of the file shares, you can determine whether access requests to each file share will be received by the administrator, a distribution list that represents the file share owners, or both. 

You can use the File Server Resource Manager console to configure the owner distribution list by editing the management properties of the classification properties. 

Reference: http://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK_12 

Q6. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Windows Deployment Services server role installed. 

Server1 contains two boot images and four install images. 

You need to ensure that when a computer starts from PXE, the available operating system 

images appear in a specific order. 

What should you do? 

A. Modify the properties of the boot images. 

B. Create a new image group. 

C. Modify the properties of the install images. 

D. Modify the PXE Response Policy. 

Answer:

Q7. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. 

You view the effective policy settings of Server1 as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that an entry is added to the event log whenever a local user account is created or deleted on Server1. 

What should you do? 

A. In Servers GPO, modify the Advanced Audit Configuration settings. 

B. On Server1, attach a task to the security log. 

C. In Servers GPO, modify the Audit Policy settings. 

D. On Server1, attach a task to the system log. 

Answer:

Explanation: 

When you use Advanced Audit Policy Configuration settings, you need to confirm that these settings are not overwritten by basic audit policy settings. The following procedure shows how to prevent conflicts by blocking the application of any basic audit policy settings. 

Enabling Advanced Audit Policy Configuration 

Basic and advanced audit policy configurations should not be mixed. As such, it’s best practice to enable Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings in Group Policy to make sure that basic auditing is disabled. The setting can be found under Computer Configuration\Policies\Security Settings\Local Policies\Security Options, and sets the SCENoApplyLegacyAuditPolicy registry key to prevent basic auditing being applied using Group Policy and the Local Security Policy MMC snap-in. 

In Windows 7 and Windows Server 2008 R2, the number of audit settings for which success and failure can be tracked has increased to 53. Previously, there were nine basic auditing settings under Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Audit Policy. These 53 new settings allow you to select only the behaviors that you want to monitor and exclude audit results for behaviors that are of little or no concern to you, or behaviors that create an excessive number of log entries. In addition, because Windows 7 and Windows Server 2008 R2 security audit policy can be applied by using domain Group Policy, audit policy settings can be modified, tested, and deployed to selected users and groups with relative simplicity. 

Audit Policy settings 

Any changes to user account and resource permissions. 

Any failed attempts for user logon. 

Any failed attempts for resource access. 

Any modification to the system files. 

Advanced Audit Configuration Settings 

Audit compliance with important business-related and security-related rules by tracking precisely defined activities, such as: 

. A group administrator has modified settings or data on servers that contain finance information. 

. An employee within a defined group has accessed an important file. 

. The correct system access control list (SACL) is applied to every file and folder or registry key on a computer or file share as a verifiable safeguard against undetected access. 

In Servers GPO, modify the Audit Policy settings - enabling audit account management setting will generate events about account creation, deletion and so on. 

Advanced Audit Configuration Settings 

Advanced Audit Configuration Settings ->Audit Policy 

-> Account Management -> Audit User Account Management 

In Servers GPO, modify the Audit Policy settings - enabling audit account management setting will generate events about account creation, deletion and so on. 

Reference: 

http: //blogs. technet. com/b/abizerh/archive/2010/05/27/tracing-down-user-and-computer-account-deletion-in-active-directory. aspx 

http: //technet. microsoft. com/en-us/library/dd772623%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/jj852202(v=ws. 10). aspx 

http: //www. petri. co. il/enable-advanced-audit-policy-configuration-windows-server. htm 

http: //technet. microsoft. com/en-us/library/dd408940%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/dd408940%28v=ws. 10%29. 

aspx#BKMK_step2 

Q8. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 P.2. Server1 has the Network Policy and Access Services server role installed. 

Your company's security policy requires that certificate-based authentication must be used by some network services. 

You need to identify which Network Policy Server (NPS) authentication methods comply with the security policy. 

Which two authentication methods should you identify? (Each correct answer presents part of the solution. Choose two.) 

A. MS-CHAP 

B. PEAP-MS-CHAP v2 

C. Chap 

D. EAP-TLS 

E. MS-CHAP v2 

Answer: B,D 

Explanation: 

PEAP is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create a secure TLS tunnel to protect user authentication, and uses server-side public key certificates to authenticate the server. When you use EAP with a strong EAP type, such as TLS with smart cards or TLS with certificates, both the client and the server use certificates to verify their identities to each other. 

Q9. HOTSPOT 

You have a server named Servers that runs Windows Server 2012 R2. Servers has the Windows Deployment Services server role installed. 

Server5 contains several custom images of Windows 8. 

You need to ensure that when 32-bit client computers start by using PXE, the computers automatically install an image named Image 1. 

What should you configure? 

To answer, select the appropriate tab in the answer area. 

Answer:  

Q10. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. Both servers have the File and Storage Services server role, the DFS Namespaces role service, and the DFS Replication role service installed. 

Server1 and Server2 are part of a Distributed File System (DFS) Replication group named Group1. Server1 and Server2 are separated by a low-speed WAN connection. 

You need to limit the amount of bandwidth that DFS can use to replicate between Server1 and Server2. 

What should you modify? 

A. The referral ordering of the namespace 

B. The staging quota of the replicated folder 

C. The cache duration of the namespace 

D. The schedule of the replication group 

Answer:

Explanation: 

Scheduling allows less bandwidth the by limiting the time interval of the replication 

Does DFS Replication throttle bandwidth per schedule, per server, or per connection? 

If you configure bandwidth throttling when specifying the schedule, all connections for that replication group will use that setting for bandwidth throttling. Bandwidth throttling can be also set as a connection-level setting using DFS Management. 

To edit the schedule and bandwidth for a specific connection, use the following steps: 

In the console tree under the Replication node, select the appropriate replication group. 

Click the Connections tab, right-click the connection that you want to edit, and then click Properties. 

Click the Schedule tab, select Custom connection schedule and then click Edit Schedule. 

Use the Edit Schedule dialog box to control when replication occurs, as well as the maximum amount of bandwidth replication can consume. 

Q11. Your network contains an Active Directory domain named contoso.com. The domain contains client computers that run either Windows XP or Windows 8. 

Network Policy Server (NPS) is deployed to the domain. 

You plan to create a system health validator (SHV). 

You need to identify which policy settings can be applied to all of the computers. 

Which three policy settings should you identify? (Each correct answer presents part of the solution. Choose three.) 

A. Antispyware is up to date. 

B. Automatic updating is enabled. 

C. Antivirus is up to date. 

D. A firewall is enabled for all network connections. 

E. An antispyware application is on. 

Answer: B,C,D 

Explanation: 

The WSHA on NAP client computers running Windows XP SP3 does not monitor the status of antispyware applications. 

Q12. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains three member servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2 and have the Windows Server Update Services (WSUS) server role installed. 

Server1 and Server2 are configured as replica servers that use Server3 as an upstream server. 

You remove Servers from the network. 

You need to ensure that WSUS on Server2 retrieves updates from Server1. The solution must ensure that Server1 and Server2 have the latest updates from Microsoft. 

Which command should you run on each server? To answer, select the appropriate command to run on each server in the answer area. 

Answer:  

Q13. You have two Windows Server Update Services (WSUS) servers named Server01 and Server02. Server01 synchronizes from Microsoft Update. Server02 synchronizes updates from Server01. Both servers are members of the same Active Directory domain. 

You configure Server01 to require SSL for all WSUS metadata by using a certificate issued by an enterprise root certification authority (CA). 

You need to ensure that Server02 synchronizes updates from Server01. 

What should you do on Server02? 

A. From a command prompt, run wsusutil.exe configuresslproxy server02 443. 

B. From a command prompt, run wsusutil.exe configuressl server01. 

C. From a command prompt, run wsusutil.exe configuresslproxy server01 443. 

D. From the Update Services console, modify the Update Source and Proxy Server options. 

Answer:

Q14. Your network contains an Active Directory domain named adatum.com. 

You have a standard primary zone named adatum.com. 

You need to provide a user named User1 the ability to modify records in the zone. Other users must be prevented from modifying records in the zone. 

What should you do first? 

A. Run the Zone Signing Wizard for the zone. 

B. From the properties of the zone, modify the start of authority (SOA) record. 

C. From the properties of the zone, change the zone type. 

D. Run the New Delegation Wizard for the zone. 

Answer:

Explanation: 

The Zone would need to be changed to a AD integrated zone When you use directory-integrated zones, you can use access control list (ACL) editing to secure a dnsZone object container in the directory tree. This feature provides detailed access to either the zone or a specified resource record in the zone. For example, an ACL for a zone resource record can be restricted so that dynamic updates are allowed only for a specified client computer or a secure group, such as a domain administrators group. This security feature is not available with standard primary zones. 

DNS update security is available only for zones that are integrated into Active Directory. After you integrate a zone, you can use the access control list (ACL) editing features that are available in the DNS snap-in to add or to remove users or groups from the ACL for a specific zone or for a resource record. 

Standard (not an Active Directory integrated zone) has no Security settings: 

You need to firstly change the "Standard Primary Zone" to AD Integrated Zone: 

Now there's Security tab: 

References: http: //technet. microsoft. com/en-us/library/cc753014. aspx 

http: //technet. microsoft. com/en-us/library/cc726034. aspx 

http: //support. microsoft. com/kb/816101 

Q15. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

The domain contains a server named Server1 that has the Network Policy Server server role and the Remote Access server role installed. The domain contains a server named Server2 that is configured as a RADIUS server. 

Server1 provides VPN access to external users. 

You need to ensure that all of the VPN connections to Server1 are logged to the RADIUS server on Server2. 

What should you run? 

A. Add-RemoteAccessRadius -ServerNameServer1 -AccountingOnOffMsg Enabled -SharedSecret "Secret" -Purpose Accounting 

B. Set-RemoteAccessAccounting -AccountingOnOffMsg Enabled -AccountingOnOffMsg Enabled 

C. Add-RemoteAccessRadius -ServerName Server2 -AccountingOnOffMsg Enabled -SharedSecret "Secret" -Purpose Accounting 

D. Set-RemoteAccessAccounting -EnableAccountingType Inbox -AccountingOnOffMsg Enabled 

Answer:

Explanation: 

Add-RemoteAccessRadius 

Adds a new external RADIUS server for VPN authentication, accounting for DirectAccess 

(DA) and VPN, or one-time password (OTP) authentication for DA. 

AccountingOnOffMsg<String> 

Indicates the enabled state for sending of accounting on or off messages. The acceptable 

values for this parameter are: 

. Enabled. 

. Disabled. 

This is the default value. This parameter is applicable only when the RADIUS server is being added for Remote Access accounting. 

START 70-411 EXAM