70-411 Premium Bundle

70-411 Premium Bundle

Administering Windows Server 2012 Certification Exam

4.5 
(8565 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 70-411 Free Practice Questions

Q1. Your network is configured as shown in the exhibit. (Click the Exhibit button.) 

Server1 regularly accesses Server2. 

You discover that all of the connections from Server1 to Server2 are routed through Routerl. 

You need to optimize the connection path from Server1 to Server2. 

Which route command should you run on Server1? 

A. Route add -p 192.168.2.0 MASK 255.255.255.0 192.168.2.1 METRIC 50 

B. Route add -p 192.168.2.12 MASK 255.255.255.0 192.168.2.1 METRIC 100 

C. Route add -p 192.168.2.12 MASK 255.255.255.0 192.168.2.0 METRIC 50 

D. Route add -p 192.168.2.0 MASK 255.255.255.0 192.168.1.2 METRIC 100 

Answer:

Q2. Your company has a main office and two branch offices. The main office is located in New York. The branch offices are located in Seattle and Chicago. 

The network contains an Active Directory domain named contoso.com. An Active Directory site exists for each office. Active Directory site links exist between the main office and the branch offices. All servers run Windows Server 2012 R2. 

The domain contains three file servers. The file servers are configured as shown in the following table. 

You implement a Distributed File System (DFS) replication group named ReplGroup. 

ReplGroup is used to replicate a folder on each file server. ReplGroup uses a hub and spoke topology. NYC-SVR1 is configured as the hub server. 

You need to ensure that replication can occur if NYC-SVR1 fails. 

What should you do? 

A. Create an Active Directory site link bridge. 

B. Create an Active Directory site link. 

C. Modify the properties of Rep1Group. 

D. Create a connection in Rep1Group. 

Answer:

Explanation: 

Unsure about this answer. 

D: 

A: 

The Bridge all site links option in Active Directory must be enabled. (This option is available in the Active Directory Sites and Services snap-in.) Turning off Bridge all site links can affect the ability of DFS to refer client computers to target computers that have the least expensive connection cost. An Intersite Topology Generator that is running Windows Server 2003 relies on the Bridge all site links option being enabled to generate the intersite cost matrix that DFS requires for its site-costing functionality. If you turn off this option, you must create site links between the Active Directory sites for which you want DFS to calculate accurate site costs. Any sites that are not connected by site links will have the maximum possible cost. For more information about site link bridging, see “Active Directory Replication Topology Technical Reference.” 

Reference: 

http: //faultbucket. ca/2012/08/fixing-a-dfsr-connection-problem/ 

http: //faultbucket. ca/2012/08/fixing-a-dfsr-connection-problem/ 

http: //technet. microsoft. com/en-us/library/cc771941. aspx 

Q3. Your network contains a Hyper-V host named Server1 that hosts 20 virtual machines. 

You need to view the amount of memory resources and processor resources each virtual machine uses currently. 

Which tool should you use on Server1? 

A. Hyper-V Manager 

B. Task Manager 

C. Windows System Resource Manager (WSRM) 

D. Resource Monitor 

Answer:

Q4. HOTSPOT 

Your network contains a DNS server named Server1 that runs Windows Server 2012 R2. Server1 has a zone named contoso.com. The network contains a server named Server2 that runs Windows Server 2008 R2. Server1 and Server2 are members of an Active Directory domain named contoso.com. 

You change the IP address of Server2. 

Several hours later, some users report that they cannot connect to Server2. 

On the affected users' client computers, you flush the DNS client resolver cache, and the users successfully connect to Server2. 

You need to reduce the amount of time that the client computers cache DNS records from contoso.com. 

Which value should you modify in the Start of Authority (SOA) record? To answer, select the appropriate setting in the answer area. 

Answer:  

Q5. HOTSPOT 

Your company has two offices. The offices are located in Montreal and Seattle. 

The network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2. Server1 is located in the Seattle office. Server2 is located in the Montreal office. Both servers run Windows Server 2012 R2 and have the Windows Server Update Services (WSUS) server role installed. 

You need to configure Server2 to download updates that are approved on Server1 only. 

What cmdlet should you run? To answer, select the appropriate options in the answer area. 

Answer:  

Q6. Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.1. 

The network contains a shared folder named FinancialData that contains five files. 

You need to ensure that the FinancialData folder and its contents are copied to all of the client computers. 

Which two Group Policy preferences should you configure? (Each correct answer presents part of the solution. Choose two.) 

A. Shortcuts 

B. Network Shares 

C. Environment 

D. Folders 

E. Files 

Answer: D,E 

Explanation: 

Folder preference items allow you to create, update, replace, and delete folders and their contents. (To configure individual files rather than folders, see Files Extension.) Before you create a Folder preference item, you should review the behavior of each type of action possible with this extension. File preference items allow you to copy, modify the attributes of, replace, and delete files. (To configure folders rather than individual files, see Folders Extension.) Before you create a File preference item, you should review the behavior of each type of action possible with this extension. 

Q7. Your network contains one Active Directory domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1. 

The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2. 

You need to identify which user accounts were authenticated by RODC1. 

Which cmdlet should you use? 

A. Get-ADGroupMember 

B. Get-ADDomainControllerPasswordReplicationPolicy 

C. Get-ADDomainControllerPasswordReplicationPolicyUsage 

D. Get-ADDomain 

E. Get-ADOptionalFeature 

F. Get-ADAccountAuthorizationGroup 

Answer:

Explanation: Gets the Active Directory accounts that are authenticated by a read-only domain controller or that are in the revealed list of the domain controller. 

Reference: Get-ADDomainControllerPasswordReplicationPolicyUsage 

https://technet.microsoft.com/en-us/library/ee617194.aspx 

Q8. Your network contains an Active Directory domain named contoso.com. 

All user accounts reside in an organizational unit (OU) named OU1. All of the users in the marketing department are members of a group named Marketing. All of the users in the human resources department are members of a group named HR. 

You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU1. You configure the Group Policy preferences of GPO1 to add two shortcuts named Link1 and Link2 to the desktop of each user. 

You need to ensure that Link1 only appears on the desktop of the users in Marketing and that Link2 only appears on the desktop of the users in HR. 

What should you configure? 

A. Security Filtering 

B. WMI Filtering 

C. Group Policy Inheritance 

D. Item-level targeting 

Answer:

Explanation: 

You can use item-level targeting to change the scope of individual preference items, so they apply only to selected users or computers. Within a single Group Policy object (GPO), you can include multiple preference items, each customized for selected users or computers and each targeted to apply settings only to the relevant users or computers. 

Reference: http://technet.microsoft.com/en-us/library/cc733022.aspx 

Q9. You have a DNS server named Served that has a Server Core Installation on Windows Server 2012 R2. 

You need to view the time-to-live (TTL) value of a name server (NS) record that is cached by the DNS Server service on Server1. 

What should you run? 

A. Show-DNSServerCache 

B. nslookup.exe 

C. ipconfig.exe /displaydns 

D. dnscacheugc.exe 

Answer:

Explanation: 

The Show-DNSServerCache shows all cached Domain Name System (DNS) server resource records in the following format: Name, ResourceRecordData, Time-to-Live (TTL). 

Q10. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

On all of the domain controllers, Windows is installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\. 

All of the domain controllers have a third-party application installed. 

The operating system fails to recognize that the application is compatible with domain controller cloning. 

You verify with the application vendor that the application supports domain controller cloning. 

You need to prepare a domain controller for cloning. 

What should you do? 

A. In D:\Windows\NTDS\, create an XML file named DCCloneConfig.xml and add the application information to the file. 

B. In the root of a USB flash drive, add the application information to an XML file named DefaultDCCIoneAllowList.xml. 

C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and add the application information to the file. 

D. In C:\Windows\System32\Sysprep\Actionfiles\, add the application information to an XML file named Respecialize.xml. 

Answer:

Explanation: 

Place the CustomDCCloneAllowList.xml file in the same folder as the Active Directory database (ntds. dit) on the source Domain Controller. 

References: 

http: //blogs. dirteam. com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-cloning. aspx 

http: //www. thomasmaurer. ch/2012/08/windows-server-2012-hyper-v-how-to-clone-a-virtual-domain-controller 

http: //technet. microsoft. com/en-us/library/hh831734. aspx 

Q11. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains two servers. The servers are configured as shown in the following table. 

All client computers run Windows 8 Enterprise. 

You plan to deploy Network Access Protection (NAP) by using IPSec enforcement. 

A Group Policy object (GPO) named GPO1 is configured to deploy a trusted server group to all of the client computers. 

You need to ensure that the client computers can discover HRA servers automatically. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. On all of the client computers, configure the EnableDiscovery registry key. 

B. In a GPO, modify the Request Policy setting for the NAP Client Configuration. 

C. On Server2, configure the EnableDiscovery registry key. 

D. On DC1, create an alias (CNAME) record. 

E. On DC1, create a service location (SRV) record. 

Answer: A,B,E 

Explanation: 

Requirements for HRA automatic discovery 

The following requirements must be met in order to configure trusted server groups on NAP client computers using HRA automatic discovery: 

Client computers must be running Windows Vista. with Service Pack 1 (SP1) or Windows XP with Service Pack 3 (SP3). 

The HRA server must be configured with a Secure Sockets Layer (SSL) certificate. 

The EnableDiscovery registry key must be configured on NAP client computers. 

DNS SRV records must be configured. 

The trusted server group configuration in either local policy or Group Policy must be cleared. 

http: //technet. microsoft. com/en-us/library/dd296901. aspx 

Q12. Your network contains an Active Directory domain named adatum.com. 

A network administrator creates a Group Policy central store. 

After the central store is created, you discover that when you create new Group Policy objects (GPOs), the GPOs do not contain any Administrative Templates. 

You need to ensure that the Administrative Templates appear in new GPOs. 

What should you do? 

A. Add your user account to the Group Policy Creator Owners group. 

B. Configure all domain controllers as global catalog servers. 

C. Copy files from %Windir%\Policydefinitions to the central store. 

D. Modify the Delegation settings of the new GPOs. 

Answer:

Explanation: 

To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain. 

Q13. Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2012 R2. The domain contains a virtual machine named DC2. 

On DC2, you run Get-ADDCCIoningExcludedApplicationList and receive the output shown in the following table. 

You need to ensure that you can clone DC2. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

E. Option E 

Answer: A,E 

Explanation: 

Because domain controllers provide a distributed environment, you could not safely clone an Active Directory domain controller in the past. 

Before, if you cloned any server, the server would end up with the same domain or forest, which is unsupported with the same domain or forest. You would then have to run sysprep, which would remove the unique security information before cloning and then promote a domain controller manually. When you clone a domain controller, you perform safe cloning, which a cloned domain controller automatically runs a subset of the sysprep process and promotes the server to a domain controller automatically. 

The four primary steps to deploy a cloned virtualized domain controller are as follows: 

. Grant the source virtualized domain controller the permission to be cloned by 

adding the source virtualized domain controller to the Cloneable Domain 

Controllers group. 

. Run Get-ADDCCloningExcludedApplicationListcmdlet in Windows PowerShell to determine which services and applications on the domain controller are not compatible with the cloning. 

. Run New-ADDCCloneConfigFile to create the clone configuration file, which is stored in the C:\Windows\NTDS. 

. In Hyper-V, export and then import the virtual machine of the source domain controller. 

Run Get-ADDCCloningExcludedApplicationListcmdlet In this procedure, run the Get-ADDCCloningExcludedApplicationListcmdlet on the source virtualized domain controller to identify any programs or services that are not evaluated for cloning. You need to run the Get-ADDCCloningExcludedApplicationListcmdlet before the New-ADDCCloneConfigFilecmdlet because if the New-ADDCCloneConfigFilecmdlet detects an excluded application, it will not create a DCCloneConfig.xml file. To identify applications or services that run on a source domain controller which have not been evaluated for cloning. 

Get-ADDCCloningExcludedApplicationList 

Get-ADDCCloningExcludedApplicationList -GenerateXml 

The clone domain controller will be located in the same site as the source domain controller unless a different site is specified in the DCCloneConfig.xml file. 

Note: 

. The Get-ADDCCloningExcludedApplicationListcmdlet searches the local domain controller for programs and services in the installed programs database, the services control manager that are not specified in the default and user defined inclusion list. The applications in the resulting list can be added to the user defined exclusion list if they are determined to support cloning. If the applications are not cloneable, they should be removed from the source domain controller before the clone media is created. Any application that appears in cmdlet output and is not included in the user defined inclusion list will force cloning to fail. 

. The Get-ADDCCloningExcludedApplicationListcmdlet needs to be run before the New- ADDCCloneConfigFilecmdlet is used because if the New-ADDCCloneConfigFilecmdlet detects an excluded application, it will not create a DCCloneConfig.xml file. 

. DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways. 

The New-ADDCCloneConfigcmdlet in PowerShell 

By hand with an XML editor 

By editing an existing config file, again with an XML editor (Notepad is not an XML editor.) 

You can populate the XML file. . . . . doesn't need to be empty. . . . . 

References: http: //technet. microsoft. com/en-us/library/hh831734. aspx 

http: //blogs. dirteam. com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-cloning. aspx 

Q14. You have a server named Server1 that runs Windows Server 2012 R2. 

You create a custom Data Collector Set (DCS) named DCS1. 

You need to configure Server1 to start DCS1 automatically when the network usage exceeds 70 percent. 

Which type of data collector should you create? 

A. A performance counter alert 

B. A configuration data collector 

C. A performance counter data collector 

D. An event trace data collector 

Answer:

Explanation: 

Performance alerts notify you when a specified performance counter exceeds your configured threshold by logging an event to the event log. But rather than notifying you immediately when the counter exceeds the threshold, you can configure a time period over which the counter needs to exceed the threshold, to avoid unnecessary alerts. 

Q15. HOTSPOT 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2 and are configured as DNS servers. All DNS zones are Active Directory-integrated. Active Directory Recycle Bin is enabled. 

You need to modify the amount of time deleted objects are retained in the Active Directory Recycle Bin. 

Which naming context should you use? To answer, select the appropriate naming context in the answer area. 

Answer:  

START 70-411 EXAM