You can save a lot more time in the event you utilize our Microsoft 70-411 study manual. To put this another means, you dont should spend significantly time upon reading people lengthy books. The Microsoft Microsoft 70-411 dumps also contain many wonderful simulated questions. The simulated questions are usually merged into the 70-411 questions and answers of our Microsoft 70-411 study guides. Its very convenient to suit your needs to get ready the exam using our remarkable 70-411 materials. We make sure that you will definitely obtain success as long as you set pace using our Microsoft certification examine materials. Naturally, you should possess a vast knowledge regarding the course to start with. The a lot more you examine the 70-411 examine materials, the actual nearer to your destination. The particular Microsoft 70-411 books or the eBooks are usually portable, so you can get them anyplace and anytime you would like. You have the access to the Microsoft study manual for additional assistance. We guarantee the clients absolute achievement as a result of ultimate, authentic and excellent supplies.

2021 Dec 70-411 exam prep

Q101. Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named R0DC1. 

You create a global group named RODC_Admins. 

You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on R0DC1. The solution must not provide RODC_Admins with the ability to manage Active Directory objects. 

What should you do? 

A. From Active Directory Sites and Services, run the Delegation of Control Wizard. 

B. From a command prompt, run the dsadd computer command. 

C. From Active Directory Site and Services, configure the Security settings of the R0DC1 server object. 

D. From a command prompt, run the dsmgmt local roles command. 

Answer:

Explanation: 

RODC: using the dsmgmt.exe utility to manage local administrators One of the benefits of RODC is that you can add local administrators who do not have full access to the domain administration. This gives them the ability to manage the server but not add or change active directory objects unless those roles are delegated. Adding this type of user is done using the dsmdmt.exe utility at the command prompt. 


Q102. Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the DNS Server server role installed. Server1 hosts a primary zone for contoso.com. Server2 hosts a secondary zone for contoso.com. The zone is not configured to notify secondary servers of changes automatically. 

You update several records on Server1. 

You need to force the replication of the contoso.com zone records from Server1 to Server2. 

What should you do from Server2? 

A. Right-click the contoso.com zone and click Reload. 

B. Right-click the contoso.com zone and click Transfer from Master. 

C. Right-click Server2 and click Update Server Data Files. 

D. Right-click Server2 and click Refresh. 

Answer:

Explanation: 

Initiates zone transfer from secondary server Open DNS; In the console tree, right-click the applicable zone and click Transfer from master. 

References: http: //technet. microsoft. com/en-us/library/cc779391%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc779391%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc786985(v=ws. 10). aspx 

http: //technet. microsoft. com/en-us/library/cc779391(v=ws. 10). aspx 


Q103. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. You implement DirectAccess. 

You need to view the properties of the DirectAccess connection. 

Which connection properties should you view? To answer, select the appropriate connection properties in the answer area. 

Answer: 


Q104. Your network contains four Network Policy Server (NPS) servers named Server1, Server2, Servers, and Server4. 

Server1 is configured as a RADIUS proxy that forwards connection requests to a remote RADIUS server group named Group1. 

You need to ensure that Server2 and Server3 receive connection requests. Server4 must only receive connection requests if both Server2 and Server3 are unavailable. 

How should you configure Group1? 

A. Change the Weight of Server4 to 10. 

B. Change the Weight of Server2 and Server3 to 10. 

C. Change the Priority of Server2 and Server3 to 10. 

D. Change the Priority of Server4 to 10. 

Answer:

Explanation: 

During the NPS proxy configuration process, you can create remote RADIUS server groups and then add RADIUS servers to each group. To configure load balancing, you must have more than one RADIUS server per remote RADIUS server group. While adding group members, or after creating a RADIUS server as a group member, you can access the Add RADIUS server dialog box to configure the following items on the Load Balancing tab: 

Priority. Priority specifies the order of importance of the RADIUS server to the NPS proxy server. Priority level must be assigned a value that is an integer, such as 1, 2, or 3. The lower the number, the higher priority the NPS proxy gives to the RADIUS server. For example, if the RADIUS server is assigned the highest priority of 1, the NPS proxy sends connection requests to the RADIUS server first; if servers with priority 1 are not available, NPS then sends connection requests to RADIUS servers with priority 2, and so on. You can assign the same priority to multiple RADIUS servers, and then use the Weight setting to load balance between them. 

Weight. NPS uses this Weight setting to determine how many connection requests to send to each group member when the group members have the same priority level. Weight setting must be assigned a value between 1 and 100, and the value represents a percentage of 100 percent. For example, if the remote RADIUS server group contains two members that both have a priority level of 1 and a weight rating of 50, the NPS proxy forwards 50 percent of the connection requests to each RADIUS server. 

Advanced settings. These failover settingsprovide a way for NPS to determine whether the remote RADIUS server is unavailable. If NPS determines that a RADIUS server is unavailable, it can start sending connection requests to other group members. With these settings you can configure the number of seconds that the NPS proxy waits for a response from the RADIUS server before it considers the request dropped; the maximum number of dropped requests before the NPS proxy identifies the RADIUS server as unavailable; and the number of seconds that can elapse between requests before the NPS proxy identifies the RADIUS server as unavailable. 

The default priority is 1 and can be changed from 1 to 65535. So changing server 2 and 3 to priority 10 is not the way to go. 

Reference: http: //technet. microsoft. com/en-us/library/dd197433(WS. 10). aspx 


Q105. HOTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed. 

You have a client named Client1 that is configured as an 802. IX supplicant. 

You need to configure Server1 to handle authentication requests from Client1. The solution must minimize the number of authentication methods enabled on Server1. 

Which authentication method should you enable? To answer, select the appropriate authentication method in the answer area. 

Answer: 


Most up-to-date 70-411 exam fees:

Q106. Your network contains one Active Directory domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1. 

The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2. 

You need to identify which domain controller must be online when cloning a domain controller. 

Which cmdlet should you use? 

A. Get-ADGroupMember 

B. Get-ADDomainControllerPasswordReplicationPolicy 

C. Get-ADDomainControllerPasswordReplicationPolicyUsage 

D. Get-ADDomain 

E. Get-ADOptionalFeature 

F. Get-ADAccountAuthorizationGroup 

Answer:

Explanation: One requirement for cloning a domain controller is an existing Windows Server 2012 DC that hosts the PDC emulator role. You can run the Get-ADDomain and retrieve which server has the PDC emulator role. 

Example: Command Prompt: C:\PS> 

Get-ADDomain 

Output wouldinclude a line such as: PDCEmulator : Fabrikam-DC1.Fabrikam.com 

Incorrect: 

Not A: The Get-ADGroupMember cmdlet gets the members of an Active Directory group. 

Members can be users, groups, and computers. 

Not E: The Get-ADOptionalFeature cmdlet gets an optional feature or performs a search to retrieve multiple optional features from an Active Directory. 

Not F: The Get-ADAuthorizationGroup cmdlet gets the security groups from the specified user, computer or service accounts token. 

Reference: Step-by-Step: Domain Controller Cloning 

http://blogs.technet.com/b/canitpro/archive/2013/06/12/step-by-step-domain-controller-cloning.aspx 

Reference: Get-ADDomain https://technet.microsoft.com/en-us/library/ee617224.aspx 


Q107. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

You have a Group Policy object (GPO) named GPO1 that contains hundreds of settings. GPO1 is linked to an organizational unit (OU) named OU1. OU1 contains 200 client computers. 

You plan to unlink GPO1 from OU1. 

You need to identify which GPO settings will be removed from the computers after GPO1 is unlinked from OU1. 

Which two GPO settings should you identify? (Each correct answer presents part of the solution. Choose two.) 

A. The managed Administrative Template settings 

B. The unmanaged Administrative Template settings 

C. The System Services security settings 

D. The Event Log security settings 

E. The Restricted Groups security settings 

Answer: A,D 

Explanation: 

There are two kinds of Administrative Template policy settings: Managed and Unmanaged . The Group Policy service governs Managed policy settings and removes a policy setting when it is no longer within scope of the user or computer. 

References: http: //technet. microsoft. com/en-us/library/cc778402(v=ws. 10). aspx http: //technet. microsoft. com/en-us/library/bb964258. aspx 


Q108. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Network Policy Server role service installed. 

You need to enable trace logging for Network Policy Server (NPS) on Server1. 

Which tool should you use? 

A. The tracert.exe command 

B. The Network Policy Server console 

C. The Server Manager console 

D. The netsh.exe command 

Answer:

Explanation: 

NPS trace logging files 

You can use log files on servers running Network Policy Server (NPS) and NAP client computers to help troubleshoot NAP problems. Log files can provide the detailed information required for troubleshooting complex problems. 

You can capture detailed information in log files on servers running NPS by enabling remote access tracing. The Remote Access service does not need to be installed or running to use remote access tracing. When you enable tracing on a server running NPS, several log files are created in %windir%\tracing. 

The following log files contain helpful information about NAP: 

IASNAP. LOG: Contains detailed information about NAP processes, NPS authentication, and NPS authorization. 

IASSAM. LOG: Contains detailed information about user authentication and authorization. 

Membership in the local Administrators group, or equivalent, is the minimum required to enable tracing. Review details about using the appropriate accounts and group memberships at Local and Domain Default Groups (http: //go. microsoft. com/fwlink/?LinkId=83477). 

To create tracing log files on a server running NPS 

Open a command line as an administrator. 

Type netshras set tr * en. 

Reproduce the scenario that you are troubleshooting. 

Type netshras set tr * dis. 

Close the command prompt window. 

Reference: http: //technet. microsoft. com/en-us/library/dd348461%28v=ws. 10%29. aspx 


Q109. Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.1. 

The network contains a shared folder named FinancialData that contains five files. 

You need to ensure that the FinancialData folder and its contents are copied to all of the client computers. 

Which two Group Policy preferences should you configure? (Each correct answer presents part of the solution. Choose two.) 

A. Shortcuts 

B. Network Shares 

C. Environment 

D. Folders 

E. Files 

Answer: D,E 

Explanation: 

Folder preference items allow you to create, update, replace, and delete folders and their contents. (To configure individual files rather than folders, see Files Extension.) Before you create a Folder preference item, you should review the behavior of each type of action possible with this extension. File preference items allow you to copy, modify the attributes of, replace, and delete files. (To configure folders rather than individual files, see Folders Extension.) Before you create a File preference item, you should review the behavior of each type of action possible with this extension. 


Q110. Your network contains an Active Directory domain named adatum.com. The domain contains five servers. The servers are configured as shown in the following table. 

All desktop computers in adatum.com run Windows 8 and are configured to use BitLocker Drive Encryption (BitLocker) on all local disk drives. 

You need to deploy the Network Unlock feature. The solution must minimize the number of features and server roles installed on the network. 

To which server should you deploy the feature? 

A. Server3 

B. Server1 

C. DC2 

D. Server2 

E. DC1 

Answer:

Explanation: 

The BitLocker-NetworkUnlock feature must be installed on a Windows Deployment Server (which does not have to be configured--the WDSServer service just needs to be running).