Pass4sure exam 70 411 Questions are updated and all mcsa 70 411 answers are verified by experts. Once you have completely prepared with our exam ref 70 411 exam prep kits you will be ready for the real exam 70 411 exam without a problem. We have Avant-garde Microsoft exam ref 70 411 dumps study guide. PASSED exam ref 70 411 First attempt! Here What I Did.

Q121. DRAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

You generalize Server2. 

You install the Windows Deployment Services (WDS) server role on Server1. 

You need to capture an image of Server2 on Server1. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q122. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 

You need to configure Server1 to meet the following requirements: 

. Ensure that old files in a folder named Folder1 are archived automatically to a folder named Archive1. 

. Ensure that JPG files can always be saved to a local computer, even when a file screen exists. 

Which two nodes should you configure? To answer, select the appropriate two nodes in the answer area. 

Answer Area 

Answer: 


Q123. HOTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed. 

You need to configure the ports on Server1 to ensure that client computers can establish VPN connections to Server1. The solution must NOT require the use of certificates or pre-shared keys. 

What should you modify? 

To answer, select the appropriate object in the answer area. 

Answer: 


Q124. HOTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed. 

You have a client named Client1 that is configured as an 802. IX supplicant. 

You need to configure Server1 to handle authentication requests from Client1. The solution must minimize the number of authentication methods enabled on Server1. 

Which authentication method should you enable? To answer, select the appropriate authentication method in the answer area. 

Answer: 


Q125. DRAG DROP 

You are a network administrator of an Active Directory domain named contoso.com. 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Web Server (IIS) server role installed. 

Server1 will host a web site at URL https: //secure.contoso.com. The application pool identity account of the web site will be set to a domain user account named AppPool1. 

You need to identify the setspn.exe command that you must run to configure the appropriate Service Principal Name (SPN) for the web site. 

What should you run? 

To answer, drag the appropriate objects to the correct location. Each object may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q126. Your network contains an Active Directory domain named contoso.com. All domain controllers run either Windows Server 2008 or Windows Server 2008 R2. You deploy a new domain controller named DC1 that runs Windows Server 2012 R2. 

You log on to DC1 by using an account that is a member of the Domain Admins group. You discover that you cannot create Password Settings objects (PSOs) by using Active Directory Administrative Center. 

You need to ensure that you can create PSOs from Active Directory Administrative Center. 

What should you do? 

A. Modify the membership of the Group Policy Creator Owners group. 

B. Transfer the PDC emulator operations master role to DC1. 

C. Upgrade all of the domain controllers that run Window Server 2008. 

D. Raise the functional level of the domain. 

Answer:

Explanation: 

Fine-grained password policies allow you to specify multiple password policies within a single domain so that you can apply different restrictions for password and account lockout policies to different sets of users in a domain. To use a fine-grained password policy, your domain functional level must be at least Windows Server 2008. To enable fine-grained password policies, you first create a Password Settings Object (PSO). You then configure the same settings that you configure for the password and account lockout policies. You can create and apply PSOs in the Windows Server 2012 environment by using the Active Directory Administrative Center (ADAC) or Windows PowerShell. 

Step 1: Create a PSO Applies To: Windows Server 2008, Windows Server 2008 R2 

Reference: 

http: //technet. microsoft. com/en-us//library/cc754461%28v=ws. 10%29. aspx 


Q127. Your network contains an Active Directory domain named contoso.com. The domain contains a virtual machine named Server1 that runs Windows Server 2012 R2. 

Server1 has a dynamically expanding virtual hard disk that is mounted to drive E. 

You need to ensure that you can enable BitLocker Drive Encryption (BitLocker) on drive E. 

Which command should you run? 

A. manage-bde -protectors -add c: -startup e: 

B. manage-bde -lock e: 

C. manage-bde -protectors -add e: -startupkey c: 

D. manage-bde -on e: 

Answer:

Explanation: 

Manage-bde: on 

Encrypts the drive and turns on BitLocker. 

Example: 

The following example illustrates using the -on command to turn on BitLocker for drive C and add a recovery password to the drive. 

manage-bde –on C: -recoverypassword 


Q128. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Network Policy Server role service installed. 

An administrator creates a RADIUS client template named Template1. 

You create a RADIUS client named Client1 by using Template 1. 

You need to modify the shared secret for Client1. 

What should you do first? 

A. Configure the Advanced settings of Template1. 

B. Set the Shared secret setting of Template1 to Manual. 

C. Clear Enable this RADIUS client for Client1. 

D. Clear Select an existing template for Client1. 

Answer:

Explanation: 

Clear checkmark for Select an existing template in the new client wizard. 

In New RADIUS Client, in Shared secret, do one of the following: 

Bullet Ensure that Manual is selected, and then in Shared secret, type the strong password that is also entered on the RADIUS client. Retype the shared secret in Confirm shared secret. 


Q129. You have a server named Server1 that runs Windows Server 2012 R2. 

You create a custom Data Collector Set (DCS) named DCS1. 

You need to configure Server1 to start DCS1 automatically when the network usage exceeds 70 percent. 

Which type of data collector should you create? 

A. A performance counter alert 

B. A configuration data collector 

C. A performance counter data collector 

D. An event trace data collector 

Answer:

Explanation: 

Performance alerts notify you when a specified performance counter exceeds your configured threshold by logging an event to the event log. But rather than notifying you immediately when the counter exceeds the threshold, you can configure a time period over which the counter needs to exceed the threshold, to avoid unnecessary alerts. 


Q130. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. 

You view the effective policy settings of Server1 as shown in the exhibit. (Click the Exhibit button.) 

On Server1, you have a folder named C:\Share1 that is shared as Share1. Share1 contains confidential data. A group named Group1 has full control of the content in Share1. 

You need to ensure that an entry is added to the event log whenever a member of Group1 deletes a file in Share1. 

What should you configure? 

A. the Audit File Share setting of Servers GPO 

B. the Sharing settings of C:\Share1 

C. the Audit File System setting of Servers GPO 

D. the Security settings of C:\Share1 

Answer:

Explanation: 

You can use Computer Management to track all connections to shared resources on a Windows Server 2008 R2 system. 

Whenever a user or computer connects to a shared resource, Windows Server 2008 R2 lists a connection in the Sessions node. 

File access, modification and deletion can only be tracked, if the object access auditing is enabled you can see the entries in the event log. 

To view connections to shared resources, type net session at a command prompt or follow these steps: 

In Computer Management, connect to the computer on which you created the shared resource. 

In the console tree, expand System Tools, expand Shared Folders, and then select Sessions. You can now view connections to shares for users and computers. 

To enable folder permission auditing, you can follow the below steps: 

Click start and run "secpol. msc" without quotes. 

Open the Local Policies\Audit Policy 

Enable the Audit object access for "Success" and "Failure". 

Go to target files and folders, right click the folder and select properties. 

Go to Security Page and click Advanced. 

Click Auditing and Edit. 

Click add, type everyone in the Select User, Computer, or Group. 

Choose Apply onto: This folder, subfolders and files. 

Tick on the box “Change permissions” 

Click OK. 

After you enable security auditing on the folders, you should be able to see the folder permission changes in the server's Security event log. Task Category is File System. 

References: 

http: //social. technet. microsoft. com/Forums/en-US/winservergen/thread/13779c78-0c73-4477-8014-f2eb10f3f10f/ 

http: //technet. microsoft. com/en-us/library/cc753927(v=ws. 10). aspx 

http: //social. technet. microsoft. com/Forums/en-US/winservergen/thread/13779c78-0c73-4477-8014-f2eb10f3f10f/ 

http: //support. microsoft. com/kb/300549 

http: //www. windowsitpro. com/article/permissions/auditing-folder-permission-changes 

http: //www. windowsitpro. com/article/permissions/auditing-permission-changes-on-a-folder