It is impossible to pass Microsoft 70 411 study guide exam without any help in the short term. Come to Actualtests soon and find the most advanced, correct and guaranteed Microsoft 70 411 exam practice questions. You will get a surprising result by our Renovate Administering Windows Server 2012 practice guides.

Q1. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

The domain contains 200 Group Policy objects (GPOs). 

An administrator named Admin1 must be able to add new WMI filters from the Group Policy Management Console (GPMC). 

You need to delegate the required permissions to Admin1. The solution must minimize the number of permissions assigned to Admin1. 

What should you do? 

A. From Active Directory Users and Computers, add Admin1 to the WinRMRemoteWMIUsers__group. 

B. From Group Policy Management, assign Creator Owner to Admin1 for the WMI Filters container. 

C. From Active Directory Users and Computers, add Admin1 to the Domain Admins group. 

D. From Group Policy Management, assign Full control to Admin1 for the WMI Filters container. 

Answer:

Explanation: 

Users with Full control permissions can create and control all WMI filters in the domain, 

including WMI filters created by others. 

Users with Creator owner permissions can create WMI filters, but can only control WMI 

filters that they create. 

: http://technet.microsoft.com/en-us/library/cc757429(v=ws.10).aspx 


Q2. HOTSPOT 

Your network contains a DNS server named Server1 that runs Windows Server 2012 R2. Server1 has a zone named contoso.com. The network contains a server named Server2 that runs Windows Server 2008 R2. Server1 and Server2 are members of an Active Directory domain named contoso.com. 

You change the IP address of Server2. 

Several hours later, some users report that they cannot connect to Server2. 

On the affected users' client computers, you flush the DNS client resolver cache, and the users successfully connect to Server2. 

You need to reduce the amount of time that the client computers cache DNS records from contoso.com. 

Which value should you modify in the Start of Authority (SOA) record? To answer, select the appropriate setting in the answer area. 

Answer: 


Q3. Your network contains two Active Directory forests named contoso.com and adatum.com. 

All domain controllers run Windows Server 2012 R2. 

The adatum.com domain contains a Group Policy object (GPO) named GPO1. An administrator from adatum.com backs up GPO1 to a USB flash drive. You have a domain controller named dc1.contoso.com. You insert the USB flash drive in 

dc1.contoso.com. 

You need to identify the domain-specific reference in GPO1. 

What should you do? 

A. From the Migration Table Editor, click Populate from Backup. 

B. From Group Policy Management, run the Group Policy Modeling Wizard. 

C. From Group Policy Management, run the Group Policy Results Wizard. 

D. From the Migration Table Editor, click Populate from GPO. 

Answer:


Q4. You have a DNS server that runs Windows Server 2012 R2. The server hosts the zone for contoso.com and is accessible from the Internet. 

You need to create a DNS record for the Sender Policy Framework (SPF) to list the hosts that are authorized to send email for contoso.com. 

Which type of record should you create? 

A. mail exchanger (MX) 

B. resource record signature (RRSIG) 

C. text (TXT) 

D. name server (NS) 

Answer:


Q5. DRAG DROP 

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server. 

You need to log all DHCP clients that have windows Firewall disabled. 

Which three actions should you perform in sequence? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q6. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The functional level of both the domain and the forest is Windows Server 2008 R2. 

The domain contains a domain-based Distributed File System (DFS) namespace that is configured as shown in the exhibit. (Click the Exhibit button.) 

You need to enable access-based enumeration on the DFS namespace. 

What should you do first? 

A. Raise the domain functional level. 

B. Raise the forest functional level. 

C. Install the File Server Resource Manager role service on Server3 and Server5. 

D. Delete and recreate the namespace. 

Answer:

Explanation: 

Access-based enumeration is only supported on a Domain-based Namespace in Windows Server 2008 Mode. This type of Namespace requires a minimum Windows Server 2003 forest functional level and a minimum Windows Server 2008 domain functional level. 

The exhibit indicates that the current namespace is a Domain-based Namespace in Windows Server 2000 Mode. To migrate a domain-based namespace from Windows 2000 Server mode to Windows Server 2008 mode, you must export the namespace to a file, delete the namespace, recreate it in Windows Server 2008 mode, and then import the namespace settings. 

http://msdn.microsoft.com/en-us/library/cc770287.aspx http://msdn.microsoft.com/en-us/library/cc753875.aspx 


Q7. You have a DNS server named Server1 that runs Windows Server 2012 R2. On Server1, you create a DNS zone named contoso.com. 

You need to specify the email address of the person responsible for the zone. 

Which type of DNS record should you configure? 

A. Start of authority (SOA) 

B. Host information (HINFO) 

C. Mailbox (MB) 

D. Mail exchanger (MX) 

Answer:

Explanation: 

A SOA-record defines the responsible person for an entire zone, but a zone may contain many individual hosts / domain names for which different people are responsible. The RP-record type makes it possible to identify the responsible person for individual host names contained within the zone. 


Q8. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

On all of the domain controllers, Windows is installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\. 

All of the domain controllers have a third-party application installed. 

The operating system fails to recognize that the application is compatible with domain controller cloning. 

You verify with the application vendor that the application supports domain controller cloning. 

You need to prepare a domain controller for cloning. 

What should you do? 

A. In D:\Windows\NTDS\, create an XML file named DCCloneConfig.xml and add the application information to the file. 

B. In the root of a USB flash drive, add the application information to an XML file named DefaultDCCIoneAllowList.xml. 

C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and add the application information to the file. 

D. In C:\Windows\System32\Sysprep\Actionfiles\, add the application information to an XML file named Respecialize.xml. 

Answer:

Explanation: 

Place the CustomDCCloneAllowList.xml file in the same folder as the Active Directory database (ntds. dit) on the source Domain Controller. 

References: 

http: //blogs. dirteam. com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-cloning. aspx 

http: //www. thomasmaurer. ch/2012/08/windows-server-2012-hyper-v-how-to-clone-a-virtual-domain-controller 

http: //technet. microsoft. com/en-us/library/hh831734. aspx 


Q9. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

The network contains several group Managed Service Accounts that are used by four member servers. 

You need to ensure that if a group Managed Service Account resets a password of a domain user account, an audit entry is created. 

You create a Group Policy object (GPO) named GPO1. 

What should you do next? 

A. In GPO1, configure the Advanced Audit Policy Configuration settings for Audit User Account Management. Link GPO1 to the Domain Controllers organizational unit (OU). 

B. In GPO1, configure the Advanced Audit Policy Configuration settings for Audit User Account Management. Move the member servers to a new organizational unit (OU). Link GPO1 to the new OU. 

C. In GPO1, configure the Advanced Audit Policy Configuration settings for Audit Sensitive Privilege Use. Link GPO1 to the Domain Controllers organizational unit (OU). 

D. In GPO1, configure the Advanced Audit Policy Configuration settings for Audit Sensitive Privilege Use. Move the member servers to a new organizational unit (OU). Link GPO1 to the new OU. 

Answer:

Explanation: 

Audit User Account Management This security policy setting determines whether the operating system generates audit events when the following user account management tasks are performed: 

. A user account is created, changed, deleted, renamed, disabled, enabled, locked out, or unlocked. 

A user account password is set or changed. 

Security identifier (SID) history is added to a user account. 

The Directory Services Restore Mode password is set. 

Permissions on accounts that are members of administrators groups are changed. 

Credential Manager credentials are backed up or restored. 

This policy setting is essential for tracking events that involve provisioning and managing user accounts. 


Q10. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1. 

You make a change to GPO1. 

You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solution must minimize administrative effort. 

Which tool should you use? 

A. Server Manager 

B. Active Directory Users and Computers 

C. The Gpupdate command 

D. Group Policy Management Console (GPMC) 

Answer:

Explanation: 

Starting with Windows Server. 2012 and Windows. 8, you can now remotely refresh Group Policy settings for all computers in an OU from one central location through the Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to refresh Group Policy for a set of computers, not limited to the OU structure, for example, if the computers are located in the default computers container. 

References: http: //technet. microsoft. com/en-us//library/jj134201. aspx 

http: //blogs. technet. com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-server-2012-using-remote-gpupdate. aspx 


Q11. Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs. 

The domain contains a top-level organizational unit (OU) for each department. A group 

named Group1 contains members from each department. 

You have a GPO named GPO1 that is linked to the domain. 

You need to configure GPO1 to apply settings to Group1 only. 

What should you use? 

A. Dcgpofix 

B. Get-GPOReport 

C. Gpfixup 

D. Gpresult 

E. Gpedit. msc 

F. Import-GPO 

G. Restore-GPO 

H. Set-GPInheritance 

I. Set-GPLink 

J. Set-GPPermission 

K. Gpupdate 

L. Add-ADGroupMember 

Answer:

Explanation: 

Set-GPPermission grants a level of permissions to a security principal (user, security group, or computer) for one GPO or all the GPOs in a domain. You use the TargetName and TargetType parameters to specify a user, security group, or computer for which to set the permission level. 

-Replace <SwitchParameter> Specifies that the existing permission level for the group or user is removed before the new permission level is set. If a security principal is already granted a permission level that is higher than the specified permission level and you do not use the Replace parameter, no change is made. 

Reference: http: //technet. microsoft. com/en-us/library/ee461038. aspx 


Q12. You have a server named Server1 that runs Windows Server 2012 R2. You create a Data Collector Set (DCS) named DCS1. 

You need to configure DCS1 to log data to D:\logs. 

What should you do? 

A. Right-click DCS1 and click Properties. 

B. Right-click DCS1 and click Export list. 

C. Right-click DCS1 and click Data Manager. 

D. Right-click DCS1 and click Save template. 

Answer:

Explanation: 

The Root Directory will contain data collected by the Data Collector Set. Change this setting if you want to store your Data Collector Set data in a different location than the default. Browse to and select the directory, or type the directory name. 

To view or modify the properties of a Data Collector Set after it has been created, you can: 

* Select the Open properties for this data collector set check box at the end of the Data 

Collector Set Creation Wizard. 

* Right-click the name of a Data Collector Set, either in the MMC scope tree or in the 

console window, and click Properties in the context menu. 

Directory tab: 

In addition to defining a root directory for storing Data Collector Set data, you can specify a 

single Subdirectory or create a Subdirectory name format by clicking the arrow to the right 

of the text entry field. 


Q13. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

You have a Group Policy object (GPO) named GPO1 that contains hundreds of settings. GPO1 is linked to an organizational unit (OU) named OU1. OU1 contains 200 client computers. 

You plan to unlink GPO1 from OU1. 

You need to identify which GPO settings will be removed from the computers after GPO1 is unlinked from OU1. 

Which two GPO settings should you identify? (Each correct answer presents part of the solution. Choose two.) 

A. The managed Administrative Template settings 

B. The unmanaged Administrative Template settings 

C. The System Services security settings 

D. The Event Log security settings 

E. The Restricted Groups security settings 

Answer: A,D 

Explanation: 

There are two kinds of Administrative Template policy settings: Managed and Unmanaged . The Group Policy service governs Managed policy settings and removes a policy setting when it is no longer within scope of the user or computer. 

References: http: //technet. microsoft. com/en-us/library/cc778402(v=ws. 10). aspx http: //technet. microsoft. com/en-us/library/bb964258. aspx 


Q14. Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1 that runs Windows Server 2012 R2. 

You enable and configure Routing and Remote Access (RRAS) on Server1. 

You create a user account named User1. 

You need to ensure that User1 can establish VPN connections to Server1. 

What should you do? 

A. Modify the members of the Remote Management Users group. 

B. Add a RADIUS client. 

C. Modify the Dial-in setting of User1. 

D. Create a connection request policy. 

Answer:

Explanation: 

Access permission is also granted or denied based on the dial-in properties of each user account. 

http://technet.microsoft.com/en-us/library/cc772123.aspx 


Q15. You have a failover cluster that contains five nodes. All of the nodes run Windows Server 2012 R2. All of the nodes have BitLocker Drive Encryption (BitLocker) enabled. 

You enable BitLocker on a Cluster Shared Volume (CSV). 

You need to ensure that all of the cluster nodes can access the CSV. 

Which cmdlet should you run next? 

A. Unblock-Tpm 

B. Add-BitLockerKeyProtector 

C. Remove-BitLockerKeyProtector 

D. Enable BitLockerAutoUnlock 

Answer:

Explanation: 

4. Add an Active Directory Security Identifier (SID) to the CSV disk using the Cluster Name Object (CNO) The Active Directory protector is a domain security identifier (SID) based protector for protecting clustered volumes held within the Active Directory infrastructure. It can be bound to a user account, machine account or group. When an unlock request is made for a protected volume, the BitLocker service interrupts the request and uses the BitLocker protect/unprotect APIs to unlock or deny the request. For the cluster service to selfmanage BitLocker enabled disk volumes, an administrator must add the Cluster Name Object (CNO), which is the Active Directory identity associated with the Cluster Network name, as a BitLocker protector to the target disk volumes. Add-BitLockerKeyProtector <drive letter or CSV mount point> -ADAccountOrGroupProtector – ADAccountOrGroup $cno