Having a Microsoft Microsoft certification is a dream with regard to those who operate in The idea field. Actualtests is probably the leaders in supplying Microsoft 70-411 certification candidates using up-to-date online practice tests with regard to Microsoft certification exam preparation. The 70-411 human brain dumps are usually revised in line with the particular Microsoft 70-411 real exam. Many of us give you 100% promise to get over the Microsoft 70-411 examination using our high-quality and also reliable Microsoft practice questions. You simply need to click the particular mouse and confirm the particular payment; then you can get pleasure from our free downloadable 70-411 Pdf files. The Microsoft 70-411 certification sample questions are usually cutting-edge, and matching using correct answers. Commit the least volume of money and a little span of time getting the most valuable and also accurate Microsoft Microsoft 70-411 training materials. Purchasing our Microsoft item and passing your Microsoft 70-411 certification exam on your initial try, as well as you can get entire money rear.

2021 Dec 70-411 practice question

Q31. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 P.2. Server1 has the Network Policy and Access Services server role installed. 

Your company's security policy requires that certificate-based authentication must be used by some network services. 

You need to identify which Network Policy Server (NPS) authentication methods comply with the security policy. 

Which two authentication methods should you identify? (Each correct answer presents part of the solution. Choose two.) 

A. MS-CHAP 

B. PEAP-MS-CHAP v2 

C. Chap 

D. EAP-TLS 

E. MS-CHAP v2 

Answer: B,D 

Explanation: 

PEAP is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create a secure TLS tunnel to protect user authentication, and uses server-side public key certificates to authenticate the server. When you use EAP with a strong EAP type, such as TLS with smart cards or TLS with certificates, both the client and the server use certificates to verify their identities to each other. 


Q32. Your network contains an Active Directory domain named contoso.com. 

All user accounts reside in an organizational unit (OU) named OU1. 

You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU1. You 

configure the Group Policy preference of GPO1 to add a shortcut named Link1 to the desktop of each user. 

You discover that when a user deletes Link1, the shortcut is removed permanently from the desktop. 

You need to ensure that if a user deletes Link1, the shortcut is added to the desktop again. What should you do? 

A. Enforce GPO1. 

B. Modify the Link1 shortcut preference of GPO1. 

C. Enable loopback processing in GPO1. 

D. Modify the Security Filtering settings of GPO1. 

Answer:

Explanation: 

Replace Delete and recreate a shortcut for computers or users. The net result of the Replace action is to overwrite the existing shortcut. If the shortcut does not exist, then the Replace action creates a new shortcut. 

This type of preference item provides a choice of four actions: Create, Replace, Update, and Delete. The behavior of the preference item varies with the action selected and whether the shortcut already exists. 

Refernces: http: //technet.microsoft.com/en-us/library/cc753580.aspx http: //technet.microsoft.com/en-us/library/cc753580.aspx 


Q33. Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs. 

The domain is renamed to adatum.com. 

Group Policies no longer function correctly. 

You need to ensure that the existing GPOs are applied to users and computers. You want to achieve this goal by using the minimum amount of administrative effort. 

What should you use? 

A. Dcgpofix 

B. Get-GPOReport 

C. Gpfixup 

D. Gpresult 

E. Gpedit. msc 

F. Import-GPO 

G. Restore-GPO 

H. Set-GPInheritance 

I. Set-GPLink 

J. Set-GPPermission 

K. Gpupdate 

L. Add-ADGroupMember 

Answer:

Explanation: 

You can use the gpfixup command-line tool to fix the dependencies that Group Policy objects (GPOs) and Group Policy links in Active Directory Domain Services (AD DS) have on Domain Name System (DNS) and NetBIOS names after a domain rename operation. 

Reference: http: //technet. microsoft. com/en-us/library/hh852336(v=ws. 10). aspx 


Q34. HOTSPOT 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest contains two Active Directory sites named Site1 and Site2. 

You plan to deploy a read-only domain controller (RODC) named DC10 to Site2. You pre-create the DC10 domain controller account by using Active Directory Users and Computers. 

You need to identify which domain controller will be used for initial replication during the promotion of the RODC. 

Which tab should you use to identify the domain controller? 

To answer, select the appropriate tab in the answer area. 

Answer: 


Q35. Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs. 

You have two GPOs linked to an organizational unit (OU) named OU1. 

You need to change the precedence order of the GPOs. 

What should you use? 

A. Dcgpofix 

B. Get-GPOReport 

C. Gpfixup 

D. Gpresult 

E. Gpedit. msc 

F. Import-GPO 

G. Restore-GPO 

H. Set-GPInheritance 

I. Set-GPLink 

J. Set-GPPermission 

K. Gpupdate 

L. Add-ADGroupMember 

Answer:

Explanation: 

The Set-GPLinkcmdlet sets the properties of a GPO link. You can set the following properties: 

. Enabled. If the GPO link is enabled, the settings of the GPO are applied when Group Policy is processed for the site, domain or OU. 

. Enforced. If the GPO link is enforced, it cannot be blocked at a lower-level (in the Group Policy processing hierarchy) container. 

. Order. The order specifies the precedence that the settings of the GPO take over conflicting settings in other GPOs that are linked (and enabled) to the same site, domain, or OU. 

Reference: http: //technet. microsoft. com/en-us/library/ee461022. aspx 


Refresh 70-411 exam question:

Q36. HOTSPOT 

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1. 

Your company implements DirectAccess. 

A user named User1 works at a customer's office. The customer's office contains a server named Server1. 

When User1 attempts to connect to Server1, User1 connects to Server1 in adatum.com. You need to provide User1 with the ability to connect to Server1 in the customer's office. Which Group Policy option should you configure? To answer, select the appropriate option in the answer area. 

Answer: 


Q37. Your company deploys a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2. The forest contains a domain controller named DC10. 

On DC10, the disk that contains the SYSVOL folder fails. 

You replace the failed disk. You stop the Distributed File System (DFS) Replication service. You restore the SYSVOL folder. 

You need to perform a non-authoritative synchronization of SYSVOL on DC10. 

Which tool should you use before you start the DFS Replication service on DC10? 

A. Dfsgui.msc 

B. Dfsmgmt.msc 

C. Adsiedit.msc 

D. Ldp 

Answer:

Explanation: 

How to perform a non-authoritative synchronization of DFSR-replicated SYSVOL (like "D2" for FRS) 

. In the ADSIEDIT. MSC tool modify the following distinguished name (DN) value and attribute on each of the domain controllers that you want to make non-authoritative: 

CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=<the server name>,OU=Domain Controllers,DC=<domain> msDFSR-Enabled=FALSE 

. Force Active Directory replication throughout the domain. 

. Run the following command from an elevated command prompt on the same servers that you set as non-authoritative: 

DFSRDIAG POLLAD 

. You will see Event ID 4114 in the DFSR event log indicating SYSVOL is no longer being replicated. 

. On the same DN from Step 1, set: 

msDFSR-Enabled=TRUE 

. Force Active Directory replication throughout the domain. 

. Run the following command from an elevated command prompt on the same servers that you set as non-authoritative: 

DFSRDIAG POLLAD 

. You will see Event ID 4614 and 4604 in the DFSR event log indicating SYSVOL has been initialized. That domain controller has now done a “D2” of SYSVOL. 

Note: Active Directory Service Interfaces Editor (ADSI Edit) is a Lightweight Directory Access Protocol (LDAP) editor that you can use to manage objects and attributes in Active Directory. ADSI Edit (adsiedit. msc) provides a view of every object and attribute in an Active Directory forest. You can use ADSI Edit to query, view, and edit attributes that are not exposed through other Active Directory Microsoft Management Console (MMC) snap-ins: Active Directory Users and Computers, Active Directory Sites and Services, Active Directory Domains and Trusts, and Active Directory Schema. 


Q38. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy Server role service installed. 

You plan to configure Server1 as a Network Access Protection (NAP) health policy server for VPN enforcement by using the Configure NAP wizard. 

You need to ensure that you can configure the VPN enforcement method on Server1 successfully. 

What should you install on Server1 before you run the Configure NAP wizard? 

A. A system health validator (SHV) 

B. The Host Credential Authorization Protocol (HCAP) 

C. A computer certificate 

D. The Remote Access server role 

Answer:

Explanation: 

Configure NAP enforcement for VPN 

This checklist provides the steps required to deploy computers with Routing and Remote 

Access Service installed and configured as VPN servers with Network Policy Server (NPS) and Network Access Protection (NAP). 


Q39. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

Client computers run either Windows 7 or Windows 8. All of the client computers have an application named App1 installed. 

The domain contains a Group Policy object (GPO) named GPO1 that is applied to all of the client computers. 

You need to add a system variable named App1Data to all of the client computers. 

Which Group Policy preference should you configure? 

A. Environment 

B. Ini Files 

C. Data Sources 

D. Services 

Answer:

Explanation: 

Environment Variable preference items allow you to create, update, replace, and delete user and system environment variables or semicolon-delimited segments of the PATH variable. Before you create an Environment Variable preference item, you should review the behavior of each type of action possible with this extension. 


Q40. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

An organizational unit (OU) named ResearchServers contains the computer accounts of all research servers. 

All domain users are configured to have a minimum password length of eight characters. 

You need to ensure that the minimum password length of the local user accounts on the research servers in the ResearchServers OU is 10 characters. 

What should you do? 

A. Configure a local Group Policy object (GPO) on each research server. 

B. Create and link a Group Policy object (GPO) to the ResearchServers OU. 

C. Create a universal group that contains the research servers. Create a Password Settings object (PSO) and assign the PSO to the group. 

D. Create a global group that contains the research servers. Create a Password Settings object (PSO) and assign the PSO to the group. 

Answer:

Explanation: 

For a domain, and you are on a member server or a workstation that is joined to the domain 

1. Open Microsoft Management Console (MMC). 

2. On the File menu, click Add/Remove Snap-in, and then click Add. 

3. Click Group Policy Object Editor, and then click Add. 

4. In Select Group Policy Object, click Browse. 

5. In Browse for a Group Policy Object, select a Group Policy object (GPO) in the appropriate domain, site, or organizational unit--or create a new one, click OK, and then click Finish. 

6. Click Close, and then click OK. 

7. In the console tree, click Password Policy. 

Where? 

Group Policy Object [computer name] Policy/Computer Configuration/Windows 

Settings/Security Settings/Account Policies/Password Policy 

8. In the details pane, right-click the policy setting that you want, and then click Properties. 

9. If you are defining this policy setting for the first time, select the Define this policy setting 

check box. 

10. Select the options that you want, and then click OK.