★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-411 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-411-dumps.html


Proper study guides for Up to the minute Microsoft Administering Windows Server 2012 certified begins with Microsoft 70-411 preparation products which designed to deliver the Best Quality 70-411 questions by making you pass the 70-411 test at your first time. Try the free 70-411 demo right now.

2021 Jul administering windows server:

Q11. You have a DNS server named Server1. 

Server1 has a primary zone named contoso.com. 

Zone Aging/Scavenging is configured for the contoso.com zone. 

One month ago, an administrator removed a server named Server2 from the network. 

You discover that a static resource record for Server2 is present in contoso.com. Resource records for decommissioned client computers are removed automatically from contoso.com. 

You need to ensure that the static resource records for all of the servers are removed automatically from contoso.com. 

What should you modify? 

A. The Expires after value of contoso.com 

B. The Record time stamp value of the static resource records 

C. The time-to-live (TTL) value of the static resource records 

D. The Security settings of the static resource records 

Answer: B 

Explanation: 

Reset and permit them to use a current (non-zero) time stamp value. This enables these records to become aged and scavenged. 

You can use this procedure to change how a specific resource record is scavenged. 

A stale record is a record where both the No-Refresh Interval and Refresh Interval have passed without the time stamp updating. 

DNS->View->Advanced 


Depending on the how the resource record was originally added to the zone, do one of the following: If the record was added dynamically using dynamic update, clear the Delete this record when it becomes stale check box to prevent its aging or potential removal during the scavenging process. If dynamic updates to this record continue to occur, the Domain Name System (DNS) server will always reset this check box so that the dynamically updated record can be deleted. 

If you added the record statically, select the Delete this record when it becomes stale check box to permit its aging or potential removal during the scavenging process. 


References: http: //technet. microsoft. com/en-us/library/cc759204%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc759204%28v=ws. 10%29. aspx 

Typically, stale DNS records occur when a computer is permanently removed from the network. Mobile users who abnormally disconnect from the network can also cause stale DNS records. To help manage stale records, Windows adds a time stamp to dynamically added resource records in primary zones where aging and scavenging are enabled. Manually added records are time stamped with a value of 0, and they are automatically excluded from the aging and scavenging process. 

To enable aging and scavenging, you must do the following: 

Resource records must be either dynamically added to zones or manually modified to be used in aging and scavenging operations. 

Scavenging and aging must be enabled both at the DNS server and on the zone. 

Scavenging is disabled by default. 


DNS scavenging depends on the following two settings: 

No-refresh interval: The time between the most recent refresh of a record time stamp and the moment when the time stamp can be refreshed again. When scavenging is enabled, this is set to 7 days by default. 

Refresh interval: The time between the earliest moment when a record time stamp can be refreshed and the earliest moment when the record can be scavenged. The refresh interval must be longer than the maximum record refresh period. When scavenging is enabled, this is set to 7 days by default. 

A DNS record becomes eligible for scavenging after both the no-refresh and refresh intervals have elapsed. If the default values are used, this is a total of 14 days. 

References: http: //technet. microsoft. com/en-us/library/cc759204%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc759204%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc771570. aspx 

http: //technet. microsoft. com/en-us/library/cc771677. aspx 

http: //technet. microsoft. com/en-us/library/cc758321(v=ws. 10). aspx 


Q12. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains 500 client computers that run Windows 8 Enterprise. 

You implement a Group Policy central store. 

You have an application named App1. App1 requires that a custom registry setting be deployed to all of the computers. 

You need to deploy the custom registry setting. The solution must minimize administrator effort. 

What should you configure in a Group Policy object (GPO)? 

A. The Software Installation settings 

B. The Administrative Templates 

C. An application control policy 

D. The Group Policy preferences 

Answer: D 

Explanation: 

. Open the Group Policy Management Console. Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit. 

. In the console tree under Computer Configuration or User Configuration, expand the Preferences folder, and then expand the Windows Settings folder. 

. Right-click the Registry node, point to New, and select Registry Item. 

Group Policy preferences provide the means to simplify deployment and standardize configurations. They add to Group Policy a centralized system for deploying preferences (that is, settings that users can change later). 

You can also use Group Policy preferences to configure applications that are not Group Policy-aware. By using Group Policy preferences, you can change or delete almost any registry setting, file or folder, shortcut, and more. You are not limited by the contents of Administrative Template files. The Group Policy Management Editor (GPME) includes Group Policy preferences. 

References: http: //technet.microsoft.com/en-us/library/gg699429.aspx http: //www. unidesk. com/blog/gpos-set-custom-registry-entries-virtual-desktops-disabling-machine-password 




Q13. Your company has a main office and two branch offices. The main office is located in Seattle. The two branch offices are located in Montreal and Miami. Each office is configured as an Active Directory site. 

The network contains an Active Directory domain named contoso.com. Network traffic is not routed between the Montreal office and the Miami office. 

You implement a Distributed File System (DFS) namespace named \\contoso.com\public. The namespace contains a folder named Folder1. Folder1 has a folder target in each office. 

You need to configure DFS to ensure that users in the branch offices only receive referrals to the target in their respective office or to the target in the main office. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Set the Ordering method of \\contoso.com\public to Random order. 

B. Set the Advanced properties of the folder target in the Seattle office to Last among all targets. 

C. Set the Advanced properties of the folder target in the Seattle office to First among targets of equal cost. 

D. Set the Ordering method of \\contoso.com\public to Exclude targets outside of the client's site. 

E. Set the Advanced properties of the folder target in the Seattle office to Last among targets of equal cost. 

F. Set the Ordering method of \\contoso.com\public to Lowest cost. 

Answer: C,D 

Explanation: 

Exclude targets outside of the client's site In this method, the referral contains only the targets that are in the same site as the client. These same-site targets are listed in random order. If no same-site targets exist, the client does not receive a referral and cannot access that portion of the namespace. Note: Targets that have target priority set to "First among all targets" or "Last among all targets" are still listed in the referral, even if the ordering method is set to Exclude targets outside of the client's site. Note 2: Set the Ordering Method for Targets in Referrals A referral is an ordered list of targets that a client computer receives from a domain controller or namespace server when the user accesses a namespace root or folder with targets. After the client receives the referral, the client attempts to access the first target in the list. If the target is not available, the client attempts to access the next target. 


Q14. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 has the DHCP Server server role and the Network Policy Server role service installed. 

Server1 contains three non-overlapping scopes named Scope1, Scope2, and Scope3. Server1 currently provides the same Network Access Protection (NAP) settings to the three scopes. 

You modify the settings of Scope1 as shown in the exhibit. (Click the Exhibit button.) 


You need to configure Server1 to provide unique NAP enforcement settings to the NAP non-compliant DHCP clients from Scope1. 

What should you create? 

A. A connection request policy that has the Service Type condition 

B. A connection request policy that has the Identity Type condition 

C. A network policy that has the Identity Type condition 

D. A network policy that has the MS-Service Class condition 

Answer: D 

Explanation: 

MS-Service Class 

Restricts the policy to clients that have received an IP address from a DHCP scope that matches the specified DHCP profile name. This condition is used only when you are deploying NAP with the DHCP enforcement method. To use the MS-Service Class attribute, in Specify the profile name that identifies your DHCP scope, type the name of an existing DHCP profile. 

Open the NPS console, double-click Policies, click Network Policies, and then double-click the policy you want to configure. 

In policy Properties, click the Conditions tab, and then click Add. In Select condition, scroll to the Network Access Protection group of conditions. 

If you want to configure the Identity Type condition, click Identity Type, and then click Add. 

In Specify the method in which clients are identified in this policy, select the items appropriate for your deployment, and then click OK. 

The Identity Type condition is used for the DHCP and Internet Protocol security (IPsec) enforcement methods to allow client health checks when NPS does not receive an Access-Request message that contains a value for the User-Name attribute; in this case, client health checks are performed, but authentication and authorization are not performed. 

If you want to configure the MS-Service Class condition, click MS-Service Class, and then click Add. In Specify the profile name that identifies your DHCP scope, type the name of an existing DHCP profile, and then click Add. 


The MS-Service Class condition restricts the policy to clients that have received an IP address from a DHCP scope that matches the specified DHCP profile name. This condition is used only when you are deploying NAP with the DHCP enforcement method. 

References: http: //technet. microsoft. com/en-us/library/cc731560(v=ws. 10). aspx 

http: //technet. microsoft. com/en-us/library/cc731220(v=ws. 10). aspx 


Q15. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

Administrators use client computers that run Windows 8 to perform all management tasks. 

A central store is configured on a domain controller named DC1. 

You have a custom administrative template file named App1.admx. App1.admx contains application settings for an application named Appl. 

From a client computer named Computer1, you create a new Group Policy object (GPO) named GPO1. 

You discover that the application settings for App1 fail to appear in GPO1. 

You need to ensure that the App1 settings appear in all of the new GPOs that you create. 

What should you do? 

A. From the Default Domain Controllers Policy, add App1.admx to the Administrative Templates. 

B. Copy App1.admx to \\Contoso.com\SYSVOL\Contoso.com\Policies\PolicyDefinitions\. 

C. From the Default Domain Policy, add App1.admx to the Administrative Templates. 

D. Copy App1.admx to \\Contoso.com\SYSVOL\Contoso.com\StarterGPOs. 

Answer: B 

Explanation: 

To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain. 


70-411 exam topics

Avant-garde mcsa 70-411:

Q16. Your network contains one Active Directory domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1. 

The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2. 

You need to identify which security principals are authorized to have their password cached on RODC1. 

Which cmdlet should you use? 

A. Get-ADGroupMember 

B. Get-ADDomainControllerPasswordReplicationPolicy 

C. Get-ADDomainControllerPasswordReplicationPolicyUsage 

D. Get-ADDomain 

E. Get-ADOptionalFeature 

F. Get-ADAccountAuthorizationGroup 

Answer: B 


Q17. Your network contains an Active Directory forest named contoso.com. The functional level of the forest is Windows Server 2008 R2. 

All of the user accounts in the marketing department are members of a group named Contoso\MarketingUsers. All of the computer accounts in the marketing department are members of a group named Contoso\MarketingComputers. 

A domain user named User1 is a member of the Contoso\MarketingUsers group. A computer named Computer1 is a member of the Contoso\MarketingComputers group. 

You have five Password Settings objects (PSOs). The PSOs are defined as shown in the following table. 


When User1 logs on to Computer1 and attempts to change her password, she receives an error message indicating that her password is too short. 

You need to tell User1 what her minimum password length is. 

What should you tell User1? 

A. 10 

B. 11 

C. 12 

D. 14 

Answer: A 

Explanation: 

One PSO has a precedence value of 2 and the other PSO has a precedence value of 4. In this case, the PSO that has the precedence value of 2 has a higher rank and, hence, is applied to the object. 


Q18. Your network contains two Active Directory forests named contoso.com and adatum.com. The contoso.com forest contains a server named Server1.contoso.com. The adatum.com forest contains a server named server2. adatum.com. Both servers have the Network Policy Server role service installed. 

The network contains a server named Server3. Server3 is located in the perimeter network and has the Network Policy Server role service installed. 

You plan to configure Server3 as an authentication provider for several VPN servers. 

You need to ensure that RADIUS requests received by Server3 for a specific VPN server are always forwarded to Server1.contoso.com. 

Which two should you configure on Server3? (Each correct answer presents part of the solution. Choose two.) 

A. Remediation server groups 

B. Remote RADIUS server groups 

C. Connection request policies 

D. Network policies 

E. Connection authorization policies 

Answer: B,C 

Explanation: 

To configure NPS as a RADIUS proxy, you must create a connection request policy that contains all of the information required for NPS to evaluate which messages to forward and where to send the messages. 

When you configure Network Policy Server (NPS) as a Remote Authentication Dial-In User Service (RADIUS) proxy, you use NPS to forward connection requests to RADIUS servers that are capable of processing the connection requests because they can perform authentication and authorization in the domain where the user or computer account is located. For example, if you want to forward connection requests to one or more RADIUS servers in untrusted domains, you can configure NPS as a RADIUS proxy to forward the requests to the remote RADIUS servers in the untrusted domain. To configure NPS as a RADIUS proxy, you must create a connection request policy that contains all of the information required for NPS to evaluate which messages to forward and where to send the messages. 

When you configure a remote RADIUS server group in NPS and you configure a connection request policy with the group, you are designating the location where NPS is to forward connection requests. 


References: http: //technet. microsoft. com/en-us/library/cc754518. aspx 

http: //technet. microsoft. com/en-us/library/cc754518. aspx 

http: //technet. microsoft. com/en-us/library/cc754518. aspx 


Q19. Your network contains an Active Directory domain named contoso.com. 

You need to install and configure the Web Application Proxy role service. 

What should you do? 

A. Install the Active Directory Federation Services server role and the Remote Access server role on different servers. 

B. Install the Active Directory Federation Services server role and the Remote Access server role on the same server. 

C. Install the Web Server (IIS) server role and the Application Server server role on the same server. 

D. Install the Web Server (IIS) server role and the Application Server server role on different servers. 

Answer: A 

Explanation: 

Web Application Proxy is a new Remote Access role service in Windows Server. 2012 R2. 



Q20. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. You implement DirectAccess. 

You need to view the properties of the DirectAccess connection. 

Which connection properties should you view? To answer, select the appropriate connection properties in the answer area. 


Answer: