★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-411 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-411-dumps.html


Cause all that matters here is passing the Microsoft 70-411 exam. Cause all that you need is a high score of 70-411 Administering Windows Server 2012 exam. The only one thing you need to do is downloading Exambible 70-411 exam study guides now. We will not let you down with our money-back guarantee.

2021 Sep 70-411 practice exam:

Q31. Your network is configured as shown in the exhibit. (Click the Exhibit button.) 


Server1 regularly accesses Server2. 

You discover that all of the connections from Server1 to Server2 are routed through Router1. 

You need to optimize the connection path from Server1 to Server2. 

Which route command should you run on Server1? 

A. Route add -p 10.10.10.0 MASK 255.255.255.0 172.23.16.2 METRIC 100 

B. Route add -p 10.10.10.0 MASK 255.255.255.0 10.10.10.1 METRIC 50 

C. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.1 METRIC 100 

D. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.0 METRIC 50 

Answer: A 

Explanation: 

Destination - specifies either an IP address or host name for the network or host. 

subnetmask - specifies a subnet mask to be associated with this route entry. If subnetmask is not specified, 255.255.255.255 is used. 

gateway - specifies either an IP address or host name for the gateway or router to use when forwarding. 

costmetric - assigns an integer cost metric (ranging from 1 through 9,999) to be used in calculating the fastest, most reliable, and/or least expensive routes. If costmetric is not specified, 1 is used. 

interface - specifies the interface to be used for the route that uses the interface number. If an interface is not specified, the interface to be used for the route is determined from the gateway IP address. 

References: http: //support. microsoft. com/kb/299540/en-us 

http: //technet. microsoft. com/en-us/library/cc757323%28v=ws. 10%29. aspx 


Q32. Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1 that runs Windows Server 2008 R2. 

You plan to test Windows Server 2012 R2 by using native-boot virtual hard disks (VHDs). 

You attach a new VHD to Server1. 

You need to install Windows Server 2012 R2 in the VHD. 

What should you do? 

A. Run imagex.exe and specify the /append parameter. 

B. Run dism.exe and specify the /apply-image parameter. 

C. Run imagex.exe and specify the /export parameter. 

D. Run dism.exe and specify the /append-image parameter. 

Answer: B 

Explanation: 

On the destination computer, you will create a structure for the partitions where you apply your images. The partition structure on the destination computer must match the partition structure of the reference computer. If you apply an image to a volume with an existing Windows installation, files from the previous installation may not be deleted. Format the volume by using a tool such as DiskPart before applying the new image. 


Q33. You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 

Files created by users in the human resources department are assigned the Department classification property automatically. 

You are configuring a file management task named Task1 to remove user files that have not been accessed for 60 days or more. 

You need to ensure that Task1 only removes files that have a Department classification property of human resources. The solution must minimize administrative effort. 

What should you configure on Task1? 

A. Configure a file screen 

B. Create a condition 

C. Create a classification rule 

D. Create a custom action 

Answer: B 

Explanation: 

Create a File Expiration Task The following procedure guides you through the process of creating a file management task for expiring files. File expiration tasks are used to automatically move all files that match certain criteria to a specified expiration directory, where an administrator can then back those files up and delete them. Property conditions. Click Add to create a new condition based on the file’s classification. This will open the Property Condition dialog box, which allows you to select a property, an operator to perform on the property, and the value to compare the property against. After clicking OK, you can then create additional conditions, or edit or remove an existing condition. 


Q34. Your network contains an Active Directory domain named contoso.com. 

All user accounts reside in an organizational unit (OU) named OU1. All of the users in the marketing department are members of a group named Marketing. All of the users in the human resources department are members of a group named HR. 

You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU1. You configure the Group Policy preferences of GPO1 to add two shortcuts named Link1 and Link2 to the desktop of each user. 

You need to ensure that Link1 only appears on the desktop of the users in Marketing and that Link2 only appears on the desktop of the users in HR. 

What should you configure? 

A. Security Filtering 

B. WMI Filtering 

C. Group Policy Inheritance 

D. Item-level targeting 

Answer: D 

Explanation: 

You can use item-level targeting to change the scope of individual preference items, so they apply only to selected users or computers. Within a single Group Policy object (GPO), you can include multiple preference items, each customized for selected users or computers and each targeted to apply settings only to the relevant users or computers. 

Reference: http://technet.microsoft.com/en-us/library/cc733022.aspx 


Q35. Your network contains an Active Directory domain named contoso.com. The domain contains a Web server named www.contoso.com. The Web server is available on the Internet. 

You implement DirectAccess by using the default configuration. 

You need to ensure that users never attempt to connect to www.contoso.com by using DirectAccess. The solution must not prevent the users from using DirectAccess to access other resources in contoso.com. 

Which settings should you configure in a Group Policy object (GPO)? 

A. DirectAccess Client Experience Settings 

B. DNS Client 

C. Name Resolution Policy 

D. Network Connections 

Answer: C 

Explanation: 

For DirectAccess, the NRPT must be configured with the namespaces of your intranet with a leading dot (for example, internal.contoso.com or . corp.contoso.com). For a DirectAccess client, any name request that matches one of these namespaces will be sent to the specified intranet Domain Name System (DNS) servers. 

Include all intranet DNS namespaces that you want DirectAccess client computers to access. 

There are no command line methods for configuring NRPT rules. You must use Group Policy settings. To configure the NRPT through Group Policy, use the Group Policy add-in at Computer Configuration \Policies\Windows Settings\Name Resolution Policy in the Group Policy object for DirectAccess clients. You can create a new NRPT rule and edit or delete existing rules. For more information, see Configure the NRPT with Group Policy. 


70-411 practice exam

Down to date windows server 2012 exam 70 411:

Q36. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

You enable and configure Routing and Remote Access (RRAS) on Server1. 

You create a user account named User1. 

You need to ensure that User1 can establish VPN connections to Server1. 

What should you do? 

A. Create a network policy. 

B. Create a connection request policy. 

C. Add a RADIUS client. 

D. Modify the members of the Remote Management Users group. 

Answer: A 

Explanation: 

Network policies are sets of conditions, constraints, and settings that allow you to designate who is authorized to connect to the network and the circumstances under which they can or cannot connect. 

Network policies can be viewed as rules. Each rule has a set of conditions and settings. 

Configure your VPN server to use Network Access Protection (NAP) to enforce health requirement policies. 


References: http: //technet. microsoft. com/en-us/library/hh831683. aspx 

http: //technet. microsoft. com/en-us/library/cc754107. aspx 

http: //technet. microsoft. com/en-us/library/dd314165%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/windowsserver/dd448603. aspx 

http: //technet. microsoft. com/en-us/library/dd314165(v=ws. 10). aspx 

http: //technet. microsoft. com/en-us/library/dd469733. aspx 

http: //technet. microsoft. com/en-us/library/dd469660. aspx 

http: //technet. microsoft. com/en-us/library/cc753603. aspx 

http: //technet. microsoft. com/en-us/library/cc754033. aspx 

http: //technet. microsoft. com/en-us/windowsserver/dd448603. aspx 


Q37. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You have several Windows PowerShell scripts that execute when client computers start. 

When a client computer starts, you discover that it takes a long time before users are prompted to log on. 

You need to reduce the amount of time it takes for the client computers to start. The solution must not prevent scripts from completing successfully. 

Which setting should you configure? To answer, select the appropriate setting in the answer area. 


Answer: 



Q38. Your network contains an Active Directory domain named adatum.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. 

All client computers run Windows 7. 

You need to ensure that user settings are saved to \\Server1\Users\. 

What should you do? 

A. From the properties of each user account, configure the Home folder settings. 

B. From a Group Policy object (GPO), configure the Folder Redirection settings. 

C. From the properties of each user account, configure the User profile settings. 

D. From a Group Policy object (GPO), configure the Drive Maps preference. 

Answer: C 

Explanation: 

If a computer is running Windows 2000 Server or later on a network, users can store their profiles on the server. These profiles are called roaming user profiles. 


Q39. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2. 

The domain contains two domain controllers. The domain controllers are configured as shown in the following table. 


Active Directory Recycle Bin is enabled. 

You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago. 

You need to restore the membership of Group1. 

What should you do? 

A. Recover the items by using Active Directory Recycle Bin. 

B. Modify the Recycled attribute of Group1. 

C. Perform tombstone reanimation. 

D. Perform an authoritative restore. 

Answer: A 

Explanation: 

Active Directory Recycle Bin helps minimize directory service downtime by enhancing your ability to preserve and restore accidentally deleted Active Directory objects without restoring Active Directory data from backups, restarting Active Directory Domain Services (AD DS), or rebooting domain controllers. 

When you enable Active Directory Recycle Bin, all link-valued and non-link-valued attributes of the deleted Active Directory objects are preserved and the objects are restored in their entirety to the same consistent logical state that they were in immediately before deletion. For example, restored user accounts automatically regain all group memberships and corresponding access rights that they had immediately before deletion, within and across domains. 


Q40. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Windows Server Update Services server role installed. 

You need to configure Windows Server Update Services (WSUS) to support Secure Sockets Layer (SSL). 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. From Internet Information Services (IIS) Manager, modify the connection strings of the WSUS website. 

B. Install a server certificate. 

C. Run the wsusutil.exe command. 

D. Run the iisreset.exe command. 

E. From Internet Information Services (IIS) Manager, modify the bindings of the WSUS website. 

Answer: B,C,E 

Explanation: 

Certificate needs to be installed to IIS, Bindings modifies and wsusutil run. 

1. First we need to request a certificate for the WSUS web site, so open IIS, click the server 

name, then open Server Certificates. 

On the Actions pane click Create Domain Certificate. 

2. To add the signing certificate to the WSUS Web site in IIS 7.0 

On the WSUS server, open Internet Information Services (IIS) Manager. 

Expand Sites, right-click the WSUS Web site, and then click Edit Bindings. 

In the Site Binding dialog box, select the https binding, and click Edit to open the Edit Site 

Binding dialog box. 

Select the appropriate Web server certificate in the SSL certificate box, and then click OK. 

Click Close to exit the Site Bindings dialog box, and then click OK to close Internet 

Information Services (IIS) Manager. 

3. WSUSUtil.exe configuressl<FQDN of the software update point site system> (the name 

in your certificate) 

WSUSUtil.exe configuressl<Intranet FQDN of the software update point site system>. 

4. The next step is to point your clients to the correct url, by modifying the existing GPO or 

creating a new one. Open the policy Specify intranet Microsoft update service location and 

type the new url in the form https: //YourWSUSserver. 

The gpupdate /force command will just download all the GPO’s and re-apply them to the client, it won’t force the client to check for updates. For that you need to use wuauclt /resetautorization /detectnow followed by wuauclt /reportnow 

References: 

http: //technet. microsoft. com/en-us/library/bb680861. aspx 

http: //technet. microsoft. com/en-us/library/bb633246. aspx 

http: //www. vkernel. ro/blog/configure-wsus-to-use-ssl