★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-411 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-411-dumps.html


Exam Code: 70-411 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Administering Windows Server 2012
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-411 Exam.

2021 Mar 70-411 brain dumps

Q131. HOTSPOT 

You have a server named Servers that runs Windows Server 2012 R2. Servers has the Windows Deployment Services server role installed. 

Server5 contains several custom images of Windows 8. 

You need to ensure that when 32-bit client computers start by using PXE, the computers automatically install an image named Image 1. 

What should you configure? 

To answer, select the appropriate tab in the answer area. 

Answer: 


Q132. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Windows Server Update Services server role installed. 

Server1 stores update files locally in C:\Updates. 

You need to change the location in which the update files are stored to D:\Updates. 

What should you do? 

A. From the Update Services console, run the Windows Server Update Services Configuration Wizard. 

B. From a command prompt, run wsusutil.exe and specify the movecontent parameter. 

C. From the Update Services console, configure the Update Files and Languages option. 

D. From a command prompt, run wsusutil.exe and specify the export parameter. 

Answer:

Explanation: 

You might need to change the location where WSUS stores updates locally. This might be required if the disk becomes full and there is no longer any room for new updates. You might also have to do this if the disk where updates are stored fails and the replacement disk uses a new drive letter. You accomplish this move with the movecontent command of WSUSutil.exe, a command-line tool that is copied to the file system of the WSUS server during WSUS Setup. By default, Setup copies WSUSutil.exe to the following location: WSUSInstallationDrive:\Program Files\Microsoft Windows Server Update Services\Tools\ 


Q133. Your network is configured as shown in the exhibit. (Click the Exhibit button.) 

Server1 regularly accesses Server2. 

You discover that all of the connections from Server1 to Server2 are routed through Router1. 

You need to optimize the connection path from Server1 to Server2. 

Which route command should you run on Server1? 

A. Route add -p 10.10.10.0 MASK 255.255.255.0 172.23.16.2 METRIC 100 

B. Route add -p 10.10.10.0 MASK 255.255.255.0 10.10.10.1 METRIC 50 

C. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.1 METRIC 100 

D. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.0 METRIC 50 

Answer:

Explanation: 

Destination - specifies either an IP address or host name for the network or host. 

subnetmask - specifies a subnet mask to be associated with this route entry. If subnetmask is not specified, 255.255.255.255 is used. 

gateway - specifies either an IP address or host name for the gateway or router to use when forwarding. 

costmetric - assigns an integer cost metric (ranging from 1 through 9,999) to be used in calculating the fastest, most reliable, and/or least expensive routes. If costmetric is not specified, 1 is used. 

interface - specifies the interface to be used for the route that uses the interface number. If an interface is not specified, the interface to be used for the route is determined from the gateway IP address. 

References: http: //support. microsoft. com/kb/299540/en-us 

http: //technet. microsoft. com/en-us/library/cc757323%28v=ws. 10%29. aspx 


Q134. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 

Each time a user receives an access-denied message after attempting to access a folder on Server1, an email notification is sent to a distribution list named DL1. 

You create a folder named Folder1 on Server1, and then you configure custom NTFS permissions for Folder1. 

You need to ensure that when a user receives an access-denied message while attempting to access Folder1, an email notification is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving notifications about other access-denied messages. 

What should you do? 

A. From Server Manager, run the New Share Wizard to create a share for Folder1 by selecting the SMB Share - Advanced option. 

B. From the File Server Resource Manager console, modify the Access-Denied Assistance settings. 

C. From the File Server Resource Manager console, modify the Email Notifications settings. 

D. From Server Manager, run the New Share Wizard to create a share for Folder1 by selecting the SMB Share -Applications option. 

Answer:

Reference: http://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK_12 

Explanation: 

When using the email model each of the file shares, you can determine whether access requests to each file share will be received by the administrator, a distribution list that represents the file share owners, or both. 

The owner distribution list is configured by using the SMB Share – Advanced file share profile in the New Share Wizard in Server Manager. 


Q135. Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1 that runs Windows Server 2012 R2. 

You enable and configure Routing and Remote Access (RRAS) on Server1. 

You create a user account named User1. 

You need to ensure that User1 can establish VPN connections to Server1. 

What should you do? 

A. Modify the members of the Remote Management Users group. 

B. Add a RADIUS client. 

C. Modify the Dial-in setting of User1. 

D. Create a connection request policy. 

Answer:

Explanation: 

Access permission is also granted or denied based on the dial-in properties of each user account. 

http://technet.microsoft.com/en-us/library/cc772123.aspx 


Renewal 70-411 brain dumps:

Q136. Your network contains an Active Directory domain named contoso.com. The domain 

contains a domain controller named DC1 that runs Windows Server 2012 R2. 

You create an Active Directory snapshot of DC1 each day. 

You need to view the contents of an Active Directory snapshot from two days ago. 

What should you do first? 

A. Run the dsamain.exe command. 

B. Stop the Active Directory Domain Services (AD DS) service. 

C. Start the Volume Shadow Copy Service (VSS). 

D. Run the ntdsutil.exe command. 

Answer:

Explanation: 

Dsamain.exe exposes Active Directory data that is stored in a snapshot or backup as a Lightweight Directory Access Protocol (LDAP) server. 

: http://technet.microsoft.com/en-us/library/cc772168.aspx 


Q137. HOTSPOT 

You have a server named Server4 that runs Windows Server 2012 R2. Server4 has the Windows Deployment Services server role installed. 

Server4 is configured as shown in the exhibit. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. 

Answer: 


Q138. You have a failover cluster that contains five nodes. All of the nodes run Windows Server 2012 R2. All of the nodes have BitLocker Drive Encryption (BitLocker) enabled. 

You enable BitLocker on a Cluster Shared Volume (CSV). 

You need to ensure that all of the cluster nodes can access the CSV. 

Which cmdlet should you run next? 

A. Unblock-Tpm 

B. Add-BitLockerKeyProtector 

C. Remove-BitLockerKeyProtector 

D. Enable BitLockerAutoUnlock 

Answer:

Explanation: 

4. Add an Active Directory Security Identifier (SID) to the CSV disk using the Cluster Name Object (CNO) The Active Directory protector is a domain security identifier (SID) based protector for protecting clustered volumes held within the Active Directory infrastructure. It can be bound to a user account, machine account or group. When an unlock request is made for a protected volume, the BitLocker service interrupts the request and uses the BitLocker protect/unprotect APIs to unlock or deny the request. For the cluster service to selfmanage BitLocker enabled disk volumes, an administrator must add the Cluster Name Object (CNO), which is the Active Directory identity associated with the Cluster Network name, as a BitLocker protector to the target disk volumes. Add-BitLockerKeyProtector <drive letter or CSV mount point> -ADAccountOrGroupProtector – ADAccountOrGroup $cno 


Q139. You manage a server that runs Windows Server 2012 R2. The server has the Windows Deployment Services server role installed. 

You have a desktop computer that has the following configuration: 

Computer name: Computer1 

Operating system: Windows 8 

MAC address: 20-CF-30-65-D0-87 

GUID: 979708BF-C04B-4525-9FE0-C4150BB6C618 

You need to configure a pre-staged device for Computer1 in the Windows Deployment Services console. 

Which two values should you assign to the device ID? (Each correct answer presents a complete solution. Choose two.) 

A. 20CF3065D08700000000000000000000 

B. 979708BFC04B45259FE0C4150BB6C618 

C. 979708BF-C04B-452S-9FE0-C4150BB6C618 

D. 0000000000000000000020CF306SD087 

E. 00000000-0000-0000-0000-C41S0BB6C618 

Answer: C,D 

Explanation: 

In the text box, type the client computer's MAC address preceded with twenty zeros or the globally unique identifier (GUID) in the format: {XXXXXXXX-XXXX-XXXX-XXX-XXXXXXXXXXXX}. 

* To add or remove pre-staged client to/from AD DS, specify the name of the computer or the device ID, which is a GUID, media access control (MAC) address, or Dynamic Host Configuration Protocol (DHCP) identifier associated with the computer. 

* Example: Remove a device by using its ID from a specified domain This command removes the pre-staged device that has the specified ID. The cmdlet searches the domain named TSQA.contoso.com for the device. 

Windows PowerShell PS C:\> Remove-WdsClient -DeviceID "5a7a1def-2e1f-4a7b-a792-ae5275b6ef92" -Domain -DomainName "TSQA.contoso.com" 


Q140. Your network contains one Active Directory domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1. 

The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2. 

You need to identify which domain controllers are authorized to be cloned by using virtual domain controller cloning. 

Which cmdlet should you use? 

A. Get-ADGroupMember 

B. Get-ADDomainControllerPasswordReplicationPolicy 

C. Get-ADDomainControllerPasswordReplicationPolicyUsage 

D. Get-ADDomain 

E. Get-ADOptionalFeature 

F. Get-ADAccountAuthorizationGroup 

Answer:

Explanation: One requirement for cloning a domain controller is an existing Windows Server 2012 DC that hosts the PDC emulator role. You can run the Get-ADDomain and retrieve which server has the PDC emulator role. 

Example: Command Prompt: C:\PS> Get-ADDomain 

Output wouldinclude a line such as: PDCEmulator : Fabrikam-DC1.Fabrikam.com 

Reference: Step-by-Step: Domain Controller Cloning 

http://blogs.technet.com/b/canitpro/archive/2013/06/12/step-by-step-domain-controller-cloning.aspx 

Reference: Get-ADDomain 

https://technet.microsoft.com/en-us/library/ee617224.aspx