★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-411 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-411-dumps.html


Cause all that matters here is passing the Microsoft 70-411 exam. Cause all that you need is a high score of 70-411 Administering Windows Server 2012 exam. The only one thing you need to do is downloading Actualtests 70-411 exam study guides now. We will not let you down with our money-back guarantee.

2021 Mar 70-411 dumps

Q121. Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named R0DC1. 

You create a global group named RODC_Admins. 

You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on R0DC1. The solution must not provide RODC_Admins with the ability to manage Active Directory objects. 

What should you do? 

A. From Active Directory Sites and Services, run the Delegation of Control Wizard. 

B. From a command prompt, run the dsadd computer command. 

C. From Active Directory Site and Services, configure the Security settings of the R0DC1 server object. 

D. From a command prompt, run the dsmgmt local roles command. 

Answer:

Explanation: 

RODC: using the dsmgmt.exe utility to manage local administrators One of the benefits of RODC is that you can add local administrators who do not have full access to the domain administration. This gives them the ability to manage the server but not add or change active directory objects unless those roles are delegated. Adding this type of user is done using the dsmdmt.exe utility at the command prompt. 


Q122. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

Client computers run either Windows 7 or Windows 8. All of the client computers have an application named App1 installed. 

The domain contains a Group Policy object (GPO) named GPO1 that is applied to all of the client computers. 

You need to add a system variable named App1Data to all of the client computers. 

Which Group Policy preference should you configure? 

A. Environment 

B. Ini Files 

C. Data Sources 

D. Services 

Answer:

Explanation: 

Environment Variable preference items allow you to create, update, replace, and delete user and system environment variables or semicolon-delimited segments of the PATH variable. Before you create an Environment Variable preference item, you should review the behavior of each type of action possible with this extension. 


Q123. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You have several Windows PowerShell scripts that execute when users log on to their client computer. 

You need to ensure that all of the scripts execute completely before the users can access their desktop. 

Which setting should you configure? To answer, select the appropriate setting in the answer area. 

Answer: 


Q124. Your network contains two Active Directory domains named contoso.com and adatum.com. 

The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. Server1 has a copy of the contoso.com DNS zone. 

You need to configure Server1 to resolve names in the adatum.com domain. The solution must meet the following requirements: 

Prevent the need to change the configuration of the current name servers that host zones for adatum.com. Minimize administrative effort. 

Which type of zone should you create? 

A. Secondary 

B. Stub 

C. Reverse lookup 

D. Primary 

Answer:

Explanation: 

When a zone that this DNS server hosts is a stub zone, this DNS server is a source only for information about the authoritative name servers for this zone. The zone at this server must be obtained from another DNS server that hosts the zone. This DNS server must have network access to the remote DNS server to copy the authoritative name server information about the zone. 

A stub zone is a copy of a zone that contains only necessary resource records (Start of Authority (SOA), Name Server (NS), and Address/Host (A) record) in the master zone and acts as a pointer to the authoritative name server. The stub zone allows the server to forward queries to the name server that is authoritative for the master zone without going up to the root name servers and working its way down to the server. While a stub zone can improve performance, it does not provide redundancy or load sharing. 

You can use stub zones to: 

Keep delegated zone information current. By updating a stub zone for one of its child zones regularly, the DNS server that hosts both the parent zone and the stub zone will maintain a current list of authoritative DNS servers for the child zone. 

Improve name resolution. Stub zones enable a DNS server to perform recursion using the stub zone's list of name servers, without having to query the Internet or an internal root server for the DNS namespace. 

Simplify DNS administration. By using stub zones throughout your DNS infrastructure, you can distribute a list of the authoritative DNS servers for a zone without using secondary zones. However, stub zones do not serve the same purpose as secondary zones, and they are not an alternative for enhancing redundancy and load sharing. 

There are two lists of DNS servers involved in the loading and maintenance of a stub zone: 

The list of master servers from which the DNS server loads and updates a stub zone. A master server may be a primary or secondary DNS server for the zone. In both cases, it will have a complete list of the DNS servers for the zone. 

The list of the authoritative DNS servers for a zone. This list is contained in the stub zone using name server (NS) resource records. 

When a DNS server loads a stub zone, such as widgets. tailspintoys.com, it queries the master servers, which can be in different locations, for the necessary resource records of the authoritative servers for the zone widgets. tailspintoys.com. The list of master servers may contain a single server or multiple servers, and it can be changed anytime. 

References: http: //technet.microsoft.com/en-us/library/cc771898.aspx http: //technet.microsoft.com/en-us/library/cc754190.aspx http: //technet.microsoft.com/en-us/library/cc730980.aspx 


Q125. Your network contains two Active Directory forests named contoso.com and adatum.com. 

All domain controllers run Windows Server 2012 R2. 

The adatum.com domain contains a Group Policy object (GPO) named GPO1. An administrator from adatum.com backs up GPO1 to a USB flash drive. You have a domain controller named dc1.contoso.com. You insert the USB flash drive in 

dc1.contoso.com. 

You need to identify the domain-specific reference in GPO1. 

What should you do? 

A. From the Migration Table Editor, click Populate from Backup. 

B. From Group Policy Management, run the Group Policy Modeling Wizard. 

C. From Group Policy Management, run the Group Policy Results Wizard. 

D. From the Migration Table Editor, click Populate from GPO. 

Answer:


Far out 70-411 torrent:

Q126. HOTSPOT 

Your network contains one Active Directory domain named contoso.com. The domain contains 10 file servers that run Windows Server 2012 R2. 

You plan to enable BitLocker Drive Encryption (BitLocker) for the operating system drives of the file servers. 

You need to configure BitLocker policies for the file servers to meet the following requirements: 

. Ensure that all of the servers use a startup PIN for operating system drives encrypted with BitLocker. 

. Ensure that the BitLocker recovery key and recovery password are stored in Active 

Directory. Which two Group Policy settings should you configure? To answer, select the appropriate settings in the answer area. 

Answer: 


Q127. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 

Server1 has a folder named Folder1 that is used by the sales department. 

You need to ensure that an email notification is sent to the sales manager when a File Screening Audit report is generated. 

What should you configure on Server1? 

A. a file group 

B. a file screen 

C. a file screen exception 

D. a storage report task 

Answer:

Explanation: 

From the Storage Reports Management node, you can generate reports that will help you understand file use on the storage server. You can use the storage reports to monitor disk usage patterns (by file type or user), identify duplicate files and dormant files, track quota usage, and audit file screening. 

Before you run a File Screen Audit report, in the File Server Resource Manager Options dialog box, on the File Screen Audit tab, verify that the Record file screening activity in the auditing database check box is selected. 

Reference: http: //technet. microsoft. com/en-us/library/cc755988. aspx 

http: //technet. microsoft. com/en-us/library/cc730822. aspx 

http: //technet. microsoft. com/en-us/library/cc770594. aspx 

http: //technet. microsoft. com/en-us/library/cc771212. aspx 

http: //technet. microsoft. com/en-us/library/cc732074. aspx 


Q128. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains 500 client computers that run Windows 8 Enterprise. 

You implement a Group Policy central store. 

You have an application named App1. App1 requires that a custom registry setting be deployed to all of the computers. 

You need to deploy the custom registry setting. The solution must minimize administrator effort. 

What should you configure in a Group Policy object (GPO)? 

A. The Software Installation settings 

B. The Administrative Templates 

C. An application control policy 

D. The Group Policy preferences 

Answer:

Explanation: 

. Open the Group Policy Management Console. Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit. 

. In the console tree under Computer Configuration or User Configuration, expand the Preferences folder, and then expand the Windows Settings folder. 

. Right-click the Registry node, point to New, and select Registry Item. 

Group Policy preferences provide the means to simplify deployment and standardize configurations. They add to Group Policy a centralized system for deploying preferences (that is, settings that users can change later). 

You can also use Group Policy preferences to configure applications that are not Group Policy-aware. By using Group Policy preferences, you can change or delete almost any registry setting, file or folder, shortcut, and more. You are not limited by the contents of Administrative Template files. The Group Policy Management Editor (GPME) includes Group Policy preferences. 

References: http: //technet.microsoft.com/en-us/library/gg699429.aspx http: //www. unidesk. com/blog/gpos-set-custom-registry-entries-virtual-desktops-disabling-machine-password 


Q129. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains two servers. The servers are configured as shown in the following table. 

All client computers run Windows 8 Enterprise. 

You plan to deploy Network Access Protection (NAP) by using IPSec enforcement. 

A Group Policy object (GPO) named GPO1 is configured to deploy a trusted server group to all of the client computers. 

You need to ensure that the client computers can discover HRA servers automatically. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. On all of the client computers, configure the EnableDiscovery registry key. 

B. In a GPO, modify the Request Policy setting for the NAP Client Configuration. 

C. On Server2, configure the EnableDiscovery registry key. 

D. On DC1, create an alias (CNAME) record. 

E. On DC1, create a service location (SRV) record. 

Answer: A,B,E 

Explanation: 

Requirements for HRA automatic discovery 

The following requirements must be met in order to configure trusted server groups on NAP client computers using HRA automatic discovery: 

Client computers must be running Windows Vista. with Service Pack 1 (SP1) or Windows XP with Service Pack 3 (SP3). 

The HRA server must be configured with a Secure Sockets Layer (SSL) certificate. 

The EnableDiscovery registry key must be configured on NAP client computers. 

DNS SRV records must be configured. 

The trusted server group configuration in either local policy or Group Policy must be cleared. 

http: //technet. microsoft. com/en-us/library/dd296901. aspx 


Q130. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. Both servers have the File and Storage Services server role, the DFS Namespaces role service, and the DFS Replication role service installed. 

Server1 and Server2 are part of a Distributed File System (DFS) Replication group named Group1. Server1 and Server2 are separated by a low-speed WAN connection. 

You need to limit the amount of bandwidth that DFS can use to replicate between Server1 and Server2. 

What should you modify? 

A. The referral ordering of the namespace 

B. The staging quota of the replicated folder 

C. The cache duration of the namespace 

D. The schedule of the replication group 

Answer:

Explanation: 

Scheduling allows less bandwidth the by limiting the time interval of the replication 

Does DFS Replication throttle bandwidth per schedule, per server, or per connection? 

If you configure bandwidth throttling when specifying the schedule, all connections for that replication group will use that setting for bandwidth throttling. Bandwidth throttling can be also set as a connection-level setting using DFS Management. 

To edit the schedule and bandwidth for a specific connection, use the following steps: 

In the console tree under the Replication node, select the appropriate replication group. 

Click the Connections tab, right-click the connection that you want to edit, and then click Properties. 

Click the Schedule tab, select Custom connection schedule and then click Edit Schedule. 

Use the Edit Schedule dialog box to control when replication occurs, as well as the maximum amount of bandwidth replication can consume.