Download Administering Windows Server 2012.70-411.ActualTests.2019-09-03.182q.vcex

Vendor: Microsoft
Exam Code: 70-411
Exam Name: Administering Windows Server 2012
Date: Sep 03, 2019
File Size: 21 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 
Server1 has the following role services installed:
  • DirectAccess and VPN (RRAS) 
  • Network Policy Server 
Remote users have client computers that run either Windows XP, Windows 7, or Windows 8. 
You need to ensure that only the client computers that run Windows 7 or Windows 8 can establish VPN connections to Server1. 
What should you configure on Server1?
  1. A condition of a Network Policy Server (NPS) network policy
  2. A constraint of a Network Policy Server (NPS) network policy
  3. a condition of a Network Policy Server (NPS) connection request policy
  4. A vendor-specific RADIUS attribute of a Network Policy Server (NPS) connection request policy
Correct answer: A
Explanation:
If you want to configure the Operating System condition, click Operating System, and then click Add. In Operating System Properties, click Add, and then specify the operating system settings that are required to match the policy. The Operating System condition specifies the operating system (operating system version or service pack number), role (client or server), and architecture (x86, x64, or ia64) required for the computer configuration to match the policy.
If you want to configure the Operating System condition, click Operating System, and then click Add. In Operating System Properties, click Add, and then specify the operating system settings that are required to match the policy. 
The Operating System condition specifies the operating system (operating system version or service pack number), role (client or server), and architecture (x86, x64, or ia64) required for the computer configuration to match the policy.
Question 2
You are a network administrator of an Active Directory domain named contoso.com. 
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the DHCP Server server role and the Network Policy Server role service installed. 
You enable Network Access Protection (NAP) on all of the DHCP scopes on Server1. You need to create a DHCP policy that will apply to all of the NAP non-compliant DHCP clients. 
Which criteria should you specify when you create the DHCP policy?
  1. The client identifier
  2. The user class
  3. The vendor class
  4. The relay agent information
Correct answer: B
Explanation:
   To configure a NAP-enabled DHCP server On the DHCP server, click Start, click Run, in Open, type dhcpmgmt. smc, and then press ENTER. In the DHCP console, open <servername>\IPv4. Right-click the name of the DHCP scope that you will use for NAP client computers, and then click Properties. On the Network Access Protection tab, under Network Access Protection Settings, choose Enable for this scope, verify that Use default Network Access Protection profile is selected, and then click OK. In the DHCP console tree, under the DHCP scope that you have selected, right-click Scope Options, and then click Configure Options. On the Advanced tab, verify that Default User Class is selected next to User class. Select the 003 Router check box, and in IP Address, under Data entry, type the IP address for the default gateway used by compliant NAP client computers, and then click Add. Select the 006 DNS Servers check box, and in IP Address, under Data entry, type the IP address for each router to be used by compliant NAP client computers, and then click Add. Select the 015 DNS Domain Name check box, and in String value, under Data entry, type your organization's domain name (for example, woodgrovebank. local), and then click Apply. This domain is a full-access network assigned to compliant NAP clients. 10.On the Advanced tab, next to User class, choose Default Network Access Protection Class. 11.Select the 003 Router check box, and in IP Address, under Data entry, type the IP address for the default gateway used by noncompliant NAP client computers, and then click Add. This can be the same default gateway that is used by compliant NAP clients. 12.Select the 006 DNS Servers check box, and in IP Address, under Data entry, type the IP address for each DNS server to be used by noncompliant NAP client computers, and then click Add. These can be the same DNS servers used by compliant NAP clients. 13.Select the 015 DNS Domain Name check box, and in String value, under Data entry, type a name to identify the restricted domain (for example, restricted. Woodgrovebank. local), and then click OK. This domain is a restricted-access network assigned to noncompliant NAP clients. Click OK to close the Scope Options dialog box. Close the DHCP console. Reference: http: //technet.microsoft.com/en-us/library/dd296905%28v=ws.10%29.aspx
  
To configure a NAP-enabled DHCP server 
  • On the DHCP server, click Start, click Run, in Open, type dhcpmgmt. smc, and then press ENTER. 
  • In the DHCP console, open <servername>\IPv4. 
  • Right-click the name of the DHCP scope that you will use for NAP client computers, and then click Properties. 
  • On the Network Access Protection tab, under Network Access Protection Settings, choose Enable for this scope, verify that Use default Network Access Protection profile is selected, and then click OK. 
  • In the DHCP console tree, under the DHCP scope that you have selected, right-click Scope Options, and then click Configure Options. 
  • On the Advanced tab, verify that Default User Class is selected next to User class. 
  • Select the 003 Router check box, and in IP Address, under Data entry, type the IP address for the default gateway used by compliant NAP client computers, and then click Add. 
  • Select the 006 DNS Servers check box, and in IP Address, under Data entry, type the IP address for each router to be used by compliant NAP client computers, and then click Add. 
  • Select the 015 DNS Domain Name check box, and in String value, under Data entry, type your organization's domain name (for example, woodgrovebank. local), and then click Apply. This domain is a full-access network assigned to compliant NAP clients. 10.On the Advanced tab, next to User class, choose Default Network Access Protection Class. 11.Select the 003 Router check box, and in IP Address, under Data entry, type the IP address for the default gateway used by noncompliant NAP client computers, and then click Add. This can be the same default gateway that is used by compliant NAP clients. 12.Select the 006 DNS Servers check box, and in IP Address, under Data entry, type the IP address for each DNS server to be used by noncompliant NAP client computers, and then click Add. These can be the same DNS servers used by compliant NAP clients. 13.Select the 015 DNS Domain Name check box, and in String value, under Data entry, type a name to identify the restricted domain (for example, restricted. Woodgrovebank. local), and then click OK. This domain is a restricted-access network assigned to noncompliant NAP clients. 
  • Click OK to close the Scope Options dialog box. 
  • Close the DHCP console. 
Reference: http: //technet.microsoft.com/en-us/library/dd296905%28v=ws.10%29.aspx
Question 3
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Network Policy Server role service installed. 
An administrator creates a RADIUS client template named Template1. 
You create a RADIUS client named Client1 by using Template 1. 
You need to modify the shared secret for Client1. 
What should you do first?
  1. Configure the Advanced settings of Template1.
  2. Set the Shared secret setting of Template1 to Manual.
  3. Clear Enable this RADIUS client for Client1.
  4. Clear Select an existing template for Client1.
Correct answer: D
Explanation:
Clear checkmark for Select an existing template in the new client wizard. In New RADIUS Client, in Shared secret, do one of the following:Bullet Ensure that Manual is selected, and then in Shared secret, type the strong password that is also entered on the RADIUS client. Retype the shared secret in Confirm shared secret.       
Clear checkmark for Select an existing template in the new client wizard. 
In New RADIUS Client, in Shared secret, do one of the following:
Bullet Ensure that Manual is selected, and then in Shared secret, type the strong password that is also entered on the RADIUS client. Retype the shared secret in Confirm shared secret. 
  
  
Question 4
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 
The domain contains a server named Server1 that has the Network Policy Server server role and the Remote Access server role installed. The domain contains a server named Server2 that is configured as a RADIUS server. 
Server1 provides VPN access to external users. 
You need to ensure that all of the VPN connections to Server1 are logged to the RADIUS server on Server2. 
What should you run?
  1. Add-RemoteAccessRadius -ServerNameServer1 -AccountingOnOffMsg Enabled -SharedSecret "Secret" -Purpose Accounting
  2. Set-RemoteAccessAccounting -AccountingOnOffMsg Enabled -AccountingOnOffMsg Enabled
  3. Add-RemoteAccessRadius -ServerName Server2 -AccountingOnOffMsg Enabled -SharedSecret "Secret" -Purpose Accounting
  4. Set-RemoteAccessAccounting -EnableAccountingType Inbox -AccountingOnOffMsg Enabled
Correct answer: C
Explanation:
Add-RemoteAccessRadius Adds a new external RADIUS server for VPN authentication, accounting for DirectAccess (DA) and VPN, or one-time password (OTP) authentication for DA. AccountingOnOffMsg<String> Indicates the enabled state for sending of accounting on or off messages. The acceptable values for this parameter are:Enabled. Disabled. This is the default value. This parameter is applicable only when the RADIUS server is being added for Remote Access accounting.
Add-RemoteAccessRadius 
Adds a new external RADIUS server for VPN authentication, accounting for DirectAccess (DA) and VPN, or one-time password (OTP) authentication for DA. 
AccountingOnOffMsg<String> 
Indicates the enabled state for sending of accounting on or off messages. The acceptable values for this parameter are:
  • Enabled. 
  • Disabled. This is the default value. 
This parameter is applicable only when the RADIUS server is being added for Remote Access accounting.
Question 5
Your network contains an Active Directory domain named adatum.com. 
A network administrator creates a Group Policy central store. 
After the central store is created, you discover that when you create new Group Policy objects (GPOs), the GPOs do not contain any Administrative Templates. 
You need to ensure that the Administrative Templates appear in new GPOs. 
What should you do?
  1. Add your user account to the Group Policy Creator Owners group.
  2. Configure all domain controllers as global catalog servers.
  3. Copy files from %Windir%\Policydefinitions to the central store.
  4. Modify the Delegation settings of the new GPOs.
Correct answer: C
Explanation:
To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain.
To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain.
Question 6
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains 500 client computers that run Windows 8.1 Enterprise. 
You implement a Group Policy central store. 
You have an application named App1. App1 requires that a custom registry setting be deployed to all of the computers. 
You need to deploy the custom registry setting. The solution must minimize administrator effort. 
What should you configure in a Group Policy object (GPO)?
  1. The Software Installation settings
  2. The Administrative Templates
  3. An application control policy
  4. The Group Policy preferences
Correct answer: D
Explanation:
  Open the Group Policy Management Console. Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit.    In the console tree under Computer Configuration or User Configuration, expand the Preferences folder, and then expand the Windows Settings folder.    Right-click the Registry node, point to New, and select Registry Item.  Group Policy preferences provide the means to simplify deployment and standardize configurations. They add to Group Policy a centralized system for deploying preferences (that is, settings that users can change later). You can also use Group Policy preferences to configure applications that are not Group Policy- aware. By using Group Policy preferences, you can change or delete almost any registry setting, file or folder, shortcut, and more. You are not limited by the contents of Administrative Template files. The Group Policy Management Editor (GPME) includes Group Policy preferences. References:http://technet.microsoft.com/en-us/library/gg699429.aspx http://www.unidesk.com/blog/gpos-set-custom-registry-entries-virtual-desktops-disabling-machine-password      
  Open the Group Policy Management Console. Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit.  
  In the console tree under Computer Configuration or User Configuration, expand the Preferences folder, and then expand the Windows Settings folder.  
  Right-click the Registry node, point to New, and select Registry Item.  
Group Policy preferences provide the means to simplify deployment and standardize configurations. They add to Group Policy a centralized system for deploying preferences (that is, settings that users can change later). 
You can also use Group Policy preferences to configure applications that are not Group Policy- aware. By using Group Policy preferences, you can change or delete almost any registry setting, file or folder, shortcut, and more. You are not limited by the contents of Administrative Template files. 
The Group Policy Management 
Editor (GPME) includes Group Policy preferences. 
References:
http://technet.microsoft.com/en-us/library/gg699429.aspx 
http://www.unidesk.com/blog/gpos-set-custom-registry-entries-virtual-desktops-disabling-machine-password
  
  
Question 7
Your network contains two Active Directory forests named contoso.com and dev.contoso.com. The contoso.com forest contains a domain controller named DC1. The dev.contoso.com forest contains a domain controller named DC2. Each domain contains an organizational unit (OU) named OU1. 
Dev.contoso.com has a Group Policy object (GPO) named GPO1. GPO1 contains 200 settings, including several settings that have network paths. GPO1 is linked to OU1. 
You need to copy GPO1 from dev.contoso.com to contoso.com. 
What should you do first on DC2?
  1. From the Group Policy Management console, right-click GPO1 and select Copy.
  2. Run the mtedit.exe command and specify the /Domaintcontoso.com /DC: DC 1 parameter.
  3. Run the Save-NetGpocmdlet.
  4. Run the Backup-Gpocmdlet.
Correct answer: A
Explanation:
      To copy a Group Policy object:In the GPMC console tree, right-click the GPO that you want to copy, and then click Copy.  To create a copy of the GPO in the same domain as the source GPO, right-click Group Policy objects, click Paste, specify permissions for the new GPO in the Copy GPO box, and then click OK. For copy operations to another domain, you may need to specify a migration table. The Migration Table Editor (MTE) is provided with Group Policy Management Console (GPMC) to facilitate the editing of migration tables. Migration tables are used for copying or importing Group Policy objects (GPOs) from one domain to another, in cases where the GPOs include domain-specific information that must be updated during copy or import.  Source WS2008R2: Backup the existing GPOs from the GPMC, you need to ensure that the "Group Policy Objects" container is selected for the "Backup Up All" option to be available.Copy a Group Policy Object with the Group Policy Management Console (GPMC)  You can copy a Group Policy object (GPO) either by using the drag-and-drop method or right-click method. Applies To: Windows 8, Windows Server 2008 R2, Windows Server 2012References:http://technet.microsoft.com/en-us/library/cc785343(v=WS.10).aspx http://technet.microsoft.com/en-us/library/cc733107.aspx
  
  
To copy a Group Policy object:
In the GPMC console tree, right-click the GPO that you want to copy, and then click Copy.  
To create a copy of the GPO in the same domain as the source GPO, right-click Group Policy objects, click Paste, specify permissions for the new GPO in the Copy GPO box, and then click OK. 
For copy operations to another domain, you may need to specify a migration table. 
The Migration Table Editor (MTE) is provided with Group Policy Management Console (GPMC) to facilitate the editing of migration tables. Migration tables are used for copying or importing Group Policy objects (GPOs) from one domain to another, in cases where the GPOs include domain-specific information that must be updated during copy or import.  
Source WS2008R2: Backup the existing GPOs from the GPMC, you need to ensure that the "Group Policy Objects" container is selected for the "Backup Up All" option to be available.
Copy a Group Policy Object with the Group Policy Management Console (GPMC)  
You can copy a Group Policy object (GPO) either by using the drag-and-drop method or right-click method. 
Applies To: Windows 8, Windows Server 2008 R2, Windows Server 2012
References:
http://technet.microsoft.com/en-us/library/cc785343(v=WS.10).aspx 
http://technet.microsoft.com/en-us/library/cc733107.aspx
Question 8
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 
Client computers run either Windows 7 or Windows 8. All of the client computers have an application named App1 installed. 
The domain contains a Group Policy object (GPO) named GPO1 that is applied to all of the client computers. 
You need to add a system variable named App1Data to all of the client computers. 
Which Group Policy preference should you configure?
  1. Environment
  2. Ini Files
  3. Data Sources
  4. Services
Correct answer: A
Explanation:
Environment Variable preference items allow you to create, update, replace, and delete user and system environment variables or semicolon-delimited segments of the PATH variable. Before you create an Environment Variable preference item, you should review the behavior of each type of action possible with this extension.
Environment Variable preference items allow you to create, update, replace, and delete user and system environment variables or semicolon-delimited segments of the PATH variable. Before you create an Environment Variable preference item, you should review the behavior of each type of action possible with this extension.
Question 9
Your network contains an Active Directory domain named contoso.com. 
All user accounts reside in an organizational unit (OU) named OU1. 
You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU1. You configure the Group Policy preference of GPO1 to add a shortcut named Link1 to the desktop of each user. 
You discover that when a user deletes Link1, the shortcut is removed permanently from the desktop. 
You need to ensure that if a user deletes Link1, the shortcut is added to the desktop again. 
What should you do?
  1. Enforce GPO1.
  2. Modify the Link1 shortcut preference of GPO1.
  3. Enable loopback processing in GPO1.
  4. Modify the Security Filtering settings of GPO1.
Correct answer: B
Explanation:
Replace Delete and recreate a shortcut for computers or users. The net result of the Replace action is to overwrite the existing shortcut. If the shortcut does not exist, then the Replace action creates a new shortcut. This type of preference item provides a choice of four actions: Create, Replace, Update, and Delete. The behavior of the preference item varies with the action selected and whether the shortcut already exists.    References:http://technet.microsoft.com/en-us/library/cc753580.aspx http://technet.microsoft.com/en-us/library/cc753580.aspx
Replace Delete and recreate a shortcut for computers or users. The net result of the Replace action is to overwrite the existing shortcut. If the shortcut does not exist, then the Replace action creates a new shortcut. 
This type of preference item provides a choice of four actions: Create, Replace, Update, and Delete. The behavior of the preference item varies with the action selected and whether the shortcut already exists.
  
References:
http://technet.microsoft.com/en-us/library/cc753580.aspx 
http://technet.microsoft.com/en-us/library/cc753580.aspx
Question 10
You manage a server that runs Windows Server 2012 R2. The server has the Windows Deployment Services server role installed. 
You have a desktop computer that has the following configuration:
  • Computer name: Computer1
  • Operating system: Windows 8
  • MAC address: 20-CF-30-65-D0-87
  • GUID: 979708BF-C04B-4525-9FE0-C4150BB6C618
You need to configure a pre-staged device for Computer1 in the Windows Deployment Services console. 
Which two values should you assign to the device ID? (Each correct answer presents a complete solution. Choose two.)
  1. 20CF3065D08700000000000000000000
  2. 979708BFC04B45259FE0C4150BB6C618
  3. 979708BF-C04B-452S-9FE0-C4150BB6C618
  4. 0000000000000000000020CF306SD087
  5. 00000000-0000-0000-0000-C41S0BB6C618
Correct answer: CD
Explanation:
In the text box, type the client computer's MAC address preceded with twenty zeros or the globally unique identifier (GUID) in the format: {XXXXXXXX-XXXX-XXXX-XXX- XXXXXXXXXXXX}.* To add or remove pre-staged client to/from AD DS, specify the name of the computer or the device ID, which is a GUID, media access control (MAC) address, or Dynamic Host Configuration Protocol (DHCP) identifier associated with the computer. * Example: Remove a device by using its ID from a specified domain This command removes the pre-staged device that has the specified ID. The cmdlet searches the domain named TSQA.contoso.com for the device.Windows PowerShell PS C:\> Remove-WdsClient -DeviceID "5a7a1def-2e1f-4a7b-a792-ae5275b6ef92" -Domain -DomainName "TSQA.contoso.com"
In the text box, type the client computer's MAC address preceded with twenty zeros or the globally unique identifier (GUID) in the format: {XXXXXXXX-XXXX-XXXX-XXX- XXXXXXXXXXXX}.
* To add or remove pre-staged client to/from AD DS, specify the name of the computer or the device ID, which is a GUID, media access control (MAC) address, or Dynamic Host Configuration Protocol (DHCP) identifier associated with the computer. 
* Example: Remove a device by using its ID from a specified domain This command removes the pre-staged device that has the specified ID. The cmdlet searches the domain named TSQA.contoso.com for the device.
Windows PowerShell 
PS C:\> Remove-WdsClient -DeviceID "5a7a1def-2e1f-4a7b-a792-ae5275b6ef92" -Domain -DomainName "TSQA.contoso.com"
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!