Download Administering Windows Server 2012.70-411.TestKing.2018-09-10.176q.vcex

Vendor: Microsoft
Exam Code: 70-411
Exam Name: Administering Windows Server 2012
Date: Sep 10, 2018
File Size: 22 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. 
You run ntdsutil as shown in the exhibit.
  
You need to ensure that you can access the contents of the mounted snapshot. 
What should you do?
  1. From the snapshot context of ntdsutil, run activate instance "NTDS".
  2. From a command prompt, run dsamain.exe -dbpath c:\$snap_201204131056_volumec$\windows\ntds\ntds. dit -Idapport 389.
  3. From the snapshot context of ntdsutil, run mount {79f94f82-5926-4f44-8af0-2f56d827a57d}.
  4. From a command prompt, run dsamain.exe -dbpath c:\$snap_201204131056_volumec$\windows\ntds\ntds. dit -Idapport 33389.
Correct answer: D
Explanation:
By default, only members of the Domain Admins group and the Enterprise Admins group are allowed to view the snapshots because they contain sensitive AD DS data. If you want to access snapshot data from an old domain or forest that has been deleted, you can allow nonadministrators to access the data when you run Dsamain.exe. If you plan to view the snapshot data on a domain controller, specify ports that are different from the ports that the domain controller will use. A client starts an LDAP session by connecting to an LDAP server, called a Directory System Agent (DSA), by default on TCP port and UDP [7] port 389. The client then sends an operation request to the server, and the server sends responses in return. With some exceptions, the client does not need to wait for a response before sending the next request, and the server may send the responses in any order. All information is transmitted using Basic Encoding Rules (BER).   References:http://technet.microsoft.com/en-us/library/cc753609(v=ws.10).aspx
By default, only members of the Domain Admins group and the Enterprise Admins group are allowed to view the snapshots because they contain sensitive AD DS data. If you want to access snapshot data from an old domain or forest that has been deleted, you can allow nonadministrators to access the data when you run Dsamain.exe. 
If you plan to view the snapshot data on a domain controller, specify ports that are different from the ports that the domain controller will use. 
A client starts an LDAP session by connecting to an LDAP server, called a Directory System Agent (DSA), by default on TCP port and UDP [7] port 389. The client then sends an operation request to the server, and the server sends responses in return. With some exceptions, the client does not need to wait for a response before sending the next request, and the server may send the responses in any order. All information is transmitted using Basic Encoding Rules (BER). 
  
References:
http://technet.microsoft.com/en-us/library/cc753609(v=ws.10).aspx
Question 2
You are a network administrator of an Active Directory domain named contoso.com. 
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Web Server (IIS) server role installed. 
Server1 will host a web site at URL https://secure.contoso.com. The application pool identity account of the web site will be set to a domain user account named AppPool1.
You need to configure the Service Principal Name (SPN) for the web site. 
What should you run? To answer, drag the appropriate objects to the correct location. Each object may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Correct answer: To work with this question, an Exam Simulator is required.
Explanation:
Note:* -s <SPN> Adds the specified SPN for the computer, after verifying that no duplicates exist. Usage: setspn –s SPN accountnameFor example, to register SPN "http/daserver" for computer "daserver1":setspn -S http/daserver daserver1 Attn: with Windows 2008 option is-abut with Windows 2012 it started to show-sDefinition of an SPN An SPN is the name by which a client uniquely identifies an instance of a service. If you install multiple instances of a service on computers throughout a forest, each service instance must have its own SPN. A particular service instance can have multiple SPNs if there are multiple names that clients might use for authentication. For example, an SPN always includes the name of the host computer on which the service instance is running. Therefore, a service instance might register an SPN for each name or alias of its host. Adding SPNs To add an SPN, use the setspn -s service/namehostname command at a command prompt, where service/name is the SPN that you want to add and hostname is the actual host name of the computer object that you want to update. For example, if there is an Active Directory domain controller with the host name server1.contoso.com that requires an SPN for the Lightweight Directory Access Protocol (LDAP), type setspn -s ldap/server1.contoso.com server1, and then press ENTER to add the SPN. The HTTP service class The HTTP service class differs from the HTTP protocol. Both the HTTP protocol and the HTTPS protocol use the HTTP service class. The service class is the string that identifies the general class of service. For example, the command may resemble the following command:setspn–S HTTP/iis6server1. mydomain.com mydomain\appPool1 References:http://support.microsoft.com/kb/929650/en-ushttp://technet.microsoft.com/en-us/library/cc731241(v=ws.10).aspx
Note:
* -s <SPN> 
Adds the specified SPN for the computer, after verifying that no duplicates exist. 
Usage: setspn –s SPN accountname
For example, to register SPN "http/daserver" for computer "daserver1":
setspn -S http/daserver daserver1 
Attn: with Windows 2008 option is-abut with Windows 2012 it started to show-s
Definition of an SPN 
An SPN is the name by which a client uniquely identifies an instance of a service. If you install multiple instances of a service on computers throughout a forest, each service instance must have its own SPN. A particular service instance can have multiple SPNs if there are multiple names that clients might use for authentication. For example, an SPN always includes the name of the host computer on which the service instance is running. Therefore, a service instance might register an SPN for each name or alias of its host. 
Adding SPNs 
To add an SPN, use the setspn -s service/namehostname command at a command prompt, where service/name is the SPN that you want to add and hostname is the actual host name of the computer object that you want to update. For example, if there is an Active Directory domain controller with the host name server1.contoso.com that requires an SPN for the Lightweight Directory Access Protocol (LDAP), type setspn -s ldap/server1.contoso.com server1, and then press ENTER to add the SPN. 
The HTTP service class 
The HTTP service class differs from the HTTP protocol. Both the HTTP protocol and the HTTPS protocol use the HTTP service class. The service class is the string that identifies the general class of service. 
For example, the command may resemble the following command:
setspn–S HTTP/iis6server1. mydomain.com mydomain\appPool1 
References:
http://support.microsoft.com/kb/929650/en-us
http://technet.microsoft.com/en-us/library/cc731241(v=ws.10).aspx
Question 3
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 is backed up daily. The domain has the Active Directory Recycle Bin enabled. 
During routine maintenance, you delete 500 inactive user accounts and 100 inactive groups. One of the deleted groups is named Group1. Some of the deleted user accounts are members of some of the deleted groups. 
For documentation purposes, you must provide a list of the members of Group1 before the group was deleted. 
You need to identify the names of the users who were members of Group1 prior to its deletion. 
You want to achieve this goal by using the minimum amount of administrative effort. 
What should you do first?
  1. Mount the most recent Active Directory backup.
  2. Reactivate the tombstone of Group1.
  3. Perform an authoritative restore of Group1.
  4. Use the Recycle Bin to restore Group1.
Correct answer: A
Explanation:
The Active Directory Recycle Bin does not have the ability to track simple changes to objects.  If the object itself is not deleted, no element is moved to the Recycle Bin for possible recovery in the future. In other words, there is no rollback capacity for changes to object properties, or, in other words, to the values of these properties.
The Active Directory Recycle Bin does not have the ability to track simple changes to objects.  
If the object itself is not deleted, no element is moved to the Recycle Bin for possible recovery in the future. In other words, there is no rollback capacity for changes to object properties, or, in other words, to the values of these properties.
Question 4
Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers. The domain controllers are configured as shown in the following table. 
  
The network contains a server named Server1 that has the Hyper-v server role installed. DC6 is a virtual machine that is hosted on Server1. 
You need to ensure that you can clone DC6. 
Which FSMO role should you transfer to DC2?
  1. Rid master
  2. Domain naming master
  3. PDC emulator
  4. Infrastructure master
Correct answer: C
Explanation:
The clone domain controller uses the security context of the source domain controller (the domain controller whose copy it represents) to contact the Windows Server 2012 R2 Primary Domain Controller (PDC) emulator operations master role holder (also known as flexible single master operations, or FSMO). The PDC emulator must be running Windows Server 2012 R2, but it does not have to be running on a hypervisor. Reference:http://technet.microsoft.com/en-us/library/hh831734.aspx
The clone domain controller uses the security context of the source domain controller (the domain controller whose copy it represents) to contact the Windows Server 2012 R2 Primary Domain Controller (PDC) emulator operations master role holder (also known as flexible single master operations, or FSMO). The PDC emulator must be running Windows Server 2012 R2, but it does not have to be running on a hypervisor. 
Reference:
http://technet.microsoft.com/en-us/library/hh831734.aspx
Question 5
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 
Server1 has a folder named Folder1 that is used by the human resources department. 
You need to ensure that an email notification is sent immediately to the human resources manager when a user copies an audio file or a video file to Folder1. 
What should you configure on Server1?
  1. a storage report task
  2. a file screen exception
  3. a file screen
  4. a file group
Correct answer: C
Explanation:
Create file screens to control the types of files that users can save, and generate notifications when users attempt to save unauthorized files. With File Server Resource Manager (FSRM) you can create file screens that prevent users from saving unauthorized files on volumes or folders. File Screen Enforcement:You can create file screens to prevent users from saving unauthorized files on volumes or folders. There are two types of file screen enforcement: active and passive enforcement. Active file screen enforcement does not allow the user to save an unauthorized file. Passive file screen enforcement allows the user to save the file, but notifies the user that the file is not an authorized file. You can configure notifications, such as events logged to the event log or e-mails sent to users and administrators, as part of active and passive file screen enforcement.
Create file screens to control the types of files that users can save, and generate notifications when users attempt to save unauthorized files. 
With File Server Resource Manager (FSRM) you can create file screens that prevent users from saving unauthorized files on volumes or folders. 
File Screen Enforcement:
You can create file screens to prevent users from saving unauthorized files on volumes or folders. There are two types of file screen enforcement: active and passive enforcement. Active file screen enforcement does not allow the user to save an unauthorized file. Passive file screen enforcement allows the user to save the file, but notifies the user that the file is not an authorized file. You can configure notifications, such as events logged to the event log or e-mails sent to users and administrators, as part of active and passive file screen enforcement.
Question 6
Your network contains an Active Directory domain named contoso.com. The domain contains five servers. The servers are configured as shown in the following table. 
  
All desktop computers in contoso.com run Windows 8 and are configured to use BitLocker Drive Encryption (BitLocker) on all local disk drives. 
You need to deploy the Network Unlock feature. The solution must minimize the number of features and server roles installed on the network. 
To which server should you deploy the feature?
  1. Server1
  2. Server2
  3. Server3
  4. Server4
  5. Server5
Correct answer: E
Explanation:
The BitLocker Network Unlock feature will install the WDS role if it is not already installed. If you want to install it separately before you install BitLocker Network Unlock you can use Server Manager or Windows PowerShell. To install the role using Server Manager, select the Windows Deployment Services role in Server Manager.
The BitLocker Network Unlock feature will install the WDS role if it is not already installed. If you want to install it separately before you install BitLocker Network Unlock you can use Server Manager or Windows PowerShell. To install the role using Server Manager, select the Windows Deployment Services role in Server Manager.
Question 7
Your network contains an Active Directory domain named contoso.com. The Active Directory Recycle bin is enabled for contoso.com. 
A support technician accidentally deletes a user account named User1. You need to restore the User1 account. 
Which tool should you use?
  1. Ldp
  2. Esentutl
  3. Active Directory Administrative Center
  4. Ntdsutil
Correct answer: C
Question 8
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2. 
The domain contains two domain controllers. The domain controllers are configured as shown in the following table. 
  
Active Directory Recycle Bin is enabled. 
You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago. 
You need to restore the membership of Group1. 
What should you do?
  1. Recover the items by using Active Directory Recycle Bin.
  2. Modify the Recycled attribute of Group1.
  3. Perform tombstone reanimation.
  4. Perform an authoritative restore.
  5. Perform a non-authoritative restore.
  6. Modify the isDeleted attribute of Group1.
  7. Apply a virtual machine snapshot to DC2.
Correct answer: D
Explanation:
Because removing user accounts from an Active Directory group will not send them to the Active Directory Recycle Bin, performing an authoritative restore is the best option.
Because removing user accounts from an Active Directory group will not send them to the Active Directory Recycle Bin, performing an authoritative restore is the best option.
Question 9
Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named RODC1. 
You create a global group named RODC_Admins. 
You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on RODC1. The solution must not provide RODC_Admins with the ability to manage Active Directory objects. 
What should you do?
  1. From Active Directory Site and Services, configure the Security settings of the RODC1 server object.
  2. From Active Directory Sites and Services, run the Delegation of Control Wizard.
  3. From a command prompt, run the dsmgmt local roles command.
  4. From a command prompt, run the dsadd computer command.
Correct answer: C
Explanation:
RODC: using the dsmgmt.exe utility to manage local administratorsOne of the benefits of RODC is that you can add local administrators who do not have full access to the domain administration. This gives them the ability to manage the server but not add or change active directory objects unless those roles are delegated. Adding this type of user is done using the dsmdmt.exe utility at the command prompt.
RODC: using the dsmgmt.exe utility to manage local administrators
One of the benefits of RODC is that you can add local administrators who do not have full access to the domain administration. This gives them the ability to manage the server but not add or change active directory objects unless those roles are delegated. Adding this type of user is done using the dsmdmt.exe utility at the command prompt.
Question 10
Your network contains an Active Directory forest named contoso.com. All domain controllers run Windows Server 2008 R2. 
The schema is upgraded to Windows Server 2012 R2. 
Contoso.com contains two servers. The servers are configured as shown in the following table. 
  
Server1 and Server2 host a load-balanced application pool named AppPool1. 
You need to ensure that AppPool1 uses a group Managed Service Account as its identity. 
Which three actions should you perform? 
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 
Correct answer: To work with this question, an Exam Simulator is required.
Explanation:
Note:Box 1:Group Managed Service Accounts Requirements:At least one Windows Server 2012 Domain Controller A Windows Server 2012 or Windows 8 machine with the ActiveDirectory PowerShell module, to create/manage the gMSA. A Windows Server 2012 or Windows 8 domain member to run/use the gMSA. Box 2:To create a new managed service account On the domain controller, click Start, and then click Run. In the Open box, type dsa. msc, and then click OK to open the Active Directory Users and Computers snap-in. Confirm that the Managed Service Account container exists. Click Start, click All Programs, click Windows PowerShell 2.0, and then click the Windows PowerShell icon. Run the following command: New-ADServiceAccount [-SAMAccountName<String>] [-Path <String>].Box 3:Configure a service account for Internet Information Services Organizations that want to enhance the isolation of IIS applications can configure IIS application pools to run managed service accounts. To use the Internet Information Services (IIS) Manager snap-in to configure a service to use a managed service account Click Start, point to Administrative Tools, and then click Internet Information Services (IIS) Manager. Double-click <Computer name>, double-click Application Pools, right-click <Pool Name>, and click Advanced Settings. In the Identity box, click …, click Custom Account, and then click Set. Type the name of the managed service account in the format domainname\accountname. Reference: Service Accounts Step-by-Step Guide
Note:
Box 1:
Group Managed Service Accounts Requirements:
  • At least one Windows Server 2012 Domain Controller 
  • A Windows Server 2012 or Windows 8 machine with the ActiveDirectory PowerShell module, to create/manage the gMSA. 
  • A Windows Server 2012 or Windows 8 domain member to run/use the gMSA. 
Box 2:
To create a new managed service account 
  • On the domain controller, click Start, and then click Run. In the Open box, type dsa. msc, and then click OK to open the Active Directory Users and Computers snap-in. Confirm that the Managed Service Account container exists. 
  • Click Start, click All Programs, click Windows PowerShell 2.0, and then click the Windows PowerShell icon. 
  • Run the following command: New-ADServiceAccount [-SAMAccountName<String>] [-Path <String>].
Box 3:
Configure a service account for Internet Information Services 
Organizations that want to enhance the isolation of IIS applications can configure IIS application pools to run managed service accounts. 
To use the Internet Information Services (IIS) Manager snap-in to configure a service to use a managed service account 
  • Click Start, point to Administrative Tools, and then click Internet Information Services (IIS) Manager. 
  • Double-click <Computer name>, double-click Application Pools, right-click <Pool Name>, and click Advanced Settings. 
  • In the Identity box, click …, click Custom Account, and then click Set. 
  • Type the name of the managed service account in the format domainname\accountname. 
Reference: Service Accounts Step-by-Step Guide
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!