Download Administering Windows Server 2012.70-411.PracticeTest.2019-01-26.181q.vcex

Vendor: Microsoft
Exam Code: 70-411
Exam Name: Administering Windows Server 2012
Date: Jan 26, 2019
File Size: 18 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The functional level of both the domain and the forest is Windows Server 2008 R2. 
The domain contains a domain-based Distributed File System (DFS) namespace that is configured as shown in the exhibit. 
  
You need to enable access-based enumeration on the DFS namespace. 
What should you do first?
  1. Raise the domain functional level.
  2. Raise the forest functional level.
  3. Install the File Server Resource Manager role service on Server3 and Server5.
  4. Delete and recreate the namespace.
Correct answer: D
Explanation:
Access-based enumeration is only supported on a Domain-based Namespace in Windows Server 2008 Mode. This type of Namespace requires a minimum Windows Server 2003 forest functional level and a minimum Windows Server 2008 domain functional level. The exhibit indicates that the current namespace is a Domain-based Namespace in Windows Server 2000 Mode. To migrate a domain-based namespace from Windows 2000 Server mode to Windows Server 2008 mode, you must export the namespace to a file, delete the namespace, recreate it in Windows Server 2008 mode, and then import the namespace settings. Reference:http://msdn.microsoft.com/en-us/library/cc770287.aspxhttp://msdn.microsoft.com/en-us/library/cc753875.aspx
Access-based enumeration is only supported on a Domain-based Namespace in Windows Server 2008 Mode. This type of Namespace requires a minimum Windows Server 2003 forest functional level and a minimum Windows Server 2008 domain functional level. 
The exhibit indicates that the current namespace is a Domain-based Namespace in Windows Server 2000 Mode. To migrate a domain-based namespace from Windows 2000 Server mode to Windows Server 2008 mode, you must export the namespace to a file, delete the namespace, recreate it in Windows Server 2008 mode, and then import the namespace settings. 
Reference:
http://msdn.microsoft.com/en-us/library/cc770287.aspx
http://msdn.microsoft.com/en-us/library/cc753875.aspx
Question 2
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 
A local account named Admin1 is a member of the Administrators group on Server1. 
You need to generate an audit event whenever Admin1 is denied access to a file or folder. 
What should you run?
  1. auditpol.exe /set /user:admin1 /failure:enable
  2. auditpol.exe /set /user:admin1 /category:"detailed tracking" /failure:enable
  3. auditpol.exe /resourcesacl /set /type:file /user:admin1 /failure
  4. auditpol.exe /resourcesacl /set /type:key /user: admin1 /failure /access:ga
Correct answer: C
Explanation:
To set a global resource SACL to audit successful and failed attempts by a user to perform generic read and write functions on files or folders:auditpol /resourceSACL /set /type: File /user:MYDOMAINmyuser /success /failure /access: FRFWSyntax auditpol /resourceSACL [/set /type: <resource> [/success] [/failure] /user: <user> [/access: <access flags>]][/remove/type: <resource>/user: <user> [/type: <resource>]][/clear [/type: <resource>]][/view [/user: <user>] [/type: <resource>]]References:http://technet.microsoft.com/en-us/library/ff625687(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/ff625687.aspx
To set a global resource SACL to audit successful and failed attempts by a user to perform generic read and write functions on files or folders:
auditpol /resourceSACL /set /type: File /user:MYDOMAINmyuser /success /failure /access: FRFW
Syntax 
auditpol /resourceSACL 
[/set /type: <resource> [/success] [/failure] /user: <user> [/access: <access flags>]]
[/remove/type: <resource>/user: <user> [/type: <resource>]]
[/clear [/type: <resource>]]
[/view [/user: <user>] [/type: <resource>]]
References:
http://technet.microsoft.com/en-us/library/ff625687(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/ff625687.aspx
Question 3
You have a server named Server1 that runs Windows Server 2012 R2. 
An administrator creates a quota as shown in the Quota exhibit.
  
You run the dir command as shown in the Dir exhibit. 
  
You need to ensure that D:\Folder1 can only consume 100 MB of disk space.
What should you do?
  1. From File Server Resource Manager, create a new quota.
  2. From File Server Resource Manager, edit the existing quota.
  3. From the Services console, set the Startup Type of the Optimize drives service to Automatic.
  4. From the properties of drive D, enable quota management.
Correct answer: A
Explanation:
In Quota Management, click the Quota Templates node. In the Results pane, select the template on which you will base your new quota. Right-click the template and click Create Quota from Template (or select Create Quota from Template from the Actions pane). This opens the Create Quota dialog box with the summary properties of the quota template displayed. Under Quota path, type or browse to the folder that the quota will apply to. Click the Create quota on path option. Note that the quota properties will apply to the entire folder. Note: To create an auto apply quota, click the Auto apply template and create quotas on existing and new subfolders option. For more information about auto apply quotas, see Create an Auto Apply Quota.Under Drive properties from this quota template, the template you used in step 2 to create your new quota is preselected (or you can select another template from the list). Note that the template's properties are displayed under Summary of quota properties. Click Create. Create a new Quota on path, without using the auto apply template and create quota on existing and new subfolders.       Reference: http://technet.microsoft.com/en-us/library/cc755603(v=ws.10).aspx
  • In Quota Management, click the Quota Templates node. 
  • In the Results pane, select the template on which you will base your new quota. 
  • Right-click the template and click Create Quota from Template (or select Create Quota from Template from the Actions pane). This opens the Create Quota dialog box with the summary properties of the quota template displayed. 
  • Under Quota path, type or browse to the folder that the quota will apply to. 
  • Click the Create quota on path option. Note that the quota properties will apply to the entire folder. Note: To create an auto apply quota, click the Auto apply template and create quotas on existing and new subfolders option. For more information about auto apply quotas, see Create an Auto Apply Quota.
  • Under Drive properties from this quota template, the template you used in step 2 to create your new quota is preselected (or you can select another template from the list). Note that the template's properties are displayed under Summary of quota properties. 
  • Click Create. Create a new Quota on path, without using the auto apply template and create quota on existing and new subfolders. 
  
  
  
Reference: http://technet.microsoft.com/en-us/library/cc755603(v=ws.10).aspx
Question 4
Your company has a main office and two branch offices. The main office is located in New York. The branch offices are located in Seattle and Chicago. 
The network contains an Active Directory domain named contoso.com. An Active Directory site exists for each office. Active Directory site links exist between the main office and the branch offices. All servers run Windows Server 2012 R2. 
The domain contains three file servers. The file servers are configured as shown in the following table. 
  
You implement a Distributed File System (DFS) replication group named ReplGroup. 
ReplGroup is used to replicate a folder on each file server. ReplGroup uses a hub and spoke topology. NYC-SVR1 is configured as the hub server. 
You need to ensure that replication can occur if NYC-SVR1 fails. 
What should you do?
  1. Create an Active Directory site link bridge.
  2. Create an Active Directory site link.
  3. Modify the properties of ReplGroup.
  4. Create a connection in ReplGroup.
Correct answer: D
Explanation:
  A: The Bridge all site links option in Active Directory must be enabled. (This option is available in the Active Directory Sites and Services snap-in.) Turning off Bridge all site links can affect the ability of DFS to refer client computers to target computers that have the least expensive connection cost. An Intersite Topology Generator that is running Windows Server 2003 relies on the Bridge all site links option being enabled to generate the intersite cost matrix that DFS requires for its site-costing functionality. If you turn off this option, you must create site links between the Active Directory sites for which you want DFS to calculate accurate site costs.Any sites that are not connected by site links will have the maximum possible cost.   References: http://faultbucket.ca/2012/08/fixing-a-dfsr-connection-problem/http://technet.microsoft.com/en-us/library/cc771941.aspx
  
A: The Bridge all site links option in Active Directory must be enabled. (This option is available in the Active Directory Sites and Services snap-in.) Turning off Bridge all site links can affect the ability of DFS to refer client computers to target computers that have the least expensive connection cost. An Intersite Topology Generator that is running Windows Server 2003 relies on the Bridge all site links option being enabled to generate the intersite cost matrix that DFS requires for its site-costing functionality. If you turn off this option, you must create site links between the Active Directory sites for which you want DFS to calculate accurate site costs.
Any sites that are not connected by site links will have the maximum possible cost. 
  
References: http://faultbucket.ca/2012/08/fixing-a-dfsr-connection-problem/
http://technet.microsoft.com/en-us/library/cc771941.aspx
Question 5
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 has a share named Share1. 
When users without permission to Share1 attempt to access the share, they receive the Access Denied message as shown in the exhibit. 
  
You deploy a new file server named Server2 that runs Windows Server 2012 R2. 
You need to configure Server2 to display the same custom Access Denied message as Server1. 
What should you install on Server2?
  1. The Remote Assistance feature
  2. The Storage Services server role
  3. The File Server Resource Manager role service
  4. The Enhanced Storage feature
Correct answer: C
Explanation:
Access-Denied Assistance is a new role service of the File Server role in Windows Server 2012.   We need to install the prerequisites for Access-Denied Assistance. Because Access-Denied Assistance relies up on e-mail notifications, we also need to configure each relevant file server with a Simple Mail Transfer Protocol (SMTP) server address. Let's do that quickly with Windows PowerShell:Set-FSRMSetting -SMTPServer mailserver. nuggetlab.com -AdminEmailAddress [email protected] -FromEmailAddress [email protected] You can enable Access-Denied Assistance either on a per-server basis or centrally via Group Policy. To my mind, the latter approach is infinitely preferable from an administration standpoint. Create a new GPO and make sure to target the GPO at your file servers' Active Directory computer accounts as well as those of your AD client computers. In the Group Policy Object Editor, we are looking for the following path to configure Access-Denied Assistance:\Computer Configuration\Policies\Administrative Templates\System\Access-Denied Assistance   The Customize message for Access Denied errors policy, shown in the screenshot below, enables us to create the actual message box shown to users when they access a shared file to which their user account has no access.   What's cool about this policy is that we can "personalize" the e-mail notifications to give us administrators (and, optionally, file owners) the details they need to resolve the permissions issue quickly and easily. For instance, we can insert pre-defined macros to swap in the full path to the target file, the administrator e-mail address, and so forth. See this example:Whoops! It looks like you're having trouble accessing [Original File Path]. Please click Request Assistance to send [Admin Email] a help request e-mail message. Thanks! You should find that your users prefer these human-readable, informative error messages to the cryptic, non-descript error dialogs they are accustomed to dealing with. The Enable access-denied assistance on client for all file types policy should be enabled to force client computers to participate in Access-Denied Assistance. Again, you must make sure to target your GPO scope accordingly to "hit" your domain workstations as well as your Windows Server 2012 file servers. Testing the configuration This should come as no surprise to you, but Access-Denied Assistance works only with Windows Server 2012 and Windows 8 computers. More specifically, you must enable the Desktop Experience feature on your servers to see Access-Denied Assistance messages on server computers. When a Windows 8 client computer attempts to open a file to which the user has no access, the custom Access-Denied Assistance message should appear:  If the user clicks Request Assistance in the Network Access dialog box, they see a secondary message:  At the end of this process, the administrator(s) will receive an e-mail message that contains the key information they need in order to resolve the access problem:The user's Active Directory identity The full path to the problematic file A user-generated explanation of the problem So that's it, friends! Access-Denied Assistance presents Windows systems administrators with an easy-to-manage method for more efficiently resolving user access problems on shared file system resources. Of course, the key caveat is that your file servers must run Windows Server 2012 and your client devices must run Windows 8, but other than that, this is a great technology that should save admins extra work and end-users extra headaches. Reference: http://4sysops.com/archives/access-denied-assistance-in-windows-server-2012/
Access-Denied Assistance is a new role service of the File Server role in Windows Server 2012. 
  
We need to install the prerequisites for Access-Denied Assistance. 
Because Access-Denied Assistance relies up on e-mail notifications, we also need to configure each relevant file server with a Simple Mail Transfer Protocol (SMTP) server address. Let's do that quickly with Windows PowerShell:
Set-FSRMSetting -SMTPServer mailserver. nuggetlab.com -AdminEmailAddress [email protected] -FromEmailAddress [email protected] 
You can enable Access-Denied Assistance either on a per-server basis or centrally via Group Policy. To my mind, the latter approach is infinitely preferable from an administration standpoint. 
Create a new GPO and make sure to target the GPO at your file servers' Active Directory computer accounts as well as those of your AD client computers. In the Group Policy Object Editor, we are looking for the following path to configure Access-Denied Assistance:
\Computer Configuration\Policies\Administrative Templates\System\Access-Denied Assistance 
  
The Customize message for Access Denied errors policy, shown in the screenshot below, enables us to create the actual message box shown to users when they access a shared file to which their user account has no access. 
  
What's cool about this policy is that we can "personalize" the e-mail notifications to give us administrators (and, optionally, file owners) the details they need to resolve the permissions issue quickly and easily. 
For instance, we can insert pre-defined macros to swap in the full path to the target file, the administrator e-mail address, and so forth. See this example:
Whoops! It looks like you're having trouble accessing [Original File Path]. Please click Request Assistance to send [Admin Email] a help request e-mail message. Thanks! 
You should find that your users prefer these human-readable, informative error messages to the cryptic, non-descript error dialogs they are accustomed to dealing with. 
The Enable access-denied assistance on client for all file types policy should be enabled to force client computers to participate in Access-Denied Assistance. Again, you must make sure to target your GPO scope accordingly to "hit" your domain workstations as well as your Windows Server 2012 file servers. 
Testing the configuration 
This should come as no surprise to you, but Access-Denied Assistance works only with Windows Server 2012 and Windows 8 computers. More specifically, you must enable the Desktop Experience feature on your servers to see Access-Denied Assistance messages on server computers. 
When a Windows 8 client computer attempts to open a file to which the user has no access, the custom Access-Denied Assistance message should appear:
  
If the user clicks Request Assistance in the Network Access dialog box, they see a secondary message:
  
At the end of this process, the administrator(s) will receive an e-mail message that contains the key information they need in order to resolve the access problem:
  • The user's Active Directory identity 
  • The full path to the problematic file 
  • A user-generated explanation of the problem 
So that's it, friends! Access-Denied Assistance presents Windows systems administrators with an easy-to-manage method for more efficiently resolving user access problems on shared file system resources. Of course, the key caveat is that your file servers must run Windows Server 2012 and your client devices must run Windows 8, but other than that, this is a great technology that should save admins extra work and end-users extra headaches. 
Reference: http://4sysops.com/archives/access-denied-assistance-in-windows-server-2012/
Question 6
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 
Each time a user receives an access-denied message after attempting to access a folder on Server1, an email notification is sent to a distribution list named DL1. 
You create a folder named Folder1 on Server1, and then you configure custom NTFS permissions for Folder1. 
You need to ensure that when a user receives an access-denied message while attempting to access Folder1, an email notification is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving notifications about other access-denied messages. 
What should you do?
  1. From Server Manager, run the New Share Wizard to create a share for Folder1 by selecting the SMB Share – Advanced option.
  2. From the File Server Resource Manager console, modify the Access-Denied Assistance settings.
  3. From the File Server Resource Manager console, modify the Email Notifications settings.
  4. From Server Manager, run the New Share Wizard to create a share for Folder1 by selecting the SMB Share –Applications option.
Correct answer: A
Explanation:
When using the email model each of the file shares, you can determine whether access requests to each file share will be received by the administrator, a distribution list that represents the file share owners, or both. The owner distribution list is configured by using the SMB Share – Advanced file share profile in the New Share Wizard in Server Manager. References:http://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK_12
When using the email model each of the file shares, you can determine whether access requests to each file share will be received by the administrator, a distribution list that represents the file share owners, or both. 
The owner distribution list is configured by using the SMB Share – Advanced file share profile in the New Share Wizard in Server Manager. 
References:
http://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK_12
Question 7
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. 
You run ntdsutil as shown in the exhibit. 
  
You need to ensure that you can access the contents of the mounted snapshot. 
What should you do?
  1. From the snapshot context of ntdsutil, run activate instance "NTDS".
  2. From a command prompt, run dsamain.exe -dbpath c:\$snap_201204131056_volumec$\windows\ntds\ntds.dit -1dapport 389.
  3. From the snapshot context of ntdsutil, run mount {79f94f82-5926-4f44-8af0-2f56d827a57d}.
  4. From a command prompt, run dsamain.exe -dbpath c:\$snap_201204131056_volumec$\windows\ntds\ntds.dit -1dapport 33389.
Correct answer: D
Explanation:
By default, only members of the Domain Admins group and the Enterprise Admins group are allowed to view the snapshots because they contain sensitive AD DS data. If you want to access snapshot data from an old domain or forest that has been deleted, you can allow nonadministrators to access the data when you run Dsamain.exe. If you plan to view the snapshot data on a domain controller, specify ports that are different from the ports that the domain controller will use. A client starts an LDAP session by connecting to an LDAP server, called a Directory System Agent (DSA), by default on TCP port and UDP [7] port 389. The client then sends an operation request to the server, and the server sends responses in return. With some exceptions, the client does not need to wait for a response before sending the next request, and the server may send the responses in any order. All information is transmitted using Basic Encoding Rules (BER).   References:http://technet.microsoft.com/en-us/library/cc753609(v=ws.10).aspx
By default, only members of the Domain Admins group and the Enterprise Admins group are allowed to view the snapshots because they contain sensitive AD DS data. If you want to access snapshot data from an old domain or forest that has been deleted, you can allow nonadministrators to access the data when you run Dsamain.exe. 
If you plan to view the snapshot data on a domain controller, specify ports that are different from the ports that the domain controller will use. 
A client starts an LDAP session by connecting to an LDAP server, called a Directory System Agent (DSA), by default on TCP port and UDP [7] port 389. The client then sends an operation request to the server, and the server sends responses in return. With some exceptions, the client does not need to wait for a response before sending the next request, and the server may send the responses in any order. All information is transmitted using Basic Encoding Rules (BER). 
  
References:
http://technet.microsoft.com/en-us/library/cc753609(v=ws.10).aspx
Question 8
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 is backed up daily. The domain has the Active Directory Recycle Bin enabled. 
During routine maintenance, you delete 500 inactive user accounts and 100 inactive groups. One of the deleted groups is named Group1. Some of the deleted user accounts are members of some of the deleted groups. 
For documentation purposes, you must provide a list of the members of Group1 before the group was deleted. 
You need to identify the names of the users who were members of Group1 prior to its deletion. 
You want to achieve this goal by using the minimum amount of administrative effort. 
What should you do first?
  1. Mount the most recent Active Directory backup.
  2. Reactivate the tombstone of Group1.
  3. Perform an authoritative restore of Group1.
  4. Use the Recycle Bin to restore Group1.
Correct answer: A
Explanation:
The Active Directory Recycle Bin does not have the ability to track simple changes to objects.  If the object itself is not deleted, no element is moved to the Recycle Bin for possible recovery in the future. In other words, there is no rollback capacity for changes to object properties, or, in other words, to the values of these properties.
The Active Directory Recycle Bin does not have the ability to track simple changes to objects.  
If the object itself is not deleted, no element is moved to the Recycle Bin for possible recovery in the future. In other words, there is no rollback capacity for changes to object properties, or, in other words, to the values of these properties.
Question 9
Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers. The domain controllers are configured as shown in the following table. 
  
The network contains a server named Server1 that has the Hyper-v server role installed. DC6 is a virtual machine that is hosted on Server1. 
You need to ensure that you can clone DC6. 
Which FSMO role should you transfer to DC2?
  1. Rid master
  2. Domain naming master
  3. PDC emulator
  4. Infrastructure master
Correct answer: C
Explanation:
The clone domain controller uses the security context of the source domain controller (the domain controller whose copy it represents) to contact the Windows Server 2012 R2 Primary Domain Controller (PDC) emulator operations master role holder (also known as flexible single master operations, or FSMO). The PDC emulator must be running Windows Server 2012 R2, but it does not have to be running on a hypervisor. References: https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/introduction-to-active-directory-domain-services-ad-ds-virtualization-level-100
The clone domain controller uses the security context of the source domain controller (the domain controller whose copy it represents) to contact the Windows Server 2012 R2 Primary Domain Controller (PDC) emulator operations master role holder (also known as flexible single master operations, or FSMO). The PDC emulator must be running Windows Server 2012 R2, but it does not have to be running on a hypervisor. 
References: https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/introduction-to-active-directory-domain-services-ad-ds-virtualization-level-100
Question 10
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. 
Server1 has a folder named Folder1 that is used by the human resources department. 
You need to ensure that an email notification is sent immediately to the human resources manager when a user copies an audio file or a video file to Folder1. 
What should you configure on Server1?
  1. a storage report task
  2. a file screen exception
  3. a file screen
  4. a file group
Correct answer: C
Explanation:
Create file screens to control the types of files that users can save, and generate notifications when users attempt to save unauthorized files. With File Server Resource Manager (FSRM) you can create file screens that prevent users from saving unauthorized files on volumes or folders. File Screen Enforcement:You can create file screens to prevent users from saving unauthorized files on volumes or folders. There are two types of file screen enforcement: active and passive enforcement. Active file screen enforcement does not allow the user to save an unauthorized file. Passive file screen enforcement allows the user to save the file, but notifies the user that the file is not an authorized file. You can configure notifications, such as events logged to the event log or e-mails sent to users and administrators, as part of active and passive file screen enforcement.
Create file screens to control the types of files that users can save, and generate notifications when users attempt to save unauthorized files. 
With File Server Resource Manager (FSRM) you can create file screens that prevent users from saving unauthorized files on volumes or folders. 
File Screen Enforcement:
You can create file screens to prevent users from saving unauthorized files on volumes or folders. There are two types of file screen enforcement: active and passive enforcement. Active file screen enforcement does not allow the user to save an unauthorized file. Passive file screen enforcement allows the user to save the file, but notifies the user that the file is not an authorized file. You can configure notifications, such as events logged to the event log or e-mails sent to users and administrators, as part of active and passive file screen enforcement.
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!