Do you want to pass the 70-411 examsavior exam? What are the new questions of the latest 70-411 exam? Braindumps 70-411 VCE dumps and 70-411 PDF dumps will tell you all about the 70-411 examsavior exam.Here are the examsavior newest and covered all new added questions and answers, which will help you 100% passing 70-411 examsavior exam.Hurry up and get the free exam from here!
NOW FREE DOWNLOAD
QUESTION 21
You are working as a server administrator for the company CertBase.
To install Windows Server 2012 R2 Server Core on a new server computer that is named Server1.
Once you decide to install the graphical user interface (GUI) on Server1.
Which tool will you use?
A. PowerShell cmdlet Add-Windows Package
B. PowerShell Cmdlet Add-WindowsFeature
C. PowerShell Cmdlet Install-Module
D. PowerShell Cmdlet Install-RoleService
Correct Answer: B
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
Among the new features of Windows Server 2012 and Windows Server 2012 R2 include the ability to
install them separately or can remove the GUI after the initial installation. In the blog you can find more
information on the topic:
QUESTION 22
You work as an administrator for the company Contoso. You administer a Windows Server 2012 R2
computer that is named Server1.
You want to create an image of Server1.
To keep the size of the image as small as possible, you want to remove the source files of all server
roles that are not installed on Server1.
Which tool you are use?
A. Ocsetup.exe
B. ServerManagerCMD.exe
C. ImageX.exe
D. Dism.exe
Correct Answer: D
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
You are working as a server administrator for the company CertBase.
To install Windows Server 2012 R2 Server Core on a new server computer that is named Server1.
Once you decide to install the graphical user interface (GUI) on Server1.
Which tool will you use?
A. PowerShell cmdlet Add-Windows Package
B. PowerShell Cmdlet Add-WindowsFeature
C. PowerShell Cmdlet Install-Module
D. PowerShell Cmdlet Install-RoleService
Correct Answer: B
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
Among the new features of Windows Server 2012 and Windows Server 2012 R2 include the ability to
install them separately or can remove the GUI after the initial installation. In the blog you can find more
information on the topic:
QUESTION 22
You work as an administrator for the company Contoso. You administer a Windows Server 2012 R2
computer that is named Server1.
You want to create an image of Server1.
To keep the size of the image as small as possible, you want to remove the source files of all server
roles that are not installed on Server1.
Which tool you are use?
A. Ocsetup.exe
B. ServerManagerCMD.exe
C. ImageX.exe
D. Dism.exe
Correct Answer: D
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
In order to limit the attack surface of a server to a minimum or to reduce the installation files for a
scheduled imaging, you can completely remove the program files of roles and features that you are not
using from the hard disk.
The cmdlet Uninstall Windows feature has for this purpose over the -Remove parameter. Alternatively, the
command line program
Dism.exe with the /Disable-Feature can be used. Dism.exe also has the new parameter /Cleanup-Image,
which it experienced allows users the size of the directory WinSxS by removing unneeded components to
reduce:
QUESTION 23
Your network includes five servers running the operating system Windows Server 2012 R2.
In the five servers, the Failover Clustering feature is installed. To create a new cluster with the name
Cluster1.
The configuration of the cluster is shown in the picture (click on the button drawing). Site B is a site for
disaster recovery.
Server1, Server2 and Server3 are configured as the preferred owner of Cluster1. The dynamic quorum
management is disabled.
You are planning a hardware maintenance for Server3.
You must make sure that the cluster resources remain available to Site A if the WAN connection
fails while you are performing maintenance on Server3.
How do you proceed?
Sites : DC
———————————————————-
Site A Server1
Server2
Server3
———————————————————-
Site B Server4
Server4
———————————————————-
A. Create in StandortA a witness file share.
B. Remove Server3 the nodes vote.
C. Remove Server4 and Server5 the nodes vote.
D. Enable the dynamic quorum administration.
Correct Answer: C
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The quorum configuration in a failover cluster, the number of failures is determined that can be tolerated by
the cluster. If another failure occurs, the cluster must stop running. The relevant in this context are failures
or node failures – in some cases – failure of a witness disk (of a copy of the cluster configuration contains)
or a witness file share.
It is essential that the cluster is no longer running, enter if too many failures, or if a problem with the
communication between the cluster nodes is present.
In Windows Server 2012 and Windows Server 2012 R2, you can a node on the extended quorum settings
the “right to vote “escape and manually influence the determination of the majorities in special situations.
https://technet.microsoft.com/en-us/library/jj612870.aspx
QUESTION 24
You are working as a server administrator for the company contoso.local.
They serve 30 servers on which the operating system is Windows Server 2012 R2 installed.
All servers are backed up daily by Windows Azure Online Backup.
You must perform on all servers an immediate backup in Windows Azure Online Backup.
What PowerShell cmdlets are on each server Run?
A. Start OBRegistration | Start OBBackup
B. Get-OBPolicy | Start OBBackup
C. Get-WBBackupTarget | Start WBBackup
D. Get-WBPolicy | Start WBBackup
Correct Answer:
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The cmdlet Start-OBBackup starts a one-time backup based on the direction indicated by the -Policy
parameter settings.
The following example retrieves the backup settings and transfers them to the cmdlet Start-OBBackup:
Get-OBPolicy | Start OBBackup
Gives the following example the Directive explicitly named at:
Start-OBBackup -Name myPolicy
QUESTION 25
You are working as a server administrator for the company contoso. They serve 20 servers on which the
operating system is Windows Server 2012 R2 installed.
You must create a Windows PowerShell script that each server is registered in Windows Azure
Online Backup.
In addition, the script must specify the encryption passphrase.
Which two PowerShell cmdlets, you will include in your script? (Each correct answer presents part of the
solution. Choose two.)
A. New-OBPolicy
B. New-OBRetentionPolicy
C. Add-OBFileSpec
D. Start-OBRegistration
E. Set-OBMachineSetting
Correct Answer: DE
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
When you register a server with Windows Azure Online Backup, creates a space allocation for the server
in the cloud service, and the server is associated with the subscription. Each server whose elements you
want to back up must be registered with the service, so that online backups can be performed. The initial
configuration of Windows Azure Online Backup Agent is done by a server using the Windows Azure Online
Backup Agent snap-in or Windows register PowerShell cmdlets for Windows Azure Online Backup Online
Portal. Before registering a server for use with Windows Azure Online Backup, you must run the process
described under Log for Windows Azure Online Backup and install Windows Azure Online Backup Agent.
You can register in 2012 every server running Windows Server 2012 and Windows Server R2, you want to
protect. Prerequisite to perform this operation is a member of the local Administrators group or equivalent
membership. The following code example demonstrates that you can register a server with Windows
Azure Online Backup with Windows PowerShell after you have defined variables for providing the
credentials. If no credentials are specified, you are prompted by the Registry cmdlet prior to registration,
enter the account credentials for the user ID. However, they are not prompted for the additional server
properties that you have configured using the wizard for registering servers. You can copy the sample
code and paste it into a Windows
PowerShell script.
$pwd = ConvertTo-SecureString -String -AsPlainText –Force
$cred = New-Object –TypeName System.Management.Automation.PsCredential –ArgumentList , $pwd
Start-OBRegistration -Credential $cred
If the server is registered, you must specify the server properties with the set-OBMachineSetting cmdlet. In
the following examples show how the various settings can be specified:
Specifying the encryption passphrase
$pass = ConvertTo-SecureString -String -AsPlainText –Force
Set-OBMachineSetting -EncryptionPassphrase $pass
Configuring proxy settings
$spwd = ConvertTo-SecureString -String -AsplainText –Force
Set-OBMachineSetting -ProxyServer proxycontoso.com -ProxyPort -ProxyUsername Domäne
\Benutzername -ProxyPassword $spwd
Configuring throttling settings for bandwidth
$mon = [System.DayOfWeek]::Monday
$tue = [System.DayOfWeek]::Tuesday
Set-OBMachineSetting -WorkDay “Mo”, “Tu” -StartWorkHour “9:00:00” -EndWorkHour “18:00:00” –
WorkHourBandwidth (512*1024) -NonWorkHourBandwidth (2048*1024)
If a server does not throttling settings to be used for more bandwidth, use the following command:
Set-OBMachineSetting -NoThrottle
QUESTION 26
Your company uses an Active Directory Domain Services (AD DS) domain named .local . On all domain
controllers running Windows Server 2008 R2 is installed.
The domain contains a Windows Server 2012 R2 file server named Server1. Server1 hosts a directory
named Data1. The directory is shared under the name documents1.
The NTFS permissions of Data1 are shown in the picture (click on the button drawing). The domain
contains two global groups with the name Group1 and Group2.
You must make sure that users who a member of the two groups Group1 and Group2 are being
denied access to Data1.
What do you do?
(Each correct answer presents part of the solution. Choose two.)
Sorry I could not create or find an english exemple, so i took the from this original question!
scheduled imaging, you can completely remove the program files of roles and features that you are not
using from the hard disk.
The cmdlet Uninstall Windows feature has for this purpose over the -Remove parameter. Alternatively, the
command line program
Dism.exe with the /Disable-Feature can be used. Dism.exe also has the new parameter /Cleanup-Image,
which it experienced allows users the size of the directory WinSxS by removing unneeded components to
reduce:
QUESTION 23
Your network includes five servers running the operating system Windows Server 2012 R2.
In the five servers, the Failover Clustering feature is installed. To create a new cluster with the name
Cluster1.
The configuration of the cluster is shown in the picture (click on the button drawing). Site B is a site for
disaster recovery.
Server1, Server2 and Server3 are configured as the preferred owner of Cluster1. The dynamic quorum
management is disabled.
You are planning a hardware maintenance for Server3.
You must make sure that the cluster resources remain available to Site A if the WAN connection
fails while you are performing maintenance on Server3.
How do you proceed?
Sites : DC
———————————————————-
Site A Server1
Server2
Server3
———————————————————-
Site B Server4
Server4
———————————————————-
A. Create in StandortA a witness file share.
B. Remove Server3 the nodes vote.
C. Remove Server4 and Server5 the nodes vote.
D. Enable the dynamic quorum administration.
Correct Answer: C
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The quorum configuration in a failover cluster, the number of failures is determined that can be tolerated by
the cluster. If another failure occurs, the cluster must stop running. The relevant in this context are failures
or node failures – in some cases – failure of a witness disk (of a copy of the cluster configuration contains)
or a witness file share.
It is essential that the cluster is no longer running, enter if too many failures, or if a problem with the
communication between the cluster nodes is present.
In Windows Server 2012 and Windows Server 2012 R2, you can a node on the extended quorum settings
the “right to vote “escape and manually influence the determination of the majorities in special situations.
https://technet.microsoft.com/en-us/library/jj612870.aspx
QUESTION 24
You are working as a server administrator for the company contoso.local.
They serve 30 servers on which the operating system is Windows Server 2012 R2 installed.
All servers are backed up daily by Windows Azure Online Backup.
You must perform on all servers an immediate backup in Windows Azure Online Backup.
What PowerShell cmdlets are on each server Run?
A. Start OBRegistration | Start OBBackup
B. Get-OBPolicy | Start OBBackup
C. Get-WBBackupTarget | Start WBBackup
D. Get-WBPolicy | Start WBBackup
Correct Answer:
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The cmdlet Start-OBBackup starts a one-time backup based on the direction indicated by the -Policy
parameter settings.
The following example retrieves the backup settings and transfers them to the cmdlet Start-OBBackup:
Get-OBPolicy | Start OBBackup
Gives the following example the Directive explicitly named at:
Start-OBBackup -Name myPolicy
QUESTION 25
You are working as a server administrator for the company contoso. They serve 20 servers on which the
operating system is Windows Server 2012 R2 installed.
You must create a Windows PowerShell script that each server is registered in Windows Azure
Online Backup.
In addition, the script must specify the encryption passphrase.
Which two PowerShell cmdlets, you will include in your script? (Each correct answer presents part of the
solution. Choose two.)
A. New-OBPolicy
B. New-OBRetentionPolicy
C. Add-OBFileSpec
D. Start-OBRegistration
E. Set-OBMachineSetting
Correct Answer: DE
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
When you register a server with Windows Azure Online Backup, creates a space allocation for the server
in the cloud service, and the server is associated with the subscription. Each server whose elements you
want to back up must be registered with the service, so that online backups can be performed. The initial
configuration of Windows Azure Online Backup Agent is done by a server using the Windows Azure Online
Backup Agent snap-in or Windows register PowerShell cmdlets for Windows Azure Online Backup Online
Portal. Before registering a server for use with Windows Azure Online Backup, you must run the process
described under Log for Windows Azure Online Backup and install Windows Azure Online Backup Agent.
You can register in 2012 every server running Windows Server 2012 and Windows Server R2, you want to
protect. Prerequisite to perform this operation is a member of the local Administrators group or equivalent
membership. The following code example demonstrates that you can register a server with Windows
Azure Online Backup with Windows PowerShell after you have defined variables for providing the
credentials. If no credentials are specified, you are prompted by the Registry cmdlet prior to registration,
enter the account credentials for the user ID. However, they are not prompted for the additional server
properties that you have configured using the wizard for registering servers. You can copy the sample
code and paste it into a Windows
PowerShell script.
$pwd = ConvertTo-SecureString -String -AsPlainText –Force
$cred = New-Object –TypeName System.Management.Automation.PsCredential –ArgumentList , $pwd
Start-OBRegistration -Credential $cred
If the server is registered, you must specify the server properties with the set-OBMachineSetting cmdlet. In
the following examples show how the various settings can be specified:
Specifying the encryption passphrase
$pass = ConvertTo-SecureString -String -AsPlainText –Force
Set-OBMachineSetting -EncryptionPassphrase $pass
Configuring proxy settings
$spwd = ConvertTo-SecureString -String -AsplainText –Force
Set-OBMachineSetting -ProxyServer proxycontoso.com -ProxyPort -ProxyUsername Domäne
\Benutzername -ProxyPassword $spwd
Configuring throttling settings for bandwidth
$mon = [System.DayOfWeek]::Monday
$tue = [System.DayOfWeek]::Tuesday
Set-OBMachineSetting -WorkDay “Mo”, “Tu” -StartWorkHour “9:00:00” -EndWorkHour “18:00:00” –
WorkHourBandwidth (512*1024) -NonWorkHourBandwidth (2048*1024)
If a server does not throttling settings to be used for more bandwidth, use the following command:
Set-OBMachineSetting -NoThrottle
QUESTION 26
Your company uses an Active Directory Domain Services (AD DS) domain named .local . On all domain
controllers running Windows Server 2008 R2 is installed.
The domain contains a Windows Server 2012 R2 file server named Server1. Server1 hosts a directory
named Data1. The directory is shared under the name documents1.
The NTFS permissions of Data1 are shown in the picture (click on the button drawing). The domain
contains two global groups with the name Group1 and Group2.
You must make sure that users who a member of the two groups Group1 and Group2 are being
denied access to Data1.
What do you do?
(Each correct answer presents part of the solution. Choose two.)
Sorry I could not create or find an english exemple, so i took the from this original question!
A. Remove the authorization of type Deny for Group1 of Data1.
B. Deny access Group2 crushing adjustments on Data1.
C. Install a domain controller running Windows Server 2012 R2.
D. Create a condition for a permission entry.
E. Deny access Group2 crushing adjustments on documents1.
F. Deny access Group1 crushing adjustments on documents1.
Correct Answer: AD
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
B. Deny access Group2 crushing adjustments on Data1.
C. Install a domain controller running Windows Server 2012 R2.
D. Create a condition for a permission entry.
E. Deny access Group2 crushing adjustments on documents1.
F. Deny access Group1 crushing adjustments on documents1.
Correct Answer: AD
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
Windows Server 2012 R2 provides the ability NTFS permission entries with conditions linked to so that the
privilege only applies when the associated condition is satisfied. Conditions are only for permissions type
Allow possible. For permissions type Deny no conditions can be configured. In this case, we can remove
the Deny entry for group 1 and limit the Berechtgingseintrag for the Domain Users group so that it will only
be applied to a user if it does not Member the groups Group1 and Group2 is.
QUESTION 27
Your company uses an Active Directory Domain Services (AD DS) domain named contos.local. On all
servers in the network, the operating system is Windows Server 2012 R2 installed.
The domain contains a file server named Server1. On Server1 role service Resource Manager File Server
is installed.
The computer account of Server1 is in an organizational unit (OU) named OU1. You have a Group Policy
object (GPO) created with the name GPO1 and linked it with OU1.
The relevant settings GPO1 are shown in the picture (click on the button drawing). Server1 contains a
folder named Data1. The folder is shared under the name documents1 the network.
They are trying to “access denied” support according to Configure Server1. However, you can change the
settings for the support for “Access Denied” in the Resource Manager file server is not configured.
You must make sure that you “access denied” the settings for the support according to manually
configure file servers on Server1 in Resource Manager.
How do you proceed?
Windows Server 2012 R2 provides the ability NTFS permission entries with conditions linked to so that the
privilege only applies when the associated condition is satisfied. Conditions are only for permissions type
Allow possible. For permissions type Deny no conditions can be configured. In this case, we can remove
the Deny entry for group 1 and limit the Berechtgingseintrag for the Domain Users group so that it will only
be applied to a user if it does not Member the groups Group1 and Group2 is.
QUESTION 27
Your company uses an Active Directory Domain Services (AD DS) domain named contos.local. On all
servers in the network, the operating system is Windows Server 2012 R2 installed.
The domain contains a file server named Server1. On Server1 role service Resource Manager File Server
is installed.
The computer account of Server1 is in an organizational unit (OU) named OU1. You have a Group Policy
object (GPO) created with the name GPO1 and linked it with OU1.
The relevant settings GPO1 are shown in the picture (click on the button drawing). Server1 contains a
folder named Data1. The folder is shared under the name documents1 the network.
They are trying to “access denied” support according to Configure Server1. However, you can change the
settings for the support for “Access Denied” in the Resource Manager file server is not configured.
You must make sure that you “access denied” the settings for the support according to manually
configure file servers on Server1 in Resource Manager.
How do you proceed?
A. Enable the policy setting in GPO1 message for error type “Access Denied” adapt.
B. Activate in GPO1 the policy setting support for “Access Denied” Enable Client for all file types.
C. Configure the policy setting “Access Denied” message for error type adapt in GPO1 with Not
Configured.
D. Disable GPO1 in the policy setting support for “Access Denied” Enable Client for all file types.
Correct Answer: C
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The two policy settings, see >> Computer Configuration \ Policies \ Administrative Templates \
System \ Access-denied-Assistance
message for error type “Access Denied” Customize With this Directive, the message indicates that users
see when accessing a file or folder has been denied.
You can download the message of type “Access Denied” supplemented by additional text and links.
Moreover, you can offer users the ability to send an email to request access to the file or folder, or the
access is denied for.
If you enable this policy setting, users will receive a custom message type “Access denied” from the file
servers on which this policy setting is enabled.
If you disable this policy setting, users with a default message type “Access Denied” is displayed, which
provides, irrespective of the file server configuration none of the controlled by this policy setting functions.
If this do not configure policy setting, users will be a default message “Access Denied” type appears,
unless the file server was configured to the user-defined message is displayed.
By default, users will get the default message “Access Denied” type displayed. Support “Access Denied”
by Enable Client for all file types, this policy setting should be set to Windows clients to the support for
“Access Denied” to activate for all file types.
B. Activate in GPO1 the policy setting support for “Access Denied” Enable Client for all file types.
C. Configure the policy setting “Access Denied” message for error type adapt in GPO1 with Not
Configured.
D. Disable GPO1 in the policy setting support for “Access Denied” Enable Client for all file types.
Correct Answer: C
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The two policy settings, see >> Computer Configuration \ Policies \ Administrative Templates \
System \ Access-denied-Assistance
message for error type “Access Denied” Customize With this Directive, the message indicates that users
see when accessing a file or folder has been denied.
You can download the message of type “Access Denied” supplemented by additional text and links.
Moreover, you can offer users the ability to send an email to request access to the file or folder, or the
access is denied for.
If you enable this policy setting, users will receive a custom message type “Access denied” from the file
servers on which this policy setting is enabled.
If you disable this policy setting, users with a default message type “Access Denied” is displayed, which
provides, irrespective of the file server configuration none of the controlled by this policy setting functions.
If this do not configure policy setting, users will be a default message “Access Denied” type appears,
unless the file server was configured to the user-defined message is displayed.
By default, users will get the default message “Access Denied” type displayed. Support “Access Denied”
by Enable Client for all file types, this policy setting should be set to Windows clients to the support for
“Access Denied” to activate for all file types.
QUESTION 28
You are working as a network administrator for the company contoso. Your network includes a Windows
Server 2012 R2 computer that is named Server1. To install the role file / storage services on Server1.
You use the Windows Explorer and open the properties of a folder named documents1.
They note that the register classification is missing.
You must ensure that you can use Windows Explorer to assign the folder manually documents1
classifications.
How do you proceed?
A. Configure the Folder Options and uncheck the option (Recommended) Sharing Wizard.
B. Install the role service Resource Manager file server.
C. Configure the Folder Options and uncheck Hide protected operating system files (Recommended).
D. Install the Role Management Tool tools for sharing and Memory management.
Correct Answer: B
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The Resource Manager
File Server provides a number of features for managing and classifying data stored on file servers data.
The Resource Manager File Server includes the following features:
File Classification Infrastructure Provides an insight into your data, which facilitate more efficient data
management is made possible by automating classification processes. You can classify files and apply
policies based on this classification. Example policies include dynamic access control for restricting file
access, file encryption and file expiration. Files can be automatically classified based on file classification
rules or manually by changing the properties of a selected file or folder.
File Management Tasks
Apply a conditional policy or action for files based on their classification. Among the conditions of a file
management task include the file location, the classification properties, the creation date of the file, the
date the file was last modified or the date the file was last accessed. Among the possible actions for a file
management task includes the ability to run off of files, to encrypt files or to execute a custom command.
Quota Management
Limit the allowed for a volume or folder location, and can be automatically applied to new folders that are
created on a volume. You can also define quota templates that can be applied to new volumes or folders.
File Screening Management
Controls the types of files that users can save on a file server. You can restrict the extensions that can be
stored on the file share. For example you can create a file screen, which prevents files are saved with the
extension MP3 in personal shared folders on a file server.
Storage Reports
Identify trends in disk usage and the way in which the data are classified. Storage Reports also monitor
attempts to selected user groups to save unauthorized files.
The features of the File Server Resource Manager can be configured and managed with the MMC
Resource Manager File Server or with Windows PowerShell.
QUESTION 29
Your corporate network includes an Active Directory Domain Services (AD DS) domain named contoso.
The domain contains a Windows Server 2012 R2 member server named Server1.
On Server1 role service Resource Manager is installed on the file server.
You need to configure Server1 to the following requirements:
Old files that are located in a folder named Folder1, must be moved to a folder named Archiv1.
All reports must be stored in a network share.
Configure Which two nodes?
(To be configured dialog box shown in the picture. Click the Drawing button.)
You are working as a network administrator for the company contoso. Your network includes a Windows
Server 2012 R2 computer that is named Server1. To install the role file / storage services on Server1.
You use the Windows Explorer and open the properties of a folder named documents1.
They note that the register classification is missing.
You must ensure that you can use Windows Explorer to assign the folder manually documents1
classifications.
How do you proceed?
A. Configure the Folder Options and uncheck the option (Recommended) Sharing Wizard.
B. Install the role service Resource Manager file server.
C. Configure the Folder Options and uncheck Hide protected operating system files (Recommended).
D. Install the Role Management Tool tools for sharing and Memory management.
Correct Answer: B
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The Resource Manager
File Server provides a number of features for managing and classifying data stored on file servers data.
The Resource Manager File Server includes the following features:
File Classification Infrastructure Provides an insight into your data, which facilitate more efficient data
management is made possible by automating classification processes. You can classify files and apply
policies based on this classification. Example policies include dynamic access control for restricting file
access, file encryption and file expiration. Files can be automatically classified based on file classification
rules or manually by changing the properties of a selected file or folder.
File Management Tasks
Apply a conditional policy or action for files based on their classification. Among the conditions of a file
management task include the file location, the classification properties, the creation date of the file, the
date the file was last modified or the date the file was last accessed. Among the possible actions for a file
management task includes the ability to run off of files, to encrypt files or to execute a custom command.
Quota Management
Limit the allowed for a volume or folder location, and can be automatically applied to new folders that are
created on a volume. You can also define quota templates that can be applied to new volumes or folders.
File Screening Management
Controls the types of files that users can save on a file server. You can restrict the extensions that can be
stored on the file share. For example you can create a file screen, which prevents files are saved with the
extension MP3 in personal shared folders on a file server.
Storage Reports
Identify trends in disk usage and the way in which the data are classified. Storage Reports also monitor
attempts to selected user groups to save unauthorized files.
The features of the File Server Resource Manager can be configured and managed with the MMC
Resource Manager File Server or with Windows PowerShell.
QUESTION 29
Your corporate network includes an Active Directory Domain Services (AD DS) domain named contoso.
The domain contains a Windows Server 2012 R2 member server named Server1.
On Server1 role service Resource Manager is installed on the file server.
You need to configure Server1 to the following requirements:
Old files that are located in a folder named Folder1, must be moved to a folder named Archiv1.
All reports must be stored in a network share.
Configure Which two nodes?
(To be configured dialog box shown in the picture. Click the Drawing button.)
A. Resource Manager File Server (locally)
B. Quotas
C. File Screens
D. Storage Reports Management
E. Classification rules
F. File management tasks
Correct Answer: AF
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Last update: 15/09/2015
Based on the Based on the actual exam and checked with an Premium account. exam and checked with
and Premium account.
Notes:
B. Quotas
C. File Screens
D. Storage Reports Management
E. Classification rules
F. File management tasks
Correct Answer: AF
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Last update: 15/09/2015
Based on the Based on the actual exam and checked with an Premium account. exam and checked with
and Premium account.
Notes:
For moving old files a file management task can be type file sequence are created. The locations for
reports on the roster report locations are configured in the Options for the Resource Manager file server.
By default, the reports are stored in a local directory.
QUESTION 30
You are working as a server administrator for the company Contoso. You administer a Windows Server
2012 R2 Server Core computer named Server1. Server1 is used as a file server.
You must ensure that users register previous versions can use to access previous versions of
files.
Which tool will you use?
A. Wbadmin
B. Diskpart
C. Storrept
D. Vssadmin
Correct Answer:
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
reports on the roster report locations are configured in the Options for the Resource Manager file server.
By default, the reports are stored in a local directory.
QUESTION 30
You are working as a server administrator for the company Contoso. You administer a Windows Server
2012 R2 Server Core computer named Server1. Server1 is used as a file server.
You must ensure that users register previous versions can use to access previous versions of
files.
Which tool will you use?
A. Wbadmin
B. Diskpart
C. Storrept
D. Vssadmin
Correct Answer:
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
With previous versions, you can access previous versions of files and folders that are shared on your
network. This can be accessed on previous versions of files, must “Shadow Copies of Shared Folders” is
enabled on the file server. Previous versions are read-only until the restoration. A previous version of the
file on the server can not be changed. Calling an earlier version of a file
Locate the file (on the network), from which you want to view an earlier version, you click with the right
mouse button, and select Properties.
On the Previous Versions tab, select the desired version, and click Open.
In a full installation of Windows Server 2012 R2, you can enable earlier versions of the properties of the
volume.
A Server Core version, you can use the administrative command-line tool of the Volume Shadow Copy
Service (Vssadmin). To enable Shadow Copies of Volume D and to save on volume E example, you can
run the following command:
Vssadmin Add ShadowStorage /for=d: /on=e: /maxsize=2GB
QUESTION 31
Your company network includes a Windows Server 2012 R2 computer that is named Server1.
The disk configuration of Server1 is shown in the picture (click on the button drawing).
network. This can be accessed on previous versions of files, must “Shadow Copies of Shared Folders” is
enabled on the file server. Previous versions are read-only until the restoration. A previous version of the
file on the server can not be changed. Calling an earlier version of a file
Locate the file (on the network), from which you want to view an earlier version, you click with the right
mouse button, and select Properties.
On the Previous Versions tab, select the desired version, and click Open.
In a full installation of Windows Server 2012 R2, you can enable earlier versions of the properties of the
volume.
A Server Core version, you can use the administrative command-line tool of the Volume Shadow Copy
Service (Vssadmin). To enable Shadow Copies of Volume D and to save on volume E example, you can
run the following command:
Vssadmin Add ShadowStorage /for=d: /on=e: /maxsize=2GB
QUESTION 31
Your company network includes a Windows Server 2012 R2 computer that is named Server1.
The disk configuration of Server1 is shown in the picture (click on the button drawing).
You must create a volume, user data can be stored on up to 3 TB. Your solution must ensure that the
files remain available even if one disk in the volume.
What will you create?
A. A storage pool disk 2 and disk. 3
B. A mirrored volume on disk 2 and disk. 3
C. A spanned volume on disk 0 and disk. 4
D. A mirrored volume on disk 1 and disk. 4
E. A RAID-5 volume on disk 1, Disk 2 and Disk. 3
Correct Answer: B
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
Basic disks contain basic volumes, such as primary partitions and logical volumes on extended partitions.
Dynamic disks are for creating volumes with advanced features required. We can use Disk 2 and Disk 3 to
create a mirrored volume with a size of 3 TB.
Note : Dynamic disks can not be used for storage pools.
google translate
QUESTION 32
Your corporate network includes two Active Directory Domain Services (AD DS) domains. contoso.com
The names of the domains loud and traincert.com.
You administer a Windows Server 2012 R2 computer that is named Server1. On Server1, the DNS server
role is installed.
The server hosting a copy of the zone contoso.com.
You need to configure Server1 traincert.de for the resolution of the name of the zone. Your solution must
meet the following requirements:
It must be avoided that the configuration of the name servers of the zone traincert.de must be
adapted when it changes.
The administrative expenses for the maintenance and care of your solution should turn out as
low as possible.
What type of zone you are using?
A. A primary zone
B. A secondary zone
C. A reverse lookup zone
D. A stub zone
Correct Answer: D
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
Stub zones contain only name server records (NS) and its host (A) records. The DNS client can retrieve a
list of authorized name servers on the stub zone. The host changes (A) entry of a name server is a stub
zone (as opposed to a delegated zone) automatically updated. There are no manual steps to adapt the
Domain Name System (DNS) is required.
QUESTION 33
The Domain Name System (DNS) supports numerous types of entries.
Which listing type associates a domain name, such as www.google.com, with an IP address?
A. A
B. CNAME
C. MX
D. PTR
Correct Answer: A
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Last update: 16/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
domains are managed through a worldwide system of domain registrars and databases. The DNS
(Domain Name System) provides mappings between human-readable computer hostnames and the IP
addresses used by the network devices. Basic knowledge of DNS and domain registrars help
administrators manage domains. Domain names are used in URLs and e-mail addresses that are
associated with one or more IP addresses. Domain names consist of several levels. For example, the
domain name “mail.contoso.com” for the following three levels:
.com is the top-level domain.
contoso is the second-level domain.
mail is the third level domain.
Understanding DNS record types and functions
DNS records are used to route traffic from one and a domain. These entries a domain name of a specific
IP address is assigned. The following commonly used DNS records and their functions are listed:
Name Server Entry
Specifies which name servers are used as the authoritative name server for a given domain. DNS
information can be temporarily stored on multiple name servers, after the non-authoritative name server
caches contact but the authoritative name server to obtain updated information about a domain.
A record (address entry) assigns a domain name to an IP address.
CNAME
record (Alias or canonical name) Specifies that it is the domain name is an alias of another canonical
domain name. When hit by a name server for a domain and a CNAME record is found, the first domain
name is replaced with the CNAME and then looks for the new name.
MX record
(mail exchanger) Specifies the server are routed to the e-mails. The entry also contains a priority field so
that e-mail messages can be sent in the prescribed sequence to multiple servers.
SPF
(Sender Policy Framework) A verification system for e-mail, which was developed to prevent e-mail
spoofing and phishing-.
SRV
record (service record) Specifies information about available services. SRV records are used by some
Microsoft cloud services such as Lync Online and Exchange Online, for coordinating the flow of information
between different services.
QUESTION 34
Your company uses an Active Directory forest named certbase.de. On all server computers Windows
Server 2012 R2 is installed. The domain contains four servers.
The configuration of four server is shown in the picture (click on the button drawing).
You want to implement the IP address management (IPAM) for the management of the DNS and the
DHCP server.
On what server you install the feature IP address management?
files remain available even if one disk in the volume.
What will you create?
A. A storage pool disk 2 and disk. 3
B. A mirrored volume on disk 2 and disk. 3
C. A spanned volume on disk 0 and disk. 4
D. A mirrored volume on disk 1 and disk. 4
E. A RAID-5 volume on disk 1, Disk 2 and Disk. 3
Correct Answer: B
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
Basic disks contain basic volumes, such as primary partitions and logical volumes on extended partitions.
Dynamic disks are for creating volumes with advanced features required. We can use Disk 2 and Disk 3 to
create a mirrored volume with a size of 3 TB.
Note : Dynamic disks can not be used for storage pools.
google translate
QUESTION 32
Your corporate network includes two Active Directory Domain Services (AD DS) domains. contoso.com
The names of the domains loud and traincert.com.
You administer a Windows Server 2012 R2 computer that is named Server1. On Server1, the DNS server
role is installed.
The server hosting a copy of the zone contoso.com.
You need to configure Server1 traincert.de for the resolution of the name of the zone. Your solution must
meet the following requirements:
It must be avoided that the configuration of the name servers of the zone traincert.de must be
adapted when it changes.
The administrative expenses for the maintenance and care of your solution should turn out as
low as possible.
What type of zone you are using?
A. A primary zone
B. A secondary zone
C. A reverse lookup zone
D. A stub zone
Correct Answer: D
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
Stub zones contain only name server records (NS) and its host (A) records. The DNS client can retrieve a
list of authorized name servers on the stub zone. The host changes (A) entry of a name server is a stub
zone (as opposed to a delegated zone) automatically updated. There are no manual steps to adapt the
Domain Name System (DNS) is required.
QUESTION 33
The Domain Name System (DNS) supports numerous types of entries.
Which listing type associates a domain name, such as www.google.com, with an IP address?
A. A
B. CNAME
C. MX
D. PTR
Correct Answer: A
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Last update: 16/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
domains are managed through a worldwide system of domain registrars and databases. The DNS
(Domain Name System) provides mappings between human-readable computer hostnames and the IP
addresses used by the network devices. Basic knowledge of DNS and domain registrars help
administrators manage domains. Domain names are used in URLs and e-mail addresses that are
associated with one or more IP addresses. Domain names consist of several levels. For example, the
domain name “mail.contoso.com” for the following three levels:
.com is the top-level domain.
contoso is the second-level domain.
mail is the third level domain.
Understanding DNS record types and functions
DNS records are used to route traffic from one and a domain. These entries a domain name of a specific
IP address is assigned. The following commonly used DNS records and their functions are listed:
Name Server Entry
Specifies which name servers are used as the authoritative name server for a given domain. DNS
information can be temporarily stored on multiple name servers, after the non-authoritative name server
caches contact but the authoritative name server to obtain updated information about a domain.
A record (address entry) assigns a domain name to an IP address.
CNAME
record (Alias or canonical name) Specifies that it is the domain name is an alias of another canonical
domain name. When hit by a name server for a domain and a CNAME record is found, the first domain
name is replaced with the CNAME and then looks for the new name.
MX record
(mail exchanger) Specifies the server are routed to the e-mails. The entry also contains a priority field so
that e-mail messages can be sent in the prescribed sequence to multiple servers.
SPF
(Sender Policy Framework) A verification system for e-mail, which was developed to prevent e-mail
spoofing and phishing-.
SRV
record (service record) Specifies information about available services. SRV records are used by some
Microsoft cloud services such as Lync Online and Exchange Online, for coordinating the flow of information
between different services.
QUESTION 34
Your company uses an Active Directory forest named certbase.de. On all server computers Windows
Server 2012 R2 is installed. The domain contains four servers.
The configuration of four server is shown in the picture (click on the button drawing).
You want to implement the IP address management (IPAM) for the management of the DNS and the
DHCP server.
On what server you install the feature IP address management?
A. Server1
B. Server2
C. Server3
D. Server4
Correct Answer: D
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Create on: 16/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The detection range for IPAM server is limited to a single Active Directory forest. The overall structure can
be made up of trusted and untrusted domains. IPAM requires membership in an Active Directory domain
and a functional network infrastructure environment to integrate with existing DHCP, DNS, Domain
Controller and Network Policy Server installations in the forest can. IPAM can not be installed on a domain
controller. Apply IPAM the following additional specifications:
IPAM supports only Microsoft DHCP, DNS, Domain Controller and Network Policy Server on Windows
Server 2008 and later.
IPAM supports only one domain associated servers in a single Active Directory forest.
A single IPAM server can support up to 150 DHCP servers and 500 DNS servers.
A single IPAM server can support up to 6000 DHCP scopes and 150 DNS zones.
IPAM stores forensic data (IP address leases, host MAC addresses, login and logout information of users)
for 100,000 users for 3 years in a Windows Internal Database. A policy for the deletion of data from the
database is not included; the administrator must manually delete the data when needed.
IPAM does not support management and configuration of network elements (WINS, DHCP relay or proxy)
other providers as Microsoft.
IPAM supports only Windows Internal Database. External databases are not supported.
IP address utilization trends are provided only for IPv4 available.
The redemption of IP addresses is available only for IPv4 available.
For automatic configuration stateless IPv6 addresses with private extensions no special processing is
performed.
For virtualization technology or migration of the virtual machine, no special processing is performed.
IPAM does not check the consistency of IP addresses to routers and switches.
IPAM does not support Überrwachung of IPv6 addresses (automatic configuration stateless addresses) to
track users on unmanaged computers.
QUESTION 35
Your company network includes a router with the name Router1. Router1 provides access to the Internet.
You use a Windows Server 2012 R2 computer that is named Server1. Server1 used Router1 as the default
gateway.
One of your colleagues take a new router with the name Router2 in operation. Router2 also provides
access to the Internet.
The internal interface of Router2 is configured with the IP address 10.1.14.254.
You need to configure Server1 so that Router2 is used for connections to Internet resources when
Router1 fails.
What step to run on Server1?
A. Create a route to network 10.1.14.0/24. Enter the IP address 10.1.14.254 as a gateway for the route
and set the metric of the route with 500 fixed.
B. Add the IP address 10.1.14.254 as the default gateway added and set the metric of the route with 500
fixed.
C. Create a route to network 10.1.14.0/24. Enter the IP address 10.1.14.254 as a gateway for the route
and set the metric of the route with 1 fixed.
D. Add the IP address 10.1.14.254 as the default gateway added and set the metric of the route with 1
fixed.
Correct Answer: B
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Created on: 16/09/2015
Based on the actual exam and checked with an Premium account.
B. Server2
C. Server3
D. Server4
Correct Answer: D
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Create on: 16/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The detection range for IPAM server is limited to a single Active Directory forest. The overall structure can
be made up of trusted and untrusted domains. IPAM requires membership in an Active Directory domain
and a functional network infrastructure environment to integrate with existing DHCP, DNS, Domain
Controller and Network Policy Server installations in the forest can. IPAM can not be installed on a domain
controller. Apply IPAM the following additional specifications:
IPAM supports only Microsoft DHCP, DNS, Domain Controller and Network Policy Server on Windows
Server 2008 and later.
IPAM supports only one domain associated servers in a single Active Directory forest.
A single IPAM server can support up to 150 DHCP servers and 500 DNS servers.
A single IPAM server can support up to 6000 DHCP scopes and 150 DNS zones.
IPAM stores forensic data (IP address leases, host MAC addresses, login and logout information of users)
for 100,000 users for 3 years in a Windows Internal Database. A policy for the deletion of data from the
database is not included; the administrator must manually delete the data when needed.
IPAM does not support management and configuration of network elements (WINS, DHCP relay or proxy)
other providers as Microsoft.
IPAM supports only Windows Internal Database. External databases are not supported.
IP address utilization trends are provided only for IPv4 available.
The redemption of IP addresses is available only for IPv4 available.
For automatic configuration stateless IPv6 addresses with private extensions no special processing is
performed.
For virtualization technology or migration of the virtual machine, no special processing is performed.
IPAM does not check the consistency of IP addresses to routers and switches.
IPAM does not support Überrwachung of IPv6 addresses (automatic configuration stateless addresses) to
track users on unmanaged computers.
QUESTION 35
Your company network includes a router with the name Router1. Router1 provides access to the Internet.
You use a Windows Server 2012 R2 computer that is named Server1. Server1 used Router1 as the default
gateway.
One of your colleagues take a new router with the name Router2 in operation. Router2 also provides
access to the Internet.
The internal interface of Router2 is configured with the IP address 10.1.14.254.
You need to configure Server1 so that Router2 is used for connections to Internet resources when
Router1 fails.
What step to run on Server1?
A. Create a route to network 10.1.14.0/24. Enter the IP address 10.1.14.254 as a gateway for the route
and set the metric of the route with 500 fixed.
B. Add the IP address 10.1.14.254 as the default gateway added and set the metric of the route with 500
fixed.
C. Create a route to network 10.1.14.0/24. Enter the IP address 10.1.14.254 as a gateway for the route
and set the metric of the route with 1 fixed.
D. Add the IP address 10.1.14.254 as the default gateway added and set the metric of the route with 1
fixed.
Correct Answer: B
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Created on: 16/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The metric indicates the cost of a route. Existence to a destination several routes at different speeds,
availability or connection costs, as can be done with the metric to prioritize the route using. The higher the
value of the metric of a route, the higher the costs and correspondingly lower the route is prioritized. Since
Windows XP Professional defaults automatically assigned to the metric based on the transmission rate.
The interface metric is added to the metric of a default gateway. The sum results in the effective metric of
the resulting default route.
QUESTION 36
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain.
The DNS zone is Active Directory-integrated contoso.local and configured so that the zone data to all DNS
servers running on domain controllers in the domain certbase.de replicated. Server1 is a member server of
the domain.
The IP address of Server1 is in the zone contoso.local registered.
You must determine when the DNS record of Server1 was last updated. In which Active Directory
partition to see the DNS record of a Server1?
(To be configured dialog box shown in the picture. Click the Drawing button.)
Hot Area:
The metric indicates the cost of a route. Existence to a destination several routes at different speeds,
availability or connection costs, as can be done with the metric to prioritize the route using. The higher the
value of the metric of a route, the higher the costs and correspondingly lower the route is prioritized. Since
Windows XP Professional defaults automatically assigned to the metric based on the transmission rate.
The interface metric is added to the metric of a default gateway. The sum results in the effective metric of
the resulting default route.
QUESTION 36
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain.
The DNS zone is Active Directory-integrated contoso.local and configured so that the zone data to all DNS
servers running on domain controllers in the domain certbase.de replicated. Server1 is a member server of
the domain.
The IP address of Server1 is in the zone contoso.local registered.
You must determine when the DNS record of Server1 was last updated. In which Active Directory
partition to see the DNS record of a Server1?
(To be configured dialog box shown in the picture. Click the Drawing button.)
Hot Area:
Section: 5. Configure and manage Active Directory
Explanation
Explanation/Reference:
created on: 16/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
In the task is mentioned that the zone data to all DNS servers running on domain controllers in the domain
certbase.de replicated. The zone data is consequently in the Active Directory partition DomainDnsZones
saved.
QUESTION 37
Your corporate network includes an Active Directory Domain Services (AD DS) domain certbase.de
named.
You have a new Group Policy object (GPO) created to configure the Windows Update settings.
Currently the client computers are configured so that updates can be downloaded from the Microsoft
Update servers gladen.
The users determine when the updates are installed.
To configure the client computer so that Windows updates are installed automatically.
Which policy will configure?
A. Enable Windows Update Power Management to reactivate the system to install scheduled updates
automatically.
B. Configure Automatic Updates
C. Specify intranet Microsoft update service
D. Search frequency for automatic updates
E. Install Automatic Updates Immediately
F. Enable Client-side target allocation
Correct Answer: B
Section: 6. Configure and manage Group Policy
Explanation
Explanation/Reference:
Last update: 14/09/2015
Based on the actual exam and checked with an Premium account.
Explanation
Explanation/Reference:
created on: 16/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
In the task is mentioned that the zone data to all DNS servers running on domain controllers in the domain
certbase.de replicated. The zone data is consequently in the Active Directory partition DomainDnsZones
saved.
QUESTION 37
Your corporate network includes an Active Directory Domain Services (AD DS) domain certbase.de
named.
You have a new Group Policy object (GPO) created to configure the Windows Update settings.
Currently the client computers are configured so that updates can be downloaded from the Microsoft
Update servers gladen.
The users determine when the updates are installed.
To configure the client computer so that Windows updates are installed automatically.
Which policy will configure?
A. Enable Windows Update Power Management to reactivate the system to install scheduled updates
automatically.
B. Configure Automatic Updates
C. Specify intranet Microsoft update service
D. Search frequency for automatic updates
E. Install Automatic Updates Immediately
F. Enable Client-side target allocation
Correct Answer: B
Section: 6. Configure and manage Group Policy
Explanation
Explanation/Reference:
Last update: 14/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The policy Configure Automatic Updates. Specifies whether the computer receives security updates and
other important downloads through the Windows Automatic Updates service and when they are installed If
the service is enabled, you must select in the Group Policy setting one of the following four options :
2 = notify before downloading any updates and notify again before installation. If Windows detects updates
that can be applied to the computer, an icon in the status area with a message that informs you that
updates are available for download. Clicking the icon or message, you can select to download updates.
The selected updates are then downloaded from Windows in the background. After downloading is
complete, an icon in the status area again displayed that informs you that the updates can be installed.
When you click the icon or message, you can select the updates that you want to install.
Automatically download 3 = (default) updates and notify you of updates installable Windows checks for
updates that can be applied to the computer, and loads these automatically in the background without (the
user is not notified during the process or disturbed). After downloading has been completed, the status
area, the icon is displayed, informing you that the updates can be installed. When you click the icon or
message, you can select the updates that you want to install.
Automatically download 4 = Updates and schedule that I specify install Specify the schedule using the
options in the Group Policy setting. By default installations are planned daily for 3 clock in the morning, if
no timetable is given. The completion of the update installation, if a restart is required, Windows will
automatically restart the computer. (If a user is logged on to the computer when Windows is restarted, the
user is notified and can delay the restart.) Windows 8 and Windows RT: The option to specify the schedule
in the Group Policy setting has no effect.
The planning option under “Computer Configuration” -> “Administrative Templates” -> “Windows
Components” – specify> “Activation limit for maintenance” -> “Maintenance Schedule”.
By default installations are planned during the standard maintenance window at 3 clock in the morning, if
no timetable is given. To complete the installation of security updates, if a restart is required, Windows
automatically restarts the computer after the user has been notified of an impending automatic restart in a
given period. If a user is logged on to the computer and a potential state or data loss is present when
Windows is restarted, the restart is delayed until next unlock the computer by the user.
5 = places allow administrators to select the configuration mode for the update installation through
Automatic Updates This option can be enabled with local administrators, on the Control Panel icon
“Automatic Updates” option to select a configuration. You can select a date for a planned installation
example itself. Local administrators will not be allowed to disable the configuration for “Automatic
Updates”. If you want to use this setting, click “Enable”, and then select one of the options (2, 3, 4 or 5). If
you choose option 4, you can set a regular schedule (no schedule specifying all installations are carried
out by 3 clock in the morning every day). In Windows 8 and Windows RT, you can define “Activation limit
for maintenance Computer Configuration \ Administrative Templates \ Windows Components \
Maintenance Schedule \” the schedule below. If no schedule is specified, all installations are carried out
during the standard maintenance window at 3 clock in the morning.
QUESTION 38
Your corporate network includes an Active Directory Domain Services (AD DS) domain certbase.de
named.
The domain includes 10 servers on which the operating system is running Windows Server 2012 R2. You
plan the BitLocker Drive Encryption (BitLocker) to activate the operating system partitions on the file
server.
You must configure policies for BitLocker Drive Encryption, the file server. Your configuration must meet
the following requirements:
All file servers must use a PIN for the system start.
The BitLocker recovery key and the BitLocker recovery password must be stored in Active
Directory.
To configure policy settings Which two?
(To be configured dialog box shown in the picture. Click the Drawing button.)
To configure policy settings_bitlocker (exhibit):
The policy Configure Automatic Updates. Specifies whether the computer receives security updates and
other important downloads through the Windows Automatic Updates service and when they are installed If
the service is enabled, you must select in the Group Policy setting one of the following four options :
2 = notify before downloading any updates and notify again before installation. If Windows detects updates
that can be applied to the computer, an icon in the status area with a message that informs you that
updates are available for download. Clicking the icon or message, you can select to download updates.
The selected updates are then downloaded from Windows in the background. After downloading is
complete, an icon in the status area again displayed that informs you that the updates can be installed.
When you click the icon or message, you can select the updates that you want to install.
Automatically download 3 = (default) updates and notify you of updates installable Windows checks for
updates that can be applied to the computer, and loads these automatically in the background without (the
user is not notified during the process or disturbed). After downloading has been completed, the status
area, the icon is displayed, informing you that the updates can be installed. When you click the icon or
message, you can select the updates that you want to install.
Automatically download 4 = Updates and schedule that I specify install Specify the schedule using the
options in the Group Policy setting. By default installations are planned daily for 3 clock in the morning, if
no timetable is given. The completion of the update installation, if a restart is required, Windows will
automatically restart the computer. (If a user is logged on to the computer when Windows is restarted, the
user is notified and can delay the restart.) Windows 8 and Windows RT: The option to specify the schedule
in the Group Policy setting has no effect.
The planning option under “Computer Configuration” -> “Administrative Templates” -> “Windows
Components” – specify> “Activation limit for maintenance” -> “Maintenance Schedule”.
By default installations are planned during the standard maintenance window at 3 clock in the morning, if
no timetable is given. To complete the installation of security updates, if a restart is required, Windows
automatically restarts the computer after the user has been notified of an impending automatic restart in a
given period. If a user is logged on to the computer and a potential state or data loss is present when
Windows is restarted, the restart is delayed until next unlock the computer by the user.
5 = places allow administrators to select the configuration mode for the update installation through
Automatic Updates This option can be enabled with local administrators, on the Control Panel icon
“Automatic Updates” option to select a configuration. You can select a date for a planned installation
example itself. Local administrators will not be allowed to disable the configuration for “Automatic
Updates”. If you want to use this setting, click “Enable”, and then select one of the options (2, 3, 4 or 5). If
you choose option 4, you can set a regular schedule (no schedule specifying all installations are carried
out by 3 clock in the morning every day). In Windows 8 and Windows RT, you can define “Activation limit
for maintenance Computer Configuration \ Administrative Templates \ Windows Components \
Maintenance Schedule \” the schedule below. If no schedule is specified, all installations are carried out
during the standard maintenance window at 3 clock in the morning.
QUESTION 38
Your corporate network includes an Active Directory Domain Services (AD DS) domain certbase.de
named.
The domain includes 10 servers on which the operating system is running Windows Server 2012 R2. You
plan the BitLocker Drive Encryption (BitLocker) to activate the operating system partitions on the file
server.
You must configure policies for BitLocker Drive Encryption, the file server. Your configuration must meet
the following requirements:
All file servers must use a PIN for the system start.
The BitLocker recovery key and the BitLocker recovery password must be stored in Active
Directory.
To configure policy settings Which two?
(To be configured dialog box shown in the picture. Click the Drawing button.)
To configure policy settings_bitlocker (exhibit):
Require Additional authentication at startup (exhibit):
Choose how Bitlocker-protected os drives can be recovered (exhibit):
A. Allow Network unlock at startup
B. Require Additional authentication at startup
C. Allow enhanced PINs for startup
D. Configure use of passwords for operating system drives
E. Choose how Bitlocker-protected os drives can be recovered
F. Configure TPM platform validation profile for native UEFI firmware configurations
Correct Answer: BE
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
B. Require Additional authentication at startup
C. Allow enhanced PINs for startup
D. Configure use of passwords for operating system drives
E. Choose how Bitlocker-protected os drives can be recovered
F. Configure TPM platform validation profile for native UEFI firmware configurations
Correct Answer: BE
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Created on: 15/09/2015
Based on the actual exam and checked with an Premium account.
With the policy setting Additional authentication request at startup, you can configure whether BitLocker at
every computer startup requires additional authentication and you are using BitLocker with or without TPM
(Trusted Platform Module). This policy setting is applied to enable BitLocker.
If you want to use BitLocker on a computer without a TPM, select the check box “Allow BitLocker without a
compatible TPM”. In this mode, either a password or a USB drive is required for the start. When using a
startup key, the key information that is used to encrypt the drive is stored in the form of a USB key to the
USB drive. When the USB key is made available, the access to the drive is authenticated, and it can be
accessed on the drive. When the USB key is lost, is not available or you have forgotten your password,
use one of the BitLocker recovery options to access the drive.
On a computer with a compatible TPM four authentication methods can be used to provide additional
protection for encrypted data at startup. When the computer starts, either only the TPM for authentication
may be required, or there must be an additional USB flash drive connected with a startup key, and a 4- to
20-digit personal identification number (PIN) to be entered, or both options may be required.
If you enable this policy setting, users can configure advanced startup options in the BitLocker Setup
wizard.
If you disable this policy setting or do not configure, users can configure on computers with a TPM only
basic options.
Note: If you want to force the use of a startup PIN and a USB flash drive, you need to configure BitLocker
settings using the command-line tools “manage-bde” and not via the Setup Wizard of BitLocker Drive
Encryption.
every computer startup requires additional authentication and you are using BitLocker with or without TPM
(Trusted Platform Module). This policy setting is applied to enable BitLocker.
If you want to use BitLocker on a computer without a TPM, select the check box “Allow BitLocker without a
compatible TPM”. In this mode, either a password or a USB drive is required for the start. When using a
startup key, the key information that is used to encrypt the drive is stored in the form of a USB key to the
USB drive. When the USB key is made available, the access to the drive is authenticated, and it can be
accessed on the drive. When the USB key is lost, is not available or you have forgotten your password,
use one of the BitLocker recovery options to access the drive.
On a computer with a compatible TPM four authentication methods can be used to provide additional
protection for encrypted data at startup. When the computer starts, either only the TPM for authentication
may be required, or there must be an additional USB flash drive connected with a startup key, and a 4- to
20-digit personal identification number (PIN) to be entered, or both options may be required.
If you enable this policy setting, users can configure advanced startup options in the BitLocker Setup
wizard.
If you disable this policy setting or do not configure, users can configure on computers with a TPM only
basic options.
Note: If you want to force the use of a startup PIN and a USB flash drive, you need to configure BitLocker
settings using the command-line tools “manage-bde” and not via the Setup Wizard of BitLocker Drive
Encryption.
With the policy setting Choose how BitLocker-protected operating system drives can be recovered, you
can control how BitLocker-protected operating system drives can be recovered if no information is
available to the required startup key. This policy setting is applied to enable BitLocker.
Select “Save BitLocker recovery information in Active Directory Domain Services” under from which
BitLocker recovery information to be saved for operating system drives in AD DS. Both the BitLocker
recovery password and the key package in AD DS “back up the recovery password and key package”
Selecting saved. By storing the key packet data can be recovered from a physically damaged drive. If you
select “Back up only recovery password” the recovery password is stored in AD DS exclusively.
can control how BitLocker-protected operating system drives can be recovered if no information is
available to the required startup key. This policy setting is applied to enable BitLocker.
Select “Save BitLocker recovery information in Active Directory Domain Services” under from which
BitLocker recovery information to be saved for operating system drives in AD DS. Both the BitLocker
recovery password and the key package in AD DS “back up the recovery password and key package”
Selecting saved. By storing the key packet data can be recovered from a physically damaged drive. If you
select “Back up only recovery password” the recovery password is stored in AD DS exclusively.
QUESTION 39
Your corporate network includes an Active Directory Domain Services (AD DS) domain cblabs.de named.
The domain contains two Windows Server 2012 R2 member server with the name Server3 and Server4.
Your manager wants to implement a centralized location where the system events of all servers in the
domain can be collected.
One of your colleagues created on Server3 a collection initiated event subscription for Server4.
To determine that Server3 has received no events of Server4 and check the runtime status of the
subscription.
The runtime status shows the following error: The value passed to a system call data area is too small.
You must ensure that the system events can be collected from Server4 on Server3.
What settings you will configure? (To be configured dialog box is shown in the picture. Click the Drawing
button.)
Your corporate network includes an Active Directory Domain Services (AD DS) domain cblabs.de named.
The domain contains two Windows Server 2012 R2 member server with the name Server3 and Server4.
Your manager wants to implement a centralized location where the system events of all servers in the
domain can be collected.
One of your colleagues created on Server3 a collection initiated event subscription for Server4.
To determine that Server3 has received no events of Server4 and check the runtime status of the
subscription.
The runtime status shows the following error: The value passed to a system call data area is too small.
You must ensure that the system events can be collected from Server4 on Server3.
What settings you will configure? (To be configured dialog box is shown in the picture. Click the Drawing
button.)
A. Target Protocol
B. Select Computer
C. Select events
D. Advanced
Correct Answer: C
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Last update: 14/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The error message described above can occur if selected during Initials transfer too many events. To
avoid the problem, the number of events for the first transmission should be reduced by limiting the event
categories. Once the initial merge is successfully completed, the selection of events can be expanded
again. There is a post in the Windows support forums, describing the error and correct it. See:
2008 R2: Forwarded events – data area passed to system call is too small
QUESTION 40
On all server computers running Windows Server 2012 R2 is installed. All client computers Windows 8
Enterprise is installed.
The domain contains two servers with the name DC1 and Server2. The configuration of the server is
shown in the picture (click on the button drawing).
You are planning the implementation of Network Access Protection (NAP) in conjunction with the NAP
enforcement for IPsec communications.
You have a Group Policy object (GPO) is configured with the name GPO1 to apply trusted server groups
on the client computer.
You have to make sure to that the client computer HRA Server (Health Registration Authority, HRA)
Automatically detect.
What three steps you will perform? ( Each correct answer presents part of the solution. Choose three.)
B. Select Computer
C. Select events
D. Advanced
Correct Answer: C
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Last update: 14/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The error message described above can occur if selected during Initials transfer too many events. To
avoid the problem, the number of events for the first transmission should be reduced by limiting the event
categories. Once the initial merge is successfully completed, the selection of events can be expanded
again. There is a post in the Windows support forums, describing the error and correct it. See:
2008 R2: Forwarded events – data area passed to system call is too small
QUESTION 40
On all server computers running Windows Server 2012 R2 is installed. All client computers Windows 8
Enterprise is installed.
The domain contains two servers with the name DC1 and Server2. The configuration of the server is
shown in the picture (click on the button drawing).
You are planning the implementation of Network Access Protection (NAP) in conjunction with the NAP
enforcement for IPsec communications.
You have a Group Policy object (GPO) is configured with the name GPO1 to apply trusted server groups
on the client computer.
You have to make sure to that the client computer HRA Server (Health Registration Authority, HRA)
Automatically detect.
What three steps you will perform? ( Each correct answer presents part of the solution. Choose three.)
A. Create an entry for DC1 on the Service Location (SRV).
B. Configure the registry key EnableDiscovery on Server2.
C. Configure the registry key EnableDiscovery on all client computers.
D. Change the request policy of the NAP Client Configuration in GPO1.
E. Create on DC1 an alias (CNAME) record.
Correct Answer: ACD
Section: 5. Configure and manage Active Directory
Explanation
Explanation/Reference:
Created on: 16/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The HRA (Health Registration Authority, HRA) is a NAP component that issues health certificates to clients
that pass the health policy verification. This test is performed by NPS using the client SoH (Statement of
Health). HRA is used only with the NAP IPsec enforcement. For the automatic determination of the HRA,
the following requirements apply:
On the client computers at least Windows XP Service Pack 3 (SP3) must be installed.
The HRA server must have a valid Secure Socket Layer (SSL) certificate.
In the NAP client computers, the registry key must EnableDiscovery be configured.
In DNS, a service identification entry (SRV) must be configured for the HRA server.
The configuration of settings Trusted server groups must be in the local policy or the GPO used reset.
For more information, see the TechNet article Configure HRA Automatic Discovery at the following URL
http://technet.microsoft.com/en-us/library/dd296901(v=ws.10).aspx
B. Configure the registry key EnableDiscovery on Server2.
C. Configure the registry key EnableDiscovery on all client computers.
D. Change the request policy of the NAP Client Configuration in GPO1.
E. Create on DC1 an alias (CNAME) record.
Correct Answer: ACD
Section: 5. Configure and manage Active Directory
Explanation
Explanation/Reference:
Created on: 16/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
The HRA (Health Registration Authority, HRA) is a NAP component that issues health certificates to clients
that pass the health policy verification. This test is performed by NPS using the client SoH (Statement of
Health). HRA is used only with the NAP IPsec enforcement. For the automatic determination of the HRA,
the following requirements apply:
On the client computers at least Windows XP Service Pack 3 (SP3) must be installed.
The HRA server must have a valid Secure Socket Layer (SSL) certificate.
In the NAP client computers, the registry key must EnableDiscovery be configured.
In DNS, a service identification entry (SRV) must be configured for the HRA server.
The configuration of settings Trusted server groups must be in the local policy or the GPO used reset.
For more information, see the TechNet article Configure HRA Automatic Discovery at the following URL
http://technet.microsoft.com/en-us/library/dd296901(v=ws.10).aspx
Latest online browsing the 70-411 exam!
70-411 PDF dumps & 70-411 VCE dumps: http://examsavior.com/70-411
100% Pass:http://examsavior.com/
This comment has been removed by the author.
ReplyDeleteTestcollection provides valid Microsoft 70-411 exam questions that are verified by expert IT professionals. We have 70-411 test questions of 70-411 with verified answers that can be of great help for students looking for test questions
ReplyDeleteDumpsprofessor.us is an amazing dumps provider with guarantee which helped me to pass my 70-411 exam by the first attempt. I am happy for my selection of 70-411 braindumps and satisfied for the performance in my final test. In my view, there is no match for 70-411 dumps.
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteI read about in a comment and visit Realexamdumps.com and found it really useful. I am thankful to all the members who have been the part of its creation. In my view, there is no better dumps material than 70-411 BrainDumps. was so much informative and scholarly written that I got a thorough understanding of the field with only one read. All the information was presented in the form of questions and answers. Questions have been selected by the experts and the answers have been filled with the information about the exam. There will be no question in the final test that will be out of my knowledge. My thanks go to Realexamdumps.com for creating 70-411 Dumps which was so useful throughout my preparation. This study guide has become my favorite.
ReplyDeleteMany thanks for sharing such kind of info. It is actually not easy to meet the difficulties to Pass your Microsoft PL-400 Exam Dumps, but if you have valid study material like Real Microsoft Exam Questions. No doubt will pending to be successful.
ReplyDeleteHence its only need to get an authentic study material to prepare any of your exam, than nobody can stop you to be successful in your field. Only Valid Microsoft Exam Dumps can be the cause of your success.
For More Details:-
https://dumpstoday.com/