Do you want to pass the 70-411 examsavior exam? What are the new questions of the latest 70-411 exam? Braindumps 70-411 VCE dumps and 70-411 PDF dumps will tell you all about the 70-411 examsavior exam.Here are the examsavior newest and covered all new added questions and answers, which will help you 100% passing 70-411 examsavior exam.Hurry up and get the free exam from here!
NOW FREE DOWNLOAD
Exam D
QUESTION 1
You have a server named Server1 that runs Windows Server 2012 R2.
You discover that the performance of Server1 is poor.
The results of a performance report generated on Server1 are shown in the following table.
QUESTION 1
You have a server named Server1 that runs Windows Server 2012 R2.
You discover that the performance of Server1 is poor.
The results of a performance report generated on Server1 are shown in the following table.
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-238.png)
You need to identify the cause of the performance issue.
What should you identify?
A. Driver malfunction
B. Insufficient ram
C. Insufficient processors
D. Excessive paging
Correct Answer: C
What should you identify?
A. Driver malfunction
B. Insufficient ram
C. Insufficient processors
D. Excessive paging
Correct Answer: C
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Explanation:
Processor: %DPC Time. Much like the other values, this counter shows the amount of time that the processor spends servicing DPC requests. DPC
requests are more often than not associated with the network interface.
Processor: % Interrupt Time. This is the percentage of time that the processor is spending on handling Interrupts. Generally, if this value exceeds 50%
of the processor time you may have a hardware issue. Some components on the computer can force this issue and not really be a problem. For
example a programmable I/O card like an old disk controller card, can take up to 40% of the CPU time. A NIC on a busy IIS server can likewise generate
a large percentage of processor activity.
Processor: % User Time. The value of this counter helps to determine the kind of processing that is affecting the system. Of course the resulting value
is the total amount of non-idle time that was spent on User mode operations. This generally means application code.
Processor: %Privilege Time. This is the amount of time the processor was busy with Kernel mode operations. If the processor is very busy and this
mode is high, it is usually an indication of some type of NT service having difficulty, although user mode programs can make calls to the Kernel mode
NT components to occasionally cause this type of performance issue.
Memory: Pages/sec. This value is often confused with Page Faults/sec. The Pages/sec counter is a combination of Pages Input/sec and Pages Output/
sec counters. Recall that Page Faults/sec is a combination of hard page faults and soft page faults. This counter, however, is a general indicator of how
often the system is using the hard drive to store or retrieve memory associated data.
http://technet.microsoft.com/en-us/library/cc768048.aspx
QUESTION 2
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1.
On Server1 the operating system Windows Server 2012 R2 is installed.
Check the RSoP of Server1. The effective settings are shown in the picture (click on the button drawing).
You must ensure that an entry is recorded in the event log when it is on Server1 created or deleted a local user account.
How do you proceed?
Explanation
Explanation/Reference:
Explanation:
Processor: %DPC Time. Much like the other values, this counter shows the amount of time that the processor spends servicing DPC requests. DPC
requests are more often than not associated with the network interface.
Processor: % Interrupt Time. This is the percentage of time that the processor is spending on handling Interrupts. Generally, if this value exceeds 50%
of the processor time you may have a hardware issue. Some components on the computer can force this issue and not really be a problem. For
example a programmable I/O card like an old disk controller card, can take up to 40% of the CPU time. A NIC on a busy IIS server can likewise generate
a large percentage of processor activity.
Processor: % User Time. The value of this counter helps to determine the kind of processing that is affecting the system. Of course the resulting value
is the total amount of non-idle time that was spent on User mode operations. This generally means application code.
Processor: %Privilege Time. This is the amount of time the processor was busy with Kernel mode operations. If the processor is very busy and this
mode is high, it is usually an indication of some type of NT service having difficulty, although user mode programs can make calls to the Kernel mode
NT components to occasionally cause this type of performance issue.
Memory: Pages/sec. This value is often confused with Page Faults/sec. The Pages/sec counter is a combination of Pages Input/sec and Pages Output/
sec counters. Recall that Page Faults/sec is a combination of hard page faults and soft page faults. This counter, however, is a general indicator of how
often the system is using the hard drive to store or retrieve memory associated data.
http://technet.microsoft.com/en-us/library/cc768048.aspx
QUESTION 2
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1.
On Server1 the operating system Windows Server 2012 R2 is installed.
Check the RSoP of Server1. The effective settings are shown in the picture (click on the button drawing).
You must ensure that an entry is recorded in the event log when it is on Server1 created or deleted a local user account.
How do you proceed?
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-249.png)
You need to ensure that an entry is added to the event log whenever a local user account is created or deleted on Server1.
What should you do?
A. Change the settings of the audit policy in Group Policy Object (GPO) ServersGPO
B. On Server1, attach a task to the security log.
C. Add the System log on Server1 a task.
D. Change the settings of the Advanced Audit Policy Configuration in Group Policy Object (GPO) ServersGPO
What should you do?
A. Change the settings of the audit policy in Group Policy Object (GPO) ServersGPO
B. On Server1, attach a task to the security log.
C. Add the System log on Server1 a task.
D. Change the settings of the Advanced Audit Policy Configuration in Group Policy Object (GPO) ServersGPO
Correct Answer: A
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
NOTE2:
From the figure it is evident that the policy Audit account management is enabled only for failed attempts. Must be monitored in order to monitor the
creation and deletion of accounts also successful attempts of account management. Audit account management is determined whether all Account
Management events are monitored on a computer with this security setting. The account management events include:
A user account or user group is created, changed or deleted.
A user account is renamed, disabled or enabled.
A password is set or changed.
If you define this policy setting, you can specify whether success or failure can be monitored and specify that the event type is not monitored. Success
audits generate an audit entry is generated when any account management event succeeds. Failure audits generate an audit entry is generated when
any account management event fails. If you “No monitoring” want to set this value to, activate the dialog “Properties” for this policy setting check box
“Define these policy settings” and uncheck the checkbox “success” and “failure”.
Explanation:
When you use Advanced Audit Policy Configuration settings, you need to confirm that these settings are not overwritten by basic audit policy settings.
The following procedure shows how to prevent conflicts by blocking the application of any basic audit policy settings.
Enabling Advanced Audit Policy Configuration
Basic and advanced audit policy configurations should not be mixed. As such, it’s best practice to enable Audit: Force audit policy subcategory settings
(Windows Vista or later) to override audit policy category settings in Group Policy to make sure that basic auditing is disabled. The setting can be found
under Computer Configuration\Policies\Security Settings\Local Policies\Security Options, and sets the SCENoApplyLegacyAuditPolicy registry key to
prevent basic auditing being applied using Group Policy and the Local Security Policy MMC snap-in.
In Windows 7 and Windows Server 2008 R2, the number of audit settings for which success and failure can be tracked has increased to 53. Previously,
there were nine basic auditing settings under Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Audit Policy. These 53
new settings allow you to select only the behaviors that you want to monitor and exclude audit results for behaviors that are of little or no concern to you,
or behaviors that create an excessive number of log entries. In addition, because Windows 7 and Windows Server 2008 R2 security audit policy can be
applied by using domain Group Policy, audit policy settings can be modified, tested, and deployed to selected users and groups with relative simplicity.
Audit Policy settings
Any changes to user account and resource permissions.
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
NOTE2:
From the figure it is evident that the policy Audit account management is enabled only for failed attempts. Must be monitored in order to monitor the
creation and deletion of accounts also successful attempts of account management. Audit account management is determined whether all Account
Management events are monitored on a computer with this security setting. The account management events include:
A user account or user group is created, changed or deleted.
A user account is renamed, disabled or enabled.
A password is set or changed.
If you define this policy setting, you can specify whether success or failure can be monitored and specify that the event type is not monitored. Success
audits generate an audit entry is generated when any account management event succeeds. Failure audits generate an audit entry is generated when
any account management event fails. If you “No monitoring” want to set this value to, activate the dialog “Properties” for this policy setting check box
“Define these policy settings” and uncheck the checkbox “success” and “failure”.
Explanation:
When you use Advanced Audit Policy Configuration settings, you need to confirm that these settings are not overwritten by basic audit policy settings.
The following procedure shows how to prevent conflicts by blocking the application of any basic audit policy settings.
Enabling Advanced Audit Policy Configuration
Basic and advanced audit policy configurations should not be mixed. As such, it’s best practice to enable Audit: Force audit policy subcategory settings
(Windows Vista or later) to override audit policy category settings in Group Policy to make sure that basic auditing is disabled. The setting can be found
under Computer Configuration\Policies\Security Settings\Local Policies\Security Options, and sets the SCENoApplyLegacyAuditPolicy registry key to
prevent basic auditing being applied using Group Policy and the Local Security Policy MMC snap-in.
In Windows 7 and Windows Server 2008 R2, the number of audit settings for which success and failure can be tracked has increased to 53. Previously,
there were nine basic auditing settings under Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Audit Policy. These 53
new settings allow you to select only the behaviors that you want to monitor and exclude audit results for behaviors that are of little or no concern to you,
or behaviors that create an excessive number of log entries. In addition, because Windows 7 and Windows Server 2008 R2 security audit policy can be
applied by using domain Group Policy, audit policy settings can be modified, tested, and deployed to selected users and groups with relative simplicity.
Audit Policy settings
Any changes to user account and resource permissions.
Any failed attempts for user logon.
Any failed attempts for resource access.
Any modification to the system files.
Advanced Audit Configuration SettingsAudit compliance with important business-related and security-related rules by tracking precisely defined
activities, such as:
A group administrator has modified settings or data on servers that contain finance information.
An employee within a defined group has accessed an important file. The correct system access control list (SACL) is applied to every file and folder or
registry key on a computer or file share as a verifiable safeguard against undetected access.
In Servers GPO, modify the Audit Policy settings – enabling audit account management setting will generate events about account creation, deletion and
so on.
Advanced Audit Configuration SettingsAdvanced Audit Configuration Settings ->Audit Policy -> Account Management -> Audit User Account
Management
Any failed attempts for resource access.
Any modification to the system files.
Advanced Audit Configuration SettingsAudit compliance with important business-related and security-related rules by tracking precisely defined
activities, such as:
A group administrator has modified settings or data on servers that contain finance information.
An employee within a defined group has accessed an important file. The correct system access control list (SACL) is applied to every file and folder or
registry key on a computer or file share as a verifiable safeguard against undetected access.
In Servers GPO, modify the Audit Policy settings – enabling audit account management setting will generate events about account creation, deletion and
so on.
Advanced Audit Configuration SettingsAdvanced Audit Configuration Settings ->Audit Policy -> Account Management -> Audit User Account
Management
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-252.png)
In Servers GPO, modify the Audit Policy settings – enabling audit account management setting will generate events about account creation, deletion and so on.
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-254.png)
QUESTION 3
On a server with the operating system Windows Server 2012 R2, you can uninstall the graphical shell for servers and get a server with minimal server
user interface.
The user interface is similar to a minimal server installation Server with complete graphical user interface. Some features are missing,
however.
On a server with the operating system Windows Server 2012 R2, you can uninstall the graphical shell for servers and get a server with minimal server
user interface.
The user interface is similar to a minimal server installation Server with complete graphical user interface. Some features are missing,
however.
Which of the following features missing?
A. Microsoft Management Console (MMC)
B. Windows Explorer
C. Subset of the Control Panel
D. Server Manager
Correct Answer: B
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Notes:
In Windows Ser1ver 2012, you can remove the server graphic shell, resulting in the “Minimal Server Interface”. This is similar to a server installation with
a graphical user interface, but Internet Explorer 10, the Windows Explorer, the desktop and the Start screen are not installed.
The Microsoft Management Console (MMC), Server Manager, and a subset of the control panel are still available. If you start with a server installation
with a graphical user interface, you can switch at any time using the Server Manager to minimum server user.
QUESTION 4
Your corporate network includes an Active Directory Domain Services (AD DS) domain named contoso.com .
The domain contains a Windows Server 2012 R2 computer that is named Server1.
On Server1 the role Windows Server Update Services is installed.
You want to use a Group Policy object (GPO) to assign members of a computer group. Which settings you will configure?
A. Microsoft Management Console (MMC)
B. Windows Explorer
C. Subset of the Control Panel
D. Server Manager
Correct Answer: B
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Notes:
In Windows Ser1ver 2012, you can remove the server graphic shell, resulting in the “Minimal Server Interface”. This is similar to a server installation with
a graphical user interface, but Internet Explorer 10, the Windows Explorer, the desktop and the Start screen are not installed.
The Microsoft Management Console (MMC), Server Manager, and a subset of the control panel are still available. If you start with a server installation
with a graphical user interface, you can switch at any time using the Server Manager to minimum server user.
QUESTION 4
Your corporate network includes an Active Directory Domain Services (AD DS) domain named contoso.com .
The domain contains a Windows Server 2012 R2 computer that is named Server1.
On Server1 the role Windows Server Update Services is installed.
You want to use a Group Policy object (GPO) to assign members of a computer group. Which settings you will configure?
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-256.png)
A. Configure Automatic Updates
B. Specify intranet Microsoft update service
C. Enable Software Notifications
D. Enable recommended updates via Automatic Updates
E. Enable Client-side targeting
F. Allow signed updates from an intranet Microsoft update service location
Correct Answer: E
Section: 6. Configure and manage Group Policy
Explanation
Explanation/Reference:
Notes:
Computer can either manually or using the policy setting Client-side target association enable to computer groups of the Windows Server Update
Services can be added.
The Directive Enable Client-side target mapping indicates the target group name or the name that will be used to receive updates from Microsoft
Update Service on the intranet .
If the status to “Enabled” is set, the specified target group information to the Microsoft Update service will be sent on the intranet. This uses this
information to determine which updates will be made available on the computer.
If the Microsoft update service location on the intranet supports multiple audiences, multiple, semicolon-separated group names can be specified by this
Directive. Otherwise, a single group must be specified.
If the status is set to “Disabled” or “Not Configured”, no target group information to the Microsoft Update service will be sent on the intranet.
Note:
This policy applies only when the Microsoft Update service on the intranet, which this Computer use is configured to support client-side target allocation.
This policy has no effect when the policy is “intranet specify for Microsoft update service location” is disabled or not configured.
This policy is not supported on Windows RT. Enabling this policy on PCs running Windows RT runs has no effect.
B. Specify intranet Microsoft update service
C. Enable Software Notifications
D. Enable recommended updates via Automatic Updates
E. Enable Client-side targeting
F. Allow signed updates from an intranet Microsoft update service location
Correct Answer: E
Section: 6. Configure and manage Group Policy
Explanation
Explanation/Reference:
Notes:
Computer can either manually or using the policy setting Client-side target association enable to computer groups of the Windows Server Update
Services can be added.
The Directive Enable Client-side target mapping indicates the target group name or the name that will be used to receive updates from Microsoft
Update Service on the intranet .
If the status to “Enabled” is set, the specified target group information to the Microsoft Update service will be sent on the intranet. This uses this
information to determine which updates will be made available on the computer.
If the Microsoft update service location on the intranet supports multiple audiences, multiple, semicolon-separated group names can be specified by this
Directive. Otherwise, a single group must be specified.
If the status is set to “Disabled” or “Not Configured”, no target group information to the Microsoft Update service will be sent on the intranet.
Note:
This policy applies only when the Microsoft Update service on the intranet, which this Computer use is configured to support client-side target allocation.
This policy has no effect when the policy is “intranet specify for Microsoft update service location” is disabled or not configured.
This policy is not supported on Windows RT. Enabling this policy on PCs running Windows RT runs has no effect.
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-258.png)
QUESTION 5
Server1 download update from microsoft update. You have Server2 that must syncronize update from Server1. Have firewall separate between Server1
and Server2.
Which port should to open on Server2 to syncronize ?
A. 80
B. 443
C. 3389
D. 8530
Correct Answer: D
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
http://mcsa.freeforums.net/thread/41/question-forumshttp://mcsa.freeforums.net/thread/41/question-forums)
QUESTION 6
Your corporate network includes an Active Directory Domain Services (AD DS) domain certbase.de named.
On all domain controllers running Windows Server 2012 R2 is installed.
A support technician installed at an outdoor location Windows Server 2012 R2 on a server named DC10. DC10 is currently a member of a workgroup.
You plan DC10 to a read-only domain controller (RODC) to change or “elevate”.
You must ensure that a user can promoted to a read-only domain controller with the username contoso\Tom DC10.
Your solution must the permissions that are granted to Tom, minimize. How do you proceed?
A. Use the command-line tool Ntdsutil.exe and run the command Local Roles from.
B. Use Active Directory Users and Computers and create an account for a read-only domain controller.
C. Use the console Active Directory Users and Computers, and then run the wizard for assigning object management for container Domain Controllers
from.
D. Take DC10 to the domain. And you change the properties of the computer account of DC10.
Correct Answer: B
Section: 5. Configure and manage Active Directory
Explanation
Server1 download update from microsoft update. You have Server2 that must syncronize update from Server1. Have firewall separate between Server1
and Server2.
Which port should to open on Server2 to syncronize ?
A. 80
B. 443
C. 3389
D. 8530
Correct Answer: D
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
http://mcsa.freeforums.net/thread/41/question-forumshttp://mcsa.freeforums.net/thread/41/question-forums)
QUESTION 6
Your corporate network includes an Active Directory Domain Services (AD DS) domain certbase.de named.
On all domain controllers running Windows Server 2012 R2 is installed.
A support technician installed at an outdoor location Windows Server 2012 R2 on a server named DC10. DC10 is currently a member of a workgroup.
You plan DC10 to a read-only domain controller (RODC) to change or “elevate”.
You must ensure that a user can promoted to a read-only domain controller with the username contoso\Tom DC10.
Your solution must the permissions that are granted to Tom, minimize. How do you proceed?
A. Use the command-line tool Ntdsutil.exe and run the command Local Roles from.
B. Use Active Directory Users and Computers and create an account for a read-only domain controller.
C. Use the console Active Directory Users and Computers, and then run the wizard for assigning object management for container Domain Controllers
from.
D. Take DC10 to the domain. And you change the properties of the computer account of DC10.
Correct Answer: B
Section: 5. Configure and manage Active Directory
Explanation
Explanation/Reference:
Remarks:
Use the context menu of the container domain controller you can access an assistant for a preliminary deployment of an account for a read-only domain
controller. The wizard asks the name of the RODC, the destination site and the user account of a person from whom the permissions are delegated to
install the read-only domain controller. The figure shows the relevant page of the wizard:
QUESTION 7
You are working as a network administrator for the company contoso. Your network includes a Windows Server 2012 R2 computer that is named
Server1. To install the role file / storage services on Server1.
You use the Windows Explorer and open the properties of a folder named documents1.
They note that the register classification is missing.
You must ensure that you can use Windows Explorer to assign the folder manually documents1 classifications.
How do you proceed?
A. Configure the Folder Options and uncheck the option (Recommended) Sharing Wizard.
B. Install the role service Resource Manager file server.
C. Configure the Folder Options and uncheck Hide protected operating system files (Recommended).
D. Install the Role Management Tool tools for sharing and Memory management.
Correct Answer: B
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Notes:
The Resource Manager
File Server provides a number of features for managing and classifying data stored on file servers data. The Resource Manager File Server includes the
following features:
File Classification Infrastructure Provides an insight into your data, which facilitate more efficient data management is made possible by automating
classification processes. You can classify files and apply policies based on this classification. Example policies include dynamic access control for
restricting file access, file encryption and file expiration. Files can be automatically classified based on file classification rules or manually by changing
the properties of a selected file or folder.
File Management Tasks
Apply a conditional policy or action for files based on their classification. Among the conditions of a file management task include the file location, the
classification properties, the creation date of the file, the date the file was last modified or the date the file was last accessed. Among the possible
Remarks:
Use the context menu of the container domain controller you can access an assistant for a preliminary deployment of an account for a read-only domain
controller. The wizard asks the name of the RODC, the destination site and the user account of a person from whom the permissions are delegated to
install the read-only domain controller. The figure shows the relevant page of the wizard:
QUESTION 7
You are working as a network administrator for the company contoso. Your network includes a Windows Server 2012 R2 computer that is named
Server1. To install the role file / storage services on Server1.
You use the Windows Explorer and open the properties of a folder named documents1.
They note that the register classification is missing.
You must ensure that you can use Windows Explorer to assign the folder manually documents1 classifications.
How do you proceed?
A. Configure the Folder Options and uncheck the option (Recommended) Sharing Wizard.
B. Install the role service Resource Manager file server.
C. Configure the Folder Options and uncheck Hide protected operating system files (Recommended).
D. Install the Role Management Tool tools for sharing and Memory management.
Correct Answer: B
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Notes:
The Resource Manager
File Server provides a number of features for managing and classifying data stored on file servers data. The Resource Manager File Server includes the
following features:
File Classification Infrastructure Provides an insight into your data, which facilitate more efficient data management is made possible by automating
classification processes. You can classify files and apply policies based on this classification. Example policies include dynamic access control for
restricting file access, file encryption and file expiration. Files can be automatically classified based on file classification rules or manually by changing
the properties of a selected file or folder.
File Management Tasks
Apply a conditional policy or action for files based on their classification. Among the conditions of a file management task include the file location, the
classification properties, the creation date of the file, the date the file was last modified or the date the file was last accessed. Among the possible
actions for a file management task includes the ability to run off of files, to encrypt files or to execute a custom command.
Quota Management
Limit the allowed for a volume or folder location, and can be automatically applied to new folders that are created on a volume. You can also define
quota templates that can be applied to new volumes or folders.
File Screening Management
Controls the types of files that users can save on a file server. You can restrict the extensions that can be stored on the file share. For example you can
create a file screen, which prevents files are saved with the extension MP3 in personal shared folders on a file server.
Storage Reports
Identify trends in disk usage and the way in which the data are classified. Storage Reports also monitor attempts to selected user groups to save
unauthorized files.
The features of the File Server Resource Manager can be configured and managed with the MMC Resource Manager File Server or with Windows
PowerShell.
QUESTION 8
Your corporate network includes an Active Directory Domain Services (AD DS) domain named contoso.
The domain contains a Windows Server 2012 R2 member server named Server1.
On Server1 role service Resource Manager is installed on the file server.
You need to configure Server1 to the following requirements:
Old files that are located in a folder named Folder1, must be moved to a folder named Archiv1.
All reports must be stored in a network share.
Configure Which two nodes?
(To be configured dialog box shown in the picture. Click the Drawing button.)
Quota Management
Limit the allowed for a volume or folder location, and can be automatically applied to new folders that are created on a volume. You can also define
quota templates that can be applied to new volumes or folders.
File Screening Management
Controls the types of files that users can save on a file server. You can restrict the extensions that can be stored on the file share. For example you can
create a file screen, which prevents files are saved with the extension MP3 in personal shared folders on a file server.
Storage Reports
Identify trends in disk usage and the way in which the data are classified. Storage Reports also monitor attempts to selected user groups to save
unauthorized files.
The features of the File Server Resource Manager can be configured and managed with the MMC Resource Manager File Server or with Windows
PowerShell.
QUESTION 8
Your corporate network includes an Active Directory Domain Services (AD DS) domain named contoso.
The domain contains a Windows Server 2012 R2 member server named Server1.
On Server1 role service Resource Manager is installed on the file server.
You need to configure Server1 to the following requirements:
Old files that are located in a folder named Folder1, must be moved to a folder named Archiv1.
All reports must be stored in a network share.
Configure Which two nodes?
(To be configured dialog box shown in the picture. Click the Drawing button.)
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-260.png)
A. Resource Manager File Server (locally)
B. Quotas
C. File Screens
D. Storage Reports Management
E. Classification rules
F. File management tasks
Correct Answer: AF
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Notes:
B. Quotas
C. File Screens
D. Storage Reports Management
E. Classification rules
F. File management tasks
Correct Answer: AF
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Notes:
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-262.png)
For moving old files a file management task can be type file sequence are created. The locations for reports on the roster report locations are
configured in the Options for the Resource Manager file server. By default, the reports are stored in a local directory.
QUESTION 9
You are working as a server administrator for the company Contoso. You administer a Windows Server 2012 R2 Server Core computer named Server1.
Server1 is used as a file server.
You must ensure that users register previous versions can use to access previous versions of files.
Which tool will you use?
A. Wbadmin
B. Diskpart
C. Storrept
D. Vssadmin
Correct Answer:
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Notes:
configured in the Options for the Resource Manager file server. By default, the reports are stored in a local directory.
QUESTION 9
You are working as a server administrator for the company Contoso. You administer a Windows Server 2012 R2 Server Core computer named Server1.
Server1 is used as a file server.
You must ensure that users register previous versions can use to access previous versions of files.
Which tool will you use?
A. Wbadmin
B. Diskpart
C. Storrept
D. Vssadmin
Correct Answer:
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
Notes:
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-264.png)
With previous versions, you can access previous versions of files and folders that are shared on your network. This can be accessed on previous
versions of files, must “Shadow Copies of Shared Folders” is enabled on the file server. Previous versions are read-only until the restoration. A previous
version of the file on the server can not be changed. Calling an earlier version of a file
Locate the file (on the network), from which you want to view an earlier version, you click with the right mouse button, and select Properties.
On the Previous Versions tab, select the desired version, and click Open.
In a full installation of Windows Server 2012 R2, you can enable earlier versions of the properties of the volume.
A Server Core version, you can use the administrative command-line tool of the Volume Shadow Copy Service (Vssadmin). To enable Shadow Copies
of Volume D and to save on volume E example, you can run the following command:
Vssadmin Add ShadowStorage /for=d: /on=e: /maxsize=2GB
QUESTION 10
Your company network includes a Windows Server 2012 R2 computer that is named Server1.
The disk configuration of Server1 is shown in the picture (click on the button drawing).
versions of files, must “Shadow Copies of Shared Folders” is enabled on the file server. Previous versions are read-only until the restoration. A previous
version of the file on the server can not be changed. Calling an earlier version of a file
Locate the file (on the network), from which you want to view an earlier version, you click with the right mouse button, and select Properties.
On the Previous Versions tab, select the desired version, and click Open.
In a full installation of Windows Server 2012 R2, you can enable earlier versions of the properties of the volume.
A Server Core version, you can use the administrative command-line tool of the Volume Shadow Copy Service (Vssadmin). To enable Shadow Copies
of Volume D and to save on volume E example, you can run the following command:
Vssadmin Add ShadowStorage /for=d: /on=e: /maxsize=2GB
QUESTION 10
Your company network includes a Windows Server 2012 R2 computer that is named Server1.
The disk configuration of Server1 is shown in the picture (click on the button drawing).
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-267.png)
You must create a volume, user data can be stored on up to 3 TB. Your solution must ensure that the files remain available even if one disk in the
volume.
What will you create?
A. A storage pool disk 2 and disk. 3
B. A mirrored volume on disk 2 and disk. 3
C. A spanned volume on disk 0 and disk. 4
D. A mirrored volume on disk 1 and disk. 4
E. A RAID-5 volume on disk 1, Disk 2 and Disk. 3
Correct Answer: B
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Notes:
Basic disks contain basic volumes, such as primary partitions and logical volumes on extended partitions. Dynamic disks are for creating volumes with
advanced features required. We can use Disk 2 and Disk 3 to create a mirrored volume with a size of 3 TB.
Note : Dynamic disks can not be used for storage pools.
google translate
QUESTION 11
Your corporate network includes two Active Directory Domain Services (AD DS) domains. contoso.com
The names of the domains loud and traincert.com.
volume.
What will you create?
A. A storage pool disk 2 and disk. 3
B. A mirrored volume on disk 2 and disk. 3
C. A spanned volume on disk 0 and disk. 4
D. A mirrored volume on disk 1 and disk. 4
E. A RAID-5 volume on disk 1, Disk 2 and Disk. 3
Correct Answer: B
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Notes:
Basic disks contain basic volumes, such as primary partitions and logical volumes on extended partitions. Dynamic disks are for creating volumes with
advanced features required. We can use Disk 2 and Disk 3 to create a mirrored volume with a size of 3 TB.
Note : Dynamic disks can not be used for storage pools.
google translate
QUESTION 11
Your corporate network includes two Active Directory Domain Services (AD DS) domains. contoso.com
The names of the domains loud and traincert.com.
You administer a Windows Server 2012 R2 computer that is named Server1. On Server1, the DNS server role is installed.
The server hosting a copy of the zone contoso.com.
You need to configure Server1 traincert.de for the resolution of the name of the zone. Your solution must meet the following requirements:
It must be avoided that the configuration of the name servers of the zone traincert.de must be adapted when it changes.
The administrative expenses for the maintenance and care of your solution should turn out as low as possible.
What type of zone you are using?
A. A primary zone
B. A secondary zone
C. A reverse lookup zone
D. A stub zone
Correct Answer: D
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Notes:
Stub zones contain only name server records (NS) and its host (A) records. The DNS client can retrieve a list of authorized name servers on the stub
zone. The host changes (A) entry of a name server is a stub zone (as opposed to a delegated zone) automatically updated. There are no manual steps
to adapt the Domain Name System (DNS) is required.
QUESTION 12
The Domain Name System (DNS) supports numerous types of entries.
Which listing type associates a domain name, such as www.google.com, with an IP address?
A. A
B. CNAME
C. MX
D. PTR
Correct Answer: A
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
The server hosting a copy of the zone contoso.com.
You need to configure Server1 traincert.de for the resolution of the name of the zone. Your solution must meet the following requirements:
It must be avoided that the configuration of the name servers of the zone traincert.de must be adapted when it changes.
The administrative expenses for the maintenance and care of your solution should turn out as low as possible.
What type of zone you are using?
A. A primary zone
B. A secondary zone
C. A reverse lookup zone
D. A stub zone
Correct Answer: D
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Notes:
Stub zones contain only name server records (NS) and its host (A) records. The DNS client can retrieve a list of authorized name servers on the stub
zone. The host changes (A) entry of a name server is a stub zone (as opposed to a delegated zone) automatically updated. There are no manual steps
to adapt the Domain Name System (DNS) is required.
QUESTION 12
The Domain Name System (DNS) supports numerous types of entries.
Which listing type associates a domain name, such as www.google.com, with an IP address?
A. A
B. CNAME
C. MX
D. PTR
Correct Answer: A
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Notes:
domains are managed through a worldwide system of domain registrars and databases. The DNS (Domain Name System) provides mappings between
human-readable computer hostnames and the IP addresses used by the network devices. Basic knowledge of DNS and domain registrars help
administrators manage domains. Domain names are used in URLs and e-mail addresses that are associated with one or more IP addresses. Domain
names consist of several levels. For example, the domain name “mail.contoso.com” for the following three levels:
.com is the top-level domain.
contoso is the second-level domain.
mail is the third level domain.
Understanding DNS record types and functions
DNS records are used to route traffic from one and a domain. These entries a domain name of a specific IP address is assigned. The following
commonly used DNS records and their functions are listed:
Name Server Entry
Specifies which name servers are used as the authoritative name server for a given domain. DNS information can be temporarily stored on multiple
name servers, after the non-authoritative name server caches contact but the authoritative name server to obtain updated information about a domain.
A record (address entry) assigns a domain name to an IP address.
CNAME
record (Alias or canonical name) Specifies that it is the domain name is an alias of another canonical domain name. When hit by a name server for a
domain and a CNAME record is found, the first domain name is replaced with the CNAME and then looks for the new name.
MX record
(mail exchanger) Specifies the server are routed to the e-mails. The entry also contains a priority field so that e-mail messages can be sent in the
prescribed sequence to multiple servers.
SPF
(Sender Policy Framework) A verification system for e-mail, which was developed to prevent e-mail spoofing and phishing-.
SRV
record (service record) Specifies information about available services. SRV records are used by some Microsoft cloud services such as Lync Online and
Exchange Online, for coordinating the flow of information between different services.
QUESTION 13
Your company uses an Active Directory forest named certbase.de. On all server computers Windows Server 2012 R2 is installed. The domain contains
four servers.
The configuration of four server is shown in the picture (click on the button drawing).
domains are managed through a worldwide system of domain registrars and databases. The DNS (Domain Name System) provides mappings between
human-readable computer hostnames and the IP addresses used by the network devices. Basic knowledge of DNS and domain registrars help
administrators manage domains. Domain names are used in URLs and e-mail addresses that are associated with one or more IP addresses. Domain
names consist of several levels. For example, the domain name “mail.contoso.com” for the following three levels:
.com is the top-level domain.
contoso is the second-level domain.
mail is the third level domain.
Understanding DNS record types and functions
DNS records are used to route traffic from one and a domain. These entries a domain name of a specific IP address is assigned. The following
commonly used DNS records and their functions are listed:
Name Server Entry
Specifies which name servers are used as the authoritative name server for a given domain. DNS information can be temporarily stored on multiple
name servers, after the non-authoritative name server caches contact but the authoritative name server to obtain updated information about a domain.
A record (address entry) assigns a domain name to an IP address.
CNAME
record (Alias or canonical name) Specifies that it is the domain name is an alias of another canonical domain name. When hit by a name server for a
domain and a CNAME record is found, the first domain name is replaced with the CNAME and then looks for the new name.
MX record
(mail exchanger) Specifies the server are routed to the e-mails. The entry also contains a priority field so that e-mail messages can be sent in the
prescribed sequence to multiple servers.
SPF
(Sender Policy Framework) A verification system for e-mail, which was developed to prevent e-mail spoofing and phishing-.
SRV
record (service record) Specifies information about available services. SRV records are used by some Microsoft cloud services such as Lync Online and
Exchange Online, for coordinating the flow of information between different services.
QUESTION 13
Your company uses an Active Directory forest named certbase.de. On all server computers Windows Server 2012 R2 is installed. The domain contains
four servers.
The configuration of four server is shown in the picture (click on the button drawing).
You want to implement the IP address management (IPAM) for the management of the DNS and the DHCP server.
On what server you install the feature IP address management?
On what server you install the feature IP address management?
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-268.png)
A. Server1
B. Server2
C. Server3
D. Server4
Correct Answer: D
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Notes:
The detection range for IPAM server is limited to a single Active Directory forest. The overall structure can be made up of trusted and untrusted domains.
IPAM requires membership in an Active Directory domain and a functional network infrastructure environment to integrate with existing DHCP, DNS,
Domain Controller and Network Policy Server installations in the forest can. IPAM can not be installed on a domain controller.Apply IPAM the
following additional specifications:
B. Server2
C. Server3
D. Server4
Correct Answer: D
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Notes:
The detection range for IPAM server is limited to a single Active Directory forest. The overall structure can be made up of trusted and untrusted domains.
IPAM requires membership in an Active Directory domain and a functional network infrastructure environment to integrate with existing DHCP, DNS,
Domain Controller and Network Policy Server installations in the forest can. IPAM can not be installed on a domain controller.Apply IPAM the
following additional specifications:
IPAM supports only Microsoft DHCP, DNS, Domain Controller and Network Policy Server on Windows Server 2008 and later.
IPAM supports only one domain associated servers in a single Active Directory forest.
A single IPAM server can support up to 150 DHCP servers and 500 DNS servers.
A single IPAM server can support up to 6000 DHCP scopes and 150 DNS zones.
IPAM stores forensic data (IP address leases, host MAC addresses, login and logout information of users) for 100,000 users for 3 years in a Windows
Internal Database. A policy for the deletion of data from the database is not included; the administrator must manually delete the data when needed.
IPAM does not support management and configuration of network elements (WINS, DHCP relay or proxy) other providers as Microsoft.
IPAM supports only Windows Internal Database. External databases are not supported.
IP address utilization trends are provided only for IPv4 available.
The redemption of IP addresses is available only for IPv4 available.
For automatic configuration stateless IPv6 addresses with private extensions no special processing is performed.
For virtualization technology or migration of the virtual machine, no special processing is performed.
IPAM does not check the consistency of IP addresses to routers and switches.
IPAM does not support Überrwachung of IPv6 addresses (automatic configuration stateless addresses) to track users on unmanaged computers.
QUESTION 14
Your company network includes a router with the name Router1. Router1 provides access to the Internet.
You use a Windows Server 2012 R2 computer that is named Server1. Server1 used Router1 as the default gateway.
One of your colleagues take a new router with the name Router2 in operation. Router2 also provides access to the Internet.
The internal interface of Router2 is configured with the IP address 10.1.14.254.
You need to configure Server1 so that Router2 is used for connections to Internet resources when Router1 fails.
What step to run on Server1?
A. Create a route to network 10.1.14.0/24. Enter the IP address 10.1.14.254 as a gateway for the route and set the metric of the route with 500 fixed.
IPAM supports only one domain associated servers in a single Active Directory forest.
A single IPAM server can support up to 150 DHCP servers and 500 DNS servers.
A single IPAM server can support up to 6000 DHCP scopes and 150 DNS zones.
IPAM stores forensic data (IP address leases, host MAC addresses, login and logout information of users) for 100,000 users for 3 years in a Windows
Internal Database. A policy for the deletion of data from the database is not included; the administrator must manually delete the data when needed.
IPAM does not support management and configuration of network elements (WINS, DHCP relay or proxy) other providers as Microsoft.
IPAM supports only Windows Internal Database. External databases are not supported.
IP address utilization trends are provided only for IPv4 available.
The redemption of IP addresses is available only for IPv4 available.
For automatic configuration stateless IPv6 addresses with private extensions no special processing is performed.
For virtualization technology or migration of the virtual machine, no special processing is performed.
IPAM does not check the consistency of IP addresses to routers and switches.
IPAM does not support Überrwachung of IPv6 addresses (automatic configuration stateless addresses) to track users on unmanaged computers.
QUESTION 14
Your company network includes a router with the name Router1. Router1 provides access to the Internet.
You use a Windows Server 2012 R2 computer that is named Server1. Server1 used Router1 as the default gateway.
One of your colleagues take a new router with the name Router2 in operation. Router2 also provides access to the Internet.
The internal interface of Router2 is configured with the IP address 10.1.14.254.
You need to configure Server1 so that Router2 is used for connections to Internet resources when Router1 fails.
What step to run on Server1?
A. Create a route to network 10.1.14.0/24. Enter the IP address 10.1.14.254 as a gateway for the route and set the metric of the route with 500 fixed.
B. Add the IP address 10.1.14.254 as the default gateway added and set the metric of the route with 500 fixed.
C. Create a route to network 10.1.14.0/24. Enter the IP address 10.1.14.254 as a gateway for the route and set the metric of the route with 1 fixed.
D. Add the IP address 10.1.14.254 as the default gateway added and set the metric of the route with 1 fixed.
Correct Answer: B
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
C. Create a route to network 10.1.14.0/24. Enter the IP address 10.1.14.254 as a gateway for the route and set the metric of the route with 1 fixed.
D. Add the IP address 10.1.14.254 as the default gateway added and set the metric of the route with 1 fixed.
Correct Answer: B
Section: 3. Configure network services and access
Explanation
Explanation/Reference:
Notes:
The metric indicates the cost of a route. Existence to a destination several routes at different speeds, availability or connection costs, as can be done
with the metric to prioritize the route using. The higher the value of the metric of a route, the higher the costs and correspondingly lower the route is
prioritized. Since Windows XP Professional defaults automatically assigned to the metric based on the transmission rate. The interface metric is added
to the metric of a default gateway. The sum results in the effective metric of the resulting default route.
QUESTION 15
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The DNS zone is Active Directory-integrated
contoso.local and configured so that the zone data to all DNS servers running on domain controllers in the domain certbase.de replicated. Server1 is a
member server of the domain.
The IP address of Server1 is in the zone contoso.local registered.
You must determine when the DNS record of Server1 was last updated. In which Active Directory partition to see the DNS record of a
Server1?
(To be configured dialog box shown in the picture. Click the Drawing button.)
Hot Area:
The metric indicates the cost of a route. Existence to a destination several routes at different speeds, availability or connection costs, as can be done
with the metric to prioritize the route using. The higher the value of the metric of a route, the higher the costs and correspondingly lower the route is
prioritized. Since Windows XP Professional defaults automatically assigned to the metric based on the transmission rate. The interface metric is added
to the metric of a default gateway. The sum results in the effective metric of the resulting default route.
QUESTION 15
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The DNS zone is Active Directory-integrated
contoso.local and configured so that the zone data to all DNS servers running on domain controllers in the domain certbase.de replicated. Server1 is a
member server of the domain.
The IP address of Server1 is in the zone contoso.local registered.
You must determine when the DNS record of Server1 was last updated. In which Active Directory partition to see the DNS record of a
Server1?
(To be configured dialog box shown in the picture. Click the Drawing button.)
Hot Area:
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-270.png)
Correct Answer:![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-274.png)
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-274.png)
Section: 5. Configure and manage Active Directory
Explanation
Explanation/Reference:
created on: 16/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
In the task is mentioned that the zone data to all DNS servers running on domain controllers in the domain certbase.de replicated. The zone data is
consequently in the Active Directory partitionDomainDnsZones saved.
QUESTION 16
Your corporate network includes an Active Directory Domain Services (AD DS) domain certbase.de named.
Explanation
Explanation/Reference:
created on: 16/09/2015
Based on the actual exam and checked with an Premium account.
Notes:
In the task is mentioned that the zone data to all DNS servers running on domain controllers in the domain certbase.de replicated. The zone data is
consequently in the Active Directory partitionDomainDnsZones saved.
QUESTION 16
Your corporate network includes an Active Directory Domain Services (AD DS) domain certbase.de named.
You have a new Group Policy object (GPO) created to configure the Windows Update settings.
Currently the client computers are configured so that updates can be downloaded from the Microsoft Update servers gladen.
The users determine when the updates are installed.
To configure the client computer so that Windows updates are installed automatically.
Which policy will configure?
A. Enable Windows Update Power Management to reactivate the system to install scheduled updates automatically.
B. Configure Automatic Updates
C. Specify intranet Microsoft update service
D. Search frequency for automatic updates
E. Install Automatic Updates Immediately
F. Enable Client-side target allocation
Correct Answer: B
Section: 6. Configure and manage Group Policy
Explanation
Explanation/Reference:
Currently the client computers are configured so that updates can be downloaded from the Microsoft Update servers gladen.
The users determine when the updates are installed.
To configure the client computer so that Windows updates are installed automatically.
Which policy will configure?
A. Enable Windows Update Power Management to reactivate the system to install scheduled updates automatically.
B. Configure Automatic Updates
C. Specify intranet Microsoft update service
D. Search frequency for automatic updates
E. Install Automatic Updates Immediately
F. Enable Client-side target allocation
Correct Answer: B
Section: 6. Configure and manage Group Policy
Explanation
Explanation/Reference:
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-275.png)
Notes:
The policy Configure Automatic Updates. Specifies whether the computer receives security updates and other important downloads through the
Windows Automatic Updates service and when they are installed If the service is enabled, you must select in the Group Policy setting one of the
following four options :
2 = notify before downloading any updates and notify again before installation. If Windows detects updates that can be applied to the computer, an icon
in the status area with a message that informs you that updates are available for download. Clicking the icon or message, you can select to download
updates. The selected updates are then downloaded from Windows in the background. After downloading is complete, an icon in the status area again
displayed that informs you that the updates can be installed. When you click the icon or message, you can select the updates that you want to install.
Automatically download 3 = (default) updates and notify you of updates installable Windows checks for updates that can be applied to the computer,
and loads these automatically in the background without (the user is not notified during the process or disturbed). After downloading has been
completed, the status area, the icon is displayed, informing you that the updates can be installed. When you click the icon or message, you can select
the updates that you want to install.
Automatically download 4 = Updates and schedule that I specify install Specify the schedule using the options in the Group Policy setting. By default
installations are planned daily for 3 clock in the morning, if no timetable is given. The completion of the update installation, if a restart is required,
Windows will automatically restart the computer. (If a user is logged on to the computer when Windows is restarted, the user is notified and can delay
the restart.) Windows 8 and Windows RT: The option to specify the schedule in the Group Policy setting has no effect.
The planning option under “Computer Configuration” -> “Administrative Templates” -> “Windows Components” – specify> “Activation limit for
maintenance” -> “Maintenance Schedule”.
By default installations are planned during the standard maintenance window at 3 clock in the morning, if no timetable is given. To complete the
installation of security updates, if a restart is required, Windows automatically restarts the computer after the user has been notified of an impending
automatic restart in a given period. If a user is logged on to the computer and a potential state or data loss is present when Windows is restarted, the
restart is delayed until next unlock the computer by the user.
5 = places allow administrators to select the configuration mode for the update installation through Automatic Updates This option can be enabled with
local administrators, on the Control Panel icon “Automatic Updates” option to select a configuration. You can select a date for a planned installation
example itself. Local administrators will not be allowed to disable the configuration for “Automatic Updates”. If you want to use this setting, click “Enable”,
and then select one of the options (2, 3, 4 or 5). If you choose option 4, you can set a regular schedule (no schedule specifying all installations are
carried out by 3 clock in the morning every day). In Windows 8 and Windows RT, you can define “Activation limit for maintenance Computer
Configuration \ Administrative Templates \ Windows Components \ Maintenance Schedule \” the schedule below. If no schedule is specified, all
installations are carried out during the standard maintenance window at 3 clock in the morning.
QUESTION 17
The policy Configure Automatic Updates. Specifies whether the computer receives security updates and other important downloads through the
Windows Automatic Updates service and when they are installed If the service is enabled, you must select in the Group Policy setting one of the
following four options :
2 = notify before downloading any updates and notify again before installation. If Windows detects updates that can be applied to the computer, an icon
in the status area with a message that informs you that updates are available for download. Clicking the icon or message, you can select to download
updates. The selected updates are then downloaded from Windows in the background. After downloading is complete, an icon in the status area again
displayed that informs you that the updates can be installed. When you click the icon or message, you can select the updates that you want to install.
Automatically download 3 = (default) updates and notify you of updates installable Windows checks for updates that can be applied to the computer,
and loads these automatically in the background without (the user is not notified during the process or disturbed). After downloading has been
completed, the status area, the icon is displayed, informing you that the updates can be installed. When you click the icon or message, you can select
the updates that you want to install.
Automatically download 4 = Updates and schedule that I specify install Specify the schedule using the options in the Group Policy setting. By default
installations are planned daily for 3 clock in the morning, if no timetable is given. The completion of the update installation, if a restart is required,
Windows will automatically restart the computer. (If a user is logged on to the computer when Windows is restarted, the user is notified and can delay
the restart.) Windows 8 and Windows RT: The option to specify the schedule in the Group Policy setting has no effect.
The planning option under “Computer Configuration” -> “Administrative Templates” -> “Windows Components” – specify> “Activation limit for
maintenance” -> “Maintenance Schedule”.
By default installations are planned during the standard maintenance window at 3 clock in the morning, if no timetable is given. To complete the
installation of security updates, if a restart is required, Windows automatically restarts the computer after the user has been notified of an impending
automatic restart in a given period. If a user is logged on to the computer and a potential state or data loss is present when Windows is restarted, the
restart is delayed until next unlock the computer by the user.
5 = places allow administrators to select the configuration mode for the update installation through Automatic Updates This option can be enabled with
local administrators, on the Control Panel icon “Automatic Updates” option to select a configuration. You can select a date for a planned installation
example itself. Local administrators will not be allowed to disable the configuration for “Automatic Updates”. If you want to use this setting, click “Enable”,
and then select one of the options (2, 3, 4 or 5). If you choose option 4, you can set a regular schedule (no schedule specifying all installations are
carried out by 3 clock in the morning every day). In Windows 8 and Windows RT, you can define “Activation limit for maintenance Computer
Configuration \ Administrative Templates \ Windows Components \ Maintenance Schedule \” the schedule below. If no schedule is specified, all
installations are carried out during the standard maintenance window at 3 clock in the morning.
QUESTION 17
Your corporate network includes an Active Directory Domain Services (AD DS) domain certbase.de named.
The domain includes 10 servers on which the operating system is running Windows Server 2012 R2. You plan the BitLocker Drive Encryption
(BitLocker) to activate the operating system partitions on the file server.
You must configure policies for BitLocker Drive Encryption, the file server. Your configuration must meet the following requirements:
All file servers must use a PIN for the system start.
The BitLocker recovery key and the BitLocker recovery password must be stored in Active Directory.
To configure policy settings Which two?
(To be configured dialog box shown in the picture. Click the Drawing button.)
To configure policy settings_bitlocker (exhibit):
The domain includes 10 servers on which the operating system is running Windows Server 2012 R2. You plan the BitLocker Drive Encryption
(BitLocker) to activate the operating system partitions on the file server.
You must configure policies for BitLocker Drive Encryption, the file server. Your configuration must meet the following requirements:
All file servers must use a PIN for the system start.
The BitLocker recovery key and the BitLocker recovery password must be stored in Active Directory.
To configure policy settings Which two?
(To be configured dialog box shown in the picture. Click the Drawing button.)
To configure policy settings_bitlocker (exhibit):
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-277.png)
Choose how Bitlocker-protected os drives can be recovered (exhibit):![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-279.png)
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-279.png)
A. Allow Network unlock at startup
B. Require Additional authentication at startup
C. Allow enhanced PINs for startup
D. Configure use of passwords for operating system drives
E. Choose how Bitlocker-protected os drives can be recovered
F. Configure TPM platform validation profile for native UEFI firmware configurations
Correct Answer: BE
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
B. Require Additional authentication at startup
C. Allow enhanced PINs for startup
D. Configure use of passwords for operating system drives
E. Choose how Bitlocker-protected os drives can be recovered
F. Configure TPM platform validation profile for native UEFI firmware configurations
Correct Answer: BE
Section: 2. Configure file and print services
Explanation
Explanation/Reference:
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-280.png)
With the policy setting Additional authentication request at startup, you can configure whether BitLocker at every computer startup requires additional
authentication and you are using BitLocker with or without TPM (Trusted Platform Module). This policy setting is applied to enable BitLocker.
If you want to use BitLocker on a computer without a TPM, select the check box “Allow BitLocker without a compatible TPM”. In this mode, either a
password or a USB drive is required for the start. When using a startup key, the key information that is used to encrypt the drive is stored in the form of a
USB key to the USB drive. When the USB key is made available, the access to the drive is authenticated, and it can be accessed on the drive. When the
USB key is lost, is not available or you have forgotten your password, use one of the BitLocker recovery options to access the drive.
On a computer with a compatible TPM four authentication methods can be used to provide additional protection for encrypted data at startup. When the
computer starts, either only the TPM for authentication may be required, or there must be an additional USB flash drive connected with a startup key,
and a 4- to 20-digit personal identification number (PIN) to be entered, or both options may be required.
If you enable this policy setting, users can configure advanced startup options in the BitLocker Setup wizard.
If you disable this policy setting or do not configure, users can configure on computers with a TPM only basic options.
Note: If you want to force the use of a startup PIN and a USB flash drive, you need to configure BitLocker settings using the command-line tools
“manage-bde” and not via the Setup Wizard of BitLocker Drive Encryption.
authentication and you are using BitLocker with or without TPM (Trusted Platform Module). This policy setting is applied to enable BitLocker.
If you want to use BitLocker on a computer without a TPM, select the check box “Allow BitLocker without a compatible TPM”. In this mode, either a
password or a USB drive is required for the start. When using a startup key, the key information that is used to encrypt the drive is stored in the form of a
USB key to the USB drive. When the USB key is made available, the access to the drive is authenticated, and it can be accessed on the drive. When the
USB key is lost, is not available or you have forgotten your password, use one of the BitLocker recovery options to access the drive.
On a computer with a compatible TPM four authentication methods can be used to provide additional protection for encrypted data at startup. When the
computer starts, either only the TPM for authentication may be required, or there must be an additional USB flash drive connected with a startup key,
and a 4- to 20-digit personal identification number (PIN) to be entered, or both options may be required.
If you enable this policy setting, users can configure advanced startup options in the BitLocker Setup wizard.
If you disable this policy setting or do not configure, users can configure on computers with a TPM only basic options.
Note: If you want to force the use of a startup PIN and a USB flash drive, you need to configure BitLocker settings using the command-line tools
“manage-bde” and not via the Setup Wizard of BitLocker Drive Encryption.
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-281.png)
With the policy setting Choose how BitLocker-protected operating system drives can be recovered, you can control how BitLocker-protected operating
system drives can be recovered if no information is available to the required startup key. This policy setting is applied to enable BitLocker.
Select “Save BitLocker recovery information in Active Directory Domain Services” under from which BitLocker recovery information to be saved for
operating system drives in AD DS. Both the BitLocker recovery password and the key package in AD DS “back up the recovery password and key
package” Selecting saved. By storing the key packet data can be recovered from a physically damaged drive. If you select “Back up only recovery
password” the recovery password is stored in AD DS exclusively.
system drives can be recovered if no information is available to the required startup key. This policy setting is applied to enable BitLocker.
Select “Save BitLocker recovery information in Active Directory Domain Services” under from which BitLocker recovery information to be saved for
operating system drives in AD DS. Both the BitLocker recovery password and the key package in AD DS “back up the recovery password and key
package” Selecting saved. By storing the key packet data can be recovered from a physically damaged drive. If you select “Back up only recovery
password” the recovery password is stored in AD DS exclusively.
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-282.png)
QUESTION 18
Your corporate network includes an Active Directory Domain Services (AD DS) domain cblabs.de named. The domain contains two Windows Server
2012 R2 member server with the name Server3 and Server4.
Your manager wants to implement a centralized location where the system events of all servers in the domain can be collected.
One of your colleagues created on Server3 a collection initiated event subscription for Server4.
To determine that Server3 has received no events of Server4 and check the runtime status of the subscription.
The runtime status shows the following error: The value passed to a system call data area is too small.
You must ensure that the system events can be collected from Server4 on Server3.
What settings you will configure? (To be configured dialog box is shown in the picture. Click the Drawing button.)
Your corporate network includes an Active Directory Domain Services (AD DS) domain cblabs.de named. The domain contains two Windows Server
2012 R2 member server with the name Server3 and Server4.
Your manager wants to implement a centralized location where the system events of all servers in the domain can be collected.
One of your colleagues created on Server3 a collection initiated event subscription for Server4.
To determine that Server3 has received no events of Server4 and check the runtime status of the subscription.
The runtime status shows the following error: The value passed to a system call data area is too small.
You must ensure that the system events can be collected from Server4 on Server3.
What settings you will configure? (To be configured dialog box is shown in the picture. Click the Drawing button.)
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-283.png)
A. Target Protocol
B. Select Computer
C. Select events
D. Advanced
Correct Answer: C
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Notes:
The error message described above can occur if selected during Initials transfer too many events. To avoid the problem, the number of events for the
first transmission should be reduced by limiting the event categories. Once the initial merge is successfully completed, the selection of events can be
expanded again. There is a post in the Windows support forums, describing the error and correct it. See:
2008 R2: Forwarded events – data area passed to system call is too small
QUESTION 19
On all server computers running Windows Server 2012 R2 is installed. All client computers Windows 8 Enterprise is installed.
The domain contains two servers with the name DC1 and Server2. The configuration of the server is shown in the picture (click on the button drawing).
You are planning the implementation of Network Access Protection (NAP) in conjunction with the NAP enforcement for IPsec communications.
You have a Group Policy object (GPO) is configured with the name GPO1 to apply trusted server groups on the client computer.
You have to make sure to that the client computer HRA Server (Health Registration Authority, HRA) Automatically detect.
What three steps you will perform? ( Each correct answer presents part of the solution. Choose three.)
B. Select Computer
C. Select events
D. Advanced
Correct Answer: C
Section: 1. Deploy and manage server images
Explanation
Explanation/Reference:
Notes:
The error message described above can occur if selected during Initials transfer too many events. To avoid the problem, the number of events for the
first transmission should be reduced by limiting the event categories. Once the initial merge is successfully completed, the selection of events can be
expanded again. There is a post in the Windows support forums, describing the error and correct it. See:
2008 R2: Forwarded events – data area passed to system call is too small
QUESTION 19
On all server computers running Windows Server 2012 R2 is installed. All client computers Windows 8 Enterprise is installed.
The domain contains two servers with the name DC1 and Server2. The configuration of the server is shown in the picture (click on the button drawing).
You are planning the implementation of Network Access Protection (NAP) in conjunction with the NAP enforcement for IPsec communications.
You have a Group Policy object (GPO) is configured with the name GPO1 to apply trusted server groups on the client computer.
You have to make sure to that the client computer HRA Server (Health Registration Authority, HRA) Automatically detect.
What three steps you will perform? ( Each correct answer presents part of the solution. Choose three.)
![NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE NEW! 70-411 EXAM] MICROSOFT.BRAINDUMPS.BY.SACRIESTORY_AIKONFX.383Q EXAM D PART1 (1-20) VCE DUMPS FOR FREE DOWNLOAD WITH 100%PASS ENSURE](http://www.hotitexam.com/wp-content/uploads/2016/08/image-284.png)
A. Create an entry for DC1 on the Service Location (SRV).
B. Configure the registry key EnableDiscovery on Server2.
C. Configure the registry key EnableDiscovery on all client computers.
D. Change the request policy of the NAP Client Configuration in GPO1.
E. Create on DC1 an alias (CNAME) record.
Correct Answer: ACD
Section: 5. Configure and manage Active Directory
Explanation
Explanation/Reference:
Notes:
The HRA (Health Registration Authority, HRA) is a NAP component that issues health certificates to clients that pass the health policy verification. This
test is performed by NPS using the client SoH (Statement of Health). HRA is used only with the NAP IPsec enforcement. For the automatic
determination of the HRA, the following requirements apply:
On the client computers at least Windows XP Service Pack 3 (SP3) must be installed.
The HRA server must have a valid Secure Socket Layer (SSL) certificate.
In the NAP client computers, the registry key must EnableDiscovery be configured.
In DNS, a service identification entry (SRV) must be configured for the HRA server.
The configuration of settings Trusted server groups must be in the local policy or the GPO used reset.
B. Configure the registry key EnableDiscovery on Server2.
C. Configure the registry key EnableDiscovery on all client computers.
D. Change the request policy of the NAP Client Configuration in GPO1.
E. Create on DC1 an alias (CNAME) record.
Correct Answer: ACD
Section: 5. Configure and manage Active Directory
Explanation
Explanation/Reference:
Notes:
The HRA (Health Registration Authority, HRA) is a NAP component that issues health certificates to clients that pass the health policy verification. This
test is performed by NPS using the client SoH (Statement of Health). HRA is used only with the NAP IPsec enforcement. For the automatic
determination of the HRA, the following requirements apply:
On the client computers at least Windows XP Service Pack 3 (SP3) must be installed.
The HRA server must have a valid Secure Socket Layer (SSL) certificate.
In the NAP client computers, the registry key must EnableDiscovery be configured.
In DNS, a service identification entry (SRV) must be configured for the HRA server.
The configuration of settings Trusted server groups must be in the local policy or the GPO used reset.
For more information, see the TechNet article Configure HRA Automatic Discovery at the following URL
http://technet.microsoft.com/en-us/library/dd296901(v=ws.10).aspx
QUESTION 20
Your network contains an Active Directory domain named contoso.com. The domain contains a RADIUS server named Server1 that runs Windows
Server 2012 R2.
You add a VPN server named Server2 to the network.
On Server1, you create several network policies for VPN users.
You need to configure Server1 to accept authentication requests from Server2.
Which tool should you use on Server1?
A. The Set-Remote Access radius
B. Routing and Remote Access
C. The console NPS
D. Connection Manager Administration Kit (CMAK)
Correct Answer: C
Section: 4. Configure a Network Policy Server infrastructure
Explanation
Explanation/Reference:
Notes:
To NPS (Network Policy Server, NPS) as a RADIUS server, RADIUS proxy, or NAP policy server (Network Access Protection, Network Access
Protection) to provide, you must configure RADIUS clients in NPS. Examples of network access servers or devices that are as RADIUS clients can be
configured:
Network access servers that provide remote access connectivity for an organization’s network or the Internet. An example would be a computer running
Windows Server 2008, the Routing and Remote Access service is running and provides the an organization’s intranet traditional dial-up or VPN remote
access services.
Wireless access points, allowing at the physical level using wireless transmission and reception technologies access to an organization’s network.
Switches that enable on a physical level, using traditional LAN technologies (eg. B. Ethernet) access to an organization’s network.
RADIUS proxies that forward connection requests to RADIUS servers that are members of a remote RADIUS server group that is configured on the RADIUS proxy.
http://technet.microsoft.com/en-us/library/dd296901(v=ws.10).aspx
QUESTION 20
Your network contains an Active Directory domain named contoso.com. The domain contains a RADIUS server named Server1 that runs Windows
Server 2012 R2.
You add a VPN server named Server2 to the network.
On Server1, you create several network policies for VPN users.
You need to configure Server1 to accept authentication requests from Server2.
Which tool should you use on Server1?
A. The Set-Remote Access radius
B. Routing and Remote Access
C. The console NPS
D. Connection Manager Administration Kit (CMAK)
Correct Answer: C
Section: 4. Configure a Network Policy Server infrastructure
Explanation
Explanation/Reference:
Notes:
To NPS (Network Policy Server, NPS) as a RADIUS server, RADIUS proxy, or NAP policy server (Network Access Protection, Network Access
Protection) to provide, you must configure RADIUS clients in NPS. Examples of network access servers or devices that are as RADIUS clients can be
configured:
Network access servers that provide remote access connectivity for an organization’s network or the Internet. An example would be a computer running
Windows Server 2008, the Routing and Remote Access service is running and provides the an organization’s intranet traditional dial-up or VPN remote
access services.
Wireless access points, allowing at the physical level using wireless transmission and reception technologies access to an organization’s network.
Switches that enable on a physical level, using traditional LAN technologies (eg. B. Ethernet) access to an organization’s network.
RADIUS proxies that forward connection requests to RADIUS servers that are members of a remote RADIUS server group that is configured on the RADIUS proxy.
Latest online browsing the 70-411 exam!
70-411 PDF dumps & 70-411 VCE dumps: http://examsavior.com/70-411
100% Pass:http://examsavior.com/
No comments:
Post a Comment