70-411 Exam - Administering Windows Server 2012

certleader.com

Q1. Your network contains two Active Directory forests named contoso.com and adatum.com. 

All domain controllers run Windows Server 2012 R2. 

The adatum.com domain contains a Group Policy object (GPO) named GPO1. An administrator from adatum.com backs up GPO1 to a USB flash drive. You have a domain controller named dc1.contoso.com. You insert the USB flash drive in 

dc1.contoso.com. 

You need to identify the domain-specific reference in GPO1. 

What should you do? 

A. From the Migration Table Editor, click Populate from Backup. 

B. From Group Policy Management, run the Group Policy Modeling Wizard. 

C. From Group Policy Management, run the Group Policy Results Wizard. 

D. From the Migration Table Editor, click Populate from GPO. 

Answer:

Q2. Your network contains an Active Directory domain named contoso.com. The domain 

contains a domain controller named DC1 that runs Windows Server 2012 R2. 

You create an Active Directory snapshot of DC1 each day. 

You need to view the contents of an Active Directory snapshot from two days ago. 

What should you do first? 

A. Run the dsamain.exe command. 

B. Stop the Active Directory Domain Services (AD DS) service. 

C. Start the Volume Shadow Copy Service (VSS). 

D. Run the ntdsutil.exe command. 

Answer:

Explanation: 

Dsamain.exe exposes Active Directory data that is stored in a snapshot or backup as a Lightweight Directory Access Protocol (LDAP) server. 

: http://technet.microsoft.com/en-us/library/cc772168.aspx 

Q3. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Network Policy Server role service installed. 

You need to enable trace logging for Network Policy Server (NPS) on Server1. 

Which tool should you use? 

A. The tracert.exe command 

B. The Network Policy Server console 

C. The Server Manager console 

D. The netsh.exe command 

Answer:

Explanation: 

NPS trace logging files 

You can use log files on servers running Network Policy Server (NPS) and NAP client computers to help troubleshoot NAP problems. Log files can provide the detailed information required for troubleshooting complex problems. 

You can capture detailed information in log files on servers running NPS by enabling remote access tracing. The Remote Access service does not need to be installed or running to use remote access tracing. When you enable tracing on a server running NPS, several log files are created in %windir%\tracing. 

The following log files contain helpful information about NAP: 

IASNAP. LOG: Contains detailed information about NAP processes, NPS authentication, and NPS authorization. 

IASSAM. LOG: Contains detailed information about user authentication and authorization. 

Membership in the local Administrators group, or equivalent, is the minimum required to enable tracing. Review details about using the appropriate accounts and group memberships at Local and Domain Default Groups (http: //go. microsoft. com/fwlink/?LinkId=83477). 

To create tracing log files on a server running NPS 

Open a command line as an administrator. 

Type netshras set tr * en. 

Reproduce the scenario that you are troubleshooting. 

Type netshras set tr * dis. 

Close the command prompt window. 

Reference: http: //technet. microsoft. com/en-us/library/dd348461%28v=ws. 10%29. aspx 

Q4. Your network contains an Active Directory domain named contoso.com. 

All user accounts reside in an organizational unit (OU) named OU1. All of the users in the marketing department are members of a group named Marketing. All of the users in the human resources department are members of a group named HR. 

You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU1. You configure the Group Policy preferences of GPO1 to add two shortcuts named Link1 and Link2 to the desktop of each user. 

You need to ensure that Link1 only appears on the desktop of the users in Marketing and that Link2 only appears on the desktop of the users in HR. 

What should you configure? 

A. Security Filtering 

B. WMI Filtering 

C. Group Policy Inheritance 

D. Item-level targeting 

Answer:

Explanation: 

You can use item-level targeting to change the scope of individual preference items, so they apply only to selected users or computers. Within a single Group Policy object (GPO), you can include multiple preference items, each customized for selected users or computers and each targeted to apply settings only to the relevant users or computers. 

Reference: http://technet.microsoft.com/en-us/library/cc733022.aspx 

Q5. Your network contains an Active Directory domain named contoso.com. Network Access Protection (NAP) is deployed to the domain. 

You need to create NAP event trace log files on a client computer. 

What should you run? 

A. logman 

B. Register-ObjectEvent 

C. tracert 

D. Register-EngineEvent 

Answer:

Explanation: 

You can enable NAP client tracing by using the command line. On computers running Windows Vista., you can enable tracing by using the NAP Client Configuration console. NAP client tracing files are written in Event Trace Log (ETL) format. These are binary files representing trace data that must be decoded by Microsoft support personnel. Use the –o option to specify the directory to which they are written. In the following example, files are written to %systemroot%\tracing\nap. For more information, see Logman (http: //go. microsoft.com/fwlink/?LinkId=143549). 

To create NAP event trace log files on a client computer 

Open a command line as an administrator. 

Type 

logman start QAgentRt -p {b0278a28-76f1-4e15-b1df-14b209a12613} 0xFFFFFFFF 9 -o 

%systemroot%\tracing\nap\QAgentRt. etl –ets. 

Note: To troubleshoot problems with WSHA, use the following GUID: 789e8f15-0cbf-4402-b0ed-0e22f90fdc8d. 

Reproduce the scenario that you are troubleshooting. 

Type logman stop QAgentRt -ets. 

Close the command prompt window. 

References: 

http: //technet. microsoft. com/en-us/library/dd348461%28v=ws. 10%29. aspx 

Q6. Your network contains an Active Directory domain named contoso.com. The domain contains three servers. The servers are configured as shown in the following table. 

You need to ensure that end-to-end encryption is used between clients and Server2 when the clients connect to the network by using DirectAccess. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From the Remote Access Management Console, reload the configuration. 

B. Add Server2 to a security group in Active Directory. 

C. Restart the IPSec Policy Agent service on Server2. 

D. From the Remote Access Management Console, modify the Infrastructure Servers settings. 

E. From the Remote Access Management Console, modify the Application Servers settings. 

Answer: B,E 

Explanation: 

Unsure about these answers: 

A public key infrastructure must be deployed. 

Windows Firewall must be enabled on all profiles. 

ISATAP in the corporate network is not supported. If you are using ISATAP, you should remove it and use native IPv6. 

Computers that are running the following operating systems are supported as DirectAccess clients: 

Windows Server. 2012 R2 

Windows 8.1 Enterprise 

Windows Server. 2012 

Windows 8 Enterprise 

Windows Server. 2008 R2 

Windows 7 Ultimate 

Windows 7 Enterprise 

. Force tunnel configuration is not supported with KerbProxy authentication. 

. Changing policies by using a feature other than the DirectAccess management console or Windows PowerShell cmdlets is not supported. 

. Separating NAT64/DNS64 and IPHTTPS server roles on another server is not supported. 

Q7. HOTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has two network adapters and is located in a perimeter network. 

You need to install the RIP version 2 routing protocol on Server1. 

Which node should you use to add the RIP version 2 routing protocol? 

To answer, select the appropriate node in the answer area. 

Answer:  

Q8. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains the users shown in the following table. 

You have a Network Policy Server (NPS) server that has the network policies shown in the following table. 

User1, User2, and User3 plan to connect to the network by using a VPN. You need to identify which network policy will apply to each user. 

What should you identify? 

To answer, select the appropriate policy for each user in the answer area. 

Answer:  

Q9. You have a DNS server named Server1 that runs Windows Server 2012 R2. On Server1, you create a DNS zone named contoso.com. 

You need to specify the email address of the person responsible for the zone. 

Which type of DNS record should you configure? 

A. Start of authority (SOA) 

B. Host information (HINFO) 

C. Mailbox (MB) 

D. Mail exchanger (MX) 

Answer:

Explanation: 

A SOA-record defines the responsible person for an entire zone, but a zone may contain many individual hosts / domain names for which different people are responsible. The RP-record type makes it possible to identify the responsible person for individual host names contained within the zone. 

Q10. You have a group Managed Service Account named Service01. Three servers named Server01, Server02, and Server03 currently use the Service01 service account. 

You plan to decommission Server01. 

You need to remove the cached password of the Service01 service account from Server01. The solution must ensure that Server02 and Server 03 continue to use Service01. 

Which cmdlet should you run? 

A. Set-ADServiceAccount 

B. Remove-ADServiceAccount 

C. Uninstall-ADServiceAccount 

D. Reset-ADServiceAccountPassword 

Answer:

Explanation: The Remove-ADServiceAccount cmdlet removes an Active Directory service account. This cmdlet does not make changes to any computers that use the service account. After this operation, the service account is no longer hosted on the target computer but still exists in the directory. 

Incorrect: 

Not C: The Uninstall-ADServiceAccount cmdlet removes an Active Directory service 

account on the computer on which the cmdlet is run. The specified service account must be installed on the computer. 

Reference: Remove-ADServiceAccount 

https://technet.microsoft.com/en-us/library/ee617190.aspx