70-411 Exam - Administering Windows Server 2012

certleader.com

Q1. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 has a share named Share1. 

When users without permission to Share1 attempt to access the share, they receive the Access Denied message as shown in the exhibit. (Click the Exhibit button.) 

You deploy a new file server named Server2 that runs Windows Server 2012 R2. 

You need to configure Server2 to display the same custom Access Denied message as Server1. 

What should you install on Server2? 

A. The Remote Assistance feature 

B. The Storage Services server role 

C. The File Server Resource Manager role service 

D. The Enhanced Storage feature 

Answer:

Explanation: 

Access-Denied Assistance is a new role service of the File Server role in Windows Server 2012. 

We need to install the prerequisites for Access-Denied Assistance. 

Because Access-Denied Assistance relies up on e-mail notifications, we also need to configure each relevant file server with a Simple Mail Transfer Protocol (SMTP) server address. Let’s do that quickly with Windows PowerShell: 

Set-FSRMSetting -SMTPServer mailserver. nuggetlab.com -AdminEmailAddress admingroup@nuggetlab.com -FromEmailAddress admingroup@nuggetlab.com 

You can enable Access-Denied Assistance either on a per-server basis or centrally via Group Policy. To my mind, the latter approach is infinitely preferable from an administration standpoint. 

Create a new GPO and make sure to target the GPO at your file servers’ Active Directory computer accounts as well as those of your AD client computers. In the Group Policy Object Editor, we are looking for the following path to configure Access-Denied Assistance: \Computer Configuration\Policies\Administrative Templates\System\Access-Denied Assistance 

The Customize message for Access Denied errors policy, shown in the screenshot below, enables us to create the actual message box shown to users when they access a shared file to which their user account has no access. 

What’s cool about this policy is that we can “personalize” the e-mail notifications to give us administrators (and, optionally, file owners) the details they need to resolve the permissions issue quickly and easily. 

For instance, we can insert pre-defined macros to swap in the full path to the target file, the administrator e-mail address, and so forth. See this example: 

Whoops! It looks like you’re having trouble accessing [Original File Path]. Please click Request Assistance to send [Admin Email] a help request e-mail message. Thanks! 

You should find that your users prefer these human-readable, informative error messages to the cryptic, non-descript error dialogs they are accustomed to dealing with. 

The Enable access-denied assistance on client for all file types policy should be enabled to force client computers to participate in Access-Denied Assistance. Again, you must make sure to target your GPO scope accordingly to “hit” your domain workstations as well as your Windows Server 2012 file servers. 

Testing the configuration 

This should come as no surprise to you, but Access-Denied Assistance works only with Windows Server 2012 and Windows 8 computers. More specifically, you must enable the Desktop Experience feature on your servers to see Access-Denied Assistance messages on server computers. 

When a Windows 8 client computer attempts to open a file to which the user has no access, the custom Access-Denied Assistance message should appear: 

If the user clicks Request Assistance in the Network Access dialog box, they see a secondary message: 

At the end of this process, the administrator(s) will receive an e-mail message that contains the key information they need in order to resolve the access problem: 

The user’s Active Directory identity 

The full path to the problematic file 

A user-generated explanation of the problem 

So that’s it, friends! Access-Denied Assistance presents Windows systems administrators with an easy-to-manage method for more efficiently resolving user access problems on shared file system resources. Of course, the key caveat is that your file servers must run Windows Server 2012 and your client devices must run Windows 8, but other than that, this is a great technology that should save admins extra work and end-users extra headaches. 

Reference: http: //4sysops. com/archives/access-denied-assistance-in-windows-server-2012/ 

Q2. Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named R0DC1. 

You create a global group named RODC_Admins. 

You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on R0DC1. The solution must not provide RODC_Admins with the ability to manage Active Directory objects. 

What should you do? 

A. From Active Directory Sites and Services, run the Delegation of Control Wizard. 

B. From a command prompt, run the dsadd computer command. 

C. From Active Directory Site and Services, configure the Security settings of the R0DC1 server object. 

D. From a command prompt, run the dsmgmt local roles command. 

Answer:

Explanation: 

RODC: using the dsmgmt.exe utility to manage local administrators One of the benefits of RODC is that you can add local administrators who do not have full access to the domain administration. This gives them the ability to manage the server but not add or change active directory objects unless those roles are delegated. Adding this type of user is done using the dsmdmt.exe utility at the command prompt. 

Q3. You have the following Windows PowerShell Output. 

You need to create a Managed Service Account. 

What should you do? 

A. Run New-ADServiceAccount –Name “service01” –DNSHostName service01.contoso.com –SAMAccountName service01. 

B. Run New-AuthenticationPolicySilo, and then run New-ADServiceAccount –Name “service01” –DNSHostName service01.contoso.com. 

C. Run Add-KDSRootKey, and then run New-ADServiceAccount –Name “service01” –DNSHostName service01.contoso.com. 

D. Run Set-KDSConfiguration, and then run New-ADServiceAccount –Name “service01” –DNSHostName service01.contoso.com. 

Answer:

Explanation: From the exhibit we see that the required key does not exist. First we create this key, then we create the managed service account. 

The Add-KdsRootKey cmdlet generates a new root key for the Microsoft Group Key Distribution Service (KdsSvc) within Active Directory (AD). The Microsoft Group KdsSvc generates new group keys from the new root key. 

The New-ADServiceAccount cmdlet creates a new Active Directory managed service account. 

Reference: New-ADServiceAccount 

https://technet.microsoft.com/en-us/library/hh852236(v=wps.630).aspx 

Reference: Add-KdsRootKey 

ttps://technet.microsoft.com/en-us/library/jj852117(v=wps.630).aspx 

Q4. Your network contains an Active Directory domain named contoso.com. 

Network Policy Server (NPS) is deployed to the domain. 

You plan to deploy Network Access Protection (NAP). 

You need to configure the requirements that are validated on the NPS client computers. 

What should you do? 

A. From the Network Policy Server console, configure a network policy. 

B. From the Network Policy Server console, configure a health policy. 

C. From the Network Policy Server console, configure a Windows Security Health Validator (WSHV) policy. 

D. From a Group Policy object (GPO), configure the NAP Client Configuration security setting. 

E. From a Group Policy object (GPO), configure the Network Access Protection Administrative Templates setting. 

Answer:

Q5. Your network contains an Active Directory domain named contoso.com. 

All user accounts for the marketing department reside in an organizational unit (OU) named OU1. All user accounts for the finance department reside in an organizational unit (OU) named OU2. 

You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU2. You configure the Group Policy preference of GPO1 to add a shortcut named Link1 to the desktop. 

You discover that when a user signs in, the Link1 is not added to the desktop. 

You need to ensure that when a user signs in, Link1 is added to the desktop. 

What should you do? 

A. Enforce GPO1. 

B. Enable loopback processing in GPO1. 

C. Modify the Link1 shortcut preference of GPO1. 

D. Modify the Security Filtering settings of GPO1. 

Answer:

Explanation: 

Security filtering is a way of refining which users and computers will receive and apply the settings in a Group Policy object (GPO). Using security filtering, you can specify that only certain security principals within a container where the GPO is linked apply the GPO. Security group filtering determines whether the GPO as a whole applies to groups, users, or computers; it cannot be used selectively on different settings within a GPO. 

Q6. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. You plan to use fine-grained password policies to customize the password policy settings ofcontoso.com. 

You need to identify to which Active Directory object types you can directly apply the fine-grained password policies. 

Which two object types should you identify? (Each correct answer presents part of the solution. Choose two.) 

A. Users 

B. Global groups 

C. computers 

D. Universal groups 

E. Domain local groups 

Answer: A,B 

Explanation: 

First off, your domain functional level must be at Windows Server 2008. Second, Fine-grained password policies ONLY apply to user objects, and global security groups. Linking them to universal or domain local groups is ineffective. I know what you’re thinking, what about OU’s? Nope, Fine-grained password policy cannot be applied to an organizational unit (OU) directly. The third thing to keep in mind is, by default only members of the Domain Admins group can set fine-grained password policies. However, you can delegate this ability to other users if needed. 

Fine-grained password policies apply only to user objects (or inetOrgPerson objects if they are used instead of user objects) and global security groups. 

You can apply Password Settings objects (PSOs) to users or global security groups: 

References: 

http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc770848%28v=ws. 10%29. aspx 

http: //www. brandonlawson. com/active-directory/creating-fine-grained-password-policies/ 

Q7. Your network contains an Active Directory domain named contoso.com. 

A user named User1 creates a central store and opens the Group Policy Management Editor as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that the default Administrative Templates appear in GPO1. 

What should you do? 

A. Link a WMI filter to GPO1. 

B. Copy files from %Windir%\Policydefinitions to the central store. 

C. Configure Security Filtering in GPO1. 

D. Add User1 to the Group Policy Creator Owners group. 

Answer:

Explanation: 

In earlier operating systems, all the default Administrative Template files are added to the ADM folder of a Group Policy object (GPO) on a domain controller. The GPOs are stored in the SYSVOL folder. The SYSVOL folder is automatically replicated to other domain controllers in the same domain. A policy file uses approximately 2 megabytes (MB) of hard disk space. Because each domain controller stores a distinct version of a policy, replication traffic is increased. 

In Group Policy for Windows Server 2008 and Windows Vista, if you change Administrative template policy settings on local computers, Sysvol will not be automatically updated with the new .admX or .admL files. This change in behavior is implemented to reduce network load and disk storage requirements, and to prevent conflicts between .admX files and.admL files when edits to Administrative template policy settings are made across different locales. To make sure that any local updates are reflected in Sysvol, you must manually copy the updated .admX or .admL files from the PolicyDefinitions file on the local computer to the Sysvol\PolicyDefinitions folder on the appropriate domain controller. 

To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain. 

To create a Central Store for .admx and .adml files, create a folder that is named PolicyDefinitions in the following location: \\FQDN\SYSVOL\FQDN\policies 

Reference: 

http: //support. microsoft. com/kb/929841 

Q8. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2. You enable the EventLog-Application event trace session. 

You need to set the maximum size of the log file used by the trace session to 10 MB. From which tab should you perform the configuration? To answer, select the appropriate tab in the answer area. 

Answer:  

Q9. Your network contains one Active Directory domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1. 

The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2. 

You need to identify whether deleted objects can be recovered from the Active Directory Recycle Bin. 

Which cmdlet should you use? 

A. Get-ADGroupMember 

B. Get-ADDomainControllerPasswordReplicationPolicy 

C. Get-ADDomainControllerPasswordReplicationPolicyUsage 

D. Get-ADDomain 

E. Get-ADOptionalFeature 

F. Get-ADAccountAuthorizationGroup 

Answer:

Explanation: The Get-ADOptionalFeature cmdlet gets an optional feature or performs a search to retrieve multiple optional features from an Active Directory. 

Example: Get-ADOptionalFeature 'Recycle Bin Feature' 

Get the optional feature with the name 'Recycle Bin Feature'. 

Reference: Get-ADOptionalFeature 

https://technet.microsoft.com/en-us/library/ee617218.aspx 

Q10. Your network contains an Active Directory domain named contoso.com. All domain controllers run either Windows Server 2008 or Windows Server 2008 R2. You deploy a new domain controller named DC1 that runs Windows Server 2012 R2. 

You log on to DC1 by using an account that is a member of the Domain Admins group. You discover that you cannot create Password Settings objects (PSOs) by using Active Directory Administrative Center. 

You need to ensure that you can create PSOs from Active Directory Administrative Center. 

What should you do? 

A. Modify the membership of the Group Policy Creator Owners group. 

B. Transfer the PDC emulator operations master role to DC1. 

C. Upgrade all of the domain controllers that run Window Server 2008. 

D. Raise the functional level of the domain. 

Answer:

Explanation: 

Fine-grained password policies allow you to specify multiple password policies within a single domain so that you can apply different restrictions for password and account lockout policies to different sets of users in a domain. To use a fine-grained password policy, your domain functional level must be at least Windows Server 2008. To enable fine-grained password policies, you first create a Password Settings Object (PSO). You then configure the same settings that you configure for the password and account lockout policies. You can create and apply PSOs in the Windows Server 2012 environment by using the Active Directory Administrative Center (ADAC) or Windows PowerShell. 

Step 1: Create a PSO Applies To: Windows Server 2008, Windows Server 2008 R2 

Reference: 

http: //technet. microsoft. com/en-us//library/cc754461%28v=ws. 10%29. aspx