70-411 Exam - Administering Windows Server 2012

certleader.com

Q1. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2. You enable the EventLog-Application event trace session. 

You need to set the maximum size of the log file used by the trace session to 10 MB. From which tab should you perform the configuration? To answer, select the appropriate tab in the answer area. 

Answer:  

Q2. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2. Both servers have the DFS Replication role service installed. 

You need to configure the DFS Replication environment to meet the following requirements: 

. Increase the quota limit of the staging folder. 

. Configure the staging folder cleanup process to provide the highest amount of free space possible. 

Which cmdlets should you use to meet each requirement? To answer, select the appropriate options in the answer area. 

Answer:  

Q3. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You have several Windows PowerShell scripts that execute when users log on to their client computer. 

You need to ensure that all of the scripts execute completely before the users can access their desktop. 

Which setting should you configure? To answer, select the appropriate setting in the answer area. 

Answer:  

Q4. Your network contains an Active Directory domain named contoso.com. The Active Directory Recycle bin is enabled for contoso.com. 

A support technician accidentally deletes a user account named User1. You need to restore the User1 account. 

Which tool should you use? 

A. Ldp 

B. Esentutl 

C. Active Directory Administrative Center 

D. Ntdsutil 

Answer:

Q5. Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2012 R2. The domain contains a virtual machine named DC2. 

On DC2, you run Get-ADDCCIoningExcludedApplicationList and receive the output shown in the following table. 

You need to ensure that you can clone DC2. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

E. Option E 

Answer: A,E 

Explanation: 

Because domain controllers provide a distributed environment, you could not safely clone an Active Directory domain controller in the past. 

Before, if you cloned any server, the server would end up with the same domain or forest, which is unsupported with the same domain or forest. You would then have to run sysprep, which would remove the unique security information before cloning and then promote a domain controller manually. When you clone a domain controller, you perform safe cloning, which a cloned domain controller automatically runs a subset of the sysprep process and promotes the server to a domain controller automatically. 

The four primary steps to deploy a cloned virtualized domain controller are as follows: 

. Grant the source virtualized domain controller the permission to be cloned by 

adding the source virtualized domain controller to the Cloneable Domain 

Controllers group. 

. Run Get-ADDCCloningExcludedApplicationListcmdlet in Windows PowerShell to determine which services and applications on the domain controller are not compatible with the cloning. 

. Run New-ADDCCloneConfigFile to create the clone configuration file, which is stored in the C:\Windows\NTDS. 

. In Hyper-V, export and then import the virtual machine of the source domain controller. 

Run Get-ADDCCloningExcludedApplicationListcmdlet In this procedure, run the Get-ADDCCloningExcludedApplicationListcmdlet on the source virtualized domain controller to identify any programs or services that are not evaluated for cloning. You need to run the Get-ADDCCloningExcludedApplicationListcmdlet before the New-ADDCCloneConfigFilecmdlet because if the New-ADDCCloneConfigFilecmdlet detects an excluded application, it will not create a DCCloneConfig.xml file. To identify applications or services that run on a source domain controller which have not been evaluated for cloning. 

Get-ADDCCloningExcludedApplicationList 

Get-ADDCCloningExcludedApplicationList -GenerateXml 

The clone domain controller will be located in the same site as the source domain controller unless a different site is specified in the DCCloneConfig.xml file. 

Note: 

. The Get-ADDCCloningExcludedApplicationListcmdlet searches the local domain controller for programs and services in the installed programs database, the services control manager that are not specified in the default and user defined inclusion list. The applications in the resulting list can be added to the user defined exclusion list if they are determined to support cloning. If the applications are not cloneable, they should be removed from the source domain controller before the clone media is created. Any application that appears in cmdlet output and is not included in the user defined inclusion list will force cloning to fail. 

. The Get-ADDCCloningExcludedApplicationListcmdlet needs to be run before the New- ADDCCloneConfigFilecmdlet is used because if the New-ADDCCloneConfigFilecmdlet detects an excluded application, it will not create a DCCloneConfig.xml file. 

. DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways. 

The New-ADDCCloneConfigcmdlet in PowerShell 

By hand with an XML editor 

By editing an existing config file, again with an XML editor (Notepad is not an XML editor.) 

You can populate the XML file. . . . . doesn't need to be empty. . . . . 

References: http: //technet. microsoft. com/en-us/library/hh831734. aspx 

http: //blogs. dirteam. com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-cloning. aspx 

Q6. Your network contains an Active Directory domain named contoso.com. 

A user named User1 creates a central store and opens the Group Policy Management Editor as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that the default Administrative Templates appear in GPO1. 

What should you do? 

A. Link a WMI filter to GPO1. 

B. Copy files from %Windir%\Policydefinitions to the central store. 

C. Configure Security Filtering in GPO1. 

D. Add User1 to the Group Policy Creator Owners group. 

Answer:

Explanation: 

In earlier operating systems, all the default Administrative Template files are added to the ADM folder of a Group Policy object (GPO) on a domain controller. The GPOs are stored in the SYSVOL folder. The SYSVOL folder is automatically replicated to other domain controllers in the same domain. A policy file uses approximately 2 megabytes (MB) of hard disk space. Because each domain controller stores a distinct version of a policy, replication traffic is increased. 

In Group Policy for Windows Server 2008 and Windows Vista, if you change Administrative template policy settings on local computers, Sysvol will not be automatically updated with the new .admX or .admL files. This change in behavior is implemented to reduce network load and disk storage requirements, and to prevent conflicts between .admX files and.admL files when edits to Administrative template policy settings are made across different locales. To make sure that any local updates are reflected in Sysvol, you must manually copy the updated .admX or .admL files from the PolicyDefinitions file on the local computer to the Sysvol\PolicyDefinitions folder on the appropriate domain controller. 

To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain. 

To create a Central Store for .admx and .adml files, create a folder that is named PolicyDefinitions in the following location: \\FQDN\SYSVOL\FQDN\policies 

Reference: 

http: //support. microsoft. com/kb/929841 

Q7. Your network contains a server named Server1 that has the Network Policy and Access Services server role installed. 

All of the network access servers forward connection requests to Server1. 

You create a new network policy on Server1. 

You need to ensure that the new policy applies only to connection requests from the 192.168.0.0/24 subnet. 

What should you do? 

A. Set the Client IP4 Address condition to 192.168.0.0/24. 

B. Set the Client IP4 Address condition to 192.168.0. 

C. Set the Called Station ID constraint to 192.168.0.0/24. 

D. Set the Called Station ID constraint to 192.168.0. 

Answer:

Explanation: 

RADIUS client properties 

Following are the RADIUS client conditions that you can configure in network policy. 

. Calling Station ID: Specifies the network access server telephone number that was dialed by the dial-up access client. 

. Client Friendly Name: Specifies the name of the RADIUS client that forwarded the connection request to the NPS server. 

. Client IPv4 Address: Specifies the Internet Protocol (IP) version 4 address of the RADIUS client that forwarded the connection request to the NPS server. 

. Client IPv6 Address: Specifies the Internet Protocol (IP) version 6 address of the RADIUS client that forwarded the connection request to the NPS server. 

. Client Vendor: Specifies the name of the vendor or manufacturer of the RADIUS client that sends connection requests to the NPS server. 

. MS RAS Vendor: Specifies the vendor identification number of the network access server that is requesting authentication. 

Q8. HOTSPOT 

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1. 

Your company implements DirectAccess. 

A user named User1 works at a customer's office. The customer's office contains a server named Server1. 

When User1 attempts to connect to Server1, User1 connects to Server1 in adatum.com. You need to provide User1 with the ability to connect to Server1 in the customer's office. Which Group Policy option should you configure? To answer, select the appropriate option in the answer area. 

Answer:  

Q9. Your network has a router named Router1 that provides access to the Internet. You have a server named Server1 that runs Windows Server 2012 R2. Server1 to use Router1 as the default gateway. 

A new router named Router2 is added to the network. Router2 provides access to the Internet. The IP address of the internal interface on Router2 is 10.1.14.2S4. 

You need to configure Server1 to use Router2 to connect to the Internet if Router1 fails. 

What should you do on Server1? 

A. Add a route for 10.1.14.0/24 that uses 10.1.14.254 as the gateway and set the metric to 1. 

B. Add 10.1.14.254 as a gateway and set the metric to 1. 

C. Add a route for 10.1.14.0/24 that uses 10.1.14.254 as the gateway and set the metric to 500. 

D. Add 10.1.14.254 as a gateway and set the metric to 500. 

Answer:

Explanation: 

To configure the Automatic Metric feature: 

1. In Control Panel, double-click Network Connections. 

2. Right-click a network interface, and then click Properties. 

3. Click Internet Protocol (TCP/IP), and then click Properties. 

4. On the General tab, click Advanced. 

5. To specify a metric, on the IP Settings tab, click to clear the Automatic metric check box, and then enter the metric that you want in the Interface Metric field. 

To manually add routes for IPv4 

Open the Command Prompt window by clicking the Start button Picture of the Start button. 

In the search box, type Command Prompt, and then, in the list of results, click Command Prompt. 

At the command prompt, type route -p add [destination] [mask <netmask>] [gateway] 

[metric <metric>] [if <interface>]. 

Q10. Your company has a main office and a branch office. 

The network contains an Active Directory domain named contoso.com. 

The main office contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 is a DNS server and hosts a primary zone for contoso.com. The branch office contains a member server named Server1 that runs Windows Server 2012 R2. Server1 is a DNS server and hosts a secondary zone for contoso.com. 

The main office connects to the branch office by using an unreliable WAN link. 

You need to ensure that Server1 can resolve names in contoso.com if the WAN link in unavailable for three days. 

Which setting should you modify in the start of authority (SOA) record? 

A. Retry interval 

B. Refresh interval 

C. Expires after 

D. Minimum (default) TTL 

Answer:

Explanation: 

Used by other DNS servers that are configured to load and host the zone to determine when zone data expires if it is not renewed