You can find out the theoretical information by the Pdf files and practice the practical simulation questions through test engine. Both of these are free of charge downloadable if you buy them at Ucertify. In addition, you can take a quiz prior to buying our own exam products upon Ucertify web. We encourage you to be confident with regards to our Microsoft 70-411 practice materials. The large passing ratio is a proof pertaining to our high-quality exam demos. A lot of candidates have handed the Microsoft Microsoft exam beneath the aid of the Microsoft training materials. Nonetheless, if you carry out fail to apparent the exam, many of us are willing to give your paying fees again. Or you can order yet another Microsoft Microsoft 70-411 exam products which are the same price.

2021 Mar 70-411 study guide

Q71. Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the DNS Server server role installed. 

On Server1, you create a standard primary zone named contoso.com. 

You need to ensure that Server2 can host a secondary zone for contoso.com. 

What should you do from Server1? 

A. Add Server2 as a name server. 

B. Create a trust anchor named Server2. 

C. Convert contoso.com to an Active Directory-integrated zone. 

D. Create a zone delegation that points to Server2. 

Answer:

Explanation: 

Typically, adding a secondary DNS server to a zone involves three steps: 

1. 

On the primary DNS server, add the prospective secondary DNS server to the list of name servers that are authoritative for the zone. 

2. On the primary DNS server, verify that the transfer settings for the zone permit the zone to be transferred to the prospective secondary DNS server. 

3. On the prospective secondary DNS server, add the zone as a secondary zone. 

You must add a new Name Server. To add a name server to the list of authoritative servers for the zone, you must specify both the server's IP address and its DNS name. When entering names, click Resolve to resolve the name to its IP address prior to adding it to the list. Secondary zones cannot be AD-integrated under any circumstances. 

You want to be sure Server2 can host, you do not want to delegate a zone. 

Secondary Domain Name System (DNS) servers help provide load balancing and fault tolerance. Secondary DNS servers maintain a read-only copy of zone data that is transferred periodically from the primary DNS server for the zone. You can configure DNS clients to query secondary DNS servers instead of (or in addition to) the primary DNS server for a zone, reducing demand on the primary server and ensuring that DNS queries for the zone will be answered even if the primary server is not available. 

How-To: Configure a secondary DNS Server in Windows Server 2012 

We need to tell our primary DNS that it is ok for this secondary DNS to pull information from it. Otherwise replication will fail and you will get this big red X. 

Head over to your primary DNS server, launch DNS manager, expand Forward Lookup Zones, navigate to your primary DNS zone, right-click on it and go to Properties. 

Go to “Zone Transfers” tab, by default, for security reasons, the “Allow zone transfers: ” is un-checked to protect your DNS information. We need to allow zone transfers, if you value your DNS records, you do not want to select “To any server” but make sure you click on “Only to servers listed on the Name Servers tab”. 

Head over to the “Name Servers” tab, click Add. 

You will get “New Name Server Record” window, type in the name of your secondary DNS server. it is always better to validate by name not IP address to avoid future problems in case your IP addresses change. Once done, click OK. 

You will see your secondary DNS server is now added to your name servers selection, click OK. 

Now if you head back to your secondary DNS server and refresh, the big red X will go away and your primary zone data will populate. 

Your secondary DNS is fully setup now. You cannot make any DNS changes from your secondary DNS. Secondary DNS is a read-only DNS, Any DNS changes have to be done from the primary DNS. 

References: 

http: //technet. microsoft. com/en-us/library/cc816885%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc816814%28v=ws. 10%29. aspx 

http: //blog. hyperexpert. com/how-to-configure-a-secondary-dns-server-in-windows-server-2012/ 

http: //technet. microsoft. com/en-us/library/cc770984. aspx 

http: //support. microsoft. com/kb/816101 

http: //technet. microsoft. com/en-us/library/cc753500. aspx 

http: //technet. microsoft. com/en-us/library/cc771640(v=ws. 10). aspx 

http: //technet. microsoft. com/en-us/library/ee649280(v=ws. 10). aspx 


Q72. HOTSPOT 

Your network contains 25 Web servers that run Windows Server 2012 R2. 

You need to configure auditing policies that meet the following requirements: 

. Generate an event each time a new process is created. 

. Generate an event each time a user attempts to access a file share. 

Which two auditing policies should you configure? To answer, select the appropriate two auditing policies in the answer area. 

Answer: 


Q73. Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and 10 web servers. All of the web servers are in an organizational unit (OU) named WebServers_OU. All of the servers run Windows Server 2012 R2. 

On Server1, you need to collect the error events from all of the web servers. The solution must ensure that when new web servers are added to WebServers_OU, their error events are collected automatically on Server1. 

What should you do? 

A. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting. 

B. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting. 

C. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting. 

D. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting. 

Answer:

Explanation: 

Source-initiated subscriptions allow you to define a subscription on an event collector computer without defining the event source computers, and then multiple remote event source computers can be set up (using a group policy setting) to forward events to the event collector computer. This differs from a collector initiated subscription because in the collector initiated subscription model, the event collector must define all the event sources in the event subscription. 

1. Run the following command from an elevated privilege command prompt on the 

Windows Server domain controller to configure Windows Remote Management: winrm qc –q. 

2. Start group policy by running the following command: %SYSTEMROOT%\System32\gpedit. msc. 

3. Under the Computer Configuration node, expand the Administrative Templates node, then expand the Windows Components node, then select the Event Forwarding node. 

4. Right-click the SubscriptionManager setting, and select Properties. Enable the SubscriptionManager setting, and click the Show button to add a server address to the setting. Add at least one setting that specifies the event collector computer. The SubscriptionManager Properties window contains an Explain tab that describes the syntax for the setting. 

5. After the SubscriptionManager setting has been added, run the following command to ensure the policy is applied: gpupdate /force. 

If you want to configure a source computer-initiated subscription, you need to configure the following group policies on the computers that will act as the event forwarders: 

* (A) Configure Target Subscription Manager This policy enables you to set the location of the collector computer. 


Q74. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You need to create a certificate template for the BitLocker Drive Encryption (BitLocker) Network Unlock feature. 

Which Cryptography setting of the certificate template should you modify? To answer, select the appropriate setting in the answer area. 

Answer: 


Q75. You have a DNS server named Server1. 

Server1 has a primary zone named contoso.com. 

Zone Aging/Scavenging is configured for the contoso.com zone. 

One month ago, an administrator removed a server named Server2 from the network. 

You discover that a static resource record for Server2 is present in contoso.com. Resource records for decommissioned client computers are removed automatically from contoso.com. 

You need to ensure that the static resource records for all of the servers are removed automatically from contoso.com. 

What should you modify? 

A. The Expires after value of contoso.com 

B. The Record time stamp value of the static resource records 

C. The time-to-live (TTL) value of the static resource records 

D. The Security settings of the static resource records 

Answer:

Explanation: 

Reset and permit them to use a current (non-zero) time stamp value. This enables these records to become aged and scavenged. 

You can use this procedure to change how a specific resource record is scavenged. 

A stale record is a record where both the No-Refresh Interval and Refresh Interval have passed without the time stamp updating. 

DNS->View->Advanced 

Depending on the how the resource record was originally added to the zone, do one of the following: If the record was added dynamically using dynamic update, clear the Delete this record when it becomes stale check box to prevent its aging or potential removal during the scavenging process. If dynamic updates to this record continue to occur, the Domain Name System (DNS) server will always reset this check box so that the dynamically updated record can be deleted. 

If you added the record statically, select the Delete this record when it becomes stale check box to permit its aging or potential removal during the scavenging process. 

References: http: //technet. microsoft. com/en-us/library/cc759204%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc759204%28v=ws. 10%29. aspx 

Typically, stale DNS records occur when a computer is permanently removed from the network. Mobile users who abnormally disconnect from the network can also cause stale DNS records. To help manage stale records, Windows adds a time stamp to dynamically added resource records in primary zones where aging and scavenging are enabled. Manually added records are time stamped with a value of 0, and they are automatically excluded from the aging and scavenging process. 

To enable aging and scavenging, you must do the following: 

Resource records must be either dynamically added to zones or manually modified to be used in aging and scavenging operations. 

Scavenging and aging must be enabled both at the DNS server and on the zone. 

Scavenging is disabled by default. 

DNS scavenging depends on the following two settings: 

No-refresh interval: The time between the most recent refresh of a record time stamp and the moment when the time stamp can be refreshed again. When scavenging is enabled, this is set to 7 days by default. 

Refresh interval: The time between the earliest moment when a record time stamp can be refreshed and the earliest moment when the record can be scavenged. The refresh interval must be longer than the maximum record refresh period. When scavenging is enabled, this is set to 7 days by default. 

A DNS record becomes eligible for scavenging after both the no-refresh and refresh intervals have elapsed. If the default values are used, this is a total of 14 days. 

References: http: //technet. microsoft. com/en-us/library/cc759204%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc759204%28v=ws. 10%29. aspx 

http: //technet. microsoft. com/en-us/library/cc771570. aspx 

http: //technet. microsoft. com/en-us/library/cc771677. aspx 

http: //technet. microsoft. com/en-us/library/cc758321(v=ws. 10). aspx 


Latest 70-411 testing engine:

Q76. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

On all of the domain controllers, Windows is installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\. 

All of the domain controllers have a third-party application installed. 

The operating system fails to recognize that the application is compatible with domain controller cloning. 

You verify with the application vendor that the application supports domain controller cloning. 

You need to prepare a domain controller for cloning. 

What should you do? 

A. In D:\Windows\NTDS\, create an XML file named DCCloneConfig.xml and add the application information to the file. 

B. In the root of a USB flash drive, add the application information to an XML file named DefaultDCCIoneAllowList.xml. 

C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and add the application information to the file. 

D. In C:\Windows\System32\Sysprep\Actionfiles\, add the application information to an XML file named Respecialize.xml. 

Answer:

Explanation: 

Place the CustomDCCloneAllowList.xml file in the same folder as the Active Directory database (ntds. dit) on the source Domain Controller. 

References: 

http: //blogs. dirteam. com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-cloning. aspx 

http: //www. thomasmaurer. ch/2012/08/windows-server-2012-hyper-v-how-to-clone-a-virtual-domain-controller 

http: //technet. microsoft. com/en-us/library/hh831734. aspx 


Q77. Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs. 

The domain contains a top-level organizational unit (OU) for each department. A group 

named Group1 contains members from each department. 

You have a GPO named GPO1 that is linked to the domain. 

You need to configure GPO1 to apply settings to Group1 only. 

What should you use? 

A. Dcgpofix 

B. Get-GPOReport 

C. Gpfixup 

D. Gpresult 

E. Gpedit. msc 

F. Import-GPO 

G. Restore-GPO 

H. Set-GPInheritance 

I. Set-GPLink 

J. Set-GPPermission 

K. Gpupdate 

L. Add-ADGroupMember 

Answer:

Explanation: 

Set-GPPermission grants a level of permissions to a security principal (user, security group, or computer) for one GPO or all the GPOs in a domain. You use the TargetName and TargetType parameters to specify a user, security group, or computer for which to set the permission level. 

-Replace <SwitchParameter> Specifies that the existing permission level for the group or user is removed before the new permission level is set. If a security principal is already granted a permission level that is higher than the specified permission level and you do not use the Replace parameter, no change is made. 

Reference: http: //technet. microsoft. com/en-us/library/ee461038. aspx 


Q78. HOTSPOT 

Your network contains a RADIUS server named Server1. 

You install a new server named Server2 that runs Windows Server 2012 R2 and has Network Policy Server (NPS) installed. 

You need to ensure that all accounting requests for Server2 are forwarded to Server1. 

On Server2, you configure a Connection Request Policy. 

What else should you configure on Server2? To answer, select the appropriate node in the answer area. 

Answer: 


Q79. Your network contains one Active Directory domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1. 

The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2. 

You need to identify which security principals are authorized to have their password cached on RODC1. 

Which cmdlet should you use? 

A. Get-ADGroupMember 

B. Get-ADDomainControllerPasswordReplicationPolicy 

C. Get-ADDomainControllerPasswordReplicationPolicyUsage 

D. Get-ADDomain 

E. Get-ADOptionalFeature 

F. Get-ADAccountAuthorizationGroup 

Answer:


Q80. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has the Network Policy Server server role installed. The domain contains a server named Server2 that is configured for RADIUS accounting. 

Server1 is configured as a VPN server and is configured to forward authentication requests to Server2. 

You need to ensure that only Server2 contains event information about authentication requests from connections to Server1. 

Which two nodes should you configure from the Network Policy Server console? 

To answer, select the appropriate two nodes in the answer area. 

Answer: