Examcollection offers free demo for 70 411 exam dumps pdf exam. "Administering Windows Server 2012", also known as 70 411 exam dumps exam, is a Microsoft Certification. This set of posts, Passing the Microsoft 70 411 pdf exam, will help you answer those questions. The 70 411 vce Questions & Answers covers all the knowledge points of the real exam. 100% real Microsoft examcollection 70 411 exams and revised by experts!

Q121. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed. 

On Server1, you create a network policy named Policy1. 

You need to configure Policy1 to ensure that users are added to a VLAN. 

Which attributes should you add to Policy1? 

A. Tunnel-Tag, Tunnel-Password, Tunnel-Medium-Type, and Tunnel-Preference 

B. Tunnel-Tag, Tunnel-Server-Auth-ID, Tunnel-Preference, and Tunnel-Pvt-Group-ID 

C. Tunnel-Type, Tunnel-Tag, Tunnel-Medium-Type, and Tunnel-Pvt-Group-ID 

D. Tunnel-Type, Tunnel-Password, Tunnel-Server-Auth-ID, and Tunnel-Pvt-Group-ID 

Answer:

Explanation: 

VLAN attributes used in network policy 

When you use network hardware, such as routers, switches, and access controllers that support virtual local area networks (VLANs), you can configure Network Policy Server (NPS) network policy to instruct the access servers to place members of Active Directory. groups on VLANs. 

Before configuring network policy in NPS for VLANs, create groups of users in Active Directory Domain Services (AD DS) that you want to assign to specific VLANs. Then when you run the New Network Policy wizard, add the Active Directory group as a condition of the network policy. 

You can create a separate network policy for each group that you want to assign to a VLAN. For more information, see Create a Group for a Network Policy. When you configure network policy for use with VLANs, you must configure the RADIUS standard attributes Tunnel-Medium-Type, Tunnel-Pvt-Group-ID, and Tunnel-Type. Some hardware vendors also require the use of the RADIUS standard attribute Tunnel-Tag. 

To configure these attributes in a network policy, use the New Network Policy wizard to create a network policy. You can add the attributes to the network policy settings while running the wizard or after you have successfully created a policy with the wizard. 

. Tunnel-Medium-Type. Select a value appropriate to the previous selections you made while running the New Network Policy wizard. For example, if the network policy you are configuring is a wireless policy, in Attribute Value, select 802 (Includes all 802 media plus Ethernet canonical format). 

. Tunnel-Pvt-Group-ID. Enter the integer that represents the VLAN number to which group members will be assigned. For example, if you want to create a Sales VLAN for your sales team by assigning team members to VLAN 4, type the number 4. 

. Tunnel-Type. Select the value Virtual LANs (VLAN). 

. Tunnel-Tag. Some hardware devices do not require this attribute. If your hardware device requires this attribute, obtain this value from your hardware documentation. 


Q122. Your network contains three Network Policy Server (NPS) servers named NPS1, NPS2, and NPS3. 

NP51 is configured as a RADIUS proxy that forwards connection requests to a remote RADIUS server group named Group1. 

You need to ensure that NPS2 receives connection requests. NPS3 must only receive connection requests if NPS2 is unavailable. 

How should you configure Group1? 

A. Change the Priority of NPS3 to 10. 

B. Change the Weight of NPS2 to 10. 

C. Change the Weight of NPS3 to 10. 

D. Change the Priority of NPS2 to 10. 

Answer:

Explanation: 

Priority. Priority specifies the order of importance of the RADIUS server to the NPS proxy server. Priority level must be assigned a value that is an integer, such as 1, 2, or 3. The lower the number, the higher priority the NPS proxy gives to the RADIUS server. For example, if the RADIUS server is assigned the highest priority of 1, the NPS proxy sends connection requests to the RADIUS server first; if servers with priority 1 are not available, NPS then sends connection requests to RADIUS servers with priority 2, and so on. You can assign the same priority to multiple RADIUS servers, and then use the Weight setting to load balance between them. 


Q123. Your network contains an Active Directory domain named contoso.com. All domain 

controllers run Windows Server 2012 R2. One of the domain controllers is named DC1. The DNS zone for the contoso.com zone is Active Directory-integrated and has the default settings. 

A server named Server1 is a DNS server that runs a UNIX-based operating system. 

You plan to use Server1 as a secondary DNS server for the contoso.com zone. 

You need to ensure that Server1 can host a secondary copy of the contoso.com zone. 

What should you do? 

A. From DNS Manager, modify the Advanced settings of DC1. 

B. From DNS Manager, modify the Zone Transfers settings of the contoso.com zone. 

C. From Windows PowerShell, run the Set-DnsServerForwardercmdlet and specify the contoso.com zone as a target. 

D. From DNS Manager, modify the Security settings of DC1. 

Answer:

Explanation: 

There are two ways that a secondary DNS server can be added. In both scenarios you will need to add the new server to the Forwarders list of the primary Domain Controller. 

1. The Set-DnsServerForwarder cmdlet changes forwarder settings on a Domain Name System (DNS) server. 

2. From the primary server, open DNS Manager, right click on the server name and select Properties. Click on the Forwarders tab and click the Edit button in the middle of the dialogue box. 


Q124. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. 

You create an organizational unit (OU) named OU1 and a Group Policy object (GPO) named GPO1. You link GPO1 to OU1. 

You move several file servers that store sensitive company documents to OU1. Each file server contains more than 40 shared folders. 

You need to audit all of the failed attempts to access the files on the file servers in OU1. The solution must minimize administrative effort. 

Which two audit policies should you configure in GPO1? To answer, select the appropriate two objects in the answer area. 

Answer: 


Q125. DRAG DROP 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. 

You need to create an Active Directory snapshot on DC1. 

Which four commands should you run? 

To answer, move the four appropriate commands from the list of commands to the answer 

area and arrange them in the correct order. 

Answer: 


Q126. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1. 

You make a change to GPO1. 

You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solution must minimize administrative effort. 

Which tool should you use? 

A. Server Manager 

B. Active Directory Users and Computers 

C. The Gpupdate command 

D. Group Policy Management Console (GPMC) 

Answer:

Explanation: 

Starting with Windows Server. 2012 and Windows. 8, you can now remotely refresh Group Policy settings for all computers in an OU from one central location through the Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to refresh Group Policy for a set of computers, not limited to the OU structure, for example, if the computers are located in the default computers container. 

References: http: //technet. microsoft. com/en-us//library/jj134201. aspx 

http: //blogs. technet. com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-server-2012-using-remote-gpupdate. aspx 


Q127. HOTSPOT 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed. 

You have a client named Client1 that is configured as an 802. IX supplicant. 

You need to configure Server1 to handle authentication requests from Client1. The solution must minimize the number of authentication methods enabled on Server1. 

Which authentication method should you enable? To answer, select the appropriate authentication method in the answer area. 

Answer: 


Q128. Your network contains an Active Directory domain named contoso.com. The domain contains a server named NPS1 that has the Network Policy Server server role installed. All servers run Windows Server 2012 R2. 

You install the Remote Access server role on 10 servers. 

You need to ensure that all of the Remote Access servers use the same network policies. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Configure each Remote Access server to use the Routing and Remote Access service (RRAS) to authenticate connection requests. 

B. On NPS1, create a remote RADIUS server group. Add all of the Remote Access servers to the remote RADIUS server group. 

C. On NPS1, create a new connection request policy and add a Tunnel-Type and a Service-Type condition. 

D. Configure each Remote Access server to use a RADIUS server named NPS1. 

E. On NPS1, create a RADIUS client template and use the template to create RADIUS clients. 

Answer: C,D 

Explanation: 

Connection request policies are sets of conditions and settings that allow network administrators to designate which RADIUS servers perform the authentication and authorization of connection requests that the server running Network Policy Server (NPS) receives from RADIUS clients. Connection request policies can be configured to designate which RADIUS servers are used for RADIUS accounting. When you configure Network Policy Server (NPS) as a Remote Authentication Dial-In User Service (RADIUS) proxy, you use NPS to forward connection requests to RADIUS servers that are capable of processing the connection requests because they can perform authentication and authorization in the domain where the user or computer account is located. For example, if you want to forward connection requests to one or more RADIUS servers in untrusted domains, you can configure NPS as a RADIUS proxy to forward the requests to the remote RADIUS servers in the untrusted domain. To configure NPS as a RADIUS proxy, you must create a connection request policy that contains all of the information required for NPS to evaluate which messages to forward and where to send the messages. 

: http://technet.microsoft.com/en-us/library/cc730866(v=ws.10).aspx 


Q129. HOTSPOT 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest contains two Active Directory sites named Site1 and Site2. 

You plan to deploy a read-only domain controller (RODC) named DC10 to Site2. You pre-create the DC10 domain controller account by using Active Directory Users and Computers. 

You need to identify which domain controller will be used for initial replication during the promotion of the RODC. 

Which tab should you use to identify the domain controller? 

To answer, select the appropriate tab in the answer area. 

Answer: 


Q130. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Windows Server Update Services server role installed. 

Server1 stores update files locally in C:\Updates. 

You need to change the location in which the update files are stored to D:\Updates. 

What should you do? 

A. From the Update Services console, run the Windows Server Update Services Configuration Wizard. 

B. From a command prompt, run wsusutil.exe and specify the movecontent parameter. 

C. From the Update Services console, configure the Update Files and Languages option. 

D. From a command prompt, run wsusutil.exe and specify the export parameter. 

Answer:

Explanation: 

You might need to change the location where WSUS stores updates locally. This might be required if the disk becomes full and there is no longer any room for new updates. You might also have to do this if the disk where updates are stored fails and the replacement disk uses a new drive letter. You accomplish this move with the movecontent command of WSUSutil.exe, a command-line tool that is copied to the file system of the WSUS server during WSUS Setup. By default, Setup copies WSUSutil.exe to the following location: WSUSInstallationDrive:\Program Files\Microsoft Windows Server Update Services\Tools\