+ All Categories
Home > Documents > Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures...

Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures...

Date post: 26-Aug-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
96
Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN.58q Number : 70-411 Passing Score : 700 Time Limit : 120 min File Version : 16.5 http://www.gratisexam.com/ Exam Code: 70-411 Exam Name: Administering Windows Server 2012
Transcript
Page 1: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN. 58q

Number: 70-411Passing Score: 700Time Limit: 120 minFile Version: 16.5

http://www.gratisexam.com/

Exam Code: 70-411

Exam Name: Administering Windows Server 2012

Page 2: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Real march 2014 exam

QUESTION 1Q1 = Mckenzie Q1-39 = Snowden:Q89 David:Q98 Peggy: Q18 ScottCha:B29 Jimi:B21 Korede:A57 Tara:B9 | #: peggy: CD

You have a server named Server1 that runs Windows Server 2012. You create a custom Data Collector Set (DCS) named DCS1.

You need to configure DCS1 to meet the following requirements:Automatically run a program when the amount of total free disk space on Server1 drops below 10 percent ofcapacity.Log the current values of several registry settings.

Which two should you configure in DCS1? (Each correct answer presents part of the solution. Choose two.)

A. System configuration informationB. A Performance Counter AlertC. Event trace dataD. A performance counter

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:Automatically run a program when the amount of total free disk space on Server1 drops below 10 percent ofcapacity.You can also configure alerts to start applications and performance logsLog the current values of several registry settings.

System configuration information allows you to record the state of, and changes to, registry keys.

Total free disk space

Page 3: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab
Page 4: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab
Page 5: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Registry settings

Page 6: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab
Page 7: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Run a program on alert

Page 8: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab
Page 9: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

http://technet.microsoft.com/en-us/library/cc766404.aspx

QUESTION 2Q2 = V31-Q110You have a cluster named Cluster1 that contains two nodes. Both nodes run Windows Server 2012 R2.Cluster1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.

You configure a custom service on VM1 named Service1.

You need to ensure that VM1 will be moved to a different node if Service1 fails.

Which cmdlet should you run on Cluster1?

A. Add-ClusterVmMonitoredItemB. Add-ClusterGenericServiceRoleC. Set-ClusterResourceDependencyD. Enable VmResourceMetering

Correct Answer: ASection: (none)Explanation

Explanation/Reference:V31: no explanation!

From McKenzie Q1-36:Monitoring can also be enabled using the Add-ClusterVMMonitoredItem cmdlet and -VirtualMachine, with the -

Page 10: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Service parameters, as the example below shows: PS C:\Windows\system32> Add-ClusterVMMonitoredItem -VirtualMachine savdaltst01 -Service spooler

http://sportstoday.us/technology/windows-server-2012---continuous-availability-%28part-4%29---failover-clustering-enhancements---virtual-machine-monitoring-.aspxhttp://windowsitpro.com/windows-server-2012/enable-windows-server-2012-failover-cluster-hyper-v-vm-monitoringhttp://technet.microsoft.com/en-us/library/cc742396.aspx

QUESTION 3Q3 = McKenzie Q1-10 Snowden:Q163 David:Q201 Ricardo:Q140 ScottCha:D9

You have a server that runs Windows Server 2012 R2.

You have an offline image named Windows2012.vhd that contains an installation of Windows Server 2012 R2.

You plan to apply several updates to Windows2012.vhd.

You need to mount Wmdows2012.vhd to H:\Mount.

Which tool should you use?

A. MountvolB. Server ManagerC. DiskpartD. Device Manager

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 11: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

http://technet.microsoft.com/en-us/library/cc753321.aspx

QUESTION 4Q4 = V31-Q112 0 = Mck Q1-45 = Snowden:Q193 David:Q232 Ricardo:Q175 ScottCha:D36

You have a server named Server1 that runs Windows Server 2012 R2.

You discover that the performance of Server1 is poor.

The results of a performance report generated on Server1 are shown in the following table.

Page 12: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

You need to identify the cause of the performance issue.

What should you identify?

A. Driver malfunctionB. Insufficient RAMC. Excessive pagingD. NUMA fragmentation

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Processor: %DPC Time. Much like the other values, this counter shows the amount of time that the processorspends servicing DPC requests. DPC requests are more often than not associated with the network interface.

Processor : % Interrupt Time. This is the percentage of time that the processor is spending on handlingInterrupts. Generally, if this value exceeds 50% of the processor time you may have a hardware issue .Some components on the computer can force this issue and not really be a problem. For example aprogrammable I/O card like an old disk controller card, can take up to 40% of the CPU time. A NIC on a busyIIS server can likewise generate a large percentage of processor activity.

Processor : % User Time. The value of this counter helps to determine the kind of processing that is affectingthe system. Of course the resulting value is the total amount of non-idle time that was spent on User modeoperations. This generally means application code.

Processor : %Privilege Time. This is the amount of time the processor was busy with Kernel modeoperations. If the processor is very busy and this mode is high, it is usually an indication of some type of NTservice having difficulty, although user mode programs can make calls to the Kernel mode NT components tooccasionally cause this type of performance issue.

Memory : Pages/sec. This value is often confused with Page Faults/sec. The Pages/sec counter is acombination of Pages Input/sec and Pages Output/sec counters. Recall that Page Faults/sec is a combinationof hard page faults and soft page faults. This counter, however, is a general indicator of how often the system is

Page 13: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

using the hard drive to store or retrieve memory associated data.

http://technet.microsoft.com/en-us/library/cc768048.aspx

QUESTION 5Q5 = V31-Q111 = McK Q1-26 = Snowden:Q95 David:Q104 Ricardo:Q58 ScottCha:B34 Jimi:A9 Korede:A59 Molly1:A9

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Windows ServerUpdate Services server role installed.

You need to configure Windows Server Update Services (WSUS) to support Secure Sockets Layer (SSL).

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

A. From Internet Information Services (IIS) Manager, modify the connection strings of the WSUS website.B. Install a server certificate.C. Run the wsusutil.exe command.D. Run the iisreset.exe command.E. From Internet Information Services (IIS) Manager, modify the bindings of the WSUS website.

Correct Answer: BCESection: (none)Explanation

Explanation/Reference:Certficate needs to be installed to IIS, Bindings modifies and wsutil run.

1. First we need to request a certificate for the WSUS web site, so open IIS, click the server name, then openServer Certificates.On the Actions pane click Create Domain Certificate.

2. To add the signing certificate to the WSUS Web site in IIS 7.0 On the WSUS server, open InternetInformation Services (IIS) Manager. Expand Sites, right-click the WSUS Web site, and then click Edit Bindings.In the Site Binding dialog box, select the https binding, and click Edit to open the Edit Site Binding dialog box.Select the appropriate Web server certificate in the SSL certificate box, and then click OK. Click Close to exitthe Site Bindings dialog box, and then click OK to close Internet Information Services (IIS) Manager.

3. WSUSUtil.exe configuressl<FQDN of the software update point site system> (the name in your certificate)WSUSUtil.exe configuressl<Intranet FQDN of the software update point site system>.

4. The next step is to point your clients to the correct url, by modifying the existing GPO or creating a new one.Open the policy Specify intranet Microsoft update service location and type the new url in the form https://YourWSUSserver.

The gpupdate /force command will just download all the GPO's and re-apply them to the client, it won't force theclient to check for updates. For that you need to use wuauclt /resetautorization /detectnow followed by wuauclt /reportnow

http://technet.microsoft.com/en-us/library/bb680861.aspxhttp://technet.microsoft.com/en-us/library/bb633246.aspxhttp://www.vkernel.ro/blog/configure-wsus-to-use-ssl

QUESTION 6Q6 = V31-Q113 = mckK Q1-36 Snowden:Q83 David:Q92 Ricardo:Q96 ScottCha:B25 Jimi:C5 Korede:A53 Tara:C3

Your network contains an Active Directory domain named contoso.com. The domain contains two memberservers named Server1 and Server2. All servers run Windows Server 2012 R2.

Page 14: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. Cluster1 hosts 10 virtual machines. All ofthe virtual machines run Windows Server 2012 R2 and are members of the domain.

http://www.gratisexam.com/

You need to ensure that the first time a service named Service1 fails on a virtual machine, the virtual machineis moved to a different node.

You configure Service1 to be monitored from Failover Cluster Manager.

What should you configure on the virtual machine?

A. From the General settings, modify the Startup type.B. From the General settings, modify the Service status.C. From the Recovery settings of Service1, set the First failure recovery action to Take No Action.D. From the Recovery settings of Service1, set the First failure recovery action to Restart the Service.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:C. Configure the virtual machine to take no action through Hyper-V if the physical computer shuts down bymodifying the Automatic Stop Action setting to None. Virtual machine state must be managed through theFailover Clustering feature.

Virtual machine application monitoring and manageme ntIn clusters running Windows Server 2012, administrators can monitor services on clustered virtual machinesthat are also running Windows Server 2012. This functionality extends the high-level monitoring of virtualmachines that is implemented in Windows Server 2008 R2 failover clusters. If a monitored service in a virtualmachine fails, the service can be restarted, or the clustered virtual machine can be restarted or moved toanother node (depending on service restart settings and cluster failover settings).This feature increases the uptime of high availabil ity services that are running on virtual machineswithin a failover cluster.

Windows Server 2012 Failover Cluster introduces a new capability for Hyper-V virtual machines (VMs), which isa basic monitoring of a service within the VM which causes the VM to be rebooted should the monitored servicefail three times. For this feature to work the following must be configured:

Both the Hyper-V servers must be Windows Server 2012 and the guest OS running in theVM must beWindows Server 2012.The host and guest OSs are in the same or at least trusting domains.The Failover Cluster administrator must be a member of the local administrator's group inside the VM.Ensure the service being monitored is set to Take N o Action (see screen shot below) within the guestVM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tabof the service properties within the Services application (services.msc).

Page 15: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Within the guest VM, ensure the Virtual Machine Monitoring firewall exception is enabled for the Domainnetwork by using the Windows Firewall with Advanced Security application or by using the WindowsPowerShell command below: Set-NetFirewallRule -DisplayGroup "Virtual Machine Monitoring" -EnabledTrue

After the above is true, enabling the monitoring is a simple process:1. Launch the Failover Cluster Manager tool.2. Navigate to the cluster - Roles.3. Right click on the virtual machine role you wish to enable monitoring for and under More Actions select

Configure Monitoring...

Page 16: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

T4. he services running inside the VM will be gathered and check the box for the services that should be 4.monitored and click OK.

Page 17: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

You are done!

Monitoring can also be enabled using the Add-ClusterVMMonitoredItemcmdlet and -VirtualMachine, with the -Service parameters, as the example below shows: PS C:\Windows\system32> Add-ClusterVMMonitoredItem -VirtualMachine savdaltst01 -Service spooler

http://sportstoday.us/technology/windows-server-2012---continuous-availability-%28part-4%29---failover-clustering-enhancements---virtual-machine-monitoring-.aspxhttp://windowsitpro.com/windows-server-2012/enable-windows-server-2012-failover-cluster-hyper-v-vm-monitoringhttp://technet.microsoft.com/en-us/library/cc742396.aspx

QUESTION 7Q7 = V31-Q65 = McK Q1-28 = Snowden:Q109 David:Q119,Q127 Ricardo:Q275 ScottCha:C7 Jimi:A35 Korede:A63,A71 Tara:A16

You have a server named WSUS1 that runs Windows Server 2012 R2. WSUS1 has the Windows ServerUpdate Services server role installed and has one volume.

You add a new hard disk to WSUS1 and then create a volume on the hard disk.

You need to ensure that the Windows Server Update Services (WSUS) update files are stored on the newvolume.

What should you do?

A. From a command prompt, run wsusutil.exe and specify the movecontent parameter.B. From the Update Services console, run the Windows Server Update Services Configuration Wizard.C. From the Update Services console, configure the Update Files and Languages option.D. From a command prompt, run wsusutil.exe and specify the export parameter.

Page 18: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Correct Answer: ASection: (none)Explanation

Explanation/Reference:A. Changes the file system location where the WSUS server stores update files, and optionally copies anyupdate files from the old location to the new location

B. Configuration wizard will be run immediately after installation or at a later time. If you want to change theconfiguration later, you run WSUS Server Configuration Wizard from the Options page of the WSUS 3.0Administration console

C. Allows you to specify where store downloaded update file, will not move already downloaded updates

D. The export command enables you to export update metadata to an export package file. You cannot use thisparameter to export update files, update approvals, or server settings.

Local Storage Considerations

If you decide to store update files on your server, the recommended minimum disk size is 30 GB. However,depending on the synchronization options you specify, you might need to use a larger disk. For example, whenspecifying advanced synchronization options, as in the following procedure, if you select options to downloadmultiple languages and/or the option to download express installation files, your server disk can easily reach 30GB. Therefore if you choose any of these options, install a larger disk (for example, 100 GB).

If your disk gets full, you can install a new, larger disk and then move the update files to the new location. To dothis, after you create the new disk drive, you will need to run the WSUSutil.exe tool (with the movecontentcommand) to move the update files to the new disk. For this procedure, see Managing WSUS from theCommand Line.

For example, if D:\WSUS1 is the new path for local WSUS update storage, D:\move.log is the path to the logfile, and you wanted to copy the old files to the new location, you would type:wsusutil.exe movecontent D:\WSUS1\ D:\move.log

Note: If you do not want to use WSUSutil.exe to change the location of local WSUS update storage, you canalso use NTFS functionality to add a partition to the current location of local WSUS update storage. For moreinformation about NTFS, go to Help and Support Center in Windows Server 2003.

Syntax

At the command line %drive%\Program Files\Update Services\Tools>, type:

wsusutil movecontent contentpath logfile -skipcopy [/?]

The parameters are defined in the following table.contentpath - the new root for content files. The path must exist.logfile - the path and file name of the log file to create.-skipcopy - indicates that only the server configuration should be changed, and that the content files shouldnot be copied./help or /? - displays command-line help for movecontent command.

http://blogs.technet.com/b/sus/archive/2008/05/19/wsus-how-to-change-the-location-where-wsus-stores-updates-locally.aspxhttp://technet.microsoft.com/en-us/library/cc720475(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/cc708480%28v=ws.10%29.aspxhttp://technet.microsoft.com/en-us/library/cc720466(v=ws.10).aspx

Ricardo-Q275/Jimi-A35/Korede-A63/Tara: Options BADC

Page 19: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Snowden:Q109 David:Q119,Q127 Ricardo:Q275 ScottCha:C7 Jimi:A35 Korede:A63,A71 Tara:A16

QUESTION 8Q8 = V31-Q61 = McKenzie Q1-5 = Snowden:Q82 David:Q91 Ricardo:Q98 ScottCha:B24 Jimi:C1 Korede:A52 Tara:C1 Molly1:A33 #V31-Q12

You have Windows Server 2012 R2 installation media that contains a file named Install.wim. You need to identify which images are present in Install.wim.

What should you do?

A. Run imagex.exe and specify the /verify parameter.B. Run imagex.exe and specify the /ref parameter.C. Run dism.exe and specify the /get-mountedwiminfo parameter.D. Run dism.exe and specify the/get-imageinfo parameter.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:In V31-Q12 a variant: - Be aware if this also is an exam question:The 2. line is: "You need to identify the permissions of the mounted images in Install.wim."And the "right" choice is "Run dism.exe and specify the /get-mounted wiminfo parameter" ====================================================================

A. /verify Enables file resource verification by checking for errors and file duplication.

B. /ref Enables the reference of split .wim files (SWMs). splitwim.swm is the name and location of additionalsplit files. Wildcards are accepted.

C. /Get-MountedWimInfo Lists the images that are currently mounted and information about the mountedimage such as read/write permissions, mount location, mounted file path, and mounted image index.Example:Dism /Get-MountedImageInfo

D. /Get-ImageInfo retrieve the name or index number for the image that you want to updateArguments:/ImageFile:<path_to_image.wim>[{/Index:<Image_index> | /Name:<Image_name>}]Displays information about the images that are cont ained in the .wim, .vhd or .vhdx file. When used withthe /Index or /Name argument, information about the specified image is displayed. The /Name argument doesnot apply to VHD files. You must specify /Index:1 for VHD files.

Example:Dism /Get-ImageInfo /ImageFile:C:\test\offline\install.wimDism /Get-ImageInfo /ImageFile:C:\test\images\myimage.vhd /Index:1

http://technet.microsoft.com/en-us/library/hh825224.aspxhttp://technet.microsoft.com/en-us/library/hh825258.aspxhttp://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/dd744382(v=ws.10).aspx

QUESTION 9Q9 = V31-Q59 = Snowden:Q200 David:Q238 Ricardo:Q185 ScottCha:D40 # McKenzie Q1-11 !!!!!!!!!!!

You manage a server that runs Windows Server 2012 R2. The server has the Windows Deployment Servicesserver role installed.

Page 20: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

You start a virtual machine named VM1 as shown in the exhibit. (Click the Exhibit button.)

You need to configure a pre-staged device for VM1 in the Windows Deployment Services console.

Which two values should you assign to the device ID? (Each correct answer presents a complete solution.Choose two.)

A. 979708BFC04B45259FE0C4150BB6C618B. 979708BF-C04B-4525-9FE0-C4150BB6C618C. 00155D000F1300000000000000000000D. 0000000000000000000000155D000F13E. 00000000-0000-0000-0000-C4150BB6C618

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:Use client computer's media access control (MAC) address preceded with twenty zeros or the globally uniqueidentifier (GUID) in the format: {XXXXXXXX-XXXX-XXXX-XXX- XXXXXXXXXXXX}.http://technet.microsoft.com/en-us/library/cc754469.aspx

=====My question is the guid with or with out dashes? all except McKensie Q1-11 will have with dashes(Snowden:Q200 David:Q238 Ricardo:Q185 ScottCha:D40)

But McKensie Q1-11 wrote:Fill in the computer’s GUID, which is a 32-character hexadecimal value embedded in the computer andgenerally viewable when attempting to PXE boot. Enter in this value without any spaces, dashes , braces,or brackets, even if the value is presented to you with those characters in the value.

http://activedirectory.ncsu.edu/services/imaging/windows-deployment-services/

=============================================================================V31-Q11 almost the same question and same choices:

You manage a server that runs Windows Server 2012 R2. The server has the Windows Deployment Servicesserver role installed.

You have a desktop computer that has the following configuration:Computer name: Computer1Operating system: Windows 8MAC address: 20-CF-30-65-D0-87

Page 21: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

GUID: 979708BF-C04B-4525-9FE0-C4150BB6C618

You need to configure a pre-staged device for Computer1 in the Windows Deployment Services console.

Which two values should you assign to the device ID? (Each correct answer presents a complete solution.Choose two.)

---------------------------------------------------------------------------------------------------------------------------------------------------------* To add or remove pre-staged client to/from AD DS, specify the name of the computer or the device ID, whichis a GUID, media access control (MAC) address, or Dynamic Host Configuration Protocol (DHCP) identifierassociated with the computer.

* Example: Remove a device by using its ID from a specified domain

This command removes the pre-staged device that has the specified ID. The cmdlet searches the domainnamed TSQA.Contoso.com for the device.

Windows PowerShell

PS C:\> Remove-WdsClient -DeviceID "5a7a1def-2e1f-4a7b-a792-ae5275b6ef92" -Domain -DomainName"TSQA.Contoso.com"

---------

Fill in the computer’s GUID, which is a 32-character hexadecimal value embedded in the computer andgenerally viewable when attempting to PXE boot. Enter in this value without any spaces, dashes,braces, or brackets , even if the value is presented to you with those characters in the value. Alternatively, the MAC address of the network adapter that will be used to PXE boot can be used – in thiscase, fill in the MAC address without any spaces or dashes, and then prepend zeroes (0) to the value untilit is 32 characters long – you’ll know when you have the correct number of zeroes because the Next buttonwill become available to press when the correct length is entered.

http://activedirectory.ncsu.edu/services/imaging/windows-deployment-services/

Page 22: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

QUESTION 10Q10 = V31-Q185 = McK Q1-4 = Snowden:Q220 David:Q256 Ricardo:Q235 ScottCha:H1/8

You have a server named Servers that runs Windows Server 2012 R2. Servers has the Windows DeploymentServices server role installed.

Server5 contains several custom images of Windows 8.

You need to ensure that when 32-bit client computers start by using PXE, the computers automatically install animage named Image 1.

What should you configure?To answer, select the appropriate tab in the answer area.

Point and Shoot:

Correct Answer:

Page 23: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Section: (none)Explanation

Explanation/Reference:

QUESTION 11Q11 = V31-Q75 = McK Q2-30 = Snowden:Q69 David:Q75 Ricardo:Q3,Q83 ScottCha:B14 Jimi:B4 Korede:A14 Molly1:B5

Your network contains an Active Directory domain named contoso.com. The domain contains a file servernamed Server1 that runs Windows Server 2012 R2.

You view the effective policy settings of Server1 as shown in the exhibit. (Click the Exhibit button.)

Page 24: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

On Server1, you have a folder named C:\Share1 that is shared as Share1. Share1 contains confidential data. Agroup named Group1 has full control of the content in Share1.

You need to ensure that an entry is added to the event log whenever a member of Group1 deletes a file inShare1.

What should you configure?

A. the Audit File Share setting of Servers GPOB. the Sharing settings of C:\Share1C. the Audit File System setting of Servers GPOD. the Security settings of C:\Share1

Correct Answer: DSection: (none)Explanation

Explanation/Reference:You can use Computer Management to track all connections to shared resources on a Windows Server 2008R2 system.

Whenever a user or computer connects to a shared resource, Windows Server 2008 R2 lists a connection in

Page 25: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

the Sessions node.

File access, modification and deletion can only be tracked, if the object access auditing is enabled you can seethe entries in event log.

To view connections to shared resources, type net session at a command prompt or follow these steps: 1. In Computer Management, connect to the computer on which you created the shared resource. 2. In the console tree, expand System Tools, expand Shared Folders, and then select Sessions. You can now

view connections to shares for users and computers.

To enable folder permission auditing, you can follow the below steps:1. Click start and run "secpol.msc" without quotes.2. Open the Local Policies\Audit Policy3. Enable the Audit object access for "Success" and "Failure".4. Go to target files and folders, right click the folder and select properties.5. Go to Security Page and click Advanced .

6. Click Auditing and Edit.7. Click add, type everyone in the Select User, Computer, or Group.8. Choose Apply onto: This folder, subfolders and files.9. Tick on the box “Change permissions” 10.Click OK.

Page 26: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

After you enable security auditing on the folders, you should be able to see the folder permission changes in theserver's Security event log. Task Category is File System.

http://technet.microsoft.com/en-us/library/cc753927(v=ws.10).aspxhttp://social.technet.microsoft.com/Forums/en-US/winservergen/thread/13779c78-0c73-4477-8014-f2eb10f3f10f/http://support.microsoft.com/kb/300549http://www.windowsitpro.com/article/permissions/auditing-folder-permission-changeshttp://www.windowsitpro.com/article/permissions/auditing-permission-changes-on-a-folder

QUESTION 12Q12 = V31-Q71 = McK Q2-16 = Snowden:Q70 David:Q76 Ricardo:Q5,Q82 Peggy:C4 ScottCha:B15 Jimi:B5 Korede:A15 Tara:B1Molly1:B6

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server ResourceManager role service installed.

Server1 has a folder named Folder1 that is used by the human resources department.

You need to ensure that an email notification is sent immediately to the human resources manager when a usercopies an audio file or a video file to Folder1.

Page 27: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

What should you configure on Server1?

A. A file screenB. A file screen exceptionC. A file groupD. A storage report task

Correct Answer: ASection: (none)Explanation

Explanation/Reference:V31 explanation:Create file screens to control the types of files that users can save, and generate notifications when usersattempt to save unauthorized files.With File Server Resource Manager (FSRM) you can create file screens that prevent users from savingunauthorized files on volumes or folders.File Screen Enforcement:You can create file screens to prevent users from saving unauthorized files on volumes or folders. There aretwo types of file screen enforcement: active and passive enforcement. Active file screen enforcement does notallow the user to save an unauthorized file. Passive file screen enforcement allows the user to save the file, butnotifies the user that the file is not an authorized file. You can configure notifications, such as events logged tothe event log or e-mails sent to users and administrators, as part of active and passive file screen enforcement. And see where it came from:-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------McKenzie / Snowden explanation:A. Create file screens to control the types of files that users can save, and generate notifications when usersattempt to save unauthorized files.With File Server Resource Manager (FSRM) you can create file screens that prevent users from savingunauthorized files on volumes or folders.File Screen Enforcement:You can create file screens to prevent users from saving unauthorized files on volumes or folders. There aretwo types of file screen enforcement: active and passive enforcement. Active file screen enforcement does notallow the user to save an unauthorized file. Passive file screen enforcement allows the user to save the file,but notifies the user that the file is not an autho rized file. You can configure notifications, such a sevents logged to the event log or e-mails sent to u sers and administrators , as part of active and passivefile screen enforcement.

B. Occasionally, you need to allow exceptions to file screening. For example, you might want to block videofiles from a file server, but you need to allow your training group to save the video files for their computer-basedtraining. To allow files that other file screens are blocking, create a file screen exception.A file screen exception is a special type of file screen that overrides any file screening that would otherwiseapply to a folder and all its subfolders in a designated exception path. That is, it creates an exception to anyrules derived from a parent folder.You cannot create a file screen exception on a parent folder where a file screen is already defined. You mustassign the exception to a subfolder or make changes to the existing file screen.

C. File are a group of file classified by extension (i.e. Images: ,jpg, .gif, etc..) A file group is used to define a namespace for a file screen, file screen exception, or Files by File Groupstorage report.It consists of a set of file name patterns, which are grouped by the following:

Files to include: files that belong in the groupFiles to exclude: files that do not belong in the group

For convenience, you can create and edit file groups while you edit the properties of file screens, file screenexceptions, file screen templates, and Files by File Group reports. Any file group changes that you make fromthese property sheets are not limited to the current item that you are working on.

D. On the Storage Reports Management node of the File Server Resource Manager MMC snap-in, you can

Page 28: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

perform the following tasks:Schedule periodic storage reports that allow you to identify trends in disk usage.Monitor attempts to save unauthorized files for all users or a selected group of users.Generate storage reports instantly.

To set e-mail notifications and certain reporting c apabilities, you must first configure the general F ileServer Resource Manager options.To configure e-mail options

In the console tree, right-click File Server Resource Manager, and then click Configure Options. The FileServer Resource Manager Options dialog box opens.On the E-mail Notifications tab, under SMTP server name or IP address, type the host name or the IPaddress of the SMTP server that will forward e-mail notifications and storage reports.If you want to routinely notify certain administrators about quota or file screening events or e-mail storagereports, under Default administrator recipients, type each e-mail address.Use the format account@domain. Use semicolons to separate multiple accounts.To specify a different "From" address for e-mail notifications and storage reports sent from File ServerResource Manager, under Default "From" e-mail address, type the e-mail address that you want to appearin your message.To test your settings, click Send Test E-mail.Click OK.

http://technet.microsoft.com/en-us/library/cc732349%28v=ws.10%29.aspx#BKMK_CreateFShttp://technet.microsoft.com/en-us/library/cc734419%28v=ws.10%29.aspxhttp://technet.microsoft.com/en-us/library/cc730822.aspxhttp://technet.microsoft.com/en-us/library/cc770594.aspxhttp://technet.microsoft.com/en-us/library/cc771212.aspxhttp://technet.microsoft.com/en-us/library/cc732074.aspxhttp://technet.microsoft.com/en-us/library/cc755988(v=ws.10).aspx

Peggy: Answer CRicardo-Q82: Options BDAC

QUESTION 13Q13 = V31-Q108 = McK-Q2-18 = Snowden:Q231 David:Q272 Ricardo:Q265 ScottCha:E25

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has the File ServerResource Manager role service installed.

Files created by users in the human resources department are assigned the Department classification propertyautomatically.

You are configuring a file management task named Task1 to remove user files that have not been accessed for60 days or more.

You need to ensure that Task1 only removes files that have a Department classification property of humanresources. The solution must minimize administrative effort.

What should you configure on Task1?

A. Configure a file screen.B. Create a condition.C. Create a classification rule.D. Create a custom action.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

Page 29: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

QUESTION 14Q14 = V31-Q107 = Mck-Q2-4 = Snowden:Q67 David:Q73,Q210 Ricardo:Q7,Q81 Peggy:Q6 ScottCha:B12 Jimi:B6 Korede:A12 Tara:B2Molly1:B7

Your network contains an Active Directory domain named contoso.com. The domain contains two serversnamed Server1 and Server2. Both servers run Windows Server 2012 R2. Both servers have the File andStorage Services server role, the DFS Namespaces role service, and the DFS Replication role service installed.

Server1 and Server2 are part of a Distributed File System (DFS) Replication group named Group1.Server1 and Server2 are separated by a low-speed WAN connection.You need to limit the amount of bandwidth that DFS can use to replicate between Server1 and Server2.

What should you modify?

A. The cache duration of the namespaceB. The staging quota of the replicated folderC. The referral ordering of the namespaceD. The schedule of the replication group

Correct Answer: DSection: (none)Explanation

Explanation/Reference:A. A referral is an ordered list of targets that a client computer receives from a domain controller or namespaceserver when the user accesses a namespace root or folder with targets in the namespace. You can adjust howlong clients cache a referral before requesting a new one.

B. DFS Replication uses staging folders for each replicated folder to act as caches for new and changed filesthat are ready to be replicated from sending members to receiving members.

C. A referral is an ordered list of targets that a client computer receives from a domain controller or namespaceserver when the user accesses a namespace root or folder with targets. After the client receives the referral,the client attempts to access the first target in the list. If the target is not available, the client attempts to accessthe next target.

D. Scheduling allows less bandwidth the by limiting the time interval of the replication

Does DFS Replication throttle bandwidth per schedule, per server, or per connection?If you configure bandwidth throttling when specifying the schedule, all connections for that replication group willuse that setting for bandwidth throttling. Bandwidth throttling can be also set as a connection-level setting usingDFS Management.

To edit the schedule and bandwidth for a specific connection, use the following steps:In the console tree under the Replication node, select the appropriate replication group.Click the Connections tab, right-click the connection that you want to edit, and then click Properties.Click the Schedule tab, select Custom connection schedule and then click Edit Schedule.Use the Edit Schedule dialog box to control when replication occurs, as well as the maximum amount ofbandwidth replication can consume.

Page 30: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Ricardo-Q81: Options CADB

QUESTION 15Q15 = V31-Q106 a new question please verify

Your company has a main office and a branch office.

The main office contains a server that hosts a Distributed File System (DFS) replicated folder.You plan to implement a new DFS server in the branch office.

You need to recommend a solution that minimizes the amount of network bandwidth used to perform the initialsynchronization of the folder to the branch office.

You recommend using the Export-DfsrClone and Import-DfsrClonecmdlets.

Which additional command or cmdlet should you include in the recommendation?

A. Robocopy.exeB. Synchost.exe

Page 31: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

C. Export-BcCachePackageD. Sync-DfsReplicationGroup

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Please check + explanation !!!

QUESTION 16Q16 new ~ V31-Q74 a new question please verify

Your network contains an Active Directory domain named contoso.com. The domain contains a virtual machinenamed Server1 that runs Windows Server 2012 R2.

Server1 has a dynamically expanding virtual hard disk that is mounted to drive E.

You need to ensure that you can enable BitLocker Drive Encryption (BitLocker) on drive E.

Which command should you run?

A. manage-bde -protectors -add c: -startup e:B. manage-bde -protectors -add -password -sid administrator c:C. manage-bde -protectors -add e: -startupkey c:D. manage-bde -on e:

Correct Answer: DSection: (none)Explanation

Explanation/Reference:B choice is new; In V31-Q74 the choice B was: manage-bde -lock e:Please verify the answer !!

--------Manage-bde: on

Encrypts the drive and turns on BitLocker.

Example:

The following example illustrates using the -on command to turn on BitLocker for drive C and add a recoverypassword to the drive.

manage-bde on C: -recoverypassword

QUESTION 17Q17 = V31-Q17 = McK-Q2-12 = Snowden:Q203 David:Q240 Ricardo:Q188 ScottCha:E3

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012R2. The functional level of both the domain and the forest is Windows Server 2008 R2.

The domain contains a domain-based Distributed File System (DFS) namespace that is configured as shown inthe exhibit. (Click the Exhibit button.)

Page 32: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

You need to enable access-based enumeration on the DFS namespace.What should you do first?

A. Raise the domain functional level.B. Raise the forest functional level.C. Install the File Server Resource Manager role service on Server3 and Server5.D. Delete and recreate the namespace.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 18Q18 = V31-Q173 new question - please verify!

Your network contains an Active Directory domain named contoso.com. The domain contains three serversnamed Server2, Server3, and Server4.

Server2 and Server4 host a Distributed File System (DFS) namespace named Namespace1. You open theDFS Management console as shown in the exhibit. (Click the Exhibit button.)

Page 33: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

To answer, complete each statement according to the information presented in the exhibit. Each correctselection is worth one point.

Hot Area:

Correct Answer:

Page 34: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Section: (none)Explanation

Explanation/Reference:Explanation:Please explain why!

QUESTION 19Q19 new question like V31-Q184 but it had wrong ans wer

Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC1.

You need to create an Active Directory snapshot on DC1.

Which four commands should you run?To answer, move the four appropriate commands from the list of commands to the answer area and arrangethem in the correct order.

Page 35: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Select and Place:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:The answer:

Box 1: ntdsutil

Page 36: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Box 2: activate instance ntdsBox 3: snapshotBox 4: create

Note:

(More)or less the same as Mckenzie Q5-29 Snowden:Q168 David:Q214 Ricardo:Q151 ScottCha:D14

QUESTION 20Q20 = V31-Q98 0 McK-Q5-3 = Snowden:Q147 David:Q160 Ricardo:Q69 ScottCha:C35 Jimi:A21 Korede:B21 Molly1:A16

Your network contains an Active Directory domain named contoso.com.

You create a user account named User1. The properties of User1 are shown in the exhibit. (Click the Exhibitbutton.)

Page 37: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

You plan to use the User1 account as a service account. The service will forward authentication requests toother servers.You need to ensure that you can view the Delegation tab from the properties of the User1 account.

What should you do first?

A. Configure the Name Mappings of User1.B. Modify the user principal name (UPN) of User1.C. Configure a Service Principal Name (SPN) for User1.D. Modify the Security settings of User1.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:If you you cannot see the Delegation tab, do one or both of the following:

Register a Service Principal Name (SPN) for the user account with the Setspn utility in the support tools onyour CD. Delegation is only intended to be used by service accounts, which should have registered SPNs,as opposed to a regular user account which typically does not have SPNs.Raise the functional level of your domain to Windows Server 2003. For more information, see RelatedTopics.

Page 38: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

http://blogs.msdn.com/b/mattlind/archive/2010/01/14/delegation-tab-in-aduc-not-available-until-a- spn-is-set.aspxhttp://blogs.msdn.com/b/mattlind/archive/2010/01/14/delegation-tab-in-aduc-not-available-until-a-spn-is-set.aspxhttp://technet.microsoft.com/en-us/library/cc739474(v=ws.10).aspxhttp://blogs.msdn.com/b/mattlind/archive/2010/01/14/delegation-tab-in-aduc-not-available-until-a- spn-is-set.aspx

QUESTION 21Q21 = V31-Q109 = McK-Q5-48 = Snowden:Q217 David:Q252 Ricardo:Q208 ScottCha:E13

Your network contains an Active Directory domain named contoso.com. All domain controllers run WindowsServer 2012 R2. You plan to use fine-grained password policies to customize the password policy settings ofcontoso.com.

You need to identify to which Active Directory object types you can directly apply the fine-grained passwordpolicies.

Which two object types should you identify? (Each correct answer presents part of the solution. Choose two.)

A. Users

Page 39: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

B. Global groupsC. ComputersD. Universal groupsE. Domain local groups

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:First off, your domain functional level must be at Windows Server 2008. Second, Fine-grained passwordpolicies ONLY apply to user objects, and global security groups. Linking them to universal or domain localgroups is ineffective . I know what you’re thinking, what about OU’s? Nope, Fine-grained password policycannot be applied to an organizational unit (OU) directly. The third thing to keep in mind is, by default onlymembers of the Domain Admins group can set fine-grained password policies. However, you can delegate thisability to other users if needed.

Fine-grained password policies apply only to user objects (or inetOrgPerson objects if they are used instead ofuser objects) and global security groups.

You can apply Password Settings objects (PSOs) to users or global security groups :

http://technet.microsoft.com/en-us/library/cc731589%28v=ws.10%29.aspxhttp://technet.microsoft.com/en-us/library/cc770848%28v=ws.10%29.aspxhttp://www.brandonlawson.com/active-directory/creating-fine-grained-password-policies/

QUESTION 22Q22 = McKenzie Q5-46 = Snowden:Q215 David:Q247 Ricardo:Q203,Q269 ScottCha:E11

Your network contains an Active Directory domain named contoso.com. The domain controllers in the domainare configured as shown in the following table.

You deploy a new domain controller named DC3 that runs Windows Server 2012 R2.

You discover that you cannot create Password Settings objects (PSOs) by using Active Directory AdministrativeCenter.

You need to ensure that you can create PSOs from Active Directory Administrative Center.

What should you do?

A. Raise the functional level of the domain.B. Upgrade DC1.C. Transfer the infrastructure master operations master role.D. Transfer the PDC emulator operations master role.

Page 40: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Fine-grained password policies allow you to specify multiple password policies within a single domain so thatyou can apply different restrictions for password and account lockout policies to different sets of users in adomain. To use a fine-grained password policy, your domain functional level must be at least WindowsServer 2008 . To enable fine-grained password policies, you first create a Password Settings Object (PSO) .You then configure the same settings that you configure for the password and account lockout policies. Youcan create and apply PSOs in the Windows Server 2012 environment by using the Active DirectoryAdministrative Center (ADAC) or Windows PowerShell.

Step 1: Create a PSOApplies To: Windows Server 2008 , Windows Server 2008 R2

http://technet.microsoft.com/en-us//library/cc754461%28v=ws.10%29.aspx

QUESTION 23Q23 McKenzie Q5-34 # V31-Q28 please verify

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. Alldomain controllers run Windows Server 2012 R2.

The domain contains two domain controllers. The domain controllers are configured as shown in the followingtable.

Active Directory Recycle Bin is enabled.

You discover that a support technician accidentally removed 100 users from an Active Directory group namedGroup1 an hour ago.

You need to restore the membership of Group1.

What should you do?

A. Recover the items by using Active Directory Recycle Bin.B. B1:Apply a virtual machine snapshot to DC2 | (B2: Modify the is Recycled attribute of Group1).C. Perform tombstone reanimation.D. Perform an authoritative restore.

Correct Answer: ASection: (none)Explanation

Page 41: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Explanation/Reference:The bold line in the question is mineIn this real exam the B choice was B1, but in V31-Q28 it is B2

V31-Q28 said C: Perform tombstone reanimation. I think it is wrong

In McKenzie Q5-34 the right answer is "Recover the items by using Active Directory Recycle Bin"

umar00o UK.: the right answer is "Recover the items by using Active Directory Recycle Bin"

Please verify

V31:Tombstone reanimation provides the only way to recover deleted objects without taking a DC offline, and it's theonly way to recover a deleted object's identity information, such as its objectGUID and objectSid attributes. Itneatly solves the problem of recreating a deleted user or group and having to fix up all the old access controllist (ACL) references, which contain the objectSid of the deleted object.

McKenzie:All deleted AD object information including attributes, passwords and group membership can be selected inmass then undeleted from the user interface instantly or via Powershell Need to know what objects were deleted so you can filter for them or a specific time period

You could undelete all objects during a specific time period but if you have multiple location where adminsare making changes to AD, an intentional change may have occurred which you may not be aware of at thetime. It is possible that users were terminated during the same time as the accidental deletions so you wantto be cautious to not accidently undelete a terminated employee for security reasons.

http://technet.microsoft.com/en-us/library/ff625687(v=ws.10).aspx)http://windowsitpro.com/active-directory/windows-server-2012-active-directory-recycle-binhttp://communities.quest.com/community/quest-itexpert/blog/2012/09/24/the-windows-server-2012-recycle-bin-and-recovery-manager-for-active-directory

Snowden:Q154 David:Q169 Ricardo:Q227 ScottCha:C40 Jimi:C27 Korede:B29

Page 42: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

QUESTION 24Q24 = V31-Q93 = McK-Q5-19 = Snowden:Q157 David:Q173 Ricardo:Q133 ScottCha:D3 Korede:B32

Your network contains an Active Directory domain named contoso.com. The domain contains six domaincontrollers. The domain controllers are configured as shown in the following table.

The network contains a server named Server1 that has the Hyper-V server role installed. DC6 is a virtualmachine that is hosted on Server1.

You need to ensure that you can clone DC6.

What should you do?

A. Transfer the schema master to DC6.B. Transfer the PDC emulator to DC5.C. Transfer the schema master to DC4.D. Transfer the PDC emulator to DC2.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:http://technet.microsoft.com/en-us/library/hh831734.aspx#steps_deploy_vdc

QUESTION 25Q25 = McKenzie Q5-45 = Snowden:Q19 David:Q18 Ricardo:Q135 ScottCha:H1/13 Korede:C12 # V31-Q175

Your network contains an Active Directory domain named contoso.com. The domain contains 30 user accountsthat are used for network administration. The user accounts are members of a domain global group namedGroup1.

You identify the security requirements for the 30 user accounts as shown in the following table.

Page 43: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

You need to identify which settings must be implemented by using a Password Settings object (PSO) and whichsettings must be implemented by modifying the properties of the user accounts.

What should you identify?

To answer, configure the appropriate settings in the dialog box in the answer area.

Hot Area:

Correct Answer:

Section: (none)Explanation

Explanation/Reference:At this exam the last question it was the old question with Enforce password history.But be aware MS have different variation on this question.

Explanation:Box 1: PSOBox 2: User Account PropertiesBox 3: User Account PropertiesBox 4: PSONote:* Password Setting Object (PSO) is another name for Fine Grain Password Policies.* Here you can see all the settings that go into a PSO.

PSO

Page 44: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

User

Page 45: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

http://technet.microsoft.com/en-us/library/cc770842%28v=ws.10%29.aspxhttp://technet.microsoft.com/en-us/library/dd145547.aspx

Snowden:Q19 David:Q18 Ricardo:Q135 ScottCha:H1/13 Korede:C12

QUESTION 26Q26 = V31-Q142 please verify

Your network contains an Active Directory domain named contoso.com. The domain contains domaincontrollers that run Windows Server 2008, Windows Server 2008 R2 Windows Server 2012, and WindowsServer 2012 R2.

A domain controller named DC1 runs Windows Server 2012 R2. DC1 is backed up daily.During routine maintenance, you delete a group named Group1.

You need to recover Group1 and identify the names of the users who were members of Group1 prior to itsdeletion. You want to achieve this goal by using the minimum amount of administrative effort.

Page 46: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

What should you do first?

A. Perform an authoritative restore of Group1.B. Mount the most recent Active Directory backup.C. Use the Recycle Bin to restore Group1.D. Reactivate the tombstone of Group1.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:A: to perform an authoritative restore, recycle bin restore should be enable, but by default it's disa bled (this include C,D) so Irecommend answer B

QUESTION 27Q27 new choices - Please verifySame question as McK Q2-9 but different choicesSame question as V31 Q95 but other different choices

Your company deploys a new Active Directory forest named contoso.com. The first domain controller in theforest runs Windows Server 2012 R2. The forest contains a domain controller named DC10.

On DC10, the disk that contains the SYSVOL folder fails.You replace the failed disk . You stop the Distributed File System (DFS) Replication service.You restore the SYSVOL folder.

You need to perform a non-authoritative synchronization of SYSVOL on DC10.

Which tool should you use before you start the DFS Replication service on DC10?

A. Active Directory Sites and ServicesB. LdpC. Dfsmgmt.mscD. Ultrasound

Correct Answer: BSection: (none)Explanation

Explanation/Reference:The bold words in the question is mine

http://kx.cloudingenium.com/microsoft/servers/windows-servers/force-authoritative-non-authoritative-synchronization-dfsr-replicated-sysvol-like-d4d2-frs/

. You cannot use the DFS Management snap-in (Dfsmgm t.msc) or the Dfsradmin.exe command-linetool to achieve this

Note: Active Directory Service Interfaces Editor (ADSI Edit) is a Lightweight Directory Access Protocol (LDAP)editor that you can use to manage objects and attributes in Active Directory. ADSI Edit (adsiedit.msc) providesa view of every object and attribute in an Active Directory forest. You can use ADSI Edit to query, view, and editattributes that are not exposed through other Active Directory Microsoft Management Console (MMC) snap- ins:Active Directory Users and Computers, Active Directory Sites and Services, Active Directory Domains andTrusts, and Active Directory Schema.

QUESTION 28Q28 = V31-Q27 - please double check answer!

Page 47: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Your network contains an Active Directory domain named contoso.com. The Active Directory Recycle bin isenabled for contoso.com.A support technician accidentally deletes a user account named User1. You need to restore the User1 account.

Which tool should you use?

A. LdpB. EsentutlC. Active Directory Administrative CenterD. Ntdsutil

Correct Answer: CSection: (none)Explanation

Explanation/Reference:The bold words in the question is mineNo explanation in V31-Q27! Be aware of the question.----------------------------

Please compare McKenzie-Q5-30 and some of the explanations.

Your network contains an Active Directory domain named contoso.com. Domain controllers run eitherWindows Server 2003, Windows Server 2008 R2, or Win dows Server 2012. A support technician accidentally deletes a user account named User1.You need to use tombstone reanimation to restore the User1 account.Which tool should you use?

Same choices - but the right answer were Ldp

explanation:A. You can use the ntdsutil commands to perform database maintenance of AD DS, manage and control singlemaster operations, and remove metadata

B. Use Ldp.exe to restore a single, deleted Active Directory object

C. ESEnTUtl Utility Repair/Defragment/backup. Provides database utilities for the Extensible Storage Engine (ESE) including Windows 2012

D. ADAC offers no options to restore deleted objects <<<<<======= please check this !!!!!

Tombstone reanimation for Active Directory was introduced in Windows Server 2003.This feature takes advantage of the fact that Active Directory keeps deleted objects in the database for a periodof time before physically removing them.use Ldp.exe to restore a single, deleted Active Directory object

The LPD.exe tool, included with Windows Server 2012, allows users to perform operations against any LDAP-compatible directory, including Active Directory. LDP is used to view objects stored in Active Directory alongwith their metadata, such as security descriptors and replication metadata.

http://www.petri.co.il/manually-undeleting-objects-windows-active-directory-ad.htmhttp://technet.microsoft.com/en-us/magazine/2007.09.tombstones.aspxhttp://technet.microsoft.com/nl-nl/library/dd379509(v=ws.10).aspx#BKMK_2http://technet.microsoft.com/en-us/library/hh875546.aspxhttp://technet.microsoft.com/en-us/library/dd560651(v=ws.10).aspx

Page 48: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Snowden:Q143 David:Q155 Ricardo:Q17 Peggy:Q14 ScottCha:C31 Jimi:B17 Korede:B17 Molly1:B15

QUESTION 29Q29 = V31-Q97 = McK Q5-12 but only the first 4 choices

Your network contains an Active Directory domain named contoso.com. All domain controllers run WindowsServer 2012 R2.

On all of the domain controllers, Windows is installed in C:\Windows and the Active Directory database islocated in D:\Windows\NTDS\.

All of the domain controllers have a third-party application installed.

The operating system fails to recognize that the application is compatible with domain controller cloning.

You verify with the application vendor that the application supports domain controller cloning.

You need to prepare a domain controller for cloning.

What should you do?

A. In D:\Windows\NTDS\, create an XML file named DCCloneConfig.xml and add the application information tothe file.

B. In the root of a USB flash drive, add the application information to an XML file namedDefaultDCCIoneAllowList.xml.

C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and add the applicationinformation to the file.

D. In C:\Windows\System32\Sysprep\Actionfiles\, add the application information to an XML file namedRespecialize.xml.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Place the CustomDCCloneAllowList.xml file in the same folder as the Active Directory database (ntds.dit) onthe source Domain Controller.

http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-cloning.aspxhttp://www.thomasmaurer.ch/2012/08/windows-server-2012-hyper-v-how-to-clone-a-virtual-domain-controllerhttp://technet.microsoft.com/en-us/library/hh831734.aspx

David/Snowden/Ricardo/Peggy/ScottCha/Jimi-A22/Korede-B22/Molly: Options ABCE

Page 49: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Jimi-A23/Korede-B23: Options CDBFSnowden:Q148 David:Q161 Ricardo:Q70 Peggy:Q54 ScottCha:C36 Jimi:A22,A23 Korede:B22,B23 Tara:A10,A11 Molly1:A17

QUESTION 30Q30 = V31-Q117 = McK Q3-10 # Snowden Q176

Your network contains an Active Directory domain named adatum.com.You have a standard primary zone named adatum.com.

You need to provide a user named User1 the ability to modify records in the zone. Other users must beprevented from modifying records in the zone.

What should you do first?

A. From the properties of the zone, modify the start of authority (SOA) record.B. Run the Zone Signing Wizard for the zone.C. Run the New Delegation Wizard for the zone.D. From the properties of the zone, change the zone type.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Not all agreed in the choice, look below. Please ve rify

V31:The Zone would need to be changed to a AD integrated zone When you use directory-integrated zones, youcan use access control list (ACL) editing to secure a dnsZone object container in the directory tree. This feature provides detailed access to either the zone or a specified resource record in the zone. For example, an ACL for a zone resource record can be restricted so that dynamic updates are allowed only fora specified client computer or a secure group, such as a domain administrators group. This security feature isnot available with standard primary zones

DNS update security is available only for zones that are integrated into Active Directory. After you integrate azone, you can use the access control list (ACL) editing features that are available in the DNS snap-in to add orto remove users or groups from the ACL for a specific zone or for a resource record.

McKenzie:Standard (not an Active Directory integrated zone) has no Security settings:

Page 50: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

You need to firstly change the "Standard Primary Zone" to AD Integrated Zone:

Page 51: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Now there's Security tab:

http://technet.microsoft.com/en-us/library/cc753014.aspxhttp://technet.microsoft.com/en-us/library/cc726034.aspxhttp://support.microsoft.com/kb/816101

Abdelrhman from Egypt - Oct 26, 2013:I want to check the answer again As in sam's dump I t is : Run the New Delegation Wizard for the zone. RinCE from Spain - Nov 26, 2013:Should not be "change zone type"?hatewin from Romania - Dec 03, 2013:According to the training guide, "zone delegations function as pointers to the next DNS layer down inthe DNS hierarchy". I think RinCE is right.Snowden/Ricardo: Answer CSnowden:Q176 David:Q203 Ricardo:Q123 ScottCha:D22

QUESTION 31Q31 = V31-Q36 - old question but new choices, pleas e verify

Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed.

You log on to Server1 by using a user account named User2.

From the Remote Access Management Console, you run the Getting Started Wizard and you receive a warningmessage as shown in the exhibit. (Click the Exhibit button.)

Page 52: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

http://www.gratisexam.com/

You need to ensure that you can configure DirectAccess successfully. The solution must minimize the numberof permissions assigned to User2.

To which group should you add User2?

A. Enterprise AdminsB. AdministratorsC. Account OperatorsD. Server Operators

Correct Answer: CSection: (none)Explanation

Page 53: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Explanation/Reference:I think 'Account Operators' is okay, but why was it 'Domain Admin' answer the right early not 'AccountOperators' ?Please verify

===============McKenzie Q3-48 Snowden:Q210 David:Q243 Ricardo:Q195 ScottCha:E9A: Enterprise AdminsB: Domain Admins (Correct in McKenzie Q3-48)C: Server OperatorsD: Account Operators

QUESTION 32Q32 = V31-Q79 = Mck Q3-13 = Snowden:Q31 David:Q33 Ricardo:Q31 Peggy:Q26 ScottCha:A25 Jimi:B32 Korede:A26

You have a DNS server named Server1.

Server1 has a primary zone named contoso.com.

Zone Aging/Scavenging is configured for the contoso.com zone.

One month ago, an administrator removed a server named Server2 from the network.

You discover that a static resource record for Server2 is present in contoso.com. Resource records fordecommissioned client computers are removed automatically from contoso.com.

You need to ensure that the static resource records for all of the servers are removed automatically fromcontoso.com.

What should you modify?

A. The Expires after value of contoso.comB. The Record time stamp value of the static resource recordsC. The time-to-live (TTL) value of the static resource recordsD. The Security settings of the static resource records

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Reset and permit them to use a current (non-zero) time stamp value. This enables these records to becomeaged and scavenged.You can use this procedure to change how a specific resource record is scavenged. A stale record is a recordwhere both the No-Refresh Interval and Refresh Interval have passed without the time stamp updating.

DNS->View->Advanced

Page 54: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Depending on the how the resource record was originally added to the zone, do one of the following:If the record was added dynamically using dynamic update, clear the Delete this record when it becomes

stale check box to prevent its aging or potential removal during the scavenging process. If dynamic updates tothis record continue to occur, the Domain Name System (DNS) server will always reset this check box so thatthe dynamically updated record can be deleted.If you added the record statically, select the Delete this record when it becomes stale check box to

permit its aging or potential removal during the scavenging process.

Page 55: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

http://technet.microsoft.com/en-us/library/cc759204%28v=ws.10%29.aspxhttp://technet.microsoft.com/en-us/library/cc759204%28v=ws.10%29.aspxTypically, stale DNS records occur when a computer is permanently removed from the network. Mobile userswho abnormally disconnect from the network can also cause stale DNS records. To help manage stale records,Windows adds a time stamp to dynamically added resource records in primary zones where aging andscavenging are enabled. Manually added records are time stamped with a value of 0, and they areautomatically excluded from the aging and scavenging process.To enable aging and scavenging, you must do the following:Resource records must be either dynamically added to zones or manually modified to be used in

aging and scavenging operations.Scavenging and aging must be enabled both at the DNS server and on the zone.

Scavenging is disabled by default.

Page 56: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

DNS scavenging depends on the following two settings:No-refresh interval: The time between the most recent refresh of a record time stamp and the moment

when the time stamp can be refreshed again. When scavenging is enabled, this is set to 7 days by default.Refresh interval: The time between the earliest moment when a record time stamp can be refreshed

and the earliest moment when the record can be scavenged. The refresh interval must be longer than themaximum record refresh period. When scavenging is enabled, this is set to 7 days by default.

A DNS record becomes eligible for scavenging after both the no-refresh and refresh intervals have elapsed. Ifthe default values are used, this is a total of 14 days.http://technet.microsoft.com/en-us/library/cc759204%28v=ws.10%29.aspxhttp://technet.microsoft.com/en-us/library/cc759204%28v=ws.10%29.aspxhttp://technet.microsoft.com/en-us/library/cc771570.aspxhttp://technet.microsoft.com/en-us/library/cc771677.aspxhttp://technet.microsoft.com/en-us/library/cc758321(v=ws.10).aspx

QUESTION 33Q33 = V31-Q114 = Mck Q3-22 = Snowden:Q192 David:Q231 Ricardo:Q173 ScottCha:D35

You have a DNS server named Server1 that runs Windows Server 2012 R2. On Server1, you create a DNSzone named contoso.com.

You need to specify the email address of the person responsible for the zone.

Which type of DNS record should you configure?

A. Start of authority (SOA)B. Host information (HINFO)C. Mailbox (MB)

Page 57: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

D. Mail exchanger (MX)

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Page 58: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

QUESTION 34Q34 = V31-116 = Mck Q3-33 = Snowden:Q112 David:Q122 Ricardo:Q144 ScottCha:C10 Korede:A38

Your network is configured as shown in the exhibit. (Click the Exhibit button.)

Server1 regularly accesses Server2.

You discover that all of the connections from Server1 to Server2 are routed through Router1.

You need to optimize the connection path from Server1 to Server2.

Which route command should you run on Server1?

A. Route add -p 10.10.10.0 MASK 255.255.255.0 172.23.16.2 METRIC 100B. Route add -p 10.10.10.0 MASK 255.255.255.0 10.10.10.1 METRIC 50C. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.1 METRIC 100D. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.0 METRIC 50

Correct Answer: ASection: (none)Explanation

Explanation/Reference:destination - specifies either an IP address or host name for the network or host.

subnetmask - specifies a subnet mask to be associated with this route entry. If subnetmask is not specified,255.255.255.255 is used.

gateway - specifies either an IP address or host name for the gateway or router to use when forwarding.

costmetric - assigns an integer cost metric (ranging from 1 through 9,999) to be used in calculating the fastest,most reliable, and/or least expensive routes. If costmetric is not specified, 1 is used.

interface - specifies the interface to be used for the route that uses the interface number. If an interface is notspecified, the interface to be used for the route is determined from the gateway IP address.

http://support.microsoft.com/kb/299540/en-ushttp://technet.microsoft.com/en-us/library/cc757323%28v=ws.10%29.aspx

QUESTION 35Q35 = V31-Q164 = Mck Q4-11 = Snowden:Q124 David:Q134 Ricardo:Q107 ScottCha:H2/12 Jimi:C8 Korede:C28

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access serverrole installed.

Page 59: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

You have a client named Client1 that is configured as an 802.1X supplicant.

You need to configure Server1 to handle authentication requests from Client1. The solution must minimize thenumber of authentication methods enabled on Server1.

Which authentication method should you enable? To answer, select the appropriate authentication method inthe answer area.

Point and Shoot:

Correct Answer:

Page 60: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Section: (none)Explanation

Explanation/Reference:V31 Explanation:Microsoft® Windows® uses EAP to authenticate network access for Point-to-Point Protocol (PPP) connections(dial-up and virtual private network) and for IEEE 802.1X-based network access to authenticating Ethernetswitches and wireless access points (APs).http://technet.microsoft.com/en-us/library/bb457039.aspx

McKenzie:IEEE 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It is part of the IEEE 802.1group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LANor WLAN.

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. Thesupplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN - though the term'supplicant' is also used interchangeably to refer to the software running on the client that provides credentialsto the authenticator. The authenticator is a network device, such as an Ethernet switch or wireless access point;and the authentication server is typically a host running software supporting the RADIUS and EAP protocols.

The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is notallowed access through the authenticator to the protected side of the network until the supplicant’s identity hasbeen validated and authorized.

Page 61: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

EAP data is first encapsulated in EAPOL frames between the Supplicant and Authenticator, then re-encapsulated between the Authenticator and the Authentication server using RADIUS or Diameter.

http://en.wikipedia.org/wiki/IEEE_802.1X

QUESTION 36Q36 = V31-Q41 = new question, please verify

Your network contains an Active Directory domain named contoso.com. The domain contains three servers.The servers are configured as shown in the following table.

You need to ensure that end-to-end encryption is used between clients and Server2 when the clients connect tothe network by using DirectAccess.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. From the Remote Access Management Console, reload the configuration.B. Add Server2 to a security group in Active Directory.C. Restart the IPSec Policy Agent service on Server2.D. From the Remote Access Management Console, modify the Infrastructure Servers settings.E. From the Remote Access Management Console, modify the Application Servers settings.

Correct Answer: BESection: (none)Explanation

Explanation/Reference:When selecting application servers that require end-to-end encryption and authentication, it

Page 62: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

is important to note that:** The selected end-to-end application servers must be members of one or more AD DSsecurity groups.* The selected end-to-end application servers must run Windows Server 2008 or later.* The selected end-to-end application servers must be accessible via IPv6 (Native orISATAP, not NAT64).* The selected end-to-end application servers can be used with smart cards for anadditional level of authorization.

Reference: Planning a Forefront UAG DirectAccess deployment strategy, Choosing an access model

QUESTION 37Q37 = V31-Q37 = new question, please verify

Your network contains an Active Directory domain named contoso.com.

You need to install and configure the Web Application Proxy role service.

What should you do?

A. Install the Active Directory Federation Services server role and the Remote Access server role on differentservers.

B. Install the Active Directory Federation Services server role and the Remote Access server role on the sameserver.

C. Install the Web Server (IIS) server role and the Application Server server role on the same server.D. Install the Web Server (IIS) server role and the Application Server server role on different servers.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 38Q38 = V31-Q186

Your network contains an Active Directory domain named adatum.com. The domain contains a server namedServer1.

Your company implements DirectAccess.

A user named User1 works at a customer's office. The customer's office contains a server named Server1.

When User1 attempts to connect to Server1, User1 connects to Server1 in adatum.com.

You need to provide User1 with the ability to connect to Server1 in the customer's office.

Which Group Policy option should you configure?To answer, select the appropriate option in the answer area.

Point and Shoot:

Page 63: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Explanation:

Specifies whether the user has Connect and Disconnect options for the DirectAccess entry when the userclicks the Networking notification area icon.

If the user clicks the Disconnect option, NCA removes the DirectAccess rules from the Name Resolution PolicyTable (NRPT) and the DirectAccess client computer uses whatever normal name resolution is available to theclient computer in its current network configuration, including sending all DNS queries to the local intranet orInternet DNS servers. Note that NCA does not remove the existing IPsec tunnels and users can still accessintranet resources across the DirectAccess server by specifying IPv6 addresses rather than names.

The ability to disconnect allows users to specify single-label, unqualified names (such as "PRINTSVR") for localresources when connected to a different intranet and for temporary access to intranet resources when networklocation detection has not correctly determined that the DirectAccess client computer is connected to its ownintranet.

To restore the DirectAccess rules to the NRPT and resume normal DirectAccess functionality, the user clicksConnect.

Page 64: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

NoteIf the DirectAccess client computer is on the intranet and has correctly determined its network location, theDisconnect option has no effect because the rules for DirectAccess are already removed from the NRPT.

If this setting is not configured, users do not have Connect or Disconnect options.

QUESTION 39Q39 = V31-Q115 new question

Your network contains an Active Directory forest. The forest contains two domains named contoso.com andfabrikam.com. All of the DNS servers in both of the domains run Windows Server 2012 R2.

The network contains two servers named Server1 and Server2. Server1 hosts an Active Directory- integratedzone for contoso.com. Server2 hosts an Active Directory-integrated zone for fabrikam.com.Server1 and Server2 connect to each other by using a WAN link.

Client computers that connect to Server1 for name r esolution cannot resolve names in fabrikam.com.

You need to configure Server1 to resolve names in fabrikam.com. The solution must NOT require that changesbe made to the fabrikam.com zone on Server2.

What should you create?

A. A trust anchorB. A stub zoneC. A zone delegationD. A secondary zone

Correct Answer: BSection: (none)Explanation

Explanation/Reference:I think the choice is right.

If question had added: The solution must ensure that users in contoso.com can resolve names infabrikam.com if the WAN link fails.The choice should have been: Create a secondary zone. See McKenzie Q3-2

QUESTION 40Q40 = V31-Q103 = Snowden:Q186 # McKenzie Q6-24 please verify

Your network contains an Active Directory domain named adatum.com. The domain contains a file servernamed Server1 that runs Windows Server 2012 R2.

All client computers run Windows 7.

You need to ensure that user settings are saved to \\Server1\Users\.What should you do?

A. From a Group Policy object (GPO), configure the Folder Redirection settings.B. From the properties of each user account, configure the Home folder settings.C. From the properties of each user account, configure the User profile settings.D. From a Group Policy object (GPO), configure the Drive Maps preference.

Correct Answer: ASection: (none)Explanation

Page 65: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Explanation/Reference:The bold words in the question is minePlease verify the choice

McKenzie Q6-24 question, almost same question, His answer is A Do we have any different between windows 7 & 8 rega rding this choice ?-----------------------------------------------Your network contains an Active Directory domain named contoso.com . All servers run Windows Server 2012.The domain contains a file server named Server1.

All client computers run Windows 8 . Users share the client computers and frequently log on to different clientcomputers.

You need to ensure that when the users save files in the Documents folder, the files are saved automatically to\\Server1\Users\. The solution must minimize the amount of network tr affic that occurs when the userslog on to the client computers.What should you do?----------------------------------------------Same choices----------------------------------------------Explanation:

http://en.wikipedia.org/wiki/Folder_redirection

Драган - Nov 18, 2013:I do not see how My documents location could be changed from User profile settings. It could be changed inthis way http://support.microsoft.com/kb/310147 .I think that correct answer is A. Folder redirection. IT does not use much network traffic because it usessynchronization for only changes.

RinCE from Spain - Nov 26, 2013:Should not be "folder redirection"?

hatewin from Romania - Dec 03, 2013:Folder redirection. User profile settings also add the desktop settings and consequently the amount of networktraffic will increase.

Ricardo/Snowden: Answer C

Snowden:Q186 David:Q225 Ricardo:Q165 ScottCha:D31

QUESTION 41Q41 One new choices but almost like McKenzie-Q6-19, Snowden:Q175 David:Q266 Ricardo:Q254 ScottCha:D21

Your network contains an Active Directory domain named contoso.com. All domain controllers run WindowsServer 2012 R2.

An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A GroupPolicy object (GPO) named GPO1 is linked to OU1.

You make a change to GPO1.

You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solutionmust minimize administrative effort.

Which tool should you use?

Page 66: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

A. A1: Group Policy Object Editor | A2: The Secedit commandB. The Set-AdComputer cmdletC. Active Directory Users and ComputersD. The Invoke-GPUpdate cmdlet

Correct Answer: DSection: (none)Explanation

Explanation/Reference:The A choice "Group Policy Object Editor" is new it use to be "The Secedit command".But I think the answer is still "The Invoke-GPUpdate cmdlet".

(V31-Q82 6 V31-Q104 same question but complete different choices)

Get-ADComputer –filter * -Searchbase "ou=Accounting , dc=Contoso,dc=com" | foreach{ Invoke-GPUpdate –computer $_.name -force}

You can force an immediate Group Policy refresh for all Group Policy settings for all computers in a single OUwhen you combine the Get-ADComputer with the Invoke-GPUpdate cmdlet and set the –-RandomDelayInMinutes to 0. For example, to force a refresh of all Group Policy settings for all computers inthe Accounting OU of the Contoso.com domain, use the following script:

Invoke-GPUpdate - schedules a remote Group Policy refresh (gpupdate) on the specified computer.

The Invoke-GPUpdate cmdlet refreshes Group Policy settings, including security settings that are set onremote computers by scheduling the running of the Gpupdate command on a remote computer. You cancombine this cmdlet in a scripted fashion to schedule the Gpupdate command on a group of computers.

The refresh can be scheduled to immediately start a refresh of policy settings or wait for a specified period oftime, up to a maximum of 31 days. To avoid putting a load on the network, the refresh times will be offset by arandom delay.

Group Policy is a complicated infrastructure that enables you to apply policy settings to remotely configure acomputer and user experience within a domain. When the Resultant Set of Policy settings does not conform toyour expectations, a best practice is to first verify that the computer or user has received the latest policysettings. In previous versions of Windows, this was accomplished by having the user run GPUpdate.exe ontheir computer.

With Windows Server 2012 and Windows 8, you can remotely refresh Group Policy settings for all computers inan organizational unit (OU) from one central location by using the Group Policy Management Console (GPMC).Or you can use the Invoke-GPUpdate Windows PowerShell cmdlet to refresh Group Policy for a set ofcomputers, including computers that are not within the OU structure-for example, if the computers are locatedin the default computers container.

The remote Group Policy refresh updates all Group Policy settings, including security settings that are set on agroup of remote computers, by using the functionality that is added to the context menu for an OU in the GroupPolicy Management Console (GPMC). When you select an OU to remotely refresh the Group Policy settings onall the computers in that OU, the following operations happen:1. An Active Directory query returns a list of all computers that belong to that OU.2. For each computer that belongs to the selected OU, a WMI call retrieves the list of signed in users.3. A remote scheduled task is created to run GPUpdate.exe /force for each signed in user and once for the

computer Group Policy refresh. The task is scheduled to run with a random delay of up to 10 minutes todecrease the load on the network traffic. This random delay cannot be configured when you use the GPMC,but you can configure the random delay for the scheduled task or set the scheduled task to run immediatelywhen you use the Invoke-GPUpdate cmdlet.

Page 67: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

http://technet.microsoft.com/en-us/library/jj134201.aspx

---------Other explanations:In the previous versions of Windows, this was accomplished by having the user run GPUpdate.exe on theircomputer.

Starting with Windows Server® 2012 and Windows® 8, you can now remotely refresh Group Policy settings forall computers in an OU from one central location through the Group Policy Management Console (GPMC). Oryou can use the Invoke-GPUpdatecmdlet to refresh Group Policy for a set of computers, not limited to the OUstructure, for example, if the computers are located in the default computers container.

Page 68: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

http://technet.microsoft.com/en-us//library/jj134201.aspxhttp://blogs.technet.com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-server-2012-using- remote-gpupdate.aspx

QUESTION 42Q42 = McK Q6-39 = Snowden:Q25 David:Q25,Q148 Ricardo:Q139 ScottCha:A20 Korede:B11,B60 # V31-Q49 please verify

Your network contains an Active Directory domain named contoso.com. All domain controllers run WindowsServer 2012 R2. The domain contains 500 client computers that run Windows 8.1 Enterprise and MicrosoftOffice 2013.You implement a Group Policy central store.

You need to modify the default Microsoft Office 2013 Save As lo cation for all client computers.The solution must minimize administrative effort.

What should you configure in a Group Policy object (GPO)?

A. The Administrative TemplatesB. An application control policyC. The Group Policy preferencesD. The Software Installation settings

Correct Answer: CSection: (none)Explanation

Explanation/Reference:V31-Q49 said D

McKenzie Q6-39 question:

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows

Page 69: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Server 2012. The domain contains 500 client computers that run Windows 8 Enterprise.

You implement a Group Policy central store.

You have an application named App1. App1 requires that a custom registry setting be deployed to all of thecomputers.

You need to deploy the custom registry setting. The solution must minimize administrator effort.

What should you configure in a Group Policy object (GPO)?

------------------------Same choices------------------------

Explanation:

A. User Configuration\Software Settings is for software settings that apply to users regardless of whichcomputer they log on to. This folder also contains the Software installation subitem, and it might contain othersubitems that are placed there by independent software vendors.

B. Computer Configuration\Windows Settings\Security Settings\Application Control Policies

C. Group Policy preferences provide the means to simplify deployment and standardize configurations. Theyadd to Group Policy a centralized system for deploying preferences (that is, settings that users can changelater). You can also use Group Policy preferences to configure applications that are not Group Policy-aware. Byusing Group Policy preferences, you can change or delete almost any registry settin g, file or folder,shortcut, and more . You are not limited by the contents of Administrative Template files. The Group PolicyManagement Editor (GPME) includes Group Policy preferences.

Group Policy preferences , new for the Windows Server 2008 operating system, include more than 20 newGroup Policy extensions that expand the range of configurable settings within a Group Policy object (GPO).These new extensions are included in the Group Policy Management Editor window of the Group PolicyManagement Console (GPMC), under the new Preferences item. Examples of the new Group Policypreference extensions include folder options, mapped drives, printers, scheduled tasks, services, and Startmenu settings.

Group Policy preferences provide better targeting, through item-level targeting and action modes. Additionally,rich user interfaces and standards-based XML configurations provide you with more power and flexibility overmanaged computers when you administer GPOs.

In addition to providing significantly more coverage, better targeting, and easier management, Group Policypreferences enable you to deploy settings to client computers without restricting the users from changing thesettings. This capability provides you with the flexibility to decide which settings to enforce and which settings tonot enforce. You can deploy settings that you do not want to enforce by using Group Policy preferences.

Page 70: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab
Page 71: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

D. Computer Configuration\Software Settings is for software settings that apply to all users who log on to thecomputer. This folder contains the Software installation subitem, and it might contain other subitems that areplaced there by independent software vendors.

http://technet.microsoft.com/en-us/library/hh125923%28v=WS.10%29.aspxhttp://technet.microsoft.com/en-us/library/gg699429.aspxhttp://www.unidesk.com/blog/gpos-set-custom-registry-entries-virtual-desktops-disabling-machine-passwordhttp://technet.microsoft.com/en-us/library/cc784044%28v=ws.10%29.aspx

QUESTION 43Q43 = V31-Q50 = Mck Q6-20 = Snowden:Q216 David:Q249 Ricardo:Q204 ScottCha:E12

Your network contains an Active Directory domain named contoso.com. All domain controllers run WindowsServer 2012 R2.

The domain contains 200 Group Policy objects (GPOs).

An administrator named Admin1 must be able to add new WMI filters from the Group Policy ManagementConsole (GPMC).You need to delegate the required permissions to Admin1. The solution must minimize the number ofpermissions assigned to Admin1.

What should you do?

A. From Active Directory Users and Computers, add Admin1 to the WinRMRemoteWMIUsers__group.

Page 72: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

B. From Group Policy Management, assign Creator Owner to Admin1 for the WMI Filters container.C. From Active Directory Users and Computers, add Admin1 to the Domain Admins group.D. From Group Policy Management, assign Full control to Admin1 for the WMI Filters container.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Users with Full control permissions can create and control all WMI filters in the domain, including WMI filterscreated by others.Users with Creator owner permissions can create WMI filters, but can only control WMI filters that they create.

http://technet.microsoft.com/en-us/library/cc757429(v=ws.10).aspx

QUESTION 44Q44 = V31-Q8

Your network contains two Active Directory forests named contoso.com and dev.contoso.com. Thecontoso.com forest contains a domain controller named DC1. The dev.contoso.com forest contains a domaincontroller named DC2. Each domain contains an organizational unit (OU) named OU1.

Dev.contoso.com has a Group Policy object (GPO) named GPO1. GPO1 contains 200 settings, includingseveral settings that have network paths. GPO1 is linked to OU1.

Page 73: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

You need to copy GPO1 from dev.contoso.com to contoso.com.

What should you do first on DC2?

A. From the Group Policy Management console, right-click GPO1 and select Copy.B. Run the mtedit.exe command and specify the /Domain:contoso.com /DC:DC1 parameter.C. Run the Save-NetGpo cmdlet.D. Run the Backup-Gpo cmdlet.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:A copy operation transfers settings using an existing GPO in Active Directory as the source and creates a newGPO as its destination. A copy operation can be used to transfer settings to a new GPO either in the samedomain, cross-domain in the same forest, or cross-domain in a separate forest. Since a copy operation uses anexisting GPO in Active Directory as its source, trust is required between the source and destination domains, oryou must use the Stored User Names and Passwords tool as described earlier in the section “ManagingMultiple Forests,” to gain access to the untrusted forest. Copy operations are ideally suited for migrating GPOsbetween production environments, as well as for migrating Group Policy that has been staged and tested in atest domain or forest to a production environment.

http://technet.microsoft.com/en-us/library/cc739955%28WS.10%29.aspxhttp://technet.microsoft.com/en-us/library/ee461050.aspx

QUESTION 45Q45 # V31-Q45 - Please verify

Your network contains an Active Directory domain named contoso.com.

All user accounts for the marketing department reside in an organizational unit (OU) named OU1. All useraccounts for the finance department reside in an organizational unit (OU) named OU2.

You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU2. You configure the Group Policypreference of GPO1 to add a shortcut named Link1 to the desktop.

You discover that when a user signs in, the Link1 is not added to the desktop.

You need to ensure that when a user signs in, Link1 is added to the desktop . What should you do?

A. Enforce GPO1.B. Enable loopback processing in GPO1.C. Modify the Link1 shortcut preference of GPO1.D. Modify the Security Filtering settings of GPO1.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Answer D ?The bold words in the question is mine.

Please compare V31-Q10 with McKenzie Q6-35 = Snowd en:Q180 David:Q216 Ricardo:Q153ScottCha:D26

Page 74: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Same choices, more or less same same question but d ifferent answer. Please verify

umar00o UK.: "shortcut preference" or "Security Filtering"

McKenzie Q6-35:Your network contains an Active Directory domain named contoso.com.All user accounts reside in an organizational unit (OU) named OU1.You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU1. You configure the Group Policypreference of GPO1 to add a shortcut named Link1 to the desktop of each user . You discover that when a user deletes Link1, the shortcut is removed permanently from the deskto p.You need to ensure that if a user deletes Link1 , the shortcut is added to the desktop again.What should you do?---Same choices but the right answer was Modify the Link1 shortcut preference of GPO1. ---This type of preference item provides a choice of four actions: Create, Replace, Update, and Delete. Thebehavior of the preference item varies with the action selected and whether the shortcut already exists.

http://technet.microsoft.com/en-us/library/cc753580.aspx

QUESTION 46Q46 = V31-Q105 = Mck Q6-41 = Snowden:Q218 Ricardo:Q209 ScottCha:E14

Your network contains an Active Directory domain named contoso.com. The domain contains a domaincontroller named DC1 that runs Windows Server 2012 R2.

All client computers run Windows 8 Enterprise.

DC1 contains a Group Policy object (GPO) named GPO1.

You need to update the PATH variable on all of the client computers.

Which Group Policy preference should you configure?

A. Ini FilesB. ServicesC. Data SourcesD. Environment

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 47

Page 75: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Q47 = V31-Q151 = McK Q3-2 = Snowden:Q46 David:Q50 Ricardo:Q66,Q100 ScottCha:H1/18 Jimi:A18 Korede:C7 Molly1:Q15

Your network contains a RADIUS server named Server1.

You install a new server named Server2 that runs Windows Server 2012 R2 and has Network Policy Server(NPS) installed.

You need to ensure that all accounting requests for Server2 are forwarded to Server1.

On Server2, you configure a Connection Request Policy.

What else should you configure on Server2?To answer, select the appropriate node in the answer area.

Point and Shoot:

Correct Answer:

Section: (none)Explanation

Page 76: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Explanation/Reference:Explanation:

When you configure NPS as a RADIUS proxy, you create a new connection request policy that NPS uses todetermine which connection requests to forward to other RADIUS servers. In addition, the connection requestpolicy is configured by specifying a remote RADIUS server group that contains one or more RADIUS servers,which tells NPS where to send the connection requests that match the connection request policy.

When you configure Network Policy Server (NPS) as a Remote Authentication Dial-In User Service (RADIUS)proxy, you use NPS to forward connection requests to RADIUS servers that are capable of processing theconnection requests because they can perform authentication and authorization in the domain where the useror computer account is located. For example, if you want to forward connection requests to one or moreRADIUS servers in untrusted domains, you can configure NPS as a RADIUS proxy to forward the requests tothe remote RADIUS servers in the untrusted domain.

To configure NPS as a RADIUS proxy, you must create a connection request policy that contains all of theinformation required for NPS to evaluate which messages to forward and where to send the messages.

When you configure a remote RADIUS server group in NPS and you configure a connection request policy withthe group, you are designating the location where NPS is to forward connection requests.

A remote RADIUS server group is a named group that contains one or more RADIUS servers. If you configuremore than one server, you can specify load balancing settings to either determine the order in which the serversare used by the proxy or to distribute the flow of RADIUS messages across all servers in the group to preventoverloading one or more servers with too many connection requests.

Each server in the group has the following settings:Name or addressEach group member must have a unique name within the group. The name can be an IP address or a namethat can be resolved to its IP address.Authentication and accountingYou can forward authentication requests, accounting requests, or both to each remote RADIUS servergroup member.Load balancing

A priority setting is used to indicate which member of the group is the primary server (the priority is set to 1). Forgroup members that have the same priority, a weight setting is used to calculate how often RADIUS messagesare sent to each server. You can use additional settings to configure the way in which the NPS server detectswhen a group member first becomes unavailable and when it becomes available after it has been determinedto be unavailable.

After a remote RADIUS server group is configured, it can be specified in the authentication and accountingsettings of a connection request policy. Because of this, you can configure a remote RADIUS server group first.Next, you can configure the connection request policy to use the newly configured remote RADIUS servergroup. Alternatively, you can use the New Connection Request Policy Wizard to create a new remote RADIUSserver group while you are creating the connection request policy.

Page 77: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab
Page 78: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Remote RADIUS server groups are unrelated to and separate from Windows groups and Network AccessProtection (NAP) remediation server groups.

http://technet.microsoft.com/en-us/library/cc754518.aspxhttp://technet.microsoft.com/en-us/library/cc753894.aspx

QUESTION 48Q48 = V31-Q102 new question please verify

Your network contains an Active Directory domain named contoso.com. The domain contains a server named

Page 79: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy and Access Services server roleinstalled.

Your company's security policy requires that certif icate-based authentication must be used by somenetwork services.

You need to identify which Network Policy Server (NPS) authentication methods comply with the securitypolicy.

Which two authentication methods should you identify? (Each correct answer presents part of the solution.Choose two.)

A. MS-CHAPB. PEAP-MS-CHAP v2C. ChapD. EAP-TLSE. MS-CHAP v2

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:The bold words in the question is mine - the bold lines is a new variable of an old question - please verify

PEAP is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create a secure TLStunnel to protect user authentication, and uses server-side public key certificates to authenticate the server.

When you use EAP with a strong EAP type, such as TLS with smart cards or TLS with certificates, both theclient and the server use certificates to verify their identities to each other.

QUESTION 49Q49 = Mck Q4-28 = Snowden:Q117 David:Q127 Ricardo:Q40 ScottCha:C15 Jimi:B40 Korede:A44 Molly1:B28

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012R2. The domain contains two servers. The servers are configured as shown in the following table.

All client computers run Windows 8 Enterprise.

You plan to deploy Network Access Protection (NAP) by using IPSec enforcement.

A Group Policy object (GPO) named GPO1 is configured to deploy a trusted server group to all of the clientcomputers.

Page 80: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

You need to ensure that the client computers can discover HRA servers automatically.

Which three actions should you perform? (Each correct answer presents part of the solution.Choose three.)

A. On all of the client computers, configure the EnableDiscovery registry key.B. In a GPO, modify the Request Policy setting for the NAP Client Configuration.C. On Server2, configure the EnableDiscovery registry key.D. On DC1, create an alias (CNAME) record.E. On DC1, create a service location (SRV) record.

Correct Answer: ABESection: (none)Explanation

Explanation/Reference:Requirements for HRA automatic discovery

The following requirements must be met in order to configure trusted server groups on NAP client computersusing HRA automatic discovery:

Client computers must be running Windows Vista® with Service Pack 1 (SP1) or Windows XP with ServicePack 3 (SP3).The HRA server must be configured with a Secure Sockets Layer (SSL) certificate.The EnableDiscovery registry key must be configured on NAP client computers .DNS SRV records must be configured.The trusted server group configuration in either local policy or Group Policy must be cleared.

http://technet.microsoft.com/en-us/library/dd296901.aspx

QUESTION 50Q50 = V31-Q169 new question please verify

Your network contains an Active Directory named contoso.com.

You have users named User1 and user2.

The Network Access Permission for User1 is set to Control access through NPS Network Policy .The Network Access Permission for User2 is set to Allow access .

A policy named Policy1 is shown in the Policy1 exhibit. (Click the Exhibit button.)

Page 81: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

A policy named Policy2 is shown in the Policy2 exhibit. (Click the Exhibit button.)

Page 82: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

A policy named Policy3 is shown in the Policy3 exhibit. (Click the Exhibit button.)

Page 83: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

For each of the following statements, select Yes if the statement is true. Otherwise, select No.Each correct selection is worth one point.

Hot Area:

Page 84: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Correct Answer:

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 51Q51 = McK Q4-17 = Snowden:Q178 David:Q237 Ricardo:Q184 ScottCha:D24 # V31-Q1 is wrong

Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1 that runs Windows Server 2012 R2.

Server1 has the following role services installed:DirectAccess and VPN (RRAS)Network Policy Server

Remote users have client computers that run either Windows XP, Windows 7, or Windows 8.

You need to ensure that only the client computers that run Windows 7 or Windows 8 can establish VPN

Page 85: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

connections to Server1.

What should you configure on Server1?

A. a condition of a Network Policy Server (NPS) network policyB. a constraint of a Network Policy Server (NPS) network policyC. a condition of a Network Policy Server (NPS) connection request policyD. a vendor-specific RADIUS attribute of a Network Policy Server (NPS) connection request policy

Correct Answer: ASection: (none)Explanation

Explanation/Reference:A choice = McK Q4-17 = Snowden:Q178 = David:Q237 = Ricardo:Q184 = ScottCha:D24C choice = V31-Q1

QUESTION 52Q52 = V31-Q183 new question please verify

Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1 that has the Network Policy Server server role installed. The domain contains a server named Server2that is configured for RADIUS accounting.

Server1 is configured as a VPN server and is configured to forward authentication requests to Server2.You need to ensure that only Server2 contains event information about authentication requests fromconnections to Server1.

Which two nodes should you configure from the Network Policy Server console? To answer, select theappropriate two nodes in the answer area.

Hot Area:

Page 86: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Correct Answer:

Page 87: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 53Q53 = V31-Q101 = McK Q4-1 =Snowden:Q47 David:Q51 Ricardo:Q67 Peggy:Q52 ScottCha:A36 Jimi:A19 Korede:B47 Molly1:A15

Your network contains two Active Directory forests named contoso.com and adatum.com. The contoso.comforest contains a server named Server1.contoso.com. The adatum.com forest contains a server namedserver2.adatum.com. Both servers have the Network Policy Server role service installed.

The network contains a server named Server3. Server3 is located in the perimeter network and has theNetwork Policy Server role service installed.

You plan to configure Server3 as an authentication provider for several VPN servers.

You need to ensure that RADIUS requests received by Server3 for a specific VPN server are always forwardedto Server1.contoso.com.

Which two should you configure on Server3? (Each correct answer presents part of the solution.Choose two.)

A. Remediation server groupsB. Remote RADIUS server groupsC. Connection request policiesD. Network policies

Page 88: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

E. Connection authorization policies

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:To configure NPS as a RADIUS proxy, you must create a connection request policy that contains all of theinformation required for NPS to evaluate which messages to forward and where to send the messages.

When you configure Network Policy Server (NPS) as a Remote Authentication Dial-In User Service (RADIUS)proxy, you use NPS to forward connection requests to RADIUS servers that are capable of processing theconnection requests because they can perform authentication and authorization in the domain where the useror computer account is located. For example, if you want to forward connection requests to one or moreRADIUS servers in untrusted domains, you can configure NPS as a RADIUS proxy to forward the requests tothe remote RADIUS servers in the untrusted domain. To configure NPS as a RADIUS proxy, you must create aconnection request policy that contains all of the information required for NPS to evaluate which messages toforward and where to send the messages.

When you configure a remote RADIUS server group in NPS and you configure a connection request policywith the group, you are designating the location where NPS is to forward connection requests.

Page 89: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

http://technet.microsoft.com/en-us/library/cc754518.aspx

QUESTION 54Q54 = V31-Q35 = McK Q6-6 = Snowden:Q11 David:Q10 Ricardo:Q46 ScottCha:A10 Jimi:B46 Korede:B71 Tara:B20 Molly1:A3

Note : This question is part of a series of questions that use the same or similar answer choices. An answerchoice may be correct for more than one question in the series. Each question is independent of the otherquestion in this series.Information and details provided in a question apply only to this question.

Your network contains an Active Directory domain named contoso.com. The domain contains more than 100Group Policy objects (GPOs). Currently, there are no enforced GPOs.

Page 90: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

The domain is renamed to adatum.com.Group Policies no longer function correctly.

You need to ensure that the existing GPOs are appli ed to users and computers. You want to achievethis goal by using the minimum amount of administra tive effort.

What should you use?

A. DcgpofixB. Get-GPOReportC. GpfixupD. GpresultE. Gpedit.mscF. Import-GPOG. Restore-GPOH. Set-GPInheritanceI. Set-GPLinkJ. Set-GPPermissionK. GpupdateL. Add-ADGroupMember

Correct Answer: CSection: (none)Explanation

Explanation/Reference:The bold word in the question is mine, it is not in the exam. But the note is and I have not seen this in the V31 etc text.

Gpfixup - Fix domain name dependencies in Group Policy Objects (GPOs) and Group Policy links after adomain rename operation.

You can use the gpfixup command-line tool to fix the dependencies that Group Policy objects (GPOs) andGroup Policy links in Active Directory Domain Services (AD DS) have on Domain Name System (DNS) andNetBIOS names after a domain rename operation.

gpfixup /olddns: MyOldDnsName /newdns:MyNewDnsName /oldnb: MyOldNetBIOSName /newnb:MyNewNetBIOSName /dc:MyDcDnsName 2>&1 >gpfixu p.log

http://technet.microsoft.com/en-us//library/hh852336%28v=ws.10%29.aspx

QUESTION 55Q55 = V31-Q34 = McK Q6-4 = Snowden:Q12 David:Q11 Ricardo:Q47 Peggy:Q39 ScottCha:A11 Jimi:B47 Korede:B72

Note : This question is part of a series of questions that use the same or similar answer choices. An answerchoice may be correct for more than one question in the series. Each question is independent of the otherquestion in this series.Information and details provided in a question apply only to this question.

Your network contains an Active Directory domain named contoso.com. The domain contains more than 100Group Policy objects (GPOs). Currently, there are no enforced GPOs.

The domain contains a top-level organizational unit (OU) for each department. A group named Group1contains members from each department.

You have a GPO named GPO1 that is linked to the dom ain.

Page 91: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

You need to configure GPO1 to apply settings to Gro up1 only.

What should you use?

A. DcgpofixB. Get-GPOReportC. GpfixupD. GpresultE. Gpedit.mscF. Import-GPOG. Restore-GPOH. Set-GPInheritanceI. Set-GPLinkJ. Set-GPPermissionK. GpupdateL. Add-ADGroupMember

Correct Answer: JSection: (none)Explanation

Explanation/Reference:The bold word in the question is mine, it is not in the exam. But the note is and I have not seen this in the V31 etc text.

J. Set-GPPermissions - Grants a level of permissions to a security principal for one GPO or all the GPOs in adomain.

C:\PS> Set-GPPermissions -All -TargetName "Marketing Admi ns" -TargetType Group -PermissionLevel GpoEdit -Replace

Grants a level of permissions to a security principal (user, security group , or computer) for one GPO or all theGPOs in a domain. You use the TargetName and TargetType parameters to specify a user, security group, orcomputer for which to set the permission level. You can use the Name or the Guid parameter to set thepermission level for the security principal on a single GPO, or you can use the All parameter to set thepermission level for the security principal on all GPOs in the domain.

By default, if the security principal already has a higher permission level than the specified permission level, thechange is not applied. You can specify the Replace parameter, to remove the existing permission level from theGPO before the new permission level is set. This ensures that the existing permission level is replaced by thenew permission level.

-Replace <SwitchParameter>Specifies that the existing permission level for the group or user is removed before the new permission level isset. If a security principal is already granted a permission level that is higher than the specified permission leveland you do not use the Replace parameter, no change is made.

http://technet.microsoft.com/en-us/library/ee461038.aspx

QUESTION 56Q56 = V31-Q33 = Mck Q6-27 = Snowden:Q10 David:Q9 Ricardo:Q44 Peggy:Q37 ScottCha:A9 Jimi:B45 Korede:B70 Tara:B19 Molly1:A2

Note : This question is part of a series of questions that use the same or similar answer choices. An answerchoice may be correct for more than one question in the series. Each question is independent of the otherquestion in this series.Information and details provided in a question apply only to this question.

Your network contains an Active Directory domain named contoso.com. The domain contains more than 100

Page 92: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Group Policy objects (GPOs). Currently, there are no enforced GPOs.

A network administrator accidentally deletes the De fault Domain Policy GPO.You do not have a backup of any of the GPOs.

You need to recreate the Default Domain Policy GPO.

What should you use?

A. DcgpofixB. Get-GPOReportC. GpfixupD. GpresultE. Gpedit.mscF. Import-GPOG. Restore-GPOH. Set-GPInheritanceI. Set-GPLinkJ. Set-GPPermissionK. GpupdateL. Add-ADGroupMember

Correct Answer: ASection: (none)Explanation

Explanation/Reference:The bold word in the question is mine, it is not in the exam. But the note is and I have not seen this in the V31 etc text.

Dcgpofix - Recreates the default Group Policy Objects (GPOs) for a domain.

DCGPOFix [/ignoreschema] [/target: {Domain | DC | Both}] [/ ?]

Restores the default Group Policy objects to their original state (that is, the default state after initial installation).

http://technet.microsoft.com/pt-pt/library/hh875588%28v=ws.10%29.aspx

QUESTION 57Q57 = V31-Q32 = McK Q6-2 = Snowden:Q7 David:Q6 Ricardo:Q37,Q45 Peggy:Q31,Q38 ScottCha:A7 Jimi:B37 Korede:A3 Tara:B15

Note : This question is part of a series of questions that use the same or similar answer choices. An answerchoice may be correct for more than one question in the series. Each question is independent of the otherquestion in this series.Information and details provided in a question apply only to this question.

Your network contains an Active Directory domain named contoso.com. The domain contains more than 100Group Policy objects (GPOs). Currently, there are no enforced GPOs.

You have two GPOs linked to an organizational unit (OU) named OU1.

You need to change the precedence order of the GPOs .

What should you use?

A. DcgpofixB. Get-GPOReport

Page 93: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

C. GpfixupD. GpresultE. Gpedit.mscF. Import-GPOG. Restore-GPOH. Set-GPInheritanceI. Set-GPLinkJ. Set-GPPermissionK. GpupdateL. Add-ADGroupMember

Correct Answer: ISection: (none)Explanation

Explanation/Reference:The bold word in the question is mine, it is not in the exam. But the note is and I have not seen this in the V31 etc text.

Set-GPLink - Sets the properties of the specified GPO link.

You can set the following properties:Enabled. If the GPO link is enabled, the settings of the GPO are applied when Group Policy is processed forthe site, domain or OU.Enforced. If the GPO link is enforced, it cannot be blocked at a lower-level (in the Group Policy processinghierarchy) container.Order . The order specifies the precedence that the settings of the GPO take over conflicting settings inother GPOs that are linked (and enabled) to the same site, domain, or OU.

C:\PS> Set-GPLink -Name TestGPO -Target "ou=MyOU,dc=conto so,dc=com" -LinkEnabledYes

GpoId : c25daa3e-5d05-43b3-87ca-0a237882fd63DisplayName : Test2GPOEnabled : TrueEnforced : FalseTarget : OU=MyOU,DC=contoso,DC=comOrder : 1

http://technet.microsoft.com/en-us/library/ee461022.aspx

QUESTION 58V2:This 57 questions is from a real 70-411 exam from one of the last days in march 2014.The order of the question is 100% like the real exam this day. Maybe they are random next day?

The order of the choices is not 100% like the exam, but the text is 99,9% right. Maybe the order is random at the exam?

Most of the question can you find in the Premium V31 from 22 march Dump = Annette Dump from 2014-04-07.Some of the question is to old for V31 dump, but they are found in McKenzies dump.

A lot of the explanation in V31 is copied from McKenzie / Snowden ..., but the formatting of the text is bad, Ihave changed it in this version

There are some new choices to old question, but this is documented in the dump.

I'm not 100% sure about the right choices, but it is documented where the choice is from.

Page 94: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Be aware 13 of these real exam question you cannot find the right answer in Premium V31 dump !

I have compare the questionin this Exam with the Premium V31 from 22 march Dump, McKenzie andSnowd en

Page 95: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab
Page 96: Microsoft.Certkiller.70-411.v2014-04-29.by.KATHRYN · 4/30/2014  · VM for Subsequent failures (which is used after the first and second failures) and is set via the Recovery tab

Correct Answer: Section: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/


Recommended