QUESTION 31

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2. Both servers have the DFS Replication role service installed.

 

You need to configure the DFS Replication environment to meet the following requirements:

 

clip_image002Increase the quota limit of the staging folder.

clip_image002[1]Configure the staging folder cleanup process to provide the highest amount of free space possible.

 

Which cmdlets should you use to meet each requirement?

 

To answer, select the appropriate options in the answer area.

 

clip_image004

 

Correct Answer:

clip_image006

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 32

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that
runs Windows Server 2012 R2. Server1 has a share named Share1.

 

When users without permission to Share1 attempt to access the share, they receive the Access Denied message as shown in the exhibit. (Click the Exhibit button.)

 

clip_image008

 

You deploy a new file server named Server2 that runs Windows Server 2012 R2.

 

You need to configure Server2 to display the same custom Access Denied message as Server1.

 

What should you install on Server2?

 

A.

The Remote Assistance feature

B.

The Storage Services server role

C.

The File Server Resource Manager role service

D.

The Enhanced Storage feature

 

Correct Answer: C

Explanation:

Access-Denied Assistance is a new role service of the File Server role in Windows Server 2012.

 

clip_image010

 

We need to install the prerequisites for Access-Denied Assistance.

 

Because Access-Denied Assistance relies up on e-mail notifications, we also need to configure each relevant file server with a Simple Mail Transfer Protocol (SMTP) server address. Let’s do that quickly with Windows PowerShell:

 

Set-FSRMSetting -SMTPServer mailserver. nuggetlab.com -AdminEmailAddress admingroup@nuggetlab.com -FromEmailAddress admingroup@nuggetlab.com

 

You can enable Access-Denied Assistance either on a per-server basis or centrally via Group Policy. To my mind, the latter approach is infinitely preferable from an administration standpoint.

 

Create a new GPO and make sure to target the GPO at your file servers’ Active Directory computer accounts as well as those of your AD client computers. In the Group Policy Object Editor, we are looking for the following path to configure Access-Denied Assistance:

 

\Computer Configuration\Policies\Administrative Templates\System\Access-Denied Assistance

 

clip_image012

 

The Customize message for Access Denied errors policy, shown in the screenshot below, enables us to create the actual message box shown to users when they access a shared file to which their user account has no access.

 

clip_image014

What’s cool about this policy is that we can “personalize” the e-mail notifications to give us administrators (and, optionally, file owners) the details they need to resolve the permissions issue quickly and easily.

 

For instance, we can insert pre-defined macros to swap in the full path to the target file, the administrator e-mail address, and so forth. See this example:

 

Whoops! It looks like you’re having trouble accessing [Original File Path]. Please click Request Assistance to send [Admin Email] a help request e-mail message. Thanks!

 

You should find that your users prefer these human-readable, informative error messages to the cryptic, non-descript error dialogs they are accustomed to dealing with.

 

The Enable access-denied assistance on client for all file types policy should be enabled to force client computers to participate in Access-Denied Assistance. Again, you must make sure to target your GPO scope accordingly to “hit” your domain workstations as well as your Windows Server 2012 file servers.

 

Testing the configuration

 

This should come as no surprise to you, but Access-Denied Assistance works only with Windows Server 2012 and Windows 8 computers. More specifically, you must enable the Desktop Experience feature on your servers to see Access-Denied Assistance messages on server computers.

 

When a Windows 8 client computer attempts to open a file to which the user has no access, the custom Access-Denied Assistance message should appear:

 

clip_image016

 

If the user clicks Request Assistance in the Network Access dialog box, they see a secondary message:

 

clip_image018

 

At the end of this process, the administrator(s) will receive an e-mail message that contains the key information they need in order to resolve the access problem:

The user’s Active Directory identity

The full path to the problematic file

A user-generated explanation of the problem

 

So that’s it, friends! Access-Denied Assistance presents Windows systems administrators with an easy-to-manage method for more efficiently resolving user access problems on shared file system resources. Of course, the key caveat is that your file servers must run Windows Server 2012 and your client devices must run Windows 8, but other than that, this is a great technology that should save admins extra work and end-users extra headaches.

 

http://4sysops.com/archives/access-denied-assistance-in-windows-server-2012/

 

 

QUESTION 33

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed.

 

Each time a user receives an access-denied message after attempting to access a folder on Server1, an email notification is sent to a distribution list named DL1.

 

You create a folder named Folder1 on Server1, and then you configure custom NTFS permissions for Folder1.

 

You need to ensure that when a user receives an access-denied message while attempting to access Folder1, an email notification is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving notifications about other access-denied messages.

 

What should you do?

 

A.

From Server Manager, run the New Share Wizard to create a share for Folder1 by selecting the SMB Share – Advanced option.

B.

From the File Server Resource Manager console, modify the Access-Denied Assistance settings.

C.

From the File Server Resource Manager console, modify the Email Notifications settings.

D.

From Server Manager, run the New Share Wizard to create a share for Folder1 by selecting the SMB Share -Applications option.

 

Correct Answer: A

Explanation:

http://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK_12

When using the email model each of the file shares, you can determine whether access requests to each file share will be received by the administrator, a distribution list that represents the file share owners, or both.

The owner distribution list is configured by using the SMB Share ?Advanced file share profile in the New Share Wizard in Server Manager.

 

 

QUESTION 34

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed.

 

You need to configure Server1 to meet the following requirements:

 

clip_image002[2]Ensure that old files in a folder named Folder1 are archived automatically to a folder named Archive1.

clip_image002[3]Ensure that all storage reports are saved to a network share.

 

Which two nodes should you configure?

 

To answer, select the appropriate two nodes in the answer area.

 

clip_image020

 

Correct Answer:

clip_image022

 

 

QUESTION 35

DRAG DROP

You are a network administrator of an Active Directory domain named contoso.com.

 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Web Server (IIS) server role installed.

 

Server1 will host a web site at URL https://secure.contoso.com. The application pool identity account of the web site will be set to a domain user account named AppPool1.

 

You need to identify the setspn.exe command that you must run to configure the appropriate Service Principal Name (SPN) for the web site.

 

What should you run?

 

To answer, drag the appropriate objects to the correct location. Each object may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

 

clip_image024

 

Correct Answer:

clip_image026

 

 

QUESTION 36

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 is backed up daily.

 

The domain has the Active Directory Recycle Bin enabled.

 

During routine maintenance, you delete 500 inactive user accounts and 100 inactive groups. One of the deleted groups is named Group1. Some of the deleted user accounts are members of some of the deleted groups.

 

For documentation purposes, you must provide a list of the m
embers of Group1 before the group was deleted.

 

You need to identify the names of the users who were members of Group1 prior to its deletion.

 

You want to achieve this goal by using the minimum amount of administrative effort.

 

What should you do first?

 

A.

Mount the most recent Active Directory backup.

B.

Reactivate the tombstone of Group1.

C.

Perform an authoritative restore of Group1.

D.

Use the Recycle Bin to restore Group1.

 

Correct Answer: A

Explanation:

The Active Directory Recycle Bin does not have the ability to track simple changes to objects.

If the object itself is not deleted, no element is moved to the Recycle Bin for possible recovery in the future. In other words, there is no rollback capacity for changes to object properties, or, in other words, to the values of these properties.

 

 

 

 

 

 

 

 

 

 

QUESTION 37

Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers. The domain controllers are configured as shown in the following table.

 

clip_image028

 

The network contains a server named Server1 that has the Hyper-v server role installed. DC6 is a virtual machine that is hosted on Server1.

 

You need to ensure that you can clone DC6.

 

Which FSMO role should you transfer to DC2?

 

A.

Rid master

B.

Domain naming master

C.

PDC emulator

D.

Infrastructure master

 

Correct Answer: C

Explanation:

The clone domain controller uses the security context of the source domain controller (the domain controller whose copy it represents) to contact the Windows Server 2012 R2 Primary Domain Controller (PDC) emulator operations master role holder (also known as flexible single master operations, or FSMO). The PDC emulator must be running Windows Server 2012 R2, but it does not have to be running on a hypervisor.

http://technet.microsoft.com/en-us/library/hh831734.aspx


 

 

 

 

 

 

 

QUESTION 38

Your network contains an Active Directory domain named contoso.com. All domain controllers run either Windows Server 2008 or Windows Server 2008 R2.

 

You deploy a new domain controller named DC1 that runs Windows Server 2012 R2.

 

You log on to DC1 by using an account that is a member of the Domain Admins group.

 

You discover that you cannot create Password Settings objects (PSOs) by using Active Directory Administrative Center.

 

You need to ensure that you can create PSOs from Active Directory Administrative Center.

 

What should you do?

 

A.

Modify the membership of the Group Policy Creator Owners group.

B.

Transfer the PDC emulator operations master role to DC1.

C.

Upgrade all of the domain controllers that run Window Server 2008.

D.

Raise the functional level of the domain.

 

Correct Answer: D

Explanation:

Fine-grained password policies allow you to specify multiple password policies within a single domain so that you can apply different restrictions for password and account lockout policies to different sets of users in a domain. To use a fine-grained password policy, your domain functional level must be at least Windows Server 2008. To enable fine-grained password policies, you first create a Password Settings Object (PSO). You then configure the same settings that you configure for the password and account lockout policies. You can create and apply PSOs in the Windows Server 2012 environment by using the Active Directory Administrative Center (ADAC) or Windows PowerShell.

 

Step 1: Create a PSO

Applies To: Windows Server 2008, Windows Server 2008 R2

 

http://technet.microsoft.com/en-us//library/cc754461%28v=ws.10%29.aspx

 

 

QUESTION 39

Your network contains an Active Directory forest named contoso.com. The functional level of the forest is Windows Server 2008 R2.

 

All of the user accounts in the marketing department are members of a group named Contoso\MarketingUsers. All of the computer accounts in the marketing department are members of a group named Contoso\MarketingComputers.

 

A domain user named User1 is a member of the Contoso\MarketingUsers group. A computer named Computer1 is a member of the Contoso\MarketingComputers group.

 

You have five Password Settings objects (PSOs). The PSOs are defined as shown in the following table.

 

clip_image030

 

When User1 logs on to Computer1 and attempts to change her password, she receives an error message indicating that her password is too short.

 

You need to tell User1 what her minimum password length is.

 

What should you tell User1?

 

A.

10

B.

11

C.

12

D.

14

 

Correct Answer: A

Explanation:

One PSO has a precedence value of 2 and the other PSO has a precedence value of 4. In this case, the PSO that has the precedence value of 2 has a higher rank and, hence, is applied to the object.

 

 

QUESTION 40

Your network contains an Active Directory domain named contoso.com. The Active Directory Recycle bin is enabled for contoso.com.

 

A support technician accidentally deletes a user account named User1. You need to restore the User1 account.

 

Which tool should you use?

 

A.

Ldp

B.

Esentutl

C.

Active Directory Administrative Center

D.

Ntdsutil

 

Correct Answer: C

 

Free VCE & PDF File for Microsoft 70-411 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…