Download Microsoft.70-411.TestKing.2018-06-15.171q.tqb

Download Exam

File Info

Exam Administering Windows Server 2012
Number 70-411
File Name Microsoft.70-411.TestKing.2018-06-15.171q.tqb
Size 21 MB
Posted Jun 15, 2018
Download Microsoft.70-411.TestKing.2018-06-15.171q.tqb

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. 
You run ntdsutil as shown in the exhibit.
  
You need to ensure that you can access the contents of the mounted snapshot. 
What should you do?


  1. From the snapshot context of ntdsutil, run activate instance "NTDS".
  2. From a command prompt, run dsamain.exe -dbpath c:\$snap_201204131056_volumec$\windows\ntds\ntds. dit -Idapport 389.
  3. From the snapshot context of ntdsutil, run mount {79f94f82-5926-4f44-8af0-2f56d827a57d}.
  4. From a command prompt, run dsamain.exe -dbpath c:\$snap_201204131056_volumec$\windows\ntds\ntds. dit -Idapport 33389.
Correct answer: D
Explanation:
By default, only members of the Domain Admins group and the Enterprise Admins group are allowed to view the snapshots because they contain sensitive AD DS data. If you want to access snapshot data from an old domain or forest that has been deleted, you can allow nonadministrators to access the data when you run Dsamain.exe. If you plan to view the snapshot data on a domain controller, specify ports that are different from the ports that the domain controller will use. A client starts an LDAP session by connecting to an LDAP server, called a Directory System Agent (DSA), by default on TCP port and UDP [7] port 389. The client then sends an operation request to the server, and the server sends responses in return. With some exceptions, the client does not need to wait for a response before sending the next request, and the server may send the responses in any order. All information is transmitted using Basic Encoding Rules (BER).     References:http://technet.microsoft.com/en-us/library/cc753609(v=ws.10).aspx
By default, only members of the Domain Admins group and the Enterprise Admins group are allowed to view the snapshots because they contain sensitive AD DS data. If you want to access snapshot data from an old domain or forest that has been deleted, you can allow nonadministrators to access the data when you run Dsamain.exe. 
If you plan to view the snapshot data on a domain controller, specify ports that are different from the ports that the domain controller will use. 
A client starts an LDAP session by connecting to an LDAP server, called a Directory System Agent (DSA), by default on TCP port and UDP [7] port 389. The client then sends an operation request to the server, and the server sends responses in return. With some exceptions, the client does not need to wait for a response before sending the next request, and the server may send the responses in any order. All information is transmitted using Basic Encoding Rules (BER). 
  
References:
http://technet.microsoft.com/en-us/library/cc753609(v=ws.10).aspx



Question 2

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 is backed up daily. The domain has the Active Directory Recycle Bin enabled. 
During routine maintenance, you delete 500 inactive user accounts and 100 inactive groups. One of the deleted groups is named Group1. Some of the deleted user accounts are members of some of the deleted groups. 
For documentation purposes, you must provide a list of the members of Group1 before the group was deleted. 
You need to identify the names of the users who were members of Group1 prior to its deletion. 
You want to achieve this goal by using the minimum amount of administrative effort. 
What should you do first?


  1. Mount the most recent Active Directory backup.
  2. Reactivate the tombstone of Group1.
  3. Perform an authoritative restore of Group1.
  4. Use the Recycle Bin to restore Group1.
Correct answer: A
Explanation:
The Active Directory Recycle Bin does not have the ability to track simple changes to objects.  If the object itself is not deleted, no element is moved to the Recycle Bin for possible recovery in the future. In other words, there is no rollback capacity for changes to object properties, or, in other words, to the values of these properties.
The Active Directory Recycle Bin does not have the ability to track simple changes to objects.  
If the object itself is not deleted, no element is moved to the Recycle Bin for possible recovery in the future. In other words, there is no rollback capacity for changes to object properties, or, in other words, to the values of these properties.



Question 3

Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers. The domain controllers are configured as shown in the following table. 
  
The network contains a server named Server1 that has the Hyper-v server role installed. DC6 is a virtual machine that is hosted on Server1. 
You need to ensure that you can clone DC6. 
Which FSMO role should you transfer to DC2?


  1. Rid master
  2. Domain naming master
  3. PDC emulator
  4. Infrastructure master
Correct answer: C
Explanation:
The clone domain controller uses the security context of the source domain controller (the domain controller whose copy it represents) to contact the Windows Server 2012 R2 Primary Domain Controller (PDC) emulator operations master role holder (also known as flexible single master operations, or FSMO). The PDC emulator must be running Windows Server 2012 R2, but it does not have to be running on a hypervisor. Reference:http://technet.microsoft.com/en-us/library/hh831734.aspx
The clone domain controller uses the security context of the source domain controller (the domain controller whose copy it represents) to contact the Windows Server 2012 R2 Primary Domain Controller (PDC) emulator operations master role holder (also known as flexible single master operations, or FSMO). The PDC emulator must be running Windows Server 2012 R2, but it does not have to be running on a hypervisor. 
Reference:
http://technet.microsoft.com/en-us/library/hh831734.aspx









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files