[Free] Download New Updated (October 2016) Microsoft 70-411 Real Exam 71-80

Ensurepass

QUESTION 71

Your network contains two Active Directory domains named contoso.com and adatum.com.

 

The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. Server1 has a copy of the contoso.com DNS zone.

 

You need to configure Server1 to resolve names in the adatum.com domain. The solution must meet the following requirements:

 

clip_image002Prevent the need to change the configuration of the current name servers that host zones for adatum.com.

clip_image002[1]Minimize administrative effort.

 

Which type of zone should you create?

 

A.

Secondary

B.

Stub

C.

Reverse lookup

D.

Primary

 

Correct Answer: B

Explanation:

When a zone that this DNS server hosts is a stub zone, this DNS server is a source only for information about the authoritative name servers for this zone. The zone at this server must be obtained from another DNS server that hosts the zone. This DNS server must have network access to the remote DNS server to copy the authoritative name server information about the zone.

 

A stub zone is a copy of a zone that contains only necessary resource records (Start of Authority (SOA), Name Server (NS), and Address/Host (A) record) in the master zone and acts as a pointer to the authoritative name server. The stub zone allows the server to forward queries to the name server that is authoritative for the master zone without going up to the root name servers and working its way down to the server. While a stub zone can improve performance, it does not provide redundancy or load sharing.

 

clip_image004

 

You can use stub zones to:

Keep delegated zone information current. By updating a stub zone for one of its child zones regularly, the DNS server that hosts both the parent zone and the stub zone will maintain a current list of authoritative DNS servers for the child zone. Improve name resolution. Stub zones enable a DNS server to perform recursion using the stub zone’s list of name servers, without having to query the Internet or an internal root server for the DNS namespace.

Simplify DNS administration. By using stub zones throughout your DNS infrastructur
e, you can distribute a list of the authoritative DNS servers for a zone without using secondary zones. However, stub zones do not serve the same purpose as secondary zones, and they are not an alternative for enhancing redundancy and load sharing.

 

There are two lists of DNS servers involved in the loading and maintenance of a stub zone:

 

The list of master servers from which the DNS server loads and updates a stub zone. A master server may be a primary or secondary DNS server for the zone. In both cases, it will have a complete list of the DNS servers for the zone. The list of the authoritative DNS servers for a zone. This list is contained in the stub zone using name server (NS) resource records.

 

When a DNS server loads a stub zone, such as widgets. tailspintoys.com, it queries the master servers, which can be in different locations, for the necessary resource records of the authoritative servers for the zone widgets. tailspintoys.com. The list of master servers may contain a single server or multiple servers, and it can be changed anytime.

 

http://technet.microsoft.com/en-us/library/cc771898.aspx

http://technet.microsoft.com/en-us/library/cc754190.aspx

http://technet.microsoft.com/en-us/library/cc730980.aspx

 

 

 

QUESTION 72

Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers named DC1, DC2, DC3, DC4, DC5, and DC6. Each domain controller has the DNS Server server role installed and hosts an Active Directory-integrated zone for contoso.com.

 

You plan to create a new Active Directory-integrated zone named litwareinc.com that will be used for testing.

 

You need to ensure that the new zone will be available only on DC5 and DC6.

 

What should you do first?

 

A.

Change the zone replication scope.

B.

Create an Active Directory connection object.

C.

Create an Active Directory site link.

D.

Create an application directory partition.

 

Correct Answer: D

Explanation:

You can store Domain Name System (DNS) zones in the domain or application directory partitions of Active Directory Domain Services (AD DS). A partition is a data structure in AD DS that distinguishes data for different replication purposes. When you create an application directory partition for DNS, you can control the scope of replication for the zone that is stored in that partition.

 

 

QUESTION 73

HOTSPOT

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has two network adapters and is located in a perimeter network.

 

You need to install the RIP version 2 routing protocol on Server1.

 

Which node should you use to add the RIP version 2 routing protocol?

 

To answer, select the appropriate node in the answer area.

 

clip_image006

 

Correct Answer:

clip_image008

 

QUESTION 74

Your network contains an Active Directory domain named contoso.com. The domain contains a server named NPS1 that has the Network Policy Server server role installed. All servers run Windows Server 2012 R2.

 

You install the Remote Access server role on 10 servers.

 

You need to ensure that all of the Remote Access
servers use the same network policies.

 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

 

A.

Configure each Remote Access server to use the Routing and Remote Access service (RRAS) to authenticate connection requests.

B.

On NPS1, create a remote RADIUS server group. Add all of the Remote Access servers to the remote RADIUS server group.

C.

On NPS1, create a new connection request policy and add a Tunnel-Type and a Service-Type condition.

D.

Configure each Remote Access server to use a RADIUS server named NPS1.

E.

On NPS1, create a RADIUS client template and use the template to create RADIUS clients.

 

Correct Answer: CD

Explanation:

Connection request policies are sets of conditions and settings that allow network administrators to designate which RADIUS servers perform the authentication and authorization of connection requests that the server running Network Policy Server (NPS) receives from RADIUS clients. Connection request policies can be configured to designate which RADIUS servers are used for RADIUS accounting. When you configure Network Policy Server (NPS) as a Remote Authentication Dial-In User Service (RADIUS) proxy, you use NPS to forward connection requests to RADIUS servers that are capable of processing the connection requests because they can perform authentication and authorization in the domain where the user or computer account is located. For example, if you want to forward connection requests to one or more RADIUS servers in untrusted domains, you can configure NPS as a RADIUS proxy to forward the requests to the remote RADIUS servers in the untrusted domain. To configure NPS as a RADIUS proxy, you must create a connection request policy that contains all of the information required for NPS to evaluate which messages to forward and where to send the messages.

http://technet.microsoft.com/en-us/library/cc730866(v=ws.10).aspx

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 75

HOTSPOT

You have a server named Server1 that has the Web Server (IIS) server role installed.

 

You obtain a Web Server certificate.

 

You need to configure a website on Server1 to use Secure Sockets Layer (SSL).

 

To which store should you import the certificate?

 

To answer, select the appropriate store in the answer area.

 

clip_image010

 

Correct Answer:

clip_image012

 

 

QUESTION 76

Your network contains a server named Server1 that has the Network Policy and Access Services server role installed.

 

All of the network access servers forward connection requests to Server1.

 

You create a new network policy on Server1.

 

You need to ensure that the new policy applies only to connection requests from the 192.168.0.0/24 subnet.

 

What should you do?

 

A.

Set the Client IP4 Address condition to 192.168.0.0/24.

B.

Set the Client IP4 Address condition to 192.168.0.

C.

Set the Called Station ID constraint to 192.168.0.0/24.

D.

Set the Called Station ID constraint to 192.168.0.

 

Correct Answer: B

Explanation:

RADIUS client properties

Following are the RADIUS client conditions that you can configure in network policy.

Calling Station ID: Specifies the network access server telephone number that was dialed by the dial-up access client.

Client Friendly Name: Specifies the name of the RADIUS client that forwarded the connection request to the NPS server.

Client IPv4 Address: Specifies the Internet Protocol (IP) version 4 address of the RADIUS client that forwarded the connection request to the NPS server.

Client IPv6 Address: Specifies the Internet Protocol (IP) version 6 address of the RADIUS client that forwarded the connection request to the NPS server.

Client Vendor: Specifies the name of the vendor or manufacturer of the RADIUS client that sends connection requests to the NPS server.

MS RAS Vendor: Specifies the vendor identification number of the network access server that is requesting authentication.

 

 

QUESTION 77

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy and Access Services server role installed.

 

You plan to deploy 802.1x authentication to secure the wireless network.

 

You need to identify which Network Policy Server (NPS) authentication method supports certificate-based mutual authentication for the 802.1x deployment.

 

Which authentication method should you identify?

 

A.

MS-CHAP

B.

PEAP-MS-CHAPv2

C.

EAP-TLS

D.

MS-CHAP v2

 

Correct Answer: C

Explanation:

802.1X uses EAP, EAP-TLS, EAP-MS-CHAP v2, and PEAP authentication methods:

EAP (Extensible Authentication Protocol) uses an arbitrary authentication method, such as certificates, smart cards, or credentials.

EAP-TLS (EAP-Transport Layer Security) is an EAP type that is used in certificate- based security environments, and it provides the strongest authentication and key determination method.

EAP-MS-CHAP v2 (EAP-Microsoft Challenge Handshake Authentication Protocol version 2) is a mutual authentication method that supports password-based user or computer authentication.

PEAP (Protect
ed EAP) is an authentication method that uses TLS to enhance the security of other EAP authentication protocols.

 

 

 

 

QUESTION 78

HOTSPOT

Your network contains an Active Directory named contoso.com.

 

You have users named User1 and user2.

 

The Network Access Permission for User1 is set to Control access through NPS Network Policy. The Network Access Permission for User2 is set to Allow access.

 

A policy named Policy1 is shown in the Policy1 exhibit. (Click the Exhibit button.)

 

clip_image014

 

A policy named Policy2 is shown in the Policy2 exhibit. (Click the Exhibit button.)

 

clip_image016

 

A policy named Policy3 is shown in the Policy3 exhibit. (Click the Exhibit button.)

 

clip_image018

 

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

 

clip_image020

 

Correct Answer:

clip_image022

 

 

QUESTION 79

DRAG DROP

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server.

 

You need to log all DHCP clients that have windows Firewall disabled.

 

Which three actions should you perform in sequence?

 

To answer, move the three appropriate actions from the list of actions to
the answer area and arrange them in the correct order.

 

clip_image024

 

Correct Answer:

clip_image026

 

 

QUESTION 80

Your network contains an Active Directory domain named contoso.com. The domain contains client computers that run either Windows XP or Windows 8.

 

Network Policy Server (NPS) is deployed to the domain.

 

You plan to create a system health validator (SHV).

 

You need to identify which policy settings can be applied to all of the computers.

 

Which three policy settings should you identify? (Each correct answer presents part of the solution. Choose three.)

 

A.

Antispyware is up to date.

B.

Automatic updating is enabled.

C.

Antivirus is up to date.

D.

A firewall is enabled for all network connections.

E.

An antispyware application is on.

 

Correct Answer: BCD

Explanation:

The WSHA on NAP client computers running Windows XP SP3 does not monitor the status of antispyware applications.

 

clip_image027

 

Free VCE & PDF File for Microsoft 70-411 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…