[Free] Get all latest Microsoft 70-411 Actual Tests 181-190



Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 and has the Hyper-V server role installed. Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server 2012 and hosts a processor-intensive application named Appl. Users report that App1 responds more slowly than expected. You need to monitor the processor usage on VM1 to identify whether changes must be made to the hardware settings of VM1. Which performance object should you monitor on Server1?


A.      Processor

B.      Hyper-V Hypervisor Virtual Processor

C.      Hyper-V Hypervisor Root Virtual Processor

D.      Process

E.       Hyper-V Hypervisor Logical Processor


Correct Answer: B




Your network contains an Active Directory domain named adatum.com. The domain contains 10 domain controllers that run Windows Server 2012.


You plan to create a new Active Directory-integrated zone named contoso.com.

You need to ensure that the new zone will be replicated to only four of the domain controllers.


What should you do first?


A.      Create an Active Directory connection object.

B.      Create an application directory partition.

C.      Change the zone replication scope.

D.      Create an Active Directory site link.


Correct Answer: B






Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. You pre-create a read-only domain controller (P.QDC) account named RODC1. You export the settings of RODC1 to a file named Filel.txt. You need to promote RODC1 by using Filel.txt. Which tool should you use?


A.      The Install-WindowsFeature cmdlet

B.      The Add-WindowsFeature cmdlet

C.      The Dism command

D.      The Install-ADDSDomainController cmdlet

E.       the Dcpromo command


Correct Answer: E




How to configure IIS to change the authentication (kerberos or ntlm)



cscript adsutil.vbs set w3svc/WebSite/root/NTAuthenticationProviders “Negotiate,NTLM”


A.      True

B.      False


Correct Answer: A




You need to enable three of your domain controllers as global catalog servers. Where would you configure the domain controllers as global catalogs?


A.      Forest, NTDS settings

B.      Domain, NTDS settings

C.      Site, NTDS settings

D.      Server, NTDS settings


Correct Answer: D




You are the network administrator for your organization. Your company uses a Windows Server 2012 Enterprise certification authority to issue certificates. You need to start using key archival. What should you do?


A.      Implement a distribution CRL.

B.      Install the smart card key retrieval.

C.      Implement a Group Policy object (GPO) that enables the Online Certificate Status Protocol (OCSP) responder.

D.      Archive the private key on the server.


Correct Answer: D




You wants to change the memory of a virtual machine that is currently powered up. What does he need to do?


A.      Shut down the virtual machine, use the virtual machine’s settings to change the memory, and start it again.

B.      Use the virtual machine’s settings to change the memory.

C.      Pause the virtual machine, use the virtual machine’s settings to change the memory, and resume it.

D.      Save the virtual machine, use the virtual machine’s settings to change the memory, and resume it.


Correct Answer: A




You need to stop an application from running in Task Manager. Which tab would you use to stop an application from running?


A.      Performance

B.      Users

C.      Options

D.      Details


Correct Answer: D







You upgraded all of your locations to Windows Server 2012 and implemented the routing capability built into the servers. You chose to implement RIP. After implementing the routers, you discover that routes that you don’t want your network to consider are updating your RIP routing tables. What can you do to control which networks the RIP routing protocol will communicate with on your network?


A.      Configure TCP/IP filtering.

B.      Configure RIP route filtering.

C.      Configure IP packet filtering.

D.      Configure RIP peer filtering.

E.       There is no way to control this behavior.


Correct Answer: B




Your company has offices in five locations around the country. Most of the users’ activity is local to their own network. Occasionally, some of the users in one location need to send confidential information to one of the other four locations or to retrieve information from one of them. The communication between the remote locations is sporadic and relatively infrequent, so you have configured RRAS to use demand-dial lines to set up the connections. Management’s only requirement is that any communication between the office locations be appropriately secured. Which of the following steps should you take to ensure compliance with this requirement? (Choose all that apply.)


A.      Configure CHAP on all the RRAS servers.

B.      Configure PAP on all the RRAS servers.

C.      Configure MPPE on all the RRAS servers.

D.      Configure L2TP on all the RRAS servers.

E.       Configure MS-CHAPv2 on all the RRAS servers.


Correct Answer: CE



Instant Access to Download Testing Software & PDF File for Microsoft 70-411 Real Exam

Instant Access to Try Microsoft 70-411 Free Demo