AllExam Dumps

DUMPS, FREE DUMPS, VCP5 DUMPS| VMWARE DUMPS, VCP DUMPS, VCP4 DUMPS, VCAP DUMPS, VCDX DUMPS, CISCO DUMPS, CCNA, CCNA DUMPS, CCNP DUMPS, CCIE DUMPS, ITIL, EXIN DUMPS,


READ Free Dumps For Microsoft- 70-411





Question ID 14121

Your network contains one Active Directory domain named contoso.com. The forest
functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All
client computers run Windows 8.1.
The domain contains 10 domain controllers and a read-only domain controller (RODC)
named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that
runs Windows Server 2012 R2.
You need to identify which security principals are authorized to have their password cached
on RODC1.
Which cmdlet should you use?

Option A

Get-ADGroupMember

Option B

Get-ADDomainControllerPasswordReplicationPolicy

Option C

Get-ADDomainControllerPasswordReplicationPolicyUsage

Option D

Get-ADDomain

Option E

Get-ADOptionalFeature

Option F

Get-ADAccountAuthorizationGroup

Correct Answer B
Explanation


Question ID 14122

Your network contains an Active Directory domain named contoso.com. The domain
contains a file server named Server1 that runs Windows Server 2012 R2.
You view the effective policy settings of Server1 as shown in the exhibit. (Click the Exhibit
button.)

On Server1, you have a folder named C:\Share1 that is shared as Share1. Share1 contains
confidential data. A group named Group1 has full control of the content in Share1.
You need to ensure that an entry is added to the event log whenever a member of Group1
deletes a file in Share1.
What should you configure?

Option A

the Audit File Share setting of Servers GPO

Option B

the Sharing settings of C:\Share1

Option C

the Audit File System setting of Servers GPO

Option D

 the Security settings of C:\Share1

Option F

Answer : D

Explanation: You can use Computer Management to track all connections to shared resources on a Windows Server 2008 R2 system. Whenever a user or computer connects to a shared resource, Windows Server 2008 R2 lists a connection in the Sessions node. File access, modification and deletion can only be tracked, if the object access auditing is enabled you can see the entries in the event log. To view connections to shared resources, type net session at a command prompt or follow these steps: ✑ In Computer Management, connect to the computer on which you created the shared resource. ✑ In the console tree, expand System Tools, expand Shared Folders, and then select Sessions. You can now view connections to shares for users and computers. To enable folder permission auditing, you can follow the below steps: ✑ Click start and run "secpol. msc" without quotes. ✑ Open the Local Policies\Audit Policy ✑ Enable the Audit object access for "Success" and "Failure". ✑ Go to target files and folders, right click the folder and select properties. ✑ Go to Security Page and click Advanced.

✑ Click Auditing and Edit. ✑ Click add, type everyone in the Select User, Computer, or Group. ✑ Choose Apply onto: This folder, subfolders and files. ✑ Tick on the box “Change permissions” ✑ Click OK.

After you enable security auditing on the folders, you should be able to see the folder permission changes in the server's Security event log. Task Category is File System. References: http: //social. technet. microsoft. com/Forums/en-US/winservergen/thread/13779c78-0c73- 4477-8014-f2eb10f3f10f/ http: //technet. microsoft. com/en-us/library/cc753927(v=ws. 10). aspx http: //social. technet. microsoft. com/Forums/en-US/winservergen/thread/13779c78-0c73- 4477-8014-f2eb10f3f10f/ http: //support. microsoft. com/kb/300549 http: //www. windowsitpro. com/article/permissions/auditing-folder-permission-changes ht

Correct Answer D
Explanation

Send email to admin@getfreedumps for new dumps request!!!