Cause all that matters here is passing the Microsoft 70-410 exam. Cause all that you need is a high score of 70-410 Installing and Configuring Windows Server 2012 exam. The only one thing you need to do is downloading Examcollection 70-410 exam study guides now. We will not let you down with our money-back guarantee.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 70-410 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/70-410-exam-dumps.html
2021 Apr 70-410 brain dumps
Q41. - (Topic 2)
You have a server named Server1 that runs Windows Server 2012 R2.
You connect three new hard disks to Server1.
You need to create a storage space that contains the three disks.
The solution must meet the following requirements:
. Provide fault tolerance if a single disk fails.
. Maximize the amount of files that can be stored in the storage space.
What should you create?
A. A simple space
B. A spanned volume
C. A mirrored space
D. A parity space
Answer: D
Explanation:
A. Stripes data across a set of pool disks, and is not resilient to any disk failures.
B. A spanned volume is a dynamic volume consisting of disk space on more than one physical disk and not fault tolerant
C. Fault tolerant but Not max space
D. Fault tolerant and better space ratio Parity spaces are designed for capacity efficiency and increased resiliency. Parity spaces are best suited for archival data and streaming media, such as music and videos.
Q42. DRAG DROP - (Topic 3)
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed.
On Server1, you create a share named Documents. The Share permission for the Documents share is configured as shown in the following table.
The NTFS permission for the Documents share is configured as shown in the following table.
You need to configure the Share and NTFS permissions for the Documents share.
The permissions must meet the following requirements:
. Ensure that the members of a group named Group1 can read files and run programs in Documents. . Ensure that the members of Group1 can modify the permissions on only their own
files in Documents. . Ensure that the members of Group1 can create folders and files in Documents. . Minimize the number of permissions assigned to users and groups.
How should you configure the permissions?
To answer, drag the appropriate permission to the correct location. Each permission may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Answer:
Q43. - (Topic 3)
Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy.
You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed.
You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent Server1 from attempting to resolve Internet host names for the client computers.
What should you do on Server1?
A. Create a primary zone named “.”.
B. Configure the Security settings of the contoso.com zone.
C. Create a zone delegation for GlobalNames.contoso.com.
D. Create a stub zone named “root”.
Answer: A
Explanation:
When you install DNS on a Windows server that does not have a connection to the Internet, the zone for the domain is created and a root zone, also known as a dot zone, is also created. This root zone may prevent access to the Internet for DNS and for clients of the DNS. If there is a root zone, there are no other zones other than those that are listed with DNS, and you cannot configure forwarders or root hint servers. Root domain This is the top of the tree, representing an unnamed level; it is sometimes shown as two empty quotation marks (“”), indicating a null value. When used in a DNS domain name, it is stated by a trailing period (.) to designate that the name is located at the root or highest level of the domain hierarchy. In this instance, the DNS domain name is considered to be complete and points to an exact location in the tree of names. Names stated this way are called fully qualified domain names (FQDNs). DNS Domain Name Hierarchy:
Q44. - (Topic 1)
Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2.All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts.
Servers are restarted only occasionally.
You need to identify which servers were restarted during the last two days.
What should you do?
A. Run dsquery computer and specify the –staiepwd parameter.
B. Run Get-ADComputer and specify the SearchScope parameter.
C. Run Get-ADComputer and specify the IastLogon property.
D. Run dsquery server and specify the –o parameter
Answer: C
Q45. HOTSPOT - (Topic 3)
You have three servers named Server1, Server2, and DC1 that run Windows Server 2012
R2. IPv6 addresses and configurations are assigned to all of the servers by using DHCPv6.
The IPv6 routing on Server1 is shown in the following table.
You verify that Server2 can ping the IPv6 address of DC1.
You need to ensure that Server1 can ping the IPv6 address of DC1.
What command should you run on Server1? (To answer, select the appropriate options in
the answer area.)
Answer:
Most up-to-date 70-410 exam engine:
Q46. - (Topic 3)
Your network contains an Active Directory domain named adatum.com. The domain contains three domain controllers.
The domain controllers are configured as shown in the following table.
DC3 loses network connectivity due to a hardware failure.
You plan to remove DC3 from the domain.
You log on to DC3.
You need to identify which service location (SRV) records are registered by DC3.
What should you do?
A. Open the %windir%system32confignetlogon.dns file.
B. Run dcdiag /test:dns
C. Open the %windir%system32dnsbackupadatum.com.dns file.
D. Run ipconfig /displaydns.
Answer: A
Explanation:
A. Netlogon service creates a log file that contains all the locator resource records and
places the logfile in the following location:
B. Analyzes the state of domain controllers in a forest or enterprise and reports any
problems to help introubleshooting.
C. dns backup file
D. used to display current resolver cache content You can verify SRV locator resource
records by viewing netlogon.dns, located in the %systemroot%System32Config folder.
The SRV record is a Domain Name System (DNS) resource record that is used to identify
computers that host specific services.
SRV resource records are used to locate domain controllers for Active Directory.
You can use Notepad, to view this file.
The first record in the file is the domain controller’s Lightweight Directory Access Protocol
(LDAP) SRV record.
This record should appear similar to the following: _ldap._tcp.Domain_Name
Q47. - (Topic 3)
Your network contains an Active Directory domain named contoso.com.
An organizational unit (OU) named OU1 contains the user accounts and the computer accounts for laptops and desktop computers. A Group Policy object (GPO) named GP1 is linked to OU1. You need to ensure that the configuration settings in GP1 are applied only to the laptops in OU1. The solution must ensure that GP1 is applied automatically to new laptops that are added to OU1.
What should you do?
A. Modify the GPO Status of GP1.
B. Configure the WMI Filter of GP1.
C. Modify the security settings of GP1.
D. Modify the security settings of OU1.
Answer: B
Q48. - (Topic 1)
Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Host1. Host1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
Host1 hosts two virtual machines named VM5 and VM6. Both virtual machines connect to a virtual switch named Virtual1.
On VM5, you install a network monitoring application named Monitor1.
You need to capture all of the inbound and outbound traffic to VM6 by using Monitor1.
Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.)
A. Get-VM “VM6 | Set-VMNetworkAdapter-IovWeight 1
B. Get-VM “VM5 I Set-VMNetworkAdapter -IovWeight 0
C. Get-VM “VM5 | Set-VMNetworkAdapter -PortMirroring Source
D. Get-VM “VM6 | Set-VMNetworkAdapter -AllowTeaming On
E. Get-VM “VM6 | Set-VMNetworkAdapter -PortMirroring Destination
F. Get-VM “VM5 | Set-VMNetworkAdapter -AllowTeaming On
Answer: C,E
Explanation:
-PortMirroring specifies the port mirroring mode for the network adapter. This can be set to None, Source, and Destination. . If set to Source, a copy of every network packet it sends or receives is forwarded to a virtual network adapter configured to receive the packets. . If set to Destination, it receives copied packets from the source virtual network adapter.
In this scenario, VM5 is the destination which must receive a copy of the network packets from VM6, which s the source.
Reference: http://technet.microsoft.com/en-us/library/hh848457.aspx
Q49. - (Topic 2)
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 R2.
You plan to create a shared folder. The shared folder will have a quota limit.
You discover that when you run the New Share Wizard, you cannot select the SMB Share Advanced option.
You need to ensure that you can use SMB Share – Advanced to create the new share.
What should you do on Server1 before you run the New Share Wizard?
A. Configure the Advanced system settings.
B. Run the Install-WindowsFeature cmdlet.
C. Run the Set-SmbShare cmdlet.
D. Install the Share and Storage Management tool.
Answer: B
Explanation:
Install-WindowsFeature will install one or more Windows Server roles, role services, or features on either the local or a specified remote server that is running Windows Server 2012 R2. This cmdlet is equivalent to and replaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features in Windows Server 2008 R2.
Q50. - (Topic 3)
You have a server named Server1. Server1 runs Windows Server 2012 R2 and is located in a perimeter network.
You need to configure a custom connection security rule on Server1. The rule must encrypt network communications across the Internet to a computer at another company.
Which authentication method should you configure in the connection security rule?
A. Advanced
B. User (Kerberos V5)
C. Default
D. Computer (Kerberos V5)
E. Computer and user (Kerberos V5)
Answer: A
Explanation:
You need to make use of Advanced authentication method to ensure that communication is
encrypted over the network to the other company from your custom connection security
rule on Server1.
References:
http://technet.microsoft.com/en-us/library/bb742516.aspx
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 8: File
Services and Storage, p. 428