It is more faster and easier to pass the Microsoft 70 410 practice exam exam by using Best Quality Microsoft Installing and Configuring Windows Server 2012 questuins and answers. Immediate access to the Most up-to-date exam 70 410 pdf Exam and find the same core area vce 70 410 questions with professionally verified answers, then PASS your exam with a high score now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-410 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-410-exam-dumps.html

Q11. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature. 

Which of the following is TRUE with regards to Windows Firewall with Advanced Security? (Choose all that apply.) 

A. It provides host-based, two-way network traffic filtering for a computer. 

B. It provides host-based, one-way network traffic filtering for a computer. 

C. It blocks unauthorized network traffic flowing into or out of the local computer. 

D. It only blocks unauthorized network traffic flowing into the local computer. 

E. It only blocks unauthorized network traffic flowing out of the local computer. 

Answer: A,C 

Explanation: 

Windows Firewall with Advanced Security is an important part of a layered security model. By providing host-based, two-way network traffic filtering for a computer, Windows Firewall with Advanced Security blocks unauthorized network traffic flowing into or out of the local computer. Windows Firewall with Advanced Security also works with Network Awareness so that it can apply security settings appropriate to the types of networks to which the computer is connected. Windows Firewall and Internet Protocol Security (IPsec) configuration settings are integrated into a single Microsoft Management Console (MMC) named important part of your network’s Windows Firewall with Advanced Security, so Windows Firewall is also an isolation strategy. 


Q12. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

When you recently added new workstations to the Contoso.com manually, you found that that the computer accounts were created in the default container. 

You want to make sure that the default container for newly created computers is redirected to a specified, target organizational unit (OU). 

Which of the following actions should you take? 

A. You should consider making use of the replace.exe command-line tool. 

B. You should consider making use of the redircmp.exe command-line tool. 

C. You should consider making use of the redirusr.exe command-line tool. 

D. You should consider making use of the rexec.exe command-line tool. 

Answer:

Explanation: 

redircmp.exe redirects the default container for newly created computers to a specified, target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers. 


Q13. - (Topic 2) 

You have a server named Server2 that runs Windows Server 2012 R2. 

A network technician installs a new disk on Server2 and creates a new volume. 

The properties of the new volume are shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can enable NTFS disk quotas for volume D. 

What should you do first? 

A. Format volume D 

B. Install the File Server Resource Manager role service 

C. Run the convert.exe command 

D. Convert the disk to a dynamic disk 

Answer:

Explanation: 

To be able to use a NEW disk so that you can enable NTFS disk quotas, in other word REFS to NTFS, it requires formatting first. 


Q14. - (Topic 3) 

A company’s server deployment team needs to install fourteen Windows Server 2012 R2 to handle the expected increase in holiday traffic. The team would like the option of switching the servers between Server Core and Full GUI servers and do not want to be locked in to their first choice. 

The server team would like four of the servers to include the Windows 8 Shell. 

Which installation option is required for these servers? 

A. Server Core 

B. Desktop Experience 

C. Server with a GUI 

D. Minimal Server Interface 

Answer:

Explanation: 

The Desktop Experience installation option includes the Windows 8 Shell feature. This installation option also includes other features available for installation not found in the other three; such as Themes, Windows Store and support for Windows Store apps, and Windows Media Player. Quick Tip: To completely remove a feature and the binary files from the disk, use the Windows PowerShell command Uninstall-WindowsFeature. For example, to remove Desktop Experience: Uninstall-WindowsFeature Desktop-Experience –Remove. 


Q15. - (Topic 3) 

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. 

You need to add a graphical user interface (GUI) to Server1. 

Which tool should you use? 

A. The Install-WindowsFeature cmdlet 

B. The Install-Module cmdlet 

C. The Install-RoleService cmdlet 

D. The setup.exe command 

Answer:

Explanation: 

The DISM command is called by the Add-WindowsFeature commanD. Here is the syntax for DISM: 

Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:Server-Gui-Shell /featurename:Server-Gui-Mgmt 


Q16. - (Topic 3) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 is a DHCP server that is configured to have a scope named Scope1. Server2 is configured to obtain an IP address automatically. 

In Scope1, you create a reservation named Res_Server2 for Server2. 

A technician replaces the network adapter on Server2. 

You need to ensure that Server2 can obtain the same IP address. 

What should you modify on Server1? 

A. The Name Protection settings of Scope1 

B. The MAC address of Res_Server2 

C. The Advanced settings of Res_Server2 

D. The Network Access Protection Settings of Scope1 

Answer:

Explanation: 

DHCP reservations are given based upon MAC address (at least on IPv4/DHCPv4). For clients that require a constant IP address, you can either manually configure a static IP address, or assign a reservation on the DHCP server. Reservations are permanent lease assignments that are used to ensure that a specified client on a subnet can always use the same IP address. You can use DHCP reservations for hosts that require a consistent IP address, but do not need to be statically configured. DHCP reservations provide a mechanism by which IP addresses may be permanently assigned to a specific client based on the MAC address of that client. The MAC address of a Windows client can be found running the ipconfig /all command. For Linux systems the corresponding command is ifconfig -a. Once the MAC address has been identified, the reservation may be configured using either the DHCP console or at the command prompt using the netsh tool. 

Media access control (MAC) address authorization functions in the same way as automatic number identification (ANI) authorization, but it is used for wireless clients and clients connecting to your network by using an 802.1X authenticating switch. Since the network adapter was replaced, you need to modify the MAC address on Server1 to ensure that Server2 can obtain the same IP address. 

Reference: http://technet.microsoft.com/en-us/library/dd197535%28v=WS.10%29.aspx 


Q17. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

An organizational unit (OU) named OU1 contains the computer accounts for laptops and 

desktop computers. 

A Group Policy object (GPO) named GP1 is linked to OU1. 

You need to ensure that the configuration settings in GP1 are applied only to a user named 

User1. 

What should you do? 

A. Modify the security settings of OU1. 

B. Modify the GPO Status of GP1. 

C. Modify the security settings of GP1. 

D. Configure the WMI Filter of GP1. 

Answer:

Explanation: 

References: Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10: Implementing Group Policy, p. 470, 482 http://technet.microsoft.com/en-us/library/jj134176 WMI filtering using GPMC 


Q18. - (Topic 3) 

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has following hardware configurations: 

-16GB of RAM 

-A single quad-core CPU 

-Three network teams that have two network adapters each 

You add additional CPUs and RAM to Server 1. 

You repurpose Server1 as a virtualization host. You install the Hyper-V server role on Server1. You need to create four external virtual switches in Hyper-V. Which cmdlet should you run first? 

A. Set-NetAdapter. 

B. Add-Net1.bfoTeamNic 

C. Add-VMNetworkAdapter 

D. Remove-NetLbfoTeam 

Answer:


Q19. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an organizational unit (OU) named AllComputers. Client computers run either Windows 7 or Windows 8. 

You create a Group Policy object (GPO) named GP1. 

You link GP1 to the AllComputers OU. 

You need to ensure that GP1 applies only to computers that have more than 8 GB of 

memory. 

What should you configure? 

A. The Security settings of GP1 

B. The Block Inheritance option for AllComputers 

C. The Security settings of AllComputers 

D. The WMI filter for GP1 

Answer:

Explanation: 

Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group Policy objects (GPOs) based on attributes of the target computer. When a GPO that is linked to a WMI filter is applied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates to false, the GPO is not applied (except if the client computer is running Windows Server, in which case the filter is ignored and the GPO is always applied). If the WMI filter evaluates to true, the GPO is applied. WMI filters, like GPOs, are stored on a per-domain basis. A WMI filter and the GPO it is linked to must be in the same domain. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10: Implementing Group Policy, p.470, 482 http://technet.microsoft.com/en-us/library/jj134176 WMI filtering using GPMC 


Q20. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. 

On Server1, you create a share named Documents. 

You need to ensure that users can recover files that they accidently delete from Documents. 

What should you do? 

A. Enable shadow copies by using Computer Management. 

B. Create a storage pool that contains a two-way mirrored volume by using Server Manager. 

C. Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the Services console. 

D. Create a recovery partition by using Windows Assessment and Deployment Kit (Windows ADK). 

Answer:

Explanation: 

If you enable Shadow Copies of Shared Folders on a volume using the default values, a task will be scheduled to create shadow copies at 7:00 A.M of next business day. The default storage area will be on the same volume, and its size will be 10 percent of the available space. You can only enable Shadow Copies of Shared Folders on a per-volume basis–that is, you cannot select specific shared folders and files on a volume to be copied or not copied. 

To enable and configure Shadow Copies of Shared Folders: 

1. Click Start, point to Administrative Tools, and then click Computer Management. 

2. In the console tree, right-click Shared Folders, click All Tasks, and then click Configure Shadow Copies. 

3. In Select a volume, click the volume that you want to enable Shadow Copies of Shared Folders for, and then click Enable. 

4. You will see an alert that Windows will create a shadow copy now with the current settings and that the settings might not be appropriate for servers with high I/O loads. Click Yes if you want to continue or No if you want to select a different volume or settings. 

5. To make changes to the default schedule and storage area, click Settings. 

Shadow copies - a feature that provides point-in-time copies of files stored on file shares on file servers. Shadow Copies of Shared Folders allows users to view and access shadow copies, which are shared files and folders as they existed at different points of time in the past. By accessing previous versions of files and folders, users can compare versions of a file while working and recover files that were accidentally deleted or overwritten. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 

7: Hyper-V virtualization, Lesson 1: Deploying and configuring Hyper-V- hosts, p. 302