we provide Practical Microsoft 70 410 exam dumps free exam questions which are the best for clearing 70 410 exam dumps test, and to get certified by Microsoft Installing and Configuring Windows Server 2012. The 70 410 exam Questions & Answers covers all the knowledge points of the real 70 410 exam questions and answers pdf exam. Crack your Microsoft 70 410 study guide pdf Exam with latest dumps, guaranteed!


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-410 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-410-exam-dumps.html

Q121. - (Topic 2) 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. 

The domain contains a user named User1 and a global security group named Group1. 

You need to ensure that User1 can manage the group membership of Group1. The solution must minimize the number of permissions assigned to User1. 

Which cmdlet should you run? 

A. Add-AdPrincipalGroupMembership 

B. Install-AddsDomainController 

C. Install-WindowsFeature 

D. Install-AddsDomain 

E. Rename-AdObject 

F. Set-AdAccountControl 

G. Set-AdGroup 

H. Set-User 

Answer:

Explanation: 

The Set-ADGroup cmdlet modifies the properties of an Active Directory group. You can modify commonly used property values by using the cmdlet parameters. For example, the –ManagedBy parameter allows you to specify a user or group of users who can manage the specified AD group. 


Q122. - (Topic 3) 

You have a server that runs Windows Server 2012 R2. The server contains the disks configured as shown in the following table. 

You need to create a volume that can store up to 3 TB of user files. The solution must ensure that the user files are available if one of the disks in the volume fails. 

What should you create? 

A. a mirrored volume on Disk 1 and Disk 4 

B. a mirrored volume on Disk 2 and Disk 3 

C. a RAID-5 volume on Disk 1, Disk 2, and Disk 3 

D. a spanned volume on Disk 0 and Disk 4 

Answer:


Q123. - (Topic 2) 

Your network contains an Active Directory forest named contoso.com. The forest contains five domains. All domain controllers run Windows Server 2012 R2. 

The contoso.com domain contains two user accounts named Admin1 and Admin2. 

You need to ensure that Admin1 and Admin2 can configure hardware and services on all of the member servers in the forest. The solution must minimize the number of privileges granted to Admin1 and Admin2. 

Which built-in groups should you use? 

A. Administrators local groups 

B. Administrators domain local groups 

C. Domain Admins global groups 

D. Server Operators global groups 

Answer:


Q124. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees. 

You create a Group Policy object (GPO) named GP1. You link GP1 to the Employees OU. 

You need to ensure that GP1 does not apply to the members of a group named Managers. 

What should you configure? 

A. The Security settings of Employees 

B. The WMI filter for GP1 

C. The Block Inheritance option for Employees 

D. The Security settings of GP1 

Answer:

Explanation: 

A. Wrong Group 

B. Windows Management Instrumentation (WMI) filters allow you to dynamically determine 

the scope of Group Policy objects (GPOs) based on attributes of the target computer. 

C. Blocking inheritance prevents Group Policy objects (GPOs) that are linked to higher 

sites, domains, or organizational units from being automatically inherited by the child-level. 

D. Set Managers to – Members of this security group are exempt from this Group Policy 

object. 

Security settings. 

You use the Security Settings extension to set security options for computers and users 

within the scope of a Group Policy object. You can define local computer, domain, and network security settings. Figure below shows an example of the security settings that allow everyone to be affected by this GPO except the members of the Management group, who were explicitly denied permission to the GPO by setting the Apply Group Policy ACE to Deny. Note that if a member of the Management group were also a member of a group that had an explicit Allow setting for the Apply Group Policy ACE, the Deny would take precedence and the GPO would not affect the user. 


Q125. - (Topic 3) 

You have a network printer connected to print server. You need to be able to print if print server goes down. 

What should you configure? 

A. branch office direct printing 

B. printer pooling 

C. spooling 

D. Print forwarding 

Answer:

Explanation: 

Branch Office Direct Printing can reduce Wide Area Network (WAN) usage by printing directly to a print device instead of a server print queue. This feature can be enabled or disabled on a per printer basis and is transparent to the user. It is enabled by an administrator using the Print Management Console or Windows PowerShell on the server. 

The printer information is cached in the branch office, so that if the print server is unavailable for some reason (for example if the WAN link to the data center is down), then it is still possible for the user to print. Branch Office Direct Printing requires the following operating systems: Windows Server 2012 Windows 8 


Q126. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has three physical network adapters named NIC1, NIC2, and NIC3. 

On Server1, you create a NIC team named Team1 by using NIC1 and NIC2. You configure Team1 to accept network traffic on VLAN 10. 

You need to ensure that Server1 can accept network traffic on VLAN 10 and VLAN 11. The solution must ensure that the network traffic can be received on both VLANs if a network adapter fails. 

What should you do? 

A. From Server Manager, change the load balancing mode of Team1. 

B. Run the New-NetLbfoTeam cmdlet. 

C. From Server Manager, add an interface to Team1. 

D. Run the Add-NetLbfoTeamMember cmdlet. 

Answer:


Q127. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All user accounts in the sales department reside in an organizational unit (OU) named OU1. 

You have a Group Policy object (GPO) named GPO1. GPO1 is used to deploy a logon script to all of the users in the sales department. 

You discover that the logon script does not run when the sales users log on to their computers. You open Group Policy Management as shown in the exhibit. 

You need to ensure that the logon script in GPO1 is applied to the sales users. What should you do? 

A. Enforce GPO1. 

B. Modify the link order of GPO1. 

C. Modify the Delegation settings of GPO1. 

D. Enable the link of GPO1. 

Answer:


Q128. HOTSPOT - (Topic 1) 

Your network contains an Active Directory forest. The forest contains a single domain named contoso.com. 

AppLocker policies are enforced on all member servers. 

You view the AppLocker policy applied to the member servers as shown in the exhibit. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. 

Answer: 


Q129. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

You create a new inbound rule by using Windows Firewall with Advanced Security. 

You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. 

Which setting in the rule should you configure? 

A. Interface types 

B. Authorized computers 

C. Remote IP address 

D. Edge traversal 

Answer:

Explanation: 

Edge traversal – This indicates whether edge traversal is enabled (Yes) or disabled (No). When edge traversal is enabled, the application, service, or port to which the rule applies is globally addressable and accessible from outside a network address translation (NAT) or edge device. 

Select one of the following options from the list: Block edge traversal (default) – Prevent applications from receiving unsolicited traffic from the Internet through a NAT edge device. Allow edge traversal – Allow applications to receive unsolicited traffic directly from the Internet through a NAT edge device. Defer to user – Let the user decide whether to allow unsolicited traffic from the Internet through a NAT edge device when an application requests it. Defer to application – Let each application determine whether to allow unsolicited traffic from the Internet through a NAT edge device. 

: http://technet.microsoft.com/en-us/library/cc731927.aspx 


Q130. HOTSPOT - (Topic 3) 

You have a Server Core 2012 installation and all roles and features removed. The server does not haveaccess to Windows Update. You mount the network volume containing the installation files for Server 2012. 

You need to install DNS and DHCP server role. 

Which directory do you reference for installing? 

Answer: