Tactics to 70 410 installing and configuring windows server 2012 pdf

We provide real 70 410 pdf exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft 70 410 dumps pdf Exam quickly & easily. The microsoft 70 410 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft exam 70 410 pdf dumps pdf and vce product and material, you can easily pass the 70 410 installing and configuring windows server 2012 pdf exam.


♥♥ 2018 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-410 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-410-exam-dumps.html

Q226. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains an application server named Server1. Server1 runs Windows Server 2012 R2. You have a client application named App1 that communicates to Server1 by using dynamic TCP ports. 

On Server1, a technician runs the following command: New-NetFirewallRule -DisplayName AllowDynamic - Direction Outbound -LocalPort 1024- 65535 -Protocol TCP. 

Users report that they can no longer connect to Server1 by using App1. 

You need to ensure that App1 can connect to Server1. 

What should you run on Server1? 

A. Set-NetFirewallRule -DisplayName AllowDynamic -Action Allow 

B. netsh advfirewall firewall set rule name=allowdynamic new action = allow 

C. Set-NetFirewallRule -DisplayName AllowDynamic -Direction Inbound 

D. netsh advfirewall firewall add rule name=allowdynamic action=allow 

Answer:


Q227. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. A server named Server1 is configured to encrypt all traffic by using IPSec. 

You need to ensure that Server1 can respond to ping requests from computers that do not support IPSec. 

What should you do? 

A. From a command prompt, run netsh set global 

autotuninglevel = highlyrestrictedcongestionprovider=none. 

B. From a command prompt, run netsh set global autotuninglevel = restricted congestionprovider = ctcp. 

C. From Windows Firewall with Advanced Security, allow unicast responses for the Domain Profile. 

D. From Windows Firewall with Advanced Security, exempt ICMP from IPSec. 

Answer:


Q228. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. You install Windows Server 2012 on a new computer named DC3. You need to manually configure DC3 as a domain controller. Which tool should you use? 

A. Server Manager 

B. winrm.exe 

C. Active Directory Domains and Trusts 

D. dcpromo.exe 

Answer:


Q229. - (Topic 3) 

Which of the following are the two built-in user accounts created automatically on a computer running Windows Server 2012 R2? 

A. Network 

B. Interactive 

C. Administrator 

D. Guest 

Answer: C,D 

Explanation: 

A. Incorrect: There is no Network account in Windows Server 2012 R2. 

B. Incorrect: There is no Interactive account in Windows Server 2012 R2. 

C. Correct: By default, the two built-in user accounts created on a computer running Windows Server 2012 are the Administrator account and the Guest account. 

D. Correct: By default, the two built-in user accounts created on a computer running Windows Server 2012 are the Administrator account and the Guest account. 


Q230. - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the 

installation fails repeatedly. 

You need to ensure that the feature can be installed on Server1. 

What should you do? 

A. Run the Add-AppxProvisionedPackage cmdlet. 

B. Disable User Account Control (UAC). 

C. Connect Server1 to the Internet. 

D. Remove the .NET Framework 4.5 Features feature. 

Answer:


Q231. - (Topic 3) 

Your network contains a domain controller that is configured as a DNS server. The server hosts an Active Directory-integrated zone for the domain. 

You need to reduce how long it takes until stale records are deleted from the zone. What should you do? 

A. From the configuration directory partition of the forest, modify the tombstone lifetime. 

B. From the configuration directory partition of the forest, modify the garbage collection interval. 

C. From the aging properties of the zone, modify the no-refresh interval and the refresh interval. 

D. From the start of authority (SOA) record of the zone, modify the refresh interval and the expire interval. 

Answer:

Explanation: 

Scavenging automates the deletion of old records. When scavenging is enabled, then you should also change the no-refresh and refresh intervals of the aging properties of the zone else it may take too long for stale records to be deleted and the size of the DNS database can become large and have an adverse effect on performance. 


Q232. - (Topic 3) 

Your network contains a file server named Server1 that runs Windows Server 2012 R2. All client computers run Windows 8. Server1 contains a folder named Folder1. Folder1 contains the installation files for the company’s desktop applications. A network technician shares Folder1 as Share 1. 

You need to ensure that the share for Folder1 is not visible when users browse the network. 

What should you do? 

A. From the properties of Folder1, deny the List Folder Contents permission for the Everyone group. 

B. From the properties of Folder1, remove Share1, and then share Folder1 as Share1$. 

C. From the properties of Folder1, configure the hidden attribute. 

D. From the properties of Share1, configure access-based enumeration 

Answer:


Q233. HOTSPOT - (Topic 3) 

You have a DNS server named Server 1. Server1 runs Windows Server 2012 R2. 

The network ID is 10.1.1.0/24. 

An administrator creates several reverse lookup zones. 

You need to identify which reverse lookup zone is configured correctly. 

Which zone should you identify? 

To answer, select the appropriate zone in the answer area. 

Answer: 


Q234. - (Topic 3) 

Your network contains an Active Directory forest named adatum.com. The forest contains a child domain named asia.adatum.com. The asia.adatum.com child domain contains a server named DHCP1 that runs Windows Server 2012 R2. 

You install the DHCP Server server role on DHCP1. 

You have access to the administrative accounts shown in the following table. 

You need to authorize DHCP1. 

Which user account should you use? 

A. Admin1 

B. Admin2 

C. Admin3 

D. Admin4 

Answer:


Q235. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1 that runs Windows Server 2012 R2 and a server named Server2 that runs Windows Server 2008 R2 Service Pack 1 (SP1).Both servers are member servers. 

On Server2, you install all of the software required to ensure that Server2 can be managed remotely from Server Manager. 

You need to ensure that you can manage Server2 from Server1 by using Server Manager. 

Which two tasks should you perform on Server2? (Each correct answer presents part of the solution.Choose two.) 

A. Run the systempropertiesremote. execommand. 

B. Run the Fnable-PsRemoting cmdlet. 

C. Run the Enable-PsSessionConfigurationcmdlet. 

D. Run the Confiqure-SMRemoting.ps1script. 

E. Run the Set-ExecutionPolicycmdlet. 

Answer: D,E 

Explanation: 

The output of this command indicates whether Server Manager Remoting is enabled or disabled on the server. To configure Server Manager remote management by using Windows PowerShell On the computer that you want to manage remotely, open a Windows PowerShell session with elevated user rights.To do this, click Start, click All Programs, click Accessories, click Windows PowerShell, right-click the Windows PowerShell shortcut, and then click Run as administrator. In the Windows PowerShell session, type the following, and then press Enter. Set-ExecutionPolicy -ExecutionPolicyRemoteSigned Type the following, and then press Enter to enable all required firewall rule exceptions. Configure-SMRemoting.ps1 -force –enable. 


Q236. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

Contoso.com has a server, named ENSUREPASS-SR15, which is configured as a file server. 

You have received instructions to make sure that a user, named Mia Hamm, has the ability to generate a complete backup of ENSUREPASS-SR15 via Windows Server Backup. 

Which of the following actions should you take? 

A. You should consider making use of Computer Management to configure the local groups. 

B. You should consider making use of Computer Management to configure the domain local groups. 

C. You should consider making use of Computer Management to configure the global groups. 

D. You should consider making use of Computer Management to configure the administrator groups. 

Answer:

Explanation: 

To perform backups or recoveries by using Windows Server Backup, you must be a 

member of the Administrators or Backup Operators groups. 

You can only use Backup locally; you cannot backup a remote computer. 

You can only back up and restore System State data on a local computer. You cannot back 

up and restore System State data on a remote computer even if you are an administrator 

on the remote computer. 


Q237. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled. 

You install the DHCP server role on a virtual machine named Server1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope. 

You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1. 

You need to ensure that the virtual machines can use Server1 as a DHCP server. 

What should you do? 

A. Enable MAC address spoofing on Server1. 

B. Enable single-root I/O visualization (SR-IOV) on Server1. 

C. Disable the DHCP guard on Server1. 

D. Disable the DHCP guard on all of the virtual machines that are DHCP clients. 

Answer:

Explanation: 

DHCP guard setting 

This setting stops the virtual machine from making DHCP offers over this network interface. 

To be clear – this does not affect the ability to receive a DHCP offer (i.e. if you need to use 

DHCP to acquire an IP address that will work) it only blocks the ability for the virtual 

machine to act as a DHCP server. 


Q238. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 and has the Hyper-V server role installed. HVServer1 hosts 10 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled. 

You install the DHCP server role on a virtual machine named Server 1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope. 

You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1. 

You need to ensure that the virtual machines can use Server1 as a DHCP server. 

What should you do? 

A. Enable MAC address spoofing on Server1. 

B. Disable the DHCP guard on all of the virtual machines that are DHCP clients. 

C. Disable the DHCP guard on Server1. 

D. Enable single-root I/O virtualization (SR-IOV) on Server1. 

Answer:

Explanation: 

Private virtual networks are used where you want to allow communications between virtual machine to virtual machine on the same physical server in a block diagram, a private network is an internal network without a virtual NIC in the parent partition. A private network would commonly be used where you need complete isolation of virtual machines from external and parent partition traffic. DMZ workloads running on a leg of a trihomed firewall, or an isolated test domain are examples where this type of network may be useful. 


Q239. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. All domain controllers currently run Windows Server 2008 R2. 

You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2. 

The new domain controller will have the following configurations: 

Schema master 

Global catalog server 

Active Directory Federation Services server role 

Active Directory Certificate Services server role 

You need to identify which configuration can be fulfilled by using the Active Directory Domain Services Configuration Wizard. 

Which configuration should you identify? 

A. Enable the global catalog server. 

B. Install the DNS Server role. 

C. Install the Active Directory Certificate Services role. 

D. Transfer the schema master. 

Answer:


Q240. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named adatum.com. 

You create an account for a temporary employee named User1. 

You need to ensure that User1 can log on to the domain only between 08:00 and 18:00 

from a client computer named Computer1. 

From which tab should you perform the configuration? 

To answer, select the appropriate tab in the answer area. 

Answer: