70-410 keys(346 to 360) for consumer: Mar 2016 Edition

Exam Code: 70-410 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Installing and Configuring Windows Server 2012
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-410 Exam.

2016 Mar 70-410 Study Guide Questions:

Q346. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing printer pooling. 

Which of the following is TRUE with regards to printer pooling? (Choose all that apply.) 

A. Printers in a pool must be of the same model, and use the same printer driver. 

B. Each printer in the pool must have a different printer driver. 

C. Printer ports used in the pool must be of the same type. 

D. The types of printer ports used in the pool must be mixed. 

E. Pooled printers appear to workstations as a single printer. 

F. A minimum of three printers are required to configure a printer pool. 

Answer: A,E 

Explanation: 

You can create a printing pool to automatically distribute print jobs to the next available printer. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for their documents. A printing pool also simplifies administration because multiple printers can be managed from the same logical printer on a server. 


Q347. - (Topic 3) 

You run a Windows 2012 R2 Hyper-V Role Server, you need to shrink the size of files.vhd. 

Which PowerShell cmdlet option you should run first? 

A. Dismount-VHD 

B. Mount-VHD 

C. Resize-VHD 

D. Convert-VHD 

Answer: D 


Q348. HOTSPOT - (Topic 2) 

Your network contains a subnet named Subnet1. Subnet1 contains a DHCP server named 

Server1. 

You deploy a new subnet named Subnet2. On Subnet2, you deploy a new server named 

Server2 that runs Windows Server 2012 R2. 

You need to configure Server2 to route DHCP broadcast from Subnet2 to Server1. 

Which server role should you install on Server2? 

To answer, select the appropriate role in the answer area. 


Answer: 



Q349. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

On Server1, you create a virtual machine named VM1. 

When you try to add a RemoteFX 3D Video Adapter to VM1, you discover that the option is unavailable as shown in the following exhibit. (Click the Exhibit button.) 


You need to add the RemoteFX 3D Video Adapter to VM1. 

What should you do first? 

A. On Server1, run the Add-VMRemoteFx3dVideoAdapter cmdlet 

B. On Server1, install the Media Foundation feature. 

C. On Server1, run the Enable-VMRemoteFxPhysicalVideoAdaptercmdlet. 

D. On Server1, install the Remote Desktop Visualization Host (RD Visualization Host) role service. 

Answer: D 

Explanation: 

Remote Desktop services are not available in server core installation; you need to add the 

role. 

References: 

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 1: 

Installing and Configuring servers, Objective 1.2: 

Configure servers, p. 19 

http://technet.microsoft.com/en-us/library/hh848506(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh848520(v=wps.620).aspx http://technet.microsoft.com/en-us/library/ff817586(v=ws.10).aspx 


Q350. - (Topic 3) 

You have a laptop named Computer1. Computer1 runs Windows 8 Enterprise. 

Computer1 has a wired network adapter and a wireless network adapter. Computer1 connects to a wireless network named Network1. 

For testing purposes, you install Windows Server 2012 R2 on Computer1 as a second operating system. You install the drivers for the wireless network adapter. 

You need to ensure that you can connect to Network1 from Windows Server 2012 R2. 

What should you do? 

A. Restart the WLAN AutoConfig service. 

B. From a local Group Policy object (GPO), configure the Wireless Network (IEEE 802.11) Policies settings. 

C. From a local Group Policy object (GPO), configure the settings of Windows Connection Manager. 

D. From Server Manager, install the Wireless LAN Service feature. 

Answer: D 

Explanation: 

The Wireless LAN service is a feature in Windows Server. 2012 R2 that you can use to enable the wireless WLAN AutoConfig service, and to configure the WLAN AutoConfig service for automatic startup. Once enabled, the WLAN AutoConfig service dynamically selects which wireless network the computer automatically connects to, and configures the necessary settings on the wireless network adapter. This includes automatically selecting and connecting to a more preferred wireless network when one becomes available. To enable the Wireless LAN Service In Server Manager Dashboard, click Manage, and then click Add Roles and Features. The Add Roles and Features Wizard opens. Click Next. In Select installation type, select Role-based or feature-based installation, and then click Next. In Select destination server, enable Select a server from the server pool, and in Server Pool, select the server for which you want to enable the Wireless LAN Service, and then click Next. In Select server roles, click Next. In Select Server features, in Features, select Wireless LAN Service, and then click Next. 

: http://technet.microsoft.com/en-us/library/hh994698.aspx 


70-410 training

Renovate 70-410 exam engine:

Q351. DRAG DROP - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You add a new internal SAS disk to Server1. 

You need to ensure that the new disk is available to store files. 

Which three cmdlets should you run in sequence? 

To answer, move the appropriate three cmdlets from the list of cmdlets to the answer area 

and arrange them in the correct order. 


Answer: 



Q352. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All user accounts in the sales department reside in an organizational unit (OU) named OU1. 

You have a Group Policy object (GPO) named GPO1. GPO1 is used to deploy a logon script to all of the users in the sales department. 

You discover that the logon script does not run when the sales users log on to their computers. You open Group Policy Management as shown in the exhibit. 

You need to ensure that the logon script in GPO1 is applied to the sales users. What should you do? 


A. Enforce GPO1. 

B. Modify the link order of GPO1. 

C. Modify the Delegation settings of GPO1. 

D. Enable the link of GPO1. 

Answer: D 


Q353. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

An administrator provides you with a file that contains the information to create user accounts for 200 temporary employees. The file is shown in the exhibit. (Click the Exhibit button.) 


You need to automate the creation of the user accounts. You must achieve this goal by using the minimum amount of administrative effort. 

Which tool should you use? 

A. Ldifde 

B. csvde 

C. Dsadd 

D. Net user 

Answer: B 

Explanation: 

csvde – Imports and exports data from Active Directory Domain Services (AD DS) using files that store data in the comma-separated value (CSV) format. You can also support batch operations based on the CSV file format standard. Net user – Adds or modifies user accounts, or displays user account information. Ldifde – Creates, modifies, and deletes directory objects. You can also use ldifde to extend the schema, export Active Directory user and group information to other applications or services, and populate Active Directory Domain Services (AD DS) with data from other directory services. Dsadd – Adds specific types of objects to the directory. 

csvde.exe is the best option to add multiple users. As you just need to export the excel 

spreadsheet as a .csv file and make sure the parameters are correct. 

You can use Csvde to import and export Active Directory data that uses the comma-

separated value format. 

Use a spreadsheet program such as Microsoft Excel to open this .csv file and view the 

header and value information. 

References: 

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 5: Install 

and administer Active Directory, Objective 5.2: Create and Manage Active Directory Users 

and Computers, p. 269 


Q354. - (Topic 3) 

A company’s network administrator needs to ensure a specific IP address is never assigned by a Windows Server 2012 R2 DHCP server to any device connecting to the network. 

Which of the following should the administrator configure on the Windows Server 2012 R2 DHCP server? 

A. Reservation 

B. Scope options 

C. NAP 

D. Scope properties 

Answer: B 

Explanation: 

Configuring an IP address as a reservation will restrict a DHCP server’s assignment of that address unless a specific MAC address makes a request for the address. Exclusion is for not use the IP Address or range inside the Scope Pool, Filter is for not use theMAC Address or range. Quick Tip: Policies can also be defined per scope or server. Policy based assignment (PBA) allows an administrator to group DHCP clients by specific attributes based on fields contained in the DHCP client request packet. This feature allows for targeted administration and greater control of configuration parameters delivered to network devices. 


Q355. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. 

All servers run Windows Server 2012 R2. 

An application named Appl.exe is installed on all client computers. Multiple versions of Appl.exe are installed on different client computers. Appl.exe is digitally signed. 

You need to ensure that only the latest version of Appl.exe can run on the client computers. 

What should you create? 

A. An application control policy packaged app rule 

B. A software restriction policy certificate rule 

C. An application control policy Windows Installer rule 

D. An application control policy executable rule 

Answer: D 

Explanation: 

A. A publisher rule for a Packaged app is based on publisher, name and version B. You can create a certificate rule that identifies software and then allows or does not allow the software torun, depending on the security level. 

C. For .msi or .msp 

D. Executable Rules, for .exe and can be based on Publisher, Product name, filename and version. Use Certificate Rules on Windows Executables for Software Restriction Policies This security setting determines if digital certificates are processed when a user or process attempts to run software with an .exe file name extension. This security settings is used to enable or disable certificate rules, a type of software restriction policies rule. With software restriction policies, you can create a certificate rule that will allow or disallow software that is signed by Authenticode to run, based on the digital certificate that is associated with the software. In order for certificate rules to take effect, you must enable this security setting. When certificate rules are enabled, software restriction policies will check a certificate revocation list (CRL) to make sure the software’s certificate and signature are valid. This may decrease performance when start signed programs. You can disable this feature. On Trusted Publishers Properties, clear the Publisher and Timestampcheck boxes. 


70-410 free practice test

Highest Quality 70-410 practice exam:

Q356. HOTSPOT - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Hyperv1 and a domain controller named DC1. Hyperv1 has the Hyper-V server role installed. DC1 is a virtual machine on Hyperv1. 

Users report that the time on their client computer is incorrect. 

You log on to DC1 and verify that the time services are configured correctly. 

You need to prevent time conflicts between the time provided by DC1 and other potential 

time sources. 

What should you configure? 

To answer, select the appropriate object in the answer area. 


Answer: 



Q357. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. You need to create a script that will create and mount a virtual hard disk. Which tool should you use? 

A. diskpart.exe 

B. vdsldr.exe 

C. fsutil.exe 

D. vds.exe 

Answer: A 


Q358. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. 

Contoso.com has a server, named ENSUREPASS-SR15, which has Windows Server 2012 R2 installed. Contoso.com also has a server, named ENSUREPASS-SR16, which has Windows Server 2008 R2 SP1 installed. 

You have been instructed to make sure that ENSUREPASS-SR16 is able to run Windows PowerShell 3.0. 

Which of the following actions should you take? (Choose two.) 

A. You should consider making sure that ENSUREPASS-SR16 has a full installation of Microsoft .NET Framework 4 installed. 

B. You should consider making sure that ENSUREPASS-SR16 has a full installation of Microsoft .NET Framework 2 installed. 

C. You should consider making sure that ENSUREPASS-SR16 has WS-Management 3.0 installed. 

D. You should consider making sure that ENSUREPASS-SR16 is upgraded to Windows Server 2012 R2. 

Answer: A,C 

Explanation: 

WS-Management 3.0 – Windows Management Framework 3.0 Includes Windows PowerShell 3.0, WMI, WinRM, Management OData IIS Extension, and Server Manager CIM Provider 

Windows Management Framework 3.0 requires Microsoft .NET Framework 4.0. 


Q359. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

You are in the process of installing a Server Core installation of Windows Server 2012 on a new Contoso.com server, named ENSUREPASS-SR13. 

Which of the following is TRUE with regards to a installing a Server Core installation of Windows Server 2012? (Choose all that apply.) 

A. The Server Graphical Shell is installed, but not enabled. 

B. Server roles can be configured locally via the command prompt using Windows PowerShell. 

C. Server roles can be configured locally via Server Manager. 

D. You are able to access the Microsoft Management Console locally. 

E. The Desktop Experience is not available. 

Answer: B,E 

Explanation: 

A. There is no Windows shell and very limited GUI functionality. 

B. The Server Core interface is a command prompt with PowerShell support. 

C. Only Remotely using Server Manager. 

D. Microsoft Management Console is not available locally. 

E. Desktop Experience is not available. 

Server Core is a minimal server installation option for computers running on the operating 

system. Server Core provides a low-maintenance server environment with limited 

functionality. 

The minimal nature of Server Core creates limitations: 

There is no Windows shell and very limited GUI functionality. The Server Core interface is 

a command prompt with PowerShell support. 

There is limited MSI support (unattended mode only). 

Server Graphical Shell is not installed. 

Microsoft Management Console: not available locally. 

Desktop Experience: not available. 


Q360. - (Topic 3) 

Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012 R2. A one-way external trust exists between contoso.com and adatum.com. 

Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com. 

What should you do? 

A. Change the scope of Group1 to domain local. 

B. Modify the Allowed to Authenticate permissions in adatum.com. 

C. Enable SID quarantine on the trust between contoso.com and adatum.com. 

D. Modify the Allowed to Authenticate permissions in contoso.com. 

Answer: D 

Explanation: 

* Accounts that require access to the customer Active Directory will be granted a special right called Allowed to Authenticate. This right is then applied to computer objects (Active Directory domain controllers and AD RMS servers) within the customer Active Directory to which the account needs access. 

* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest.