70-410 rapidshare(1 to 15) for IT engineers: Apr 2016 Edition

Exam Code: 70-410 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Installing and Configuring Windows Server 2012
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-410 Exam.

2016 Apr 70-410 Study Guide Questions:

Q1. - (Topic 1) 

Your network contains an Active Directory forest. The forest functional level is Windows Server 2012 R2. The forest contains a single domain. The domain contains a member server named Server1. Server1 runs windows Server 2012 R2. 

You purchase a network scanner named Scanner1 that supports Web Services on Devices (WSD). 

You need to share the network scanner on Server1. 

Which server role should you install on Server1? 

A. Web Server (IIS) 

B. Fax Server 

C. Print and Document Services 

D. File and Storage Services 

Answer: C 

Explanation: 

The Print and Document Services role allows for the configuration to share printers, 

scanners and fax devices. 

References: 

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 1: 

Installing and Configuring servers, Objective 1.2: Configure servers, p. 8 

http://technet.microsoft.com/en-us/library/hh831468.aspx 


Q2. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

Contoso.com has a server, named ENSUREPASS-SR07, which has the AD DS, DHCP, and DNS server roles installed. Contoso.com also has a server, named ENSUREPASS-SR08, which has the DHCP, and Remote Access server roles installed. You have configured a server, which has the File and Storage Services server role installed, to automatically acquire an IP address. 

The server is named ENSUREPASS-SR09. You then create a filter on ENSUREPASS-SR07. 

Which of the following is a reason for this configuration? 

A. To make sure that ENSUREPASS-SR07 issues ENSUREPASS-SR09 an IP address. 

B. To make sure that ENSUREPASS-SR07 does not issue ENSUREPASS-SR09 an IP address. 

C. To make sure that ENSUREPASS-SR09 acquires a constant IP address from ENSUREPASS-SR08 only. 

D. To make sure that ENSUREPASS-SR09 is configured with a static IP address. 

Answer: B 


Q3. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

Server1 has the Group Policy Management feature installed. Server2 has the Print and Document Services server role installed. 

On Server2, you open Print Management and you deploy a printer named Printer1 by using a Group Policy object (GPO) named GPO1.When you open GPO1 on Server1, you discover that the Deployed Printers node does not appear. 

You need to view the Deployed Printers node in GPO1. 

What should you do? 

A. On Server1, modify the Group Policy filtering options of GPO1. 

B. On a domain controller, create a Group Policy central store. 

C. On Server2, install the Group Policy Management feature. 

D. On Server1, configure the security filtering of GPO1. 

Answer: C 

Explanation: 

Pre-Requisites To use Group Policy for printer deployment you will need to have a Windows Active Directory domain, and this article assumes that your Domain Controller is a Windows 2008 R2 Server. You will also need the Print Services role installed on a server (can be on your DC), and you will be using the Print Management and Group Policy Management consoles to configure the various settings. It’s assumed that you have already followed Part One and have one or more printers shared on your server with the necessary drivers, ready to deploy to your client computers. 


Q4. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. 

You need to configure storage for a virtual machine to meet the following requirements: . Support up to 3 TB of data on a single hard disk. 

. Allocate disk space as needed. 

. Use a portable storage format. 

What should you configure? 

A. A fixed-size VHDX 

B. A pass-through disk 

C. A fixed-size VHD 

D. A dynamically expanding VHDX 

E. A dynamically expanding VHD 

Answer: D 

Explanation: 

Support for virtual hard disk storage capacity of up to 64 TB. 

vhd max is 2TB 

Dynamically expanding virtual hard disk uses only as much physical storage space as it 

needs to store the actual data that the disk currently contains. The size of the virtual disk’s 

image file then grows as additional data is written to it. 

References: 

http://technet.microsoft.com/en-us/library/cc720381(v=ws.10).aspx 

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 3.2: 

Create and Configure virtual machine storage, Chapter 3: p. 157-158 

70-410: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 7: 

Hyper-V virtualization, Lesson 2: Deploying and Configuring virtual machines, p. 320 


Q5. - (Topic 3) 

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 is located on the same subnet as all of the client computers. A network technician reports that he receives a “Request timed out” error message when he attempts to use the ping utility to connect to Server1 from his client computer. The network technician confirms that he can access resources on Server1 from his client computer. 

You need to configure Windows Firewall with Advanced Security on Server1 to allow the ping utility to connect. 

Which rule should you enable? 

A. File and Printer Sharing (Echo Request – ICMPv4-In) 

B. Network Discovery (WSD-In) 

C. File and Printer Sharing (NB-Session-In) 

D. Network Discovery (SSDP-In) 

Answer: A 


70-410 free practice test

Up to the immediate present 70-410 free practice test:

Q6. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named OU1. 

You need to ensure that when new client computers join the domain, their computer accounts are created in OU1 by default. 

What should you do? 

A. From Windows PowerShell, run the Move-ADObjectcmdlet. 

B. From a command prompt, run the redircmp.exe command. 

C. From ADSI Edit, configure the properties of the OU1 object. 

D. From Ldp, configure the properties of the Computers container. 

Answer: B 

Explanation: 

Redirects the default container for newly created computers to a specified, target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers. The CN=Computers container is a computer-protected object. For backward compatibility reasons, you cannot (and must not) remove it. 

: http://technet.microsoft.com/en-us/library/cc770619.aspx 


Q7. - (Topic 2) 

Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains one domain. A two-way forest trust exists between the forests. 

The forests use the address spaces shown in the following table. 


From a computer in the contoso.com domain, you can perform reverse lookups for the servers in the contoso.com domain, but you cannot perform reverse lookups for the servers in the adatum.com domain. 

From a computer in the adatum.com domain, you can perform reverse lookups for the servers in both domains. 

You need to ensure that you can perform reverse lookups for the servers in the adatum.com domain from the computers in the contoso.com domain. 

What should you create? 

A. A trust point 

B. A GlobalNames zone 

C. A delegation 

D. A conditional forwarder 

Answer: D 

Explanation: 

Conditional forwarders are DNS servers that only forward queries for specific domain names. Instead of forwarding all queries it cannot resolve locally to a forwarder, a conditional forwarder is configured to forward a query to specific forwarders based on the domain name contained in the query. Forwarding according to domain names improves conventional forwarding by adding a name-based condition to the forwarding process. The conditional forwarder setting for a DNS server consists of the following: The domain names for which the DNS server will forward queries. One or more DNS server IP addresses for each domain name specified. When a DNS client or server performs a query operation against a DNS server, the DNS server looks to see if the query can be resolved using its own zone data or the data stored in its cache. If the DNS server is configured to forward for the domain name designated in the query, then the query is forwarded to the IP address of a forwarder associated with the domain name. For example, in the following figure, each of the queries for the domain names is forwarded to a DNS server associated with the domain name. 

: http://technet.microsoft.com/en-us/library/cc757172(v=ws.10).aspx 


Q8. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

You create and enforce the default AppLocker executable rules. 

Users report that they can no longer execute a legacy application installed in the root of drive C. 

You need to ensure that the users can execute the legacy application. 

What should you do? 

A. Create a new rule. 

B. Delete an existing rule. 

C. Modify the action of the existing rules. 

D. Add an exception to the existing rules. 

Answer: A 

Explanation: 

AppLocker is a feature that advances the functionality of the Software Restriction Policies 

feature. AppLocker contains new capabilities and extensions that reduce administrative 

overhead and help administrators control how users can access and use files, such as 

executable files, scripts, Windows Installer files, and DLLs. By using AppLocker, you can: 

Define rules based on file attributes that persist across application updates, such as the 

publisher name (derived from the digital signature), product name, file name, and file 

version. You can also create rules based on the file path and hash. 

Assign a rule to a security group or an individual user. 

Create exceptions to rules. For example, you can create a rule that allows all users to run 

all Windows binaries except the Registry Editor (Regedit.exe). 

Use audit-only mode to deploy the policy and understand its impact before enforcing it. . 

Create rules on a staging server, test them, export them to your production environment, 

and then import them into a Group Policy Object. 

Simplify creating and managing AppLocker rules by using Windows PowerShell cmdlets for 

AppLocker. 

AppLocker default rules 

AppLocker allows you to generate default rules for each of the rule types. 

Executable default rule types: 

Allow members of the local Administrators group to run all applications. Allow members of the Everyone group to run applications that are located in the Windows folder. Allow members of the Everyone group to run applications that are located in the Program Filesfolder. Windows Installer default rule types: Allow members of the local Administrators group to run all Windows Installer files. Allow members of the Everyone group to run digitally signed Windows Installer files. Allow members of the Everyone group to run all Windows Installer files located in the Windows\Installer folder. Script default rule types: Allow members of the local Administrators group to run all scripts. Allow members of the Everyone group to run scripts located in the Program Files folder. Allow members of the Everyone group to run scripts located in the Windows folder. DLL default rule types: (this on can affect system performance ) Allow members of the local Administrators group to run all DLLs. Allow members of the Everyone group to run DLLs located in the Program Files folder. Allow members of the Everyone group to run DLLs located in the Windows folder. You can apply AppLocker rules to individual users or to a group of users. If you apply a rule to a group of users, all users in that group are affected by that rule. If you need to allow a subset of a user group to use an application, you can create a special rule for that subset. For example, the rule “Allow Everyone to run Windows except Registry Editor” allows everyone in the organization to run the Windows operating system, but it does not allow anyone to run Registry Editor. The effect of this rule would prevent users such as Help Desk personnel from running a program that is necessary for their support tasks. To resolve this problem, create a second rule that applies to the Help Desk user group: “Allow Help Desk to run Registry Editor.” If you create a deny rule that does not allow any users to run Registry Editor, the deny rule will override the second rule that allows the Help Desk user group to run Registry Editor. 


Q9. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that has the DNS Server server role installed. Server1 hosts a primary zone for contoso.com. 

The domain contains a member server named Server2 that is configured to use Server1 as its primary DNS server. 

From Server2, you run nslookup.exe as shown in the exhibit. (Click the Exhibit button.) 


You need to ensure that when you run Nslookup, the correct name of the default server is displayed. 

What should you do? 

A. On Server1, create a reverse lookup zone. 

B. On Server1, modify the Security settings of the contoso.com zone. 

C. From Advanced TCP/IP Settings on Server1, add contoso.com to the DNS suffix list. 

D. From Advanced TCP/IP Settings on Server2, add contoso.com to the DNS suffix list. 

Answer: A 

Explanation: 

Make sure that a reverse lookup zone that is authoritative for the PTR resource record 

exists. 

PTR records contain the information that is required for the server to perform reverse name 

lookups. 

References: 

http://technet.microsoft.com/en-us/library/cc961417.aspx 

Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: 

Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6 

addressing, p.246 


Q10. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

You are running a training exercise for junior administrators. You are currently discussing spanned volumes. 

Which of the following is TRUE with regards to spanned volumes? (Choose all that apply.) 

A. Spanned volumes do not provide fault tolerance. 

B. Spanned volumes are a fault tolerant solution. 

C. You can extend a spanned volume onto a maximum of 16 dynamic disks. 

D. You cannot create a spanned volume using a system volume or boot volume. 

Answer: A,D 

Explanation: 

A spanned volume is a dynamic volume consisting of disk space on more than one physical disk. If a simple volume is not a system volume or boot volume, you can extend it across additional disks (up to 32 total) to create a spanned volume, or you can create a spanned volume in unallocated space on a dynamic disk. You need at least two dynamic disks in addition to the startup disk to create a spanned volume. You can extend a spanned volume onto a maximum of 32 dynamic disks. Spanned volumes are not fault tolerant. 


70-410 exam guide

Refined 70-410 dumps:

Q11. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains 500 servers that run Windows Server 2012 R2. 

You have a written security policy that states the following: 

Only required ports must be open on the servers. 

All of the servers must have Windows Firewall enabled. 

Client computers used by administrators must be allowed to access all of the ports 

on all of the servers. 

Client computers used by the administrators must be authenticated before the 

client computers can access the servers. 

You have a client computer named Computer1 that runs Windows 8. 

... . 

You need to ensure that you can use Computer1 to access all of the ports on all of the servers successfully. The solution must adhere to the security policy. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. On Computer1, create a connection security rule. 

B. On all of the servers, create an outbound rule and select the Allow the connection if it is secure option. 

C. On all of the servers, create an inbound rule and select the Allow the connection if it is secure option. 

D. On Computer1, create an inbound rule and select the Allow the connection if it is secure option. 

E. On Computer1, create an outbound rule and select the Allow the connection if it is secure option. 

F. On all of the servers, create a connection security rule. 

Answer: A,C,F 

Explanation: 

Unlike firewall rules, which operate unilaterally, connection security rules require that both 

communicating computers have a policy with connection security rules or another 

compatible IPsec policy. 

Traffic that matches a firewall rule that uses the Allow connection if it is secure setting 

bypasses Windows Firewall. The rule can filter the traffic by IP address, port, or protocol. 

This method is supported on Windows Vista or Windows Server 2008. 

References: 

http://technet.microsoft.com/en-us/library/cc772017.aspx 

http://technet.microsoft.com/en-us/library/cc753463.aspx 


Q12. DRAG DROP - (Topic 3) 

You have a print server named Server1Server1 runs Windows Server 2008 R2. You have a file server named Server2. Server2 runs Windows Server 2012 R2. 

You need to migrate all of the printers on Server1 to Server2. 

Which actions should you perform on the servers? 

To answer, drag the appropriate action to the correct servers in the answer area. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 


Answer: 



Q13. - (Topic 3) 

Your network contains an Active Directory domain named adatum.com. The domain contains the servers shown in the following table. 


You need to ensure that you can use Server Manager on DC1 to manage DC2. 

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Install Microsoft .NET Framework 4 on DC2. 

B. Install Remote Server Administration Tools on DC1. 

C. Install the Windows PowerShell 2.0 engine on DC1. 

D. Install Remote Server Administration Tools on DC2. 

E. Install Windows Management Framework 3.0 on DC2. 

Answer: A,E 

Explanation: 

In Windows Server 2012 R2, you can use Server Manager to perform management tasks on remote servers. Remote management is enabled by default on servers that are running Windows Server 2012 R2. To manage a server remotely by using Server Manager, you add the server to the Server Manager server pool. You can use Server Manager to manage remote servers that are running Windows Server 2008 and Windows Server 2008 R2, but the following updates are required to fully manage these older operating systems. Windows Management Framework 3.0. To use this release of Server Manager to access and manage remote servers that are running Windows Server 2008 or Windows Server 2008 R2, you must first install .NET Framework 4.0, and then install Windows Management Framework 3.0 on those servers. 

Reference: 

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80 


Q14. - (Topic 3) 

Your network contains an Active Directory domain named adatum.com. The domain contains three domain controllers. 

The domain controllers are configured as shown in the following table. 


DC3 loses network connectivity due to a hardware failure. 

You plan to remove DC3 from the domain. 

You log on to DC3. 

You need to identify which service location (SRV) records are registered by DC3. 

What should you do? 

A. Open the %windir%\system32\config\netlogon.dns file. 

B. Run dcdiag /test:dns 

C. Open the %windir%\system32\dns\backup\adatum.com.dns file. 

D. Run ipconfig /displaydns. 

Answer: A 

Explanation: 

A. Netlogon service creates a log file that contains all the locator resource records and 

places the logfile in the following location: 

B. Analyzes the state of domain controllers in a forest or enterprise and reports any 

problems to help introubleshooting. 

C. dns backup file 

D. used to display current resolver cache content You can verify SRV locator resource 

records by viewing netlogon.dns, located in the %systemroot%\System32\Config folder. 

The SRV record is a Domain Name System (DNS) resource record that is used to identify 

computers that host specific services. 

SRV resource records are used to locate domain controllers for Active Directory. 

You can use Notepad, to view this file. 

The first record in the file is the domain controller’s Lightweight Directory Access Protocol 

(LDAP) SRV record. 

This record should appear similar to the following: _ldap._tcp.Domain_Name 


Q15. - (Topic 3) 

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2. On DC2, you open Server Manager and you add Server1 as another server to manage. From Server Manager on DC2, you right-click Server1 as shown in the exhibit. You need to ensure that when you right-click Server1, you see the option to run the DHCP console. 

What should you do? 


A. On Server1, install the Feature Administration Tools. 

B. In the domain, add DC1 to the DHCP Administrators group. 

C. On DC2 and Server1, run winrm quickconfig. 

D. On DC2, install the Role Administration Tools. 

Answer: D