70-410 study guides(31 to 45) for IT professionals: Mar 2016 Edition

Question No. 31

- (Topic 1) 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. 

The domain contains a user named User1 and a global security group named Group1. 

User1 logs on to a client computer named Computer1. 

You need to disable the computer account of Computer1. 

Which cmdlet should you run? 

A. Add-AdPrincipalGroupMember.hip 

B. Install-AddsDomainController 

C. Install WindowsFeature 

D. Install AddsDomain 

E. Roname-AdObject 

F. Set-AdAccountControl 

G. Set-AdGroup 

H. Set-User 

Answer:

Explanation: 

Set-ADAccountControl Enabled Specifies if an account is enabled. An enabled account requires a password. This parameter sets the Enabled property for an account object. This parameter also sets the ADS_UF_ACCOUNTDISABLE flag of the Active Directory User Account Control (UAC) attribute. Possible values for this parameter include: $false or 0 $true or 1 The following example shows how to set this parameter to enable the account. -Enabled $true 


Question No. 32

DRAG DROP - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and is configured as the only domain controller. 

You need to retrieve a list of all the user accounts. The list must include the last time each user was authenticated successfully. 

Which Windows PowerShell command should you run? 

To answer, drag the appropriate cmdlet or property to the correct locations to complete the PowerShell command in the answer area. Each cmdlet or property may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 


Answer: 



Question No. 33

HOTSPOT - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All client 

computers run Windows 8. 

An administrator creates an application control policy and links the policy to an 

organizational unit (OU) named OU1. The application control policy contains several deny 

rules. The deny rules apply to the Everyone group. 

You need to prevent users from running the denied application. 

What should you configure? 

To answer, select the appropriate object in the answer area. 


Answer: 



Question No. 34

- (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a DHCP server named Server1 that runs Windows Server 2012 R2. 

You create a DHCP scope named Scope1. The scope has a start address of 192.168.1.10, an end address of 192.168.1.50, and a subnet mask of 255.255.255.192. 

You need to ensure that Scope1 has a subnet mask of 255.255.255.0. 

What should you do first? 

A. From the DHCP console, reconcile Scope1. 

B. From the DHCP console, delete Scope1. 

C. From the DHCP console, modify the Scope Options of Scope1. 

D. From Windows PowerShell, run the Set-DhcpServerv4Scope cmdlet. 

Answer:

Explanation: 

You cannot change the subnet mask of a DHCP scope without deleting the scope and 

recreating it with the new subnet mask. 

Set-DhcpServerv4Scope does not include a parameter for the subnet mask. 


Question No. 35

- (Topic 3) 

You have a server named Server2 that runs Windows Server 2012 R2. You open Server Manager on Server2 as shown in the exhibit. (Click the Exhibit button.) The Everyone group has read share permission and read NTFS permission to Sources. 

You need to ensure that when users browse the network, the Sources share is not visible. 

What should you do? 


A. From the properties of the Sources folder, remove the Sources share, and then share the Sources folder as Sources$ B. From the properties of the Sources folder, deny the List Folder Contents permission for the Everyone group 

C. From the properties of the Sources share, configure access-based enumeration 

D. From the properties of the Sources folder, configure the hidden attribute 

Answer:


Question No. 36

HOTSPOT - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server that runs Windows Server 2012 R2. 

You perform a Server Core Installation of Windows Server 2012 R2 on a new server. 

You need to ensure that you can add the new server to Server Manager on Server1. 

What should you configure on the new server? To answer, select the appropriate setting in 

the answer area. 


Answer: 



Question No. 37

- (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed, and all workstations have Windows 8 installed. 

You are running a training exercise for junior administrators. You are currently discussing a Windows PowerShell cmdlet that activates previously de-activated firewall rules. 

Which of the following is the cmdlet being discussed? 

A. Set-NetFirewallRule 

B. Enable-NetFirewallRule 

C. Set-NetIPsecRule 

D. Enable-NetIPsecRule 

Answer:

Explanation: 

Enable-NetFirewallRule – Enables a previously disabled firewall rule. 


Question No. 38

- (Topic 3) 

You have external virtual switch with srv-io enabled with 10 Virtual Machines on it. You need to make the Virtual Machines able to talk only to each other. 

A. remove the vswitch and recreate it as private. 

B. add new vswitch 

C. remove vswitch and recreate it as public 

D. adjust srv-io settings 

Answer:

Explanation: 

You cannot change the settings of a vswitch with SR-IOV enabled, so you must delete it and recreate it. 


Question No. 39

- (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has following storage spaces: 

.... 

Data 

Users 

Backups 

Primordial 

You add an additional hard disk to Server1. 

You need to identify which storage space contains the new hard disk. 

Which storage space contains the new disk? 

A. Primordial 

B. Data 

C. Users 

D. Backups 

Answer:

Explanation: 

All storage that meets acceptable criteria for Storage Spaces will be placed in the Primordial Pool. This can be considered the default pool for devices from which any other pools will be created. Notice that there are no other virtual disks or pools at this point. The Primordial Pool will only consist of physical storage devices that do not belong to any other pools. 


Question No. 40

- (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

Contoso.com has its headquarters in London, and several widespread satellite offices. When Contoso.com releases a new written policy stating that the graphical user interface (GUI) should not be installed on any servers deployed to Contoso.com’s satellite offices. 

It is reported that a server in one of the satellite offices are not compliant with the new written policy. 

You are required to remedy the situation, while using the least amount of user interaction. 

Which of the following actions should you take? 

A. You should consider uninstalling the User Interfaces and Infrastructure feature using a PowerShell cmdlet. 

B. You should consider uninstalling the User Interfaces and Infrastructure feature via TS Manager. 

C. You should consider uninstalling the User Interfaces and Infrastructure feature via Server Manager. 

D. You should consider uninstalling the User Interfaces and Infrastructure feature using the Dsrm.exe command from the command prompt. 

Answer:

Explanation: 

Although you could utilize a PowerShell cmdlet, it would require you to either log on to the remote machine to enable PowerShell remoting first (or to use the local PowerShell console). Using Server Manager, you could just add the server (if it wasn't already added) and use the "Remove Roles and Features" applet. 


Question No. 41

- (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 installed. 

You have been instructed to modify an Active Directory computer object. 

Which of the following actions should you take? 

A. You should consider making use of the Get-ADComputer Windows PowerShell cmdlet. 

B. You should consider making use of the Set-ADComputer Windows PowerShell cmdlet 

C. You should consider making use of the New-ADComputer Windows PowerShell cmdlet 

D. You should consider making use of the Get-ADComputerServiceAccount Windows PowerShell cmdlet 

Answer:

Explanation: 

Set-ADComputer – Modifies an Active Directory computer object. 


Question No. 42

- (Topic 2) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. 

Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. 

VM1 has several snapshots. 

You need to modify the snapshot file location of VM1. 

What should you do? 

A. Delete the existing snapshots, and then modify the settings of VM1. 

B. Right-click VM1, and then click Move. .. 

C. Right-click VM1, and then click Export... 

D. PauseVM1, and then modify the settings of VM1. 

Answer:

Explanation: 

You will need to navigate to the Hyper-V Management 

snap-in (C:\ProgramData\Microsoft\Windows\Hyper-V) and from there access the Snapshot file Location tab where you can change the settings for the VM1 snapshot file location. However, since there are already several snapshots in existence, you will need to delete them first because you will not be able to change the location of the snapshot file while there is an existing snapshot. 

You need to modify the snapshot file location of VM1. 


Question No. 43

- (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following  table. 


You plan to schedule a complete backup of Server1 by using Windows Server Backup. 

You need to ensure that the state of VM1 is saved before the backup starts. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. resource metering 

D. virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

The Integration Services settings on virtual machines include services such as operating system shutdown, time synchronization, data exchange, Heartbeat, and Backup (volume snapshot services). This snapshot will ensure that the state of VM1 is saved prior to backup. 

References: http://msdn.microsoft.com/en-us/library/dd405549(v=vs.85).aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 


Question No. 44

HOTSPOT - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 does not 

have Internet connectivity. 

All roles are removed completely from Server1. 

You mount a Windows Server 2012 R2 installation image to the C:\Source folder. 

You need to install the DNS Server server role on Server1. 

Which folder should you use as the source? To answer, select the appropriate folder in the 

answer area. 


Answer: 



Question No. 45

- (Topic 1) 

Your company has a main office and two branch offices. The offices connect to each other by using a WAN link. 

In the main office, you have a server named Server1 that runs Windows Server 2012 R2. 

Server1 is configured to use an IPv4 address only. 

You need to assign an IPv6 address to Server1. The IP address must be private and routable. 

Which IPv6 address should you assign to Server1? 

A. fe80:ab32:145c::32cc:401b 

B. ff00:3fff:65df:145c:dca8::82a4 

C. 2001:ab32:145c::32cc:401b 

D. fd00:ab32:14:ad88:ac:58:abc2:4 

Answer:

Explanation: 

Unique local addresses are IPv6 addresses that are private to an organization in the same way that private addresses–such as 10.x.x.x, 192.168.x.x, or 172.16.0.0 172.31.255.255–can be used on an IPv4 network. Unique local addresses, therefore, are not routable on the IPv6 Internet in the same way that an address like 10.20.100.55 is not routable on the IPv4 Internet. A unique local address is always structured as follows: The first 8 bits are always 11111101 in binary format. This means that a unique local address always begins with FD and has a prefix identifier of FD00::/8.