Ideas to 70 410 installing and configuring windows server 2012 r2


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-410 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-410-exam-dumps.html

Q31. - (Topic 3) 

How can you manage a newly installed Windows Server 2012 R2 core from a another Windows Server 2012 R2 with computer manager? 

Exhibit: 

A. 1 

B. 2 

C. 4 

D. 8 

Answer:


Q32. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server 2012. You create a group Managed Service Account named gservice1. You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1? 

A. From a command prompt, run sc.exe and specify the config parameter. 

B. From Windows PowerShell,run Set-Service and specify the -PassThrough parameter 

C. From Windows PowerShell,run Set-Service and specify the -StartupType parameter 

D. From Services Console configure the General settings 

Answer:


Q33. HOTSPOT - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains 25 servers. All servers run Windows Server 2012 R2. 

You need to create a Windows Firewall rule to prevent administrators from using Internet Explorer to access the Internet while they are logged on interactively to the servers. The solution must not prevent administrators from accessing websites on the internal network. 

How should you configure the rule? 

To answer, select the appropriate options in the answer area. 

Answer: 


Q34. - (Topic 3) 

You have a server named Server1. Server1 runs Windows Server 2012 R2 and is located in a perimeter network. 

You need to configure a custom connection security rule on Server1. The rule must encrypt network communications across the Internet to a computer at another company. 

Which authentication method should you configure in the connection security rule? 

A. Advanced 

B. User (Kerberos V5) 

C. Default 

D. Computer (Kerberos V5) 

E. Computer and user (Kerberos V5) 

Answer:

Explanation: 

You need to make use of Advanced authentication method to ensure that communication is 

encrypted over the network to the other company from your custom connection security 

rule on Server1. 

References: 

http://technet.microsoft.com/en-us/library/bb742516.aspx 

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 8: File 

Services and Storage, p. 428 


Q35. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. 

You create a software restriction policy to allow an application named App1 by using a certificate rule. You need to ensure that when users attempt to execute App1, the certificate for App1 is 

verified against a certificate revocation list (CRL). What should you do? 

A. Modify the rule for App1. 

B. Modify the Trusted Publishers Properties. 

C. Create a new certificate rule for App1. 

D. Modify the Enforcement Properties. 

Answer:


Q36. - (Topic 2) 

You have a server named Server2 that runs Windows Server 2012 R2. 

A network technician installs a new disk on Server2 and creates a new volume. 

The properties of the new volume are shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can enable NTFS disk quotas for volume D. 

What should you do first? 

A. Format volume D 

B. Install the File Server Resource Manager role service 

C. Run the convert.exe command 

D. Convert the disk to a dynamic disk 

Answer:

Explanation: 

To be able to use a NEW disk so that you can enable NTFS disk quotas, in other word REFS to NTFS, it requires formatting first. 


Q37. - (Topic 3) 

Your network contains two Hyper-V hosts named Host1 and Host2. Host1 contains a virtual machine named VM1. Host2 contains a virtual machine named VM2. VM1 and VM2 run Windows Server 2012 R2. 

You install the Network Load Balancing feature on VM1 and VM2. 

You need to ensure that the virtual machines are configured to support Network Load Balancing (NLB). 

Which virtual machine settings should you configure on VM1 and VM2? 

A. DHCP guard 

B. MAC address 

C. Router guard 

D. Port mirroring 

Answer:

Explanation: 

When MAC addresses are not assigned to virtual machines, it could cause network problems. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V virtualization, Lesson 1: Deploying and configuring Hyper-V hosts, p. 313-319 http://blogs.msdn.com/b/clustering/archive/2010/07/01/10033544.aspx 


Q38. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. 

The domain contains a user named User1 and a global security group named Group1. 

You need to modify the SAM account name of Group1. 

Which cmdlet should you run? 

A. Add-AdPrincipalGroupMembership 

B. Install-AddsDomainController 

C. Install-WindowsFeature 

D. Install-AddsDomain 

E. Rename-AdObject 

F. Set AdAccountControl 

G. Set-AdGroup 

H. Set-User 

Answer:


Q39. - (Topic 3) 

A company’s server deployment team needs to install fourteen Windows Server 2012 R2 to handle the expected increase in holiday traffic. The team would like the option of switching the servers between Server Core and Full GUI servers and do not want to be locked in to their first choice. 

The server team would like four of the servers to include the Windows 8 Shell. 

Which installation option is required for these servers? 

A. Server Core 

B. Desktop Experience 

C. Server with a GUI 

D. Minimal Server Interface 

Answer:

Explanation: 

The Desktop Experience installation option includes the Windows 8 Shell feature. This installation option also includes other features available for installation not found in the other three; such as Themes, Windows Store and support for Windows Store apps, and Windows Media Player. Quick Tip: To completely remove a feature and the binary files from the disk, use the Windows PowerShell command Uninstall-WindowsFeature. For example, to remove Desktop Experience: Uninstall-WindowsFeature Desktop-Experience –Remove. 


Q40. - (Topic 3) 

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2 Standard. You establish a Remote Desktop session to Server1. 

You need to identify which task can be performed on Server1 from within the Remote Desktop session. 

What should you identify? 

A. Install a feature by using Server Manager. 

B. Modify the network settings by using Sconfig. 

C. Disable services by using Msconfig. 

D. Join a domain by using the System Properties. 

Answer:

Explanation: 

In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must be a member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode. 

References: http://technet.microsoft.com/en-us/library/jj647766.aspx Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80