10 tips on exam 70 410 pdf

Want to know Ucertify 70 410 questions Exam practice test features? Want to lear more about Microsoft Installing and Configuring Windows Server 2012 certification experience? Study Pinpoint Microsoft examcollection 70 410 answers to Replace microsoft 70 410 exam questions at Ucertify. Gat a success with an absolute guarantee to pass Microsoft microsoft 70 410 exam (Installing and Configuring Windows Server 2012) test on your first attempt.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-410 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-410-exam-dumps.html

Q201. HOTSPOT - (Topic 3) 

Your network contains a domain controller named dc5.adatum.com that runs Windows 

Server 2012 R2. 

You discover that you can connect successfully to DC5 over the network, but you receive a 

request timed out message when you attempt to ping DC5. 

You need to configure DC5 to respond to ping request. 

Which firewall rule should you modify on DC5? To answer, select the appropriate rule in 

the answer area. 

Answer: 


Q202. - (Topic 2) 

Your network contains several servers that run Windows Server 2012 R2 and client computers that run Windows 8.1. 

You download several signed Windows PowerShell scripts from the Internet. 

You need to run the PowerShell scripts on all of the servers and all of the client computers. 

What should you modify first? 

A. The environment variables on all of the servers 

B. The execution policy on all of the servers 

C. The execution policy on all of the client computers 

D. The environment variables on all client computers 

Answer:

Explanation: 

The default execution policy of Windows Server 2012 is RemoteSigned meaning that as long as a valid signature is used on the scripts, they will run. However, the client computers have a default execution policy of restricted meaning that no scripts will run in PowerShell whatsoever, so this would have to be changed before the scripts could be executed on the client computers. 


Q203. - (Topic 3) 

Your network contains an Active Directory forest named adatum.com. The forest contains a child domain named asia.adatum.com. The asia.adatum.com child domain contains a server named DHCP1 that runs Windows Server 2012 R2. 

You install the DHCP Server server role on DHCP1. 

You have access to the administrative accounts shown in the following table. 

You need to authorize DHCP1. 

Which user account should you use? 

A. Admin1 

B. Admin2 

C. Admin3 

D. Admin4 

Answer:


Q204. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing connection security rules. 

Which of the following is TRUE with regards to connection security rules? (Choose all that apply.) 

A. Connection security rules allows for traffic to be secured via IPsec. 

B. Connection security rules do not allow the traffic through the firewall. 

C. Connection security rules are applied to programs or services. 

D. Connection security rules are applied between two computers. 

Answer: A,B,D 

Explanation: 

Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity, and, optionally, data encryption. How firewall rules and connection security rules are related Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with IPsec, you can create Computer Connection Security rules. However, the creation of a connection security rule does not allow the traffic through the firewall. You must create a firewall rule to do this, if the traffic is not allowed by the default behavior of the firewall. Connection security rules are not applied to programs or services; they are applied between the computers that make up the two endpoints. 


Q205. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

An organizational unit (OU) named OU1 contains user accounts and computer accounts. 

A Group Policy object (GPO) named GP1 is linked to the domain.GP1 contains Computer Configuration settings and User Configuration settings. 

You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers. 

What should you configure? 

A. The GPO Status 

B. The Block Inheritance feature 

C. The Group Policy loopback processing mode 

D. The Enforced setting 

Answer:

Explanation: 

A loopback with merge option needs to be used. 


Q206. - (Topic 3) 

You have two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. The servers are configured as shown in the following table. 

The routing table for Server1 is shown in the Routing Table exhibit. (Click the Exhibit button.) 

From Server1, you attempt to ping Server2, but you receive an error message as shown in the Error exhibit. (Click the Exhibit button.) 

You need to ensure that you can successfully ping Server2 from Server1. What should you do on Server1? 

A. Disable Windows Firewall. 

B. Modify the subnet mask. 

C. Modify the DNS settings. 

D. Modify the default gateway settings. 

Answer:

Explanation: 

Route is used to view and modify the IP routing table. Route Print displays a list of current routes that the host knows. Default gateways are important to make IP routing work efficiently. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain extensive and continuously updated knowledge about individual remote IP network segments. Only the router that acts as the default gateway needs to maintain this level of routing knowledge to reach other remote network segments in the larger inter network. In order for Host A on Network 1 to communicate with Host B on Network 2, Host A first checks its routing table to see if a specific route to Host B exists. If there is no specific route to Host B, Host A forwards its TCP/IP traffic for Host B to its own default gateway, IP Router 1. 

The Default Gateway specifies the IP address of a router on the local subnet, which the system will use to access destinations on other networks. If the default gateway settings are not properly configured, then there can be no successful connection. 

Reference: 

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 269 


Q207. - (Topic 3) 

Your network contains one Active Directory domain named contoso.com. The domain contains 

2,000 client computers used by students. You recently discover an increase in calls to the helpdesk that relate to security policy to meet the following requirement: 

. Modify the UserName of the built-in account named Administrator . Support a time mismatch between client computers and domain controllers of up to three minutes. 

Which Two security settings should you modify? 

A. Account Policies 

B. Password Policy 

C. Account Lockout Policy 

D. Kerberos Policy 

E. Local Policies 

F. Audit Policy 

G. User Rights Assignment 

H. Security Options 

Answer: D,H 

Explanation: 

In Group Policy Object Editor, click Computer Configuration, click Windows Settings, click Security Settings, click Local Policies, and then click Security Options. In the details pane, double-click Accounts: Rename administrator account. 


Q208. - (Topic 3) 

You run a Windows 2012 R2 Hyper-V Role Server, you need to shrink the size of files.vhd. 

Which PowerShell cmdlet option you should run first? 

A. Dismount-VHD 

B. Mount-VHD 

C. Resize-VHD 

D. Convert-VHD 

Answer:


Q209. - (Topic 3) 

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a folder named Folder1. 

You share Folder1 as Share1 by using Advanced Sharing. Access-based enumeration is 

enabled. 

Share1 contains an application named Appl.exe. 

You configure the NTFS permissions on Folder1 as shown in the following table. 

The members of Group2 report that they cannot make changes to the files in Share1. The 

members of Group1 and Group2 run Appl.exe successfully. 

You need to ensure that the members of Group2 can edit the files in Share1. 

What should you do? 

A. Replace the NTFS permissions on all of the child objects. 

B. Edit the Share permissions. 

C. Edit the NTFS permissions. 

D. Disable access-based enumeration. 

Answer:

Explanation: 

Share permissions and NTFS permissions are independent in the sense that neither changes the other. The final access permissions on a shared folder are determined by taking into consideration both the share permission and the NTFS permission entries. The more restrictive permissions are then applied. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter8: File Services and Storage, Lesson 2: Provisioning and Managing Shared Storage, p.388 


Q210. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. 

The domain contains a user named User1 and a global security group named Group1. 

You need to add a new domain controller to the domain. 

You install Windows Server 2012 R2 on a new server named DC3. 

Which cmdlet should you run next? 

A. Add-AdPrincipalGroupMembership 

B. Install-AddsDomainController 

C. Install WindowsFeature 

D. Install AddsDomain 

E. Rename-AdObject 

F. Set-AdAccountControl 

G. Set-AdGroup 

H. Set-User 

Answer:

Explanation: 

It is the 2nd step when installing a DC by powershell on a fresh server.