getcertified4sure.com

Up to date 70-410 free practice questions Guide




It is impossible to pass Microsoft 70-410 exam without any help in the short term. Come to Actualtests soon and find the most advanced, correct and guaranteed Microsoft 70-410 practice questions. You will get a surprising result by our Update Installing and Configuring Windows Server 2012 practice guides.

2021 Mar 70-410 exam prep

Q181. - (Topic 3) 

A company’s network administrator needs to ensure a specific IP address is never assigned by a Windows Server 2012 R2 DHCP server to any device connecting to the network. 

Which of the following should the administrator configure on the Windows Server 2012 R2 DHCP server? 

A. Reservation 

B. Scope options 

C. NAP 

D. Scope properties 

Answer:

Explanation: 

Configuring an IP address as a reservation will restrict a DHCP server’s assignment of that address unless a specific MAC address makes a request for the address. Exclusion is for not use the IP Address or range inside the Scope Pool, Filter is for not use theMAC Address or range. Quick Tip: Policies can also be defined per scope or server. Policy based assignment (PBA) allows an administrator to group DHCP clients by specific attributes based on fields contained in the DHCP client request packet. This feature allows for targeted administration and greater control of configuration parameters delivered to network devices. 


Q182. - (Topic 3) 

Your network contains two subnets. The subnets are configured as shown in the following table. 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 is connected to LAN1. 

You run the route print command as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that Server1 can communicate with the client computers on LAN2. 

What should you do? 

A. Change the default gateway address. 

B. Set the state of the Microsoft ISATAP Adapter #2 interface to disable. 

C. Change the metric of the 10.10.1.0 route. 

D. Set the state of the Teredo interface to disable. 

Answer:

Explanation: 

The exhibit shows the default gateway address to be that of LAN1. This should be changed to the LAN2 gateway address to allow client computers access on LAN2. 

In general, the first and last addresses in a subnet are used as the network identifier and broadcast address, respectively. All other addresses in the subnet can be assigned to hosts on that subnet. For example, IP addresses of networks with subnet masks of at least 24 bits ending in .0 or .255 can never be assigned to hosts. Such “last” addresses of a subnet are considered “broadcast” addresses and all hosts on the corresponding subnet will respond to it. Theoretically, there could be situations where you can assign an address ending in .0: for example, if you have a subnet like 192.168.0.0/255.255.0.0, you are allowed to assign a host the address 192.168.1.0. It could create confusion though, so it’s not a very common practice. Example10.6.43.0 with subnet 255.255.252.0 (22 bit subnet mask) means subnet ID 10.6.40.0, a host address range from 10.6.40.1 to 10.6.43.254 and a broadcast address10.6.43.255. So in theory, your example 10.6.43.0 would be allowed as a valid host address. The default gateway address should not end in .0 with the /24 address. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256 


Q183. HOTSPOT - (Topic 3) 

Your network contains a domain controller named dc5.adatum.com that runs Windows 

Server 2012 R2. 

You discover that you can connect successfully to DC5 over the network, but you receive a 

request timed out message when you attempt to ping DC5. 

You need to configure DC5 to respond to ping request. 

Which firewall rule should you modify on DC5? To answer, select the appropriate rule in 

the answer area. 

Answer: 


Q184. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1. Server1 runs Windows Server 2012 R2. 

On Server1, you create a printer named Printer1. You share Printer1 and publish Printer1 in Active Directory. 

You need to provide a group named Group1 with the ability to manage Printer1. 

What should you do? 

A. From Print Management, configure the Sharing settings of Printer1. 

B. From Active Directory Users and Computers, configure the Security settings of Server1-Printer1. 

C. From Print Management, configure the Security settings of Printer1. 

D. From Print Management, configure the Advanced settings of Printer1. 

Answer:

Explanation: 

If you navigate to the Security tab of the Print Server Properties you will find the Permissions that you can set to Allow which will provide Group1 with the ability to manage Printer1. 

Set permissions for print servers 

Open Print Management. 

In the left pane, click Print Servers, right-click the applicable print server and then 

click Properties. 

On the Security tab, under Group or users names, click a user or group for which 

you want to set permissions. 

Under Permissions for <user or group name>, select the Allow or Deny check 

boxes for the permissions listed as needeD. 

To edit Special permissions, click Advanced. 

On the Permissions tab, click a user group, and then click Edit. 

In the Permission Entry dialog box, select the Allow or Deny check boxes for the 

permissions that you want to edit. 


Q185. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing Group Policy preference. 

Which of the following is TRUE with regards to Group Policy preference? 

A. It supports applications and operating system features that are not compatible with Group Policy 

B. It does not support item-level targeting. 

C. It is the same as Group Policy filtering. 

D. It does not cause the application or operating system feature to disable the user interface for the settings they configure. 

Answer: A,D 


Up to the immediate present 70-410 actual exam:

Q186. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

You are running a training exercise for junior administrators. You are currently discussing Storage Spaces. 

Which of the following is TRUE with regards to Storage Spaces? 

A. Mirroring and parity are optional resilient storage modes of Storage Spaces. 

B. Failover clustering is not supported by Storage Spaces. 

C. Storage spaces are virtual disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning. 

D. Storage spaces are a collection of physical disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning. 

Answer: A,C 


Q187. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains a domain controller named Server1 that runs Windows Server 2012 R2. 

On Server1, you create a work folder named Work1. 

A user named User1 connects to Work1 from a computer named Computer1. 

You need to identify the last time the documents in Work1 were synchronized successfully 

from Computer1. 

What should you do? 

A. From Server Manager, review the properties of Computer1. 

B. From Windows PowerShell, run the Get-SyncUserSettingscmdlet. 

C. From Windows PowerShell, run the Get-SyncSharecmdlet. 

D. From Server Manager, review the properties of User1. 

Answer:


Q188. - (Topic 3) 

You have a server named Server2 that runs Windows Server 2012 R2. Server2 has the Hyper-V server role installed. 

The disks on Server2 are configured as shown in the exhibit. (Click the Exhibit button.) 

You create a virtual machine on Server2 named VM1. 

You need to ensure that you can configure a pass-through disk for VM1. 

What should you do? 

A. Convert Disk 1 to a basic disk. 

B. Take Disk 1 offline. 

C. Create a partition on Disk 1. 

D. Convert Disk 1 to a MBR disk. 

Answer:

Explanation: 

Pass-through Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspective 


Q189. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees. 

You create a Group Policy object (GPO) named GP1. You link GP1 to the Employees OU. 

You need to ensure that GP1 does not apply to the members of a group named Managers. 

What should you configure? 

A. The Security settings of Employees 

B. The WMI filter for GP1 

C. The Block Inheritance option for Employees 

D. The Security settings of GP1 

Answer:

Explanation: 

A. Wrong Group 

B. Windows Management Instrumentation (WMI) filters allow you to dynamically determine 

the scope of Group Policy objects (GPOs) based on attributes of the target computer. 

C. Blocking inheritance prevents Group Policy objects (GPOs) that are linked to higher 

sites, domains, or organizational units from being automatically inherited by the child-level. 

D. Set Managers to – Members of this security group are exempt from this Group Policy 

object. 

Security settings. 

You use the Security Settings extension to set security options for computers and users 

within the scope of a Group Policy object. You can define local computer, domain, and network security settings. Figure below shows an example of the security settings that allow everyone to be affected by this GPO except the members of the Management group, who were explicitly denied permission to the GPO by setting the Apply Group Policy ACE to Deny. Note that if a member of the Management group were also a member of a group that had an explicit Allow setting for the Apply Group Policy ACE, the Deny would take precedence and the GPO would not affect the user. 


Q190. - (Topic 3) 

Your network contains two subnets. The subnets are configured as shown in the following table. 

You have a server named Server2 that runs Windows Server 2012 R2. Server2 is connected to LAN1. You run the route print command as shown in the exhibit. 

You need to ensure that Server2 can communicate with the client computers on LAN2. 

What should you do? 

A. Change the metric of the 10.10.1.0 route. 

B. Set the state of the Teredo interface to disable. 

C. Set the state of the Microsoft ISATAP Adapter #2 interface to disable. 

D. Run route delete 172.23.2.0. 

Answer:

Explanation: 

You should delete the route 172.23.2.0 to allow communication between the client computers and Server2. The route is used to identify PIv6 /IPv4 packets that are being sent.