getcertified4sure.com

Key benefits of mcsa 70 410 pdf




Q1. - (Topic 3) 

A company’s server administration team would like to take advantage of the newest file systems available with Windows Server 2012 R2. The team needs a file system capable of managing extremely large data drives that can auto-detect data corruption and automatically perform needed repairs without taking a volume offline. 

Which file system should the server administration team choose? 

A. NFS 

B. DFS 

C. NTFS 

D. ReFS 

Answer:

Explanation: 

The ReFS (Resilient File System) is capable of managing extremely large data drives (1 

YB Yottabyte), can auto-detect data corruption, and automatically perform needed repairs 

without taking the volume offline. 

Quick Tip: The command fsutil fsinfo volumeinfo x: will display the volume file system. 

ReFS is only intended for data drives and not compatible with all Windows Server 2012 R2 

file system technologies, however it is compatible with the new Storage Spaces. 


Q2. - (Topic 3) 

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. 

You need to add a graphical user interface (GUI) to Server1. 

Which tool should you use? 

A. The Install-WindowsFeature cmdlet 

B. The Install-Module cmdlet 

C. The Install-RoleService cmdlet 

D. The setup.exe command 

Answer:

Explanation: 

The DISM command is called by the Add-WindowsFeature commanD. Here is the syntax for DISM: 

Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:Server-Gui-Shell /featurename:Server-Gui-Mgmt 


Q3. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

The password policy for the domain is set to require a minimum password length of 10 characters. 

A user named User1 and a user named User2 work for the sales department. 

User1 is forced to create a domain password that has a minimum of 12 characters. User2 is forced to create a domain password that has a minimum of eight characters. 

You need to identify what forces the two users to have different password lengths. 

Which tool should you use? 

A. Credential Manager 

B. Security Configuration Wizard (SCW) 

C. Group Policy Management 

D. Active Directory Administrative Center 

Answer:

Explanation: 

In Windows Server 2008, you can use fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. For example, to increase the security of privileged accounts, you can apply stricter settings to the privileged accounts and then apply less strict settings to the accounts of other users. Or in some cases, you may want to apply a special password policy for accounts whose passwords are synchronized with other data sources. 

This is found in the Active Directory Administrative Center. You can use Active Directory Administrative Center to perform the following Active Directory administrative tasks: Create new user accounts or manage existing user accounts Create new groups or manage existing groups Create new computer accounts or manage existing computer accounts Create new organizational units (OUs) and containers or manage existing OUs Connect to one or several domains or domain controllers in the same instance of Active Directory Administrative Center, and view or manage the directory information for those domains or domain controllers Filter Active Directory data by using query-building search 

: http://technet.microsoft.com/en-us/library/cc770842(v=ws.10).aspx 


Q4. - (Topic 3) 

You have two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. The servers are configured as shown in the following table. 

The routing table for Server1 is shown in the Routing Table exhibit. (Click the Exhibit button.) 

From Server1, you attempt to ping Server2, but you receive an error message as shown in the Error exhibit. (Click the Exhibit button.) 

You need to ensure that you can successfully ping Server2 from Server1. What should you do on Server1? 

A. Disable Windows Firewall. 

B. Modify the subnet mask. 

C. Modify the DNS settings. 

D. Modify the default gateway settings. 

Answer:

Explanation: 

Route is used to view and modify the IP routing table. Route Print displays a list of current routes that the host knows. Default gateways are important to make IP routing work efficiently. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain extensive and continuously updated knowledge about individual remote IP network segments. Only the router that acts as the default gateway needs to maintain this level of routing knowledge to reach other remote network segments in the larger inter network. In order for Host A on Network 1 to communicate with Host B on Network 2, Host A first checks its routing table to see if a specific route to Host B exists. If there is no specific route to Host B, Host A forwards its TCP/IP traffic for Host B to its own default gateway, IP Router 1. 

The Default Gateway specifies the IP address of a router on the local subnet, which the system will use to access destinations on other networks. If the default gateway settings are not properly configured, then there can be no successful connection. 

Reference: 

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 269 


Q5. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You apply a security policy to server1 by using the Security Configuration Wizard (CWM). You plan to roll back the security policy. 

You need to identify the settings that are prevented from rolling back running the CWM Witch settings should you identify. 

A. The secure startup order 

B. The outbound authentication methods 

C. The network security rules 

D. The system access control list 

Answer:


Q6. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy. 

You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. 

You configure all of the client computers to use Server1 as their primary DNS server. 

You need to prevent Server1 from attempting to resolve Internet host names for the client computers. 

What should you do on Server1? 

A. Create a primary zone named “root”. 

B. Create a primary zone named "GlobalNames". 

C. Create a forwarder that points to 169.254.0.1. 

D. Create a primary zone named “.”. 

Answer:


Q7. HOTSPOT - (Topic 3) 

Your network contains an Active Directory domain. The domain contains a server named Server28. 

The computer account of Server 28 is located in an organizational unit (OU) named OU1. A Group Policy object (GPO) named Application Restriction Policy is linked to OU1. 

The settings of the GPO are configured as shown in the GPO Settings exhibit. (Click the Exhibit button.) 

The Services console on Server28 is shown in the Services exhibit. (Click the Exhibit 

button.) 

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point. 

Answer: 


Q8. HOTSPOT - (Topic 1) 

Your network contains an Active Directory forest. The forest contains a single domain named contoso.com. 

AppLocker policies are enforced on all member servers. 

You view the AppLocker policy applied to the member servers as shown in the exhibit. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. 

Answer: 


Q9. HOTSPOT - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

From Server2, you attempt to connect to Server1 by using Computer Management and you receive the following error message: "Computer\ \Server1 cannot be found. The network path was not found." 

From Server1, you successfully connect to Server2 by using Server Manager. 

You need to ensure that you can manage Server1 remotely from Server2 by using Computer Management. 

What should you configure? To answer, select the appropriate option in the answer area. 

Answer: 


Q10. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

Your company hires 500 temporary employees for the summer. 

The human resources department gives you a Microsoft Excel document that contains a list of the temporary employees. 

You need to automate the creation of user accounts for the 500 temporary employees. 

Which tool should you use? 

A. ADSI Edit 

B. The csvde.exe command 

C. Active Directory Users and Computers 

D. The Add-Member cmdlet 

Answer:

Explanation: 

Csvde.exe is the best option to add multiple users. As you just need to export the excel 

spreadsheet as a csv file and make sure the parameters are correct. 

You can use Csvde to import and export Active Directory data that uses the comma-

separated value format. 

Use a spreadsheet program such as Microsoft Excel to open this .csv file and view the 

header and value information. 

The CSVDE is a command-line utility that can create new AD DS objects by importing 

information from a comma-separated value (.csv) file. This would be the least amount of 

administrative effort in this case especially considering that these would be temporary 

employees.