getcertified4sure.com

Getting Smart with: 70 410 dumps pdf




Act now and download your Microsoft microsoft 70 410 exam test today! Do not waste time for the worthless Microsoft vce 70 410 tutorials. Download Abreast of the times Microsoft Installing and Configuring Windows Server 2012 exam with real questions and answers and begin to learn Microsoft 70 410 exam questions pdf with a classic professional.

Q11. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Server1 that runs Windows Server 2012 R2. 

You share several printers on Server1. 

You need to ensure that you can view the printer objects associated to Server1 in Active 

Directory Users and Computers. 

Which option should you select? 

To answer, select the appropriate option in the answer area. 

Answer: 


Q12. - (Topic 2) 

You have a new server named Server1 that runs Windows Server 2012 R2. 

Server1 has two dual-core processors and 32 GB of RAM. 

You install the Hyper-V server role on Server1. 

You create two virtual machines on Server1 that each have 8 GB of memory. 

You need to minimize the amount of time it takes for both virtual machines to access 

memory. 

What should you configure on each virtual machine? 

A. Resource control 

B. Memory weight 

C. Dynamic Memory 

D. NUMA topology 

Answer:

Explanation: 

Windows Server 2012 introduced support for projecting a virtual NUMA topology into Hyper-V virtual machines. This capability can help improve the performance of workloads running on virtual machines that are configured with large amounts of memory. 


Q13. - (Topic 2) 

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named L0N-DC1. L0N-DC1 runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

The network contains 100 client computers and 50 IP phones. The computers and the phones are from the same vendor. 

You create an IPv4 scope that contains addresses from 172.16.0.1 to 172.16.1.254. 

You need to ensure that the IP phones receive IP addresses in the range of 172.16.1.100 to 172.16.1.200. The solution must minimize administrative effort. 

What should you create? 

A. Server level policies 

B. Reservations 

C. Filters 

D. Scope level policies 

Answer:

Explanation: 

The scope is already in place. 

Scope level policies are typically settings that only apply to that scope. They can also 

overwrite a setting that was set at the server level. 

When a client matches the conditions of a policy, the DHCP server responds to the clients 

based on the settings of a policy. 

Settings associated to a policy can be an IP address range and/or options. 

An administrator could configure the policy to provide an IP address from a specified sub-range within the overall IP address range of the scope. 

You can also provide different option values for clients satisfying this policy. 

Policies can be defined server wide or for a specific scope. 

A server wide policy – on the same lines as server wide option values – is applicable to all 

scopes on the DHCP server. 

A server wide policy however cannot have an IP address range associated with it. 

There a couple of ways to segregate clients based on the type of device. One way to do 

this is by using vendor class/identifier. 

This string sent in option 60 by most DHCP clients identify the vendor and thereby the type 

of the device. 

Another way to segregate clients based on device type is by using the MAC address prefix. 

The first three bytes of a MAC address is called OUI and identify the vendor or 

manufacturer of the device. 

By creating DHCP policies with conditions based on Vendor Class or MAC address prefix, 

you can now segregate the clients in your subnet in such a way, that devices of a specific 

type get an IP address only from a specified IP address range within the scope. You can 

also give different set of options to these clients. 

In conclusion, DHCP policies in Windows Server 2012 R2 enables grouping of 

clients/devices using the different criteria and delivering targeted network configuration to 

them. 

Policy based assignment in Windows Server 2012 R2 DHCP allows you to create simple 

yet powerful rules to administer DHCP on your network. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, p.253 


Q14. - (Topic 3) 

Your network contains one Active Directory domain named contoso.com. The domain contains 

2,000 client computers used by students. You recently discover an increase in calls to the helpdesk that relate to security policy to meet the following requirement: 

. Modify the UserName of the built-in account named Administrator . Support a time mismatch between client computers and domain controllers of up to three minutes. 

Which Two security settings should you modify? 

A. Account Policies 

B. Password Policy 

C. Account Lockout Policy 

D. Kerberos Policy 

E. Local Policies 

F. Audit Policy 

G. User Rights Assignment 

H. Security Options 

Answer: D,H 

Explanation: 

In Group Policy Object Editor, click Computer Configuration, click Windows Settings, click Security Settings, click Local Policies, and then click Security Options. In the details pane, double-click Accounts: Rename administrator account. 


Q15. - (Topic 1) 

Your network contains an Active Directory forest. The forest functional level is Windows Server 2012 R2. The forest contains a single domain. The domain contains a member server named Server1. Server1 runs windows Server 2012 R2. 

You purchase a network scanner named Scanner1 that supports Web Services on Devices (WSD). 

You need to share the network scanner on Server1. 

Which server role should you install on Server1? 

A. Web Server (IIS) 

B. Fax Server 

C. Print and Document Services 

D. File and Storage Services 

Answer:

Explanation: 

The Print and Document Services role allows for the configuration to share printers, 

scanners and fax devices. 

References: 

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 1: 

Installing and Configuring servers, Objective 1.2: Configure servers, p. 8 

http://technet.microsoft.com/en-us/library/hh831468.aspx 


Q16. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature. 

Which of the following is TRUE with regards to Windows Firewall with Advanced Security? (Choose all that apply.) 

A. It provides host-based, two-way network traffic filtering for a computer. 

B. It provides host-based, one-way network traffic filtering for a computer. 

C. It blocks unauthorized network traffic flowing into or out of the local computer. 

D. It only blocks unauthorized network traffic flowing into the local computer. 

E. It only blocks unauthorized network traffic flowing out of the local computer. 

Answer: A,C 

Explanation: 

Windows Firewall with Advanced Security is an important part of a layered security model. By providing host-based, two-way network traffic filtering for a computer, Windows Firewall with Advanced Security blocks unauthorized network traffic flowing into or out of the local computer. Windows Firewall with Advanced Security also works with Network Awareness so that it can apply security settings appropriate to the types of networks to which the computer is connected. Windows Firewall and Internet Protocol Security (IPsec) configuration settings are integrated into a single Microsoft Management Console (MMC) named important part of your network’s Windows Firewall with Advanced Security, so Windows Firewall is also an isolation strategy. 


Q17. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. 

All user accounts in the marketing department reside in an organizational unit (OU) named OU1. 

You have a Group Policy object (GPO) named GPO1. GPO1 contains Folder Redirection settings. GPO1 has default permissions. 

You discover that the Folder Redirection settings are not applied to the users in the marketing department. 

You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that the Folder Redirection settings in GPO1 apply to the marketing users. 

What should you do? 

A. Modify the Delegation settings of GPO1. 

B. Enable the link of GPO1. 

C. Enforce GPO1. 

D. Modify the link order of GPO1. 

Answer:


Q18. - (Topic 3) 

You have a server named Server1. Server1 runs Windows Server 2012 R2 and is located in a perimeter network. 

You need to configure a custom connection security rule on Server1. The rule must encrypt network communications across the Internet to a computer at another company. 

Which authentication method should you configure in the connection security rule? 

A. Advanced 

B. User (Kerberos V5) 

C. Default 

D. Computer (Kerberos V5) 

E. Computer and user (Kerberos V5) 

Answer:

Explanation: 

You need to make use of Advanced authentication method to ensure that communication is 

encrypted over the network to the other company from your custom connection security 

rule on Server1. 

References: 

http://technet.microsoft.com/en-us/library/bb742516.aspx 

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 8: File 

Services and Storage, p. 428 


Q19. HOTSPOT - (Topic 2) 

The settings for a virtual machine named VM2 are configured as shown in the VM2 exhibit. (Click the Exhibit button.) 

The settings for Disk1.vhdx are configured as shown in the Disk1.vhdx exhibit. (Click the Exhibit button.) 

The settings for Disk2.vhdx are configured as shown in the Disk2.vhdx exhibit. (Click the Exhibit button.) 

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point. 

Answer: 


Q20. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1. 

You open Review Options in the Active Directory Domain Services Configuration Wizard, and then you click View script. 

You need to ensure that you can use the script to promote Server1 to a domain controller. 

Which file extension should you use to save the script? 

A. .bat 

B. .cmd 

C. .ps1 

D. .xml 

Answer:

Explanation: 

PowerShell scripts are saved with the extension ".ps1". 

From http://technet.microsoft.com/en-us/library/jj574105.aspx The Review Options page in Server Manager also offers an optional View Script button to create a Unicode text file that contains the current ADDS Deployment configuration as a single Windows PowerShell script. This enables you to use the Server Manager graphical interface as a Windows PowerShell deployment studio. Use the Active Directory Domain Services Configuration Wizard to configure options, export the configuration, and then cancel the wizard. This process creates a valid and syntactically correct sample for further modification or direct use.