getcertified4sure.com

Jun 2021 updated: 70 410 installing and configuring windows server 2012 r2




We provide real 70 410 questions exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft microsoft 70 410 exam Exam quickly & easily. The vce 70 410 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 70 410 exam dumps dumps pdf and vce product and material, you can easily pass the 70 410 exam questions exam.

Q41. Your network contains an Active Directory forest. The forest contains two domains named contoso.com and corp.contoso.com. The forest contains four domain controllers. The domain controllers are configured as shown in the following table.

All domain controllers are DNS servers. In the corp.contoso.com domain, you plan to deploy a new domain controller named DC5. 

You need to identify which domain controller must be online to ensure that DC5 can be promoted successfully to a domain controller. 

Which domain controller should you identify? 

A. DC1 

B. DC2 

C. DC3 

D. DC4 

Answer:


Q42. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. 

You need to create a 3-TB virtual hard disk (VHD) on Server1. 

Which tool should you use? 

A. Computer Management 

B. Server Manager 

C. Share and Storage Management 

D. New-VirtualDisk 

Answer:

Explanation: 

For other questions to create a VHD (file) you can use computer management. 

-Share and storage management (2008 only) 

-New-storagesubsystemVirtualDisk (this is a virtual disk, NOT a virtual hard disk) 

-Server Manager (you would use this to create virtual disks, not virtual hard disks) 


Q43. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table. 

You need to recommend a solution to minimize the amount of disk space used for the checkpoint of VM1. 

What should you do before you create the checkpoint? 

A. Run the Resize-VHD cmdlet. 

B. Convert Disk1.vhd to a dynamically expanding disk. 

C. Shut down VM1. 

D. Run the Convert-VHD cmdlet. 

Answer:

Explanation: 

Changing between a fixed and dynamic disk type does not alter the size of a SNAPSHOT much at all. However, since a snapshot is a record of a VMs state at the exact time that the snapshot was taken, shutting down the VM before taking the snapshot prevents the snapshot from having to contain all of the data in RAM (as there is no data in memory when a machine is powered down). 

The question states that the solution should minimize the amount of disk space used for the checkpoint of VM1. If the checkpoint is taken while VM1 is running, there will be two attritional files present at the checkpoint location; a .VSV with VM1 saved state files and a .BIN file which contains VM1’s memory contents. If, however, VM1 is shut down first, these files will not be created, thus saving disk space. In order to convert Disk1.vhd to a dynamically expanding disk, VM1 still have to be shut down. 


Q44. - (Topic 1) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are part of a workgroup. 

On Server1 and Server2, you create a local user account named Admin1.You add the account to the local Administrators group. On both servers, Admin1 has the same password. 

You log on to Server1 as Admin1. You open Computer Management and you.connect to Server2. 

When you attempt to create a scheduled task, view the event logs, and manage the shared folders, you receive Access Denied messages. 

You need to ensure that you can administer Server2 remotely from Server1 by using Computer Management. 

What should you configure on Server2? 

A. From Server Manager, modify the Remote Management setting. 

B. From Local Users and Groups, modify the membership of the Remote Management Users group. 

C. From Windows Firewall, modify the Windows Management Instrumentation (WMI) firewall rule. 

D. From Registry Editor, configure the LocalAccountTokenFilterPolicy registry value. 

Answer:

Explanation: 

The LocalAccountTokenFilterPolicy setting affects how administrator credentials are applied to remotely administer the computer. : http://support.microsoft.com/kb/942817 


Q45. - (Topic 2) 

You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2 Datacenter. 

You have a WIM file that contains the four images of Windows Server 2012 R2 as shown in the Images exhibit. (Click the Exhibit button.) 

You review the installed features on Server1 as shown in the Features exhibit. (Click the Exhibit button.) 

You need to install the Server Graphical Shell feature on Server1. 

Which two possible sources can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. Index 1 

B. Index 2 

C. Index 3 

D. Index 4 

Answer: B,D 

Explanation: 

These images (since they are Full GUI, not CORE), contain the binaries necessary to install all GUI elements. When you install Windows Server 2012 R2, you can choose between Server Core Installation and Server with a GUI. The “Server with a GUI” option is the Windows Server 2012 R2 equivalent of the Full installation option available in Windows Server 2008 R2. The “Server Core Installation” option reduces the space required on disk, the potential attack surface, and especially the servicing requirements, so we recommend that you choose the Server Core installation unless you have a particular need for the additional user interface elements and graphical management tools that are included in the “Server with a GUI” option. For this reason, the Server Core installation is now the default. Because you can freely switch between these options at any time later, one approach might be to initially install the Server with a GUI option, use the graphical tools to configure the server, and then later switch to the Server Core Installation option. 

Reference: Windows Server Installation Options 


Q46. HOTSPOT - (Topic 3) 

You have three servers named Server1, Server2, and DC1 that run Windows Server 2012 

R2. IPv6 addresses and configurations are assigned to all of the servers by using DHCPv6. 

The IPv6 routing on Server1 is shown in the following table. 

You verify that Server2 can ping the IPv6 address of DC1. 

You need to ensure that Server1 can ping the IPv6 address of DC1. 

What command should you run on Server1? (To answer, select the appropriate options in 

the answer area.) 

Answer: 


Q47. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. You need to ensure that the local Administrator account on all computers is renamed to L_Admin. Which Group Policy settings should you modify? 

A. Security Options 

B. User Rights Assignment 

C. Restricted Groups 

D. Preferences 

Answer:


Q48. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

You have been instructed to make sure that Contoso.com users are not able to install a Windows Store application. You then create a rule for packaged apps. 

Which of the following is the rule based on? (Choose all that apply.) 

A. The publisher of the package. 

B. The publisher of the application. 

C. The name of the package 

D. The name of the application 

E. The package version. 

F. The application version. 

Answer: A,C,E 

Explanation: 

Packaged apps (also known as Windows 8 apps) are new to Windows Server 2012 R2 and Windows 8. They are based on the new app model that ensures that all the files within an app package share the same identity. Therefore, it is possible to control the entire application using a single AppLocker rule as opposed to the non-packaged apps where each file within the app could have a unique identity. Windows does not support unsigned packaged apps which implies all packaged apps must be signed. AppLocker supports only publisher rules for Packaged apps. A publisher rule for a Packaged app is based on the following information: Publisher of the package Package name Package version All the files within a package as well as the package installer share these attributes. Therefore, an AppLocker rule for a Packaged app controls both the installation as well as the running of the app. Otherwise, the publisher rules for Packaged apps are no different than the rest of the rule collections; they support exceptions, can be increased or decreased in scope, and can be assigned to users and groups. 


Q49. - (Topic 2) 

Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.Server1 is configured as shown in the following table. 

VM3 is used to test applications. 

You need to prevent VM3 from synchronizing its clock to Server1. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. Resource metering 

D. Virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O visualization 

Answer:

Explanation: 

Integration Services settings on virtual machines includes services such as operating system shutdown, time synchronization, data exchange, Heart beat, and Backup (volume snapshot services. Thus you should disable the time synchronization using Integration Services. 

References: http://blogs.technet.com/b/virtualization/archive/2008/08/29/backing-up-hyper-v-virtual-machines.aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p. 144 


Q50. - (Topic 2) 

Your network contains three servers that run Windows Server 2012 R2. The servers are configured as shown in the following table. 

Server3 is configured to obtain an IP address automatically. 

You need to prevent Server3 from receiving an IP address from Server1. 

What should you create on Server1? 

A. A reservation 

B. A filter 

C. A scope option 

D. An exclusion 

Answer:

Explanation: 

A. For clients that require a constant IP address 

B. Filter to exclude MAC address of Server3 

C. Range of allowed IP’s to be assigned 

D. Exclude range of IP’s MAC address based filtering ensure that only a known set of devices in the system are able to obtain an IPAddress from the DHCP Reservation and Exclusion, two incredibly different concepts. An exclusion is an address or range of addresses taken from a DHCP scope that the DHCP server is not allowed to hand out. For example, if you have set a DHCP server to exclude the address range 192.168.0.1-192.168.0.10 then the only way a computer on your network would get an address of 192.168.0.4 would be if you assigned it statically on that machine. This is because DHCP knows NOT to give this range of IP addresses out. A reservation is a specific IP addresses that is tied to a certain device through its MAC address. For example, if we have a workstation on the network that requires a certain IP address, but we don’t want to go through to trouble of assigning it statically, then we can create a reservation for it. So if the MAC address of the NIC on the computer is AA-BB-00FF-CC-AA and we want it to maintain the IP address of 192.168.0.100 then we would create a DHCP reservation under that particular scope saying that the IP address 

192.168.0.100 is reserved only for the MAC address AA-BB-00-FF-CC-AA. Reference: http://technet.microsoft.com/en-us/magazine/ff521761.aspx