getcertified4sure.com

10 tips on 70 410 dumps pdf




Act now and download your Microsoft exam collections 70 410 test today! Do not waste time for the worthless Microsoft 70 410 exam questions and answers pdf tutorials. Download Rebirth Microsoft Installing and Configuring Windows Server 2012 exam with real questions and answers and begin to learn Microsoft 70 410 exam questions pdf with a classic professional.

Q111. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

When you recently added new workstations to the Contoso.com manually, you found that that the computer accounts were created in the default container. 

You want to make sure that the default container for newly created computers is redirected to a specified, target organizational unit (OU). 

Which of the following actions should you take? 

A. You should consider making use of the replace.exe command-line tool. 

B. You should consider making use of the redircmp.exe command-line tool. 

C. You should consider making use of the redirusr.exe command-line tool. 

D. You should consider making use of the rexec.exe command-line tool. 

Answer:

Explanation: 

redircmp.exe redirects the default container for newly created computers to a specified, target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers. 


Q112. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2 and a client computer named Computer1 that runs windows 8. 

DC1 is configured as a DHCP server as shown in the exhibit. (Click the Exhibit button.) 

Computer1 is configured to obtain an IP address automatically. 

You notice that Computer1 is unable to obtain an IP address from DC1. 

You need to ensure that Computer1 can receive an IP address from DC1. 

What should you do? 

A. Disable the Allow filters. 

B. Disable the Deny filters. 

C. Authorize DC1.contoso.com. 

D. Activate Scope [10.1.1.0] Contoso.com. 

Answer:

Explanation: 

A red down arrow indicates an unauthorized DHCP server. A DHCP server that is a domain controller or a member of an Active Directory domain queries Active Directory for the list of authorized servers (identified by IP address). If its own IP address is not in the list of authorized DHCP servers, the DHCP Server service does not complete its startup sequence and automatically shuts down. 


Q113. HOTSPOT - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 is a member of a workgroup. 

You need to ensure that only members of the Administrators group and members of a group named Group1 can log on locally to Server1. 

Which settings should you modify from the Local Security Policy? To answer, select the appropriate settings in the answer area. 

Answer: 


Q114. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

You log on to a domain controller by using an account named Admin1. Admin1 is a member of the Domain Admins group. 

You view the properties of a group named Group1 as shown in the exhibit. (Click the Exhibit button.) 

Group1 is located in an organizational unit (OU) named OU1. 

You need to ensure that you can modify the Security settings of Group1 by using Active Directory Users and Computers. 

What should you do from Active Directory Users and Computers? 

A. From the View menu, select Users, Contacts, Groups, and Computers as containers. 

B. Right-click OU1 and select Delegate Control 

C. From the View menu, select Advanced Features 

D. Right-click contoso.com and select Delegate Control. 

Answer:

Explanation: 

From ADUC select view toolbar then select advanced features. When you open up the ADUC in a default installation of Active Directory, you are only presented with the basic containers. These basic containers include the only organizational unit (OU), which is the Domain Controllers OU, as wellas the other containers such as Users and Computers. To see more in-depth containers, you need to configure the ADUC by going to the View option on the toolbar, then selecting Advanced Features. This will refresh the view within the ADUC and add some new containers. There are no hidden (or Advanced) OUs that will show up when you configure the ADUC in this way. 


Q115. DRAG DROP - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1. All servers in the domain run Windows Server 2012 R2. 

You need to create a new volume on File1. 

The new volume must have the following configurations: 

Have the drive letter T 

Have the FAT32 file system 

Be stored on a new virtual hard disk 

In which order should you run the Diskpart commands? 

To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the correct order. 

Answer: 


Q116. - (Topic 2) 

You are configuring the IPv6 network infrastructure for a branch office. 

The corporate network administrator allocates the 2001:DB8:0:C000::/58 address space for use in the branch office. 

You need to identify the maximum number of IPv6 subnets you can create. 

How many IPv6 subnets should you identify? 

A. 32 

B. 64 

C. 128 

D. 1024 

Answer:

Explanation: 

IPv6 has 128-bit (16-byte) source and destination IP addresses. Although 128 bits can express over 3.4×1038 possible combinations, the large address space of IPv6 has been designed for multiple levels of subnetting and address allocation from the Internet backbone to the individual subnets within an organization. 

: http://technet.microsoft.com/en-us/library/dd379516%28v=WS.10%29.aspx 


Q117. - (Topic 2) 

You have a server named Print1 that runs Windows Server 2012 R2. 

On Print1, you share a printer named Printer1. 

You need to ensure that only the members of the Server Operators group, the 

Administrators group, and the Print Operators group can send print jobs to Printer1. 

What should you do? 

A. Remove the permissions for the Creator Owner group. 

B. Assign the Print permission to the Server Operators group. 

C. Remove the permissions for the Everyone group. 

D. Assign the Print permission to the Administrators group. 

Answer:

Explanation: 

By default Everyone can print. This permissions need to be removed. 


Q118. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 installed. 

You have been instructed to modify the name of the local Administrator account on all Contoso.com workstations. You want to achieve this using as little administrative effort as possible. 

Which of the following actions should you take? 

A. You should consider configuring the Security Options settings via the Group Policy Management Console (GPMC). 

B. You should consider navigating to Local Users and Groups via Computer 

C. You should consider configuring the replication settings. 

D. You should consider navigating to Local Users and Groups via Computer Management on each workstation. 

Answer:

Explanation: 

Rename administrator account policy setting determines whether a different account name is associated with the security identifier (SID) for the Administrator account. Because the Administrator account exists on all Windows server versions, renaming the account makes it slightly more difficult for attackers to guess this user name and password combination. By default, the built-in Administrator account cannot be locked out no matter how many times a malicious user might use a bad password. This makes the Administrator account a popular target for brute-force password-guessing attacks. The value of this countermeasure is lessened because this account has a well-known SID and there are non-Microsoft tools that allow you to initiate a brute-force attack over the network by specifying the SID rather than the account name. This means that even if you have renamed the Administrator account, a malicious user could start a brute-force attack by using the SID. Rename the Administrator account by specifying a value for the Accounts: Rename administrator account policy setting. Location: GPO_name\Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options 


Q119. - (Topic 3) 

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. 

You have a domain controller named DC5 that has the Server Graphical Shell disabled. 

You create an organizational unit (OU) named OU1. 

From DC5, you need to create 50 new user accounts in OU1. 

Which tool should you use? 

A. the ntdsutil command 

B. the Set-ADDomain cmdlet 

C. the Install-ADDSDomain cmdlet 

D. the dsadd command 

E. the dsamain command 

F. the dsmgmt command 

G. the net user command 

H. the Set-ADForest cmdlet 

Answer:

Explanation: Net user adds or modifies user accounts, or displays user account information. 

Reference: Net User Command for Windows Server 2012 (R2) 

http://www.isunshare.com/windows-2012/net-user-command-for-windows-server-2012-r2.html 


Q120. - (Topic 3) 

A company’s server virtualization team needs to provision a series of Hyper-V workloads to use existing network storage arrays. The team has chosen to use Fibre Channel ports within the guest operating systems. 

Which of the following Windows Server versions can be used as guest operating systems when using Hyper-V Fibre Channel ports? 

A. 2003 R2 

B. 2008 

C. 2003 

D. 2012 

Answer: B,D 

Explanation: 

Windows Server 2008, 2008 R2, and 2012 R2 can be guest operating systems when using 

Hyper-V Fibre Channel host bus adaptors (HBAs). Updated HBA drivers are needed along 

with NPIV-enabled (N_Port ID Virtualization) SANs. 

Quick Tip: Virtual Fibre Channel logical units cannot be used as boot media.