getcertified4sure.com

Super to 70 410 vce




Our pass rate is high to 98.9% and the similarity percentage between our 70 410 exam study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Microsoft 70 410 dumps pdf exam in just one try? I am currently studying for the Microsoft 70 410 pdf exam. Latest Microsoft braindumps 70 410 Test exam practice questions and answers, Try Microsoft 70 410 installing and configuring windows server 2012 pdf Brain Dumps First.

Q71. - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the 

installation fails repeatedly. 

You need to ensure that the feature can be installed on Server1. 

What should you do? 

A. Install Windows Identity Foundation (WIF) 3.5. 

B. Install the Web Server (IIS) server role. 

C. Connect Server1 to the Internet. 

D. Run the Add-AppxProvisionedPackage cmdlet. 

Answer:

Explanation: 

The files needed are no longer available on the local Hard drive. We need to connect the server to the Internet. Important to note that when starting with Windows Server 2012 R2 and Windows 8, the feature files for .NET Framework 3.5 (which includes .NET Framework 2.0 and .NET Framework 3.0) are not available on the local computer by default. The files have been removed. Files for features that have been removed in a Features on Demand configuration, along with feature files for .NET Framework 3.5, are available through Windows Update. By default, if feature files are not available on the destination server that is running Windows Server 2012 R2 Preview or Windows Server 2012 R2, the installation process searches for the missing files by connecting to Windows Update. You can override the default behavior by configuring a Group Policy setting or specifying an alternate source path during installation, whether you are installing by using the Add Roles and Features Wizard GUI or a command line. 


Q72. - (Topic 3) 

You install Windows Server 2012 R2 on a standalone server named Server1. You configure Server1 as a VPN server. 

You need to ensure that client computers can establish PPTP connections to Server1. 

Which two firewall rules should you create? (Each correct answer presents part of the solution. Choose two.) 

A. An inbound rule for protocol 47 

B. An outbound rule for protocol 47 

C. An inbound rule for TCP port 1723 

D. An inbound rule for TCP port 1701 

E. An outbound rule for TCP port 1723 

F. An outbound rule for TCP port 1701 

Answer: A,C 

Explanation: 

The following is a list of firewall ports which need to be opened for the various VPN tunnel 

protocols: 

For PPTP: 

IP Protocol=TCP, TCP Port number=1723 <- Used by PPTP control path 

IP Protocol=GRE (value 47) <- Used by PPTP data path 

For L2TP: 

IP Protocol Type=UDP, UDP Port Number=500 <- Used by IKEv1 (IPSec control path) 

IP Protocol Type=UDP, UDP Port Number=4500 <- Used by IKEv1 (IPSec control path) 

IP Protocol Type=ESP (value 50) <- Used by IPSec data path 

For SSTP: 

IP Protocol=TCP, TCP Port number=443 <- Used by SSTP control and data path 

For IKEv2: 

IP Protocol Type=UDP, UDP Port Number=500 <- Used by IKEv2 (IPSec control path) 

IP Protocol Type=UDP, UDP Port Number=4500 <- Used by IKEv2 (IPSec control path) 

IP Protocol Type=ESP (value 50) <- Used by IPSec data path 


Q73. - (Topic 3) 

You have a server named Server2 that runs Windows Server 2012 R2. You open Server Manager on Server2 as shown in the exhibit. (Click the Exhibit button.) The Everyone group has read share permission and read NTFS permission to Sources. 

You need to ensure that when users browse the network, the Sources share is not visible. 

What should you do? 

A. From the properties of the Sources folder, remove the Sources share, and then share the Sources folder as Sources$ B. From the properties of the Sources folder, deny the List Folder Contents permission for the Everyone group 

C. From the properties of the Sources share, configure access-based enumeration 

D. From the properties of the Sources folder, configure the hidden attribute 

Answer:


Q74. DRAG DROP - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and is configured as the only domain controller. 

You need to retrieve a list of all the user accounts. The list must include the last time each user was authenticated successfully. 

Which Windows PowerShell command should you run? 

To answer, drag the appropriate cmdlet or property to the correct locations to complete the PowerShell command in the answer area. Each cmdlet or property may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q75. - (Topic 2) 

You have a server named Corel that has a Server Core Installation of Windows Server 2012 R2. 

Corel has the Hyper-V server role installed. Corel has two network adapters from different third-party hardware vendors. 

You need to configure network traffic failover to prevent connectivity loss if a network adapter fails. 

What should you use? 

A. New-NetSwitchTeam 

B. Install-Feature 

C. Add-NetSwitchTeamMember 

D. Netsh.exe 

Answer:


Q76. - (Topic 3) 

Your network contains two subnets. The subnets are configured as shown in the following table. 

You have a server named Server2 that runs Windows Server 2012 R2. Server2 is connected to LAN1. You run the route print command as shown in the exhibit. 

You need to ensure that Server2 can communicate with the client computers on LAN2. 

What should you do? 

A. Change the metric of the 10.10.1.0 route. 

B. Set the state of the Teredo interface to disable. 

C. Set the state of the Microsoft ISATAP Adapter #2 interface to disable. 

D. Run route delete 172.23.2.0. 

Answer:

Explanation: 

You should delete the route 172.23.2.0 to allow communication between the client computers and Server2. The route is used to identify PIv6 /IPv4 packets that are being sent. 


Q77. - (Topic 3) 

Which of the following is not a type of user account that can be configured in Windows Server 2012 R2? 

A. local accounts 

B. domain accounts 

C. network accounts 

D. built-in accounts 

Answer:

Explanation: 

A. Incorrect: Local accounts can be created and configured in Windows Server 2012 R2. 

B. Incorrect: Domain accounts can be created and configured in Windows Server 2012 R2. 

C. Correct: Three types of user accounts can be created and configured in Windows Server 2012: local accounts, domain accounts, and built-in user accounts. 

D. Incorrect: Built-in accounts can be created and configured in Windows Server 2012 R2. 


Q78. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled. 

You install the DHCP server role on a virtual machine named Server1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope. 

You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1. 

You need to ensure that the virtual machines can use Server1 as a DHCP server. 

What should you do? 

A. Enable MAC address spoofing on Server1. 

B. Enable single-root I/O visualization (SR-IOV) on Server1. 

C. Disable the DHCP guard on Server1. 

D. Disable the DHCP guard on all of the virtual machines that are DHCP clients. 

Answer:

Explanation: 

DHCP guard setting 

This setting stops the virtual machine from making DHCP offers over this network interface. 

To be clear – this does not affect the ability to receive a DHCP offer (i.e. if you need to use 

DHCP to acquire an IP address that will work) it only blocks the ability for the virtual 

machine to act as a DHCP server. 


Q79. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

You create a new inbound rule by using Windows Firewall with Advanced Security. 

You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. 

Which setting in the rule should you configure? 

A. Interface types 

B. Authorized computers 

C. Remote IP address 

D. Edge traversal 

Answer:

Explanation: 

Edge traversal – This indicates whether edge traversal is enabled (Yes) or disabled (No). When edge traversal is enabled, the application, service, or port to which the rule applies is globally addressable and accessible from outside a network address translation (NAT) or edge device. 

Select one of the following options from the list: Block edge traversal (default) – Prevent applications from receiving unsolicited traffic from the Internet through a NAT edge device. Allow edge traversal – Allow applications to receive unsolicited traffic directly from the Internet through a NAT edge device. Defer to user – Let the user decide whether to allow unsolicited traffic from the Internet through a NAT edge device when an application requests it. Defer to application – Let each application determine whether to allow unsolicited traffic from the Internet through a NAT edge device. 

: http://technet.microsoft.com/en-us/library/cc731927.aspx 


Q80. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. The domain contains a standalone server named Server2 that is located in a perimeter network. Both servers run Windows Server 2012 R2. 

You need to manage Server2 remotely from Server1. 

What should you do? 

A. From Server1, run the Enable-PsRemotingcmdlet. 

B. From Server2, run the winrm command. 

C. From Server2/ run the Enable-PsRemotingcmdlet. 

D. From Server1, run the winrm command. 

Answer: