getcertified4sure.com

Super ways to 70 410 vce




Want to know Ucertify 70 410 exam questions and answers pdf Exam practice test features? Want to lear more about Microsoft Installing and Configuring Windows Server 2012 certification experience? Study Guaranteed Microsoft exam 70 410 pdf answers to Renewal examcollection 70 410 questions at Ucertify. Gat a success with an absolute guarantee to pass Microsoft 70 410 installing and configuring windows server 2012 (Installing and Configuring Windows Server 2012) test on your first attempt.

Q31. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that has the DNS Server server role installed. Server1 hosts a primary zone for contoso.com. 

The domain contains a member server named Server2 that is configured to use Server1 as its primary DNS server. 

From Server2, you run nslookup.exe as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that when you run Nslookup, the correct name of the default server is displayed. 

What should you do? 

A. On Server1, create a reverse lookup zone. 

B. On Server1, modify the Security settings of the contoso.com zone. 

C. From Advanced TCP/IP Settings on Server1, add contoso.com to the DNS suffix list. 

D. From Advanced TCP/IP Settings on Server2, add contoso.com to the DNS suffix list. 

Answer:

Explanation: 

Make sure that a reverse lookup zone that is authoritative for the PTR resource record 

exists. 

PTR records contain the information that is required for the server to perform reverse name 

lookups. 

References: 

http://technet.microsoft.com/en-us/library/cc961417.aspx 

Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: 

Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6 

addressing, p.246 


Q32. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and child.contoso.com. The forest contains two domain controllers. The domain controllers are configured as shown in the following table. 

You need to ensure that DC2 can provide authoritative responses for queries to the contoso.com namespace. 

What should you do? 

A. On DC1, create a delegation. 

B. On DC1, change the replication scope of the contoso.com zone. 

C. On DC2, create a forwarder. 

D. On DC2, modify the Zone Transfers settings. 

Answer:

Explanation: 

For DC1 to be able to provide authoritative responses to DNS queries the replication scope should be changed accordingly so that it has the zone data for the contoso.com domain. 


Q33. HOTSPOT - (Topic 1) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 40 virtual machines that run Windows Server 2008 R2. The virtual machines connect to a private virtual switch. 

You have a file that you want to copy to all of the virtual machines. 

You need to identify to which servers you can copy files by using the Copy-VmFile cmdlet. 

What command should you run? To answer, select the appropriate options in the answer area. 

Answer: 


Q34. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. 

Contoso.com has a domain controller, named ENSUREPASS-DC01, which has Windows Server 2012 R2 installed. Another Contoso.com domain controller, named ENSUREPASS-DC02, has Windows Server 2008 R2 installed. 

You have deployed a server, named ENSUREPASS-SR15, on Contoso.com’s perimeter network. ENSUREPASSSR15 is running a Server Core Installation of Windows Server 2012 R2. 

You have been instructed to make sure that ENSUREPASS-SR15 is part of the Contoso.com domain. 

Which of the following actions should you take? 

A. You should consider making use of Set-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15. 

B. You should consider making use of Get-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15. 

C. You should consider making use of Test-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15. 

D. You should consider making use of Add-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15. 

Answer:

Explanation: 

Add-Computer – Add the local computer to a domain or workgroup. 


Q35. - (Topic 3) 

Your network contains a domain controller that is configured as a DNS server. The server hosts an Active Directory-integrated zone for the domain. 

You need to reduce how long it takes until stale records are deleted from the zone. What should you do? 

A. From the configuration directory partition of the forest, modify the tombstone lifetime. 

B. From the configuration directory partition of the forest, modify the garbage collection interval. 

C. From the aging properties of the zone, modify the no-refresh interval and the refresh interval. 

D. From the start of authority (SOA) record of the zone, modify the refresh interval and the expire interval. 

Answer:

Explanation: 

Scavenging automates the deletion of old records. When scavenging is enabled, then you should also change the no-refresh and refresh intervals of the aging properties of the zone else it may take too long for stale records to be deleted and the size of the DNS database can become large and have an adverse effect on performance. 


Q36. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. 

The domain contains a user named User1 and a global security group named Group1. 

User1 logs on to a client computer named Computer1. 

You need to disable the computer account of Computer1. 

Which cmdlet should you run? 

A. Add-AdPrincipalGroupMember.hip 

B. Install-AddsDomainController 

C. Install WindowsFeature 

D. Install AddsDomain 

E. Roname-AdObject 

F. Set-AdAccountControl 

G. Set-AdGroup 

H. Set-User 

Answer:

Explanation: 

Set-ADAccountControl Enabled Specifies if an account is enabled. An enabled account requires a password. This parameter sets the Enabled property for an account object. This parameter also sets the ADS_UF_ACCOUNTDISABLE flag of the Active Directory User Account Control (UAC) attribute. Possible values for this parameter include: $false or 0 $true or 1 The following example shows how to set this parameter to enable the account. -Enabled $true 


Q37. - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You connect three new hard disks to Server1. 

You need to create a storage space that contains the three disks. 

The solution must meet the following requirements: 

. Provide fault tolerance if a single disk fails. 

. Maximize the amount of files that can be stored in the storage space. 

What should you create? 

A. A simple space 

B. A spanned volume 

C. A mirrored space 

D. A parity space 

Answer:

Explanation: 

A. Stripes data across a set of pool disks, and is not resilient to any disk failures. 

B. A spanned volume is a dynamic volume consisting of disk space on more than one physical disk and not fault tolerant 

C. Fault tolerant but Not max space 

D. Fault tolerant and better space ratio Parity spaces are designed for capacity efficiency and increased resiliency. Parity spaces are best suited for archival data and streaming media, such as music and videos. 


Q38. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. 

An iSCSI SAN is available on the network. 

Server1 hosts four virtual machines named VM1, VM2, VM3, VM4. 

You create a LUN on the SAN. 

You need to provide VM1 with access to the LUN. The solution must prevent other virtual machines from accessing the LUN. 

What should you configure? 

A. A fixed-size VHDX 

B. A dynamically expanding VHDX 

C. A fixed-size VHD 

D. A pass-through disk 

E. A dynamically expanding VHD 

Answer:

Explanation: 

You can use physical disks that are directly attached to a virtual machine as a storage option on the management operating system. This allows virtual machines to access storage that is mapped directly to the server running Hyper-V without first configuring the volume. The storage can be either a physical disk which is internal to the server, or a SAN logical unit number (LUN) that is mapped to the server (a LUN is a logical reference to a portion of a storage subsystem). The virtual machine must have exclusive access to the storage, so the storage must be set in an Offline state in Disk Management. The storage is not limited in size, so it can be a multi-terabyte LUN. When using physical disks that are directly attached to a virtual machine, you should be aware of the following: This type of disk cannot be dynamically expanded. You cannot use differencing disks with them. You cannot take virtual hard disk snapshots. Att: If you are installing an operating system on the physical disk and it is in an Online state before the virtual machine is started, the virtual machine will fail to start. You must store the virtual machine configuration file in an alternate location because the physical disk is used by the operating system installation. For example, locate the configuration file on another internal drive on the server running Hyper-V. 


Q39. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

You have been instructed to add a new domain controller to Contoso.com’s existing environment. 

Which of the following actions should you take? 

A. You should consider making use of Server Manager. 

B. You should consider making use of Authorization Manager. 

C. You should consider making use of Remote Desktop Gateway Manager. 

D. You should consider making use of Network Load Balancing Manager. 

Answer:


Q40. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

You have created and linked a new Group Policy object (GPO) to an organizational unit (OU), named ENSUREPASSServ, which host the computer accounts for servers in the Contoso.com domain. 

You have been tasked with adding a group to a local group on all servers in the Contoso.com domain. This group should not, however, be removed from the local group. 

Which of the following actions should you take? 

A. You should consider adding a restricted group. 

B. You should consider adding a global group. 

C. You should consider adding a user group. 

D. You should consider adding a server group. 

Answer:

Explanation: 

Restricted groups in Group policies are a simple way of delegating permissions or group 

membership centrally to any domain computer or server. Using restricted groups it is easier 

to enforce the lowest possible permissions to any given account. 

Computer Configuration\Windows Settings\Security Settings\Restricted Groups 

Restricted groups allow an administrator to define two properties for security-sensitive 

groups (that is, “restricted” groups). The two properties are Members and Member Of . 

The Members list defines who should and should not belong to the restricted group. 

The Member Of list specifies which other groups the restricted group should belong to. 

When a restricted Group Policy is enforced, any current member of a restricted group that 

is not on the Members list is removed.