getcertified4sure.com

Quick Guide: microsoft official academic course 70-410




Examcollection.com presents the actual high-quality and trustworthy Microsoft Microsoft simulation tests. Many of us are certain you will get through the Microsoft 70-410 genuine exam with Examcollections valuable preparation materials. Or perhaps you will get full refund. Our own experts make certain that the Microsoft 70-410 exam questions are usually precise, accurate, as well as logical which will make you succeed in the actual Microsoft exam.

2021 Sep windows server 2012 certification:

Q281. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

You create a new inbound rule by using Windows Firewall with Advanced Security. 

You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. 

Which setting in the rule should you configure? 

A. Interface types 

B. Authorized computers 

C. Remote IP address 

D. Edge traversal 

Answer: D 

Explanation: 

Edge traversal – This indicates whether edge traversal is enabled (Yes) or disabled (No). When edge traversal is enabled, the application, service, or port to which the rule applies is globally addressable and accessible from outside a network address translation (NAT) or edge device. 

Select one of the following options from the list: Block edge traversal (default) – Prevent applications from receiving unsolicited traffic from the Internet through a NAT edge device. Allow edge traversal – Allow applications to receive unsolicited traffic directly from the Internet through a NAT edge device. Defer to user – Let the user decide whether to allow unsolicited traffic from the Internet through a NAT edge device when an application requests it. Defer to application – Let each application determine whether to allow unsolicited traffic from the Internet through a NAT edge device. 

: http://technet.microsoft.com/en-us/library/cc731927.aspx 


Q282. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

You create a security template named Template1 by using the security template snap-in. 

You need to apply Template1 to Server2. 

Which tool should you use? 

A. Security Templates 

B. Computer Management 

C. Security Configuration and Analysis 

D. System Configuration 

Answer: C 

Explanation: 

A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer. 

A. Template was already created – Provide standard security option to use in security policies 

B. Needs to be applied at the GP level 

C. Security templates are inactive until imported into a Group Policy object or the SecurityConfiguration and Analysis 

D. Tool to ID windows problems 


Q283. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named 0U1. You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to OU1. The solution must minimize the number of permissions assigned to User1. 

What should you do? 

A. Modify the permissions on OU1. 

B. Run the Set-GPPermission cmdlet. 

C. Add User1 to the Group Policy Creator Owners group. 

D. Modify the permissions on the User1 account. 

Answer: A 

Explanation: 



Q284. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

You have a virtual machine named VM1. VM1 has a checkpoint. 

You need to modify the Checkpoint File Location of VM1. 

What should you do first? 

A. Copy the checkpoint file. 

B. Delete the checkpoint. 

C. Shut down VM1. 

D. Pause VM1. 

Answer: B 


Q285. HOTSPOT - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2. 

You create a windows PowerShell script named Scriptl.psl that contains the following configuration: 


You need to apply the configuration to Server1. The solution must ensure that the configuration on Server1 can be updated by modifying a MOF file on Server2. 

Which actions should you perform on each server? 

To answer, select the appropriate server on which to perform each action in the answer area. 



Answer: 



70-410 rapidshare

Down to date microsoft windows server 2012 certification:

Q286. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1. Server1 runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

You create two IPv4 scopes on Server1. The scopes are configured as shown in the following table. 


The DHCP clients in Subnet_Tor can connect to the client computers in Subnet_Mtl by using an IP address or a FQDN. You discover that the DHCP clients in Subnet_Mtl can connect to client computers in Subnet_Tor by using an IP address only. 

You need to ensure that the DHCP clients in both subnets can connect to any other DHCP client by using a FQDN. 

What should you add? 

A. The 006 DNS Servers option to Subnet_Mtl 

B. The 006 DNS Servers option to Subnet_Tor 

C. The 015 DNS Domain Name option to Subnet_Mtl 

D. The 015 DNS Domain Name option to Subnet_Tor 

Answer: A 


Q287. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has three physical network adapters named NIC1, NIC2, and NIC3. 

On Server1, you create a NIC team named Team1 by using NIC1 and NIC2. You configure Team1 to accept network traffic on VLAN 10. 

You need to ensure that Server1 can accept network traffic on VLAN 10 and VLAN 11. The solution must ensure that the network traffic can be received on both VLANs if a network adapter fails. 

What should you do? 

A. From Server Manager, change the load balancing mode of Team1. 

B. Run the New-NetLbfoTeam cmdlet. 

C. From Server Manager, add an interface to Team1. 

D. Run the Add-NetLbfoTeamMember cmdlet. 

Answer: C 


Q288. - (Topic 3) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 is a DHCP server that is configured to have a scope named Scope1. Server2 is configured to obtain an IP address automatically. 

In Scope1, you create a reservation named Res_Server2 for Server2. 

A technician replaces the network adapter on Server2. 

You need to ensure that Server2 can obtain the same IP address. 

What should you modify on Server1? 

A. The Name Protection settings of Scope1 

B. The MAC address of Res_Server2 

C. The Advanced settings of Res_Server2 

D. The Network Access Protection Settings of Scope1 

Answer: B 

Explanation: 

DHCP reservations are given based upon MAC address (at least on IPv4/DHCPv4). For clients that require a constant IP address, you can either manually configure a static IP address, or assign a reservation on the DHCP server. Reservations are permanent lease assignments that are used to ensure that a specified client on a subnet can always use the same IP address. You can use DHCP reservations for hosts that require a consistent IP address, but do not need to be statically configured. DHCP reservations provide a mechanism by which IP addresses may be permanently assigned to a specific client based on the MAC address of that client. The MAC address of a Windows client can be found running the ipconfig /all command. For Linux systems the corresponding command is ifconfig -a. Once the MAC address has been identified, the reservation may be configured using either the DHCP console or at the command prompt using the netsh tool. 

Media access control (MAC) address authorization functions in the same way as automatic number identification (ANI) authorization, but it is used for wireless clients and clients connecting to your network by using an 802.1X authenticating switch. Since the network adapter was replaced, you need to modify the MAC address on Server1 to ensure that Server2 can obtain the same IP address. 

Reference: http://technet.microsoft.com/en-us/library/dd197535%28v=WS.10%29.aspx 


Q289. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named OU1. 

You need to ensure that when new client computers join the domain, their computer accounts are created in OU1 by default. 

What should you do? 

A. From Windows PowerShell, run the Move-ADObjectcmdlet. 

B. From a command prompt, run the redircmp.exe command. 

C. From ADSI Edit, configure the properties of the OU1 object. 

D. From Ldp, configure the properties of the Computers container. 

Answer: B 

Explanation: 

Redirects the default container for newly created computers to a specified, target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers. The CN=Computers container is a computer-protected object. For backward compatibility reasons, you cannot (and must not) remove it. 

: http://technet.microsoft.com/en-us/library/cc770619.aspx 


Q290. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2 and a client computer named Computer1 that runs windows 8. 

DC1 is configured as a DHCP server as shown in the exhibit. (Click the Exhibit button.) 


Computer1 is configured to obtain an IP address automatically. 

You notice that Computer1 is unable to obtain an IP address from DC1. 

You need to ensure that Computer1 can receive an IP address from DC1. 

What should you do? 

A. Disable the Allow filters. 

B. Disable the Deny filters. 

C. Authorize DC1.contoso.com. 

D. Activate Scope [10.1.1.0] Contoso.com. 

Answer: A 

Explanation: 

A red down arrow indicates an unauthorized DHCP server. A DHCP server that is a domain controller or a member of an Active Directory domain queries Active Directory for the list of authorized servers (identified by IP address). If its own IP address is not in the list of authorized DHCP servers, the DHCP Server service does not complete its startup sequence and automatically shuts down.