getcertified4sure.com

Ultimate Guide: mcsa windows server 2012




It will be superb in the event that contenders consider 70-410 schooling straight from Microsoft Institution. Candidates might gain more experience and knowledge in Microsoft University since masters/ pros will give schooling for the contenders. Before Microsoft 70-410 exams, the particular foremost factor the contenders should want to do could be to know about the 70-410 assessment syllabus and that will make this happen to get a apparent expertise in learning the particular 70-410 study course. Most of the 70-410 assessment points along with other details are out there directly within the Microsoft website.

2021 Sep exam 70-410 installing and configuring windows server 2012:

Q271. - (Topic 3) 

RODC comes with a number of features that focus on heightened security with limited functionality to remote office users. Which of the following are features of RODC? 

A. Filtered Attribute Sets 

B. Read-Only DNS 

C. Unidirectional Replication 

D. All of these 

Answer: A 


Q272. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing connection security rules. 

Which of the following is TRUE with regards to connection security rules? (Choose all that apply.) 

A. Connection security rules allows for traffic to be secured via IPsec. 

B. Connection security rules do not allow the traffic through the firewall. 

C. Connection security rules are applied to programs or services. 

D. Connection security rules are applied between two computers. 

Answer: A,B,D 

Explanation: 

Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity, and, optionally, data encryption. How firewall rules and connection security rules are related Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with IPsec, you can create Computer Connection Security rules. However, the creation of a connection security rule does not allow the traffic through the firewall. You must create a firewall rule to do this, if the traffic is not allowed by the default behavior of the firewall. Connection security rules are not applied to programs or services; they are applied between the computers that make up the two endpoints. 


Q273. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. 

You have a Group Policy object (GPO) named GPO1 that contains several user settings. 

GPO1 is linked to an organizational unit (OU) named OU1. 

The help desk reports that GPO1 applies to only some of the users in OU1. 

You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.) 


You need to configure GPO1 to apply to all of the users in OU1. 

What should you do? 

A. Modify the Security settings of GPO1. 

B. Disable Block Inheritance on OU1. 

C. Modify the GPO status of GPO1. 

D. Enforce GPO1. 

Answer: A 

Explanation: 

Inheritance is blocked, but that would only affect policies applied ABOVE the given OU, not 

the one applied directly to it (as is the case with GPO1). Also Enforcing a policy is only going to cause it to be applied even when inheritance is blocked (which, as mentioned, does not make a difference on policies which are directly linked to the OU as a child). That means that there must be something in the security settings (such as a Security Group which does not have the “read” or “Apply group policy” permission) preventing ALL of the users in OU1 from having the policy applied. (GPO status is the status of its replication within the forest, so it is not relevant here.) 


Q274. - (Topic 3) 

In a domain running at the Windows Server 2012 R2 domain functional level, which of the following security principals can be members of a global group? (Choose all answers that are correct.) 

A. Users 

B. Computers 

C. Universal groups 

D. Global groups 

Answer: A,B,D 

Explanation: 

A. Correct: Users can be security principals in a global group. 

B. Correct: Computers can be security principals in a global group. 

C. Incorrect: Universal groups cannot be security principals in a global group. 

D. Correct: Global group can be security principals in a global group. 


Q275. - (Topic 2) 

Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.Server1 is configured as shown in the following table. 


You need to configure VM4 to track the CPU, memory, and network usage. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. Resource metering 

D. Virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring K. Single-root I/O virtualization 

Answer: C 

Explanation: 

Metrics collected for each virtual machine using resource metering: Average CPU usage, measured in megahertz over a period of time. Average physical memory usage, measured in megabytes. Minimum memory usage (lowest amount of physical memory). Maximum memory usage (highest amount of physical memory). Maximum amount of disk space allocated to a virtual machine. Total incoming network traffic, measured in megabytes, for a virtual network adapter. Total outgoing network traffic, measured in megabytes, for a virtual network adapter 

: http://blogs.technet.com/b/meamcs/archive/2012/05/28/hyper-v-resource-metering-in-windows-server-2012-server-8-beta.aspx 


70-410 practice

Replace 70-410 installing and configuring windows server 2012 pdf:

Q276. - (Topic 2) 

Your network contains several servers that run Windows Server 2012 R2 and client computers that run Windows 8.1. 

You download several signed Windows PowerShell scripts from the Internet. 

You need to run the PowerShell scripts on all of the servers and all of the client computers. 

What should you modify first? 

A. The environment variables on all of the servers 

B. The execution policy on all of the servers 

C. The execution policy on all of the client computers 

D. The environment variables on all client computers 

Answer: C 

Explanation: 

The default execution policy of Windows Server 2012 is RemoteSigned meaning that as long as a valid signature is used on the scripts, they will run. However, the client computers have a default execution policy of restricted meaning that no scripts will run in PowerShell whatsoever, so this would have to be changed before the scripts could be executed on the client computers. 


Q277. - (Topic 3) 

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

ABC.com’s user accounts are located in an organizational unit (OU), named ABCStaff. ABC.com’s managers belong to a group, named ABCManagers. 

You have been instructed to create a new Group Policy object (GPO) that should be linked to the ABCStaffOU, but not affect ABC.com’s managers. 

Which of the following actions should you take? 

A. You should consider removing the user accounts of the managers from the ABCStaff OU. 

B. You should consider configuring the new GPO’s WMI filter. 

C. You should consider adding the user accounts of ABC.com’s managers to the Admins group. 

D. You should consider adding the user accounts of ABC.com’s managers to the local Administrators group. 

Answer: B 


Q278. - (Topic 1) 

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. 

Server1 is configured to obtain an IPv4 address by using DHCP. 

You need to configure the IPv4 settings of the network connection on Server1 as follows: 

IP address: 10.1.1.1 

Subnet mask: 255.255.240.0 

Default gateway: 10.1.1.254 

What should you run? 

A. netsh.exe 

B. netcfg.exe 

C. msconfig.exe 

D. ipconfig.exe 

Answer: A 

Explanation: 

In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default 

Gateway, DNS and WINS addresses and many other options you can use Netsh.exe. 

Incorrect: 

Not D: Windows Server 2012 Core still has IPCONFIG.EXE that can be used to view the IP 

configuration. 

Modern servers typically come with several network interface ports. This causes 

IPCONFIG.EXE to scroll off the screen when viewing its output. Consider piping the output 

if IPCONFIG.EXE to a file and view it with Notepad.exe. 


Q279. - (Topic 3) 

You have a server named Server1 that has a Server Core installation of Windows Server 2008 R2. 

Server1 has the DHCP Server server role and the File Server server role installed. 

You need to upgrade Server1 to Windows Server 2012 R2 with the graphical user interface (GUI). 

The solution must meet the following requirements: 

. Preserve the server roles and their configurations. 

. Minimize administrative effort. 

What should you do? 

A. On Server1, run setup.exe from the Windows Server 2012 R2 installation media and 

select Server with a GUI. 

B. Start Server1 from the Windows Server 2012 R2 installation media and select Server 

Core Installation. 

When the installation is complete, add the Server Graphical Shell feature. 

C. Start Server1 from the Windows Server 2012 R2 installation media and select Server 

with a GUI. 

D. On Server1, run setup.exe from the Windows Server 2012 R2 installation media and 

select Server Core Installation. 

When the installation is complete, add the Server Graphical Shell feature 

Answer: D 

Explanation: 

A. Server is on 2008 R2 core, must install 2012 R2 core and then GUI 

B. Not least effort 

C. Not least effort 

D. Upgrade to 2012 R2 and install GUI shell http://technet.microsoft.com/en-us/library/jj574204.aspx Upgrades that switch from a Server Core installation to the Server with a GUI mode of Windows Server 2012 R2 in one step (and vice versa) are not supported. However, after upgrade is complete, Windows Server 2012 R2 allows you to switch freely between Server Core and Server with a GUI modes. 


Q280. DRAG DROP - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1. All servers in the domain run Windows Server 2012 R2. 

You need to create a new volume on File1. 

The new volume must have the following configurations: 

Have the drive letter T 

Have the FAT32 file system 

Be stored on a new virtual hard disk 

In which order should you run the Diskpart commands? 

To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the correct order. 


Answer: