getcertified4sure.com

how to use test 70




Proper study guides for Update Microsoft Installing and Configuring Windows Server 2012 certified begins with Microsoft 70-410 preparation products which designed to deliver the Download 70-410 questions by making you pass the 70-410 test at your first time. Try the free 70-410 demo right now.

2021 Oct windows server 2012 mcsa:

Q201. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

You have just executed the Uninstall-WindowsFeature Server-Gui-Shell Contoso.com server, named ENSUREPASS-SR13. 

Which of the following is the reason for doing this? 

A. To only remove Windows Explorer from ENSUREPASS-SR13. 

B. To only remove the Windows Internet Explorer from ENSUREPASS-SR13. 

C. To only remove the components and files related to Windows Explorer from ENSUREPASSSR13. 

D. To remove Windows Explorer, Windows Internet Explorer, and all associated components and files from ENSUREPASS-SR13. 

Answer: D 

Explanation: 

Minimal Server Interface If the server has a full installation of Windows Server, and I need to bring the server down to minimal server interface, I only need to remove the Server-GUI-Shell. The command is shown here. Get-WindowsFeature Server-Gui-Shell | Uninstall-WindowsFeature – restart Minimal Server Interface is situated between the Server Core and Server with a GUI modes, you can either install features on Server Core or remove features from Server with a GUI to reach the Minimal Server Interface installation state. 


Q202. - (Topic 3) 

Server 1 and Server2 host a load-balanced Application pool named AppPool1. You need to ensure thatAppPool1 uses a group Managed Service Account as its identity. Which 3 actions should you perform? 

A. Install a domain controller that runs Windows Server 2012 R2, Run the New- ADService Accountcmdlet, Modify the settings of AppPool1. 

B. Configure the Security settings of the contoso.com zone. 

C. Add a second legacy network adapter, and then run the Set-VMNetwork Adoptercmdlet. 

D. From Windows Powershell, run Get-DNS ServerDiagnostics. 

Answer: A 

Explanation: 

For the application pool to use a group Managed Service account as its identity you will have to make sure that there is a domain controller where you can add the account and then modify the application pool accordingly. Thus you should use the New- ADService Account on the domain controller that will create a new Active Directory service account. 


Q203. - (Topic 3) 

You have a virtual machine named VM1. 

You install Windows Server 2012 R2 on VM1. 

You plan to use VM1 as an image that will be distributed to sales users to demonstrate the features of a custom application. The custom application only requires the Web Server (IIS) server role to be installed. 

You need to ensure that the VHD file for VM1 only contains the required Windows Server 2012 R2 source files. 

Which tool should you use? 

A. servermanagercmd.exe 

B. dism.exe 

C. ocsetup.exe 

D. imagex.exe 

Answer: B 

Explanation: 

You can use DISM to: 

Add, remove, and enumerate packages and drivers. 

Enable or disable Windows features. 

Apply changes based on the offline servicing section of an unattend.xml answer file. 

Configure international settings. 

Upgrade a Windows image to a different edition. 

Prepare a Windows PE image. 

Take advantage of better logging. 

Service down-level operating systems like Windows Vista with SP1 and Windows Server 

2008. 

Service all platforms (32-bit, 64-bit, and Itanium). 

Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host. 

Make use of old Package Manager scripts. 

This command will mount the image before making any changes. This will ensure that only 

the required Windows Server 2012 R2 source files are contained. 


Q204. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed, and all workstations have Windows 8 installed. 

You are running a training exercise for junior administrators. You are currently discussing the Always Offline Mode. 

Which of the following is TRUE with regards to the Always Offline Mode? (Choose all that apply.) 

A. It allows for swifter access to cached files and redirected folders. 

B. To enable Always Offline Mode, you have to satisfy the forest and domain functional-level requirements, as well as schema requirements 

C. It allows for lower bandwidth usage due to users are always working offline. 

D. To enable Always Offline Mode, you must have workstations running Windows 7 or Windows Server 2008 R2. 

Answer: A,C 

Explanation: 

There are no domain/forest/schema requirements, but clients must be running Windows 

8/Windows Server 2012 or later. 

Offline Files have four modes of operation: 

Online Slow link Auto offline Manual offline Offline Files transition between the three modes online, slow link and auto offline depending on connection speed. The user can always override the automatic mode selection by manually switching to manual offline mode. To determine the connection speed two pings with default packet size are sent to the file server. If the average round-trip time is below 80 ms (Windows 7) or 35 ms (Windows 8), the connection is put into online mode, otherwise into slow link mode. The latency value of 35/80 ms is configurable through the Group Policy setting Configure slow-link mode. Reads, Writes and Synchronization In online mode, changes to files are made on the file server as well as in the local cache (this induces a performance hit – see this article for details). Reads are satisfied from the local cache (if in sync). In slow link mode, changes to files are made in the local cache. The local cache is background-synchronized with the file server every 6 hours (Windows 7) or 2 hours (Windows 8), by default. This can be changed through the Group Policy setting Configure Background Sync. . In auto offline mode, all reads and writes go to the local cache. No synchronization occurs. . In manual offline mode, all reads and writes go to the local cache. No synchronization occurs by default, but background synchronization can be enabled through the Group Policy setting Configure Background Sync. 


Q205. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. 

All user accounts in the marketing department reside in an organizational unit (OU) named OU1. 

You have a Group Policy object (GPO) named GPO1. GPO1 contains Folder Redirection settings. GPO1 has default permissions. 

You discover that the Folder Redirection settings are not applied to the users in the marketing department. 

You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.) 


You need to ensure that the Folder Redirection settings in GPO1 apply to the marketing users. 

What should you do? 

A. Modify the Delegation settings of GPO1. 

B. Enable the link of GPO1. 

C. Enforce GPO1. 

D. Modify the link order of GPO1. 

Answer: C 


70-410 exam guide

Up to the immediate present 70-410 installing and configuring windows server 2012:

Q206. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

You create and enforce the default AppLocker executable rules. 

Users report that they can no longer execute a legacy application installed in the root of drive C. 

You need to ensure that the users can execute the legacy application. 

What should you do? 

A. Create a new rule. 

B. Delete an existing rule. 

C. Modify the action of the existing rules. 

D. Add an exception to the existing rules. 

Answer: A 

Explanation: 

AppLocker is a feature that advances the functionality of the Software Restriction Policies 

feature. AppLocker contains new capabilities and extensions that reduce administrative 

overhead and help administrators control how users can access and use files, such as 

executable files, scripts, Windows Installer files, and DLLs. By using AppLocker, you can: 

Define rules based on file attributes that persist across application updates, such as the 

publisher name (derived from the digital signature), product name, file name, and file 

version. You can also create rules based on the file path and hash. 

Assign a rule to a security group or an individual user. 

Create exceptions to rules. For example, you can create a rule that allows all users to run 

all Windows binaries except the Registry Editor (Regedit.exe). 

Use audit-only mode to deploy the policy and understand its impact before enforcing it. . 

Create rules on a staging server, test them, export them to your production environment, 

and then import them into a Group Policy Object. 

Simplify creating and managing AppLocker rules by using Windows PowerShell cmdlets for 

AppLocker. 

AppLocker default rules 

AppLocker allows you to generate default rules for each of the rule types. 

Executable default rule types: 

Allow members of the local Administrators group to run all applications. Allow members of the Everyone group to run applications that are located in the Windows folder. Allow members of the Everyone group to run applications that are located in the Program Filesfolder. Windows Installer default rule types: Allow members of the local Administrators group to run all Windows Installer files. Allow members of the Everyone group to run digitally signed Windows Installer files. Allow members of the Everyone group to run all Windows Installer files located in the Windows\Installer folder. Script default rule types: Allow members of the local Administrators group to run all scripts. Allow members of the Everyone group to run scripts located in the Program Files folder. Allow members of the Everyone group to run scripts located in the Windows folder. DLL default rule types: (this on can affect system performance ) Allow members of the local Administrators group to run all DLLs. Allow members of the Everyone group to run DLLs located in the Program Files folder. Allow members of the Everyone group to run DLLs located in the Windows folder. You can apply AppLocker rules to individual users or to a group of users. If you apply a rule to a group of users, all users in that group are affected by that rule. If you need to allow a subset of a user group to use an application, you can create a special rule for that subset. For example, the rule “Allow Everyone to run Windows except Registry Editor” allows everyone in the organization to run the Windows operating system, but it does not allow anyone to run Registry Editor. The effect of this rule would prevent users such as Help Desk personnel from running a program that is necessary for their support tasks. To resolve this problem, create a second rule that applies to the Help Desk user group: “Allow Help Desk to run Registry Editor.” If you create a deny rule that does not allow any users to run Registry Editor, the deny rule will override the second rule that allows the Help Desk user group to run Registry Editor. 


Q207. - (Topic 3) 

Your network contains an Active Directory forest that contains two domains. The forest contains five domain controllers. The domain controllers are configured as shown in the following table. 


You need to configure DC5 as a global catalog server. Which tool should you use? 

A. Active Directory Domains and Trusts 

B. Active Directory Users and Computers 

C. Active Directory Administrative Center 

D. Active Directory Sites and Services 

Answer: D 

Explanation: 

If you have more than one domain in your forest and you have a significant user population in a site, you can optimize the speed and efficiency of domain logons and directory searches by adding a global catalog server to the site. If you have a single-domain forest, global catalog servers are not required for logons, but directory searches are directed to the global catalog. In this case, you can enable the global catalog on all domain controllers for faster directory searches. You can use the same user interface (UI) in the Active Directory Sites and Services snap-in to add or remove the global catalog. Enabling the global catalog can cause additional replication traffic. However, global catalog removal occurs gradually in the background and does not affect replication or performance. Membership in the Enterprise Admins group in the forest or the Domain Admins group in the forest root domain, or equivalent, is the minimum required to complete this procedure. To add or remove the global catalog Open Active Directory Sites and Services. To open Active Directory Sites and Services, click Start, click Administrative Tools, and then click Active Directory Sites and Services. To open Active Directory Sites and Services in Windows Server 2012, click Start , type dssite.msc. In the console tree, click the server object to which you want to add the global catalog or from which you want to remove the global catalog. Where? Active Directory Sites and Services\Sites\SiteName\Servers In the details pane, right-click NTDS Settings of the selected server object, and then click Properties. Select the Global Catalog check box to add the global catalog, or clear the check box to remove the global catalog. Global catalog servers and sites. To optimize network performance in a multiple-site environment, consider adding global catalog servers in sites according to the needs in the sites for fast search responses and domain logons. It is recommended to make all domain controllers be global catalog severs if possible. In a single-site, multiple-domain environment, a single global catalog server is usually sufficient to cover common Active Directory queries and logons. 


Q208. HOTSPOT - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Hyperv1 and a domain controller named DC1. Hyperv1 has the Hyper-V server role installed. DC1 is a virtual machine on Hyperv1. 

Users report that the time on their client computer is incorrect. 

You log on to DC1 and verify that the time services are configured correctly. 

You need to prevent time conflicts between the time provided by DC1 and other potential 

time sources. 

What should you configure? 

To answer, select the appropriate object in the answer area. 


Answer: 



Q209. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has five network adapters. Three of the network adapters are connected to a network named LAN1. The two other network adapters are connected to a network named LAN2. 

You need to create a network adapter team from the three network adapters connected to LAN1. 

Which tool should you use? 

A. Routing and Remote Access 

B. Network and Sharing Center 

C. Server Manager 

D. Network Load Balancing Manager 

Answer: C 


Q210. HOTSPOT - (Topic 3) 

Your network contains a domain controller named dc5.adatum.com that runs Windows 

Server 2012 R2. 

You discover that you can connect successfully to DC5 over the network, but you receive a 

request timed out message when you attempt to ping DC5. 

You need to configure DC5 to respond to ping request. 

Which firewall rule should you modify on DC5? To answer, select the appropriate rule in 

the answer area. 


Answer: