getcertified4sure.com

Advanced Guide: microsoft official academic course 70-410




It is more faster and easier to pass the Microsoft 70-410 exam by using Tested Microsoft Installing and Configuring Windows Server 2012 questuins and answers. Immediate access to the Update 70-410 Exam and find the same core area 70-410 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Oct braindump 70-410:

Q121. - (Topic 3) 

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 is located on the same subnet as all of the client computers. A network technician reports that he receives a “Request timed out” error message when he attempts to use the ping utility to connect to Server1 from his client computer. The network technician confirms that he can access resources on Server1 from his client computer. 

You need to configure Windows Firewall with Advanced Security on Server1 to allow the ping utility to connect. 

Which rule should you enable? 

A. File and Printer Sharing (Echo Request – ICMPv4-In) 

B. Network Discovery (WSD-In) 

C. File and Printer Sharing (NB-Session-In) 

D. Network Discovery (SSDP-In) 

Answer:


Q122. HOTSPOT - (Topic 3) 

Your network contains two Active Directory forests named contoso.com and adatum.com. A two-way forest trust exists between the forests. 

You have custom starter Group Policy objects (GPOs) defined in contoso.com. 

You need to ensure that the same set of custom starter GPOs are available in adatum.com. 

In the table below, identify which action must be performed for the starter GPOs container in each forest. Make only one selection in two of the rows. Each correct selection is worth one point. 

Answer: 


Q123. HOTSPOT - (Topic 1) 

You have a shared folder named Share1. The folder permissions of Share1 are configured as shown in the Folder Permissions exhibit. (Click the Exhibit button.) 

The Share permissions of Share1 are configured as shown in the Share Permissions exhibit. (Click the Exhibit button.) 

You have a group named Group1. The members of Group1 are shown in the Group1 exhibit. (Click the Exhibit button.) 

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point. 

Answer: 


Q124. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named OU1. 

You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to OU1. The solution must minimize the number of permissions assigned to User1. 

What should you do? 

A. Run the Delegation of Control Wizard on OU1. 

B. Add User1 to the Group Policy Creator Owners group. 

C. Modify the permission on the \\Contoso.com\SYSVOL\Contoso.com\Policies folder. 

D. Modify the permissions on the User1 account. 

Answer:

Explanation: 

The Delegation of Control Wizard allows you to delegate tasks, active Directory Object types and to set permissions. 


Q125. - (Topic 3) 

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

You have installed the DNS Server Role on an ABC.com server, named ABC-SR13. ABC.com’s workstations make use of a web proxy to access the Internet, and refer to ABC-SR13 as a primary DNS server. 

You have been instructed to make sure that Internet host names for ABC.com’s workstations are not resolved by ABC-SR13. 

Which of the following actions should you take? 

A. You should consider configuring a primary zone on ENSUREPASS-SR13. 

B. You should consider configuring a secondary zone on ENSUREPASS-SR13. 

C. You should consider configuring a reverse lookup zone on ENSUREPASS-SR13. 

D. You should consider configuring a forward lookup zone on ENSUREPASS-SR13. 

Answer:


Abreast of the times mcsa windows server 2012 r2:

Q126. - (Topic 3) 

You have a server that runs Windows Server 2012 R2. The server contains the disks configured as shown in the following table. 

You need to create a volume that can store up to 3 TB of user files. The solution must ensure that the user files are available if one of the disks in the volume fails. What should you create? 

A. a storage pool on Disk 2 and Disk 3 

B. a spanned volume on Disk 2 and Disk 3 

C. a mirrored volume on Disk 1 and Disk 3 

D. a mirrored volume on Disk 2 and Disk 3 

E. a RAID-5 volume on Disk 1, Disk 2, and Disk 3 

F. a storage pool on Disk 1 and Disk 3 

G. a spanned volume on Disk 0 and Disk 4 

H. a mirrored volume on Disk 1 and Disk 4 

Answer:


Q127. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

Contoso.com has its headquarters in London, and several widespread satellite offices. When Contoso.com releases a new written policy stating that the graphical user interface (GUI) should not be installed on any servers deployed to Contoso.com’s satellite offices. 

It is reported that a server in one of the satellite offices are not compliant with the new written policy. 

You are required to remedy the situation, while using the least amount of user interaction. 

Which of the following actions should you take? 

A. You should consider uninstalling the User Interfaces and Infrastructure feature using a PowerShell cmdlet. 

B. You should consider uninstalling the User Interfaces and Infrastructure feature via TS Manager. 

C. You should consider uninstalling the User Interfaces and Infrastructure feature via Server Manager. 

D. You should consider uninstalling the User Interfaces and Infrastructure feature using the Dsrm.exe command from the command prompt. 

Answer:

Explanation: 

Although you could utilize a PowerShell cmdlet, it would require you to either log on to the remote machine to enable PowerShell remoting first (or to use the local PowerShell console). Using Server Manager, you could just add the server (if it wasn't already added) and use the "Remove Roles and Features" applet. 


Q128. - (Topic 2) 

Your network contains three servers that run Windows Server 2012 R2. The servers are configured as shown in the following table. 

Server3 is configured to obtain an IP address automatically. 

You need to prevent Server3 from receiving an IP address from Server1. 

What should you create on Server1? 

A. A reservation 

B. A filter 

C. A scope option 

D. An exclusion 

Answer:

Explanation: 

A. For clients that require a constant IP address 

B. Filter to exclude MAC address of Server3 

C. Range of allowed IP’s to be assigned 

D. Exclude range of IP’s MAC address based filtering ensure that only a known set of devices in the system are able to obtain an IPAddress from the DHCP Reservation and Exclusion, two incredibly different concepts. An exclusion is an address or range of addresses taken from a DHCP scope that the DHCP server is not allowed to hand out. For example, if you have set a DHCP server to exclude the address range 192.168.0.1-192.168.0.10 then the only way a computer on your network would get an address of 192.168.0.4 would be if you assigned it statically on that machine. This is because DHCP knows NOT to give this range of IP addresses out. A reservation is a specific IP addresses that is tied to a certain device through its MAC address. For example, if we have a workstation on the network that requires a certain IP address, but we don’t want to go through to trouble of assigning it statically, then we can create a reservation for it. So if the MAC address of the NIC on the computer is AA-BB-00FF-CC-AA and we want it to maintain the IP address of 192.168.0.100 then we would create a DHCP reservation under that particular scope saying that the IP address 

192.168.0.100 is reserved only for the MAC address AA-BB-00-FF-CC-AA. Reference: http://technet.microsoft.com/en-us/magazine/ff521761.aspx 


Q129. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

You have created and linked a new Group Policy object (GPO) to an organizational unit (OU), named ENSUREPASSServ, which host the computer accounts for servers in the Contoso.com domain. 

You have been tasked with adding a group to a local group on all servers in the Contoso.com domain. This group should not, however, be removed from the local group. 

Which of the following actions should you take? 

A. You should consider adding a restricted group. 

B. You should consider adding a global group. 

C. You should consider adding a user group. 

D. You should consider adding a server group. 

Answer:

Explanation: 

Restricted groups in Group policies are a simple way of delegating permissions or group 

membership centrally to any domain computer or server. Using restricted groups it is easier 

to enforce the lowest possible permissions to any given account. 

Computer Configuration\Windows Settings\Security Settings\Restricted Groups 

Restricted groups allow an administrator to define two properties for security-sensitive 

groups (that is, “restricted” groups). The two properties are Members and Member Of . 

The Members list defines who should and should not belong to the restricted group. 

The Member Of list specifies which other groups the restricted group should belong to. 

When a restricted Group Policy is enforced, any current member of a restricted group that 

is not on the Members list is removed. 


Q130. - (Topic 2) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2 

Datacenter.Server1 is located in an isolated network that cannot access the Internet. 

On Server1, you install a new virtual machine named VM1.VM1 runs Windows Server 2012 

R2 Essentials and connects to a private virtual network. 

After 30 days, you discover that VM1 shuts down every 60 minutes. 

You need to resolve the issue that causes VM1 to shut down every 60 minutes. 

What should you do? 

A. OnVM1, run slmgr.exe and specify the /ipk parameter. 

B. OnServer1, run slmgr.exe and specify the /rearm-sku parameter. 

C. Create a new internal virtual network and attach VM1 to the new virtual network. 

D. On Server1, run Add-WindowsFeatureVolumeActivation. 

Answer: