getcertified4sure.com

Key benefits of mcsa 2012 practice test




People of 70-410 are going to be gaining together with latest technology of Microsoft products and services and also with its treatments and hence your individuals are usually sure together with fine careers. Thriving 70-410 individuals are going to be gaining a new to blame new member within the Microsoft provider in different among the grounds (could possibly be within the product sales area maybe in the knowledge technological innovation area). Ever since the successful 70-410 individuals are becoming a new to blame new member within the provider, theyre going to get hold of admiration through the group as well as are going to be gaining testimonials in outlining about the latest Microsoft technology and approaches to the mates.

2021 Nov mcsa server:

Q291. - (Topic 2) 

You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the DHCP Server server role installed. 

You need to create an IPv6 reservation for Server2. 

Which two values should you obtain from Server2? (Each correct answer presents part of the solution. Choose two.) 

A. the hardware ID 

B. the DHCPv6 unique identifier 

C. the DHCPv6 identity association ID 

D. the SMSBIOS GUID 

E. the MAC address 

Answer: B,C 

Explanation: 

The Add-DhcpServerv6Reservation cmdlet reserves a specified IPv6 address for the client identified by the specified Dynamic Host Configuration Protocol (DHCP) v6 unique identifier (ID) (DUID) and identity association ID (IAID). 


Q292. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All servers run Windows Server 2012 R2. The domain contains two domain controllers named DC1 and DC2. Both domain controllers are virtual machines on a Hyper-V host. 

You plan to create a cloned domain controller named DC3 from an image of DC1. 

You need to ensure that you can clone DC1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Add the computer account of DC1 to the Cloneable Domain Controllers group. 

B. Create a DCCloneConfig.xml file on DC1. 

C. Add the computer account of DC3 to the Cloneable Domain Controllers group. 

D. Run the Enable-AdOptionalFeaturecmdlet. 

E. Modify the contents of the DefaultDCCIoneAllowList.xml file on DC1. 

Answer: A,B 

Explanation: 

A. Cloneable Domain Controllers Group There’s a new group in town. It’s called Cloneable Domain Controllers and you can find it in the Users container. Membership in this group dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn’t be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete. Cloned DCs will also end up in the Cloneable Domain Controllers group. 

B. DCCloneConfig.xml There’s one key difference between a cloned DC and a DC that is being restored to a previous snapshot: DCCloneConfig.XML. DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways. The New-ADDCCloneConfigcmdlet in PowerShell By hand with an XML editor By editing an existing config file, again with an XML editor. 

Reference: Virtual Domain Controller Cloning in Windows Server 2012. 


Q293. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature. 

Which of the following is TRUE with regards to Windows Firewall with Advanced Security? (Choose all that apply.) 

A. It provides host-based, two-way network traffic filtering for a computer. 

B. It provides host-based, one-way network traffic filtering for a computer. 

C. It blocks unauthorized network traffic flowing into or out of the local computer. 

D. It only blocks unauthorized network traffic flowing into the local computer. 

E. It only blocks unauthorized network traffic flowing out of the local computer. 

Answer: A,C 

Explanation: 

Windows Firewall with Advanced Security is an important part of a layered security model. By providing host-based, two-way network traffic filtering for a computer, Windows Firewall with Advanced Security blocks unauthorized network traffic flowing into or out of the local computer. Windows Firewall with Advanced Security also works with Network Awareness so that it can apply security settings appropriate to the types of networks to which the computer is connected. Windows Firewall and Internet Protocol Security (IPsec) configuration settings are integrated into a single Microsoft Management Console (MMC) named important part of your network’s Windows Firewall with Advanced Security, so Windows Firewall is also an isolation strategy. 


Q294. - (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS). 

You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE. 

Which virtual machine setting should you configure for VM2? 

A. NUMA topology 

B. Resource control 

C. resource metering 

D. virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from the network is first. 

References: http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335 


Q295. - (Topic 3) 

Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Hyper-V server role installed. You have a virtual machine named VM1. VM1 has a snapshot. You need to modify the Snapshot File Location of VM1. 

What should you do first? 

A. Copy the snapshot file 

B. Pause VM1 

C. Shut down VM1 

D. Delete the snapshot 

Answer:

Explanation: 

Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located in the same folder as the virtual machine by default. In Hyper-V in Windows Server 2008 R2, the files usually are located in the same folder as the virtual hard disk. The following exceptions affect the location of the snapshot data files: If the virtual machine was imported with snapshots, they are stored in their own folder. If the virtual machine has no snapshots and you configure the virtual machine snapshot setting, all snapshots you take afterwards will be stored in the folder you specify. Caution Do not delete .avhd files directly from the storage location. Instead, use Hyper-V Manager to select the virtual machine, and then delete the snapshots from the snapshot tree. Do not expand a virtual hard disk when it is used in a virtual machine that has snapshots. Doing so will make the snapshots unusable. http://technet.microsoft.com/en-us/library/dd560637(v=ws.10).aspx 


Improved windows server 2012 simulator:

Q296. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed. 

A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge Handshake Authentication Protocol (CHAP) for remote connections. CHAP is enabled on Server1. 

You need to ensure that User1 can connect to Server1 and authenticate to the domain. 

What should you do from Active Directory Users and Computers? 

A. From the properties of User1, select Store password using reversible encryption. 

B. From the properties of Server1, assign the Allowed to Authenticate permission to User1. 

C. From the properties of User1, select Use Kerberos DES encryption types for this account. 

D. From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only). 

Answer:

Explanation: 

The Store password using reversible encryption policy setting provides support for Applications that use protocols that require the user’s password for authentication. Storing encrypted passwords in a way that irreversible means that the encrypted passwords can be decrypted. A knowledgeable attacker who is able to break this encryption can then log on to network resources by using the compromised account. For this reason, never enable Store password using reversible encryption for all users in the domain unless Application requirements outweigh the need to protect password information. If you use the Challenge Handshake Authentication Protocol (CHAP) through remote access or Internet Authentication Services (IAS), you must enable this policy setting. CHAP is an authentication protocol that is used by remote access and network connections. Digest Authentication in Internet Information Services (IIS) also requires that you enable this policy setting. If your organization uses CHAP through remote access or IAS, or Digest Authentication in IIS, you must configure this policy setting to Enabled. This presents a security risk when you App1y the setting through Group Policy on a user-by-user basis because it requires the appropriate user account object to be opened in Active Directory Users and Computers. 


Q297. - (Topic 3) 

You have an Active Directory domain named contoso.com. You have a domain controller named Server1 that is configured as a DNS server. Server1 hosts a standard primary zone for contoso.com. The DNS configuration of Server1 is shown in the exhibit. 

You discover that stale resource records are not automatically removed from the contoso.com zone. 

You need to ensure that the stale resource records are automatically removed from the contoso.com zone. 

What should you do? 

A. Set the scavenging period of Server1 to 0 days. 

B. Modify the Server Aging/Scavenging properties. 

C. Configure the aging properties for the contoso.com zone. 

D. Convert the contoso.com zone to an Active Directory-integrated zone. 

Answer:

Explanation: 

Scavenging or aging as it is also known as automates the deletion of old records. When scavenging is disabled, these records must be deleted manually or the size of the DNS database can become large and have an adverse effect on performance. In the exhibit it shows that scavenging is enabled on Server1, thus you should configure the aging properties for the zone. 


Q298. - (Topic 3) 

Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts. Servers are restarted only occasionally. 

You need to identify which servers were restarted during the last two days. 

What should you do? 

A. Run dsquery computer and specify the -stalepwd parameter 

B. Run dsquery server and specify the -o parameter. 

C. Run Get-ADComputer and specify the lastlogon property. 

D. Run Get-ADComputer and specify the SearchScope parameter 

Answer:


Q299. - (Topic 3) 

Your network contains multiple subnets. 

On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2. 

You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com. 

You need to ensure that client computers can resolve IP addresses to host names. 

What should you do first? 

A. Create a GlobalNames zone. 

B. Convert the contoso.com zone to an Active Directory-integrated zone. 

C. Configure dynamic updates for contoso.com. 

D. Create a reverse lookup zone. 

Answer:

Explanation: 

Use a reverse lookup zone to be able to resolve IP addresses to host names. 


Q300. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2008 R2 installed. 

Most of the Contoso.com servers have 64 – bit CPU’s installed, while the rest have 32 – bit CPU’s installed. You are informed that Contoso.com wants to deploy Windows Server 2012 R2 on all their servers. 

You need to make recommendations to ensure that this is possible. 

Which of the following would you recommend? 

A. You should inform Contoso.com that the deployment can proceed without any changes. 

B. You should inform Contoso.com that the servers with 32 bit CPU’s must be upgraded to include 64 bit CPU’s for the deployment to proceed. 

C. You should inform Contoso.com that the servers with 64 bit CPU’s must be upgraded to include 32 bit CPU’s for the deployment to proceed. 

D. You should inform Contoso.com that the deployment is not in any way possible. 

Answer:

Explanation: 

Windows Server 2012 is a 64-bit only operating system. Minimum: 1.4 GHz 64-bit processor