70-410 Guide

[Refresh] 70-410 pdf

Exam Code: 70-410 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Installing and Configuring Windows Server 2012
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-410 Exam.

2021 May 70-410 Study Guide Questions:

Q361. HOTSPOT - (Topic 2) 

The settings for a virtual machine named VM2 are configured as shown in the VM2 exhibit. (Click the Exhibit button.) 


The settings for Disk1.vhdx are configured as shown in the Disk1.vhdx exhibit. (Click the Exhibit button.) 


The settings for Disk2.vhdx are configured as shown in the Disk2.vhdx exhibit. (Click the Exhibit button.) 


Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point. 


Answer: 



Q362. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. 

On Server1, you create a share named Documents. 

You need to ensure that users can recover files that they accidently delete from Documents. 

What should you do? 

A. Enable shadow copies by using Computer Management. 

B. Create a storage pool that contains a two-way mirrored volume by using Server Manager. 

C. Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the Services console. 

D. Create a recovery partition by using Windows Assessment and Deployment Kit (Windows ADK). 

Answer: A 

Explanation: 

If you enable Shadow Copies of Shared Folders on a volume using the default values, a task will be scheduled to create shadow copies at 7:00 A.M of next business day. The default storage area will be on the same volume, and its size will be 10 percent of the available space. You can only enable Shadow Copies of Shared Folders on a per-volume basis–that is, you cannot select specific shared folders and files on a volume to be copied or not copied. 

To enable and configure Shadow Copies of Shared Folders: 

1. Click Start, point to Administrative Tools, and then click Computer Management. 

2. In the console tree, right-click Shared Folders, click All Tasks, and then click Configure Shadow Copies. 

3. In Select a volume, click the volume that you want to enable Shadow Copies of Shared Folders for, and then click Enable. 

4. You will see an alert that Windows will create a shadow copy now with the current settings and that the settings might not be appropriate for servers with high I/O loads. Click Yes if you want to continue or No if you want to select a different volume or settings. 

5. To make changes to the default schedule and storage area, click Settings. 

Shadow copies - a feature that provides point-in-time copies of files stored on file shares on file servers. Shadow Copies of Shared Folders allows users to view and access shadow copies, which are shared files and folders as they existed at different points of time in the past. By accessing previous versions of files and folders, users can compare versions of a file while working and recover files that were accidentally deleted or overwritten. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 

7: Hyper-V virtualization, Lesson 1: Deploying and configuring Hyper-V- hosts, p. 302 


Q363. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1.VM1 has a legacy network adapter. 

You need to assign a specific amount of available network bandwidth to VM1. 

What should you do first? 

A. Remove the legacy network adapter, and then run the Set-VMNetworkAdapter cmdlet. 

B. Add a second legacy network adapter, and then run the Set-VMNetworkAdopter cmdlet 

C. Add a second legacy network adapter, and then configure network adapter teaming. 

D. Remove the legacy network adapter, and then add a network adapter 

Answer: D 

Explanation: 

A. Set-VMNetworkAdaptercmdlet configures features of the virtual network adapter in a virtual machine or the management operating system 

B. The legacy network adapter doesn’t support bandwidth management 

C. The legacy network adapter doesn’t support bandwidth management 

D. Add a New network adapter The legacy network adapter doesn’t support bandwidth management 


Q364. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Web Server (US) server role installed. 

Server1 has a web site named Web1. Web1 is configured to use digest authentication. 

You need to ensure that a user named User1 can access Web1. 

What should you do from Active Directory Users and Computers? 

A. From the properties of User1, select Store password using reversible encryption. 

B. From the properties of User1, select Use Kerberos DES encryption types for this account. 

C. From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only). 

D. From the properties of Server1, assign the Allowed to Authenticate permission to User1. 

Answer: A 

Explanation: 

Challenge Handshake Authentication Protocol (CHAP) is a basic level of iSCSI security that is used to authenticate the peer of a connection and is based upon the peers sharing a secret: that secret being a password. To make sure that User1 can connect to the server, you should use Active Directory Users and Computers to store that password. 


70-410 test questions

Down to date exam ref 70-410:

Q365. - (Topic 2) 

Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains one domain. A two-way forest trust exists between the forests. 

The forests use the address spaces shown in the following table. 


From a computer in the contoso.com domain, you can perform reverse lookups for the servers in the contoso.com domain, but you cannot perform reverse lookups for the servers in the adatum.com domain. 

From a computer in the adatum.com domain, you can perform reverse lookups for the servers in both domains. 

You need to ensure that you can perform reverse lookups for the servers in the adatum.com domain from the computers in the contoso.com domain. 

What should you create? 

A. A trust point 

B. A GlobalNames zone 

C. A delegation 

D. A conditional forwarder 

Answer: D 

Explanation: 

Conditional forwarders are DNS servers that only forward queries for specific domain names. Instead of forwarding all queries it cannot resolve locally to a forwarder, a conditional forwarder is configured to forward a query to specific forwarders based on the domain name contained in the query. Forwarding according to domain names improves conventional forwarding by adding a name-based condition to the forwarding process. The conditional forwarder setting for a DNS server consists of the following: The domain names for which the DNS server will forward queries. One or more DNS server IP addresses for each domain name specified. When a DNS client or server performs a query operation against a DNS server, the DNS server looks to see if the query can be resolved using its own zone data or the data stored in its cache. If the DNS server is configured to forward for the domain name designated in the query, then the query is forwarded to the IP address of a forwarder associated with the domain name. For example, in the following figure, each of the queries for the domain names is forwarded to a DNS server associated with the domain name. 

: http://technet.microsoft.com/en-us/library/cc757172(v=ws.10).aspx 


Q366. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. You have fixed-size VHD named Files.vhd. 

You need to make the contents in Files.vhd available to several virtual machines. The solution must meet the following requirements: 

. Ensure that if the contents are changed on any virtual machine, the changes are not reflected on the other virtual machines. . Minimize the amount of disk space used. 

What should you do? 

A. Create a fixed-size VHDX. Transfer the information from Files.vhd to the new VHDX file. 

B. Convert Files.vhd to a dynamically expanding VHD? 

C. Create a dynamically expanding VHDX. Transfer the information from Files.vhd to the new VHDX file. 

D. Create differencing VHDs that use Files.vhd as the parent disk. 

Answer: D 

Explanation: 

A. A conversion would be needed from VHD to VHDX. Not available to multiple VM’s 

B. Single VHD not available to multiple VM’s. Changes wouldn’t be reflected 

C. A conversion would be needed from VHD to VHDX. Not available to multiple VM’s 

D. Child disk for multiple VM’s with Files.vhd as parent. A differencing disk is associated with another virtual hard disk that you select when you create the differencing disk. This means that the disk to which you want to associate the differencing disk must exist first. This virtual hard disk is called the “parent” disk and the differencing disk is the “child” disk. The parent disk can be any type of virtual hard disk. The differencing disk stores all changes that would otherwise be made to the parent disk if the differencing disk was not being used. The differencing disk provides an ongoing way to save changes without altering the parent disk. You can use the differencing disk to store changes indefinitely, as long as there is enough space on the physical disk where the differencing disk is stored. The differencing disk expands dynamically as data is written to it and can grow as large as the maximum size allocated for the parent disk when the parent disk was created. 


Q367. - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. You add an additional disk to Server1 as shown in the exhibit. (Click the Exhibit button.) 


You need to ensure that users can access the additional disk from drive C. 

What should you do? 

A. Convert Disk 0 to a dynamic disk and add a mirror. 

B. Create a simple volume on Disk 1 and mount the volume to a folder. 

C. Convert Disk 0 and Disk 1 to dynamic disks and extend a volume. 

D. Convert Disk 1 to a dynamic disk and create a spanned volume. 

Answer: B 


Q368. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet. 

Which of the following describes the results of running this cmdlet? 

A. It removes one or more network adapters from a specified NIC team. 

B. It removes a team interface from a NIC team. 

C. It removes a specified NIC team from the host. 

D. It removes a network adapter member from a switch team. 

Answer: C 

Explanation: 

Remove-NetLbfoTeam removes the specified NIC team from the host. 

The Remove-NetLbfoTeam cmdlet removes the specified NIC team from the host. This 

cmdlet disconnects all associated team members and providers from the team. You can 

specify the team to remove by using either a team object retrieved by Get-NetLbfoTeam, or 

by specifying a team name. 

You can use Remove-NetLbfoTeam to remove all NIC teams from the server. 

You need administrator privileges to use Remove-NetLbfoTeam. 


70-410 rapidshare

Tested microsoft exam 70-410:

Q369. - (Topic 1) 

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

On a server named Core1, you perform a Server Core Installation of Windows Server 2012 R2. You join Core1 to the adatum.com domain. 

You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1. 

What should you do on Core1? 

A. Run the Disable NetFirewallRule cmdlet. 

B. Install Remote Server Administration Tools (RSAT). 

C. Install Windows Management Framework. 

D. Run the Enable-Com + Network Access Firewall Rule. 

Answer: D 

Explanation: 

Information regarding IPsec policy changes, etc. can be found in the Event Viewer. Thus you need to enable the NetFirewallRule command. This will allow you to view the event logs. 


Q370. HOTSPOT - (Topic 2) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 hosts 50 virtual machines. 

You need to create a script to list all of the virtual machines that have checkpoints and support Secure Boot. 

What should you do? To answer, select the appropriate options in the answer area. 



Answer: 



Q371. HOTSPOT - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. 

Several users are members of the local Administrators group. 

You need to ensure that all local administrators receive User Account Control (UAC) 

prompts when they run a Microsoft Management Console (MMC). 

Which settings should you modify from the Local Security Policy? To answer, select the 

appropriate settings in the answer area. 


Answer: 



Q372. - (Topic 3) 

You have a virtual machine named VM1. 

You install Windows Server 2012 R2 on VM1. 

You plan to use VM1 as an image that will be distributed to sales users to demonstrate the features of a custom application. The custom application only requires the Web Server (IIS) server role to be installed. 

You need to ensure that the VHD file for VM1 only contains the required Windows Server 2012 R2 source files. 

Which tool should you use? 

A. servermanagercmd.exe 

B. dism.exe 

C. ocsetup.exe 

D. imagex.exe 

Answer: B 

Explanation: 

You can use DISM to: 

Add, remove, and enumerate packages and drivers. 

Enable or disable Windows features. 

Apply changes based on the offline servicing section of an unattend.xml answer file. 

Configure international settings. 

Upgrade a Windows image to a different edition. 

Prepare a Windows PE image. 

Take advantage of better logging. 

Service down-level operating systems like Windows Vista with SP1 and Windows Server 

2008. 

Service all platforms (32-bit, 64-bit, and Itanium). 

Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host. 

Make use of old Package Manager scripts. 

This command will mount the image before making any changes. This will ensure that only 

the required Windows Server 2012 R2 source files are contained. 


To know more about the 70-410, click here.

Tagged as : Microsoft 70-410 Dumps, Download 70-410 pdf, 70-410 VCE, 70-410 pass4sure, examcollection 70-410