70-410 Guide

All About 70-410 dumps Apr 2021

True worth of building a Microsoft certification is actually enhanced chance. With more chance can come job growth and higher pay. The particular Microsoft 70-410 grant Modern technology experts utilizing little or no Microsoft encounter receive the information as well as abilities recommended to break into a remarkably profitable as well as demanding Microsoft profession. It is needed to keep this unique Microsoft certification ahead of moving on to the next stage for Microsoft.

2021 Apr 70-410 training

Q21. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

You create a security template named Template1 by using the Security Templates snap-in. 

You need to apply Template1 to Server2. 

Which tool should you use? 

A. Authorization Manager 

B. Local Security Policy 

C. Certificate Templates 

D. System Configuration 

Answer:

Explanation: 

A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer. 


Q22. - (Topic 3) 

You have an Active Directory domain named contoso.com. You have a domain controller named Server1 that is configured as a DNS server. Server1 hosts a standard primary zone for contoso.com. The DNS configuration of Server1 is shown in the exhibit. 

You discover that stale resource records are not automatically removed from the contoso.com zone. 

You need to ensure that the stale resource records are automatically removed from the contoso.com zone. 

What should you do? 

A. Set the scavenging period of Server1 to 0 days. 

B. Modify the Server Aging/Scavenging properties. 

C. Configure the aging properties for the contoso.com zone. 

D. Convert the contoso.com zone to an Active Directory-integrated zone. 

Answer:

Explanation: 

Scavenging or aging as it is also known as automates the deletion of old records. When scavenging is disabled, these records must be deleted manually or the size of the DNS database can become large and have an adverse effect on performance. In the exhibit it shows that scavenging is enabled on Server1, thus you should configure the aging properties for the zone. 


Q23. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an organizational unit (OU) named AllComputers. Client computers run either Windows 7 or Windows 8. 

You create a Group Policy object (GPO) named GP1. 

You link GP1 to the AllComputers OU. 

You need to ensure that GP1 applies only to computers that have more than 8 GB of 

memory. 

What should you configure? 

A. The Security settings of GP1 

B. The Block Inheritance option for AllComputers 

C. The Security settings of AllComputers 

D. The WMI filter for GP1 

Answer:

Explanation: 

Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group Policy objects (GPOs) based on attributes of the target computer. When a GPO that is linked to a WMI filter is applied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates to false, the GPO is not applied (except if the client computer is running Windows Server, in which case the filter is ignored and the GPO is always applied). If the WMI filter evaluates to true, the GPO is applied. WMI filters, like GPOs, are stored on a per-domain basis. A WMI filter and the GPO it is linked to must be in the same domain. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10: Implementing Group Policy, p.470, 482 http://technet.microsoft.com/en-us/library/jj134176 WMI filtering using GPMC 


Q24. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You plan to use Windows PowerShell Desired State Configuration (DSC) to confirm that the Application Identity service is running on all file servers. 

You define the following configuration in the Windows PowerShell Integrated Scripting Environment (ISE):

 

You need to use DSC to configure Server1 as defined in the configuration. 

What should you run first? 

A. Service1 

B. Configuration1 

C. Start DscConfiguration 

D. Test-DscConfigu ration 

Answer:


Q25. - (Topic 3) 

Your network contains an Active Directory domain named adatum.com. The domain contains a file server named Server2 that runs Windows Server 2012 R2. Server2 contains a shared folder named Home. Home contains the home folder of each user. 

All users have the necessary permissions to access only their home folder. 

A user named User1 opens the Home share as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that all users see only their own home folder when they access Home. 

What should you do from Server2? 

A. From Windows Explorer, modify the properties of Home. 

B. From Server Manager, modify the properties of the volume that contains Home. 

C. From Windows Explorer, modify the properties of the volume that contains Home. 

D. From Server Manager, modify the properties of Home. 

Answer:

Explanation: 

Access-based Enumeration is a new feature included with Windows Server 2003 Service Pack 1. This feature based file servers to list only the files and folders to which they have allows users of Windows Server 2003 access when browsing content on the file server. This eliminates user confusion that can be caused when users connect to a file server and encounter a large number of files and folders that they cannot access. Access-based Enumeration filters the list of available files and folders on a server to include only those that the requesting user has access to. This change is important because this allows users to see only those files and directories that they have access to and nothing else. This mitigates the scenario where unauthorized users might otherwise be able to see the contents of a directory even though they don’t have access to it. 


Renovate 70-410 exam price:

Q26. - (Topic 3) 

A network technician installs Windows Server 2012 R2 Standard on a server named 

Server1. 

A corporate policy states that all servers must run Windows Server 2012 R2 Enterprise. 

You need to ensure that Server1 complies with the corporate policy. 

You want to achieve this goal by using the minimum amount of administrative effort. 

What should you perform? 

A. a clean installation of Windows Server 2012 R2 

B. an upgrade installation of Windows Server 2012 R2 

C. online servicing by using Dism 

D. offline servicing by using Dism 

Answer:

Explanation: 

A. Not least effort 

B. Not least effort 

C. dism /online /set-edition 

D. offline would be less ideal and more workex: DISM /online /Set-Edition:ServerEnterprise/ProductKey:489J6-VHDMP-X63PK-3K798-CPX3YWindows Server 2008 R2/2012 contains a command-line utility called DISM (Deployment Image Servicing and Management tool). This tool has many features, but one of those features is the ability to upgrade the edition of Windows in use. Note that this process is for upgrades only and is irreversible. You cannot set a Windows image to a lower edition. The lowest edition will not appear when you run the /Get- TargetEditions option. If the server is running an evaluation version of Windows Server 2012 R2 Standard or Windows Server 2012 R2 Datacenter, you can convert it to a retail version as follows: If the server is a domain controller, you cannot convert it to a retail version. In this case, install an additional domain controller on a server that runs a retail version and remove AD DS from the domain controller that runs on the evaluation version. From an elevated command prompt, determine the current edition name with the command DISM /online /Get-CurrentEdition. Make note of the edition ID, an abbreviated form of the edition name. Then run DISM /online /Set-Edition:<edition ID> /ProductKey:XXXXXXXXXX-XXXXX-XXXXXXXXXX/AcceptEula, providing the edition ID and a retail product key. The server will restart twice. 


Q27. DRAG DROP - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. All servers run 

Windows Server 2012 R2.All client computers run Windows 8. 

The domain contains a security group named Group1. 

You have a Group Policy object (GPO) named GPO1.GPO1 is linked to the domain. 

You need to ensure that only the members of Group1 can run the applications shown in the 

following table. 

Which type of application control policy should you implement for each application? 

To answer, drag the appropriate rule types to the correct applications. Each rule type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q28. - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You need to enable access-based enumeration for a file share on Server1. 

Which tool should you use? 

A. File Server Resource Manager (FSRM) 

B. Share and Storage Management 

C. Server Manager 

D. File Explorer 

Answer:

Explanation: 

Access-based enumeration displays only the files and folders that a user has permissions to access. It is a feature that was previously available as a downloadable package for the Windows Server. 2003 operating system (it was also included in Windows Server 2003 Service Pack 1). Access-based enumeration is now included in the Windows Server 2008 operating system, and you can enable it by using Share and Storage Management. 


Q29. - (Topic 1) 

Your company has a main office and two branch offices. The offices connect to each other by using a WAN link. 

In the main office, you have a server named Server1 that runs Windows Server 2012 R2. 

Server1 is configured to use an IPv4 address only. 

You need to assign an IPv6 address to Server1. The IP address must be private and routable. 

Which IPv6 address should you assign to Server1? 

A. fe80:ab32:145c::32cc:401b 

B. ff00:3fff:65df:145c:dca8::82a4 

C. 2001:ab32:145c::32cc:401b 

D. fd00:ab32:14:ad88:ac:58:abc2:4 

Answer:

Explanation: 

Unique local addresses are IPv6 addresses that are private to an organization in the same way that private addresses–such as 10.x.x.x, 192.168.x.x, or 172.16.0.0 172.31.255.255–can be used on an IPv4 network. Unique local addresses, therefore, are not routable on the IPv6 Internet in the same way that an address like 10.20.100.55 is not routable on the IPv4 Internet. A unique local address is always structured as follows: The first 8 bits are always 11111101 in binary format. This means that a unique local address always begins with FD and has a prefix identifier of FD00::/8. 


Q30. - (Topic 3) 

You have two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. The servers are configured as shown in the following table. 

The routing table for Server1 is shown in the Routing Table exhibit. (Click the Exhibit button.) 

From Server1, you attempt to ping Server2, but you receive an error message as shown in the Error exhibit. (Click the Exhibit button.) 

You need to ensure that you can successfully ping Server2 from Server1. What should you do on Server1? 

A. Disable Windows Firewall. 

B. Modify the subnet mask. 

C. Modify the DNS settings. 

D. Modify the default gateway settings. 

Answer:

Explanation: 

Route is used to view and modify the IP routing table. Route Print displays a list of current routes that the host knows. Default gateways are important to make IP routing work efficiently. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain extensive and continuously updated knowledge about individual remote IP network segments. Only the router that acts as the default gateway needs to maintain this level of routing knowledge to reach other remote network segments in the larger inter network. In order for Host A on Network 1 to communicate with Host B on Network 2, Host A first checks its routing table to see if a specific route to Host B exists. If there is no specific route to Host B, Host A forwards its TCP/IP traffic for Host B to its own default gateway, IP Router 1. 

The Default Gateway specifies the IP address of a router on the local subnet, which the system will use to access destinations on other networks. If the default gateway settings are not properly configured, then there can be no successful connection. 

Reference: 

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 269 


To know more about the 70-410, click here.

Tagged as : Microsoft 70-410 Dumps, Download 70-410 pdf, 70-410 VCE, 70-410 pass4sure, examcollection 70-410