★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-410-dumps.html


Microsoft Microsoft certification is regarded while one of the most highly demanded certifications around the globe. Within the field of IT, Microsoft 70-410 certification will be something anyone is eager to have. When you make an effort to get promotion or even change work, you will have a good advantage over additional workmates or candidates in case you have a Microsoft Microsoft certification in hand.

2021 Dec 70-410 installing and configuring windows server 2012 pdf download:

Q301. - (Topic 2) 

Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.Server1 is configured as shown in the following table. 

You need to configure VM4 to track the CPU, memory, and network usage. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. Resource metering 

D. Virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring K. Single-root I/O virtualization 

Answer:

Explanation: 

Metrics collected for each virtual machine using resource metering: Average CPU usage, measured in megahertz over a period of time. Average physical memory usage, measured in megabytes. Minimum memory usage (lowest amount of physical memory). Maximum memory usage (highest amount of physical memory). Maximum amount of disk space allocated to a virtual machine. Total incoming network traffic, measured in megabytes, for a virtual network adapter. Total outgoing network traffic, measured in megabytes, for a virtual network adapter 

: http://blogs.technet.com/b/meamcs/archive/2012/05/28/hyper-v-resource-metering-in-windows-server-2012-server-8-beta.aspx 


Q302. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing Group Policy preference. 

Which of the following is TRUE with regards to Group Policy preference? 

A. It supports applications and operating system features that are not compatible with Group Policy 

B. It does not support item-level targeting. 

C. It is the same as Group Policy filtering. 

D. It does not cause the application or operating system feature to disable the user interface for the settings they configure. 

Answer: A,D 


Q303. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1. 

You install the Windows PowerShell Web Access gateway on Server1. 

You need to provide administrators with the ability to manage the servers in the domain by using the Windows PowerShell Web Access gateway. 

Which two cmdlets should you run on Server1? (Each correct answer presents part of the solution. Choose two.) 

A. Set-WSManQuickConfig 

B. Set-WSManInstance 

C. Add-PswaAuthorizationRule 

D. Set-BCAuthentication 

E. Install-PswaWebApplication 

Answer: C,E 

Explanation: 

A. Configures the local computer for remote management. 

B. Modifies the management information that is related to a resource. 

C. Adds a new authorization rule to the Windows PowerShell Web Access authorization rule set. 

D. Specifies the BranchCache computer authentication mode. 

E. Configures the Windows PowerShell . Web Access web Application in IIS. 


Q304. - (Topic 2) 

You have a server that runs Windows Server 2012 R2. 

The disks on the server are configured as shown in the exhibit. (Click the Exhibit button.) 

You need to create a storage pool that contains Disk 1 and Disk 2. What should you do first? 

A. Delete volume E 

B. Convert Disk 1 and Disk 2 to dynamic disks 

C. Convert Disk 1 and Disk 2 to GPT disks 

D. Create a volume on Disk 2 

Answer:

Explanation: 

A. Storage Pools use unallocated space There is no way to create a storage pool with existing data. Storage pools are only a collection of drives that are managed by windows. 


Q305. - (Topic 3) 

A network technician installs Windows Server 2012 R2 Standard on a server named 

Server1. 

A corporate policy states that all servers must run Windows Server 2012 R2 Enterprise. 

You need to ensure that Server1 complies with the corporate policy. 

You want to achieve this goal by using the minimum amount of administrative effort. 

What should you perform? 

A. a clean installation of Windows Server 2012 R2 

B. an upgrade installation of Windows Server 2012 R2 

C. online servicing by using Dism 

D. offline servicing by using Dism 

Answer:

Explanation: 

A. Not least effort 

B. Not least effort 

C. dism /online /set-edition 

D. offline would be less ideal and more workex: DISM /online /Set-Edition:ServerEnterprise/ProductKey:489J6-VHDMP-X63PK-3K798-CPX3YWindows Server 2008 R2/2012 contains a command-line utility called DISM (Deployment Image Servicing and Management tool). This tool has many features, but one of those features is the ability to upgrade the edition of Windows in use. Note that this process is for upgrades only and is irreversible. You cannot set a Windows image to a lower edition. The lowest edition will not appear when you run the /Get- TargetEditions option. If the server is running an evaluation version of Windows Server 2012 R2 Standard or Windows Server 2012 R2 Datacenter, you can convert it to a retail version as follows: If the server is a domain controller, you cannot convert it to a retail version. In this case, install an additional domain controller on a server that runs a retail version and remove AD DS from the domain controller that runs on the evaluation version. From an elevated command prompt, determine the current edition name with the command DISM /online /Get-CurrentEdition. Make note of the edition ID, an abbreviated form of the edition name. Then run DISM /online /Set-Edition:<edition ID> /ProductKey:XXXXXXXXXX-XXXXX-XXXXXXXXXX/AcceptEula, providing the edition ID and a retail product key. The server will restart twice. 


Most up-to-date powershell cheat sheet 70-410:

Q306. - (Topic 1) 

You have a print server named Server1 that runs Windows Server 2012 R2. 

You discover that when there are many pending print jobs, the system drive occasionally 

runs out of free space. 

You add a new hard disk to Server1.You create a new NTFS volume. 

You need to prevent the print jobs from consuming disk space on the system volume. 

What should you modify? 

A. The properties on the new volume 

B. The properties of the Print Spooler service 

C. The Print Server Properties 

D. The properties of each shared printer 

Answer:

Explanation: 

Windows spools print jobs by default to the following directory as they are processed: 

%SystemRoot%\SYSTEM32\SPOOL\PRINTERS. 

It is possible for the administrator of a Windows print server to manually instruct Windows 

the location for placing the spool files, if for example there is a concern for disk space. 


Q307. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. All domain 

controllers run Windows Server 2012 R2. 

All servers are configured to enforce AppLocker policies. 

You install a server named Server1. 

On Server1, you install an application named App1.exe in a folder located on C:\App1. 

You have two domain groups named Group1 and Group2.A user named User1 is a 

member of Group1 and Group2. 

You create a Group Policy object (GPO) named GPO1. You link GPO1 to contoso.com. 

You create the executable rules as shown in the exhibit by using the Create Executable Rules wizard. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. 

Answer: 


Q308. - (Topic 3) 

In a domain running at the Windows Server 2012 R2 domain functional level, which of the following security principals can be members of a global group? (Choose all answers that are correct.) 

A. Users 

B. Computers 

C. Universal groups 

D. Global groups 

Answer: A,B,D 

Explanation: 

A. Correct: Users can be security principals in a global group. 

B. Correct: Computers can be security principals in a global group. 

C. Incorrect: Universal groups cannot be security principals in a global group. 

D. Correct: Global group can be security principals in a global group. 


Q309. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a DHCP server named Server1 that runs Windows Server 2012 R2. 

You create a DHCP scope named Scope1. The scope has a start address of 192.168.1.10, an end address of 192.168.1.50, and a subnet mask of 255.255.255.192. 

You need to ensure that Scope1 has a subnet mask of 255.255.255.0. 

What should you do first? 

A. From the DHCP console, reconcile Scope1. 

B. From the DHCP console, delete Scope1. 

C. From the DHCP console, modify the Scope Options of Scope1. 

D. From Windows PowerShell, run the Set-DhcpServerv4Scope cmdlet. 

Answer:

Explanation: 

You cannot change the subnet mask of a DHCP scope without deleting the scope and 

recreating it with the new subnet mask. 

Set-DhcpServerv4Scope does not include a parameter for the subnet mask. 


Q310. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed. 

A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge Handshake Authentication Protocol (CHAP) for remote connections. CHAP is enabled on Server1. 

You need to ensure that User1 can connect to Server1 and authenticate to the domain. 

What should you do from Active Directory Users and Computers? 

A. From the properties of User1, select Store password using reversible encryption. 

B. From the properties of Server1, assign the Allowed to Authenticate permission to User1. 

C. From the properties of User1, select Use Kerberos DES encryption types for this account. 

D. From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only). 

Answer:

Explanation: 

The Store password using reversible encryption policy setting provides support for Applications that use protocols that require the user’s password for authentication. Storing encrypted passwords in a way that irreversible means that the encrypted passwords can be decrypted. A knowledgeable attacker who is able to break this encryption can then log on to network resources by using the compromised account. For this reason, never enable Store password using reversible encryption for all users in the domain unless Application requirements outweigh the need to protect password information. If you use the Challenge Handshake Authentication Protocol (CHAP) through remote access or Internet Authentication Services (IAS), you must enable this policy setting. CHAP is an authentication protocol that is used by remote access and network connections. Digest Authentication in Internet Information Services (IIS) also requires that you enable this policy setting. If your organization uses CHAP through remote access or IAS, or Digest Authentication in IIS, you must configure this policy setting to Enabled. This presents a security risk when you App1y the setting through Group Policy on a user-by-user basis because it requires the appropriate user account object to be opened in Active Directory Users and Computers.