★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-410-dumps.html


Testking Exam Engine Features: 1. Microsoft Microsoft 70-410 exam offers questions and answers inside details. 2. Take a Microsoft prep examination before an individual buy that. 3. Promptly update your Microsoft 70-410 exam dump. 4. Almost 100% guarantee towards the Microsoft exam questions and answers. Your five. The Microsoft certification stimulation exam is the identical to the true Microsoft exam.

2021 Apr 70-410 free exam questions

Q261. DRAG DROP - (Topic 3) 

Your company has a main office that contains 225 client computers. The client computers are located on a subnet that uses the network ID of 10.10.1.0/24. 

The company plans to open two branch offices. The offices will be configured as shown in the following table. 

You need to select a network prefix for each office to ensure that there are enough IPv4 addresses for each client computer. 

The solution must minimize the number of unused IP addresses. 

Which network prefixes should you select? 

To answer, drag the appropriate network prefix to the correct branch office in the answer area. 

Answer: 


Q262. - (Topic 2) 

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 is a member of a workgroup. 

You need to configure a local Group Policy on Server1 that will apply only to non-administrators. 

Which tool should you use? 

A. Group Policy Object Editor 

B. Group Policy Management 

C. Group Policy Management Editor 

D. Server Manager 

Answer:

Explanation: 

Once you create a GPO, you can open it in the Group Policy Management Editor and 

configure the GPO’s policies, specifically those settings that target the non-administrators. 

In this scenario however, you still need to configure the Group Policy thus you would need 

the GPO Editor. 

References: 

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 10: 

Implementing Group Policy, Lesson 1: Planning, implementing and managing group policy, 

p. 475 


Q263. - (Topic 2) 

You are configuring the IPv6 network infrastructure for a branch office. 

The corporate network administrator allocates the 2001:DB8:0:C000::/58 address space for use in the branch office. 

You need to identify the maximum number of IPv6 subnets you can create. 

How many IPv6 subnets should you identify? 

A. 32 

B. 64 

C. 128 

D. 1024 

Answer:

Explanation: 

IPv6 has 128-bit (16-byte) source and destination IP addresses. Although 128 bits can express over 3.4×1038 possible combinations, the large address space of IPv6 has been designed for multiple levels of subnetting and address allocation from the Internet backbone to the individual subnets within an organization. 

: http://technet.microsoft.com/en-us/library/dd379516%28v=WS.10%29.aspx 


Q264. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains 500 servers that run Windows Server 2012 R2. 

You have a written security policy that states the following: 

Only required ports must be open on the servers. 

All of the servers must have Windows Firewall enabled. 

Client computers used by administrators must be allowed to access all of the ports 

on all of the servers. 

Client computers used by the administrators must be authenticated before the 

client computers can access the servers. 

You have a client computer named Computer1 that runs Windows 8. 

... . 

You need to ensure that you can use Computer1 to access all of the ports on all of the servers successfully. The solution must adhere to the security policy. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. On Computer1, create a connection security rule. 

B. On all of the servers, create an outbound rule and select the Allow the connection if it is secure option. 

C. On all of the servers, create an inbound rule and select the Allow the connection if it is secure option. 

D. On Computer1, create an inbound rule and select the Allow the connection if it is secure option. 

E. On Computer1, create an outbound rule and select the Allow the connection if it is secure option. 

F. On all of the servers, create a connection security rule. 

Answer: A,C,F 

Explanation: 

Unlike firewall rules, which operate unilaterally, connection security rules require that both 

communicating computers have a policy with connection security rules or another 

compatible IPsec policy. 

Traffic that matches a firewall rule that uses the Allow connection if it is secure setting 

bypasses Windows Firewall. The rule can filter the traffic by IP address, port, or protocol. 

This method is supported on Windows Vista or Windows Server 2008. 

References: 

http://technet.microsoft.com/en-us/library/cc772021.aspx 

http://technet.microsoft.com/en-us/library/cc753463.aspx 


Q265. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You plan to create an image of Server1. 

You need to remove the source files for all server roles that are not installed on Server1. 

Which tool should you use? 

A. servermanagercmd.exe 

B. imagex.exe 

C. ocsetup.exe 

D. dism.exe 

Answer:

Explanation: 

servermanagercmd.exe – The ServerManagerCmd.exe command-line tool has been deprecated in Windows Server 2008 R2. imagex.exe – ImageX is a command-line tool in Windows Vista that you can use to create and manage Windows image (.wim) files. A .wim file contains one or more volume images, disk volumes that contain images of an installed Windows operating system. dism.exe – Deployment Image Servicing and Management (DISM.exe) is a command-line tool that can be used to service a Windows image or to prepare a Windows Preinstallation Environment (Windows PE) image. It replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg that were included in Windows Vista. The functionality that was included in these tools is now consolidated in one tool(DISM.exe), and new functionality has been added to improve the experience for offline servicing. DISM can Add, remove, and enumerate packages. ocsetup.exe – The Ocsetup.exe tool is used as a wrapper for Package Manager (Pkgmgr.exe) and for Windows Installer (Msiexec.exe). Ocsetup.exe is a command-line utility that can be used to perform scripted installs and scripted uninstalls of Windows optional components. The Ocsetup.exe tool replaces the Sysocmgr.exe tool that Windows XP and Windows Server 2003i use. 

The Dism utility can be used to create and mount an image of Server1. 

References: 

http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx http://technet.microsoft.com/en-us/library/dd744382(v=ws.10).aspx 

Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 2: Deploying Servers, p. 44 Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 1: Installing and Configuring Servers, p. 19-22 


Latest 70-410 free exam questions:

Q266. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. You need to log the amount of system resources used by each virtual machine. What should you do? 

A. From Windows PowerShell, run the Enable-VMResourceMetering cmdlet. 

B. From Windows System Resource Manager, enable Accounting. 

C. From Windows System Resource Manager, add a resource allocation policy. 

D. From Windows PowerShell, run the Measure-VM cmdlet. 

Answer:

Explanation: 

Enable-VMResourceMetering – The Enable-VMResourceMeteringcmdlet starts collecting 

resourceutilization data for a virtual machine or resource pool. 

Measure-VM – The Measure-VM cmdlet reports data on processor usage, memory usage, 

network traffic, and disk capacity for one or more virtual machines. 


Q267. - (Topic 3) 

Server1 runs Windows Server 2012 R2 and is installed as an FTP server. Client uses App1 to connect to Server1 for FTP. App1 uses TCP port 21 for control and a dynamic port for data. You have allowed port 21 in firewall. What should you do next in order to allow clients to use App1 to connect to server1 using ftp. 

A. At Server1 allow firewall rule of outbound 

B. At Server1 allow firewall rule of inbound 

C. Netsh advfirewall domainprofile state off 

D. Netsh advfirewall set global StatefulFtp enable 

Answer:

Explanation: 

Set global statefulftp Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port. This affects both active and passive FTP. 


Q268. - (Topic 3) 

You have a server named Server1 that runs a full installation of Windows Server 2012 R2. 

You need to uninstall the graphical user interface (GUI) on Server1. You must achieve this goal by using the minimum amount of Administrative effort. What should you do? 

A. Reinstall Windows Server 2012 R2 on the server. 

B. From Server Manager, uninstall the User Interfaces and Infrastructure feature. 

C. From Windows PowerShell, run Uninstall-WindowsFeature PowerShell-ISE 

D. From Windows PowerShell, run Uninstall-WindowsFeature Desktop-Experience. 

Answer:


Q269. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. 

The domain contains a user named User1 and a global security group named Group1. 

You need to modify the SAM account name of Group1. 

Which cmdlet should you run? 

A. Add-AdPrincipalGroupMembership 

B. Install-AddsDomainController 

C. Install-WindowsFeature 

D. Install-AddsDomain 

E. Rename-AdObject 

F. Set AdAccountControl 

G. Set-AdGroup 

H. Set-User 

Answer:


Q270. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers. The servers are contained in an organizational unit (OU) named Servers OU. 

You need to create a group named Group1 on all of the servers in the domain. You must ensure that Group1 is added only to the servers. 

What should you configure? 

A. a Local Users and Groups preferences setting in a Group Policy linked to the Domain Controllers OU 

B. a Restricted Groups setting in a Group Policy linked to the domain 

C. a Local Users and Groups preferences setting in a Group Policy linked to ServersOU 

D. a Restricted Groups setting in a Group Policy linked to Servers OU 

Answer:

Explanation: 

A. This would add the group to the wrong OU 

B. This would affect the whole domain and would effect member of the group 

C. allows you to centrally manage local users and groups on domain member computers and is this is the correct OU for the GPO change 

D. Restricted Groups defines what member or groups should exist as part of a group Why use Group Policy preferences? Unlike Group Policy settings, which App1y to both local computer policy and Active Directory policy, Group Policy preferences only App1y to Active Directory policy. You use preferences to configure many areas of the OS, including: System devices, such as USB ports, floppy drives and removable media Network shares and mapping network shares to drive letters System and user environment variables User and group accounts for the local computer VPN and dial-up networking connections Printer configuration and mapping Registry settings, schedule tasks and system services Settings for Folder Options, Internet Options and Regional and Language Options Settings for power schemes and power management Start Menu properties and menu items