★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-410-dumps.html


Dont spend any moment to search other Exambible. Our Microsoft Microsoft exam braindumps are totally free for you. Microsoft certification exam questions and also answers are most reliable, exact and logical training materials, which promise you a large score to pass the particular Microsoft exam. Take steps right today, and you will end up being at your occupation peak very shortly with a Microsoft Microsoft certification.

2021 Apr 70-410 exam answers

Q201. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. 

All client computers run Windows 8. 

You deploy a server named Server1 that runs Windows Server 2012 R2. 

You install a new client-server application named App1 on Server1 and on the client 

computers. The client computers must use TCP port 6444 to connect to App1 on Server1.Server1 publishes the information of App1 to an intranet server named Server2 by using TCP port 3080. 

You need to ensure that all of the client computers can connect to App1. The solution must 

ensure that the application can connect to Server2. 

Which Windows Firewall rule should you create on Server1? 

A. an inbound rule to allow a connection to TCP port 3080 

B. an outbound rule to allow a connection to TCP port 3080 

C. an outbound rule to allow a connection to TCP port 6444 

D. an inbound rule to allow a connection to TCP port 6444 

Answer:

Explanation: 

A. Server2 needs inbound on 3080. 

B. All ports outbound allowed by default. 

D. Server1 gets request from Client PC’s it needs an inbound rule for 6444. By default, Windows Firewall with Advanced Security blocks all unsolicited inbound network traffic, and allows all outbound network traffic. For unsolicited inbound network traffic to reach your computer, you must create an allow rule to permit that type of network traffic. If a network program cannot get access, verify that in the Windows Firewall with Advanced Security snap-in there is an active allow rule for the current profile. To verify that there is an active allow rule, double-click Monitoring and then click Firewall. If there is no active allow rule for the program, go to the Inbound Rules node and create a new rule for that program. Create either a program rule, or a service rule, or search for a group that applies to the feature and make sure all the rules in the group are enabled. To permit the traffic, you must create a rule for the program that needs to listen for that traffic. If you know the TCP or UDP port numbers required by the program, you can additionally restrict the rule to only those ports, reducing the vulnerability of opening up all ports for the program. 


Q202. - (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS). 

You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE. 

Which virtual machine setting should you configure for VM2? 

A. NUMA topology 

B. Resource control 

C. resource metering 

D. virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from the network is first. 

References: http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335 


Q203. DRAG DROP - (Topic 1) 

Your network contains three servers. The servers are configured as shown in the following tablE. 

Your company plans to standardize all of the servers on Windows Server 2012 R2. 

You need to recommend an upgrade path for each server. 

The solution must meet the following requirements: . Upgrade the existing operating system whenever possible. . Minimize hardware purchases. Which upgrade path should you recommend for each server? 

To answer, drag the appropriate upgrade path to each server in the answer area. Each upgrade path may be used once, more than once, or not at all. 

Answer: 


Q204. DRAG DROP - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You need to perform the following storage configuration tasks on Server1: 

Bring a disk named Disk1 online. 

Defragment a volume named Volume1. 

Remove a disk named Disk2 from a storage pool named Pool1. 

Which cmdlet should you use to perform each task? 

To answer, drag the appropriate cmdlets to the correct tasks. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q205. HOTSPOT - (Topic 3) 

You have three servers named Server1, Server2, and DC1 that run Windows Server 2012 

R2. IPv6 addresses and configurations are assigned to all of the servers by using DHCPv6. 

The IPv6 routing on Server1 is shown in the following table. 

You verify that Server2 can ping the IPv6 address of DC1. 

You need to ensure that Server1 can ping the IPv6 address of DC1. 

What command should you run on Server1? (To answer, select the appropriate options in 

the answer area.) 

Answer: 


Renovate 70-410 sample question:

Q206. HOTSPOT - (Topic 1) 

You have a Hyper-V host named Server1 that runs Windows Server 2008 R2. All of the virtual machines on Server1 use VHDs. 

You install the Hyper-V server role on a server named Server2 that runs Windows Server 2012 R2. Server2 has the same hardware configurations as Server1. 

You plan to migrate the Hyper-V host from Server1 to Server2 by using the Windows Server Migration Tools. 

In the table below, identify what can be migrated by using the Windows Server Migration Tools. Make only one selection in each row. Each correct selection is worth one point. 

Answer: 


Q207. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

You create a security template named Template1 by using the security template snap-in. 

You need to apply Template1 to Server2. 

Which tool should you use? 

A. Security Templates 

B. Computer Management 

C. Security Configuration and Analysis 

D. System Configuration 

Answer:

Explanation: 

A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer. 

A. Template was already created – Provide standard security option to use in security policies 

B. Needs to be applied at the GP level 

C. Security templates are inactive until imported into a Group Policy object or the SecurityConfiguration and Analysis 

D. Tool to ID windows problems 


Q208. HOTSPOT - (Topic 2) 

You have two servers that run Windows Server 2012 R2. The servers are configured as shown in the following table. 

You need to ensure that Server2 can be managed by using Server Manager from Server1. 

In the table below, identify which actions must be performed on Server1 and Server2.Make only one selection in each row. Each correct selection is worth one point. 

Answer: 


Q209. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has 2 dual-

core processors and 16 GB of RAM. 

You install the Hyper-V server role in Server1. 

You plan to create two virtual machines on Server1. 

You need to ensure that both virtual machines can use up to 8 GB of memory. The solution 

must ensure that both virtual machines can be started simultaneously. 

What should you configure on each virtual machine? 

A. Dynamic Memory 

B. NUMA topology 

C. Memory weight 

D. Resource Control 

Answer:


Q210. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. 

The domain contains a user named User1 and a global security group named Group1. 

You reconfigure DC2 as a member server in the domain. 

You need to add DC2 as the first domain controller in a new domain in the forest. 

Which cmdlet should you run? 

A. Add-AdPrincipalGroupMembership 

B. Install-AddsDomainController 

C. Install WindowsFeature 

D. Install AddsDomain 

E. Rename-AdObject 

F. Set AdAccountControl 

G. Set-AdGroup 

H. Set-User 

Answer:

Explanation: 

Since a member server does not have Active Directory Domain Services installed, you must install this role before you can configure the new Domain Controller (which would require you to run Install-ADDSForest). 

Topic 2, Volume B