★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-410-dumps.html


Act now and download your Microsoft mcsa 70 410 test today! Do not waste time for the worthless Microsoft vce 70 410 tutorials. Download Leading Microsoft Installing and Configuring Windows Server 2012 exam with real questions and answers and begin to learn Microsoft microsoft 70 410 exam with a classic professional.

Q121. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

An administrator provides you with a file that contains the information to create user accounts for 200 temporary employees. The file is shown in the exhibit. (Click the Exhibit button.) 

You need to automate the creation of the user accounts. You must achieve this goal by using the minimum amount of administrative effort. 

Which tool should you use? 

A. Ldifde 

B. csvde 

C. Dsadd 

D. Net user 

Answer:

Explanation: 

csvde – Imports and exports data from Active Directory Domain Services (AD DS) using files that store data in the comma-separated value (CSV) format. You can also support batch operations based on the CSV file format standard. Net user – Adds or modifies user accounts, or displays user account information. Ldifde – Creates, modifies, and deletes directory objects. You can also use ldifde to extend the schema, export Active Directory user and group information to other applications or services, and populate Active Directory Domain Services (AD DS) with data from other directory services. Dsadd – Adds specific types of objects to the directory. 

csvde.exe is the best option to add multiple users. As you just need to export the excel 

spreadsheet as a .csv file and make sure the parameters are correct. 

You can use Csvde to import and export Active Directory data that uses the comma-

separated value format. 

Use a spreadsheet program such as Microsoft Excel to open this .csv file and view the 

header and value information. 

References: 

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 5: Install 

and administer Active Directory, Objective 5.2: Create and Manage Active Directory Users 

and Computers, p. 269 


Q122. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains an Application server named Server1. Server1 runs Windows Server 2012 R2. 

Server1 is configured as an FTP server. 

Client computers use an FTP Application named App1.exe. App1.exe uses TCP port 21 as 

the control port and dynamically requests a data port. 

On Server1, you create a firewall rule to allow connections on TCP port 21. You need to configure Server1 to support the client connections from App1.exe. What should you do? 

A. Run netshadvfirewall set global statefulftp enable. 

B. Create an inbound firewall rule to allow App1.exe. 

C. Create a tunnel connection security rule. 

D. Run Set-NetFirewallRule -DisplayName DynamicFTP -Profile Domain 

Answer:

Explanation: 

The netsh firewall context is supplied only for backward compatibility. We recommend that you do not use this context on a computer that is running Windows Vista or a later version of Windows. In the netsh advfirewall firewall context, the add command only has one variation, the add rule command. Netsh advfirewall set global statefulftp: Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port. When statefulftp is enabled, the firewall examines the PORT and PASV requests for these other port numbers and then allows the corresponding data connection to the port number that was requested. Syntax set global statefulftp { enable | disable | notconfigured } Parameters statefulftp can be set to one of the following values: enable The firewall tracks the port numbers specified in PORT command requests and in the responses to PASV requests, and then allows the incoming FTP data traffic entering on the requested port number. disable This is the default value. The firewall does not track outgoing PORT commands or PASV responses, and so incoming data connections on the PORT or PASV requested port is blocked as an unsolicited incoming connection. notconfigured Valid only when netsh is configuring a GPO by using the set store command. 


Q123. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing printer pooling. 

Which of the following is TRUE with regards to printer pooling? (Choose all that apply.) 

A. Printers in a pool must be of the same model, and use the same printer driver. 

B. Each printer in the pool must have a different printer driver. 

C. Printer ports used in the pool must be of the same type. 

D. The types of printer ports used in the pool must be mixed. 

E. Pooled printers appear to workstations as a single printer. 

F. A minimum of three printers are required to configure a printer pool. 

Answer: A,E 

Explanation: 

You can create a printing pool to automatically distribute print jobs to the next available printer. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for their documents. A printing pool also simplifies administration because multiple printers can be managed from the same logical printer on a server. 


Q124. - (Topic 3) 

Your network contains an Active Directory forest named contoso.com. The forest contains a child domain named europe.contoso.com. The europe.contoso.com child domain 

contains a server named Server1 that runs Windows Server 2012 R2. You install the DHCP Server server role on Server1. You have access to the administrative accounts shown in the following table. 

A. Admin1 

B. Admin2 

C. Admin3 

D. Admin4 

Answer:

Explanation: 

A. Local account can’t be used 

B. Authorization needs to happen in contoso.com and must be an Ent Admin 

C. Authorization needs to happen in contoso.com and must be an Ent Admin 

D. Correct domain and is a member of Ent Admin’s 


Q125. - (Topic 1) 

You have a server named Server1. Server1 runs Windows Server 2012 R2. 

Server1 has a thin provisioned disk named Disk1. 

You need to expand Disk1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From File and Storage Services, extend Disk1. 

B. From File and Storage Services, add a physical disk to the storage pool. 

C. From Disk Management, extend the volume. 

D. From Disk Management, delete the volume, create a new volume, and then format the volume. 

E. From File and Storage Services, detach Disk1. 

Answer: A,B 

Explanation: 

Step 1 (B): if required add physical disk capacity. 

Step 2 (A): Dynamically extend the virtual disk (not volume). 

The File and Storage Services role and the Storage Services role service are installed by 

default, but without any additional role services. This basic functionality enables you to use 

Server Manager or Windows PowerShell to manage the storage functionality of your 

servers. 

Windows Server 2012 Storage Space subsystem now virtualizes storage by abstracting 

multiple physical disks into a logical construct with specified capacity. 

The process is to group selected physical disks into a container, the so-called storage pool, 

such that the total capacity collectively presented by those associated physical disks can 

appear and become manageable as a single and seemingly continuous space. 

Subsequently storage administrator creates a virtual disk based on a storage pool, 

configure a storage layout which is essentially a RAID level, and expose the storage of the 

virtual disk as a drive letter or a mapped folder in Windows Explorer. 

The system administrator uses File and Storage Services in Server Manager or the Disk 

Management tool tore scan the disk, bring the disk online, and extend the disk size. 


Q126. - (Topic 3) 

Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012 R2. A one-way external trust exists between contoso.com and adatum.com. 

Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com. 

What should you do? 

A. Change the scope of Group1 to domain local. 

B. Modify the Allowed to Authenticate permissions in adatum.com. 

C. Enable SID quarantine on the trust between contoso.com and adatum.com. 

D. Modify the Allowed to Authenticate permissions in contoso.com. 

Answer:

Explanation: 

* Accounts that require access to the customer Active Directory will be granted a special right called Allowed to Authenticate. This right is then applied to computer objects (Active Directory domain controllers and AD RMS servers) within the customer Active Directory to which the account needs access. 

* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest. 


Q127. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the 

Hyper-V server role installed. On Server1, you create a virtual machine named VM1. 

You need to ensure that VM1 can start by using PXE. 

What should you do? 

A. Add a second network adapter, and then run the Set-VMNetworkAdaptercmdlet. 

B. Add a second network adapter, and then configure network adapter teaming. 

C. Remove the network adapter, and then run the Set-VMNetworkAdaptercmdlet. 

D. Remove the network adapter, and then add a legacy network adapter. 

Answer:


Q128. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1.Server1 runs Windows Server 2012 R2. 

You create a group Managed Service Account named gservice1. 

You need to configure a service named Service1 to run as the gservice1 account. 

How should you configure Service1? 

A. From Services Console configure the recovery settings 

B. From a command prompt, run sc.exe and specify the config parameter 

C. From Windows PowerShell, run Set-Service and specify the -PassThrough parameter 

D. From a command prompt, run sc.exe and specify the sdset parameter 

Answer:

Explanation: 

Sc config, Modifies the value of a service’s entries in the registry and in the Service Control 

Manager database. 

obj= {<AccountName> | <ObjectName>} 

Specifies a name of an account in which a service will run, or specifies a name of the 

Windows driver object in 

which the driver will run. The default setting is LocalSystem. 

password= <Password> 

Specifies a password. This is required if an account other than the LocalSystem account is 

used. 


Q129. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

Contoso.com has a server, named ENSUREPASS-SR07, which has the AD DS, DHCP, and DNS server roles installed. Contoso.com also has a server, named ENSUREPASS-SR08, which has the DHCP, and Remote Access server roles installed. You have configured a server, which has the File and Storage Services server role installed, to automatically acquire an IP address. 

The server is named ENSUREPASS-SR09. You then create a filter on ENSUREPASS-SR07. 

Which of the following is a reason for this configuration? 

A. To make sure that ENSUREPASS-SR07 issues ENSUREPASS-SR09 an IP address. 

B. To make sure that ENSUREPASS-SR07 does not issue ENSUREPASS-SR09 an IP address. 

C. To make sure that ENSUREPASS-SR09 acquires a constant IP address from ENSUREPASS-SR08 only. 

D. To make sure that ENSUREPASS-SR09 is configured with a static IP address. 

Answer:


Q130. HOTSPOT - (Topic 2) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 hosts 50 virtual machines. 

You need to create a script to list all of the virtual machines that have checkpoints and support Secure Boot. 

What should you do? To answer, select the appropriate options in the answer area. 

Answer: