microsoft 70 410 exam : Jun 2017 Edition

Act now and download your Microsoft 70 410 installing and configuring windows server 2012 pdf test today! Do not waste time for the worthless Microsoft 70 410 dumps tutorials. Download Avant-garde Microsoft Installing and Configuring Windows Server 2012 exam with real questions and answers and begin to learn Microsoft 70 410 study guide pdf with a classic professional.

2017 NEW RECOMMEND

Free VCE & PDF File for Microsoft 70-410 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on:
http://www.certleader.com/70-410-dumps.html

Q171. – (Topic 3) 

Your infrastructure divided in 2 sites. You have a forest root domain and child domain. There is only one DC on site 2 with no FSMO roles. The link goes down to site 2 and no users can log on. What FSMO roles you need on to restore the access? 

A. Infrastructure master 

B. RID master 

C. Domain Naming master 

D. PDC Emulator 

Answer:

Explanation: 

D. The PDC emulator is used as a reference DC to double-check incorrect passwords and it also receives new password changes. PDC Emulator is the most complicated and least understood role, for it runs a diverse range of critical tasks. It is a domain-specific role, so exists in the forest root domain and every child domain. Password changes and account lockouts are immediately processed at the PDC Emulator for a domain, to ensure such changes do not prevent a user logging on as a result of multi-master replication delays, such as across Active Directory sites. 

Q172. – (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

Server2 establishes an IPSec connection to Server1. 

You need to view which authentication method was used to establish the initial IPSec connection. 

What should you do? 

A. From Windows Firewall with Advanced Security, view the quick mode security association. 

B. From Event Viewer, search the Application Log for events that have an ID of 1704. 

C. From Event Viewer, search the Security Log for events that have an ID of 4672. 

D. From Windows Firewall with Advanced Security, view the main mode security association. 

Answer:

Explanation: 

Main mode negotiation establishes a secure channel between two computers by determining a set of cryptographic protection suites, exchanging keying material to establish a shared secret key, and authenticating computer and user identities. A security association (SA) is the information maintained about that secure channel on the local computer so that it can use the information for future network traffic to the remote computer. You can monitor main mode SAs for information like which peers are currently connected to this computer and which protection suite was used to form the SA. To get to this view In the Windows Firewall with Advanced Security MMC snap-in, expand Monitoring, expand Security Associations, and then click Main Mode. The following information is available in the table view of all main mode SAs. To see the information for a single main mode SA, double-click the SA in the list. Main mode SA information You can add, remove, reorder, and sort by these columns in the Results pane: Local Address: The local computer IP address. Remote Address: The remote computer or peer IP address. 1st Authentication Method: The authentication method used to create the SA. 1st Authentication Local ID: The authenticated identity of the local computer used in first authentication. 1st Authentication Remote ID: The authenticated identity of the remote computer used in first authentication. 

2nd Authentication Method: The authentication method used in the SA. 

2nd Authentication Local ID: The authenticated identity of the local computer used in 

second authentication. 

2nd Authentication Remote ID: The authenticated identity of the remote computer used in 

second authentication. 

Encryption: The encryption method used by the SA to secure quick mode key exchanges. 

Integrity: The data integrity method used by the SA to secure quick mode key exchanges. 

Key Exchange: The Diffie-Hellman group used to create the main mode SA. 

: http://technet.microsoft.com/en-us/library/dd448497(v=ws.10).aspx 

Q173. – (Topic 1) 

Your network contains an Active Directory domain named contoso.com. You have a Group Policy object (GPO) named GP1 that is linked to the domain. GP1 contains a software restriction policy that blocks an application named App1. 

You have a workgroup computer named Computer1 that runs Windows 8. A local Group Policy on Computer1 contains an application control policy that allows App1. 

You join Computer1 to the domain. 

You need to prevent App1 from running on Computer1. 

What should you do? 

A. From Computer1, run gpupdate/force. 

B. From Group Policy Management, add an application control policy to GP1. 

C. From Group Policy Management, enable the Enforced option on GP1. 

D. In the local Group Policy of Computer1, configure a software restriction policy. 

Answer:

Explanation: 

AppLocker policies take precedence over policies generated by SRP on computers that are 

running an operating system that supports AppLocker. 

AppLocker policies in the GPO are applied, and they supersede the policies generated by 

SRP in the GPO and local AppLocker policies or policies generated by SRP. 

Q174. HOTSPOT – (Topic 2) 

Your network contains an Active Directory domain named corp.contoso.com. The domain contains a domain controller named DC1. 

When you run ping dc1.corp.contoso.com, you receive the result as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that DC1 can respond to the Ping command. 

Which rule should you modify? 

To answer, select the appropriate rule in the answer area. 

Answer: 

Q175. – (Topic 3) 

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. 

You plan to deploy a child domain for contoso.com in Microsoft Azure. 

To the Azure subscription, you add several virtual machines that have a Server Core installation of Windows Server 2012 R2. 

You need to create the new domain on one of the virtual machines. 

Which tool should you use? 

A. the ntdsutil command 

B. the Set-ADDomain cmdlet 

C. the Install-ADDSDomain cmdlet 

D. the dsadd command 

E. the dsamain command 

F. the dsmgmt command 

G. the net user command 

H. the Set-ADForest cmdlet 

Answer:

Explanation: The Install-ADDSDomain cmdlet installs a new Active Directory domain configuration. 

https://technet.microsoft.com/en-us/library/hh974722(v=wps.630).aspx 

Q176. – (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy. 

You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. 

You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent Server1 from attempting to resolve Internet host names for the client computers. 

What should you do on Server1? 

A. Create a primary zone named “.”. 

B. Configure the Security settings of the contoso.com zone. 

C. Create a zone delegation for GlobalNames.contoso.com. 

D. Create a stub zone named “root”. 

Answer:

Explanation: 

When you install DNS on a Windows server that does not have a connection to the Internet, the zone for the domain is created and a root zone, also known as a dot zone, is also created. This root zone may prevent access to the Internet for DNS and for clients of the DNS. If there is a root zone, there are no other zones other than those that are listed with DNS, and you cannot configure forwarders or root hint servers. Root domain This is the top of the tree, representing an unnamed level; it is sometimes shown as two empty quotation marks (“”), indicating a null value. When used in a DNS domain name, it is stated by a trailing period (.) to designate that the name is located at the root or highest level of the domain hierarchy. In this instance, the DNS domain name is considered to be complete and points to an exact location in the tree of names. Names stated this way are called fully qualified domain names (FQDNs). DNS Domain Name Hierarchy: 

Q177. HOTSPOT – (Topic 1) 

Your network contains an Active Directory domain named adatum.com. 

You create an account for a temporary employee named User1. 

You need to ensure that User1 can log on to the domain only between 08:00 and 18:00 

from a client computer named Computer1. 

From which tab should you perform the configuration? 

To answer, select the appropriate tab in the answer area. 

Answer: 

Q178. – (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

Contoso.com has a server, named ENSUREPASS-SR07, which has two physical disks installed. The C: drive hosts the boot partition, while the D: drive is not being used. Both disks are online. 

You have received instructions to create a virtual machine on ENSUREPASS-SR07. Subsequent to creating the virtual machine, you have to connect the D: drive to the virtual machine. 

Which of the following is TRUE with regards to connecting a physical disk to a virtual machine? 

A. The physical disk should not be online. 

B. The physical disk should be uninstalled and re-installed. 

C. The physical disk should be configured as a striped disk. 

D. The physical disk should be configured as a mirrored disk. 

Answer:

Explanation: 

Your virtual machines can also be connected to physical hard disks on the virtualization server virtual hard disks. (This is sometimes referred to as having a “pass-through” disk connected to a virtual machine.) The physical hard disk that you connect to a virtual machine can also be a network-attached disk, like a logical unit number (LUN) in a storage area network (SAN). A common example is an iSCSI LUN that has been mapped to the virtualization server by using Microsoft iSCSI Initiator. Because the virtualization server sees network-attached storage as local disks, the iSCSI LUN can be connected to a virtual machine. The most important limitation about having a physical hard disk connected to a virtual machine is that it cannot be connected to the virtualization server or to other virtual machines at the same time. The virtual machine must have exclusive access to the physical hard disk. Pass-through Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-Vserver perspective. 

Q179. – (Topic 3) 

You have a server named Server1 that runs a full installation of Windows Server 2012 R2. 

You need to uninstall the graphical user interface (GUI) on Server1. You must achieve this goal by using the minimum amount of Administrative effort. What should you do? 

A. Reinstall Windows Server 2012 R2 on the server. 

B. From Server Manager, uninstall the User Interfaces and Infrastructure feature. 

C. From Windows PowerShell, run Uninstall-WindowsFeature PowerShell-ISE 

D. From Windows PowerShell, run Uninstall-WindowsFeature Desktop-Experience. 

Answer:

Q180. – (Topic 3) 

Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Hyper-V server role installed. You have a virtual machine named VM1. VM1 has a snapshot. You need to modify the Snapshot File Location of VM1. 

What should you do first? 

A. Copy the snapshot file 

B. Pause VM1 

C. Shut down VM1 

D. Delete the snapshot 

Answer:

Explanation: 

Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located in the same folder as the virtual machine by default. In Hyper-V in Windows Server 2008 R2, the files usually are located in the same folder as the virtual hard disk. The following exceptions affect the location of the snapshot data files: If the virtual machine was imported with snapshots, they are stored in their own folder. If the virtual machine has no snapshots and you configure the virtual machine snapshot setting, all snapshots you take afterwards will be stored in the folder you specify. Caution Do not delete .avhd files directly from the storage location. Instead, use Hyper-V Manager to select the virtual machine, and then delete the snapshots from the snapshot tree. Do not expand a virtual hard disk when it is used in a virtual machine that has snapshots. Doing so will make the snapshots unusable. http://technet.microsoft.com/en-us/library/dd560637(v=ws.10).aspx 

Certleader Dumps
Certleader is a company specialized on providing high quality IT exam materials and fully committed to assist our respected clients crack any IT certification tests on their 1st efforts.