Surprising mcsa 70 410

Your success in Microsoft 70 410 study guide pdf is our sole target and we develop all our 70 410 vce braindumps in a way that facilitates the attainment of this target. Not only is our mcp 70 410 study material the best you can find, it is also the most detailed and the most updated. microsoft 70 410 Practice Exams for Microsoft Windows Server microsoft 70 410 exam are written to the highest standards of technical accuracy.

2018 NEW RECOMMEND

Free VCE & PDF File for Microsoft 70-410 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-410-dumps.html

Q1. – (Topic 3) 

Server 1 and Server2 host a load-balanced Application pool named AppPool1. You need to ensure thatAppPool1 uses a group Managed Service Account as its identity. Which 3 actions should you perform? 

A. Install a domain controller that runs Windows Server 2012 R2, Run the New- ADService Accountcmdlet, Modify the settings of AppPool1. 

B. Configure the Security settings of the contoso.com zone. 

C. Add a second legacy network adapter, and then run the Set-VMNetwork Adoptercmdlet. 

D. From Windows Powershell, run Get-DNS ServerDiagnostics. 

Answer:

Explanation: 

For the application pool to use a group Managed Service account as its identity you will have to make sure that there is a domain controller where you can add the account and then modify the application pool accordingly. Thus you should use the New- ADService Account on the domain controller that will create a new Active Directory service account. 

Q2. – (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing Group Policy preference. 

Which of the following is TRUE with regards to Group Policy preference? 

A. It supports applications and operating system features that are not compatible with Group Policy 

B. It does not support item-level targeting. 

C. It is the same as Group Policy filtering. 

D. It does not cause the application or operating system feature to disable the user interface for the settings they configure. 

Answer: A,D 

Q3. – (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following  table. 

You plan to schedule a complete backup of Server1 by using Windows Server Backup. 

You need to ensure that the state of VM1 is saved before the backup starts. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. resource metering 

D. virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

The Integration Services settings on virtual machines include services such as operating system shutdown, time synchronization, data exchange, Heartbeat, and Backup (volume snapshot services). This snapshot will ensure that the state of VM1 is saved prior to backup. 

References: http://msdn.microsoft.com/en-us/library/dd405549(v=vs.85).aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 

Q4. – (Topic 1) 

Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an organizational unit (OU) named AllComputers. Client computers run either Windows 7 or Windows 8. 

You create a Group Policy object (GPO) named GP1. 

You link GP1 to the AllComputers OU. 

You need to ensure that GP1 applies only to computers that have more than 8 GB of 

memory. 

What should you configure? 

A. The Security settings of GP1 

B. The Block Inheritance option for AllComputers 

C. The Security settings of AllComputers 

D. The WMI filter for GP1 

Answer:

Explanation: 

Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group Policy objects (GPOs) based on attributes of the target computer. When a GPO that is linked to a WMI filter is applied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates to false, the GPO is not applied (except if the client computer is running Windows Server, in which case the filter is ignored and the GPO is always applied). If the WMI filter evaluates to true, the GPO is applied. WMI filters, like GPOs, are stored on a per-domain basis. A WMI filter and the GPO it is linked to must be in the same domain. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10: Implementing Group Policy, p.470, 482 http://technet.microsoft.com/en-us/library/jj134176 WMI filtering using GPMC 

Q5. – (Topic 3) 

You have a server named Server1. Server1 runs Windows Server 2012 R2 and is located in a perimeter network. 

You need to configure a custom connection security rule on Server1. The rule must encrypt network communications across the Internet to a computer at another company. 

Which authentication method should you configure in the connection security rule? 

A. Advanced 

B. User (Kerberos V5) 

C. Default 

D. Computer (Kerberos V5) 

E. Computer and user (Kerberos V5) 

Answer:

Explanation: 

You need to make use of Advanced authentication method to ensure that communication is 

encrypted over the network to the other company from your custom connection security 

rule on Server1. 

References: 

http://technet.microsoft.com/en-us/library/bb742516.aspx 

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 8: File 

Services and Storage, p. 428 

Q6. DRAG DROP – (Topic 3) 

You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 hosts a virtual machine named VM1. VM1 is currently running. VM1 has a snapshot that was created two weeks ago. 

You plan to use Server2 to perform a forensic analysis of the contents of the disk of VM1 from two weeks ago. 

You need to ensure that you can view the contents of the disk of VM1 from two weeks ago from Server2. 

Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 

Q7. – (Topic 2) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. 

Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. 

VM1 has several snapshots. 

You need to modify the snapshot file location of VM1. 

What should you do? 

A. Delete the existing snapshots, and then modify the settings of VM1. 

B. Right-click VM1, and then click Move. .. 

C. Right-click VM1, and then click Export… 

D. PauseVM1, and then modify the settings of VM1. 

Answer:

Explanation: 

You will need to navigate to the Hyper-V Management 

snap-in (C:\\ProgramData\\Microsoft\\Windows\\Hyper-V) and from there access the Snapshot file Location tab where you can change the settings for the VM1 snapshot file location. However, since there are already several snapshots in existence, you will need to delete them first because you will not be able to change the location of the snapshot file while there is an existing snapshot. 

You need to modify the snapshot file location of VM1. 

Q8. – (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

You create a security template named Template1 by using the security template snap-in. 

You need to apply Template1 to Server2. 

Which tool should you use? 

A. Security Templates 

B. Computer Management 

C. Security Configuration and Analysis 

D. System Configuration 

Answer:

Explanation: 

A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer. 

A. Template was already created – Provide standard security option to use in security policies 

B. Needs to be applied at the GP level 

C. Security templates are inactive until imported into a Group Policy object or the SecurityConfiguration and Analysis 

D. Tool to ID windows problems 

Q9. HOTSPOT – (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server that runs Windows Server 2012 R2. 

You perform a Server Core Installation of Windows Server 2012 R2 on a new server. 

You need to ensure that you can add the new server to Server Manager on Server1. 

What should you configure on the new server? To answer, select the appropriate setting in 

the answer area. 

Answer: 

Q10. – (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

On a server named Server2, you perform a Server Core Installation of Windows Server 2012 R2. You join Server2 to the contoso.com domain. 

You need to ensure that you can manage Server2 by using the Computer Management console on Server1. 

What should you do on Server2? 

A. Install Windows Management Framework. 

B. Run sconfig.exe and configure Remote Server Administration Tools (RSAT). 

C. Install Remote Server Administration Tools (RSAT). 

D. Run sconfig.exe and configure remote management. 

Answer:

Explanation: 

In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must be a member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode. 

References: http://technet.microsoft.com/en-us/library/jj647766.aspx Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80