♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-410 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: http://www.exam.com/70-410-dumps.html


Proper study guides for Down to date Microsoft Installing and Configuring Windows Server 2012 certified begins with Microsoft 70 410 dumps pdf preparation products which designed to deliver the Precise mcsa 70 410 questions by making you pass the 70 410 study guide pdf test at your first time. Try the free 70 410 vce demo right now.

P.S. Precise 70-410 free samples are available on Google Drive, GET MORE: https://drive.google.com/open?id=1kvP726ODa9zZg32kCD3kLoR5Zt7aQQnX


New Microsoft 70-410 Exam Dumps Collection (Question 1 - Question 10)

Question No: 1

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.

You need to add a graphical user interface (GUI) to Server1. Which tool should you use?

A. The setup.exe command

B. The dism.exe command

C. The imagex.exe command

D. The Add-WindowsPackage cmdlet

Answer: B

Explanation:

The DISM command is called by the Add-WindowsFeature command. Here is the systax for DISM:

Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:ServerGui- Shell /featurename:Server-Gui-Mgmt


Question No: 2

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. Client computers run either Windows 7 or Windows 8.

All of the computer accounts of the client computers reside in an organizational unit (OU) named Clients. A Group Policy object (GPO) named GPO1 is linked to the Clients OU. All of the client computers use a DNS server named Server1.

You configure a server named Server2 as an ISATAP router. You add a host (A) record for ISATAP to the contoso.com DNS zone.

You need to ensure that the client computers locate the ISATAP router. What should you do?

A. Run the Set-DnsServerGlobalQueryBlockList cmdlet on Server1.

B. Configure the Network Options Group Policy preference of GPO1.

C. Run the Add-DnsServerResourceRecord cmdlet on Server1.

D. Configure the DNS Client Group Policy setting of GPO1.

Answer: A

Explanation:

The Set-DnsServerGlobalQueryBlockList command will change the settings of a global query block list which you can use to ensure that client computers locate the ISATAP router.

Windows Server 2008 introduced a new feature, called u201cGlobal Query Block listu201d, which prevents some arbitrary machine from registering the DNS name of WPAD. This is a good security feature, as it prevents someone from just joining your network, and setting himself up as a proxy. The dynamic update feature of Domain Name System (DNS) makes it possible for DNS client computers to register and dynamically update their resource records with a DNS server whenever a client changes its network address or host name. This reduces the need for manual administration of zone records. This convenience comes at a cost, however, because any authorized client can register any unused host name, even a host name that might have special significance for certain Applications. This can allow a malicious user to take over a special name and divert certain types of network traffic to that useru2019s computer. Two commonly deployed protocols are particularly vulnerable to this type of takeover: the Web Proxy Automatic Discovery Protocol (WPAD) and the Intra-site Automatic Tunnel Addressing Protocol (ISATAP). Even if a network does not deploy these protocols, clients that are configured to use them are vulnerable to the takeover that DNS dynamic update enables. Most commonly, ISATAP hosts construct their PRLs by using DNS to locate a host named isatap on the local domain. For example, if the local domain is corp.contoso.com, an ISATAP-enabled host queries DNS to obtain the IPv4 address of a host named isatap.corp.contoso.com. In its default configuration, the Windows Server 2008 DNS Server service maintains a list of names that, in effect, it ignores when it receives a query to resolve the name in any zone for which the server is authoritative. Consequently, a malicious user can spoof an ISATAP router in much the same way as a malicious user can spoof a WPAD server: A malicious user can use dynamic update to register the useru2019s own computer as a counterfeit ISATAP router and then divert traffic between ISATAP-enabled computers on the network. The initial contents of the blocktypes of resource records. Use different switches for different record types. By using this cmdlet, you can list depend on whether WPAD or ISATAP is already deployed when you add the DNS server role to an existing Windows Server 2008 deployment or when you upgrade an earlier version of Windows Server running the DNS Server service. Add- DnsServerResourceRecord u2013 The Add-DnsServerResourceRecordcmdlet adds a resource record for a Domain Name System (DNS) zone on a DNS server. You can add different change a value for a record, configure whether a record has a time stamp, whether any authenticated user can update a record with the same owner name, and change lookup timeout values, Windows Internet Name Service (WINS) cache settings, and replication settings. Set-DnsServerGlobalQueryBlockList u2013 The Set- DnsServerGlobalQueryBlockListcmdlet changes settings of a global query block list on a Domain Name System (DNS) server. This cmdlet replaces all names in the list of names that the DNS server does not resolve with the names that you specify. If you need the DNS server to resolve names such as ISATAP and WPAD, remove these names from the list. Web Proxy Automatic Discovery Protocol (WPAD) and Intra-site Automatic Tunnel Addressing Protocol (ISATAP) are two commonly deployed protocols that are particularly vulnerable to hijacking.

References:

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256 http://technet.microsoft.com/en-us/library/jj649942(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj649876(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj649874.aspx

http://technet.microsoft.com/en-us/library/jj649909.aspx


Question No: 3

Your network contains a Windows Server 2012 R2 image named Server12.wim.Server12.wim contains the images shown in the following table.

You need to enable the Windows Server Migration Tools feature in the Windows Server 2012 R2 Datacenter image.

You want to achieve this goal by using the minimum amount of administrative effort. Which command should you run first?

A. dism.exe /image:c:\\Server12.wim /enable-feature /featurename:servermigration

B. dism.exe /mount-wim /wimfile:c:\\Server12.wim /index:4 /mountdir:c:\\mount

C. imagex.exe /capture c: c:\\Server12.wim "windows server 2012 r2 datacenter"

D. imagex.exe /apply c:\\Server12.wim 4 c:\\

Answer: B

Explanation:

This command will mount the image before making any changes. References:

http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx http://technet.microsoft.com/en-us/library/dd744382(v=ws.10).aspx


Question No: 4

Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.

You create a checkpoint of VM1, and then you install an application on VM1. You verify that the application runs properly.

You need to ensure that the current state of VM1 is contained in a single virtual hard disk file.

The solution must minimize the amount of downtime on VM1. What should you do?

A. From a command prompt, run dism.exe and specify the /delete-image parameter.

B. From a command prompt, run dism.exe and specify the /commit-image parameter.

C. From Hyper-V Manager, delete the checkpoint.

D. From Hyper-V Manager, inspect the virtual hard disk.

Answer: C


Question No: 5

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.

You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs on Server1 are under a heavy load.

What should you configure?

A. NUMA topology

B. Resource control

C. resource metering

D. virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Answer: B

Explanation:

:B. Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual machine. Resource control in used in the event where you need to adjust the computing resources of a virtual machine, you can reconfigure the resources to meet the changing needs. You can also specify resource controls to automate how resources are allocated to virtual machines.

References:

http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831410.aspx http://technet.microsoft.com/en-us/library/cc742470.aspx

Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335


Question No: 6

You have a server named Corel that has a Server Core Installation of Windows Server 2012 R2.

Corel has the Hyper-V server role installed. Corel has two network adapters from different third-party hardware vendors.

You need to configure network traffic failover to prevent connectivity loss if a network adapter fails.

What should you use?

A. New-NetSwitchTeam

B. Install-Feature

C. Add-NetSwitchTeamMember

D. Netsh.exe

Answer: A


Question No: 7

You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2 Datacenter.

You have a WIM file that contains the four images of Windows Server 2012 R2 as shown in the Images exhibit. (Click the Exhibit button.)

You review the installed features on Server1 as shown in the Features exhibit. (Click the Exhibit button.)

You need to install the Server Graphical Shell feature on Server1.

Which two possible sources can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A. Index 1

B. Index 2

C. Index 3

D. Index 4

Answer: B,D

Explanation:

These images (since they are Full GUI, not CORE), contain the binaries necessary to install all GUI elements.

When you install Windows Server 2012 R2, you can choose between Server Core Installation and Server with a GUI. The u201cServer with a GUIu201d option is the Windows Server 2012 R2 equivalent of the Full installation option available in Windows Server 2008 R2. The u201cServer Core Installationu201d option reduces the space required on disk, the potential attack surface, and especially the servicing requirements, so we recommend that you choose the Server Core installation unless you have a particular need for the additional user interface elements and graphical management tools that are included in the u201cServer with a GUIu201d option. For this reason, the Server Core installation is now the default. Because you can freely switch between these options at any time later, one approach might be to initially install the Server with a GUI option, use the graphical tools to configure the server, and then later switch to the Server Core Installation option.

Reference: Windows Server Installation Options


Question No: 8

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that runs Windows Server 2012 R2.

On Server1, you create a work folder named Work1.

A user named User1 connects to Work1 from a computer named Computer1.

You need to identify the last time the documents in Work1 were synchronized successfully from Computer1.

What should you do?

A. From Server Manager, review the properties of Computer1.

B. From Windows PowerShell, run the Get-SyncUserSettingscmdlet.

C. From Windows PowerShell, run the Get-SyncSharecmdlet.

D. From Server Manager, review the properties of User1.

Answer: D


Question No: 9

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2 Datacenter.Server1 is located in an isolated network that cannot access the Internet.

On Server1, you install a new virtual machine named VM1.VM1 runs Windows Server 2012 R2 Essentials and connects to a private virtual network.

After 30 days, you discover that VM1 shuts down every 60 minutes.

You need to resolve the issue that causes VM1 to shut down every 60 minutes. What should you do?

A. OnVM1, run slmgr.exe and specify the /ipk parameter.

B. OnServer1, run slmgr.exe and specify the /rearm-sku parameter.

C. Create a new internal virtual network and attach VM1 to the new virtual network.

D. On Server1, run Add-WindowsFeatureVolumeActivation.

Answer: A


Question No: 10

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.

The domain contains a user named User1 and a global security group named Group1. You need to prevent User1 from changing his password. The solution must minimize

administrative effort.

Which cmdlet should you run?

A. Add-AdPrincipalGroupMembership

B. Install-AddsDomainController

C. Install-WindowsFeature

D. Install-AddsDomain

E. Rename-AdObject

F. Set-AdAccountControl

G. Set-AdGroup

H. Set-User

Answer: F

Explanation:

The Set-ADAccountControlcmdlet modifies the user account control (UAC) values for an Active Directory user or computer account. UAC values are represented by cmdlet parameters.

CannotChangePassword

Modifies the ability of an account to change its password. To disallow password change by the account set this to $true. This parameter changes the Boolean value of the CannotChangePassword property of an account.

The following example shows how to specify the PasswordCannotChange parameter.

-CannotChangePassword $false

References:

http://technet.microsoft.com/en-us/library/ee617249.aspx http://technet.microsoft.com/en-us/library/hh974723.aspx http://technet.microsoft.com/en-us/library/hh974722.aspx


Recommend!! Get the Precise 70-410 dumps in VCE and PDF From Examcollection, Welcome to download: http://www.examcollectionuk.com/70-410-vce-download.html (New 496 Q&As Version)