Quick Guide: 70 410 pdf

We provide real 70 410 practice exam exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft mcp 70 410 Exam quickly & easily. The 70 410 dumps pdf PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 70 410 study guide pdf dumps pdf and vce product and material, you can easily pass the vce 70 410 exam.


The article at Testaimer.com going over http://www.testaimer.com/70-410-test is very comprehensive.

Q181. - (Topic 2) 

You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the DHCP Server server role installed. 

You need to create an IPv6 reservation for Server2. 

Which two values should you obtain from Server2? (Each correct answer presents part of the solution. Choose two.) 

A. the hardware ID 

B. the DHCPv6 unique identifier 

C. the DHCPv6 identity association ID 

D. the SMSBIOS GUID 

E. the MAC address 

Answer: B,C 

Explanation: 

The Add-DhcpServerv6Reservation cmdlet reserves a specified IPv6 address for the client identified by the specified Dynamic Host Configuration Protocol (DHCP) v6 unique identifier (ID) (DUID) and identity association ID (IAID). 


Q182. - (Topic 3) 

You have a server named Server1. Server1 runs Windows Server 2012 R2 and is located in a perimeter network. 

You need to configure a custom connection security rule on Server1. The rule must encrypt network communications across the Internet to a computer at another company. 

Which authentication method should you configure in the connection security rule? 

A. Advanced 

B. User (Kerberos V5) 

C. Default 

D. Computer (Kerberos V5) 

E. Computer and user (Kerberos V5) 

Answer:

Explanation: 

You need to make use of Advanced authentication method to ensure that communication is 

encrypted over the network to the other company from your custom connection security 

rule on Server1. 

References: 

http://technet.microsoft.com/en-us/library/bb742516.aspx 

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 8: File 

Services and Storage, p. 428 


Q183. HOTSPOT - (Topic 3) 

You have a Group Policy object (GPO) named Server Audit Policy. The settings of the GPO are shown in the Settings exhibit. (Click the Exhibit button.) 

The scope of the GPO is shown in the Scope exhibit. (Click the Exhibit button.) 

The domain contains a group named Group1. The membership of Group1 is shown in the Group1 exhibit. (Click the Exhibit button.) 

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point. 

Answer: 


Q184. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

Contoso.com has its headquarters in London, and several widespread satellite offices. When Contoso.com releases a new written policy stating that the graphical user interface (GUI) should not be installed on any servers deployed to Contoso.com’s satellite offices. 

It is reported that a server in one of the satellite offices are not compliant with the new written policy. 

You are required to remedy the situation, while using the least amount of user interaction. 

Which of the following actions should you take? 

A. You should consider uninstalling the User Interfaces and Infrastructure feature using a PowerShell cmdlet. 

B. You should consider uninstalling the User Interfaces and Infrastructure feature via TS Manager. 

C. You should consider uninstalling the User Interfaces and Infrastructure feature via Server Manager. 

D. You should consider uninstalling the User Interfaces and Infrastructure feature using the Dsrm.exe command from the command prompt. 

Answer:

Explanation: 

Although you could utilize a PowerShell cmdlet, it would require you to either log on to the remote machine to enable PowerShell remoting first (or to use the local PowerShell console). Using Server Manager, you could just add the server (if it wasn't already added) and use the "Remove Roles and Features" applet. 


Q185. - (Topic 3) 

You have a laptop named Computer1. Computer1 runs Windows 8 Enterprise. 

Computer1 has a wired network adapter and a wireless network adapter. Computer1 connects to a wireless network named Network1. 

For testing purposes, you install Windows Server 2012 R2 on Computer1 as a second operating system. You install the drivers for the wireless network adapter. 

You need to ensure that you can connect to Network1 from Windows Server 2012 R2. 

What should you do? 

A. Restart the WLAN AutoConfig service. 

B. From a local Group Policy object (GPO), configure the Wireless Network (IEEE 802.11) Policies settings. 

C. From a local Group Policy object (GPO), configure the settings of Windows Connection Manager. 

D. From Server Manager, install the Wireless LAN Service feature. 

Answer:

Explanation: 

The Wireless LAN service is a feature in Windows Server. 2012 R2 that you can use to enable the wireless WLAN AutoConfig service, and to configure the WLAN AutoConfig service for automatic startup. Once enabled, the WLAN AutoConfig service dynamically selects which wireless network the computer automatically connects to, and configures the necessary settings on the wireless network adapter. This includes automatically selecting and connecting to a more preferred wireless network when one becomes available. To enable the Wireless LAN Service In Server Manager Dashboard, click Manage, and then click Add Roles and Features. The Add Roles and Features Wizard opens. Click Next. In Select installation type, select Role-based or feature-based installation, and then click Next. In Select destination server, enable Select a server from the server pool, and in Server Pool, select the server for which you want to enable the Wireless LAN Service, and then click Next. In Select server roles, click Next. In Select Server features, in Features, select Wireless LAN Service, and then click Next. 

: http://technet.microsoft.com/en-us/library/hh994698.aspx 


Q186. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. One of the domain controllers is named DC1. 

The network contains a member server named Server1 that runs Windows Server 2012 R2. 

You need to promote Server1 to a domain controller by using install from media (IFM). 

What should you do first? 

A. Create a system state backup of DC1. 

B. Create IFM media on DC1. 

C. Upgrade DC1 to Windows Server 2012 R2. 

D. Run the Active Directory Domain Services Configuration Wizard on Server1. 

E. Run the Active Directory Domain Services Installation Wizard on DC1. 

Answer:

Explanation: 

A. Backs up system state data to be restored 

C. Only valid option. You could install ADDS role on Server 1 and run ADDS configuration wizard and add DC to existing domain 

D. Need to add ADDS role first 

E. Wrong server Installation from media does not work across different operating system versions. In other words, you must use a Windows Server 2012 R2 domain controller to generate installation media to use for another Windows Server 2012 R2 domain controller installation. We can use the Install from media (IFM) option to install an Additional Domain Controller in an existing domain is the best option such as a branch office scenario where network is slow, unreliable and costly. IFM will minimize replication traffic during the installation because it uses restored backup files to populate the AD DS database. This will significantly reduce the amount of traffic copied over the WAN link. Things to remember: If you are deploying your first Domain Controller in the domain, you cannot use IFM. The OS will need to match the IFM media. (If you create a 2008 R2 IFM, promote a 2008 R2 DC) If you are creating a DC that will be a Global Catalog Server, create your IFM on a Global Catalog Server. 

If you are creating a DC that will be a DNS Server, create your IFM on a DNS Server. If you want to copy the SYSVOL, the DC on which you generate the installation media and the new DC must be at least running Windows Server 2008 with Service Pack 2 or Windows Server 2008 R2. Membership of the Domain Admins group is the minimum required to complete IFM. 


Q187. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that has the DNS Server server role installed. Server1 hosts a primary zone for contoso.com. 

The domain contains a member server named Server2 that is configured to use Server1 as its primary DNS server. 

From Server2, you run nslookup.exe as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that when you run Nslookup, the correct name of the default server is displayed. 

What should you do? 

A. On Server1, create a reverse lookup zone. 

B. On Server1, modify the Security settings of the contoso.com zone. 

C. From Advanced TCP/IP Settings on Server1, add contoso.com to the DNS suffix list. 

D. From Advanced TCP/IP Settings on Server2, add contoso.com to the DNS suffix list. 

Answer:

Explanation: 

Make sure that a reverse lookup zone that is authoritative for the PTR resource record 

exists. 

PTR records contain the information that is required for the server to perform reverse name 

lookups. 

References: 

http://technet.microsoft.com/en-us/library/cc961417.aspx 

Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: 

Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6 

addressing, p.246 


Q188. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. All domain 

controllers run Windows Server 2012 R2. 

All servers are configured to enforce AppLocker policies. 

You install a server named Server1. 

On Server1, you install an application named App1.exe in a folder located on C:App1. 

You have two domain groups named Group1 and Group2.A user named User1 is a 

member of Group1 and Group2. 

You create a Group Policy object (GPO) named GPO1. You link GPO1 to contoso.com. 

You create the executable rules as shown in the exhibit by using the Create Executable Rules wizard. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. 

Answer: 


Q189. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees. 

You create a Group Policy object (GPO) named GP1. You link GP1 to the Employees OU. 

You need to ensure that GP1 does not apply to the members of a group named Managers. 

What should you configure? 

A. The Security settings of Employees 

B. The WMI filter for GP1 

C. The Block Inheritance option for Employees 

D. The Security settings of GP1 

Answer:

Explanation: 

A. Wrong Group 

B. Windows Management Instrumentation (WMI) filters allow you to dynamically determine 

the scope of Group Policy objects (GPOs) based on attributes of the target computer. 

C. Blocking inheritance prevents Group Policy objects (GPOs) that are linked to higher 

sites, domains, or organizational units from being automatically inherited by the child-level. 

D. Set Managers to – Members of this security group are exempt from this Group Policy 

object. 

Security settings. 

You use the Security Settings extension to set security options for computers and users 

within the scope of a Group Policy object. You can define local computer, domain, and network security settings. Figure below shows an example of the security settings that allow everyone to be affected by this GPO except the members of the Management group, who were explicitly denied permission to the GPO by setting the Apply Group Policy ACE to Deny. Note that if a member of the Management group were also a member of a group that had an explicit Allow setting for the Apply Group Policy ACE, the Deny would take precedence and the GPO would not affect the user. 


Q190. HOTSPOT - (Topic 2) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 hosts 50 virtual machines. 

You need to create a script to list all of the virtual machines that have checkpoints and support Secure Boot. 

What should you do? To answer, select the appropriate options in the answer area. 

Answer: