70-410 Premium Bundle

70-410 Premium Bundle

Installing and Configuring Windows Server 2012 Certification Exam

4.5 
(1875 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
December 3, 2024Last update

Microsoft 70-410 Free Practice Questions

Q1. - (Topic 3) 

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. 

You plan to deploy a child domain for contoso.com in Microsoft Azure. 

To the Azure subscription, you add several virtual machines that have a Server Core installation of Windows Server 2012 R2. 

You need to create the new domain on one of the virtual machines. 

Which tool should you use? 

A. the ntdsutil command 

B. the Set-ADDomain cmdlet 

C. the Install-ADDSDomain cmdlet 

D. the dsadd command 

E. the dsamain command 

F. the dsmgmt command 

G. the net user command 

H. the Set-ADForest cmdlet 

Answer:

Explanation: The Install-ADDSDomain cmdlet installs a new Active Directory domain configuration. 

https://technet.microsoft.com/en-us/library/hh974722(v=wps.630).aspx 

Q2. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. 

You log on to Server1. 

You need to retrieve a list of the active TCP connections on Server2. 

Which command should you run from Server1? 

A. winrm get server2 

B. netstat> server2 

C. dsquery * -scope base -attrip, server2 

D. winrs -r:server2 netstat 

Answer:

Explanation: 

This command line tool enables administrators to remotely execute most Cmd.exe commands using the WSManagement protocol. 

Q3. DRAG DROP - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. 

On Server1, you create a share named Documents. The Share permission for the Documents share is configured as shown in the following table. 

The NTFS permission for the Documents share is configured as shown in the following table. 

You need to configure the Share and NTFS permissions for the Documents share. 

The permissions must meet the following requirements: 

. Ensure that the members of a group named Group1 can read files and run programs in Documents. . Ensure that the members of Group1 can modify the permissions on only their own 

files in Documents. . Ensure that the members of Group1 can create folders and files in Documents. . Minimize the number of permissions assigned to users and groups. 

How should you configure the permissions? 

To answer, drag the appropriate permission to the correct location. Each permission may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q4. HOTSPOT - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All client 

computers run Windows 8. 

An administrator creates an application control policy and links the policy to an 

organizational unit (OU) named OU1. The application control policy contains several deny 

rules. The deny rules apply to the Everyone group. 

You need to prevent users from running the denied application. 

What should you configure? 

To answer, select the appropriate object in the answer area. 

Answer:  

Q5. HOTSPOT - (Topic 2) 

You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the 

Windows Deployment Services (WDS) server role installed. 

You install the DHCP Server server role on Server1. 

You need to ensure that Server1 can respond to DHCP clients and WDS clients. 

What should you configure for the DHCP service and the WDS service? 

To answer, configure the appropriate options in the answer area. 

Answer:  

Q6. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains 500 servers that run Windows Server 2012 R2. 

You have a written security policy that states the following: 

Only required ports must be open on the servers. 

All of the servers must have Windows Firewall enabled. 

Client computers used by administrators must be allowed to access all of the ports 

on all of the servers. 

Client computers used by the administrators must be authenticated before the 

client computers can access the servers. 

You have a client computer named Computer1 that runs Windows 8. 

... . 

You need to ensure that you can use Computer1 to access all of the ports on all of the servers successfully. The solution must adhere to the security policy. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. On Computer1, create a connection security rule. 

B. On all of the servers, create an outbound rule and select the Allow the connection if it is secure option. 

C. On all of the servers, create an inbound rule and select the Allow the connection if it is secure option. 

D. On Computer1, create an inbound rule and select the Allow the connection if it is secure option. 

E. On Computer1, create an outbound rule and select the Allow the connection if it is secure option. 

F. On all of the servers, create a connection security rule. 

Answer: A,C,F 

Explanation: 

Unlike firewall rules, which operate unilaterally, connection security rules require that both 

communicating computers have a policy with connection security rules or another 

compatible IPsec policy. 

Traffic that matches a firewall rule that uses the Allow connection if it is secure setting 

bypasses Windows Firewall. The rule can filter the traffic by IP address, port, or protocol. 

This method is supported on Windows Vista or Windows Server 2008. 

References: 

http://technet.microsoft.com/en-us/library/cc772021.aspx 

http://technet.microsoft.com/en-us/library/cc753463.aspx 

Q7. - (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following  table. 

You plan to schedule a complete backup of Server1 by using Windows Server Backup. 

You need to ensure that the state of VM1 is saved before the backup starts. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. resource metering 

D. virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

The Integration Services settings on virtual machines include services such as operating system shutdown, time synchronization, data exchange, Heartbeat, and Backup (volume snapshot services). This snapshot will ensure that the state of VM1 is saved prior to backup. 

References: http://msdn.microsoft.com/en-us/library/dd405549(v=vs.85).aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 

Q8. HOTSPOT - (Topic 3) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server2 has the Windows Deployment Services server role installed. 

On Server1, you have a virtual machine named VM1. 

You plan to deploy an image to VM1 by using Windows Deployment Services (WDS). 

You need to ensure that VM1 can connect to Server1 by using PXE. 

Which settings should you configure on VM1? To answer, select the appropriate settings in 

the answer area. 

Answer:  

Q9. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

You need to add a user named User1 to a group named ServerAdmins. 

What command should you run? To answer, select the appropriate options in the answer area. 

Answer:  

Q10. - (Topic 3) 

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. Server1 is configured to obtain an IPv4 address by using DHCP. You need to configure the IPv4 settings of the network connection on Server1 as follows: 

IP address: 10.1.1.1 

Subnet mask: 255.255.240.0 

Default gateway: 10.1.1.254 

What should you run? 

A. Set-NetlPInterface 

B. netcfg.exe 

C. New-NetlPAddress 

D. msconfig.exe 

Answer:

Q11. - (Topic 3) 

Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2. 

Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. 

You take a snapshot of VM1, and then you install an application on VM1. 

You verify that the application runs properly. 

You need to ensure that the current state of VM1 is contained in a single virtual hard disk file. The solution must minimize the amount of downtime on VM1. 

What should you do? 

A. From Hyper-V Manager, delete the snapshot. 

B. From a command prompt, run dism.exe and specify the /commit-image parameter. 

C. From a command prompt, run dism.exe and specify the /delete-image parameter. 

D. From Hyper-V Manager, inspect the virtual hard disk. 

Answer:

Explanation: 

Virtual machine snapshots are file-based snapshots of the state, disk data, and configuration of a virtualmachine at a specific point in time. You can take multiple snapshots of a virtual machine, even while it is running. You can then revert the virtual machine to any of the previous states by App1ying a snapshot to the virtualmachine. Taking a snapshot of a VM is to in essence freeze the current state and make it a parent disk based on currentstate, and at the same time create a child disk to capture all subsequent changes. – See more at: Snapshots require adequate storage space. Snapshots are stored as .avhd files in the same location at thevirtual hard disk. Taking multiple snapshots can quickly consume a large amount of storage space. When you use Hyper-V Manager to delete a snapshot, the snapshot is removed from the snapshot treebut the .avhd file is not deleted until you turn off the virtual machine. 

Q12. - (Topic 3) 

You have external virtual switch with srv-io enabled with 10 Virtual Machines on it. You need to make the Virtual Machines able to talk only to each other. 

A. remove the vswitch and recreate it as private. 

B. add new vswitch 

C. remove vswitch and recreate it as public 

D. adjust srv-io settings 

Answer:

Explanation: 

You cannot change the settings of a vswitch with SR-IOV enabled, so you must delete it and recreate it. 

Q13. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers. The domain controllers are configured as shown in the following table. 

In the perimeter network, you install a new server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. You need to join Server1 to the contoso.com domain. What should you use? 

A. The New-ADComputer cmdlet 

B. The djoin.exe command 

C. The dsadd.exe command 

D. The Add-Computer cmdlet 

Answer:

Q14. - (Topic 3) 

Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts. Servers are restarted only occasionally. 

You need to identify which servers were restarted during the last two days. 

What should you do? 

A. Run dsquery computer and specify the -stalepwd parameter 

B. Run dsquery server and specify the -o parameter. 

C. Run Get-ADComputer and specify the lastlogon property. 

D. Run Get-ADComputer and specify the SearchScope parameter 

Answer:

Q15. - (Topic 3) 

You have a DNS server named DNS1 that runs windows server 2012 R2. 

DNS1 is used to resolve the names of internet resources by using several DNS forwarders. 

You need to prevent DNS1 from performing iterative queries if the DNS forwarders are unable to reslove the queries. 

Which cmdlet should you use? 

A. Remove-DNSServerRootHint 

B. Set-DNSServerPrimaryZone 

C. Ser-DNSServerGlobalNameZone 

D. Unregister-DNSserverDrirectoryPartition 

Answer: