70-410 Premium Bundle

70-410 Premium Bundle

Installing and Configuring Windows Server 2012 Certification Exam

4.5 
(20010 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-410 Free Practice Questions

Q1. - (Topic 1) 

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V 

hosts contain several virtual machines that run Windows Server 2012 R2. 

You install the Network Load Balancing feature on the virtual machines. 

You need to configure the virtual machines to support Network Load Balancing (NLB). 

Which virtual machine settings should you configure? 

A. DHCP guard 

B. Port mirroring 

C. Router guard 

D. MAC address 

Answer:

Explanation: 

http://social.technet.microsoft.com/Forums/windowsserver/en-US/5b3a0a9d-26a2-49ba-bbbe- 29d11fcbb7ce/nlb-on-hyperv?forum=winserverhyperv 

For NLB to be configured you need to enable MAC address spoofing. 

Q2. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed. 

A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge Handshake Authentication Protocol (CHAP) for remote connections. CHAP is enabled on Server1. 

You need to ensure that User1 can connect to Server1 and authenticate to the domain. 

What should you do from Active Directory Users and Computers? 

A. From the properties of User1, select Store password using reversible encryption. 

B. From the properties of Server1, assign the Allowed to Authenticate permission to User1. 

C. From the properties of User1, select Use Kerberos DES encryption types for this account. 

D. From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only). 

Answer:

Explanation: 

The Store password using reversible encryption policy setting provides support for Applications that use protocols that require the user’s password for authentication. Storing encrypted passwords in a way that irreversible means that the encrypted passwords can be decrypted. A knowledgeable attacker who is able to break this encryption can then log on to network resources by using the compromised account. For this reason, never enable Store password using reversible encryption for all users in the domain unless Application requirements outweigh the need to protect password information. If you use the Challenge Handshake Authentication Protocol (CHAP) through remote access or Internet Authentication Services (IAS), you must enable this policy setting. CHAP is an authentication protocol that is used by remote access and network connections. Digest Authentication in Internet Information Services (IIS) also requires that you enable this policy setting. If your organization uses CHAP through remote access or IAS, or Digest Authentication in IIS, you must configure this policy setting to Enabled. This presents a security risk when you App1y the setting through Group Policy on a user-by-user basis because it requires the appropriate user account object to be opened in Active Directory Users and Computers. 

Q3. - (Topic 2) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2 

Datacenter.Server1 is located in an isolated network that cannot access the Internet. 

On Server1, you install a new virtual machine named VM1.VM1 runs Windows Server 2012 

R2 Essentials and connects to a private virtual network. 

After 30 days, you discover that VM1 shuts down every 60 minutes. 

You need to resolve the issue that causes VM1 to shut down every 60 minutes. 

What should you do? 

A. OnVM1, run slmgr.exe and specify the /ipk parameter. 

B. OnServer1, run slmgr.exe and specify the /rearm-sku parameter. 

C. Create a new internal virtual network and attach VM1 to the new virtual network. 

D. On Server1, run Add-WindowsFeatureVolumeActivation. 

Answer:

Q4. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. 

You need to create a 3-TB virtual hard disk (VHD) on Server1. 

Which tool should you use? 

A. Computer Management 

B. Server Manager 

C. Share and Storage Management 

D. New-VirtualDisk 

Answer:

Explanation: 

For other questions to create a VHD (file) you can use computer management. 

-Share and storage management (2008 only) 

-New-storagesubsystemVirtualDisk (this is a virtual disk, NOT a virtual hard disk) 

-Server Manager (you would use this to create virtual disks, not virtual hard disks) 

Q5. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

Contoso.com has a server, named ENSUREPASS-SR07, which has two physical disks installed. The C: drive hosts the boot partition, while the D: drive is not being used. Both disks are online. 

You have received instructions to create a virtual machine on ENSUREPASS-SR07. Subsequent to creating the virtual machine, you have to connect the D: drive to the virtual machine. 

Which of the following is TRUE with regards to connecting a physical disk to a virtual machine? 

A. The physical disk should not be online. 

B. The physical disk should be uninstalled and re-installed. 

C. The physical disk should be configured as a striped disk. 

D. The physical disk should be configured as a mirrored disk. 

Answer:

Explanation: 

Your virtual machines can also be connected to physical hard disks on the virtualization server virtual hard disks. (This is sometimes referred to as having a “pass-through” disk connected to a virtual machine.) The physical hard disk that you connect to a virtual machine can also be a network-attached disk, like a logical unit number (LUN) in a storage area network (SAN). A common example is an iSCSI LUN that has been mapped to the virtualization server by using Microsoft iSCSI Initiator. Because the virtualization server sees network-attached storage as local disks, the iSCSI LUN can be connected to a virtual machine. The most important limitation about having a physical hard disk connected to a virtual machine is that it cannot be connected to the virtualization server or to other virtual machines at the same time. The virtual machine must have exclusive access to the physical hard disk. Pass-through Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-Vserver perspective. 

Q6. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of two Active Directory forests, named Contoso.com and test.com. There is no trust relationship configured between the forests. 

A backup of Group Policy object (GPO) from the test.com domain is stored on a domain controller in the Contoso.com domain. 

You are informed that a GPO must be created in the Contoso.com domain, and must be based on the settings of the GPO in the test.com domain. 

You start by creating the new GPO using the New-GPO Windows PowerShell cmdlet. You want to complete the task via a Windows PowerShell cmdlet. 

Which of the following actions should you take? 

A. You should consider making use of the Invoke-GPUpdate Windows PowerShell cmdlet. 

B. You should consider making use of the Copy-GPO Windows PowerShell cmdlet. 

C. You should consider making use of the New-GPLink Windows PowerShell cmdlet. 

D. You should consider making use of the Import-GPO Windows PowerShell cmdlet. 

Answer:

Explanation: 

Import-GPO -Imports the Group Policy settings from a backed-up GPO into a specified GPO. 

Q7. - (Topic 3) 

You have a print server named Server1. 

You install a printer on Server1. You share the printer as Printer1. 

You need to configure Printer1 to be available only from 19:00 to 05:00 every day. 

Which settings from the properties of Printer1 should you modify? 

A. Sharing 

B. Security 

C. Advanced 

D. Device Settings 

E. Ports 

Answer:

Explanation: 

When navigating to the printer properties, the Properties tab is divided into several different tabs of which the Advanced tab will give you access to the scheduling where you can configure the availability of the printer. 

: http://technet.microsoft.com/en-us/library/cc722526.aspx 

Q8. - (Topic 2) 

You have a server named Corel that has a Server Core Installation of Windows Server 2012 R2. 

Corel has the Hyper-V server role installed. Corel has two network adapters from different third-party hardware vendors. 

You need to configure network traffic failover to prevent connectivity loss if a network adapter fails. 

What should you use? 

A. New-NetSwitchTeam 

B. Install-Feature 

C. Add-NetSwitchTeamMember 

D. Netsh.exe 

Answer:

Q9. - (Topic 3) 

You are attempting to delete a global security group in the Active Directory Users and Computers console, and the console will not let you complete the task. 

Which of the following could possibly be causes for the failure? (Choose all answers that are correct.) 

A. There are still members in the group. 

B. One of the group’s members has the group set as its primary group. 

C. You do not have the proper permissions for the container in which the group is located. 

D. You cannot delete global groups from the Active Directory Users and Computers console. 

Answer: B,C 

Explanation: 

A. Incorrect: It is possible to delete a group that has members. 

B. Correct: If any member sets the group as its primary group, then the system does not permit the group to be deleted. 

C. Correct: You must have the appropriate Active Directory permissions for the container in which the group is located to delete it. 

D. Incorrect: It is possible to delete groups using the Active Directory Users and Groups console. 

Q10. HOTSPOT - (Topic 1) 

You have a print server named Server1 that runs Windows Server 2012 R2. 

On Server1, you create and share a printer named Printer1. 

The Advanced settings of Printer1 are shown in the Advanced exhibit. (Click the Exhibit 

button.) 

The Security settings of Printer1 are shown in the Security exhibit. (Click the Exhibit button.) 

The Members settings of a group named Group1 are shown in the Group1 exhibit. (Click the Exhibit button.) 

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point. 

Answer:  

Q11. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 installed. 

You have been instructed to modify the name of the local Administrator account on all Contoso.com workstations. You want to achieve this using as little administrative effort as possible. 

Which of the following actions should you take? 

A. You should consider configuring the Security Options settings via the Group Policy Management Console (GPMC). 

B. You should consider navigating to Local Users and Groups via Computer 

C. You should consider configuring the replication settings. 

D. You should consider navigating to Local Users and Groups via Computer Management on each workstation. 

Answer:

Explanation: 

Rename administrator account policy setting determines whether a different account name is associated with the security identifier (SID) for the Administrator account. Because the Administrator account exists on all Windows server versions, renaming the account makes it slightly more difficult for attackers to guess this user name and password combination. By default, the built-in Administrator account cannot be locked out no matter how many times a malicious user might use a bad password. This makes the Administrator account a popular target for brute-force password-guessing attacks. The value of this countermeasure is lessened because this account has a well-known SID and there are non-Microsoft tools that allow you to initiate a brute-force attack over the network by specifying the SID rather than the account name. This means that even if you have renamed the Administrator account, a malicious user could start a brute-force attack by using the SID. Rename the Administrator account by specifying a value for the Accounts: Rename administrator account policy setting. Location: GPO_name\Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options 

Q12. HOTSPOT - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. 

Technicians use Windows Deployment Services (WDS) to deploy Windows Server 2012 R2. 

The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. 

You need to ensure that you can use WDS to deploy Windows Server 2012 R2 to a virtual machine named VM1. 

Which settings should you configure? 

To answer, select the appropriate settings in the answer area. 

Answer:  

Q13. - (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS). 

You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE. 

Which virtual machine setting should you configure for VM2? 

A. NUMA topology 

B. Resource control 

C. resource metering 

D. virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from the network is first. 

References: http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335 

Q14. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. The domain contains a virtual machine named VM1. 

A developer wants to attach a debugger to VM1. 

You need to ensure that the developer can connect to VM1 by using a named pipe. 

Which virtual machine setting should you configure? 

A. BIOS 

B. Network Adapter 

C. COM 1 

D. Processor 

Answer:

Explanation: 

Named pipe. This option connects the virtual serial port to a Windows named pipe on the host operating system or a computer on the network. A named pipe is a portion of memory that can be used by one process to pass information to another process, so that the output of one is the input of the other. The second process can be local (on the same computer as the first) or remote (on a networked computer). For example, a local named pipe path could be \\.\pipe\mypipename. Named pipes can be used to create a virtual null modem cable between two virtual machines, or between a virtual machine and a debugging program on the host operating system that supports the use of named pipes. By connecting two virtual serial ports to the same named pipe, you can create a virtual null modem cable connection. Named pipes are useful for debugging or for any program that requires a null modem connection. 

Named pipes can be used to connect to a virtual machine by configuring COM 1. 

References: http://support.microsoft.com/kb/819036 http://support.microsoft.com/kb/141709 

Q15. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers. The servers are contained in an organizational unit (OU) named Servers OU. 

You need to create a group named Group1 on all of the servers in the domain. You must ensure that Group1 is added only to the servers. 

What should you configure? 

A. a Local Users and Groups preferences setting in a Group Policy linked to the Domain Controllers OU 

B. a Restricted Groups setting in a Group Policy linked to the domain 

C. a Local Users and Groups preferences setting in a Group Policy linked to ServersOU 

D. a Restricted Groups setting in a Group Policy linked to Servers OU 

Answer:

Explanation: 

A. This would add the group to the wrong OU 

B. This would affect the whole domain and would effect member of the group 

C. allows you to centrally manage local users and groups on domain member computers and is this is the correct OU for the GPO change 

D. Restricted Groups defines what member or groups should exist as part of a group Why use Group Policy preferences? Unlike Group Policy settings, which App1y to both local computer policy and Active Directory policy, Group Policy preferences only App1y to Active Directory policy. You use preferences to configure many areas of the OS, including: System devices, such as USB ports, floppy drives and removable media Network shares and mapping network shares to drive letters System and user environment variables User and group accounts for the local computer VPN and dial-up networking connections Printer configuration and mapping Registry settings, schedule tasks and system services Settings for Folder Options, Internet Options and Regional and Language Options Settings for power schemes and power management Start Menu properties and menu items