70-410 Premium Bundle

70-410 Premium Bundle

Installing and Configuring Windows Server 2012 Certification Exam

4.5 
(25245 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 70-410 Free Practice Questions

Q1. DRAG DROP - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and is configured as the only domain controller. 

You need to retrieve a list of all the user accounts. The list must include the last time each user was authenticated successfully. 

Which Windows PowerShell command should you run? 

To answer, drag the appropriate cmdlet or property to the correct locations to complete the PowerShell command in the answer area. Each cmdlet or property may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q2. - (Topic 3) 

You run a Windows 2012 R2 Hyper-V Role Server, you need to shrink the size of files.vhd. 

Which PowerShell cmdlet option you should run first? 

A. Dismount-VHD 

B. Mount-VHD 

C. Resize-VHD 

D. Convert-VHD 

Answer:

Q3. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing connection security rules. 

Which of the following is TRUE with regards to connection security rules? (Choose all that apply.) 

A. Connection security rules allows for traffic to be secured via IPsec. 

B. Connection security rules do not allow the traffic through the firewall. 

C. Connection security rules are applied to programs or services. 

D. Connection security rules are applied between two computers. 

Answer: A,B,D 

Explanation: 

Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity, and, optionally, data encryption. How firewall rules and connection security rules are related Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with IPsec, you can create Computer Connection Security rules. However, the creation of a connection security rule does not allow the traffic through the firewall. You must create a firewall rule to do this, if the traffic is not allowed by the default behavior of the firewall. Connection security rules are not applied to programs or services; they are applied between the computers that make up the two endpoints. 

Q4. - (Topic 3) 

You have a virtual machine named VM1. 

You install Windows Server 2012 R2 on VM1. 

You plan to use VM1 as an image that will be distributed to sales users to demonstrate the features of a custom application. The custom application only requires the Web Server (IIS) server role to be installed. 

You need to ensure that the VHD file for VM1 only contains the required Windows Server 2012 R2 source files. 

Which tool should you use? 

A. servermanagercmd.exe 

B. dism.exe 

C. ocsetup.exe 

D. imagex.exe 

Answer:

Explanation: 

You can use DISM to: 

Add, remove, and enumerate packages and drivers. 

Enable or disable Windows features. 

Apply changes based on the offline servicing section of an unattend.xml answer file. 

Configure international settings. 

Upgrade a Windows image to a different edition. 

Prepare a Windows PE image. 

Take advantage of better logging. 

Service down-level operating systems like Windows Vista with SP1 and Windows Server 

2008. 

Service all platforms (32-bit, 64-bit, and Itanium). 

Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host. 

Make use of old Package Manager scripts. 

This command will mount the image before making any changes. This will ensure that only 

the required Windows Server 2012 R2 source files are contained. 

Q5. DRAG DROP - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You add a new internal SAS disk to Server1. 

You need to ensure that the new disk is available to store files. 

Which three cmdlets should you run in sequence? 

To answer, move the appropriate three cmdlets from the list of cmdlets to the answer area 

and arrange them in the correct order. 

Answer:  

Q6. HOTSPOT - (Topic 3) 

Your network contains a domain controller named dc5.adatum.com that runs Windows 

Server 2012 R2. 

You discover that you can connect successfully to DC5 over the network, but you receive a 

request timed out message when you attempt to ping DC5. 

You need to configure DC5 to respond to ping request. 

Which firewall rule should you modify on DC5? To answer, select the appropriate rule in 

the answer area. 

Answer:  

Q7. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. You need to create a script that will create and mount a virtual hard disk. Which tool should you use? 

A. diskpart.exe 

B. vdsldr.exe 

C. fsutil.exe 

D. vds.exe 

Answer:

Q8. - (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

You install a network monitoring application on VM2. 

You need to ensure that all of the traffic sent to VM3 can be captured on VM2. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. Resource metering 

D. Virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch port that receives copies of all the traffic. And since Port mirroring allows the network traffic of a virtual machine to be monitored by copying the traffic and forwarding it to another virtual machine that is configured for monitoring, you should configure port mirroring on VM2. 

: http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror 

Q9. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1.VM1 has a legacy network adapter. 

You need to assign a specific amount of available network bandwidth to VM1. 

What should you do first? 

A. Remove the legacy network adapter, and then run the Set-VMNetworkAdapter cmdlet. 

B. Add a second legacy network adapter, and then run the Set-VMNetworkAdopter cmdlet 

C. Add a second legacy network adapter, and then configure network adapter teaming. 

D. Remove the legacy network adapter, and then add a network adapter 

Answer:

Explanation: 

A. Set-VMNetworkAdaptercmdlet configures features of the virtual network adapter in a virtual machine or the management operating system 

B. The legacy network adapter doesn’t support bandwidth management 

C. The legacy network adapter doesn’t support bandwidth management 

D. Add a New network adapter The legacy network adapter doesn’t support bandwidth management 

Q10. - (Topic 1) 

You have virtual machine named VM1. 

VM1 uses a fixed size virtual hard disk (VHD) named Disk1.vhD. Disk1.vhd is 200 GB. 

You shut down VM1. 

You need to reduce the size of disk1.vhd. 

Which action should you select from the Edit Virtual Hard Disk Wizard? 

A. Merge 

B. Compact 

C. Shrink 

D. Convert 

Answer:

Q11. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server 2012. You create a group Managed Service Account named gservice1. You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1? 

A. From a command prompt, run sc.exe and specify the config parameter. 

B. From Windows PowerShell,run Set-Service and specify the -PassThrough parameter 

C. From Windows PowerShell,run Set-Service and specify the -StartupType parameter 

D. From Services Console configure the General settings 

Answer:

Q12. - (Topic 1) 

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. 

Server1 is configured to obtain an IPv4 address by using DHCP. 

You need to configure the IPv4 settings of the network connection on Server1 as follows: 

IP address: 10.1.1.1 

Subnet mask: 255.255.240.0 

Default gateway: 10.1.1.254 

What should you run? 

A. netsh.exe 

B. netcfg.exe 

C. msconfig.exe 

D. ipconfig.exe 

Answer:

Explanation: 

In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default 

Gateway, DNS and WINS addresses and many other options you can use Netsh.exe. 

Incorrect: 

Not D: Windows Server 2012 Core still has IPCONFIG.EXE that can be used to view the IP 

configuration. 

Modern servers typically come with several network interface ports. This causes 

IPCONFIG.EXE to scroll off the screen when viewing its output. Consider piping the output 

if IPCONFIG.EXE to a file and view it with Notepad.exe. 

Q13. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1. 

You install the Windows PowerShell Web Access gateway on Server1. 

You need to provide administrators with the ability to manage the servers in the domain by using the Windows PowerShell Web Access gateway. 

Which two cmdlets should you run on Server1? (Each correct answer presents part of the solution. Choose two.) 

A. Set-WSManQuickConfig 

B. Set-WSManInstance 

C. Add-PswaAuthorizationRule 

D. Set-BCAuthentication 

E. Install-PswaWebApplication 

Answer: C,E 

Explanation: 

A. Configures the local computer for remote management. 

B. Modifies the management information that is related to a resource. 

C. Adds a new authorization rule to the Windows PowerShell Web Access authorization rule set. 

D. Specifies the BranchCache computer authentication mode. 

E. Configures the Windows PowerShell . Web Access web Application in IIS. 

Q14. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All servers run Windows Server 2012 R2. The domain contains two domain controllers named DC1 and DC2. Both domain controllers are virtual machines on a Hyper-V host. 

You plan to create a cloned domain controller named DC3 from an image of DC1. 

You need to ensure that you can clone DC1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Add the computer account of DC1 to the Cloneable Domain Controllers group. 

B. Create a DCCloneConfig.xml file on DC1. 

C. Add the computer account of DC3 to the Cloneable Domain Controllers group. 

D. Run the Enable-AdOptionalFeaturecmdlet. 

E. Modify the contents of the DefaultDCCIoneAllowList.xml file on DC1. 

Answer: A,B 

Explanation: 

A. Cloneable Domain Controllers Group There’s a new group in town. It’s called Cloneable Domain Controllers and you can find it in the Users container. Membership in this group dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn’t be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete. Cloned DCs will also end up in the Cloneable Domain Controllers group. 

B. DCCloneConfig.xml There’s one key difference between a cloned DC and a DC that is being restored to a previous snapshot: DCCloneConfig.XML. DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways. The New-ADDCCloneConfigcmdlet in PowerShell By hand with an XML editor By editing an existing config file, again with an XML editor. 

Reference: Virtual Domain Controller Cloning in Windows Server 2012. 

Q15. HOTSPOT - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

From Server2, you attempt to connect to Server1 by using Computer Management and you receive the following error message: "Computer\ \Server1 cannot be found. The network path was not found." 

From Server1, you successfully connect to Server2 by using Server Manager. 

You need to ensure that you can manage Server1 remotely from Server2 by using Computer Management. 

What should you configure? To answer, select the appropriate option in the answer area. 

Answer: