70-410 Premium Bundle

70-410 Premium Bundle

Installing and Configuring Windows Server 2012 Certification Exam

4.5 
(29445 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-410 Free Practice Questions

Q1. - (Topic 3) 

Your company has a remote office that contains 1,600 client computers on a single subnet. You need to select a subnet mask for the network that will support all of the client 

computers. The solution must minimize the number of unused addresses. Which subnet mask should you select? 

A. 255.255.248.0 

B. 255.255.252.0 

C. 255.255.254.0 

D. 255.255.240.0 

Answer:

Q2. - (Topic 3) 

A company’s network administrator needs to ensure a specific IP address is never assigned by a Windows Server 2012 R2 DHCP server to any device connecting to the network. 

Which of the following should the administrator configure on the Windows Server 2012 R2 DHCP server? 

A. Reservation 

B. Scope options 

C. NAP 

D. Scope properties 

Answer:

Explanation: 

Configuring an IP address as a reservation will restrict a DHCP server’s assignment of that address unless a specific MAC address makes a request for the address. Exclusion is for not use the IP Address or range inside the Scope Pool, Filter is for not use theMAC Address or range. Quick Tip: Policies can also be defined per scope or server. Policy based assignment (PBA) allows an administrator to group DHCP clients by specific attributes based on fields contained in the DHCP client request packet. This feature allows for targeted administration and greater control of configuration parameters delivered to network devices. 

Q3. - (Topic 2) 

You have a server named dc2.contoso.com that runs Windows Server 2012 R2 and has the DNS Server server role installed. 

You open DNS Manager as shown in the exhibit. (Click the Exhibit button.) 

You need to view the DNS server cache from DNS Manager. 

What should you do first? 

A. From the View menu, click Filter... 

B. From the Action menu, click Configure a DNS Server... 

C. From the Action menu, click Properties. 

D. From the View menu, click Advanced. 

Answer:

Explanation: 

To view the contents of the DNS cache, perform the following steps: 

1. Start the Microsoft Management Console (MMC) DNS snap-in (Go to Start, Programs, Administrative Tools, and click DNS). 

2. From the View menu, select Advanced. 

3. Select the Cached Lookups tree node from the left-hand pane to display the top-level domains (e.g., com, net) under.(root). Expand any of these domains to view the cached DNS information (the actual records will appear in the right-hand pane). 

Navigating the DNS Manager console you should go to the View menu and click the Advanced tab. That will yield the DNS server cache. 

: http://technet.microsoft.com/en-us/library/ee683892%28v=WS.10%29.aspx 

Q4. - (Topic 3) 

A company’s server virtualization team needs to provision a series of Hyper-V workloads to use existing network storage arrays. The team has chosen to use Fibre Channel ports within the guest operating systems. 

Which of the following Windows Server versions can be used as guest operating systems when using Hyper-V Fibre Channel ports? 

A. 2003 R2 

B. 2008 

C. 2003 

D. 2012 

Answer: B,D 

Explanation: 

Windows Server 2008, 2008 R2, and 2012 R2 can be guest operating systems when using 

Hyper-V Fibre Channel host bus adaptors (HBAs). Updated HBA drivers are needed along 

with NPIV-enabled (N_Port ID Virtualization) SANs. 

Quick Tip: Virtual Fibre Channel logical units cannot be used as boot media. 

Q5. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the 

Hyper-V server role installed. 

An iSCSI SAN is available on the network. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

You create a LUN on the SAN to host the virtual hard drive files for the virtual machines. 

You need to create a 3-TB virtual hard disk for VM1 on the LUN. The solution must prevent 

VM1 from being paused if the LUN runs out of disk space. 

Which type of virtual hard disk should you create on the LUN? 

A. Dynamically expanding VHDX 

B. Fixed-size VHDX 

C. Fixed-size VHD 

D. Dynamically expanding VHD 

Answer:

Explanation: 

The virtual disk needs to be a VHDX file since it is going to be over 2TB in size and it must be fixed-size so that the space is already taken on the server (that way the server does not run out of space as the volume grows) even if the actual virtual disk does not yet hold that amount of data. 

Q6. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

You need to add a user named User1 to a group named ServerAdmins. 

What command should you run? To answer, select the appropriate options in the answer area. 

Answer:  

Q7. - (Topic 2) 

You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the DHCP Server server role installed. 

You need to create an IPv6 reservation for Server2. 

Which two values should you obtain from Server2? (Each correct answer presents part of the solution. Choose two.) 

A. the hardware ID 

B. the DHCPv6 unique identifier 

C. the DHCPv6 identity association ID 

D. the SMSBIOS GUID 

E. the MAC address 

Answer: B,C 

Explanation: 

The Add-DhcpServerv6Reservation cmdlet reserves a specified IPv6 address for the client identified by the specified Dynamic Host Configuration Protocol (DHCP) v6 unique identifier (ID) (DUID) and identity association ID (IAID). 

Q8. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. 

You log on to a domain controller by using an account named Admin1.Admin1 is a member of the Domain Admins group. 

You view the properties of a group named Group1 as shown in the exhibit. (Click the Exhibit button.) 

Group1 is located in an organizational unit (OU) named OU1. 

You need to ensure that users from Group1 can modify the Security settings of OU1 only. 

What should you do from Active Directory Users and Computers? 

A. Modify the Managed By settings on OU1. 

B. Right-click contoso.com and select Delegate Control. 

C. Right-click OU1 and select Delegate Control. 

D. Modify the Security settings of Group1. 

Answer:

Explanation: 

Delegating control to only the OU will allow the users of Group1 to modify the security settings. 

Q9. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1. Server1 runs Windows Server 2012 R2. 

You need to create a 3-TB virtual hard disk (VHD) on Server1. 

Which tool should you use? 

A. New-StoragePool 

B. Diskpart 

C. File Server Resource Manager (FSRM) 

D. New-StorageSubsytemVirtualDisk 

Answer:

Explanation: 

You can create a VHD from either the Disk Management snap-in or the command line (diskpart). From the DiskPart command-line tool at an elevated command prompt, run the create vdisk command and specify the file (to name the file) and maximum (to set the maximum size in megabytes) parameters. The following code demonstrates how to create a VHD file at C:\vdisks\disk1.vdh with a maximum file size of 16 GB (or 16,000 MB). DiskPart Microsoft DiskPart version 6.1.7100 Copyright (C) 1999-2008 Microsoft Corporation. On computer: WIN7 DISKPART> create vdisk file="C:\vdisks\disk1.vhd" maximum=16000 

Q10. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. 

You log on to Server1. 

You need to retrieve a list of the active TCP connections on Server2. 

Which command should you run from Server1? 

A. winrm get server2 

B. netstat> server2 

C. dsquery * -scope base -attrip, server2 

D. winrs -r:server2 netstat 

Answer:

Explanation: 

This command line tool enables administrators to remotely execute most Cmd.exe commands using the WSManagement protocol. 

Q11. - (Topic 2) 

Your network contains a server named Server1 and 10 Web servers. All servers run 

Windows Server 2012 R2. 

You create a Windows PowerShell Desired State Configuration (DSC) to push the settings 

from Server1 to all of the Web servers. 

On Server1, you modify the file set for the Web servers. 

You need to ensure that all of the Web servers have the latest configurations. 

Which cmdlet should you run on Server1? 

A. Get-DcsConfiguration 

B. Restore-DcsConfiguration 

C. Set-DcsLocalConfigurationManager 

D. Start-DcsConfiguration 

Answer:

Q12. - (Topic 3) 

You have a server that runs Windows Server 2012 R2. The server contains the disks configured as shown in the following table. 

You need to create a volume that can store up to 3 TB of user files. The solution must ensure that the user files are available if one of the disks in the volume fails. 

What should you create? 

A. a mirrored volume on Disk 1 and Disk 4 

B. a mirrored volume on Disk 2 and Disk 3 

C. a RAID-5 volume on Disk 1, Disk 2, and Disk 3 

D. a spanned volume on Disk 0 and Disk 4 

Answer:

Q13. - (Topic 3) 

You have an Active Directory domain named contoso.com. You have a domain controller named Server1 that is configured as a DNS server. Server1 hosts a standard primary zone for contoso.com. The DNS configuration of Server1 is shown in the exhibit. 

You discover that stale resource records are not automatically removed from the contoso.com zone. 

You need to ensure that the stale resource records are automatically removed from the contoso.com zone. 

What should you do? 

A. Set the scavenging period of Server1 to 0 days. 

B. Modify the Server Aging/Scavenging properties. 

C. Configure the aging properties for the contoso.com zone. 

D. Convert the contoso.com zone to an Active Directory-integrated zone. 

Answer:

Explanation: 

Scavenging or aging as it is also known as automates the deletion of old records. When scavenging is disabled, these records must be deleted manually or the size of the DNS database can become large and have an adverse effect on performance. In the exhibit it shows that scavenging is enabled on Server1, thus you should configure the aging properties for the zone. 

Q14. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. You promote Server1 to domain controller. You need to view the service location (SVR) records that Server1 registers on DNS. What should you do on Server1? 

A. Open the Srv.sys file 

B. Open the Netlogon.dns file 

C. Run ipconfig/displaydns 

D. Run Get-DnsServerDiagnostics 

Answer:

Q15. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees. 

You create a Group Policy object (GPO) named GP1. You link GP1 to the Employees OU. 

You need to ensure that GP1 does not apply to the members of a group named Managers. 

What should you configure? 

A. The Security settings of Employees 

B. The WMI filter for GP1 

C. The Block Inheritance option for Employees 

D. The Security settings of GP1 

Answer:

Explanation: 

A. Wrong Group 

B. Windows Management Instrumentation (WMI) filters allow you to dynamically determine 

the scope of Group Policy objects (GPOs) based on attributes of the target computer. 

C. Blocking inheritance prevents Group Policy objects (GPOs) that are linked to higher 

sites, domains, or organizational units from being automatically inherited by the child-level. 

D. Set Managers to – Members of this security group are exempt from this Group Policy 

object. 

Security settings. 

You use the Security Settings extension to set security options for computers and users 

within the scope of a Group Policy object. You can define local computer, domain, and network security settings. Figure below shows an example of the security settings that allow everyone to be affected by this GPO except the members of the Management group, who were explicitly denied permission to the GPO by setting the Apply Group Policy ACE to Deny. Note that if a member of the Management group were also a member of a group that had an explicit Allow setting for the Apply Group Policy ACE, the Deny would take precedence and the GPO would not affect the user.