70-410 Premium Bundle

70-410 Premium Bundle

Installing and Configuring Windows Server 2012 Certification Exam

4.5 
(38325 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-410 Free Practice Questions

Q1. - (Topic 2) 

Your network contains three servers that run Windows Server 2012 R2. The servers are configured as shown in the following table. 

Server3 is configured to obtain an IP address automatically. 

You need to prevent Server3 from receiving an IP address from Server1. 

What should you create on Server1? 

A. A reservation 

B. A filter 

C. A scope option 

D. An exclusion 

Answer:

Explanation: 

A. For clients that require a constant IP address 

B. Filter to exclude MAC address of Server3 

C. Range of allowed IP’s to be assigned 

D. Exclude range of IP’s MAC address based filtering ensure that only a known set of devices in the system are able to obtain an IPAddress from the DHCP Reservation and Exclusion, two incredibly different concepts. An exclusion is an address or range of addresses taken from a DHCP scope that the DHCP server is not allowed to hand out. For example, if you have set a DHCP server to exclude the address range 192.168.0.1-192.168.0.10 then the only way a computer on your network would get an address of 192.168.0.4 would be if you assigned it statically on that machine. This is because DHCP knows NOT to give this range of IP addresses out. A reservation is a specific IP addresses that is tied to a certain device through its MAC address. For example, if we have a workstation on the network that requires a certain IP address, but we don’t want to go through to trouble of assigning it statically, then we can create a reservation for it. So if the MAC address of the NIC on the computer is AA-BB-00FF-CC-AA and we want it to maintain the IP address of 192.168.0.100 then we would create a DHCP reservation under that particular scope saying that the IP address 

192.168.0.100 is reserved only for the MAC address AA-BB-00-FF-CC-AA. Reference: http://technet.microsoft.com/en-us/magazine/ff521761.aspx 

Q2. - (Topic 3) 

You have a domain controller named Server1 that runs Windows Server 2012 R2 and has the DNS Server server role installed. Server1 hosts a DNS zone named contoso.com and a GlobalNames zone. 

You discover that the root hints were removed from Server1. 

You need to view the default root hints of Server1. 

What should you do? 

A. From Event Viewer, open the DNS Manager log. 

B. From Notepad, open the Cache.dns file. 

C. From Windows Powershell, run Get-DNSServerDiagnostics. 

D. From nslookup, run root server1.contoso.com 

Answer:

Explanation: 

A. Allows you to troubleshoot DNS issues 

B. DNS Server service implements root hints using a file, Cache.dns, stored in the systemroot\System32\Dnsfolder on the server 

C. Gets DNS event logging details 

D. nslookup is used to query the DNS server 

Q3. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The network contains a server named Server1 that runs Windows Server 2012 R2 and a server named Server2 that runs Windows Server 2008 R2 Service Pack 1 (SP1).Server1 and Server2 are member servers. 

You need to ensure that you can manage Server2 from Server1 by using Server Manager. 

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Install Remote Server Administration Tools on Server1. 

B. Install Windows Management Framework 3.0 on Server2. 

C. Install the Windows PowerShell 2.0 engine on Server1. 

D. Install Microsoft .NET Framework 4 on Server2. 

E. Install Remote Server Administration Tools on Server2. 

Answer: B,D 

Explanation: 

To be able to fully manage remote servers that run Windows Server 2008 or the R2 Service Pack 1 operating system, you should install the .NET Framework 4 on Server2 first followed by the Windows Management Framework 3.0. 

Q4. - (Topic 3) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. You need to install the Remote Desktop Services server role on Server2 remotely from Server1. Which tool should you use? 

A. The dsadd.exe command 

B. The Server Manager console 

C. The Remote Desktop Gateway Manager console 

D. The Install-RemoteAccess cmdlet 

Answer:

Q5. HOTSPOT - (Topic 3) 

You have a DNS server named Server1. Server1 runs Windows Server 2012 R2. The network ID is 10.1.1.0/24. An administrator creates several reverse lookup zones. You need to identify which reverse lookup zone is configured correctly. Which zone should you identify? To answer, select the appropriate zone in the answer area. 

Answer:  

Q6. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

You have been instructed to make sure that Contoso.com users are not able to install a Windows Store application. You then create a rule for packaged apps. 

Which of the following is the rule based on? (Choose all that apply.) 

A. The publisher of the package. 

B. The publisher of the application. 

C. The name of the package 

D. The name of the application 

E. The package version. 

F. The application version. 

Answer: A,C,E 

Explanation: 

Packaged apps (also known as Windows 8 apps) are new to Windows Server 2012 R2 and Windows 8. They are based on the new app model that ensures that all the files within an app package share the same identity. Therefore, it is possible to control the entire application using a single AppLocker rule as opposed to the non-packaged apps where each file within the app could have a unique identity. Windows does not support unsigned packaged apps which implies all packaged apps must be signed. AppLocker supports only publisher rules for Packaged apps. A publisher rule for a Packaged app is based on the following information: Publisher of the package Package name Package version All the files within a package as well as the package installer share these attributes. Therefore, an AppLocker rule for a Packaged app controls both the installation as well as the running of the app. Otherwise, the publisher rules for Packaged apps are no different than the rest of the rule collections; they support exceptions, can be increased or decreased in scope, and can be assigned to users and groups. 

Q7. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

Contoso.com has a server, named ENSUREPASS-SR07, which has two physical disks installed. The C: drive hosts the boot partition, while the D: drive is not being used. Both disks are online. 

You have received instructions to create a virtual machine on ENSUREPASS-SR07. Subsequent to creating the virtual machine, you have to connect the D: drive to the virtual machine. 

Which of the following is TRUE with regards to connecting a physical disk to a virtual machine? 

A. The physical disk should not be online. 

B. The physical disk should be uninstalled and re-installed. 

C. The physical disk should be configured as a striped disk. 

D. The physical disk should be configured as a mirrored disk. 

Answer:

Explanation: 

Your virtual machines can also be connected to physical hard disks on the virtualization server virtual hard disks. (This is sometimes referred to as having a “pass-through” disk connected to a virtual machine.) The physical hard disk that you connect to a virtual machine can also be a network-attached disk, like a logical unit number (LUN) in a storage area network (SAN). A common example is an iSCSI LUN that has been mapped to the virtualization server by using Microsoft iSCSI Initiator. Because the virtualization server sees network-attached storage as local disks, the iSCSI LUN can be connected to a virtual machine. The most important limitation about having a physical hard disk connected to a virtual machine is that it cannot be connected to the virtualization server or to other virtual machines at the same time. The virtual machine must have exclusive access to the physical hard disk. Pass-through Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-Vserver perspective. 

Q8. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have 

Windows Server 2012 installed. 

You are running a training exercise for junior administrators. You are currently discussing NIC Teaming. 

Which of the following is TRUE with regards to NIC Teaming? (Choose all that apply.) 

A. It allows for traffic failover to prevent connectivity loss if a network component fails. 

B. It prevents bandwidth aggregation. 

C. The Windows Server 2012 implementation of NIC Teaming supports a maximum of 5 NICs in a team. 

D. The Windows Server 2012 implementation of NIC Teaming supports a maximum of 32 NICs in a team. 

Answer: A,D 

Explanation: 

NIC teaming, also known as Load Balancing/Failover (LBFO), allows multiple network adapters to be placed into a team for the purposes of bandwidth aggregation, and/or traffic failover to maintain connectivity in the event of a network component failure. This feature has long been available from NIC vendors but until now NIC teaming has not been included with Windows Server. Do I have to select a standby member to get fault tolerance (failover)? No. IN any team with two or more network adapters if a network adapter fails in an Active/Active configuration, the traffic on that network adapter will gracefully failover to the other network adapters in the team even if none of the other adapters are in standby mode. Number of NICs in a team in a native host NIC teaming requires the presence of at least one Ethernet NIC. A team of one NIC may be used for separation of traffic using VLANs. Obviously a team with only one team member has no failure protection. Fault protection (failover) requires a minimum of two Ethernet NICs in the team. The Windows Server 2012 implementation supports up to 32 NICs in a team. Number of team interfaces for a team Windows Server 2012 supports up to 32 team interfaces. 

Q9. - (Topic 3) 

You run a Windows 2012 R2 Hyper-V Role Server, you need to shrink the size of files.vhd. 

Which PowerShell cmdlet option you should run first? 

A. Dismount-VHD 

B. Mount-VHD 

C. Resize-VHD 

D. Convert-VHD 

Answer:

Q10. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

Contoso.com has a Hyper-V server, named ENSUREPASS-SR13, which hosts multiple virtual machines. 

You have enabled the use of Single-root I/O virtualization. 

Which of the following is TRUE with regards to using Single-root I/O virtualization? (Choose all that apply.) 

A. It maximizes network throughput, while minimizing network latency. 

B. It maximizes network throughput, as well as network latency. 

C. It avoids the virtual switch stack and allows the virtual machine direct access to the actual network switch. 

D. It prevents the virtual machine from accessing the network switch directly. 

Answer: A,C 

Explanation: 

SR-IOV enables network traffic to bypass the software switch layer of the Hyper-V virtualizationstack. Because the VF is assigned to a child partition, the network traffic flows directly between the VF and child partition. As a result, the I/O overhead in the software emulation layer is diminished and achieves network performance that is nearly the same performance as in nonvirtualized environments. 

Q11. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

You are running a training exercise for junior administrators. You are currently discussing Storage Spaces. 

Which of the following is TRUE with regards to Storage Spaces? 

A. Mirroring and parity are optional resilient storage modes of Storage Spaces. 

B. Failover clustering is not supported by Storage Spaces. 

C. Storage spaces are virtual disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning. 

D. Storage spaces are a collection of physical disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning. 

Answer: A,C 

Q12. DRAG DROP - (Topic 3) 

You have a Hyper-V host named Server1. Server1 hosts a virtual machine named VM1. You view the properties of VM1 as shown in the following exhibit. (Click the Exhibit button.) 

You need to configure bandwidth management for VM1. 

Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer:  

Q13. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

Your company hires 500 temporary employees for the summer. 

The human resources department gives you a Microsoft Excel document that contains a list of the temporary employees. 

You need to automate the creation of user accounts for the 500 temporary employees. 

Which tool should you use? 

A. ADSI Edit 

B. The csvde.exe command 

C. Active Directory Users and Computers 

D. The Add-Member cmdlet 

Answer:

Explanation: 

Csvde.exe is the best option to add multiple users. As you just need to export the excel 

spreadsheet as a csv file and make sure the parameters are correct. 

You can use Csvde to import and export Active Directory data that uses the comma-

separated value format. 

Use a spreadsheet program such as Microsoft Excel to open this .csv file and view the 

header and value information. 

The CSVDE is a command-line utility that can create new AD DS objects by importing 

information from a comma-separated value (.csv) file. This would be the least amount of 

administrative effort in this case especially considering that these would be temporary 

employees. 

Q14. - (Topic 3) 

Which of the following groups do you use to consolidate groups and accounts that either span multiple domains or the entire forest? 

A. Global 

B. Domain local 

C. Built-in 

D. Universal 

Answer:

Explanation: 

A. Incorrect: Global groups cannot contain users from other domains. 

B. Incorrect: Domain local groups cannot have permissions for resources in other domains. 

C. Incorrect: Built-in groups have no inherent cross-domain qualities. 

D. Correct: Universal groups, like global groups, are used to organize users according to their resource access needs. You can use them to organize users to facilitate access to any resource located in any domain in the forest through the use of domain local groups. Universal groups are used to consolidate groups and accounts that either span multiple domains or the entire forest. 

Q15. - (Topic 1) 

Your network contains an Active Directory forest. The forest functional level is Windows Server 2012 R2. The forest contains a single domain. The domain contains a member server named Server1. Server1 runs windows Server 2012 R2. 

You purchase a network scanner named Scanner1 that supports Web Services on Devices (WSD). 

You need to share the network scanner on Server1. 

Which server role should you install on Server1? 

A. Web Server (IIS) 

B. Fax Server 

C. Print and Document Services 

D. File and Storage Services 

Answer:

Explanation: 

The Print and Document Services role allows for the configuration to share printers, 

scanners and fax devices. 

References: 

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 1: 

Installing and Configuring servers, Objective 1.2: Configure servers, p. 8 

http://technet.microsoft.com/en-us/library/hh831468.aspx