70-410 Premium Bundle

70-410 Premium Bundle

Installing and Configuring Windows Server 2012 Certification Exam

4.5 
(38610 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 70-410 Free Practice Questions

Q1. - (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following  table. 

You plan to schedule a complete backup of Server1 by using Windows Server Backup. 

You need to ensure that the state of VM1 is saved before the backup starts. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. resource metering 

D. virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

The Integration Services settings on virtual machines include services such as operating system shutdown, time synchronization, data exchange, Heartbeat, and Backup (volume snapshot services). This snapshot will ensure that the state of VM1 is saved prior to backup. 

References: http://msdn.microsoft.com/en-us/library/dd405549(v=vs.85).aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 

Q2. - (Topic 3) 

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2 Standard. You establish a Remote Desktop session to Server1. 

You need to identify which task can be performed on Server1 from within the Remote Desktop session. 

What should you identify? 

A. Install a feature by using Server Manager. 

B. Modify the network settings by using Sconfig. 

C. Disable services by using Msconfig. 

D. Join a domain by using the System Properties. 

Answer:

Explanation: 

In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must be a member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode. 

References: http://technet.microsoft.com/en-us/library/jj647766.aspx Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80 

Q3. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2 and a client computer named Computer1 that runs Windows 8. DC1 is configured as a DHCP server as shown in the exhibit. Computer1 is configured to obtain an IP address automatically. 

You need to ensure that Computer1 can receive an IP address from DC1. 

What should you do? 

A. Disable the Allow filters. 

B. Disable the Deny filters 

C. Activate Scope [10.1.1.0] Contoso.com. 

D. Authorize dc1.contoso.com. 

Answer:

Explanation: 

A red down arrow indicates an unauthorized DHCP server. A DHCP server that is a domain controller or a member of an Active Directory domain queries Active Directory for the list of authorized servers (identified by IP address). If its own IP address is not in the list of authorized DHCP servers, the DHCP Server service does not complete its startup sequence and automatically shuts down. 

Q4. - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. You add an additional disk to Server1 as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that users can access the additional disk from drive C. 

What should you do? 

A. Convert Disk 0 to a dynamic disk and add a mirror. 

B. Create a simple volume on Disk 1 and mount the volume to a folder. 

C. Convert Disk 0 and Disk 1 to dynamic disks and extend a volume. 

D. Convert Disk 1 to a dynamic disk and create a spanned volume. 

Answer:

Q5. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed. 

A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge Handshake Authentication Protocol (CHAP) for remote connections. CHAP is enabled on Server1. 

You need to ensure that User1 can connect to Server1 and authenticate to the domain. 

What should you do from Active Directory Users and Computers? 

A. From the properties of User1, select Store password using reversible encryption. 

B. From the properties of Server1, assign the Allowed to Authenticate permission to User1. 

C. From the properties of User1, select Use Kerberos DES encryption types for this account. 

D. From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only). 

Answer:

Explanation: 

The Store password using reversible encryption policy setting provides support for Applications that use protocols that require the user’s password for authentication. Storing encrypted passwords in a way that irreversible means that the encrypted passwords can be decrypted. A knowledgeable attacker who is able to break this encryption can then log on to network resources by using the compromised account. For this reason, never enable Store password using reversible encryption for all users in the domain unless Application requirements outweigh the need to protect password information. If you use the Challenge Handshake Authentication Protocol (CHAP) through remote access or Internet Authentication Services (IAS), you must enable this policy setting. CHAP is an authentication protocol that is used by remote access and network connections. Digest Authentication in Internet Information Services (IIS) also requires that you enable this policy setting. If your organization uses CHAP through remote access or IAS, or Digest Authentication in IIS, you must configure this policy setting to Enabled. This presents a security risk when you App1y the setting through Group Policy on a user-by-user basis because it requires the appropriate user account object to be opened in Active Directory Users and Computers. 

Q6. HOTSPOT - (Topic 1) 

You have a DHCP server named Server1 that runs Windows Server 2012 R2. On Server1, you run the commands as shown in the exhibit. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. 

Answer:  

Q7. - (Topic 3) 

RODC comes with a number of features that focus on heightened security with limited functionality to remote office users. Which of the following are features of RODC? 

A. Filtered Attribute Sets 

B. Read-Only DNS 

C. Unidirectional Replication 

D. All of these 

Answer:

Q8. - (Topic 3) 

You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. 

You attach four 500-GB disks to Server1. 

You need to configure the storage to meet the following requirements: 

. Storage for an application named Application1 must be provided. Application1 requires 20 GB and will require a maximum of 800 GB in three years. . Storage for an application named Application2 must be provided. Application2 requires 20 GB and will require a maximum of 900 GB in three years. . The solution must provide the ability to dynamically add storage without requiring configuration changes to the applications. . The storage must be available if a single disk fails. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From File and Storage Services, create virtual disks by using fixed provisioning. 

B. From File and Storage Services, create virtual disks by using thin provisioning. 

C. From File and Storage Services, create a storage pool that uses all four disks. 

D. From Disk Management, create a new RAID-5 volume that uses all four disks. 

E. From Disk Management, create two new mirror volumes that use two disks each. 

Answer: A,C 

Q9. - (Topic 3) 

A company’s server virtualization team needs to provision a series of Hyper-V workloads to use existing network storage arrays. The team has chosen to use Fibre Channel ports within the guest operating systems. 

Which of the following Windows Server versions can be used as guest operating systems when using Hyper-V Fibre Channel ports? 

A. 2003 R2 

B. 2008 

C. 2003 

D. 2012 

Answer: B,D 

Explanation: 

Windows Server 2008, 2008 R2, and 2012 R2 can be guest operating systems when using 

Hyper-V Fibre Channel host bus adaptors (HBAs). Updated HBA drivers are needed along 

with NPIV-enabled (N_Port ID Virtualization) SANs. 

Quick Tip: Virtual Fibre Channel logical units cannot be used as boot media. 

Q10. - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You need to enable access-based enumeration for a file share on Server1. 

Which tool should you use? 

A. File Server Resource Manager (FSRM) 

B. Share and Storage Management 

C. Server Manager 

D. File Explorer 

Answer:

Explanation: 

Access-based enumeration displays only the files and folders that a user has permissions to access. It is a feature that was previously available as a downloadable package for the Windows Server. 2003 operating system (it was also included in Windows Server 2003 Service Pack 1). Access-based enumeration is now included in the Windows Server 2008 operating system, and you can enable it by using Share and Storage Management. 

Q11. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 has a virtual switch named RDS Virtual. 

You replace all of the network adapters on Server1 with new network adapters that support single-root I/O visualization (SR-IOV). 

You need to enable SR-IOV for all of the virtual machines on Server1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On each virtual machine, modify the Advanced Features settings of the network adapter. 

B. Modify the settings of the RDS Virtual virtual switch. 

C. On each virtual machine, modify the BIOS settings. 

D. Delete, and then recreate the RDS Virtual virtual switch. 

E. On each virtual machine, modify the Hardware Acceleration settings of the network adapter. 

Answer: D,E 

Explanation: 

The first step when allowing a virtual machine to have connectivity to a physical network is to create an external virtual switch using Virtual Switch Manager in Hyper-V Manager. The additional step that is necessary when using SR-IOV is to ensure the checkbox is checked when the virtual switch is being created. It is not possible to change a “non SR-IOV mode” external virtual switch into an “SR-IOV mode” switch. The choice must be made a switch creation time. Thus you should first delete the existing virtual switch and then recreate it. 

E: Once a virtual switch has been created, the next step is to configure a virtual machine. 

SR-IOV in Windows Server “8” is supported on x64 editions of Windows “8” as a guest operating system (as in Windows “8” Server, and Windows “8” client x64, but not x86 client).We have rearranged the settings for a virtual machine to introduce sub-nodes under a network adapter, one of which is the hardware acceleration node. At the bottom is a checkbox to enable SR-IOV. 

Q12. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet. 

Which of the following describes the results of running this cmdlet? 

A. It removes one or more network adapters from a specified NIC team. 

B. It removes a team interface from a NIC team. 

C. It removes a specified NIC team from the host. 

D. It removes a network adapter member from a switch team. 

Answer:

Explanation: 

Remove-NetLbfoTeam removes the specified NIC team from the host. 

The Remove-NetLbfoTeam cmdlet removes the specified NIC team from the host. This 

cmdlet disconnects all associated team members and providers from the team. You can 

specify the team to remove by using either a team object retrieved by Get-NetLbfoTeam, or 

by specifying a team name. 

You can use Remove-NetLbfoTeam to remove all NIC teams from the server. 

You need administrator privileges to use Remove-NetLbfoTeam. 

Q13. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

The password policy for the domain is set to require a minimum password length of 10 characters. 

A user named User1 and a user named User2 work for the sales department. 

User1 is forced to create a domain password that has a minimum of 12 characters. User2 is forced to create a domain password that has a minimum of eight characters. 

You need to identify what forces the two users to have different password lengths. 

Which tool should you use? 

A. Credential Manager 

B. Security Configuration Wizard (SCW) 

C. Group Policy Management 

D. Active Directory Administrative Center 

Answer:

Explanation: 

In Windows Server 2008, you can use fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. For example, to increase the security of privileged accounts, you can apply stricter settings to the privileged accounts and then apply less strict settings to the accounts of other users. Or in some cases, you may want to apply a special password policy for accounts whose passwords are synchronized with other data sources. 

This is found in the Active Directory Administrative Center. You can use Active Directory Administrative Center to perform the following Active Directory administrative tasks: Create new user accounts or manage existing user accounts Create new groups or manage existing groups Create new computer accounts or manage existing computer accounts Create new organizational units (OUs) and containers or manage existing OUs Connect to one or several domains or domain controllers in the same instance of Active Directory Administrative Center, and view or manage the directory information for those domains or domain controllers Filter Active Directory data by using query-building search 

: http://technet.microsoft.com/en-us/library/cc770842(v=ws.10).aspx 

Q14. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The DNS zone for contoso.com is Active-Directory integrated. 

The domain contains 500 client computers. There are an additional 20 computers in a workgroup. 

You discover that every client computer on the network can add its record to the contoso.com zone. 

You need to ensure that only the client computers in the Active Directory domain can register records in the contoso.com zone. 

What should you do? 

A. Sign the contoso.com zone by using DNSSEC. 

B. Configure the Dynamic updates settings of the contoso.com zone. 

C. Configure the Security settings of the contoso.com zone. 

D. Move the contoso.com zone to a domain controller that is configured as a DNS server. 

Answer:

Q15. - (Topic 3) 

Your network contains a Hyper-V host named Hyperv1 that runs Windows Server 2012 R2. 

Hyperv1 has a virtual switch named Switch1. 

You replace all of the network adapters on Hyperv1 with new network adapters that support single-root I/O virtualization (SR-IOV). You need to enable SR-IOV for all of the virtual machines on Hyperv1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On each virtual machine, modify the Advanced Features settings of the network adapter. 

B. Modify the settings of the Switch1 virtual switch. 

C. Delete, and then recreate the Switch1 virtual switch. 

D. On each virtual machine, modify the BIOS settings. 

E. On each virtual machine, modify the Hardware Acceleration settings of the network adapter. 

Answer: C,E