70-410 Premium Bundle

70-410 Premium Bundle

Installing and Configuring Windows Server 2012 Certification Exam

4.5 
(41400 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-410 Free Practice Questions

P.S. Tested 70-410 dumps are available on Google Drive, GET MORE: https://drive.google.com/open?id=1XEw2m0USoR1DzdkDOR873WF9RHZitH-o


New Microsoft 70-410 Exam Dumps Collection (Question 5 - Question 14)

Q1. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2 and a client computer named Computer1 that runs windows 8.

DC1 is configured as a DHCP server as shown in the exhibit. (Click the Exhibit button.)

Computer1 is configured to obtain an IP address automatically.

You notice that Computer1 is unable to obtain an IP address from DC1. You need to ensure that Computer1 can receive an IP address from DC1. What should you do?

A. Disable the Allow filters.

B. Disable the Deny filters.

C. Authorize DC1.contoso.com.

D. Activate Scope [10.1.1.0] Contoso.com.

Answer: A

Explanation:

A red down arrow indicates an unauthorized DHCP server. A DHCP server that is a domain controller or a member of an Active Directory domain queries Active Directory for the list of authorized servers (identified by IP address). If its own IP address is not in the list of authorized DHCP servers, the DHCP Server service does not complete its startup sequence and automatically shuts down.


Q2. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1. VM1 has a legacy network adapter.

You need to assign a specific amount of available network bandwidth to VM1. What should you do first?

A. Remove the legacy network adapter, and then run the Set-VMNetworkAdapter cmdlet.

B. Add a second legacy network adapter, and then run the Set-VMNetworkAdopter cmdlet.

C. Add a second legacy network adapter, and then configure network adapter teaming.

D. Remove the legacy network adapter, and then add a network adapter.

Answer: D

Explanation:

:A. Set-VMNetworkAdaptercmdlet configures features of the virtual network adapter in a virtual machine or the management operating system

:B. The legacy network adapter doesnu2021t support bandwidth management

:C. The legacy network adapter doesnu2021t support bandwidth management

:D. Add a New network adapter. The legacy network adapter doesnu2021t support bandwidth management.


Q3. Your network contains an Active Directory forest named contoso.com.

The forest contains two domains named contoso.com and child.contoso.com and two sites named Site1 and Site2. The domains and the sites are configured as shown in following table.

When the link between Site1 and Site2 fails, users fail to log on to Site2.

You need to identify what prevents the users in Site2 from logging on to the child.contoso.com domain.

What should you identify?

A. The placement of the global catalog server

B. The placement of the infrastructure master

C. The placement of the domain naming master

D. The placement of the PDC emulator

Answer: D

Explanation:

The exhibit shows that Site2 does not have a PDC emulator. This is important because of the close interaction between the RID operations master role and the PDC emulator role. The PDC emulator processes password changes from earlier-version clients and other domain controllers on a best-effort basis; handles password authentication requests involving passwords that have recently changed and not yet been replicated throughout the domain; and, by default, synchronizes time. If this domain controller cannot connect to the PDC emulator, this domain controller cannot process authentication requests, it may not be able to synchronize time, and password updates cannot be replicated to it.

The PDC emulator master processes password changes from client computers and replicates these updates to all domain controllers throughout the domain. At any time, there can be only one domain controller acting as the PDC emulator master in each domain in the forest.


Q4. Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Print and Document Services server role installed.

You connect a new print device to the network. The marketing department and the sales department will use the print device.

You need to provide users from both departments with the ability to print to the network

print device. The solution must ensure that if there are multiple documents queued to print, the documents from the sales users print before the documents from the marketing users.

What should you do on Server1?

A. Add two printers. Modify the priorities of each printer and the security settings of each printer

B. Add two printers and configure printer pooling

C. Add one printer and configure printer pooling.

D. Add one printer. Modify the printer priority and the security settings

Answer: A

Explanation:

To set different print priority to different groups Open Printers and Faxes.

Right-click the printer you want to set, click Properties, and then click the Advanced tab. In Priority, click the up or down arrows, and then click OK. Or, type a priority level, where 1 is the lowest level and 99 is the highest, and then click OK. Click Add Printer to add a second logical printer for the same physical printer. For instructions, see Related Topics.

Click the Advanced tab.

In Priority, set a priority higher than that of the first logical printer. Instruct the regular group of users to use the first logical printer name and the group with higher priority to use the second logical printer name. Set the appropriate permissions for the different groups.


Q5. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.

You create a security template named Template1 by using the security template snap-in. You need to apply Template1 to Server2.

Which tool should you use?

A. Security Templates

B. Computer Management

C. Security Configuration and Analysis

D. System Configuration

Answer: C

Explanation:

A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer.

:A. Template was already created u2013 Provide standard security option to use in security policies

:B. Needs to be applied at the GP level

:C. Security templates are inactive until imported into a Group Policy object or the SecurityConfiguration and Analysis

:D. Tool to ID windows problems


Q6. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1. Server1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.

You create two IPv4 scopes on Server1. The scopes are configured as shown in the following table.

The DHCP clients in Subnet1 can connect to the client computers in Subnet2 by using an IP address or a FQDN.

You discover that the DHCP clients in Subnet2 can connect to client computers in Subnet1 by using an IP address only.

You need to ensure that the DHCP clients in both subnets can connect to any other DHCP client by using a FQDN.

What should you add?

A. The 015 DNS Domain Name option to Subnet1

B. The 015 DNS Domain Name option to Subnet2

C. The 006 DNS Servers option to Subnet2

D. The 006 DNS Servers option to Subnet1

Answer: C

Explanation: References:

http://technet.microsoft.com/en-us/library/ee941136%28v=WS.10%29.aspx

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, p.253


Q7. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that hosts the primary DNS zone for contoso.com.

All client computers are configured to use DC1 as the primary DNS server.

You need to configure DC1 to resolve any DNS requests that are not for the contoso.com zone by querying the DNS server of your Internet Service Provider (ISP).

What should you configure?

A. Naming Authority Pointer (NAPTR) DNS resource records (RR)

B. Name server (NS) records

C. A Forwarders

D. Conditional forwarders

Answer: C

Explanation:

On a network with several servers and/or client computers a server that is configured as a forwarder will manage the Domain Name System (DNS) traffic between your network and the Internet.


Q8. Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.

You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs on Server1 are under a heavy load.

What should you configure?

A. NUMA topology

B. Resource control

C. resource metering

D. virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Answer: B

Explanation:

:B. Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual machine. Resource control in used in the event where you need to adjust the computing resources of a virtual machine, you can reconfigure the resources to meet the changing needs. You can also specify resource controls to automate how resources are allocated to virtual machines.

References:

http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831410.aspx http://technet.microsoft.com/en-us/library/cc742470.aspx

Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335


Q9. You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 has the virtual switches listed in the following table.

You create a virtual machine named VM1.VM1 has two network adapters. One network adapter connects to vSwitch1. The other network adapter connects to vSwitch2.You configure NIC teaming on VM1.

You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the network.

What should you do on Server1?

A. Run the Set-VmNetworkAdaptercmdlet.

B. Add a new network adapter to VM1.

C. Create a new virtual switch on Server 1.

D. Modify the properties of vSwitch1 and vSwitch2.

Answer: A


Q10. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 is connected to two Fibre Channel SANs and is configured as shown in the following table.

You have a virtual machine named VM1.

You need to configure VM1 to connect to SAN1. What should you do first?

A. Add one HBA

B. Create a Virtual Fibre Channel SAN.

C. Create a Hyper-V virtual switch.

D. Configure network adapter teaming.

Answer: B

Explanation:

You need your virtualized workloads to connect easily and reliably to your existing storage arrays.

Windows Server 2012 provides Fibre Channel ports within the guest operating system, which allows you to connect to Fibre Channel directly from within virtual machines. This

feature protects your investments in Fibre Channel, enables you to virtualize workloads that use direct access to Fibre Channel storage, allows you to cluster guest operating systems over Fibre Channel, and provides an important new storage option for servers hosted in your virtualization infrastructure.

With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre Channel storage from within a virtual machine. This allows you to use your existing Fibre Channel investments to support virtualized workloads.

Support for Fibre Channel in Hyper-V guests also includes support for many related features, such as virtual SANs, live migration, and MPIO.


P.S. Easily pass 70-410 Exam with Thedumpscentre Tested Dumps & pdf vce, Try Free: http://www.thedumpscentre.com/70-410-dumps/ (496 New Questions)