70-410 Premium Bundle

70-410 Premium Bundle

Installing and Configuring Windows Server 2012 Certification Exam

4.5 
(4635 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-410 Free Practice Questions

Q1. - (Topic 3) 

You have a print server named Server1. 

You install a printer on Server1. You share the printer as Printer1. 

You need to configure Printer1 to be available only from 19:00 to 05:00 every day. 

Which settings from the properties of Printer1 should you modify? 

A. Sharing 

B. Security 

C. Advanced 

D. Device Settings 

E. Ports 

Answer:

Explanation: 

When navigating to the printer properties, the Properties tab is divided into several different tabs of which the Advanced tab will give you access to the scheduling where you can configure the availability of the printer. 

: http://technet.microsoft.com/en-us/library/cc722526.aspx 

Q2. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The DNS zone for contoso.com is Active-Directory integrated. 

The domain contains 500 client computers. There are an additional 20 computers in a workgroup. 

You discover that every client computer on the network can add its record to the contoso.com zone. 

You need to ensure that only the client computers in the Active Directory domain can register records in the contoso.com zone. 

What should you do? 

A. Sign the contoso.com zone by using DNSSEC. 

B. Configure the Dynamic updates settings of the contoso.com zone. 

C. Configure the Security settings of the contoso.com zone. 

D. Move the contoso.com zone to a domain controller that is configured as a DNS server. 

Answer:

Q3. DRAG DROP - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You need to create a new volume on Server1. 

The new volume must have the following configurations: Be stored on a new virtual hard disk Be assigned the drive letter G Have the NTFS file system In which order should you run the Diskpart commands? 

To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the correct order. 

Answer:  

Q4. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. 

You log on to Server1. 

You need to retrieve a list of the active TCP connections on Server2. 

Which command should you run from Server1? 

A. winrm get server2 

B. netstat> server2 

C. dsquery * -scope base -attrip, server2 

D. winrs -r:server2 netstat 

Answer:

Explanation: 

This command line tool enables administrators to remotely execute most Cmd.exe commands using the WSManagement protocol. 

Q5. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. An organizational unit (OU) named OU1 contains user accounts and computer accounts. A Group Policy object (GPO) named GP1 is linked to the domain. GP1 contains Computer Configuration settings and User Configuration settings. 

You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers. 

What should you configure? 

A. the Group Policy loopback processing mode 

B. the Block Inheritance feature 

C. the Enforced setting 

D. the GPO Status 

Answer:

Explanation: 

Q6. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers. 

The domain controllers are configured as shown in the following table. 

In the perimeter network, you install a new server named Server1 that runs Windows Server 2012 R2. Server1 is in a workgroup. 

You need to perform an offline domain join of Server1 to the contoso.com domain. 

What should you do first? 

A. Transfer the PDC emulator role to Dc1. 

B. Run the djoin.exe command. 

C. Run the dsadd.exe command. 

D. Transfer the infrastructure master role to DC1. 

Answer:

Explanation: 

A. Creates a new Active Directory computer. 

B. Use djoin for offline join in the perimeter network 

C. Adds specific types of objects to the directory. 

D. Add the local computer to a domain or workgroup. 

Q7. - (Topic 3) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. You need to install the Remote Desktop Services server role on Server2 remotely from Server1. Which tool should you use? 

A. The dsadd.exe command 

B. The Server Manager console 

C. The Remote Desktop Gateway Manager console 

D. The Install-RemoteAccess cmdlet 

Answer:

Q8. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

When you recently added new workstations to the Contoso.com manually, you found that that the computer accounts were created in the default container. 

You want to make sure that the default container for newly created computers is redirected to a specified, target organizational unit (OU). 

Which of the following actions should you take? 

A. You should consider making use of the replace.exe command-line tool. 

B. You should consider making use of the redircmp.exe command-line tool. 

C. You should consider making use of the redirusr.exe command-line tool. 

D. You should consider making use of the rexec.exe command-line tool. 

Answer:

Explanation: 

redircmp.exe redirects the default container for newly created computers to a specified, target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers. 

Q9. - (Topic 3) 

In a domain running at the Windows Server 2012 R2 domain functional level, which of the following security principals can be members of a global group? (Choose all answers that are correct.) 

A. Users 

B. Computers 

C. Universal groups 

D. Global groups 

Answer: A,B,D 

Explanation: 

A. Correct: Users can be security principals in a global group. 

B. Correct: Computers can be security principals in a global group. 

C. Incorrect: Universal groups cannot be security principals in a global group. 

D. Correct: Global group can be security principals in a global group.