70-410 Flashcards
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You reconfigure DC2 as a member server in the domain.
You need to add DC2 as the first domain controller in a new domain in the forest.
Which cmdlet should you run?
Available Choices
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController C. Install-WindowsFeature D. Install-AddsDomain E. Rename AdObject F. Set AdAccountControl G. Set-AdGroup H. Set-User
D. Install-AddsDomain
Your network contains an Active Directory domain named contoso.com.
You log on to a domain controller by using an account named Admin1.Admin1 is a member of the Domain Admins group.
You view the properties of a group named Group1 as shown in the exhibit. (Click the Exhibit button.)
Group1 is located in an organizational unit (OU) named OU1.
You need to ensure that users from Group1 can modify the Security settings of OU1 only.
What should you do from Active Directory Users and Computers?
Available Choices
A. Right-click OU1 and select Delegate Control.
B. Right-click contoso.com and select Delegate Control.
C. Modify the Security settings of Group1.
D. Modify the Managed By settings on OU1.

A. Right-click OU1 and select Delegate Control.
Explanation:
Delegating control to only the OU will allow the users of Group1 to modify the security settings.
References:
http://msdn.microsoft.com/en-us/library/windows/desktop/ms676857(v=vs.85).aspx http://technet.microsoft.com/en-us/library/cc732524.aspx
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.Server1 is configured as shown in the following table.
VM3 is used to test applications.
You need to prevent VM3 from synchronizing its clock to Server1.
What should you configure?
Available Choices
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O visualization

I. Integration Services
Explanation:
Integration Services settings on virtual machines includes services such as operating system shutdown, time synchronization, data exchange, Heart beat, and Backup (volume snapshot services. Thus you should disable the time synchronization using Integration Services.
References:
http://blogs.technet.com/b/virtualization/archive/2008/08/29/backing-up-hyper-v-virtual- machines.aspx
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p. 144
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.
The disks on Server1 are configured as shown in the exhibit.(Click the Exhibit button.)
You create a virtual machine on Server1.
You need to ensure that you can configure a pass-through disk for the virtual machine.
What should you do?
Available Choices
A. Convert Disk 1 to a GPT disk.
B. Delete partition E.
C. Convert Disk 1 to a dynamic disk.
D. Take Disk 1 offline.

D. Take Disk 1 offline.
Explanation/References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 3.2: Create and Configure virtual machine storage, Chapter 3: p. 159 Exam Ref 70-410: Installing and Configuring Server 2012: Objective 1.3: Installing and Configuring servers, Chapter 1: p. 42-43
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-hyper- v.aspx
You have a print server named Server1 that runs Windows Server 2012 R2.
On Server1, you create and share a printer named Printer1.
The Advanced settings of Printer1 are shown in the Advanced exhibit.(Click the Exhibit button.)
The Security settings of Printer1 are shown in the Security exhibit. (Click the Exhibit button.)
The Members settings of a group named Group1 are shown in the Group1 exhibit.(Click the Exhibit button.)
Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.

- NO
- NO
- YES
(See image)

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.Server1 runs Windows Server 2012 R2.
On Server1, you create a printer named Printed. You share Printed and publish Printed in Active Directory.
You need to provide a group named Group1 with the ability to manage Printer1.
What should you do?
Available Choices
A. From Print Management, configure the Sharing settings of Printer1.
B. From Active Directory Users and Computers, configure the Security settings of Server1- Printer1. C. From Print Management, configure the Security settings of Printer1. D. From Print Management, configure the Advanced settings of Printer1.
C. From Print Management, configure the Security settings of Printer1.
Explanation:
If you navigate to the Security tab of the Print Server Properties you will find the Permissions that you can set to Allow which will provide Group1 with the ability to manage Printer1.
Set permissions for print servers
1. Open Print Management.
2. In the left pane, clickPrint Servers, right-click the applicable print server and then clickProperties.
3. On theSecuritytab, underGroup or users names, click a user or group for which you want to set permissions.
4. UnderPermissions for , select theAlloworDenycheck boxes for the permissions listed as needeD.
5. To editSpecial permissions, clickAdvanceD.
6. On thePermissionstab, click a user group, and then clickEdit.
7. In thePermissionEntrydialog box, select theAlloworDenycheck boxes for the permissions that you want to edit.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. The domain contains a standalone server named Server2 that is located in a perimeter network. Both servers run Windows Server 2012 R2.
You need to manage Server2 remotely from Server1.
What should you do?
Available Choices
A. From Server1, run the Enable-PsRemotingcmdlet.
B. From Server2, run the winrm command. C. From Server2/ run the Enable-PsRemotingcmdlet. D. From Server1, run the winrm command.
D. From Server1, run the winrm command.
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Print and Document Services server role installed.
Server1 is connected to two identical print devices.
The solution must ensure that if one print device fails, the print jobs will print automatically on the other print device.
What should you do on Server1?
Available Choices
A. Add two printers and configure the priority of each printer.
B. Install the Failover Clustering feature, and then add one printer. C. Install the Network Load Balancing (NLB) feature, and then add one printer. D. Add one printer and configure printer pooling.
D. Add one printer and configure printer pooling.
Explanation:
By adding one printer as the default printer you ensure that only that printer is used at a time, and creating a printing pool to automatically distribute print jobs to the next available printer will cover all the requirements stated in the question. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer.
A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for their documents. A printing pool also simplifies administration because multiple printers can be managed from the same logical printer on a server.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 2.3 Configure print and document services, Chapter 2: Configure Server roles and Features, p. 93, 97 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File Services and Storage, p. 361
http://technet.microsoft.com/en-us/library/cc757086(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc784619(v=ws.10).aspx http://technet.microsoft.com/en-us/library/jj556311.aspx
You have two servers named Server1 and Server2 that run Windows Server 2012 R2.Server1 and Server2 are part of a workgroup.
On Server1, you add Server2 to Server Manager.
When you attempt to connect to Server2 from Server Manager, you receive the following error message: “Credentials not valid.”
You need to ensure that you can manage Server2 from Server1 by using Server Manager on Server1.
What should you do
Available Choices
A. On Server1, run the Set-Item cmdlet. B. On Server 1, run the Set-NetFirewallRulecmdlet. C. On Server 2, install the Remote Server Administration Tools (RSAT). D. On Server2, run the Configure-SmRemotingcmdlet.
D. On Server2, run the Configure-SmRemotingcmdlet.
You have virtual machine named VM1.
VM1 uses a fixed size virtual hard disk (VHD) named Disk1.vhD. Disk1.vhd is 200 GB.
You shut down VM1.
You need to reduce the size of Disk1.vhD.
Which action should you select from the Edit Virtual Hard Disk Wizard?
Available Choices
A. Shrink B. compact C. Merge D. Convert
CONVERT
The Edit Virtual Hard Disk Wizard allows you to Compact, Convert, or Expand the VHD. Compacting reduces the size of a dynamically expanding VHD but not a fixed-size VHD. Converting changes the disk format to the newer VHDX. This process recreates the virtual disk, and allows you to specify the size of the VHDX.
Ref: http://blogs.technet.com/b/yungchou/archive/2013/01/23/hyper-v-virtual-hard-disk-vhd-operations-explained.aspx
http://blogs.technet.com/b/aviraj/archive/2012/05/06/windows-server-2012-convert-vhd-to-vhdx-using-hyper-v-manager.aspx
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that has the DNS Server server role installed. Server1 hosts a primary zone for contoso.com.
The domain contains a member server named Server2 that is configured to use Server1 as its primary DNS server.
From Server2, you run nslookup.exe as shown in the exhibit.
You need to ensure that when you run Nslookup, the correct name of the default server is displayed.
What should you do?
Available Choices
A. On Server1, create a reverse lookup zone.
B. On Server1, modify the Security settings of the contoso.com zone.
C. From Advanced TCP/IP Settings on Server1, add contoso.com to the DNS suffix list.
D. From Advanced TCP/IP Settings on Server2, add contoso.com to the DNS suffix list.

A. On Server1, create a reverse lookup zone.
Explanation:
Make sure that a reverse lookup zone that is authoritative for the PTR resource record exists. PTR records contain the information that is required for the server to perform reverse name lookups.
References:
http://technet.microsoft.com/en-us/library/cc961417.aspx Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6 addressing, p.246
You have a server named Server1 that runs Windows Server 2012 R2.
You connect three new hard disks to Server1.
You need to create a storage space that contains the three disks.
The solution must meet the following requirements:
Provide fault tolerance if a single disk fails.
Maximize the amount of useable storage space.
What should you create?
Available Choices
A. A mirrored space
B. A spanned volume C. A parity space D. A simple space
A parity space
Explanation:
Fault tolerant and better space ratio. The data on volumes created on this type of virtual disk, together with parity information that can be used to facilitate automatic reconstruction of data in the event of a physical disk failure, is striped across all physical disks in the pool. Parity virtual disks also provide resiliency to help protect you from data loss arising from the failure 368 Chapter 8 File services and storage of a physical disk in the pool, but they perform better with large sequential disk writes than with random I/O.
References:
http://social.technet.microsoft.com/wiki/contents/articles/15198.storage-spaces-overview.aspx http://technet.microsoft.com/en-us/library/cc772180.aspx Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File Services and Storage, p. 367-8
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You plan to schedule a complete backup of Server1 by using Windows Server Backup.
You need to ensure that the state of VM1 is saved before the backup starts.
What should you configure?
Available Choices
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization

Integration Services
You have a server that runs Windows Server 2012 R2.
The disks on the server are configured as shown in the exhibit.(Click the Exhibit button.)
You need to create a storage pool that contains Disk 1 and Disk 2.
What should you do first?
Available Choices
A. Convert Disk 1 and Disk 2 to GPT disks.
B. Create a volume on Disk 2.
C. Convert Disk 1 and Disk 2 to dynamic disks.
D. Delete volume E.

D. Delete volume E.
Explanation:
Storage Pools use unallocated space thus you need to delete Volume E.
References:
http://technet.microsoft.com/en-us/library/ff399688.aspx
You have a server named Server1 that runs Windows Server 2012 R2.
A network technician installs a new disk on Server1 and creates a new volume. The properties of the new volume are shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can restore files on volume D by using the Previous Versions tab
What should you do first?
Available Choices
A. Install the File Server Resource Manager role service.
B. Convert the disk to a dynamic disk.
C. Run the convert.exe command.
D. Format volume D.

D. Format volume D.
Shadow Copies for Shared Folders is activated at the volume level. A Shadow copy is essentially a copy of the disk at a specific moment in time, and this has to be set up do that you can have a Previous Version that can be used to restore files. However, prior to any action taken to set up shadow copies, you need to format the disk first since it is mentioned that it is a NEW volume that was created.
Your network contains an Active Directory domain named contoso.com.
You create a software restriction policy to allow an application named App1 by using a certificate rule.
You need to ensure that when users attempt to execute App1, the certificate for App1 is verified against a certificate revocation list (CRL).
What should you do?
Available Choices
A. Modify the rule for App1.
B. Modify the Trusted Publishers Properties. C. Create a new certificate rule for App1. D. Modify the Enforcement Properties.
B. Modify the Trusted Publishers Properties.
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You need to ensure that User1 can manage the group membership of Group1. The solution must minimize the number of permissions assigned to User1.
Which cmdlet should you run?
Available Choices
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController C. Install-WindowsFeature D. Install-AddsDomain E. Rename AdOh F. Set-AdAccountControl G. Set-AdGroup H. Set-User
G. Set-AdGroup
Explanation:
The Set-ADGroup cmdlet modifies the properties of an Active Directory group. You can modify commonly used property values by using the cmdlet parameters. ManagedBy Specifies the user or group that manages the object by providing one of the following property values. Note:
The identifier in parentheses is the LDAP display name for the property.
Distinguished Name
Example: CN=SaraDavis,OU=Europe,CN=Users,DC=corp,DC=contoso,DC=com GUID (objectGUID)
Example: 599c3d2e-f72d-4d20-8a88-030d99495f20
Security Identifier (objectSid)
Example: S-1-5-21-3165297888-301567370-576410423-1103
SAM Account Name (sAMAccountName)
Example: saradavis
The Install-ADDSDomainController cmdlet installs a domain controller in Active Directory. Example: C:\PS>Install-ADDSDomainController -InstallDns -Credential (Get-Credential CORP\Administrator) -DomainName “corp.contoso.com”
References:
http://technet.microsoft.com/en-us/library/hh974723.aspx http://technet.microsoft.com/en-us/library/ee617199.aspx http://technet.microsoft.com/en-us/library/ee617225.aspx
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
You create a new inbound rule by using Windows Firewall with Advanced Security.
You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network.
Which setting in the rule should you configure?
Available Choices
A. Interface types
B. Authorized computers C. Remote IP address D. Edge traversal
D. Edge traversal
Explanation:
Edge traversal allows the computer to accept unsolicited inbound packets that have passed through an edge device, such as a network address translation (NAT) router or firewall.
References:
http://technet.microsoft.com/en-us/library/cc731927.aspx
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. An iSCSI SAN is available on the network. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. You create a LUN on the SAN to host the virtual hard drive files for the virtual machines. You need to create a 3-TB virtual hard disk for VM1 on the LUN. The solution must prevent VM1 from being paused if the LUN runs out of disk space. Which type of virtual hard disk should you create on the LUN?
Choose One:
Dynamically expanding VHDX
Fixed-size VHDX
Fixed-size VHD
Dynamically expanding VHD
Fixed-size VHDX
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
VM1 has several snapshots.
You need to modify the snapshot file location of VM1.
What should you do?
Available Choices
A. Right-click VM1, and then click Export…
B. Shut down VM1, and then modify the settings of VM1. C. Delete the existing snapshots, and then modify the settings of VM1. D. Pause VM1, and then modify the settings of VM1.
C. Delete the existing snapshots, and then modify the settings of VM1.
Explanation: you will need to navigate to the Hyper-V Management snap-in
(C:\ProgramData\Microsoft\Windows\Hyper-V) and from there access the Snapshot file Location tab where you can change the settings for the VM1 snapshot file location. However, since there are already several snapshots in existence, you will need to delete them first because you will not be able to change the location of the snapshot file while there is an existing snapshot and you need to modify the snapshot file location of VM1.
You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2 Datacenter.
You have a WIM file that contains the four images of Windows Server 2012 R2 as shown in the Images exhibit.(Click the Exhibit button.)
You review the installed features on Server1 as shown in the Features exhibit.(Click the Exhibit button.)
You need to install the Server Graphical Shell feature on Server1.
Which two possible sources can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
Available Choices
A. Index 1
B. Index 2
C. Index 3
D. Index 4

B. Index 2
D. Index 4
Explanation:
When you install Windows Server 2012 R2, you can choose between Server Core Installation and Server with a GUI. The “Server with a GUI” option is the Windows Server 2012 R2 equivalent of the Full installation option available in Windows Server 2008 R2. The “Server Core Installation” option reduces the space required on disk, the potential attack surface, and especially the servicing requirements, so we recommend that you choose the Server Core installation unless you have a particular need for the additional user interface elements and graphical management tools that are included in the “Server with a GUI” option. For this reason, the Server Core installation is now the default. Because you can freely switch between these options at any time later, one approach might be to initially install the Server with a GUI option, use the graphical tools to configure the server, and then later switch to the Server Core Installation option.
Reference: Windows Server Installation Options
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that hosts the primary DNS zone for contoso.com.
All client computers are configured to use DC1 as the primary DNS server.
You need to configure DC1 to resolve any DNS requests that are not for the contoso.com zone by querying the DNS server of your Internet Service Provider (ISP).
What should you configure?
Available Choices
A. Naming Authority Pointer (NAPTR) DNS resource records (RR)
B. Name server (NS) records C. Forwarders D. Conditional forwarders
C. Forwarders
Explanation:
On a network with several servers and/or client computers a server that is configured as a forwarder will manage the Domain Name System (DNS) traffic between your network and the Internet.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed.
A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge Handshake Authentication Protocol (CHAP) for remote connections. CHAP is enabled on Server1.
You need to ensure that User1 can connect to Server1 and authenticate to the domain.
What should you do from Active Directory Users and Computers?
Available Choices
A. From the properties of User1, select Store password using reversible encryption.
B. From the properties of Server1, assign the Allowed to Authenticate permission to User1. C. From the properties of User1, select Use Kerberos DES encryption types for this account. D. From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only).
A. From the properties of User1, select Store password using reversible encryption.
Your network contains an Active Directory domain named contoso.com. The domain contains hundreds of groups, many of which are nested in other groups.
The domain contains a user account named user1.User1 is a direct member of 15 groups.
You need to identify of which Active Directory groups User1 is a member, including the nested groups. The solution must minimize administrative effort.
Which tool should you use?
Available Choices
A. Active Directory Users and Computers
B. ADSI Edit C. Get-ADUser D. Dsget
D. Dsget





























