70-410 Flashcards
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You reconfigure DC2 as a member server in the domain.
You need to add DC2 as the first domain controller in a new domain in the forest.
Which cmdlet should you run?
Available Choices
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController C. Install-WindowsFeature D. Install-AddsDomain E. Rename AdObject F. Set AdAccountControl G. Set-AdGroup H. Set-User
D. Install-AddsDomain
Your network contains an Active Directory domain named contoso.com.
You log on to a domain controller by using an account named Admin1.Admin1 is a member of the Domain Admins group.
You view the properties of a group named Group1 as shown in the exhibit. (Click the Exhibit button.)
Group1 is located in an organizational unit (OU) named OU1.
You need to ensure that users from Group1 can modify the Security settings of OU1 only.
What should you do from Active Directory Users and Computers?
Available Choices
A. Right-click OU1 and select Delegate Control.
B. Right-click contoso.com and select Delegate Control.
C. Modify the Security settings of Group1.
D. Modify the Managed By settings on OU1.
A. Right-click OU1 and select Delegate Control.
Explanation:
Delegating control to only the OU will allow the users of Group1 to modify the security settings.
References:
http://msdn.microsoft.com/en-us/library/windows/desktop/ms676857(v=vs.85).aspx http://technet.microsoft.com/en-us/library/cc732524.aspx
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.Server1 is configured as shown in the following table.
VM3 is used to test applications.
You need to prevent VM3 from synchronizing its clock to Server1.
What should you configure?
Available Choices
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O visualization
I. Integration Services
Explanation:
Integration Services settings on virtual machines includes services such as operating system shutdown, time synchronization, data exchange, Heart beat, and Backup (volume snapshot services. Thus you should disable the time synchronization using Integration Services.
References:
http://blogs.technet.com/b/virtualization/archive/2008/08/29/backing-up-hyper-v-virtual- machines.aspx
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p. 144
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.
The disks on Server1 are configured as shown in the exhibit.(Click the Exhibit button.)
You create a virtual machine on Server1.
You need to ensure that you can configure a pass-through disk for the virtual machine.
What should you do?
Available Choices
A. Convert Disk 1 to a GPT disk.
B. Delete partition E.
C. Convert Disk 1 to a dynamic disk.
D. Take Disk 1 offline.
D. Take Disk 1 offline.
Explanation/References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 3.2: Create and Configure virtual machine storage, Chapter 3: p. 159 Exam Ref 70-410: Installing and Configuring Server 2012: Objective 1.3: Installing and Configuring servers, Chapter 1: p. 42-43
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-hyper- v.aspx
You have a print server named Server1 that runs Windows Server 2012 R2.
On Server1, you create and share a printer named Printer1.
The Advanced settings of Printer1 are shown in the Advanced exhibit.(Click the Exhibit button.)
The Security settings of Printer1 are shown in the Security exhibit. (Click the Exhibit button.)
The Members settings of a group named Group1 are shown in the Group1 exhibit.(Click the Exhibit button.)
Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.
- NO
- NO
- YES
(See image)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.Server1 runs Windows Server 2012 R2.
On Server1, you create a printer named Printed. You share Printed and publish Printed in Active Directory.
You need to provide a group named Group1 with the ability to manage Printer1.
What should you do?
Available Choices
A. From Print Management, configure the Sharing settings of Printer1.
B. From Active Directory Users and Computers, configure the Security settings of Server1- Printer1. C. From Print Management, configure the Security settings of Printer1. D. From Print Management, configure the Advanced settings of Printer1.
C. From Print Management, configure the Security settings of Printer1.
Explanation:
If you navigate to the Security tab of the Print Server Properties you will find the Permissions that you can set to Allow which will provide Group1 with the ability to manage Printer1.
Set permissions for print servers
1. Open Print Management.
2. In the left pane, clickPrint Servers, right-click the applicable print server and then clickProperties.
3. On theSecuritytab, underGroup or users names, click a user or group for which you want to set permissions.
4. UnderPermissions for , select theAlloworDenycheck boxes for the permissions listed as needeD.
5. To editSpecial permissions, clickAdvanceD.
6. On thePermissionstab, click a user group, and then clickEdit.
7. In thePermissionEntrydialog box, select theAlloworDenycheck boxes for the permissions that you want to edit.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. The domain contains a standalone server named Server2 that is located in a perimeter network. Both servers run Windows Server 2012 R2.
You need to manage Server2 remotely from Server1.
What should you do?
Available Choices
A. From Server1, run the Enable-PsRemotingcmdlet.
B. From Server2, run the winrm command. C. From Server2/ run the Enable-PsRemotingcmdlet. D. From Server1, run the winrm command.
D. From Server1, run the winrm command.
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Print and Document Services server role installed.
Server1 is connected to two identical print devices.
The solution must ensure that if one print device fails, the print jobs will print automatically on the other print device.
What should you do on Server1?
Available Choices
A. Add two printers and configure the priority of each printer.
B. Install the Failover Clustering feature, and then add one printer. C. Install the Network Load Balancing (NLB) feature, and then add one printer. D. Add one printer and configure printer pooling.
D. Add one printer and configure printer pooling.
Explanation:
By adding one printer as the default printer you ensure that only that printer is used at a time, and creating a printing pool to automatically distribute print jobs to the next available printer will cover all the requirements stated in the question. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer.
A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for their documents. A printing pool also simplifies administration because multiple printers can be managed from the same logical printer on a server.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 2.3 Configure print and document services, Chapter 2: Configure Server roles and Features, p. 93, 97 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File Services and Storage, p. 361
http://technet.microsoft.com/en-us/library/cc757086(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc784619(v=ws.10).aspx http://technet.microsoft.com/en-us/library/jj556311.aspx
You have two servers named Server1 and Server2 that run Windows Server 2012 R2.Server1 and Server2 are part of a workgroup.
On Server1, you add Server2 to Server Manager.
When you attempt to connect to Server2 from Server Manager, you receive the following error message: “Credentials not valid.”
You need to ensure that you can manage Server2 from Server1 by using Server Manager on Server1.
What should you do
Available Choices
A. On Server1, run the Set-Item cmdlet. B. On Server 1, run the Set-NetFirewallRulecmdlet. C. On Server 2, install the Remote Server Administration Tools (RSAT). D. On Server2, run the Configure-SmRemotingcmdlet.
D. On Server2, run the Configure-SmRemotingcmdlet.
You have virtual machine named VM1.
VM1 uses a fixed size virtual hard disk (VHD) named Disk1.vhD. Disk1.vhd is 200 GB.
You shut down VM1.
You need to reduce the size of Disk1.vhD.
Which action should you select from the Edit Virtual Hard Disk Wizard?
Available Choices
A. Shrink B. compact C. Merge D. Convert
CONVERT
The Edit Virtual Hard Disk Wizard allows you to Compact, Convert, or Expand the VHD. Compacting reduces the size of a dynamically expanding VHD but not a fixed-size VHD. Converting changes the disk format to the newer VHDX. This process recreates the virtual disk, and allows you to specify the size of the VHDX.
Ref: http://blogs.technet.com/b/yungchou/archive/2013/01/23/hyper-v-virtual-hard-disk-vhd-operations-explained.aspx
http://blogs.technet.com/b/aviraj/archive/2012/05/06/windows-server-2012-convert-vhd-to-vhdx-using-hyper-v-manager.aspx
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that has the DNS Server server role installed. Server1 hosts a primary zone for contoso.com.
The domain contains a member server named Server2 that is configured to use Server1 as its primary DNS server.
From Server2, you run nslookup.exe as shown in the exhibit.
You need to ensure that when you run Nslookup, the correct name of the default server is displayed.
What should you do?
Available Choices
A. On Server1, create a reverse lookup zone.
B. On Server1, modify the Security settings of the contoso.com zone.
C. From Advanced TCP/IP Settings on Server1, add contoso.com to the DNS suffix list.
D. From Advanced TCP/IP Settings on Server2, add contoso.com to the DNS suffix list.
A. On Server1, create a reverse lookup zone.
Explanation:
Make sure that a reverse lookup zone that is authoritative for the PTR resource record exists. PTR records contain the information that is required for the server to perform reverse name lookups.
References:
http://technet.microsoft.com/en-us/library/cc961417.aspx Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6 addressing, p.246
You have a server named Server1 that runs Windows Server 2012 R2.
You connect three new hard disks to Server1.
You need to create a storage space that contains the three disks.
The solution must meet the following requirements:
Provide fault tolerance if a single disk fails.
Maximize the amount of useable storage space.
What should you create?
Available Choices
A. A mirrored space
B. A spanned volume C. A parity space D. A simple space
A parity space
Explanation:
Fault tolerant and better space ratio. The data on volumes created on this type of virtual disk, together with parity information that can be used to facilitate automatic reconstruction of data in the event of a physical disk failure, is striped across all physical disks in the pool. Parity virtual disks also provide resiliency to help protect you from data loss arising from the failure 368 Chapter 8 File services and storage of a physical disk in the pool, but they perform better with large sequential disk writes than with random I/O.
References:
http://social.technet.microsoft.com/wiki/contents/articles/15198.storage-spaces-overview.aspx http://technet.microsoft.com/en-us/library/cc772180.aspx Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File Services and Storage, p. 367-8
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You plan to schedule a complete backup of Server1 by using Windows Server Backup.
You need to ensure that the state of VM1 is saved before the backup starts.
What should you configure?
Available Choices
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Integration Services
You have a server that runs Windows Server 2012 R2.
The disks on the server are configured as shown in the exhibit.(Click the Exhibit button.)
You need to create a storage pool that contains Disk 1 and Disk 2.
What should you do first?
Available Choices
A. Convert Disk 1 and Disk 2 to GPT disks.
B. Create a volume on Disk 2.
C. Convert Disk 1 and Disk 2 to dynamic disks.
D. Delete volume E.
D. Delete volume E.
Explanation:
Storage Pools use unallocated space thus you need to delete Volume E.
References:
http://technet.microsoft.com/en-us/library/ff399688.aspx
You have a server named Server1 that runs Windows Server 2012 R2.
A network technician installs a new disk on Server1 and creates a new volume. The properties of the new volume are shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can restore files on volume D by using the Previous Versions tab
What should you do first?
Available Choices
A. Install the File Server Resource Manager role service.
B. Convert the disk to a dynamic disk.
C. Run the convert.exe command.
D. Format volume D.
D. Format volume D.
Shadow Copies for Shared Folders is activated at the volume level. A Shadow copy is essentially a copy of the disk at a specific moment in time, and this has to be set up do that you can have a Previous Version that can be used to restore files. However, prior to any action taken to set up shadow copies, you need to format the disk first since it is mentioned that it is a NEW volume that was created.
Your network contains an Active Directory domain named contoso.com.
You create a software restriction policy to allow an application named App1 by using a certificate rule.
You need to ensure that when users attempt to execute App1, the certificate for App1 is verified against a certificate revocation list (CRL).
What should you do?
Available Choices
A. Modify the rule for App1.
B. Modify the Trusted Publishers Properties. C. Create a new certificate rule for App1. D. Modify the Enforcement Properties.
B. Modify the Trusted Publishers Properties.
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You need to ensure that User1 can manage the group membership of Group1. The solution must minimize the number of permissions assigned to User1.
Which cmdlet should you run?
Available Choices
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController C. Install-WindowsFeature D. Install-AddsDomain E. Rename AdOh F. Set-AdAccountControl G. Set-AdGroup H. Set-User
G. Set-AdGroup
Explanation:
The Set-ADGroup cmdlet modifies the properties of an Active Directory group. You can modify commonly used property values by using the cmdlet parameters. ManagedBy Specifies the user or group that manages the object by providing one of the following property values. Note:
The identifier in parentheses is the LDAP display name for the property.
Distinguished Name
Example: CN=SaraDavis,OU=Europe,CN=Users,DC=corp,DC=contoso,DC=com GUID (objectGUID)
Example: 599c3d2e-f72d-4d20-8a88-030d99495f20
Security Identifier (objectSid)
Example: S-1-5-21-3165297888-301567370-576410423-1103
SAM Account Name (sAMAccountName)
Example: saradavis
The Install-ADDSDomainController cmdlet installs a domain controller in Active Directory. Example: C:\PS>Install-ADDSDomainController -InstallDns -Credential (Get-Credential CORP\Administrator) -DomainName “corp.contoso.com”
References:
http://technet.microsoft.com/en-us/library/hh974723.aspx http://technet.microsoft.com/en-us/library/ee617199.aspx http://technet.microsoft.com/en-us/library/ee617225.aspx
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
You create a new inbound rule by using Windows Firewall with Advanced Security.
You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network.
Which setting in the rule should you configure?
Available Choices
A. Interface types
B. Authorized computers C. Remote IP address D. Edge traversal
D. Edge traversal
Explanation:
Edge traversal allows the computer to accept unsolicited inbound packets that have passed through an edge device, such as a network address translation (NAT) router or firewall.
References:
http://technet.microsoft.com/en-us/library/cc731927.aspx
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. An iSCSI SAN is available on the network. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. You create a LUN on the SAN to host the virtual hard drive files for the virtual machines. You need to create a 3-TB virtual hard disk for VM1 on the LUN. The solution must prevent VM1 from being paused if the LUN runs out of disk space. Which type of virtual hard disk should you create on the LUN?
Choose One:
Dynamically expanding VHDX
Fixed-size VHDX
Fixed-size VHD
Dynamically expanding VHD
Fixed-size VHDX
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
VM1 has several snapshots.
You need to modify the snapshot file location of VM1.
What should you do?
Available Choices
A. Right-click VM1, and then click Export…
B. Shut down VM1, and then modify the settings of VM1. C. Delete the existing snapshots, and then modify the settings of VM1. D. Pause VM1, and then modify the settings of VM1.
C. Delete the existing snapshots, and then modify the settings of VM1.
Explanation: you will need to navigate to the Hyper-V Management snap-in
(C:\ProgramData\Microsoft\Windows\Hyper-V) and from there access the Snapshot file Location tab where you can change the settings for the VM1 snapshot file location. However, since there are already several snapshots in existence, you will need to delete them first because you will not be able to change the location of the snapshot file while there is an existing snapshot and you need to modify the snapshot file location of VM1.
You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2 Datacenter.
You have a WIM file that contains the four images of Windows Server 2012 R2 as shown in the Images exhibit.(Click the Exhibit button.)
You review the installed features on Server1 as shown in the Features exhibit.(Click the Exhibit button.)
You need to install the Server Graphical Shell feature on Server1.
Which two possible sources can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
Available Choices
A. Index 1
B. Index 2
C. Index 3
D. Index 4
B. Index 2
D. Index 4
Explanation:
When you install Windows Server 2012 R2, you can choose between Server Core Installation and Server with a GUI. The “Server with a GUI” option is the Windows Server 2012 R2 equivalent of the Full installation option available in Windows Server 2008 R2. The “Server Core Installation” option reduces the space required on disk, the potential attack surface, and especially the servicing requirements, so we recommend that you choose the Server Core installation unless you have a particular need for the additional user interface elements and graphical management tools that are included in the “Server with a GUI” option. For this reason, the Server Core installation is now the default. Because you can freely switch between these options at any time later, one approach might be to initially install the Server with a GUI option, use the graphical tools to configure the server, and then later switch to the Server Core Installation option.
Reference: Windows Server Installation Options
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that hosts the primary DNS zone for contoso.com.
All client computers are configured to use DC1 as the primary DNS server.
You need to configure DC1 to resolve any DNS requests that are not for the contoso.com zone by querying the DNS server of your Internet Service Provider (ISP).
What should you configure?
Available Choices
A. Naming Authority Pointer (NAPTR) DNS resource records (RR)
B. Name server (NS) records C. Forwarders D. Conditional forwarders
C. Forwarders
Explanation:
On a network with several servers and/or client computers a server that is configured as a forwarder will manage the Domain Name System (DNS) traffic between your network and the Internet.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed.
A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge Handshake Authentication Protocol (CHAP) for remote connections. CHAP is enabled on Server1.
You need to ensure that User1 can connect to Server1 and authenticate to the domain.
What should you do from Active Directory Users and Computers?
Available Choices
A. From the properties of User1, select Store password using reversible encryption.
B. From the properties of Server1, assign the Allowed to Authenticate permission to User1. C. From the properties of User1, select Use Kerberos DES encryption types for this account. D. From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only).
A. From the properties of User1, select Store password using reversible encryption.
Your network contains an Active Directory domain named contoso.com. The domain contains hundreds of groups, many of which are nested in other groups.
The domain contains a user account named user1.User1 is a direct member of 15 groups.
You need to identify of which Active Directory groups User1 is a member, including the nested groups. The solution must minimize administrative effort.
Which tool should you use?
Available Choices
A. Active Directory Users and Computers
B. ADSI Edit C. Get-ADUser D. Dsget
D. Dsget
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs on Server1 are under a heavy load.
What should you configure?
Available Choices
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Resource control
Your network contains an Active Directory domain named contoso.com. The DNS zone for contoso.com is Active-Directory integrated.
The domain contains 500 client computers. There are an additional 20 computers in a workgroup.
You discover that every client computer on the network can add its record to the contoso.com zone.
You need to ensure that only the client computers in the Active Directory domain can register records in the contoso.com zone.
What should you do?
Available Choices
A. Sign the contoso.com zone by using DNSSEC.
B. Configure the Dynamic updates settings of the contoso.com zone. C. Configure the Security settings of the contoso.com zone. D. Move the contoso.com zone to a domain controller that is configured as a DNS server.
B. Configure the Dynamic updates settings of the contoso.com zone.
Your network contains an Active Directory forest named contoso.com. The forest contains five domains. All domain controllers run Windows Server 2012 R2.
The contoso.com domain contains two user accounts named Admin1 and Admin2.
You need to ensure that Admin1 and Admin2 can configure hardware and services on all of the member servers in the forest. The solution must minimize the number of privileges granted to Admin1 and Admin2.
Which built-in groups should you use?
Available Choices
A. Administrators local groups
B. Administrators domain local groups C. Domain Admins global groups D. Server Operators global groups
A. Administrators local groups
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.Server1 has the Group Policy Management feature installed. Server2 has the Print and Document Services server role installed.
On Server2, you open Print Management and you deploy a printer named Printer1 by using a Group Policy object (GPO) named GPO1.When you open GPO1 on Server1, you discover that the Deployed Printers node does not appear.
You need to view the Deployed Printers node in GPO1.
What should you do?
Available Choices
A. On Server1, modify the Group Policy filtering options of GPO1.
B. On a domain controller, create a Group Policy central store. C. On Server2, install the Group Policy Management feature. D. On Server1, configure the security filtering of GPO1.
C. On Server2, install the Group Policy Management feature.
Explanation:
To use Group Policy for printer deployment you will need to have a Windows Active Directory domain, and this article assumes that your Domain Controller is a Windows 2008 R2 Server. You will also need the Print Services role installed on a server (can be on your DC), and you will be using the Print Management and Group Policy Management consoles to configure the various settings. It is assumed that you have already followed Part One and have one or more printers shared on your server with the necessary drivers, ready to deploy to your client computers. The question does not mention if GPMC is installed on server 2, so I assume that it does not deploy the GPO because it had no GPMC on server 2.
GPMC is not installed by default.
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 is connected to two Fibre Channel SANs and is configured as shown in the following table.
You have a virtual machine named VM1.
You need to configure VM1 to connect to SAN1.
What should you do first?
Available Choices
A. Create a Virtual Fibre Channel SAN.
B. Create a Hyper-V virtual switch.
C. Add one HBA.
D. Configure network adapter teaming.
Create a Virtual Fibre Channel SAN.
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
VM2 sends and receives large amounts of data over the network.
You need to ensure that the network traffic of VM2 bypasses the virtual switches of the parent partition.
What should you configure?
Available Choices
A. NUMA topology
B. Resource control C. resource metering D. virtual Machine Chimney E. The VLAN ID F. Processor Compatibility G. The startup order H. Automatic Start Action I. Integration Services J. Port mirroring K. Single-root I/O virtualization
Single-root I/O virtualization
You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2.
Server1 is configured to obtain an IPv4 address by using DHCP.
You need to configure the IPv4 settings of the network connection on Server1 as follows:
IP address: 10.1.1.1
Subnet mask: 255.255.240.0
Default gateway: 10.1.1.254
What should you run?
Available Choices
A. netsh.exe
B. netcfg.exe C. msconfig.exe D. ipconfig.exe
A. netsh.exe
Explanation:
In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses and many other options you can use Netsh.exE.
You have a shared folder named Share1. The folder permissions of Share1 are configured as shown in the Folder Permissions exhibit.(Click the Exhibit button.)
The Share permissions of Share1 are configured as shown in the Share Permissions exhibit.
(Click the Exhibit button.)
You have a group named Group1. The members of Group1 are shown in the Group1 exhibit.
(Click the Exhibit button.)
Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.
SEE IMaGE
Explanation:
NTFS permissions control access to the files and folders stored on disk volumes formatted with the NTFS file system. Share permissions control access to folders over a network.
To access a file over a network, a user must have appropriate share permissions (and appropriate NTFS permissions if the shared folder is on an NTFS volume).Granting a user Full
Control NTFS permission on a folder enables that user to take ownership of the folder unless the user is restricted in some other way.User1 was not granted Full Control permission.
The Administrators have Full Control permission. I assume that User2 is an administrator since the Group1 exhibit shows only User1 as a member.
References:
http://technet.microsoft.com/en-us/library/cc754178.aspx Exam Ref 70-410: Installing and configuring Windows Server 2012 R2, Chapter 2: Configure server roles and features,
Objective 2.1: Configure file and share access, p.75-80
Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains one domain. A two-way forest trust exists between the forests.
The forests use the address spaces shown in the following table.
From a computer in the contoso.com domain, you can perform reverse lookups for the servers in the contoso.com domain, but you cannot perform reverse lookups for the servers in the adatum.com domain.
From a computer in the adatum.com domain, you can perform reverse lookups for the servers in both domains.
You need to ensure that you can perform reverse lookups for the servers in the adatum.com domain from the computers in the contoso.com domain.
What should you create?
Available Choices
A. A trust point
B. A GlobalNames zone C. A delegation D. A conditional forwarder
D. A conditional forwarder
Explanation:
Conditional forwarders are DNS servers that only forward queries for specific domain names. Instead of forwarding all queries it cannot resolve locally to a forwarder, a conditional forwarder is configured to forward a query to specific forwarders based on the domain name contained in the query. Forwarding in terms of domain names improves conventional forwarding by adding a name-based condition to the forwarding process.
References:
http://technet.microsoft.com/en-us/library/cc757172(v=ws.10).aspx
Your company has a main office and four branch offices. The main office contains a server named Server1 that runs Windows Server 2012 R2.
The IP configuration of each office is configured as shown in the following tablE.
You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all of the subnets.
Which command should you run?
Available Choices
A. route.exe add -p 10.10.0.0 mask 255.255.252.0 10.10.0.1
B. route.exe add -p 172.16.16.0 mask 255.255.252.0 10.10.0.1
C. route.exe add -p 10.10.0.0 mask 255.255.252.0 172.16.0.0
D. route.exe add -p 172.16.18.0 mask 255.255.252.0 10.10.0.1
B. route.exe add -p 172.16.16.0 mask 255.255.252.0 10.10.0.1
Explanation:
These parameters will allow communication with all the hosts.
References:
Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6 addressing, p.192, 196
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1.
You open Review Options in the Active Directory Domain Services Configuration Wizard, and then you click View script.
You need to ensure that you can use the script to promote Server1 to a domain controller.
Which file extension should you use to save the script?
A. .bat B. .cmd C. .psl D. .xml
C. .psl
From http://technet.microsoft.com/en-us/library/jj574105.aspx
The Review Options page in Server Manager also offers an optional View Script button to create a Unicode text file that contains the current ADDSDeployment configuration as a single Windows PowerShell script. This enables you to use the Server Manager graphical interface as a Windows PowerShell deployment studio. Use the Active Directory Domain Services Configuration Wizard to configure options, export the configuration, and then cancel the wizard. This process creates a valid and syntactically correct sample for further modification or direct use.
Your network contains an Active Directory domain named contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named OU1.
You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to OU1. The solution must minimize the number of permissions assigned to User1.
What should you do?
Available Choices
A. Run the Delegation of Control Wizard on OU1.
B. Add User1 to the Group Policy Creator Owners group. C. Modify the permission on the \\Contoso.com\SYSVOL\Contoso.com\Policies folder. D. Modify the permissions on the User1 account.
A. Run the Delegation of Control Wizard on OU1.
The Delegation of Control Wizard allows you to delegate tasks, active Directory Object types and to set permissions.
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.A server named Server1 is configured to encrypt all traffic by using IPSec.
You need to ensure that Server1 can respond to ping requests from computers that do not support IPSec.
What should you do?
Available Choices
A. From a command prompt, run netsh set global autotuninglevel = highlyrestrictedcongestionprovider=none.
B. From a command prompt, run netsh set global autotuninglevel-restricted congestionprovider=ctcp. C. From Windows Firewall with Advanced Security, allow unicast responses for the Domain Profile. D. From Windows Firewall with Advanced Security, exempt ICMP from IPSec.
D. From Windows Firewall with Advanced Security, exempt ICMP from IPSec.
You have a print server named Server1 that runs Windows Server 2012 R2.
You discover that when there are many pending print jobs, the system drive occasionally runs out of free space.
You add a new hard disk to Server1.You create a new NTFS volume.
You need to prevent the print jobs from consuming disk space on the system volume.
What should you modify?
Available Choices
A. The properties on the new volume
B. The properties of the Print Spooler service C. The Print Server Properties D. The properties of each shared printer
The Print Server Properties
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS).
You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE.
Which virtual machine setting should you configure for VM2?
Available Choices (select all choices that are correct) A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
The startup order
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
You create and enforce the default AppLocker executable rules.
Users report that they can no longer execute a legacy application installed in the root of drive C.
You need to ensure that the users can execute the legacy application.
What should you do?
Available Choices
A. Create a new rule.
B. Delete an existing rule. C. Modify the action of the existing rules. D. Add an exception to the existing rules.
A. Create a new rule.
You have a server named Corel that has a Server Core Installation of Windows Server 2012 R2.
Corel has the Hyper-V server role installed. Corel has two network adapters from different third- party hardware vendors.
You need to configure network traffic failover to prevent connectivity loss if a network adapter fails.
What should you use?
Available Choices
A. New-NetSwitchTeam
B. Install-Feature C. Add-NetSwitchTeamMember D. Netsh.exe
A. New-NetSwitchTeam
Your network contains an Active Directory domain named contoso.com.
An organizational unit (OU) named OU1 contains user accounts and computer accounts.
A Group Policy object (GPO) named GP1 is linked to the domain.GP1 contains Computer Configuration settings and User Configuration settings.
You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers.
What should you configure?
Available Choices A. The GPO Status B. The Block Inheritance feature C. The Group Policy loopback processing mode D. The Enforced setting
C. The Group Policy loopback processing mode
Your network contains an Active Directory domain named contoso.com. The domain contains an application server named Server1.Server1 runs Windows Server 2012 R2.
Server1 is configured as an FTP server.
Client computers use an FTP application named App1.exE. App1.exe uses TCP port 21 as the control port and dynamically requests a data port.
On Server1, you create a firewall rule to allow connections on TCP port 21.
You need to configure Server1 to support the client connections from App1.exE.
What should you do?
A. Run netshadvfirewall set global statefulftp enable. B. Run netsh firewall addportopening TCP 21 dynamicftp. C. Create an inbound firewall rule to allow App1.exE. D. Create an isolation connection security rule.
A. Run netshadvfirewall set global statefulftp enable.
The Netshadvfirewall set global statefulftp command will configure how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port.
When statefulftp is enabled (Disabled being the default setting) the firewall tracks the port numbers specified in PORT command requests and in the responses to PASV requests, and then allows the incoming FTP data traffic entering on the requested port number.
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Print and Document Services server role installed.
You connect a new print device to the network. The marketing department and the sales department will use the print device.
You need to provide users from both departments with the ability to print to the network print device. The solution must ensure that if there are multiple documents queued to print, the documents from the sales users print before the documents from the marketing users.
What should you do on Server1?
Available Choices A. Add two printers and configure printer pooling. B. Add one printer. Modify the printer priority and the security settings. C. Add two printers. Modify the priorities of each printer and the security settings of each printer. D. Add one printer and configure printer pooling.
Add two printers. Modify the priorities of each printer and the security settings of each printer.
Explanation:
To set different print priority to different groups you need to navigate to the Advanced tab of the Printers and Faxes properties to set priorities to ensure that the Sales department print jobs take priority.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 2.3 Configure print and document services, Chapter 2: Configure Server roles and Features, p. 93, 97, 104
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 9: Print and Document Services, p. 444
http://technet.microsoft.com/en-us/library/cc738090(v=ws.10).aspx
Your network contains an Active Directory domain named adatum.com. The domain contains a member server named L0N-DC1.L0N-DC1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.
The network contains 100 client computers and 50 IP phones. The computers and the phones are from the same vendor.
You create an IPv4 scope that contains addresses from 172.16.0.1 to 172.16.1.254.
You need to ensure that the IP phones receive IP addresses in the range of 172.16.1.100 to 172.16.1.200. The solution must minimize administrative effort.
What should you create?
Available Choices
A. Server level policies
B. Reservations C. Filters D. Scope level policies
Scope level policies
Explanation:
The scope is already in place.
Scope level policies are typically settings that only apply to that scope. They can also overwrite a setting that was set at the server level.
Your network contains several servers that run Windows Server 2012 R2 and client computers that run Windows 8.1.
You download several signed Windows PowerShell scripts from the Internet.
You need to run the PowerShell scripts on all of the servers and all of the client computers.
What should you modify first?
Available Choices
A. The environment variables on all of the servers
B. The execution policy on all of the servers C. The execution policy on all of the client computers D. The environment variables on all client computers
C. The execution policy on all of the client computers
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2.
A user named User1 attempts to log on to DC1, but receives the error message shown in the exhibit.(Click the Exhibit button.)
You need to ensure that User1 can log on to DC1.
What should you do?
Available Choices
A. Add User1 to the Remote Management Users group.
B. Grant User1 the Allow log on locally user right.
C. Modify the Logon Workstations setting of the User1 account.
D. Modify the Account is sensitive and cannot be delegated setting of the User1 account.
Grant User1 the Allow log on locally user right.
Explanation:
Domain controllers, by default, restrict the types of user accounts that have the ability to log on locally.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 6: Create and Manage Group Policy, Objective 6.2: Configure Security Policies, p. 321
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 2: Configure server roles and features, Objective 2.3: Configure servers for remote
management, p. 114 http://technet.microsoft.com/en-us/library/ee957044(v=ws.10).aspx
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You install a network monitoring application on VM2.
You need to ensure that all of the traffic sent to VM3 can be captured on VM2.
What should you configure?
Available Choices
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
J. Port mirroring
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has three physical network adapters named NIC1, NIC2, and NIC3.
On Server1, you create a NIC team named Team1 by using NIC1 and NIC2.You configure Team1 to accept network traffic on VLAN 10.
You need to ensure that Server1 can accept network traffic on VLAN 10 and VLAN 11. The solution must ensure that the network traffic can be received on both VLANs if a network adapter fails.
What should you do?
Available Choices
A. From Server Manager, change the load balancing mode of Team1.
B. Run the New-NetLbfoTeamcmdlet. C. From Server Manager, add an interface to Team1. D. Run the Add-NetLbfoTeamMembercmdlet.
C. From Server Manager, add an interface to Team1.
Your network contains an Active Directory forest. The forest contains a single domain named contoso.com. The domain contains four domain controllers. The domain controllers are configured as shown in the following table.
All domain controllers are DNS servers.
You plan to deploy a new domain controller named DC5 in the contoso.com domain.
You need to identify which domain controller must be online to ensure that DC5 can be promoted successfully to a domain controller.
Which domain controller should you identify?
DC4
You have a server named Server1 that runs Windows Server 2012 R2.
On Server1, you open Computer Management as shown in the exhibit.(Click the Exhibit button.)
You need to ensure that you can create a 3-TB volume on Disk 1.
What should you do first?
Available Choices
A. Create a storage pool.
B. Convert the disk to a GPT disk.
C. Convert the disk to a dynamic disk.
D. Create a VHD, and then attach the VHD.
B. Convert the disk to a GPT disk.
Your network contains an Active Directory domain named contoso.com.
An administrator provides you with a file that contains the information to create user accounts for 200 temporary employees. The file is shown in the exhibit.(Click the Exhibit button.)
You need to automate the creation of the user accounts. You must achieve this goal by using the minimum amount of administrative effort.
Which tool should you use?
Available Choices
A. Ldifde
B. csvde
C. Dsadd
D. Net user
B. csvde
Explanation:
The CSVDE is a command-line utility that can create new AD DS objects by importing information from a comma-separated value (.csv) file. This would be the least amount of administrative effort in this case.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 5: Install and administer Active Directory, Objective 5.2: Create and Manage Active Directory Users and Computers, p. 269
Your network contains an Active Directory domain named contoso.com.
Computer accounts for the marketing department are in an organizational unit (OU) named Departments\Marketing\Computers. User accounts for the marketing department are in an OU named Departments\Marketing\Users.
Marketing users can only log on to the client computers in the Departments\Marketing\Computers OU.
You need to apply an application control policy to all of the marketing users.
Which Group Policy Object (GPO) should you configure?
To answer, select the appropriate GPO in the answer area.
GPO3
Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and child.contoso.com. The forest contains two domain controllers. The domain controllers are configured as shown in the following table.
You need to ensure that DC2 can provide authoritative responses for queries to the contoso.com namespace.
What should you do?
Available Choices A. On DC2, create a forwarder. B. On DC1, create a delegation. C. On DC1, change the replication scope of the contoso.com zone. D. On DC2, modify the Zone Transfers settings.
B. On DC1, create a delegation.
Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers. The servers are contained in an organizational unit (OU) named ServersOU.
You need to create a group named Group1 on all of the servers in the domain.You must ensure that Group1 is added only to the servers.
What should you configure?
Available Choices
A. A Restricted Groups setting in a Group Policy linked to ServersOU
B. A Local Users and Groups preferences setting in a Group Policy linked to the Domain Controllers OU C. A Local Users and Groups preferences setting in a Group Policy linked to ServersOU D. A Restricted Groups setting in a Group Policy linked to the domain
C. A Local Users and Groups preferences setting in a Group Policy linked to ServersOU
C. allows you to centrally manage local users and groups on domain member computers and is this is the correct OU for the GPO change
Your network contains multiple subnets.
On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2. You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com.
You need to ensure that client computers can resolve single-label names to IP addresses.
What should you do first?
Available Choices
A. Create a reverse lookup zone.
B. Convert the contoso.com zone to an Active Directory-integrated zone. C. Create a GlobalNames zone. D. Configure dynamic updates for contoso.com.
C. Create a GlobalNames zone.
Explanation:
You should use GlobalNames zone to take advantage of single-label names. This will also ensure that the zone remains valid.
References:
Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: Deploying and configuring core network services, Objective 4.3: Deploy and Configure the DNS service, p.233
http://technet.microsoft.com/en-us/library/cc731744.aspx
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1.VM1 has a legacy network adapter.
You need to assign a specific amount of available network bandwidth to VM1.
What should you do first?
Available Choices
A. Add a second legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
B. Add a second legacy network adapter, and then configure network adapter teaming. C. Remove the legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet. D. Remove the legacy network adapter, and then add a network adapter.
D. Remove the legacy network adapter, and then add a network adapter.
Add a New network adapter because the legacy network adapter doesn’t support bandwidth management.