aiotestking uk

70-410 Exam Questions - Online Test


70-410 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

P.S. Simulation 70-410 Q&A are available on Google Drive, GET MORE: https://drive.google.com/open?id=1BVkSfbqXvu-899KNNIUIs3PgRkOyx9Ss


New Microsoft 70-410 Exam Dumps Collection (Question 5 - Question 14)

Q1. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. Client computers run either Windows 7 or Windows 8.

All of the computer accounts of the client computers reside in an organizational unit (OU) named Clients. A Group Policy object (GPO) named GPO1 is linked to the Clients OU. All of the client computers use a DNS server named Server1.

You configure a server named Server2 as an ISATAP router. You add a host (A) record for ISATAP to the contoso.com DNS zone.

You need to ensure that the client computers locate the ISATAP router. What should you do?

A. Run the Set-DnsServerGlobalQueryBlockList cmdlet on Server1.

B. Configure the Network Options Group Policy preference of GPO1.

C. Run the Add-DnsServerResourceRecord cmdlet on Server1.

D. Configure the DNS Client Group Policy setting of GPO1.

Answer: A

Explanation:

The Set-DnsServerGlobalQueryBlockList command will change the settings of a global query block list which you can use to ensure that client computers locate the ISATAP router.

Windows Server 2008 introduced a new feature, called u201cGlobal Query Block listu201d, which prevents some arbitrary machine from registering the DNS name of WPAD. This is a good security feature, as it prevents someone from just joining your network, and setting himself up as a proxy. The dynamic update feature of Domain Name System (DNS) makes it possible for DNS client computers to register and dynamically update their resource records with a DNS server whenever a client changes its network address or host name. This reduces the need for manual administration of zone records. This convenience comes at a cost, however, because any authorized client can register any unused host name, even a host name that might have special significance for certain Applications. This can allow a malicious user to take over a special name and divert certain types of network traffic to that useru2021s computer. Two commonly deployed protocols are particularly vulnerable to this type of takeover: the Web Proxy Automatic Discovery Protocol (WPAD) and the Intra-site Automatic Tunnel Addressing Protocol (ISATAP). Even if a network does not deploy these protocols, clients that are configured to use them are vulnerable to the takeover that DNS dynamic update enables. Most commonly, ISATAP hosts construct their PRLs by using DNS to locate a host named isatap on the local domain. For example, if the local domain is corp.contoso.com, an ISATAP-enabled host queries DNS to obtain the IPv4 address of a host named isatap.corp.contoso.com. In its default configuration, the Windows Server 2008 DNS Server service maintains a list of names that, in effect, it ignores when it receives a query to resolve the name in any zone for which the server is authoritative. Consequently, a malicious user can spoof an ISATAP router in much the same way as a malicious user can spoof a WPAD server: A malicious user can use dynamic update to register the useru2021s own computer as a counterfeit ISATAP router and then divert traffic between ISATAP-enabled computers on the network. The initial contents of the blocktypes of resource records. Use different switches for different record types. By using this cmdlet, you can list depend on whether WPAD or ISATAP is already deployed when you add the DNS server role to an existing Windows Server 2008 deployment or when you upgrade an earlier version of Windows Server running the DNS Server service. Add- DnsServerResourceRecord u2013 The Add-DnsServerResourceRecordcmdlet adds a resource record for a Domain Name System (DNS) zone on a DNS server. You can add different change a value for a record, configure whether a record has a time stamp, whether any authenticated user can update a record with the same owner name, and change lookup timeout values, Windows Internet Name Service (WINS) cache settings, and replication settings. Set-DnsServerGlobalQueryBlockList u2013 The Set- DnsServerGlobalQueryBlockListcmdlet changes settings of a global query block list on a Domain Name System (DNS) server. This cmdlet replaces all names in the list of names that the DNS server does not resolve with the names that you specify. If you need the DNS server to resolve names such as ISATAP and WPAD, remove these names from the list. Web Proxy Automatic Discovery Protocol (WPAD) and Intra-site Automatic Tunnel Addressing Protocol (ISATAP) are two commonly deployed protocols that are particularly vulnerable to hijacking.

References:

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256 http://technet.microsoft.com/en-us/library/jj649942(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj649876(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj649874.aspx

http://technet.microsoft.com/en-us/library/jj649909.aspx


Q2. Your network contains an Active Directory domain named contoso.com.

You install Windows Server 2012 R2 on a new server named Server1 and you join Server1 to the domain.

You need to ensure that you can view processor usage and memory usage information in Server Manager.

What should you do?

A. From Server Manager, click Configure Performance Alerts.

B. From Performance Monitor, create a Data Collector Set (DCS).

C. From Performance Monitor, start the System Performance Data Collector Set (DCS).

D. From Server Manager, click Start Performance Counters.

Answer: D

Explanation:

You should navigate to the Server Manager snap-in and there click on All Servers, and then Performance Counters. The Performance Counters, when started can be set to collect and display data regarding processor usage, memory usage, amongst many other resources like disk-related and security related data, that can be monitored.

Reference: http://technet.microsoft.com/en-us/library/bb734903.aspx


Q3. You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2.

Server1 is configured to obtain an IPv4 address by using DHCP.

You need to configure the IPv4 settings of the network connection on Server1 as follows:

u2711 IP address: 10.1.1.1

u2711 Subnet mask: 255.255.240.0

u2711 Default gateway: 10.1.1.254

What should you run?

A. netsh.exe

B. netcfg.exe

C. msconfig.exe

D. ipconfig.exe

Answer: A

Explanation:

In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses and many other options you can use Netsh.exe. Incorrect:

Not D: Windows Server 2012 Core still has IPCONFIG.EXE that can be used to view the IP configuration.

Modern servers typically come with several network interface ports. This causes IPCONFIG.EXE to scroll off the screen when viewing its output. Consider piping the output if IPCONFIG.EXE to a file and view it with Notepad.exe.


Q4. Your network contains several servers that run Windows Server 2012 R2 and client computers that run Windows 8.1.

You download several signed Windows PowerShell scripts from the Internet.

You need to run the PowerShell scripts on all of the servers and all of the client computers. What should you modify first?

A. The environment variables on all of the servers

B. The execution policy on all of the servers

C. The execution policy on all of the client computers

D. The environment variables on all client computers

Answer: C

Explanation:

The default execution policy of Windows Server 2012 is RemoteSigned meaning that as long as a valid signature is used on the scripts, they will run. However, the client computers

have a default execution policy of restricted meaning that no scripts will run in PowerShell whatsoever, so this would have to be changed before the scripts could be executed on the client computers.


Q5. You have a server named Server1 that runs Windows Server 2012 R2.

A network technician installs a new disk on Server1 and creates a new volume. The properties of the new volume are shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can enable NTFS disk quotas for volume D. What should you do first?

A. Install the File Server Resource Manager role service.

B. Format volume D.

C. Run the convert.exe command.

D. Convert the disk to a dynamic disk.

Answer: : B

Explanation:

ReFS-formatted disks cannot use NTFS disk quotas, so the drive must be formatted as an NTFS partition


Q6. Your network contains an Active Directory domain named contoso.com. The domain contains a DHCP server named Server1 that runs Windows Server 2012 R2.

You create a DHCP scope named Scope1. The scope has a start address of 192.168.1.10, an end address of 192.168.1.50, and a subnet mask of 255.255.255.192.

You need to ensure that Scope1 has a subnet mask of 255.255.255.0. What should you do first?

A. From the DHCP console, reconcile Scope1.

B. From the DHCP console, delete Scope1.

C. From the DHCP console, modify the Scope Options of Scope1.

D. From Windows PowerShell, run the Set-DhcpServerv4Scope cmdlet.

Answer: B

Explanation:

You cannot change the subnet mask of a DHCP scope without deleting the scope and recreating it with the new subnet mask.

Set-DhcpServerv4Scope does not include a parameter for the subnet mask.


Q7. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that hosts the primary DNS zone for contoso.com.

All client computers are configured to use DC1 as the primary DNS server.

You need to configure DC1 to resolve any DNS requests that are not for the contoso.com zone by querying the DNS server of your Internet Service Provider (ISP).

What should you configure?

A. Naming Authority Pointer (NAPTR) DNS resource records (RR)

B. Name server (NS) records

C. A Forwarders

D. Conditional forwarders

Answer: C

Explanation:

On a network with several servers and/or client computers a server that is configured as a forwarder will manage the Domain Name System (DNS) traffic between your network and the Internet.


Q8. Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.

You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs on Server1 are under a heavy load.

What should you configure?

A. NUMA topology

B. Resource control

C. resource metering

D. virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Answer: B

Explanation:

:B. Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual machine. Resource control in used in the event where you need to adjust the computing resources of a virtual machine, you can reconfigure the resources to meet the changing needs. You can also specify resource controls to automate how resources are allocated to virtual machines.

References:

http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831410.aspx http://technet.microsoft.com/en-us/library/cc742470.aspx

Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335


Q9. You have a Hyper-V host named Server1 that runs Windows Server 2012 R2 Datacenter.Server1 is located in an isolated network that cannot access the Internet.

On Server1, you install a new virtual machine named VM1.VM1 runs Windows Server 2012 R2 Essentials and connects to a private virtual network.

After 30 days, you discover that VM1 shuts down every 60 minutes.

You need to resolve the issue that causes VM1 to shut down every 60 minutes. What should you do?

A. OnVM1, run slmgr.exe and specify the /ipk parameter.

B. OnServer1, run slmgr.exe and specify the /rearm-sku parameter.

C. Create a new internal virtual network and attach VM1 to the new virtual network.

D. On Server1, run Add-WindowsFeatureVolumeActivation.

Answer: A


Q10. Your network contains an Active Directory domain named contoso.com. You have a DHCP server named Server1 that runs Windows Server 2008.

You install Windows Server 2012 R2 on a server named Server2. You install the DHCP Server server role on Server2.

You need to migrate the DHCP services from Server1 to Server2. The solution must meet the following requirements:

u2711 Ensure that existing leases are migrated.

u2711 Prevent lease conflicts.

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

A. On Server1, run the Export-DhcpServer cmdlet.

B. On Server1, run the Stop-Service cmdlet.

C. On Server2, run the Receive-SmigServerData cmdlet.

D. On Server2, run the Stop-Service cmdlet.

E. On Server2, run the Import-DhcpServer cmdlet.

F. On Server1, run the Send-SmigServerData cmdlet.

Answer: A,B,E

Topic 2, Volume B

101.Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.

The domain contains a user named User1 and a global security group named Group1.

You need to ensure that User1 can manage the group membership of Group1. The solution must minimize the number of permissions assigned to User1.

Which cmdlet should you run?

A. Add-AdPrincipalGroupMembership

B. Install-AddsDomainController

C. Install-WindowsFeature

D. Install-AddsDomain

E. Rename-AdObject

F. Set-AdAccountControl

G. Set-AdGroup

H. Set-User


100% Latest Microsoft 70-410 Questions & Answers shared by Allfreedumps, Get HERE: https://www.allfreedumps.com/70-410-dumps.html (New 496 Q&As)