aiotestking uk

70-410 Exam Questions - Online Test


70-410 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

P.S. Virtual 70-410 answers are available on Google Drive, GET MORE: https://drive.google.com/open?id=1BVkSfbqXvu-899KNNIUIs3PgRkOyx9Ss


New Microsoft 70-410 Exam Dumps Collection (Question 8 - Question 17)

Q1. Your network contains an Active Directory domain named adatum.com. The domain contains three domain controllers.

The domain controllers are configured as shown in the following table.

DC3 loses network connectivity due to a hardware failure. You plan to remove DC3 from the domain.

You log on to DC3.

You need to identify which service location (SRV) records are registered by DC3. What should you do?

A. Open the %windir%system32confignetlogon.dns file.

B. Run dcdiag /test:dns

C. Open the %windir%system32dnsbackupadatum.com.dns file.

D. Run ipconfig /displaydns.

Answer: A

Explanation:

:A. Netlogon service creates a log file that contains all the locator resource records and places the logfile in the following location:

:B. Analyzes the state of domain controllers in a forest or enterprise and reports any problems to help introubleshooting.

:C. dns backup file

:D. used to display current resolver cache content You can verify SRV locator resource records by viewing netlogon.dns, located in the %systemroot%System32Config folder. The SRV record is a Domain Name System (DNS) resource record that is used to identify computers that host specific services.

SRV resource records are used to locate domain controllers for Active Directory. You can use Notepad, to view this file.

The first record in the file is the domain controlleru2021s Lightweight Directory Access Protocol (LDAP) SRV record.

This record should appear similar to the following: _ldap._tcp.Domain_Name


Q2. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has five network adapters. Three of the network adapters are connected to a network named LAN1. The two other network adapters are connected to a network named LAN2.

You need to create a network adapter team from the three network adapters connected to LAN1.

Which tool should you use?

A. Routing and Remote Access

B. Network and Sharing Center

C. Server Manager

D. Network Load Balancing Manager

Answer: C


Q3. Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012 R2.

A one-way external trust exists between contoso.com and adatum.com.

Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com.

What should you do?

A. Modify the Managed By settings of Group1.

B. Modify the Allowed to Authenticate permissions in adatum.com.

C. Change the type of Group1 to distribution.

D. Modify the name of Group1.

Answer: : B

Explanation:

* Accounts that require access to the customer Active Directory will be granted a special right called Allowed to Authenticate. This right is then applied to computer objects (Active Directory domain controllers and AD RMS servers) within the customer Active Directory to which the account needs access.

* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest.


Q4. You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed.

You have created and linked a new Group Policy object (GPO) to an organizational unit (OU), named ENSUREPASSServ, which host the computer accounts for servers in the Contoso.com domain.

You have been tasked with adding a group to a local group on all servers in the Contoso.com domain. This group should not, however, be removed from the local group.

Which of the following actions should you take?

A. You should consider adding a restricted group.

B. You should consider adding a global group.

C. You should consider adding a user group.

D. You should consider adding a server group.

Answer: A

Explanation:

Restricted groups in Group policies are a simple way of delegating permissions or group membership centrally to any domain computer or server. Using restricted groups it is easier to enforce the lowest possible permissions to any given account.

Computer ConfigurationWindows SettingsSecurity SettingsRestricted Groups Restricted groups allow an administrator to define two properties for security-sensitive groups (that is, u201crestrictedu201d groups). The two properties are Members and Member Of . The Members list defines who should and should not belong to the restricted group. The Member Of list specifies which other groups the restricted group should belong to.

When a restricted Group Policy is enforced, any current member of a restricted group that is not on the Members list is removed.


Q5. Your network contains an Active Directory domain named contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named 0U1. You

need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to OU1. The solution must minimize the number of permissions assigned to User1.

What should you do?

A. Modify the permissions on OU1.

B. Run the Set-GPPermission cmdlet.

C. Add User1 to the Group Policy Creator Owners group.

D. Modify the permissions on the User1 account.

Answer: A

Explanation:


Q6. Your network contains an Active Directory domain named adatum.com. The domain contains the servers shown in the following table.

You need to ensure that you can use Server Manager on DC1 to manage DC2.

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Install Microsoft .NET Framework 4 on DC2.

B. Install Remote Server Administration Tools on DC1.

C. Install the Windows PowerShell 2.0 engine on DC1.

D. Install Remote Server Administration Tools on DC2.

E. Install Windows Management Framework 3.0 on DC2.

Answer: A,E

Explanation:

In Windows Server 2012 R2, you can use Server Manager to perform management tasks on remote servers. Remote management is enabled by default on servers that are running Windows Server 2012 R2. To manage a server remotely by using Server Manager, you add the server to the Server Manager server pool.

You can use Server Manager to manage remote servers that are running Windows Server 2008 and Windows Server 2008 R2, but the following updates are required to fully manage these older operating systems.

Windows Management Framework 3.0. To use this release of Server Manager to access and manage remote servers that are running Windows Server 2008 or Windows Server 2008 R2, you must first install .NET Framework 4.0, and then install Windows Management Framework 3.0 on those servers.

Reference:

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80


Q7. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.

When a domain user named User3 attempts to log on to a client computer named Client10, User3 receives the message shown in the following exhibit. (Click the Exhibit button.)

You need to ensure that User3 can log on to Client10. What should you do?

A. From Active Directory Users and Computers, configure the Logon Workstations setting of User3.

B. On Client10, modify the Allow log on locally User Rights Assignment.

C. From Active Directory Users and Computers, configure the Personal Virtual Desktop property of User3.

D. On Client10, modify the Deny log on locally User Rights Assignment.

Answer: A


Q8. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1.

You need to ensure that VM1 can start by using PXE. What should you do?

A. Add a second network adapter, and then run the Set-VMNetworkAdaptercmdlet.

B. Add a second network adapter, and then configure network adapter teaming.

C. Remove the network adapter, and then run the Set-VMNetworkAdaptercmdlet.

D. Remove the network adapter, and then add a legacy network adapter.

Answer: D


Q9. Server 1 and Server2 host a load-balanced Application pool named AppPool1. You need to ensure thatAppPool1 uses a group Managed Service Account as its identity. Which 3 actions should you perform?

A. Install a domain controller that runs Windows Server 2012 R2, Run the New- ADService Accountcmdlet, Modify the settings of AppPool1.

B. Configure the Security settings of the contoso.com zone.

C. Add a second legacy network adapter, and then run the Set-VMNetwork Adoptercmdlet.

D. From Windows Powershell, run Get-DNS ServerDiagnostics.

Answer: A

Explanation:

For the application pool to use a group Managed Service account as its identity you will have to make sure that there is a domain controller where you can add the account and then modify the application pool accordingly.

Thus you should use the New- ADService Account on the domain controller that will create a new Active Directory service account.


Q10. Your network contains an Active Directory domain named contoso.com.

All user accounts in the marketing department reside in an organizational unit (OU) named OU1.

You have a Group Policy object (GPO) named GPO1. GPO1 contains Folder Redirection settings. GPO1 has default permissions.

You discover that the Folder Redirection settings are not applied to the users in the marketing department.

You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that the Folder Redirection settings in GPO1 apply to the marketing users.

What should you do?

A. Modify the Delegation settings of GPO1.

B. Enable the link of GPO1.

C. Enforce GPO1.

D. Modify the link order of GPO1.

Answer: C


Recommend!! Get the Virtual 70-410 dumps in VCE and PDF From Examcollectionplus, Welcome to download: https://www.examcollectionplus.net/vce-70-410/ (New 496 Q&As Version)