aiotestking uk

70-410 Exam Questions - Online Test


70-410 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

P.S. Download 70-410 testing bible are available on Google Drive, GET MORE: https://drive.google.com/open?id=1BVkSfbqXvu-899KNNIUIs3PgRkOyx9Ss


New Microsoft 70-410 Exam Dumps Collection (Question 4 - Question 13)

New Questions 4

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed.

Contoso.com has a server, named ENSUREPASS-SR07, which has the AD DS, DHCP, and DNS server roles installed. Contoso.com also has a server, named ENSUREPASS- SR08, which has the DHCP, and Remote Access server roles installed. You have configured a server, which has the File and Storage Services server role installed, to automatically acquire an IP address.

The server is named ENSUREPASS-SR09. You then create a filter on ENSUREPASS- SR07.

Which of the following is a reason for this configuration?

A. To make sure that ENSUREPASS-SR07 issues ENSUREPASS-SR09 an IP address.

B. To make sure that ENSUREPASS-SR07 does not issue ENSUREPASS-SR09 an IP address.

C. To make sure that ENSUREPASS-SR09 acquires a constant IP address from ENSUREPASS-SR08 only.

D. To make sure that ENSUREPASS-SR09 is configured with a static IP address.

Answer: B


New Questions 5

Your network contains an Active Directory domain named contoso.com. The domain contains a user account named User1 that resides in an organizational unit (OU) named OU1.

A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to publish several applications to a user named User1.

In the Users container, you create a new user named User2.

You need to ensure that the same applications are published to User2. What should you do?

A. Modify the settings in GPO1.

B. Move User2 to OU1

C. Link a WMI filter to GPO1.

D. Modify the security of GPO1.

Answer: B

Explanation:

Moving User2 to OU1 will give him the same access as User1.

The GPO is linked to OU1. By moving User2 to OU1 the GPO will be applied to this user.


New Questions 6

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.

You need to ensure that the local administrator account on all computers is renamed to L.Admin.

Which Group Policy settings should you modify?

A. Restricted Groups

B. Security Options

C. User Rights Assignment

D. Preferences

Answer: B

Explanation:

In Group Policy Object Editor, click Computer Configuration, click Windows Settings, click Security Settings, click Local Policies, and then click Security Options.

In the details pane, double-click Accounts: Rename administrator account.

The Security Options node includes security settings regarding interactive logon, digital signing of data, restrictions of access to floppy and CD-ROM drives, unsigned driver

installations as well as logon dialog box behavior. This category also includes options to configure authentication and communication security within Active Directory.


New Questions 7

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. Server1 is configured to obtain an IPv4 address by using DHCP. You need to configure the IPv4 settings of the network connection on Server1 as follows:

u2711 IP address: 10.1.1.1

u2711 Subnet mask: 255.255.240.0

u2711 Default gateway: 10.1.1.254

What should you run?

A. Set-NetlPInterface

B. netcfg.exe

C. New-NetlPAddress

D. msconfig.exe

Answer: C


New Questions 8

You have a server named Server1. Server1 runs Windows Server 2012 R2 and is located in a perimeter network.

You need to configure a custom connection security rule on Server1. The rule must encrypt network communications across the Internet to a computer at another company.

Which authentication method should you configure in the connection security rule?

A. Advanced

B. User (Kerberos V5)

C. Default

D. Computer (Kerberos V5)

E. Computer and user (Kerberos V5)

Answer: : A

Explanation: Explanation:

You need to make use of Advanced authentication method to ensure that communication is encrypted over the network to the other company from your custom connection security rule on Server1.

References:

http://technet.microsoft.com/en-us/library/bb742516.aspx

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 8: File Services and Storage, p. 428.


New Questions 9

Your network contains a file server named Server1 that runs Windows Server 2012 R2. All

client computers run Windows 8. Server1 contains a folder named Folder1. Folder1 contains the installation files for the companyu2021s desktop applications. A network technician shares Folder1 as Share 1.

You need to ensure that the share for Folder1 is not visible when users browse the network.

What should you do?

A. From the properties of Folder1, deny the List Folder Contents permission for the Everyone group.

B. From the properties of Folder1, remove Share1, and then share Folder1 as Share1$.

C. From the properties of Folder1, configure the hidden attribute.

D. From the properties of Share1, configure access-based enumeration

Answer: B


New Questions 10

You have a file server named File1 that runs Windows Server 2012 R2.

File1 contains a shared folder named Share1. Share1 contains an Application named SalesAppl.exe.

The NTFS permissions for Share1 are shown in the following table.

The members of L_Sales discover that they cannot add files to Share1. Domain users can run SalesAppl.exe successfully.

You need to ensure that the members of L_Sales can add files to Share1. What should you do?

A. Add the Domain Users group to L_Sales.

B. Add L_Sales to the Domain Users group.

C. Edit the Share permissions.

D. Edit the NTFS permissions.

Answer: C

Explanation:

Based on the NTFS permissions, these users should be able to add files (as they have the u201cwriteu201d permission), so they must have read-only share permissions preventing them from doing so.


New Questions 11

Your network contains an Active Directory domain named contoso.com. All user accounts in the sales department reside in an organizational unit (OU) named OU1.

You have a Group Policy object (GPO) named GPO1. GPO1 is used to deploy a logon script to all of the users in the sales department.

You discover that the logon script does not run when the sales users log on to their computers. You open Group Policy Management as shown in the exhibit.

You need to ensure that the logon script in GPO1 is applied to the sales users. What should you do?

A. Enforce GPO1.

B. Modify the link order of GPO1.

C. Modify the Delegation settings of GPO1.

D. Enable the link of GPO1.

Answer: D


New Questions 12

Your network contains two subnets. The subnets are configured as shown in the following table.

You have a server named Server1 that runs Windows Server 2012 R2. Server1 is connected to LAN1.

You run the route print command as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that Server1 can communicate with the client computers on LAN2. What should you do?

A. Change the default gateway address.

B. Set the state of the Microsoft ISATAP Adapter #2 interface to disable.

C. Change the metric of the 10.10.1.0 route.

D. Set the state of the Teredo interface to disable.

Answer: A

Explanation:

The exhibit shows the default gateway address to be that of LAN1. This should be changed to the LAN2 gateway address to allow client computers access on LAN2.

In general, the first and last addresses in a subnet are used as the network identifier and broadcast address, respectively. All other addresses in the subnet can be assigned to hosts on that subnet. For example, IP addresses of networks with subnet masks of at least 24 bits ending in .0 or .255 can never be assigned to hosts. Such u201clastu201d addresses of a subnet are considered u201cbroadcastu201d addresses and all hosts on the corresponding subnet will respond to it. Theoretically, there could be situations where you can assign an address ending in .0: for example, if you have a subnet like 192.168.0.0/255.255.0.0, you are allowed to assign a host the address 192.168.1.0. It could create confusion though, so itu2021s not a very common practice.

Example10.6.43.0 with subnet 255.255.252.0 (22 bit subnet mask) means subnet ID 10.6.40.0, a host address range from 10.6.40.1 to 10.6.43.254 and a broadcast address10.6.43.255. So in theory, your example 10.6.43.0 would be allowed as a valid host address. The default gateway address should not end in .0 with the /24 address.

References:

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256


New Questions 13

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2. On DC2, you open Server Manager and you add Server1 as another server to manage. From Server Manager on DC2, you right-click Server1 as shown in the exhibit. You need to ensure that when you right-click Server1, you see the option to run the DHCP console.

What should you do?

A. On Server1, install the Feature Administration Tools.

B. In the domain, add DC1 to the DHCP Administrators group.

C. On DC2 and Server1, run winrm quickconfig.

D. On DC2, install the Role Administration Tools.

Answer: D


100% Updated Microsoft 70-410 Questions & Answers shared by Surepassexam, Get HERE: https://www.surepassexam.com/70-410-exam-dumps.html (New 496 Q&As)