aiotestking uk

70-410 Exam Questions - Online Test


70-410 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains an application server named Server1. Server1 runs Windows Server 2012 R2. You have a client application named App1 that communicates to Server1 by using dynamic TCP ports. 

On Server1, a technician runs the following command: New-NetFirewallRule -DisplayName AllowDynamic - Direction Outbound -LocalPort 1024- 65535 -Protocol TCP. 

Users report that they can no longer connect to Server1 by using App1. 

You need to ensure that App1 can connect to Server1. 

What should you run on Server1? 

A. Set-NetFirewallRule -DisplayName AllowDynamic -Action Allow 

B. netsh advfirewall firewall set rule name=allowdynamic new action = allow 

C. Set-NetFirewallRule -DisplayName AllowDynamic -Direction Inbound 

D. netsh advfirewall firewall add rule name=allowdynamic action=allow 

Answer:

Q2. DRAG DROP - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. 

On Server1, you create a share named Documents. The Share permission for the Documents share is configured as shown in the following table. 

The NTFS permission for the Documents share is configured as shown in the following table. 

You need to configure the Share and NTFS permissions for the Documents share. 

The permissions must meet the following requirements: 

. Ensure that the members of a group named Group1 can read files and run programs in Documents. . Ensure that the members of Group1 can modify the permissions on only their own 

files in Documents. . Ensure that the members of Group1 can create folders and files in Documents. . Minimize the number of permissions assigned to users and groups. 

How should you configure the permissions? 

To answer, drag the appropriate permission to the correct location. Each permission may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q3. - (Topic 1) 

You have virtual machine named VM1. 

VM1 uses a fixed size virtual hard disk (VHD) named Disk1.vhD. Disk1.vhd is 200 GB. 

You shut down VM1. 

You need to reduce the size of disk1.vhd. 

Which action should you select from the Edit Virtual Hard Disk Wizard? 

A. Merge 

B. Compact 

C. Shrink 

D. Convert 

Answer:

Q4. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1. 

You open Review Options in the Active Directory Domain Services Configuration Wizard, and then you click View script. 

You need to ensure that you can use the script to promote Server1 to a domain controller. 

Which file extension should you use to save the script? 

A. .bat 

B. .cmd 

C. .ps1 

D. .xml 

Answer:

Explanation: 

PowerShell scripts are saved with the extension ".ps1". 

From http://technet.microsoft.com/en-us/library/jj574105.aspx The Review Options page in Server Manager also offers an optional View Script button to create a Unicode text file that contains the current ADDS Deployment configuration as a single Windows PowerShell script. This enables you to use the Server Manager graphical interface as a Windows PowerShell deployment studio. Use the Active Directory Domain Services Configuration Wizard to configure options, export the configuration, and then cancel the wizard. This process creates a valid and syntactically correct sample for further modification or direct use. 

Q5. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. You log on to Server1. You need to retrieve the IP configurations of Server2. Which command should you run from Server1? 

A. winrs -r:server2 ipconfig 

B. winrm get server2 

C. dsquery *-scope base-attr ip, server2 

D. ipconfig > server2.ip 

Answer:

Q6. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. 

The forest contains two domains named contoso.com and child.contoso.com and two sites named Site1 and Site2. The domains and the sites are configured as shown in following table. 

When the link between Site1 and Site2 fails, users fail to log on to Site2. 

You need to identify what prevents the users in Site2 from logging on to the child.contoso.com domain. 

What should you identify? 

A. The placement of the global catalog server 

B. The placement of the infrastructure master 

C. The placement of the domain naming master 

D. The placement of the PDC emulator 

Answer:

Explanation: 

The exhibit shows that Site2 does not have a PDC emulator. This is important because of the close interaction between the RID operations master role and the PDC emulator role. The PDC emulator processes password changes from earlier-version clients and other domain controllers on a best-effort basis; handles password authentication requests involving passwords that have recently changed and not yet been replicated throughout the domain; and, by default, synchronizes time. If this domain controller cannot connect to the PDC emulator, this domain controller cannot process authentication requests, it may not be able to synchronize time, and password updates cannot be replicated to it. The PDC emulator master processes password changes from client computers and replicates these updates to all domain controllers throughout the domain. At any time, there can be only one domain controller acting as the PDC emulator master in each domain in the forest. 

Q7. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Serve 2012 R2. All client computers run either Windows 7 or Windows 8. The domain contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the File and Storage Services server role installed. On Server1, you create a share named Share1. 

You need to ensure that users can use Previous Versions to restore the files in Share1. 

What should you configure on Server1? 

A. The Shadow Copies settings 

B. A Windows Server Backup schedule 

C. A data recovery agent 

D. The Recycle Bin properties 

Answer:

Explanation: 

A. Enable and schedule shadow copies for Share1 

B. The backup doesn’t give users access until files are restored 

D. No settings for file version 

Q8. - (Topic 3) 

You have a server that runs Windows Server 2012 R2. The server contains the disks configured as shown in the following table. 

You need to create a volume that can store up to 3 TB of user files. The solution must ensure that the user files are available if one of the disks in the volume fails. What should you create? 

A. A mirrored volume on Disk 1 and Disk 4 

B. A storage pool on Disk 2 and Disk 3 

C. A storage pool on Disk 1 and Disk 3 

D. A mirrored volume on Disk 2 and Disk 3 

Answer:

Q9. DRAG DROP - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and is configured as the only domain controller. 

You need to retrieve a list of all the user accounts. The list must include the last time each user was authenticated successfully. 

Which Windows PowerShell command should you run? 

To answer, drag the appropriate cmdlet or property to the correct locations to complete the PowerShell command in the answer area. Each cmdlet or property may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q10. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 and has the Hyper-V server role installed. HVServer1 hosts 10 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled. 

You install the DHCP server role on a virtual machine named Server 1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope. 

You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1. 

You need to ensure that the virtual machines can use Server1 as a DHCP server. 

What should you do? 

A. Enable MAC address spoofing on Server1. 

B. Disable the DHCP guard on all of the virtual machines that are DHCP clients. 

C. Disable the DHCP guard on Server1. 

D. Enable single-root I/O virtualization (SR-IOV) on Server1. 

Answer:

Explanation: 

Private virtual networks are used where you want to allow communications between virtual machine to virtual machine on the same physical server in a block diagram, a private network is an internal network without a virtual NIC in the parent partition. A private network would commonly be used where you need complete isolation of virtual machines from external and parent partition traffic. DMZ workloads running on a leg of a trihomed firewall, or an isolated test domain are examples where this type of network may be useful.