aiotestking uk

70-410 Exam Questions - Online Test


70-410 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 1) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. 

Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. 

VM1 has several snapshots. 

You need to modify the snapshot file location of VM1. 

What should you do? 

A. Right-click VM1, and then click Export. 

B. Shut down VM1, and then modify the settings of VM1. 

C. Delete the existing snapshots, and then modify the settings of VM1. 

D. Pause VM1, and then modify the settings of VM1. 

Answer:

Q2. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

When you recently added new workstations to the Contoso.com manually, you found that that the computer accounts were created in the default container. 

You want to make sure that the default container for newly created computers is redirected to a specified, target organizational unit (OU). 

Which of the following actions should you take? 

A. You should consider making use of the replace.exe command-line tool. 

B. You should consider making use of the redircmp.exe command-line tool. 

C. You should consider making use of the redirusr.exe command-line tool. 

D. You should consider making use of the rexec.exe command-line tool. 

Answer:

Explanation: 

redircmp.exe redirects the default container for newly created computers to a specified, target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers. 

Q3. HOTSPOT - (Topic 3) 

You have a DNS server named Server1. Server1 runs Windows Server 2012 R2. The network ID is 10.1.1.0/24. An administrator creates several reverse lookup zones. You need to identify which reverse lookup zone is configured correctly. Which zone should you identify? To answer, select the appropriate zone in the answer area. 

Answer:  

Q4. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Server1 that runs Windows Server 2012 R2. Server1 contains a local group named Group1. 

You share a printer named Printer1 on Server1. 

You need to configure Printer1 to meet the following requirements: 

. Ensure that the members of Group1, the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1. 

. Prevent other users from sending print jobs to Printer1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Remove the permissions for the Creator Owner group. 

B. Assign the Print permission to the Administrators group. 

C. Remove the permissions for the Everyone group. 

D. Assign the Print permission to the Server Operators group. 

E. Assign the Print permission to Group1. 

Answer: C,E 

Explanation: 

C. To prevent other users from sending print jobs to Printer1 

E. To enable Group1 to send print jobs. 

Note: The Server Operators group, the Administrators group, and the Print Operators group 

are all built-in and already have permissions to send print jobs. 

Q5. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. The domain contains a virtual machine named VM1. 

A developer wants to attach a debugger to VM1. 

You need to ensure that the developer can connect to VM1 by using a named pipe. 

Which virtual machine setting should you configure? 

A. BIOS 

B. Network Adapter 

C. COM 1 

D. Processor 

Answer:

Explanation: 

Named pipe. This option connects the virtual serial port to a Windows named pipe on the host operating system or a computer on the network. A named pipe is a portion of memory that can be used by one process to pass information to another process, so that the output of one is the input of the other. The second process can be local (on the same computer as the first) or remote (on a networked computer). For example, a local named pipe path could be \\.\pipe\mypipename. Named pipes can be used to create a virtual null modem cable between two virtual machines, or between a virtual machine and a debugging program on the host operating system that supports the use of named pipes. By connecting two virtual serial ports to the same named pipe, you can create a virtual null modem cable connection. Named pipes are useful for debugging or for any program that requires a null modem connection. 

Named pipes can be used to connect to a virtual machine by configuring COM 1. 

References: http://support.microsoft.com/kb/819036 http://support.microsoft.com/kb/141709 

Q6. DRAG DROP - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. All servers run 

Windows Server 2012 R2.All client computers run Windows 8. 

The domain contains a security group named Group1. 

You have a Group Policy object (GPO) named GPO1.GPO1 is linked to the domain. 

You need to ensure that only the members of Group1 can run the applications shown in the 

following table. 

Which type of application control policy should you implement for each application? 

To answer, drag the appropriate rule types to the correct applications. Each rule type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q7. - (Topic 3) 

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2 Standard. You establish a Remote Desktop session to Server1. 

You need to identify which task can be performed on Server1 from within the Remote Desktop session. 

What should you identify? 

A. Install a feature by using Server Manager. 

B. Modify the network settings by using Sconfig. 

C. Disable services by using Msconfig. 

D. Join a domain by using the System Properties. 

Answer:

Explanation: 

In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must be a member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode. 

References: http://technet.microsoft.com/en-us/library/jj647766.aspx Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80 

Q8. - (Topic 3) 

You have a server named Server2 that runs Windows Server 2012 R2. Server2 has the Hyper-V server role installed. 

The disks on Server2 are configured as shown in the exhibit. (Click the Exhibit button.) 

You create a virtual machine on Server2 named VM1. 

You need to ensure that you can configure a pass-through disk for VM1. 

What should you do? 

A. Convert Disk 1 to a basic disk. 

B. Take Disk 1 offline. 

C. Create a partition on Disk 1. 

D. Convert Disk 1 to a MBR disk. 

Answer:

Explanation: 

Pass-through Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspective 

Q9. - (Topic 3) 

Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012 R2. 

A one-way external trust exists between contoso.com and adatum.com. 

Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com. 

What should you do? 

A. Modify the Managed By settings of Group1. 

B. Modify the Allowed to Authenticate permissions in adatum.com. 

C. Change the type of Group1 to distribution. 

D. Modify the name of Group1. 

Answer:

Explanation: 

* Accounts that require access to the customer Active Directory will be granted a special right called Allowed to Authenticate. This right is then applied to computer objects (Active Directory domain controllers and AD RMS servers) within the customer Active Directory to which the account needs access. 

* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest. 

Q10. HOTSPOT - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The network contains a DHCP server named DHCP1. 

You add a new network segment to the network. 

On the new network segment, you deploy a new server named Server1 that runs Windows 

Server 2012 R2. 

You need to configure Server1 as a DHCP Relay Agent. 

Which server role should you install on Server1? 

To answer, select the appropriate role in the answer area. 

Answer: