aiotestking uk

70-410 Exam Questions - Online Test


70-410 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. 

All client computers run Windows 8. 

You deploy a server named Server1 that runs Windows Server 2012 R2. 

You install a new client-server application named App1 on Server1 and on the client 

computers. The client computers must use TCP port 6444 to connect to App1 on Server1.Server1 publishes the information of App1 to an intranet server named Server2 by using TCP port 3080. 

You need to ensure that all of the client computers can connect to App1. The solution must 

ensure that the application can connect to Server2. 

Which Windows Firewall rule should you create on Server1? 

A. an inbound rule to allow a connection to TCP port 3080 

B. an outbound rule to allow a connection to TCP port 3080 

C. an outbound rule to allow a connection to TCP port 6444 

D. an inbound rule to allow a connection to TCP port 6444 

Answer:

Explanation: 

A. Server2 needs inbound on 3080. 

B. All ports outbound allowed by default. 

D. Server1 gets request from Client PC’s it needs an inbound rule for 6444. By default, Windows Firewall with Advanced Security blocks all unsolicited inbound network traffic, and allows all outbound network traffic. For unsolicited inbound network traffic to reach your computer, you must create an allow rule to permit that type of network traffic. If a network program cannot get access, verify that in the Windows Firewall with Advanced Security snap-in there is an active allow rule for the current profile. To verify that there is an active allow rule, double-click Monitoring and then click Firewall. If there is no active allow rule for the program, go to the Inbound Rules node and create a new rule for that program. Create either a program rule, or a service rule, or search for a group that applies to the feature and make sure all the rules in the group are enabled. To permit the traffic, you must create a rule for the program that needs to listen for that traffic. If you know the TCP or UDP port numbers required by the program, you can additionally restrict the rule to only those ports, reducing the vulnerability of opening up all ports for the program. 

Q2. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

Your company hires 500 temporary employees for the summer. 

The human resources department gives you a Microsoft Excel document that contains a list of the temporary employees. 

You need to automate the creation of user accounts for the 500 temporary employees. 

Which tool should you use? 

A. ADSI Edit 

B. The csvde.exe command 

C. Active Directory Users and Computers 

D. The Add-Member cmdlet 

Answer:

Explanation: 

Csvde.exe is the best option to add multiple users. As you just need to export the excel 

spreadsheet as a csv file and make sure the parameters are correct. 

You can use Csvde to import and export Active Directory data that uses the comma-

separated value format. 

Use a spreadsheet program such as Microsoft Excel to open this .csv file and view the 

header and value information. 

The CSVDE is a command-line utility that can create new AD DS objects by importing 

information from a comma-separated value (.csv) file. This would be the least amount of 

administrative effort in this case especially considering that these would be temporary 

employees. 

Q3. - (Topic 3) 

A network technician installs Windows Server 2012 R2 Standard on a server named 

Server1. 

A corporate policy states that all servers must run Windows Server 2012 R2 Enterprise. 

You need to ensure that Server1 complies with the corporate policy. 

You want to achieve this goal by using the minimum amount of administrative effort. 

What should you perform? 

A. a clean installation of Windows Server 2012 R2 

B. an upgrade installation of Windows Server 2012 R2 

C. online servicing by using Dism 

D. offline servicing by using Dism 

Answer:

Explanation: 

A. Not least effort 

B. Not least effort 

C. dism /online /set-edition 

D. offline would be less ideal and more workex: DISM /online /Set-Edition:ServerEnterprise/ProductKey:489J6-VHDMP-X63PK-3K798-CPX3YWindows Server 2008 R2/2012 contains a command-line utility called DISM (Deployment Image Servicing and Management tool). This tool has many features, but one of those features is the ability to upgrade the edition of Windows in use. Note that this process is for upgrades only and is irreversible. You cannot set a Windows image to a lower edition. The lowest edition will not appear when you run the /Get- TargetEditions option. If the server is running an evaluation version of Windows Server 2012 R2 Standard or Windows Server 2012 R2 Datacenter, you can convert it to a retail version as follows: If the server is a domain controller, you cannot convert it to a retail version. In this case, install an additional domain controller on a server that runs a retail version and remove AD DS from the domain controller that runs on the evaluation version. From an elevated command prompt, determine the current edition name with the command DISM /online /Get-CurrentEdition. Make note of the edition ID, an abbreviated form of the edition name. Then run DISM /online /Set-Edition:<edition ID> /ProductKey:XXXXXXXXXX-XXXXX-XXXXXXXXXX/AcceptEula, providing the edition ID and a retail product key. The server will restart twice. 

Q4. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. You have a DHCP server named Server1 that runs Windows Server 2008. 

You install Windows Server 2012 R2 on a server named Server2. You install the DHCP Server server role on Server2. 

You need to migrate the DHCP services from Server1 to Server2. The solution must meet the following requirements: 

. Ensure that existing leases are migrated. 

. Prevent lease conflicts. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. On Server1, run the Export-DhcpServer cmdlet. 

B. On Server1, run the Stop-Service cmdlet. 

C. On Server2, run the Receive-SmigServerData cmdlet. 

D. On Server2, run the Stop-Service cmdlet. 

E. On Server2, run the Import-DhcpServer cmdlet. 

F. On Server1, run the Send-SmigServerData cmdlet. 

Answer: A,B,E 

Q5. - (Topic 3) 

You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. You attach a 4-TB disk to Server1. 

The disk is configured as an MBR disk. You need to ensure that you can create a 4-TB volume on the disk. 

Which Diskpart command should you use? 

A. Expand 

B. Attach 

C. Automount 

D. Convert 

Answer:

Explanation: 

Explanation: You can use Diskpart to convert a basic disk to a dynamic disk. The basic disk can either be empty or contain either primary partitions or logical drives. The basic disk can be a data disk or system or boot drive. A MBR file structure is only capable of 2TB maximum. The disk will have to be converted to a GPT file structure. GPT is capable of 18 exabytes volumes. Convert gpt – Converts an empty basic disk with the master boot record (MBR) partition style into a basic disk with the GUID partition table (GPT) partition style. The disk may be a basic or a dynamic disk but it must not contain any valid data partitions or volumes. 

Q6. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing the use of Non-Uniform Memory Architecture (NUMA). 

Which of the following is TRUE with regards to Non-Uniform Memory Architecture (NUMA)? (Choose two.) 

A. It is a computer architecture used in multiprocessor systems. 

B. It is a computer architecture used in single processor systems. 

C. It allows a processor to access local memory faster than it can access remote memory. 

D. It allows a processor to access remote memory faster than it can access local memory. 

Answer: A,C 

Explanation: 

NUMA is a hardware design feature that divides CPUs and memory in a physical server into NUMA nodes. You get the best performance when a process uses memory and CPU from within the same NUMA node. de is full, then it’ll get memory from When a process requires more memory, but the current NUMA no another NUMA node and that comes at a performance cost to that process, and possibly all other processes on that physical server. And that’s why virtualization engineers need to be aware of this. In Hyper-V we have Dynamic Memory. Non-Uniform Memory Access or Non-Uniform Memory Architecture (NUMA) is a computer memory design used in multiprocessors, where the memory access time depends on the memory location relative to a processor. Under ccNUMA, a processor can access its own local memory faster than non-local memory, that is, memory local to another processor or memory shared between processors. NUMA architectures logically follow in scaling from symmetric multiprocessing (SMP) architectures. 

Q7. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has 2 dual-

core processors and 16 GB of RAM. 

You install the Hyper-V server role in Server1. 

You plan to create two virtual machines on Server1. 

You need to ensure that both virtual machines can use up to 8 GB of memory. The solution 

must ensure that both virtual machines can be started simultaneously. 

What should you configure on each virtual machine? 

A. Dynamic Memory 

B. NUMA topology 

C. Memory weight 

D. Resource Control 

Answer:

Q8. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. 

An iSCSI SAN is available on the network. 

Server1 hosts four virtual machines named VM1, VM2, VM3, VM4. 

You create a LUN on the SAN. 

You need to provide VM1 with access to the LUN. The solution must prevent other virtual machines from accessing the LUN. 

What should you configure? 

A. A fixed-size VHDX 

B. A dynamically expanding VHDX 

C. A fixed-size VHD 

D. A pass-through disk 

E. A dynamically expanding VHD 

Answer:

Explanation: 

You can use physical disks that are directly attached to a virtual machine as a storage option on the management operating system. This allows virtual machines to access storage that is mapped directly to the server running Hyper-V without first configuring the volume. The storage can be either a physical disk which is internal to the server, or a SAN logical unit number (LUN) that is mapped to the server (a LUN is a logical reference to a portion of a storage subsystem). The virtual machine must have exclusive access to the storage, so the storage must be set in an Offline state in Disk Management. The storage is not limited in size, so it can be a multi-terabyte LUN. When using physical disks that are directly attached to a virtual machine, you should be aware of the following: This type of disk cannot be dynamically expanded. You cannot use differencing disks with them. You cannot take virtual hard disk snapshots. Att: If you are installing an operating system on the physical disk and it is in an Online state before the virtual machine is started, the virtual machine will fail to start. You must store the virtual machine configuration file in an alternate location because the physical disk is used by the operating system installation. For example, locate the configuration file on another internal drive on the server running Hyper-V. 

Q9. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1. Server1 runs Windows Server 2012 R2. 

An administrator creates a security template named Template1. 

You need to apply Template1 to Server1. 

Which snap-in should you use? 

A. Resultant Set of Policy 

B. Security Configuration and Analysis 

C. Authorization Manager 

D. Security Templates 

Answer:

Explanation: 

The Security Configuration and Analysis tool contains the Local Security Policy snap-in that is used to apply templates. 

References: 

http://technet.microsoft.com/en-us/library/bb742512.aspx http://technet.microsoft.com/en-us/library/cc739442%28v=WS.10%29.aspx 

Q10. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has three physical network adapters named NIC1, NIC2, and NIC3. 

On Server1, you create a NIC team named Team1 by using NIC1 and NIC2. You configure Team1 to accept network traffic on VLAN 10. 

You need to ensure that Server1 can accept network traffic on VLAN 10 and VLAN 11. The solution must ensure that the network traffic can be received on both VLANs if a network adapter fails. 

What should you do? 

A. From Server Manager, change the load balancing mode of Team1. 

B. Run the New-NetLbfoTeam cmdlet. 

C. From Server Manager, add an interface to Team1. 

D. Run the Add-NetLbfoTeamMember cmdlet. 

Answer: