aiotestking uk

70-410 Exam Questions - Online Test


70-410 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named CONT1 and CONT2. Both servers run Windows Server 2012 R2. 

CONT1 has a shared printer named Printer1. CONT2 connects to Printer1 on CONT1. 

When you attempt to remove Printer1 from CONT2, you receive the error message shown in the exhibit. (Click the Exhibit button.) 

You successfully delete the other printers installed on CONT2. 

You need to identify what prevents you from deleting Printer1 on CONT2. 

What should you identify? 

A. Printer1 is deployed as part of a mandatory profile. 

B. Printer1 is deployed by using a Group Policy object (GPO). 

C. Your user account is not a member of the Print Operators group on CONT2. 

D. Your user account is not a member of the Print Operators group on CONT1. 

Answer:

Q2. - (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

VM2 sends and receives large amounts of data over the network. 

You need to ensure that the network traffic of VM2 bypasses the virtual switches of the parent partition. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. resource metering 

D. virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine to maximize network throughput while minimizing network latency and the CPU overhead required for processing network traffic. 

References: 

http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831410.aspx 

Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335 

Q3. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. 

Contoso.com has a domain controller, named ENSUREPASS-DC01, which has Windows Server 2012 R2 installed. Another Contoso.com domain controller, named ENSUREPASS-DC02, has Windows Server 2008 R2 installed. 

You have deployed a server, named ENSUREPASS-SR15, on Contoso.com’s perimeter network. ENSUREPASSSR15 is running a Server Core Installation of Windows Server 2012 R2. 

You have been instructed to make sure that ENSUREPASS-SR15 is part of the Contoso.com domain. 

Which of the following actions should you take? 

A. You should consider making use of Set-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15. 

B. You should consider making use of Get-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15. 

C. You should consider making use of Test-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15. 

D. You should consider making use of Add-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15. 

Answer:

Explanation: 

Add-Computer – Add the local computer to a domain or workgroup. 

Q4. - (Topic 3) 

RODC comes with a number of features that focus on heightened security with limited functionality to remote office users. Which of the following are features of RODC? 

A. Filtered Attribute Sets 

B. Read-Only DNS 

C. Unidirectional Replication 

D. All of these 

Answer:

Q5. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

When a domain user named User3 attempts to log on to a client computer named Client10, User3 receives the message shown in the following exhibit. (Click the Exhibit button.) 

You need to ensure that User3 can log on to Client10. 

What should you do? 

A. From Active Directory Users and Computers, configure the Logon Workstations setting of User3. 

B. On Client10, modify the Allow log on locally User Rights Assignment. 

C. From Active Directory Users and Computers, configure the Personal Virtual Desktop property of User3. 

D. On Client10, modify the Deny log on locally User Rights Assignment. 

Answer:

Q6. - (Topic 3) 

You have a DNS server named DNS1 that runs windows server 2012 R2. 

DNS1 is used to resolve the names of internet resources by using several DNS forwarders. 

You need to prevent DNS1 from performing iterative queries if the DNS forwarders are unable to reslove the queries. 

Which cmdlet should you use? 

A. Remove-DNSServerRootHint 

B. Set-DNSServerPrimaryZone 

C. Ser-DNSServerGlobalNameZone 

D. Unregister-DNSserverDrirectoryPartition 

Answer:

Q7. DRAG DROP - (Topic 3) 

You have a Hyper-V host named Server1. A technician creates a virtual machine named 

VM1 on Server1 by using the New Virtual Machine Wizard. 

You start VM1 and you discover that there is no option to start by using PXE. 

You need to ensure that you can start VM1 by using PXE. 

Which three actions should you perform in sequence? (To answer, move the appropriate 

three actions from the list of actions to the answer area and arrange them in the correct 

order.) 

Answer:  

Q8. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that has the DNS Server server role installed. Server1 hosts a primary zone for contoso.com. 

The domain contains a member server named Server2 that is configured to use Server1 as its primary DNS server. 

From Server2, you run nslookup.exe as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that when you run Nslookup, the correct name of the default server is displayed. 

What should you do? 

A. On Server1, create a reverse lookup zone. 

B. On Server1, modify the Security settings of the contoso.com zone. 

C. From Advanced TCP/IP Settings on Server1, add contoso.com to the DNS suffix list. 

D. From Advanced TCP/IP Settings on Server2, add contoso.com to the DNS suffix list. 

Answer:

Explanation: 

Make sure that a reverse lookup zone that is authoritative for the PTR resource record 

exists. 

PTR records contain the information that is required for the server to perform reverse name 

lookups. 

References: 

http://technet.microsoft.com/en-us/library/cc961417.aspx 

Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: 

Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6 

addressing, p.246 

Q9. - (Topic 2) 

Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2. 

Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. 

You create a checkpoint of VM1, and then you install an application on VM1. You verify 

that the application runs properly. 

You need to ensure that the current state of VM1 is contained in a single virtual hard disk 

file. 

The solution must minimize the amount of downtime on VM1. 

What should you do? 

A. From a command prompt, run dism.exe and specify the /delete-image parameter. 

B. From a command prompt, run dism.exe and specify the /commit-image parameter. 

C. From Hyper-V Manager, delete the checkpoint. 

D. From Hyper-V Manager, inspect the virtual hard disk. 

Answer:

Q10. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains an Application server named Server1. Server1 runs Windows Server 2012 R2. 

Server1 is configured as an FTP server. 

Client computers use an FTP Application named App1.exe. App1.exe uses TCP port 21 as 

the control port and dynamically requests a data port. 

On Server1, you create a firewall rule to allow connections on TCP port 21. You need to configure Server1 to support the client connections from App1.exe. What should you do? 

A. Run netshadvfirewall set global statefulftp enable. 

B. Create an inbound firewall rule to allow App1.exe. 

C. Create a tunnel connection security rule. 

D. Run Set-NetFirewallRule -DisplayName DynamicFTP -Profile Domain 

Answer:

Explanation: 

The netsh firewall context is supplied only for backward compatibility. We recommend that you do not use this context on a computer that is running Windows Vista or a later version of Windows. In the netsh advfirewall firewall context, the add command only has one variation, the add rule command. Netsh advfirewall set global statefulftp: Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port. When statefulftp is enabled, the firewall examines the PORT and PASV requests for these other port numbers and then allows the corresponding data connection to the port number that was requested. Syntax set global statefulftp { enable | disable | notconfigured } Parameters statefulftp can be set to one of the following values: enable The firewall tracks the port numbers specified in PORT command requests and in the responses to PASV requests, and then allows the incoming FTP data traffic entering on the requested port number. disable This is the default value. The firewall does not track outgoing PORT commands or PASV responses, and so incoming data connections on the PORT or PASV requested port is blocked as an unsolicited incoming connection. notconfigured Valid only when netsh is configuring a GPO by using the set store command.