70 410 Dump4certs 336QA PDF
70 410 Dump4certs 336QA PDF
70 410 Dump4certs 336QA PDF
www.Dump4certs.com
70-410 Exam
336 Q&As
Version: 9.20
The disks on Server1 are configured as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can configure a pass-through disk for the virtual machine.
A. Delete partition E.
B. Convert Disk 1 to a GPT disk.
C. Convert Disk 1 to a dynamic disk.
D. Take Disk 1 offline.
Answer: D
Explanation:
Pass-Through Disk must be offline
Pass-through Disk Configuration
Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server
without requiring thevolume be configured. The storage can either be a physical disk
internal to the Hyper-V server or it can be aStorage Area Network (SAN) Logical Unit (LUN)
Microsoft 70-410 : Practice Test
mapped to the Hyper-V server. To ensure the Guest hasexclusive access to the storage, it
must be placed in an Offline state from the Hyper-V serverperspective
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-
hyper-v.aspx
http://technet.microsoft.com/pt-pt/library/ff404147%28v=ws.10%29.aspx
Question No : 2 - (Topic 0)
You have a server named Server1 that runs Windows Server 8. Server1 has the Hyper-V
server role installed.
You need to make the contents in Files.vhd available to several virtual machines.
Ensure that if the contents are changed on any virtual machine, the changes are
not reflected on the other virtual machines.
Minimize the amount of disk space used.
A. Create a dynamically expanding VHDX. Transfer the information from Files.vhd to the
new VHDX file.
B. Create a fixed-size VHDX. Transfer the information from Files.vhd to the new VHDX file.
C. Convert Files.vhd to a dynamically expanding VHD.
D. Create differencing VHDs that use Files.vhd as the parent disk.
Answer: D
Explanation:
A. A conversion would be needed from VHD to VHDX. Not available to multiple VM's
B. Single VHD not available to multiple VM's. Changes wouldn't be reflected
C. A conversion would be needed from VHD to VHDX. Not available to multiple VM's
D. Child disk for multiple VM's with Files.vhd as parent
A differencing disk is associated with another virtual hard disk that you select when you
Microsoft 70-410 : Practice Test
create the differencing disk. This means that the disk to which you want to associate the
differencing disk must exist first. This virtual hard disk is called the "parent" disk and the
differencing disk is the "child" disk. The parent disk can be any type of virtual hard disk.
The differencing disk stores all changes that would otherwise be made to the parent disk if
the differencing disk was not being used. The differencing disk provides an ongoing way to
save changes without altering the parent disk. You can use the differencing disk to store
changes indefinitely, as long as there is enough space on the physical disk where the
differencing disk is stored. The differencing disk expands dynamically as data is written to it
and can grow as large as the maximum size allocated for the parent disk when the parent
disk was created.
http://technet.microsoft.com/en-us/library/cc720381(v=ws.10).aspx
Question No : 3 - (Topic 0)
You have a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-
V server role installed.
On Server1, you create a virtual machine named VM1. VM1 has a legacy network adapter.
A. Remove the legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
B. Add a second legacy network adapter, and then run the Set-VMNetworkAdoptercmdlet.
C. Add a second legacy network adapter, and then configure network adapter teaming.
D. Remove the legacy network adapter, and then add a network adapter.
Answer: D
Explanation:
A. Set-VMNetworkAdaptercmdlet configures features of the virtual network adapter in a
virtual machine or the management operating system
B. The legacy network adapter doesn't support bandwidth management
C. The legacy network adapter doesn't support bandwidth management
D. Add a New network adapter The legacy network adapter doesn't support bandwidth
management
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/hh848457(v=wps.620).aspx
http://www.techrepublic.com/blog/networking/set-bandwidth-limits-for-hyper-v-vms-with-
windows-server-2012/5924
Question No : 4 - (Topic 0)
Your network contains an Active Directory domain named adatum.com. The domain
contains a server named Server1 that runs Windows Server 2012.
On a server named Core1, you perform a Server Core Installation of Windows Server
2012. You join Core1 to the adatum.com domain.
Microsoft 70-410 : Practice Test
You need to ensure that you can use Event Viewer on Server1 to view the event logs on
Core1.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/jj574205.aspx
http://technet.microsoft.com/en-us/library/cc990290(v=ws.10).aspx
Question No : 5 - (Topic 0)
Your network contains a file server named Server1 that runs Windows Server 2012. All
client computers run Windows 8.
You need to ensure that when users are connected to the network, they always use local
offline files that are cached from Server1.
Answer: A
Microsoft 70-410 : Practice Test
Explanation:
A. Offline Files to provide faster access to cached files and redirected folders.
B. Defines a slow connection for purposes of App1ying and updating Group Policy.
C. automatically tracks roaming and bandwidth usage limits while on metered connections
D. Lists network files and folders that are always available for offline use. This policy makes
the specified filesand folders available offline to users of the computer.
When Offline Files is operating in the slow-link mode, all network file requests are satisfied
from the OfflineFiles cache. This is similar to a user working offline.
If you enable this policy setting, Offline Files uses the slow-link mode if the network
throughput between theclient and the server is below (slower than) the Throughput
threshold parameter, or if the round-trip networklatency is above (slower than) the Latency
threshold parameter.
Question No : 6 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. All servers run
either Windows Server 2008 R2 or Windows Serve 2012. All client computers run either
Windows 7 or Windows 8.
The domain contains a member server named Server1 that runs Windows Server 2012.
Server1 has the File and Storage Services server role installed.
You need to ensure that users can use Previous Versions to restore the files in Share1.
Answer: A
Explanation:
A. Enable and schedule shadow copies for Share1
B. The backup doesn't give users access until files are restored
C.
D. No settings for file version
http://technet.microsoft.com/en-us/library/cc786104(v=ws.10).aspx
Question No : 7 - (Topic 0)
Microsoft 70-410 : Practice Test
You have a server named Server1 that runs Windows Server 2012. Server1 has the Print
and Document Services server role installed.
You need to ensure that users can submit print jobs to the print devices. The solution must
ensure that if one print device fails, the print jobs will print automatically on the other print
device.
Answer: B
Explanation:
A. expedite documents that need to be printed immediately
B. A printing pool is one logical printer connected to multiple printers through multiple ports
of theprint server. The printer that is idle receives the next document sent to the logical
printer. Whenprinting to a printer pool, the spooler will send waiting jobs to alternate ports.
If the original or alternateports are not available
C. NLB for printing is not supported
D. Would need 2 nodes
A printing pool is one logical printer connected to multiple printers through multiple ports of
the print server.
The printer that is idle receives the next document sent to the logical printer.
This is useful in a network with a high volume of printing because it decreases the time
users wait for theirdocuments.
A printing pool also simplifies administration because multiple printers can be managed
from the same logicalprinter on a server.
If one device within a pool stops printing, the current document is held at that device. The
succeedingdocuments print to other devices in the pool, while the delayed document waits
until the nonfunctioningprinter is fixed.
Efficient printer pools have the following characteristics:
All printers in the pool are the same model.
Printer ports can be of the same type or mixed (parallel, serial, and network).
It is recommended that all printers be in one location. Because it is impossible to predict
which printer willreceive the document, keep all printers in a pool in a single location.
Otherwise, users might have a hard timefinding their printed document.
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/cc757086(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc784619(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc958172.aspx
You can create a printing pool to automatically distribute print jobs to the next available
printer. A printing poolis one logical printer connected to multiple printers through multiple
ports of the print server. The printer that isidle receives the next document sent to the
logical printer.
Question No : 8 - (Topic 0)
Your network contains a server named Server1 that runs Windows Server 2012. Server1
has the Print and Document Services server role installed.
You connect a new print device to the network. The marketing department and the sales
department will use the print device.
You need to provide users from both departments with the ability to print to the network
print device. The solution must ensure that if there are multiple documents queued to print,
the documents from the sales users print before the documents from the marketing users.
A. Add two printers. Modify the priorities of each printer and the security settings of each
printer.
B. Add two printers and configure printer pooling.
C. Add one printer and configure printer pooling.
D. Add one printer. Modify the printer priority and the security settings.
Answer: A
Explanation: http://technet.microsoft.com/en-us/library/cc738090(v=ws.10).aspx
To set different print priority to different groups
Open Printers and Faxes.
Right-click the printer you want to set, click Properties, and then click the Advanced tab.
In Priority, click the up or down arrows, and then click OK.
Microsoft 70-410 : Practice Test
Or, type a priority level, where 1 is the lowest level and 99 is the highest, and then click OK.
Click Add Printer to add a second logical printer for the same physical printer. For
instructions, see Related Topics.
Question No : 9 - (Topic 0)
You have a server named Server2 that runs Windows Server 2012.
You open Server Manager on Server2 as shown in the exhibit. (Click the Exhibit button.)
The Everyone group has read share permission and read NTFS permission to Sources.
You need to ensure that when users browse the network, the Sources share is not visible.
Microsoft 70-410 : Practice Test
What should you do?
A. From the properties of the Sources folder, remove the Sources share, and then share
the Sources folder as Sources$.
B. From the properties of the Sources folder, deny the List Folder Contents permission for
the Everyone group.
C. From the properties of the Sources share, configure access-based enumeration.
D. From the properties of the Sources folder, configure the hidden attribute.
Answer: A
Explanation:
A. need to remove the old share, $ creates a hidden share
B. This would deny everyine
C. This feature allows users of Windows Server 2003based file servers to list only the files
and folders towhich they have access when browsing content on the file server
D. This would hide the physical folder not the share
A hidden share is identified by a dollar sign ($) at the end of the share name
Hidden shares are not listed when you look through the shares on a computer or use the
"net view" command
Why Use Hidden Shares?
Using hidden shares on your network is useful if you do not want a shared folder or drive
on the network to beeasily accessible. Hidden shares can add another layer of protection
for shared files against unauthorizedpeople connecting to your network. Using hidden
shares helps eliminate the chance for people to guess yourpassword (or be logged into an
authorized Windows account) and then receive access to the shared resource.
Microsoft 70-410 : Practice Test
http://support.microsoft.com/kb/314984
http://technet.microsoft.com/en-us/library/cc784710(v=ws.10).aspx
Question No : 10 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The network
contains a server named Server1 that runs Window Server 8 and a server named Server2
that runs Windows Server 2008 R2 Service Pack 1 (SP1). Server1 and Server2 are
member server.
You need to ensure that you can manage Server2 from Server1 by using Server Manager.
Which two tasks should you perform? (Each correct answer presents part of the solution.
Choose two.)
Microsoft 70-410 : Practice Test
A. Install Remote Server Administration Tools on Server1.
B. Install Windows Management Framework 3.0 on Server2.
C. Install the Windows PowerShell 2.0 engine on Server1.
D. Install Microsoft .NET Framework 4 on Server2.
E. Install Remote Server Administration Tools on Server2.
Answer: B,D
Explanation: http://technet.microsoft.com/en-us/library/hh831456.aspx
Question No : 11 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The network
contains a member server named Server1 that runs Windows Server 2012. Server1 has
the DNS Server server role installed and has a primary zone for contoso.com.
The Active Directory domain contains 500 client computers. There are an additional 20
computers in a workgroup.
You discover that every client computer on the network can add its record to the
contoso.com zone.
You need to ensure that only the client computers in the Active Directory domain can
register records in the contoso.com zone.
A. Move the contoso.com zone to a domain controller that is configured as a DNS server.
B. Configure the Dynamic updates settings of the contoso.com zone.
C. Sign the contoso.com zone by using DNSSEC.
Microsoft 70-410 : Practice Test
D. Configure the Security settings of the contoso.com zone.
Answer: A
Explanation:
If you install DNS server on a non-DC, then you are not able to create AD-integrated
zones.
DNS update security is available only for zones that are integrated into AD DS.
When you directory-integrate a zone, access control list (ACL) editing features are
available in DNS Managerso that you can add or remove users or groups from the ACL for
a specified zone or resource record.
http://technet.microsoft.com/en-us/library/cc771255.aspx
http://social.technet.microsoft.com/Forums/en-US/winserverNIS/thread/9b041bbc-0765-
4eed-bd1cd65027f05e9f/
http://blogs.msmvps.com/acefekay/2012/11/19/ad-dynamic-dns-updates-registration-rules-
of-engagement/
1. Active Directory's DNS Domain Name is NOT a single label name ("DOMAIN" vs the
minimal requirement of"domain.com." "domain.local," etc).
2. The Primary DNS Suffix MUST match the zone name that is allowing updates.
Otherwise the client doesn'tknow what zone name to register in. You can also have a
different Conneciton Specific Suffix in addition to thePrimary DNS Suffix to register into that
zone as well.
4. You must ONLY use the DNS servers that host a copy of the AD zone name or have a
reference to get tothem. Do not use your ISP's, an external DNS adddress, your router as a
DNS address, or any other DNS thatdoes not have a copy of the AD zone. Internet
resolution for your machines will be accomplished by the Rootservers (Root Hints),
however it's recommended to configure a forwarder for efficient Internet resolution. .
5. The domain controller is multihomed (which means it has more than one unteamed,
active NIC, more thanone IP address, and/or RRAS is installed on the DC).
6. The DNS addresses configured in the client's IP properties must ONLY reference the
DNS server(s) hostingthe AD zone you want to update in.
This means that you must NOT use an external DNS in any machine's IP property in an AD
environment.
Microsoft 70-410 : Practice Test
You can't mix them either. That's because of the way the DNS Client side resolver service
works. Even if youmix up internal DNS and ISP's DNS addresses, the resolver algorithm
can still have trouble asking the correctDNS server. It will ask the first one first. If it doesn't
get a response, it removes the first one from the eligibleresolvers list and goes to the next
in the list. It will not go back to the first one unless you restart the machine,restart the DNS
Client service, or set a registry entry to cut the query TTL to 0. The rule is to ONLY use
yourinternal DNS server(s) and configure a forwarder to your ISP's DNS for efficient
Internet resolution.
7. For DHCP clients, DHCP Option 006 for the clients are set to the same DNS server.
8. If using DHCP, DHCP server must only be referencing the same exact DNSserver(s) in
it's own IP properties in order for it to 'force' (if you setthat setting) registration into DNS.
Otherwise, how would it know which DNSto send the reg data to?
9. If the AD DNS Domain name is a single label name, such as "EXAMPLE", and not the
proper format of"example.com" and/or any child of that format, such as
"child1.example.com", then we have a real big problem.
DNS will not allow registration into a single label domain name.
This is for two reasons:
1. It's not the proper hierachal format. DNS is hierarchal, but a single label name has no
hierarchy. It's just asingle name.
2. Registration attempts causes major Internet queriesto the Root servers. Why? Because
it thinks thesingle label name, such as "EXAMPLE", is a TLD(Top Level Domain), such as
"com", "net", etc. Itwill now try to find what Root name server out therehandles that TLD. In
the end it comes back to itselfand then attempts to register. Unfortunately it doe NOTask
Microsoft 70-410 : Practice Test
itself first for the mere reason it thinks it's a TLD.
The above also *especially* App1ies to Windows Vista, &, 2008, 2008 R2, and newer.
10. 'Register this connection's address" on the client is not enabled under the NIC's IP
properties, DNS tab.
11. Maybe there's a GPO set to force Secure updates and the machine isn't a joined
member of the domain.
12. ON 2000, 2003 and XP, the "DHCP client" Service not running. In 2008/Vista and
newer, it's the DNSClient Service. This is a requirement for DNS registration and DNS
resolution even if the client is not actuallyusing DHCP.
13. You can also configure DHCP to force register clients for you, as well as keep the DNS
zone clean of old orduplicate entries. See the link I posted in my previous post.
Question No : 12 - (Topic 0)
Your company has a remote office that contains 1,600 client computers on a single subnet.
You need to select a subnet mask for the network that will support all of the client
computers. The solution must minimize the number of unused addresses.
A. 255.255.248.0
B. 255.255.252.0
C. 255.255.254.0
D. 255.255.240.0
Answer: A
Microsoft 70-410 : Practice Test
Explanation:
http://zeus.fh-brandenburg.de/~ihno/doc/lehre/internet/ip_eng.html
You plan to deploy a DHCP server that will support four subnets. The subnets will be
configured as shown in the following table.
Microsoft 70-410 : Practice Test
You need to identify which network ID you should use for each subnet.
To answer, drag the appropriate network ID to the each subnet in the answer area.
Answer:
Microsoft 70-410 : Practice Test
Question No : 14 - (Topic 0)
Your network contains three servers that run Windows Server 2012. The servers are
configured as shown in the following table.
You need to ensure that Server3 only receives an IP address from Server1. The IP address
must always be the same.
Which two tasks should you perform? (Each correct answer presents part of the solution.
Choose two.)
Answer: D,E
Explanation:
A. Exclude range of IP's for lease
B. Wrong Server
C. Wrong Sever
D. For clients that require a constant IP address, you can either manually configure a static
IP address,or assign a reservation on the DHCP server
E. DHCP Deny Filter at Server2 to exclude MAC address of Server3
MAC address filterEnable and define an explicit allow list. The DHCP server provides
DHCP services only to clients whose MACaddresses are in the allow list.
Microsoft 70-410 : Practice Test
Any client that previously received IP addresses is denied address renewal if its MAC
address isnt onthe allow list.
Enable and define an explicit deny list. The DHCP server denies DHCP services only to
clients whose MACaddresses are in the deny list.
Any client that previously received IP addresses is denied address renewal if its MAC
address is on thedeny list.
http://technet.microsoft.com/en-us/library/cc754537(v=ws.10).aspx
http://technet.microsoft.com/en-us/magazine/ff521761.aspx
http://technet.microsoft.com/en-us/library/cc779507(v=ws.10).aspx
Question No : 15 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that runs Windows Server 2012 and a client
computer named Computer1 that runs Windows 8.
DC1 is configured as a DHCP server as shown in the exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
You need to ensure that Computer1 can receive an IP address from DC1.
Answer: D
Explanation:
Red down arrow indicates a unauthorized DHCP server
A DHCP server that is a domain controller or a member of an Active Directory domain
queries Active Directoryfor the list of authorized servers (identified by IP address).
If its own IP address is not in the list of authorized DHCP servers, the DHCP Server service
does not completeits startup sequence and automatically shuts down.
http://technet.microsoft.com/en-us/library/cc754792.aspx
http://technet.microsoft.com/en-us/library/ee941131(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/gg722802(v=ws.10).aspx
http://pc-addicts.com/server-2012-dhcp-server-role/
Microsoft 70-410 : Practice Test
Question No : 16 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named Server1 that ha the DNS Server server role installed.
Server1 hosts a primary zone for contoso.com.
The domain contains a member server named Server2 that is configured to use Server1 as
its primary DNS server.
From Server2, you run nslookup.exe as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that when you run Nslookup, the correct name of the default server is
displayed.
A. From Advanced TCP/IP Settings on Server1, add contoso.com to the DNS suffix list.
B. On Server1, modify the Security settings of the contoso.com zone.
C. On Server1, create a reverse lookup zone.
D. From Advanced TCP/IP Settings on Server2, add contoso.com to the DNS suffix list.
Answer: C
Microsoft 70-410 : Practice Test
Explanation:
C. Make sure that a reverse lookup zone that is authoritative for the PTR resource record
exists. For more information about adding a reverse lookup zone, see "Adding a Reverse
Lookup Zone"
http://technet.microsoft.com/en-us/library/cc961417.aspx
Question No : 17 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that hosts the primary DNS zone for
contoso.com.
All client computers are configured to use DC1 as the primary DNS server.
You need to configure DC1 to resolve any DNS requests that are not for the contoso.com
zone by querying the DNS server of your Internet Service Provider (ISP).
Answer: C
Explanation:
A. Specifies a name server for the domain, which allows DNS lookups within various
zones. Each primary andsecondary name server should be declared through this record.
B. http://windowsitpro.com/networking/q-whats-conditional-dns-forwarding
C. manage the Domain Name System (DNS) traffic between your network and the Internet
D.
Configure forwarders to send DNS queries directly to your ISP's DNS server or other DNS
servers.
Most of the time, when you configure forwarders, DNS performance and efficiency
increases, but thisconfiguration can also introduce a point of failure if the forwarding DNS
server is experiencing problems.
Microsoft 70-410 : Practice Test
A forwarder is a Domain Name System (DNS) server on a network used to forward DNS
queries for externalDNS names to DNS servers outside of that network.
A DNS server on a network is designated as a forwarder by having the other DNS servers
in the networkforward the queries they cannot resolve locally to that DNS server.
By using a forwarder, you can manage name resolution for names outside of your network,
such as names onthe Internet, and improve the efficiency of name resolution for the
computers in your network.
http://social.technet.microsoft.com/Forums/en-US/winserverNIS/thread/2f35cae2-341c-
4bfe-9dac-724ddace6d51/
http://technet.microsoft.com/en-us/library/cc722542.aspx
http://technet.microsoft.com/en-us/library/cc754931.aspx
Question No : 18 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012. The domain contains a server named Server1 that
runs Windows Server 2012.
You need to ensure that when users log on to Server1, their user account is added
automatically to a local group named Group1 during the log on process.
A. Restricted Groups
B. Security Options
C. User Rights Assignment
D. Preferences
Answer: D
Explanation:
A. If a Restricted Groups policy is defined and Group Policy is refreshed, any current
member not on the Restricted Groups policy members list is removed
B. Security settings incorporated into policies are rules that administrators configure on a
computer or multiple computers for the purpose of protecting resources on a computer
Microsoft 70-410 : Practice Test
C. User Rights Assignment policies determines which users or groups have logon rights or
privileges on the computer
D. With Preferences, local and domain accounts can be added to a local group without
affecting the existing members of the group
http://technet.microsoft.com/en-us/library/cc785631(v=ws.10).aspx
http://www.grouppolicy.biz/2010/01/how-to-use-group-policy-preferences-to-secure-local-
administrator-groups/
http://technet.microsoft.com/en-us/library/cc780182(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh831424.aspx
Question No : 19 - (Topic 0)
You need to prevent users from installing a Windows Store app named App1.
Answer: B
Explanation:
Windows 8 is coming REALLY SOON and of course one of the big new things to computer
with that is the newPackaged Apps that run in the start screen. However these apps are
very different and do not install liketraditional apps to a path or have a true executable file
to launch the program. Ofcourse enterprises need a way to control these packaged apps
and therefore Microsoft has added a newfeature Packaged Apps option to the App1ocker
feature.
http://technet.microsoft.com/en-us/library/dd759068.aspx
http://technet.microsoft.com/en-us/library/hh994588.aspx
http://www.grouppolicy.biz/2012/08/how-manage-published-a-k-a-metro-apps-in-windows-
8-using-grouppolicy/
http://technet.microsoft.com/en-us/library/hh994597.aspx#BKMK_Cert_Rules
Packaged Apps run in the start screen.
However these apps are very different and do not install like traditional apps to a path or
have a trueexecutable file to launch the program.
Enterprises need a way to control these packaged apps and therefore Microsoft has added
a new featurePackaged Apps option to the App1ocker feature.
Question No : 20 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The domain
Microsoft 70-410 : Practice Test
contains 500 servers that run Windows Server 2012.
You need to ensure that you can use Computer1 to access all of the ports on all of the
servers successfully.
Which three actions should you perform? (Each correct answer presents part of the
solution. Choose three.)
Answer: A,C,F
Explanation:
http://technet.microsoft.com/en-us/library/cc772017.aspx
Unlike firewall rules, which operate unilaterally, connection security rules require that both
communicating computers have a policy with connection security rules or another
compatible IPsec policy.
http://technet.microsoft.com/en-us/library/cc753463.aspx
Traffic that matches a firewall rule that uses the Allow connection if it is secure setting
Microsoft 70-410 : Practice Test
bypasses Windows Firewall. The rule can filter the traffic by IP address, port, or protocol.
This method is supported on Windows Vista or Windows Server 2008.
Question No : 21 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. All user accounts
are in an organizational unit (OU) named Employees.
You create a Group Policy object (GPO) named GP1. You link GP1 to the Employees CU.
You need to ensure that GP1 does not App1y to the members of a group named
Managers.
Answer: D
Explanation:
A. Wrong Group
B. Windows Management Instrumentation (WMI) filters allow you to dynamically determine
the scope of GroupPolicy objects (GPOs) based on attributes of the target computer.
C. Blocking inheritance prevents Group Policy objects (GPOs) that are linked to higher
sites, domains, ororganizational units from being automatically inherited by the child-level.
D. Set Managers to - Members of this security group are exempt from this Group Policy
object.
Security settings.Youuse the Security Settings extension to set security options for
computers and userswithin the scope of a Group Policy object. You can define local
computer, domain, and network securitysettings.
Figure belows shows an example of the security settings that allow everyone to be affected
by this GPO exceptthe members of the Management group, who were explicitly denied
permission to the GPO by setting the App1yGroup Policy ACE to Deny. Note that if a
Microsoft 70-410 : Practice Test
member of the Management group were also a member of a groupthat had an explicit
Allow setting for the App1y Group Policy ACE, the Deny would take precedence and
theGPO would not affect the user.
http://technet.microsoft.com/en-us/library/bb742376.aspx
http://technet.microsoft.com/en-us/library/cc786636(WS.10).aspx
http://technet.microsoft.com/en-us/library/cc731076.aspx
http://technet.microsoft.com/en-us/library/cc779036(v=ws.10).aspx
Question No : 22 - (Topic 0)
Your network contains a server named Server1 that runs Windows Server 2012. Server1 is
located on the same subnet as all of the client computers.
A network technician reports that he receives a Request timed out error message when
he attempts to use the ping utility to connect to Server1 from his client computer.
The network technician confirms that he can access resources on Server1 from his client
computer.
You need to configure Windows Firewall with Advanced Security on Server1 to allow the
ping utility to connect.
Microsoft 70-410 : Practice Test
Which rule should you enable?
Answer: A
Explanation:
Ping uses ICMP
Open Control Panel, then select System and Security by clicking on that header
Select Windows Firewall, Advanced SettingsIn Windows Firewall with Advanced security
click on Inbound rules Scroll down to File and Printer sharing(Echo request ICMPv4-In).
Right click on the rule and select Enable rule
Powershell:
Import-Module NetSecurity
Set-NetFirewallRule -DisplayName File and Printer Sharing (Echo Request ICMPv4-In)
-enabled True
Microsoft 70-410 : Practice Test
Question No : 23 - (Topic 0)
You have a file server named Server1 that runs Windows Server 2012.
You need to ensure that a user named User1 can use Windows Server Backup to create a
complete backup of Server1.
Answer: A
Explanation:
A. User needs to be added to local Backup Operator group
B. AzMan is a role-based access control (RBAC) framework that provides an administrative
tool to manage authorization policy and a runtime that allows Applications to perform
access checks against that policy.
C. User Rights Assignment policies determines which users or groups have logon rights or
privileges on the computer
D. AzMan is a role-based access control (RBAC) framework that provides an administrative
tool to manage authorization policy and a runtime that allows Applications to perform
access checks against that policy.
http://technet.microsoft.com/en-us/library/cc780182(v=ws.10).aspx
http://msdn.microsoft.com/en-us/library/bb897401.aspx
Question No : 24 - (Topic 0)
Your network contains a production Active Directory forest named contoso.com and a test
Microsoft 70-410 : Practice Test
Active Directory forest named contoso.test. A trust relationship does not exist between the
forests.
In the contoso.test domain, you create a backup of a Group Policy object (GPO) named
GPO1.
You transfer the backup of GPO1 to a domain controller in the contoso.com domain.
You need to create a GPO in contoso.com based on the settings of GPO1. You must
achieve this goal by using the minimum amount of Administrative effort.
A. From Windows PowerShell, run the Get- GPO cmdlet and the Copy- GPO cmdlet.
B. From Windows PowerShell, run the New- GPO cmdlet and the Import- GPO cmdlet.
C. From Group Policy Management, create a new starter GPO. Right-click the new starter
GPO, and then click Restore from Backup.
D. From Group Policy Management, right-click the Croup Policy Objects container, and
then click Manage Backups.
Answer: B
Explanation:
Why not D?
You can also restore GPOs. This operation takes a backed-up GPO and restores it to the
same domain from which it was backed up. You cannot restore a GPO from backup into a
domain different from the GPOs original domain.
http://technet.microsoft.com/en-us/library/cc781458(v=WS.10).aspx
http://technet.microsoft.com/en-us/library/hh967461.aspx
http://technet.microsoft.com/en-us/library/ee461050.aspx
http://technet.microsoft.com/en-us/library/ee461044.aspx
Question No : 25 - (Topic 0)
Your network contains a server named Server1 that runs Windows Server 2012. Server1
has the Hyper-V server role installed.
Microsoft 70-410 : Practice Test
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
You need to ensure that all of the traffic sent to VM3 can be captured on VM2.
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. the VLAN ID
F. Processor Compatibility
G. the startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Answer: J
Explanation:
J. With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are
monitored as well as the switch port that receives copies of all the traffic
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror
Question No : 26 - (Topic 0)
Your network contains a server named Server1 that runs Windows Server 2012. Server1
has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
You plan to schedule a complete backup of Server1 by using Windows Server Backup.
You need to ensure that the state of VM1 is saved before the backup starts.
Answer: I
Explanation:
What is the Hyper-V Saved State?
Some Hyper-V virtual machines briefly go offline into a "Saved State" at the initial phase of
a backup.
While the backup is running, they usually come back online after a couple of seconds.
Background KnowledgeThe decision to pull Hyper-V virtual machines offline into a Saved
State is done solely within Hyper-VManagement Services.
Backup software utilities have no way to force a live backup when Hyper-V determines it
can't and shouldn't bedone.There are many factors that are considered by Hyper-V when it
decides whether to take a VM offline or not,Hyper-V Live Backup Requirements:
To achieve zero downtime live backups of virtual machines, you need the following
conditions met:
1. The VM guest needs to have Integration Services installed, enabled, and running
(COM+ System
Application Service, Distributed Transaction Coordinator Service, and Volume Shadow
Copy Service). Alsoreview the VM settings in Hyper-V, the 'backup' option needs to be
checked.
2. All disks involved need to be formatted with NTFS, including the disks within the VM.
3. The Volume Shadow Copy Service and related VSS services need to be enabled and
running.
4. The shadow copy storage space for each drive must be available to Hyper-V VSS Writer
and be located atthe same volume. For instance, the storage space for drive C: needs to
be on drive C: itself, and so on. Usethe VSSADMIN command from the command line to
check the settings. (Use: vssadmin list shadowstorage /vssadmin resize shadowstorage)
5. Ensure the VMs are partitioned using 'basic disk' formatting. At the moment Hyper-V
does not support livebackup for VMs formatted using dynamic disk partitioning or GPT.
7. Ensure you have at least about 20% free space on each drive involved, such as the
drive on the host andthe VM's main system drive.
8. Ensure plenty of un-fragmented RAM is available on the host. If a machine is pulled into
Microsoft 70-410 : Practice Test
Saved State, Hyper-
V may not be able to bring the VM back online if it can't allocate a continuous block of
RAM. Note that theremay be sufficient total RAM available but not enough to place a single
block. You should therefore aim to keepat least 512 MB to 1 GB of RAM free when all VMs
are powered up.
http://msdn.microsoft.com/en-us/library/dd405549(v=vs.85).aspx
http://backupchain.com/Understanding-Saved-State-Hyper-V-Backup.html
Question No : 27 - (Topic 0)
Your network contains a server named Server1 that runs Windows Server 2012. Server1
has the Hyper-V server role installed.
Microsoft 70-410 : Practice Test
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. the VLAN ID
F. Processor Compatibility
G. the startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Answer: I
Explanation:
By default when you install the Integration Services/Components you get time
synchronization with the host OS, here is how to disable ongoing time synchronization.
When you install the integration services/components in Hyper-V virtual machine you get a
Microsoft 70-410 : Practice Test
set of services installed and enabled by default.
The virtual machine will now not sync its time with the Hyper-V host on a continuous
basis....BUT it will always sync once at power on. This is required to boot strap the timer
inside the virtual machine
Microsoft 70-410 : Practice Test
http://www.virtualizationadmin.com/kbase/VirtualizationTips/ServerVirtualization/MicrosoftH
yper-VTips/PerformanceandScalability/DisablingTimeSyncinaVM.html
http://blogs.technet.com/b/virtualization/archive/2008/08/29/backing-up-hyper-v-virtual-
machines.aspx
Question No : 28 - (Topic 0)
Your network contains a server named Server1 that runs Windows Server 2012. Server1
has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
You need to configure VM4 to track the CPU, memory, and network usage.
A. NUMA topology
B. Resource control
C. resource metering
D. Virtual Machine Chimney
Microsoft 70-410 : Practice Test
E. the VLAN ID
F. Processor Compatibility
G. the startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Answer: C
Explanation:
http://blogs.technet.com/b/meamcs/archive/2012/05/28/hyper-v-resource-metering-in-
windows-server-2012-server-8-beta.aspx
Question No : 29 - (Topic 0)
Your network contains a server named Server1 that runs Windows Server 2012. Server1
has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
You install Windows Server 2012 on VM2 by using Windows Deployment Services (WDS).
You need to ensure that the next time VM2 restarts, you can connect to the WDS server by
using PXE.
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Answer: G
Explanation:
G. Configure the BIOS of the computer to enable PXE boot, and set the boot order so that
it is booting from the network is first
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx
Question No : 30 - (Topic 0)
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains two domain controllers. The domain controllers are configured as shown in the
following table.
In the perimeter network, you install a new server named Server1 that runs a Server Core
Installation of Windows Server 8.
A. The New-ADComputercmdlet
B. The djoin.exe command
C. The dsadd.exe command
D. The Add-Computer cmdlet
Answer: B
Explanation:
A. Creates a new Active Directory computer.
B. Use djoin for offline join in the perimeter network
C. Adds specific types of objects to the directory.
D. Add the local computer to a domain or workgroup.
http://technet.microsoft.com/en-us/library/ee617245.aspx
http://technet.microsoft.com/en-us/library/ff793312(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh849798.aspx
Question No : 31 - (Topic 0)
Microsoft 70-410 : Practice Test
Your network contains an Active Directory forest that contains three domains.
A group named Group1 is configured as a domain local distribution group in the forest root
domain.
You plan to grant Group1 read-only access to a shared folder named Share1. Share1 is
located in a child domain.
You need to ensure that the members of Group1 can access Share1.
Answer: B
Explanation:
A. Distribution Groups only used for email
B, Universal can be used for any domain or forest
C. Distribution Groups only used for email
D. Permissions can be assigned only within the same domain as the parent domain local
group
http://technet.microsoft.com/en-us/library/cc781446(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc755692(v=ws.10).aspx
Microsoft 70-410 : Practice Test
Question No : 32 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2008 R2. One of the domain controllers is named DCI.
The network contains a member server named Server1 that runs Windows Server 2012.
You need to promote Server1 to a domain controller by using install from media (IFM).
Answer: C
Explanation:
A. Backs up system state data to be restored
B. ???
C. Only valid option. You could install ADDS role on Server 1 and run ADDS configuration
wizard andadd DC to existing domain
D. Need to add ADDS role first
E. Wrong server
Installation from media does not work across different operating system versions.
In other words, you must use a Windows Server 2012 domain controller to generate
installation media to usefor another Windows Server 2012 domain controller installation.
We can use the Install from media (IFM) option to install an Additional Domain Controller in
an existing domainis the best option such as a branch office scenario where network is
slow, unreliable and costly.
IFM will minimize replication traffic during the installation because it uses restored backup
files to populate theAD DS database. This will significantly reduce the amount of traffic
copied over the WAN link.
Microsoft 70-410 : Practice Test
Things to remember:
If you are deploying your first Domain Controller in the domain, you cannot use IFM.
The OS will need to match the IFM media. (If you create a 2008 R2 IFM, promote a 2008
R2 DC)
If you are creating a DC that will be a Global Catalog Server, create your IFM on a Global
Catalog Server.
If you are creating a DC that will be a DNS Server, create your IFM on a DNS Server.
If you want to copy the SYSVOL, the DC on which you generate the installation media and
the new DC mustbe at least running Windows Server 2008 with Service Pack 2 or
Windows Server 2008 R2.
Membership of the Domain Admins group is the minimum required to complete IFM.
http://www.brandonlawson.com/active-directory/deploying-domain-controllers-with-install-
from-media-ifm/
http://technet.microsoft.com/en-us/library/jj574166.aspx
http://technet.microsoft.com/en-us/library/cc770654%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/library/jj574134.aspx
Media used by the IFM option is created with Windows Server Backup or Ntdsutil.exe from
another existingWindows Server 2012 computer only
You cannot use a Windows Server 2008 R2 or previous operating system to create media
for a Windows Server 2012 domain controller.
Question No : 33 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The domain
contains 100 servers. The servers are contained in a organizational unit (OU) named
ServersOU.
You need to create a group named Group1 on all of the servers in the domain. You must
ensure that Group1 is added only to the servers.
Answer: C
Explanation:
A. This would add the group to the wrong OU
B. This would affect the whole domain and would effect member of the group
C. allows you to centrally manage local users and groups on domain member computers
and is this isthe correct OU for the GPO change
D. Restricted Groups defines what member or groups should exist as part of a group
Why use Group Policy preferences?
Unlike Group Policy settings, which App1y to both local computer policy and Active
Directory policy, GroupPolicy preferences only App1y to Active Directory policy. You use
preferences to configure many areas of theOS, including:
System devices, such as USB ports, floppy drives and removable media
Network shares and mapping network shares to drive letters
System and user environment variables
User and group accounts for the local computer
VPN and dial-up networking connections
Printer configuration and mapping
Registry settings, schedule tasks and system services
Settings for Folder Options, Internet Options and Regional and Language Options
Settings for power schemes and power management
Start Menu properties and menu items
Microsoft 70-410 : Practice Test
http://www.grouppolicy.biz/2010/01/how-to-use-group-policy-preferences-to-secure-local-
administrator-groups/
http://technet.microsoft.com/en-us/magazine/hh848751.aspx
http://technet.microsoft.com/en-us/library/cc957640.aspx
http://technet.microsoft.com/en-us/library/cc731972.aspx
Question No : 34 - (Topic 0)
Your network contains an Active Directory domain named adatum.com. The domain
contains three domain controllers. The domain controllers are configured as shown in the
following table.
You need to identify which service location (SRV) records are registered by DC3.
Answer: A
Explanation:
A. Netlogon service creates a log file that contains all the locator resource records and
places the logfile in the following location:
B. Analyzes the state of domain controllers in a forest or enterprise and reports any
problems to help introubleshooting.
C. dns backup file
D. used to display current resolver cache content
You can verify SRV locator resource records by viewing netlogon.dns, located in the
%systemroot%\System32\Config folder.
The SRV record is a Domain Name System (DNS) resource record that is used to identify
computers that hostspecific services.
SRV resource records are used to locate domain controllers for Active Directory.
You can use Notepad, to view this file.
The first record in the file is the domain controller's Lightweight Directory Access Protocol
(LDAP) SRV record.
http://support.microsoft.com/kb/816587/en-us
http://technet.microsoft.com/en-us/library/cc959303.aspx
http://technet.microsoft.com/en-us/library/cc731968(v=ws.10).aspx
Question No : 35 - (Topic 0)
Your network contains an Active Directory domain named adatum.com. The domain
contains several thousand member servers that run Windows Server 2012. All of the
computer accounts for the member servers are in an organizational unit (OU) named
ServersAccounts.
You need to identify which servers were restarted during the last two days.
Answer: C
Explanation:
A. dsquery computer -stalepwdnumber_of_days - Searches for all computers that have not
changed theirpassword for the specified number_of_days.
B. dsquery server -o {dn | rdn | samid} - Specifies the format in which the list of entries
found by the search willbe displayed: dn distinguished name of each entry, default; rdn
relative distinguished name of each entry;
samid SAM account name of each entry computer group server user; upn user principal
name of each entryuser
C. Gets one or more Active Directory computers lastLogondate should be used
D. SearchScope specifies the scope of an Active Directory search. Possible values for this
parameter are:
Base or 0; OneLevel or 1; Subtree or 2 - A Base query searches only the current path or
object. AOneLevelquery searches the immediate children of that path or object. A Subtree
query searches the current path orobject and all children of that path or object.
http://technet.microsoft.com/en-us/library/ee617192.aspx
http://technet.microsoft.com/en-us/library/cc732952(v=ws.10).aspx
Question No : 36 - (Topic 0)
You view the properties of a group named Group1 as shown in the exhibit. (Click the
Exhibit button.)
You need to ensure that you can modify the Security settings of Group1 by using Active
Directory Users and Computers.
A. From the View menu, select Users, Contacts, Groups, and Computers as containers.
B. Right-click OU1 and select Delegate Control.
C. From the View menu, select Advanced Features.
Microsoft 70-410 : Practice Test
D. Right-click contoso.com and select Delegate Control.
Answer: C
Explanation:
From ADUC select view toolbar then select advanced features
When you open up the ADUC in a default installation of Active Directory, you are only
presented with the basiccontainers.
These basic containers include the only organizational unit (OU), which is the Domain
Controllers OU, as wellas the other containers such as Users and Computers.
To see more in-depth containers, you need to configure the ADUC by going to the View
option on thetoolbar, then selecting Advanced Features.
This will refresh the view within the ADUC and add some new containers. There are no
hidden (or Advanced)OUs that will show up when you configure the ADUC in this way.
http://searchwindowsserver.techtarget.com/tip/Viewing-advanced-settings-in-Active-
Directory-Users-and-Computers
Question No : 37 - (Topic 0)
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains two domain controllers named DC1 and DC.
A. Server Manager
B. winrm.exe
C. Active Directory Domains and Trusts
D. dcpromo.exe
Answer: A
Explanation:
A. using the Add Roles Wizard in Server Manager, followed by the Active Directory Domain
Services
Configuration Wizard
B. winrm is the server side service for remote managment
C. used for trust between multiple domains
D. Dcpromo.exe has been deprecated. In Windows Server 2012, if you run dcpromo.exe
(without anyparameters) from a command prompt, you receive a message directing you to
Server Manager
http://technet.microsoft.com/en-us/library/hh472162.aspx#BKMK_GUI
http://technet.microsoft.com/en-us/library/dd163506.aspx
http://technet.microsoft.com/en-us/library/hh831568.aspx
Question No : 38 - (Topic 0)
You have a server named Server1 that runs Windows Server 2012.
You need to remove Windows Explorer, Windows Internet Explorer, and all related
components and files from Server1.
Answer: B
Explanation:
A. Would be a server core install
B. No IE or taskbar, explorer or control panel
C. Would leave components
D. Would leave components
In Windows Server 2012, you can remove the Server Graphical Shell, resulting in the
Minimal ServerInterface.
This is similar to a Server with a GUI installation, but Internet Explorer 10, Windows
Explorer, the desktop, andthe Start screen are not installed.
Microsoft Management Console (MMC), Server Manager, and a subset of Control Panel
are still present.
If the server has a full installation of Windows Server, and I need to bring the server down
to minimal serverinterface, I only need to remove the Server-GUI-Shell.
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/hh831786(v=ws.11).aspx
Question No : 39 - (Topic 0)
The server contains the disks configured as shown in the following table.
You need to create a volume that can store up to 3 TB of user files. The solution must
ensure that the user files are available if one of the disks in the volume fails.
Question No : 40 - (Topic 0)
You have a server named Core1 that has a Server Core Installation of Windows Server
2012.
Core1 has the Hyper-V server role installed Core1 has two network adapters from different
third-party hardware vendors.
You need to configure network traffic failover to prevent connectivity loss if a network
adapter fails.
A. New-NetSwitchTeam
B. Add-NetSwitchTeamMember
C. Install-Feature
D. netsh.exe
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/jj553814.aspx
Question No : 41 - (Topic 0)
You need to create a storage space that contains the three disks.
A. A simple space
B. A spanned volume
C. A mirrored space
D. A parity space
Answer: D
Explanation:
A.Stripes data across a set of pool disks, and is not resilient to any disk failures.
B.A spanned volume is a dynamic volume consisting of disk space on more than one
physical disk and not fault tolerant
C. Fault tolerant but Not max space
D. Fault tolerant and better space ratio
http://social.technet.microsoft.com/wiki/contents/articles/15198.storage-spaces-
overview.aspx
http://technet.microsoft.com/en-us/library/cc772180.aspx
Question No : 42 - (Topic 0)
You perform a Server Core Installation of Windows Server 2012 on a server named
Server1.
Answer: B
Explanation:
The DISM command is called by the Add-WindowsFeature command. Here is the systax
for DISM:
Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:Server-
Gui-Shell /featurename:Server-Gui-Mgmt
Question No : 43 - (Topic 0)
You have a server named Server1 that runs Windows Server 2012. Server1 has five
network adapters. Three of the network adapters an connected to a network named LAN1.
The two other network adapters are connected to a network named LAN2.
You need to create a network adapter team from the three network adapters connected to
LAN 1.
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/hh831648.aspx
Question No : 44 - (Topic 0)
Your companys security policy states that all of the servers deployed to a branch office
must not have the graphical user interface (GUI) installed.
In a branch office, a support technician installs a server with a GUI installation of Windows
Server 2012 on a new server, and then configures the server as a DHCP server.
You need to ensure that the new server meets the security policy. You want to achieve this
goal by using the minimum amount of Administrative effort.
Answer: D
Explanation:
A. Not least effort
B. Uninstalls desktop experience not the full GUI
C. Uninstalls the powershell ISE
D. Least effort and removes full GUI
http://www.howtogeek.com/111967/how-to-turn-the-gui-off-and-on-in-windows-server-2012/
http://technet.microsoft.com/en-us/library/cc772567.aspx
http://blogs.technet.com/b/server_core/archive/2012/05/09/configuring-the-minimal-server-
interface.aspx
Microsoft 70-410 : Practice Test
Question No : 45 DRAG DROP - (Topic 0)
Your network contains three servers. The servers are configured as shown in the following
table.
To answer, drag the appropriate upgrade path to each server in the answer area. Each
upgrade path may be used once, more than once, or not at all.
Answer:
Microsoft 70-410 : Practice Test
Question No : 46 - (Topic 0)
Your network contains a file server named Server1 that runs Windows Server 2012.
Server1 contains a folder named Folder1. Folder1 contains the installation files for the
companys desktop Applications.
You need to ensure that the share for Folder1 is not visible when users browse the
network.
A. From the properties of Folder1, deny the List Folder Contents permission for the
Everyone group.
B. From the properties of Folder1, remove Share1, and then share Folder1 as Share1$.
C. From the properties of Folder1, configure the hidden attribute.
D. From the properties of Share1, configure access-based enumeration.
Answer: B
Explanation:
A. Will deny everyone list of folder content
B. Remove share and re-add using $ for Hidden/Administrative share
C. This will hide the physical folder
D. lists only the files and folders to which they have access when browsing content on the
file server
A hidden share is identified by a dollar sign ($) at the end of the share name
Hidden shares are not listed when you look through the shares on a computer or use the
"net view" command
Using hidden shares on your network is useful if you do not want a shared folder or drive
on the network to beeasily accessible. Hidden shares can add another layer of protection
for shared files against unauthorizedpeople connecting to your network. Using hidden
Microsoft 70-410 : Practice Test
shares helps eliminate the chance for people to guess yourpassword (or be logged into an
authorized Windows account) and then receive access to the shared resource.
http://support.microsoft.com/kb/314984
http://technet.microsoft.com/en-us/library/cc784710(v=ws.10).aspx
Question No : 47 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 and a server named
Server2 that runs Windows Server 2008 R2 Service Pack 1 (SP1). Both servers are
member servers.
On Server2, you install all of the software required to ensure that Server2 can be managed
Microsoft 70-410 : Practice Test
remotely from Server Manager.
You need to ensure that you can manage Server2 from Server1 by using Server Manager.
Which two tasks should you perform on Server2? (Each correct answer presents part of the
solution. Choose two.)
Answer: D,E
Explanation:
To configure Server Manager remote management by using Windows PowerShell
On the computer that you want to manage remotely, open a Windows PowerShell session
with elevated user rights. To do this, click Start, click All Programs, click Accessories, click
Windows PowerShell, right-click the Windows PowerShell shortcut, and then click Run as
administrator.
In the Windows PowerShell session, type the following, and then press Enter.
Set-ExecutionPolicy -ExecutionPolicyRemoteSigned
Type the following, and then press Enter to enable all required firewall rule exceptions.
Configure-SMRemoting.ps1 -force -enable
http://technet.microsoft.com/en-us/library/dd759202.aspx
To do this, click Start, click All Programs, click Accessories, click Windows PowerShell,
right-click the WindowsPowerShell shortcut, and then click Run as administrator. In the
Windows PowerShell session, type thefollowing, and then press Enter.
Set-ExecutionPolicy -ExecutionPolicyRemoteSigned Type the following, and then press
Enter to enable allrequired firewall rule exceptions.
Configure-SMRemoting.ps1 -force -enable
http://technet.microsoft.com/en-us/library/dd759202.aspx
Your network contains an Active Directory domain named contoso.com. The domain
contains a print server named Server1 that runs Windows Server 2012.
You need to ensure that you can view the printer objects associated to Server1 in Active
Directory Users and Computers.
Answer:
Question No : 49 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2 that run Windows Server 2012.
Microsoft 70-410 : Practice Test
You log on to Server1.
A. winrs -r:server2ipconfig
B. winrm get server2
C. dsquery *-scope base-attrip, server2
D. ipconfig> server2.ip
Answer: A
Explanation: A. Windows Remote Management allows you to manage and execute
programs remotely
B. winrm is the server side services for remote mgmt
C. dsquery * finds any objects in the directory according to criteria using a LDAP query.
D. Would output server1 ipconfig info to server2.ip file
http://technet.microsoft.com/en-us/library/dd349801(v=ws.10).aspx
Microsoft 70-410 : Practice Test
Question No : 50 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The network
contains a domain controller named DC1 that has to DNS Server server role installed. DC1
has a standard primary DNS zone for contoso.com.
You need to ensure that only client computers in the contoso.com domain will be able to
add their records to the contoso.com zone.
Answer: C
Explanation:
C. Only Authenticated users can create records when zone is stored in AD
Secure dynamic updates allow an administrator to control what computers update what
names and preventunauthorized computers from overwriting existing names in DNS.
If you have an Active Directory infrastructure, you can only use Active Directoryintegrated
zones on ActiveDirectory domain controllers.
If you are using Active Directoryintegrated zones, you must decide whether or not to store
Active Directoryintegrated zones in the Application directory partition.
To configure computers to update DNS data more securely, store DNS zones in Active
Directory DomainServices (AD DS) and use the secure dynamic update feature.
Secure dynamic update restricts DNS zone updates to only those computers that are
authenticated and joinedto the Active Directory domain where the DNS server is located
and to the specific security settings that aredefined in the access control lists (ACLs) for the
DNS zone.
http://technet.microsoft.com/en-us/library/cc731204(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc755193.aspx
http://technet.microsoft.com/en-us/library/cc786068%28v=ws.10%29.aspx
Microsoft 70-410 : Practice Test
Question No : 51 - (Topic 0)
Your network contains a single Active Directory domain named contoso.com. The network
contains two subnets. The subnets are configured as shown in the following table.
The network contains a member server named Server1 that runs Windows Server 2012.
Server1 has the DHCP Server server role installed. Server1 is configured to lease [P
addresses to the two subnets.
You discover that computers on the Warehouse subnet that have static IP addresses can
communicate with the computers on the MainOffice subnet. Computers on the Warehouse
subnet that obtain an IP address automatically can only communicate with other computers
on the Warehouse subnet.
You need to ensure that all of the computers on the Warehouse subnet can communicate
with the computers on the MainOffice subnet.
A. 003 Router
B. 011 Resource Location Servers
C. 020 Nonlocal Source Routing
D. 019 IP Layer Forwarding
Answer: A
Explanation:
A. This option is normally used to assign a default gateway to DHCP clients on a subnet. A
DHCP clientrequests this option.
B. This option specifies a list of IP addresses for resource location servers
C. This option specifies whether the DHCP client enables or disables the forwarding at the
IP layer ofdatagrams that contain source routing information and were sent by a non-local
host.
D. This option specifies whether the DHCP client should enable or disable forwarding of
datagrams at the IPlayer.
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/dd145324(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/ee941211(v=ws.10).aspx
Question No : 52 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The network
contains 500 client computers that run Windows 2012. All of the client computers connect
to the Internet by using a web proxy.
Microsoft 70-410 : Practice Test
You deploy a server named Server1 that runs Windows Server 2012. Server1 has the DNS
Server server role installed.
You configure all of the client computers to use Server1 as their primary DNS server.
You need to prevent Server1 from attempting to resolve Internet host names for the client
computers.
Answer: C
Explanation: Root Hints are a vital cog in configuring your DNS Server. If your server
receives a query for an unknown domain, then the root hints give a clue as to where to
search for the answer.
If you operate internal root DNS servers on a private network that is not connected to the
Internet, edit or replace root hints to point to your own internal root DNS servers. Delete
root hints from your internal root DNS servers.
Question No : 53 - (Topic 0)
Your company has a remote office that contains 600 client computers on a single subnet.
You need to select a subnet mask for the network that will support all of the client
computers. The solution must minimize the number of unused addresses.
A. 255.255.252.0
B. 255.255.254.0
C. 255.255.255.0
D. 255.255.255.128
Answer: A
Microsoft 70-410 : Practice Test
Question No : 54 - (Topic 0)
Your network contains three servers that run Windows Server 2012. The servers are
configured as shown in the following table.
A. A reservation
B. A filter
C. A scope option
D. An exclusion
Answer: B
Explanation:
A. For clients that require a constant IP address
B. Filter to exclude MAC address of Server3
C. Range of allowed IP's to be assigned
D. Exclude range of IP's
MAC address based filtering ensure that only a known set of devices in the system are able
to obtain an IPAddress from the DHCP
Microsoft 70-410 : Practice Test
A reservation is a specific IP addresses that is tied to a certain device through its MAC
address. Forexample, if we have a workstation on the network that requires a certain IP
address, but we dont want to gothrough to trouble of assigning it statically, then we can
create a reservation for it. So if the MAC address of theNIC on the computer is AA-BB-00-
FF-CC-AA and we want it to maintain the IP address of 192.168.0.100 thenwe would
create a DHCP reservation under that particular scope saying that the IP address
192.168.0.100 isreserved only for the MAC address AA-BB-00-FF-CC-AA.
http://technet.microsoft.com/en-us/magazine/ff521761.aspx
http://technet.microsoft.com/en-us/library/cc726954(v=ws.10).aspx
http://www.windowsnetworking.com/kbase/WindowsTips/Windows2003/AdminTips/Networ
k/
DHCPReservationsandExclusions.html
Question No : 55 - (Topic 0)
You view the properties of a group named Group1 as shown in the exhibit. (Click the
Exhibit button.)
You need to ensure that users from Group1 can modify the Security settings of OU1 only.
Answer: C
Explanation:
A. The distinguished name of the user that is assigned to manage this object.
B. Would delegat control to the whole domain
C. Delegates control to only the OU
D. Wrong Feature
http://msdn.microsoft.com/en-us/library/windows/desktop/ms676857(v=vs.85).aspx
http://technet.microsoft.com/en-us/library/cc732524.aspx
Question No : 56 - (Topic 0)
Your network contains an Active Directory forest. The forest contains two domains named
contoso.com and corp.contoso.com. The forest contains four domain controllers. The
domain controllers are configured as shown in the following table.
In the corp.contoso.com domain, you plan to deploy a new domain controller named DC5.
You need to identify which domain controller must be online to ensure that DCS can be
promoted successfully to a domain controller.
Answer: C
Explanation:
A. Wrong Domain
B. Wrong Domain
C. Right domain, RID Master must be online
D. Right domain but Not needed to be online
Relative ID (RID) Master:
Allocates active and standby RID pools to replica domain controllers in the same domain.
(corp.contoso.com)
Must be online for newly promoted domain controllers to obtain a local RID pool that is
required to advertise orwhen existing domain controllers have to update their current or
standby RID pool allocation.
The RID master is responsible for processing RID pool requests from all domain controllers
in a particulardomain.
When a DC creates a security principal object such as a user or group, it attaches a unique
Security ID (SID) tothe object.
This SID consists of a domain SID (the same for all SIDs created in a domain), and a
relative ID (RID) that isunique for each security principal SID created in a domain.
Each DC in a domain is allocated a pool of RIDs that it is allowed to assign to the security
principals it creates.
When a DC's allocated RID pool falls below a threshold, that DC issues a request for
additional RIDs to thedomain's RID master.
The domain RID master responds to the request by retrieving RIDs from the domain's
unallocated RID pooland assigns them to the pool of the requesting DC
At any one time, there can be only one domain controller acting as the RID master in the
domain.
Microsoft 70-410 : Practice Test
http://support.microsoft.com/kb/223346
Question No : 57 - (Topic 0)
Your network contains an Active Directory forest named contoso.com. All domain
controllers currently run Windows Server 2008 R2.
You plan to install a new domain controller named DC4 that runs Windows Server 8.
Schema master
Global catalog server
DNS Server server role
Active Directory Certificate Services server role
You need to identify which configurations cannot be fulfilled by using the Active Directory
Installation Wizard.
Which two configurations should you identify? (Each correct answer presents part of the
solution. Choose two.)
Question No : 58 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The domain
contains two domain controllers. The domain controllers are configured as shown in the
following table.
In the perimeter network, you install a new server named Server1 that runs Windows
Server 2012. Server1 is in a workgroup.
You need to perform an offline domain join of Server1 to the contoso.com domain.
Microsoft 70-410 : Practice Test
What should you do first?
Answer: B
Explanation:
A. Creates a new Active Directory computer.
B. Use djoin for offline join in the perimeter network
C. Adds specific types of objects to the directory.
D. Add the local computer to a domain or workgroup.
To perform an offline domain join, you run commands by using a new tool named
Djoin.exe. You use Djoin.exe to provision computer account data into AD DS. You also use
it to insert the computer account data intothe Windows directory of the destination
computer, which is the computer that you want to join to the domain.
http://technet.microsoft.com/en-us/library/ee617245.aspx
http://technet.microsoft.com/en-us/library/ff793312(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh849798.aspx
http://winsrvtuts.com/2011/08/off-line-domain-join-with-djoin-exe/
http://technet.microsoft.com/en-us/library/offline-domain-join-djoin-step-by-
step%28v=ws.10%29.aspx
Question No : 59 - (Topic 0)
You discover that when you join client computers to the domain manually, the computer
accounts are created in the Computers container.
Microsoft 70-410 : Practice Test
You need to ensure that new computer accounts are created automatically in an
organizational unit (OU) named Corp.
A. net.exe
B. redircmp.exe
C. regedit.exe
D. dsadd.exe
Answer: B
Explanation:
A. Used to stop/start protocols
B.Redirects the default container for newly created computers to a specified, target
organizational unit
C. Modify local registry entries
D. Adds specific types of objects to the directory
http://technet.microsoft.com/en-us/library/bb490949.aspx
http://technet.microsoft.com/en-us/library/cc770619(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx
Your network contains two Active Directory forests named adatum.com and contoso.com.
Both forests contain multiple domains. A two-way trust exists between the forests.
The contoso.com domain contains a domain local security group named Group1. Group1
contains contoso\user1 and adatum\user1.
You need to ensure that Group1 can only contain users from the contoso.com domain.
To answer, move three actions from the list of actions to the answer area and arrange them
in the correct order.
Microsoft 70-410 : Practice Test
Answer:
Question No : 61 - (Topic 0)
You have a server named Server2 that runs Windows Server 2012. Server2 has the Hyper-
V server role installed.
The disks on Server2 are configured as shown in the exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
You create a virtual machine on Server2 named VM1.
You need to ensure that you can configure a pass-through disk for VM1.
Answer: D
Explanation:
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-
hyperv.aspx
The pass-through disk must be offline.
Question No : 62 - (Topic 0)
You have a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-
V server role installed. Server1 is connected to two Fibre Channel SANs and is configured
as shown in the following table.
Answer: B
Explanation:
You need your virtualized workloads to connect easily and reliably to your existing storage
arrays. WindowsServer 2012 provides Fibre Channel ports within the guest operating
system, which allows you toconnect to Fibre Channel directly from within virtual machines.
This feature protects your investments inFibre Channel, enables you to virtualize workloads
that use direct access to Fibre Channel storage, allows youto cluster guest operating
systems over Fibre Channel, and provides an important new storage option forservers
hosted in your virtualization infrastructure.
With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre Channel storage
from within a virtualmachine. This allows you to use your existing Fibre Channel
investments to support virtualized workloads.
Support for Fibre Channel in Hyper-V guests also includes support for many related
features, such as virtualSANs, live migration, and MPIO.
Microsoft 70-410 : Practice Test
Question No : 63 - (Topic 0)
You have a file server named Server1 that runs Windows Server 8.
16GB of RAM
A single quad-core CPU
Three network teams that have two network adapters each
A. Set-NetAdapter
B. Add-NetLbfoTeamNic
C. Add-VMNetworkAdapter
D. Remove-NetLbfoTeam
Answer: B
Explanation:
A. Sets adapter properties
B. Add new interface to NIC Team
C. Adds vadapter to vm
D. Removed NIC from host
You need 4 virtual switches but currently only have 3 teams available. You would need to
break a team first.
http://technet.microsoft.com/en-us/library/jj130875(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/jj130850(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/hh848564(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/jj130848(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/jj130848.aspx
Microsoft 70-410 : Practice Test
Question No : 64 - (Topic 0)
Your network contains a server named Server1 that runs Windows Server 2012. Server1
has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
You need to ensure that VM1 can use more CPU time than the other virtual machines
when the CPUs on Server1 are under a heavy load.
A. NUMA topology
B. Resource control
C. resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Answer: B
Explanation:
B. Resource controls provide you with several ways to control the way that Hyper-V
Microsoft 70-410 : Practice Test
allocates resources to virtual machine
http://technet.microsoft.com/en-us/library/cc742470.aspx
Question No : 65 - (Topic 0)
Your network contains a server named Server1 that runs Windows Server 8. Server1 has
the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
VM2 sends and receives large amounts of data over the network.
You need to ensure that the network traffic of VM2 bypasses the virtual switches of the
parent partition.
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Answer: K
Explanation:
K. SR-IOV maximizes network throughput while minimizing network latency as well as the
CPU overhead required for processing network traffic.
http://technet.microsoft.com/en-us/library/hh831410.aspx
Microsoft 70-410 : Practice Test
Question No : 66 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that runs Windows Server 2012.
You need to configure a central store for the Group Policy Administrative Templates.
Answer: B
Explanation:
A. Create Disk Storage Pool
B. PolicyDefinitions folder in SYSVOL
C. Group Policy Management is a console for GPO Mgmt
D. Folder is for logon scripts
PolicyDefinitions folder within the SYSVOL folder hierarchy. By placing the ADMX files in
this directory,they are replicated to every DC in the domain; by extension, the ADMX-aware
Group Policy ManagementConsole in Windows Vista, Windows 7, Windows Server 2008
and R2 can check this folder as an additionalsource of ADMX files, and will report them
accordingly when setting your policies.
By default, the folder is not created. Whether you are a single DC or several thousand, I
would stronglyrecommend you create a Central Store and start using it for all your ADMX
file storage. It really does work well.
http://tigermatt.wordpress.com/tag/policydefinitions/
http://support.microsoft.com/kb/929841/en-us
http://www.virtuallyimpossible.co.uk/how-to-create-a-group-policy-central-store/
http://support.microsoft.com/kb/2741591/en-us
Question No : 67 - (Topic 0)
You install Windows Server 2012 on a standalone server named Server1. You configure
Server1 as a VPN server.
You need to ensure that client computers can establish PPTP connections to Server1.
Which two firewall rules should you create? (Each correct answer presents part of the
solution. Choose two.)
Answer: A,C
Explanation:
To enable VPN tunnels between individual host computers or entire networks that have a
firewall between them, you must open the following ports:
PPTP
To allow PPTP tunnel maintenance traffic, open TCP 1723.
To allow PPTP tunneled data to pass through router, open Protocol ID 47.
http://www.windowsitpro.com/article/pptp/which-ports-do-you-need-to-open-on-a-firewall-to-
Microsoft 70-410 : Practice Test
allow-pptp-andl2tp-over-ipsec-vpn-tunnels--46811
If you use a personal firewall or a broadband router, or if there are routers or firewalls
between the VPN client and the VPN server, the following ports and protocol must be
enabled for PPTP on all firewalls and routers that are between the VPN client and the VPN
server:
Client ports Server port Protocol
Question No : 68 - (Topic 0)
The computer accounts for all member servers are located in an organizational unit (OU)
named Servers.
You need to ensure that the domains Backup Operators group is a member of the local
Backup Operators group on each member server. The solution must not remove any
groups from the local Backup Operators groups.
A. Add a restricted group named adatum\Backup Operators. Add Backup Operators to the
This group is a member of list.
B. Add a restricted group named adatum\Backup Operators. Add Backup Operators to the
Members of this group list.
C. Add a restricted group named Backup Operators. Add adatum\Backup Operators to the
This group is a member of list.
D. Add a restricted group named Backup Operators. Add adatum\Backup Operators to the
Members of this group list.
Answer: A
Explanation:
Microsoft 70-410 : Practice Test
A. The Member Of list specifies which other groups the restricted group should belong to
B. Needs to be added to member of list
C. Wrong group
D. Wrong group
Restricted groups allow an administrator to define two properties for security-sensitive
groups (that is,"restricted" groups).
The two properties are Members and Member Of . The Members list defines who should
and should not belongto the restricted group. The Member Of list specifies which other
groups the restricted group should belong to.
When a restricted Group Policy is enforced, any current member of a restricted group that
is not on theMembers list is removed. Any user on the Members list which is not currently a
member of the restrictedgroup is added.
The Restricted Groups folder is available only in Group Policy objects associated with
domains, OUs,and sites. The Restricted Groups folder does not appear in the Local
Computer Policy object.
If a Restricted Group is defined such that it has no members (that is, the Members list is
empty), then allmembers of the group are removed when the policy is enforced on the
system. If the Member Of list is emptyno changes are made to any groups that the
restricted group belongs to. In short, an empty Members listmeans the restricted group
should have no members while an empty Member Of list means "don't care" whatgroups
the restricted group belongs to.
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/cc957640.aspx
Question No : 69 - (Topic 0)
You need to ensure that only the latest version of App1.exe can run on the client
computers.
Answer: D
Explanation:
A. A publisher rule for a Packaged app is based on publisher, name and version
B. You can create a certificate rule that identifies software and then allows or does not
allow the software torun, depending on the security level.
C. For .msi or .msp
D. Executable Rules, for .exe and can be based on Publisher, Product name, filename and
version.
Use Certificate Rules on Windows Executables for Software Restriction Policies
This security setting determines if digital certificates are processed when a user or process
attempts to runsoftware with an .exe file name extension. This security settings is used to
enable or disable certificate rules, atype of software restriction policies rule. With software
restriction policies, you can create a certificate rule thatwill allow or disallow software that is
signed by Authenticode to run, based on the digital certificate that isassociated with the
software. In order for certificate rules to take effect, you must enable this security setting.
When certificate rules are enabled, software restriction policies will check a certificate
revocation list (CRL) tomake sure the software's certificate and signature are valid. This
may decrease performance when start signedprograms. You can disable this feature. On
Trusted Publishers Properties, clear the Publisher and Timestampcheck boxes.
http://technet.microsoft.com/en-us/library/dd759068.aspx
http://technet.microsoft.com/en-us/library/hh994588.aspx
http://www.grouppolicy.biz/2012/08/how-manage-published-a-k-a-metro-apps-in-windows-
8-using-grouppolicy/
http://technet.microsoft.com/en-us/library/hh994597.aspx#BKMK_Cert_Rules
http://technet.microsoft.com/en-us/library/cc782660%28v=ws.10%29.aspx
Question No : 70 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012.
You need to ensure that the local Administrator account on all computers is renamed to
L_Admin.
A. Security Options
B. User Rights Assignment
C. Restricted Groups
D. Preferences
Answer: A
Explanation:
A. Allows configuration of computers
B. User Rights Assignment policies determines which users or groups have logon rights or
privileges on thecomputer
C. Restricted Groups defines what member or groups should exist as part of a group
D. With Preferences, local and domain accounts can be added to a local group without
affecting the existingmembers of the group
In Group Policy Object Editor, click Computer Configuration, click Windows Settings, click
Security Settings,click Local Policies, and then click Security Options.
In the details pane, double-click Accounts: Rename administrator account.
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/cc747484(v=ws.10).aspx
In Group Policy Object Editor, click Computer Configuration, click Windows Settings, click
Security
Settings, click Local Policies, and then click Security Options.
In the details pane, double-click Accounts: Rename administrator account.
Question No : 71 - (Topic 0)
The disks on the server are configured as shown in the exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
You need to create a storage pool that contains Disk 1 and Disk 2.
A. Delete volume E
B. Convert Disk 1 and Disk 2 to dynamic disks
C. Convert Disk 1 and Disk 2 to GPT disks
D. Create a volume on Disk 2
Answer: A
Explanation:
A. Storage Pools use unallocated space
http://technet.microsoft.com/en-us/library/ff399688.aspx
Question No : 72 - (Topic 0)
You have a server named Server1 that runs Windows Server 2012.
You need to ensure that you can create a 3-TB volume on Disk 5.
Answer: D
Explanation:
MBR max is 2TB, the disk must be GPT
For any hard drive over 2TB, we need to use GPT partition. If you have a disk larger than
2TB size, the rest ofthe disk space will not be used unless you convert it to GPT.
An existing MBR partition cant be converted to GPT unless it is completely empty; you
must either deleteeverything and convert or create the partition as GPT.
Microsoft 70-410 : Practice Test
It is not possible to boot to a GPT partition, impossible to convert MBR to GPT without data
loss.
http://msdn.microsoft.com/en-us/library/windows/hardware/gg463525.aspx
Question No : 73 - (Topic 0)
You have a server named Server1 that has a Server Core installation of Windows Server
2008 R2.
Server1 has the DHCP Server server role and the File Server server role installed.You
need to upgrade Server1 to Windows Server 8 with the graphical user interface (GUI).
A. On Server1, run setup.exe from the Windows Server 8 installation media and select
Server with a GUI.
B. Start Server1 from the Windows Server 8 installation media and select Server Core
Installation. When the installation is complete, add the Server Graphical Shell feature.
C. Start Server1 from the Windows Server 8 installation media and select Server with a
GUI.
D. On Server1, run setup.exe from the Windows Server 8 installation media and select
Server Core Installation. When the installation is complete, add the Server Graphical Shell
feature.
Answer: D
Explanation:
A. Server is on 2008 R2 core, must install 2012 core and then GUI
B. Not least effort
C. Not least effort
D. Upgrade to 2012 and install GUI shell
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/jj574204.aspx
Upgrades that switch from a Server Core installation to the Server with a GUI mode of
Windows Server 2012 in one step (and vice versa) are not supported. However, after
upgrade is complete, Windows Server 2012 allows you to switch freely between Server
Core and Server with a GUI modes. For more information about these installation options,
how to convert between them, and how to use the new Minimal Server Interface and
Features on Demand, see http://technet.microsoft.com/library/hh831786.
Question No : 74 - (Topic 0)
Your network contains two servers named Server1 and Server2 that run Windows Server
2012.
You need to install the Remote Desktop Services server role on Server2 remotely from
Server1.
Answer: B
Explanation:
A. Adds specific types of objects to the directory
B. You can manage remote server by Server Manager and install roles/features
C. Remote Desktop Gateway (RD Gateway) is a role service that enables authorized
remote users to connectto resources on an internal corporate or private network, from any
Internet-connected device that can run theRemote Desktop Connection (RDC) client.
D. Performs prerequisite checks for DirectAccess (DA) to ensure that it can be installed,
installs DA for remoteaccess (RA) (includes management of remote clients) or for
management of remote clients only, and installsVPN (both Remote Access VPN and site-
to-site VPN).
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh831456.aspx
http://technet.microsoft.com/en-us/library/cc725706.aspx
http://technet.microsoft.com/en-us/library/hh918408(v=wps.620).aspx
Question No : 75 - (Topic 0)
You have a server named Server1 that runs a full installation of Windows Server 2012.
You need to uninstall the graphical user interface (GUI) on Server1. You must achieve this
goal by using the minimum amount of Administrative effort.
Answer: B
Explanation:
A. Not least effort
B. Quick and Easy
C. Uninstalls PS-ISE
D. Doesn't remove all GUI components
http://www.petri.co.il/switching-gui-server-core-windows-server-2012.htm
Question No : 76 - (Topic 0)
Your network contains a Windows Server 2012 image named Server12.wim. Server12.wim
contains the images shown in the following table.
Microsoft 70-410 : Practice Test
You need to enable the Windows Server Migration Tools feature in the Windows Server
2012 Server Datacenter image.
You want to achieve this goal by using the minimum amount of Administrative effort.
Answer: A
Explanation:
A. Mounts the image before making any chnages
B. imagex /capture creates windows images .wim
C. You need to mount the image first
D. imagex /App1y App1ies image to drive
The Deployment Image Servicing and Management (DISM) tool is a command-line tool that
is used to modifyWindows images. You can use DISM to enable or disable Windows
features directly from the commandprompt, or by App1ying an answer file to the image.
You can enable or disable Windows features offline on a
WIM or VHD file, or online on a running operating system.
You can also use the DISM image management command to list the image index numbers
or to verify thearchitecture for the image that you are mounting.ex: Dism /Mount-Image
/ImageFile:C:\test\images\install.wim /Name:"Base Windows Image" /MountDir:C:\test
\offline
By default, DISM is installed at C:\Program Files (x86)\Windows Kits\8.0\Assessment and
Deployment Kit\Deployment Tools\
http://technet.microsoft.com/en-us/library/hh824822.aspx
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/hh825258.aspx
http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/dd744382(v=ws.10).aspx
Question No : 77 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The network
contains 500 client computers that run Windows 2012. All of the client computers connect
to the Internet by using a web proxy. You deploy a server named Server1 that runs
Windows Server 2012.
Server1 has the DNS Server server role installed. You configure all of the client computers
to use Server1 as their primary DNS server. You need to prevent Server1 from attempting
to resolve Internet host names for the client computers.
Answer: E
Question No : 78 - (Topic 0)
You perform a Server Core Installation of Windows Server 2012 on a server named
Server1.
Answer: A,B
Question No : 79 - (Topic 0)
Your network contains a production Active Directory forest named contoso.com and a test
Active Directory forest named contoso.test. A trust relationship does not exist between the
forests.
In the contoso.test domain, you create a backup of a Group Policy object (GPO) named
GPO1.
You transfer the backup of GPO1 to a domain controller in the contoso.com domain. You
need to create a GPO in contoso.com based on the settings of GPO1.
You must achieve this goal by using the minimum amount of administrative effort.
A. From Group Policy Management, right-click the Group Policy Objects container, and
then click Manage Backups.
B. From Group Policy Management, right-click the Starter GPOscontainer, and then click
Manage Backups.
C. From Group Policy Management, create a new starter GPO. Right-click the new starter
GPO, and then click Restore from Backup.
D. From Group Policy Management, create a new GPO. Right-click the new GPO, and then
click Import Settings.
E. From Windows PowerShell, run the Copy-GPOcmdlet and the Restore-GPOcmdlet.
F. From Windows PowerShell, run the New-GPOcmdlet and the Import-GPOcmdlet.
G. From Windows PowerShell, run the New-GPOcmdlet and the Restore-GPOcmdlet.
H. From Windows PowerShell, run the Get-GPOcmdlet and the Copy-GPOcmdlet.
Answer: D,F
Microsoft 70-410 : Practice Test
Explanation:
The New-GPO cmdlet creates a new GPO with a specified name. By default, the newly
created GPO is notlinked to a site, domain, or organizational unit (OU).
The Import-GPO cmdlet imports the settings from a GPO backup into a specified target
GPO. The targetGPO can be in a different domain or forest than that from which the
backup was made and it does nothave to exist prior to the operation.
The Restore-GPO cmdlet restores a GPO backup to the original domain from which it was
saved. If theoriginal domain is not available, or if the GPO no longer exists in the domain,
the cmdlet fails.
http://technet.microsoft.com/en-us/library/cc781458(v=WS.10).aspx
http://technet.microsoft.com/en-us/library/hh967461.aspx
http://technet.microsoft.com/en-us/library/ee461050.aspx
http://technet.microsoft.com/en-us/library/ee461044.aspx
http://blogs.technet.com/b/askpfeplat/archive/2012/11/04/windows-server-2012-the-new-
and-improved-grouppolicy-management-console.aspx
Question No : 80 - (Topic 0)
You have a server that runs Windows Server 2012. The server contains the disks
configured as shown in the following table.
You need to create a volume that can store up to 3 TB of user files. The solution must
ensure that the user files are available if one of the disks in the volume fails.
Microsoft 70-410 : Practice Test
What should you create?
Answer: D,E
Your network contains a server named Server1 that runs Windows Server 2012. App1 has
the Print and Document Services server role installed.
You need to ensure that users who have connected to Printer1 previously can print to
Printer1 if App1 fails.
Answer:
You have a server named Server1. Server1 runs Windows Server 2012.
Which node should you use to add the DHCP Relay Agent? To answer, select the
appropriate node in the answer area.
Microsoft 70-410 : Practice Test
Answer:
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named corp.contoso.com. The domain
contains a domain controller named DC1.
When you run ping dc1.corp.contoso.com, you receive the result as shown in the exhibit.
(Click the Exhibit button.)
Microsoft 70-410 : Practice Test
You need to ensure that DC1 can respond to the Ping command.
Answer:
Microsoft 70-410 : Practice Test
Question No : 84 DRAG DROP - (Topic 0)
Your network contains two Active Directory forests named contoso.com and adatum.com.
Both forests contain multiple domains. A two-way trust exists between the forests.
The adatum.com domain contains a domain local security group named Group1. Group1
contains adatum\user1 and contoso\user1.
You need to ensure that Group1 can only contain users from the adatum.com domain.
To answer, move three actions from the list of actions to the answer area and arrange them
in the correct order.
Answer:
Microsoft 70-410 : Practice Test
Question No : 85 - (Topic 0)
Your network contains an active directory domain named Contoso.com. The domain
contains 100 user accounts that reside in an organizational unit (OU) named OU1.
You need to ensure that user named user1 can link and unlink Group Policy
Objects(GPOs) to OU1. The solution must minimize the number of permissions assigned to
user1.
Answer: C
Explanation:
A. Not minimum permissions
B. Grants a level of permissions to a security principal for one GPO or all the GPOs in a
domain
C. Minimizes delegated permission to a single OU
D. Will not allow GPO changes to the OU
Delegation of Control Wizard
The following are common tasks that you can select to delegate control of them:
Create, delete, and manage user accounts
Reset user passwords and force password change at next logon
Read all user information
Modify the membership of a group
Join a computer to a domain
Manage Group Policy links
Generate Resultant Set of Policy (Planning)
Generate Resultant Set of Policy (Logging)
Create, delete, and manage inetOrgPerson accounts
Reset inetOrgPerson passwords and force password change at next logon
Read all inetOrgPerson information
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/dd145442.aspx
http://technet.microsoft.com/en-us/library/ee461038.aspx
http://technet.microsoft.com/en-us/library/cc732524.aspx
Question No : 86 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012.
You need to configure a service named Service1 to run as the gservice1 account.
Answer: C
Explanation:
A. General settings only allow you to stop, start and set type/paramaters
B. Set-Service provides a way for you to change the Description, StartupType, or
DisplayName of a service
C. Modifies service configuration
D. Sets the response/action on service failure
http://windows.microsoft.com/en-us/windows-vista/using-system-configuration
http://technet.microsoft.com/en-us/library/ee176963.aspx
http://technet.microsoft.com/en-us/library/cc990290(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc738230(v=ws.10).aspx
Question No : 87 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012.
You create a security template named Template1 by using the Security Templates snap-in.
Answer: A
Explanation:
Security templates are inactive until imported into a Group Policy object or the Security
Configurationand Analysis.
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/jj730960.aspx
http://windows.microsoft.com/en-us/windows-vista/using-system-configuration
Question No : 88 - (Topic 0)
Your network contains an Active Directory domain named adatum.com. The domain
contains a server named Server1 that runs Windows Server 2012.
On a server named Corel, you perform a Server Core Installation of Windows Server 2012.
You join Corel to the adatum.com domain.
You need to ensure that you can use Event Viewer on Server1 to view the event logs on
Core1.
Question No : 89 - (Topic 0)
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that runs Windows Server 2012.
A user named User1 attempts to log on to DO, but receives the error message shown in
the exhibit. (Click the Exhibit button.)
A. Modify the Account is sensitive and cannot be delegated setting of the User1 account.
B. Grant User1 the Allow log on locally user right.
C. Modify the Logon Workstations setting of the User1 account.
D. Add User1 to the Remote Management Users group.
Answer: B
Explanation:
Domain controllers, by default, restrict the types of user accounts that have the ability to log
on locally.
Microsoft 70-410 : Practice Test
Domain controllers, by default, restrict the types of user accounts that have the ability to log
on locally.
Question No : 90 - (Topic 0)
All user accounts in the sales department reside in an organizational unit (OU) named
OU1.
You have a Group Policy object (GPO) named GPO1. GPO1 is used to deploy a logon
script to all of the users in the sales department.
You discover that the logon script does not run when the sales users log on to their
computers.
You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
You need to ensure that the logon script in GPO1 is App1ied to the sales users.
Answer: C
Question No : 91 - (Topic 0)
An organizational unit (OU) named OU1 contains user accounts and computer accounts.
A Group Policy object (GPO) named GP1 is linked to the domain. GP1 contains Computer
Configuration settings and User Configuration settings.
You need to prevent the User Configuration settings in GP1 from being App1ied to users.
The solution must ensure that the Computer Configuration settings in GP1 are App1ied to
all client computers.
Answer: A
Explanation:
A. Group Policy loopback with replace option needs to be used
B. Blocking inheritance prevents Group Policy objects (GPOs) that are linked to higher
sites, domains, ororganizational units from being automatically inherited by the child-level
C. Enforced prevent blocking at lower level
D. The GPO Status. This indicates whether either the user configuration or computer
configuration of the GPOis enabled or disabled.
You can use the Group Policy loopback feature to App1y Group Policy Objects (GPOs) that
depend only onwhich computer the user logs on to.
User Group Policy loopback processing can be enabled in one of two modes: merge or
replace. In mergemode, both GPOs App1ying to the user account and GPOs App1ying to
the computer account are processedwhen a user logs in. GPOs that App1y to the computer
account are processed second and therefore takeprecedence if a setting is defined in
both the GPO(s) App1ying to the user account, and the GPO(s) App1yingto the computer
account, the setting in the GPO(s) App1ying to the computer account will be enforced. With
thereplace mode, GPOs App1ying to the user account are not processed only the GPOs
App1ying to thecomputer account are App1ied.
Loopback can be set to Not Configured, Enabled, or Disabled. In the Enabled state,
loopback can be set toMerge or Replace. In either case the user only receives user-related
policy settings.
Loopback with ReplaceIn the case of Loopback with Replace, the GPO list for the user is
replaced in itsentirety by the GPO list that is already obtained for the computer at computer
startup (during step 2 in GroupPolicy processing and precedence). The User Configuration
settings from this list are App1ied to the user.
Loopback with MergeIn the case of Loopback with Merge, the Group Policy object list is
a concatenation.
The default list of GPOs for the user object is obtained, as normal, but then the list of GPOs
for the computer(obtained during computer startup) is appended to this list. Because the
computer's GPOs are processed afterthe user's GPOs, they have precedence if any of the
settings conflict.
This is a COMPUTER setting, which is found under Computer Configuration |
Microsoft 70-410 : Practice Test
Administrative Templates |
System | Group Policy | User Group Policy Loopback Processing Mode
You want to create a new OU in AD that is dedicated to computer accounts that will have
loopbackprocessing enabled.
Create a new GPO in your new OU to enable User Group Policy Loopback Processing and
set theappropriate mode (merge / replace).
You will define the user settings you want to App1y to the loopback-enabled PCs via GPOs
in this same newOU. You can define these settings either in the same GPO where you
enabled the User Group PolicyLoopback Processing setting, or you create another new
GPO in the same OU for your user settings.
Remember that when using the REPLACE mode, none of your other user GPOs will be
App1ied whena user logs in to a machine that has loopback processing enabled. ONLY the
user settings that aredefined in the GPOs that App1y to that machine will be App1ied.
http://msmvps.com/blogs/cgross/archive/2009/10/12/group-policy-loopback-
processing.aspx
http://technet.microsoft.com/en-us/library/cc782810(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc731076.aspx
http://technet.microsoft.com/en-us/library/cc753909.aspx
http://technet.microsoft.com/en-us/library/cc778238%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/magazine/dd673616.aspx
Question No : 92 - (Topic 0)
You deploy a server named Server1 that runs Windows Server 2012.
You install a new client-server Application named App1 on Server1 and on the client
computers. The client computers must use TCP port 6444 to connect to App1 on Server1.
Server1 publishes the information of App1 to an intranet server named Server2 by using
TCP port 3080.
Microsoft 70-410 : Practice Test
You need to ensure that all of the client computers can connect to App1. The solution must
ensure that the Application can connect to Server2.
Answer: A
Explanation:
Server1 gets request from Client PC's it needs a inbound rule for 6444
By default, Windows Firewall with Advanced Security blocks all unsolicited inbound
network traffic,and allows all outbound network traffic. For unsolicited inbound network
traffic to reach your computer, youmust create an allow rule to permit that type of network
traffic. If a network program cannot get access,verify that in the Windows Firewall with
Advanced Security snap-in there is an active allow rule for the currentprofile. To verify that
there is an active allow rule, double-click Monitoring and then click Firewall.
If there is no active allow rule for the program, go to the Inbound Rules node and create a
new rule for thatprogram. Create either a program rule, or a service rule, or search for a
group that App1ies to the feature andmake sure all the rules in the group are enabled. To
permit the traffic, you must create a rule for the programthat needs to listen for that traffic. If
you know the TCP or UDP port numbers required by the program, you canadditionally
restrict the rule to only those ports, reducing the vulnerability of opening up all ports for
theprogram.
http://social.technet.microsoft.com/wiki/contents/articles/13894.troubleshooting-windows-
firewall-withadvanced-security-in-windows-server-2012.aspx
Question No : 93 - (Topic 0)
You have a server named Server1 that runs Windows Server 2012. Server1 has following
storage spaces:
Data
Users
Microsoft 70-410 : Practice Test
Backups
Primordial
You need to identify which storage space contains the new hard disk.
A. Data
B. Primordial
C. Users
D. Backups
Answer: B
Explanation:
New Disks (Unallocated space) added to Primordial spacePrimordial Pool?
All storage that meets acceptable criteria for Storage Spaces will be placed in the
Primordial Pool. Thiscan be considered the default pool for devices from which any other
pools will be created.
Notice that there are no other virtual disks or pools at this point. The Primordial Pool will
only consist ofphysical storage devices that do not belong to any other pools.
http://blogs.technet.com/b/canitpro/archive/2012/12/13/storage-pools-dive-right-in.aspx
http://blogs.technet.com/b/askpfeplat/archive/2012/10/10/windows-server-2012-storage-
spaces-is-it-for-youcould-be.aspx
Question No : 94 - (Topic 0)
Your network contains two Hyper-V hosts named Host1 and Host2. Host1 contains a virtual
machine named VM1. Host2 contains a virtual machine named VM2. VM1 and VM2 run
Windows Server 2012.
You install the Network Load Balancing feature on VM1 and VM2.
You need to ensure that the virtual machines are configured to support Network Load
Balancing (NLB).
Which virtual machine settings should you configure on VM1 and VM2?
A. Port mirroring
B. Router guard
C. DHCP quard
D. MAC address
Microsoft 70-410 : Practice Test
Answer: D
Explanation:
In Hyper-V, the VM host prevents dynamic MAC address updates as an extra layer of
security in thedatacenter. This is because the VM may have full administrator rights, yet it
may be untrusted in thedatacenter, for example when the VM hosting is provided by an
independent hosting company. In this scenario,we need to make sure that one VM cannot
cause a DOS or information disclosure attack against another VM.
If a VM is able to spoof its MAC address, then it can spoof the MAC addresses of other
VMs and impactother VMs on that host. The physical switches have similar protections and
it is up to the admin to enable thatprotection or not.
If you do not enable spoofing of MAC address prior to configuring NLB on the VM you
could potentially haveproblems with the NLB cluster.
When configuring NLB in unicast mode on Hyper-V with enable spoofing of MAC Address
disabled you maysee some of the following symptoms:
When initially configuring NLB you will lose network connectivity on the network adaptor
NLB was configuredon.
There will be an NLB error event in the Windows Event Log stating that the network
adaptor does not supportdynamic MAC address updates.
After rebooting the server, NLB will appear to be bound to the network adapter, but the
cluster VIP will nothave been added to the network adaptor.
The cluster MAC address will still be the original MAC address associated with the
network adaptor prior toconfiguring NLB. Use CMD>ipconfig /all to view the MAC address.
It should start with "02-BF-***"
If you ignore all previous symptoms and manually add the VIP you could get an IP conflict
if there are othernodes in the cluster that have the same VIP.
With that said, to allow VM guests to run NLB you need to set the VM property for "Enable
spoofing of MACAddress".
To enable spoofing of MAC Addresses open the Hyper-V management console. Make sure
the VM is stoppedopen the properties of the VM. Select the Network Adaptor for the NLB
VM and check the "Enable spoofing ofMAC Address" and click OK. Then start the VM.
Question No : 95 - (Topic 0)
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 and has the Hyper-
V server role installed.
When you try to add a RemoteFX 3D Video Adapter to VM1, you discover that the option is
unavailable as shown in the following exhibit. (Click the Exhibit button.)
Answer: D
Explanation:
http://social.technet.microsoft.com/Forums/en-US/winserverTS/thread/c7a6cf20-9c66-4fda-
ac36-0f069660c174/
I am not sure if you already solved this but I ran into an issue when I was trying to enable
the
RemoteFX video adapter to a VM and had to add it using powershell. This is what I used:
Import-Module RemoteDesktopServices
Add-VMRemoteFx3dVideoAdapter -VMNameVirtualMachineName Where
VirtualMachineName isthe name of your VM. If I did not do this it was impossible to add the
vGPU to the VM and it justgave me errors.
Add-VMRemoteFx3dVideoAdapter -VMNameVirtualMachineName
Question No : 96 - (Topic 0)
Your company has a main office and two branch offices. The offices connect to each other
by using a WAN link.
In the main office, you have a server named Server1 that runs Windows Server 2012.
You need to assign an IPv6 address to Server1. The IP address must be private and
routable.
A. ff00:3fff:65df:145c:dca8::82a4
B. 2001:ab32:145c::32cc:401b
C. fe80:ab32:145c::32cc:401b
D. fd00:ab32:14:ad88:ac:58:abc2:4
Microsoft 70-410 : Practice Test
Answer: D
Explanation:
pg 266 Chapter 6 : Installing and Configuring Windows Server 2012
Unique local addresses
Unique local addresses are IPv6 addresses that are private to an organization in the same
way that private addressessuch as 10.x.x.x, 192.168.x.x, or 172.16.0.0 -
172.31.255.255can be used on an IPv4 network.
Unique local addresses, therefore, are not routable on the IPv6 Internet in the same way
that an address like 10.20.100.55 is not routable on the IPv4 Internet.
Your network contains three servers. The servers are configured as shown in the following
table.
Microsoft 70-410 : Practice Test
Your company plans to standardize all of the servers on Windows Server 2012.
To answer, drag the appropriate upgrade path to each server in the answer area. Each
upgrade path may be used once, more than once, or not at all.
Answer:
Microsoft 70-410 : Practice Test
Question No : 98 - (Topic 0)
Your network contains an Active Directory forest. The forest functional level is Windows
Server 2012. The forest contains a single domain.
The domain contains a member server named Server1. Server1 runs Windows Server
2012.
You purchase a network scanner named Scanner1 that supports Web Services on Devices
(WSD).
Answer: D
Explanation:
A. Can share printers, scanners and fax
Print and Document Services enables you to centralize print server and network printer
tasks. With this role,you can also receive scanned documents from network scanners and
route the documents to a sharednetwork resource, Windows SharePoint Services site, or
email addresses.
Windows Server 2012 uses Web Services on Devices (WSD) technologies to integrate
scanning devices intothe system
http://technet.microsoft.com/en-us/library/hh831468.aspx
http://technet.microsoft.com/en-us/library/jj134196.aspx
Question No : 99 - (Topic 0)
You have a server named Server1. Server1 runs Windows Server 2012 and has the File
and Storage Services server role installed.
Microsoft 70-410 : Practice Test
You attach four 500-GB disks to Server1.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. From File and Storage Services, create virtual disks by using fixed provisioning.
B. From File and Storage Services, create a storage pool that uses all four disks.
C. From Disk Management, create two new mirror volumes that use two disks each.
D. From Disk Management, create a new RAID-5 volume that uses all four disks.
E. From File and Storage Services, create virtual disks by using thin provisioning.
Answer: A,B
Explanation:
A. 2 VHD's set to fixed size of 800 & 900GB
B. Allows Fault Tolerance
C. No Fault Tolerance MAX when mirroring 2 500GB drives
D. 1500GB MAX App's require 1700GB MAX
E. No Fault Tolerance
http://technet.microsoft.com/en-us/library/jj822937.aspx
Your network contains an Active Directory forest named contoso.com. The forest contains
a child domain named europe.contoso.com. The europe.contoso.com child domain
contains a server named Server1 that runs Windows Server 2012.
You have access to the administrative accounts shown in the following table.
Microsoft 70-410 : Practice Test
A. Admin1
B. Admin2
C. Admin3
D. Admin4
Answer: D
Explanation:
A. Local account can't be used
B. Authorization needs to happen in contoso.com and must be aEnt Admin
C. Authorization needs to happen in contoso.com and must be aEnt Admin
D. Correct domain and is a member of Ent Admin's
http://technet.microsoft.com/en-us/library/cc759688(v=ws.10).aspx
Topic 2, Volume B
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012. Server1 contains a
single virtual machine named VM1.
You need to ensure that a user named User1 can manage the virtual machine settings of
VM1.
Answer: C
Explanation:
This group can reduce the number of users that belong to the local Administrators group
while providing users with access to Hyper-VSimplified authorization:
The Hyper-V Administrators group is a new local security group. Add users to this group
instead of thelocal Administrators group to provide them with access to Hyper-V. Members
of the Hyper-V
Administrators have complete and unrestricted access to all features of Hyper-V.
http://technet.microsoft.com/en-us/library/hh831410.aspx
On one of the subnets, you deploy a server named Server1 that runs Windows Server
2012.
You install the DNS Server server role on Server1, and then you create a standard primary
zone named contoso.com.
You need to ensure that client computers can resolve single-label names to IP addresses.
Microsoft 70-410 : Practice Test
What should you do first?
Answer: D
Explanation:
Use GlobalNames zones in Windows Server 2008 to take advantage of single-label names
Providing Single-Label DNS Name Resolution:
While Domain Name System (DNS) is the predominant name-resolution technology in
TCP/IP networks,Windows Internet Name Service (WINS) is deployed in many networks as
an alternative name-resolutionprotocol.
You have a server named Server1 that runs Windows Server 2012. Server1 has six
network adapters. Two of the network adapters are connected to a network named LAN1,
two of the network adapters are connected to a network named LAN2, and two of the
network adapters are connected to a network named LAN3.
You create a network adapter team named Team1 from the two adapters connected to
LAN1.
You create a network adapter team named Team2 from the two adapters connected to
Microsoft 70-410 : Practice Test
LAN2.
A company policy states that all server IP addresses must be assigned by using a reserved
address in DHCP.
You need to identify how many DHCP reservations you must create for Server1.
A. 3
B. 4
C. 6
D. 8
Answer: B
Explanation:
2 Adapters = LAN1 = Team1 = 1 IP
2 Adapters = LAN2 = Team2 = 1 IP
2 Adapters = LAN3 = No Team = 2 IP
1+1+2=4
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012. The domain contains a server named Server1.
You open Review Options in the Active Directory Domain Services Configuration Wizard,
and then you click View script.
You need to ensure that you can use the script to promote Server1 to a domain controller.
A. .ps1
B. .bat
C. .xml
Microsoft 70-410 : Practice Test
D. .cmd
Answer: A
Explanation:
The View Script button is used to view the corresponding PowerShell script
The PowerShell script extension is .ps1, The Answer could logically be either a .cmd file or
a .bat file.
According to http://www.fileinfo.com/:
PAL - Settings file created by Corel Painter or Palette of colors used by Dr. Halo bitmap
images
BAT - DOS batch file used to execute commands with the Windows Command Prompt
(cmd.exe); contains aseries of line commands that typically might be entered at the DOS
command prompt; most commonly used tostart programs and run maintenance utilities
within Windows.
XML - XML (Extensible Markup Language) data file that uses tags to define objects and
object attributes;formatted much like an .HTML document, but uses custom tags to define
objects and the data within eachobject; can be thought of as a text-based database.
CMD - Batch file that contains a series of commands executed in order; introduced with
Windows NT, but canbe run by DOS or Windows NT systems; similar to a .BAT file, but is
run by CMD.EXE instead of COMMAND.COM.
You have a server named Server1 that runs Windows Server 2012.
You need to view the service location (SVR) records that Server1 registers on DNS.
http://technet.microsoft.com/en-us/library/cc959303.aspx
http://technet.microsoft.com/en-us/library/jj649883(v=wps.620).aspx
You perform a Server Core Installation of Windows Server 2012 on a server named
Server1.
A. The Add-WindowsPackagecmdlet
B. The ocsetup.exe command
C. The Add-WindowsFeaturecmdlet
D. The Install-RoleServicecmdlet
Answer: C
Explanation: http://technet.microsoft.com/en-us/library/ee662309.aspx
http://technet.microsoft.com/en-us/library/hh852164.aspx
You have a server named Server1. Server1 runs Windows Server 2012.
Server1 has two network adapters. Each network adapter must be configured as shown in
the following table.
You need to configure the correct IPv6 address prefix for each network adapter.
To answer, drag the appropriate IPv6 prefix to the correct network adapter in the answer
area.
Each prefix may be used once, more than once, or not at all. You may need to drag the
split bar between panes or scroll to view content.
Microsoft 70-410 : Practice Test
Answer:
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs a Server Core installation of Windows
Server 2012.
Answer:
You have a DNS server named Server1. Server1 runs Windows Server 2012.
Answer:
Your company has a main office that contains 225 client computers. The client computers
are located on a subnet that uses the network ID of 10.10.1.0/24.
The company plans to open two branch offices. The offices will be configured as shown in
the following table.
Microsoft 70-410 : Practice Test
You need to select a network prefix for each office to ensure that there are enough IPv4
addresses for each client computer. The solution must minimize the number of unused IP
addresses.
Which network prefixes should you select?To answer, drag the appropriate network prefix
to the correct branch office in the answer area.
Answer:
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The network
contains 500 client computers that run Windows 8. All of the client computers connect to
the Internet by using a web proxy.
You deploy a server named Server1 that runs Windows Server 2012. Server1 has the DNS
Server server role installed.
You configure all of the client computers to use Server1 as their primary DNS server.
You need to prevent Server1 from attempting to resolve Internet host names for the client
computers.
Answer: D
Your network contains an Active Directory domain named contoso.com. The domain
contains 100 user accounts that reside in an organizational unit (OU) named 0U1.
You need to ensure that a user named User1 can link and unlink Group Policy objects
(GPOs) to OU1.
Answer: A
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012.
You create a security template named Template1 by using the Security Templates snap-in.
A. System Configuration
B. Authorization Manager
C. Computer Management
D. Local Security Policy
Answer: A
How can you manage an newly installed server 2012 core from a another server 2012 with
computer manager?
Microsoft 70-410 : Practice Test
Answer:
You have a server named Server1 that runs Windows Server 2012.
You need to ensure that both virtual machines can use up to 8 GB of memory. The solution
must ensure that both virtual machines can be started simultaneously.
A. Dynamic Memory
B. NUMA topology
C. Memory weight
D. Resource Control
Answer: A
Explanation:
A. Dynamic Memory adjusts the amount of memory available to a virtual machine, based
on changes in memory demand and values that you specify
B. Used for high performance apps like SQL
C. Provides Hyper-V with a way to determine how to distribute memory among virtual
machines if there is not enough physical memory available in the computer to give every
virtual machine its requested amount of memory.
Microsoft 70-410 : Practice Test
D. Resource controls provide you with several ways to control the way that Hyper-V
allocates resources to virtual machine.
http://technet.microsoft.com/en-us/library/ff817651(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh831410.aspx
http://technet.microsoft.com/en-us/library/cc742470.aspx
Your network contains an active directory domain named Contoso.com. The domain
contains a server named Server1 that runs Windows server 2012 and has the Hyper-V
server role installed.
Microsoft 70-410 : Practice Test
You have a virtual machine named VM1. VM1 has a snapshot.
Answer: A
Your network contains an active directory domain named contoso.com. The domain
contains a domain controller named DCS. DCS has a server core installation of windows
server 2012.
A. The Remove-WindowsFeaturecmdlet
B. the dsamain.exe command
C. the ntdsutil.exe command
D. the Remove-ADComputercmdlet
Answer: C
Explanation:
A. Removes Roles and Features to remove DC use Uninstall-addsdomaincontroller
B.Exposes Active Directory data that is stored in a snapshot or backup as a Lightweight
Directory Access
Protocol (LDAP) server
C. Manually removes a domain controller
D. Removes AD computer object
http://technet.microsoft.com/en-us/library/ee662310.aspx
http://support.microsoft.com/kb/216498
http://technet.microsoft.com/en-us/library/ee617250.aspx
Microsoft 70-410 : Practice Test
You have a server named Server1 that runs Windows Server 2012.
You need to ensure that all local administrators receive User Account Control (UAC)
prompts when they run a Microsoft Management Console (MMC).
Which setting should you modify from the Local Security Policy?
Answer:
Microsoft 70-410 : Practice Test
What should you do for server core so it can be managed from another server 2012?
A. 1
B. 2
C. 3
D. 4
E. 5
F. 6
G. 7
H. 8
I. 9
J. 10
K. 11
L. 12
M. 13
N. 14
O. 15
Answer: H
Explanation:
4) Configure Remote Management is already "Enabled".
http://technet.microsoft.com/en-us/library/jj647766.aspx
Answer:
A corporate policy states that all servers must run Windows Server 2012 Enterprise.
You need to ensure that Server1 complies with the corporate policy. You want to achieve
this goal by using the minimum amount of administrative effort.
Answer: C
Explanation:
A. Not least effort
B. Not least effort
C. dism /online /set-edition
D. offline would be less ideal and more workex: DISM /online /Set-Edition:ServerEnterprise
/ProductKey:489J6-VHDMP-X63PK-3K798-CPX3YWindows Server 2008 R2/2012
contains a command-line utility called DISM (Deployment Image Servicing
andManagement tool). This tool has many features, but one of those features is the ability
to upgrade the edition ofWindows in use. Note that this process is for upgrades only and is
irreversible. You cannot set a Windowsimage to a lower edition. The lowest edition will not
appear when you run the /Get-TargetEditions option.
http://technet.microsoft.com/en-us/library/jj574204.aspx
http://technet.microsoft.com/en-us/library/dd744380%28v=ws.10%29.aspx
Microsoft 70-410 : Practice Test
http://blogs.technet.com/b/server_core/archive/2009/10/14/upgrading-windows-server-
2008-r2-without-media.aspx
http://communities.vmware.com/people/vmroyale/blog/2012/05/30/howto-upgrading-
windows-edition-with-dism
You have a domain controller named Server1 that runs Windows Server 2012 and has the
DNS Server server role installed. Server1 hosts a DNS zone named contoso.com and a
GlobalNames zone.
You discover that the root hints were removed from Server1.
Answer: B
Explanation:
A. Allows you to troubleshoot DNS issues
B. DNS Server service implements root hints using a file, Cache.dns, stored in the
systemroot\System32\Dnsfolder on the server
C. Gets DNS event logging details
D.
http://technet.microsoft.com/en-us/library/cc758353(v=ws.10).aspx
You need to provide administrators with the ability to manage the servers in the domain by
using the Windows PowerShell Web Access gateway.
Which two cmdlets should you run on Server1? (Each correct answer presents part of the
solution. Choose two.)
A. Set-WSManQuickConfig
B. Set-WSManInstance
C. Add-PswaAuthorizationRule
D. Set-BCAuthentication
E. Install-PswaWebApplication
Answer: C,E
Explanation:
A. Configures the local computer for remote management.
B. Modifies the management information that is related to a resource.
C. Adds a new authorization rule to the Windows PowerShell Web Access authorization
rule set.
D. Specifies the BranchCache computer authentication mode.
E. Configures the Windows PowerShellWeb Access web Application in IIS.
http://technet.microsoft.com/en-us/library/hh849867.aspx
http://technet.microsoft.com/en-us/library/hh849875.aspx
http://technet.microsoft.com/en-us/library/jj592890(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/hh848404(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/jj592894(v=wps.620).aspx
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 and is configured as
Microsoft 70-410 : Practice Test
the only domain controller.
You need to retrieve a list of all the user accounts. The list must include the last time each
user was authenticated successfully.
To answer, drag the appropriate cmdlet or property to the correct locations to complete the
PowerShell command in the answer area. Each cmdlet or property may be used once,
more than once, or not at all. You may need to drag the split bar between panes or scroll to
view content.
Answer:
Your network contains an Active Directory domain named adatum.com. All domain
controllers run Windows Server 2012. All client computers run Windows 7. The computer
accounts for all of the client computers are located in an organizational unit (OU) named
Microsoft 70-410 : Practice Test
OU1.
An administrator links a Group Policy object (GPO) to OU1. The GPO contains several
Application control policies.
You discover that the Application control policies are not enforced on the client computers.
You need to modify the GPO to ensure that the Application control policies are enforced on
the client computers.
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012.
On Server1, you create a printer named Printer1. You share Printer1 and publish Printer1
in Active Directory.
You need to provide a group named Group1 with the ability to manage Printer1.
Answer: C
Explanation: Set permissions for print servers
Open Print Management.
In the left pane, clickPrint Servers, right-click the App1icable print server and then
clickProperties.
On theSecuritytab, underGroup or users names, click a user or group for which
you want to set permissions.
UnderPermissions for <user or group name>, select theAlloworDenycheck boxes
for the permissions listed as needed.
To editSpecial permissions, clickAdvanced.
On thePermissionstab, click a user group, and then clickEdit.
In thePermission Entrydialog box, select theAlloworDenycheck boxes for the
permissions that you want to edit.
Note:
*
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains three servers named Server1, Served, and Server3.
You need to ensure that Server2 can be managed remotely by using Server Manager.
Answer: C
Explanation: This is a security issue. To be able to access Server2 remotely through
Server Manager the user need to be a member of the Remote Management Users group.
Note:
* Name: BUILTIN\Remote Management Users
Description: A Builtin Local group. Members of this group can access WMI resources over
management protocols (such as WS-Management via the Windows Remote Management
service). This App1ies only to WMI namespaces that grant access to the user.
* Enable-ServerManagerStandardUserRemoting
Microsoft 70-410 : Practice Test
Provides one or more standard, non-Administrator users access to event, service,
performance counter, and role and feature inventory data for a server that you are
managing by using Server Manager.
Syntax:
Parameter Set: Default
Enable-ServerManagerStandardUserRemoting [-User] <String[]> [-Force] [-Confirm] [-
WhatIf] [ <CommonParameters>]
Detailed Description
Provides one or more standard, non-Administrator users access to event, service,
performance counter, and role and feature inventory data for a server that you are
managing, either locally or remotely, by using Server Manager. The cmdlet must be run
locally on the server that you are managing by using Server Manager. The cmdlet works by
performing the following actions:
Adds access rights for specified standard users to the root\cimv2 namespace on the local
server (for access to role and feature inventory information).
Adds specified standard users to required user groups (Remote Management Users,
Event Log Readers, and Performance Log Readers) that allow remote access to event and
performance counter logs on the managed server.
Changes access rights in the Service Control Manager to allow specified standard users
remote access to the status of services on the managed server.
Incorrect:
Not A: the Enable-PSSessionConfiguration.This is an advanced cmdlet that is designed to
be used by system administrators to manage customized session configurations for their
users.
Reference: Enable-ServerManagerStandardUserRemoting
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2. Server1 runs Windows Server 2012.
Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server
Microsoft 70-410 : Practice Test
server role installed.
You need to manage DHCP on Server2 by using the DHCP console on Server1.
Answer: A
You have a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-
V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
You need to provide VM1 with access to the LUN. The solution must prevent other virtual
machines from accessing the LUN.
A. A fixed-size VHDX
B. A fixed-size VHD
C. A dynamically expanding VHD
D. A dynamically expanding VHDX
E. A pass-through disk
Answer: E
Explanation:
Microsoft 70-410 : Practice Test
You can use physical disks that are directly attached to a virtual machine as a storage
option on themanagement operating system. This allows virtual machines to access
storage that is mapped directly to theserver running Hyper-V without first configuring the
volume. The storage can be either a physical disk which isinternal to the server, or a SAN
logical unit number (LUN) that is mapped to the server (a LUN is a logicalreference to a
portion of a storage subsystem). The virtual machine must have exclusive access to
thestorage, so the storage must be set in an Offline state in Disk Management. The storage
is not limited insize, so it can be a multiterabyte LUN.
When using physical disks that are directly attached to a virtual machine, you should be
aware of the following:
This type of disk cannot be dynamically expanded.
You cannot use differencing disks with them.
You cannot take virtual hard disk snapshots.
Att:
If you are installing an operating system on the physical disk and it is in an Online state
before the virtualmachine is started, the virtual machine will fail to start. You must store the
virtual machine configuration file inan alternate location because the physical disk is used
by the operating system installation. For example,locate the configuration file on another
internal drive on the server running Hyper-V.
http://technet.microsoft.com/en-us/library/ee344823%28v=ws.10%29.aspx
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-
hyper-v.aspx
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012. Client computers run either Windows 7 or Windows 8.
All of the computer accounts of the client computers reside in an organizational unit (OU)
named Clients. A Group Policy object (GPO) named GP01 is linked to the Clients OU. All
of the client computers use a DNS server named Server1.
You configure a server named Server2 as an ISATAP router. You add a host (A) record for
ISATAP to the contoso.com DNS zone.
Microsoft 70-410 : Practice Test
You need to ensure that the client computers locate the ISATAP router.
Answer: D
Explanation:
Windows Server 2008 introduced a new feature, called "Global Query Block list", which
prevents somearbitrary machine from registering the DNS name of WPAD.
This is a good security feature, as it prevents someone from just joining your network, and
setting himself up asa proxy.
The dynamic update feature of Domain Name System (DNS) makes it possible for DNS
client computers toregister and dynamically update their resource records with a DNS
server whenever a client changes itsnetwork address or host name.
This reduces the need for manual administration of zone records. This convenience comes
at a cost, however,because any authorized client can register any unused host name, even
a host name that might havespecial significance for certain Applications. This can allow a
malicious user to take over a special nameand divert certain types of network traffic to that
user's computer.
Two commonly deployed protocols are particularly vulnerable to this type of takeover: the
Web ProxyAutomatic Discovery Protocol (WPAD) and the Intra-site Automatic Tunnel
Addressing Protocol (ISATAP).
Even if a network does not deploy these protocols, clients that are configured to use them
are vulnerable to thetakeover that DNS dynamic update enables.
Most commonly, ISATAP hosts construct their PRLs by using DNS to locate a host named
isatap on the localdomain. For example, if the local domain is corp.contoso.com, an
ISATAP-enabled host queries DNS to obtainthe IPv4 address of a host named
isatap.corp.contoso.com.
In its default configuration, the Windows Server 2008 DNS Server service maintains a list
of names that, ineffect, it ignores when it receives a query to resolve the name in any zone
Microsoft 70-410 : Practice Test
for which the server is authoritative.
Consequently, a malicious user can spoof an ISATAP router in much the same way as a
malicious user canspoof a WPAD server: A malicious user can use dynamic update to
register the user's own computer as acounterfeit ISATAP router and then divert traffic
between ISATAP-enabled computers on the network.
The initial contents of the block list depend on whether WPAD or ISATAP is already
deployed when you addthe DNS server role to an existing Windows Server 2008
deployment or when you upgrade an earlier versionof Windows Server running the DNS
Server service.
You can add different types of resource records. Use different switches for different record
types.
By using this cmdlet, you can change a value for a record, configure whether a record has
a time stamp,whether any authenticated user can update a record with the same owner
name, and change lookup timeoutvalues, Windows Internet Name Service (WINS) cache
settings, and replication settings.
If you need the DNS server to resolve names such as ISATAP and WPAD, remove these
names from the list.
Web Proxy Automatic Discovery Protocol (WPAD) and Intra-site Automatic Tunnel
Addressing Protocol(ISATAP) are two commonly deployed protocols that are particularly
vulnerable to hijacking.
http://technet.microsoft.com/en-us/library/jj649857(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/cc794902%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/security/bulletin/ms09-008
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0093
Windows DNS Server in Microsoft Windows 2000 SP4, Server 2003 SP1 and SP2, and
Microsoft 70-410 : Practice Test
Server 2008, whendynamic updates are enabled, does not restrict registration of the
"wpad" hostname, which allows remoteauthenticated users to hijack the Web Proxy Auto-
Discovery (WPAD) feature, and conduct man-in-the-middleattacks by spoofing a proxy
server, via a Dynamic Update request for this hostname, aka "DNS ServerVulnerability in
WPAD Registration Vulnerability," a related issue to CVE-2007-1692.
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 and has the Remote
Access server role installed.
A user named User1 must connect to the network remotely. The client computer of User1
requires Challenge Handshake Authentication Protocol (CHAP) for remote connections.
CHAP is enabled on Server1.
You need to ensure that User1 can connect to Server1 and authenticate to the domain.
A. From the properties of Server1, select Trust this computer for delegation to any service
(Kerberos only).
B. From the properties of Server1, assign the Allowed to Authenticate permission to User1.
C. From the properties of User1, select Use Kerberos DES encryption types for this
account.
D. From the properties of User1, select Store password using reversible encryption.
Answer: D
Explanation:
The Store password using reversible encryption policy setting provides support for
Applications that useprotocols that require the user's password for authentication. Storing
encrypted passwords in a way that isreversible means that the encrypted passwords can
be decrypted. A knowledgeable attacker who is able tobreak this encryption can then log
on to network resources by using the compromised account. For this reason,never enable
Store password using reversible encryption for all users in the domain unless
Applicationrequirements outweigh the need to protect password information.
Microsoft 70-410 : Practice Test
If you use the Challenge Handshake Authentication Protocol (CHAP) through remote
access or InternetAuthentication Services (IAS), you must enable this policy setting. CHAP
is an authentication protocolthat is used by remote access and network connections. Digest
Authentication in Internet Information Services(IIS) also requires that you enable this policy
setting.
If your organization uses CHAP through remote access or IAS, or Digest Authentication in
IIS, you mustconfigure this policy setting to Enabled. This presents a security risk when you
App1y the setting through GroupPolicy on a user-by-user basis because it requires the
appropriate user account object to be opened in ActiveDirectory Users and Computers.
Microsoft 70-410 : Practice Test
C:\Documents and Settings\usernwz1\Desktop\1.JPG
http://technet.microsoft.com/pt-pt/library/hh994559%28v=ws.10%29.aspx
Your network contains a Hyper-V host named Hyperv1 that runs Windows Server 2012.
Hyperv1 has a virtual switch named Switch1.
You replace all of the network adapters on Hyperv1 with new network adapters that support
single-root I/O virtualization (SR-IOV). You need to enable SR-IOV for all of the virtual
machines on Hyperv1.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. On each virtual machine, modify the Advanced Features settings of the network adapter.
B. Modify the settings of the Switch1 virtual switch.
C. Delete, and then recreate the Switch1 virtual switch.
D. On each virtual machine, modify the BIOS settings.
E. On each virtual machine, modify the Hardware Acceleration settings of the network
adapter.
Answer: C,E
Explanation: The first step when allowing a virtual machine to have connectivity to a
physical network is to create an external virtual switch using Virtual Switch Manager in
Hyper-V Manager. The additional step that is necessary when using SR-IOV is to ensure
the checkbox is checked when the virtual switch is being created. It is not possible to
change a non SR-IOV mode external virtual switch into an SR-IOV mode switch. The
choice must be made a switch creation time.
E: Once a virtual switch has been created, the next step is to configure a virtual machine.
SR-IOV in Windows Server 8 is supported on x64 editions of Windows 8 as a guest
operating system (as in Windows 8 Server, and Windows 8 client x64, but not x86
client). We have rearranged the settings for a virtual machine to introduce sub-nodes under
a network adapter, one of which is the hardware acceleration node. At the bottom is a
Microsoft 70-410 : Practice Test
checkbox to enable SR-IOV.
Note:
* Steps:
* Single Root I/O Virtualization (SR-IOV) is a standard introduced by the PCI-SIG that owns
and manages PCI specifications as open industry standards.
SR-IOV enables network traffic to bypass the software switch layer of the Hyper-V
Virtualization stack to reduce the I/O overhead in this layer. It allows an SR-IOV virtual
function of a physical network adapter to be assigned directly to a virtual machine to
increase network throughput by reducing latency. Host CPU overhead also get reduced for
processing network traffic.
Microsoft 70-410 : Practice Test
* The diagram below illustrates how SR-IOV allows virtual machines to directly address the
physical NIC.
Your network contains a server named Server1 that runs Windows Server 2012. Server1 is
a member of a workgroup.
You need to configure a local Group Policy on Server1 that will App1y only to non-
administrators.
A. Server Manager
B. Group Policy Management Editor
C. Group Policy Management
D. Group Policy Object Editor
Answer: D
Explanation:
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/cc766291%28v=ws.10%29.aspx
Your network contains an Active Directory domain named contoso.com. The domain
contains a print server named Server1 that runs Windows Server 2012. Server1 contains a
local group named Group1.
Ensure that the members of Group1, the Server Operators group, the
Administrators group, and the Print Operators group can send print jobs to
Printer1.
Prevent other users from sending print jobs to Printer1.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
Answer: C,D
Microsoft 70-410 : Practice Test
Explanation: C: To prevent other users from sending print jobs to Printer1
D: To enable Group1 to send print jobs.
Note: The Server Operators group, the Administrators group, and the Print Operators group
are all built-in and already have permissions to send print jobs.
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012. Server1 contains a
virtual machine named VM1 that runs Windows Server 2012.
You need to ensure that a user named User1 can install Windows features on VM1. The
solution must minimize the number of permissions assigned to User1.
A. Administrators on VM1
B. Power Users on VM1
C. Hyper-V Administrators on Server1
D. Server Operators on Server1
Answer: A
Explanation:
In Windows Server 2012, the Server Manager console and Windows PowerShell
cmdlets for ServerManager allow installation of roles and features to local or remote
servers, or offline virtual hard disks (VHDs).
You can install multiple roles and features on a single remote server or offline VHD in a
single Add Roles andFeatures Wizard or Windows PowerShell session.
Your network contains an Active Directory domain named adatum.com. The domain
contains a member server named LON-DC1. LON-DC1 runs Windows Server 2012 and
has the DHCP Server server role installed.
The network contains 100 client computers and 50 IP phones. The computers and the
phones are from the same vendor.
You create an IPv4 scope that contains addresses from 172.16.0.1 to 172.16.1.254.
You need to ensure that the IP phones receive IP addresses in the range of 172.16.1.100
to 172.16.1.200. The solution must minimize administrative effort.
Answer: A
Your network contains an Active Directory forest. The forest contains a single domain
named contoso.com. The domain contains four domain controllers. The domain controllers
are configured as shown in the following table.
Microsoft 70-410 : Practice Test
You plan to deploy a new domain controller named DC5 in the contoso.com domain.
You need to identify which domain controller must be online to ensure that DC5 can be
promoted successfully to a domain controller.
A. DC1
B. DC2
C. DC3
D. DC4
Answer: C
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named HVServer1. HVServer1 runs Windows Server 2012 and
has the Hyper-V server role installed.
HVServer1 hosts two virtual machines named Server1 and Server2. Both virtual machines
connect to a virtual switch named Switch1.
You need to capture all of the inbound and outbound traffic to Server1 by using App1.
Which two commands should you run from Windows PowerShell? (Each correct answer
presents part of the solution. Choose two.)
Microsoft 70-410 : Practice Test
A. Get-VM "Server2" | Set-VMNetworkAdapter -IovWeight 1
B. Get-VM "Server1" | Set-VMNetworkAdapter -Allow/Teaming On
C. Get-VM "Server1" | Set-VMNetworkAdapter -PortMirroring Source
D. Get-VM "Server2" | Set-VMNetworkAdapter -PortMirroring Destination
E. Get-VM "Server1" | Set-VMNetworkAdapter -IovWeight 0
F. Get-VM "Server2 | Set-VMNetworkAdapter-AllowTeaming On
Answer: C,D
Explanation: C: Catching the traffic from Server1
D: Catching the traffic to Server1.
Note:
* Get-VM
Gets the virtual machines from one or more Hyper-V hosts.
-ComputerName<String[]>
Specifies one or more Hyper-V hosts from which virtual machines are to be retrieved.
NetBIOS names, IP addresses, and fully-qualified domain names are allowable. The
default is the local computer use localhost or a dot (.) to specify the local computer
explicitly.
* Set-VMNetworkAdapter
Configures features of the virtual network adapter in a virtual machine or the management
operating system.
* -PortMirroring<VMNetworkAdapterPortMirroringMode>
Specifies the port mirroring mode for the network adapter to be configured. Allowed values
are None, Source, and Destination. If a virtual network adapter is configured as Source,
every packet it sends or receives is copied and forwarded to a virtual network adapter
configured to receive the packets. If a virtual network adapter is configured as Destination,
it receives copied packets from the source virtual network adapter. The source and
destination virtual network adapters must be connected to the same virtual switch. Specify
None to disable the feature.
http://technet.microsoft.com/en-us/library/hh848479%28v=wps.620%29.aspx
http://technet.microsoft.com/en-us/library/hh848457%28v=wps.620%29.aspx
Microsoft 70-410 : Practice Test
Question No : 139 - (Topic 2)
You have a server named Server 1. Server1 runs Windows Server 2012.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
Answer: A,B
Explanation:
Step 1 (B): if required add physical disk capacity.
Step 2 (A): Dynamically extend the virtual disk (not volume).
Windows Server 2012 Storage Space subsystem now virtualizes storage by abstracting
multiple physical disksinto a logical construct with specified capacity. The process is to
group selected physical disks into a container,the so-called storage pool, such that the total
capacity collectively presented by those associated physicaldisks can appear and become
manageable as a single and seemingly continuous space. Subsequently astorage
administrator creates a virtual disk based on a storage pool, configure a storage layout
which isessentially a RAID level, and expose the storage of the virtual disk as a drive letter
or a mapped folder inWindows Explorer.
Microsoft 70-410 : Practice Test
The system administrator uses File and Storage Services in Server Manager or the Disk
Management tool torescan the disk, bring the disk online, and extend the disk size.
http://blogs.technet.com/b/yungchou/archive/2012/08/31/windows-server-2012-storage-
virtualization-explained.aspx
Microsoft 70-410 : Practice Test
Question No : 140 - (Topic 2)
The server contains the disks configured as shown in the following table.
You need to create a volume that can store up to 3 TB of user files. The solution must
ensure that the user files are available if one of the disks in the volume fails.
Answer: D
You plan to deploy a DHCP server that will support four subnets. The subnets will be
configured as shown in the following table.
Microsoft 70-410 : Practice Test
You need to identify which network ID you should use for each subnet.
To answer, drag the appropriate network ID to the each subnet in the answer area.
Answer:
Microsoft 70-410 : Practice Test
Your network contains two servers named Server1 and Server2 that run Windows Server
2012.
Server1 has the Hyper-V server role installed. Server2 has the Windows Deployment
Services server role installed.
You plan to deploy an image to VM1 by using Windows Deployment Services (WDS).
You need to ensure that VM1 can connect to Server1 by using PXE.
Answer:
Microsoft 70-410 : Practice Test
You need to identify whether the Company attribute replicates to the global catalog.
To answer, select the appropriate Active Directory object in the answer area.
Microsoft 70-410 : Practice Test
Answer:
Your network contains an Active Directory domain named contoso.com. The domain
contains two domain controllers. The domain controllers are configured as shown in the
following table.
Microsoft 70-410 : Practice Test
You install a new server named Server1 that runs a Server Core Installation of Windows
Server 2012.
Answer: D
Explanation: A. Adds specific types of objects to the directory
B. Creates a new Active Directory computer.
C. Use djoin for offline join in the perimeter network .
D. Add the local computer to a domain or workgroup.
http://technet.microsoft.com/en-us/library/ee617245.aspx
http://technet.microsoft.com/en-us/library/ff793312(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh849798.aspx
You have a new server named Server1 that runs Windows Server 2012.
You create two virtual machines on Server1 that each have 8 GB of memory.
You need to minimize the amount of time it takes for both virtual machines to access
memory.
A. Resource control
B. Dynamic Memory
C. NUMA topology
D. Memory weight
Answer: B
Explanation: * Dynamic Memory is a new Hyper-V feature that helps you use physical
memory more efficiently. With Dynamic Memory, Hyper-V treats memory as a shared
resource that can be reallocated automatically among running virtual machines. Dynamic
Memory adjusts the amount of memory available to a virtual machine, based on changes in
memory demand and values that you specify. Dynamic Memory is available for Hyper-V in
Windows Server 2008 R2 Service Pack 1 (SP1).
* Dynamic Memory helps you use memory resources more efficiently. Before this feature
was introduced, changing the amount of memory available to a virtual machine could be
done only when the virtual machine was turned off. With Dynamic Memory, Hyper-V can
provide a virtual machine with more or less memory dynamically in response to changes in
the amount of memory required by the workloads or Applications running in the virtual
machine. As a result, Hyper-V can distribute memory more efficiently among the running
virtual machines configured with Dynamic Memory. Depending on factors such as
workload, this efficiency can make it possible to run more virtual machines at the same
time on one physical computer.
Your network contains an Active Directory domain named contoso.com. Domain controllers
Microsoft 70-410 : Practice Test
run either Windows Server 2008 R2 or Windows Server 2012. All client computers run
Windows 8.
All computer accounts are located in an organizational unit (OU) named OU1.
You create a Group Policy object (GPO) that contains several App1ocker rules. You link
the GPO to OU1.
You need to ensure that the App1ocker rules App1y to all of the client computers.
Technicians use Windows Deployment Services (WDS) to deploy Windows Server 2012.
The network contains a server named Server1 that runs Windows Server 2012. Server1
has the Hyper-V server role installed.
You need to ensure that you can use WDS to deploy Windows Server 2012 to a virtual
machine named VM1.
Answer:
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Hyperv1 and a domain controller named DC1. Hyperv1
has the Hyper-V server role installed. DC1 is a virtual machine on Hyperv1.
You log on to DC1 and verify that the time services are configured correctly.
You need to prevent time conflicts between the time provided by DC1 and other potential
time sources.
Answer:
Microsoft 70-410 : Practice Test
Your network contains an Active Directory forest named contoso.com. All domain
controllers currently run Windows Server 2008 R2.
You plan to install a new domain controller named DC4 that runs Windows Server 2012.
The new domain controller will have the following configurations:
Schema master
Global catalog server
DNS Server server role
Active Directory Certificate Services server role
You need to identify which configurations cannot be fulfilled by using the Active Directory
Domain Services Configuration Wizard.
Which two configurations should you identify? (Each correct answer presents part of the
solution. Choose two.)
Microsoft 70-410 : Practice Test
A. Enable the global catalog server.
B. Install the Active Directory Certificate Services role.
C. Install the DNS Server role.
D. Transfer the schema master.
Answer: B,D
Explanation:
AD Installation Wizard will automatically install DNS and allows for the option to set it as a
global catalogserver.
http://technet.microsoft.com/en-us/library/hh831457.aspx
Your network contains an Active Directory domain named adatum.com. The domain
contains a file server named Server2 that runs Windows Server 2012. 5erver2 contains a
shared folder named Home. Home contains the home folder of each user.
Microsoft 70-410 : Practice Test
All users have the necessary permissions to access only their home folder.
A user named User1 opens the Home share as shown in the exhibit. (Click the Exhibit
button.)
You need to ensure that all users see only their own home folder when they access Home.
Answer: C
You have a server named Server1 that runs a Server Core Installation of Windows Server
2012 Datacenter.
You have a WIM file that contains the four images of Windows Server 2012 as shown in
the Images exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
You review the installed features on Server1 as shown in the Features exhibit. (Click the
Exhibit button.)
Which two possible sources can you use to achieve this goal? (Each correct answer
presents a complete solution. Choose two.)
A. Index 1
B. Index 2
C. Index 3
D. Index 4
Answer: B,D
Explanation: Note:
When you install Windows Server 2012, you can choose between Server Core Installation
and Server with a GUI. The Server with a GUI option is the Windows Server 2012
equivalent of the Full installation option available in Windows Server 2008 R2. The Server
Core Installation option reduces the space required on disk, the potential attack surface,
Microsoft 70-410 : Practice Test
and especially the servicing requirements, so we recommend that you choose the Server
Core installation unless you have a particular need for the additional user interface
elements and graphical management tools that are included in the Server with a GUI
option. For this reason, the Server Core installation is now the default. Because you can
freely switch between these options at any time later, one approach might be to initially
install the Server with a GUI option, use the graphical tools to configure the server, and
then later switch to the Server Core Installation option.
Your network contains an Active Directory domain named contoso.com. The domain
contains 20 computer accounts that reside in an organizational unit (OU) named OU1.
A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to assign
several user rights to a user named User1.
You need to ensure that User2 is assigned the same user rights as User1 on all of the
client computers in OU1.
Answer: B
Your network contains an Active Directory domain named contoso.com. All servers run
Microsoft 70-410 : Practice Test
Windows Server 2012. The domain contains a member server named Server1. Server1
has the File Server server role installed.
On Server1, you create a share named Documents. The Documents share will contain the
files and folders of all users.
You need to ensure that when the users connect to Documents, they only see the files to
which they have access.
Answer: C
Explanation:
Access-based Enumeration is a new feature included with Windows Server 2003 Service
Pack 1. This featureallows users of Windows Server 2003based file servers to list only the
files and folders to which they haveaccess when browsing content on the file server. This
eliminates user confusion that can be caused whenusers connect to a file server and
encounter a large number of files and folders that they cannot access.Access-based
Enumeration filters the list of available files and folders on a server to include only those
that therequesting user has access to.
This change is important because this allows users to see only those files and directories
that they haveaccess to and nothing else. This mitigates the scenario where unauthorized
users might otherwise be able tosee the contents of a directory even though they dont
have access to it.
Access-Based Enumeration (ABE) can be enabled at the Share properties through Server
Manager.
After implementation instead of seeing all folder including the ones the user does not have
access to:
Microsoft 70-410 : Practice Test
User will have access just to the folder where has rights to:
If a user with full access browses the same folder it will show all 5230 folders.
http://technet.microsoft.com/en-us/library/cc784710%28v=ws.10%29.aspx
http://technet.microsoft.com/pt-pt/library/dd772681%28v=ws.10%29.aspx
Your network contains two subnets. The subnets are configured as shown in the following
table.
You have a server named Server1 that runs Windows Server 2012. Server1 is connected
to LAN1.
You run the route print command as shown in the exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
You need to ensure that Server1 can communicate with the client computers on LAN2.
Answer: A
Explanation:
In general, the first and last addresses in a subnet are used as the network identifier and
broadcast address,respectively. All other addresses in the subnet can be assigned to hosts
on that subnet.
For example, IP addresses of networks with subnet masks of at least 24 bits ending in .0 or
Microsoft 70-410 : Practice Test
.255 can never beassigned to hosts. Such "last" addresses of a subnet are considered
"broadcast" addresses and all hosts onthe corresponding subnet will respond to it.
Theoretically, there could be situations where you can assign an address ending in .0: for
example, if you havea subnet like 192.168.0.0/255.255.0.0, you are allowed to assign a
host the address 192.168.1.0. It couldcreate confusion though, so it's not a very common
practice.
Example10.6.43.0 with subnet 255.255.252.0 (22 bit subnet mask) means subnet ID
10.6.40.0, a host address range from 10.6.40.1 to 10.6.43.254 and a broadcast
address10.6.43.255. So in theory, your example 10.6.43.0 would be allowed as a valid host
address.
The default gateway address should not end in .0 with the /24 address
http://tools.ietf.org/html/rfc4632
http://en.wikipedia.org/wiki/IPv4#Addresses_ending_in_0_or_255
You have a starter Group Policy object (GPO) named GPO1 that contains more than 100
settings.
You need to create a new starter GPO based on the settings in GPO1. You must achieve
this goal by using the minimum amount of administrative effort.
Answer: D
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Server1. Server1 runs Windows Server 2012 and has
the DHCP Server server role installed.
You create two IPv4 scopes on Server1. The scopes are configured as shown in the
following table.
The DHCP clients in Subnet1 can connect to the client computers in Subnet2 by using an
IP address or a FQDN.
You discover that the DHCP clients in Subnet2 can connect to client computers in Subnet1
by using an IP address only.
You need to ensure that the DHCP clients in both subnets can connect to any other DHCP
client by using a FQDN.
Answer: D
Explanation:
To enable DNS on the network, you need to configure DNS clients and servers.
When you configure DNS clients, you tell the clients the IP addresses of DNS servers on
the network. Usingthese addresses, clients can communicate with DNS servers anywhere
on the network, even if the servers areon different subnets.
When the network uses DHCP, you should configure DHCP to work with DNS. To do this,
Microsoft 70-410 : Practice Test
you need to set theDHCP scope options 006 DNS Servers and 015 DNS Domain Name.
Issue: The DNS domain option (option 15) is not configured for one or more scopes.
Impact: DHCP IPv4 clients will not be provided with a DNS domain and will not be able to
resolve names.
Resolution:
Configure a DNS domain option as a server or scope option using the DHCP MMC.
Dynamic Host Configuration Protocol (DHCP) uses options to pass additional Internet
Protocol (IP) settings toDHCP clients on a network.
Examples of DHCP options include: The default gateway IP address, The Domain Name
System (DNS) serverIP address
The DNS domain name
Membership in the Administrators or DHCP Administrators group is the minimum required
to complete thisprocedure.
To configure DNS server as a scope option or server option
1. Click Start, point to Administrative Tools and then click DHCP.
2. In the console tree, expand the App1icable DHCP server, expand IPv4, and then right-
click Server Options
3. Click Configure Options, check 015 DNS Domain Name, type the App1icable domain
name in String value:,and then click OK.
Microsoft 70-410 : Practice Test
http://support.microsoft.com/kb/300684/en-us
http://technet.microsoft.com/en-us/library/bb727109.aspx
http://technet.microsoft.com/en-us/library/ee941136(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/dd572752%28v=office.13%29.aspx
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012.
On Server1, you create a printer named Printer1. You share Printer1 and publish Printer1
in Active Directory.
You need to provide a group named Group1 with the ability to manage Printer1.
Microsoft 70-410 : Practice Test
What should you do?
Answer: C
Explanation: Set permissions for print servers
Open Print Management.
In the left pane, clickPrint Servers, right-click the App1icable print server and then
clickProperties.
On theSecuritytab, underGroup or users names, click a user or group for which
you want to set permissions.
UnderPermissions for <user or group name>, select theAlloworDenycheck boxes
for the permissions listed as needed.
To editSpecial permissions, clickAdvanced.
On thePermissionstab, click a user group, and then clickEdit.
In thePermission Entrydialog box, select theAlloworDenycheck boxes for the
permissions that you want to edit.
Note:
*
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2.
Server1 runs Windows Server 2012. Server2 runs Windows Server 2008 R2 Service Pack
1 (SP1) and has the DHCP Server server role installed.
Microsoft 70-410 : Practice Test
You need to manage DHCP on Server2 by using the DHCP console on Server1.
Answer: A
Explanation: How do you enable remote management.
Assuming the remote server is all set up and prepared to enter production, first, open
Server Manager on the remote server.
Click on the "Configure Server Manager for Remote Management" link.
Select the "Enable remote management of this server from other computers".
Click "Ok".
Note:
* You can use Server Manager to manage remote servers that are running Windows
Server 2008 and Windows Server 2008 R2, but the following updates are required to fully
manage these older operating systems.
/ Windows Management Framework 3.0
/ Performance Updates
Microsoft 70-410 : Practice Test
* Windows Server 2008 R2, unlike Windows Server 2008 RTM, has a nice feature that
allows you to remotely manage it, from another server or from a Windows 7 workstation, by
using Server Manager.
* The tasks that you can perform remotely by using Server Manager include:
Your network contains an Active Directory domain named contoso.com. The network
contains 500 client computers that run Windows 8. All of the client computers connect to
the Internet by using a web proxy.
You deploy a server named Server1 that runs Windows Server 2012. Server1 has the DNS
Server server role installed.
You configure all of the client computers to use Server1 as their primary DNS server.
You need to prevent Server1 from attempting to resolve Internet host names for the client
computers.
Answer: B
Explanation: When a zone that this DNS server hosts is a stub zone, this DNS server is a
source only for information about the authoritative name servers for this zone. The zone at
this server must be obtained from another DNS server that hosts the zone. This DNS
server must have network access to the remote DNS server to copy the authoritative name
server information about the zone.
Note:
You can use stub zones to:
* Keep delegated zone information current. By updating a stub zone for one of its child
zones regularly, the DNS server that hosts both the parent zone and the stub zone will
maintain a current list of authoritative DNS servers for the child zone.
* Improve name resolution. Stub zones enable a DNS server to perform recursion using the
stub zone's list of name servers, without having to query the Internet or an internal root
server for the DNS namespace.
* Simplify DNS administration. By using stub zones throughout your DNS infrastructure,
you can distribute a list of the authoritative DNS servers for a zone without using secondary
zones. However, stub zones do not serve the same purpose as secondary zones, and they
are not an alternative for enhancing redundancy and load sharing.
Incorrect:
Not D:
* The DNS Server Role in Windows Server 2008 now supports the GlobalNames Zone.
This has been introduced to assist organizations to move away from WINS and allow
organizations to move to an all-DNS environment. Unlike WINS, The GlobalNames zone is
not intended to be used for peer-to-peer name resolution.
* The DNS Server Role in Windows Server 2008 now supports the GlobalNames Zone.
This has been introduced to assist organizations to move away from WINS and allow
organizations to move to an all-DNS environment. Unlike WINS, The GlobalNames zone is
not intended to be used for peer-to-peer name resolution.
Your network contains two servers named Server1 and Server2 that run Windows Server
2012. Server1 is a DHCP server that is configured to have a scope named Scope1.
Server2 is configured to obtain an IP address automatically.
You need to ensure that Server2 can obtain the same IP address.
Answer: B
Explanation:
For clients that require a constant IP address, you can either manually configure a static IP
address, or assigna reservation on the DHCP server.
Reservations are permanent lease assignments that are used to ensure that a specified
client on a subnet canalways use the same IP address.
You can use DHCP reservations for hosts that require a consistent IP address, but do not
need to be staticallyconfigured.
The MAC address of a Windows client can be found running the ipconfig /all command. For
Linux systems thecorresponding command is ifconfig -a.
Once the MAC address has been identified, the reservation may be configured using either
the DHCP consoleor at the command prompt using the netsh tool.
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/cc779507%28v=ws.10%29.aspx
http://support.microsoft.com/kb/170062/en-us
An organizational unit (OU) named OU1 contains the user accounts and the computer
accounts for laptops and desktop computers.
Microsoft 70-410 : Practice Test
A Group Policy object (GPO) named GP1 is linked to OU1.
You need to ensure that the configuration settings in GP1 are App1ied only to the laptops
in OU1.
The solution must ensure that GP1 is App1ied automatically to new laptops that are added
to OU1.
Answer: B
Explanation:
WMI filtering
Windows Management Instrumentation (WMI) filters allow you to dynamically determine
the scope of GroupPolicy objects (GPOs) based on attributes of the target computer. When
a GPO that is linked to a WMI filter isApp1ied on the target computer, the filter is evaluated
on the target computer. If the WMI filter evaluates tofalse, the GPO is not App1ied (except
if the client computer is running Windows Server, in which case the filteris ignored and the
GPO is always App1ied). If the WMI filter evaluates to true, the GPO is App1ied.
If the WMI filter evaluates to false, the GPO is not App1ied (except if the client computer is
running WindowsServer, in which case the filter is ignored and the GPO is always
App1ied). If the WMI filter evaluates to true, theGPO is App1ied. WMI filters, like GPOs, are
stored on a per-domain basis. A WMI filter and the GPO it is linkedto must be in the same
domain.
http://technet.microsoft.com/en-us/library/cc779036%28v=ws.10%29.aspx
Your network contains an Active Directory domain named contoso.com. All client computer
accounts are in an organizational unit (OU) named AllComputers. Client computers run
either Windows 7 or Windows 8.
You need to ensure that GP1 App1ies only to computers that have more than 8 GB of
memory.
Answer: C
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2.
Server1 runs Windows Server 2012. Server2 runs Windows Server 2008 R2 Service Pack
1 (SP1) and has the DHCP Server server role installed.
You need to manage DHCP on Server2 by using the DHCP console on Server1.
Microsoft 70-410 : Practice Test
What should you do first?
A. From Windows Firewall with Advanced Security on Server2, create an inbound rule.
B. From Internet Explorer on Server2, download and install Windows Management
Framework 3.0.
C. From Server Manager on Server1, install a feature.
D. From Windows PowerShell on Server2, run Enable PSRemoting.
Answer: D
Explanation: The Enable-PSRemotingcmdlet configures the computer to receive
Windows PowerShell remote commands that are sent by using the WS-Management
technology.
On Windows Server 2012, Windows PowerShell remoting is enabled by default. You can
use Enable-PSRemoting to enable Windows PowerShell remoting on other supported
versions of Windows and to re-enable remoting on Windows Server 2012 if it becomes
disabled.
You need to run this command only once on each computer that will receive commands.
You do not need to run it on computers that only send commands. Because the
configuration activates listeners, it is prudent to run it only where it is needed.
Note: (not B)
You can use Server Manager to manage remote servers that are running Windows Server
2008 and Windows Server 2008 R2, but the following updates are required to fully manage
these older operating systems.
/ Windows Management Framework 3.0
/ Performance Updates
Reference: Enable-PSRemoting
Your network contains an Active Directory domain named contoso.com. The network
contains 500 client computers that run Windows 8. All of the client computers connect to
the Internet by using a web proxy.
You deploy a server named Server1 that runs Windows Server 2012. Server1 has the DNS
Server server role installed.
Microsoft 70-410 : Practice Test
You configure all of the client computers to use Server1 as their primary DNS server.
You need to prevent Server1 from attempting to resolve Internet host names for the client
computers.
Answer: C
Explanation: When a zone that this DNS server hosts is a stub zone, this DNS server is a
source only for information about the authoritative name servers for this zone. The zone at
this server must be obtained from another DNS server that hosts the zone. This DNS
server must have network access to the remote DNS server to copy the authoritative name
server information about the zone.
Note:
You can use stub zones to:
* Keep delegated zone information current. By updating a stub zone for one of its child
zones regularly, the DNS server that hosts both the parent zone and the stub zone will
maintain a current list of authoritative DNS servers for the child zone.
* Improve name resolution. Stub zones enable a DNS server to perform recursion using the
stub zone's list of name servers, without having to query the Internet or an internal root
server for the DNS namespace.
* Simplify DNS administration. By using stub zones throughout your DNS infrastructure,
you can distribute a list of the authoritative DNS servers for a zone without using secondary
zones. However, stub zones do not serve the same purpose as secondary zones, and they
are not an alternative for enhancing redundancy and load sharing.
Incorrect:
Not A:
* The DNS Server Role in Windows Server 2008 now supports the GlobalNames Zone.
This has been introduced to assist organizations to move away from WINS and allow
organizations to move to an all-DNS environment. Unlike WINS, The GlobalNames zone is
not intended to be used for peer-to-peer name resolution.
* The DNS Server Role in Windows Server 2008 now supports the GlobalNames Zone.
Microsoft 70-410 : Practice Test
This has been introduced to assist organizations to move away from WINS and allow
organizations to move to an all-DNS environment. Unlike WINS, The GlobalNames zone is
not intended to be used for peer-to-peer name resolution.
You have a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-
V server role installed.
You need to configure storage for a virtual machine to meet the following requirements:
A. A pass-through disk
B. A fixed-size VHD
C. A dynamically expanding VHD
D. A fixed-size VHDX
E. A dynamically expanding VHDX
Answer: E
You plan to use VM1 as an image that will be distributed to sales users to demonstrate the
features of a custom Application. The custom Application only requires the Web Server
(IIS) server role to be installed.
Microsoft 70-410 : Practice Test
You need to ensure that the VHD file for VM1 only contains the required Windows Server
2012 source files.
A. dism.exe
B. ocsetup.exe
C. imagex.exe
D. servermanagercmd.exe
Answer: A
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named HVServer1. HVServer1 runs Windows Server 2012 and
has the Hyper-V server role installed.
HVServer1 hosts 10 virtual machines. All of the virtual machines connect to a virtual switch
named Switch1. Switch1 is configured as a private network. All of the virtual machines
have the DHCP guard and the router guard settings enabled.
You install the DHCP server role on a virtual machine named Server 1. You authorize
Server1 as a DHCP server in contoso.com. You create an IP scope.
You discover that the virtual machines connected to Switch1 do not receive IP settings
from Server1.
You need to ensure that the virtual machines can use Server1 as a DHCP server.
Answer: D
Explanation:
Microsoft 70-410 : Practice Test
SR-IOV enables network traffic to bypass the software switch layer of the Hyper-V
virtualization stack. Becausethe VF is assigned to a child partition, the network traffic flows
directly between the VF and child partition. As aresult, the I/O overhead in the software
emulation layer is diminished and achieves network performance that isnearly the same
performance as in nonvirtualized environments.
You need to ensure that User1 can log on to the domain only between 08:00 and 18:00
from a client computer named Computer1.
Answer:
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-
V server role installed. Server1 has a virtual switch named RDS Virtual.
You replace all of the network adapters on Server1 with new network adapters that support
single-root I/O virtualization (SR-IOV).
Microsoft 70-410 : Practice Test
You need to enable SR-IOV for all of the virtual machines on Server1.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. On each virtual machine, modify the Advanced Features settings of the network adapter.
B. Modify the settings of the RDS Virtual virtual switch.
C. On each virtual machine, modify the BIOS settings.
D. Delete, and then recreate the RDS Virtual virtual switch.
E. On each virtual machine, modify the Hardware Acceleration settings of the network
adapter.
Answer: D,E
Explanation: The first step when allowing a virtual machine to have connectivity to a
physical network is to create an external virtual switch using Virtual Switch Manager in
Hyper-V Manager. The additional step that is necessary when using SR-IOV is to ensure
the checkbox is checked when the virtual switch is being created. It is not possible to
change a non SR-IOV mode external virtual switch into an SR-IOV mode switch. The
choice must be made a switch creation time .
E: Once a virtual switch has been created, the next step is to configure a virtual machine.
SR-IOV in Windows Server 8 is supported on x64 editions of Windows 8 as a guest
operating system (as in Windows 8 Server, and Windows 8 client x64, but not x86
client). We have rearranged the settings for a virtual machine to introduce sub-nodes under
a network adapter, one of which is the hardware acceleration node. At the bottom is a
checkbox to enable SR-IOV.
Microsoft 70-410 : Practice Test
Note:
* Steps:
* Single Root I/O Virtualization (SR-IOV) is a standard introduced by the PCI-SIG that owns
and manages PCI specifications as open industry standards.
SR-IOV enables network traffic to bypass the software switch layer of the Hyper-V
Virtualization stack to reduce the I/O overhead in this layer. It allows an SR-IOV virtual
function of a physical network adapter to be assigned directly to a virtual machine to
increase network throughput by reducing latency. Host CPU overhead also get reduced for
processing network traffic.
* The diagram below illustrates how SR-IOV allows virtual machines to directly address the
Microsoft 70-410 : Practice Test
physical NIC.
You have a server named Server1 that runs a Server Core Installation of Windows Server
2012.
You attach a 4-TB disk to Server1. The disk is configured as an MBR disk.
You need to ensure that you can create a 4-TB volume on the disk.
A. Automount
B. Convert
C. Expand
D. Attach
Answer: B
Explanation:
You can use Diskpart to convert a basic disk to a dynamic disk. The basic disk can either
Microsoft 70-410 : Practice Test
be empty or containeither primary partitions or logical drives. The basic disk can be a data
disk or system or boot drive.
A MBR file structure is only capable of 2TB maximum. The disk will have to be converted to
a GPT filestructure. GPT is capable of 18 exabytes volumes.
Convert gpt - Converts an empty basic disk with the master boot record (MBR) partition
style into a basic diskwith the GUID partition table (GPT) partition style.
The disk may be a basic or a dynamic disk but it must not contain any valid data partitions
or volumes.
http://technet.microsoft.com/en-us/library/cc766465(v=ws.10).aspx
http://support.microsoft.com/kb/300415/en-us
You have a server named Server1. Server1 runs Windows Server 2012 and has the
Windows Deployment Services (WDS) server role installed.
You need to ensure that Server1 can respond to DHCP clients and WDS clients.
What should you configure for the DHCP service and the WDS service?
Answer:
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2. Server1 runs Windows Server 2012.
Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server
server role installed.
You need to manage DHCP on Server2 by using the DHCP console on Server1.
Note:
* You can use Server Manager to manage remote servers that are running Windows
Server 2008 and Windows Server 2008 R2, but the following updates are required to fully
manage these older operating systems.
/ Windows Management Framework 3.0
/ Performance Updates
* Windows Server 2008 R2, unlike Windows Server 2008 RTM, has a nice feature that
allows you to remotely manage it, from another server or from a Windows 7 workstation, by
using Server Manager.
* The tasks that you can perform remotely by using Server Manager include:
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012.
A. Server Manager
B. Diskpart
C. New-StoragePool
D. New-VirtualDisk
Answer: D
Explanation: The New-VirtualDisk command creates a new virtual disk in the specified
storage pool.
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 and has the Hyper-
V server role installed.
On Server1, you create and start a virtual machine named VM1. VM1 is configured as
shown in the following table.
Microsoft 70-410 : Practice Test
You need to recommend a solution to minimize the amount of disk space used for the
snapshot of VM1.
Answer: C
Explanation: Reducing the available RAM for the VM would reduce the size of the
snapshot.
Note:
* A disk snapshot is a copy of the virtual machine disk file at a certain point in time. It
preserves the disk file system and system memory of your virtual machine by enabling you
to revert to the snapshot in case something goes wrong.
* Each snapshot consists of the following files:
Configuration file - An XML file containing the current configuration settings of the virtual
machine.
Saved state file - A .vsv file containing virtual machine state information.
Differencing disk image file - A .avhd differencing disk.
Memory image file - A .bin file containing an image of the virtual machine's memory at the
point the snapshot was taken.
Incorrect:
Not D: Convert-VHD
Converts the format, version type, and block size of a virtual hard disk file
Microsoft 70-410 : Practice Test
Question No : 175 - (Topic 2)
You have a server named Server1 that runs a Server Core installation of Windows Server
2012.
You need to configure the IPv4 settings of the network connection on Server1 as follows:
IP address: 10.1.1.1
Subnet mask: 255.255.240.0
Default gateway: 10.1.1.254
A. netsh.exe
B. netcfg.exe
C. msconfig.exe
D. ipconfig.exe
Answer: A
Explanation: In order to configure TCP/IP settings such as the IP address, Subnet Mask,
Default Gateway, DNS and WINS addresses and many other options you can use
Netsh.exe.
Incorrect:
not D: Windows Server 2012 Core still has IPCONFIG.EXE that can be used to view the IP
configuration. Modern servers typically come with several network interface ports. This
causes IPCONFIG.EXE to scroll off the screen when viewing its output. Consider piping the
output if IPCONFIG.EXE to a file and view it with Notepad.exe.
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012.
Users report that they can no longer execute a legacy Application installed in the root of
drive C.
Microsoft 70-410 : Practice Test
You need to ensure that the users can execute the legacy Application.
Answer: B
Explanation:
App1ocker is a feature that advances the functionality of the Software Restriction Policies
feature.
App1ocker contains new capabilities and extensions that reduce administrative overhead
and helpadministrators control how users can access and use files, such as executable
files, scripts, Windows Installerfiles, and DLLs. By using App1ocker, you can:
Define rules based on file attributes that persist across Application updates, such as the
publisher name(derived from the digital signature), product name, file name, and file
version. You can also create rulesbased on the file path and hash.
Assign a rule to a security group or an individual user.
Create exceptions to rules. For example, you can create a rule that allows all users to run
all Windowsbinaries except the Registry Editor (Regedit.exe).
Use audit-only mode to deploy the policy and understand its impact before enforcing it.
Create rules on a staging server, test them, export them to your production environment,
and then importthem into a Group Policy Object.
Simplify creating and managing App1ocker rules by using Windows PowerShell cmdlets for
App1ocker.
App1ocker default rules
App1ocker allows you to generate default rules for each of the rule types.
Executable default rule types:
Allow members of the local Administrators group to run all Applications.
Allow members of the Everyone group to run Applications that are located in the Windows
folder.
Allow members of the Everyone group to run Applications that are located in the Program
Filesfolder.
You can App1y App1ocker rules to individual users or to a group of users. If you App1y a
rule to a group ofusers, all users in that group are affected by that rule. If you need to allow
a subset of a user group to use anApplication, you can create a special rule for that subset.
For example, the rule "Allow Everyone to runWindows except Registry Editor" allows
everyone in the organization to run the Windows operating system, butit does not allow
anyone to run Registry Editor.
The effect of this rule would prevent users such as Help Desk personnel from running a
program that isnecessary for their support tasks. To resolve this problem, create a second
rule that App1ies to the HelpDesk user group: "Allow Help Desk to run Registry Editor." If
you create a deny rule that does not allow anyusers to run Registry Editor, the deny rule
will override the second rule that allows the Help Desk user group torun Registry Editor.
http://technet.microsoft.com/library/hh831440.aspx
http://technet.microsoft.com/en-us/library/dd759068.aspx
http://technet.microsoft.com/de-de/library/hh994621.aspx
You have two servers named Server1 and Server2. Both servers run Windows Server
2012. The servers are configured as shown in the following table.
Microsoft 70-410 : Practice Test
The routing table for Server1 is shown in the Routing Table exhibit. (Click the Exhibit
button.)
From Server1, you attempt to ping Server2, but you receive an error message as shown in
the Error exhibit. (Click the Exhibit button.)
You need to ensure that you can successfully ping Server2 from Server1.
Microsoft 70-410 : Practice Test
What should you do on Server1?
Answer: B
Explanation:
Route is used to view and modify the IP routing table.
Route Print displays a list of current routes that the host knows.
Default gateways are important to make IP routing work efficiently.
TCP/IP hosts rely on default gateways for most of their communication needs with hosts on
remote networksegments. In this way, individual hosts are freed of the burden of having to
maintain extensive andcontinuously updated knowledge about individual remote IP network
segments. Only the router that acts as thedefault gateway needs to maintain this level of
routing knowledge to reach other remote network segments inthe larger internetwork.
In order for Host A on Network 1 to communicate with Host B on Network 2, Host A first
checks its routing tableto see if a specific route to Host B exists. If there is no specific route
to Host B, Host A forwards its TCP/IPtraffic for Host B to its own default gateway, IP Router
1.
http://technet.microsoft.com/en-us/library/cc779696%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/library/cc958877.aspx
You have a server named Server2 that runs Windows Server 2012. Server2 is connected
to LAN1.
You run the route print command as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that Server2 can communicate with the client computers on LAN2.
Microsoft 70-410 : Practice Test
What should you do?
Answer: D
Explanation:
Route is used to view and modify the IP routing table.
Route Print displays a list of current routes that the host knows.
Default gateways are important to make IP routing work efficiently.
TCP/IP hosts rely on default gateways for most of their communication needs with hosts on
remote networksegments. In this way, individual hosts are freed of the burden of having to
maintain extensive andcontinuously updated knowledge about individual remote IP network
segments. Only the router that acts as thedefault gateway needs to maintain this level of
routing knowledge to reach other remote network segments inthe larger internetwork.
If the default gateway fails, communication beyond the local network segment may be
impaired. To preventthis, you can use the Advanced TCP/IP Settings dialog box (in
Network Connections) for each connection tospecify multiple default gateways. You can
also use the route command to manually add routes to therouting table for heavily used
hosts or networksIf you have multiple interfaces and you configure a default gateway for
each interface, TCP/IP by defaultautomatically calculates an interface metric that is based
on the speed of the interface. The interface metricbecomes the metric of the default route
in the routing table for the configured default gateway. The interfacewith the highest speed
has the lowest metric for its default route. The result is that whenever multiple
defaultgateways are configured on multiple interfaces, the fastest interface will be used to
forward traffic to its defaultgateway.
If multiple interfaces of the same speed have the same lowest interface metric, then, based
upon the bindingorder, the default gateway of the first network adapter is used. The default
gateway for the second networkadapter is used when the first is unavailable.
In order for Host A on Network 1 to communicate with Host B on Network 2, Host A first
checks its routing tableto see if a specific route to Host B exists. If there is no specific route
to Host B, Host A forwards its TCP/IPtraffic for Host B to its own default gateway, IP Router
1.
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/cc779696%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/library/cc958877.aspx
http://support.microsoft.com/kb/299540/en-us
Your network contains an Active Directory domain named contoso.com. The domain
contains a file server named Server1 that runs Windows Server 2012. Server1 contains a
shared folder named Share1. Share1 contains the home folder of each user.
All users have the necessary permissions to access only their home folder.
The users report that when they access Share1, they can see the home folders of all the
users.
You need to ensure that the users see only their home folder when they access Share1.
A. From Windows Explorer, modify the properties of the volume that contains Share1.
B. From Server Manager, modify the properties of the volume that contains Share1.
C. From Server Manager, modify the properties of Share1.
D. From Windows Explorer, modify the properties of Share1.
Answer: C
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-
V server role installed. The domain contains a virtual machine named VM1.
You need to ensure that the developer can connect to VM1 by using a named pipe.
A. Network Adapter
B. BIOS
C. Processor
D. COM 1
Answer: D
Explanation:
Named pipe. This option connects the virtual serial port to a Windows named pipe on the
host operatingsystem or a computer on the network. A named pipe is a portion of memory
that can be used by one processto pass information to another process, so that the output
of one is the input of the other. The second processcan be local (on the same computer as
the first) or remote (on a networked computer). For example, a localnamed pipe path could
be \\.\pipe\mypipename.
Named pipes can be used to create a virtual null modem cable between two virtual
machines, or between avirtual machine and a debugging program on the host operating
system that supports the use of named pipes.
By connecting two virtual serial ports to the same named pipe, you can create a virtual null
modem cableconnection. Named pipes are useful for debugging or for any program that
requires a null modem connection.
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/ee449417(v=ws.10).aspx
http://blogs.msdn.com/b/ntdebugging/archive/2011/12/30/configuring-a-hyper-v-vm-for-
kernel-debugging.aspx
The human resources department gives you a Microsoft Excel document that contains a list
of the temporary employees.
You need to automate the creation of user accounts for the 500 temporary employees.
Answer: C
Explanation:
Csvde.exe is the best option to add multiple users. as you just need to export the excel
spreadsheet as a csvfile and make sure the parameters are correct.
You can use Csvde to import and export Active Directory data that uses the comma-
separated valueformat. Use a spreadsheet program such as Microsoft Excel to open this
.csv file and view the header andvalue information.
http://support.microsoft.com/kb/327620/en-us
In an isolated test environment, you deploy a server named Server1 that runs a Server
Core Installation of Windows Server 2012. The test environment does not have Active
Directory Domain Services (AD DS) installed.
You install the Active Directory Domain Services server role on Server1.
Answer: C
Explanation:
Install-ADDSDomainController - Installs a domain controller in Active Directory.
Install-ADDSDomain - Installs a new Active Directory domain configuration.
Install-ADDSForest - Installs a new Active Directory forest configuration.
Install-WindowsFeature - Installs one or more Windows Server roles, role services, or
features on either thelocal or a specified remote server that is running Windows Server
2012. This cmdlet is equivalent to andreplaces Add-WindowsFeature, the cmdlet that was
used to install roles, role services, and features.
C:\PS>Install-ADDSForest -DomainName corp.contoso.com -CreateDNSDelegation -
DomainMode Win2008 -
ForestMode Win2008R2 -DatabasePath "d:\NTDS" -SysvolPath "d:\SYSVOL" -LogPath
"e:\Logs"Installs a new forest named corp.contoso.com, creates a DNS delegation in the
contoso.com domain, setsdomain functional level to Windows Server 2008 R2 and sets
forest functional level to Windows Server 2008,installs the Active Directory database and
SYSVOL on the D:\ drive, installs the log files on the E:\ drive andhas the server
automatically restart after AD DS installation is complete and prompts the user to provide
andconfirm the Directory Services Restore Mode (DSRM) password.
http://technet.microsoft.com/en-us/library/hh974720%28v=wps.620%29.aspx
Your network contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named 0U1.
You need to ensure that when new client computers join the domain, their computer
accounts are created in OU1 by default.
Answer: A
You are configuring a test network. The test network contains a subnet named LAN1. LAN1
uses the network ID of 10.10.1.0/27.
You plan to add a new subnet named LAN2 to the test network.
You need to identify a valid network ID for LAN2 that meets the following requirements:
To answer, drag the appropriate network ID and subnet mask to the correct location in the
answer area.
Microsoft 70-410 : Practice Test
Answer:
You need to ensure that Admin1 receives a User Account Control (UAC) prompt when
attempting to open Windows PowerShell as an administrator.
Which setting should you modify from the Local Group Policy Editor? To answer, select the
appropriate setting in the answer area.
Answer:
You have a Hyper-V host named HYPERV1. HYPERV1 hosts a virtual machine named
DC1.
You need to prevent the clock on DC1 from synchronizing from the clock on HYPERV1.
What should you configure? To answer, select the appropriate object in the answer area.
Microsoft 70-410 : Practice Test
Answer:
Microsoft 70-410 : Practice Test
Your network contains a subnet named Subnet1. Subnet1 contains a DHCP server named
Server1.
You deploy a new subnet named Subnet2. On Subnet2, you deploy a new server named
5erver2 that runs Windows Server 2012.
You need to configure Server2 to route DHCP broadcast from Subnet2 to Server1.
Answer:
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains a user account named User1 that resides in an organizational unit (OU) named
OU1.
A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to publish
several Applications to a user named User1.
You need to ensure that the same Applications are published to User2.
Answer: C
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 and has the Hyper-
V server role installed.
You need to log the amount of system resources used by each virtual machine.
http://technet.microsoft.com/en-us/library/hh848481%28v=wps.620%29.aspx
http://blogs.technet.com/b/virtualization/archive/2012/08/20/how-to-use-resource-metering-
with-powershell.Aspx
You have a server named Server1 that runs Windows Server 2012.
You need to remove the source files for all server roles that are not installed on Server1.
A. servermanagercmd.exe
B. imagex.exe
Microsoft 70-410 : Practice Test
C. dism.exe
D. ocsetup.exe
Answer: C
Explanation:
servermanagercmd.exe - The ServerManagerCmd.exe command-line tool has been
deprecated in WindowsServer 2008 R2.
imagex.exe - ImageX is a command-line tool in Windows Vista that you can use to create
and manageWindows image (.wim) files. A .wim file contains one or more volume images,
disk volumes that containimages of an installed Windows operating system.
dism.exe - Deployment Image Servicing and Management (DISM.exe) is a command-line
tool that canbe used to service a Windows image or to prepare a Windows Preinstallation
Environment (WindowsPE) image. It replaces Package Manager (Pkgmgr.exe), PEimg,
and Intlcfg that were included inWindows Vista. The functionality that was included in
these tools is now consolidated in one tool(DISM.exe), and new functionality has been
added to improve the experience for offline servicing. DISMcan Add, remove, and
enumerate packages.
ocsetup.exe - The Ocsetup.exe tool is used as a wrapper for Package Manager
(Pkgmgr.exe) and for WindowsInstaller (Msiexec.exe). Ocsetup.exe is a command-line
utility that can be used to perform scripted installs andscripted uninstalls of Windows
optional components. The Ocsetup.exe tool replaces the Sysocmgr.exe tool thatWindows
XP and Windows Server 2003i use.
http://technet.microsoft.com/en-us/library/hh824822.aspx
http://blogs.technet.com/b/joscon/archive/2010/08/26/adding-features-with-dism.aspx
http://technet.microsoft.com/en-us/library/hh831809.aspx
http://technet.microsoft.com/en-us/library/hh825265.aspx
On Server1, you create a share named Documents. The Share permission for the
Documents share is configured as shown in the following table.
The NTFS permission for the Documents share is configured as shown in the following
table.
You need to configure the Share and NTFS permissions for the Documents share. The
permissions must meet the following requirements:
Ensure that the members of a group named Group1 can read files and run
programs in Documents.
Ensure that the members of Group1 can modify the permissions on their own files
in Documents.
Ensure that the members of Group1 can create folders and files in Documents.
Minimize the number of permissions assigned to users and groups.
To answer, drag the appropriate permission to the correct location. Each permission may
be used once, more than once, or not at all. You may need to drag the split bar between
panes or scroll to view content.
Microsoft 70-410 : Practice Test
Answer:
Your network contains an Active Directory forest. The forest contains two domains named
Domain1 and Domain2.
Domain1 contains a file server named Server1. Server1 has a shared folder named
Share1. Domain2 contains 50 users who require access to Share1.
You need to create groups in each domain to meet the following requirements:
Which type of groups should you create and which group nesting strategy should you use?
To answer, select the appropriate configuration in the answer area.
Answer:
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012.
A. New-StoragePool
B. New-VirtualDisk
C. Diskpart
D. Share and Storage Management
Answer: D
You perform a Server Core Installation of Windows Server 2012 on a server named
Server1.
Answer: B
Explanation: There are a couple of ways to install the GUI from the command prompt,
although both use the same tool DISM (Deployment Image Service Manager). When you
are doing it for a single (local) server, the command is:
The server contains the disks configured as shown in the following table.
You need to create a volume that can store up to 3 TB of user files. The solution must
ensure that the user files are available if one of the disks in the volume fails.
Answer: A
Explanation: The RAID volume would provide 8 TB of space and would be available if one
of the disk fails.
However, you need at least three (but no more than 32) dynamic disks to create a RAID-5
volume.
Disk1 would have to be converted to a dynamic disk first.
Incorrect:
Not B: A storage pool would not ensure data redundancy.
Not C: This mirror would provide only 2 TB of storage.
Not D: This mirror would provide 4 TB of storage. However, disk1 would have to converted
to a dynamic disk first.
Your network contains an Active Directory domain named contoso.com. All client
computers run Windows 8.
Answer:
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012.
A. New-StorageSubsytemVirtualDisk
B. File Server Resource Manager (FSRM)
C. Server Manager
D. Computer Management
Microsoft 70-410 : Practice Test
Answer: C
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 and has the Hyper-
V server role installed.
On Server1, you create and start a virtual machine named VM1. VM1 is configured as
shown in the following table.
You need to recommend a solution to minimize the amount of disk space used for the
snapshot of VM1.
Answer: D
Explanation: A dynamically expanding disk, on the other hand, is a VHD, which starts
small -- usually at only a few kilobytes -- and expands as additional storage space is
needed. It can only grow, however, to the size limit you designate in the setup wizard.
Incorrect:
Not D: Convert-VHD
Converts the format, version type, and block size of a virtual hard disk file.
Microsoft 70-410 : Practice Test
You have a server named Server1 that runs a Server Core installation of Windows Server
2012.
You need to configure the IPv4 settings of the network connection on Server1 as follows:
IP address: 10.1.1.1
Subnet mask: 255.255.240.0
Default gateway: 10.1.1.254
A. netsh.exe
B. Set NetIPInterface
C. msconfig.exe
D. netcfg.exe
Answer: A
Explanation: In order to configure TCP/IP settings such as the IP address, Subnet Mask,
Default Gateway, DNS and WINS addresses and many other options you can use
Netsh.exe.
You have a print server named Server1 that runs Windows Server 2012.
You discover that when there are many pending print jobs, the system drive occasionally
runs out of free space.
You add a new hard disk to Server1. You create a new NTFS volume.
Microsoft 70-410 : Practice Test
You need to prevent the print jobs from consuming disk space on the system volume.
Answer: B
Explanation:
Windows spools print jobs by default to the following directory as the they are processed:
%SystemRoot%\SYSTEM32\SPOOL\PRINTERS.
It is possible for the administrator of a Windows print server to manually instruct Windows
the location forplacing the spool files, if for example there is a concern for disk space.
http://support.microsoft.com/kb/137503/en-us
http://technet.microsoft.com/en-us/library/cc757764%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/library/cc736979%28v=ws.10%29.aspx
Microsoft 70-410 : Practice Test
Topic 3, Volume C
An administrator provides you with a file that contains the information to create user
accounts for 200 temporary employees.
You need to automate the creation of the user accounts. You must achieve this goal by
using the minimum amount of administrative effort.
A. csvde
B. Net user
C. Ldifde
D. Dsadd
Answer: A
Explanation:
csvde - Imports and exports data from Active Directory Domain Services (AD DS) using
files that storedata in the comma-separated value (CSV) format. You can also support
batch operations based on theCSV file format standard.
http://technet.microsoft.com/en-us/library/cc732101(v=ws.10).aspx
Net user - Adds or modifies user accounts, or displays user account information.
http://technet.microsoft.com/en-us/library/cc771865(v=ws.10).aspx
Microsoft 70-410 : Practice Test
Ldifde - Creates, modifies, and deletes directory objects. You can also use ldifde to extend
the schema, exportActive Directory user and group information to other Applications or
services, and populate Active DirectoryDomain Services (AD DS) with data from other
directory services.
http://technet.microsoft.com/en-us/library/cc731033(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc753708
(v=ws.10).aspxcsvde.exe is the best option to add multiple users. as you just need to
export the excel spreadsheet as a csvfile and make sure the parameters are correct.
You can use Csvde to import and export Active Directory data that uses the comma-
separated valueformat. Use a spreadsheet program such as Microsoft Excel to open this
.csv file and view the header andvalue information
http://support.microsoft.com/kb/327620/en-us
Your network contains an Active Directory domain named contoso.com. The domain
contains an Application server named Server1. Server1 runs Windows Server 2012.
You have a client Application named App1 that communicates to Server1 by using dynamic
TCP ports.
Users report that they can no longer connect to Server1 by using App1. You need to
ensure that App1 can connect to Server1.
Answer: C
Explanation:
Set-NetFirewallRule - Modifies existing firewall rules.
You have to allow the connection INTO the server - inbound rules
http://technet.microsoft.com/en-us/library/jj573828%28v=wps.620%29.aspx
http://mikefrobbins.com/2013/02/28/use-powershell-to-remotely-enable-firewall-exceptions-
on-windows-server-2012/
You open DNS Manager as shown in the exhibit. (Click the Exhibit button.)
You need to view the DNS server cache from DNS Manager.
Answer: A
Explanation:
To view the contents of the DNS cache, perform the following steps:
1. Start the Microsoft Management Console (MMC) DNS snap-in (Go to Start, Programs,
Administrative Tools,and click DNS).
2. From the View menu, select Advanced.
3. Select the Cached Lookups tree node from the left-hand pane to display the top-level
Microsoft 70-410 : Practice Test
domains (e.g., com, net) under.(root). Expand any of these domains to view the cached
DNS information (the actual records willappear in the right-hand pane).
Your network contains two Hyper-V hosts that run Windows Server 2012. The Hyper-V
hosts contains several virtual machines that run Windows Server 2012.
You install the Network Load Balancing feature on the virtual machines.
You need to configure the virtual machines to support Network Load Balancing (NLB).
A. Port mirroring
B. DHCP guard
C. Router guard
Microsoft 70-410 : Practice Test
D. MAC address
Answer: D
Your network contains an Active Directory forest that contains two domains. The forest
contains five domain controllers. The domain controllers are configured as shown in the
following table.
Answer: D
Explanation:
If you have more than one domain in your forest and you have a significant user population
in a site, you canoptimize the speed and efficiency of domain logons and directory
searches by adding a global catalog server tothe site.
If you have a single-domain forest, global catalog servers are not required for logons, but
directory searchesare directed to the global catalog. In this case, you can enable the global
catalog on all domain controllers forfaster directory searches.
You can use the same user interface (UI) in the Active Directory Sites and Services snap-in
to add or removethe global catalog. Enabling the global catalog can cause additional
replication traffic. However, global catalogremoval occurs gradually in the background and
Microsoft 70-410 : Practice Test
does not affect replication or performance.
Membership in the Enterprise Admins group in the forest or the Domain Admins group in
the forest rootdomain, or equivalent, is the minimum required to complete this procedure.
To add or remove the global catalogOpen Active Directory Sites and Services. To open
Active Directory Sites and Services, click Start, click Administrative Tools, and then click
Active Directory Sites and Services.
To open Active Directory Sites and Services in Windows Server 2012, click Start , type
dssite.msc.
In the console tree, click the server object to which you want to add the global catalog or
from which youwant to remove the global catalog.
Where?
Active Directory Sites and Services\Sites\SiteName\Servers
In the details pane, right-click NTDS Settings of the selected server object, and then click
Properties.
Select the Global Catalog check box to add the global catalog, or clear the check box to
remove theglobal catalog.
Your network contains an Active Directory domain named contoso.com. The network
contains 500 client computers that run Windows 8. All of the client computers connect to
the Internet by using a web proxy.
You deploy a server named Server1 that runs Windows Server 2012. Server1 has the DNS
Server server role installed.
Microsoft 70-410 : Practice Test
You configure all of the client computers to use Server1 as their primary DNS server.
You need to prevent Server1 from attempting to resolve Internet host names for the client
computers.
Answer: C
Explanation: When a zone that this DNS server hosts is a stub zone, this DNS server is a
source only for information about the authoritative name servers for this zone. The zone at
this server must be obtained from another DNS server that hosts the zone. This DNS
server must have network access to the remote DNS server to copy the authoritative name
server information about the zone.
Note:
You can use stub zones to:
* Keep delegated zone information current. By updating a stub zone for one of its child
zones regularly, the DNS server that hosts both the parent zone and the stub zone will
maintain a current list of authoritative DNS servers for the child zone.
* Improve name resolution. Stub zones enable a DNS server to perform recursion using the
stub zone's list of name servers, without having to query the Internet or an internal root
server for the DNS namespace.
* Simplify DNS administration. By using stub zones throughout your DNS infrastructure,
you can distribute a list of the authoritative DNS servers for a zone without using secondary
zones. However, stub zones do not serve the same purpose as secondary zones, and they
are not an alternative for enhancing redundancy and load sharing.
Incorrect:
Not D:
* The DNS Server Role in Windows Server 2008 now supports the GlobalNames Zone.
This has been introduced to assist organizations to move away from WINS and allow
organizations to move to an all-DNS environment. Unlike WINS, The GlobalNames zone is
not intended to be used for peer-to-peer name resolution.
* The DNS Server Role in Windows Server 2008 now supports the GlobalNames Zone.
Microsoft 70-410 : Practice Test
This has been introduced to assist organizations to move away from WINS and allow
organizations to move to an all-DNS environment. Unlike WINS, The GlobalNames zone is
not intended to be used for peer-to-peer name resolution.
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 and has the Hyper-
V server role installed.
On Server1, you create and start a virtual machine named VM1. VM1 is configured as
shown in the following table.
You need to recommend a solution to minimize the amount of disk space used for the
snapshot of VM1.
Answer: D
Explanation: A dynamically expanding disk, on the other hand, is a VHD, which starts
small -- usually at only a few kilobytes -- and expands as additional storage space is
Microsoft 70-410 : Practice Test
needed. It can only grow, however, to the size limit you designate in the setup wizard.
Incorrect:
Not DB Convert-VHD
Converts the format, version type, and block size of a virtual hard disk file.
You have a server named Server1 that runs a Server Core installation of Windows Server
2012.
You need to configure the IPv4 settings of the network connection on Server1 as follows:
IP address: 10.1.1.1
Subnet mask: 255.255.240.0
Default gateway: 10.1.1.254
A. ipconfig.exe
B. netsh.exe
C. Set-NetIPInterface
D. Set-NetIPv4Protocol
Answer: B
Explanation: In order to configure TCP/IP settings such as the IP address, Subnet Mask,
Default Gateway, DNS and WINS addresses and many other options you can use
Netsh.exe.
Incorrect:
not A: Windows Server 2012 Core still has IPCONFIG.EXE that can be used to view the IP
configuration. Modern servers typically come with several network interface ports. This
causes IPCONFIG.EXE to scroll off the screen when viewing its output. Consider piping the
output if IPCONFIG.EXE to a file and view it with Notepad.exe.
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012.
Answer: D
Explanation: With Share and Storage Management, you can provision storage on disks
that are available on your server, or on storage subsystems that support Virtual Disk
Service (VDS). The Provision Storage Wizard guides you through the process of creating a
volume on an existing disk, or on a storage subsystem attached to your server. If the
volume is going to be created on a storage subsystem, the wizard will also guide you
through the process of creating a logical unit number (LUN) to host that volume. You also
have the option of only creating the LUN, and using Disk Management to create the volume
later.
Incorrect:
Not A: File Server Resource Manager is a suite of tools for Windows Server that allows
administrators to understand, control, and manage the quantity and type of data that is
stored on their servers. By using File Server Resource Manager, administrators can place
quotas on folders and volumes, actively screen files, and generate comprehensive storage
reports. This set of advanced instruments not only helps the administrator efficiently
monitor existing storage resources, but it also aids in the planning and implementation of
future policy changes.
You create a new inbound rule by using Windows Firewall with Advanced Security.
You need to configure the rule to allow Server1 to accept unsolicited inbound packets that
are received through a network address translation (NAT) device on the network.
A. Edge traversal
B. Authorized computers
C. Interface types
D. Remote IP address
Answer: A
Explanation:
Edge traversal - This indicates whether edge traversal is enabled (Yes) or disabled (No).
When edge traversalis enabled, the Application, service, or port to which the rule App1ies
is globally addressable and accessiblefrom outside a network address translation (NAT) or
edge device.
Microsoft 70-410 : Practice Test
Allow edge traversal - Allow Applications to receive unsolicited traffic directly from the
Internet through aNAT edge device.
Defer to user - Let the user decide whether to allow unsolicited traffic from the Internet
Microsoft 70-410 : Practice Test
through a NAT edgedevice when an Application requests it.
Defer to Application - Let each Application determine whether to allow unsolicited traffic
from the Internetthrough a NAT edge device.
http://technet.microsoft.com/en-us/library/cc731927.aspx
http://technet.microsoft.com/en-us/library/dd421713%28v=ws.10%29.aspx
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Server1. Server1 runs Windows Server 2012 and has
the File Server server role installed.
You need to ensure that users can recover files that they accidently delete from
Documents.
Answer: A
Explanation:
If you enable Shadow Copies of Shared Folders on a volume using the default values, a
task will be scheduledto create shadow copies at 7:00 A.M of next business day. The
default storage area will be on the samevolume, and its size will be 10 percent of the
available space.
Microsoft 70-410 : Practice Test
You can only enable Shadow Copies of Shared Folders on a per-volume basisthat is,
you cannot selectspecific shared folders and files on a volume to be copied or not copied.
To enable and configure Shadow Copies of Shared Folders
1. Click Start, point to Administrative Tools, and then click Computer Management.
2. In the console tree, right-click Shared Folders, click All Tasks, and then click Configure
Shadow Copies.
3. In Select a volume, click the volume that you want to enable Shadow Copies of Shared
Folders for, and then click Enable.
4. You will see an alert that Windows will create a shadow copy now with the current
settings and that thesettings might not be appropriate for servers with high I/O loads. Click
Yes if you want to continue or No if youwant to select a different volume or settings.
5. To make changes to the default schedule and storage area, click Settings.
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/cc771893.aspx
You need to create a new volume on Server1. The new volume must have the following
configurations:
To answer, move all the Diskpart commands from the list of commands to the answer area
and arrange them in the correct order.
Answer:
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The network
contains a DHCP server named DHCP1.
On the new network segment, you deploy a new server named Server1 that runs Windows
Server 2012.
Answer:
Microsoft 70-410 : Practice Test
Question No : 214 - (Topic 3)
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012.
A. Server Manager
B. New-StorageSubsytemVirtualDisk
C. Computer Management
D. Share and Storage Management
Answer: D
Explanation: With Share and Storage Management, you can provision storage on disks
that are available on your server, or on storage subsystems that support Virtual Disk
Service (VDS). The Provision Storage Wizard guides you through the process of creating a
volume on an existing disk, or on a storage subsystem attached to your server. If the
volume is going to be created on a storage subsystem, the wizard will also guide you
through the process of creating a logical unit number (LUN) to host that volume. You also
have the option of only creating the LUN, and using Disk Management to create the volume
later.
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 and has the Hyper-
V server role installed.
On Server1, you create and start a virtual machine named VM1. VM1 is configured as
shown in the following table.
Microsoft 70-410 : Practice Test
You need to recommend a solution to minimize the amount of disk space used for the
snapshot of VM1.
Answer: C
Explanation: A dynamically expanding disk, on the other hand, is a VHD, which starts
small -- usually at only a few kilobytes -- and expands as additional storage space is
needed. It can only grow, however, to the size limit you designate in the setup wizard.
You have a server named Server1 that runs a Server Core installation of Windows Server
2012.
You need to configure the IPv4 settings of the network connection on Server1 as follows:
IP address: 10.1.1.1
Subnet mask: 255.255.240.0
Default gateway: 10.1.1.254
Microsoft 70-410 : Practice Test
What should you run?
A. Set-NetlPInterface
B. netcfg.exe
C. New-NetlPAddress
D. msconfig.exe
Answer: A
Explanation: Set-NetIPInterface
Modifies IP interface properties.
Your network contains an Active Directory domain named contoso.com. The network
contains 500 client computers that run Windows 8. All of the client computers connect to
the Internet by using a web proxy.
You deploy a server named Server1 that runs Windows Server 2012. Server1 has the DNS
Server server role installed.
You configure all of the client computers to use Server1 as their primary DNS server.
You need to prevent Server1 from attempting to resolve Internet host names for the client
computers.
Answer: C
Explanation: When a zone that this DNS server hosts is a stub zone, this DNS server is a
Microsoft 70-410 : Practice Test
source only for information about the authoritative name servers for this zone. The zone at
this server must be obtained from another DNS server that hosts the zone. This DNS
server must have network access to the remote DNS server to copy the authoritative name
server information about the zone.
Note:
You can use stub zones to:
* Keep delegated zone information current. By updating a stub zone for one of its child
zones regularly, the DNS server that hosts both the parent zone and the stub zone will
maintain a current list of authoritative DNS servers for the child zone.
* Improve name resolution. Stub zones enable a DNS server to perform recursion using the
stub zone's list of name servers, without having to query the Internet or an internal root
server for the DNS namespace.
* Simplify DNS administration. By using stub zones throughout your DNS infrastructure,
you can distribute a list of the authoritative DNS servers for a zone without using secondary
zones. However, stub zones do not serve the same purpose as secondary zones, and they
are not an alternative for enhancing redundancy and load sharing.
Incorrect:
Not B:
* The DNS Server Role in Windows Server 2008 now supports the GlobalNames Zone.
This has been introduced to assist organizations to move away from WINS and allow
organizations to move to an all-DNS environment. Unlike WINS, The GlobalNames zone is
not intended to be used for peer-to-peer name resolution.
* The DNS Server Role in Windows Server 2008 now supports the GlobalNames Zone.
This has been introduced to assist organizations to move away from WINS and allow
organizations to move to an all-DNS environment. Unlike WINS, The GlobalNames zone is
not intended to be used for peer-to-peer name resolution.
Your network contains an Active Directory domain named adatum.com. The domain
contains the servers shown in the following table.
Microsoft 70-410 : Practice Test
You need to ensure that you can use Server Manager on DC1 to manage DC2.
Which two tasks should you perform? (Each correct answer presents part of the solution.
Choose two.)
Answer: A,D
Explanation: Windows Management Framework 3.0 To use this release of Server
Manager to access and manage remote servers that are running Windows Server 2008 or
Windows Server 2008 R2, you must first install .NET Framework 4.0, and then install
Windows Management Framework 3.0 on those servers.
Note: In Windows Server 2012, you can use Server Manager to perform management
tasks on remote servers. Remote management is enabled by default on servers that are
running Windows Server 2012. To manage a server remotely by using Server Manager,
you add the server to the Server Manager server pool.
You can use Server Manager to manage remote servers that are running Windows Server
2008 and Windows Server 2008 R2, but the following updates are required to fully manage
these older operating systems (see above).
You have a file server named Server1 that runs Windows Server 2012. Server1 contains a
folder named Folder1.
Microsoft 70-410 : Practice Test
You share Folder1 as Share1 by using Advanced Sharing. Access-based enumeration is
enabled.
You configure the NTFS permissions on Folder1 as shown in the following table.
The members of Group2 report that they cannot make changes to the files in Share1. The
members of Group1 and Group2 run App1.exe successfully.
You need to ensure that the members of Group2 can edit the files in Share1.
Answer: A
Explanation:
Suppose youve shared a folder on a Windows Server 2012 system and youve created the
share as a readonlyshare, but the NTFS permissions for the folder are Full Control for the
Everyone group. When conflicts likethis arise between share and NTFS permissions, the
most restrictive permission set wins out.
There are a number of additional settings that you can enable for the share. ABE allows
users to see just thefiles and folders to which they have been granted access and not even
be able to see that other itemsexist.
http://blogs.technet.com/b/keithmayer/archive/2012/10/21/ntfs-shared-folders-a-whole-lot-
easier-in-windowsserver-2012.aspx
http://www.techrepublic.com/blog/networking/how-to-share-a-folder-in-windows-server-
2012/6057
http://www.techrepublic.com/blog/networking/windows-server-2012-tips-for-setting-share-
vs-ntfspermissions/6204
Microsoft 70-410 : Practice Test
Computer accounts for the marketing department are in an organizational unit (OU) named
Departments\Marketing\Computers. User accounts for the marketing department are in an
OU named Departments\Marketing\Users.
You need to App1y an Application control policy to all of the marketing users.
Answer:
Microsoft 70-410 : Practice Test
You have a server named Server1 that runs a Server Core installation of Windows Server
2012.
You need to configure the IPv4 settings of the network connection on Server1 as follows:
IP address: 10.1.1.1
Subnet mask: 255.255.240.0
Default gateway: 10.1.1.254
A. Set-NetIPv4Protocol
B. ipconfig.exe
C. netsh.exe
D. msconfig.exe
Microsoft 70-410 : Practice Test
Answer: C
Explanation: In order to configure TCP/IP settings such as the IP address, Subnet Mask,
Default Gateway, DNS and WINS addresses and many other options you can use
Netsh.exe.
Incorrect:
Not A: The command Set-NetIPv4Protocol modifies information about the IPv4 Protocol
configuration.
TheSet-NetIPv4Protocolcmdlet modifies the global IPv4 protocol configuration for the
computer. This includes parameters such as the default hop limit, the neighbor cache limit,
and multi-cast configuration.
not B: Windows Server 2012 Core still has IPCONFIG.EXE that can be used to view the IP
configuration. Modern servers typically come with several network interface ports. This
causes IPCONFIG.EXE to scroll off the screen when viewing its output. Consider piping the
output if IPCONFIG.EXE to a file and view it with Notepad.exe.
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 and has the Hyper-
V server role installed.
On Server1, you create and start a virtual machine named VM1. VM1 is configured as
shown in the following table.
You need to recommend a solution to minimize the amount of disk space used for the
snapshot of VM1.
Microsoft 70-410 : Practice Test
What should you do before you create the snapshot?
Answer: A
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server 1. Server1 runs Windows Server 2012.
A. New-StorageSubsytemVirtualDisk
B. Share and Storage Management
C. Computer Management
D. File Server Resource Manager (FSRM)
Answer: B
Explanation:
With Share and Storage Management, you can provision storage on disks that are
available on your server, or on storage subsystems that support Virtual Disk Service (VDS).
The Provision Storage Wizard guides you through the process of creating a volume on an
existing disk, or on a storage subsystem attached to your server. If the volume is going to
be created on a storage subsystem, the wizard will also guide you through the process of
creating a logical unit number (LUN) to host that volume. You also have the option of only
creating the LUN, and using Disk Management to create the volume later.
Incorrect:
Not D: File Server Resource Manager is a suite of tools for Windows Server that allows
administrators to understand, control, and manage the quantity and type of data that is
stored on their servers. By using File Server Resource Manager, administrators can place
quotas on folders and volumes, actively screen files, and generate comprehensive storage
reports. This set of advanced instruments not only helps the administrator efficiently
Microsoft 70-410 : Practice Test
monitor existing storage resources, but it also aids in the planning and implementation of
future policy changes.
Your network contains an Active Directory domain named contoso.com. The domain
contains three member servers. The servers are configured as shown in the following table.
All client computers run Windows 8. All client computers receive updates from Server2.
On Servers, you add a shared printer named Printer1. Printer1 uses a Type 4 driver that is
not included in the Windows 8 installation media.
You need to ensure that when users connect to the printer for the first time, the printer
driver is installed automatically on their client computer.
A. From the Windows Deployment Services console on Server1, add the driver package for
Printer1.
B. From the Update Services console on Server2, import and approve updates.
C. From Windows PowerShell on Server3, run the Add-PrinterDrivercmdlet.
D. From the Print Management console on Server3, add additional drivers for Printer1.
Answer: B
From Server Manager on Server2, you right-click DC2 as shown in the exhibit. (Click the
Exhibit button.)
You need to ensure that when you right-click DC2, you see the option to run DNS
Manager.
Answer: D
Explanation:
If you have installed Windows Server 2012 Roles and Features using PowerShell or
remote server admin toolsor new multi server manager console, you will see that the
management tools are missing from the server onwhich you just have enabled the role or
feature. This is because Microsoft has provided more granular controlon what is installed
on the Windows Server 2012. As an administrator we have choice to include or not
toinclude management tools while installing the Roles and Features we choose.
The goal for Windows Server 2012 administration is to manage remotely from Windows
Server 2012 box thatwill act as the management host for all servers and will be accessed
by all the IT administrators.
Typically, when a role is installed, the associated administration tools are also installed.
However, sometimes you simply need to add additional administrative tools.
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us//library/cc731420%28v=ws.10%29.aspx
http://windowsitpro.com/windows-server-2012/q-im-missing-some-windows-server-2012-
administration-toolshow-do-i-add-them
Your network contains an Active Directory domain named contoso.com. The domain
contains 20 computer accounts in an organizational unit (OU) named OU1. A user account
named User1 is in an OU named OU2.
You are configuring a Group Policy object (GPO) named GPO1. You need to assign User1
the Back up files and directories user right to all of the computer accounts in OU1.
Microsoft 70-410 : Practice Test
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
Answer: A,E
Explanation:
A. You have to Link a GPO to an object in order for it to be App1ied to that object
B. Wrong object to link the GPO
C. Delegation settings refer to delegating control over the properties of the GPO
D. User Configuration typically contains subitems for Software Settings, Windows Settings,
and AdministrativeTemplates
E. Backup Files and Directories are found in Computer Configuration\Windows
Settings\Local Policies\User Rights Assignment
Back up files and directories - This user right determines which users can bypass file and
directory, registry,and other persistent object permissions for the purposes of backing up
the system.
Microsoft 70-410 : Practice Test
C:\Documents and Settings\usernwz1\Desktop\1.JPG
Specifically, this user right is similar to granting the following permissions to the user or
group in question on allfiles and folders on the system:
Traverse Folder/Execute File
List Folder/Read Data
Read Attributes
Read Extended Attributes
Read Permissions
Caution:
Assigning this user right can be a security risk. Since there is no way to be sure that a user
is backing up data,stealing data, or copying data to be distributed, only assign this user
right to trusted users.
Default on workstations and servers: Administrators, Backup Operators.
Default on domain controllers:Administrators,BackupOperators,Server Operators
http://www.microsoft.com/en-us/download/details.aspx?id=25250
Your network contains a Hyper-V host named Server1 that runs Windows Server 2012.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012. You take a
snapshot of VM1, and then you install an Application on VM1. You verify that the
Application runs properly.
You need to ensure that the current state of VM1 is contained in a single virtual hard disk
file.
You can take multiple snapshots of a virtual machine, even while it is running.
You can then revert the virtual machine to any of the previous states by App1ying a
snapshot to the virtualmachine.
Taking a snapshot of a VM is to in essence freeze the current state and make it a parent
disk based on currentstate, and at the same time create a child disk to capture all
subsequent changes. - See more at:
Snapshots require adequate storage space. Snapshots are stored as .avhd files in the
same location at thevirtual hard disk. Taking multiple snapshots can quickly consume a
large amount of storage space.
When you use Hyper-V Manager to delete a snapshot, the snapshot is removed from the
snapshot treebut the .avhd file is not deleted until you turn off the virtual machine.
Microsoft 70-410 : Practice Test
http://www.laneolson.ca/2009/10/09/hyper-v-snapshots-and-disk-space/
http://blogs.technet.com/b/yungchou/archive/2013/01/23/hyper-v-virtual-hard-disk-vhd-
operations-explained.aspx
http://zoom.it/12u8
http://www.server-talk.eu/wp-content/uploads/article_2010-05-28_02.png
http://blogs.msdn.com/b/virtual_pc_guy/archive/2009/04/15/what-happens-when-i-delete-a-
snapshot-hyper-v.aspx
http://blogs.technet.com/b/yungchou/archive/2013/01/23/hyper-v-virtual-hard-disk-vhd-
Microsoft 70-410 : Practice Test
operations-explained.aspx
http://blogs.technet.com/b/josebda/archive/2012/03/20/windows-server-8-beta-hyper-v-
over-smb-quickprovisioning-a-vm-on-an-smb-file-share.aspx
Your network contains an Active Directory domain named contoso.com. The domain
contains a server namedServer1. Server1 runs Windows Server 2012 and has the Hyper-V
server role installed. On Server1, you createand start a virtual machine named VM1.
VM1 is configured as shown in the following table. You plan to create a snapshot of VM1.
You need torecommend a solution to minimize the amount of disk space used for the
snapshot of VM1. What should youdo before you create the snapshot?
Answer: A,F
Explanation:
Virtual machine snapshots are file-based snapshots of the state, disk data, and
configuration of a virtualmachine at a specific point in time.
You can take multiple snapshots of a virtual machine, even while it is running.
Microsoft 70-410 : Practice Test
You can then revert the virtual machine to any of the previous states by App1ying a
snapshot to the virtualmachine.
Taking a snapshot of a VM is to in essence freeze the current state and make it a parent
disk based on currentstate, and at the same time create a child disk to capture all
subsequent changes. - See more at:
Snapshots require adequate storage space. Snapshots are stored as .avhd files in the
same location at thevirtual hard disk. Taking multiple snapshots can quickly consume a
large amount of storage space.
When you use Hyper-V Manager to delete a snapshot, the snapshot is removed from the
snapshot treebut the .avhd file is not deleted until you turn off the virtual machine.
Each snapshot introduces a parent-child dependency of the runtime environment when the
snapshot wastaken, and over time a series of backups will results in a multi-level hierarchy
of snapshots with nested parentchilddependencies.
When you have systems that are required to be up and running 24/7 it basically throws
away any use thatsnapshots have. It seems somewhat ridiculous that you have to bring a
system down to delete the snapshotwhen one of the reasons you created the snapshot
was to help reduce downtime in case something goeswrong. It is even more ridiculous that
if you dont power down your system and wait for the vhd to merge,the snapshot will
continue to grow until the system comes crashing down due to a lack of disk space!
http://www.laneolson.ca/2009/10/09/hyper-v-snapshots-and-disk-space/
http://blogs.technet.com/b/yungchou/archive/2013/01/23/hyper-v-virtual-hard-disk-vhd-
operations-explained.aspx
http://zoom.it/12u8
http://www.server-talk.eu/wp-content/uploads/article_2010-05-28_02.png
http://blogs.msdn.com/b/virtual_pc_guy/archive/2009/04/15/what-happens-when-i-delete-a-
snapshot-hyper-v.aspx
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012. You need to create
3-TB virtual hard disk (VHD) on Server1.
Answer: A,C
Explanation:
The New-VirtualDisk command creates a new virtual disk in the specified storage pool.
New-VirtualDisk - Creates a new virtual disk in the specified storage pool.
Although the new Server Manager UI in Windows Server 2012 provides a very convenient
and intuitiveworkflow to provision and manage Storage, interaction with PowerShell is
required to access many of theadvanced features.
If I then create a simple 200GB Virtual Disk via the UI named VDiskSimpleUI, the resulting
Virtual Diskleverages 8 columns and maintains 1 copy of the data. But when creating the
Virtual Disk via PowerShell, Ican force the tripping across all nine of the disks and optimize
performance.
And creating a mirrored 200GB Virtual Disk via the UI named VDiskMirrorUI produces a
Virtual Disk with 4columns and 2 data copies. But with PowerShell, I can create a slightly
different configuration, increasing thedata protection (and also the disk footprint):
New-VirtualDisk -StoragePoolFriendlyName Pool01 -ResiliencySettingName Mirror -Size
200GB -FriendlyNameVDiskMirrorPS -ProvisioningType Fixed -NumberOfDataCopies 3 -
NumberOfColumns 3.
Microsoft 70-410 : Practice Test
http://blogs.technet.com/b/wincat/archive/2012/05/21/optimizing-windows-server-2012-
storage-managementvia-powershell-for-both-performance-and-resiliency.aspx
http://technet.microsoft.com/en-us/library/hh848643%28v=wps.620%29.aspx
Your network contains an Active Directory domain named contoso.com. The network
contains 500 client computers that run Windows 8. All of the client computers connect to
the Internet by using a web proxy. You deploy a server named Server1 that runs Windows
Server 2012. Server1 has the DNS Server server role installed. You configure all of the
client computers to use Server1 as their primary DNS server.
Microsoft 70-410 : Practice Test
You need to prevent Server1 from attempting to resolve Internet host names for the client
computers.
Answer: B,C
Explanation:
B. necessary to remove the default root hints files
C. install a root (.) zone on all internal DNS servers to prevent name resolution on the
Internet
http://support.microsoft.com/kb/298148
Your network contains an Active Directory forest named contoso.com. All domain
controllers currently run Windows Server 2008 R2. You plan to install a new domain
controller named DC4 that runs Windows Server 2012.
Schema master
Global catalog server
DNS Server server role
Active Directory Certificate Services server role
You need to identify which configurations Administrators by using the Active Directory
Installation Wizard.
Which two configurations should you identify? (Each correct answer presents part of the
solution. Choose two.)
Microsoft 70-410 : Practice Test
A. Transfer the schema master.
B. Enable the global catalog server.
C. Install the DNS Server role
D. Install the Active Directory Certificate Services role.
Answer: A,D
Explanation:
http://technet.microsoft.com/en-us/library/hh831457.aspx
AD Installation Wizard will automatically install DNS and allows for the option to set it as a
global catalog server. ADCS and schema must be done separately.
Your network contains an Active Directory domain named adatum.com. The domain
contains a member server named Server1 and a domain controller named DC2. All servers
run Windows Server 2012.
On DC2, you open Server Manager and you add Server1 as another server to manage.
From Server Manager on DC2, you right-click Server1 as shown in the exhibit.
Microsoft 70-410 : Practice Test
You need to ensure that when you right-click Server1, you see the option to run the DHCP
console.
Answer: C
Explanation:
C. Remote Mgmt must be setuo on both servers
http://technet.microsoft.com/en-us/library/ee441255(v=ws.10).aspx
You have a network printer connected to print server. You need to be able to print if print
server goes down. What should you chose?
Microsoft 70-410 : Practice Test
A. brach office direct printing
B. printer pooling
C. spooling
D. Print forwarding
Answer: A
You have external virtual switch with srv-io enabled with 10 Virtual Machines on it. You
need to make the Virtual Machines able to talk only to each other.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/hh831823.aspx
http://www.altaro.com/hyper-v/hyper-v-virtual-switch-explained-part-2/
Your infrastructure divided in 2 sites. You have a forest root domain and child domain.
There is only one DC on site 2 with no FSMO roles. The link goes down to site 2 and no
users can log on.
A. Infrastructure master
B. RID master
C. Domain Naming master
D. PCD emulator
Answer: D
Explanation:
Microsoft 70-410 : Practice Test
D. The PDC emulator is used as a reference DC to double-check incorrect passwords and
it also receives new password changes.
http://technet.microsoft.com/en-us/library/cc773108(v=ws.10).aspx
You have a server named Server1 that runs Windows Server 2012. A network technician
installs a new disk onServer1 and creates a new volume. The properties of the new
volume.
You need to ensure that you canrestore files on volume D by using the Previous Versions
tab.
Answer: B
Explanation:
Shadow Copies for Shared Folders is activated at the volume level.
The volume to be enabled for shadow copies must use NTFS and can be saved either on a
basic disk or adynamic disk.
Assigning a drive letter to the volume is optional; an NTFS volume with shadow copy
enabled can be mountedas a folder on another NTFS volume.
You can only enable Shadow Copies of Shared Folders on a per-volume basis; that is, you
cannot selectspecific shared folders and files on a volume to be copied or not copied. By
default, the shadow copies will bestored on the volume that is being copied (the source
volume). If you have more than one drive available onyour server, you should use a
separate volume on another disk to store the shadow copies. This eliminates thepossibility
that high input/output (I/O) load will cause shadow copies to be deleted. This is the
recommendedconfiguration for heavily used file servers.
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/pt-pt/magazine/2006.01.rapidrecovery%28en-us%29.aspx
http://technet.microsoft.com/en-us/library/cc875808.aspx
You need to ensure thatAppPool1 uses a group Managed Service Account as its identity.
A. I believe it should be Install a domain controller that runs Windows Server 2012, Run the
New-ADServiceAccountcmdlet, Modify the settings of AppPool1.
B. Configure the Security settings of the contoso.com zone.
Microsoft 70-410 : Practice Test
C. Add a second legacy network adapter, and then run the Set-VMNetworkAdoptercmdlet.
D. From Windows Powershell, run Get-DNSServerDiagnostics.
Answer: A
You run a Windows 2012 and implementing 3 new printers in a warehouse. You need to
makean exclusion forthese IP addresses within DHCP server.
Answer:
Microsoft 70-410 : Practice Test
You have a Server Core 2012 installation and all roles and features removed. The server
does not haveaccess to Windows Update. You mount the network volume containing the
installation files for Server 2012.
Answer:
Microsoft 70-410 : Practice Test
App1 use TCP port 21 for control and a dynamic port for data. You have allowed port 21 in
firewall. What youshould next do to allow clients to use App1 to connect to server1 using
ftp.
Answer: D
Explanation:
Set global statefulftp
Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an
initial connection onone port to request a data connection on a different port. This affects
both active and passive FTP.
http://technet.microsoft.com/en-us/library/cc771920%28v=ws.10%29.aspx
http://support.microsoft.com/kb/832017/en-us#method20
Microsoft 70-410 : Practice Test
P.S
There is a fair bit of confusion around the purpose of the Alternate DNS Server.
This Post should hopefully put these questions to bed.
The general assumption is that, the Windows DNS Client on all counts, will send a DNS
query to the PreferredDNS first. If this query fails, then it will query the Alternate DNS
Server, and so on and so forth.
The above statement is true, however there is a twist.
The Windows DNS Client will reset the DNS Server Priority at periodic intervals. By default,
the serverpriorities are reset every 15 minutes.
If say the Preferred DNS timed out on a DNS query, the DNS Client will send that DNS
Query to theAlternate DNS.
If the Alternate DNS resolves the Query, the Priority will now switch to the Alternate DNS,
until either it timesout on a Query or the Priority Time Limit expires.
It is a common practice to configure the Preferred DNS Server with the IP of a Local Site
DNS Server and the
Alternate DNS Server with that of a Remote Site. The problem arises when
Firewall/Network folk raisecomplaints that Clients are sending DNS Traffic to Remote DNS
Servers. Well, that is because they have beenconfigured to do so.
http://blogs.technet.com/b/ajayr/archive/2011/12/14/who-does-dns-client-prefer-preferred-
or-alternate.aspx
http://technet.microsoft.com/en-us/library/cc738344%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/library/jj590768.aspx
You run a Windows 2012 Hyper-V Role Server, you need to shrink the size of files.vhd.
Which powershellcmdlet option you should run first?
A. Dismount-VHD
B. Mount-VHD
C. Resize-VHD
D. Convert-VHD
Answer: D
Microsoft 70-410 : Practice Test
Explanation:
Answer: Convert, as .vhd dont support shrink.
Convert-VHD - Converts the format, version type, and block size of a virtual hard disk file.
Convert-VHD Path c:\test\files.vhd DestinationPath c:\test\testvhdx.vhdx
The Resize-VHD cmdlet resizes a virtual hard disk. This cmdlet lets you shrink or expand
the size of a virtualhard disk, but the shrink operation is allowed only on VHDX virtual hard
disks. The shrink operation fails ifit would shrink the virtual disk to less than its minimum
size (available through the VHDX objects MinimumSizeproperty).
After converting a dynamically expanding VHD to the VHDX format, a new Shrink menu
option becomesavailable in the Hyper-V UI as shown.
VHDX format VHDs only expose the Shrink option when there is free space in the VHDX
file to reclaim.
http://technet.microsoft.com/en-us/library/hh848454.aspx
http://blogs.msdn.com/b/virtual_pc_guy/archive/2012/05/10/shrinking-a-vhd-in-windows-8-
fast.aspx
http://technet.microsoft.com/en-us/library/hh848535.aspx
You only want to share a printer with Group1, administrators, central owner and operators.
Microsoft 70-410 : Practice Test
(pick 2 answers)
Answer: A,E
Explanation:
Answer: C
Explanation:
http://www.win2012workstation.com/wireless-networking/
You run a Windows 2012 Hyper-V Role Server, you need to shrink the size of files.vhd(
200GB ).
Using the Edit Virtual Disk Wizard what option should you choose.
Microsoft 70-410 : Practice Test
A. Compact
B. Shrink
C. Resize
D. Convert
Answer: D
Explanation:
Answer: Convert, as .vhd dont support shrink.
After converting a dynamically expanding VHD to the VHDX format, a new Shrink menu
option becomesavailable in the Hyper-V UI as shown.
VHDX format VHDs only expose the Shrink option when there is free space in the VHDX
file to reclaim.
http://technet.microsoft.com/en-us/library/hh848454.aspx
http://blogs.msdn.com/b/virtual_pc_guy/archive/2012/05/10/shrinking-a-vhd-in-windows-8-
fast.aspx
http://technet.microsoft.com/en-us/library/hh848535.aspx
You add a new server to the MainOffice and it needs to be able to communicate to all sites.
Answer: C
Your network contains an Active Directory domain named contoso.com. The domain
contains a server namedServer1. Server1 runs Windows Server 2012 and has the Hyper-
V server role installed.
You need to log the amount of system resources used by each virtual machine.
Answer: A
Explanation:
Enable-VMResourceMetering - The Enable-VMResourceMeteringcmdlet starts collecting
resourceutilization data for a virtual machine or resource pool.
http://technet.microsoft.com/en-us/library/hh848481
(v=wps.620).aspx
Measure-VM - The Measure-VM cmdlet reports data on processor usage, memory usage,
network traffic, anddisk capacity for one or more virtual machines.
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/en-us/library/hh848471
(v=wps.620).aspx
ABC.coms user accounts are located in an organizational unit (OU), named ABCStaff.
ABC.coms managersbelong to a group, named ABCManagers.
You have been instructed to create a new Group Policy object (GPO) that should be linked
to the ABCStaffOU, but not affect ABC.coms managers.
A. You should consider removing the user accounts of the managers from the ABCStaff
OU.
B. You should consider configuring the new GPOs WMI filter.
C. You should consider adding the user accounts of ABC.coms managers to the Admins
group.
D. You should consider adding the user accounts of ABC.coms managers to the
localAdministrators group.
Answer: B
Explanation:
GPOs cannot be linked directly to users, computers, or security groups. They can only be
linked to sites,domains and organizational units. However, by using security filtering, you
can narrow the scope of aGPO so that it App1ies only to a single group, user, or computer.
http://technet.microsoft.com/en-us/library/cc781988%28v=ws.10%29.aspx
deny a specific group both Read and App1y Group Policy permission to prevent them
from App1ying the GPO.
http://blogs.technet.com/b/grouppolicy/archive/2009/07/30/security-filtering-wmi-filtering-
and-item-leveltargeting-in-group-policy-preferences.aspx
Microsoft 70-410 : Practice Test
http://technet.microsoft.com/pt-pt/library/cc758471%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/library/cc779036%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/library/cc904317%28v=ws.10%29.aspx
You have two servers named Server1 and Server2 that run Windows Server 2012. Server1
and Server2 are part of a workgroup.
When you attempt to connect to Server2 from Server Manager, you receive the following
error message: "Credentials not valid."
You need to ensure that you can manage Server2 from Server1 by using Server Manager
on Server1.
Answer: C
You have a shared folder named Share1. The folder permissions of Share1 are configured
as shown in the Folder Permissions exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
The Share permissions of Share1 are configured as shown in the Share Permissions
exhibit. (Click the Exhibit button.)
You have a group named Group1. The members of Group1 are shown in the Group1
exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
Select Yes if the statement can be shown to be true based on the available information;
otherwise select No. Each correct selection is worth one point.
Microsoft 70-410 : Practice Test
Answer:
You have a server named Server1 that runs a Server Core installation of Windows Server
2012 Standard.
You need to identify which task can be performed on Server1 from within the Remote
Desktop session.
Answer: A
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012.
Microsoft 70-410 : Practice Test
You create a security template named Template1 by using the Security Templates snap-in.
Answer: B
Explanation: The Security Configuration Wizard (SCW) guides you through the process of
creating, editing, applying, or rolling back a security policy.
Note:
* Security templates provide standard security settings to use as a model for your security
policies. They help you troubleshoot problems with computers whose security settings are
not in compliance with policy or are unknown. Security templates are inactive until imported
into a Group Policy object or the Security Configuration and Analysis snap-in to MMC.
Your network contains two Active Directory forests named contoso.com and adatum.com.
A two-way forest trust exists between the forests.
You have custom starter Group Policy objects (GPOs) defined in contoso.com.
You need to ensure that the same set of custom starter GPOs are available in
adatum.com.
In the table below, identify which action must be performed for the starter GPOs container
in each forest. Make only one selection in two of the rows. Each correct selection is worth
one point.
Microsoft 70-410 : Practice Test
Answer:
You have a server named Server1 that runs Windows Server 2012. Server1 is a member of
a workgroup.
You need to ensure that only members of the Administrators group and members of a
group named Group1 can log on locally to Server1.
Microsoft 70-410 : Practice Test
Which settings should you modify from the Local Security Policy? To answer, select the
appropriate settings in the answer area.
Answer:
You need to configure a custom connection security rule on Server1. The rule must encrypt
network communications across the Internet to a computer at another company.
Which authentication method should you configure in the connection security rule?
A. Advanced
B. User (Kerberos V5)
C. Computer (Kerberos V5)
D. Computer and user (Kerberos V5)
E. Default
Answer: A
Your network contains two Active Directory forests named contoso.com and adatum.com.
All servers run Windows Server 2012.
You need to prevent Group1 from being used to provide access to the resources in
contoso.com.
Answer: B
Explanation:
* Accounts that require access to the customer Active Directory will be granted a special
right called Allowed to Authenticate. This right is then applied to computer objects (Active
Microsoft 70-410 : Practice Test
Directory domain controllers and AD RMS servers) within the customer Active Directory to
which the account needs access.
* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to
be able to access resources in a trusting Windows Server 2008 or Windows Server 2003
domain or forest where the trust authentication setting has been set to selective
authentication, each user must be explicitly granted the Allowed to Authenticate permission
on the security descriptor of the computer objects (resource computers) that reside in the
trusting domain or forest.
Your network contains an Active Directory forest named contoso.com. The forest contains
a child domain named corp.contoso.com.
You need to create a mail-enabled distribution group. Which type of group should you
create?
A. Domain local
B. Global
C. Local
D. Universal
Answer: D
Your network contains an Active Directory forest named contoso.com. The forest contains
a single domain. The domain contains two domain controllers named DC1 and DC2 that
run Windows Server 2012.
The domain contains a user named User1 and a global security group named Group1.
Microsoft 70-410 : Practice Test
You need to add a new domain controller to the domain.
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController
C. Install WindowsFeature
D. Install AddsDomain
E. Rename-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User
Answer: C
Your network contains an Active Directory forest named contoso.com. The forest contains
a single domain. The domain contains two domain controllers named DC1 and DC2 that
run Windows Server 2012.
The domain contains a user named User1 and a global security group named Group1.
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController
C. Install WindowsFeature
D. Install AddsDomain
E. Rename-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User
Microsoft 70-410 : Practice Test
Answer: F
Your network contains an Active Directory forest named contoso.com. The forest contains
a single domain. The domain contains two domain controllers named DC1 and DC2 that
run Windows Server 2012.
The domain contains a user named User1 and a global security group named Group1.
You need to add DC2 as the first domain controller in a new domain in the forest.
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController
C. Install WindowsFeature
D. Install AddsDomain
E. Rename-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User
Answer: D
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Server1. Server1 runs Windows Server 2012 and has
the Hyper-V server role installed.
You create an external virtual switch named Switch1. Switch1 has the following
configurations:
You need to ensure that all of the virtual machines that connect to Switch1 are isolated
from the external network and can connect to each other only. The solution must minimize
network downtime for the virtual machines.
Answer: D
You have a Hyper-V host named Server1 that runs Windows Server 2012.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012.
Answer: A
You have two servers named Server1 and Server2 that run Windows Server 2012. Server1
has the Hyper-V server role installed. Server1 hosts a virtual machine named VM1.
Microsoft 70-410 : Practice Test
VM1 is currently running. VM1 has a snapshot that was created two weeks ago.
You plan to use Server2 to perform a forensic analysis of the contents of the disk of VM1
from two weeks ago.
You need to ensure that you can view the contents of the disk of VM1 from two weeks ago
from Server2.
Which three actions should you perform in sequence? (To answer, move the appropriate
three actions from the list of actions to the answer area and arrange them in the correct
order.)
Answer:
Microsoft 70-410 : Practice Test
Question No : 262 HOTSPOT - (Topic 3)
Your network contains an Active Directory domain named contoso.com. The network
contains two subnets. The subnets are configured as shown in the following table.
The network contains a member server named Server1 that runs Windows Server 2012.
Server1 has the DHCP Server server role installed. Server1 is configured to lease IP
addresses to the two subnets.
You add three new printers to the Warehouse subnet. The printers have static IP
addresses. The IP addresses are consecutive.
You need to create an exclusion range that contains the IP addresses of the printers.
From which node should you configure the exclusion range?To answer, select the
appropriate node in the answer area.
Microsoft 70-410 : Practice Test
Answer:
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains a single location named Site1. The domain contains a server named Server1 that
has the DHCP Server server role installed.
The domain will expand to include a second location named Site2. A server named Server2
will be deployed to Site2. Site1 and Site2 will connect to each other by using a WAN link.
You need to ensure that the clients in both sites receive their IPv4 configurations from
Server1.
In the table below, identify which actions must be performed on each server. Make only
Microsoft 70-410 : Practice Test
one selection in each row. Each correct selection is worth one point.
Answer:
You have a server that runs a Server Core installation of Windows Server 2012.
You have a Hyper-V host named Server1 that runs Windows Server 2008 R2. All of the
virtual machines on Server1 use VHDs.
You install the Hyper-V server role on a server named Server2 that runs Windows Server
2012. Server2 has the same hardware configurations as Server1.
You plan to migrate the Hyper-V host from Server1 to Server2 by using the Windows
Server Migration Tools.
In the table below, identify what can be migrated by using the Windows Server Migration
Tools. Make only one selection in each row. Each correct selection is worth one point.
Answer:
Microsoft 70-410 : Practice Test
You have a server named Server1 that runs Windows Server 2012.
You plan to create a storage pool that will contain a new volume.
You need to create a new 600-GB volume by using thin provisioning. The new volume
must use the parity layout.
What is the minimum number of 256-GB disks required for the storage pool?
A. 2
B. 3
C. 4
D. 5
Answer: B
You have a server named Server1 that runs Windows Server 2012.
You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the
installation fails repeatedly.
Microsoft 70-410 : Practice Test
You need to ensure that the feature can be installed on Server1.
Answer: D
Explanation: The files needed are no longer available on the local Hard drive. We need to
connect the server to the Internet.
Note:
Starting with Windows Server 2012 and Windows 8, the feature files for .NET Framework
3.5 (which includes .NET Framework 2.0 and .NET Framework 3.0) are not available on
the local computer by default. The files have been removed. Files for features that have
been removed in a Features on Demand configuration, along with feature files for .NET
Framework 3.5, are available through Windows Update. By default, if feature files are not
available on the destination server that is running Windows Server 2012 R2 Preview or
Windows Server 2012, the installation process searches for the missing files by connecting
to Windows Update. You can override the default behavior by configuring a Group Policy
setting or specifying an alternate source path during installation, whether you are installing
by using the Add Roles and Features Wizard GUI or a command line.
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that has the DNS Server server role installed.
DC1 hosts an Active Directory-integrated zone for the domain. The domain contains a
member server named Server1.
You need to ensure that Server1 can respond authoritatively to queries for the existing
contoso.com namespace.
Which cmdlets should you run on each server? (To answer, drag the appropriate cmdlets
to the correct servers. Each cmdlet may be used once, more than once, or not at all. You
Microsoft 70-410 : Practice Test
may need to drag the split bar between panes or scroll to view content.)
Answer:
Your network contains an Active Directory forest named contoso.com. The forest contains
two domains named contoso.com and child.contoso.com. The forest contains two domain
controllers. The domain controllers are configured as shown in the following table.
Microsoft 70-410 : Practice Test
You need to ensure that DC2 can provide authoritative responses for queries to the
contoso.com namespace.
Answer: B
You have three servers named Server1, Server2, and DO that run Windows Server 2012.
IPv6 addresses and configurations are assigned to all of the servers by using DHCPv6.
You verify that Server2 can ping the IPv6 address of DC1.
You need to ensure that Server1 can ping the IPv6 address of DC1.
What command should you run on Server1? (To answer, select the appropriate options in
the answer area.)
Microsoft 70-410 : Practice Test
Answer:
You are configuring the IPv6 network infrastructure for a branch office.
The corporate network administrator allocates the 2001:DB8:0:C000::/58 address space for
use in the branch office.
You need to identify the maximum number of IPv6 subnets you can create.
A. 32
Microsoft 70-410 : Practice Test
B. 64
C. 128
D. 1024
Answer: B
You have two servers named Server1 and Server2 that run Windows Server 2012. Server1
has the DHCP Server server role installed.
Which two values should you obtain from Server2? (Each correct answer presents part of
the solution. Choose two.)
A. the hardware ID
B. the DHCPv6 unique identifier
C. the DHCPv6 identity association ID
D. the SMSBIOS GUID
E. the MAC address
Answer: B,C
Explanation: The Add-DhcpServerv6Reservation cmdlet reserves a specified IPv6
address for the client identified by the specified Dynamic Host Configuration Protocol
(DHCP) v6 unique identifier (ID) (DUID) and identity association ID (IAID).
You need to configure Printer1 to be available only from 19:00 to 05:00 every day.
Microsoft 70-410 : Practice Test
Which settings from the properties of Printer1 should you modify?
A. Device Settings
B. Advanced
C. Security
D. Ports
E. Sharing
Answer: B
You have two servers that run Windows Server 2012. The servers are configured as shown
in the following table.
You need to ensure that Server2 can be managed by using Server Manager from Server1.
In the table below, identify which actions must be performed on Server1 and Server2. Make
only one selection in each row. Each correct selection is worth one point.
Microsoft 70-410 : Practice Test
Answer:
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2 that run Windows Server 2012.
Answer: C
You have a server named Server1 that has the Print and Document Services server role
installed. You need to provide users with the ability to manage print jobs on Server1 by
using a web browser.
Answer: C
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012.
You plan to create a shared folder. The shared folder will have a quota limit.
You discover that when you run the New Share Wizard, you cannot select the SMB Share -
Advanced option.
You need to ensure that you can use SMB Share - Advanced to create the new share.
What should you do on Server1 before you run the New Share Wizard?
Answer: B
Explanation: Install-WindowsFeature
Installs one or more Windows Server roles, role services, or features on either the local or
a specified remote server that is running Windows Server 2012. This cmdlet is equivalent
to and replaces Add-WindowsFeature, the cmdlet that was used to install roles, role
services, and features in Windows Server 2008 R2.
You need to prevent Group1 from being used to provide access to the resources in
contoso.com.
Answer: B
Explanation: * Accounts that require access to the customer Active Directory will be
granted a special right called Allowed to Authenticate. This right is then applied to computer
objects (Active Directory domain controllers and AD RMS servers) within the customer
Active Directory to which the account needs access.
* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to
be able to access resources in a trusting Windows Server 2008 or Windows Server 2003
domain or forest where the trust authentication setting has been set to selective
authentication, each user must be explicitly granted the Allowed to Authenticate permission
on the security descriptor of the computer objects (resource computers) that reside in the
trusting domain or forest.
Your network contains an Active Directory domain named contoso.com. The domain
contains 100 user accounts that reside in an organizational unit (OU) named OU1.
You need to ensure that a user named User1 can link and unlink Group Policy objects
(GPOs) to 0U1.
Microsoft 70-410 : Practice Test
The solution must minimize the number of permissions assigned to User1.
Answer: B
Explanation: Set-GPPermission
Grants a level of permissions to a security principal for one GPO or all the GPOs in a
domain.
Grants a level of permissions to a security principal (user, security group, or computer) for
one GPO or all the GPOs in a domain.
The forest contains two domains named contoso.com and child.contoso.com and two sites
named Site1 and Site2. The domains and the sites are configured as shown in following
table.
When the link between Site1 and Site2 fails, users fail to log on to Site2.
Microsoft 70-410 : Practice Test
You need to identify what prevents the users in Site2 from logging on to the
child.contoso.com domain.
Answer: A
Your network contains an Active Directory forest named contoso.com. The forest contains
a single domain. All servers runs Windows Server 2012.The domain contains two domain
controllers named DC1 and DC2. Both domain controllers are virtual machines on a Hyper-
V host.
You plan to create a cloned domain controller named DC3 from an image of DC1.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. Add the computer account of DC1 to the Cloneable Domain Controllers group.
B. Create a DCCIoneConfig.xml file on DC1.
C. Add the computer account of DC3 to the Cloneable Domain Controllers group.
D. Run the Enable-AdOptionalFeaturecmdlet.
E. Modify the contents of the DefaultDCCIoneAllowList.xml file on DC1.
Answer: A,B
Explanation: A: Cloneable Domain Controllers Group
There's a new group in town. It's called Cloneable Domain Controllers and you can find it in
the Users container. Membership in this group dictates whether a DC can or cannot be
cloned. This group has some permissions set on the domain head that should not be
removed. Removing these permissions will cause cloning to fail. Also, as a best practice,
DCs shouldn't be added to the group until you plan to clone and DCs should be removed
Microsoft 70-410 : Practice Test
from the group once cloning is complete. Cloned DCs will also end up in the Cloneable
Domain Controllers group.
B: DCCloneConfig.xml
There's one key difference between a cloned DC and a DC that is being restored to a
previous snapshot: DCCloneConfig.XML.
DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned
DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new
DC name and more. This file can be generated in a few different ways.
Your network contains an Active Directory forest. The forest contains two domains named
contoso.com and corp.contoso.com. All domain controllers run Windows Server 2012 and
are configured as global catalog servers.
A. From Active Directory Users and Computers, modify the properties of the DC1 computer
account.
B. From Active Directory Administrative Center, modify the properties of the DC1 computer
account.
C. From Active Directory Sites and Services, modify the NTDS Settings of the DC1 server
object.
D. From Active Directory Domains and Trusts, modify the properties of the
corp.contoso.com domain.
Microsoft 70-410 : Practice Test
Answer: C
The human resources department gives you a Microsoft Excel document that contains a list
of the temporary employees.
You need to automate the creation of user accounts for the 500 temporary employees.
Answer: B
You deploy a Server with a GUI installation of Windows Server 2012 Datacenter. From
Windows PowerShell, you run the following command: Remove-WindowsFeature Server-
Gui-Shell.
In the table below, identify which tools are available on Server1 and which tools are
unavailable on Server1.
Make only one selection in each row. Each correct selection is worth one point.
Microsoft 70-410 : Practice Test
Answer:
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2. Server1 and Server2 run a Server with a
GUI installation of Windows Server 2012.
You remove the Graphical Management Tools and Infrastructure feature on Server2.
What should you do? (To answer, drag the appropriate tools to the correct statements.
Each tool may be used once, more than once, or not at all. You may need to drag the split
Microsoft 70-410 : Practice Test
bar between panes or scroll to view content.)
Answer:
You need to create a volume that will remain online if two disks in the volume fail. The
solution must minimize the number of disks used to create the volume.
Which three actions should you perform in sequence? (To answer, move the appropriate
three actions from the list of actions to the answer area and arrange them in the correct
order.)
Microsoft 70-410 : Practice Test
Answer:
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server that runs Windows Server 2012.
You perform a Server Core Installation of Windows Server 2012 on a new server.
You need to ensure that you can add the new server to Server Manager on Server1.
What should you configure on the new server?To answer, select the appropriate setting in
the answer area.
Microsoft 70-410 : Practice Test
Answer:
Microsoft 70-410 : Practice Test
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012.
You create a security template named Template1 by using the Security Templates snap-in.
A. System Configuration
B. Local Security Policy
C. Certificate Templates
D. Computer Management
Answer: A
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012.
A. Security Templates
B. Authorization Manager
C. Security Configuration and Analysis
D. Resultant Set of Policy
Answer: C
Microsoft 70-410 : Practice Test
Question No : 290 - (Topic 3)
Your network contains an Active Directory forest named contoso.com. The forest contains
a single domain. The domain contains two domain controllers named DC1 and DC2 that
run Windows Server 2012.
The domain contains a user named User1 and three global security groups named Group1,
Group2 and, Group3.
A. Add-AdPrincipalGroupMembership
B. Install- AddsDomainController
C. Install- WindowsFeature
D. Install-AddsDomain
E. Rename-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User
Answer: A
Your network contains an Active Directory forest named contoso.com. The forest contains
a single domain. The domain contains two domain controllers named DC1 and DC2 that
run Windows Server 2012.
The domain contains a user named User1 and a global security group named Group1.
You need to ensure that User1 can manage the group membership of Group1. The solution
must minimize the number of permissions assigned to User1.
A. Add-AdPrincipalGroupMembership
B. Install- AddsDomainController
Microsoft 70-410 : Practice Test
C. Install- WindowsFeature
D. Install-AddsDomain
E. Rename-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User
Answer: G
Your network contains an Active Directory forest named contoso.com. The forest contains
a single domain. The domain contains two domain controllers named DC1 and DC2 that
run Windows Server 2012.
The domain contains a user named User1 and a global security group named Group1.
You need to prevent User1 from changing his password. The solution must minimize
administrative effort.
A. Add-AdPrincipalGroupMembership
B. Install- AddsDomainController
C. Install- WindowsFeature
D. Install-AddsDomain
E. Rename-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User
Answer: F
You have a Hyper-V host named Host1 that connects to a SAN by using a hardware Fibre
Channel adapter.
Microsoft 70-410 : Practice Test
Host1 contains two virtual machines named VM1 and VM2.
You need to provide VM1 with direct access to the SAN. VM2 must not require access to
the SAN.
Which two configurations should you perform? (Each correct answer presents part of the
solution. Choose two.)
Answer: A,D
Explanation:
Step 1:
D: Building a Virtual SAN
The process of setting up virtual Fibre Channel starts with building a virtual SAN. The
easiest way to accomplish this is to open the Hyper-V Manager, right click on the listing for
your Hyper-V server in the console tree, and then choose the Virtual SAN Manager
command from the shortcut menu.
Step 2:
A: Once you have created a virtual SAN, the next step in the process is to link a virtual
machine to the virtual SAN. To do so, right click on the virtual machine for which you want
to provide Fibre Channel connectivity and select the Settings command from the resulting
shortcut menu.
Next, select the Add Hardware container, as shown in the figure above, and then select the
Fibre Channel Adapter option from the list of available hardware. Etc.
Note:
* Virtual Fibre Channel for Hyper-V (also referred to as Synthetic Fibre Channel) provides
VM guest operating systemswith direct access to a Fibre Channel SAN by using a standard
World Wide Name (WWN) associated with a virtual machine
Server1 hosts five virtual machines that run Windows Server 2012.
The settings of a virtual machine named Server3 are configured as shown in the exhibit.
(Click the Exhibit button.)
You need to ensure that when Server1 restarts, Server3 automatically resumes without
intervention. The solution must prevent data loss.
A. BIOS
B. Automatic Start Action
C. Automatic Stop Action
D. Integration Services
Microsoft 70-410 : Practice Test
Answer: C
Computer1 has a wired network adapter and a wireless network adapter. Computer1
connects to a wireless network named Network1.
For testing purposes, you install Windows Server 2012 on Computer1 as a second
operating system. You install the drivers for the wireless network adapter.
You need to ensure that you can connect to Network1 from Windows Server 2012.
A. From a local Group Policy object (GPO), configure the Wireless Network (IEEE 802.11)
Policies settings.
B. From a local Group Policy object (GPO), configure the settings of Windows Connection
Manager.
C. From Server Manager, install the Wireless LAN Service feature.
D. Restart the WLAN AutoConfig service.
Answer: C
You install Windows Server 2012 on a new server named Server1 and you join Server1 to
the domain.
You need to ensure that you can view processor usage and memory usage information in
Server Manager.
Answer: B
Your network contains an Active Directory forest named contoso.com. The forest contains
a single domain. The domain contains two domain controllers named DC1 and DC2 that
run Windows Server 2012.
The domain contains a user named User1 and a global security group named Group1.
A. Add-AdPrincipalGroupMembership
B. Install AddsDomainControNer
C. Install WindowsFeature
D. Install AddsDomain
E. Rename-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User
Answer: E
You have a Hyper-V host named Server1 that runs Windows Server 2012.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012.
Answer: A
Explanation: There is no need to shut down, delete, or pause.
Note:
* By default, the snapshots are stored in subfolder of the virtual machines folder called
Snapshots. You can change this setting and you can move snapshots using Live Storage
Migration.
* Storage Live Migration provides the ability to move your virtual machine storage while
your VM is running. In comparison, Storage Live Migration is similar in offering to the
VMware storage offering called vMotion. The virtual hard disks used by a virtual machine
can be moved to different physical storage while the virtual machine remains running
making it unnecessary to take a virtual machine offline to move the VMs files to different
physical storage.
The settings for a virtual machine named VM2 are configured as shown in the VM2 exhibit.
(Click the Exhibit button.)
Microsoft 70-410 : Practice Test
The settings for Diskl.vhdx are configured as shown in the Diskl.vhdx exhibit. (Click the
Exhibit button.)
The settings for Disk2.vhdx are configured as shown in the Disk2.vhdx exhibit. (Click the
Exhibit button.)
Microsoft 70-410 : Practice Test
Select Yes if the statement can be shown to be true based on the available information;
otherwise select No. Each correct selection is worth one point.
Microsoft 70-410 : Practice Test
Answer:
You have a server named Server1 that runs Windows Server 2012.
A network technician installs a new disk on Server1 and creates a new volume. The
properties of the new volume are shown in the exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
You need to ensure that you can enable NTFS disk quotas for volume D.
Topic 4, Volume D
Your network contains an Active Directory domain named contoso.com. The domain
contains a print server named Print1 that runs Windows Server 2012.
From Active Directory Users and Computers, you browse to Print1 and you discover that
the 50 printers are not visible.
You need to ensure that you can view the printer objects in Active Directory Users and
Computers.
Which option should you select?To answer, select the appropriate option in the answer
area.
Answer:
Microsoft 70-410 : Practice Test
You have a file server named File1 that runs Windows Server 2012.
File1 contains a shared folder named Share1. Share1 contains an Application named
SalesApp1.exe.
The NTFS permissions for Share1 are shown in the following table.
The members of L_Sales discover that they cannot add files to Share1.
You need to ensure that the members of L_Sales can add files to Share1.
Answer: C
You have a file server named Server1 that runs Windows Server 2012. Server1 contains a
folder named Folder1.
A user named User1 is a member of Group1 and Group2. A user named User2 is a
member of Group2 and Group3.
You need to identify which actions the users can perform when they access the files in
Share1.
To answer, select the appropriate actions for each user in the answer area.
Microsoft 70-410 : Practice Test
Answer:
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012. Server1
has the Group Policy Management feature installed. Server2 has the Print and Document
Microsoft 70-410 : Practice Test
Services server role installed.
On Server2, you open Print Management and you deploy a printer named Printer1 by using
a Group Policy object (GPO) named GPO1.
When you open GPO1 on Server1, you discover that the Deployed Printers node does not
appear.
Answer: A
Explanation:
Note:
* Group Policy Management Console (GPMC) is a scriptable Microsoft Management
Console (MMC) snap-in, providing a single administrative tool for managing Group Policy
across the enterprise. GPMC is the standard tool for managing Group Policy.
* By default, a GPO affects all users and computers contained in the linked site, domain, or
OU. However, you can use Security Filtering on a GPO to modify its effect to apply only to
a specific user or the members of a security group by modifying the permissions on the
GPO. By combining Security Filtering with appropriate placement in OUs, you can target
any given set of users.
All of the App1ocker policy settings for the member servers are configured in a Group
Policy object (GPO) named GPO1.
Microsoft 70-410 : Practice Test
A member server named Server1 runs Windows Server 2012.
On Server1, you test a new set of App1ocker policy settings by using a local computer
policy.
You need to merge the local App1ocker policy settings from Server1 into the App1ocker
policy settings of GPO1.
A. From Local Group Policy Editor on Server1, exportan .xml file. Import the .xml file by
using Group Policy Management Editor.
B. From Local Group Policy Editor on Server1, exportan .inf file. Import the .inf file by using
Group Policy Management Editor.
C. From Server1, run the Set-App1ockerPolicy cmdlet.
D. From Server1, run the New-App1ockerPolicy cmdlet.
Answer: C
Your network contains an Active Directory domain named contoso.com. You have a Group
Policy object (GPO) named GP1 that is linked to the domain. GP1 contains a software
restriction policy that blocks an Application named App1.
You have a workgroup computer named Computer1 that runs Windows 8. A local Group
Policy on Computer1 contains an Application control policy that allows App1.
Your network contains an Active Directory domain named contoso.com. The domain
contains an Application server named Server1. Server1 runs Windows Server 2012.
Client computers use an FTP Application named App1.exe. App1.exe uses TCP port 21 as
the control port and dynamically requests a data port.
On Server1, you create a firewall rule to allow connections on TCP port 21.
You need to configure Server1 to support the client connections from App1.exe.
Answer: A
Explanation: * add portopening
Used to create a port-based exception.
The domain contains an organizational unit (OU) named OU1 as shown in the OU1 exhibit.
(Click the Exhibit button.)
Microsoft 70-410 : Practice Test
The membership of Group1 is shown in the Group1 exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
You configure GPO1 to prohibit access to Control Panel. GPO1 is linked to OU1 as shown
in the GPO1 exhibit. (Click the Exhibit button.)
Select Yes if the statement can be shown to be true based on the available information;
otherwise select No. Each correct selection is worth one point.
Answer:
Microsoft 70-410 : Practice Test
You discover that when users join computers to the domain, the computer accounts are
created in the Computers container.
You need to ensure that when users join computers to the domain, the computer accounts
are automatically created in an organizational unit (OU) named All_Computers.
Answer: C
Your company has a main office and four branch offices. The main office contains a server
Microsoft 70-410 : Practice Test
named Server1 that runs Windows Server 2012.
You need to add a single static route on Server1 to ensure that Server1 can communicate
with the hosts on all of the subnets.
Answer: B
Your network contains two Active Directory forests named contoso.com and adatum.com.
Each forest contains one domain. A two-way forest trust exists between the forests.
The forests use the address spaces shown in the following table.
Microsoft 70-410 : Practice Test
From a computer in the contoso.com domain, you can perform reverse lookups for the
servers in the contoso.com domain, but you cannot perform reverse lookups for the servers
in the adatum.com domain.
From a computer in the adatum.com domain, you can perform reverse lookups for the
servers in both domains.
You need to ensure that you can perform reverse lookups for the servers in the
adatum.com domain from the computers in the contoso.com domain.
A. a delegation
B. a trust point
C. a conditional forwarder
D. a GlobalNames zone
Answer: C
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012.
You need to view which authentication method was used to establish the initial IPSec
connection.
A. From Windows Firewall with Advanced Security, view the quick mode security
association.
B. From Event Viewer, search the Application Log for events that have an ID of 1704.
C. From Event Viewer, search the Security Log for events that have an ID of 4672.
D. From Windows Firewall with Advanced Security, view the main mode security
association.
Answer: D
Microsoft 70-410 : Practice Test
You have a Group Policy object (GPO) named Server Audit Policy. The settings of the
GPO are shown in the Settings exhibit. (Click the Exhibit button.)
The scope of the GPO is shown in the Scope exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
The domain contains a group named Group1. The membership of Group1 is shown in the
Group1 exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
Select Yes if the statement can be shown to be true based on the available information;
otherwise select No. Each correct selection is worth one point.
Microsoft 70-410 : Practice Test
Answer:
You have a Group Policy object (GPO) named GPO1 that contains several user settings.
GPO1 is linked to an organizational unit (OU) named OU1.
The help desk reports that GPO1App1ies to only some of the users in OU1.
You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
Answer: A
Your network contains an Active Directory domain named contoso.com. The domain
contains an Application server named Server1. Server1 runs Windows Server 2012.
Client computers use an FTP Application named App1.exe. App1.exe uses TCP port 21 as
the control port and dynamically requests a data port.
Microsoft 70-410 : Practice Test
On Server1, you create a firewall rule to allow connections on TCP port 21.
You need to configure Server1 to support the client connections from App1.exe.
Answer: A
Explanation: * add portopening
Used to create a port-based exception.
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012.
On a server named Server2, you perform a Server Core Installation of Windows Server
2012. You join Server2 to the contoso.com domain.
You need to ensure that you can manage Server2 by using the Computer Management
console on Server1. What should you do on Server2?
Answer: C
The sales office contains a print server named App1 that runs Windows Server 2012. App1
has a shared printer named Printer1. Printer1 connects to a network-attached print device.
You plan to connect all of the users in the sales office to Printer1 on App1.
You need to ensure that if App1 fails, the users can continue to print to Printer1.
What should you configure on App1?To answer, select the appropriate option in the
answer area.
Answer:
Microsoft 70-410 : Practice Test
Question No : 318 - (Topic 4)
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 and has the Hyper-
V server role installed.
A user named User1 is the member of the local Administrators group on Server1.
User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the
Exhibit button.)
You need to ensure that User1 can modify the settings of VM1 by running the Set-Vm
cmdlet.
Answer: C
A technician creates a virtual machine named VM1 on Server1 by using the New Virtual
Machine Wizard.
Microsoft 70-410 : Practice Test
You start VM1 and you discover that there is no option to start by using PXE.
You need to ensure that you can start VM1 by using PXE.
Which three actions should you perform in sequence? (To answer, move the appropriate
three actions from the list of actions to the answer area and arrange them in the correct
order.)
Answer:
You have a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-
V server role installed.
Answer:
You have a server named Server1 that runs Windows Server 2012.
On Server1, you open Computer Management as shown in the exhibit. (Click the Exhibit
button.)
Microsoft 70-410 : Practice Test
You need to ensure that you can create a 3-TB volume on Disk 1.
Answer: B
You have 3 server named Server1. Server1 runs a Server Core installation of Windows
Server 2012.
IP address: 10.1.1.1
Subnet mask: 255.255.240.0
Default gateway: 10.1.1.254
Preferred DNS server: <none>
The network contains a DNS server that has an IPv4 address of 10.1.1.200.
You need to configure Server1 to use 10.1.1.200 as the preferred DNS server. The solution
must not change any other settings on Server1.
Microsoft 70-410 : Practice Test
Which command should you run?
A. sconfig.cmd
B. net.exe
C. Set-NetIPInterface
D. netsh.exe
Answer: A
Explanation: In Windows Server 2012, you can use the Server Configuration tool
(Sconfig.cmd) to configure and manage several common aspects of Server Core
installations.
Network settings
You can configure the IP address to be assigned automatically by a DHCP Server or you
can assign a static IP address manually. This option allows you to configure DNS Server
settings for the server as well.
Sconfig.cmd interface
Your network contains two subnets. The subnets are configured as shown in the following
table.
Microsoft 70-410 : Practice Test
You have a server named Server1 that runs Windows Server 2012. Server1 is connected
to LAN1.
You run the route print command as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that Server1 can communicate with the client computers on LAN2.
Answer: A
The password policy for the domain is set to require a minimum password length of 10
characters.
A user named User1 and a user named User2 work for the sales department.
User1 is forced to create a domain password that has a minimum of 12 characters. User2
is forced to create a domain password that has a minimum of eight characters.
You need to identify what forces the two users to have different password lengths.
A. Credential Manager
B. Security Configuration Wizard (SCW)
C. Group Policy Management
D. Active Directory Administrative Center
Answer: D
Your network contains an Active Directory domain named contoso.com. The domain
contains 100 user accounts that reside in an organizational unit (OU) named OU1.
You need to ensure that a user named User1 can link and unlink Group Policy objects
(GPOs) to 0U1.
Microsoft 70-410 : Practice Test
The solution must minimize the number of permissions assigned to User1.
Answer: D
Explanation: Delegation of Control Wizard
The following are common tasks that you can select to delegate control of them:
You have a server named Server1 that runs Windows Server 2012.
You need to view the service location (SRV) records that Server1 registers in DNS.
Answer: B
You have a server named DHCP1 that runs Windows Server 2012. DHCP1 does not have
access to the Internet.
You mount a Windows Server 2012 installation image to the C:\Mount folder.
You need to install the DHCP Server server role on DHCP1 by using Server Manager.
Which folder should you specify as the alternate path for the source files?To answer, select
the appropriate folder in the answer area.
Microsoft 70-410 : Practice Test
Answer:
Microsoft 70-410 : Practice Test
You have a server named Data1 that runs a Server Core Installation of Windows Server
2012 Standard.
Microsoft 70-410 : Practice Test
You need to configure Data1 to run a Server Core Installation of Windows Server 2012
Enterprise.
You want to achieve this goal by using the minimum amount of administrative effort.
Answer: C
You have a server named Server1 that runs Windows Server 2012.
Answer: D
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012.
You plan to create a shared folder. The shared folder will have a quota limit.
You discover that when you run the New Share Wizard, you cannot select the SMB Share -
Microsoft 70-410 : Practice Test
Advanced option.
You need to ensure that you can use SMB Share - Advanced to create the new share.
What should you do on Server1 before you run the New Share Wizard?
Answer: B
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012.
You need to ensure that Server1 can respond to ping requests from computers that do not
support IPSec.
Answer: B
The computer account of Server 28 is located in an organizational unit (OU) named OU1. A
Group Policy object (GPO) named Application Restriction Policy is linked to OU1.
The settings of the GPO are configured as shown in the GPO Settings exhibit. (Click the
Exhibit button.)
The Services console on Server28 is shown in the Services exhibit. (Click the Exhibit
button.)
Microsoft 70-410 : Practice Test
Select Yes if the statement can be shown to be true based on the available information;
otherwise select No. Each correct selection is worth one point.
Answer:
You view the properties of VM1 as shown in the following exhibit. (Click the Exhibit button.)
Microsoft 70-410 : Practice Test
Which three actions should you perform in sequence? (To answer, move the appropriate
three actions from the list of actions to the answer area and arrange them in the correct
order.)
Microsoft 70-410 : Practice Test
Answer:
The file server will contain a dedicated volume for shared folders.
You need to create a volume for the shared folders. The solution must minimize the
likelihood of file corruption if a power failure occurs.
A. ReFS
B. NFS
C. NTFS
D. FAT32
Answer: D
Your company has a main office and four branch offices. The main office contains a server
named Server1 that runs Windows Server 2012.
Microsoft 70-410 : Practice Test
The IP configuration of each office is configured as shown in the following table.
You need to add a single static route on Server1 to ensure that Server1 can communicate
with the hosts on all of the subnets.
Answer: B
You have a server named Server1 that runs Windows Server 2012.
You need to install the Windows Network Virtualization Filter Driver on Server1.
A. Set-NetVirtualizationGlobal
B. Set-NetAdapterVmq
C. Add-WindowsFeature
D. Enable-NetAdapterBinding
Microsoft 70-410 : Practice Test
Answer: D