70-410 | All About Exact 70-410 exam


P.S. Vivid 70-410 ebook are available on Google Drive, GET MORE: https://drive.google.com/open?id=16ut0voxG5Ce_wyqo4CtkFBe9CQR5t74p


New Microsoft 70-410 Exam Dumps Collection (Question 9 - Question 18)

Question No: 9

Your network contains an Active Directory domain named contoso.com. The domain contains a DHCP server named Server1 that runs Windows Server 2012 R2.

You create a DHCP scope named Scope1. The scope has a start address of 192.168.1.10, an end address of 192.168.1.50, and a subnet mask of 255.255.255.192.

You need to ensure that Scope1 has a subnet mask of 255.255.255.0. What should you do first?

A. From the DHCP console, reconcile Scope1.

B. From the DHCP console, delete Scope1.

C. From the DHCP console, modify the Scope Options of Scope1.

D. From Windows PowerShell, run the Set-DhcpServerv4Scope cmdlet.

Answer: B

Explanation:

You cannot change the subnet mask of a DHCP scope without deleting the scope and recreating it with the new subnet mask.

Set-DhcpServerv4Scope does not include a parameter for the subnet mask.

Question No: 10

You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are part of a workgroup.

On Server1, you add Server2 to Server Manager.

When you attempt to connect to Server2 from Server Manager, you receive the following error message: "Credentials not valid."

You need to ensure that you can manage Server2 from Server1 by using Server Manager on Server1.

What should you do?

A. On Server 2, run the Configure-SmRemoting cmdlet.

B. On Server 1, run the Set-NetFirewallRule cmdlet.

C. On Server 1, run the Set-Item cmdlet.

D. On Server 2, install the Remote Server Administration Tools (RSAT).

Answer: C

Explanation:

Since they are both workgroup members, server 2 will have to be added to server 1 as a trusted host

Question No: 11

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.

VM3 is used to test applications.

You need to prevent VM3 from synchronizing its clock to Server1. What should you configure?

A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O visualization

Answer:: I

Explanation:

Integration Services settings on virtual machines includes services such as operating system shutdown, time synchronization, data exchange, Heart beat, and Backup (volume snapshot services. Thus you should disable the time synchronization using Integration Services.

References:

http://blogs.technet.com/b/virtualization/archive/2008/08/29/backing-up-hyper-v-virtual- machines.aspx

Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p. 144

Question No: 12

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.

You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS).

You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE.

Which virtual machine setting should you configure for VM2?

A. NUMA topology

B. Resource control

C. resource metering

D. virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Answer: G

Explanation:

Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is

booting from the network is first.

References: http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3:

Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335

Question No: 13

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.

The domain contains a user named User1 and a global security group named Group1. You need to prevent User1 from changing his password. The solution must minimize

administrative effort.

Which cmdlet should you run?

A. Add-AdPrincipalGroupMembership

B. Install-AddsDomainController

C. Install-WindowsFeature

D. Install-AddsDomain

E. Rename-AdObject

F. Set-AdAccountControl

G. Set-AdGroup

H. Set-User

Answer: F

Explanation:

The Set-ADAccountControlcmdlet modifies the user account control (UAC) values for an Active Directory user or computer account. UAC values are represented by cmdlet parameters.

CannotChangePassword

Modifies the ability of an account to change its password. To disallow password change by the account set this to $true. This parameter changes the Boolean value of the CannotChangePassword property of an account.

The following example shows how to specify the PasswordCannotChange parameter.

-CannotChangePassword $false

References:

http://technet.microsoft.com/en-us/library/ee617249.aspx http://technet.microsoft.com/en-us/library/hh974723.aspx http://technet.microsoft.com/en-us/library/hh974722.aspx

Question No: 14

Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and child.contoso.com. The forest contains two domain controllers. The domain controllers are configured as shown in the following table.

You need to ensure that DC2 can provide authoritative responses for queries to the contoso.com namespace.

What should you do?

A. On DC1, create a delegation.

B. On DC1, change the replication scope of the contoso.com zone.

C. On DC2, create a forwarder.

D. On DC2, modify the Zone Transfers settings.

Answer:: B

Explanation:

For DC1 to be able to provide authoritative responses to DNS queries the replication scope should be changed accordingly so that it has the zone data for the contoso.com domain.

Question No: 15

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. The domain contains a virtual machine named VM1.

A developer wants to attach a debugger to VM1.

You need to ensure that the developer can connect to VM1 by using a named pipe. Which virtual machine setting should you configure?

A. BIOS

B. Network Adapter

C. COM 1

D. Processor

Answer: C

Explanation:

Named pipe.

This option connects the virtual serial port to a Windows named pipe on the host operating system or a computer on the network. A named pipe is a portion of memory that can be used by one process to pass information to another process, so that the output of one is the input of the other. The second process can be local (on the same computer as the first) or remote (on a networked computer). For example, a local named pipe path could be

\.pipemypipename. Named pipes can be used to create a virtual null modem cable between two virtual machines, or between a virtual machine and a debugging program on the host operating system that supports the use of named pipes.

By connecting two virtual serial ports to the same named pipe, you can create a virtual null modem cable connection. Named pipes are useful for debugging or for any program that requires a null modem connection.

Named pipes can be used to connect to a virtual machine by configuring COM 1. References:

http://support.microsoft.com/kb/819036

http://support.microsoft.com/kb/141709

Question No: 16

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.

The domain contains a user named User1 and three global security groups named Group1, Group2 and, Group3.

You need to add User1 to Group1, Group2, and Group3. Which cmdlet should you run?

A. Add-AdPrincipalGroupMembership

B. Install-AddsDomainController

C. Install-WindowsFeature

D. Install-AddsDomain

E. Rename-AdObject

F. Set-AdAccountControl

G. Set-AdGroup

H. Set-User

Answer: A

Explanation:

The Add-ADPrincipalGroupMembershipcmdlet adds a user, group, service account, or computer as a new member to one or more Active Directory groups.

References:

http://technet.microsoft.com/en-us/library/ee617203.aspx http://technet.microsoft.com/en-us/library/hh974723.aspx

Question No: 17

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All servers run Windows Server 2012 R2. The domain contains two domain controllers named DC1 and DC2. Both domain controllers are virtual machines on a Hyper-V host.

You plan to create a cloned domain controller named DC3 from an image of DC1. You need to ensure that you can clone DC1.

Which two actions should you perform? (Each correct answer presents part of the solution.

Choose two.)

A. Add the computer account of DC1 to the Cloneable Domain Controllers group.

B. Create a DCCloneConfig.xml file on DC1.

C. Add the computer account of DC3 to the Cloneable Domain Controllers group.

D. Run the Enable-AdOptionalFeaturecmdlet.

E. Modify the contents of the DefaultDCCIoneAllowList.xml file on DC1.

Answer: A,B

Explanation:

:A. Cloneable Domain Controllers Group Thereu2021s a new group in town. Itu2021s called Cloneable Domain Controllers and you can find it in the Users container. Membership in this group dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldnu2021t be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete. Cloned DCs will also end up in the Cloneable Domain Controllers group.

:B. DCCloneConfig.xml

Thereu2021s one key difference between a cloned DC and a DC that is being restored to a previous snapshot:

DCCloneConfig.XML.

DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways.

The New-ADDCCloneConfigcmdlet in PowerShell By hand with an XML editor

By editing an existing config file, again with an XML editor.

Reference: Virtual Domain Controller Cloning in Windows Server 2012.

Question No: 18

Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy.

You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed.

You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent Server1 from attempting to resolve Internet host names for the client

computers.

What should you do on Server1?

A. Create a primary zone named u201crootu201d.

B. Create a primary zone named "GlobalNames".

C. Create a forwarder that points to 169.254.0.1.

D. Create a primary zone named u201c.u201d.

Answer: A

100% Renewal Microsoft 70-410 Questions & Answers shared by Surepassexam, Get HERE: https://www.surepassexam.com/70-410-exam-dumps.html (New 496 Q&As)