how to use 70 410 vce


♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-410 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-410-dumps.html


70-410 Product Description:
Exam Number/Code: 70-410 vce
Exam name: Installing and Configuring Windows Server 2012
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: Microsoft 70-410 Installing and Configuring Windows Server 2012

70-410 examcollection

Act now and download your Microsoft vce 70 410 test today! Do not waste time for the worthless Microsoft 70 410 dumps pdf tutorials. Download Abreast of the times Microsoft Installing and Configuring Windows Server 2012 exam with real questions and answers and begin to learn Microsoft mcsa 70 410 with a classic professional.

Q251. HOTSPOT - (Topic 3) 

Your network contains two Active Directory forests named contoso.com and adatum.com. A two-way forest trust exists between the forests. 

You have custom starter Group Policy objects (GPOs) defined in contoso.com. 

You need to ensure that the same set of custom starter GPOs are available in adatum.com. 

In the table below, identify which action must be performed for the starter GPOs container in each forest. Make only one selection in two of the rows. Each correct selection is worth one point. 

Answer: 


Q252. - (Topic 3) 

You have a Hyper-V host named Hyper1 that runs Windows Server 2012 R2. 

Hyper1 hosts several virtual machines that run Windows 8.1. 

Several developers connect to the virtual machines by using the Virtual Machine Connection tool. 

You need to ensure that the devlopers can print to their local printers from within virtual machine sessions. 

What should you configure? 

A. a virtual switch on Hyper1 

B. Remote Desktop Services (RDS) on Hyper1 

C. enhanced session mode on Hyper1 

D. a virtual network adapter on the virtual machines 

Answer:

Explanation: To be able to use a computer’s local resources on a virtual machine: 

* The Hyper-V host must have Enhanced session mode policy and Enhanced session mode settings turned on. 

* The computer that you use to connect to the virtual machine with VMConnect must run Windows 8, Windows 8.1, Windows Server 2012, or Windows Server 2012 R2. 

* The virtual machine must have Remote Desktop Services enabled and run Windows Server 2012 R2 or Windows 8.1 as the guest operating system. 

Reference: Use local resources on Hyper-V virtual machine with VMConnect 

https://technet.microsoft.com/en-us/library/dn282274.aspx 


Q253. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. 

You need to prevent users from installing a Windows Store app named App1. 

What should you create? 

A. An application control policy executable rule 

B. An application control policy packaged app rule 

C. A software restriction policy certificate rule 

D. An application control policy Windows Installer rule 

Answer:

Explanation: 

Windows 8 is coming REALLY SOON and of course one of the big new things to computer with that is the new Packaged Apps that run in the start screen. However these apps are very different and do not install like traditional apps to a path or have a true “executable” file to launch the program. Of course enterprises need a way to control these packaged apps and therefore Microsoft has added a new feature Packaged Apps option to the App1ocker feature. 

A. For .exe or .com 

B. A publisher rule for a Packaged app is based on publisher, name and version 

C. You can create a certificate rule that identifies software and then allows or does not allow the software to run, depending on the security level. 

D. For .msi or .msp Packaged apps (also known as Windows 8 apps) are new to Windows Server 2012 R2 and Windows 8. They are based on the new app model that ensures that all the files within an app package share the same identity. Therefore, it is possible to control the entire Application using a single App1ocker rule as opposed to the non-packaged apps where each file within the app could have a unique identity. Windows does not support unsigned packaged apps which implies all packaged apps must be signed. App1ocker supports only publisher rules for Packaged apps. A publisher rule for a packaged app is based on the following information: Publisher of the package Package name Package version Therefore, an App1ocker rule for a Packaged app controls both the installation as well as the running of the app. Otherwise, the publisher rules for Packaged apps are no different than the rest of the rule collections; they support exceptions, can be increased or decreased in scope, and can be assigned to users and groups. 


Q254. - (Topic 3) 

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. 

You need to add a graphical user interface (GUI) to Server1. 

Which tool should you use? 

A. the dism.exe command 

B. the Add-WindowsFeature cmdlet 

C. the imagex.exe command 

D. the setup.exe command 

E. the ocsetup.exe command 

F. the Add-WindowsPackage cmdlet 

G. the Install-Module cmdlet 

H. the Install-RoleService cmdlet 

Answer: A,B 

Explanation: 

Add-WindowsFeature -The Add-WindowsFeature cmdlet allows you to install specified roles, role services, and features on a computer that is running Windows Server 2008 R2. Install-WindowsFeature -Installs one or more Windows Server roles, role services, or features on either the local or a specified remote server that is running Windows Server 2012 R2. This cmdlet is equivalent to and replaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features in Windows Server 2008 R2. dism /online /get-features PS C:\\> Install-WindowsFeature -Name Web-Server – IncludeAllSubFeature -ComputerName Server1 –WhatIf 


Q255. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. You log on to Server1. You need to retrieve the IP configurations of Server2. Which command should you run from Server1? 

A. winrs -r:server2 ipconfig 

B. winrm get server2 

C. dsquery *-scope base-attr ip, server2 

D. ipconfig > server2.ip 

Answer:


Q256. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. 

On Server1, you create a share named Documents. 

You need to ensure that users can recover files that they accidently delete from Documents. 

What should you do? 

A. Enable shadow copies by using Computer Management. 

B. Create a storage pool that contains a two-way mirrored volume by using Server Manager. 

C. Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the Services console. 

D. Create a recovery partition by using Windows Assessment and Deployment Kit (Windows ADK). 

Answer:

Explanation: 

If you enable Shadow Copies of Shared Folders on a volume using the default values, a task will be scheduled to create shadow copies at 7:00 A.M of next business day. The default storage area will be on the same volume, and its size will be 10 percent of the available space. You can only enable Shadow Copies of Shared Folders on a per-volume basis–that is, you cannot select specific shared folders and files on a volume to be copied or not copied. 

To enable and configure Shadow Copies of Shared Folders: 

1. Click Start, point to Administrative Tools, and then click Computer Management. 

2. In the console tree, right-click Shared Folders, click All Tasks, and then click Configure Shadow Copies. 

3. In Select a volume, click the volume that you want to enable Shadow Copies of Shared Folders for, and then click Enable. 

4. You will see an alert that Windows will create a shadow copy now with the current settings and that the settings might not be appropriate for servers with high I/O loads. Click Yes if you want to continue or No if you want to select a different volume or settings. 

5. To make changes to the default schedule and storage area, click Settings. 

Shadow copies - a feature that provides point-in-time copies of files stored on file shares on file servers. Shadow Copies of Shared Folders allows users to view and access shadow copies, which are shared files and folders as they existed at different points of time in the past. By accessing previous versions of files and folders, users can compare versions of a file while working and recover files that were accidentally deleted or overwritten. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 

7: Hyper-V virtualization, Lesson 1: Deploying and configuring Hyper-V- hosts, p. 302 


Q257. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains 500 servers that run Windows Server 2012 R2. 

You have a written security policy that states the following: 

Only required ports must be open on the servers. 

All of the servers must have Windows Firewall enabled. 

Client computers used by administrators must be allowed to access all of the ports 

on all of the servers. 

Client computers used by the administrators must be authenticated before the 

client computers can access the servers. 

You have a client computer named Computer1 that runs Windows 8. 

... . 

You need to ensure that you can use Computer1 to access all of the ports on all of the servers successfully. The solution must adhere to the security policy. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. On Computer1, create a connection security rule. 

B. On all of the servers, create an outbound rule and select the Allow the connection if it is secure option. 

C. On all of the servers, create an inbound rule and select the Allow the connection if it is secure option. 

D. On Computer1, create an inbound rule and select the Allow the connection if it is secure option. 

E. On Computer1, create an outbound rule and select the Allow the connection if it is secure option. 

F. On all of the servers, create a connection security rule. 

Answer: A,C,F 

Explanation: 

Unlike firewall rules, which operate unilaterally, connection security rules require that both 

communicating computers have a policy with connection security rules or another 

compatible IPsec policy. 

Traffic that matches a firewall rule that uses the Allow connection if it is secure setting 

bypasses Windows Firewall. The rule can filter the traffic by IP address, port, or protocol. 

This method is supported on Windows Vista or Windows Server 2008. 

References: 

http://technet.microsoft.com/en-us/library/cc772017.aspx 

http://technet.microsoft.com/en-us/library/cc753463.aspx 


Q258. - (Topic 3) 

Your network contains multiple subnets. 

On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2. 

You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com. 

You need to ensure that client computers can resolve IP addresses to host names. 

What should you do first? 

A. Create a GlobalNames zone. 

B. Convert the contoso.com zone to an Active Directory-integrated zone. 

C. Configure dynamic updates for contoso.com. 

D. Create a reverse lookup zone. 

Answer:

Explanation: 

Use a reverse lookup zone to be able to resolve IP addresses to host names. 


Q259. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. 

Contoso.com has a Windows Server 2012 R2 domain controller, named ENSUREPASS-DC01, which has the Domain Naming master and the Schema master roles installed. Contoso.com also has a Windows Server 2008 R2 domain controller, named ENSUREPASS-DC02, which has the PDC Emulator, RID master, and Infrastructure master roles installed. 

You have deployed a new Windows Server 2012 server, which belongs to a workgroup, in Contoso.com’s perimeter network. 

You then executed the djoin.exe command. 

Which of the following is the purpose of the djoin.exe command? 

A. It sets up a computer account in a domain and requests an offline domain join when a computer restarts. 

B. It sets up a user account in a domain and requests an online domain join when a computer restarts. 

C. It sets up a computer account in a domain and requests an offline domain join immediately. 

D. It sets up a computer account in a domain and requests an online domain join immediately. 

Answer:


Q260. DRAG DROP - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You need to create a new volume on Server1. 

The new volume must have the following configurations: Be stored on a new virtual hard disk Be assigned the drive letter G Have the NTFS file system In which order should you run the Diskpart commands? 

To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the correct order. 

Answer: 



To know more about the Installing and Configuring Windows Server 2012, click here.