getcertified4sure.com

Quick Guide: mcsa 70 410




Proper study guides for Renewal Microsoft Installing and Configuring Windows Server 2012 certified begins with Microsoft microsoft 70 410 preparation products which designed to deliver the Accurate exam 70 410 pdf questions by making you pass the 70 410 installing and configuring windows server 2012 pdf test at your first time. Try the free 70 410 questions demo right now.

Q251. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 installed. 

You have been instructed to modify an Active Directory computer object. 

Which of the following actions should you take? 

A. You should consider making use of the Get-ADComputer Windows PowerShell cmdlet. 

B. You should consider making use of the Set-ADComputer Windows PowerShell cmdlet 

C. You should consider making use of the New-ADComputer Windows PowerShell cmdlet 

D. You should consider making use of the Get-ADComputerServiceAccount Windows PowerShell cmdlet 

Answer:

Explanation: 

Set-ADComputer – Modifies an Active Directory computer object. 


Q252. - (Topic 3) 

Server1 runs Windows Server 2012 R2 and is installed as an FTP server. Client uses App1 to connect to Server1 for FTP. App1 uses TCP port 21 for control and a dynamic port for data. You have allowed port 21 in firewall. What should you do next in order to allow clients to use App1 to connect to server1 using ftp. 

A. At Server1 allow firewall rule of outbound 

B. At Server1 allow firewall rule of inbound 

C. Netsh advfirewall domainprofile state off 

D. Netsh advfirewall set global StatefulFtp enable 

Answer:

Explanation: 

Set global statefulftp Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port. This affects both active and passive FTP. 


Q253. - (Topic 3) 

A company’s server security team needs a solution that will prevent users from installing and using unauthorized applications on their Windows 8 desktop computers. 

Which technology should the team choose? 

A. Starter GPOs 

B. Group Policy Objects 

C. Software Restriction Policies 

D. AppLocker 

Answer:

Explanation: 

AppLocker (Application Locker) can help prevent malicious (malware) and unsupported 

applications from affecting computers. These include executable files, scripts, Windows 

Installer files, DLLs, Packaged apps and Packaged app installers. 

Quick Tip: AppLocker is also supported by Windows Server 2008 R2 and Windows 7. 


Q254. - (Topic 2) 

You have a server that runs Windows Server 2012 R2. 

You need to create a volume that will remain online if two disks in the volume fail. 

The solution must minimize the number of disks used to create the volume. 

Which three actions should you perform in sequence? 

A. Add five physical disks 

B. Create a storage space and set the disk allocation of one of the disks to "Hot Spare" 

C. Create a virtual disk 

D. Create a storage space by using the default disk allocation 

E. Add three physical disks 

Answer: A,C,D 

Explanation: 

A storage space with three-way mirroring can tolerate two disk failures but requires a minimum of five disks. 

References: 

http://technet.microsoft.com/en-us/library/hh831739.aspx http://technet.microsoft.com/en-us/library/jj822938.aspx http://technet.microsoft.com/en-us/library/jj899886.aspx http://technet.microsoft.com/en-us/library/5de72fb5-e1e3-43a7-a176-d17cdf4d312e 


Q255. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing Group Policy preference. 

Which of the following is TRUE with regards to Group Policy preference? 

A. It supports applications and operating system features that are not compatible with Group Policy 

B. It does not support item-level targeting. 

C. It is the same as Group Policy filtering. 

D. It does not cause the application or operating system feature to disable the user interface for the settings they configure. 

Answer: A,D 


Q256. - (Topic 3) 

Your network contains an Active Directory forest that contains three domains. A group named Group1 is configured as a domain local distribution group in the forest root domain. You plan to grant Group1 read-only access to a shared folder named Share1. Share1 is located in a child domain. 

You need to ensure that the members of Group1 can access Share1. 

What should you do first? 

A. Convert Group1 to a global distribution group. 

B. Convert Group1 to a universal security group. 

C. Convert Group1 to a universal distribution group. 

D. Convert Group1 to a domain local security group 

Answer:


Q257. - (Topic 3) 

Which of the following groups do you use to consolidate groups and accounts that either span multiple domains or the entire forest? 

A. Global 

B. Domain local 

C. Built-in 

D. Universal 

Answer:

Explanation: 

A. Incorrect: Global groups cannot contain users from other domains. 

B. Incorrect: Domain local groups cannot have permissions for resources in other domains. 

C. Incorrect: Built-in groups have no inherent cross-domain qualities. 

D. Correct: Universal groups, like global groups, are used to organize users according to their resource access needs. You can use them to organize users to facilitate access to any resource located in any domain in the forest through the use of domain local groups. Universal groups are used to consolidate groups and accounts that either span multiple domains or the entire forest. 


Q258. - (Topic 3) 

Which of the following are the two built-in user accounts created automatically on a computer running Windows Server 2012 R2? 

A. Network 

B. Interactive 

C. Administrator 

D. Guest 

Answer: C,D 

Explanation: 

A. Incorrect: There is no Network account in Windows Server 2012 R2. 

B. Incorrect: There is no Interactive account in Windows Server 2012 R2. 

C. Correct: By default, the two built-in user accounts created on a computer running Windows Server 2012 are the Administrator account and the Guest account. 

D. Correct: By default, the two built-in user accounts created on a computer running Windows Server 2012 are the Administrator account and the Guest account. 


Q259. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

Contoso.com has a Hyper-V server, named ENSUREPASS-SR13, which hosts multiple virtual machines. 

You have enabled the use of Single-root I/O virtualization. 

Which of the following is TRUE with regards to using Single-root I/O virtualization? (Choose all that apply.) 

A. It maximizes network throughput, while minimizing network latency. 

B. It maximizes network throughput, as well as network latency. 

C. It avoids the virtual switch stack and allows the virtual machine direct access to the actual network switch. 

D. It prevents the virtual machine from accessing the network switch directly. 

Answer: A,C 

Explanation: 

SR-IOV enables network traffic to bypass the software switch layer of the Hyper-V virtualizationstack. Because the VF is assigned to a child partition, the network traffic flows directly between the VF and child partition. As a result, the I/O overhead in the software emulation layer is diminished and achieves network performance that is nearly the same performance as in nonvirtualized environments. 


Q260. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a single location named Site1. The domain contains a server named Server1 that has the DHCP Server server role installed. 

All client computers receive their IPv4 configurations dynamically. 

The domain will expand to include a second location named Site2. A server named Server2 will be deployed to Site2. Site1 and Site2 will connect to each other by using a WAN link. 

You need to ensure that the clients in both sites receive their IPv4 configurations from Server1. 

In the table below, identify which actions must be performed on each server. Make only one selection in each row. Each correct selection is worth one point. 

Answer: