getcertified4sure.com

Foolproof exam 70-410 installing and configuring windows server 2012 pdf tips




Actualtests.com will be the most reputable supplier who provides you with the correct, original and also precise Microsoft 70-410 practice questions which with correct and also verified answers. Our professional This experts have rich expertise in writing your Microsoft real tests. Consequently, you can locate the valuable Microsoft 70-410 simulation tests with higher quality.

2021 Sep windows server 2012 study guide:

Q191. - (Topic 2) 

Your network contains an Active Directory forest named contoso.com. The forest contains five domains. All domain controllers run Windows Server 2012 R2. 

The contoso.com domain contains two user accounts named Admin1 and Admin2. 

You need to ensure that Admin1 and Admin2 can configure hardware and services on all of the member servers in the forest. The solution must minimize the number of privileges granted to Admin1 and Admin2. 

Which built-in groups should you use? 

A. Administrators local groups 

B. Administrators domain local groups 

C. Domain Admins global groups 

D. Server Operators global groups 

Answer: A 


Q192. HOTSPOT - (Topic 3) 

You have a server named Server1. Server1 runs Windows Server 2012 R2. 

A user named Admin1 is a member of the local Administrators group. 

You need to ensure that Admin1 receives a User Account Control (UAC) prompt when 

attempting to open Windows PowerShell as an administrator. 

Which setting should you modify from the Local Group Policy Editor? 

To answer, select the appropriate setting in the answer area. 


Answer: 



Q193. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table. 


You plan to create a snapshot of VM1. You need to recommend a solution to minimize the amount of disk space used for the snapshot of VM1. What should you do before you create the snapshot? 

A. Run the Stop-VM cmdlet. 

B. Run the Convert-VHD cmdlet. 

C. Decrease the Maximum RAM 

D. Decrease the Minimum RAM. 

Answer: A 

Explanation: 

What are virtual machine snapshots? 

Virtual machine snapshots capture the state, data, and hardware configuration of a running 

virtual machine. 

What are snapshots used for? 

Snapshots provide a fast and easy way to revert the virtual machine to a previous state. 

For this reason, virtual machine snapshots are intended mainly for use in development and 

test environments. Having an easy way to revert a virtual machine can be very useful if you 

need to recreate a specific state or condition so that you can troubleshoot a problem. 

There are certain circumstances in which it may make sense to use snapshots in a 

production environment. 

For example, you can use snapshots to provide a way to revert a potentially risky operation 

in a production environment, such as applying an update to the software running in the 

virtual machine. 

How are snapshots stored? 

Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly 

consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V 

in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located 

in the same folder as the virtual machine by default. In Hyper- V in Windows Server 2008 

R2, the files usually are located in the same folder as the virtual hard disk. The following 

exceptions affect the location of the snapshot data files: If the virtual machine was imported 

with snapshots, they are stored in their own folder. If the virtual machine has no snapshots 

and you configure the virtual machine snapshot setting, all snapshots you take afterwards 

will be stored in the folder you specify. 

http://technet.microsoft.com/pt-pt/library/dd560637%28v=ws.10%29.aspx 

Reducing the available RAM for the VM would reduce the size of the snapshot, what better 

than have the machine turn off, not using any memory. 


Q194. - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the 

installation fails repeatedly. 

You need to ensure that the feature can be installed on Server1. 

What should you do? 

A. Run the Add-AppxProvisionedPackage cmdlet. 

B. Disable User Account Control (UAC). 

C. Connect Server1 to the Internet. 

D. Remove the .NET Framework 4.5 Features feature. 

Answer: C 


Q195. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. 

All client computers run Windows 8. 

You deploy a server named Server1 that runs Windows Server 2012 R2. 

You install a new client-server application named App1 on Server1 and on the client 

computers. The client computers must use TCP port 6444 to connect to App1 on Server1.Server1 publishes the information of App1 to an intranet server named Server2 by using TCP port 3080. 

You need to ensure that all of the client computers can connect to App1. The solution must 

ensure that the application can connect to Server2. 

Which Windows Firewall rule should you create on Server1? 

A. an inbound rule to allow a connection to TCP port 3080 

B. an outbound rule to allow a connection to TCP port 3080 

C. an outbound rule to allow a connection to TCP port 6444 

D. an inbound rule to allow a connection to TCP port 6444 

Answer: D 

Explanation: 

A. Server2 needs inbound on 3080. 

B. All ports outbound allowed by default. 

D. Server1 gets request from Client PC’s it needs an inbound rule for 6444. By default, Windows Firewall with Advanced Security blocks all unsolicited inbound network traffic, and allows all outbound network traffic. For unsolicited inbound network traffic to reach your computer, you must create an allow rule to permit that type of network traffic. If a network program cannot get access, verify that in the Windows Firewall with Advanced Security snap-in there is an active allow rule for the current profile. To verify that there is an active allow rule, double-click Monitoring and then click Firewall. If there is no active allow rule for the program, go to the Inbound Rules node and create a new rule for that program. Create either a program rule, or a service rule, or search for a group that applies to the feature and make sure all the rules in the group are enabled. To permit the traffic, you must create a rule for the program that needs to listen for that traffic. If you know the TCP or UDP port numbers required by the program, you can additionally restrict the rule to only those ports, reducing the vulnerability of opening up all ports for the program. 


70-410 question

Replace 70-410 installing and configuring windows server 2012 pdf:

Q196. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

You create an external virtual switch named Switch1. Switch1 has the following configurations: 

Connection type: External network 

Single-root I/O virtualization (SR-IOV): Enabled 

Ten virtual machines connect to Switch1. 

You need to ensure that all of the virtual machines that connect to Switch1 are isolated from the external network and can connect to each other only. The solution must minimize network downtime for the virtual machines. 

What should you do? 

A. Remove Switch1 and recreate Switch1 as an internal network. 

B. Change the Connection type of Switch1 to Private network. 

C. Change the Connection type of Switch1 to Internal network. 

D. Remove Switch1 and recreate Switch1 as a private network. 

Answer: D 

Explanation: 

You cannot change the type of vswitch from external to private when SR-IOV is enabled at vswitch creation ->you need to recreate the vswitch. 


Q197. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. 

The domain contains a user named User1 and a global security group named Group1. 

You need to prevent User1 from changing his password. The solution must minimize administrative effort. 

Which cmdlet should you run? 

A. Add-AdPrincipalGroupMembership 

B. Install-AddsDomainController 

C. Install-WindowsFeature 

D. Install-AddsDomain 

E. Rename-AdObject 

F. Set-AdAccountControl 

G. Set-AdGroup 

H. Set-User 

Answer: F 

Explanation: 

The Set-ADAccountControlcmdlet modifies the user account control (UAC) values for an Active Directory user or computer account. UAC values are represented by cmdlet parameters. CannotChangePassword Modifies the ability of an account to change its password. To disallow password change by the account set this to $true. This parameter changes the Boolean value of the CannotChangePassword property of an account. The following example shows how to specify the PasswordCannotChange parameter. -CannotChangePassword $false 

References: 

http://technet.microsoft.com/en-us/library/ee617249.aspx http://technet.microsoft.com/en-us/library/hh974723.aspx http://technet.microsoft.com/en-us/library/hh974722.aspx 


Q198. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1. 

Which tool should you use? 

A. File Server Resource Manager (FSRM) 

B. New-StoragePool 

C. Diskpart 

D. Share and Storage Management 

Answer: C 

Explanation: 

You can create a VHD from either the Disk Management snap-in or the command line (diskpart). From the DiskPart command-line tool at an elevated command prompt, run the create vdisk command and specify the file (to name the file) and maximum (to set the maximum size in megabytes) parameters. The following code demonstrates how to create a VHD file at C:\vdisks\disk1.vdh with a maximum file size of 16 GB (or 16,000 MB). DiskPart Microsoft DiskPart version 6.1.7100 Copyright (C) 1999-2008 Microsoft Corporation. On computer: WIN7 DISKPART> create vdisk file="C:\vdisks\disk1.vhd" maximum=16000 


Q199. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. You need to create a script that will create and mount a virtual hard disk. Which tool should you use? 

A. diskpart.exe 

B. vdsldr.exe 

C. fsutil.exe 

D. vds.exe 

Answer: A 


Q200. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server 2012. You create a group Managed Service Account named gservice1. You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1? 

A. From a command prompt, run sc.exe and specify the config parameter. 

B. From Windows PowerShell,run Set-Service and specify the -PassThrough parameter 

C. From Windows PowerShell,run Set-Service and specify the -StartupType parameter 

D. From Services Console configure the General settings 

Answer: A