Exam 70-410 is easily the most valued and needed exam in IT arena. To this unique train exam 70-410 is just not really easy though with our own guidance you are going to obvious 70-410 in a really first option. The good qualities who wants to possibly be competent inside their domains and also have a new choose to attain along at the top for capability and being successful they use diverse accreditation examinations this is why. Perform examinations 70-410 will be authentic qualifications in which warranty the employers youre highly skilled, skilled, and continuous.
Q11. - (Topic 3)
Your network contains a domain controller that is configured as a DNS server. The server hosts an Active Directory-integrated zone for the domain.
You need to reduce how long it takes until stale records are deleted from the zone. What should you do?
A. From the configuration directory partition of the forest, modify the tombstone lifetime.
B. From the configuration directory partition of the forest, modify the garbage collection interval.
C. From the aging properties of the zone, modify the no-refresh interval and the refresh interval.
D. From the start of authority (SOA) record of the zone, modify the refresh interval and the expire interval.
Answer: C
Explanation:
Scavenging automates the deletion of old records. When scavenging is enabled, then you should also change the no-refresh and refresh intervals of the aging properties of the zone else it may take too long for stale records to be deleted and the size of the DNS database can become large and have an adverse effect on performance.
Q12. - (Topic 3)
Your network contains an Active Directory forest that contains three domains. A group named Group1 is configured as a domain local distribution group in the forest root domain. You plan to grant Group1 read-only access to a shared folder named Share1. Share1 is located in a child domain.
You need to ensure that the members of Group1 can access Share1.
What should you do first?
A. Convert Group1 to a global distribution group.
B. Convert Group1 to a universal security group.
C. Convert Group1 to a universal distribution group.
D. Convert Group1 to a domain local security group
Answer: B
Q13. - (Topic 3)
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed.
Contoso.com has a server, named ENSUREPASS-SR07, which has the AD DS, DHCP, and DNS server roles installed. Contoso.com also has a server, named ENSUREPASS-SR08, which has the DHCP, and Remote Access server roles installed. You have configured a server, which has the File and Storage Services server role installed, to automatically acquire an IP address.
The server is named ENSUREPASS-SR09. You then create a filter on ENSUREPASS-SR07.
Which of the following is a reason for this configuration?
A. To make sure that ENSUREPASS-SR07 issues ENSUREPASS-SR09 an IP address.
B. To make sure that ENSUREPASS-SR07 does not issue ENSUREPASS-SR09 an IP address.
C. To make sure that ENSUREPASS-SR09 acquires a constant IP address from ENSUREPASS-SR08 only.
D. To make sure that ENSUREPASS-SR09 is configured with a static IP address.
Answer: B
Q14. DRAG DROP - (Topic 3)
You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 hosts a virtual machine named VM1. VM1 is currently running. VM1 has a snapshot that was created two weeks ago.
You plan to use Server2 to perform a forensic analysis of the contents of the disk of VM1 from two weeks ago.
You need to ensure that you can view the contents of the disk of VM1 from two weeks ago from Server2.
Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q15. - (Topic 3)
Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy.
You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed.
You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent Server1 from attempting to resolve Internet host names for the client computers.
What should you do on Server1?
A. Create a primary zone named “.”.
B. Configure the Security settings of the contoso.com zone.
C. Create a zone delegation for GlobalNames.contoso.com.
D. Create a stub zone named “root”.
Answer: A
Explanation:
When you install DNS on a Windows server that does not have a connection to the Internet, the zone for the domain is created and a root zone, also known as a dot zone, is also created. This root zone may prevent access to the Internet for DNS and for clients of the DNS. If there is a root zone, there are no other zones other than those that are listed with DNS, and you cannot configure forwarders or root hint servers. Root domain This is the top of the tree, representing an unnamed level; it is sometimes shown as two empty quotation marks (“”), indicating a null value. When used in a DNS domain name, it is stated by a trailing period (.) to designate that the name is located at the root or highest level of the domain hierarchy. In this instance, the DNS domain name is considered to be complete and points to an exact location in the tree of names. Names stated this way are called fully qualified domain names (FQDNs). DNS Domain Name Hierarchy:
Q16. - (Topic 3)
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed.
You are running a training exercise for junior administrators. You are currently discussing spanned volumes.
Which of the following is TRUE with regards to spanned volumes? (Choose all that apply.)
A. Spanned volumes do not provide fault tolerance.
B. Spanned volumes are a fault tolerant solution.
C. You can extend a spanned volume onto a maximum of 16 dynamic disks.
D. You cannot create a spanned volume using a system volume or boot volume.
Answer: A,D
Explanation:
A spanned volume is a dynamic volume consisting of disk space on more than one physical disk. If a simple volume is not a system volume or boot volume, you can extend it across additional disks (up to 32 total) to create a spanned volume, or you can create a spanned volume in unallocated space on a dynamic disk. You need at least two dynamic disks in addition to the startup disk to create a spanned volume. You can extend a spanned volume onto a maximum of 32 dynamic disks. Spanned volumes are not fault tolerant.
Q17. DRAG DROP - (Topic 2)
You have a server named Server1 that runs Windows Server 2012 R2.
You add a new internal SAS disk to Server1.
You need to ensure that the new disk is available to store files.
Which three cmdlets should you run in sequence?
To answer, move the appropriate three cmdlets from the list of cmdlets to the answer area
and arrange them in the correct order.
Answer:
Q18. - (Topic 2)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2.
You need to ensure that a user named User1 can install Windows features on VM1. The solution must minimize the number of permissions assigned to User1.
To which group should you add User1?
A. Hyper-V Administrators on Server1
B. Administrators on VM1
C. Server Operators on Server1
D. Power Users on VM1
Answer: B
Explanation:
The user has to be an administrator on VM1 to be able to install features.
In Windows Server 2012 R2, the Server Manager console and Windows PowerShell-cmdlets for
Server Manager allow installation of roles and features to local or remote servers, or offline
virtual hard disks (VHDs).
You can install multiple roles and features on a single remote server or offline VHD in a
single Add Roles and Features Wizard or Windows PowerShell session. You must be
logged on to a server as an administrator to install or uninstall roles, role services, and
features. If you are logged on to the local computer with an account that does not have
administrator rights on your target server, right-click the target server in the Servers tile,
and then click Manage As to provide an account that has administrator rights. The server
on which you want to mount an offline VHD must be added to Server Manager, and you
must have Administrator rights on that server.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 10:
Implementing Group Policy, p.539
Q19. HOTSPOT - (Topic 3)
Your network contains an Active Directory domain named fabrikam.com. You implement DirectAccess and an IKEv2 VPN.
You need to view the properties of the VPN connection.
Which connection properties should you view? To answer, select the appropriate connection properties in the answer area.
Answer:
Q20. HOTSPOT - (Topic 3)
You have a server named Server1 that runs Windows Server 2012 R2.
Several users are members of the local Administrators group.
You need to ensure that all local administrators receive User Account Control (UAC)
prompts when they run a Microsoft Management Console (MMC).
Which settings should you modify from the Local Security Policy? To answer, select the
appropriate settings in the answer area.
Answer: