Facts about 70 410 exam questions and answers pdf

It is more faster and easier to pass the Microsoft 70 410 exam questions exam by using High quality Microsoft Installing and Configuring Windows Server 2012 questuins and answers. Immediate access to the Up to the minute examcollection 70 410 Exam and find the same core area 70 410 pdf questions with professionally verified answers, then PASS your exam with a high score now.

Q61. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Web Server (US) server role installed. 

Server1 has a web site named Web1. Web1 is configured to use digest authentication. 

You need to ensure that a user named User1 can access Web1. 

What should you do from Active Directory Users and Computers? 

A. From the properties of User1, select Store password using reversible encryption. 

B. From the properties of User1, select Use Kerberos DES encryption types for this account. 

C. From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only). 

D. From the properties of Server1, assign the Allowed to Authenticate permission to User1. 

Answer:

Explanation: 

Challenge Handshake Authentication Protocol (CHAP) is a basic level of iSCSI security that is used to authenticate the peer of a connection and is based upon the peers sharing a secret: that secret being a password. To make sure that User1 can connect to the server, you should use Active Directory Users and Computers to store that password. 


Q62. HOTSPOT - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The network contains two subnets. The subnets are configured as shown in the following table. 

The network contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the DHCP Server server role installed. Server1 is configured to lease IP addresses to the two subnets. 

You add three new printers to the MainOffice subnet. The printers have static IP addresses. The IP addresses are consecutive. 

You need to create an exclusion range that contains the IP addresses of the printers. 

From which node should you configure the exclusion range? To answer, select the appropriate node in the answer area. 

Answer: 


Q63. - (Topic 3) 

On Server1, you plan to create an inbound firewall rule that contains the following settings: 

Allows inbound connections to an application named App1.exe 

Applies to the domain profile 

Overrides any block rules 

You need to identify the minimum information required to create the rule. 

Which two pieces of information should you identify? Each correct answer presents part of the solution. 

A. the list of computers that are authorized to use the application 

B. the list of Active Directory users who are authorized to use the application 

C. the hash of the application 

D. the name of the IPSec policies that apply to Server1 

E. the local path of the application 

Answer: A,E 


Q64. HOTSPOT - (Topic 1) 

You have a DHCP server named Server1 that runs Windows Server 2012 R2. On Server1, you run the commands as shown in the exhibit. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. 

Answer: 


Q65. - (Topic 3) 

Your network contains an Active Directory forest named contoso.com. The forest contains a child domain named europe.contoso.com. The europe.contoso.com child domain 

contains a server named Server1 that runs Windows Server 2012 R2. You install the DHCP Server server role on Server1. You have access to the administrative accounts shown in the following table. 

A. Admin1 

B. Admin2 

C. Admin3 

D. Admin4 

Answer:

Explanation: 

A. Local account can’t be used 

B. Authorization needs to happen in contoso.com and must be an Ent Admin 

C. Authorization needs to happen in contoso.com and must be an Ent Admin 

D. Correct domain and is a member of Ent Admin’s 


Q66. - (Topic 3) 

You have an existing Active Directory site named Site1. You create a new Active Directory site and name it Site2. You need to configure Active Directory replication between Site1 and Site2. You install a new domain controller. 

You create the site link between Site1 and Site2. 

What should you do next? 

A. Use the Active Directory Sites and Services console to configure a new site link bridge object. 

B. Use the Active Directory Sites and Services console to decrease the site link cost between Site1 and Site2. 

C. Use the Active Directory Sites and Services console to assign a new IP subnet to Site2. Move the new domain controller object to Site2. 

D. Use the Active Directory Sites and Services console to configure the new domain controller as a preferred bridgehead server for Site1. 

Answer:

Explanation: 

Inter-site Replication 

The process of creating a custom site link has five basic steps: 

1. Create the site link. 

2. Configure the site link’s associated attributes. 

3. Create site link bridges. 

4. Configure connection objects. (This step is optional.) 

5. Designate a preferred bridgehead server. (This step is optional) 


Q67. - (Topic 3) 

Your network contains one Active Directory domain named contoso.com. The domain contains 

2,000 client computers used by students. You recently discover an increase in calls to the helpdesk that relate to security policy to meet the following requirement: 

. Modify the UserName of the built-in account named Administrator . Support a time mismatch between client computers and domain controllers of up to three minutes. 

Which Two security settings should you modify? 

A. Account Policies 

B. Password Policy 

C. Account Lockout Policy 

D. Kerberos Policy 

E. Local Policies 

F. Audit Policy 

G. User Rights Assignment 

H. Security Options 

Answer: D,H 

Explanation: 

In Group Policy Object Editor, click Computer Configuration, click Windows Settings, click Security Settings, click Local Policies, and then click Security Options. In the details pane, double-click Accounts: Rename administrator account. 


Q68. - (Topic 3) 

You have a server named Server2 that runs Windows Server 2012 R2. You open Server Manager on Server2 as shown in the exhibit. (Click the Exhibit button.) The Everyone group has read share permission and read NTFS permission to Sources. 

You need to ensure that when users browse the network, the Sources share is not visible. 

What should you do? 

A. From the properties of the Sources folder, remove the Sources share, and then share the Sources folder as Sources$ B. From the properties of the Sources folder, deny the List Folder Contents permission for the Everyone group 

C. From the properties of the Sources share, configure access-based enumeration 

D. From the properties of the Sources folder, configure the hidden attribute 

Answer:


Q69. - (Topic 2) 

You have a server that runs Windows Server 2012 R2. 

The disks on the server are configured as shown in the exhibit. (Click the Exhibit button.) 

You need to create a storage pool that contains Disk 1 and Disk 2. What should you do first? 

A. Delete volume E 

B. Convert Disk 1 and Disk 2 to dynamic disks 

C. Convert Disk 1 and Disk 2 to GPT disks 

D. Create a volume on Disk 2 

Answer:

Explanation: 

A. Storage Pools use unallocated space There is no way to create a storage pool with existing data. Storage pools are only a collection of drives that are managed by windows. 


Q70. - (Topic 3) 

You have a Hyper-V host named Hyper1 that runs Windows Server 2012 R2. 

Hyper1 hosts several virtual machines that run Windows 8.1. 

Several developers connect to the virtual machines by using the Virtual Machine Connection tool. 

You need to ensure that the devlopers can print to their local printers from within virtual machine sessions. 

What should you configure? 

A. a virtual switch on Hyper1 

B. Remote Desktop Services (RDS) on Hyper1 

C. enhanced session mode on Hyper1 

D. a virtual network adapter on the virtual machines 

Answer:

Explanation: To be able to use a computer’s local resources on a virtual machine: 

* The Hyper-V host must have Enhanced session mode policy and Enhanced session mode settings turned on. 

* The computer that you use to connect to the virtual machine with VMConnect must run Windows 8, Windows 8.1, Windows Server 2012, or Windows Server 2012 R2. 

* The virtual machine must have Remote Desktop Services enabled and run Windows Server 2012 R2 or Windows 8.1 as the guest operating system. 

Reference: Use local resources on Hyper-V virtual machine with VMConnect 

https://technet.microsoft.com/en-us/library/dn282274.aspx 


Microsoft 70-410 Certification Sample Questions and Answers: https://www.braindumpsall.net/70-410-dumps/

P.S. New 70-410 dumps PDF: http://www.4easydumps.com/70-410-dumps-download.html