Exam Code: 70 410 dumps pdf (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Installing and Configuring Windows Server 2012
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass mcsa 70 410 Exam.
Q71. - (Topic 3)
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. Subsequent to deploying a Server Core Installation of Windows Server 2012 on a new Contoso.com server, you are instructed to add a graphical user interface (GUI) to the server.
You want to achieve this goal from the command prompt. Which of the following actions should you take?
A. You should consider making use of the dism.exe command.
B. You should consider making use of the dsquery.exe command.
C. You should consider making use of the dsadd.exe command.
D. You should consider making use of the dsrm.exe command.
A. Deployment Image Servicing and Management (DISM)
B. dsquery Queries the directory by using search criteria that you specify.
C. dsadd Adds specific types of objects to the directory.
D. dsrm Deletes an object of a specific type or any general object from the directory.
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr, PEImg, and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a more efficient and standardized way, eliminating the source of many of the frustrations experienced by current users of these tools. Dism /online /enable-feature /featurename:Server-Gui-Mgmt /featurename:Server-Gui-Shell /featurename:ServerCore-FullServer
Q72. - (Topic 1)
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that has the DNS Server server role installed. Server1 hosts a primary zone for contoso.com.
The domain contains a member server named Server2 that is configured to use Server1 as its primary DNS server.
From Server2, you run nslookup.exe as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that when you run Nslookup, the correct name of the default server is displayed.
What should you do?
A. On Server1, create a reverse lookup zone.
B. On Server1, modify the Security settings of the contoso.com zone.
C. From Advanced TCP/IP Settings on Server1, add contoso.com to the DNS suffix list.
D. From Advanced TCP/IP Settings on Server2, add contoso.com to the DNS suffix list.
Make sure that a reverse lookup zone that is authoritative for the PTR resource record
PTR records contain the information that is required for the server to perform reverse name
Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4:
Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6
Q73. DRAG DROP - (Topic 3)
Your network contains two Active Directory forests named adatum.com and contoso.com. Both forests contain multiple domains. A two-way trust exists between the forests.
The contoso.com domain contains a domain local security group named Group1. Group1 contains Contoso\\user1 and adatum\\user1.
You need to ensure that Group1 can only contain users from the contoso.com domain.
Which three actions should you perform?
To answer, move three actions from the list of actions to the answer area and arrange them
in the correct order.
Q74. - (Topic 1)
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
You create a security template named Template1 by using the security template snap-in.
You need to apply Template1 to Server2.
Which tool should you use?
A. Security Templates
B. Computer Management
C. Security Configuration and Analysis
D. System Configuration
A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer.
A. Template was already created – Provide standard security option to use in security policies
B. Needs to be applied at the GP level
C. Security templates are inactive until imported into a Group Policy object or the SecurityConfiguration and Analysis
D. Tool to ID windows problems
Q75. HOTSPOT - (Topic 3)
You have a DNS server named Server1. Server1 runs Windows Server 2012 R2. The network ID is 10.1.1.0/24. An administrator creates several reverse lookup zones. You need to identify which reverse lookup zone is configured correctly. Which zone should you identify? To answer, select the appropriate zone in the answer area.
Q76. - (Topic 2)
Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
You create a checkpoint of VM1, and then you install an application on VM1. You verify
that the application runs properly.
You need to ensure that the current state of VM1 is contained in a single virtual hard disk
The solution must minimize the amount of downtime on VM1.
What should you do?
A. From a command prompt, run dism.exe and specify the /delete-image parameter.
B. From a command prompt, run dism.exe and specify the /commit-image parameter.
C. From Hyper-V Manager, delete the checkpoint.
D. From Hyper-V Manager, inspect the virtual hard disk.
Q77. - (Topic 3)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
On Server1, an administrator creates a virtual machine named VM1.
A user named User1 is the member of the local Administrators group on Server1.
User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the
You need to ensure that User1 can modify the settings of VM1 by running the Set-Vm cmdlet.
What should you instruct User1 to do?
A. Import the Hyper-V module.
B. Install the Integration Services on VM1.
C. Run Windows PowerShell with elevated privileges.
D. Modify the membership of the local Hyper-V Administrators group.
You can only use the PowerShell snap-in to modify the VM settings with the vm cmdlets
when you are an Administrator.
Thus best practices dictate that User1 run the PowerShell with elevated privileges.
Q78. - (Topic 3)
Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012 R2.
A one-way external trust exists between contoso.com and adatum.com.
Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com.
What should you do?
A. Modify the Managed By settings of Group1.
B. Modify the Allowed to Authenticate permissions in adatum.com.
C. Change the type of Group1 to distribution.
D. Modify the name of Group1.
* Accounts that require access to the customer Active Directory will be granted a special right called Allowed to Authenticate. This right is then applied to computer objects (Active Directory domain controllers and AD RMS servers) within the customer Active Directory to which the account needs access.
* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest.
Q79. - (Topic 3)
Your network contains an Active Directory domain named adatum.com. The computer accounts for all member servers are located in an organizational unit (OU) named Servers. You link a Group Policy object (GPO) to the Servers OU.
You need to ensure that the domain’s Backup Operators group is a member of the local Backup Operators group on each member server. The solution must not remove any groups from the local Backup Operators groups.
What should you do?
A. Add a restricted group named adatum\\Backup Operators. Add Backup Operators to the This group is a member of list.
B. Add a restricted group named adatum\\Backup Operators. Add Backup Operators to the Members of this group list.
C. Add a restricted group named Backup Operators. Add adatum\\Backup Operators to the This group is a member of list.
D. Add a restricted group named Backup Operators. Add adatum\\Backup Operators to the Members of this group list.
Q80. - (Topic 2)
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You need to ensure that User1 can manage the group membership of Group1. The solution must minimize the number of permissions assigned to User1.
Which cmdlet should you run?
The Set-ADGroup cmdlet modifies the properties of an Active Directory group. You can modify commonly used property values by using the cmdlet parameters. For example, the –ManagedBy parameter allows you to specify a user or group of users who can manage the specified AD group.
Microsoft 70-410 Certification Sample Questions and Answers: https://www.braindumpsall.net/70-410-dumps/
P.S. New 70-410 dumps PDF: http://www.4easydumps.com/70-410-dumps-download.html