Vivid Microsoft 70-410 Interactive Bootcamp

It is more faster and easier to pass the Microsoft 70-410 exam by using Downloadable Microsoft Installing and Configuring Windows Server 2012 questuins and answers. Immediate access to the Most up-to-date 70-410 Exam and find the same core area 70-410 questions with professionally verified answers, then PASS your exam with a high score now.

Page: 1 / 42
Total 505 questions Full Exam Access
Question 1
- (Topic 1)
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.
70-410 dumps exhibit
You plan to schedule a complete backup of Server1 by using Windows Server Backup. You need to ensure that the state of VM1 is saved before the backup starts.
What should you configure?
My answer: -
Reference answer: I
Reference analysis:

The Integration Services settings on virtual machines include services such as operating system shutdown, time synchronization, data exchange, Heartbeat, and Backup (volume snapshot services). This snapshot will ensure that the state of VM1 is saved prior to backup.
References: http://msdn.microsoft.com/en-us/library/dd405549(v=vs.85).aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3:
Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144

Question 2
- (Topic 2)
You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.
You need to add a graphical user interface (GUI) to Server1. Which tool should you use?
My answer: -
Reference answer: B
Reference analysis:

The DISM command is called by the Add-WindowsFeature command. Here is the systax for DISM:
Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:ServerGui- Shell /featurename:Server-Gui-Mgmt

Question 3
- (Topic 2)
Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy.
You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed.
You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent Server1 from attempting to resolve Internet host names for the client
computers.
What should you do on Server1?
My answer: -
Reference answer: A
Reference analysis:

None

Question 4
- (Topic 1)
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 R2. You need to create a 3-TB virtual hard disk (VHD) on Server1.
Which tool should you use?
My answer: -
Reference answer: B
Reference analysis:

You can create a VHD from either the Disk Management snap-in or the command line (diskpart).
From the DiskPart command-line tool at an elevated command prompt, run the create vdisk command and specify the file (to name the file) and maximum (to set the maximum size in megabytes) parameters. The following code demonstrates how to create a VHD file at C:\\vdisks\\disk1.vdh with a maximum file size of 16 GB (or 16,000 MB).
DiskPart
Microsoft DiskPart version 6.1.7100
Copyright (C) 1999-2008 Microsoft Corporation. On computer: WIN7
DISKPART> create vdisk file="C:\\vdisks\\disk1.vhd" maximum=16000

Question 5
- (Topic 2)
Your network contains an Active Directory forest named contoso.com. The forest contains five domains. All domain controllers run Windows Server 2012 R2.
The contoso.com domain contains two user accounts named Admin1 and Admin2.
You need to ensure that Admin1 and Admin2 can configure hardware and services on all of the member servers in the forest. The solution must minimize the number of privileges granted to Admin1 and Admin2.
Which built-in groups should you use?
My answer: -
Reference answer: A
Reference analysis:

None

Question 6
DRAG DROP - (Topic 4)
You plan to deploy a DHCP server that will support four subnets. The subnets will be configured as shown in the following table:
70-410 dumps exhibit
You need to identify which network ID you should use for each subnet. What should you identify? To answer, drag the appropriate network ID to the each subnet in the answer area.
70-410 dumps exhibit
Solution:
70-410 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 7
- (Topic 4)
You only want to share a printer with Group1, administrators, central owner and operators (pick 2 answers).
My answer: -
Reference answer: A
Reference analysis:

None

Question 8
- (Topic 2)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. The domain contains a standalone server named Server2 that is located in a perimeter network. Both servers run the default installation of Windows Server 2012 R2.
You need to manage Server2 remotely from Server1. What should you do?
My answer: -
Reference answer: D
Reference analysis:

None

Question 9
HOTSPOT - (Topic 1)
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 40 virtual machines that run Windows Server 2008 R2. The virtual machines connect to a private virtual switch.
You have a file that you want to copy to all of the virtual machines.
You need to identify to which servers you can copy files by using the Copy-VmFile cmdlet. What command should you run? To answer, select the appropriate options in the answer
area.
70-410 dumps exhibit
70-410 dumps exhibit
Solution:
70-410 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 10
- (Topic 5)
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.
The domain contains an administrator account named Admin1.
You need to prevent Admin1 from creating more than 100 objects in the domain partition. Which tool should you use?
My answer: -
Reference answer: D
Reference analysis:

Active Directory quotas are limits on the number of objects that a security principal (that has been delegated the Create Child Objects or Delete Child Objects permission) can own and create.
To assign a quota to a security principal, you must use the directory services tools. The command and required parameters for assigning a quota to a security principal are as follows:
dsadd quota –part <partition distinguished name> –qlimit <quotalimit> –acct <security prinicipal>
Reference: Active Directory Quotas https://technet.microsoft.com/en-us/library/cc904295(v=ws.10).aspx

Question 11
- (Topic 1)
Your network contains an Active Directory domain named contoso.com. You have a DHCP server named Server1 that runs Windows Server 2008.
You install Windows Server 2012 R2 on a server named Server2. You install the DHCP Server server role on Server2.
You need to migrate the DHCP services from Server1 to Server2. The solution must meet the following requirements:
✑ Ensure that existing leases are migrated.
✑ Prevent lease conflicts.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
My answer: -
Reference answer: ABE
Reference analysis:

None

Question 12
- (Topic 2)
Your network contains an Active Directory domain named contoso.com.
An administrator provides you with a file that contains the information to create user accounts for 200 temporary employees. The file is shown in the exhibit. (Click the Exhibit button.)
70-410 dumps exhibit
70-410 dumps exhibit
You need to automate the creation of the user accounts. You must achieve this goal by using the minimum amount of administrative effort.
Which tool should you use?
My answer: -
Reference answer: B
Reference analysis:

csvde – Imports and exports data from Active Directory Domain Services (AD DS) using files that store data in the comma-separated value (CSV) format. You can also support batch operations based on the CSV file format standard.
Net user – Adds or modifies user accounts, or displays user account information.
Ldifde – Creates, modifies, and deletes directory objects. You can also use ldifde to extend the schema, export Active Directory user and group information to other applications or services, and populate Active Directory Domain Services (AD DS) with data from other directory services.
Dsadd – Adds specific types of objects to the directory.
csvde.exe is the best option to add multiple users. As you just need to export the excel spreadsheet as a .csv file and make sure the parameters are correct.
You can use Csvde to import and export Active Directory data that uses the comma- separated value format.
Use a spreadsheet program such as Microsoft Excel to open this .csv file and view the header and value information.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 5: Install and administer Active Directory, Objective 5.2: Create and Manage Active Directory Users and Computers, p. 269

Question 13
HOTSPOT - (Topic 5)
Your network contains an Active Directory domain named contoso.com. The domain contains 25 servers. All servers run Windows Server 2012 R2.
You need to create a Windows Firewall rule to prevent administrators from connecting to Remote Assistance requests while they are logged on interactively to the servers.
How should you configure the rule?
To answer, select the appropriate options in the answer area.
70-410 dumps exhibit
Solution:
70-410 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 14
HOTSPOT - (Topic 3)
Your network contains a domain controller named dc5.adatum.com that runs Windows Server 2012 R2.
You discover that you can connect successfully to DC5 over the network, but you receive a request timed out message when you attempt to ping DC5.
You need to configure DC5 to respond to ping request.
Which firewall rule should you modify on DC5? To answer, select the appropriate rule in the answer area.
70-410 dumps exhibit
Solution:
70-410 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 15
HOTSPOT - (Topic 3)
Your network contains an Active Directory domain named contoso.com.
Technicians use Windows Deployment Services (WDS) to deploy Windows Server 2012 R2.
The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
You need to ensure that you can use WDS to deploy Windows Server 2012 R2 to a virtual machine named VM1.
Which settings should you configure?
To answer, select the appropriate settings in the answer area.
70-410 dumps exhibit
Solution:
WDS Allows network-based installation of Windows operating systems, which reduces the complexity and cost when compared to manual installations. Thus you should configure the appropriate network settings.

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 16
- (Topic 5)
Your network contains an Active Directory domain named contoso.com. The domain contains two standalone servers named Serverl and Server2 that are located in a perimeter network. Both servers run the default installation of Windows Server 2012 R2.
You need to manage Serverl remotely from Server2. What should you do?
My answer: -
Reference answer: C
Reference analysis:

For remote connections in a Workgroup to Workgroup/Domain scenario, the
remote computer (here Server2) must be added to the trusted hosts list on the source computer (here Server1). To do this, run the following command on the source computer in a Command Prompt window that is opened with elevated user rights.
winrm set winrm/config/client @{TrustedHosts="RemoteComputerName"}
Note: TrustedHosts is a setting on the local computer that defines one or more computers that are trusted when establishing remoting sessions using WinRM from the local computer using either ENTER-PSSESSION or INVOKE-COMMAND.
Reference: Remote Management with Server Manager https://technet.microsoft.com/en-us/library/dd759202.aspx

Question 17
HOTSPOT - (Topic 1)
You have a Hyper-V host named Hyperv1 that runs Windows Server 2012 R2. Hyperv1 hosts a virtual machine named Server1. Server1 uses a disk named Server1.vhdx that is stored locally on Hyperv1.
You stop Server1, and then you move Server1.vhdx to an iSCSI target that is located on another server.
You need to configure Server1 to meet the following requirements:
✑ Ensure that Server1 can start by using Server1.vhdx.
✑ Prevent Server1.vhdx from consuming more than 500 IOPS on the iSCSI target.
Which two objects should you configure? To answer, select the appropriate two objects in the answer area.
70-410 dumps exhibit
Solution:
70-410 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 18
- (Topic 1)
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All servers run Windows Server 2012 R2. The domain contains two domain controllers named DC1 and DC2. Both domain controllers are virtual machines on a Hyper-V host.
You plan to create a cloned domain controller named DC3 from an image of DC1. You need to ensure that you can clone DC1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
My answer: -
Reference answer: AB
Reference analysis:

A. Cloneable Domain Controllers Group There’s a new group in town. It’s called Cloneable Domain Controllers and you can find it in the Users container. Membership in this group
dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn’t be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete. Cloned DCs will also end up in the Cloneable Domain Controllers group.
B. DCCloneConfig.xml
There’s one key difference between a cloned DC and a DC that is being restored to a previous snapshot:
DCCloneConfig.XML.
DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways.
The New-ADDCCloneConfigcmdlet in PowerShell By hand with an XML editor
By editing an existing config file, again with an XML editor.
Reference: Virtual Domain Controller Cloning in Windows Server 2012.

Question 19
HOTSPOT - (Topic 2)
You deploy a Server with a GUI installation of Windows Server 2012 R2 Datacenter. From Windows PowerShell, you run the following command:
Remove-WindowsFeature Server-Gui-Shell.
In the table below, identify which tools are available on Server1 and which tools are unavailable on Server1.
Make only one selection in each row. Each correct selection is worth one point.
70-410 dumps exhibit
Solution:
When you uninstall "Server-GUI-Shell" you are left with a "Minimal Server Interface" server. So, File Explorer and IE10 are unavailable, but MMC and Server Manager work.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 2: Deploying Servers, p.44
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 1: Installing and Configuring Servers, p.19-22

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 20
- (Topic 1)
Your network contains an Active Directory forest named contoso.com. All domain controllers currently run Windows Server 2008 R2.
You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2.
The new domain controller will have the following configurations:
✑ Schema master
✑ Global catalog server
✑ Active Directory Federation Services server role
✑ Active Directory Certificate Services server role
You need to identify which configuration can be fulfilled by using the Active Directory Domain Services Configuration Wizard.
Which configuration should you identify?
My answer: -
Reference answer: A
Reference analysis:

None

Question 21
HOTSPOT - (Topic 2)
You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a folder named Folder1.
70-410 dumps exhibit
A user named User1 is a member of Group1 and Group2. A user named User2 is a member of Group2 and Group3.
You need to identify which actions the users can perform when they access the files in Share1.
What should you identify?
To answer, select the appropriate actions for each user in the answer area.
70-410 dumps exhibit
Solution:
70-410 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 22
- (Topic 1)
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
You create a security template named Template1 by using the security template snap-in. You need to apply Template1 to Server2.
Which tool should you use?
My answer: -
Reference answer: C
Reference analysis:

A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer.
A. Template was already created – Provide standard security option to use in security policies
B. Needs to be applied at the GP level
C. Security templates are inactive until imported into a Group Policy object or the SecurityConfiguration and Analysis
D. Tool to ID windows problems

Question 23
DRAG DROP - (Topic 3)
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1. All servers in the domain run Windows Server 2012 R2.
You need to create a new volume on File1.
The new volume must have the following configurations:
✑ Have the drive letter T
✑ Have the FAT32 file system
✑ Be stored on a new virtual hard disk
In which order should you run the Diskpart commands?
To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the correct order.
70-410 dumps exhibit
Solution:
Box 1: create vdisk Box 2: attach vdisk Box 3: create partition Box 4: assign
Box 5: format
Note: Example:
createvdisk file="C:\vdisks\disk1.vhd" maximum=16000 attachvdisk
create partition primary assign letter=g
format
References:
http://technet.microsoft.com/en-us/library/gg252576.aspx http://technet.microsoft.com/en-us/library/hh831487.aspx

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 24
HOTSPOT - (Topic 5)
Your network contains an Active Directory domain named fabrikam.com. You implement DirectAccess and an IKEv2 VPN.
You need to view the properties of the VPN connection.
Which connection properties should you view? To answer, select the appropriate connection properties in the answer area.
70-410 dumps exhibit
Solution:
WorkPlace Connection

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 25
- (Topic 4)
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing the Virtual Fibre Channel SAN feature.
Which of the following is TRUE with regards to the Virtual Fibre Channel SAN feature? (Choose all that apply.)
My answer: -
Reference answer: BC
Reference analysis:

To gain the full benefits of server virtualization and cloud architectures, virtualized workloads need to connect easily and reliably to existing SANs. For many enterprise organizations, Hyper-V deployments were limited in scale and scope because they lacked the ability to directly connect VMs to Fibre Channel SAN storage from inside a VM. Hyper- V in Windows Server 2012 R2 now provides virtual Fibre Channel Host Bus Adapter (HBA) ports within the guest operating system that runs the virtual machine, connecting virtual machines directly to FibreChannel SAN Logical Unit Numbers (LUNs).
Virtual Fibre Channel for Hyper-V provides several important advantages for Hyper-V environments:
Simplifies storage connectivity for virtualized workloads to ultra-reliable, high-performance Fibre Channel SAN storage.
Enables new solutions that require shared storage, such as failover clustering, live migration, andmultipath I/O.
Leverages and protects existing investments in Fibre Channel storage? Enables advanced FC SAN storage functionality for VMs.
Facilitates migration of FC workloads into the cloud.
Enables improved monitoring and troubleshooting, with visibility from the VM to the FC SAN storage.
Enables centralized management of Ethernet and FC-based virtualized workloads. Combining Virtual Fibre Channel for Hyper-V and the Brocade Fibre Channel SAN infrastructure greatly simplifies connectivity between Fibre Channel SAN storage and virtualized applications, enabling enterprise IT and hosting providers to achieve new levels of availability, reliability, and scalability for cloud-based services.
You need your virtualized workloads to connect easily and reliably to your existing storage arrays. Windows Server 2012 R2 provides Fibre Channel ports within the guest operating system, which allows you to connect to Fibre Channel directly from within virtual machines. This feature protects your investments in Fibre Channel, enables you to virtualize workloads that use direct access to Fibre Channel storage, allows you to cluster guest operating systems over Fibre Channel, and provides an important new storage option for servers hosted in your virtualization infrastructure.
With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre Channel storage from within a virtual machine. This allows you to use your existing Fibre Channel investments to support virtualized workloads.
Support for Fibre Channel in Hyper-V guests also includes support for many related features, such as virtual SANs, live migration, and MPIO.

Question 26
- (Topic 5)
In a domain running at the Windows Server 2012 R2 domain functional level, which of the following security principals can be members of a global group? (Choose all answers that are correct.)
My answer: -
Reference answer: ABD
Reference analysis:

\\A. Correct: Users can be security principals in a global group.
\\B. Correct: Computers can be security principals in a global group.
\\C. Incorrect: Universal groups cannot be security principals in a global group.
\\D. Correct: Global group can be security principals in a global group.

Question 27
HOTSPOT - (Topic 1)
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.
You need to add a user named User1 to a group named ServerAdmins.
What command should you run? To answer, select the appropriate options in the answer area.
70-410 dumps exhibit
70-410 dumps exhibit
Solution:
70-410 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 28
- (Topic 5)
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed.
You are running a training exercise for junior administrators. You are currently discussing spanned volumes.
Which of the following is TRUE with regards to spanned volumes? (Choose all that apply.)
My answer: -
Reference answer: AD
Reference analysis:

A spanned volume is a dynamic volume consisting of disk space on more than one physical disk. If a simple volume is not a system volume or boot volume, you can extend it across additional disks (up to 32 total) to create a spanned volume, or you can create a spanned volume in unallocated space on a dynamic disk.
You need at least two dynamic disks in addition to the startup disk to create a spanned volume. You can extend a spanned volume onto a maximum of 32 dynamic disks. Spanned volumes are not fault tolerant.

Question 29
- (Topic 5)
You have a Hyper-V host named server1 that runs windows server 2012 R2. Server1 host 50 virtual machines that run Windows Server 2012 R2.
You enable and configure enhanced session mode on Server1.
You need to identify a new functionality available for the virtual machines hosted on server1.
What should you identify?
My answer: -
Reference answer: B
Reference analysis:

None

Page: 1 / 42
Total 505 questions Full Exam Access