Proper study guides for Up to date Microsoft Installing and Configuring Windows Server 2012 certified begins with Microsoft 70 410 exam questions pdf preparation products which designed to deliver the Actual 70 410 exam questions and answers pdf questions by making you pass the 70 410 installing and configuring windows server 2012 r2 test at your first time. Try the free 70 410 installing and configuring windows server 2012 demo right now.
Q41. - (Topic 3)
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed.
You have received instructions to install the Remote Desktop Services server role on a server, named ENSUREPASS-SR07. You want to achieve this remotely from a server, named ENSUREPASS-SR06.
Which of the following actions should you take?
A. You should consider accessing the Server Manager console on ENSUREPASS-SR07.
B. You should consider accessing the Server Manager console on ENSUREPASS-SR06.
C. You should consider accessing the TS Manager console on ENSUREPASS-SR07
D. You should consider accessing the TS Manager console on ENSUREPASS-SR06.
Answer: B
Q42. - (Topic 1)
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
You create a security template named Template1 by using the security template snap-in.
You need to apply Template1 to Server2.
Which tool should you use?
A. Security Templates
B. Computer Management
C. Security Configuration and Analysis
D. System Configuration
Answer: C
Explanation:
A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer.
A. Template was already created – Provide standard security option to use in security policies
B. Needs to be applied at the GP level
C. Security templates are inactive until imported into a Group Policy object or the SecurityConfiguration and Analysis
D. Tool to ID windows problems
Q43. - (Topic 2)
Your network contains an Active Directory domain named contoso.com.
An administrator provides you with a file that contains the information to create user accounts for 200 temporary employees. The file is shown in the exhibit. (Click the Exhibit button.)
You need to automate the creation of the user accounts. You must achieve this goal by using the minimum amount of administrative effort.
Which tool should you use?
A. Ldifde
B. csvde
C. Dsadd
D. Net user
Answer: B
Explanation:
csvde – Imports and exports data from Active Directory Domain Services (AD DS) using files that store data in the comma-separated value (CSV) format. You can also support batch operations based on the CSV file format standard. Net user – Adds or modifies user accounts, or displays user account information. Ldifde – Creates, modifies, and deletes directory objects. You can also use ldifde to extend the schema, export Active Directory user and group information to other applications or services, and populate Active Directory Domain Services (AD DS) with data from other directory services. Dsadd – Adds specific types of objects to the directory.
csvde.exe is the best option to add multiple users. As you just need to export the excel
spreadsheet as a .csv file and make sure the parameters are correct.
You can use Csvde to import and export Active Directory data that uses the comma-
separated value format.
Use a spreadsheet program such as Microsoft Excel to open this .csv file and view the
header and value information.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 5: Install
and administer Active Directory, Objective 5.2: Create and Manage Active Directory Users
and Computers, p. 269
Q44. - (Topic 1)
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. A server named Server1 is configured to encrypt all traffic by using IPSec.
You need to ensure that Server1 can respond to ping requests from computers that do not support IPSec.
What should you do?
A. From a command prompt, run netsh set global
autotuninglevel = highlyrestrictedcongestionprovider=none.
B. From a command prompt, run netsh set global autotuninglevel = restricted congestionprovider = ctcp.
C. From Windows Firewall with Advanced Security, allow unicast responses for the Domain Profile.
D. From Windows Firewall with Advanced Security, exempt ICMP from IPSec.
Answer: D
Q45. - (Topic 3)
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.
Contoso.com has a server, named ENSUREPASS-SR07, which has two physical disks installed. The C: drive hosts the boot partition, while the D: drive is not being used. Both disks are online.
You have received instructions to create a virtual machine on ENSUREPASS-SR07. Subsequent to creating the virtual machine, you have to connect the D: drive to the virtual machine.
Which of the following is TRUE with regards to connecting a physical disk to a virtual machine?
A. The physical disk should not be online.
B. The physical disk should be uninstalled and re-installed.
C. The physical disk should be configured as a striped disk.
D. The physical disk should be configured as a mirrored disk.
Answer: A
Explanation:
Your virtual machines can also be connected to physical hard disks on the virtualization server virtual hard disks. (This is sometimes referred to as having a “pass-through” disk connected to a virtual machine.) The physical hard disk that you connect to a virtual machine can also be a network-attached disk, like a logical unit number (LUN) in a storage area network (SAN). A common example is an iSCSI LUN that has been mapped to the virtualization server by using Microsoft iSCSI Initiator. Because the virtualization server sees network-attached storage as local disks, the iSCSI LUN can be connected to a virtual machine. The most important limitation about having a physical hard disk connected to a virtual machine is that it cannot be connected to the virtualization server or to other virtual machines at the same time. The virtual machine must have exclusive access to the physical hard disk. Pass-through Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-Vserver perspective.
Q46. - (Topic 3)
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 is a DHCP server that is configured to have a scope named Scope1. Server2 is configured to obtain an IP address automatically.
In Scope1, you create a reservation named Res_Server2 for Server2.
A technician replaces the network adapter on Server2.
You need to ensure that Server2 can obtain the same IP address.
What should you modify on Server1?
A. The Name Protection settings of Scope1
B. The MAC address of Res_Server2
C. The Advanced settings of Res_Server2
D. The Network Access Protection Settings of Scope1
Answer: B
Explanation:
DHCP reservations are given based upon MAC address (at least on IPv4/DHCPv4). For clients that require a constant IP address, you can either manually configure a static IP address, or assign a reservation on the DHCP server. Reservations are permanent lease assignments that are used to ensure that a specified client on a subnet can always use the same IP address. You can use DHCP reservations for hosts that require a consistent IP address, but do not need to be statically configured. DHCP reservations provide a mechanism by which IP addresses may be permanently assigned to a specific client based on the MAC address of that client. The MAC address of a Windows client can be found running the ipconfig /all command. For Linux systems the corresponding command is ifconfig -a. Once the MAC address has been identified, the reservation may be configured using either the DHCP console or at the command prompt using the netsh tool.
Media access control (MAC) address authorization functions in the same way as automatic number identification (ANI) authorization, but it is used for wireless clients and clients connecting to your network by using an 802.1X authenticating switch. Since the network adapter was replaced, you need to modify the MAC address on Server1 to ensure that Server2 can obtain the same IP address.
Reference: http://technet.microsoft.com/en-us/library/dd197535%28v=WS.10%29.aspx
Q47. - (Topic 3)
Your network contains an Active Directory domain named adatum.com. The domain contains a file server named Server2 that runs Windows Server 2012 R2. Server2 contains a shared folder named Home. Home contains the home folder of each user.
All users have the necessary permissions to access only their home folder.
A user named User1 opens the Home share as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that all users see only their own home folder when they access Home.
What should you do from Server2?
A. From Windows Explorer, modify the properties of Home.
B. From Server Manager, modify the properties of the volume that contains Home.
C. From Windows Explorer, modify the properties of the volume that contains Home.
D. From Server Manager, modify the properties of Home.
Answer: D
Explanation:
Access-based Enumeration is a new feature included with Windows Server 2003 Service Pack 1. This feature based file servers to list only the files and folders to which they have allows users of Windows Server 2003 access when browsing content on the file server. This eliminates user confusion that can be caused when users connect to a file server and encounter a large number of files and folders that they cannot access. Access-based Enumeration filters the list of available files and folders on a server to include only those that the requesting user has access to. This change is important because this allows users to see only those files and directories that they have access to and nothing else. This mitigates the scenario where unauthorized users might otherwise be able to see the contents of a directory even though they don’t have access to it.
Q48. - (Topic 1)
Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and child.contoso.com. The forest contains two domain controllers. The domain controllers are configured as shown in the following table.
You need to ensure that DC2 can provide authoritative responses for queries to the contoso.com namespace.
What should you do?
A. On DC1, create a delegation.
B. On DC1, change the replication scope of the contoso.com zone.
C. On DC2, create a forwarder.
D. On DC2, modify the Zone Transfers settings.
Answer: B
Explanation:
For DC1 to be able to provide authoritative responses to DNS queries the replication scope should be changed accordingly so that it has the zone data for the contoso.com domain.
Q49. - (Topic 3)
You work as an administrator at Contoso.com. The Contoso.com network consists of an Active Directory forest that contains a root domain, named Contoso.com, and two child domains, named us.Contoso.com and uk.Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.
The root domain hosts a domain local distribution group, named ENSUREPASSGroup. You are preparing to issue ENSUREPASSGroup read-only access to a shared folder hosted by the us.Contoso.com domain.
You want to make sure that ENSUREPASSGroup is able to access the shared folder in the us.Contoso.com domain.
Which of the following actions should you take?
A. You should consider re-configuring ENSUREPASSGroup as a universal Admins group.
B. You should consider re-configuring ENSUREPASSGroup as a universal security group.
C. You should consider re-configuring ENSUREPASSGroup as a global administrators group.
D. You should consider re-configuring ENSUREPASSGroup as a local administrators group.
Answer: B
Q50. - (Topic 1)
Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers. The servers are contained in an organizational unit (OU) named Servers OU.
You need to create a group named Group1 on all of the servers in the domain. You must ensure that Group1 is added only to the servers.
What should you configure?
A. a Local Users and Groups preferences setting in a Group Policy linked to the Domain Controllers OU
B. a Restricted Groups setting in a Group Policy linked to the domain
C. a Local Users and Groups preferences setting in a Group Policy linked to ServersOU
D. a Restricted Groups setting in a Group Policy linked to Servers OU
Answer: C
Explanation:
A. This would add the group to the wrong OU
B. This would affect the whole domain and would effect member of the group
C. allows you to centrally manage local users and groups on domain member computers and is this is the correct OU for the GPO change
D. Restricted Groups defines what member or groups should exist as part of a group Why use Group Policy preferences? Unlike Group Policy settings, which App1y to both local computer policy and Active Directory policy, Group Policy preferences only App1y to Active Directory policy. You use preferences to configure many areas of the OS, including: System devices, such as USB ports, floppy drives and removable media Network shares and mapping network shares to drive letters System and user environment variables User and group accounts for the local computer VPN and dial-up networking connections Printer configuration and mapping Registry settings, schedule tasks and system services Settings for Folder Options, Internet Options and Regional and Language Options Settings for power schemes and power management Start Menu properties and menu items