Breathing of 70 410 installing and configuring windows server 2012 pdf exam engine materials and free demo for Microsoft certification for client, Real Success Guaranteed with Updated 70 410 questions pdf dumps vce Materials. 100% PASS Installing and Configuring Windows Server 2012 exam Today!

Q17. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. 

On Server1, you open Computer Management as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can create a 3-TB volume on Disk 1. 

What should you do first? 

A. Create a storage pool. 

B. Convert the disk to a GPT disk. 

C. Create a VHD, and then attach the VHD. 

D. Convert the disk to a dynamic disk. 

Answer:


Q18. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. 

The domain contains a user named User1 and three global security groups named Group1, Group2 and, Group3. 

You need to add User1 to Group1, Group2, and Group3. 

Which cmdlet should you run? 

A. Add-AdPrincipalGroupMembership 

B. Install-AddsDomainController 

C. Install-WindowsFeature 

D. Install-AddsDomain 

E. Rename-AdObject 

F. Set-AdAccountControl 

G. Set-AdGroup 

H. Set-User 

Answer:

Explanation: 

The Add-ADPrincipalGroupMembershipcmdlet adds a user, group, service account, or computer as a new member to one or more Active Directory groups. 

References: 

http://technet.microsoft.com/en-us/library/ee617203.aspx http://technet.microsoft.com/en-us/library/hh974723.aspx 


Q19. - (Topic 1) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. 

Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. 

VM1 has several snapshots. 

You need to modify the snapshot file location of VM1. 

What should you do? 

A. Right-click VM1, and then click Export. 

B. Shut down VM1, and then modify the settings of VM1. 

C. Delete the existing snapshots, and then modify the settings of VM1. 

D. Pause VM1, and then modify the settings of VM1. 

Answer:


Q20. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy. 

You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. 

You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent Server1 from attempting to resolve Internet host names for the client computers. 

What should you do on Server1? 

A. Create a primary zone named “.”. 

B. Configure the Security settings of the contoso.com zone. 

C. Create a zone delegation for GlobalNames.contoso.com. 

D. Create a stub zone named “root”. 

Answer:

Explanation: 

When you install DNS on a Windows server that does not have a connection to the Internet, the zone for the domain is created and a root zone, also known as a dot zone, is also created. This root zone may prevent access to the Internet for DNS and for clients of the DNS. If there is a root zone, there are no other zones other than those that are listed with DNS, and you cannot configure forwarders or root hint servers. Root domain This is the top of the tree, representing an unnamed level; it is sometimes shown as two empty quotation marks (“”), indicating a null value. When used in a DNS domain name, it is stated by a trailing period (.) to designate that the name is located at the root or highest level of the domain hierarchy. In this instance, the DNS domain name is considered to be complete and points to an exact location in the tree of names. Names stated this way are called fully qualified domain names (FQDNs). DNS Domain Name Hierarchy: 


Q21. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. 

The domain contains 20 computer accounts in an organizational unit (OU) named OU1. A user account named User1 is in an OU named OU2. 

You are configuring a Group Policy object (GPO) named GPO1. 

You need to assign User1 the Backup files and directories user right to all of the computer accounts in OU1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From User Configuration in GPO1, modify the security settings. 

B. Link GPO1 to OU1. 

C. From Computer Configuration in GPO1, modify the security settings. 

D. Modify the Delegation settings of GPO1. 

E. Link GPO1 to OU2. 

Answer: B,C 


Q22. - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. 

The disks on Server1 are configured as shown in the exhibit. (Click the Exhibit button.) 

You create a virtual machine on Server1. 

You need to ensure that you can configure a pass-through disk for the virtual machine. 

What should you do? 

A. Convert Disk 1 to a GPT disk. 

B. Delete partition E. 

C. Convert Disk 1 to a dynamic disk. 

D. Take Disk 1 offline. 

Answer:

Explanation: 

References: Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 3.2: Create and Configure virtual machine storage, Chapter 3: p. 159 Exam Ref 70-410: Installing and Configuring Server 2012: Objective 1.3: Installing and Configuring servers, Chapter 1: p. 42-43 http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-hyper-v.aspx 


Q23. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Web Server (US) server role installed. 

Server1 has a web site named Web1. Web1 is configured to use digest authentication. 

You need to ensure that a user named User1 can access Web1. 

What should you do from Active Directory Users and Computers? 

A. From the properties of User1, select Store password using reversible encryption. 

B. From the properties of User1, select Use Kerberos DES encryption types for this account. 

C. From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only). 

D. From the properties of Server1, assign the Allowed to Authenticate permission to User1. 

Answer:

Explanation: 

Challenge Handshake Authentication Protocol (CHAP) is a basic level of iSCSI security that is used to authenticate the peer of a connection and is based upon the peers sharing a secret: that secret being a password. To make sure that User1 can connect to the server, you should use Active Directory Users and Computers to store that password. 


Q24. HOTSPOT - (Topic 2) 

You have two servers that run Windows Server 2012 R2. The servers are configured as shown in the following table. 

You need to ensure that Server2 can be managed by using Server Manager from Server1. 

In the table below, identify which actions must be performed on Server1 and Server2.Make only one selection in each row. Each correct selection is worth one point. 

Answer: