We provide real examcollection 70 410 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft braindumps 70 410 Exam quickly & easily. The 70 410 practice exam PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 70 410 vce dumps pdf and vce product and material, you can easily pass the 70 410 installing and configuring windows server 2012 pdf exam.

P.S. Refined 70-410 cram are available on Google Drive, GET MORE: https://drive.google.com/open?id=12Hnv9NReMM9UllL56hyQjMBaXTShJEqc


New Microsoft 70-410 Exam Dumps Collection (Question 5 - Question 14)

New Questions 5

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.

You need to add a graphical user interface (GUI) to Server1. Which tool should you use?

A. The setup.exe command

B. The dism.exe command

C. The imagex.exe command

D. The Add-WindowsPackage cmdlet

Answer: B

Explanation:

The DISM command is called by the Add-WindowsFeature command. Here is the systax for DISM:

Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:ServerGui- Shell /featurename:Server-Gui-Mgmt


New Questions 6

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that hosts the primary DNS zone for contoso.com.

All client computers are configured to use DC1 as the primary DNS server.

You need to configure DC1 to resolve any DNS requests that are not for the contoso.com zone by querying the DNS server of your Internet Service Provider (ISP).

What should you configure?

A. Naming Authority Pointer (NAPTR) DNS resource records (RR)

B. Name server (NS) records

C. A Forwarders

D. Conditional forwarders

Answer: C

Explanation:

On a network with several servers and/or client computers a server that is configured as a forwarder will manage the Domain Name System (DNS) traffic between your network and the Internet.


New Questions 7

You have a server named Server1 that runs Windows Server 2012 R2.

You add an additional disk to Server1 as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that users can access the additional disk from drive C. What should you do?

A. Convert Disk 0 to a dynamic disk and add a mirror.

B. Create a simple volume on Disk 1 and mount the volume to a folder.

C. Convert Disk 0 and Disk 1 to dynamic disks and extend a volume.

D. Convert Disk 1 to a dynamic disk and create a spanned volume.

Answer: B


New Questions 8

Your network contains an Active Directory domain named contoso.com.

An organizational unit (OU) named OU1 contains user accounts and computer accounts.

A Group Policy object (GPO) named GP1 is linked to the domain.GP1 contains Computer Configuration settings and User Configuration settings.

You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers.

What should you configure?

A. The GPO Status

B. The Block Inheritance feature

C. The Group Policy loopback processing mode

D. The Enforced setting

Answer: C

Explanation:

A loopback with merge option needs to be used.


New Questions 9

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. VM1 has several snapshots.

You need to modify the snapshot file location of VM1. What should you do?

A. Delete the existing snapshots, and then modify the settings of VM1.

B. Right-click VM1, and then click Move.

C. Right-click VM1, and then click Export.

D. PauseVM1, and then modify the settings of VM1.

Answer: A

Explanation:

You will need to navigate to the Hyper-V Management snap-in (C:\ProgramData\Microsoft\Windows\Hyper-V) and from there access the Snapshot file Location tab where you can change the settings for the VM1 snapshot file location. However, since there are already several snapshots in existence, you will need to delete them first because you will not be able to change the location of the snapshot file while there is an existing snapshot.

You need to modify the snapshot file location of VM1.


New Questions 10

Your network contains an Active Directory domain named contoso.com. The DNS zone for contoso.com is Active-Directory integrated.

The domain contains 500 client computers. There are an additional 20 computers in a workgroup.

You discover that every client computer on the network can add its record to the contoso.com zone.

You need to ensure that only the client computers in the Active Directory domain can register records in the contoso.com zone.

What should you do?

A. Sign the contoso.com zone by using DNSSEC.

B. Configure the Dynamic updates settings of the contoso.com zone.

C. Configure the Security settings of the contoso.com zone.

D. Move the contoso.com zone to a domain controller that is configured as a DNS server.

Answer: B


New Questions 11

Your network contains an Active Directory domain named contoso.com. All client computers run Windows You deploy a server named Server1 that runs Windows Server 2012 R2.

You install a new client-server application named App1 on Server1 and on the client computers. The client computers must use TCP port 6444 to connect to App1 on Server1.Server1 publishes the information of App1 to an intranet server named Server2 by using TCP port 3080.

You need to ensure that all of the client computers can connect to App1. The solution must ensure that the application can connect to Server2.

Which Windows Firewall rule should you create on Server1?

A. an inbound rule to allow a connection to TCP port 3080

B. an outbound rule to allow a connection to TCP port 3080

C. an outbound rule to allow a connection to TCP port 6444

D. an inbound rule to allow a connection to TCP port 6444

Answer: D

Explanation:

:A. Server2 needs inbound on 3080.

:B. All ports outbound allowed by default.

:D. Server1 gets request from Client PCu2021s it needs an inbound rule for 6444.

By default, Windows Firewall with Advanced Security blocks all unsolicited inbound network traffic, and allows all outbound network traffic. For unsolicited inbound network traffic to reach your computer, you must create an allow rule to permit that type of network traffic. If a network program cannot get access, verify that in the Windows Firewall with Advanced Security snap-in there is an active allow rule for the current profile. To verify that there is an active allow rule, double-click Monitoring and then click Firewall.

If there is no active allow rule for the program, go to the Inbound Rules node and create a new rule for that program. Create either a program rule, or a service rule, or search for a group that applies to the feature and make sure all the rules in the group are enabled. To permit the traffic, you must create a rule for the program that needs to listen for that traffic. If you know the TCP or UDP port numbers required by the program, you can additionally

restrict the rule to only those ports, reducing the vulnerability of opening up all ports for the program.


New Questions 12

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.

VM2 sends and receives large amounts of data over the network.

You need to ensure that the network traffic of VM2 bypasses the virtual switches of the parent partition.

What should you configure?

A. NUMA topology

B. Resource control

C. resource metering

D. virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

Answer: K

Explanation:

Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual machine to maximize network throughput while minimizing network latency and the CPU overhead required for processing network traffic.

References: http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831410.aspx

Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335


New Questions 13

Your network contains an Active Directory domain named contoso.com. The domain contains an Application server named Server1. Server1 runs Windows Server 2012 R2.

Server1 is configured as an FTP server.

Client computers use an FTP Application named App1.exe. App1.exe uses TCP port 21 as the control port and dynamically requests a data port.

On Server1, you create a firewall rule to allow connections on TCP port 21.

You need to configure Server1 to support the client connections from App1.exe. What should you do?

A. Run netsh advfirewall set global statefulftp enable.

B. Create an inbound firewall rule to allow App1.exe.

C. Create a tunnel connection security rule.

D. Run Set-NetFirewallRule -DisplayName DynamicFTP -Profile Domain

Answer: A

Explanation:

The netsh firewall context is supplied only for backward compatibility. We recommend that you do not use this context on a computer that is running Windows Vista or a later version of Windows.

In the netsh advfirewall firewall context, the add command only has one variation, the add rule command. Netsh advfirewall set global statefulftp:

Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port.

When statefulftp is enabled, the firewall examines the PORT and PASV requests for these other port numbers and then allows the corresponding data connection to the port number that was requested.

Syntax

set global statefulftp { enable | disable | notconfigured }

Parameters

statefulftp can be set to one of the following values: enable

The firewall tracks the port numbers specified in PORT command requests and in the

responses to PASV requests, and then allows the incoming FTP data traffic entering on the requested port number.

disable

This is the default value. The firewall does not track outgoing PORT commands or PASV responses, and so incoming data connections on the PORT or PASV requested port is blocked as an unsolicited incoming connection.

notconfigured

Valid only when netsh is configuring a GPO by using the set store command.


New Questions 14

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1. Server1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.

You create two IPv4 scopes on Server1. The scopes are configured as shown in the following table.

The DHCP clients in Subnet1 can connect to the client computers in Subnet2 by using an IP address or a FQDN.

You discover that the DHCP clients in Subnet2 can connect to client computers in Subnet1 by using an IP address only.

You need to ensure that the DHCP clients in both subnets can connect to any other DHCP client by using a FQDN.

What should you add?

A. The 015 DNS Domain Name option to Subnet1

B. The 015 DNS Domain Name option to Subnet2

C. The 006 DNS Servers option to Subnet2

D. The 006 DNS Servers option to Subnet1

Answer: C

Explanation: References:

http://technet.microsoft.com/en-us/library/ee941136%28v=WS.10%29.aspx

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, p.253


P.S. Easily pass 70-410 Exam with Certifytools Refined Dumps & pdf vce, Try Free: https://www.certifytools.com/70-410-exam.html (496 New Questions)