Want to Pass 70-410 Exam In Next HOURS? Get it now →
May 19, 2017

The Only Tip You Need: braindumps 70 410

Exam Code: examcollection 70 410 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Installing and Configuring Windows Server 2012
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70 410 exam Exam.

Q51. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

You are running a training exercise for junior administrators. You are currently discussing Storage Spaces. 

Which of the following is TRUE with regards to Storage Spaces? 

A. Mirroring and parity are optional resilient storage modes of Storage Spaces. 

B. Failover clustering is not supported by Storage Spaces. 

C. Storage spaces are virtual disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning. 

D. Storage spaces are a collection of physical disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning. 

Answer: A,C 


Q52. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. 

The forest contains two domains named contoso.com and child.contoso.com and two sites named Site1 and Site2. The domains and the sites are configured as shown in following table. 

When the link between Site1 and Site2 fails, users fail to log on to Site2. 

You need to identify what prevents the users in Site2 from logging on to the child.contoso.com domain. 

What should you identify? 

A. The placement of the global catalog server 

B. The placement of the infrastructure master 

C. The placement of the domain naming master 

D. The placement of the PDC emulator 

Answer:

Explanation: 

The exhibit shows that Site2 does not have a PDC emulator. This is important because of the close interaction between the RID operations master role and the PDC emulator role. The PDC emulator processes password changes from earlier-version clients and other domain controllers on a best-effort basis; handles password authentication requests involving passwords that have recently changed and not yet been replicated throughout the domain; and, by default, synchronizes time. If this domain controller cannot connect to the PDC emulator, this domain controller cannot process authentication requests, it may not be able to synchronize time, and password updates cannot be replicated to it. The PDC emulator master processes password changes from client computers and replicates these updates to all domain controllers throughout the domain. At any time, there can be only one domain controller acting as the PDC emulator master in each domain in the forest. 


Q53. - (Topic 3) 

Your company has an Active Directory domain. You log on to the domain controller. The Active Directory Schema snap-in is not available in the Microsoft Management Console (MMC). 

You need to access the Active Directory Schema snap-in. What should you do? 

A. Register Schmmgmt.dll. 

B. Log off and log on again by using an account that is a member of the Schema Admins group. 

C. Use the Ntdsutil.exe command to connect to the schema master operations master and open the schema for writing. 

D. Add the Active Directory Lightweight Directory Services (AD/LDS) role to the domain controller by using Server Manager. 

Answer:

Explanation: 

Install the Active Directory Schema Snap-In You can use this procedure to first register the dynamic-link library (DLL) that is required for the Active Directory Schema snap-in. You can then add the snap-in to Microsoft Management Console (MMC). 

To install the Active Directory Schema snap-in: 

1. To open an elevated command prompt, click Start, type command prompt and then right-click Command Prompt when it appears in the Start menu. Next, click Run as administrator 

and then click OK. 

To open an elevated command prompt in Windows Server 2012 R2, click Start, type cmd, 

right-click cmd and then click Run as administrator. 

2. Type the following command, and then press ENTER: regsvr32 schmmgmt.dll 

3. Click Start, click Run, type mmc and then click OK. 

4. On the File menu, click Add/Remove Snap-in. 

5. Under Available snap-ins, click Active Directory Schema, click Add and then click OK. 

6. To save this console, on the File menu, click Save. 

7. In the Save As dialog box, do one of the following: 

* To place the snap-in in the Administrative Tools folder, in File name, type a name for the snap-in, and then click Save. 

* To save the snap-in to a location other than the Administrative Tools folder, in Save in , navigate to a location for the snap-in. In File name, type a name for the snap-in, and then click Save. 


Q54. - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. You add a 4-TB disk named Disk 5 to Server1. 

You need to ensure that you can create a 3-TB volume on Disk 5. 

What should you do? 

A. Create a storage pool. 

B. Convert the disk to a dynamic disk 

C. Create a VHD, and then attach the VHD. 

D. Convert the disk to a GPT disk. 

Answer:

Explanation: 

MBR max is 2TB, the disk must be GPT For any hard drive over 2TB, we need to use GPT partition. If you have a disk larger than 2TB size, the rest of the disk space will not be used unless you convert it to GPT. An existing MBR partition can’t be converted to GPT unless it is completely empty; you must either delete everything and convert or create the partition as GPT. It is not possible to boot to a GPT partition, impossible to convert MBR to GPT without data loss. 


Q55. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. All domain controllers currently run Windows Server 2008 R2. 

You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2. 

The new domain controller will have the following configurations: 

Schema master 

Global catalog server 

Active Directory Federation Services server role 

Active Directory Certificate Services server role 

You need to identify which configuration can be fulfilled by using the Active Directory Domain Services Configuration Wizard. 

Which configuration should you identify? 

A. Enable the global catalog server. 

B. Install the DNS Server role. 

C. Install the Active Directory Certificate Services role. 

D. Transfer the schema master. 

Answer:


Q56. - (Topic 3) 

You install Windows Server 2012 R2 on a standalone server named Server1. You configure Server1 as a VPN server. 

You need to ensure that client computers can establish PPTP connections to Server1. 

Which two firewall rules should you create? (Each correct answer presents part of the solution. Choose two.) 

A. An inbound rule for protocol 47 

B. An outbound rule for protocol 47 

C. An inbound rule for TCP port 1723 

D. An inbound rule for TCP port 1701 

E. An outbound rule for TCP port 1723 

F. An outbound rule for TCP port 1701 

Answer: A,C 

Explanation: 

The following is a list of firewall ports which need to be opened for the various VPN tunnel 

protocols: 

For PPTP: 

IP Protocol=TCP, TCP Port number=1723 <- Used by PPTP control path 

IP Protocol=GRE (value 47) <- Used by PPTP data path 

For L2TP: 

IP Protocol Type=UDP, UDP Port Number=500 <- Used by IKEv1 (IPSec control path) 

IP Protocol Type=UDP, UDP Port Number=4500 <- Used by IKEv1 (IPSec control path) 

IP Protocol Type=ESP (value 50) <- Used by IPSec data path 

For SSTP: 

IP Protocol=TCP, TCP Port number=443 <- Used by SSTP control and data path 

For IKEv2: 

IP Protocol Type=UDP, UDP Port Number=500 <- Used by IKEv2 (IPSec control path) 

IP Protocol Type=UDP, UDP Port Number=4500 <- Used by IKEv2 (IPSec control path) 

IP Protocol Type=ESP (value 50) <- Used by IPSec data path 


Q57. HOTSPOT - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 is a member of a workgroup. 

You need to ensure that only members of the Administrators group and members of a group named Group1 can log on locally to Server1. 

Which settings should you modify from the Local Security Policy? To answer, select the appropriate settings in the answer area. 

Answer: 


Q58. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2008 R2 installed. Some of Contoso.com’s workstations have Windows 7 installed, while the rest have Windows 8 installed. 

After installing a new Windows Server 2012 computer in the Contoso.com domain, you configure it to run the File and Storage Services server role. You are instructed to create a shared folder on the new server, and configure the use of Previous Versions for restoring files located in the shared folder. 

Which of the following actions should you take? 

A. You should consider configuring the Shadow Copies settings on the new server. 

B. You should consider configuring the Snapshot settings on the new server. 

C. You should consider configuring the Background Copy settings on the new server. 

D. You should consider configuring the Permission settings on the new server. 

Answer:

Explanation: 

What are previous versions? Previous versions are either backup copies (copies of files and folders that you back up by using the Back Up Files wizard, or shadow copies) copies of files and folders that Windows automatically saves as part of a restore point. (Shadow copies can be copies of files on your computer or shared files on a computer on a network.) You can use previous versions of files to restore files that you accidentally modified or deleted, or that were damaged. Depending on the type of file or folder, you can open, save to a different location, or restore a previous version. ATT: (nothing to do with question but cool to know) File Server Volume Copy Shadow Service (VSS) Agent Service Enables consistency of application snaphots (shadow copies). With previous versions of Windows Server, VSS only supported shadow copies of data on the local server. With WS2012, Microsoft has added VSS for SMB File Shares which extends shadow copy support for network volumes. Administrators install the FS VSS Agent on the file server where the application data is located. They then install the VSS provider in the server where the application is located. The provider talks to the agent using the new File Server Remote VSS protocol in order to manage the shadow copies of the data. 


Q59. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed, and all workstations have Windows 8 installed. 

You are running a training exercise for junior administrators. You are currently discussing the Always Offline Mode. 

Which of the following is TRUE with regards to the Always Offline Mode? (Choose all that apply.) 

A. It allows for swifter access to cached files and redirected folders. 

B. To enable Always Offline Mode, you have to satisfy the forest and domain functional-level requirements, as well as schema requirements 

C. It allows for lower bandwidth usage due to users are always working offline. 

D. To enable Always Offline Mode, you must have workstations running Windows 7 or Windows Server 2008 R2. 

Answer: A,C 

Explanation: 

There are no domain/forest/schema requirements, but clients must be running Windows 

8/Windows Server 2012 or later. 

Offline Files have four modes of operation: 

Online Slow link Auto offline Manual offline Offline Files transition between the three modes online, slow link and auto offline depending on connection speed. The user can always override the automatic mode selection by manually switching to manual offline mode. To determine the connection speed two pings with default packet size are sent to the file server. If the average round-trip time is below 80 ms (Windows 7) or 35 ms (Windows 8), the connection is put into online mode, otherwise into slow link mode. The latency value of 35/80 ms is configurable through the Group Policy setting Configure slow-link mode. Reads, Writes and Synchronization In online mode, changes to files are made on the file server as well as in the local cache (this induces a performance hit – see this article for details). Reads are satisfied from the local cache (if in sync). In slow link mode, changes to files are made in the local cache. The local cache is background-synchronized with the file server every 6 hours (Windows 7) or 2 hours (Windows 8), by default. This can be changed through the Group Policy setting Configure Background Sync. . In auto offline mode, all reads and writes go to the local cache. No synchronization occurs. . In manual offline mode, all reads and writes go to the local cache. No synchronization occurs by default, but background synchronization can be enabled through the Group Policy setting Configure Background Sync. 


Q60. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.Client computers run either Windows 7 or Windows 8. 

All of the computer accounts of the client computers reside in an organizational unit (OU) named Clients. A Group Policy object (GPO) named GPO1 is linked to the Clients OU. All of the client computers use a DNS server named Server1. 

You configure a server named Server2 as an ISATAP router. You add a host (A) record for ISATAP to the contoso.com DNS zone. 

You need to ensure that the client computers locate the ISATAP router. 

What should you do? 

A. Run the Set-DnsServerGlobalQueryBlockList cmdlet on Server1. 

B. Configure the Network Options Group Policy preference of GPO1. 

C. Run the Add-DnsServerResourceRecord cmdlet on Server1. 

D. Configure the DNS Client Group Policy setting of GPO1. 

Answer:

Explanation: 

The Set-DnsServerGlobalQueryBlockList command will change the settings of a global query block list which you can use to ensure that client computers locate the ISATAP router. 

Windows Server 2008 introduced a new feature, called “Global Query Block list”, which prevents some arbitrary machine from registering the DNS name of WPAD. This is a good security feature, as it prevents someone from just joining your network, and setting himself up as a proxy. The dynamic update feature of Domain Name System (DNS) makes it possible for DNS client computers to register and dynamically update their resource records with a DNS server whenever a client changes its network address or host name. This reduces the need for manual administration of zone records. This convenience comes at a cost, however, because any authorized client can register any unused host name, even a host name that might have special significance for certain Applications. This can allow a malicious user to take over a special name and divert certain types of network traffic to that user’s computer. Two commonly deployed protocols are particularly vulnerable to this type of takeover: the Web Proxy Automatic Discovery Protocol (WPAD) and the Intra-site Automatic Tunnel Addressing Protocol (ISATAP). Even if a network does not deploy these protocols, clients that are configured to use them are vulnerable to the takeover that DNS dynamic update enables. Most commonly, ISATAP hosts construct their PRLs by using DNS to locate a host named isatap on the local domain. For example, if the local domain is corp.contoso.com, an ISATAP-enabled host queries DNS to obtain the IPv4 address of a host named isatap.corp.contoso.com. In its default configuration, the Windows Server 2008 DNS Server service maintains a list of names that, in effect, it ignores when it receives a query to resolve the name in any zone for which the server is authoritative. Consequently, a malicious user can spoof an ISATAP router in much the same way as a malicious user can spoof a WPAD server: A malicious user can use dynamic update to register the user’s own computer as a counterfeit ISATAP router and then divert traffic between ISATAP-enabled computers on the network. The initial contents of the block list depend on whether WPAD or ISATAP is already deployed when you add the DNS server role to an existing Windows Server 2008 deployment or when you upgrade an earlier version of Windows Server running the DNS Server service. Add-DnsServerResourceRecord – The Add-DnsServerResourceRecordcmdlet adds a resource record for a Domain Name System (DNS) zone on a DNS server. You can add different types of resource records. Use different switches for different record types. By using this cmdlet, you can change a value for a record, configure whether a record has a time stamp, whether any authenticated user can update a record with the same owner name, and change lookup timeout values, Windows Internet Name Service (WINS) cache settings, and replication settings. Set-DnsServerGlobalQueryBlockList – The Set-DnsServerGlobalQueryBlockListcmdlet changes settings of a global query block list on a Domain Name System (DNS) server. This cmdlet replaces all names in the list of names that the DNS server does not resolve with the names that you specify. If you need the DNS server to resolve names such as ISATAP and WPAD, remove these names from the list. Web Proxy Automatic Discovery Protocol (WPAD) and Intra-site Automatic Tunnel Addressing Protocol (ISATAP) are two commonly deployed protocols that are particularly vulnerable to hijacking. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256 http://technet.microsoft.com/en-us/library/jj649942(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj649876(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj649874.aspx http://technet.microsoft.com/en-us/library/jj649909.aspx 



see more free 70-410 exam dumps