Act now and download your Microsoft 70 410 dumps test today! Do not waste time for the worthless Microsoft exam collections 70 410 tutorials. Download Improved Microsoft Installing and Configuring Windows Server 2012 exam with real questions and answers and begin to learn Microsoft 70 410 practice exam with a classic professional.

Q21. HOTSPOT - (Topic 3) 

You have a Hyper-V host named HYPERV1. HYPERV1 hosts a virtual machine named 

DC1. 

You need to prevent the clock on DC1 from synchronizing from the clock on HYPERV1. 

What should you configure? To answer, select the appropriate object in the answer area. 

Answer: 


Q22. - (Topic 2) 

Your network contains a Windows Server 2012 R2 image named Server12.wim.Server12.wim contains the images shown in the following table. 

You need to enable the Windows Server Migration Tools feature in the Windows Server 2012 R2 Datacenter image. 

You want to achieve this goal by using the minimum amount of administrative effort. 

Which command should you run first? 

A. dism.exe /image:c:\\Server12.wim /enable-feature /featurename:servermigration 

B. dism.exe /mount-wim /wimfile:c:\\Server12.wim /index:4 /mountdir:c:\\mount 

C. imagex.exe /capture c: c:\\Server12.wim "windows server 2012 r2 datacenter" 

D. imagex.exe /apply c:\\Server12.wim 4 c:\\ 

Answer:

Explanation: 

This command will mount the image before making any changes. 

References: 

http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx http://technet.microsoft.com/en-us/library/dd744382(v=ws.10).aspx 


Q23. - (Topic 3) 

Your infrastructure divided in 2 sites. You have a forest root domain and child domain. There is only one DC on site 2 with no FSMO roles. The link goes down to site 2 and no users can log on. What FSMO roles you need on to restore the access? 

A. Infrastructure master 

B. RID master 

C. Domain Naming master 

D. PDC Emulator 

Answer:

Explanation: 

D. The PDC emulator is used as a reference DC to double-check incorrect passwords and it also receives new password changes. PDC Emulator is the most complicated and least understood role, for it runs a diverse range of critical tasks. It is a domain-specific role, so exists in the forest root domain and every child domain. Password changes and account lockouts are immediately processed at the PDC Emulator for a domain, to ensure such changes do not prevent a user logging on as a result of multi-master replication delays, such as across Active Directory sites. 


Q24. - (Topic 3) 

In a domain running at the Windows Server 2012 R2 domain functional level, which of the following security principals can be members of a global group? (Choose all answers that are correct.) 

A. Users 

B. Computers 

C. Universal groups 

D. Global groups 

Answer: A,B,D 

Explanation: 

A. Correct: Users can be security principals in a global group. 

B. Correct: Computers can be security principals in a global group. 

C. Incorrect: Universal groups cannot be security principals in a global group. 

D. Correct: Global group can be security principals in a global group. 


Q25. - (Topic 3) 

You have a domain controller named Server1 that runs Windows Server 2012 R2 and has the DNS Server server role installed. Server1 hosts a DNS zone named contoso.com and a GlobalNames zone. 

You discover that the root hints were removed from Server1. 

You need to view the default root hints of Server1. 

What should you do? 

A. From Event Viewer, open the DNS Manager log. 

B. From Notepad, open the Cache.dns file. 

C. From Windows Powershell, run Get-DNSServerDiagnostics. 

D. From nslookup, run root server1.contoso.com 

Answer:

Explanation: 

A. Allows you to troubleshoot DNS issues 

B. DNS Server service implements root hints using a file, Cache.dns, stored in the systemroot\\System32\\Dnsfolder on the server 

C. Gets DNS event logging details 

D. nslookup is used to query the DNS server 


Q26. - (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

You install a network monitoring application on VM2. 

You need to ensure that all of the traffic sent to VM3 can be captured on VM2. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. Resource metering 

D. Virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch port that receives copies of all the traffic. And since Port mirroring allows the network traffic of a virtual machine to be monitored by copying the traffic and forwarding it to another virtual machine that is configured for monitoring, you should configure port mirroring on VM2. 

: http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror 


Q27. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing connection security rules. 

Which of the following is TRUE with regards to connection security rules? (Choose all that apply.) 

A. Connection security rules allows for traffic to be secured via IPsec. 

B. Connection security rules do not allow the traffic through the firewall. 

C. Connection security rules are applied to programs or services. 

D. Connection security rules are applied between two computers. 

Answer: A,B,D 

Explanation: 

Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity, and, optionally, data encryption. How firewall rules and connection security rules are related Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with IPsec, you can create Computer Connection Security rules. However, the creation of a connection security rule does not allow the traffic through the firewall. You must create a firewall rule to do this, if the traffic is not allowed by the default behavior of the firewall. Connection security rules are not applied to programs or services; they are applied between the computers that make up the two endpoints. 


Q28. - (Topic 2) 

Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2. 

Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. 

You create a checkpoint of VM1, and then you install an application on VM1. You verify 

that the application runs properly. 

You need to ensure that the current state of VM1 is contained in a single virtual hard disk 

file. 

The solution must minimize the amount of downtime on VM1. 

What should you do? 

A. From a command prompt, run dism.exe and specify the /delete-image parameter. 

B. From a command prompt, run dism.exe and specify the /commit-image parameter. 

C. From Hyper-V Manager, delete the checkpoint. 

D. From Hyper-V Manager, inspect the virtual hard disk. 

Answer:


Q29. HOTSPOT - (Topic 1) 

You have a shared folder named Share1. The folder permissions of Share1 are configured as shown in the Folder Permissions exhibit. (Click the Exhibit button.) 

The Share permissions of Share1 are configured as shown in the Share Permissions exhibit. (Click the Exhibit button.) 

You have a group named Group1. The members of Group1 are shown in the Group1 exhibit. (Click the Exhibit button.) 

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point. 

Answer: 


Q30. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains three member servers. 

The servers are configured as shown in the following table. 

All client computers run Windows 8. All client computers receive updates from Server2. 

On Server3, you add a shared printer named Printer1. Printer1 uses a Type 4 driver that is not included in the Windows 8 installation media. 

You need to ensure that when users connect to the printer for the first time, the printer driver is installed automatically on their client computer. 

What should you do? 

A. From the Windows Deployment Services console on Server1, add the driver package for Printer1. 

B. From the Update Services console on Server2, import and approve updates. 

C. From Windows PowerShell on Server3, run the Add-PrinterDriver cmdlet. 

D. From the Print Management console on Server3, add additional drivers for Printer1. 

Answer: