Master the examcollection 70 410 Installing and Configuring Windows Server 2012 content and be ready for exam day success quickly with this Testking mcsa 70 410 test questions. We guarantee it!We make it a reality and give you real 70 410 practice exam questions in our Microsoft mcsa 70 410 pdf braindumps.Latest 100% VALID Microsoft 70 410 dumps pdf Exam Questions Dumps at below page. You can use our Microsoft vce 70 410 braindumps and pass your exam.

Q61. - (Topic 1) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are part of a workgroup. 

On Server1 and Server2, you create a local user account named Admin1.You add the account to the local Administrators group. On both servers, Admin1 has the same password. 

You log on to Server1 as Admin1. You open Computer Management and you.connect to Server2. 

When you attempt to create a scheduled task, view the event logs, and manage the shared folders, you receive Access Denied messages. 

You need to ensure that you can administer Server2 remotely from Server1 by using Computer Management. 

What should you configure on Server2? 

A. From Server Manager, modify the Remote Management setting. 

B. From Local Users and Groups, modify the membership of the Remote Management Users group. 

C. From Windows Firewall, modify the Windows Management Instrumentation (WMI) firewall rule. 

D. From Registry Editor, configure the LocalAccountTokenFilterPolicy registry value. 

Answer:

Explanation: 

The LocalAccountTokenFilterPolicy setting affects how administrator credentials are applied to remotely administer the computer. : http://support.microsoft.com/kb/942817 


Q62. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a shared folder named Share1. Share1 contains the home folder of each user. 

All users have the necessary permissions to access only their home folder. 

The users report that when they access Share1, they can see the home folders of all the users. 

You need to ensure that the users see only their home folder when they access Share1. 

What should you do from Server1? 

A. From Windows Explorer, modify the properties of the volume that contains Share1. 

B. From Server Manager, modify the properties of the volume that contains Share1. 

C. From Server Manager, modify the properties of Share1. 

D. From Windows Explorer, modify the properties of Share1. 

Answer:


Q63. DRAG DROP - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1. All servers in the domain run Windows Server 2012 R2. 

You need to create a new volume on File1. 

The new volume must have the following configurations: 

Have the drive letter T 

Have the FAT32 file system 

Be stored on a new virtual hard disk 

In which order should you run the Diskpart commands? 

To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the correct order. 

Answer: 


Q64. - (Topic 3) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. You need to install the Remote Desktop Services server role on Server2 remotely from Server1. Which tool should you use? 

A. The dsadd.exe command 

B. The Server Manager console 

C. The Remote Desktop Gateway Manager console 

D. The Install-RemoteAccess cmdlet 

Answer:


Q65. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1. Server1 runs Windows Server 2012 R2. 

You need to create a 3-TB virtual hard disk (VHD) on Server1. 

Which tool should you use? 

A. New-StoragePool 

B. Diskpart 

C. File Server Resource Manager (FSRM) 

D. New-StorageSubsytemVirtualDisk 

Answer:

Explanation: 

You can create a VHD from either the Disk Management snap-in or the command line (diskpart). From the DiskPart command-line tool at an elevated command prompt, run the create vdisk command and specify the file (to name the file) and maximum (to set the maximum size in megabytes) parameters. The following code demonstrates how to create a VHD file at C:\\vdisks\\disk1.vdh with a maximum file size of 16 GB (or 16,000 MB). DiskPart Microsoft DiskPart version 6.1.7100 Copyright (C) 1999-2008 Microsoft Corporation. On computer: WIN7 DISKPART> create vdisk file="C:\\vdisks\\disk1.vhd" maximum=16000 


Q66. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 has a virtual switch named RDS Virtual. 

You replace all of the network adapters on Server1 with new network adapters that support single-root I/O visualization (SR-IOV). 

You need to enable SR-IOV for all of the virtual machines on Server1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On each virtual machine, modify the Advanced Features settings of the network adapter. 

B. Modify the settings of the RDS Virtual virtual switch. 

C. On each virtual machine, modify the BIOS settings. 

D. Delete, and then recreate the RDS Virtual virtual switch. 

E. On each virtual machine, modify the Hardware Acceleration settings of the network adapter. 

Answer: D,E 

Explanation: 

The first step when allowing a virtual machine to have connectivity to a physical network is to create an external virtual switch using Virtual Switch Manager in Hyper-V Manager. The additional step that is necessary when using SR-IOV is to ensure the checkbox is checked when the virtual switch is being created. It is not possible to change a “non SR-IOV mode” external virtual switch into an “SR-IOV mode” switch. The choice must be made a switch creation time. Thus you should first delete the existing virtual switch and then recreate it. 

E: Once a virtual switch has been created, the next step is to configure a virtual machine. 

SR-IOV in Windows Server “8” is supported on x64 editions of Windows “8” as a guest operating system (as in Windows “8” Server, and Windows “8” client x64, but not x86 client).We have rearranged the settings for a virtual machine to introduce sub-nodes under a network adapter, one of which is the hardware acceleration node. At the bottom is a checkbox to enable SR-IOV. 


Q67. - (Topic 3) 

A company’s network administrator needs to ensure a specific IP address is never assigned by a Windows Server 2012 R2 DHCP server to any device connecting to the network. 

Which of the following should the administrator configure on the Windows Server 2012 R2 DHCP server? 

A. Reservation 

B. Scope options 

C. NAP 

D. Scope properties 

Answer:

Explanation: 

Configuring an IP address as a reservation will restrict a DHCP server’s assignment of that address unless a specific MAC address makes a request for the address. Exclusion is for not use the IP Address or range inside the Scope Pool, Filter is for not use theMAC Address or range. Quick Tip: Policies can also be defined per scope or server. Policy based assignment (PBA) allows an administrator to group DHCP clients by specific attributes based on fields contained in the DHCP client request packet. This feature allows for targeted administration and greater control of configuration parameters delivered to network devices. 


Q68. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

Your company hires 500 temporary employees for the summer. 

The human resources department gives you a Microsoft Excel document that contains a list of the temporary employees. 

You need to automate the creation of user accounts for the 500 temporary employees. 

Which tool should you use? 

A. ADSI Edit 

B. The csvde.exe command 

C. Active Directory Users and Computers 

D. The Add-Member cmdlet 

Answer:

Explanation: 

Csvde.exe is the best option to add multiple users. As you just need to export the excel 

spreadsheet as a csv file and make sure the parameters are correct. 

You can use Csvde to import and export Active Directory data that uses the comma-

separated value format. 

Use a spreadsheet program such as Microsoft Excel to open this .csv file and view the 

header and value information. 

The CSVDE is a command-line utility that can create new AD DS objects by importing 

information from a comma-separated value (.csv) file. This would be the least amount of 

administrative effort in this case especially considering that these would be temporary 

employees. 


Q69. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains an Application server named Server1. Server1 runs Windows Server 2012 R2. 

Server1 is configured as an FTP server. 

Client computers use an FTP Application named App1.exe. App1.exe uses TCP port 21 as 

the control port and dynamically requests a data port. 

On Server1, you create a firewall rule to allow connections on TCP port 21. You need to configure Server1 to support the client connections from App1.exe. What should you do? 

A. Run netshadvfirewall set global statefulftp enable. 

B. Create an inbound firewall rule to allow App1.exe. 

C. Create a tunnel connection security rule. 

D. Run Set-NetFirewallRule -DisplayName DynamicFTP -Profile Domain 

Answer:

Explanation: 

The netsh firewall context is supplied only for backward compatibility. We recommend that you do not use this context on a computer that is running Windows Vista or a later version of Windows. In the netsh advfirewall firewall context, the add command only has one variation, the add rule command. Netsh advfirewall set global statefulftp: Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port. When statefulftp is enabled, the firewall examines the PORT and PASV requests for these other port numbers and then allows the corresponding data connection to the port number that was requested. Syntax set global statefulftp { enable | disable | notconfigured } Parameters statefulftp can be set to one of the following values: enable The firewall tracks the port numbers specified in PORT command requests and in the responses to PASV requests, and then allows the incoming FTP data traffic entering on the requested port number. disable This is the default value. The firewall does not track outgoing PORT commands or PASV responses, and so incoming data connections on the PORT or PASV requested port is blocked as an unsolicited incoming connection. notconfigured Valid only when netsh is configuring a GPO by using the set store command. 


Q70. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

The password policy for the domain is set to require a minimum password length of 10 characters. 

A user named User1 and a user named User2 work for the sales department. 

User1 is forced to create a domain password that has a minimum of 12 characters. User2 is forced to create a domain password that has a minimum of eight characters. 

You need to identify what forces the two users to have different password lengths. 

Which tool should you use? 

A. Credential Manager 

B. Security Configuration Wizard (SCW) 

C. Group Policy Management 

D. Active Directory Administrative Center 

Answer:

Explanation: 

In Windows Server 2008, you can use fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. For example, to increase the security of privileged accounts, you can apply stricter settings to the privileged accounts and then apply less strict settings to the accounts of other users. Or in some cases, you may want to apply a special password policy for accounts whose passwords are synchronized with other data sources. 

This is found in the Active Directory Administrative Center. You can use Active Directory Administrative Center to perform the following Active Directory administrative tasks: Create new user accounts or manage existing user accounts Create new groups or manage existing groups Create new computer accounts or manage existing computer accounts Create new organizational units (OUs) and containers or manage existing OUs Connect to one or several domains or domain controllers in the same instance of Active Directory Administrative Center, and view or manage the directory information for those domains or domain controllers Filter Active Directory data by using query-building search 

: http://technet.microsoft.com/en-us/library/cc770842(v=ws.10).aspx