Want to know Testking vce 70 410 Exam practice test features? Want to lear more about Microsoft Installing and Configuring Windows Server 2012 certification experience? Study Best Quality Microsoft 70 410 pdf answers to Renew 70 410 questions questions at Testking. Gat a success with an absolute guarantee to pass Microsoft mcsa 70 410 (Installing and Configuring Windows Server 2012) test on your first attempt.

Q91. - (Topic 3) 

How can you manage a newly installed Windows Server 2012 R2 core from a another Windows Server 2012 R2 with computer manager? 


A. 1 

B. 2 

C. 4 

D. 8 


Q92. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

You have been instructed to make sure that Contoso.com users are not able to install a Windows Store application. You then create a rule for packaged apps. 

Which of the following is the rule based on? (Choose all that apply.) 

A. The publisher of the package. 

B. The publisher of the application. 

C. The name of the package 

D. The name of the application 

E. The package version. 

F. The application version. 

Answer: A,C,E 


Packaged apps (also known as Windows 8 apps) are new to Windows Server 2012 R2 and Windows 8. They are based on the new app model that ensures that all the files within an app package share the same identity. Therefore, it is possible to control the entire application using a single AppLocker rule as opposed to the non-packaged apps where each file within the app could have a unique identity. Windows does not support unsigned packaged apps which implies all packaged apps must be signed. AppLocker supports only publisher rules for Packaged apps. A publisher rule for a Packaged app is based on the following information: Publisher of the package Package name Package version All the files within a package as well as the package installer share these attributes. Therefore, an AppLocker rule for a Packaged app controls both the installation as well as the running of the app. Otherwise, the publisher rules for Packaged apps are no different than the rest of the rule collections; they support exceptions, can be increased or decreased in scope, and can be assigned to users and groups. 

Q93. DRAG DROP - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You need to create a new volume on Server1. 

The new volume must have the following configurations: Be stored on a new virtual hard disk Be assigned the drive letter G Have the NTFS file system In which order should you run the Diskpart commands? 

To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the correct order. 


Q94. HOTSPOT - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 does not 

have Internet connectivity. 

All roles are removed completely from Server1. 

You mount a Windows Server 2012 R2 installation image to the C:\\Source folder. 

You need to install the DNS Server server role on Server1. 

Which folder should you use as the source? To answer, select the appropriate folder in the 

answer area. 


Q95. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named OU1. 

You need to ensure that when new client computers join the domain, their computer accounts are created in OU1 by default. 

What should you do? 

A. From Windows PowerShell, run the Move-ADObjectcmdlet. 

B. From a command prompt, run the redircmp.exe command. 

C. From ADSI Edit, configure the properties of the OU1 object. 

D. From Ldp, configure the properties of the Computers container. 



Redirects the default container for newly created computers to a specified, target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers. The CN=Computers container is a computer-protected object. For backward compatibility reasons, you cannot (and must not) remove it. 

: http://technet.microsoft.com/en-us/library/cc770619.aspx 

Q96. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed. 

A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge Handshake Authentication Protocol (CHAP) for remote connections. CHAP is enabled on Server1. 

You need to ensure that User1 can connect to Server1 and authenticate to the domain. 

What should you do from Active Directory Users and Computers? 

A. From the properties of User1, select Store password using reversible encryption. 

B. From the properties of Server1, assign the Allowed to Authenticate permission to User1. 

C. From the properties of User1, select Use Kerberos DES encryption types for this account. 

D. From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only). 



The Store password using reversible encryption policy setting provides support for Applications that use protocols that require the user’s password for authentication. Storing encrypted passwords in a way that irreversible means that the encrypted passwords can be decrypted. A knowledgeable attacker who is able to break this encryption can then log on to network resources by using the compromised account. For this reason, never enable Store password using reversible encryption for all users in the domain unless Application requirements outweigh the need to protect password information. If you use the Challenge Handshake Authentication Protocol (CHAP) through remote access or Internet Authentication Services (IAS), you must enable this policy setting. CHAP is an authentication protocol that is used by remote access and network connections. Digest Authentication in Internet Information Services (IIS) also requires that you enable this policy setting. If your organization uses CHAP through remote access or IAS, or Digest Authentication in IIS, you must configure this policy setting to Enabled. This presents a security risk when you App1y the setting through Group Policy on a user-by-user basis because it requires the appropriate user account object to be opened in Active Directory Users and Computers. 

Q97. HOTSPOT - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2. 

You create a windows PowerShell script named Scriptl.psl that contains the following configuration: 

You need to apply the configuration to Server1. The solution must ensure that the configuration on Server1 can be updated by modifying a MOF file on Server2. 

Which actions should you perform on each server? 

To answer, select the appropriate server on which to perform each action in the answer area. 


Q98. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table. 

You plan to create a snapshot of VM1. You need to recommend a solution to minimize the amount of disk space used for the snapshot of VM1. What should you do before you create the snapshot? 

A. Run the Stop-VM cmdlet. 

B. Run the Convert-VHD cmdlet. 

C. Decrease the Maximum RAM 

D. Decrease the Minimum RAM. 



What are virtual machine snapshots? 

Virtual machine snapshots capture the state, data, and hardware configuration of a running 

virtual machine. 

What are snapshots used for? 

Snapshots provide a fast and easy way to revert the virtual machine to a previous state. 

For this reason, virtual machine snapshots are intended mainly for use in development and 

test environments. Having an easy way to revert a virtual machine can be very useful if you 

need to recreate a specific state or condition so that you can troubleshoot a problem. 

There are certain circumstances in which it may make sense to use snapshots in a 

production environment. 

For example, you can use snapshots to provide a way to revert a potentially risky operation 

in a production environment, such as applying an update to the software running in the 

virtual machine. 

How are snapshots stored? 

Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly 

consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V 

in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located 

in the same folder as the virtual machine by default. In Hyper- V in Windows Server 2008 

R2, the files usually are located in the same folder as the virtual hard disk. The following 

exceptions affect the location of the snapshot data files: If the virtual machine was imported 

with snapshots, they are stored in their own folder. If the virtual machine has no snapshots 

and you configure the virtual machine snapshot setting, all snapshots you take afterwards 

will be stored in the folder you specify. 


Reducing the available RAM for the VM would reduce the size of the snapshot, what better 

than have the machine turn off, not using any memory. 

Q99. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. 

The domain contains an organizational unit (OU) named OU1 as shown in the OU1 exhibit. (Click the Exhibit button.) 

The membership of Group1 is shown in the Group1 exhibit. (Click the Exhibit button.) 

You configure GPO1 to prohibit access to Control Panel. GPO1 is linked to OU1 as shown in the GPO1 exhibit. (Click the Exhibit button.) 

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point. 


Q100. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The network contains a server named Server1 that runs Windows Server 2012 R2 and a server named Server2 that runs Windows Server 2008 R2 Service Pack 1 (SP1).Server1 and Server2 are member servers. 

You need to ensure that you can manage Server2 from Server1 by using Server Manager. 

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Install Remote Server Administration Tools on Server1. 

B. Install Windows Management Framework 3.0 on Server2. 

C. Install the Windows PowerShell 2.0 engine on Server1. 

D. Install Microsoft .NET Framework 4 on Server2. 

E. Install Remote Server Administration Tools on Server2. 

Answer: B,D 


To be able to fully manage remote servers that run Windows Server 2008 or the R2 Service Pack 1 operating system, you should install the .NET Framework 4 on Server2 first followed by the Windows Management Framework 3.0.