Skip to content

What Printable 70-410 dumps Is?

We provide real microsoft 70 410 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft mcsa 70 410 pdf Exam quickly & easily. The vce 70 410 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 70 410 installing and configuring windows server 2012 r2 dumps pdf and vce product and material, you can easily pass the 70 410 exam questions exam.

2018 NEW RECOMMEND

Free VCE & PDF File for Microsoft 70-410 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 70-410 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-410-dumps.html

Q1. – (Topic 3) 

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. 

You plan to replace a domain controller named DC1. DC1 has the schema operations master role. 

You need to transfer the schema master role to another domain controller named DC10 before you remove Active Directory from DC1. 

Which tool should you use? 

A. the ntdsutil command 

B. the Set-ADDomain cmdlet 

C. the Install-ADDSDomain cmdlet 

D. the dsadd command 

E. the dsamain command 

F. the dsmgmt command 

G. the net user command 

H. the Set-ADForest cmdlet 

Answer:

Explanation: To transfer the schema master role using the command line: 

Open Command Prompt. 

Type:.ntdsutil 

At the ntdsutil command prompt, type:.roles 

… 

.. .. 

At the fsmo maintenance command prompt, type:.connection At the server connections command prompt, type:.connect to serverDomainController At the server connections command prompt, type:.quit At the fsmo maintenance command prompt, type:.transfer schema master 

Reference: Transfer the schema master role 

Q2. – (Topic 2) 

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. 

The domain contains a user named User1 and a global security group named Group1. 

You need to ensure that User1 can manage the group membership of Group1. The solution must minimize the number of permissions assigned to User1. 

Which cmdlet should you run? 

A. Add-AdPrincipalGroupMembership 

B. Install-AddsDomainController 

C. Install-WindowsFeature 

D. Install-AddsDomain 

E. Rename-AdObject 

F. Set-AdAccountControl 

G. Set-AdGroup 

H. Set-User 

Answer:

Explanation: 

The Set-ADGroup cmdlet modifies the properties of an Active Directory group. You can modify commonly used property values by using the cmdlet parameters. For example, the –ManagedBy parameter allows you to specify a user or group of users who can manage the specified AD group. 

Q3. – (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. The domain contains a virtual machine named VM1. 

A developer wants to attach a debugger to VM1. 

You need to ensure that the developer can connect to VM1 by using a named pipe. 

Which virtual machine setting should you configure? 

A. BIOS 

B. Network Adapter 

C. COM 1 

D. Processor 

Answer:

Explanation: 

Named pipe. This option connects the virtual serial port to a Windows named pipe on the host operating system or a computer on the network. A named pipe is a portion of memory that can be used by one process to pass information to another process, so that the output of one is the input of the other. The second process can be local (on the same computer as the first) or remote (on a networked computer). For example, a local named pipe path could be \\\\.\\pipe\\mypipename. Named pipes can be used to create a virtual null modem cable between two virtual machines, or between a virtual machine and a debugging program on the host operating system that supports the use of named pipes. By connecting two virtual serial ports to the same named pipe, you can create a virtual null modem cable connection. Named pipes are useful for debugging or for any program that requires a null modem connection. 

Named pipes can be used to connect to a virtual machine by configuring COM 1. 

References: http://support.microsoft.com/kb/819036 http://support.microsoft.com/kb/141709 

Q4. – (Topic 2) 

You have a server that runs Windows Server 2012 R2. 

The disks on the server are configured as shown in the exhibit. (Click the Exhibit button.) 

You need to create a storage pool that contains Disk 1 and Disk 2. What should you do first? 

A. Delete volume E 

B. Convert Disk 1 and Disk 2 to dynamic disks 

C. Convert Disk 1 and Disk 2 to GPT disks 

D. Create a volume on Disk 2 

Answer:

Explanation: 

A. Storage Pools use unallocated space There is no way to create a storage pool with existing data. Storage pools are only a collection of drives that are managed by windows. 

Q5. – (Topic 3) 

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a folder named Folder1. 

You share Folder1 as Share1 by using Advanced Sharing. Access-based enumeration is 

enabled. 

Share1 contains an application named Appl.exe. 

You configure the NTFS permissions on Folder1 as shown in the following table. 

The members of Group2 report that they cannot make changes to the files in Share1. The 

members of Group1 and Group2 run Appl.exe successfully. 

You need to ensure that the members of Group2 can edit the files in Share1. 

What should you do? 

A. Replace the NTFS permissions on all of the child objects. 

B. Edit the Share permissions. 

C. Edit the NTFS permissions. 

D. Disable access-based enumeration. 

Answer:

Explanation: 

Share permissions and NTFS permissions are independent in the sense that neither changes the other. The final access permissions on a shared folder are determined by taking into consideration both the share permission and the NTFS permission entries. The more restrictive permissions are then applied. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter8: File Services and Storage, Lesson 2: Provisioning and Managing Shared Storage, p.388 

Q6. HOTSPOT – (Topic 2) 

Your network contains an Active Directory forest. The forest contains two domains named Domain1 and Domain2. 

Domain1 contains a file server named Server1. Server1 has a shared folder named Share1. 

Domain2 contains 50 users who require access to Share1. 

You need to create groups in each domain to meet the following requirements: 

. In Domain1, create a group named Group1. Group1 must be granted access to Share1. . In Domain2, create a group named Group2. Group2 must contain the user accounts of the 50 users. . Permission to Share1 must only be assigned directly to Group1. 

Which type of groups should you create and which group nesting strategy should you use? 

To answer, select the appropriate configuration in the answer area. 

Answer: 

Q7. HOTSPOT – (Topic 2) 

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a folder named Folder1. 

A user named User1 is a member of Group1 and Group2. A user named User2 is a 

member of Group2 and Group3. 

You need to identify which actions the users can perform when they access the files in 

Share1. 

What should you identify? 

To answer, select the appropriate actions for each user in the answer area. 

Answer: 

Q8. – (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The network contains a domain controller named DC1 that has the DNS Server server role installed. DC1 has a standard primary DNS zone for contoso.com. 

You need to ensure that only client computers in the contoso.com domain will be able to add their records to the contoso.com zone. 

What should you do first? 

A. Sign the contoso.com zone. 

B. Modify the Security settings of DC1. 

C. Modify the Security settings of the contoso.com zone. 

D. Store the contoso.com zone in Active Directory. 

Answer:

Explanation: 

Only Authenticated users can create records when zone is stored in AD. 

Secure dynamic updates allow an administrator to control what computers update what 

names and prevent unauthorized computers from overwriting existing names in DNS. 

References: 

Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 6: Network 

Administration, Lesson 2: Implementing DNSSEC, p. 237 

http://technet.microsoft.com/en-us/library/cc731204(v=ws.10).aspx 

http://technet.microsoft.com/en-us/library/cc755193.aspx 

Q9. – (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy. 

You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. 

You configure all of the client computers to use Server1 as their primary DNS server. 

You need to prevent Server1 from attempting to resolve Internet host names for the client computers. 

What should you do on Server1? 

A. Create a primary zone named “root”. 

B. Create a primary zone named "GlobalNames". 

C. Create a forwarder that points to 169.254.0.1. 

D. Create a primary zone named “.”. 

Answer:

Q10. – (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

You are running a training exercise for junior administrators. You are currently discussing spanned volumes. 

Which of the following is TRUE with regards to spanned volumes? (Choose all that apply.) 

A. Spanned volumes do not provide fault tolerance. 

B. Spanned volumes are a fault tolerant solution. 

C. You can extend a spanned volume onto a maximum of 16 dynamic disks. 

D. You cannot create a spanned volume using a system volume or boot volume. 

Answer: A,D 

Explanation: 

A spanned volume is a dynamic volume consisting of disk space on more than one physical disk. If a simple volume is not a system volume or boot volume, you can extend it across additional disks (up to 32 total) to create a spanned volume, or you can create a spanned volume in unallocated space on a dynamic disk. You need at least two dynamic disks in addition to the startup disk to create a spanned volume. You can extend a spanned volume onto a maximum of 32 dynamic disks. Spanned volumes are not fault tolerant.