(New Updated) PassLeader Supply New Microsoft 70-410 VCE and PDF Braindumps With 100 Percent Pass Guarantee (1-20)
100% Valid Dumps For 70-410 Exam Pass: PassLeader have been updated the 70-410 445q exam dumps and added the new exam questions, in the latest version of 70-410 445q PDF braindump or VCE practice test, you will get all the new changed 70-410 exam questions, which will help you 100% passing 70-410 exam, and you will get the free version of VCE Player together with your 70-410 445q VCE briandump. Welcome to visit our website -- passleader.com and get your 70-410 exam passed. QUESTION 1 How can you manage an newly installed Windows Server 2012 R2 core from a another Windows Server 2012 R2 with computer manager?
Answer:
QUESTION 2 Your network contain an active directory domain named Contoso.com. The domain contains two servers named server1 and server2 that run Windows Server 2012 R2. You create a security template named template1 by using the security template snap-in. You need to apply template1 to server2. Which tool should you use? A. Security Templates B. Computer Management C. Security Configuration and Analysis D. System Configuration Answer: C Explanation: A. Template was already created - Provide standard security option to use in security policies. B. Needs to be applied at the GP level. C. Security templates are inactive until imported into a Group Policy object or the SecurityConfiguration and Analysis. D. Tool to ID windows problems. http://technet.microsoft.com/en-us/library/jj730960.aspx http://windows.microsoft.com/en-us/windows-vista/using-system-configuration QUESTION 3 Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. You create a group Managed Service Account named gservice1. You need to configure a service named service1 to run as the gservice1 account. How should you configure service1? A. From Services Console configure the recovery settings B. From a command prompt ,run sc.exe and specify the config parameter C. From Windows PowerShell,run Set-Service and specify the -PassThrough parameter D. From a command prompt ,run sc.exe and specify the sdset parameter Answer: B Explanation: Sc config, Modifies the value of a service's entries in the registry and in the Service Control Manager database. obj= {<AccountName> | <ObjectName>} Specifies a name of an account in which a service will run, or specifies a name of the Windows driver object in which the driver will run. The default setting is LocalSystem. password= <Password> Specifies a password. This is required if an account other than the LocalSystem account is used. QUESTION 4 Your network contains an active directory domain named Contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named OU1. You need to ensure that user named user1 can link and unlink Group Policy Objects(GPOs) to OU1. The solution must minimize the number of permissions assigned to user1. What should you do? A. Run the Delegation of Control Wizard on the Policies containers B. Run the Set-GPPermission cmdlet C. Run the Delegation of Control Wizard on OU1 D. Modify the permission on the user1 account Answer: C Explanation: A. Not minimum permissions B. Grants a level of permissions to a security principal for one GPO or all the GPOs in a domain C. Minimizes delegated permission to a single OU D. Will not allow GPO changes to the OU Delegation of Control Wizard The following are common tasks that you can select to delegate control of them: Create, delete, and manage user accounts Reset user passwords and force password change at next logon Read all user information Modify the membership of a group Join a computer to a domain Manage Group Policy links Generate Resultant Set of Policy (Planning) Generate Resultant Set of Policy (Logging) Create, delete, and manage inetOrgPerson accounts Reset inetOrgPerson passwords and force password change at next logon Read all inetOrgPerson information http://technet.microsoft.com/en-us/library/dd145442.aspx http://technet.microsoft.com/en-us/library/ee461038.aspx http://technet.microsoft.com/en-us/library/cc732524.aspx QUESTION 5 You have a server named Server1 that runs Windows Server 2012 R2. Server1 has 2 dual-core processors and 16 GB of RAM. You install the Hyper-V server role in Server1. You plan to create two virtual machines on Server1. You need to ensure that both virtual machines can use up to 8 GB of memory. The solution must ensure that both virtual machines can be started simultaneously. What should you configure on each virtual machine? A. Dynamic Memory B. NUMA topology C. Memory weight D. Ressource Control Answer: A Explanation: A. Dynamic Memory adjusts the amount of memory available to a virtual machine, based on changes in memory demand and values that you specify. B. Used for high performance apps like SQL. C. Provides Hyper-V with a way to determine how to distribute memory among virtual machines if there is not enough physical memory available in the computer to give every virtual machine its requested amount of memory. D. Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual machine. http://technet.microsoft.com/en-us/library/ff817651(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831410.aspx http://technet.microsoft.com/en-us/library/cc742470.aspx QUESTION 6 You have a server named Server1 that runs Windows Server 2012 R2. You promote Server1 to domain controller. You need to view the service location (SVR) records that Server1 registers on DNS. What should you do on Server1? A. Open the Srv.sys file B. Open the Netlogon.dns file C. Run ipconfig/displaydns D. Run Get-DnsServerDiagnostics Answer: B Explanation: A. Timestamp server driver. B. Netlogon service creates a log file that contains all the locator resource records stored in netlogon. C. used to display current resolver cache content. D. Gets DNS event logging details. http://technet.microsoft.com/en-us/library/cc959303.aspx http://technet.microsoft.com/en-us/library/jj649883(v=wps.620).aspx QUESTION 7 Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Hyper-V server role installed. You have a virtual machine named VM1. VM1 has a snapshot. You need to modify the Snapshot File Location of VM1. What should you do First? A. Copy the snapshot file B. Pause VM1 C. Shut down VM1 D. Delete the snapshot Answer: D Explanation: How are snapshots stored? Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located in the same folder as the virtual machine by default. In Hyper-V in Windows Server 2008 R2, the files usually are located in the same folder as the virtual hard disk. The following exceptions affect the location of the snapshot data files: If the virtual machine was imported with snapshots, they are stored in their own folder. If the virtual machine has no snapshots and you configure the virtual machine snapshot setting, all snapshots you takeafterwards will be stored in the folder you specify. Caution: Do not delete .avhd files directly from the storage location. Instead, use Hyper-V Manager to select the virtual machine, and then delete the snapshots from the snapshot tree. Do not expand a virtual hard disk when it is used in a virtual machine that has snapshots. Doing so will make the snapshots unusable. http://technet.microsoft.com/en-us/library/dd560637(v=ws.10).aspx QUESTION 8 Hotspot Question You have a server named Server1 that runs Windows Server 2012 R2. Several users are members of the local Administrators group. You need to ensure that all local administrators receive User Account Control (UAC) prompts when they run a Microsoft Management Console (MMC). Which setting should you modify from the Local Security Policy? To answer, select the appropriate settings in the answer area.
Answer:
QUESTION 9 You have a network printer connected to print server. You need to be able to print if print server goes down. What should you chose? A. brach office direct printing B. printer pooling C. spooling D. Print forwarding Answer: A Explanation: Branch Office Direct Printing can reduce Wide Area Network (WAN) usage by printing directly to a print device instead of a server print queue. This feature can be enabled or disabled on a per printer basis and is transparent to the user. It is enabled by an administrator using the Print Management Console or Windows PowerShell on the server. The printer information is cached in the branch office, so that if the print server is unavailable for some reason (for example if the WAN link to the data center is down), then it is still possible for the user to print. Branch Office Direct Printing requires the following operating systems: - Windows Server 2012 - Windows 8 http://technet.microsoft.com/en-us/library/jj134156.aspx QUESTION 10 You have external virtual switch with srv-io enabled with 10 Virtual Machines on it. You need to make the Virtual Machines able to talk only to each other. A. remove the vswitch and recreate it as private. B. add new vswitch C. remove vswitch and recreate it as public D. adjust srv-io settings Answer: A Explanation: There are three possible modes for the Hyper-V switch: private, internal, and public. Do not confuse these with IP addressing schemes or any other networking configuration in a different technology. Private Switch The private switch allows communications among the virtual machines on the host and nothing else. Even the management operating system is not allowed to participate. This switch is purely logical and does not use any physical adapter in any way. "Private" in this sense is not related to private IP addressing. You can mentally think of this as a switch that has no ability to uplink to other switches. Internal Switch The internal switch is similar to the private switch with one exception: the management operating system can have a virtual adapter on this type of switch and communicate with any virtual machines that also have virtual adapters on the switch. This switch also does not have any matching to a physical adapter and therefore also cannot uplink to another switch. External Switch This switch type must be connected to a physical adapter. It allows communications between the physical network and the management operating system and virtual machines. Do not confuse this switch type with public IP addressing schemes or let its name suggest that it needs to be connected to a public-facing connection. You can use the same private IP address range for the adapters on an external virtual switch that you're using on the physical network it's attached to http://www.altaro.com/hyper-v/the-hyper-v-virtual-switch-explained-part-1/#ixzz2W095PeZd http://technet.microsoft.com/en-us/library/hh831823.aspx http://www.altaro.com/hyper-v/hyper-v-virtual-switch-explained-part-2/ http://www.passleader.com/70-410.html QUESTION 11 Hotspot Question Your network contains an Active Directory domain named corp.contoso.com. The domain contains a domain controller named DC1. When you run ping dcl.corp.contoso.com, you receive the result as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that DC1 can respond to the Ping command. Which rule should you modify? To answer, select the appropriate rule in the answer area.
Answer:
QUESTION 12 Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.
You install a new server named Server 1 that runs a Server Core Instillation of Windows Server 2012 R2. You need to join Server 1 to the contoso.com domain. The solution must minimize administrative effort. What should you use? A. The dsadd.exe command B. The New-ADComputer cmdlet C. The Djoin.exe command D. The Add-Computer cmdlet Answer: D Explanation: A. Adds specific types of objects to the directory. B. Creates a new Active Directory computer. C. Use djoin for offline join in the perimeter network . D. Add the local computer to a domain or workgroup. http://technet.microsoft.com/en-us/library/ee617245.aspx http://technet.microsoft.com/en-us/library/ff793312(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh849798.aspx QUESTION 13 Drag and Drop Question You have a print server named Server1. Server1 runs Windows Server 2008 R2. You have a file server named Server2. Server2 runs Windows Server 2012 R2. You need to migrate all of the printers on Server1 to Server2. Which actions should you perform on the servers2?
Answer:
Explanation: printbrm -p all:org - Publishes all printers in the directory, or publishes printers that were published originally. While the original server is still running, use the Printer Migration Wizard or the Printbrm.exe command-line tool to export or back up the print information (such as settings, queues, and drivers) in a printer settings file. Then, import or restore this backup image to a destination server running Windows Server 2012 that has been configured to run as a print server. http://technet.microsoft.com/en-us/library/jj134150.aspx QUESTION 14 Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 and is configured as the only domain controller. You need to retrieve a list of all the user accounts. The list must include the last time each user was authenticated successfully. Which Windows PowerShell command should you run? (To answer, drag the appropriate cmdlet or property to the correct locations to complete the PowerShell command in the answer area. Each cmdlet or property may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
Explanation: To produce a listing of all the users and their last logon date, you can use a command. Get-ADUser -Filter * -Properties "LastLogonDate" | sort-object -property lastlogondate -descending | Format-Table -property name, lastlogondate -AutoSize http://blogs.technet.com/b/heyscriptingguy/archive/2010/07/20/hey-scripting-guy-how-can-i-use-windows-powershell-to-identify-inactive-user-accounts-in-active-directory-domain-services.aspx http://technet.microsoft.com/en-us/library/ee617192.aspx http://technet.microsoft.com/en-us/library/cc732952(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc732979.aspx QUESTION 15 Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 contains a single virtual machine named VM1. You need to ensure that a user named User1 can manage the virtual machine settings of VM1. The solution must minimize the number of permissions assigned to User1. To which group should you add User1? A. Server Operators B. Administrators C. Power Users D. Hyper-V Administrators Answer: D Explanation: This group can reduce the number of users that belong to the local Administrators group while providing users with access to Hyper-VSimplified authorization: The Hyper-V Administrators group is introduced and is implemented as a local security group. What value does this change add? This group can reduce the number of users that belong to the local Administrators group while providingusers with access to Hyper-V. What works differently? The Hyper-V Administrators group is a new local security group. Add users to this group instead of thelocal Administrators group to provide them with access to Hyper-V. Members of the Hyper-V Administrators have complete and unrestricted access to all features of Hyper-V. http://technet.microsoft.com/en-us/library/hh831410.aspx QUESTION 16 Your network contains an Active Directory domain named contoso.com. The domain contains a server named Windows Server 2012 R2. You create a group Managed Service Account named gservice1. You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1? A. From the Services console, configure the General settings. B. From Windows PowerShell, run Set-Service and specify the -StartupType parameter. C. From a command prompt, run sc.exe and specify the config parameter. D. From a command prompt, run sc.exe and specify the privs parameter. Answer: C Explanation: A. General settings only allow you to stop, start and set type/paramaters. B. Set-Service provides a way for you to change the Description, StartupType, or DisplayName of a service. C. Modifies service configuration. D. Sets the response/action on service failure. http://windows.microsoft.com/en-us/windows-vista/using-system-configuration http://technet.microsoft.com/en-us/library/ee176963.aspx http://technet.microsoft.com/en-us/library/cc990290(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc738230(v=ws.10).aspx QUESTION 17 Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. A user named User1 attempts to log on to DO, but receives the error message shown in the exhibit. (Click the Exhibit button.)
You need to ensure that User1 can log on to DC1. What should you do? A. Modify the Account is sensitive and cannot be delegated setting of the User1 account. B. Grant User1 the Allow log on locally user right. C. Modify the Logon Workstations setting of the User1 account. D. Add User1 to the Remote Management Users group. Answer: B Explanation: Domain controllers, by default, restrict the types of user accounts that have the ability to log on locally. Domain controllers, by default, restrict the types of user accounts that have the ability to log on locally. By default, only members of the Account Operators, Administrators, Backup Operators, Print Operators, andServer Operators groups have the Allowed logon locally system right. If you want to grant a user account theability to log on locally to a domain controller, you must either make that user a member of a group that alreadyhas the Allowed logon locally system right or grant the right to that user account. Edit Default Domain Controllers Policy Expand Computer Configuration, Policies, Windows Settings, Security Settings, Local Policies, click UserRights Assignment. Double-click Allow Logon Locally. http://technet.microsoft.com/en-us/library/ee957044(v=ws.10).aspx QUESTION 18 Your network contains a single Active Directory domain named contoso.com. The network contains two subnets. The subnets are configured as shown in the following table.
The network contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the DHCP Server server role installed. Server1 is configured to lease IP addresses to the two subnets. You discover that computers on the Warehouse subnet that have static IP addresses can communicate with the computers on the MainOffice subnet. Computers on the Warehouse subnet that obtain an IP address automatically can only communicate with other computers on the Warehouse subnet. You need to ensure that all of the computers on the Warehouse subnet can communicate with the computers on the MainOffice subnet. Which DHCP option should you configure on Server1? A. 003 Router B. 011 Resource Location Servers C. 020 Nonlocal Source Routing D. 019 IP Layer Forwarding Answer: A Explanation: A. This option is normally used to assign a default gateway to DHCP clients on a subnet. A DHCP clientrequests this option. B. This option specifies a list of IP addresses for resource location servers. C. This option specifies whether the DHCP client enables or disables the forwarding at the IP layer ofdatagrams that contain source routing information and were sent by a non-local host. D. This option specifies whether the DHCP client should enable or disable forwarding of datagrams at the IPlayer. http://technet.microsoft.com/en-us/library/dd145324(v=ws.10).aspx http://technet.microsoft.com/en-us/library/ee941211(v=ws.10).aspx QUESTION 19 Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy. You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent Server1 from attempting to resolve Internet host names for the client computers. What should you do on Server1? A. Configure the Security settings of the contoso.com zone. B. Remove all root hints. C. Create a primary zone named ".". D. Create a primary zone named "root". E. Create a primary zone named "GlobalNames". F. Create a forwarder that points to 169.254.0.1. G. Create a stub zone named "root". H. Create a zone delegation for GlobalNames.contoso.com. Answer: BC Explanation: B. necessary to remove the default root hints files C. Create a primary zone named "." ( dot zone, root ) When you install DNS on a Windows server that does not have a connection to the Internet, the zone for the domain is created and a root zone, also known as a dot zone, is also created. This root zone may prevent access to the Internet for DNS and for clients of the DNS. If there is a root zone, there are no other zones other than those that are listed with DNS, and you cannot configure forwarders or root hint servers. Root domain This is the top of the tree, representing an unnamed level; it is sometimes shown as two empty quotation marks (""), indicating a null value. When used in a DNS domain name, it is stated by a trailing period (.) to designate that the name is located at the root or highest level of the domain hierarchy. In this instance, the DNS domain name is considered to be complete and points to an exact location in the tree of names. Names stated this way are called fully qualified domain names (FQDNs). http://technet.microsoft.com/en-us/library/cc772774%28v=ws.10%29.aspx http://youtu.be/KjMDtlR6Mhk http://support.microsoft.com/kb/298148/en-us QUESTION 20 Your company has a remote office that contains 600 client computers on a single subnet. You need to select a subnet mask for the network that will support all of the client computers. The solution must minimize the number of unused addresses. Which subnet mask should you select? A. 255.255.252.0 B. 255.255.254.0 C. 255.255.255.0 D. 255.255.255.128 Answer: A Explanation: Using a subnet mask of 255.255.252.0 will result in the fewest number of unused IP addresses. http://www.passleader.com/70-410.html
|