Microsoft: Exam 70-410
Microsoft: Exam 70-410
Microsoft: Exam 70-410
Exam 70-410
Installing and Configuring Windows Server 2012
Instant Download
Printable PDF Document
Test Software & Online Engine Included
Download and study offline
Written in plain English
Highest success rate!
Verified answers for all questions
100% Pass and Money Back Guarantee
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the
Hyper-V server role installed.
An iSCSI SAN is available on the network.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
You create a LUN on the SAN to host the virtual hard drive files for the virtual machines.
You need to create a 3-TB virtual hard disk for VM1 on the LUN. The solution must prevent
VM1 from being paused if the LUN runs out of disk space.
Which type of virtual hard disk should you create on the LUN?
Answer: B
Question: 2
Your network contains an Active Directory domain named adatum.com. The domain
contains a member server named Host1. Host1 runs Windows Server 2012 R2 and has the
Hyper-V server role installed.
Host1 hosts two virtual machines named VM5 and VM6. Both virtual machines connect to a
virtual switch named Virtual1.
On VM5, you install a network monitoring application named Monitor1.
You need to capture all of the inbound and outbound traffic to VM6 by using Monitor1.
Which two commands should you run from Windows PowerShell? (Each correct answer
presents part of the solution. Choose two.)
Answer: C, E
Explanation:
-PortMirroring specifies the port mirroring mode for the network adapter. This can be set to
None, Source, and Destination.
Question: 3
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 has
the virtual switches listed in the following table.
You create a virtual machine named VM1.VM1 has two network adapters. One network
adapter connects to vSwitch1. The other network adapter connects to vSwitch2.You
configure NIC teaming on VM1.
You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the
network.
What should you do on Server1?
Answer: A
Question: 4
Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V
hosts contains several virtual machines that run Windows Server 2012 R2.
You install the Network Load Balancing feature on the virtual machines.
You need to configure the virtual machines to support Network Load Balancing (NLB).
Which virtual machine settings should you configure?
A. DHCP guard
B. Port mirroring
C. Router guard
D. MAC address
Explanation:
http://social.technet.microsoft.com/Forums/windowsserver/en-US/5b3a0a9d-26a2-49ba-
bbbe- 29d11fcbb7ce/nlb-on-hyperv?forum=winserverhyperv
For NLB to be configured you need to enable MAC address spoofing.
Question: 5
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the
Hyper-V server role installed. Server1 is connected to two Fibre Channel SANs and is
configured as shown in the following table.
Answer: A
Explanation:
A virtual fibre channel SAN will group physical HBA ports together so that you can add a
virtual fibre channel adapter to a virtual machine that can be connected to a virtual SAN.
Question: 6
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1.Server1 runs Windows Server 2012 R2 and has the
Hyper-V server role installed.
On Server1, you create and start a virtual machine named VM1.VM1 is configured as shown
in the following table.
You need to recommend a solution to minimize the amount of disk space used for the
checkpoint of VM1.
What should you do before you create the checkpoint?
Answer: B
Question: 7 HOTSPOT
You have a Hyper-V host named Hyperv1 that runs Windows Server 2012 R2.Hyperv1 hosts
a virtual machine named Server1.Server1 uses a disk named Server1.vhdx that is stored
locally on Hyperv1.
You stop Server1, and then you move Server1.vhdx to an iSCSI target that is located on
another server.
You need to configure Server1 to meet the following requirements:
Ensure that Server1 can start by using Server1.vhdx.
Prevent Server1.vhdx from consuming more than 500 IOPS on the iSCSI target.
Which two objects should you configure?
To answer, select the appropriate two objects in the answer area.
You have a print server named Server1 that runs Windows Server 2012 R2.
You discover that when there are many pending print jobs, the system drive occasionally
runs out of free space.
You add a new hard disk to Server1.You create a new NTFS volume.
You need to prevent the print jobs from consuming disk space on the system volume.
What should you modify?
Question: 9HOTSPOT
A printer named Printer1 is configured as shown in the exhibit.(Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point.
Explanation:
* The printer is paused.
* Jobs can always be permitted (even if the printer is paused, or printer not started).
Note:
StartTime
Date and time that a printer can start to print a job—if the printer is limited to print at specific
times. This value is expressed as the time elapsed since 12:00 AM GMT (Greenwich Mean
Time).
Question: 10 HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain
contains a print server named Server1 that runs Windows Server 2012 R2.
You share several printers on Server1.
You need to ensure that you can view the printer objects associated to Server1 in Active
Directory Users and Computers.
Which option should you select?
Answer:
Explanation:
You can view printer objects in Active Directory by clicking Users, Groups, and Computers
as containers from the View menu in the Active Directory Users and Computers snap-in. By
default, printer objects are created under the machine object in which they are shared. After
you turn on the Users, Groups, and Computers as containers option, you can see printers by
expanding the printer's host computer.
References:
http://support.microsoft.com/kb/235925
You have a shared folder named Share1. The folder permissions of Share1 are configured
as shown in the Folder Permissions exhibit.(Click the Exhibit button.)
The Share permissions of Share1 are configured as shown in the Share Permissions
exhibit.(Click the Exhibit button.)
Answer:
Explanation:
NTFS permissions control access to the files and folders stored on disk volumes formatted
with the NTFS file system. Share permissions control access to folders over a network. To
access a file over a network, a user must have appropriate share permissions (and
appropriate NTFS permissions if the shared folder is on an NTFS volume).Granting a user
Full Control NTFS permission on a folder enables that user to take ownership of the folder
unless the user is restricted in some other way.User1 was not granted Full Control
permission.
The Administrators have Full Control permission. I assume that User2 is an administrator
since the Group1 exhibit shows only User1 as a member.
References:
Question: 12
Your network contains an Active Directory domain named adatum.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2.
On a server named Corel, you perform a Server Core Installation of Windows Server 2012
R2.You join Corel to the adatum.com domain.
You need to ensure that you can use Event Viewer on Server1 to view the event logs on
Corel.
What should you do on Corel?
Answer: A
Explanation:
Information regarding IPsec policy changes, etc. can be found in the Event Viewer. Thus you
need to enable the NetFirewallRule command. This will allow you to view the event logs.
Question: 13
Your network contains two servers named Server1 and Server2 that run Windows Server
2012 R2.Server1 and Server2 are part of a workgroup.
On Server1 and Server2, you create a local user account named Admin1.You add the
account to the local Administrators group. On both servers, Admin1 has the same password.
You log on to Server1 as Admin1.You open Computer Management and vol.connect to
Server2.
When you attempt to create a scheduled task, view the event logs, and manage the shared
folders, you receive Access Denied messages.
You need to ensure that you can administer Server2 remotely from Server1 by using
Computer Management.
What should you configure on Server2?
Explanation:
The LocalAccountTokenFilterPolicy setting affects how administrator credentials are applied
to remotely administer the computer.
References:
http://support.microsoft.com/kb/942817
Question: 14 HOTSPOT
You have a print server named Server1 that runs Windows Server 2012 R2.
On Server1, you create and share a printer named Printer1.
The Advanced settings of Printer1 are shown in the Advanced exhibit.(Click the Exhibit
button.)
The Security settings of Printer1 are shown in the Security exhibit. (Click the Exhibit button.)
Answer:
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1
has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services
(WDS).
You need to ensure that the next time VM2 restarts, you can connect to the WDS server by
using PXE,
Which virtual machine setting should you configure for VM2?
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Explanation:
Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is
booting from the network is first.
References:
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3:
Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V
Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335
Question: 16
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1
has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You plan to schedule a complete backup of Server1 by using Windows Server Backup.
You need to ensure that the state of VM1 is saved before the backup starts.
What should you configure?
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Explanation:
The Integration Services settings on virtual machines include services such as operating
system shutdown, time synchronization, data exchange, Heartbeat, and Backup (volume
snapshot services). This snapshot will ensure that the state of VM1 is saved prior to backup.
References:
http://msdn.microsoft.com/en-us/library/dd405549(v=vs.85).aspx
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3:
Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144
Question: 17
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1
has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
VM2 sends and receives large amounts of data over the network.
You need to ensure that the network traffic of VM2 bypasses the virtual switches of the
parent partition.
What should you configure?
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Explanation:
Single-root I/O virtualization -capable network adapters can be assigned directly to a virtual
machine to maximize network throughput while minimizing network latency and the CPU
overhead required for processing network traffic.
References:
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh831410.aspx
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3:
Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V
Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335
Question: 18
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1
has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You need to ensure that VM1 can use more CPU time than the other virtual machines when
the CPUs on Server1 are under a heavy load.
What should you configure?
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Explanation:
B. Resource controls provide you with several ways to control the way that Hyper-V
allocates resources to virtual machine. Resource control in used in the event where you
need to adjust the computing resources of a virtual machine, you can reconfigure the
resources to meet the changing needs. You can also specify resource controls to automate
how resources are allocated to virtual machines.
References:
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh831410.aspx
http://technet.microsoft.com/en-us/library/cc742470.aspx
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3:
Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V
Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335
Question: 19 HOTSPOT
Question: 20 HOTSPOT
Select Yes if the statement can be shown to be true based on the available information;
otherwise select No. Each correct selection is worth one point.
Answer:
Question: 21 HOTSPOT
Your network contains an Active Directory domain named adatum.com. All domain
controllers run Windows Server 2012 R2.All client computers run Windows 7. The computer
accounts for all of the client computers are located in an organizational unit (OU) named
OU1.
An administrator links a Group Policy object (GPO) to OU1. The GPO contains several
application control policies.
You discover that the application control policies are not enforced on the client computers.
You need to modify the GPO to ensure that the application control policies are enforced on
the client computers.
What should you configure in the GPO?
To answer, select the appropriate service in the answer area.
Question: 22
Your network contains an Active Directory domain named contoso.com. You have a Group
Policy object (GPO) named GP1 that is linked to the domain.GP1 contains a software
restriction policy that blocks an application named App1.
Answer: B
Question: 23
Your network contains an Active Directory domain named contoso.com. All client computer
accounts are in an organizational unit (OU) named AllComputers. Client computers run
either windows 7 or Windows 8.
You create a Group Policy object (GPO) named GP1.
You link GP1 to the AllComputers OU.
You need to ensure that GP1 applies only to computers that have more than 8 GB of
memory.
What should you configure?
Answer: D
Explanation:
Windows Management Instrumentation (WMI) filters allow you to dynamically determine the
scope of Group Policy objects (GPOs) based on attributes of the target computer.
When a GPO that is linked to a WMI filter is applied on the target computer, the filter is
evaluated on the target computer. If the WMI filter evaluates to false, the GPO is not applied
(except if the client computer is running Windows Server, in which case the filter is ignored
and the GPO is always applied).If the WMI filter evaluates to true, the GPO is applied.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10:
Implementing Group Policy, p.470, 482
http://technet.microsoft.com/en-us/library/jj134176
WMI filtering using GPMC
Your network contains an Active Directory domain named contoso.com. The domain
contains an application server named Server1.Server1 runs Windows Server 2012 R2.
Server1 is configured as an FTP server.
Client computers use an FTP application named App1.exE. App1.exe uses TCP port 21 as
the control port and dynamically requests a data port.
On Server1, you create a firewall rule to allow connections on TCP port 21.
You need to configure Server1 to support the client connections from App1.exE.
What should you do?
Answer: A
Explanation:
The Netshadvfirewall set global statefulftp command will configure how Windows Firewall
with Advanced Security handles FTP traffic that uses an initial connection on one port to
request a data connection on a different port.
When statefulftp is enabled (Disabled being the default setting) the firewall tracks the port
numbers specified in PORT command requests and in the responses to PASV requests, and
then allows the incoming FTP data traffic entering on the requested port number.
Question: 25
Explanation:
A. Server2 needs inbound on 3080
References:
http://social.technet.microsoft.com/wiki/contents/articles/13894.troubleshooting-windows-
firewall-withadvanced-security-in-windows-server-2012.aspx
Question: 26
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
You create a security template named Template1 by using the Security Templates snap-in.
You need to apply Template1 to Server2.
Which tool should you use?
A. Authorization Manager
B. Local Security Policy
C. Certificate Templates
D. System Configuration
Answer: B
Explanation:
A security policy is a combination of security settings that affect the security on a computer.
You can use your local security policy to edit account policies and local policies on your local
computer.
Question: 27
Explanation:
You should use GlobalNames zone to take advantage of single-label names. This will also
ensure that the zone remains valid.
References:
Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4:
Deploying and configuring core network services, Objective 4.3: Deploy and Configure the
DNS service, p.233
http://technet.microsoft.com/en-us/library/cc731744.aspx
Question: 28 HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain
contains a single location named Site1. The domain contains a server named Server1 that
has the DHCP Server server role installed.
All client computers receive their IPv4 configurations dynamically.
The domain will expand to include a second location named Site2.A server named Server2
will be deployed to Site2.Site1 and Site2 will connect to each other by using a WAN link.
You need to ensure that the clients in both sites receive their IPv4 configurations from
Server1.
In the table below, identify which actions must be performed on each server. Make only one
selection in each row. Each correct selection is worth one point.
Answer:
Question: 29
Your network contains an Active Directory domain named contoso.com. The DNS zone for
contoso.com is Active-Directory integrated.
The domain contains 500 client computers. There are an additional 20 computers in a
workgroup.
You discover that every client computer on the network can add its record to the
contoso.com zone.
You need to ensure that only the client computers in the Active Directory domain can
register records in the contoso.com zone.
What should you do?
Answer: B
Question: 30
You need to ensure that when you run Nslookup, the correct name of the default server is
displayed.
What should you do?
Answer: A
Explanation:
Make sure that a reverse lookup zone that is authoritative for the PTR resource record
exists.
PTR records contain the information that is required for the server to perform reverse name
lookups.
References:
http://technet.microsoft.com/en-us/library/cc961417.aspx
Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4:
Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6
addressing, p.246
Question: 31
DRAG DROP
You are configuring a multi-subnet IPv6 network for a regional office.
The corporate network administrator allocates the 2001:0db8:1234:0800: :/54 address space
for your use.
You need to identify network IDs of the first and last subnets that you will be able to create at
the office.
Answer:
Question: 32
DRAG DROP
You plan to deploy a DHCP server that will support four subnets. The subnets will be
configured as shown in the following table.
You need to identify which network ID you should use for each subnet.
What should you identify?
To answer, drag the appropriate network ID to the each subnet in the answer area.
Explanation
References:
Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4:
Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6
addressing, p.192, 196
Question: 33
Answer: B
Explanation:
The only way to change the subnet mask of a scope is to delete and recreate the scope.
Set-DhcpServerv4Scope does not include a parameter for the subnet mask.
Question: 34
DRAG DROP
You have a server named Server1.Server1 runs Windows Server 2012 R2.
Server1 has two network adapters. Each network adapter must be configured as shown in
the following table.
You need to configure the correct IPv6 address prefix for each network adapter.
Which prefix should you select for each network adapter?
To answer, drag the appropriate IPv6 prefix to the correct network adapter in the answer
area.
Each prefix may be used once, more than once, or not at all. You may need to drag the split
bar between panes or scroll to view content.
Explanation:
An IPv6 multicast address always begins with 11111111 or FF and includes additional
structure that identifies the scope of the address and the multicast group to which the
interface belongs.IPv6 multicast addresses, therefore, are always of the form FF00::/8.
References:
http://www.ian
A. org/assignments/ipv6-address-space/ipv6-address-spacE. xml
Question: 35
Your company has a main office and two branch offices. The offices connect to each other
by using a WAN link.
In the main office, you have a server named Server1 that runs Windows Server 2012 R2.
Server1 is configured to use an IPv4 address only.
You need to assign an IPv6 address to Server1. The IP address must be private and
routable.
Which IPv6 address should you assign to Server1?
A. 2001:ab32:145c::32cc:401b
B. ff00:3rff:65df:145c:dca8::82a4
C. fd00:ab32:14:ad88:ac:58:abc2:4
D. fe80:ab32:145c::32cc:401b
Explanation:
Unique local addresses
Unique local addresses are IPv6 addresses that are private to an organization in the same
way that private addresses—such as 10.x.x.x, 192.168.x.x, or 172.16.0.0 -
172.31.255.255—can be used on an IPv4 network.
Unique local addresses, therefore, are not routable on the IPv6 Internet in the same way that
an address like 10.20.100.55 is not routable on the IPv4 Internet.
A unique local address is always structured as follows:
The first 8 bits are always 11111101 in binary format. This means that a unique local
address always begins with FD and has a prefix identifier of FD00::/8.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 6: p.266
Question: 36
In an isolated test environment, you deploy a server named Server1 that runs a Server Core
Installation of Windows Server 2012 R2. The test environment does not have Active
Directory Domain Services (AD DS) installed.
You install the Active Directory Domain Services server role on Server1.
You need to configure Server1 as a domain controller.
Which cmdlet should you run?
A. Install-ADDSDomain
B. Install-ADDSDomainController
C. Install-WindowsFeature
D. Install-ADDSForest
Answer: D
Question: 37
You have a server named Server1 that runs Windows Server 2012 R2.
You promote Server1 to a domain controller.
You need to view the service location (SRV) records that Server1 registers in DNS.
What should you do on Server1?
Question: 38
Your network contains an Active Directory domain named adatum.com. The domain
contains several thousand member servers that run Windows Server 2012 R2.All of the
computer accounts for the member servers are in an organizational unit (OU) named
ServersAccounts.
Servers are restarted only occasionally.
You need to identify which servers were restarted during the last two days.
What should you do?
Answer: D
Question: 39
Your network contains an Active Directory forest. The forest contains a single domain named
contoso.com. The domain contains four domain controllers. The domain controllers are
configured as shown in the following table.
Answer: D
Question: 40
Your network contains an Active Directory forest that contains three domains.
A group named Group1 is configured as a domain local distribution group in the forest root
domain.
You plan to grant Group1 read-only access to a shared folder named Share1.Share1 is
located in a child domain.
You need to ensure that the members of Group1 can access Share1.
What should you do first?
Answer: A
Explanation:
Universal can be used for any domain or forest. Furthermore a Universal group can span
multiple domains, even the entire forest.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 5: Install
and Administer Active Directory, Objective 5.3 Create and manage Active Directory groups
and Organization units, p. 289-291, 293
http://technet.microsoft.com/en-us/library/cc781446(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc755692(v=ws.10).aspx
Question: 41
Your network contains an Active Directory domain named contoso.com. The domain
contains 100 servers. The servers are contained in an organizational unit (OU) named
ServersOU.
You need to create a group named Group1 on all of the servers in the domain.You must
ensure that Group1 is added only to the servers.
What should you configure?
Answer: C
Explanation:
C. allows you to centrally manage local users and groups on domain member computers
and is this is the correct OU for the GPO change
References:
http://technet.microsoft.com/en-us/library/cc957640.aspx
http://technet.microsoft.com/en-us/library/cc731972.aspx
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 5.3 Create
and manage Active Directory groups and Organization units, Chapter 5: Install and
Administer Active Directory, p. 289-291, 293, 328
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10: Implement
Group Policy, p. 507
Question: 42
Your network contains an Active Directory forest named contoso.com. All domain controllers
currently run Windows Server 2008 R2.
You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2.
The new domain controller will have the following configurations:
Schema master
Global catalog server
Active Directory Federation Services server role
Active Directory Certificate Services server role
You need to identify which configuration can be fulfilled by using the Active Directory Domain
Services Configuration Wizard.
Which configuration should you identify?
Answer: A
Question: 43
When the link between Site1 and Site2 fails, users fail to log on to Site2.
You need to identify what prevents the users in Site2 from logging on to the
child.contoso.com domain.
What should you identify?
Answer: D
Explanation:
The exhibit shows that Site2 does not have a PDC emulator. This is important because of
the close interaction between the RID operations master role and the PDC emulator role
The PDC emulator processes password changes from earlier-version clients and other
domain controllers on a best-effort basis; handles password authentication requests
involving passwords that have recently changed and not yet been replicated throughout the
domain; and, by default, synchronizes time. If this domain controller cannot connect to the
PDC emulator, this domain controller cannot process authentication requests, it may not be
able to synchronize time, and password updates cannot be replicated to it.
Question: 44
DRAG DROP
Answer:
Explanation:
When you uninstall "Server-GUI-Shell" you are left with a "Minimal Server Interface"
server.So, File Explorer and IE10 are unavailable, but MMC and Server Manager works and
MMC and Server Manager will allow you to restart server2 either locally or remotely from
Server1.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 2: Deploying
Servers, p.44
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 1: Installing
and Configuring Servers, p.19-22
Question: 45
You have a server named Server1 that runs Windows Server 2012 R2.
You plan to create a storage pool that will contain a new volume.
You need to create a new 600-GB volume by using thin provisioning. The new volume must
use the parity layout.
What is the minimum number of 256-GB disks required for the storage pool?
A. 2
B. 3
Answer: C
Explanation:
Based on the RAID calculators, in order to do a parity drive (raid 5) of 600GB will require at
least 4 drives.
References:
http://technet.microsoft.com/en-us/library/hh831391.aspx
http://www.ibeast.com/content/tools/RaidCalc/RaidCalc.asp
http://www.raid-calculator.com/default.aspx
https://www.icc-usa.com/raid-calculator
Question: 46
You have a server named Server1 that runs Windows Server 2012 R2.
You plan to use Windows PowerShell Desired State Configuration (DSC) to confirm that the
Application Identity service is running on all file servers.
You define the following configuration in the Windows PowerShell Integrated Scripting
Environment (ISE):
A. Service1
B. Configuration1
C. Start DscConfiguration
D. Test-DscConfigu ration
Answer: B
Question: 47
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1.Server1 runs Windows Server 2012 R2.
Answer: C
Explanation:
Executing the ss.exe command with the config parameter will modify service configuration.
Question: 48 HOTSPOT
You have a server named Server1 that runs Windows Server 2012 R2.
You need to switch Server1 to a Server Core installation of Windows Server 2012 R2.
What command should you run?
To answer, select the appropriate options in the answer area.
Answer:
You have a Hyper-V host named Server1 that runs Windows Server 2008 R2.All of the
virtual machines on Server1 use VHDs.
You install the Hyper-V server role on a server named Server2 that runs Windows Server
2012 R2.Server2 has the same hardware configurations as Server1.
You plan to migrate the Hyper-V host from Server1 to Server2 by using the Windows Server
Migration Tools.
In the table below, identify what can be migrated by using the Windows Server Migration
Tools. Make only one selection in each row. Each correct selection is worth one point.
Answer:
Explanation:
Question: 50
DRAG DROP
You have a server named Server1 that runs Windows Server 2012 R2.
You need to create a new volume on Server1.
The new volume must have the following configurations:
Be stored on a new virtual hard disk
Be assigned the drive letter G
Have the NTFS file system
In which order should you run the Diskpart commands?
To answer, move all the Diskpart commands from the list of commands to the answer area
and arrange them in the correct order.
Answer:
Explanation:
Note: Example:
Question: 51
DRAG DROP
Your network contains three servers. The servers are configured as shown in the following
tablE.
Your company plans to standardize all of the servers on Windows Server 2012 R2.
You need to recommend an upgrade path for each server.
The solution must meet the following requirements:
Upgrade the existing operating system whenever possible.
Minimize hardware purchases.
Which upgrade path should you recommend for each server?
To answer, drag the appropriate upgrade path to each server in the answer area.Each
upgrade path may be used once, more than once, or not at all.
Answer:
Question: 52
Your network contains an Active Directory forest named contoso.com. The forest contains a
single domain. The domain contains two domain controllers named DC1 and DC2 that run
Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You need to modify the SAM account name of Group1.
Which cmdlet should you run?
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController
C. Install-WindowsFeature
D. Install-AddsDomain
E. Rename AdObject
F. Set AdAccountControl
G. Set-AdGroup
H. Set-User
Answer: E
Your network contains an Active Directory forest named contoso.com. The forest contains a
single domain. The domain contains two domain controllers named DC1 and DC2 that run
Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You need to add a new domain controller to the domain.
You install Windows Server 2012 R2 on a new server named DC3.
Which cmdlet should you run next?
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController
C. Install WindowsFeature
D. Install AddsDomain
E. Rename-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User
Answer: C
Question: 54
Your network contains an Active Directory forest named contoso.com. The forest contains a
single domain. The domain contains two domain controllers named DC1 and DC2 that run
Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You need to prevent User1 from changing his password. The solution must minimize
administrative effort.
Which cmdlet should you run?
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController
C. Install-WindowsFeature
D. Install-AddsDomain
E. Rename AdObject
F. Set AdAccountControl
G. Set-AdGroup
H. Set-User
Answer: F
Question: 55
Your network contains an Active Directory forest named contoso.com. The forest contains a
single domain. The domain contains two domain controllers named DC1 and DC2 that run
Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You reconfigure DC2 as a member server in the domain.
You need to add DC2 as the first domain controller in a new domain in the forest.
Which cmdlet should you run?
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController
C. Install-WindowsFeature
D. Install-AddsDomain
E. Rename AdObject
F. Set AdAccountControl
G. Set-AdGroup
H. Set-User
Answer: D
Explanation:
Installs a new Active Directory domain configuration
C:\PS>Install-ADDSDomain -Credential (Get-Credential CORP\EnterpriseAdmin1) -
NewDomainName child - ParentDomainName corp.contoso.com -InstallDNS -
CreateDNSDelegation -DomainMode Win2003 - ReplicationSourceDC
DC1.corp.contoso.com -SiteName Houston -DatabasePath "D:\NTDS" –SYSVOLPath
"D:\SYSVOL" -LogPath "E:\Logs" –NoRebootOnCompletion
References:
http://technet.microsoft.com/en-us/library/hh974722.aspx
Question: 56
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Answer: J
Explanation:
With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are
monitored as well as the switch port that receives copies of all the traffic. And since Port
mirroring allows the network traffic of a virtual machine to be monitored by copying the traffic
and forwarding it to another virtual machine that is configured for monitoring, you should
configure port mirroring on VM2.
References:
http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror
Question: 57
Answer: A, D
Explanation:
The process of setting up virtual Fibre Channel starts with building a virtual SAN. DOthis by
opening the Hyper-V Manager, right click on the listing for your Hyper-V server in the
console tree, and then choose the Virtual SAN Manager command from the shortcut menu.
Then (A) Once you have created a virtual SAN, the next step in the process is to link a
virtual machine to the virtual SAN.To do so, right click on the virtual machine for which you
want to provide Fibre Channel connectivity and select the Settings command from the
resulting shortcut menu. Next, select the Add Hardware container, as shown in the figure
above, and then select the Fibre Channel Adapter option from the list of available hardware.
Etc.
* Virtual Fibre Channel for Hyper-V (also referred to as Synthetic Fibre Channel) provides
VM guest operating systemswith direct access to a Fibre Channel SAN by using a standard
World Wide Name (WWN) associated with a virtual machine
Question: 58
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
VM1 has several snapshots.
You need to modify the snapshot file location of VM1.
What should you do?
Answer: C
Question: 59
A. Shrink
B. compact
C. Merge
D. Convert
Answer: D
Explanation:
The Edit Virtual Hard Disk Wizard allows you to Compact, Convert, or Expand the VHD.
Compacting reduces the size of a dynamically expanding VHD but not a fixed-size VHD.
Converting changes the disk format to the newer VHDX. This process recreates the virtual
disk, and allows you to specify the size of the VHDX.
Ref: http://blogs.technet.com/b/yungchou/archive/2013/01/23/hyper-v-virtual-hard-disk-vhd-
operations-explained.aspx
http://blogs.technet.com/b/aviraj/archive/2012/05/06/windows-server-2012-convert-vhd-to-
vhdx-using-hyper-v-manager.aspx
Question: 60
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1.Server1 runs Windows Server 2012 R2.
You need to create a 3-TB virtual hard disk (VHD) on Server1.
Which tool should you use?
A. New-StoragePool
B. Diskpart
C. File Server Resource Manager (FSRM)
D. New-StorageSubsytemVirtualDisk
Explanation:
You can create a VHD from either the Disk Management snap-in or the command line
(diskpart).
From the DiskPart command-line tool at an elevated command prompt, run the create vdisk
command and specify the file (to name the file) and maximum (to set the maximum size in
megabytes) parameters. The following code demonstrates how to create a VHD file at
C:\vdisks\disk1.vdh with a maximum file size of 16 GB (or 16,000 MB).
DiskPart
Microsoft DiskPart version 6.1.7100
Copyright (C) 1999-2008 Microsoft Corporation.
On computer: WIN7
DISKPART> create vdisk file="C:\vdisks\disk1.vhd" maximum=16000
Question: 61 HOTSPOT
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 hosts
40 virtual machines that run Windows Server 2008 R2. The virtual machines connect to a
private virtual switch.
You have a file that you want to copy to all of the virtual machines.
You need to identify to which servers you can copy files by using the Copy-VmFilecmdlet.
What command should you run?
To answer, select the appropriate options in the answer area.
Question: 62
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the
Hyper-V server role installed. On Server1, you create a virtual machine named VM1.VM1
has a legacy network adapter.
You need to assign a specific amount of available network bandwidth to VM1.
What should you do first?
A. Add a second legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
B. Add a second legacy network adapter, and then configure network adapter teaming.
C. Remove the legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
D. Remove the legacy network adapter, and then add a network adapter.
Answer: D
Question: 63
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2.
You create a new inbound rule by using Windows Firewall with Advanced Security.
You need to configure the rule to allow Server1 to accept unsolicited inbound packets that
are received through a network address translation (NAT) device on the network.
Which setting in the rule should you configure?
A. Interface types
B. Authorized computers
C. Remote IP address
D. Edge traversal
Answer: D
Explanation:
Edge traversal allows the computer to accept unsolicited inbound packets that have passed
through an edge device, such as a network address translation (NAT) router or firewall.
References:
http://technet.microsoft.com/en-us/library/cc731927.aspx
Question: 64 HOTSPOT
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
All server are configured to enforce AppLocker policies.
You install a server named Server1.
On Server1, you install an application named App1.exe in a folder located on C:\App1.
You have two domain groups named Group1 and Group2.A user named User1 is a member
of Group1 and Group2.
You create a Group Policy object (GPO) named GPO1. You link GPO1 to contoso.com.
You create the executable rules as shown in the exhibit by using the Create Executable
Rules wizard. (Click the Exhibit button.)
Answer:
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2.A server named Server1 is configured to encrypt all traffic by
using IPSec.
You need to ensure that Server1 can respond to ping requests from computers that do not
support IPSec.
What should you do?
Answer: D
Question: 66
DRAG DROP
You have a server named Server1 that runs Windows Server 2012 R2.
You need to perform the following storage configuration tasks on Server1:
Bring a disk named Disk1 online.
Defragment a volume named Volume1.
Remove a disk named Disk2 from a storage pool named Pool1.
Which cmdlet should you use to perform each task?
Answer:
Question: 67
You have a server named Server1 that runs Windows Server 2012 R2.
You need to create a script that will create and mount a virtual hard disk.
Which tool should you use?
A. diskpart.exe
B. vdsldr.exe
C. fsutil.exe
D. vds.exe
Answer: A
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has three physical network adapters named NIC1, NIC2, and NIC3.
On Server1, you create a NIC team named Team1 by using NIC1 and NIC2.You configure
Team1 to accept network traffic on VLAN 10.
You need to ensure that Server1 can accept network traffic on VLAN 10 and VLAN 11. The
solution must ensure that the network traffic can be received on both VLANs if a network
adapter fails.
What should you do?
Answer: C
Question: 69
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has six
network adapters. Two of the network adapters are connected to a network named LAN1,
two of the network adapters are connected to a network named LAN2, and two of the
network adapters are connected to a network named LAN3.
You create a network adapter team named Team1 from the two adapters connected to
LANI. You create a network adapter team named Team2 from the two adapters connected
to LAN2.
A company policy states that all server IP addresses must be assigned by using a reServer1
address in DHCP.
You need to identify how many DHCP reservations you must create for Server1.
How many reservations should you identify?
A. 3
B. 4
C. 6
D. 8
Answer: B
Question: 70
Answer:
Explanation:
Note: Example:
createvdisk file="C:\vdisks\disk1.vhd" maximum=16000
attachvdisk
create partition primary
assign letter=g
format
References:
http://technet.microsoft.com/en-us/library/gg252576.aspx
http://technet.microsoft.com/en-us/library/hh831487.aspx
You have a server named Server1 that runs Windows Server 2012 R2.
On Server1, you open Computer Management as shown in the exhibit.(Click the Exhibit
button.)
You need to ensure that you can create a 3-TB volume on Disk 1.
What should you do first?
Answer: B
Question: 72
You have a server named Server1.Server1 runs Windows Server 2012 R2.
Server1 has a thin provisioned disk named Disk1.
You need to expand Disk1.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
Answer: A, B
Explanation:
Step 1 (B): if required add physical disk capacity.
Step 2 (A): Dynamically extend the virtual disk (not volume).
The File and Storage Services role and the Storage Services role service are installed by
default, but without any additional role services. This basic functionality enables you to use
Server Manager or Windows PowerShell to manage the storage functionality of your servers.
Question: 73
Answer: A, B, E
Question: 74
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1
has the Print and Document Services server role installed.
You connect a new print device to the network. The marketing department and the sales
department will use the print device.
Answer: C
Explanation:
To set different print priority to different groups you need to navigate to the Advanced tab of
the Printers and Faxes properties to set priorities to ensure that the Sales department print
jobs take priority.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 2.3
Configure print and document services, Chapter 2: Configure Server roles and Features, p.
93, 97, 104
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 9: Print and
Document Services, p. 444
http://technet.microsoft.com/en-us/library/cc738090(v=ws.10).aspx
Question: 75
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2 that run Windows Server 2012
R2.
You log on to Server1.
You need to retrieve a list of the active TCP connections on Server2.
Which command should you run from Server1?
Answer: D
Question: 76
Answer: B, D
Explanation:
To be able to fully manage remote servers that run Windows Server 2008 or the R2 Service
Pack 1 operating system, you should install the .NET Framework 4 on Server2 first followed
by the Windows Management Framework 3.0.
Question: 77
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2.Server1 runs Windows Server 2012
R2.Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server
server role installed.
You need to manage DHCP on Server2 by using the DHCP console on Server1.
What should you do first?
Answer: B
Explanation:
The DHCP snap-in isn't available unless the DHCP feature is installed. Server 1 is stated to
not have DHCP installed, so the snap-in therefore cannot be added. We must add the DHCP
server role.
References:
Question: 78
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012 R2.Server1
has the Group Policy Management feature installed. Server2 has the Print and Document
Services server role installed.
On Server2, you open Print Management and you deploy a printer named Printer1 by using
a Group Policy object (GPO) named GPO1.When you open GPO1 on Server1, you discover
that the Deployed Printers node does not appear.
You need to view the Deployed Printers node in GPO1.
What should you do?
Answer: C
Explanation:
To use Group Policy for printer deployment you will need to have a Windows Active
Directory domain, and this article assumes that your Domain Controller is a Windows 2008
R2 Server. You will also need the Print Services role installed on a server (can be on your
DC), and you will be using the Print Management and Group Policy Management consoles
to configure the various settings. It is assumed that you have already followed Part One and
have one or more printers shared on your server with the necessary drivers, ready to deploy
to your client computers.
The question does not mention if GPMC is installed on server 2, so I assume that it does not
deploy the GPO because it had no GPMC on server 2.
GPMC is not installed by default.
Question: 79
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Server 1.Server1 runs Windows Server 2012 R2 and has
the DHCP Server server role installed.
You create two IPv4 scopes on Server1. The scopes are configured as shown in the
following table.
Answer: A
Question: 80 HOTSPOT
You have a DHCP server named Server1 that runs Windows Server 2012 R2.
On Server1, you run the commands as shown in the exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point.
Question: 81
Your network contains an Active Directory forest named contoso.com. The forest contains
two domains named contoso.com and child.contoso.com. The forest contains two domain
controllers. The domain controllers are configured as shown in the following table.
You need to ensure that DC2 can provide authoritative responses for queries to the
contoso.com namespace.
What should you do?
Answer: B
Question: 82
You have a server named Server1 that runs a Server Core installation of Windows Server
2012 R2.
Server1 is configured to obtain an IPv4 address by using DHCP.
You need to configure the IPv4 settings of the network connection on Server1 as follows:
IP address: 10.1.1.1
Subnet mask: 255.255.240.0
Default gateway: 10.1.1.254
What should you run?
A. netsh.exe
B. netcfg.exe
C. msconfig.exe
D. ipconfig.exe
Answer: A
Explanation:
In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default
Gateway, DNS and WINS addresses and many other options you can use Netsh.exE.
Question: 83
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that hosts the primary DNS zone for contoso.com.
All client computers are configured to use DC1 as the primary DNS server.
You need to configure DC1 to resolve any DNS requests that are not for the contoso.com
zone by querying the DNS server of your Internet Service Provider (ISP).
What should you configure?
Answer: C
Question: 84
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that runs Windows Server 2012 R2 and a client
computer named Computer1 that runs windows 8.
DC1 is configured as a DHCP server as shown in the exhibit.(Click the Exhibit button.)
Answer: A
Explanation:
Ref: http://technet.microsoft.com/en-us/library/ee956897%28v=WS.10%29.aspx
Question: 85
A. From the properties of User1, select Store password using reversible encryption.
B. From the properties of Server1, assign the Allowed to Authenticate permission to User1.
C. From the properties of User1, select Use Kerberos DES encryption types for this account.
D. From the properties of Server1, select Trust this computer for delegation to any service
(Kerberos only).
Answer: A
Question: 86
Your network contains an Active Directory forest named contoso.com. All domain controllers
currently run Windows Server 2008 R2.
You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2.
The new domain controller will have the following configurations:
Schema master
Global catalog server
DNS Server server role
Active Directory Certificate Services server role
You need to identify which configurations cannot be fulfilled by using the Active Directory
Domain Services Configuration Wizard.
Which two configurations should you identify? (Each correct answer presents part of the
solution. Choose two.)
Answer: C, D
Explanation:
Installation Wizard will automatically install DNS and allows for the option to set it as a global
catalog server. ADCS and schema must be done separately.
Answer: A
Explanation:
This command redirects the default container for newly created computers to a specified,
target organizational unit (OU) so that newly created computer objects are created in the
specific target OU instead of in All_Computers.
References:
http://technet.microsoft.com/en-us/library/cc770619.aspx
Question: 88 HOTSPOT
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2.
You need to add a user named User1 to a group named ServerAdmins.
What command should you run?
To answer, select the appropriate options in the answer area.
Question: 89
Answer: A
Explanation:
Delegating control to only the OU will allow the users of Group1 to modify the security
settings.
References:
http://msdn.microsoft.com/en-us/library/windows/desktop/ms676857(v=vs.85).aspx
http://technet.microsoft.com/en-us/library/cc732524.aspx
Question: 90
A. Add the computer account of DC1 to the Cloneable Domain Controllers group.
B. Create a DCCIoneConfig.xml file on DC1.
C. Add the computer account of DC3 to the Cloneable Domain Controllers group.
D. Run the Enable-AdOptionalFeaturecmdlet.
E. Modify the contents of the DefaultDCCIoneAllowList.xml file on DC1.
Answer: A, B
Explanation:
A: Cloneable Domain Controllers Group (located in the Users container). Membership in this
group dictates whether a DC can or cannot be cloned. This group has some permissions set
on the domain head that should not be removed. Removing these permissions will cause
cloning to fail. Also, as a best practice, DCs shouldn't be added to the group until you plan to
clone and DCs should be removed from the group once cloning is complete. Cloned DCs will
also end up in the Cloneable Domain Controllers group.
B: DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned
DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new
DC name and more.
Question: 91 HOTSPOT
Your network contains an Active Directory domain named contoso.com. Domain controllers
run either Windows Server 2008 R2 or Windows Server 2012 R2.All client computers run
Windows 8.
All computer accounts are located in an organizational unit (OU) named OU1.
You create a Group Policy object (GPO) that contains several AppLocker rules. You link the
GPO to OU1.
You need to ensure that the AppLocker rules apply to all of the client computers.
What should you configure in the GPO?
To answer, select the appropriate service in the answer area.
Question: 92
Answer: B
Question: 93 HOTSPOT
Your network contains an Active Directory forest. The forest contains a single domain named
contoso.com.
AppLocker policies are enforced on all member servers.
You view the AppLocker policy applied to the member servers as shown in the exhibit.(Click
the Exhibit button.)
Question: 94
Your network contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named OU1.
You need to ensure that when new client computers join the domain, their computer
accounts are created in OU1 by default.
What should you do?
Answer: B
Explanation:
Redirects the default container for newly created computers to a specified, target
organizational unit (OU) so that newly created computer objects are created in the specific
target OU instead of in CN=Computers.
The CN=Computers container is a computer-protected object. For backward compatibility
reasons, you cannot (and must not) remove it.
References:
http://technet.microsoft.com/en-us/library/cc770619.aspx
Question: 95
Your network contains an Active Directory domain named contoso.com. The domain
contains 100 user accounts that reside in an organizational unit (OU) named OU1.
You need to ensure that a user named User1 can link and unlink Group Policy objects
(GPOs) to OU1. The solution must minimize the number of permissions assigned to User1.
What should you do?
Answer: A
Explanation:
The Delegation of Control Wizard allows you to delegate tasks, active Directory Object types
and to set permissions.
Question: 96 HOTSPOT
Question: 97
Your network contains an Active Directory forest named contoso.com. The forest contains a
single domain. The domain contains two domain controllers named DC1 and DC2 that run
Windows Server 2012 R2.
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainControllcr
C. Install-WindowsFeature
D. Install-AddsDomain
E. Rename-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User
Answer: A
Explanation:
The Add-ADPrincipalGroupMembershipcmdlet adds a user, group, service account, or
computer as a new member to one or more Active Directory groups.
References:
http://technet.microsoft.com/en-us/library/ee617203.aspx
http://technet.microsoft.com/en-us/library/hh974723.aspx
Question: 98
Your network contains an Active Directory forest named contoso.com. The forest contains a
single domain. The domain contains two domain controllers named DC1 and DC2 that run
Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
User1 logs on to a client computer named Computer1.
You need to disable the computer account of Computer1.
Which cmdlet should you run?
A. Add AdPrincipalGroupMember.hip
B. Install -AddsDomainController
C. Install-WindowsFeature
D. Install AddsDomain
E. RonameAdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User
Answer: F
Explanation:
Question: 99
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Server1 and a domain controller named DC2.All servers
run Windows Server 2012 R2.All domain controllers are configured as DNS servers.
On Server1, you open Server Manager and you add DC2 as another server to manage.
From Server Manager on Server1, you right-click DC2 as shown in the exhibit. (Click the
Exhibit button.)
You need to ensure that when you right-click DC2, you see the option to run DNS Manager.
What should you do?
Answer: A
Question: 100
Your network contains an Active Directory forest. The forest functional level is Windows
Server 2012 R2. The forest contains a single domain. The domain contains a member server
named Server1.Server1 runs windows Server 2012 R2.
You purchase a network scanner named Scanned that supports Web Services on Devices
(WSD).
You need to share the network scanner on Server1.
Which server role should you install on Server1?
Answer: C
Explanation:
The Print and Document Services role allows for the configuration to share printers,
scanners and fax devices.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 1: Installing
and Configuring servers, Objective 1.2: Configure servers, p. 8
http://technet.microsoft.com/en-us/library/hh831468.aspx
Question: 101
Your network contains an Active Directory domain named contoso.com. The domain
contains three servers named Server1, Server2, and Server3.
You create a server group named ServerGroup1.
You discover the error message shown in the following exhibit.(Click the Exhibit button.)
Answer: C
Explanation:
Explanation/Reference:
This is a security issue. To be able to access Server2 remotely through Server Manager the
user need to be a member of the Remote Management Users group.
Your company has a main office and a sales office. The main office has 2,000 users. The
sales office has 20 users. All client computers in the sales office run Windows 8.
Answer:
Explanation:
Direct printer will bypass the need to print via the print server.
References:
Question: 103
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1
has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2,
VM3, and VM4.Server1 is configured as shown in the following table.
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O visualization
Answer: I
Explanation:
Integration Services settings on virtual machines includes services such as operating system
shutdown, time synchronization, data exchange, Heart beat, and Backup (volume snapshot
services. Thus you should disable the time synchronization using Integration Services.
References:
http://blogs.technet.com/b/virtualization/archive/2008/08/29/backing-up-hyper-v-virtual-
machines.aspx
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3:
Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p. 144
You deploy a Server with a GUI installation of Windows Server 2012 R2 Datacenter.
From Windows PowerShell, you run the following command:
Remove-WindowsFeature Server-Gui-Shell.
In the table below, identify which tools are available on Server1 and which tools are
unavailable on Server1.
Make only one selection in each row. Each correct selection is worth one point.
Answer:
Explanation:
Question: 105
You have a server named Server1 that runs Windows Server 2012 R2.
You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the
installation fails repeatedly.
You need to ensure that the feature can be installed on Server1.
What should you do?
Answer: C
Explanation:
The files needed are no longer available on the local Hard drive. We need to connect the
server to the Internet.
Important to note that when starting with Windows Server 2012 R2 and Windows 8, the
feature files for .NET Framework 3.5 (which includes .NET Framework 2.0 and .NET
Framework 3.0) are not available on the local computer by default. The files have been
removed. Files for features that have been removed in a Features on Demand configuration,
along with feature files for .NET Framework 3.5, are available through Windows Update. By
default, if feature files are not available on the destination server that is running Windows
Server 2012 R2 Preview or Windows Server 2012 R2, the installation process searches for
the missing files by connecting to Windows Update. You can override the default behavior by
configuring a Group Policy setting or specifying an alternate source path during installation,
whether you are installing by using the Add Roles and Features Wizard GUI or a command
line.
Question: 106
Answer: D
Explanation:
Storage Pools use unallocated space thus you need to delete Volume E.
References:
http://technet.microsoft.com/en-us/library/ff399688.aspx
Question: 107
You have a server named Server1 that runs Windows Server 2012 R2.
You add an additional disk to Server1 as shown in the exhibit.(Click the Exhibit button.)
Answer: B
Question: 108
You have a server named Server1 that runs a Server Core Installation of Windows Server
2012 R2 Datacenter.
You have a WIM file that contains the four images of Windows Server 2012 R2 as shown in
the Images exhibit.(Click the Exhibit button.)
A. Index 1
B. Index 2
C. Index 3
D. Index 4
Answer: B, D
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server that runs Windows Server 2012 R2.
You perform a Server Core Installation of Windows Server 2012 R2 on a new server.
You need to ensure that you can add the new server to Server Manager on Server1.
What should you configure on the new server? To answer, select the appropriate setting in
the answer area.
You can add a computer to server manager using IP address. So you need to configure
Network Settings. If the server is not member of a domain, you can admin it remotely.
8 - Network Settings
Explanation:
You will require a network connection to the server to manage it from a different server,
therefore you need to configure the network settings to enable Remote Management.
References:
http://technet.microsoft.com/en-us/library/jj647766.aspx
Question: 110
Answer: C
Question: 111
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has following storage spaces:
Data
Users
Backups
Primordial
You add an additional hard disk to Server1.
You need to identify which storage space contains the new hard disk.
Which storage space contains the new disk?
A. Primordial
B. Data
C. Users
D. Backups
Answer: A
Question: 112
Your network contains an Active Directory domain named adatum.com. The domain
contains a member server named L0N-DC1.L0N-DC1 runs Windows Server 2012 R2 and
has the DHCP Server server role installed.
The network contains 100 client computers and 50 IP phones. The computers and the
phones are from the same vendor.
You create an IPv4 scope that contains addresses from 172.16.0.1 to 172.16.1.254.
You need to ensure that the IP phones receive IP addresses in the range of 172.16.1.100 to
172.16.1.200. The solution must minimize administrative effort.
Answer: D
Explanation:
The scope is already in place.
Scope level policies are typically settings that only apply to that scope. They can also
overwrite a setting that was set at the server level.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network
Administration, p.253
Question: 113
You have two servers named Server1 and Server2 that run Windows Server 2012
R2.Server1 has the DHCP Server server role installed.
You need to create an IPv6 reservation for Server2.
Which two values should you obtain from Server2? (Each correct answer presents part of
the solution. Choose two.)
A. the hardware ID
B. the DHCPv6 unique identifier
C. the DHCPv6 identity association ID
D. the SMSBIOS GUID
E. the MAC address
Answer: B, C
Explanation:
The Add-DhcpServerv6Reservation cmdlet reserves a specified IPv6 address for the client
identified by the specified Dynamic Host Configuration Protocol (DHCP) v6 unique identifier
(ID) (DUID) and identity association ID (IAID).
Your network contains a subnet named Subnet1.Subnet1 contains a DHCP server named
Server1.
Answer:
Question: 115
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1.Server1 runs a Server Core installation of Windows Server
2012 R2.
You install the DNS Server server role on Server1.
You need to perform the following configurations on Server1:
Answer:
Explanation:
Add-DnsServerDirectoryPartition: Creates a DNS application directory partition.
Add-DnsServerPrimaryZone: Adds a primary zone to a DNS server.
Set-DNSServer Overwrites a DNS server configuration.
SET-DNSServerForwarder Changes forwarder settings on a DNS server
Set-DNSServerDSSetting Modifies DNS Active Directory settings.
Set-DNSServerSetting Modifies DNS server settings.
References:
http://technet.microsoft.com/en-us/library/jj649942(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/jj649876(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/jj649845(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/jj649887(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/jj649874.aspx
http://technet.microsoft.com/en-us/library/jj649909.aspx
Question: 116
You need to add a single static route on Server1 to ensure that Server1 can communicate
with the hosts on all of the subnets.
Which command should you run?
Answer: B
Explanation:
These parameters will allow communication with all the hosts.
References:
Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4:
Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6
addressing, p.192, 196
Question: 117
Answer: A
Question: 118
Your network contains two Active Directory forests named contoso.com and adatum.com.
Each forest contains one domain. A two-way forest trust exists between the forests.
The forests use the address spaces shown in the following table.
From a computer in the contoso.com domain, you can perform reverse lookups for the
servers in the contoso.com domain, but you cannot perform reverse lookups for the servers
in the adatum.com domain.
From a computer in the adatum.com domain, you can perform reverse lookups for the
servers in both domains.
You need to ensure that you can perform reverse lookups for the servers in the adatum.com
domain from the computers in the contoso.com domain.
What should you create?
A. A trust point
B. A GlobalNames zone
C. A delegation
D. A conditional forwarder
Answer: D
Explanation:
Question: 119
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the
Hyper-V server role installed.
The disks on Server1 are configured as shown in the exhibit.(Click the Exhibit button.)
Answer: D
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 hosts
50 virtual machines.
You need to create a script to list all of the virtual machines that have checkpoints and
support Secure Boot.
What should you do? To answer, select the appropriate options in the answer area.
Answer:
The settings for Disk1.vhdx are configured as shown in the Disk1.vhdx exhibit. (Click the
Exhibit button.)
The settings for Disk2.vhdx are configured as shown in the Disk2.vhdx exhibit.(Click the
Exhibit button.)
Explanation:
If you want to compact a differencing virtual hard disk or an undo disk, you must merge the
changes to the parent disk and then compact the parent disk, if it is a dynamically expanding
virtual hard disk.
You can compact a dynamically expanding virtual hard disk.You cannot compact any other
type of virtual hard disk.However, you can convert a fixed-size virtual hard disk to a
dynamically expanding virtual hard disk and then compact the disk.If you want to compact a
differencing virtual hard disk or an undo disk, you must merge the changes to the parent disk
and then compact the parent disk, if it is a dynamically expanding virtual hard disk
References:
http://technet.microsoft.com/en-us/library/cc708394(v=ws.10).aspx
Question: 122
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1.Server1 runs Windows Server 2012 R2.
You need to create a 3-TB virtual hard disk (VHD) on Server1.
Which tool should you use?
Answer: D
Answer:
You have a server named Server1.Server1 runs Windows Server 2012 R2 and has the
Windows Deployment Services (WDS) server role installed.
You install the DHCP Server server role on Server1.
You need to ensure that Server1 can respond to DHCP clients and WDS clients.
What should you configure for the DHCP service and the WDS service?
Answer:
Question: 125
DRAG DROP
You are configuring a test network. The test network contains a subnet named LAN1.LAN1
uses the network ID of 10.10.1.0/27.
You plan to add a new subnet named LAN2 to the test network.
LAN1 and LAN2 will be connected by a router.
You need to identify a valid network ID for LAN2 that meets the following requirements:
Ensures that hosts on LAN2 can communicate with hosts on LAN1.
Supports at least 100 IPv4 hosts.
Uses only private IP addresses.
Which network ID should you use?
To answer, drag the appropriate network ID and subnet mask to the correct location in the
answer area.
Explanation:
The Subnet Mask specifies which bits of the IP address identify the host system and which
bits identify the network where the host system resides.
Question: 126
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Server 1.Server1 runs Windows Server 2012 R2 and has
the DHCP Server server role installed.
You create two IPv4 scopes on Server1. The scopes are configured as shown in the
following table.
The DHCP clients in Subnet1 can connect to the client computers in Subnet2 by using an IP
address or a FQDN.
You discover that the DHCP clients in Subnet2 can connect to client computers in Subnet1
by using an IP address only.
You need to ensure that the DHCP clients in both subnets can connect to any other DHCP
client by using a FQDN.
What should you add?
Answer: C
Question: 127
You have a server named dc2.contoso.com that runs Windows Server 2012 R2 and has the
DNS Server server role installed.
You open DNS Manager as shown in the exhibit.(Click the Exhibit button.)
You need to view the DNS server cache from DNS Manager.
What should you do first?
Answer: D
Explanation:
Navigating the DNS Manager console you should go to the View menu and click the
Advanced tab. That will yield the DNS server cache.
References:
Question: 128
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1.Server1 runs Windows Server 2012 R2.
You create a group Managed Service Account named gservice1.
You need to configure a service named Service1 to run as the gservice1 account.
How should you configure Service1?
Answer: C
Explanation:
Executing the ss.exe command with the config parameter will modify service configuration.
Question: 129
A. NFS
B. FAT32
C. ReFS
D. NTFS
Answer: C
Explanation:
The ReFS file system allows for resiliency against corruptions with the option to salvage
amongst many other key features like Metadata integrity with checksums, Integrity streams
with optional user data integrity, and shared storage pools across machines for additional
failure tolerance and load balancing, etc.
DRAG DROP
You have a Hyper-V host named Host1.Host1 contains two virtual machines named VM1
and VM2.VM1 is configured as a print server.VM1 runs Windows Server 2008 R2.VM2 is
configured as a file server.VM2 runs Windows Server 2012 R2.
You need to migrate all of the printers on VM1 to VM2.
Which actions should you perform on the virtual machines?
To answer, drag the appropriate action to the correct servers in the answer area. Each
action may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.
Answer:
Question: 131
You need to enable the Windows Server Migration Tools feature in the Windows Server
2012 R2 Datacenter image.
You want to achieve this goal by using the minimum amount of administrative effort.
Which command should you run first?
Answer: B
Question: 132
DRAG DROP
You have a server named Server1 that runs Windows Server 2012 R2.
You add a new internal SAS disk to Server1.
You need to ensure that the new disk is available to store files.
Which three cmdlets should you run in sequence?
To answer, move the appropriate three cmdlets from the list of cmdlets to the answer area
and arrange them in the correct order.
Answer:
Box 1: Initialize-Disk
Box 2: New-Partition
Box 3: Format Volume
Explanation:
Note:
* The following script accomplishes these four tasks (listed below):
Initialize-Disk -PartitionStyle MBR -PassThru |
New-Partition -AssignDriveLetter -UseMaximumSize |
Format-Volume -FileSystem NTFS -NewFileSystemLabel "disk2" -Confirm:$false
Question: 133
You perform a Server Core Installation of Windows Server 2012 R2 on a server named
Server1.
You need to add a graphical user interface (GUI) to Server1.
Which tool should you use?
A. The Install-WindowsFeaturecmdlet
B. The Install-Module cmdlet
C. The Install-RoleServicecmdlet
D. The setup.exe command
Answer: A
Explanation:
The DISM command is called by the Add-WindowsFeaturecommanD. Here is the syntax for
DISM:
Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:Server-Gui-
Shell /featurename:Server-Gui-Mgmt
Question: 134
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
Server2 establishes an IPSec connection to Server1.
You need to view which authentication method was used to establish the initial IPSec
connection.
What should you do?
Answer: D
Explanation:
Main mode negotiation establishes a secure channel between two computers by determining
a set of cryptographic protection suites, exchanging keying material to establish a shared
secret key, and authenticating computer and user identities. A security association (SA) is
the information maintained about that secure channel on the local computer so that it can
use the information for future network traffic to the remote computer. You can monitor main
mode SAs for information like which peers are currently connected to this computer and
which protection suite was used to form the SA.
References:
http://technet.microsoft.com/en-us/library/dd448497(v=ws.10).aspx
Your network contains an Active Directory domain named corp.contoso.com. The domain
contains a domain controller named DC1.
When you run ping dc1.corp.contoso.com, you receive the result as shown in the
exhibit.(Click the Exhibit button.)
You need to ensure that DC1 can respond to the Ping command.
Which rule should you modify?
Answer:
Explanation:
ICMP should have been enabled when ADDS was installed
References:
http://social.technet.microsoft.com/wiki/contents/articles/16566.windows-active-directory-
role-for-windowsservers.aspx
Question: 136
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
You create a security template named Template1 by using the Security Templates snap-in.
You need to apply Template1 to Server2.
Which tool should you use?
A. System Configuration
B. Local Security Policy
C. Certificate Templates
D. computer Management
Explanation:
A security policy is a combination of security settings that affect the security on a computer.
You can use your local security policy to edit account policies and local policies on your local
computer.
Question: 137
A. From Local Group Policy Editor on Server1, export an .inf file. Import the .inf file by using
Group Policy Management Editor.
B. From Server1, run the Set-ApplockerPolicycmdlet.
C. From Local Group Policy Editor on Server1, export an .xml file. Import the .xml file by
using Group Policy Management Editor.
D. From Server1, run the New-ApplockerPolicycmdlet.
Answer: B
Explanation:
The Set-AppLockerPolicycmdlet sets the specified Group Policy Object (GPO) to contain the
specified AppLocker policy. If no Lightweight Directory Access Protocol (LDAP) is specified,
the local GPO is the default.
When the Merge parameter is used, rules in the specified AppLocker policy will be merged
with the AppLocker rules in the target GPO specified in the LDAP path. The merging of
policies will remove rules with duplicate rule IDs, and the enforcement setting specified by
the AppLocker policy in the target GPO will be preserved. If the Merge parameter is not
specified, then the new policy will overwrite the existing policy.
References:
http://technet.microsoft.com/en-us/library/ee791816(v=ws.10).aspx
Exam Ref 70-410: Installing and configuring Windows Server 2012 R2, Chapter 10:
Implementing Group Policy, Lesson1: Planning, Implementing and managing Group Policy,
p. 479
Question: 138
Which type of application control policy should you implement for each application?
To answer, drag the appropriate rule types to the correct applications. Each rule type may be
used once, more than once, or not at all. You may need to drag the split bar between panes
or scroll to view content.
Answer:
Question: 139
Answer: D
Explanation:
By adding one printer as the default printer you ensure that only that printer is used at a
time, and creating a printing pool to automatically distribute print jobs to the next available
printer will cover all the requirements stated in the question. A printing pool is one logical
printer connected to multiple printers through multiple ports of the print server. The printer
that is idle receives the next document sent to the logical printer.
A printing pool is one logical printer connected to multiple printers through multiple ports of
the print server. The printer that is idle receives the next document sent to the logical printer.
This is useful in a network with a high volume of printing because it decreases the time users
wait for their documents. A printing pool also simplifies administration because multiple
printers can be managed from the same logical printer on a server.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 2.3
Configure print and document services, Chapter 2: Configure Server roles and Features, p.
93, 97
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File
Services and Storage, p. 361
http://technet.microsoft.com/en-us/library/cc757086(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc784619(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/jj556311.aspx
Question: 140
You have two servers named Server1 and Server2 that run Windows Server 2012
R2.Server1 and Server2 are part of a workgroup.
On Server1, you add Server2 to Server Manager.
When you attempt to connect to Server2 from Server Manager, you receive the following
error message: "Credentials not valid."
You need to ensure that you can manage Server2 from Server1 by using Server Manager on
Server1.
What should you do?
Answer: A
Explanation:
To enable Server Manager remote management by using Windows PowerShell
On the computer that you want to manage remotely, do one of the following to open a
Windows PowerShell session with elevated user rights.
On the Windows desktop, right-click Windows PowerShell on the taskbar, and then click Run
as Administrator.
On the Windows Start screen, right-click Windows PowerShell, and then on the app bar,
click Run as Administrator.
Type the following, and then press Enter to enable all required firewall rule exceptions.
Configure-SMRemoting.exe –enable
Question: 141
Your network contains an Active Directory domain named adatum.com. The domain
contains a member server named Server1 and a domain controller named DC2.All servers
run Windows Server 2012 R2.
On DC2, you open Server Manager and you add Server1 as another server to manage.
From Server Manager on DC2, you right-click Server1 as shown in the exhibit. (Click the
Exhibit button.)
Answer: D
Explanation:
References:
http://technet.microsoft.com/en-us/library/ee441255(v=ws.10).aspx
Question: 142
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2 and a server named
Answer: D, E
Explanation:
The output of this command indicates whether Server Manager Remoting is enabled or
disabled on the server. To configure Server Manager remote management by using
Windows PowerShell
On the computer that you want to manage remotely, open a Windows PowerShell session
with elevated user rights.To do this, click Start, click All Programs, click Accessories, click
Windows PowerShell, right-click the Windows PowerShell shortcut, and then click Run as
administrator.
In the Windows PowerShell session, type the following, and then press Enter.
Set-ExecutionPolicy -ExecutionPolicyRemoteSigned
Type the following, and then press Enter to enable all required firewall rule exceptions.
Configure-SMRemoting.ps1 -force –enable
Question: 143
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named Server1 that runs Windows Server 2012 R2.
On Server1, you create a work folder named Work1.
A user named User1 connects to Work1 from a computer named Computer1.
You need to identify the last time the documents in Work1 were synchronized successfully
from Computer1.
What should you do?
Answer: D
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that runs Windows Server 2012 R2.
A user named User1 attempts to log on to DC1, but receives the error message shown in the
exhibit.(Click the Exhibit button.)
Answer: B
Explanation:
Domain controllers, by default, restrict the types of user accounts that have the ability to log
on locally.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 6: Create
and Manage Group Policy, Objective 6.2: Configure Security Policies, p. 321
Answer:
Question: 146
Your network contains an Active Directory domain named contoso.com. The domain
contains hundreds of groups, many of which are nested in other groups.
The domain contains a user account named user1.User1 is a direct member of 15 groups.
You need to identify of which Active Directory groups User1 is a member, including the
nested groups. The solution must minimize administrative effort.
Which tool should you use?
Answer: D
Question: 147
You have a new server named Server1 that runs Windows Server 2012 R2.
Server1 has two dual-core processors and 32 GB of RAM.
You install the Hyper-V server role on Server1.
You create two virtual machines on Server1 that each have 8 GB of memory.
You need to minimize the amount of time it takes for both virtual machines to access
memory.
What should you configure on each virtual machine?
A. Resource control
B. Memory weight
C. Dynamic Memory
D. NUMA topology
Answer: D
Explanation:
Windows Server 2012 introduced support for projecting a virtual NUMA topology into Hyper-
V virtual machines. This capability can help improve the performance of workloads running
on virtual machines that are configured with large amounts of memory.
Question: 148
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
VM1 has several snapshots.
You need to modify the snapshot file location of VM1.
What should you do?
A. Delete the existing snapshots, and then modify the settings of VM1.
B. Right-click VM1, and then click Move. ..
C. Right-click VM1, and then click Export...
D. PauseVM1, and then modify the settings of VM1.
Answer: A
Explanation:
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Hyperv1 and a domain controller named DC1.Hyperv1
has the Hyper-V server role installed. DC1 is a virtual machine on Hyperv1.
Users report that the time on their client computer is incorrect.
You log on to DC1 and verify that the time services are configured correctly.
You need to prevent time conflicts between the time provided by DC1 and other potential
time sources.
What should you configure?
To answer, select the appropriate object in the answer area.
Question: 150
Answer: B
Explanation:
Install-WindowsFeature will install one or more Windows Server roles, role services, or
features on either the local or a specified remote server that is running Windows Server
2012 R2. This cmdlet is equivalent to and replaces Add-WindowsFeature, the cmdlet that
was used to install roles, role services, and features in Windows Server 2008 R2.
You have two servers that run Windows Server 2012 R2. The servers are configured as
shown in the following table.
You need to ensure that Server2 can be managed by using Server Manager from Server1.
In the table below, identify which actions must be performed on Server1 and Server2.Make
only one selection in each row. Each correct selection is worth one point.
Explanation:
On the computer that is running Server Manager, add the workgroup server name to the
TrustedHosts list.
References:
http://technet.microsoft.com/en-us/library/hh831453.aspx
Question: 152
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1.Server1 runs Windows Server 2012 R2.
On Server1, you create a printer named Printed. You share Printed and publish Printed in
Active Directory.
You need to provide a group named Group1 with the ability to manage Printer1.
What should you do?
Answer: C
Explanation:
If you navigate to the Security tab of the Print Server Properties you will find the Permissions
that you can set to Allow which will provide Group1 with the ability to manage Printer1.
Set permissions for print servers
Open Print Management.
In the left pane, clickPrint Servers, right-click the applicable print server and then
clickProperties.
On theSecuritytab, underGroup or users names, click a user or group for which you want to
set permissions.
UnderPermissions for <user or group name>, select theAlloworDenycheck boxes for the
permissions listed as needeD.
To editSpecial permissions, clickAdvanceD.
On thePermissionstab, click a user group, and then clickEdit.
In thePermissionEntrydialog box, select theAlloworDenycheck boxes for the permissions that
you want to edit.
You have a server named Print1 that runs Windows Server 2012 R2.
On Print1, you share a printer named Printer1.
You need to ensure that only the members of the Server Operators group, the
Administrators group, and the Print Operators group can send print jobs to Printer1.
What should you do?
Answer: C
Explanation:
By default Everyone can print. This permissions need to be removed.
Question: 154
You have a server named Server1 that runs Windows Server 2012 R2.
A network technician installs a new disk on Server1 and creates a new volume. The
properties of the new volume are shown in the exhibit. (Click the Exhibit button.)
Answer: D
Explanation:
Shadow Copies for Shared Folders is activated at the volume level. A Shadow copy is
essentially a copy of the disk at a specific moment in time, and this has to be set up do that
you can have a Previous Version that can be used to restore files. However, prior to any
action taken to set up shadow copies, you need to format the disk first since it is mentioned
that it is a NEW volume that was created.
You have a file server named Server1 that runs Windows Server 2012 R2.Server1 contains
a folder named Folder1.
A user named User1 is a member of Group1 and Group2.A user named User2 is a member
of Group2 and Group3.
You need to identify which actions the users can perform when they access the files in
Share1.
What should you identify?
To answer, select the appropriate actions for each user in the answer area.
Answer:
User 1:
- Read the files
- Edit the contents of the files
- Delete files created by other users
- Modify the permissions on the files
- Execute executable files
User 2:
- Read the files
- Edit the contents of the files
Explanation:
Question: 156
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2.
On a server named Server2, you perform a Server Core Installation of Windows Server 2012
R2.You join Server2 to the contoso.com domain.
You need to ensure that you can manage Server2 by using the Computer Management
console on Server1.
What should you do on Server2?
Answer: D
Explanation:
In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to
configure and manage several common aspects of Server Core installations. You must be a
member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal
Server Interface and in Server with a GUI mode.
References:
http://technet.microsoft.com/en-us/library/jj647766.aspx
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying
servers, p. 80
Your network contains an Active Directory domain named contoso.com. The domain
contains servers named Server1 and Server2 that run Windows Server 2012 R2.
You create a windows PowerShell script named Scriptl.psl that contains the following
configuration:
Answer:
You have a server named Server1 that runs Windows Server 2012 R2.
You connect three new hard disks to Server1.
You need to create a storage space that contains the three disks.
The solution must meet the following requirements:
Provide fault tolerance if a single disk fails.
Maximize the amount of files that can be stored in the storage space.
What should you create?
A. A mirrored space
B. A spanned volume
C. A parity space
D. A simple space
Answer: C
Explanation:
Fault tolerant and better space ratio. The data on volumes created on this type of virtual
disk, together with parity information that can be used to facilitate automatic reconstruction of
data in the event of a physical disk failure, is striped across all physical disks in the pool.
Parity virtual disks also provide resiliency to help protect you from data loss arising from the
failure
368 Chapter 8 File services and storage of a physical disk in the pool, but they perform
better with large sequential disk writes than with random I/O.
References:
http://social.technet.microsoft.com/wiki/contents/articles/15198.storage-spaces-
overview.aspx
Question: 159
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2.Client computers run either Windows 7 or Windows 8.
All of the computer accounts of the client computers reside in an organizational unit (OU)
named Clients. A Group Policy object (GPO) named GPO1 is linked to the Clients OU. All of
the client computers use a DNS server named Server1.
You configure a server named Server2 as an ISATAP router. You add a host (A) record for
ISATAP to the contoso.com DNS zone.
You need to ensure that the client computers locate the ISATAP router.
What should you do?
Answer: A
Explanation:
The Set-DnsServerGlobalQueryBlockList command will change the settings of a global
query block list which you can use to ensure that client computers locate the ISATAP router.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying
domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256
http://technet.microsoft.com/en-us/library/jj649942(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/jj649876(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/jj649874.aspx
http://technet.microsoft.com/en-us/library/jj649909.aspx
Question: 160
You are configuring the IPv6 network infrastructure for a branch office.
The corporate network administrator allocates the 2001:DB8:0:C000::/58 address space for
use in the branch office.
You need to identify the maximum number of IPv6 subnets you can create.
How many IPv6 subnets should you identify?
A. 32
B. 64
C. 128
Answer: B
Explanation:
IPv6 has 128-bit (16-byte) source and destination IP addresses. Although 128 bits can
express over 3.4×1038 possible combinations, the large address space of IPv6 has been
designed for multiple levels of subnetting and address allocation from the Internet backbone
to the individual subnets within an organization.
References:
http://technet.microsoft.com/en-us/library/dd379516%28v=WS.10%29.aspx
Question: 161
Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
You create a checkpoint of VM1, and then you install an application on VM1.You verify that
the application runs properly.
You need to ensure that the current state of VM1 is contained in a single virtual hard disk
file.
The solution must minimize the amount of downtime on VM1.
What should you do?
A. From a command prompt, run dism.exe and specify the /delete-image parameter.
B. From a command prompt, run dism.exe and specify the /commit-image parameter.
C. From Hyper-V Manager, delete the checkpoint.
D. From Hyper-V Manager, inspect the virtual hard disk.
Answer: C
Question: 162
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the
Hyper-V server role installed. Server1 has a virtual switch named RDS Virtual.
You replace all of the network adapters on Server1 with new network adapters that support
single-root I/O visualization (SR-IOV).
You need to enable SR-IOV for all of the virtual machines on Server1.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. On each virtual machine, modify the Advanced Features settings of the network adapter.
Answer: D, E
Explanation:
The first step when allowing a virtual machine to have connectivity to a physical network is to
create an external virtual switch using Virtual Switch Manager in Hyper-V Manager. The
additional step that is necessary when using SR-IOV is to ensure the checkbox is checked
when the virtual switch is being created. It is not possible to change a “non SR-IOV mode”
external virtual switch into an “SR-IOV mode” switch. The choice must be made a switch
creation time. Thus you should first delete the existing virtual switch and then recreate it.
E: Once a virtual switch has been created, the next step is to configure a virtual machine.
SR-IOV in Windows Server “8” is supported on x64 editions of Windows “8” as a guest
operating system (as in Windows “8” Server, and Windows “8” client x64, but not x86
client).We have rearranged the settings for a virtual machine to introduce sub-nodes under a
network adapter, one of which is the hardware acceleration node. At the bottom is a
checkbox to enable SR-IOV.
Question: 163
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2.Server1 contains a
virtual machine named VM1 that runs Windows Server 2012 R2.
You need to ensure that a user named User1 can install Windows features on VM1. The
solution must minimize the number of permissions assigned to User1.
To which group should you add User1?
Answer: B
Explanation:
The user has to be an administrator on VM1 to be able to install features.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 10:
Implementing Group Policy, p.539
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2
Datacenter.Server1 is located in an isolated network that cannot access the Internet.
On Server1, you install a new virtual machine named VM1.VM1 runs Windows Server 2012
R2 Essentials and connects to a private virtual network.
After 30 days, you discover that VM1 shuts down every 60 minutes.
You need to resolve the issue that causes VM1 to shut down every 60 minutes.
What should you do?
Answer: A
Question: 165
Your network contains a production Active Directory forest named contoso.com and a test
Active Directory forest named contoso.test. A trust relationship does not exist between the
forests.
In the contoso.test domain, you create a backup of a Group Policy object (GPO) named
GPO1.
You transfer the backup of GPO1 to a domain controller in the contoso.com domain.
You need to create a GPO in contoso.com based on the settings of GPO1.You must achieve
this goal by using the minimum amount of administrative effort.
What should you do?
A. From Windows PowerShell, run the Get- GPO cmdlet and the Copy- GPO cmdlet.
B. From Windows PowerShell, run the New- GPO cmdlet and the Import- GPO cmdlet.
C. From Group Policy Management, create a new starter GPO.Right-click the new starter
GPO, and then click Restore from Backup.
D. From Group Policy Management, right-click the Croup Policy Objects container, and then
click Manage Backups.
Answer: B
Explanation:
Since the GPO’s original domain is different and there is no trust relationship between
forests, you should execute the New-GPO command and import the already existing
command into the ‘new’ domain.
Answer: C
Explanation:
References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10:
Implementing Group Policy, p. 470, 482
http://technet.microsoft.com/en-us/library/jj134176
WMI filtering using GPMC
Question: 167
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
You create and enforce the default AppLocker executable rules.
Users report that they can no longer execute a legacy application installed in the root of drive
C.
You need to ensure that the users can execute the legacy application.
What should you do?
Answer: A
Your network contains an Active Directory forest named contoso.com. The forest contains a
single domain. The domain contains two domain controllers named DC1 and DC2 that run
Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You need to ensure that User1 can manage the group membership of Group1. The solution
must minimize the number of permissions assigned to User1.
Which cmdlet should you run?
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController
C. Install-WindowsFeature
D. Install-AddsDomain
E. Rename AdOh
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User
Answer: G
Explanation:
The Set-ADGroupcmdlet modifies the properties of an Active Directory group. You can
modify commonly used property values by using the cmdlet parameters.
ManagedBySpecifies the user or group that manages the object by providing one of the
following property values. Note:
The identifier in parentheses is the LDAP display name for the property.
Distinguished Name
Example: CN=SaraDavis,OU=Europe,CN=Users,DC=corp,DC=contoso,DC=com
GUID (objectGUID)
Example: 599c3d2e-f72d-4d20-8a88-030d99495f20
Security Identifier (objectSid)
Example: S-1-5-21-3165297888-301567370-576410423-1103
SAM Account Name (sAMAccountName)
Example: saradavis
The Install-ADDSDomainControllercmdlet installs a domain controller in Active Directory.
Example: C:\PS>Install-ADDSDomainController -InstallDns -Credential (Get-Credential
CORP\Administrator) -DomainName "corp.contoso.com"
References:
http://technet.microsoft.com/en-us/library/hh974723.aspx
http://technet.microsoft.com/en-us/library/ee617199.aspx
http://technet.microsoft.com/en-us/library/ee617225.aspx
Question: 169
Answer: C
Explanation:
In Windows Server 2008, you can use fine-grained password policies to specify multiple
password policies and apply different password restrictions and account lockout policies to
different sets of users within a single domain. For example, to increase the security of
privileged accounts, you can apply stricter settings to the privileged accounts and then apply
less strict settings to the accounts of other users. Or in some cases, you may want to apply a
special password policy for accounts whose passwords are synchronized with other data
sources. This is found in the Active Directory Administrative Center. You can use Active
Directory Administrative Center to perform the following Active Directory administrative
tasks:
Create new user accounts or manage existing user accounts
Create new groups or manage existing groups
Create new computer accounts or manage existing computer accounts
Create new organizational units (OUs) and containers or manage existing OUs
Connect to one or several domains or domain controllers in the same instance of Active
Directory Administrative Center, and view or manage the directory information for those
domains or domain controllers
Filter Active Directory data by using query-building search
References:
http://technet.microsoft.com/en-us/library/cc770842(v=ws.10).aspx
Question: 170
Answer: C
Explanation:
A loopback with merge option needs to be used.
Your network contains an Active Directory domain named contoso.com. The domain
contains 25 servers. All servers run Windows Server 2012 R2.
You need to create a Windows Firewall rule to prevent administrators from using Internet
Explorer to access the Internet while they are logged on interactively to the servers. The
solution must not prevent administrators from accessing websites on the internal network.
How should you configure the rule?
To answer, select the appropriate options in the answer area.
Question: 172
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2. The domain contains a server named Server1.
You open Review Options in the Active Directory Domain Services Configuration Wizard,
and then you click View script.
You need to ensure that you can use the script to promote Server1 to a domain controller.
A. .bat
B. .cmd
C. .ps1
D. .xml
Answer: C
Explanation:
From http://technet.microsoft.com/en-us/library/jj574105.aspx
The Review Options page in Server Manager also offers an optional View Script button to
create a Unicode text file that contains the current ADDSDeployment configuration as a
single Windows PowerShell script. This enables you to use the Server Manager graphical
interface as a Windows PowerShell deployment studio. Use the Active Directory Domain
Services Configuration Wizard to configure options, export the configuration, and then
cancel the wizard. This process creates a valid and syntactically correct sample for further
modification or direct use.
Question: 173
Your network contains an Active Directory forest named contoso.com. The forest contains
five domains. All domain controllers run Windows Server 2012 R2.
The contoso.com domain contains two user accounts named Admin1 and Admin2.
You need to ensure that Admin1 and Admin2 can configure hardware and services on all of
the member servers in the forest. The solution must minimize the number of privileges
granted to Admin1 and Admin2.
Which built-in groups should you use?
Answer: A
Question: 174
A. Ldifde
B. csvde
C. Dsadd
D. Net user
Answer: B
Explanation:
The CSVDE is a command-line utility that can create new AD DS objects by importing
information from a comma-separated value (.csv) file. This would be the least amount of
administrative effort in this case.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 5: Install
and administer Active Directory, Objective 5.2: Create and Manage Active Directory Users
and Computers, p. 269
Question: 175
Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1
has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2,
VM3, and VM4.Server1 is configured as shown in the following table.
You need to configure VM4 to track the CPU, memory, and network usage.
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Answer: C
Explanation:
Metrics collected for each virtual machine using resource metering:
Average CPU usage, measured in megahertz over a period of time.
Average physical memory usage, measured in megabytes.
Minimum memory usage (lowest amount of physical memory).
Maximum memory usage (highest amount of physical memory).
Maximum amount of disk space allocated to a virtual machine.
Total incoming network traffic, measured in megabytes, for a virtual network adapter.
Total outgoing network traffic, measured in megabytes, for a virtual network adapter
References:
http://blogs.technet.com/b/meamcs/archive/2012/05/28/hyper-v-resource-metering-in-
windows-server-2012-server-8-beta.aspx
Question: 176
You have a server named Server1 that runs Windows Server 2012 R2.
You need to enable access-based enumeration for a file share on Server1.
Which tool should you use?
Answer: C
Answer:
Question: 178
Your network contains a file server named Server1 that runs Windows Server 2012 R2.All
client computers run Windows 8.
You need to ensure that when users are connected to the network, they always use local
offline files that are cached from Server1.
Which Group Policy setting should you configure?
Answer: C
Question: 179
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. The domain contains a standalone server named Server2
that is located in a perimeter network. Both servers run Windows Server 2012 R2.
You need to manage Server2 remotely from Server1.
What should you do?
Answer: D
Question: 180
You have a server named Corel that has a Server Core Installation of Windows Server 2012
R2.
Corel has the Hyper-V server role installed. Corel has two network adapters from different
third-party hardware vendors.
You need to configure network traffic failover to prevent connectivity loss if a network
adapter fails.
What should you use?
A. New-NetSwitchTeam
B. Install-Feature
C. Add-NetSwitchTeamMember
D. Netsh.exe
Answer: A
Answer:
Explanation:
NIC Teaming requires the presence of a single Ethernet network adapter, which can be used
for separating traffic that is using VLANs. All modes that provide fault protection through
failover require at least two Ethernet network adapters.NIC1 is already enabled, thus you
should include NIC2 and NIC3.
References:
http://technet.microsoft.com/en-us/library/hh831648.aspx
Question: 182
A. Get-DcsConfiguration
B. Restore-DcsConfiguration
C. Set-DcsLocalConfigurationManager
D. Start-DcsConfiguration
Answer: D
Question: 183
DRAG DROP
You have a server that runs Windows Server 2012 R2.
You need to create a volume that will remain online if two disks in the volume fail. The
solution must minimize the number of disks used to create the volume.
Which three actions should you perform in sequence? (To answer, move the appropriate
three actions from the list of actions to the answer area and arrange them in the correct
order.)
Answer:
Explanation:
A storage space with three-way mirroring can tolerate two disk failures but requires a
minimum of five disks.
References:
http://technet.microsoft.com/en-us/library/hh831739.aspx
http://technet.microsoft.com/en-us/library/jj822938.aspx
http://technet.microsoft.com/en-us/library/jj899886.aspx
http://technet.microsoft.com/en-us/library/5de72fb5-e1e3-43a7-a176-d17cdf4d312e
Question: 184
You have a server named Server1 that runs Windows Server 2012 R2.You add a 4-TB disk
named Disk 5 to Server1.
You need to ensure that you can create a 3-TB volume on Disk 5.
What should you do?
Answer: B
Explanation:
The exhibit shows Disk1 to be a basic disk. The disk must be GPT since GPT disks allows
for partitioning.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File
Services and Storage, Lesson 2: Provisioning and managing shared storage, p. 379-384
http://msdn.microsoft.com/en-us/library/windows/hardware/gg463525.aspx
Question: 185
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the
Hyper-V server role installed. The domain contains a virtual machine named VM1.
A developer wants to attach a debugger to VM1.
You need to ensure that the developer can connect to VM1 by using a named pipe.
Which virtual machine setting should you configure?
A. BIOS
B. Network Adapter
Answer: C
Explanation:
Named pipes can be used to connect to a virtual machine by configuring COM 1.
References:
http://support.microsoft.com/kb/819036
http://support.microsoft.com/kb/141709
Question: 186
You have a server that runs a Server Core installation of Windows Server 2012 R2.
You need to change the DNS server used by IPv6.
What should you do?
Answer: D
Explanation:
The Set-DnsClientServerAddresscmdlet sets one or more IP addresses for DNS servers
associated with an interface. This cmdlet statically adds DNS server addresses to the
interface. If this cmdlet is used to add DNS servers to the interface, then the DNS servers
will override any DHCP configuration for that interface.
PS C:\> Set-DnsClientServerAddress -InterfaceIndex 12 -ServerAddresses
"10.0.0.1","10.0.0.2")
References:
http://technet.microsoft.com/en-us/library/jj592692.aspx
http://technet.microsoft.com/en-us/library/jj590768.aspx
You have a server named Server 1.Server1 runs Windows Server 2012 R2.
Server1 has two network adapters and is located in a perimeter network. You need to install
a DHCP Relay Agent on Server1.
Which node should you use to add the DHCP Relay Agent? To answer, select the
appropriate node in the answer area.
Question: 188
Your network contains three servers that run Windows Server 2012 R2. The servers are
configured as shown in the following table.
A. An exclusion
B. A scope option
C. A filter
D. A reservation
Answer: C
Explanation:
Filter to exclude MAC address of Server3.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 5.3 Create
and manage Active Directory groups and Organization units, Chapter 3: Configure Hyper-V,
p. 180
http://technet.microsoft.com/en-us/magazine/ff521761.aspx
http://technet.microsoft.com/en-us/library/cc726954(v=ws.10).aspx
Question: 189
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1
is a member of a workgroup.
You need to configure a local Group Policy on Server1 that will apply only to non-
administrators.
Which tool should you use?
Answer: A
Explanation:
Question: 190
Your network contains an Active Directory domain named contoso.com. The domain
contains 20 computer accounts that reside in an organizational unit (OU) named OU1.
A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to assign
several user rights to a user named User1.
In the Users container, you create a new user named User2.
You need to ensure that User2 is assigned the same user rights as User1 on all of the client
computers in OU1.
What should you do?
Answer: D
Explanation:
The GPO is linked to OU1. By moving User2 to OU1 the GPO will be applied to this user.
Question: 191
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 has
the virtual switches listed in the following table.
You create a virtual machine named VM1. VM1 has two network adapters. One network
adapter connects to vSwitch1. The other network adapter connects to vSwitch2. You
configure NIC teaming on VM1.
You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the
network.
Answer: A
You have a server named DHCP1 that runs Windows Server 2012 R2. DHCP1 does not
have access to the Internet.
All roles are removed completely from DHCP1.
You mount a Windows Server 2012 R2 installation image to the C:\Mount folder.
You need to install the DHCP Server server role on DHCP1 by using Server Manager.
Which folder should you specify as the alternate path for the source files?
To answer, select the appropriate folder in the answer area.
Question: 193
You have a server named Server1 that runs Windows Server 2012 R2.
You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the
installation fails repeatedly.
You need to ensure that the feature can be installed on Server1.
What should you do?
Answer: C
Question: 194
You have a server named Server2 that runs Windows Server 2012 R2.
A network technician installs a new disk on Server2 and creates a new volume.
The properties of the new volume are shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can enable NTFS disk quotas for volume D.
What should you do first?
Answer: A
Explanation:
To be able to use a NEW disk so that you can enable NTFS disk quotas, in other word
REFS to NTFS, it requires formatting first.
Question: 195
You have a print server named Print1 that runs Windows Server 2012 R2. Print1 has 10
shared printers. You need to change the location of the spool folder.
What should you modify?
Answer: A
Question: 196
A. From the View menu, select Users, Contacts, Groups, and Computers as containers.
B. From the View menu, select Advanced Features.
C. Right-click OU1 and select Delegate Control.
D. Right-click contoso.com and select Delegate Control.
Answer: C
Explanation:
Delegating control to only the OU will allow the users of Group1 to modify the security
settings.
References:
http://msdn.microsoft.com/en-us/library/windows/desktop/ms676857(v=vs.85).aspx
http://technet.microsoft.com/en-us/library/cc732524.aspx
Your network contains an Active Directory forest. The forest contains two domains named
Domain1 and Domain2.
Domain1 contains a file server named Server1. Server1 has a shared folder named Share1.
Domain2 contains 50 users who require access to Share1.
You need to create groups in each domain to meet the following requirements:
In Domain1, create a group named Group1. Group1 must be granted access to Share1.
In Domain2, create a group named Group2. Group2 must contain the user accounts of the
50 users.
Permission to Share1 must only be assigned directly to Group1.
Which type of groups should you create and which group nesting strategy should you use?
To answer, select the appropriate configuration in the answer area.
Answer:
Question: 198
A. ADSI Edit
B. The csvde.exe command
C. Active Directory Users and Computers
D. The Add-Member cmdlet
Answer: B
Explanation:
The CSVDE is a command-line utility that can create new AD DS objects by importing
information from a comma-separated value (.csv) file. This would be the least amount of
administrative effort in this case especially considering that these would be temporary
employees.
Question: 199
Answer: D
Explanation:
There are a couple of ways to install the GUI from the command prompt, although both use
the same tool – DISM (Deployment Image Service Manager). When you are doing it for a
single (local) server, the command is:
Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:…
References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 2: Deploying
Servers, p. 44
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 1: Installing
and Configuring Servers, p. 19-22
Question: 200
Answer: D
Explanation:
Your network contains an Active Directory domain named contoso.com. All client computers
run Windows 8.
An administrator creates an application control policy and links the policy to an
organizational unit (OU) named OU1. The application control policy contains several deny
rules. The deny rules apply to the Everyone group.
You need to prevent users from running the denied application.
What should you configure?
To answer, select the appropriate object in the answer area.
Answer:
Explanation:
Local Group Policy Editor is a Microsoft Management Console (MMC) snap-in that is used to
configure and modify Group Policy settings within Group Policy Objects (GPOs).
Administrators need to be able to quickly modify Group Policy settings for multiple users and
computers throughout a network environment. The Local Group Policy Editor provides
administrators with a hierarchical tree structure for configuring Group Policy settings in
GPOs. These GPOs can then be linked to sites, domains, and organizational units (OU) that
contain computer or user objects.To work efficiently, administrators need to have immediate
access to information about the function and purpose of individual policy settings. For
Administrative Templates policy settings, Local Group Policy Editor provides information
about each policy setting directly in the web view of the console. This information shows
operating system requirements, defines the policy setting, and includes any specific details
about the effect of enabling or disabling the policy setting.
References:
http://technet.microsoft.com/en-us/library/dn265982.aspx
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
From Server2, you attempt to connect to Server1 by using Computer Management and you
receive the following error message: "Computer\ \Server1 cannot be found. The network
path was not found."
From Server1, you successfully connect to Server2 by using Server Manager.
You need to ensure that you can manage Server1 remotely from Server2 by using Computer
Management.
What should you configure?
To answer, select the appropriate option in the answer area.
Answer:
Question: 204
Your network contains an Active Directory domain named contoso.com. The domain
contains three member servers.
The servers are configured as shown in the following table.
A. From the Windows Deployment Services console on Server1, add the driver package for
Printer1.
B. From Windows PowerShell on Server3, run the Add-PrinterDrivercmdlet.
C. From the Print Management console on Server3, add additional drivers for Printer1.
D. From the Update Services console on Server2, import and approve updates.
Answer: D
Explanation:
Since the Printer driver is not included in the Windows 8 installation media you will need to
import it. All updates have to be approved prior to installation.
References:
http://technet.microsoft.com/en-us/library/cc719842%28v=ws.10%29.aspx
Question: 205
Your network contains an Active Directory domain named adatum.com. The domain
contains the servers shown in the following table.
You need to ensure that you can use Server Manager on DC1 to manage DC2.
Which two tasks should you perform? (Each correct answer presents part of the solution.
Choose two.)
Explanation:
In Windows Server 2012 R2, you can use Server Manager to perform management tasks on
remote servers. Remote management is enabled by default on servers that are running
Windows Server 2012 R2. To manage a server remotely by using Server Manager, you add
the server to the Server Manager server pool.
You can use Server Manager to manage remote servers that are running Windows Server
2008 and Windows Server 2008 R2, but the following updates are required to fully manage
these older operating systems.
Windows Management Framework 3.0 To use this release of Server Manager to access and
manage remote servers that are running Windows Server 2008 or Windows Server 2008 R2,
you must first install .NET Framework 4.0, and then install Windows Management
Framework 3.0 on those servers.
Reference:
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying
servers, p. 80
Question: 206
A. Sharing
B. Security
C. Advanced
D. Device Settings
E. Ports
Answer: C
Explanation:
When navigating to the printer properties, the Properties tab is divided into several different
tabs of which the Advanced tab will give you access to the scheduling where you can
configure the availability of the printer.
References:
http://technet.microsoft.com/en-us/library/cc722526.aspx
Question: 207
The routing table for Server1 is shown in the Routing Table exhibit. (Click the Exhibit button.)
From Server1, you attempt to ping Server2, but you receive an error message as shown in
the Error exhibit. {Click the Exhibit button.)
Answer: D
Explanation:
The Default Gateway specifies the IP address of a router on the local subnet, which the
system will use to access destinations on other networks. If the default gateway settings is
not properly configured, then there can be no successful connection
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network
Administration, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 269
Question: 208
Explanation:
You should use GlobalNames zone to take advantage of single-label names. This will also
ensure that the zone remains valid.
Question: 209
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has
the Hyper-V server role installed.
You create an external virtual switch named Switch1. Switch1 has the following
configurations:
Connection type: External network
Single-root I/O virtualization (SR-IOV): Enabled
Ten virtual machines connect to Switch1.
You need to ensure that all of the virtual machines that connect to Switch1 are isolated from
the external network and can connect to each other only. The solution must minimize
network downtime for the virtual machines.
What should you do?
Answer: B
Explanation:
You can change the connection type of a virtual switch from the virtual switch manager
without having to remove it. A private virtual network is isolated from all external network
traffic on the virtualization server, as well any network traffic between the management
operating system and the external network. This type of network is useful when you need to
create an isolated networking environment, such as an isolated test domain.
References:
http://technet.microsoft.com/en-us/library/cc816585%28v=WS.10%29.aspx
http://blogs.technet.com/b/jhoward/archive/2008/06/17/hyper-v-what-are-the-uses-for-
different-types-of-virtual-networks.aspx
Answer:
Question: 211
A. TheRemoteFX settings
B. The Enhanced Session Mode Policy
C. The NUMA Spanning settings
D. The Integration Services settings
Answer: B
Question: 212
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the
Hyper-V server role installed.
On Server1, an administrator creates a virtual machine named VM1.
A user named User1 is the member of the local Administrators group on Server1.
User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the
Exhibit button.)
You need to ensure that User1 can modify the settings of VM1 by running the Set-Vmcmdlet.
What should you instruct User1 to do?
Answer: A
Explanation:
You can only use the PowerShell snap-in to modify the VM settings with the vmcmdlets
when you are an Administrator.
Thus best practices dictate that User1 run the Powershell with elevated privileges.
References:
Question: 213
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the
Hyper-V server role installed. On Server1, you create a virtual machine named VM1.
You need to ensure that VM1 can start by using PXE.
What should you do?
Answer: D
Question: 214
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that has the DNS Server server role installed. DC1
hosts an Active Directory-integrated zone for the domain. The domain contains a member
server named Server1.
You install the DNS Server server role on Server1.
You need to ensure that Server1 can respond authoritatively to queries for the existing
contoso.com namespace.
Which cmdlets should you run on each server? (To answer, drag the appropriate cmdlets to
the correct servers. Each cmdlet may be used once, more than once, or not at all. You may
need to drag the split bar between panes or scroll to view content.)
Explanation:
The Set-DnsServerPrimaryZonecmdlet changes settings for an existing Domain Name
System (DNS) primary zone. You can change values that are relevant for either Active
Directory-integrated zones or file-backed zones. This cmdlet should be run on Server1 to
make it authoritative. The Add-DnsServerSecondaryZonecmdlet adds a specified secondary
zone on a Domain Name System (DNS) server. You can create either a forward lookup zone
or a reverse lookup zone. This cmdlet should be run on DC1.
Question: 215
You have a domain controller named Server1 that runs Windows Server 2012 R2 and has
the DNS Server server role installed. Server1 hosts a DNS zone named contoso.com and a
GlobalNames zone.
You discover that the root hints were removed from Server1.
You need to view the default root hints of Server1.
What should you do?
Answer: B
Explanation:
DNS Server service implements root hints using a file, Cache.dns, stored in the
systemroot\System32\Dns folder on the server. Thus viewing the Cache.dns file will show
the root hints.
References
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File
Services and Storage, p. 284
http://technet.microsoft.com/en-us/library/cc758353(v=ws.10).aspx
Question: 216
DRAG DROP
Your company has a main office that contains 225 client computers. The client computers
are located on a subnet that uses the network ID of 10.10.1.0/24.
The company plans to open two branch offices. The offices will be configured as shown in
the following table.
You need to select a network prefix for each office to ensure that there are enough IPv4
addresses for each client computer.
The solution must minimize the number of unused IP addresses.
Which network prefixes should you select?
To answer, drag the appropriate network prefix to the correct branch office in the answer
area.
Question: 217
DRAG DROP
You have a print server named Server1Server1 runs Windows Server 2008 R2. You have a
file server named Server2. Server2 runs Windows Server 2012 R2.
You need to migrate all of the printers on Server1 to Server2.
Which actions should you perform on the servers?
To answer, drag the appropriate action to the correct servers in the answer area. Each
action may be used once, more than once, or not at a You may need to drag the split bar
between panes or scroll to view content.
Question: 218
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named CONT1 and CONT2. Both servers run Windows Server 2012
R2.
CONT1 has a shared printer named Printer1. CONT2 connects to Printer1 on CONT1.
When you attempt to remove Printer1 from CONT2, you receive the error message shown in
the exhibit. (Click the Exhibit button.)
Answer: B
Question: 219
Your network contains an Active Directory domain named contoso.com. The domain
contains two domain controllers.
The domain controllers are configured as shown in the following table.
In the perimeter network, you install a new server named Server1 that runs Windows Server
2012 R2. Server1 is in a workgroup.
You need to perform an offline domain join of Server1 to the contoso.com domain.
What should you do first?
Explanation:
The djoin command should be used for offline join in the perimeter network.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 5: Active
Directory Administration, p. 187
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 4: Deploying
Domain Controllers, Lesson 2: Deploying domain controllers using Server Manager, p. 157
Question: 220
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC5. DC5 has a Server Core Installation of Windows
Server 2012 R2.
You need to uninstall Active Directory from DC5 manually.
Which tool should you use?
Answer: C
Explanation:
The Remove-ADComputercmdlet removes an Active Directory computer.
Example: Remove-ADComputer -Identity "FABRIKAM-SRV4"
Remove one particular computer.
References:
http://technet.microsoft.com/en-us/library/ee662310.aspx
http://support.microsoft.com/kb/216498
http://technet.microsoft.com/en-us/library/ee617250.aspx
Question: 221
Your network contains two Hyper-V hosts named Host1 and Host2. Host1 contains a virtual
machine named VM1. Host2 contains a virtual machine named VM2. VM1 and VM2 run
Windows Server 2012 R2.
You install the Network Load Balancing feature on VM1 and VM2.
You need to ensure that the virtual machines are configured to support Network Load
Balancing (NLB).
A. DHCP guard
B. MAC address
C. Router guard
D. Port mirroring
Answer: B
Explanation:
When MAC addresses are not assigned to virtual machines, it could cause network
problems.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V
virtualization, Lesson 1: Deploying and configuring Hyper-V hosts, p. 313-319
http://blogs.msdn.com/b/clustering/archive/2010/07/01/10033544.aspx
Your network contains an Active Directory domain named contoso.com. The network
contains two subnets. The subnets are configured as shown in the following table.
Answer:
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 R2.
An administrator creates a security template named Template1.
You need to apply Template1 to Server1.
Which snap-in should you use?
Answer: B
Explanation:
The Security Configuration and Analysis tool contains the Local Security Policy snap-in that
is used to apply templates.
References:
http://technet.microsoft.com/en-us/library/bb742512.aspx
http://technet.microsoft.com/en-us/library/cc739442%28v=WS.10%29.aspx
Question: 225
A. Enforce GPO1.
B. Modify the GPO status of GPO1.
C. Modify the Security settings of GPO1.
D. Disable Block Inheritance on OUL.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/cc739343(v=ws.10).aspx
Question: 226
You need to ensure that all users see only their own home folder when they access Home.
What should you do from Server2?
Answer: B
Explanation:
Share permissions apply to users who connect to a shared folder over the network. Share
permissions do not affect users who log on locally, or log on using Remote Desktop.
You need to navigate from your Windows interface to open Computer Management from
where you can assign the appropriate permissions regarding the properties of the volume
where the home folders reside.
References:
http://technet.microsoft.com/en-us/library/cc726004.aspx
Question: 227
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has
the File and Storage Services server role installed.
On Server1, you create a share named Documents.
You need to ensure that users can recover files that they accidently delete from Documents.
Answer: A
Explanation:
Shadow copies - a feature that provides point-in-time copies of files stored on file shares on
file servers. Shadow Copies of Shared Folders allows users to view and access shadow
copies, which are shared files and folders as they existed at different points of time in the
past. By accessing previous versions of files and folders, users can compare versions of a
file while working and recover files that were accidentally deleted or overwritten.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 7: Hyper-V
virtualization, Lesson 1: Deploying and configuring Hyper-V- hosts, p. 302
Question: 228
Answer: D
Explanation:
The Wireless LAN service in Windows Server 2012 R2 can be used to enable the wireless
WLAN AutoConfig service, and to configure the WLAN AutoConfig service for automatic
startup. Once enabled, the WLAN AutoConfig service dynamically selects which wireless
network the computer automatically connects to, and configures the necessary settings on
Question: 229
DRAG DROP
Your network contains two Active Directory forests named adatum.com and contoso.com.
Both forests contain multiple domains. A two-way trust exists between the forests.
The contoso.com domain contains a domain local security group named Group1. Group1
contains Contoso\user1 and adatum\user1.
You need to ensure that Group1 can only contain users from the contoso.com domain.
Which three actions should you perform?
To answer, move three actions from the list of actions to the answer area and arrange them
in the correct order.
Answer:
Question: 230
Your network contains an Active Directory domain named contoso.com. The domain
contains 100 user accounts that reside in an organizational unit (OU) named OU1.
Answer: A
Explanation:
Delegation of Control Wizard should be used to assign the appropriate permissions to
User1.
The following are common tasks that you can select to delegate control of them: Manage
Group Policy links, Create, delete, and manage user accounts, Reset user passwords and
force password change at next logon, Read all user information, Modify the membership of a
group, Join a computer to a domain,, and many other tasks.
Permissions on the Organizational unit take precedence over user accounts permissions.
Thus by changing the permissions to the OU you can assign the appropriate permission to
the user account.
References:
http://technet.microsoft.com/en-us/library/dd145344.aspx
http://technet.microsoft.com/en-us/library/jj190062.
http://technet.microsoft.com/en-us/library/cc756952%28v=WS.10%29.aspx
Question: 231
You have a server named Server1 that runs Windows Server 2012 R2.
You plan to create an image of Server1.
You need to remove the source files for all server roles that are not installed on Server1.
Which tool should you use?
A. servermanagercmd.exe
B. imagex.exe
C. ocsetup.exe
D. dism.exe
Answer: D
Explanation:
The Dism utility can be used to create and mount an image of Server1.
References:
http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/dd744382(v=ws.10).aspx
Question: 232
You have a server named Server2 that runs Windows Server 2012 R2. Server2 has the
Hyper-V server role installed.
The disks on Server2 are configured as shown in the exhibit. (Click the Exhibit button.)
Answer: C
Question: 233
You need to ensure that when Server1 restarts, Server3 automatically resumes without
intervention. The solution must prevent data loss.
Which settings should you modify?
A. BIOS
B. Automatic Stop Action
C. Automatic Start Action
D. Integration Services
Explanation:
The Automatic Stop Action setting should be modified because it will allow you to configure:
“Save the virtual machine state” option instructs Hyper-V Virtual Machine Management
Service to save the virtual machine state on the local disk when the Hyper-V Server shuts
down.
OR “Turn Off the virtual machine” is used by the Hyper-V Management Service (VMMS.exe)
to gracefully turn off the virtual machine.
OR “Shut down the guest operating system” is successful only if the “Hyper-V Shutdown”
guest service is running in the virtual machine. The guest service is required to be running in
the virtual machine as the Hyper-V VMMS.EXE process will trigger Windows Exit message
which is received by the service. Once the message is received by the guest service, it takes
the necessary actions to shut down the virtual machine.
References:
http://www.altaro.com/hyper-v/hyper-v-automatic-start-and-stop-action/
Question: 234
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2
and has the Hyper-V server role installed.
HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a
virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual
machines have the DHCP guard and the router guard settings enabled.
You install the DHCP server role on a virtual machine named Server1. You authorize
Server1 as a DHCP server in contoso.com. You create an IP scope.
You discover that the virtual machines connected to Switch1 do not receive IP settings from
Server1.
You need to ensure that the virtual machines can use Server1 as a DHCP server.
What should you do?
Answer: C
Explanation:
DHCP guard setting
This setting stops the virtual machine from making DHCP offers over this network interface.
To be clear – this does not affect the ability to receive a DHCP offer (i.e. if you need to use
DHCP to acquire an IP address that will work) it only blocks the ability for the virtual machine
to act as a DHCP server.
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the
Hyper-V server role installed.
You have a virtual machine named VM1. VM1 has a checkpoint.
You need to modify the Checkpoint File Location of VM1.
What should you do first?
Answer: B
You have a server named Server1 that runs Windows Server 2012 R2.
Several users are members of the local Administrators group.
You need to ensure that all local administrators receive User Account Control (UAC)
prompts when they run a Microsoft Management Console (MMC).
Which settings should you modify from the Local Security Policy?To answer, select the
appropriate settings in the answer area.
Answer:
Question: 237
Your network contains an Active Directory domain named contoso.com. The network
contains a domain controller named DC1 that has the DNS Server server role installed. DC1
has a standard primary DNS zone for contoso.com.
You need to ensure that only client computers in the contoso.com domain will be able to add
their records to the contoso.com zone.
What should you do first?
Answer: D
Explanation:
Only Authenticated users can create records when zone is stored in AD
Secure dynamic updates allow an administrator to control what computers update what
names and prevent unauthorized computers from overwriting existing names in DNS.
References:
Question: 238
You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains
a folder named Folder1.
You share Folder1 as Share1 by using Advanced Sharing. Access-based enumeration is
enabled.
Share1 contains an application named Appl.exe.
You configure the NTFS permissions on Folder1 as shown in the following table.
The members of Group2 report that they cannot make changes to the files in Share1. The
members of Group1 and Group2 run Appl.exe successfully.
You need to ensure that the members of Group2 can edit the files in Share1.
What should you do?
Answer: B
Explanation:
The shared folder should have NTFS and shared folder permissions that will allow the
members of Group2 to edit the files. Thus you should edit the Share permissions
accordingly.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter8: File Services
and Storage, Lesson 2: Provisioning and Managing Shared Storage, p.388
Question: 239
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the
Hyper-V server role installed.
You need to configure storage for a virtual machine to meet the following requirements:
Support up to 3 TB of data on a single hard disk.
Allocate disk space as needed.
Use a portable storage format.
A. A fixed-size VHDX
B. A pass-through disk
C. A fixed-size VHD
D. A dynamically expanding VHDX
E. A dynamically expanding VHD
Answer: D
Explanation:
Dynamically expanding virtual hard disk uses only as much physical storage space as it
needs to store the actual data that the disk currently contains. The size of the virtual disk’s
image file then grows as additional data is written to it.
References:
http://technet.microsoft.com/en-us/library/cc720381(v=ws.10).aspx
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 3.2:
Create and Configure virtual machine storage, Chapter 3: p. 157-158
70-410: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 7:
Hyper-V virtualization, Lesson 2: Deploying and Configuring virtual machines, p. 320
Question: 240
Answer: C
Question: 241
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
You need to ensure that the local administrator account on all computers is renamed to
L.Admin.
Which Group Policy settings should you modify?
A. Restricted Groups
B. Security Options
C. User Rights Assignment
D. Preferences
Answer: B
Question: 242
You install Windows Server 2012 R2 on a standalone server named Server1. You configure
Server1 as a VPN server.
You need to ensure that client computers can establish PPTP connections to Server1.
Which two firewall rules should you create? (Each correct answer presents part of the
solution. Choose two.)
Answer: B, C
Explanation:
To enable VPN tunnels between individual host computers or entire networks that have a
firewall between them, you must open the following ports:
To allow PPTP tunnel maintenance traffic, open TCP 1723.
To allow PPTP tunneled data to pass through router, open Protocol ID 47.
If you use a personal firewall or a broadband router, or if there are routers or firewalls
between the VPN client and the VPN server, the following ports and protocol must be
enabled for PPTP on all firewalls and routers that are between the VPN client and the VPN
server:
References:
http://www.windowsitpro.com/article/pptp/which-ports-do-you-need-to-open-on-a-firewall-to-
allow-pptp-andl2tp-over-ipsec-vpn-tunnels--46811
http://support.microsoft.com/kb/314076/en-us
Question: 243
Your network contains two subnets. The subnets are configured as shown in the following
table.
You need to ensure that Server1 can communicate with the client computers on LAN2.
What should you do?
Answer: A
Explanation:
The exhibit shows the default gateway address to be that of LAN1. This should be changed
to the LAN2 gateway address to allow client computers access on LAN2.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying
domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256
Question: 244
Your network contains an Active Directory forest named adatum.com. The forest contains a
child domain named asia.adatum.com. The asia.adatum.com child domain contains a server
named DHCP1 that runs Windows Server 2012 R2.
You install the DHCP Server server role on DHCP1.
You have access to the administrative accounts shown in the following table.
A. Admin1
B. Admin2
C. Admin3
D. Admin4
Answer: B
Question: 245
You have a server named Server1 that has a Server Core installation of Windows Server
2008 R2.
Server1 has the DHCP Server server role and the File Server server role installed.
A. OnServer1, run setup.exe from the Windows Server 2012 R2 installation media and
select Server Core Installation. When the installation is complete, add the Server Graphical
Shell feature.
B. OnServer1, run setup.exe from the Windows Server 2012 R2 installation media and
select Server with a GUI.
C. Start Server1 from the Windows Server 2012 R2 installation media and select Server with
a GUI.
D. Start Server1 from the Windows Server 2012 R2 installation media and select Server
Core Installation. When the installation is complete, add the Server Graphical Shell feature.
Answer: D
Question: 246
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2. The domain contains a member server named Server1. Server1
has the File and Storage Services server role installed.
On Server1, you create a share named Documents. The Documents share will contain the
files and folders of all users.
You need to ensure that when the users connect to Documents, they only see the files to
which they have access.
What should you do?
Answer: A
Explanation:
This feature allows users of Windows Server 2003–based file servers to list only the files and
folders to which they have access when browsing content on the file server.
References:
Exam Ref 70-410: Installing and configuring Windows Server 2012 R2, Chapter 2: Configure
server roles and features, Objective 2.1: Configure file and share access, p. 75-80
You have a server named Server1 that runs a Server Core installation of Windows Server
2012 R2 Standard. You establish a Remote Desktop session to Server1.
You need to identify which task can be performed on Server1 from within the Remote
Desktop session.
What should you identify?
Answer: B
Explanation:
In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to
configure and manage several common aspects of Server Core installations. You must be a
member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal
Server Interface and in Server with a GUI mode.
http://technet.microsoft.com/en-us/library/jj647766.aspx
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying
servers, p. 80
Question: 248
You have a server named Server1. Server1 runs Windows Server 2012 R2 and is located in
a perimeter network.
You need to configure a custom connection security rule on Server1. The rule must encrypt
network communications across the Internet to a computer at another company.
Which authentication method should you configure in the connection security rule?
A. Advanced
B. User (Kerberos V5)
C. Default
D. Computer (Kerberos V5)
E. Computer and user (Kerberos V5)
Answer: A
Explanation:
Your network contains two servers named Server1 and Server2 that run Windows Server
2012 R2. Server1 has the Hyper-V server role installed. Server2 has the Windows
Deployment Services server role installed.
On Server1, you have a virtual machine named VM1.
You plan to deploy an image to VM1 by using Windows Deployment Services (WDS).
You need to ensure that VM1 can connect to Server1 by using PXE.
Which settings should you configure on VM1?To answer, select the appropriate settings in
the answer area.
Question: 250
Explanation:
Remote Desktop services are not available in server core installation; you need to add the
role.
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 1: Installing
and Configuring servers, Objective 1.2: Configure servers, p. 19
http://technet.microsoft.com/en-us/library/hh848506(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/hh848520(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/ff817586(v=ws.10).aspx
Question: 251
Answer: B, C
Question: 252
Your network contains an Active Directory domain named contoso.com. The domain
contains 500 servers that run Windows Server 2012 R2.
You have a written security policy that states the following:
Only required ports must be open on the servers.
All of the servers must have Windows Firewall enabled.
Client computers used by administrators must be allowed to access all of the ports on all of
the servers.
Answer: A, C, F
Explanation:
Unlike firewall rules, which operate unilaterally, connection security rules require that both
communicating computers have a policy with connection security rules or another
compatible IPsec policy.
Traffic that matches a firewall rule that uses the Allow connection if it is secure setting
bypasses Windows Firewall. The rule can filter the traffic by IP address, port, or protocol.
This method is supported on Windows Vista or Windows Server 2008.
References:
http://technet.microsoft.com/en-us/library/cc772017.aspx
http://technet.microsoft.com/en-us/library/cc753463.aspx
Question: 253
A. Create a new starter GPO and manually configure the policy settings of the starter GPO.
B. Right-click GPO1, and then click Back Up. Create a new starter GPO. Right-click the new
GPO, and then click Restore from Backup.
C. Right-click GPO1, and then click Copy. Right-click Starter GPOs, and then click Paste.
D. Run the New-GPStarterGPOcmdlet and the Copy-GPO cmdlet.
Explanation:
Since it is mentioned that there is a starter GPO that contains more than 100 settings
already, it would be less administrative effort to just copy the existing one to replace it with
the new GPO1 settings by clicking and pasting.
Note:
Copying a Starter GPO
1. Open the Group Policy Management Console. Expand the Starter GPOs node.
2. Right-click the Starter GPO you want to copy and then click Copy .
3. Right-click the Starter GPO node and then click Paste .
4. Click OK .
References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 5: Install
and administer Active Directory, Objective 5.2: Create and Manage Active Directory Users
and Computers, p. 277
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 6: Create
and Manage Group Policy, Objective 6.2: Configure Security Policies, p. 324
Question: 254
Your network contains an Active Directory domain named contoso.com. The domain
contains a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a
shared folder named Share1. Share1 contains the home folder of each user.
All users have the necessary permissions to access only their home folder.
The users report that when they access Share1, they can see the home folders of all the
users.
You need to ensure that the users see only their home folder when they access Share1.
What should you do from Server1?
A. From Windows Explorer, modify the properties of the volume that contains Share1.
B. From Server Manager, modify the properties of the volume that contains Share1.
C. From Server Manager, modify the properties of Share1.
D. From Windows Explorer, modify the properties of Share1.
Answer: A
Explanation:
Share permissions apply to users who connect to a shared folder over the network. Share
permissions do not affect users who log on locally, or log on using Remote Desktop.
You need to navigate from your Windows interface to open Computer Management from
where you can assign the appropriate permissions regarding the properties of the volume
where the home folders reside.
References:
http://technet.microsoft.com/en-us/library/cc726004.aspx
You have a server named Server1Server1 runs Windows Server 2012 R2 and has the File
and Storage Services server role installed.
You attach four 500-GB disks to Server1.
You need to configure the storage to meet the following requirements:
Storage for an application named Application1 must be provided. Application1 requires 20
GB and will require a maximum of 800 GB in three years.
Storage for an application named Application2 must be provided. Application2 requires 20
GB and will require a maximum of 900 GB in three years.
The solution must provide the ability to dynamically add storage without requiring
configuration changes to the applications.
The storage must be available if a single disk fails.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. From File and Storage Services, create virtual disks by using fixed provisioning.
B. From Fife and Storage Services, create virtual disks by using thin provisioning.
C. From File and Storage Services, create a storage pool that uses all four disks.
D. From Disk Management, create a new RA1D-5 volume that uses all four disks.
E. From Disk Management, create two new mirror volumes that use two disks each.
Answer: AC
Explanation:
References:
http://technet.microsoft.com/en-us/library/jj822937.aspx
Question: 256
You have a server named Server1 that runs Windows Server 2012 R2.
You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the
installation fails repeatedly.
You need to ensure that the feature can be installed on Server1.
What should you do?
Answer: C
Question: 257
A. servermanagercmd.exe
B. dism.exe
C. ocsetup.exe
D. imagex.exe
Answer: B
Explanation:
This command will mount the image before making any changes. This will ensure that only
the required Windows Server 2012 R2 source files are contained.
Question: 258
Answer: B
Explanation:
Set-DhcpServerv4Scope
Sets the properties of an existing IPv4 scope on the Dynamic Host Configuration Protocol
(DHCP) server service.
Question: 259
You have a server named Server1 that runs Windows Server 2012 R2.
You plan to enable Hyper-V Network Virtualization on Server1.
You need to install the Windows Network Visualization Filter Driver on Server1.
Which Windows PowerShell cmdlet should you run?
A. Set-NetVirtualizationGlobal
B. Enable-NetAdapterBinding
C. Add - WindowsFeature
D. Set-NetAdapterVmq
Answer: B
Explanation:
Hyper-V Network Virtrtualization runs multiple virtual networks on a physical network. And
each virtual network operates as if it is running as a physical network. The The Set-
NetAdaptercmdlet sets the basic properties of a network adapter such as virtual LAN (VLAN)
identifier (ID) and MAC address. Thus if you add the binding parameter to the command
then you will be able to install the Windows Network Virtualization Filter Driver.
Step one:
Enable Windows Network Virtualization (WNV). This is a binding that is applied to the NIC
that you External Virtual Switch is bound to. This can be a physical NIC, it can be an LBFO
Question: 260
You have a file server named File1 that runs Windows Server 2012 R2.
File1 contains a shared folder named Share1. Share1 contains an application named
SalesAppl.exe.
The NTFS permissions for Share1 are shown in the following table.
The members of L_Sales discover that they cannot add files to Share1. Domain users can
run SalesAppl.exe successfully.
You need to ensure that the members of L_Sales can add files to Share1.
What should you do?
Answer: B
Explanation:
The least restrictive permission applies here, so the users from L_sales have read &
execute, write... in order to add files they need the NTFS permission called MODIFY.
Based on NTFS permissions:
Modify: Users can view and modify files and file properties, including deleting and adding
files to a directory or file properties to a file.
You have a server named Server1 that runs Windows Server 2012 R2.
You need to remove Windows Explorer, Windows Internet Explorer, and all related
components and files from Server1.
What should you run on Server1?
Answer: D
Explanation:
Since there is no IE or taskbar, explorer or control panel you should execute the Uninstall-
WindowsFeature Server-Gui-Shell –Remove command.
Question: 262
You have a server named Server1 that runs a Server Core Installation of Windows Server
2012 R2. You attach a 4-TB disk to Server1.
The disk is configured as an MBR disk. You need to ensure that you can create a 4-TB
volume on the disk.
Which Diskpart command should you use?
A. Expand
B. Attach
C. Automount
D. Convert
Answer: D
Explanation:
You will need to convert the disk to a GPT since GPT disks allows for partitioning and not
MBR disks.
Answer:
Question: 264
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2 and has the Web
Server (US) server role installed.
Server1 has a web site named Web1. Web1 is configured to use digest authentication.
You need to ensure that a user named User1 can access Web1.
What should you do from Active Directory Users and Computers?
A. From the properties of User1, select Store password using reversible encryption.
B. From the properties of User1, select Use Kerberos DES encryption types for this account.
C. From the properties of Server1, select Trust this computer for delegation to any service
(Kerberos only).
D. From the properties of Server1, assign the Allowed to Authenticate permission to User1.
Explanation:
Challenge Handshake Authentication Protocol (CHAP) is a basic level of iSCSI security that
is used to authenticate the peer of a connection and is based upon the peers sharing a
secret: that secret being a password. To make sure that User1 can connect to the server,
you should use Active Directory Users and Computers to store that password.
Question: 265
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2.
When a domain user named User3 attempts to log on to a client computer named Client10,
User3 receives the message shown in the following exhibit. (Click the Exhibit button.)
A. From Active Directory Users and Computers, configure the Logon Workstations setting of
User3.
B. On Client10, modify the Allow log on locally User Rights Assignment.
C. From Active Directory Users and Computers, configure the Personal Virtual Desktop
property of User3.
D. On Client10, modify the Deny log on locally User Rights Assignment.
Answer: A
Question: 266
A. dsadd.exe
B. regedit.exe
C. redircmp.exe
D. net.exe
Answer: C
Explanation:
Executing this command will redirect the default container for newly created computers to a
specified, target organizational unit.
Question: 267
Your network contains an Active Directory forest named contoso.com. The forest contains a
child domain named corp.contoso.com.
The network has Microsoft Exchange Server 2010 deployed.
You need to create a mail-enabled distribution group.
Which type of group should you create?
A. global
B. local
C. domain local
D. universal
Answer: D
Explanation:
Universal groups are used to grant permissions on a wide scale throughout a domain tree or
forest. Members of global groups include accounts and groups from any domain in the
domain tree or forest. Only universal groups should be used as mail-enabled groups.
Question: 268
Answer:
Question: 269
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has five
network adapters. Three of the network adapters are connected to a network named LAN1.
The two other network adapters are connected to a network named LAN2.
You need to create a network adapter team from the three network adapters connected to
LAN1.
Which tool should you use?
Answer: D
Explanation:
The Server Manager allows access to the network adapters where you can configure the
network adapter team.
References:
http://technet.microsoft.com/en-us/library/hh831648.aspx
Question: 270
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain
contains a file server named File1. All servers in the domain run Windows Server 2012 R2.
You need to create a new volume on File1.
The new volume must have the following configurations:
Have the drive letter T
Have the FAT32 file system
Be stored on a new virtual hard disk
In which order should you run the Diskpart commands?
To answer, move all the Diskpart commands from the list of commands to the answer area
and arrange them in the correct order.
Explanation:
Note: Example:
createvdisk file="C:\vdisks\disk1.vhd" maximum=16000
attachvdisk
create partition primary
assign letter=g
format
References:
http://technet.microsoft.com/en-us/library/gg252576.aspx
http://technet.microsoft.com/en-us/library/hh831487.aspx
Question: 271
Your network contains two servers named Server1 and Server2 that run Windows Server
2012 R2. Server1 is a DHCP server that is configured to have a scope named Scope1.
Server2 is configured to obtain an IP address automatically.
In Scope1, you create a reservation named Res_Server2 for Server2.
A technician replaces the network adapter on Server2.
You need to ensure that Server2 can obtain the same IP address.
What should you modify on Server1?
Answer: B
Explanation:
Media access control (MAC) address authorization functions in the same way as automatic
number identification (ANI) authorization, but it is used for wireless clients and clients
connecting to your network by using an 802.1X authenticating switch. Since the network
adapter was replaced, you need to modify the MAC address on Server1 to ensure that
Server2 can obtain the same IP address.
References:
http://technet.microsoft.com/en-us/library/dd197535%28v=WS.10%29.aspx
Question: 272
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 R2 and is configured
as the only domain controller.
You need to retrieve a list of all the user accounts. The list must include the last time each
user was authenticated successfully.
Which Windows PowerShell command should you run?
To answer, drag the appropriate cmdlet or property to the correct locations to complete the
PowerShell command in the answer area. Each cmdlet or property may be used once, more
than once, or not at all. You may need to drag the split bar between panes or scroll to view
content.
Answer:
Question: 273
Answer: A
Explanation:
You should apply an application control policy for executable rules, and it can be based on
version.
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 6: Create
and Manage Group Policy, Objective 6.2: Local Users and Groups, p. 329
http://technet.microsoft.com/en-us/library/dd759068.aspx
http://technet.microsoft.com/en-us/library/hh994588.aspx
http://www.grouppolicy.biz/2012/08/how-manage-published-a-k-a-metro-apps-in-windows-8-
using-grouppolicy/
Question: 274
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
The domain contains a server named Server1 that runs Windows Server 2012 R2.
You need to ensure that when users log on to Server1, their user account is added
automatically to a local group named Group1 during the log on process.
Which Group Policy settings should you modify?
Answer: B
Explanation:
With Preferences, local and domain accounts can be added to a local group without affecting
the existing members of the group
References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File
Services and Storage, p. 361
http://technet.microsoft.com/en-us/library/cc785631(v=ws.10).aspx
http://www.grouppolicy.biz/2010/01/how-to-use-group-policy-preferences-to-secure-local-
administrator-groups/
http://technet.microsoft.com/en-us/library/cc780182(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh831424.aspx
Question: 275
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has
the File and Storage Services server role installed.
On Server1, you create a share named Documents. The Share permission for the
Documents share is configured as shown in the following table.
The NTFS permission for the Documents share is configured as shown in the following table.
Answer:
Explanation:
Granting a user Full Control NTFS permission on a folder enables that user to take
ownership of the folder unless the user is restricted in some other way. Be cautious in
granting Full Control.
If you want to manage folder access by using NTFS permissions exclusively, set share
permissions to Full Control for the Everyone group.
Question: 276
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2. The domain contains a server named Server1.
You install the Windows PowerShell Web Access gateway on Server1.
You need to provide administrators with the ability to manage the servers in the domain by
using the Windows PowerShell Web Access gateway.
Which two cmdlets should you run on Server1? (Each correct answer presents part of the
solution. Choose two.)
A. Add-PswaAuthorizationRule
B. Set-WSManQuickConfig
C. Set-BCAuthentication
D. Set-WSManlnstance
E. Install-PswaWebApplication
Answer: A, E
Explanation:
http://technet.microsoft.com/en-us/library/hh849867.aspx
http://technet.microsoft.com/en-us/library/hh849875.aspx
http://technet.microsoft.com/en-us/library/jj592890(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/hh848404(v=wps.620).aspx
http://technet.microsoft.com/en-us/library/jj592894(v=wps.620).aspx
Question: 277
Your network contains an Active Directory domain named adatum.com. The domain
contains three domain controllers.
The domain controllers are configured as shown in the following table.
Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/cc959303.aspx
http://technet.microsoft.com/en-us/library/cc731968(v=ws.10).aspx
You have three servers named Server1, Server2, and DC1 that run Windows Server 2012
R2. IPv6 addresses and configurations are assigned to all of the servers by using DHCPv6.
The IPv6 routing on Server1 is shown in the following table.
You verify that Server2 can ping the IPv6 address of DC1.
You need to ensure that Server1 can ping the IPv6 address of DC1.
What command should you run on Server1? (To answer, select the appropriate options in
the answer area.)
Explanation:
Before a routing table is used, the destination cache is checked for an entry matching the
destination address in the packet being forwarded. If the destination cache does not contain
an entry for the destination address, the routing table is used to determine:
The next-hop address - For a direct delivery (in which the destination is on a local link), the
next-hop address is the destination address in the packet. For an indirect delivery (in which
the destination is not on a local link), the next-hop address is the address of a router.
The next-hop interface - The interface identifies the physical or logical interface that is used
to forward the packet either to its destination or to the next router.
References:
http://technet.microsoft.com/en-us/library/dd379520%28v=WS.10%29.aspx
You have a DNS server named Server 1. Server1 runs Windows Server 2012 R2.
The network ID is 10.1.1.0/24.
An administrator creates several reverse lookup zones.
You need to identify which reverse lookup zone is configured correctly.
Which zone should you identify?
To answer, select the appropriate zone in the answer area.
Explanation:
Octets specified in reverse order
<subnet-specific label> . <octet> . <octet> . <octet> . in-addr .arpa
References:
http://technet.microsoft.com/en-us/library/cc961414.aspx
Your network contains a server named Server1 that runs Windows Server 2012 R2. App1
has the Print and Document Services server role installed.\
All client computers run Windows 8.
The network contains a network-attached print device named Printer1.
From App1, you share Printer1.
You need to ensure that users who have connected to Printer1 previously can print to
Printer1 if App1 fails.
Answer:
Explanation:
Enabling Branch Office Direct Printing isa new feature in Windows Server 2012 R2 that
helps branch-office sites reduce their wide area network (WAN) usage by printing directly to
a print device instead of spooling print jobs to a print queue on the print server.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 9: Print and
Document Services, Lesson 1: Deploying and managing print servers, p. 443
http://technet.microsoft.com/en-us/library/jj134156
Question: 281
Your network contains an Active Directory domain named contoso.com. The domain
contains an application server named Server1. Server1 runs Windows Server 2012 R2.
You have a client application named App1 that communicates to Server1 by using dynamic
TCP ports.
On Server1, a technician runs the following command:
New-NetFirewallRule -DisplayNameAllowDynamic -Direction Outbound -LocalPort 1024-
65535 -Protocol TCP. Users report that they can no longer connect to Server1 by using
Appl.
You need to ensure that App1 can connect to Server1.
What should you run on Server1?
Answer: D
Explanation:
When using the using the Windows Firewall with Advanced Security console. You can select
the Inbound Rules node and scroll down in the list, you can see nine different Network
Discovery rules. The Direction Inbound rule is the rule that will allow App1 to connect to
Server1.
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 6: Create
and manage Group Policy, Objective 6.4: Configure Windows Firewall, p. 348
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network
Administration, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 269
Question: 282
Your network contains an Active Directory domain named contoso.com. The domain
contains a user account named User1 that resides in an organizational unit (OU) named
OU1.
A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to publish
several applications to a user named User1.
In the Users container, you create a new user named User2.
You need to ensure that the same applications are published to User2.
What should you do?
Answer: B
Explanation:
The GPO is linked to OU1. By moving User2 to OU1 the GPO will be applied to this user.
Question: 283
You have a domain controller named Server1 that runs Windows Server 2012 R2 and has
the DNS Server server role installed. Server1 hosts a DNS zone named contoso.com and a
GlobalNames zone.
You discover that the root hints were removed from Server1.
You need to view the default root hints of Server1.
Which file should you open?
A. Netlogon.dns
B. Cache.dns
C. Globalnames.dns
D. Place.dns
Answer: B
Explanation:
DNS Server service implements root hints using a file, Cache.dns, stored in the
systemroot\System32\Dns folder on the server. Thus viewing the Cache.dns file will show
the root hints.
Question: 284
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2008 R2. One of the domain controllers is named DC1.
The network contains a member server named Server1 that runs Windows Server 2012 R2.
You need to promote Server1 to a domain controller by using install from media (IFM).
What should you do first?
Explanation:
This is the only valid option. You could install ADDS role on Server 1 and run ADDS
configuration wizard and add DC to existing domain.
Question: 285
You have a server named Server1 that has the Print and Document Services server role
installed.
You need to provide users with the ability to manage print jobs on Server1 by using a web
browser.
What should you do?
A. Start the Printer Extensions and Notifications service and set the service to start
automatically.
B. Install the LPD Service role service.
C. Start the Computer Browser service and set the service to start automatically.
D. Install the Internet Printing role service.
Answer: D
Explanation:
Internet printing makes it possible for computers running Windows Server 2008 to use
printers located anywhere in the world by sending print jobs using Hypertext Transfer
Protocol (HTTP).
http://technet.microsoft.com/en-us/library/cc731368(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc731857.aspx
You have a file server named Server1 that runs Windows Server 2012 R2.
You need to ensure that a user named User1 can use Windows Server Backup to create a
complete backup of Server1.
What should you configure?
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/cc780182(v=ws.10).aspx
http://msdn.microsoft.com/en-us/library/bb897401.aspx
BeCertify provides premium packages in which you can have access to all of BeCertify
Exams in one price. Just pay once and get any exam of your choice whenever you need.
All the exams questions are available in most popular PDF format that are immediately
available for download after payment. Its the best deal you ever find so don't miss it.
BeCertify Features:
Free demo of all exams allowing you to try before buy.
BeCertify offers both printable PDF and a Self Test Software for practice. The
practice software is important if you have never taken a prometric or VUE exam
before.
Payment is accepted from world renowned secure servers PayPoint and
PayPal.
BeCertify offers a full refund if you fail your test after preparing all Q&A's.