70-410 Exam - Installing and Configuring Windows Server 2012

certleader.com

Q1. - (Topic 3) 

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

You have installed the DNS Server Role on an ABC.com server, named ABC-SR13. ABC.com’s workstations make use of a web proxy to access the Internet, and refer to ABC-SR13 as a primary DNS server. 

You have been instructed to make sure that Internet host names for ABC.com’s workstations are not resolved by ABC-SR13. 

Which of the following actions should you take? 

A. You should consider configuring a primary zone on ENSUREPASS-SR13. 

B. You should consider configuring a secondary zone on ENSUREPASS-SR13. 

C. You should consider configuring a reverse lookup zone on ENSUREPASS-SR13. 

D. You should consider configuring a forward lookup zone on ENSUREPASS-SR13. 

Answer:

Q2. - (Topic 3) 

You are attempting to delete a global security group in the Active Directory Users and Computers console, and the console will not let you complete the task. 

Which of the following could possibly be causes for the failure? (Choose all answers that are correct.) 

A. There are still members in the group. 

B. One of the group’s members has the group set as its primary group. 

C. You do not have the proper permissions for the container in which the group is located. 

D. You cannot delete global groups from the Active Directory Users and Computers console. 

Answer: B,C 

Explanation: 

A. Incorrect: It is possible to delete a group that has members. 

B. Correct: If any member sets the group as its primary group, then the system does not permit the group to be deleted. 

C. Correct: You must have the appropriate Active Directory permissions for the container in which the group is located to delete it. 

D. Incorrect: It is possible to delete groups using the Active Directory Users and Groups console. 

Q3. HOTSPOT - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. 

Several users are members of the local Administrators group. 

You need to ensure that all local administrators receive User Account Control (UAC) 

prompts when they run a Microsoft Management Console (MMC). 

Which settings should you modify from the Local Security Policy? To answer, select the 

appropriate settings in the answer area. 

Answer:  

Q4. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

You create a security template named Template1 by using the security template snap-in. 

You need to apply Template1 to Server2. 

Which tool should you use? 

A. Security Templates 

B. Computer Management 

C. Security Configuration and Analysis 

D. System Configuration 

Answer:

Explanation: 

A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer. 

A. Template was already created – Provide standard security option to use in security policies 

B. Needs to be applied at the GP level 

C. Security templates are inactive until imported into a Group Policy object or the SecurityConfiguration and Analysis 

D. Tool to ID windows problems 

Q5. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing printer pooling. 

Which of the following is TRUE with regards to printer pooling? (Choose all that apply.) 

A. Printers in a pool must be of the same model, and use the same printer driver. 

B. Each printer in the pool must have a different printer driver. 

C. Printer ports used in the pool must be of the same type. 

D. The types of printer ports used in the pool must be mixed. 

E. Pooled printers appear to workstations as a single printer. 

F. A minimum of three printers are required to configure a printer pool. 

Answer: A,E 

Explanation: 

You can create a printing pool to automatically distribute print jobs to the next available printer. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for their documents. A printing pool also simplifies administration because multiple printers can be managed from the same logical printer on a server. 

Q6. - (Topic 1) 

Your network contains a server named Server1 that runs Windows Server 2012 

R2.Server1 has the Hyper-V server role installed. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

Server1 is configured as shown in the following table. 

You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs on Server1 are under a heavy load. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. resource metering 

D. virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring 

K. Single-root I/O virtualization 

Answer:

Explanation: 

B. Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual machine. Resource control in used in the event where you need to adjust the computing resources of a virtual machine, you can reconfigure the resources to meet the changing needs. You can also specify resource controls to automate how resources are allocated to virtual machines. 

References: 

http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831410.aspx http://technet.microsoft.com/en-us/library/cc742470.aspx Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p.144 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 7: Hyper-V Virtualization, Lesson 2: Deploying and configuring virtual machines, p.335 

Q7. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. 

You have a Group Policy object (GPO) named GPO1 that contains several user settings. 

GPO1 is linked to an organizational unit (OU) named OU1. 

The help desk reports that GPO1 applies to only some of the users in OU1. 

You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.) 

You need to configure GPO1 to apply to all of the users in OU1. 

What should you do? 

A. Modify the Security settings of GPO1. 

B. Disable Block Inheritance on OU1. 

C. Modify the GPO status of GPO1. 

D. Enforce GPO1. 

Answer:

Explanation: 

Inheritance is blocked, but that would only affect policies applied ABOVE the given OU, not 

the one applied directly to it (as is the case with GPO1). Also Enforcing a policy is only going to cause it to be applied even when inheritance is blocked (which, as mentioned, does not make a difference on policies which are directly linked to the OU as a child). That means that there must be something in the security settings (such as a Security Group which does not have the “read” or “Apply group policy” permission) preventing ALL of the users in OU1 from having the policy applied. (GPO status is the status of its replication within the forest, so it is not relevant here.) 

Q8. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

You have a virtual machine named VM1. VM1 has a checkpoint. 

You need to modify the Checkpoint File Location of VM1. 

What should you do first? 

A. Copy the checkpoint file. 

B. Delete the checkpoint. 

C. Shut down VM1. 

D. Pause VM1. 

Answer:

Q9. DRAG DROP - (Topic 1) 

You are configuring a multi-subnet IPv6 network for a regional office. 

The corporate network administrator allocates the 2001:0db8:1234:0800: :/54 address space for your use. 

You need to identify network IDs of the first and last subnets that you will be able to create at the office. 

Which network IDs should you identify? 

To answer, drag the appropriate network IDs to the correct subnets. Each network ID may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q10. - (Topic 2) 

You have a server that runs Windows Server 2012 R2. 

You need to create a volume that will remain online if two disks in the volume fail. 

The solution must minimize the number of disks used to create the volume. 

Which three actions should you perform in sequence? 

A. Add five physical disks 

B. Create a storage space and set the disk allocation of one of the disks to "Hot Spare" 

C. Create a virtual disk 

D. Create a storage space by using the default disk allocation 

E. Add three physical disks 

Answer: A,C,D 

Explanation: 

A storage space with three-way mirroring can tolerate two disk failures but requires a minimum of five disks. 

References: 

http://technet.microsoft.com/en-us/library/hh831739.aspx http://technet.microsoft.com/en-us/library/jj822938.aspx http://technet.microsoft.com/en-us/library/jj899886.aspx http://technet.microsoft.com/en-us/library/5de72fb5-e1e3-43a7-a176-d17cdf4d312e