P.S. Practical 70-410 questions are available on Google Drive, GET MORE: https://drive.google.com/open?id=1gKqa_vO9OeNyYEjdDpkvCkiJIJhS7seE
Question No: 6
You work as an administrator at Contoso.com. The Contoso.com network consists of an Active Directory forest that contains a root domain, named Contoso.com, and two child domains, named us.Contoso.com and uk.Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.
The root domain hosts a domain local distribution group, named ENSUREPASSGroup. You are preparing to issue ENSUREPASSGroup read-only access to a shared folder hosted by the us.Contoso.com domain.
You want to make sure that ENSUREPASSGroup is able to access the shared folder in the us.Contoso.com domain.
Which of the following actions should you take?
A. You should consider re-configuring ENSUREPASSGroup as a universal Admins group.
B. You should consider re-configuring ENSUREPASSGroup as a universal security group.
C. You should consider re-configuring ENSUREPASSGroup as a global administrators group.
D. You should consider re-configuring ENSUREPASSGroup as a local administrators group.
Answer: B
Question No: 7
You have a server named Server1 that runs Windows Server 2012 R2. You configure IPSec rules for connections to Server1.
On Server1, you plan to create an inbound firewall rule that contains the following settings:
u2711 Allows inbound connections to an application named App1.exe
u2711 Applies to the domain profile
u2711 Overrides any block rules
You need to identify the minimum information required to create the rule.
Which two pieces of information should you identify? Each correct answer presents part of the solution.
A. the list of computers that are authorized to use the application
B. the list of Active Directory users who are authorized to use the application
C. the hash of the application
D. the name of the IPSec policies that apply to Server1
E. the local path of the application
Answer: A,E
Explanation:
:E: To add a program to the rules list, you must specify the full path to the executable (.exe) file used by the program.
Reference: Add or Edit Firewall Rule https://technet.microsoft.com/en-us/library/cc753558.aspx
Question No: 8
You have a server named Server1 that runs Windows Server 2012 R2.
You apply a security policy to server1 by using the Security Configuration Wizard (CWM).
You plan to roll back the security policy.
You need to identify the settings that are prevented from rolling back running the CWM Witch settings should you identify.
A. The secure startup order
B. The outbound authentication methods
C. The network security rules
D. The system access control list
Answer: D
Question No: 9
You are attempting to delete a global security group in the Active Directory Users and Computers console, and the console will not let you complete the task.
Which of the following could possibly be causes for the failure? (Choose all answers that are correct.)
A. There are still members in the group.
B. One of the groupu2021s members has the group set as its primary group.
C. You do not have the proper permissions for the container in which the group is located.
D. You cannot delete global groups from the Active Directory Users and Computers console.
Answer: B,C
Explanation:
:A. Incorrect: It is possible to delete a group that has members.
:B. Correct: If any member sets the group as its primary group, then the system does not permit the group to be deleted.
:C. Correct: You must have the appropriate Active Directory permissions for the container in which the group is located to delete it.
:D. Incorrect: It is possible to delete groups using the Active Directory Users and Groups console.
Question No: 10
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed.
Contoso.com has its headquarters in London, and several widespread satellite offices. When Contoso.com releases a new written policy stating that the graphical user interface (GUI) should not be installed on any servers deployed to Contoso.comu2021s satellite offices.
It is reported that a server in one of the satellite offices are not compliant with the new written policy.
You are required to remedy the situation, while using the least amount of user interaction. Which of the following actions should you take?
A. You should consider uninstalling the User Interfaces and Infrastructure feature using a PowerShell cmdlet.
B. You should consider uninstalling the User Interfaces and Infrastructure feature via TS Manager.
C. You should consider uninstalling the User Interfaces and Infrastructure feature via Server Manager.
D. You should consider uninstalling the User Interfaces and Infrastructure feature using the Dsrm.exe command from the command prompt.
Answer: C
Explanation:
Although you could utilize a PowerShell cmdlet, it would require you to either log on to the remote machine to enable PowerShell remoting first (or to use the local PowerShell console). Using Server Manager, you could just add the server (if it wasn't already added) and use the "Remove Roles and Features" applet.
Question No: 11
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain have Windows Server 2012 R2 installed, while domain controllers have Windows Server 2008 R2 installed.
You are then tasked with deploying a new Windows Server 2012 R2 domain controller. You are preparing to install the DNS Server role, and enable the global catalog server option.
Which of the following actions should you take?
A. You should consider making use of Server Manager.
B. You should consider making use of the Active Directory Installation Wizard.
C. You should consider making use of the DHCP Installation Wizard
D. You should consider making use of TS Manager
Answer: A
Question No: 12
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.
You plan to replace a domain controller named DC1. DC1 has the schema operations master role.
You need to transfer the schema master role to another domain controller named DC10 before you remove Active Directory from DC1.
Which tool should you use?
A. the ntdsutil command
B. the Set-ADDomain cmdlet
C. the Install-ADDSDomain cmdlet
D. the dsadd command
E. the dsamain command
F. the dsmgmt command
G. the net user command
H. the Set-ADForest cmdlet
Answer: A
Explanation:
To transfer the schema master role using the command line:
u2711 Open Command Prompt.
u2711 Type:
ntdsutil
u2711 At the ntdsutil command prompt, type:
roles
u2711 At the fsmo maintenance command prompt, type:
connection
u2711 At the server connections command prompt, type:
connect to serverDomainController
u2711 At the server connections command prompt, type:
quit
u2711 At the fsmo maintenance command prompt, type:
transfer schema master
Reference: Transfer the schema master role
Question No: 13
You have Windows Server 2012 R2 DHCP servers with 50 leases.
You want to convert leases into reservations using PowerShell command. What do you need to have to accomplish this?
A. Computer names
B. Computer GUIDs
C. Computer MAC Addresses
D. Hardware information
Answer: C
Question No: 14
A companyu2021s server deployment team needs to introduce many new Windows Server 2012 R2 domain controllers throughout the network into a single Windows Server 2008 R2 domain. The team has chosen to use Windows PowerShell.
Which Windows PowerShell module includes the command-line options for installing domain controllers?
A. AD DS Administration cmdlets
B. AD DS Deployment cmdlets
C. AD CS Deployment cmdlets
D. AD CS Administration cmdlets
Answer: B
Explanation:
First use the Import-Module ADDSDeployment command in PowerShellu2013it includes the cmdlets needed to add new domain controllers. Then run Install-ADDSDomainController along with the required arguments.
Quick Tip: DCPromo.exe has been deprecated but can still be used along with an answer file, and ADPrep.exe runs automatically when needed (but can be run with elevated rights for more control).
P.S. Easily pass 70-410 Exam with Certifytools Practical Dumps & pdf vce, Try Free: https://www.certifytools.com/70-410-exam.html (505 New Questions)