Your success in Microsoft 70-410 is our sole target and we develop all our 70-410 braindumps in a way that facilitates the attainment of this target. Not only is our 70-410 study material the best you can find, it is also the most detailed and the most updated. 70-410 Practice Exams for Microsoft {category} 70-410 are written to the highest standards of technical accuracy.
NEW QUESTION 1
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. You need to log the amount of system resources used by each virtual machine. What should you do?
- A. From Windows PowerShell, run the Enable-VMResourceMetering cmdlet.
- B. From Windows System Resource Manager, enable Accounting.
- C. From Windows System Resource Manager, add a resource allocation policy.
- D. From Windows PowerShell, run the Measure-VM cmdlet.
Answer: A
Explanation:
Enable-VMResourceMetering – The Enable-VMResourceMeteringcmdlet starts collecting resourceutilization data for a virtual machine or resource pool.
Measure-VM – The Measure-VM cmdlet reports data on processor usage, memory usage, network traffic, and disk capacity for one or more virtual machines.
NEW QUESTION 2
Your network contains an Active Directory domain named contoso.com. All user accounts in the sales department reside in an organizational unit (OU) named OU1.
You have a Group Policy object (GPO) named GPO1. GPO1 is used to deploy a logon script to all of the users in the sales department.
You discover that the logon script does not run when the sales users log on to their computers. You open Group Policy Management as shown in the exhibit.
You need to ensure that the logon script in GPO1 is applied to the sales users. What should you do?
- A. Enforce GPO1.
- B. Modify the link order of GPO1.
- C. Modify the Delegation settings of GPO1.
- D. Enable the link of GPO1.
Answer: D
NEW QUESTION 3
Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and child.contoso.com. The forest contains two domain controllers. The domain controllers are configured as shown in the following table.
You need to ensure that DC2 can provide authoritative responses for queries to the contoso.com namespace.
What should you do?
- A. On DC1, create a delegation.
- B. On DC1, change the replication scope of the contoso.com zone.
- C. On DC2, create a forwarder.
- D. On DC2, modify the Zone Transfers settings.
Answer: B
Explanation:
For DC1 to be able to provide authoritative responses to DNS queries the replication scope should be changed accordingly so that it has the zone data for the contoso.com domain.
NEW QUESTION 4
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are part of a workgroup.
On Server1 and Server2, you create a local user account named Admin1.You add the account to the local Administrators group. On both servers, Admin1 has the same password.
You log on to Server1 as Admin1. You open Computer Management and you.connect to Server2.
When you attempt to create a scheduled task, view the event logs, and manage the shared folders, you receive Access Denied messages.
You need to ensure that you can administer Server2 remotely from Server1 by using Computer Management.
What should you configure on Server2?
- A. From Server Manager, modify the Remote Management setting.
- B. From Local Users and Groups, modify the membership of the Remote Management Users group.
- C. From Windows Firewall, modify the Windows Management Instrumentation (WMI) firewall rule.
- D. From Registry Editor, configure the LocalAccountTokenFilterPolicy registry value.
Answer: D
Explanation:
The LocalAccountTokenFilterPolicy setting affects how administrator credentials are applied to remotely administer the computer.
Reference: http://support.microsoft.com/kb/942817
NEW QUESTION 5
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled.
You install the DHCP server role on a virtual machine named Server1. You authorize
Server1 as a DHCP server in contoso.com. You create an IP scope.
You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1.
You need to ensure that the virtual machines can use Server1 as a DHCP server. What should you do?
- A. Enable MAC address spoofing on Server1.
- B. Enable single-root I/O visualization (SR-IOV) on Server1.
- C. Disable the DHCP guard on Server1.
- D. Disable the DHCP guard on all of the virtual machines that are DHCP clients.
Answer: C
Explanation:
DHCP guard setting
This setting stops the virtual machine from making DHCP offers over this network interface. To be clear – this does not affect the ability to receive a DHCP offer (i.e. if you need to use DHCP to acquire an IP address that will work) it only blocks the ability for the virtual machine to act as a DHCP server.
NEW QUESTION 6
Your network contains multiple subnets.
On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2.
You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com.
You need to ensure that client computers can resolve IP addresses to host names. What should you do first?
- A. Create a GlobalNames zone.
- B. Convert the contoso.com zone to an Active Directory-integrated zone.
- C. Configure dynamic updates for contoso.com.
- D. Create a reverse lookup zone.
Answer: D
Explanation:
Use a reverse lookup zone to be able to resolve IP addresses to host names.
NEW QUESTION 7
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All servers run Windows Server 2012 R2. The domain contains two domain controllers named DC1 and DC2. Both domain controllers are virtual machines on a Hyper-V host.
You plan to create a cloned domain controller named DC3 from an image of DC1. You need to ensure that you can clone DC1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
- A. Add the computer account of DC1 to the Cloneable Domain Controllers group.
- B. Create a DCCloneConfig.xml file on DC1.
- C. Add the computer account of DC3 to the Cloneable Domain Controllers group.
- D. Run the Enable-AdOptionalFeaturecmdlet.
- E. Modify the contents of the DefaultDCCIoneAllowList.xml file on DC1.
Answer: AB
Explanation:
A. Cloneable Domain Controllers Group There’s a new group in town. It’s called Cloneable Domain Controllers and you can find it in the Users container. Membership in this group
dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn’t be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete. Cloned DCs will also end up in the Cloneable Domain Controllers group.
B. DCCloneConfig.xml
There’s one key difference between a cloned DC and a DC that is being restored to a previous snapshot:
DCCloneConfig.XML.
DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways.
The New-ADDCCloneConfigcmdlet in PowerShell By hand with an XML editor
By editing an existing config file, again with an XML editor.
Reference: Virtual Domain Controller Cloning in Windows Server 2012.
NEW QUESTION 8
HOTSPOT
You have three servers named Server1, Server2, and DC1 that run Windows Server 2012 R2. IPv6 addresses and configurations are assigned to all of the servers by using DHCPv6.
The IPv6 routing on Server1 is shown in the following table.
You verify that Server2 can ping the IPv6 address of DC1.
You need to ensure that Server1 can ping the IPv6 address of DC1.
What command should you run on Server1? (To answer, select the appropriate options in the answer area.)
- A. Mastered
- B. Not Mastered
Answer: A
Explanation:
Before a routing table is used, the destination cache is checked for an entry matching the destination address in the packet being forwarded. If the destination cache does not contain an entry for the destination address, the routing table is used to determine:
The next-hop address - For a direct delivery (in which the destination is on a local link), the next-hop address is the destination address in the packet. For an indirect delivery (in which the destination is not on a local link), the next-hop address is the address of a router.
The next-hop interface - The interface identifies the physical or logical interface that is used to forward the packet either to its destination or to the next router.
NEW QUESTION 9
Your network contains one Active Directory forest named contoso.com. The forest contains two child domains named east.contoso.com and west.contoso.com.
Your user account is a member of the Domain Admins group in all of the domains. The
account is not a member of any other groups.
The contoso.com domain contains a Group Policy object (GPO) named DesktopGPO. DesktopGPO is applied to the following containers.
✑ An organizational unit (OU) named ALLUsers in contoso.com
✑ An OU named Marketing in east.contoso.com
✑ The east.contoso.com domain
✑ The contoso.com domain
✑ A site named Corporate
You delete DesktopGPO.
You need to identify which Group Policy links must be removed manually.
Which three GPO links should you identify? Each correct answer presents part of the solution.
- A. a site named Corporate
- B. the AllUsers OU in contoso.com
- C. the contoso.com domain
- D. the east.contoso.com domain
- E. the Marketing OU in east.contoso.com
Answer: ADE
Explanation:
When you delete a GPO, Group Policy Management attempts to delete all links to that GPO in the domain of the GPO. However, to delete a link to a GPO, you must have permission to link Group Policy objects for the organizational unit or domain. If you do not have rights to delete a link, the GPO will be deleted, but the link will remain. Links from other domains and sites are not deleted. The link to a deleted GPO appears in Group Policy Management as Not Found.
Reference: Create or delete a Group Policy object https://technet.microsoft.com/en-us/library/cc776678(v=ws.10).aspx
NEW QUESTION 10
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Group Policy Management feature installed. Server2 has the Print and Document Services server role installed.
On Server2, you open Print Management and you deploy a printer named Printer1 by using a Group Policy object (GPO) named GPO1.When you open GPO1 on Server1, you discover that the Deployed Printers node does not appear.
You need to view the Deployed Printers node in GPO1. What should you do?
- A. On Server1, modify the Group Policy filtering options of GPO1.
- B. On a domain controller, create a Group Policy central store.
- C. On Server2, install the Group Policy Management feature.
- D. On Server1, configure the security filtering of GPO1.
Answer: C
Explanation:
Pre-Requisites
To use Group Policy for printer deployment you will need to have a Windows Active Directory domain, and this article assumes that your Domain Controller is a Windows 2008 R2 Server. You will also need the Print Services role installed on a server (can be on your DC), and you will be using the Print Management and Group Policy Management consoles to configure the various settings. It’s assumed that you have already followed Part One and have one or more printers shared on your server with the necessary drivers, ready to deploy to your client computers.
NEW QUESTION 11
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed.
Contoso.com has its headquarters in London, and several widespread satellite offices. When Contoso.com releases a new written policy stating that the graphical user interface (GUI) should not be installed on any servers deployed to Contoso.com’s satellite offices.
It is reported that a server in one of the satellite offices are not compliant with the new written policy.
You are required to remedy the situation, while using the least amount of user interaction. Which of the following actions should you take?
- A. You should consider uninstalling the User Interfaces and Infrastructure feature using a PowerShell cmdlet.
- B. You should consider uninstalling the User Interfaces and Infrastructure feature via TS Manager.
- C. You should consider uninstalling the User Interfaces and Infrastructure feature via Server Manager.
- D. You should consider uninstalling the User Interfaces and Infrastructure feature using the Dsrm.exe command from the command prompt.
Answer: C
Explanation:
Although you could utilize a PowerShell cmdlet, it would require you to either log on to the remote machine to enable PowerShell remoting first (or to use the local PowerShell console). Using Server Manager, you could just add the server (if it wasn't already added) and use the "Remove Roles and Features" applet.
NEW QUESTION 12
DRAG DROP
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. All client computers run Windows 8.
The domain contains a security group named Group1.
You have a Group Policy object (GPO) named GPO1.GPO1 is linked to the domain.
You need to ensure that only the members of Group1 can run the applications shown in the
following table.
Which type of application control policy should you implement for each application?
To answer, drag the appropriate rule types to the correct applications. Each rule type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
- A. Mastered
- B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 13
You have a server named Server1 that has the Print and Document Services server role installed.
You need to provide users with the ability to manage print jobs on Server1 by using a web browser.
What should you do?
- A. Start the Printer Extensions and Notifications service and set the service to start automatically.
- B. Install the LPD Service role service.
- C. Start the Computer Browser service and set the service to start automatically.
- D. Install the Internet Printing role service.
Answer: D
Explanation:
References:
Internet printing makes it possible for computers running Windows Server 2008 to use printers located anywhere in the world by sending print jobs using Hypertext Transfer Protocol (HTTP).
http://technet.microsoft.com/en-us/library/cc731368(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc731857.aspx
NEW QUESTION 14
In a domain running at the Windows Server 2012 R2 domain functional level, which of the following security principals can be members of a global group? (Choose all answers that are correct.)
- A. Users
- B. Computers
- C. Universal groups
- D. Global groups
Answer: ABD
Explanation:
A. Correct: Users can be security principals in a global group.
B. Correct: Computers can be security principals in a global group.
C. Incorrect: Universal groups cannot be security principals in a global group.
D. Correct: Global group can be security principals in a global group.
NEW QUESTION 15
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Server1 runs Windows Server 2012 R2. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server server role installed.
You need to manage DHCP on Server2 by using the DHCP console on Server1. What should you do first?
- A. From Windows PowerShell on Server2, run Enable-PSRemoting cmdlet.
- B. From Windows PowerShell on Server1, run Install-Windows Feature.
- C. From Windows Firewall with Advanced Security on Server2, create an inbound rule.
- D. From Internet Explorer on Server2, download and install Windows Management Framework 3.0.
Answer: B
Explanation:
When the DHCP role is installed, it appears that the firewall rules are automatically added, so C is not valid (not only that, but either way it is an existing rule that one would need only enable nonetheless, not create a new rule). This means you only need to add the DHCP Manager MMC snap-in which is a Role Administration Tool feature.
So the correct answer must be B.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6 Network Administration, p.228
NEW QUESTION 16
Your network contains an Active Directory forest that contains two domains. The forest contains five domain controllers. The domain controllers are configured as shown in the following table.
You need to configure DC5 as a global catalog server. Which tool should you use?
- A. Active Directory Domains and Trusts
- B. Active Directory Users and Computers
- C. Active Directory Administrative Center
- D. Active Directory Sites and Services
Answer: D
Explanation:
If you have more than one domain in your forest and you have a significant user population in a site, you can optimize the speed and efficiency of domain logons and directory searches by adding a global catalog server to the site. If you have a single-domain forest, global catalog servers are not required for logons, but directory searches are directed to the global catalog. In this case, you can enable the global catalog on all domain controllers for faster directory searches. You can use the same user interface (UI) in the Active Directory Sites and Services snap-in to add or remove the global catalog. Enabling the global catalog can cause additional replication traffic. However, global catalog removal occurs gradually in the background and does not affect replication or performance. Membership in the Enterprise Admins group in the forest or the Domain Admins group in the forest root domain, or equivalent, is the minimum required to complete this procedure. To add or remove the global catalog Open Active Directory Sites and Services.
To open Active Directory Sites and Services, click Start, click Administrative Tools, and then click Active Directory Sites and Services.
To open Active Directory Sites and Services in Windows Server 2012, click Start , type dssite.msc. In the console tree, click the server object to which you want to add the global catalog or from which you want to remove the global catalog.
Where?
Active Directory Sites and ServicesSitesSiteNameServers In the details pane, right-click NTDS Settings of the selected server object, and then click Properties. Select the Global Catalog check box to add the global catalog, or clear the check box to remove the global catalog.
Global catalog servers and sites.
To optimize network performance in a multiple-site environment, consider adding global catalog servers in sites according to the needs in the sites for fast search responses and domain logons. It is recommended to make all domain controllers be global catalog severs if possible. In a single-site, multiple-domain environment, a single global catalog server is usually sufficient to cover common Active Directory queries and logons.
NEW QUESTION 17
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing the Virtual Fibre Channel SAN feature.
Which of the following is TRUE with regards to the Virtual Fibre Channel SAN feature? (Choose all that apply.)
- A. It prevents virtual machines from connecting directly to Fibre Channel storage.
- B. It allows for virtual machines to connect to Fibre Channel storage directly.
- C. It includes support for virtual SANs, live migration, and multipath I/O.
- D. It includes support for virtual SANs, and live migration, but not multipath I/O.
Answer: BC
Explanation:
To gain the full benefits of server virtualization and cloud architectures, virtualized workloads need to connect easily and reliably to existing SANs. For many enterprise organizations, Hyper-V deployments were limited in scale and scope because they lacked the ability to directly connect VMs to Fibre Channel SAN storage from inside a VM. Hyper- V in Windows Server 2012 R2 now provides virtual Fibre Channel Host Bus Adapter (HBA) ports within the guest operating system that runs the virtual machine, connecting virtual machines directly to FibreChannel SAN Logical Unit Numbers (LUNs).
Virtual Fibre Channel for Hyper-V provides several important advantages for Hyper-V environments:
Simplifies storage connectivity for virtualized workloads to ultra-reliable, high-performance Fibre Channel SAN storage.
Enables new solutions that require shared storage, such as failover clustering, live migration, andmultipath I/O.
Leverages and protects existing investments in Fibre Channel storage? Enables advanced FC SAN storage functionality for VMs.
Facilitates migration of FC workloads into the cloud.
Enables improved monitoring and troubleshooting, with visibility from the VM to the FC SAN storage.
Enables centralized management of Ethernet and FC-based virtualized workloads. Combining Virtual Fibre Channel for Hyper-V and the Brocade Fibre Channel SAN infrastructure greatly simplifies connectivity between Fibre Channel SAN storage and virtualized applications, enabling enterprise IT and hosting providers to achieve new levels of availability, reliability, and scalability for cloud-based services.
You need your virtualized workloads to connect easily and reliably to your existing storage arrays. Windows Server 2012 R2 provides Fibre Channel ports within the guest operating system, which allows you to connect to Fibre Channel directly from within virtual machines. This feature protects your investments in Fibre Channel, enables you to virtualize workloads that use direct access to Fibre Channel storage, allows you to cluster guest operating systems over Fibre Channel, and provides an important new storage option for servers hosted in your virtualization infrastructure.
With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre Channel storage from within a virtual machine. This allows you to use your existing Fibre Channel investments to support virtualized workloads.
Support for Fibre Channel in Hyper-V guests also includes support for many related features, such as virtual SANs, live migration, and MPIO.
NEW QUESTION 18
HOTSPOT
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server2 has the Windows Deployment Services server role installed.
On Server1, you have a virtual machine named VM1.
You plan to deploy an image to VM1 by using Windows Deployment Services (WDS). You need to ensure that VM1 can connect to Server1 by using PXE.
Which settings should you configure on VM1? To answer, select the appropriate settings in the answer area.
- A. Mastered
- B. Not Mastered
Answer: A
Explanation:
Virtual machines can be deployed to Hyper-V using Windows Deployment Services (WDS). To accomplish this requires the proper WDS infrastructure be in place and that the VM PXE boot using a Legacy Network Adapter.
By default, there is only a “Standard Network Adapter” installed on the Virtual Machine, but for PXE functionality you will need to add a “Legacy Network Adapter”.
Go to the “Legacy Network Adapter” that you just added and specify that it should use the Virtual Switch that you just created.
Last but not least, you should change the BIOS boot priority to make sure that the Virtual Machine always tries to boot first using the “Legacy Network Adapter”. Just select the “Legacy Network Adapter” and move it to the top using the buttons.
Start your Virtual Machine and now PXE boot should work.
The Pre-Boot Execution Environment (PXE) provider for Windows Deployment Services provides client boot services over the network. It registers itself with the WDS Server service (the main server-side service of the Windows Deployment Services solution) and
requests a remote procedure call (RPC) endpoint.
After the Windows Deployment Services server role is installed, you must configure the server by using either the Windows Deployment Services MMC snap-in or the /Initialize- Server command-line option. The PXE provider must be configured properly before it can provide client boot services over the network.
References:
http://technet.microsoft.com/en-us/library/cc726550%28v=WS.10%29.aspx
NEW QUESTION 19
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 has the virtual switches listed in the following table.
You create a virtual machine named VM1.VM1 has two network adapters. One network adapter connects to vSwitch1. The other network adapter connects to vSwitch2.You configure NIC teaming on VM1.
You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the network.
What should you do on Server1?
- A. Run the Set-VmNetworkAdaptercmdlet.
- B. Add a new network adapter to VM1.
- C. Create a new virtual switch on Server 1.
- D. Modify the properties of vSwitch1 and vSwitch2.
- E. Run the Set-VmNetworkAdapterAdapterFailoverConfiguration cmdlet.
Answer: A
NEW QUESTION 20
Your network contains an Active Directory forest named contoso.com. The forest contains a child domain named corp.contoso.com.
The network has Microsoft Exchange Server 2010 deployed. You need to create a mail-enabled distribution group.
Which type of group should you create?
- A. Global
- B. Local
- C. Domain local
- D. Universal
Answer: D
Explanation:
Universal groups Groups that are used to grant permissions on a wide scale throughout a domain tree or forest. Members of global groups include accounts and groups from any domain in the domain tree or forest.
Microsoft Exchange Server 2007: Implementation and Administration. By Jim McBee,
Benjamin Craig page 248: Only universal groups should be used as mail-enabled groups.
NEW QUESTION 21
A company’s server deployment team needs to introduce many new Windows Server 2012 R2 domain controllers throughout the network into a single Windows Server 2008 R2 domain. The team has chosen to use Windows PowerShell.
Which Windows PowerShell module includes the command-line options for installing domain controllers?
- A. AD DS Administration cmdlets
- B. AD DS Deployment cmdlets
- C. AD CS Deployment cmdlets
- D. AD CS Administration cmdlets
Answer: B
Explanation:
First use the Import-Module ADDSDeployment command in PowerShell–it includes the cmdlets needed to add new domain controllers. Then run Install-ADDSDomainController along with the required arguments.
Quick Tip: DCPromo.exe has been deprecated but can still be used along with an answer
file, and ADPrep.exe runs automatically when needed (but can be run with elevated rights for more control).
NEW QUESTION 22
Your company has a main office and four branch offices. The main office contains a server named Server1 that runs Windows Server 2012 R2.
The IP configuration of each office is configured as shown in the following table.
You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all of the subnets.
Which command should you run?
- A. route.exe add -p 10.10.0.0 mask 255.255.252.0 10.10.0.1
- B. route.exe add -p 172.16.16.0 mask 255.255.252.0 10.10.0.1
- C. route.exe add -p 10.10.0.0 mask 255.255.252.0 172.16.0.0
- D. route.exe add -p 172.16.18.0 mask 255.255.252.0 10.10.0.1
Answer: B
Explanation:
These parameters will allow communication with all the hosts.
References:
Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6 addressing, p.192, 196
NEW QUESTION 23
Your network contains an Active Directory domain named contoso.com. The domain contains an application server named Server1. Server1 runs Windows Server 2012 R2. You have a client application named App1 that communicates to Server1 by using dynamic TCP ports.
On Server1, a technician runs the following command: New-NetFirewallRule -DisplayName AllowDynamic - Direction Outbound -LocalPort 1024- 65535 -Protocol TCP.
Users report that they can no longer connect to Server1 by using App1. You need to ensure that App1 can connect to Server1.
What should you run on Server1?
- A. Set-NetFirewallRule -DisplayName AllowDynamic -Action Allow
- B. netsh advfirewall firewall set rule name=allowdynamic new action = allow
- C. Set-NetFirewallRule -DisplayName AllowDynamic -Direction Inbound
- D. netsh advfirewall firewall add rule name=allowdynamic action=allow
Answer: C
NEW QUESTION 24
HOTSPOT
You have a server named Server1 that runs Windows Server 2012 R2. Server1 does not have Internet connectivity.
All roles are removed completely from Server1.
You mount a Windows Server 2012 R2 installation image to the C:Source folder. You need to install the DNS Server server role on Server1.
Which folder should you use as the source? To answer, select the appropriate folder in the answer area.
- A. Mastered
- B. Not Mastered
Answer: A
Explanation:
WinSxS, the side-by-side component store enables administrators to activate any of the features included with Windows Server 2012 R2 without having to supply an installation medium.
References:
http://blogs.technet.com/b/askpfeplat/archive/2013/02/24/how-to-reduce-the-size-of-the- winsxs-directory-andfree-up-disk-space-on-windows-server-2012-using-features-on- demand.aspx
Exam Ref 70-410: Installing and configuring Windows Server 2012 R2, Chapter 1: Installing and configuring servers, Objective 1.1: Install servers, p. 10.
NEW QUESTION 25
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
From Server2, you attempt to connect to Server1 by using Computer Management and you receive the following error message: "Computer Server1 cannot be found. The network path was not found."
From Server1, you successfully connect to Server2 by using Server Manager. You need to ensure that you can manage Server1 remotely from Server2 by using
Computer Management.
What should you configure? To answer, select the appropriate option in the answer area.
- A. Mastered
- B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 26
......
Thanks for reading the newest 70-410 exam dumps! We recommend you to try the PREMIUM Certstest 70-410 dumps in VCE and PDF here: https://www.certstest.com/dumps/70-410/ (505 Q&As Dumps)