100% Valid Dumps For 70-410 Exam Pass: PassLeader have been updated the 70-410 445q exam dumps and added the new exam questions, in the latest version of 70-410 445q PDF braindump or VCE practice test, you will get all the new changed 70-410 exam questions, which will help you 100% passing 70-410 exam, and you will get the free version of VCE Player together with your 70-410 445q VCE briandump. Welcome to visit our website — passleader.com and get your 70-410 exam passed.
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.
You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS). You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE. Which virtual machine setting should you configure for VM2?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.
In the perimeter network, you install a new server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. You need to join Server1 to the contoso.com domain. What should you use?
A. The New-ADComputer cmdlet
B. The djoin.exe command
C. The dsadd.exe command
D. The Add-Computer cmdlet
A. Creates a new Active Directory computer.
B. Use djoin for offline join in the perimeter network.
C. Adds specific types of objects to the directory.
D. Add the local computer to a domain or workgroup.
Your network contains an Active Directory domain named adatum.com. The domain contains three domain DC3 loses network connectivity due to a hardware failure. You plan to remove DC3 from the domain. You log on to DC3. You need to identify which service location (SRV) records are registered by DC3. What should you do?
A. Open the %windir%\system32\config\netlogon.dns file.
B. Run dcdiag /test:dns
C. Open the %windir%\system32\dns\backup\adatum.com.dns file.
D. Run ipconfig /displaydns.
Your network contains an Active Directory forest that contains three domains. A group named Group1 is configured as a domain local distribution group in the forest root domain. You plan to grant Group1 read-only access to a shared folder named Share1. Share1 is located in a child domain. You need to ensure that the members of Group1 can access Share1. What should you do first?
A. Convert Group1 to a global distribution group.
B. Convert Group1 to a universal security group.
C. Convert Group1 to a universal distribution group.
D. Convert Group1 to a domain local security group
A. Distribution Groups only used for email.
B. Universal can be used for any domain or forest.
C. Distribution Groups only used for email.
D. Permissions can be assigned only within the same domain as the parent domain local group Group scope Universal can be assigned permissions in any domain or forest.
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. One of the domain controllers is named DCI. The network contains a member server named Server1 that runs Windows Server 2012 R2. You need to promote Server1 to a domain controller by using install from media (IFM). What should you do first?
A. Create a system state backup of DC1.
B. Create IFM media on DC1.
C. Upgrade DC1 to Windows Server 2012 R2.
D. Run the Active Directory Domain Services Configuration Wizard on Server1.
E. Run the Active Directory Domain Services Installation Wizard on DC1.
A. Backs up system state data to be restored.
C. Only valid option. You could install ADDS role on Server 1 and run ADDS configuration wizard andadd DC to existing domain.
D. Need to add ADDS role first.
E. Wrong server.
Installation from media does not work across different operating system versions. In other words, you must use a Windows Server 2012 R2 domain controller to generate installation media to usefor another Windows Server 2012 R2 domain controller installation. We can use the Install from media (IFM) option to install an Additional Domain Controller in an existing domainis the best option such as a branch office scenario where network is slow, unreliable and costly. IFM will minimize replication traffic during the installation because it uses restored backup files to populate theAD DS database. This will significantly reduce the amount of traffic copied over the WAN link.
Things to remember: If you are deploying your first Domain Controller in the domain, you cannot use IFM. The OS will need to match the IFM media. (If you create a 2008 R2 IFM, promote a 2008 R2 DC) If you are creating a DC that will be a Global Catalog Server, create your IFM on a Global Catalog Server. If you are creating a DC that will be a DNS Server, create your IFM on a DNS Server. If you want to copy the SYSVOL, the DC on which you generate the installation media and the new DC mustbe at least running Windows Server 2008 with Service Pack 2 or Windows Server 2008 R2. Membership of the Domain Admins group is the minimum required to complete IFM.
Media used by the IFM option is created with Windows Server Backup or Ntdsutil.exe from another existingWindows Server 2012 R2 computer only You cannot use a Windows Server 2008 R2 or previous operating system to create media for a Windows Server 2012 R2 domain controller.
Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers. The servers are contained in a organizational unit (OU) named ServersOU. You need to create a group named Group1 on all of the servers in the domain. You must ensure that Group1 is added only to the servers. What should you configure?
A. a Local Users and Groups preferences setting in a Group Policy linked to the Domain Controllers OU
B. a Restricted Groups setting in a Group Policy linked to the domain
C. a Local Users and Groups preferences setting in a Group Policy linked to ServersOU
D. a Restricted Groups setting in a Group Policy linked to ServersOU
A. This would add the group to the wrong OU.
B. This would affect the whole domain and would effect member of the group.
C. allows you to centrally manage local users and groups on domain member computers and is this isthe correct OU for the GPO change.
D. Restricted Groups defines what member or groups should exist as part of a group Why use Group Policy preferences.
Unlike Group Policy settings, which Apply to both local computer policy and Active Directory policy, GroupPolicy preferences only Apply to Active Directory policy. You use preferences to configure many areas of theOS, including:
— System devices, such as USB ports, floppy drives and removable media Network shares and mapping network shares to drive letters System and user environment variables
— User and group accounts for the local computer
— VPN and dial-up networking connections
— Printer configuration and mapping
— Registry settings, schedule tasks and system services
— Settings for Folder Options, Internet Options and Regional and Language Options Settings for power schemes and power management
— Start Menu properties and menu items
Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts. Servers are restarted only occasionally. You need to identify which servers were restarted during the last two days. What should you do?
A. Run dsquery computerand specify the -staiepwdpara meter.
B. Run Get-ADComputerand specify the SearchScope parameter.
C. Run Get-ADComputerand specify the IastLogonproperty.
D. Run dsquery serverand specify the -oparameter.
Your network contains an Active Directory domain named contoso.com. You log on to a domain controller by using an account named Admin1. Admin1 is a member of the Domain Admins group. You view the properties of a group named Group1 as shown in the exhibit. (Click the Exhibit button.) Group1 is located in an organizational unit (OU) named OU1. You need to ensure that you can modify the Security settings of Group1 by using Active Directory Users and Computers. What should you do from Active Directory Users and Computers?
A. From the View menu, select Users, Contacts, Groups, and Computers as containers.
B. Right-click OU1 and select Delegate Control.
C. From the View menu, select Advanced Features.
D. Right-click contoso.com and select Delegate Control.
From ADUC select view toolbar then select advanced features When you open up the ADUC in a default installation of Active Directory, you are only presented with the basiccontainers. These basic containers include the only organizational unit (OU), which is the Domain Controllers OU, as wellas the other containers such as Users and Computers. To see more in-depth containers, you need to configure the ADUC by going to the View option on thetoolbar, then selecting Advanced Features. This will refresh the view within the ADUC and add some new containers. There are no hidden (or Advanced)OUs that will show up when you configure the ADUC in this way.
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. You install Windows Server 2012 on a new computer named DC3. You need to manually configure DC3 as a domain controller. Which tool should you use?
A. Server Manager
C. Active Directory Domains and Trusts
A. using the Add Roles Wizard in Server Manager, followed by the Active Directory Domain Services Configuration Wizard.
B. winrm is the server side service for remote managment.
C. used for trust between multiple domains.
D. Dcpromo.exe has been deprecated.
In Windows Server 2012 R2, if you run dcpromo.exe (without anyparameters) from a command prompt, you receive a message directing you to Server Manager.
You have a server named Core1 that has a Server Core Installation of Windows Server 2012 R2. Core1 has the Hyper-V server role installed Core1 has two network adapters from different third-party hardware vendors. You need to configure network traffic failover to prevent connectivity loss if a network adapter fails. What should you use?
A. Creates a new switch team.
B. Adds a network adapter member to an existing switch team.
C. Not a valid cmdlet.
D. Network shell (netsh) is a command-line utility that allows you to configure and display the status of various network communications server role.
You have a server named Server1 that runs Windows Server 2012 R2. You connect three new hard disks to Server1. You need to create a storage space that contains the three disks. The solution must meet the following requirements:
– Provide fault tolerance if a single disk fails.
– Maximize the amount of files that can be stored in the storage space.
What should you create?
A. A simple space
B. A spanned volume
C. A mirrored space
D. A parity space
A. Stripes data across a set of pool disks, and is not resilient to any disk failures.
B. A spanned volume is a dynamic volume consisting of disk space on more than one physical disk and not fault tolerant.
C. Fault tolerant but Not max space.
D. Fault tolerant and better space ratio.
Parity spaces are designed for capacity efficiency and increased resiliency. Parity spaces are best suited for archival data and streaming media, such as music and videos.
You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. You need to add a graphical user interface (GUI) to Server1. Which tool should you use?
A. The setup.exe command
B. The dism.exe command
C. The imagex.exe command
D. The Add-WindowsPackage cmdlet
The DISM command is called by the Add-WindowsFeature command. Here is the systax for DISM: Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:ServerGui-Shell /featurename:Server-Gui-Mgmt
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has five network adapters. Three of the network adapters an connected to a network named LAN1. The two other network adapters are connected to a network named LAN2. You need to create a network adapter team from the three network adapters connected to LAN 1. Which tool should you use?
A. Routing and Remote Access
B. Network and Sharing Center
C. Server Manager
D. Network Load Balancing Manager
You have a server named Server1 that runs Windows Server 2012 R2. You need to remove Windows Explorer, Windows Internet Explorer, and all related components and files from Server1. What should you run on Server1?
A. Uninstall-WindowsFeature Server-Gui-Mgmt-Infra Remove
B. Uninstall-WindowsFeature Server-Gui-Shell Remove
C. msiexec.exe /uninstall iexplore.exe /x
D. msiexec.exe /uninstall explorer.exe /x
A. Would be a server core install.
B. No IE or taskbar, explorer or control panel.
C. Would leave components.
D. Would leave components.
In Windows Server 2012 R2, you can remove the Server Graphical Shell, resulting in the “Minimal ServerInterface”. This is similar to a Server with a GUI installation, but Internet Explorer 10, Windows Explorer, the desktop, andthe Start screen are not installed. Microsoft Management Console (MMC), Server Manager, and a subset of Control Panel are still present. If the server has a full installation of Windows Server, and I need to bring the server down to minimal serverinterface, I only need to remove the Server-GUI-Shell.
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1. VM1 has a legacy network adapter. You need to assign a specific amount of available network bandwidth to VM1. What should you do first?
A. Remove the legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
B. Add a second legacy network adapter, and then run the Set-VMNetworkAdoptercmdlet.
C. Add a second legacy network adapter, and then configure network adapter teaming.
D. Remove the legacy network adapter, and then add a network adapter.
A. Set-VMNetworkAdaptercmdlet configures features of the virtual network adapter in a virtual machine or the management operating system.
B. The legacy network adapter doesn’t support bandwidth management.
C. The legacy network adapter doesn’t support bandwidth management.
D. Add a New network adapter.
The legacy network adapter doesn’t support bandwidth management.
Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. On a server named Core1, you perform a Server Core Installation of Windows Server 2012 R2. You join Core1 to the adatum.com domain. You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1. What should you do on Core1?
A. Run the Enable-NetFirewallRulecmdlet.
B. Run sconfig.exeand configure remote management.
C. Run the Disable-NetFirewallRulecmdlet.
D. Run sconfiq.exeand configure the network settings.
A. Allows MMC snap in for Event Viewer.
B. Modifies service entries.
C. Would Disable a firewall rule which was enabled.
D. Modifies service entries.
Enable-NetFirewallRule -DisplayGroup “Remote Event Log Management”
Your network contains a file server named Server1 that runs Windows Server 2012 R2. All client computers run Windows 8. You need to ensure that when users are connected to the network, they always use local offline files that are cached from Server1. Which Group Policy setting should you configure?
A. Configure slow-link mode.
B. Configure Slow link speed.
C. Enable file synchronization on costed networks.
D. Turn on economical application of Administratively assigned Offline Files.
A. Offline Files to provide faster access to cached files and redirected folders.
B. Defines a slow connection for purposes of Applying and updating Group Policy.
C. automatically tracks roaming and bandwidth usage limits while on metered connections.
D. Lists network files and folders that are always available for offline use. This policy makes the specified filesand folders available offline to users of the computer. When Offline Files is operating in the slow-link mode, all network file requests are satisfied from the OfflineFiles cache. This is similar to a user working offline. If you enable this policy setting, Offline Files uses the slow-link mode if the network throughput between theclient and the server is below (slower than) the Throughput threshold parameter, or if the round-trip networklatency is above (slower than) the Latency threshold parameter.
Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Serve 2012 R2. All client computers run either Windows 7 or Windows 8. The domain contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the File and Storage Services server role installed. On Server1, you create a share named Share1. You need to ensure that users can use Previous Versions to restore the files in Share1. What should you configure on Server1?
A. The Shadow Copies settings
B. A Windows Server Backup schedule
C. A data recovery agent
D. The Recycle Bin properties
A. Enable and schedule shadow copies for Share1.
B. The backup doesn’t give users access until files are restored.
D. No settings for file version.
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Print and Document Services server role installed. Server1 is connected to two identical print devices. You need to ensure that users can submit print jobs to the print devices. The solution must ensure that if one print device fails, the print jobs will print automatically on the other print device. What should you do on Server1?
A. Add two printers and configure the priority of each printer.
B. Add one printer and configure printer pooling.
C. Install the Network Load Balancing (NLB) feature, and then add one printer.
D. Install the Failover Clustering feature, and then add one printer.
A. expedite documents that need to be printed immediately.
B. A printing pool is one logical printer connected to multiple printers through multiple ports of theprint server. The printer that is idle receives the next document sent to the logical printer. Whenprinting to a printer pool, the spooler will send waiting jobs to alternate ports. If the original or alternateports are not available.
C. NLB for printing is not supported.
D. Would need 2 nodes.
A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for theirdocuments. A printing pool also simplifies administration because multiple printers can be managed from the same logicalprinter on a server. If one device within a pool stops printing, the current document is held at that device. The succeedingdocuments print to other devices in the pool, while the delayed document waits until the nonfunctioningprinter is fixed. Efficient printer pools have the following characteristics: All printers in the pool are the same model. Printer ports can be of the same type or mixed (parallel, serial, and network). It is recommended that all printers be in one location. Because it is impossible to predict which printer willreceive the document, keep all printers in a pool in a single location. Otherwise, users might have a hard timefinding their printed document.
You can create a printing pool to automatically distribute print jobs to the next available printer. A printing poolis one logical printer connected to multiple printers through multiple ports of the print server. The printer that isidle receives the next document sent to the logical printer.