Microsoft 70-410 Exam Questions & Practice Test – Free Download (71-80)

QUESTION 71
Your company has a main office and two branch offices. The offices connect to each other by using a WAN link. In the main office, you have a server named Server1 that runs Windows Server 2012 R2. Server1 is configured to use an IPv4 address only. You need to assign an IPv6 address to Server1. The IP address must be private and routable. Which IPv6 address should you assign to Server1?

A.    fe80:ab32:145c::32cc:401b
B.    ff00:3fff:65df:145c:dca8::82a4
C.    2001:ab32:145c::32cc:401b
D.    fd00:ab32:14:ad88:ac:58:abc2:4

Answer: D
Explanation:
pg 266 Chapter 6 : Installing and Configuring Windows Server 2012 R2 Unique local addresses
Unique local addresses are IPv6 addresses that are private to an organization in the same way that private addresses–such as 10.x.x.x, 192.168.x.x, or 172.16.0.0 172.31.255.255–can be used on an IPv4 network.
Unique local addresses, therefore, are not routable on the IPv6 Internet in the same way that an address like 10.20.100.55 is not routable on the IPv4 Internet. A unique local address is always structured as follows:
The first 8 bits are always 11111101 in binary format. This means that a unique local address always begins with FD and has a prefix identifier of FD00::/8.

image

» Read more

Microsoft 70-410 Exam Questions & Practice Test – Free Download (61-70)

QUESTION 61
You have a server named Server2 that runs Windows Server 2012 R2. You open Server Manager on Server2 as shown in the exhibit. (Click the Exhibit button.) The Everyone group has read share permission and read NTFS permission to Sources.
You need to ensure that when users browse the network, the Sources share is not visible.
What should you do?

image

A.    From the properties of the Sources folder, remove the Sources share, and then share the Sources folder as Sources$
B.    From the properties of the Sources folder, deny the List Folder Contents permission for the Everyone group
C.    From the properties of the Sources share, configure access-based enumeration
D.    From the properties of the Sources folder, configure the hidden attribute

Answer: A
Explanation:
A. need to remove the old share, $ creates a hidden share
B. This would deny everyine
C. This feature allows users of Windows Server 2003-Based file servers to list only the files and folders towhich they have access when browsing content on the file server
D. This would hide the physical folder not the share
A hidden share is identified by a dollar sign ($) at the end of the share name Hidden shares are not listed when you look through the shares on a computer or use the “net view” command Why Use Hidden Shares? Using hidden shares on your network is useful if you do not want a shared folder or drive on the network to beeasily accessible. Hidden shares can add another layer of protection for shared files against unauthorizedpeople connecting to your network. Using hidden shares helps eliminate the chance for people to guess yourpassword (or be logged into an authorized Windows account) and then receive access to the shared resource.

image
http://support.microsoft.com/kb/314984
http://technet.microsoft.com/en-us/library/cc784710(v=ws.10).aspx

» Read more

Microsoft 70-410 Exam Questions & Practice Test – Free Download (51-60)

QUESTION 51
You have a server named Core1 that has a Server Core Installation of Windows Server 2012 R2. Core1 has the Hyper-V server role installed Core1 has two network adapters from different third-party hardware vendors.
You need to configure network traffic failover to prevent connectivity loss if a network adapter fails.
What should you use?

A.    New-NetSwitchTeam
B.    Add-NetSwitchTeamMember
C.    Install-Feature
D.    netsh.exe

Answer: A
Explanation:
A. Creates a new switch team
B. Adds a network adapter member to an existing switch team
C. Not a valid cmdlet
D. Network shell (netsh) is a command-line utility that allows you to configure and display the status of various network communications server role

image
http://technet.microsoft.com/en-us/library/jj553814.aspx
http://technet.microsoft.com/en-us/library/jj553811(v=wps.620).aspx http://technet.microsoft.com/en-us/library/cc725935(v=ws.10).aspx

» Read more

Microsoft 70-410 Exam Questions & Practice Test – Free Download (41-50)

QUESTION 41
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.

image
You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS).
You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE.
Which virtual machine setting should you configure for VM2?

A.    NUMA topology
B.    Resource control
C.    Resource metering
D.    Virtual Machine Chimney
E.    The VLAN ID
F.    Processor Compatibility
G.    The startup order
H.    Automatic Start Action
I.    Integration Services
J.    Port mirroring
K.    Single-root I/O virtualization

Answer: G
Explanation:
G. Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from the network is first

image
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx

» Read more

Microsoft 70-410 Exam Questions & Practice Test – Free Download (31-40)

QUESTION 31
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. You need to configure a central store for the Group Policy Administrative Templates. What should you do on DC1?

A.    From Server Manager, create a storage pool.
B.    From Windows Explorer, copy the PolicyDefinitions folder to the SYSVOL\contoso.com\policies folder.
C.    From Server Manager, add the Group Policy Management feature
D.    From Windows Explorer, copy the PolicyDefinitions folder to the NETLOGON share.

Answer: B
Explanation:
A. Create Disk Storage Pool
B. PolicyDefinitions folder in SYSVOL
C. Group Policy Management is a console for GPO Mgmt
D. Folder is for logon scripts
PolicyDefinitions folder within the SYSVOL folder hierarchy. By placing the ADMX files in this directory,they are replicated to every DC in the domain; by extension, the ADMX-aware Group Policy ManagementConsole in Windows Vista, Windows 7, Windows Server 2008 and R2 can check this folder as an additionalsource of ADMX files, and will report them accordingly when setting your policies.
By default, the folder is not created. Whether you are a single DC or several thousand, I would stronglyrecommend you create a Central Store and start using it for all your ADMX file storage. It really does work well.
The Central Store To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder ona domain controller. The Central Store is a file location that is checked by the Group Policy tools. The GroupPolicy tools use any .admx files that are in the Central Store. The files that are in the Central Store are laterreplicated to all domain controllers in the domain. To create a Central Store for .admx and .adml files, create a folder that is named PolicyDefinitions in thefollowing location:
\\FQDN\SYSVOL\FQDN\policies
Note: FQDN is a fully qualified domain name.
http://tigermatt.wordpress.com/tag/policydefinitions/
http://support.microsoft.com/kb/929841/en-us
http://www.virtuallyimpossible.co.uk/how-to-create-a-group-policy-central-store/ http://support.microsoft.com/kb/2741591/en-us

» Read more

Microsoft 70-410 Exam Questions & Practice Test – Free Download (21-30)

QUESTION 21
Your network contains three servers that run Windows Server 2012 R2. The servers are configured as shown in the following table.

image
Server3 is configured to obtain an IP address automatically.
You need to prevent Server3 from receiving an IP address from Server1. What should you create on Server1?

A.    A reservation
B.    A filter
C.    A scope option
D.    An exclusion

Answer: B
Explanation:
A. For clients that require a constant IP address
B. Filter to exclude MAC address of Server3
C. Range of allowed IP’s to be assigned
D. Exclude range of IP’s
MAC address based filtering ensure that only a known set of devices in the system are able to obtain an IPAddress from the DHCP

image
Reservation and Exclusion, two incredibly different concepts. An exclusion is an address or range of addresses taken from a DHCP scope that the DHCP server is notallowed to hand out. For example, if you have set a DHCP server to exclude the address range 192.168.0.1-192.168.0.10 then the only way a computer on your network would get an address of 192.168.0.4 would be ifyou assigned it statically on that machine. This is because DHCP knows NOT to give this range of IPaddresses out.
A reservation is a specific IP addresses that is tied to a certain device through its MAC address. Forexample, if we have a workstation on the network that requires a certain IP address, but we don’t want to gothrough to trouble of assigning it statically, then we can create a reservation for it. So if the MAC address of theNIC on the computer is AA-BB-00FF-CC-AA and we want it to maintain the IP address of 192.168.0.100 thenwe would create a DHCP reservation under that particular scope saying that the IP address 192.168.0.100
isreserved only for the MAC address AA-BB-00-FF-CC-AA.
http://technet.microsoft.com/en-us/magazine/ff521761.aspx
http://technet.microsoft.com/en-us/library/cc726954(v=ws.10).aspx http://www.windowsnetworking.com/kbase/WindowsTips/Windows2003/AdminTips/Network/DHCPReservationsandExclusions.html

» Read more

Microsoft 70-410 Exam Questions & Practice Test – Free Download (11-20)

QUESTION 11
Your network contains an Active Directory domain named corp.contoso.com. The domain contains a domain controller named DC1. When you run ping dcl.corp.contoso.com, you receive the result as shown in the exhibit. (Click the Exhibit button.)

image
You need to ensure that DC1 can respond to the Ping command. Which rule should you modify? To answer, select the appropriate rule in the answer area.

image
Answer:

image

» Read more

1 420 421 422 423 424 438