Microsoft Exam 70-410: Volume 1- Test 3

Description

This exam includes updates that relate to Windows Server 2012 R2 task which include installing and configuring servers, configuring server roles and features, configuring Hyper-V, deploying and configuring core network services, installing and administering Active Directory, and creating and managing Group Policy. I've done as much research as I can on each question to ensure they're accurate, but please let me know if any questions need to be revised.
Alex Quito
Quiz by Alex Quito, updated more than 1 year ago More Less
saheed Tijani
Created by saheed Tijani over 8 years ago
Alex Quito
Copied by Alex Quito over 8 years ago
248
1

Resource summary

Question 1

Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing the new VHD format called VHDX. Which of the following is TRUE with regards to VHDX? (Choose all that apply.) (2)
Answer
  • It supports virtual hard disk storage capacity of up to 64 GB.
  • It supports virtual hard disk storage capacity of up to 64 TB.
  • It does not provide protection against data corruption during power failures.
  • It has the ability to store custom metadata about the file that the user might want to record.

Question 2

Question
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. You plan to replace a domain controller named DC1. DC1 has the schema operations master role. You need to transfer the schema master role to another domain controller named DC10 before you remove Active Directory from DC1. Which tool should you use?
Answer
  • the ntdsutil command
  • the Set-ADDomain cmdlet
  • the Install-ADDSDomain cmdlet
  • the dsadd command
  • the dsamain command
  • the dsmgmt command
  • the net user command
  • the Set-ADForest cmdlet

Question 3

Question
You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a folder named Folder1. You share Folder1 as Share1 by using Advanced Sharing. Access-based enumeration is enabled. Share1 contains an application named Appl.exe. You configure the NTFS permissions on Folder1 as shown in the following table Group 1 - Read & Execute Group 2 - Read & Execute, Write The members of Group2 report that they cannot make changes to the files in Share1. The members of Group1 and Group2 run Appl.exe successfully. You need to ensure that the members of Group2 can edit the files in Share1. What should you do?
Answer
  • Replace the NTFS permissions on all of the child objects.
  • Edit the Share permissions.
  • Edit the NTFS permissions.
  • Disable access-based enumeration.

Question 4

Question
You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. You need to add a graphical user interface (GUI) to Server1. Which tool should you use?
Answer
  • The Install-WindowsFeature cmdlet
  • The Install-Module cmdlet
  • The Install-RoleService cmdlet
  • The setup.exe command

Question 5

Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature. Which of the following is TRUE with regards to Windows Firewall with Advanced Security? (Choose all that apply.) (2)
Answer
  • It provides host-based, two-way network traffic filtering for a computer.
  • It provides host-based, one-way network traffic filtering for a computer.
  • It blocks unauthorized network traffic flowing into or out of the local computer
  • It only blocks unauthorized network traffic flowing into the local computer
  • It only blocks unauthorized network traffic flowing out of the local computer.

Question 6

Question
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a member server named Server1. Server1 has the File Server server role installed. On Server1, you create a share named Documents. The Documents share will contain the files and folders of all users. You need to ensure that when the users connect to Documents, they only see the files to which they have access. What should you do?
Answer
  • Enable access-based enumeration.
  • Configure Dynamic Access Control.
  • Modify the Share permissions.
  • Modify the NTFS permissions.

Question 7

Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed, and all workstations have Windows 8 installed. You are running a training exercise for junior administrators. You are currently discussing the Always Offline Mode. Which of the following is TRUE with regards to the Always Offline Mode? (Choose all that apply.)
Answer
  • It allows for swifter access to cached files and redirected folders.
  • To enable Always Offline Mode, you have to satisfy the forest and domain functionallevel requirements, as well as schema requirements
  • It allows for lower bandwidth usage due to users are always working offline
  • To enable Always Offline Mode, you must have workstations running Windows 7 or Windows Server 2008 R2.

Question 8

Question
You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. You attach four 500-GB disks to Server1. You need to configure the storage to meet the following requirements: Storage for an application named Application1 must be provided. Application1 requires 20 GB and will require a maximum of 800 GB in three years. Storage for an application named Application2 must be provided. Application2 requires 20 GB and will require a maximum of 900 GB in three years. The solution must provide the ability to dynamically add storage without requiring configuration changes to the applications. The storage must be available if a single disk fails. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Answer
  • From File and Storage Services, create virtual disks by using fixed provisioning.
  • From File and Storage Services, create virtual disks by using thin provisioning.
  • From File and Storage Services, create a storage pool that uses all four disks.
  • From Disk Management, create a new RAID-5 volume that uses all four disks.
  • From Disk Management, create two new mirror volumes that use two disks each.

Question 9

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. You have just executed the Uninstall-WindowsFeature Server-Gui-Shell Contoso.com server, named ENSUREPASS-SR13. Which of the following is the reason for doing this?
Answer
  • To only remove Windows Explorer from ENSUREPASS-SR13.
  • To only remove the Windows Internet Explorer from ENSUREPASS-SR13. C. To
  • To only remove the components and files related to Windows Explorer from ENSUREPASSSR13.
  • To remove Windows Explorer, Windows Internet Explorer, and all associated components and files from ENSUREPASS-SR13.

Question 10

Question
Your network contains an Active Directory domain named contoso.com. You have a starter Group Policy object (GPO) named GPO1 that contains more than 100 settings. You need to create a new starter GPO based on the settings in GPO1. You must achieve this goal by using the minimum amount of administrative effort. What should you do?
Answer
  • Run the New-GPStarterGPO cmdlet and the Copy-GPO cmdlet.
  • Create a new starter GPO and manually configure the policy settings of the starter GPO.
  • Right-click GPO1, and then click Back Up. Create a new starter GPO. Right-click the new GPO, and then click Restore from Backup.
  • Right-click GPO1, and then click Copy. Right-click Starter GPOs, and then click Paste

Question 11

Question
A company’s server deployment team needs to install fourteen Windows Server 2012 R2 to handle the expected increase in holiday traffic. The team would like the option of switching the servers between Server Core and Full GUI servers and do not want to be locked in to their first choice. The server team would like four of the servers to include the Windows 8 Shell. Which installation option is required for these servers?
Answer
  • Server Core
  • Desktop Experience
  • Server with a GUI
  • Minimal Server Interface

Question 12

Question
You have a Hyper-V host named server1 that runs windows server 2012 R2.server1 host 50 virtual machines that run windows server 2012 R2 You enable and configure enhanced session mode on Server1. You need to identify a new functionality available for the virtual machines hosted on server1. What should you identify?
Answer
  • Smart card authentication using virtual machine connections
  • Redirection of RemoteFX USB drivers by using remote desktop connections
  • Redirection of RemoteFX USB drivers using virtual machine connections
  • smart card authentication using the remote desktop client.

Question 13

Question
You have a server named Server1 that runs Windows Server 2012 R2. You promote Server1 to domain controller. You need to view the service location (SVR) records that Server1 registers on DNS. What should you do on Server1?
Answer
  • Open the Srv.sys file
  • Open the Netlogon.dns file
  • Run ipconfig/displaydns
  • Run Get-DnsServerDiagnostics

Question 14

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. On Server1, you create a share named Documents. You need to ensure that users can recover files that they accidently delete from Documents. What should you do?
Answer
  • Enable shadow copies by using Computer Management.
  • Create a storage pool that contains a two-way mirrored volume by using Server Manager.
  • Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the Services console.
  • Create a recovery partition by using Windows Assessment and Deployment Kit (Windows ADK).

Question 15

Question
A company’s server virtualization team needs to provision a series of Hyper-V workloads to use existing network storage arrays. The team has chosen to use Fibre Channel ports within the guest operating systems. Which of the following Windows Server versions can be used as guest operating systems when using Hyper-V Fibre Channel ports?
Answer
  • 2003 R2
  • 2008
  • 2003
  • 2012

Question 16

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a user account named User1 that resides in an organizational unit (OU) named OU1. A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to publish several applications to a user named User1. In the Users container, you create a new user named User2. You need to ensure that the same applications are published to User2. What should you do?
Answer
  • Modify the settings in GPO1
  • Move User2 to OU1
  • Link a WMI filter to GPO1
  • Modify the security of GPO1.

Question 17

Question
Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012 R2. A one-way external trust exists between contoso.com and adatum.com. Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com. What should you do?
Answer
  • Modify the Managed By settings of Group1
  • Modify the Allowed to Authenticate permissions in adatum.com.
  • Change the type of Group1 to distribution.
  • Modify the name of Group1.

Question 18

Question
Your network contains an Active Directory domain named contoso.com. The domain contains an application server named Server1. Server1 runs Windows Server 2012 R2. You have a client application named App1 that communicates to Server1 by using dynamic TCP ports. On Server1, a technician runs the following command: New-NetFirewallRule -DisplayName AllowDynamic - Direction Outbound -LocalPort 1024- 65535 -Protocol TCP. Users report that they can no longer connect to Server1 by using App1. You need to ensure that App1 can connect to Server1. What should you run on Server1?
Answer
  • Set-NetFirewallRule -DisplayName AllowDynamic -Action Allow
  • netsh advfirewall firewall set rule name=allowdynamic new action = allow
  • Set-NetFirewallRule -DisplayName AllowDynamic -Direction Inbound
  • netsh advfirewall firewall add rule name=allowdynamic action=allow

Question 19

Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing printer pooling. Which of the following is TRUE with regards to printer pooling? (Choose all that apply.)
Answer
  • Printers in a pool must be of the same model, and use the same printer driver.
  • Each printer in the pool must have a different printer driver.
  • Printer ports used in the pool must be of the same type
  • The types of printer ports used in the pool must be mixed
  • Pooled printers appear to workstations as a single printer
  • A minimum of three printers are required to configure a printer pool

Question 20

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2008 R2 installed. Most of the Contoso.com servers have 64 – bit CPU’s installed, while the rest have 32 – bit CPU’s installed. You are informed that Contoso.com wants to deploy Windows Server 2012 R2 on all their servers. You need to make recommendations to ensure that this is possible. Which of the following would you recommend?
Answer
  • You should inform Contoso.com that the deployment can proceed without any changes.
  • You should inform Contoso.com that the servers with 32 bit CPU’s must be upgraded to include 64 bit CPU’s for the deployment to proceed.
  • You should inform Contoso.com that the servers with 64 bit CPU’s must be upgraded to include 32 bit CPU’s for the deployment to proceed.
  • You should inform Contoso.com that the deployment is not in any way possible.

Question 21

Question
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. An iSCSI SAN is available on the network. Server1 hosts four virtual machines named VM1, VM2, VM3, VM4. You create a LUN on the SAN. You need to provide VM1 with access to the LUN. The solution must prevent other virtual machines from accessing the LUN. What should you configure?
Answer
  • A fixed-size VHDX
  • A dynamically expanding VHDX
  • A fixed-size VHD
  • A pass-through disk
  • A dynamically expanding VHD

Question 22

Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing connection security rules. Which of the following is TRUE with regards to connection security rules? (Choose all that apply.) (3)
Answer
  • Connection security rules allows for traffic to be secured via IPsec.
  • Connection security rules do not allow the traffic through the firewall.
  • Connection security rules are applied to programs or services.
  • Connection security rules are applied between two computers.

Question 23

Question
Your company has an Active Directory domain. You log on to the domain controller. The Active Directory Schema snap-in is not available in the Microsoft Management Console (MMC). You need to access the Active Directory Schema snap-in. What should you do?
Answer
  • Register Schmmgmt.dll.
  • Log off and log on again by using an account that is a member of the Schema Admins group.
  • Use the Ntdsutil.exe command to connect to the schema master operations master and open the schema for writing.
  • Add the Active Directory Lightweight Directory Services (AD/LDS) role to the domain controller by using Server Manager.

Question 24

Question
Your network contains an Active Directory domain named contoso.com. The domain contains an application server named Server1. Server1 runs Windows Server 2012 R2. You have a client application named App1 that communicates to Server1 by using dynamic TCP ports. On Server1, a technician runs the following command: New-NetFirewallRule -DisplayNameAllowDynamic -Direction Outbound -LocalPort 1024- 65535 -Protocol TCP. Users report that they can no longer connect to Server1 by using Appl. You need to ensure that App1 can connect to Server1. What should you run on Server1?
Answer
  • Set-NetFirewallRule -DisplayNameAllowDynamic -Action Allow
  • netshadvfirewall firewall add rule name=allowdynamic action-allow
  • netshadvfirewall firewall set rule name-allowdynamic new action- allow
  • Set-NetFirewallRule -DisplayNameAllowDynamic -Direction Inbound

Question 25

Question
You have a server named Server1. Server1 runs a Server Core installation of Windows Server 2012 R2. The local area connection on Server1 has the following configuration: IP address: 10.1.1.1 Subnet mask: 255.255.240.0 Default gateway: 10.1.1.254 Preferred DNS server: <none> The network contains a DNS server that has an IPv4 address of 10.1.1.200. You need to configure Server1 to use 10.1.1.200 as the preferred DNS server. The solution must not change any other settings on Server1. Which command should you run?
Answer
  • sconfig.cmd
  • net.exe
  • Set-NetIPInterface
  • netsh.exe

Question 26

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2008 R2 installed. Some of Contoso.com’s workstations have Windows 7 installed, while the rest have Windows 8 installed. After installing a new Windows Server 2012 computer in the Contoso.com domain, you configure it to run the File and Storage Services server role. You are instructed to create a shared folder on the new server, and configure the use of Previous Versions for restoring files located in the shared folder. Which of the following actions should you take?
Answer
  • You should consider configuring the Shadow Copies settings on the new server
  • You should consider configuring the Snapshot settings on the new server.
  • You should consider configuring the Background Copy settings on the new server.
  • You should consider configuring the Permission settings on the new server.

Question 27

Question
You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has following hardware configurations: - 16GB of RAM - A single quad-core CPU - Three network teams that have two network adapters each You add additional CPUs and RAM to Server 1. You repurpose Server1 as a virtualization host. You install the Hyper-V server role on Server1. You need to create four external virtual switches in Hyper-V. Which cmdlet should you run first?
Answer
  • Set-NetAdapter.
  • Add-Net1.bfoTeamNic
  • Add-VMNetworkAdapter
  • Remove-NetLbfoTeam

Question 28

Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing the Virtual Fibre Channel SAN feature. Which of the following is TRUE with regards to the Virtual Fibre Channel SAN feature? (Choose all that apply.)
Answer
  • It prevents virtual machines from connecting directly to Fibre Channel storage.
  • It allows for virtual machines to connect to Fibre Channel storage directly.
  • It includes support for virtual SANs, live migration, and multipath I/O.
  • It includes support for virtual SANs, and live migration, but not multipath I/O.

Question 29

Question
Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory Federation Services server role installed.Server2 is a file server. Your company introduces a Bring Your Own Device (BYOD) policy. You need to ensure that users can use a personal device to access domain resources by using Single Sign-On (SSO) while they are connected to the internal network. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Answer
  • Enable the Device Registration Service in Active Directory.
  • Publish the Device Registration Service by using a Web Application Proxy
  • Configure Active Directory Federation Services (AD FS) for the Device Registration Service.
  • Install the Work Folders role service on Server2.
  • Create and configure a sync share on Server2.

Question 30

Question
You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. You need to add a graphical user interface (GUI) to Server1. Which tool should you use? (2)
Answer
  • the dism.exe command
  • the Add-WindowsFeature cmdlet
  • the imagex.exe command
  • the setup.exe command
  • the ocsetup.exe command
  • the Add-WindowsPackage cmdlet
  • the Install-Module cmdlet
  • the Install-RoleService cmdlet

Question 31

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 installed. You have been instructed to modify an Active Directory computer object. Which of the following actions should you take?
Answer
  • You should consider making use of the Get-ADComputer Windows PowerShell cmdlet
  • You should consider making use of the Set-ADComputer Windows PowerShell cmdlet
  • You should consider making use of the New-ADComputer Windows PowerShell cmdlet
  • You should consider making use of the Get-ADComputerServiceAccount Windows PowerShell cmdlet

Question 32

Question
You perform a Server Core Installation of Windows Server 2012 on a server named Server1. You need to add a graphical user interface (GUI) to Server1. Which tool should you use?
Answer
  • The setup.exe command
  • The dism.exe command
  • The imagex.exe command
  • Add-WindowsPackage cmdlet

Question 33

Question
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server2 runs Windows Server 2012. You create a security template named Template1 by using the Security Templates snap-in. You need to apply Template1 to Server2. Which tool should you use?
Answer
  • Security Templates.
  • Computer Management.
  • Security Configuration and Analysis.
  • System Configuration.

Question 34

Question
Your network contains an Active Directory domain named contoso.com. The domain contains two servers that run Windows Server 2012, Server1 and Server2. You create a security template named Template1 by using the Security Templates snap-in. You need to apply Template1 to Server2. Which tool should you use?
Answer
  • System Configuration
  • Security Templates
  • Server Manager
  • Security Configuration and Analysis

Question 35

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Server1 that runs Windows Server 2012. Server1 contains a local group named Group1. You share a printer named Printer1 on Server1. You need to configure Printer1 to meet the following requirements: Ensure that the members of Group1, the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1. Prevent other users from sending print jobs to Printer1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Answer
  • Assign the Print permission to the Server Operators group
  • Remove the permissions for the Creator Owner group.
  • Remove the permissions for the Everyone group.
  • Assign the Print permission to Group1.
  • Assign the Print permission to the Administrators group.

Question 36

Question
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Server1 runs Windows Server 2012. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server server role installed. You need to manage DHCP on Server2 by using the DHCP console on Server1. What should you do first?
Answer
  • From Server Manager on Server2, enable Windows Remote Management.
  • From a command prompt on Server2, run winrm.exe.
  • From Server Manager on Server1, install a feature.
  • From the Microsoft Management Console on Server1, add a snap-in.

Question 37

Question
You have a server named Server1 that runs a Server Core installation of Windows Server 2012. Server1 is configured to obtain an IPv4 address by using DHCP. You need to configure the IPv4 settings of the network connection on Server1 as follows: IP address: 10.1.1.1 Subnet mask: 255.255.240.0 Default gateway: 10.1.1.254 What should you run?
Answer
  • Set-NetlPInterface
  • netcfg.exe
  • New-NetlPAddress
  • msconfig.exe

Question 38

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?
Answer
  • Edge traversal
  • Authorized computers
  • Interface types
  • Remote IP address

Question 39

Question
Your network contains two Hyper-V hosts that run Windows Server 2012. The Hyper-V hosts contains several virtual machines that run Windows Server 2012. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?
Answer
  • Port mirroring
  • DHCP guard
  • Router guard
  • MAC address

Question 40

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012. You need to create 3-TB virtual hard disk (VHD) on Server1. Which tool should you use?
Answer
  • StorageSubsytemVirtualDisk
  • File Server Resource Manager (FSRM)
  • Server Manager
  • Computer Management

Question 41

Question
You have a new server named Server1 that runs Windows Server 2012. Server1 has two dual-core processors and 32 GB of RAM. You install the Hyper-V server role on Server1. You create two virtual machines on Server1 that each have 8 GB of memory. You need to minimize the amount of time it takes for both virtual machines to access memory. What should you configure on each virtual machine?
Answer
  • Resource control
  • Dynamic Memory
  • NUMA topology
  • Memory weight

Question 42

Question
You have a server named Server1 that runs Windows Server 2012. You plan to enable Hyper-V Network Visualization on Server1. You need to install the Windows Network Virtualization Filter Driver on Server1. Which Windows PowerShell cmdlet should you run?
Answer
  • Set-NetVirtualizationGlobal
  • Set-NetAdapterVmq
  • Add-WindowsFeature
  • Enable-NetAdapterBinding

Question 43

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 and has the HyperV server role installed. You need to log the amount of system resources used by each virtual machine. What should you do?
Answer
  • From Windows PowerShell, run the Enable-VMResourceMetering cmdlet.
  • From Windows System Resource Manager, enable Accounting.
  • From Windows System Resource Manager, add a resource allocation policy.
  • From Windows PowerShell, run the Measure-VM cmdlet.

Question 44

Question
You have two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 are part of a workgroup. On Server1, you add Server2 to Server Manager. When you attempt to connect to Server2 from Server Manager, you receive the following error message: "Credentials not valid." You need to ensure that you can manage Server2 from Server1 by using Server Manager on Server1. What should you do?
Answer
  • On Server 2, run the Configure-SmRemoting cmdlet.
  • On Server 1, run the Set-NetFirewallRule cmdlet.
  • On Server 1, run the Set-Item cmdlet.
  • On Server 2, install the Remote Server Administration Tools (RSAT).

Question 45

Question
You have a server named Server1 that runs a Server Core installation of Windows Server 2012 Standard. You establish a Remote Desktop session to Server1. You need to identify which task can be performed on Server1 from within the Remote Desktop session. What should you identify?
Answer
  • Modify the network settings by using Sconfig.
  • Join a domain by using the System Properties.
  • Disable services by using Msconfig.
  • Install a feature by using Server Manger.

Question 46

Question
You have a server named Server1. Server1 runs Windows Server 2012 and is located in a perimeter network. You need to configure a custom connection security rule on Server1. The rule must encrypt network communications across the Internet to a computer at another company. Which authentication method should you configure in the connection security rule?
Answer
  • Advanced
  • User (Kerberos V5)
  • Computer (Kerberos V5)
  • Computer and user (Kerberos V5)
  • Default

Question 47

Question
Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012. A one-way external trust exists between contoso.com and adatum.com. Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com What should you do?
Answer
  • Modify the Managed By settings of Group1
  • Modify the Allowed to Authenticate permissions in adatum.com
  • Change the type of Group1 to distribution
  • Modify the name of Group1
Show full summary Hide full summary

Similar

Microsoft Exam 70-410: - Volume 2 - Test 2
Alex Quito
Microsoft Exam 70-410: - Volume 2 - Test 1
Alex Quito
70-410 - MCSA: Windows Server 2012 - Installing and Configuring - Exam 3
Mike M
70-410 - MCSA: Windows Server 2012 - Installing and Configuring - Exam 2
Mike M
Exam 70-410: Installing and Configuring Windows Server 2012 R2
Mike M
Microsoft Exam 70-410: Volume1- Test 1
Alex Quito
70-410 - MCSA: Windows Server 2012 - Installing and Configuring - Exam 2
Dave S
70-410 - MCSA: Windows Server 2012 - Installing and Configuring - Exam 3
Dave S
70-410 - MCSA: Windows Server 2012 - Installing and Configuring - Exam 1
Mike M
Microsoft Exam 70-410: Volume 1- Test 4
Alex Quito
70-411 - MCSA: Administering Windows Server 2012 - Exam 4
Mike M