70 - 410 QUIZ 1 - VOLUME 3

saheed Tijani
Quiz by saheed Tijani, updated more than 1 year ago
saheed Tijani
Created by saheed Tijani about 5 years ago
32
0

Description

70-410 70-410 Quiz on 70 - 410 QUIZ 1 - VOLUME 3, created by saheed Tijani on 01/24/2016.

Resource summary

Question 1

Question
You have a network printer connected to print server. You need to be able to print if print server goes down. What should you configure?
Answer
  • branch office direct printing
  • printer pooling
  • spooling
  • Print forwarding

Question 2

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1. When you try to add a RemoteFX 3D Video Adapter to VM1, you discover that the option is unavailable as shown in the following exhibit. (Click the Exhibit button.) You need to add the RemoteFX 3D Video Adapter to VM1. What should you do first?
Answer
  • On Server1, run the Add-VMRemoteFx3dVideoAdapter cmdlet
  • On Server1, install the Media Foundation feature.
  • On Server1, run the Enable-VMRemoteFxPhysicalVideoAdaptercmdlet.
  • On Server1, install the Remote Desktop Visualization Host (RD Visualization Host) role service.

Question 3

Question
You have a server named Server1 that runs a full installation of Windows Server 2012 R2. You need to uninstall the graphical user interface (GUI) on Server1. You must achieve this goal by using the minimum amount of Administrative effort. What should you do?
Answer
  • Reinstall Windows Server 2012 R2 on the server.
  • From Server Manager, uninstall the User Interfaces and Infrastructure feature.
  • From Windows PowerShell, run Uninstall-WindowsFeature PowerShell-ISE
  • From Windows PowerShell, run Uninstall-WindowsFeature Desktop-Experience.

Question 4

Question
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers. The domain controllers are configured as shown in the following table. In the perimeter network, you install a new server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. You need to join Server1 to the contoso.com domain. What should you use?
Answer
  • The New-ADComputer cmdlet
  • The djoin.exe command
  • The dsadd.exe command
  • The Add-Computer cmdlet

Question 5

Question
You have a server named Server1 that runs Windows Server 2012 R2. You plan to create an image of Server1. You need to remove the source files for all server roles that are not installed on Server1. Which tool should you use?
Answer
  • servermanagercmd.exe
  • imagex.exe
  • ocsetup.exe
  • dism.exe

Question 6

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of an Active Directory forest that contains a root domain, named Contoso.com, and two child domains, named us.Contoso.com and uk.Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. The root domain hosts a domain local distribution group, named ENSUREPASSGroup. You are preparing to issue ENSUREPASSGroup read-only access to a shared folder hosted by the us.Contoso.com domain. You want to make sure that ENSUREPASSGroup is able to access the shared folder in the us.Contoso.com domain. Which of the following actions should you take?
Answer
  • You should consider re-configuring ENSUREPASSGroup as a universal Admins group.
  • You should consider re-configuring ENSUREPASSGroup as a universal security group.
  • You should consider re-configuring ENSUREPASSGroup as a global administrators group.
  • You should consider re-configuring ENSUREPASSGroup as a local administrators group.

Question 7

Question
You have a Hyper-V host named Server1. Server1 hosts a virtual machine named VM1. You view the properties of VM1 as shown in the following exhibit. (Click the Exhibit button.) You need to configure bandwidth management for VM1. Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.) 3 answers
Answer
  • Shut down VM1
  • Add a network Adapter to VM1
  • Configure tthe properties of the synthetic network adapter
  • Enable Hyper-V resource metering
  • Configure the properties of the synthetic network adapter

Question 8

Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing the new VHD format called VHDX. Which of the following is TRUE with regards to VHDX? (Choose all that apply.)
Answer
  • It supports virtual hard disk storage capacity of up to 64 GB.
  • It supports virtual hard disk storage capacity of up to 64 TB.
  • It does not provide protection against data corruption during power failures.
  • It has the ability to store custom metadata about the file that the user might want to record.

Question 9

Question
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. You plan to replace a domain controller named DC1. DC1 has the schema operations master role. You need to transfer the schema master role to another domain controller named DC10 before you remove Active Directory from DC1. Which tool should you use?
Answer
  • the ntdsutil command
  • the Set-ADDomain cmdlet
  • the Install-ADDSDomain cmdlet
  • the dsadd command
  • the dsamain command
  • the dsmgmt command
  • the net user command
  • the Set-ADForest cmdlet

Question 10

Question
Your network contains two Active Directory forests named contoso.com and adatum.com. A two-way forest trust exists between the forests. You have custom starter Group Policy objects (GPOs) defined in contoso.com. You need to ensure that the same set of custom starter GPOs are available in adatum.com. In the table below, identify which action must be performed for the starter GPOs container in each forest. Make only one selection in two of the rows. Each correct selection is worth one point.

Question 11

Question
You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a folder named Folder1. You share Folder1 as Share1 by using Advanced Sharing. Access-based enumeration is enabled. Share1 contains an application named Appl.exe. You configure the NTFS permissions on Folder1 as shown in the following table. The members of Group2 report that they cannot make changes to the files in Share1. The members of Group1 and Group2 run Appl.exe successfully. You need to ensure that the members of Group2 can edit the files in Share1. What should you do?
Answer
  • Replace the NTFS permissions on all of the child objects.
  • Edit the Share permissions.
  • Edit the NTFS permissions
  • Disable access-based enumeration

Question 12

Question
You have an Active Directory domain named contoso.com. You have a domain controller named Server1 that is configured as a DNS server. Server1 hosts a standard primary zone for contoso.com. The DNS configuration of Server1 is shown in the exhibit. You discover that stale resource records are not automatically removed from the contoso.com zone. You need to ensure that the stale resource records are automatically removed from the contoso.com zone. What should you do?
Answer
  • Set the scavenging period of Server1 to 0 days.
  • Modify the Server Aging/Scavenging properties.
  • Configure the aging properties for the contoso.com zone.
  • Convert the contoso.com zone to an Active Directory-integrated zone.

Question 13

Question
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a member server named Server1. Server1 has the File Server server role installed. On Server1, you create a share named Documents. The Documents share will contain the files and folders of all users. You need to ensure that when the users connect to Documents, they only see the files to which they have access. What should you do?
Answer
  • Enable access-based enumeration
  • Configure Dynamic Access Control.
  • Modify the Share permissions.
  • Modify the NTFS permissions.

Question 14

Question
Your network contains an Active Directory forest. The forest contains two domains named contoso.com and corp.contoso.com. The forest contains four domain controllers. The domain controllers are configured as shown in the following table. All domain controllers are DNS servers. In the corp.contoso.com domain, you plan to deploy a new domain controller named DC5. You need to identify which domain controller must be online to ensure that DC5 can be promoted successfully to a domain controller. Which domain controller should you identify?
Answer
  • DC1
  • DC2
  • DC3
  • DC4

Question 15

Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed, and all workstations have Windows 8 installed. You are running a training exercise for junior administrators. You are currently discussing the Always Offline Mode. Which of the following is TRUE with regards to the Always Offline Mode? (Choose all that apply.)
Answer
  • It allows for swifter access to cached files and redirected folders.
  • To enable Always Offline Mode, you have to satisfy the forest and domain functionallevel requirements, as well as schema requirements
  • It allows for lower bandwidth usage due to users are always working offline.
  • To enable Always Offline Mode, you must have workstations running Windows 7 or Windows Server 2008 R2.

Question 16

Question
You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. You attach four 500-GB disks to Server1. You need to configure the storage to meet the following requirements: Storage for an application named Application1 must be provided. Application1 requires 20 GB and will require a maximum of 800 GB in three years. Storage for an application named Application2 must be provided. Application2 requires 20 GB and will require a maximum of 900 GB in three years. The solution must provide the ability to dynamically add storage without requiring configuration changes to the applications. The storage must be available if a single disk fails. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Answer
  • From File and Storage Services, create virtual disks by using fixed provisioning.
  • From File and Storage Services, create virtual disks by using thin provisioning.
  • From File and Storage Services, create a storage pool that uses all four disks.
  • From Disk Management, create a new RAID-5 volume that uses all four disks.
  • From Disk Management, create two new mirror volumes that use two disks each.

Question 17

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. You have just executed the Uninstall-WindowsFeature Server-Gui-Shell Contoso.com server, named ENSUREPASS-SR13. Which of the following is the reason for doing this?
Answer
  • To only remove Windows Explorer from ENSUREPASS-SR13.
  • To only remove the Windows Internet Explorer from ENSUREPASS-SR13.
  • To only remove the components and files related to Windows Explorer from ENSUREPASSSR13.
  • To remove Windows Explorer, Windows Internet Explorer, and all associated components and files from ENSUREPASS-SR13.

Question 18

Question
Your network contains an Active Directory domain named contoso.com. You have a starter Group Policy object (GPO) named GPO1 that contains more than 100 settings. You need to create a new starter GPO based on the settings in GPO1. You must achieve this goal by using the minimum amount of administrative effort. What should you do?
Answer
  • Run the New-GPStarterGPO cmdlet and the Copy-GPO cmdlet.
  • Create a new starter GPO and manually configure the policy settings of the starter GPO.
  • Right-click GPO1, and then click Back Up. Create a new starter GPO. Right-click the new GPO, and then click Restore from Backup.
  • Right-click GPO1, and then click Copy. Right-click Starter GPOs, and then click Paste.

Question 19

Question
A company’s server deployment team needs to install fourteen Windows Server 2012 R2 to handle the expected increase in holiday traffic. The team would like the option of switching the servers between Server Core and Full GUI servers and do not want to be locked in to their first choice. The server team would like four of the servers to include the Windows 8 Shell. Which installation option is required for these servers?
Answer
  • Server Core
  • Desktop Experience
  • Server with a GUI
  • Minimal Server Interface

Question 20

Question
You have a Hyper-V host named server1 that runs windows server 2012 R2.server1 host 50 virtual machines that run windows server 2012 R2 You enable and configure enhanced session mode on Server1. You need to identify a new functionality available for the virtual machines hosted on server1. What should you identify?
Answer
  • Smart card authentication using virtual machine connections
  • Redirection of RemoteFX USB drivers by using remote desktop connections
  • Redirection of RemoteFX USB drivers using virtual machine connections
  • smart card authentication using the remote desktop client.

Question 21

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. On Server1, you create a share named Documents. You need to ensure that users can recover files that they accidently delete from Documents. What should you do?
Answer
  • Enable shadow copies by using Computer Management.
  • Create a storage pool that contains a two-way mirrored volume by using Server
  • Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the Services console.
  • Create a recovery partition by using Windows Assessment and Deployment Kit (Windows ADK).

Question 22

Question
A company’s server virtualization team needs to provision a series of Hyper-V workloads to use existing network storage arrays. The team has chosen to use Fibre Channel ports within the guest operating systems. Which of the following Windows Server versions can be used as guest operating systems when using Hyper-V Fibre Channel ports?
Answer
  • 2003 R2
  • 2008
  • 2003
  • 2012

Question 23

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a user account named User1 that resides in an organizational unit (OU) named OU1. A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to publish several applications to a user named User1. In the Users container, you create a new user named User2. You need to ensure that the same applications are published to User2. What should you do?
Answer
  • Modify the settings in GPO1.
  • Move User2 to OU1
  • Link a WMI filter to GPO1.
  • Modify the security of GPO1.

Question 24

Question
Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012 R2. A one-way external trust exists between contoso.com and adatum.com. Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com. What should you do?
Answer
  • Modify the Managed By settings of Group1.
  • Modify the Allowed to Authenticate permissions in adatum.com.
  • Change the type of Group1 to distribution.
  • Modify the name of Group1.

Question 25

Question
Your network contains an Active Directory domain named contoso.com. The domain contains an application server named Server1. Server1 runs Windows Server 2012 R2. You have a client application named App1 that communicates to Server1 by using dynamic TCP ports. On Server1, a technician runs the following command: New-NetFirewallRule -DisplayName AllowDynamic - Direction Outbound -LocalPort 1024- 65535 -Protocol TCP. Users report that they can no longer connect to Server1 by using App1. You need to ensure that App1 can connect to Server1. What should you run on Server1?
Answer
  • Set-NetFirewallRule -DisplayName AllowDynamic -Action Allow
  • netsh advfirewall firewall set rule name=allowdynamic new action = allow
  • Set-NetFirewallRule -DisplayName AllowDynamic -Direction Inbound
  • netsh advfirewall firewall add rule name=allowdynamic action=allow

Question 26

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2008 R2 installed. Most of the Contoso.com servers have 64 – bit CPU’s installed, while the rest have 32 – bit CPU’s installed. You are informed that Contoso.com wants to deploy Windows Server 2012 R2 on all their servers. You need to make recommendations to ensure that this is possible. Which of the following would you recommend?
Answer
  • You should inform Contoso.com that the deployment can proceed without any changes.
  • You should inform Contoso.com that the servers with 32 bit CPU’s must be upgraded to include 64 bit CPU’s for the deployment to proceed.
  • You should inform Contoso.com that the servers with 64 bit CPU’s must be upgraded to include 32 bit CPU’s for the deployment to proceed.
  • You should inform Contoso.com that the deployment is not in any way possible.

Question 27

Question
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. An iSCSI SAN is available on the network. Server1 hosts four virtual machines named VM1, VM2, VM3, VM4. You create a LUN on the SAN. You need to provide VM1 with access to the LUN. The solution must prevent other virtual machines from accessing the LUN. What should you configure?
Answer
  • A fixed-size VHDX
  • A dynamically expanding VHDX
  • A fixed-size VHD
  • A pass-through disk
  • A dynamically expanding VHD

Question 28

Question
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 has 8 GB of RAM. Server1 hosts five virtual machines that run Windows Server 2012 R2. The settings of a virtual machine named Server3 are configured as shown in the exhibit. (Click the Exhibit button.) You need to ensure that when Server1 restarts, Server3 automatically resumes without intervention. The solution must prevent data loss. Which settings should you modify?
Answer
  • BIOS
  • Automatic Start Action
  • Automatic Stop Action
  • Integration Services

Question 29

Question
Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2. On DC2, you open Server Manager and you add Server1 as another server to manage. From Server Manager on DC2, you right-click Server1 as shown in the exhibit. You need to ensure that when you right-click Server1, you see the option to run the DHCP console. What should you do?
Answer
  • On Server1, install the Feature Administration Tools.
  • In the domain, add DC1 to the DHCP Administrators group.
  • On DC2 and Server1, run winrm quickconfig.
  • On DC2, install the Role Administration Tools.

Question 30

Question
You have a server named Server2 that runs Windows Server 2012 R2. You open Server Manager on Server2 as shown in the exhibit. (Click the Exhibit button.) The Everyone group has read share permission and read NTFS permission to Sources. You need to ensure that when users browse the network, the Sources share is not visible. What should you do?
Answer
  • From the properties of the Sources folder, remove the Sources share, and then share the Sources folder as Sources$
  • From the properties of the Sources folder, deny the List Folder Contents permission for the Everyone group
  • From the properties of the Sources share, configure access-based enumeration
  • From the properties of the Sources folder, configure the hidden attribute

Question 31

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2008 R2 installed. Some of Contoso.com’s workstations have Windows 7 installed, while the rest have Windows 8 installed. After installing a new Windows Server 2012 computer in the Contoso.com domain, you configure it to run the File and Storage Services server role. You are instructed to create a shared folder on the new server, and configure the use of Previous Versions for restoring files located in the shared folder. Which of the following actions should you take?
Answer
  • You should consider configuring the Shadow Copies settings on the new server.
  • You should consider configuring the Snapshot settings on the new server.
  • You should consider configuring the Background Copy settings on the new server
  • You should consider configuring the Permission settings on the new server

Question 32

Question
Your network contains an Active Directory forest named adatum.com. The forest contains a child domain named asia.adatum.com. The asia.adatum.com child domain contains a server named DHCP1 that runs Windows Server 2012 R2. You install the DHCP Server server role on DHCP1. You have access to the administrative accounts shown in the following table. You need to authorize DHCP1. Which user account should you use?
Answer
  • Admin1
  • Admin2
  • Admin3
  • Admin4

Question 33

Question
Your network contains an Active Directory domain named contoso.com. All user accounts in the marketing department reside in an organizational unit (OU) named OU1. You have a Group Policy object (GPO) named GPO1. GPO1 contains Folder Redirection settings. GPO1 has default permissions. You discover that the Folder Redirection settings are not applied to the users in the marketing department. You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.) You need to ensure that the Folder Redirection settings in GPO1 apply to the marketing users. What should you do?
Answer
  • Modify the Delegation settings of GPO1.
  • Enable the link of GPO1
  • Enforce GPO1
  • Modify the link order of GPO1.

Question 34

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that has the DNS Server server role installed. DC1 hosts an Active Directory-integrated zone for the domain. The domain contains a member server named Server1. You install the DNS Server server role on Server1. You need to ensure that Server1 can respond authoritatively to queries for the existing contoso.com namespace. Which cmdlets should you run on each server? (To answer, drag the appropriate cmdlets to the correct servers. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer
  • add-DNS server Forwarder
  • add-DNS server Primary Zone
  • add-DNS server Secondary Zone
  • add-DNS server Trust Anchor
  • set -DNS server DS Setting
  • set-DNS server Primary Zone
  • set-DNS server Secondary Zone
  • set-DNS server setting

Question 35

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 installed. You have been instructed to modify an Active Directory computer object. Which of the following actions should you take?
Answer
  • You should consider making use of the Get-ADComputer Windows PowerShell cmdlet.
  • You should consider making use of the Set-ADComputer Windows PowerShell cmdlet
  • You should consider making use of the New-ADComputer Windows PowerShell cmdlet
  • You should consider making use of the Get-ADComputerServiceAccount Windows PowerShell cmdlet

Question 36

Question
You have a Hyper-V host named Hyper1 that runs Windows Server 2012 R2. Hyper1 hosts several virtual machines that run Windows 8.1. Several developers connect to the virtual machines by using the Virtual Machine Connection tool. You need to ensure that the devlopers can print to their local printers from within virtual machine sessions. What should you configure?
Answer
  • a virtual switch on Hyper1
  • Remote Desktop Services (RDS) on Hyper1
  • a virtual network adapter on the virtual machines
  • enhanced session mode on Hyper1

Question 37

Question
Your network contains an Active Directory forest that contains two domains. The forest contains five domain controllers. The domain controllers are configured as shown in the following table. You need to configure DC5 as a global catalog server. Which tool should you use?
Answer
  • Active Directory Domains and Trusts
  • Active Directory Users and Computers
  • Active Directory Administrative Center
  • Active Directory Sites and Services

Question 38

Question
You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. You attach four 500-GB disks to Server1. You need to configure the storage to meet the following requirements: Storage for an application named Application1 must be provided. Application1 requires 20 GB and will require a maximum of 800 GB in three years. Storage for an application named Application2 must be provided. Application2 requires 20 GB and will require a maximum of 900 GB in three years. The solution must provide the ability to dynamically add storage without requiring configuration changes to the applications. The storage must be available if a single disk fails. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Answer
  • From File and Storage Services, create virtual disks by using fixed provisioning.
  • From File and Storage Services, create a storage pool that uses all four disks.
  • From Disk Management, create two new mirror volumes that use two disks each.
  • From Disk Management, create a new RAID-5 volume that uses all four disks
  • From File and Storage Services, create virtual disks by using thin provisioning

Question 39

Question
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. You have a domain controller named DC5 that has the Server Graphical Shell disabled. You create an organizational unit (OU) named OU1. From DC5, you need to create 50 new user accounts in OU1. Which tool should you use?
Answer
  • the ntdsutil command
  • the Set-ADDomain cmdlet
  • the Install-ADDSDomain cmdlet
  • the dsadd command
  • the dsamain command
  • the dsmgmt command
  • the net user command
  • the Set-ADForest cmdlet

Question 40

Question
Your network contains an Active Directory forest named contoso.com. The forest contains a child domain named corp.contoso.com. The network has Microsoft Exchange Server 2010 deployed. You need to create a mail-enabled distribution group. Which type of group should you create?
Answer
  • Global
  • Local
  • Domain local
  • Universal

Question 41

Question
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. When a domain user named User3 attempts to log on to a client computer named Client10, User3 receives the message shown in the following exhibit. (Click the Exhibit button.) You need to ensure that User3 can log on to Client10. What should you do?
Answer
  • From Active Directory Users and Computers, configure the Logon Workstations setting of User3.
  • On Client10, modify the Allow log on locally User Rights Assignment.
  • From Active Directory Users and Computers, configure the Personal Virtual Desktop property of User3.
  • On Client10, modify the Deny log on locally User Rights Assignment

Question 42

Question
Server1 runs Windows Server 2012 R2 and is installed as an FTP server. Client uses App1 to connect to Server1 for FTP. App1 uses TCP port 21 for control and a dynamic port for data. You have allowed port 21 in firewall. What should you do next in order to allow clients to use App1 to connect to server1 using ftp.
Answer
  • At Server1 allow firewall rule of outbound
  • At Server1 allow firewall rule of inbound
  • Netsh advfirewall domainprofile state off
  • Netsh advfirewall set global StatefulFtp enable

Question 43

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and is configured as the only domain controller. You need to retrieve a list of all the user accounts. The list must include the last time each user was authenticated successfully. Which Windows PowerShell command should you run? To answer, drag the appropriate cmdlet or property to the correct locations to complete the PowerShell command in the answer area. Each cmdlet or property may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Answer
  • Get-AD Computer
  • Get-AD User
  • set-AD Computer
  • set-AD USER
  • Credentials
  • Last Logon Date
  • Logon Hours

Question 44

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 installed. You have been instructed to modify the name of the local Administrator account on all Contoso.com workstations. You want to achieve this using as little administrative effort as possible. Which of the following actions should you take?
Answer
  • You should consider configuring the Security Options settings via the Group Policy Management Console (GPMC).
  • You should consider navigating to Local Users and Groups via Computer
  • You should consider configuring the replication settings.
  • You should consider navigating to Local Users and Groups via Computer Management on each workstation.

Question 45

Question
You have two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. The servers are configured as shown in the following table. SERVER NAME WINDOWS FIREWALL IP ADDRESS Server 1 Enabled 10.01.1.4 Server 2 Disabled 192.168.1.10 The routing table for Server1 is shown in the Routing Table exhibit. (Click the Exhibit button.) From Server1, you attempt to ping Server2, but you receive an error message as shown in the Error exhibit. (Click the Exhibit button.) You need to ensure that you can successfully ping Server2 from Server1. What should you do on Server1?
Answer
  • Disable Windows Firewall
  • Modify the subnet mask.
  • Modify the DNS settings.
  • Modify the default gateway settings.

Question 46

Question
Your network contains an active directory domain named contoso.com. The domain consists 20 member Servers and 5 domain controllers. All servers run Windows Server 2012 R2. The domain contains 500 client computers. You plan to deploy a domain controller for contoso.com in Microsoft Azure. You need to prepare the conversation for planned deployment. The solution should ensure that the domain controller hosted in Azure always have the same IP address. Witch two actions should you perform? Each correct answer is a part of the solution.
Answer
  • From an Azure virtual machine run the Set-AzureStaticVNetIP cmdlet
  • Deploy a Side by side virtual private network (VPN)
  • From Azure virtual machine run the Set –NetIPAuthentication cmdlet
  • From an domain controller run the Set-NetIPAdresses cmdlet
  • From an domain controller run adprep.exe

Question 47

Question
Your network contains two Active Directory forests named adatum.com and contoso.com. Both forests contain multiple domains. A two-way trust exists between the forests. The contoso.com domain contains a domain local security group named Group1. Group1 contains Contoso\user1 and adatum\user1. You need to ensure that Group1 can only contain users from the contoso.com domain. Which three actions should you perform? To answer, move three actions from the list of actions to the answer area and arrange them in the correct order.
Answer
  • Remove adatum\user1 from Group 1
  • Remove contoso\user1 from Group 1
  • Convert Group 1 to a global group
  • Convert Group 1 to a distribution group
  • Convert Group 1 to a universal group

Question 48

Question
You run a Windows 2012 R2 Hyper-V Role Server, you need to shrink the size of files.vhd. Which PowerShell cmdlet option you should run first?
Answer
  • Dismount-VHD
  • Mount-VHD
  • Resize-VHD
  • Convert-VHD

Question 49

Question
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. One of the domain controllers is named DC1. The network contains a member server named Server1 that runs Windows Server 2012 R2. You need to promote Server1 to a domain controller by using install from media (IFM). What should you do first?
Answer
  • Create a system state backup of DC1.
  • Create IFM media on DC1.
  • Upgrade DC1 to Windows Server 2012 R2.
  • Run the Active Directory Domain Services Configuration Wizard on Server1.
  • Run the Active Directory Domain Services Installation Wizard on DC1.

Question 50

Question
Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees. You create a Group Policy object (GPO) named GP1. You link GP1 to the Employees OU. You need to ensure that GP1 does not apply to the members of a group named Managers. What should you configure?
Answer
  • The Security settings of Employees
  • The WMI filter for GP1
  • The Block Inheritance option for Employees
  • The Security settings of GP1
Show full summary Hide full summary

Similar

Exam 70-410: Installing and Configuring Windows Server 2012 R2
Mike M
Microsoft Exam 70-410: Volume1- Test 1
Alex Quito
Microsoft Exam 70-410: - Volume 2 - Test 2
Alex Quito
Microsoft Exam 70-410: - Volume 2 - Test 1
Alex Quito
70-410 - MCSA: Windows Server 2012 - Installing and Configuring - Exam 3
Mike M
70-410 - MCSA: Windows Server 2012 - Installing and Configuring - Exam 2
Mike M
70-410 - MCSA: Windows Server 2012 - Installing and Configuring - Exam 1
Mike M
Microsoft Exam 70-410: Volume 1- Test 4
Alex Quito
70 - 410 QUIZ 1 - VOLUME 2
saheed Tijani
Microsoft Exam 70-410: Volume 1- Test 2
Alex Quito
70-410 Disk and Volume Types
Kirsty Louise Jo