70 - 410 QUIZ 4 - VOLUME 3

Description

70-410 70-410 Quiz on 70 - 410 QUIZ 4 - VOLUME 3, created by saheed Tijani on 27/01/2016.
saheed Tijani
Quiz by saheed Tijani, updated more than 1 year ago
saheed Tijani
Created by saheed Tijani about 8 years ago
13
0

Resource summary

Question 1

Question
You run a Windows Server 2012 R2, what is the PowerShell command to set preferred dns server. Note: Other config such as ip address should not be changed.
Answer
  • Register-DnsClient
  • Set-DnsClient
  • Set-DnsPreferredClientServerAddress
  • Set-DnsClientServerAddress

Question 2

Question
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has five network adapters. Three of the network adapters are connected to a network named LAN1. The two other network adapters are connected to a network named LAN2. You need to create a network adapter team from the three network adapters connected to LAN1. Which tool should you use?
Answer
  • Routing and Remote Access
  • Network and Sharing Center
  • Server Manager
  • Network Load Balancing Manager

Question 3

Question
You have a virtual machine named VM1. You install Windows Server 2012 R2 on VM1. You plan to use VM1 as an image that will be distributed to sales users to demonstrate the features of a custom application. The custom application only requires the Web Server (IIS) server role to be installed. You need to ensure that the VHD file for VM1 only contains the required Windows Server 2012 R2 source files. Which tool should you use?
Answer
  • servermanagercmd.exe
  • dism.exe
  • ocsetup.exe
  • imagex.exe

Question 4

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. You need to log the amount of system resources used by each virtual machine. What should you do?
Answer
  • From Windows PowerShell, run the Enable-VMResourceMetering cmdlet.
  • From Windows System Resource Manager, enable Accounting.
  • From Windows System Resource Manager, add a resource allocation policy
  • From Windows PowerShell, run the Measure-VM cmdlet.

Question 5

Question
Which of the following is not a correct reason for creating an OU?
Answer
  • To create a permanent container that cannot be moved or renamed
  • To duplicate the divisions in your organization
  • To delegate administration tasks
  • To assign different Group Policy settings to a specific group of users or computers

Question 6

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. Subsequent to deploying a Server Core Installation of Windows Server 2012 on a new Contoso.com server, you are instructed to add a graphical user interface (GUI) to the server. You want to achieve this goal from the command prompt. Which of the following actions should you take?
Answer
  • You should consider making use of the dism.exe command
  • You should consider making use of the dsquery.exe command.
  • You should consider making use of the dsadd.exe command.
  • You should consider making use of the dsrm.exe command.

Question 7

Question
Your network contains a file server named Server1 that runs Windows Server 2012 R2. All client computers run Windows 8. Server1 contains a folder named Folder1. Folder1 contains the installation files for the company’s desktop applications. A network technician shares Folder1 as Share 1. You need to ensure that the share for Folder1 is not visible when users browse the network. What should you do?
Answer
  • From the properties of Folder1, deny the List Folder Contents permission for the Everyone group
  • From the properties of Folder1, remove Share1, and then share Folder1 as Share1$.
  • From the properties of Folder1, configure the hidden attribute
  • From the properties of Share1, configure access-based enumeration

Question 8

Question
You have a server named Server1 that has a Server Core installation of Windows Server 2008 R2. Server1 has the DHCP Server server role and the File Server server role installed. You need to upgrade Server1 to Windows Server 2012 R2 with the graphical user interface (GUI). The solution must meet the following requirements: Preserve the server roles and their configurations. Minimize administrative effort. What should you do?
Answer
  • On Server1, run setup.exe from the Windows Server 2012 R2 installation media and select Server with a GUI.
  • Start Server1 from the Windows Server 2012 R2 installation media and select Server Core Installation. When the installation is complete, add the Server Graphical Shell feature.
  • Start Server1 from the Windows Server 2012 R2 installation media and select Server with a GUI.
  • On Server1, run setup.exe from the Windows Server 2012 R2 installation media and select Server Core Installation. When the installation is complete, add the Server Graphical Shell feature

Question 9

Question
You have a domain controller named Server1 that runs Windows Server 2012 R2 and has the DNS Server server role installed. Server1 hosts a DNS zone named contoso.com and a GlobalNames zone. You discover that the root hints were removed from Server1. You need to view the default root hints of Server1. Which file should you open?
Answer
  • Netlogon.dns
  • Cache.dns
  • Globalnames.dns
  • Place.dns

Question 10

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You plan to create a shared folder. The shared folder will have a quota limit. You discover that when you run the New Share Wizard, you cannot select the SMB Share – Advanced option. You need to ensure that you can use SMB Share – Advanced to create the new share. What should you do on Server1 before you run the New Share Wizard?
Answer
  • Run the Set-SmbShare cmdlet.
  • Install the File Server Resource Manager role service
  • Configure Dynamic Access Control and Apply a central access policy.
  • Configure the Advanced system settings

Question 11

Question
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. You create a security template named Template1 by using the Security Templates snap-in. You need to apply Template1 to Server2. Which tool should you use
Answer
  • Authorization Manager
  • Local Security Policy
  • Certificate Templates
  • System Configuration

Question 12

Question
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains a server named Server1 that runs Windows Server 2012 R2. You need to ensure that when users log on to Server1, their user account is added automatically to a local group named Group1 during the log on process. Which Group Policy settings should you modify?
Answer
  • User Rights Assignment
  • Preferences
  • Security Options
  • Restricted Groups

Question 13

Question
Your network contains an active directory domain named contoso.com. The domain contains a domain controller named DCS. DCS has a server core installation of windows server 2012. You need to uninstall Active Directory from DCS manually. Which tool should you use?
Answer
  • The Remove-WindowsFeature cmdlet
  • the ntdsutil.exe command
  • the dsamain.exe command
  • the Remove-ADComputer cmdlet

Question 14

Question
A company has a forest with 4 sites. Subnets are as follows: MainOffice 172.16.1.0 Subnet: 255.255.255.0 Gateway 172.16.1.254 Site1 192.168.12.0 Subnet: 255.255.255.0 Site 2 192.168.13.0 Subnet: 255.255.255.0 Site 3 192.168.14.0 Subnet: 255.255.255.0 Site 4 192.168.15.0 Subnet: 255.255.255.0 You add a new server to the MainOffice and it needs to be able to communicate to all sites. Which route command would you run?
Answer
  • route add -p 192.168.8.0 netmask 255.255.252.0 172.16.1.254
  • route add -p 192.168.0.0 netmask 255.255.248.0 172.16.1.254
  • route add -p 192.168.12.0 netmask 255.255.252.0 172.16.1.254
  • route add -p 192.168.12.0 netmask 255.255.240.0 172.16.1.254

Question 15

Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed You are running a training exercise for junior administrators. You are currently discussing what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet. Which of the following describes the results of running this cmdlet?
Answer
  • It removes one or more network adapters from a specified NIC team.
  • It removes a team interface from a NIC team.
  • It removes a specified NIC team from the host.
  • It removes a network adapter member from a switch team

Question 16

Question
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 is a DHCP server that is configured to have a scope named Scope1. Server2 is configured to obtain an IP address automatically. In Scope1, you create a reservation named Res_Server2 for Server2. A technician replaces the network adapter on Server2. You need to ensure that Server2 can obtain the same IP address. What should you modify on Server1?
Answer
  • The Name Protection settings of Scope1
  • The MAC address of Res_Server2
  • The Advanced settings of Res_Server2
  • The Network Access Protection Settings of Scope1

Question 17

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. Contoso.com has a Hyper-V server, named ENSUREPASS-SR13, which hosts multiple virtual machines. You have enabled the use of Single-root I/O virtualization. Which of the following is TRUE with regards to using Single-root I/O virtualization? (Choose all that apply.)
Answer
  • It maximizes network throughput, while minimizing network latency
  • It maximizes network throughput, as well as network latency
  • It avoids the virtual switch stack and allows the virtual machine direct access to the actual network switch
  • It prevents the virtual machine from accessing the network switch directly.

Question 18

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. Contoso.com has a server, named ENSUREPASS-SR07, which has the AD DS, DHCP, and DNS server roles installed. Contoso.com also has a server, named ENSUREPASSSR08, which has the DHCP, and Remote Access server roles installed. You have configured a server, which has the File and Storage Services server role installed, to automatically acquire an IP address. The server is named ENSUREPASS-SR09. You then create a filter on ENSUREPASSSR07. Which of the following is a reason for this configuration?
Answer
  • To make sure that ENSUREPASS-SR07 issues ENSUREPASS-SR09 an IP address
  • To make sure that ENSUREPASS-SR07 does not issue ENSUREPASS-SR09 an IP address.
  • To make sure that ENSUREPASS-SR09 acquires a constant IP address from ENSUREPASS-SR08 only.
  • To make sure that ENSUREPASS-SR09 is configured with a static IP address

Question 19

Question
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. An application named Appl.exe is installed on all client computers. Multiple versions of Appl.exe are installed on different client computers. Appl.exe is digitally signed. You need to ensure that only the latest version of Appl.exe can run on the client computers. What should you create?
Answer
  • An application control policy packaged app rule
  • A software restriction policy certificate rule
  • An application control policy Windows Installer rule
  • An application control policy executable rule

Question 20

Question
Your network contains an Active Directory domain named contoso.com. The network contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed and has a primary zone for contoso.com. The Active Directory domain contains 500 client computers. There are an additional 20 computers in a workgroup. You discover that every client computer on the network can add its record to the contoso.com zone. You need to ensure that only the client computers in the Active Directory domain can register records in the contoso.com zone. What should you do first?
Answer
  • A. Move the contoso.com zone to a domain controller that is configured as a DNS server
  • Configure the Dynamic updates settings of the contoso.com zone
  • Sign the contoso.com zone by using DNSSEC
  • Configure the Security settings of the contoso.com zone.

Question 21

Question
Your network contains an Active Directory domain. The domain contains a server named Server28. The computer account of Server 28 is located in an organizational unit (OU) named OU1. A Group Policy object (GPO) named Application Restriction Policy is linked to OU1. The settings of the GPO are configured as shown in the GPO Settings exhibit. (Click the Exhibit button.) The Services console on Server28 is shown in the Services exhibit. (Click the Exhibit button.) Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.
Answer
  • Yes
  • Yes ..
  • No
  • Answers already in the image

Question 22

Question
Your network contains two subnets. The subnets are configured as shown in the following table. You have a server named Server1 that runs Windows Server 2012 R2. Server1 is connected to LAN1. You run the route print command as shown in the exhibit. (Click the Exhibit button.) You need to ensure that Server1 can communicate with the client computers on LAN2. What should you do?
Answer
  • Change the default gateway address.
  • Set the state of the Microsoft ISATAP Adapter #2 interface to disable
  • Change the metric of the 10.10.1.0 route
  • Set the state of the Teredo interface to disable.

Question 23

Question
Your company’s security policy states that all of the servers deployed to a branch office must not have the graphical user interface (GUI) installed. In a branch office, a support technician installs a server with a GUI installation of Windows Server 2012 on a new server, and then configures the server as a DHCP server. You need to ensure that the new server meets the security policy. You want to achieve this goal by using the minimum amount of Administrative effort. What should you do?
Answer
  • Reinstall Windows Server 2012 on the server
  • From Windows PowerShell, run Uninstall-WindowsFeature Desktop-Experience.
  • From Windows PowerShell, run Uninstall-WindowsFeature PowerShell-ISE.
  • From Server Manager, uninstall the User Interfaces and Infrastructure feature.

Question 24

Question
A company’s server deployment team needs to introduce many new Windows Server 2012 R2 domain controllers throughout the network into a single Windows Server 2008 R2 domain. The team has chosen to use Windows PowerShell. Which Windows PowerShell module includes the command-line options for installing domain controllers?
Answer
  • AD DS Administration cmdlets
  • AD DS Deployment cmdlets
  • AD CS Deployment cmdlets
  • AD CS Administration cmdlets

Question 25

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. Contoso.com has a domain controller, named ENSUREPASS-DC01, which has Windows Server 2012 R2 installed. Another Contoso.com domain controller, named ENSUREPASSDC02, has Windows Server 2008 R2 installed. You have deployed a server, named ENSUREPASS-SR15, on Contoso.com’s perimeter network. ENSUREPASSSR15 is running a Server Core Installation of Windows Server 2012 R2. You have been instructed to make sure that ENSUREPASS-SR15 is part of the Contoso.com domain. Which of the following actions should you take?
Answer
  • You should consider making use of Set-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15.
  • You should consider making use of Get-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15.
  • You should consider making use of Test-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15.
  • You should consider making use of Add-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15

Question 26

Question
You have external virtual switch with srv-io enabled with 10 Virtual Machines on it. You need to make the Virtual Machines able to talk only to each other.
Answer
  • remove the vswitch and recreate it as private.
  • add new vswitch
  • remove vswitch and recreate it as public
  • adjust srv-io settings

Question 27

Question
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. From Server2, you attempt to connect to Server1 by using Computer Management and you receive the following error message: "Computer\ \Server1 cannot be found. The network path was not found." From Server1, you successfully connect to Server2 by using Server Manager. You need to ensure that you can manage Server1 remotely from Server2 by using Computer Management. What should you configure? To answer, select the appropriate option in the answer area.
Answer
  • Windows firewall
  • Remote management
  • Remote desktop
  • NIC Teaming
  • Ethernet

Question 28

Question
Your network contains an Active Directory domain named adatum.com. The domain contains a file server named Server2 that runs Windows Server 2012 R2. Server2 contains a shared folder named Home. Home contains the home folder of each user. All users have the necessary permissions to access only their home folder. A user named User1 opens the Home share as shown in the exhibit. (Click the Exhibit button. You need to ensure that all users see only their own home folder when they access Home. What should you do from Server2?
Answer
  • From Windows Explorer, modify the properties of Home.
  • From Server Manager, modify the properties of the volume that contains Home.
  • From Windows Explorer, modify the properties of the volume that contains Home.
  • From Server Manager, modify the properties of Home

Question 29

Question
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named CONT1 and CONT2. Both servers run Windows Server 2012 R2. CONT1 has a shared printer named Printer1. CONT2 connects to Printer1 on CONT1. When you attempt to remove Printer1 from CONT2, you receive the error message shown in the exhibit. (Click the Exhibit button.) You successfully delete the other printers installed on CONT2. You need to identify what prevents you from deleting Printer1 on CONT2. What should you identify?
Answer
  • Printer1 is deployed as part of a mandatory profile
  • Printer1 is deployed by using a Group Policy object (GPO).
  • Your user account is not a member of the Print Operators group on CONT2.
  • Your user account is not a member of the Print Operators group on CONT1.

Question 30

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Web Server (US) server role installed. Server1 has a web site named Web1. Web1 is configured to use digest authentication. You need to ensure that a user named User1 can access Web1. What should you do from Active Directory Users and Computers?
Answer
  • From the properties of User1, select Store password using reversible encryption
  • From the properties of User1, select Use Kerberos DES encryption types for this account.
  • From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only).
  • From the properties of Server1, assign the Allowed to Authenticate permission to User1

Question 31

Question
Server1, you plan to create an inbound firewall rule that contains the following settings: Allows inbound connections to an application named App1.exe Applies to the domain profile Overrides any block rules You need to identify the minimum information required to create the rule. Which two pieces of information should you identify? Each correct answer presents part of the solution.
Answer
  • the list of computers that are authorized to use the application
  • the list of Active Directory users who are authorized to use the application
  • the hash of the application
  • the name of the IPSec policies that apply to Server1
  • the local path of the application

Question 32

Question
You have a server named Server1 that runs Windows Server 2012 R2. You apply a security policy to server1 by using the Security Configuration Wizard (CWM). You plan to roll back the security policy. You need to identify the settings that are prevented from rolling back running the CWM Witch settings should you identify.
Answer
  • The secure startup order
  • The outbound authentication methods
  • The network security rules
  • The system access control list

Question 33

Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. You are running a training exercise for junior administrators. You are currently discussing NIC Teaming. Which of the following is TRUE with regards to NIC Teaming? (Choose all that apply.)
Answer
  • It allows for traffic failover to prevent connectivity loss if a network component fails.
  • It prevents bandwidth aggregation
  • The Windows Server 2012 implementation of NIC Teaming supports a maximum of 5 NICs in a team.
  • The Windows Server 2012 implementation of NIC Teaming supports a maximum of 32 NICs in a team.

Question 34

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of two Active Directory forests, named Contoso.com and test.com. There is no trust relationship configured between the forests. A backup of Group Policy object (GPO) from the test.com domain is stored on a domain controller in the Contoso.com domain. You are informed that a GPO must be created in the Contoso.com domain, and must be based on the settings of the GPO in the test.com domain. You start by creating the new GPO using the New-GPO Windows PowerShell cmdlet. You want to complete the task via a Windows PowerShell cmdlet. Which of the following actions should you take?
Answer
  • You should consider making use of the Invoke-GPUpdate Windows PowerShell cmdlet.
  • You should consider making use of the Copy-GPO Windows PowerShell cmdlet
  • You should consider making use of the New-GPLink Windows PowerShell cmdlet
  • You should consider making use of the Import-GPO Windows PowerShell cmdlet.

Question 35

Question
Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts. Servers are restarted only occasionally. You need to identify which servers were restarted during the last two days. What should you do?
Answer
  • Run dsquery computer and specify the -stalepwd parameter
  • Run dsquery server and specify the -o parameter.
  • Run Get-ADComputer and specify the lastlogon property.
  • Run Get-ADComputer and specify the SearchScope parameter

Question 36

Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. You are running a training exercise for junior administrators. You are currently discussing spanned volumes. Which of the following is TRUE with regards to spanned volumes? (Choose all that apply.)
Answer
  • Spanned volumes do not provide fault tolerance
  • Spanned volumes are a fault tolerant solution.
  • You can extend a spanned volume onto a maximum of 16 dynamic disks.
  • You cannot create a spanned volume using a system volume or boot volume

Question 37

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. Contoso.com has a server, named ENSUREPASS-SR15, which is configured as a file server. You have received instructions to make sure that a user, named Mia Hamm, has the ability to generate a complete backup of ENSUREPASS-SR15 via Windows Server Backup. Which of the following actions should you take?
Answer
  • You should consider making use of Computer Management to configure the local groups.
  • You should consider making use of Computer Management to configure the domain local groups.
  • You should consider making use of Computer Management to configure the global groups
  • You should consider making use of Computer Management to configure the administrator groups

Question 38

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain have Windows Server 2012 R2 installed, while domain controllers have Windows Server 2008 R2 installed. You are then tasked with deploying a new Windows Server 2012 R2 domain controller. You are preparing to install the DNS Server role, and enable the global catalog server option. Which of the following actions should you take?
Answer
  • You should consider making use of Server Manager.
  • You should consider making use of the Active Directory Installation Wizard.
  • You should consider making use of the DHCP Installation Wizard
  • You should consider making use of TS Manager

Question 39

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. Contoso.com has a domain controller, named ENSUREPASS-DC01. You have been instructed to make sure that the Group Policy Administrative Templates are available centrally. Which of the following actions should you take?
Answer
  • You should consider copying the policies folder to the PolicyDefinitions folder in the Contoso.com domain’s SYSVOL folder.
  • You should consider copying the PolicyDefinitions folder to the policies folder in the Contoso.com domain’s SYSVOL folder.
  • You should consider copying the PolicyDefinitions folder to the policies folder in the Contoso.com domain’s systemroot folder
  • You should consider copying the PolicyDefinitions folder to the policies folder in the Contoso.com domain’s logonserver folder.

Question 40

Question
Your network contains an Active Directory domain named contoso.com. The domain contains three member servers. The servers are configured as shown in the following table. All client computers run Windows 8. All client computers receive updates from Server2. On Server3, you add a shared printer named Printer1. Printer1 uses a Type 4 driver that is not included in the Windows 8 installation media. You need to ensure that when users connect to the printer for the first time, the printer driver is installed automatically on their client computer. What should you do?
Answer
  • From the Windows Deployment Services console on Server1, add the driver package for Printer1.
  • From the Update Services console on Server2, import and approve updates.
  • From Windows PowerShell on Server3, run the Add-PrinterDriver cmdlet
  • From the Print Management console on Server3, add additional drivers for Printer1

Question 41

Question
You are attempting to delete a global security group in the Active Directory Users and Computers console, and the console will not let you complete the task. Which of the following could possibly be causes for the failure? (Choose all answers that are correct.)
Answer
  • There are still members in the group.
  • One of the group’s members has the group set as its primary group
  • You do not have the proper permissions for the container in which the group is located.
  • You cannot delete global groups from the Active Directory Users and Computers console.

Question 42

Question
In a domain running at the Windows Server 2012 R2 domain functional level, which of the following security principals can be members of a global group? (Choose all answers that are correct.)
Answer
  • Users
  • Computers
  • Universal groups
  • Global groups

Question 43

Question
A company’s server security team needs a solution that will prevent users from installing and using unauthorized applications on their Windows 8 desktop computers. Which technology should the team choose?
Answer
  • Starter GPOs
  • Group Policy Objects
  • Software Restriction Policies
  • AppLocker

Question 44

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 installed. Contoso.com has a server, named ENSUREPASS-SR07, which has four network adapters. Contoso.com has two SR07’s network adapters are connected to the one LAN, local area networks (LANs). Two of ENSUREPASS – while the other two are connected to the other LAN. You are required to configure one of the network adapter pairs into a network adapter team. Which of the following actions should you take?
Answer
  • You should consider accessing the Group Policy Management Console (GPMC) on ENSUREPASS-SR07.
  • You should consider accessing the TS Manager console on ENSUREPASS-SR07
  • You should consider accessing the Server Manager console on ENSUREPASS-SR07.
  • You should consider accessing the Remote Desktop Gateway Manager console on ENSUREPASS-SR07.

Question 45

Question
You have a server named Server1. Server1 runs Windows Server 2012 R2. A user named Admin1 is a member of the local Administrators group. You need to ensure that Admin1 receives a User Account Control (UAC) prompt when attempting to open Windows PowerShell as an administrator. Which setting should you modify from the Local Group Policy Editor? To answer, select the appropriate setting in the answer area.
Answer
  • Admin Approval mode
  • switch to secure desktop when prompting for elevation
  • Answer in the above image

Question 46

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. You have been instructed to add a new domain controller to Contoso.com’s existing environment. Which of the following actions should you take?
Answer
  • You should consider making use of Server Manager
  • You should consider making use of Authorization Manager
  • You should consider making use of Remote Desktop Gateway Manager.
  • You should consider making use of Network Load Balancing Manager

Question 47

Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing the use of Non-Uniform Memory Architecture (NUMA). Which of the following is TRUE with regards to Non-Uniform Memory Architecture (NUMA)? (Choose two.)
Answer
  • It is a computer architecture used in multiprocessor systems
  • It is a computer architecture used in single processor systems
  • It allows a processor to access local memory faster than it can access remote memory
  • It allows a processor to access remote memory faster than it can access local memory.

Question 48

Question
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled. You install the DHCP server role on a virtual machine named Server1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope. You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1. You need to ensure that the virtual machines can use Server1 as a DHCP server. What should you do?
Answer
  • Enable MAC address spoofing on Server1.
  • Enable single-root I/O visualization (SR-IOV) on Server1.
  • Disable the DHCP guard on Server1.
  • Disable the DHCP guard on all of the virtual machines that are DHCP clients

Question 49

Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. You have received instructions to install the Remote Desktop Services server role on a server, named ENSUREPASS-SR07. You want to achieve this remotely from a server, named ENSUREPASS-SR06. Which of the following actions should you take?
Answer
  • You should consider accessing the Server Manager console on ENSUREPASS-SR07
  • You should consider accessing the Server Manager console on ENSUREPASS-SR06.
  • You should consider accessing the TS Manager console on ENSUREPASS-SR07
  • You should consider accessing the TS Manager console on ENSUREPASS-SR06.

Question 50

Question
You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. You attach a 4-TB disk to Server1. The disk is configured as an MBR disk. You need to ensure that you can create a 4-TB volume on the disk. Which Diskpart command should you use?
Answer
  • Expand
  • Attach
  • Automount
  • Convert
Show full summary Hide full summary

Similar

Exam 70-410: Installing and Configuring Windows Server 2012 R2
Mike M
Microsoft Exam 70-410: Volume1- Test 1
Alex Quito
Microsoft Exam 70-410: - Volume 2 - Test 2
Alex Quito
Microsoft Exam 70-410: - Volume 2 - Test 1
Alex Quito
70-410 - MCSA: Windows Server 2012 - Installing and Configuring - Exam 2
Mike M
70-410 - MCSA: Windows Server 2012 - Installing and Configuring - Exam 3
Mike M
70-410 - MCSA: Windows Server 2012 - Installing and Configuring - Exam 1
Mike M
Microsoft Exam 70-410: Volume 1- Test 4
Alex Quito
70 - 410 QUIZ 1 - VOLUME 2
saheed Tijani
Microsoft Exam 70-410: Volume 1- Test 2
Alex Quito
70-410 Disk and Volume Types
Kirsty Louise Jo