This is the finest service of Testking so that it attracts countless new and also old customers. Testking can be run by professors who have vast experience inside IT world. They are committed to offering IT exam practice materials and also developing excellent instruments for the candidates. Numerous customers have passed many certification exam under the guidance of Testking. And also they suggest their close friends or colleagues or family members consider help through Testking. That is why all of us enjoy this type of high status. Testking continues to success is the result customers support and referrals. It really is Testkings efficient and also official practice materials in which makes the candidates dont face any kind of difficulty.

2021 Mar 70-410 test engine

Q111. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the 

installation fails repeatedly. 

You need to ensure that the feature can be installed on Server1. 

What should you do? 

A. Run the Add-AppxProvisionedPackage cmdlet. 

B. Remove the .NET Framework 4.5 Features feature. 

C. Connect Server1 to the Internet. 

D. Install the Web Server (IIS) server role. 

Answer:

Explanation: 

The files needed are no longer available on the local Hard drive. We need to connect the server to the Internet. Important to note that when starting with Windows Server 2012 R2 and Windows 8, the feature files for .NET Framework 3.5 (which includes .NET Framework 2.0 and .NET Framework 3.0) are not available on the local computer by default. The files have been removed. Files for features that have been removed in a Features on Demand configuration, along with feature files for .NET Framework 3.5, are available through Windows Update. By default, if feature files are not available on the destination server that is running Windows Server 2012 R2 R2 Preview or Windows Server 2012 R2, the installation process searches for the missing files by connecting to Windows Update. You can override the default behavior by configuring a Group Policy setting or specifying an alternate source path during installation, whether you are installing by using the Add Roles and Features Wizard GUI or a command line. 

References: Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 2: Configure server roles and Features, p. 117 Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80 


Q112. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 installed. 

You have been instructed to modify the name of the local Administrator account on all Contoso.com workstations. You want to achieve this using as little administrative effort as possible. 

Which of the following actions should you take? 

A. You should consider configuring the Security Options settings via the Group Policy Management Console (GPMC). 

B. You should consider navigating to Local Users and Groups via Computer 

C. You should consider configuring the replication settings. 

D. You should consider navigating to Local Users and Groups via Computer Management on each workstation. 

Answer:

Explanation: 

Rename administrator account policy setting determines whether a different account name is associated with the security identifier (SID) for the Administrator account. Because the Administrator account exists on all Windows server versions, renaming the account makes it slightly more difficult for attackers to guess this user name and password combination. By default, the built-in Administrator account cannot be locked out no matter how many times a malicious user might use a bad password. This makes the Administrator account a popular target for brute-force password-guessing attacks. The value of this countermeasure is lessened because this account has a well-known SID and there are non-Microsoft tools that allow you to initiate a brute-force attack over the network by specifying the SID rather than the account name. This means that even if you have renamed the Administrator account, a malicious user could start a brute-force attack by using the SID. Rename the Administrator account by specifying a value for the Accounts: Rename administrator account policy setting. Location: GPO_name\Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options 


Q113. DRAG DROP - (Topic 3) 

Your company has a main office that contains 225 client computers. The client computers are located on a subnet that uses the network ID of 10.10.1.0/24. 

The company plans to open two branch offices. The offices will be configured as shown in the following table. 

You need to select a network prefix for each office to ensure that there are enough IPv4 addresses for each client computer. 

The solution must minimize the number of unused IP addresses. 

Which network prefixes should you select? 

To answer, drag the appropriate network prefix to the correct branch office in the answer area. 

Answer: 


Q114. - (Topic 3) 

On Server1, you plan to create an inbound firewall rule that contains the following settings: 

Allows inbound connections to an application named App1.exe 

Applies to the domain profile 

Overrides any block rules 

You need to identify the minimum information required to create the rule. 

Which two pieces of information should you identify? Each correct answer presents part of the solution. 

A. the list of computers that are authorized to use the application 

B. the list of Active Directory users who are authorized to use the application 

C. the hash of the application 

D. the name of the IPSec policies that apply to Server1 

E. the local path of the application 

Answer: A,E 


Q115. - (Topic 2) 

Your network contains three servers that run Windows Server 2012 R2. The servers are configured as shown in the following table. 

Server3 is configured to obtain an IP address automatically. 

You need to prevent Server3 from receiving an IP address from Server1. 

What should you create on Server1? 

A. A reservation 

B. A filter 

C. A scope option 

D. An exclusion 

Answer:

Explanation: 

A. For clients that require a constant IP address 

B. Filter to exclude MAC address of Server3 

C. Range of allowed IP’s to be assigned 

D. Exclude range of IP’s MAC address based filtering ensure that only a known set of devices in the system are able to obtain an IPAddress from the DHCP Reservation and Exclusion, two incredibly different concepts. An exclusion is an address or range of addresses taken from a DHCP scope that the DHCP server is not allowed to hand out. For example, if you have set a DHCP server to exclude the address range 192.168.0.1-192.168.0.10 then the only way a computer on your network would get an address of 192.168.0.4 would be if you assigned it statically on that machine. This is because DHCP knows NOT to give this range of IP addresses out. A reservation is a specific IP addresses that is tied to a certain device through its MAC address. For example, if we have a workstation on the network that requires a certain IP address, but we don’t want to go through to trouble of assigning it statically, then we can create a reservation for it. So if the MAC address of the NIC on the computer is AA-BB-00FF-CC-AA and we want it to maintain the IP address of 192.168.0.100 then we would create a DHCP reservation under that particular scope saying that the IP address 

192.168.0.100 is reserved only for the MAC address AA-BB-00-FF-CC-AA. Reference: http://technet.microsoft.com/en-us/magazine/ff521761.aspx 


Most up-to-date 70-410 practice question:

Q116. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 has 8 GB of RAM. 

Server1 hosts five virtual machines that run Windows Server 2012 R2. 

The settings of a virtual machine named Server3 are configured as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that when Server1 restarts, Server3 automatically resumes without intervention. The solution must prevent data loss. 

Which settings should you modify? 

A. BIOS 

B. Automatic Start Action 

C. Automatic Stop Action 

D. Integration Services 

Answer:

Explanation: 

The Automatic Stop Action setting should be modified because it will allow you to configure: “Save the virtual machine state” option instructs Hyper-V Virtual Machine Management Service to save the virtual machine state on the local disk when the Hyper-V Server shuts down. OR “Turn Off the virtual machine” is used by the Hyper-V Management Service (VMMS.exe) to gracefully turn off the virtual machine. OR “Shut down the guest operating system” is successful only if the “Hyper-V Shutdown” guest service is running in the virtual machine. The guest service is required to be running in the virtual machine as the Hyper-V VMMS.EXE process will trigger Windows Exit message which is received by the service. Once the message is received by the guest service, it takes the necessary actions to shut down the virtual machine. 

: http://www.altaro.com/hyper-v/hyper-v-automatic-start-and-stop-action/ 


Q117. HOTSPOT - (Topic 3) 

Your network contains a domain controller named dc5.adatum.com that runs Windows 

Server 2012 R2. 

You discover that you can connect successfully to DC5 over the network, but you receive a 

request timed out message when you attempt to ping DC5. 

You need to configure DC5 to respond to ping request. 

Which firewall rule should you modify on DC5? To answer, select the appropriate rule in 

the answer area. 

Answer: 


Q118. - (Topic 3) 

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

ABC.com has a domain controller, named ABC-DC01, which contains the ABC.com domain’s primary DNS zone. ABC.com’s workstations refer to ABC-DC01 as their primary DNS server. 

You have been instructed to make sure that any DNS requests that are not for the ABC.com domain, is resolved by ABC-DC01 querying the DNS server of ABC.com’s Internet Service Provider (ISP). 

Which of the following actions should you take? 

A. You should consider configuring a reverse lookup zone. 

B. You should consider configuring forward lookup zone. 

C. You should consider configuring Forwarders. 

D. You should consider configuring 019 IP Layer Forwarding. 

Answer:

Explanation: 

A forwarder is a Domain Name System (DNS) server on a network that forwards DNS queries for external DNS names to DNS servers outside that network. You can also forward queries according to specific domain names using conditional forwarders. You designate a DNS server on a network as a forwarder by configuring the other DNS servers in the network to forward the queries that they cannot resolve locally to that DNS server. By using a forwarder, you can manage name resolution for names outside your network, such as names on the Internet, and improve the efficiency of name resolution for the computers in your network. 


Q119. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

Contoso.com has a server, named ENSUREPASS-SR13, which is configured as the primary DNS server in the Contoso.com domain. Contoso.com has another server, named ENSUREPASS-SR14, which makes use of ENSUREPASSSR13 for DNS queries. 

You want to make sure that running nslookup.exe from ENSUREPASS-SR14 produces a result that shows the proper name of the default server. 

Which of the following actions should you take? 

A. You should consider creating a reverse lookup zone on ENSUREPASS-SR14. 

B. You should consider creating a forward lookup zone on ENSUREPASS-SR14. 

C. You should consider creating a reverse lookup zone on ENSUREPASS-SR13. 

D. You should consider creating a forward lookup zone on ENSUREPASS-SR13. 

Answer: C

Explanation: 

When you start Nslookup from a command line, the following error message may be displayed: DNS request timed out timeout was x seconds Can’t find server name for address xxx.xxx.xxx.xxx: Timed out Default servers are not available Default Server: UnKnown Address: xxx.xxx.xxx.xxx where xxx.xxx.xxx.xxx is the Internet Protocol (IP) address of the host on which you are attempting to start Nslookup. CAUSE When Nslookup starts, it attempts to resolve the IP address of its host’s DNS server to its fully qualified domain name (FQDN). If the DNS server does not respond or if the DNS server’s reverse lookup zones do not contain a PTR record for the DNS server’s IP address, the error message is displayed. 


Q120. - (Topic 1) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 has the virtual switches listed in the following table. 

You create a virtual machine named VM1.VM1 has two network adapters. One network adapter connects to vSwitch1. The other network adapter connects to vSwitch2.You configure NIC teaming on VM1. 

You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the network. 

What should you do on Server1? 

A. Run the Set-VmNetworkAdaptercmdlet. 

B. Add a new network adapter to VM1. 

C. Create a new virtual switch on Server 1. 

D. Modify the properties of vSwitch1 and vSwitch2. 

Answer: