Act now and download your Microsoft 70 410 dumps test today! Do not waste time for the worthless Microsoft mcp 70 410 tutorials. Download Abreast of the times Microsoft Installing and Configuring Windows Server 2012 exam with real questions and answers and begin to learn Microsoft vce 70 410 with a classic professional.

Q101. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

All of the AppLocker policy settings for the member servers are configured in a Group Policy object (GPO) named GPO1. 

A member server named Server1 runs Windows Server 2012 R2. 

On Server1, you test a new set of AppLocker policy settings by using a local computer policy. 

You need to merge the local AppLocker policy settings from Server1 into the AppLocker policy settings of GPO1. 

What should you do? 

A. From Local Group Policy Editor on Server1, export an .inf file. Import the .inf file by using Group Policy Management Editor. 

B. From Server1, run the Set-ApplockerPolicy cmdlet. 

C. From Local Group Policy Editor on Server1, export an .xml file. Import the .xml file by using Group Policy Management Editor. 

D. From Server1, run the New-ApplockerPolicy cmdlet. 

Answer:

Explanation: 

The Set-AppLockerPolicy cmdlet sets the specified Group Policy Object (GPO) to contain the specified AppLocker policy. If no Lightweight Directory Access Protocol (LDAP) is specified, the local GPO is the default. When the Merge parameter is used, rules in the specified AppLocker policy will be merged with the AppLocker rules in the target GPO specified in the LDAP path. The merging of policies will remove rules with duplicate rule IDs, and the enforcement setting specified by 

the AppLocker policy in the target GPO will be preserved. If the Merge parameter is not 

specified, then the new policy will overwrite the existing policy. 

References: 

http://technet.microsoft.com/en-us/library/ee791816(v=ws.10).aspx 

Exam Ref 70-410: Installing and configuring Windows Server 2012 R2, Chapter 10: 

Implementing Group Policy, Lesson1: Planning, Implementing and managing Group Policy, 

p. 479 


Q102. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2 and a client computer named Computer1 that runs windows 8. 

DC1 is configured as a DHCP server as shown in the exhibit. (Click the Exhibit button.) 

Computer1 is configured to obtain an IP address automatically. 

You notice that Computer1 is unable to obtain an IP address from DC1. 

You need to ensure that Computer1 can receive an IP address from DC1. 

What should you do? 

A. Disable the Allow filters. 

B. Disable the Deny filters. 

C. Authorize DC1.contoso.com. 

D. Activate Scope [10.1.1.0] Contoso.com. 

Answer:

Explanation: 

A red down arrow indicates an unauthorized DHCP server. A DHCP server that is a domain controller or a member of an Active Directory domain queries Active Directory for the list of authorized servers (identified by IP address). If its own IP address is not in the list of authorized DHCP servers, the DHCP Server service does not complete its startup sequence and automatically shuts down. 


Q103. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table. 

You need to recommend a solution to minimize the amount of disk space used for the checkpoint of VM1. 

What should you do before you create the checkpoint? 

A. Run the Resize-VHD cmdlet. 

B. Convert Disk1.vhd to a dynamically expanding disk. 

C. Shut down VM1. 

D. Run the Convert-VHD cmdlet. 

Answer:

Explanation: 

Changing between a fixed and dynamic disk type does not alter the size of a SNAPSHOT much at all. However, since a snapshot is a record of a VMs state at the exact time that the snapshot was taken, shutting down the VM before taking the snapshot prevents the snapshot from having to contain all of the data in RAM (as there is no data in memory when a machine is powered down). 

The question states that the solution should minimize the amount of disk space used for the checkpoint of VM1. If the checkpoint is taken while VM1 is running, there will be two attritional files present at the checkpoint location; a .VSV with VM1 saved state files and a .BIN file which contains VM1’s memory contents. If, however, VM1 is shut down first, these files will not be created, thus saving disk space. In order to convert Disk1.vhd to a dynamically expanding disk, VM1 still have to be shut down. 


Q104. HOTSPOT - (Topic 2) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 hosts 50 virtual machines. 

You need to create a script to list all of the virtual machines that have checkpoints and support Secure Boot. 

What should you do? To answer, select the appropriate options in the answer area. 

Answer: 


Q105. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The network contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed and has a primary zone for contoso.com. The Active Directory domain contains 500 client computers. There are an additional 20 computers in a workgroup. You discover that every client computer on the network can add its record to the contoso.com zone. 

You need to ensure that only the client computers in the Active Directory domain can register records in the contoso.com zone. 

What should you do first? 

A. Move the contoso.com zone to a domain controller that is configured as a DNS server 

B. Configure the Dynamic updates settings of the contoso.com zone 

C. Sign the contoso.com zone by using DNSSEC 

D. Configure the Security settings of the contoso.com zone. 

Answer:

Explanation: 

If you install DNS server on a non-DC, then you are not able to create AD-integrated zones. DNS update security is available only for zones that are integrated into AD DS. When you directory- integrate a zone, access control list (ACL) editing features are available in DNS Managerso that you can add or remove users or groups from the ACL for a specified zone or resource record. 

1. Active Directory’s DNS Domain Name is NOT a single label name (“DOMAIN” vs. the minimal requirement of”domain.com.” “domain.local”, etc.). 

2. The Primary DNS Suffix MUST match the zone name that is allowing updates. Otherwise the client doesn’t know what zone name to register in. You can also have a different Conneciton Specific Suffix in addition to the Primary DNS Suffix to register into that zone as well. 

3. AD/DNS zone MUST be configured to allow dynamic updates, whether Secure or Secure and Non-Secure. For client machines, if a client is not joined to the domain, and the zone is set to Secure, it will not register either. 

4. You must ONLY use the DNS servers that host a copy of the AD zone name or have a reference to get to them. Do not use your ISP’s, an external DNS address, your router as a DNS address, or any other DNS that does not have a copy of the AD zone. Internet resolution for your machines will be accomplished by the Rootservers (Root Hints), however it’s recommended to configure a forwarder for efficient Internet resolution. 

5. The domain controller is multihomed (which means it has more than one unteamed, active NIC, more than one IP address, and/or RRAS is installed on the DC). 

6. The DNS addresses configured in the client’s IP properties must ONLY reference the DNS server(s) hosting the AD zone you want to update in. This means that you must NOT use an external DNS in any machine’s IP property in an AD environment. You can’t mix them either. That’s because of the way the DNS Client side resolver service works. Even if you mix up internal DNS and ISP’s DNS addresses, the resolver algorithm can still have trouble asking the correct DNS server. It will ask the first one first. If it doesn’t get a response, it removes the first one from the eligible resolvers list and goes to the next in the list. It will not go back to the first one unless you restart the machine, restart the DNS Client service, or set a registry entry to cut the query TTL to 0. The rule is to ONLY use your internal DNS server(s) and configure a forwarder to your ISP’s DNS for efficient Internet resolution. This is the reg entry to cut the query to 0 TTL: The DNS Client service does not revert to using the first server. The Windows 2000 Domain Name System (DNS) Client service (DNS cache) follows a certain algorithm when it decides the order in which to use the DNS servers. http://support.microsoft.com/kb/286834 For more info, please read the following on the client side resolver service: DNS, WINS NetBIOS & the Client Side Resolver, Browser Service, Disabling NetBIOS, Direct Hosted SMB (Direct SMB), If One DC is Down Does a Client logon to Another DC, and DNS Forwarders Algorithm if you have multiple forwarders. 

http://msmvps.com/blogs/acefekay/archive/2009/11/29/dns-wins-netbios-amp-the-clientside- resolverbrowserservice-disabling-netbios-direct-hosted-smb-directsmb-if-one-dc-isdown-does-a- client-logon-toanother-dcand-dns-forwarders-algorithm.aspx 

7. For DHCP clients, DHCP Option 006 for the clients are set to the same DNS server. 

8. If using DHCP, DHCP server must only be referencing the same exact DNS server(s) in 

its own IP properties in order for it to ‘force’ (if you set that setting) registration into DNS. 

Otherwise, how would it know which DNS to send the reg data to? 

9. If the AD DNS Domain name is a single label name, such as “EXAMPLE”, and not the 

proper format of ”example.com” and/or any child of that format, such as 

“child1.example.com”, then we have a real big problem. 

DNS will not allow registration into a single label domain name. 

This is for two reasons: 

1. It’s not the proper hierarchal format. DNS is hierarchal, but a single label name has no 

hierarchy. It’s just a single name. 

2. Registration attempts cause major Internet queries to the Root servers. Why? Because it 

thinks the single label name, such as “EXAMPLE”, is a TLD (Top Level Domain), such as 

“com”, “net”, etc. It will now try to find what Root name server out there handles that TLD. 

In the end it comes back to itself and then attempts to register. Unfortunately it does NOT 

ask itself first for the mere reason it thinks it’s a TLD. (Quoted from Alan Woods, Microsoft, 

2004): 

“Due to this excessive Root query traffic, which ISC found from a study that discovered 

Microsoft DNS servers are causing excessive traffic because of single label names, 

Microsoft, being an internet friendly neighbor and wanting to stop this problem for their 

neighbors, stopped the ability to register into DNS with Windows 2000SP4, XP SP1, 

(especially XP, which cause lookup problems too), and Windows 2003. After all, DNS is 

hierarchal, so therefore why even allow single label DNS domain names?” The above also 

*especially* applies to Windows Vista, 7, 2008, 2008 R2, and newer. 

10. ‘Register this connection’s address” on the client is not enabled under the NIC’s IP 

properties, DNS tab. 

11. Maybe there’s a GPO set to force Secure updates and the machine isn’t a joined 

member of the domain. 

12. ON 2000, 2003 and XP, the “DHCP client” Service not running. In 2008/Vista and 

newer, it’s the DNS Client Service. This is a requirement for DNS registration and DNS 

resolution even if the client is not actually using DHCP. 

13. You can also configure DHCP to force register clients for you, as well as keep the DNS 

zone clean of old or duplicate entries. See the link I posted in my previous post. 


Q106. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. 

You create a new inbound rule by using Windows Firewall with Advanced Security. 

You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. 

Which setting in the rule should you configure? 

A. Interface types 

B. Authorized computers 

C. Remote IP address 

D. Edge traversal 

Answer:

Explanation: 

Edge traversal – This indicates whether edge traversal is enabled (Yes) or disabled (No). When edge traversal is enabled, the application, service, or port to which the rule applies is globally addressable and accessible from outside a network address translation (NAT) or edge device. 

Select one of the following options from the list: Block edge traversal (default) – Prevent applications from receiving unsolicited traffic from the Internet through a NAT edge device. Allow edge traversal – Allow applications to receive unsolicited traffic directly from the Internet through a NAT edge device. Defer to user – Let the user decide whether to allow unsolicited traffic from the Internet through a NAT edge device when an application requests it. Defer to application – Let each application determine whether to allow unsolicited traffic from the Internet through a NAT edge device. 

: http://technet.microsoft.com/en-us/library/cc731927.aspx 


Q107. - (Topic 3) 

Your company has a remote office that contains 1,600 client computers on a single subnet. You need to select a subnet mask for the network that will support all of the client 

computers. The solution must minimize the number of unused addresses. Which subnet mask should you select? 

A. 255.255.248.0 

B. 255.255.252.0 

C. 255.255.254.0 

D. 255.255.240.0 

Answer:


Q108. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1. 

Which tool should you use? 

A. File Server Resource Manager (FSRM) 

B. New-StoragePool 

C. Diskpart 

D. Share and Storage Management 

Answer:

Explanation: 

You can create a VHD from either the Disk Management snap-in or the command line (diskpart). From the DiskPart command-line tool at an elevated command prompt, run the create vdisk command and specify the file (to name the file) and maximum (to set the maximum size in megabytes) parameters. The following code demonstrates how to create a VHD file at C:\vdisks\disk1.vdh with a maximum file size of 16 GB (or 16,000 MB). DiskPart Microsoft DiskPart version 6.1.7100 Copyright (C) 1999-2008 Microsoft Corporation. On computer: WIN7 DISKPART> create vdisk file="C:\vdisks\disk1.vhd" maximum=16000 


Q109. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains an application server named Server1. Server1 runs Windows Server 2012 R2. 

You have a client application named App1 that communicates to Server1 by using dynamic TCP ports. 

On Server1, a technician runs the following command: 

New-NetFirewallRule -DisplayNameAllowDynamic -Direction Outbound -LocalPort 1024-65535 -Protocol TCP. Users report that they can no longer connect to Server1 by using Appl. 

You need to ensure that App1 can connect to Server1. 

What should you run on Server1? 

A. Set-NetFirewallRule -DisplayNameAllowDynamic -Action Allow 

B. netshadvfirewall firewall add rule name=allowdynamic action-allow 

C. netshadvfirewall firewall set rule name-allowdynamic new action- allow 

D. Set-NetFirewallRule -DisplayNameAllowDynamic -Direction Inbound 

Answer:

Explanation: 

When using the using the Windows Firewall with Advanced Security console. You can select the Inbound Rules node and scroll down in the list, you can see nine different Network Discovery rules. The Direction Inbound rule is the rule that will allow App1 to connect to Server1. 

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 6: Create and manage Group Policy, Objective 6.4: Configure Windows Firewall, p. 348 Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 269 


Q110. - (Topic 1) 

Your network contains an Active Directory forest. The forest contains a single domain named contoso.com. The domain contains four domain controllers. The domain controllers are configured as shown in the following table. 

All domain controllers are DNS servers. 

You plan to deploy a new domain controller named DC5 in the contoso.com domain. 

You need to identify which domain controller must be online to ensure that DC5 can be promoted successfully to a domain controller. 

Which domain controller should you identify? 

A. DC1 

B. DC2 

C. DC3 

D. DC4 

Answer:

Explanation: 

Relative ID (RID) Master: Allocates active and standby RID pools to replica domain controllers in the same domain. (corp.contoso.com). Must be online for newly promoted domain controllers to obtain a local RID pool that is required to advertise or when existing domain controllers have to update their current or standby RID pool allocation. The RID master is responsible for processing RID pool requests from all domain controllers in a particular domain. When a DC creates a security principal object such as a user or group, it attaches a unique Security ID (SID) to the object. This SID consists of a domain SID (the same for all SIDs created in a domain), and a relative ID (RID) that is unique for each security principal SID created in a domain. Each DC in a domain is allocated a pool of RIDs that it is allowed to assign to the security principals it creates. When a DC’s allocated RID pool falls below a threshold, that DC issues a request for additional RIDs to the domain’s RID master. The domain RID master responds to the request by retrieving RIDs from the domain’s unallocated RID pool and assigns them to the pool of the requesting DC At any one time, there can be only one domain controller acting as the RID master in the domain. 

The Infrastructure Master – The purpose of this role is to ensure that cross-domain object references are correctly handled. For example, if you add a user from one domain to a security group from a different domain, the Infrastructure Master makes sure this is done properly. As you can guess however, if your Active Directory deployment has only a single domain, then the Infrastructure Master role does no work at all, and even in a multi-domain environment it is rarely used except when complex user administration tasks are performed, so the machine holding this role doesn’t need to have much horsepower at all.