Microsoft Microsoft exam can be handed with a substantial score under the actual help regarding Testkings 70-410 exam dumps. Our specialists are sure to make you effective in the Microsoft 70-410 actual exam. On Testkings property page you will find the most up-to-date 70-410 70-410 exam questions and accurate answers. Our Microsoft 70-410 exam dumps benefit you a lot in the preparation from the Microsoft exam.

2021 Jan 70-410 testing engine

Q41. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a DHCP server named Server1that runs Windows Server 2012 R2. 

You create a DHCP scope named Scope1. The scope has a start address of 192168.1.10, an end address of 192.168.1.50, and a subnet mask of 255.255.255.192. 

You need to ensure that Scope1 has a subnet mask of 255.255.255.0. What should you do first? 

A. From Windows PowerShell, run the Remove-DhcpServerv4PolicyIPRange cmdlet. 

B. From the DHCP console, modify the Scope Options of Scope1. 

C. From Windows PowerShell, run the Remove-DhcpServerv4Scope cmdlet. 

D. From Windows PowerShell, run the Set-DhcpServerv4Scope cmdlet. 

Answer:

Explanation: 

. Set-DhcpServerv4Scope Sets the properties of an existing IPv4 scope on the Dynamic Host Configuration Protocol (DHCP) server service. 

. Syntax: Parameter Set: WithoutRange Set-DhcpServerv4Scope [-ScopeId] <IPAddress> [-ActivatePolicies <Boolean> ] [-AsJob] [-CimSession <CimSession[]> ] [-ComputerName <String> ] [-Delay <UInt16> ] [-Description <String> ] [-LeaseDuration <TimeSpan> ] [-MaxBootpClients <UInt32> ] [-Name <String> ] [-NapEnable <Boolean> ] [-NapProfile <String> ] [-PassThru] [-State <String> ] [-SuperscopeName <String> ] [-ThrottleLimit <Int32> ] [-Type <String> ] [-Confirm] [-WhatIf] [ <CommonParameters>] Parameter Set: WithRange Set-DhcpServerv4Scope [-ScopeId] <IPAddress> -EndRange <IPAddress> -StartRange <IPAddress> [-ActivatePolicies <Boolean> ] [-AsJob] [-CimSession <CimSession[]> ] [-ComputerName <String> ] [-Delay <UInt16> ] [-Description <String> ] [-LeaseDuration <TimeSpan> ] [-MaxBootpClients <UInt32> ] [-Name <String> ] [-NapEnable <Boolean> ] [-NapProfile <String> ] [-PassThru] [-State <String> ] [-SuperscopeName <String> ] [-ThrottleLimit <Int32> ] [-Type <String> ] [-Confirm] [-WhatIf] [ <CommonParameters>] 


Q42. HOTSPOT - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Hyperv1 and a domain controller named DC1. Hyperv1 has the Hyper-V server role installed. DC1 is a virtual machine on Hyperv1. 

Users report that the time on their client computer is incorrect. 

You log on to DC1 and verify that the time services are configured correctly. 

You need to prevent time conflicts between the time provided by DC1 and other potential 

time sources. 

What should you configure? 

To answer, select the appropriate object in the answer area. 

Answer: 


Q43. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. HVServer1 hosts two virtual machines named Server1 and Server2. Both virtual machines connect to a virtual switch named Switch1. 

On Server2, you install a network monitoring application named App1. 

You need to capture all of the inbound and outbound traffic to Server1 by using App1. 

Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.) 

A. Get-VM “Server2 | Set-VMNetworkAdapter -IovWeight 1 

B. Get-VM “Server1 | Set-VMNetworkAdapter -Allow/Teaming On 

C. Get-VM “Server1 | Set-VMNetworkAdapter -PortMirroring Source 

D. Get-VM “Server2 | Set-VMNetworkAdapter -PortMirroring Destination 

E. Get-VM “Server1 | Set-VMNetworkAdapter -IovWeight 0 

F. Get-VM “Server2 | Set-VMNetworkAdapter-AllowTeaming On 

Answer: C,D 


Q44. - (Topic 2) 

You plan to deploy a file server to a temporary location. 

The temporary location experiences intermittent power failures. 

The file server will contain a dedicated volume for shared folders. 

You need to create a volume for the shared folders. The solution must minimize the 

likelihood of file corruption if a power failure occurs. 

Which file system should you use? 

A. NFS 

B. FAT32 

C. ReFS 

D. NTFS 

Answer:

Explanation: 

The ReFS file system allows for resiliency against corruptions with the option to salvage amongst many other key features like Metadata integrity with checksums, Integrity streams with optional user data integrity, and shared storage pools across machines for additional failure tolerance and load balancing, etc. 


Q45. - (Topic 3) 

Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012 R2. 

A one-way external trust exists between contoso.com and adatum.com. 

Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com. 

What should you do? 

A. Modify the Managed By settings of Group1. 

B. Modify the Allowed to Authenticate permissions in adatum.com. 

C. Change the type of Group1 to distribution. 

D. Modify the name of Group1. 

Answer:

Explanation: 

* Accounts that require access to the customer Active Directory will be granted a special right called Allowed to Authenticate. This right is then applied to computer objects (Active Directory domain controllers and AD RMS servers) within the customer Active Directory to which the account needs access. 

* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest. 


Avant-garde 70-410 answers:

Q46. HOTSPOT - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. 

From Server2, you attempt to connect to Server1 by using Computer Management and you receive the following error message: "Computer\ \Server1 cannot be found. The network path was not found." 

From Server1, you successfully connect to Server2 by using Server Manager. 

You need to ensure that you can manage Server1 remotely from Server2 by using Computer Management. 

What should you configure? To answer, select the appropriate option in the answer area. 

Answer: 


Q47. DRAG DROP - (Topic 3) 

You have a print server named Server1Server1 runs Windows Server 2008 R2. You have a file server named Server2. Server2 runs Windows Server 2012 R2. 

You need to migrate all of the printers on Server1 to Server2. 

Which actions should you perform on the servers? 

To answer, drag the appropriate action to the correct servers in the answer area. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q48. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table. 

You plan to create a snapshot of VM1. You need to recommend a solution to minimize the amount of disk space used for the snapshot of VM1. What should you do before you create the snapshot? 

A. Run the Stop-VM cmdlet. 

B. Run the Convert-VHD cmdlet. 

C. Decrease the Maximum RAM 

D. Decrease the Minimum RAM. 

Answer:

Explanation: 

What are virtual machine snapshots? 

Virtual machine snapshots capture the state, data, and hardware configuration of a running 

virtual machine. 

What are snapshots used for? 

Snapshots provide a fast and easy way to revert the virtual machine to a previous state. 

For this reason, virtual machine snapshots are intended mainly for use in development and 

test environments. Having an easy way to revert a virtual machine can be very useful if you 

need to recreate a specific state or condition so that you can troubleshoot a problem. 

There are certain circumstances in which it may make sense to use snapshots in a 

production environment. 

For example, you can use snapshots to provide a way to revert a potentially risky operation 

in a production environment, such as applying an update to the software running in the 

virtual machine. 

How are snapshots stored? 

Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly 

consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V 

in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located 

in the same folder as the virtual machine by default. In Hyper- V in Windows Server 2008 

R2, the files usually are located in the same folder as the virtual hard disk. The following 

exceptions affect the location of the snapshot data files: If the virtual machine was imported 

with snapshots, they are stored in their own folder. If the virtual machine has no snapshots 

and you configure the virtual machine snapshot setting, all snapshots you take afterwards 

will be stored in the folder you specify. 

http://technet.microsoft.com/pt-pt/library/dd560637%28v=ws.10%29.aspx 

Reducing the available RAM for the VM would reduce the size of the snapshot, what better 

than have the machine turn off, not using any memory. 


Q49. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. 

You log on to Server1. 

You need to retrieve a list of the active TCP connections on Server2. 

Which command should you run from Server1? 

A. winrm get server2 

B. netstat> server2 

C. dsquery * -scope base -attrip, server2 

D. winrs -r:server2 netstat 

Answer:

Explanation: 

This command line tool enables administrators to remotely execute most Cmd.exe commands using the WSManagement protocol. 


Q50. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that hosts the primary DNS zone for contoso.com. 

All client computers are configured to use DC1 as the primary DNS server. 

You need to configure DC1 to resolve any DNS requests that are not for the contoso.com zone by querying the DNS server of your Internet Service Provider (ISP). 

What should you configure? 

A. Naming Authority Pointer (NAPTR) DNS resource records (RR) 

B. Name server (NS) records 

C. A Forwarders 

D. Conditional forwarders 

Answer:

Explanation: 

On a network with several servers and/or client computers a server that is configured as a forwarder will manage the Domain Name System (DNS) traffic between your network and the Internet.