Ucertify offers free demo for exam collections 70 410 exam. "Installing and Configuring Windows Server 2012", also known as 70 410 pdf exam, is a Microsoft Certification. This set of posts, Passing the Microsoft 70 410 exam dumps exam, will help you answer those questions. The exam 70 410 pdf Questions & Answers covers all the knowledge points of the real exam. 100% real Microsoft 70 410 exam dumps exams and revised by experts!

Q261. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. 

You create a software restriction policy to allow an application named App1 by using a certificate rule. You need to ensure that when users attempt to execute App1, the certificate for App1 is 

verified against a certificate revocation list (CRL). What should you do? 

A. Modify the rule for App1. 

B. Modify the Trusted Publishers Properties. 

C. Create a new certificate rule for App1. 

D. Modify the Enforcement Properties. 

Answer:


Q262. - (Topic 3) 

Which of the following is not a type of user account that can be configured in Windows Server 2012 R2? 

A. local accounts 

B. domain accounts 

C. network accounts 

D. built-in accounts 

Answer:

Explanation: 

A. Incorrect: Local accounts can be created and configured in Windows Server 2012 R2. 

B. Incorrect: Domain accounts can be created and configured in Windows Server 2012 R2. 

C. Correct: Three types of user accounts can be created and configured in Windows Server 2012: local accounts, domain accounts, and built-in user accounts. 

D. Incorrect: Built-in accounts can be created and configured in Windows Server 2012 R2. 


Q263. - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. You add a 4-TB disk named Disk 5 to Server1. 

You need to ensure that you can create a 3-TB volume on Disk 5. 

What should you do? 

A. Create a storage pool. 

B. Convert the disk to a dynamic disk 

C. Create a VHD, and then attach the VHD. 

D. Convert the disk to a GPT disk. 

Answer:

Explanation: 

MBR max is 2TB, the disk must be GPT For any hard drive over 2TB, we need to use GPT partition. If you have a disk larger than 2TB size, the rest of the disk space will not be used unless you convert it to GPT. An existing MBR partition can’t be converted to GPT unless it is completely empty; you must either delete everything and convert or create the partition as GPT. It is not possible to boot to a GPT partition, impossible to convert MBR to GPT without data loss. 


Q264. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. 

The domain contains an organizational unit (OU) named OU1 as shown in the OU1 exhibit. (Click the Exhibit button.) 

The membership of Group1 is shown in the Group1 exhibit. (Click the Exhibit button.) 

You configure GPO1 to prohibit access to Control Panel. GPO1 is linked to OU1 as shown in the GPO1 exhibit. (Click the Exhibit button.) 

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point. 

Answer: 


Q265. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing connection security rules. 

Which of the following is TRUE with regards to connection security rules? (Choose all that apply.) 

A. Connection security rules allows for traffic to be secured via IPsec. 

B. Connection security rules do not allow the traffic through the firewall. 

C. Connection security rules are applied to programs or services. 

D. Connection security rules are applied between two computers. 

Answer: A,B,D 

Explanation: 

Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity, and, optionally, data encryption. How firewall rules and connection security rules are related Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with IPsec, you can create Computer Connection Security rules. However, the creation of a connection security rule does not allow the traffic through the firewall. You must create a firewall rule to do this, if the traffic is not allowed by the default behavior of the firewall. Connection security rules are not applied to programs or services; they are applied between the computers that make up the two endpoints. 


Q266. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2 and a client computer named Computer1 that runs windows 8. 

DC1 is configured as a DHCP server as shown in the exhibit. (Click the Exhibit button.) 

Computer1 is configured to obtain an IP address automatically. 

You notice that Computer1 is unable to obtain an IP address from DC1. 

You need to ensure that Computer1 can receive an IP address from DC1. 

What should you do? 

A. Disable the Allow filters. 

B. Disable the Deny filters. 

C. Authorize DC1.contoso.com. 

D. Activate Scope [10.1.1.0] Contoso.com. 

Answer:

Explanation: 

A red down arrow indicates an unauthorized DHCP server. A DHCP server that is a domain controller or a member of an Active Directory domain queries Active Directory for the list of authorized servers (identified by IP address). If its own IP address is not in the list of authorized DHCP servers, the DHCP Server service does not complete its startup sequence and automatically shuts down. 


Q267. - (Topic 3) 

You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. You attach a 4-TB disk to Server1. 

The disk is configured as an MBR disk. You need to ensure that you can create a 4-TB volume on the disk. 

Which Diskpart command should you use? 

A. Expand 

B. Attach 

C. Automount 

D. Convert 

Answer:

Explanation: 

Explanation: You can use Diskpart to convert a basic disk to a dynamic disk. The basic disk can either be empty or contain either primary partitions or logical drives. The basic disk can be a data disk or system or boot drive. A MBR file structure is only capable of 2TB maximum. The disk will have to be converted to a GPT file structure. GPT is capable of 18 exabytes volumes. Convert gpt – Converts an empty basic disk with the master boot record (MBR) partition style into a basic disk with the GUID partition table (GPT) partition style. The disk may be a basic or a dynamic disk but it must not contain any valid data partitions or volumes. 


Q268. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. 

You are running a training exercise for junior administrators. You are currently discussing Storage Spaces. 

Which of the following is TRUE with regards to Storage Spaces? 

A. Mirroring and parity are optional resilient storage modes of Storage Spaces. 

B. Failover clustering is not supported by Storage Spaces. 

C. Storage spaces are virtual disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning. 

D. Storage spaces are a collection of physical disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning. 

Answer: A,C 


Q269. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 has a virtual switch named RDS Virtual. 

You replace all of the network adapters on Server1 with new network adapters that support single-root I/O visualization (SR-IOV). 

You need to enable SR-IOV for all of the virtual machines on Server1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On each virtual machine, modify the Advanced Features settings of the network adapter. 

B. Modify the settings of the RDS Virtual virtual switch. 

C. On each virtual machine, modify the BIOS settings. 

D. Delete, and then recreate the RDS Virtual virtual switch. 

E. On each virtual machine, modify the Hardware Acceleration settings of the network adapter. 

Answer: D,E 

Explanation: 

The first step when allowing a virtual machine to have connectivity to a physical network is to create an external virtual switch using Virtual Switch Manager in Hyper-V Manager. The additional step that is necessary when using SR-IOV is to ensure the checkbox is checked when the virtual switch is being created. It is not possible to change a “non SR-IOV mode” external virtual switch into an “SR-IOV mode” switch. The choice must be made a switch creation time. Thus you should first delete the existing virtual switch and then recreate it. 

E: Once a virtual switch has been created, the next step is to configure a virtual machine. 

SR-IOV in Windows Server “8” is supported on x64 editions of Windows “8” as a guest operating system (as in Windows “8” Server, and Windows “8” client x64, but not x86 client).We have rearranged the settings for a virtual machine to introduce sub-nodes under a network adapter, one of which is the hardware acceleration node. At the bottom is a checkbox to enable SR-IOV. 


Q270. - (Topic 3) 

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has following hardware configurations: 

-16GB of RAM 

-A single quad-core CPU 

-Three network teams that have two network adapters each 

You add additional CPUs and RAM to Server 1. 

You repurpose Server1 as a virtualization host. You install the Hyper-V server role on Server1. You need to create four external virtual switches in Hyper-V. Which cmdlet should you run first? 

A. Set-NetAdapter. 

B. Add-Net1.bfoTeamNic 

C. Add-VMNetworkAdapter 

D. Remove-NetLbfoTeam 

Answer: