We provide real 70 410 exam questions and answers pdf exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft 70 410 dumps Exam quickly & easily. The 70 410 pdf PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 70 410 vce dumps pdf and vce product and material, you can easily pass the microsoft 70 410 exam.

Q1. - (Topic 3) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You plan to enable Hyper-V Network Virtualization on Server1. 

You need to install the Windows Network Visualization Filter Driver on Server1. 

Which Windows PowerShell cmdlet should you run? 

A. Set-NetVirtualizationGlobal 

B. Enable-NetAdapterBinding 

C. Add - WindowsFeature 

D. Set-NetAdapterVmq 

Answer:

Explanation: 

Hyper-V Network Virtrtualization runs multiple virtual networks on a physical network. And each virtual network operates as if it is running as a physical network. The Set-NetAdaptercmdlet sets the basic properties of a network adapter such as virtual LAN (VLAN) identifier (ID) and MAC address. Thus if you add the binding parameter to the command then you will be able to install the Windows Network Virtualization Filter Driver. Step one: Enable Windows Network Virtualization (WNV). This is a binding that is applied to the NIC that you External Virtual Switch is bound to. This can be a physical NIC, it can be an LBFO NIC team. Either way, it is the network adapter that your External Virtual Switch uses to exit the server. This also means that if you have multiple virtual networks or multiple interfaces that you can pick and choose and it is not some global setting. If you have one External Virtual Switch this is fairly easy: $vSwitch = Get-VMSwitch -SwitchType External # Check if Network Virtualization is bound # This could be done by checking for the binding and seeing if it is enabled ForEach-Object -InputObject $vSwitch { if ((Get-NetAdapterBinding -ComponentID "ms_netwnv" -InterfaceDescription $_.NetAdapterInterfaceDescription).Enabled -eq $false){ # Lets enable it Enable-NetAdapterBinding -InterfaceDescription $_.NetAdapterInterfaceDescription -ComponentID "ms_netwnv"}} 


Q2. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain 

contains a server named Server1.Server1 runs Windows Server 2012 R2. 

You create a group Managed Service Account named gservice1. 

You need to configure a service named Service1 to run as the gservice1 account. 

How should you configure Service1? 

A. From the Services console, configure the General settings. 

B. From Windows PowerShell, run Set-Service and specify the -StartupType parameter. 

C. From a command prompt, run sc.exe and specify the config parameter. 

D. From a command prompt, run sc.exe and specify the privs parameter. 

Answer:

Explanation: 

Executing the ss.exe command with the config parameter will modify service configuration. 

Topic 3, Volume C 


Q3. - (Topic 3) 

Your company has a remote office that contains 1,600 client computers on a single subnet. You need to select a subnet mask for the network that will support all of the client 

computers. The solution must minimize the number of unused addresses. Which subnet mask should you select? 

A. 255.255.248.0 

B. 255.255.252.0 

C. 255.255.254.0 

D. 255.255.240.0 

Answer:


Q4. - (Topic 3) 

Your network contains an Active Directory domain named adatum.com. The computer accounts for all member servers are located in an organizational unit (OU) named Servers. You link a Group Policy object (GPO) to the Servers OU. 

You need to ensure that the domain’s Backup Operators group is a member of the local Backup Operators group on each member server. The solution must not remove any groups from the local Backup Operators groups. 

What should you do? 

A. Add a restricted group named adatum\Backup Operators. Add Backup Operators to the This group is a member of list. 

B. Add a restricted group named adatum\Backup Operators. Add Backup Operators to the Members of this group list. 

C. Add a restricted group named Backup Operators. Add adatum\Backup Operators to the This group is a member of list. 

D. Add a restricted group named Backup Operators. Add adatum\Backup Operators to the Members of this group list. 

Answer:


Q5. - (Topic 3) 

You are attempting to delete a global security group in the Active Directory Users and Computers console, and the console will not let you complete the task. 

Which of the following could possibly be causes for the failure? (Choose all answers that are correct.) 

A. There are still members in the group. 

B. One of the group’s members has the group set as its primary group. 

C. You do not have the proper permissions for the container in which the group is located. 

D. You cannot delete global groups from the Active Directory Users and Computers console. 

Answer: B,C 

Explanation: 

A. Incorrect: It is possible to delete a group that has members. 

B. Correct: If any member sets the group as its primary group, then the system does not permit the group to be deleted. 

C. Correct: You must have the appropriate Active Directory permissions for the container in which the group is located to delete it. 

D. Incorrect: It is possible to delete groups using the Active Directory Users and Groups console. 


Q6. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. You need to configure a central store for the Group Policy Administrative Templates. 

What should you do on DC1? 

A. From Server Manager, create a storage pool. 

B. From Windows Explorer, copy the PolicyDefinitions folder to the SYSVOL\contoso.com\policies folder. 

C. From Server Manager, add the Group Policy Management feature 

D. From Windows Explorer, copy the PolicyDefinitions folder to the NETLOGON share. 

Answer:

Explanation: 

A. Create Disk Storage Pool 

B. PolicyDefinitions folder in SYSVOL 

C. Group Policy Management is a console for GPO Mgmt 

D. Folder is for logon scripts Policy Definitions folder within the SYSVOL folder hierarchy. By placing the ADMX files in this directory, they are replicated to every DC in the domain; by extension, the ADMX-aware Group Policy Management Console in Windows Vista, Windows 7, Windows Server 2008 and R2 can check this folder as an additional source of ADMX files, and will report them accordingly when setting your policies. By default, the folder is not created. Whether you are a single DC or several thousand, I would Strongly recommend you create a Central Store and start using it for all your ADMX file storage. It really does work well. The Central Store To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain. To create a Central Store for .admx and .adml files, create a folder that is named Policy Definitions in the following location: \\FQDN\SYSVOL\FQDN\policies 


Q7. - (Topic 3) 

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. 

You have a domain controller named DC5 that has the Server Graphical Shell disabled. 

You create an organizational unit (OU) named OU1. 

From DC5, you need to create 50 new user accounts in OU1. 

Which tool should you use? 

A. the ntdsutil command 

B. the Set-ADDomain cmdlet 

C. the Install-ADDSDomain cmdlet 

D. the dsadd command 

E. the dsamain command 

F. the dsmgmt command 

G. the net user command 

H. the Set-ADForest cmdlet 

Answer:

Explanation: Net user adds or modifies user accounts, or displays user account information. 

Reference: Net User Command for Windows Server 2012 (R2) 

http://www.isunshare.com/windows-2012/net-user-command-for-windows-server-2012-r2.html 


Q8. HOTSPOT - (Topic 2) 

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a folder named Folder1. 

A user named User1 is a member of Group1 and Group2. A user named User2 is a 

member of Group2 and Group3. 

You need to identify which actions the users can perform when they access the files in 

Share1. 

What should you identify? 

To answer, select the appropriate actions for each user in the answer area. 

Answer: 


Q9. - (Topic 2) 

You have a server named Print1 that runs Windows Server 2012 R2. 

On Print1, you share a printer named Printer1. 

You need to ensure that only the members of the Server Operators group, the 

Administrators group, and the Print Operators group can send print jobs to Printer1. 

What should you do? 

A. Remove the permissions for the Creator Owner group. 

B. Assign the Print permission to the Server Operators group. 

C. Remove the permissions for the Everyone group. 

D. Assign the Print permission to the Administrators group. 

Answer:

Explanation: 

By default Everyone can print. This permissions need to be removed. 


Q10. HOTSPOT - (Topic 3) 

You have a DNS server named Server1. Server1 runs Windows Server 2012 R2. The network ID is 10.1.1.0/24. An administrator creates several reverse lookup zones. You need to identify which reverse lookup zone is configured correctly. Which zone should you identify? To answer, select the appropriate zone in the answer area. 

Answer: 


Q11. - (Topic 2) 

Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.Server1 is configured as shown in the following table. 

You need to configure VM4 to track the CPU, memory, and network usage. 

What should you configure? 

A. NUMA topology 

B. Resource control 

C. Resource metering 

D. Virtual Machine Chimney 

E. The VLAN ID 

F. Processor Compatibility 

G. The startup order 

H. Automatic Start Action 

I. Integration Services 

J. Port mirroring K. Single-root I/O virtualization 

Answer:

Explanation: 

Metrics collected for each virtual machine using resource metering: Average CPU usage, measured in megahertz over a period of time. Average physical memory usage, measured in megabytes. Minimum memory usage (lowest amount of physical memory). Maximum memory usage (highest amount of physical memory). Maximum amount of disk space allocated to a virtual machine. Total incoming network traffic, measured in megabytes, for a virtual network adapter. Total outgoing network traffic, measured in megabytes, for a virtual network adapter 

: http://blogs.technet.com/b/meamcs/archive/2012/05/28/hyper-v-resource-metering-in-windows-server-2012-server-8-beta.aspx 


Q12. HOTSPOT - (Topic 2) 

Your company has a main office and a sales office. The main office has 2,000 users. The sales office has 20 users. All client computers in the sales office run Windows 8. 

The sales office contains a print server named App1 that runs Windows Server 2012 R2. App1 has a shared printer named Printer1. Printer1 connects to a network-attached print device. 

You plan to connect all of the users in the sales office to Printer1 on App1. 

You need to ensure that if App1 fails, the users can continue to print to Printer1. 

What should you configure on App1? To answer, select the appropriate option in the answer area. 

Answer: 


Q13. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. The domain contains a DHCP server named Server1 that runs Windows Server 2012 R2. 

You create a DHCP scope named Scope1. The scope has a start address of 192.168.1.10, an end address of 192.168.1.50, and a subnet mask of 255.255.255.192. 

You need to ensure that Scope1 has a subnet mask of 255.255.255.0. 

What should you do first? 

A. From the DHCP console, reconcile Scope1. 

B. From the DHCP console, delete Scope1. 

C. From the DHCP console, modify the Scope Options of Scope1. 

D. From Windows PowerShell, run the Set-DhcpServerv4Scope cmdlet. 

Answer:

Explanation: 

You cannot change the subnet mask of a DHCP scope without deleting the scope and 

recreating it with the new subnet mask. 

Set-DhcpServerv4Scope does not include a parameter for the subnet mask. 


Q14. - (Topic 3) 

A company’s server deployment team needs to introduce many new Windows Server 2012 R2 domain controllers throughout the network into a single Windows Server 2008 R2 domain. The team has chosen to use Windows PowerShell. 

Which Windows PowerShell module includes the command-line options for installing domain controllers? 

A. AD DS Administration cmdlets 

B. AD DS Deployment cmdlets 

C. AD CS Deployment cmdlets 

D. AD CS Administration cmdlets 

Answer:

Explanation: 

First use the Import-Module ADDSDeployment command in PowerShell–it includes the cmdlets needed to add new domain controllers. Then run Install-ADDSDomainController along with the required arguments. Quick Tip: DCPromo.exe has been deprecated but can still be used along with an answer file, and ADPrep.exe runs automatically when needed (but can be run with elevated rights for more control). 


Q15. - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. 

You log on to a domain controller by using an account named Admin1.Admin1 is a member of the Domain Admins group. 

You view the properties of a group named Group1 as shown in the exhibit. (Click the Exhibit button.) 

Group1 is located in an organizational unit (OU) named OU1. 

You need to ensure that users from Group1 can modify the Security settings of OU1 only. 

What should you do from Active Directory Users and Computers? 

A. Modify the Managed By settings on OU1. 

B. Right-click contoso.com and select Delegate Control. 

C. Right-click OU1 and select Delegate Control. 

D. Modify the Security settings of Group1. 

Answer:

Explanation: 

Delegating control to only the OU will allow the users of Group1 to modify the security settings.