Soon after acquiring Microsoft 70-410 college class teaching and also when you are totally delighted by an individuals preparation, simply then sign up about Prometric intended for screening facility in the section. Utilizing 70-410 apply concerns along with appraisal methods with preparing an individuals Microsoft 70-410 audit is an excellent technique to refine your performance. Our recommendation is that you have on the net Microsoft 70-410 audit solutions towards the end of this prepare. Its simply hone your skills however will help avoid inability.

2021 Dec 70-410 practice exam

Q221. HOTSPOT - (Topic 2) 

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 hosts 50 virtual machines. 

You need to create a script to list all of the virtual machines that have checkpoints and support Secure Boot. 

What should you do? To answer, select the appropriate options in the answer area. 

Answer: 


Q222. - (Topic 3) 

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. 

You are running a training exercise for junior administrators. You are currently discussing connection security rules. 

Which of the following is TRUE with regards to connection security rules? (Choose all that apply.) 

A. Connection security rules allows for traffic to be secured via IPsec. 

B. Connection security rules do not allow the traffic through the firewall. 

C. Connection security rules are applied to programs or services. 

D. Connection security rules are applied between two computers. 

Answer: A,B,D 

Explanation: 

Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity, and, optionally, data encryption. How firewall rules and connection security rules are related Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with IPsec, you can create Computer Connection Security rules. However, the creation of a connection security rule does not allow the traffic through the firewall. You must create a firewall rule to do this, if the traffic is not allowed by the default behavior of the firewall. Connection security rules are not applied to programs or services; they are applied between the computers that make up the two endpoints. 


Q223. DRAG DROP - (Topic 2) 

You have a Hyper-V host named Host1.Host1 contains two virtual machines named VM1 and VM2.VM1 is configured as a print server.VM1 runs Windows Server 2008 R2.VM2 is configured as a file server.VM2 runs Windows Server 2012 R2. 

You need to migrate all of the printers on VM1 to VM2. 

Which actions should you perform on the virtual machines? 

To answer, drag the appropriate action to the correct servers in the answer area. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q224. - (Topic 3) 

You have a network printer connected to print server. You need to be able to print if print server goes down. 

What should you configure? 

A. branch office direct printing 

B. printer pooling 

C. spooling 

D. Print forwarding 

Answer:

Explanation: 

Branch Office Direct Printing can reduce Wide Area Network (WAN) usage by printing directly to a print device instead of a server print queue. This feature can be enabled or disabled on a per printer basis and is transparent to the user. It is enabled by an administrator using the Print Management Console or Windows PowerShell on the server. 

The printer information is cached in the branch office, so that if the print server is unavailable for some reason (for example if the WAN link to the data center is down), then it is still possible for the user to print. Branch Office Direct Printing requires the following operating systems: Windows Server 2012 Windows 8 


Q225. - (Topic 2) 

You have a server named Server1 that runs Windows Server 2012 R2. 

You need to enable access-based enumeration for a file share on Server1. 

Which tool should you use? 

A. File Server Resource Manager (FSRM) 

B. Share and Storage Management 

C. Server Manager 

D. File Explorer 

Answer:

Explanation: 

Access-based enumeration displays only the files and folders that a user has permissions to access. It is a feature that was previously available as a downloadable package for the Windows Server. 2003 operating system (it was also included in Windows Server 2003 Service Pack 1). Access-based enumeration is now included in the Windows Server 2008 operating system, and you can enable it by using Share and Storage Management. 


Far out 70-410 exam question:

Q226. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees. 

You create a Group Policy object (GPO) named GP1. You link GP1 to the Employees OU. 

You need to ensure that GP1 does not apply to the members of a group named Managers. 

What should you configure? 

A. The Security settings of Employees 

B. The WMI filter for GP1 

C. The Block Inheritance option for Employees 

D. The Security settings of GP1 

Answer:

Explanation: 

A. Wrong Group 

B. Windows Management Instrumentation (WMI) filters allow you to dynamically determine 

the scope of Group Policy objects (GPOs) based on attributes of the target computer. 

C. Blocking inheritance prevents Group Policy objects (GPOs) that are linked to higher 

sites, domains, or organizational units from being automatically inherited by the child-level. 

D. Set Managers to – Members of this security group are exempt from this Group Policy 

object. 

Security settings. 

You use the Security Settings extension to set security options for computers and users 

within the scope of a Group Policy object. You can define local computer, domain, and network security settings. Figure below shows an example of the security settings that allow everyone to be affected by this GPO except the members of the Management group, who were explicitly denied permission to the GPO by setting the Apply Group Policy ACE to Deny. Note that if a member of the Management group were also a member of a group that had an explicit Allow setting for the Apply Group Policy ACE, the Deny would take precedence and the GPO would not affect the user. 


Q227. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

An administrator provides you with a file that contains the information to create user accounts for 200 temporary employees. The file is shown in the exhibit. (Click the Exhibit button.) 

You need to automate the creation of the user accounts. You must achieve this goal by using the minimum amount of administrative effort. 

Which tool should you use? 

A. Ldifde 

B. csvde 

C. Dsadd 

D. Net user 

Answer:

Explanation: 

csvde – Imports and exports data from Active Directory Domain Services (AD DS) using files that store data in the comma-separated value (CSV) format. You can also support batch operations based on the CSV file format standard. Net user – Adds or modifies user accounts, or displays user account information. Ldifde – Creates, modifies, and deletes directory objects. You can also use ldifde to extend the schema, export Active Directory user and group information to other applications or services, and populate Active Directory Domain Services (AD DS) with data from other directory services. Dsadd – Adds specific types of objects to the directory. 

csvde.exe is the best option to add multiple users. As you just need to export the excel 

spreadsheet as a .csv file and make sure the parameters are correct. 

You can use Csvde to import and export Active Directory data that uses the comma-

separated value format. 

Use a spreadsheet program such as Microsoft Excel to open this .csv file and view the 

header and value information. 

References: 

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 5: Install 

and administer Active Directory, Objective 5.2: Create and Manage Active Directory Users 

and Computers, p. 269 


Q228. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Server1 that runs Windows Server 2012 R2. Server1 contains a local group named Group1. 

You share a printer named Printer1 on Server1. 

You need to configure Printer1 to meet the following requirements: 

. Ensure that the members of Group1, the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1. 

. Prevent other users from sending print jobs to Printer1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Remove the permissions for the Creator Owner group. 

B. Assign the Print permission to the Administrators group. 

C. Remove the permissions for the Everyone group. 

D. Assign the Print permission to the Server Operators group. 

E. Assign the Print permission to Group1. 

Answer: C,E 

Explanation: 

C. To prevent other users from sending print jobs to Printer1 

E. To enable Group1 to send print jobs. 

Note: The Server Operators group, the Administrators group, and the Print Operators group 

are all built-in and already have permissions to send print jobs. 


Q229. - (Topic 2) 

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. 

You need to add a graphical user interface (GUI) to Server1. 

Which tool should you use? 

A. The setup.exe command 

B. The dism.exe command 

C. The imagex.exe command 

D. The Add-WindowsPackage cmdlet 

Answer:

Explanation: 

The DISM command is called by the Add-WindowsFeature command. Here is the systax for DISM: 

Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:ServerGui-Shell /featurename:Server-Gui-Mgmt 


Q230. - (Topic 2) 

You are configuring the IPv6 network infrastructure for a branch office. 

The corporate network administrator allocates the 2001:DB8:0:C000::/58 address space for use in the branch office. 

You need to identify the maximum number of IPv6 subnets you can create. 

How many IPv6 subnets should you identify? 

A. 32 

B. 64 

C. 128 

D. 1024 

Answer:

Explanation: 

IPv6 has 128-bit (16-byte) source and destination IP addresses. Although 128 bits can express over 3.4×1038 possible combinations, the large address space of IPv6 has been designed for multiple levels of subnetting and address allocation from the Internet backbone to the individual subnets within an organization. 

: http://technet.microsoft.com/en-us/library/dd379516%28v=WS.10%29.aspx