You are on page 1of 158

Microsoft.Passguide.70-410.v2013-12-09.by.ROD.

143q
Number: 70-410 Passing Score: 700 Time Limit: 120 min File Version: 18.5

Exam Code: 70-410 Exam Name: Installing and Configuring Windows Server 2012

Exam A QUESTION 1 Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows server 2012. You create a group Managed Service Account named gservice1. You need to configure a service named service1 to run as the gservice1 account. How should you configure service1? A. B. C. D. From From From From Services Console configure the recovery settings a command prompt ,run sc.exe and specify the config parameter Windows PowerShell,run Set-Service and specify the -PassThrough parameter a command prompt ,run sc.exe and specify the sdset parameter

Correct Answer: B Section: (none) Explanation Explanation/Reference: http://technet.microsoft.com/en-us/library/cc990290.aspx obj= {<AccountName> | <ObjectName>} Specifies a name of an account in which a service will run, or specifies a name of the Windows driver object in which the driver will run. The default setting is LocalSystem QUESTION 2 You have a server named Server1 that runs Windows Server 2012. You promote Server1 to domain controller. You need to view the service location (SVR) records that Server1 registers on DNS. What should you do on Server1? A. B. C. D. Open the Srv.sys file Open the Netlogon.dns file Run ipconfig/displaydns Run Get-DnsServerDiagnostics

Correct Answer: B Section: (none) Explanation Explanation/Reference: A. Timestamp server driver B. Netlogon service creates a log file that contains all the locator resource records stored in netlogon. C. used to display current resolver cache content D. Gets DNS event logging details

http://technet.microsoft.com/en-us/library/cc959303.aspx http://technet.microsoft.com/en-us/library/jj649883(v=wps.620).aspx QUESTION 3 Your network contains an Active Directory domain named contoso.com. The domain contains a server named Windows Server 2012. You create a group Managed Service Account named gservice1. You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1? A. B. C. D. From From From From the Services console, configure the General settings. Windows PowerShell, run Set-Service and specify the -PassThrough parameter. a command prompt, run sc.exe and specify the config parameter. the Services console, configure the Recovery settings.

Correct Answer: C Section: (none) Explanation Explanation/Reference: A. General settings only allow you to stop, start and set type/paramaters B. Set-Service provides a way for you to change the Description, StartupType, or DisplayName of a service C. Modifies service configuration D. Sets the response/action on service failure http://windows.microsoft.com/en-us/windows-vista/using-system-configuration http://technet.microsoft.com/enus/library/ee176963.aspx http://technet.microsoft.com/en-us/library/cc990290(v=ws.10).aspx http://technet.microsoft.com/en-us/library/ cc738230(v=ws.10).aspx QUESTION 4 Your network contains an Active Directory domain named contoso.com. The network contains 500 client

You need to perform an offline domain join of Server1 to the contoso. Server1 is in a workgroup.com domain. You need to prevent Server1 from attempting to resolve Internet host names for the client computers. F. Create a primary zone named "GlobalNames".exe command. necessary to remove the default root hints files C. Create a forwarder that points to 169. . Adds specific types of objects to the directory. install a root (. You deploy a server named Server1 that runs Windows Server 2012. You configure all of the client computers to use Server1 as their primary DNS server. Run the djoin. you install a new server named Server1 that runs Windows Server 2012.com. Correct Answer: B Section: (none) Explanation Explanation/Reference: A.contoso. Configure the Security settings of the contoso. Transfer the infrastructure master role to DC1. Use djoin for offline join in the perimeter network C. The domain contains two domain controllers.microsoft. Server1 has the DNS Server server role installed. D.exe command. Run the dsadd. C. Create a primary zone named "root". What should you do first? A.254.com/kb/298148 QUESTION 5 Your network contains an Active Directory domain named contoso. All of the client computers connect to the Internet by using a web proxy. D.computers that run Windows 8. Remove all root hints. E. Create a stub zone named "root". G.com.) zone on all internal DNS servers to prevent name resolution on the Internet http:// support. Correct Answer: BC Section: (none) Explanation Explanation/Reference: B. B.com zone. Transfer the PDC emulator role to Dc1. B.0. What should you do on Server1? (choose 2) A.". The domain controllers are configured as shown in the following table. In the perimeter network.1. B. Creates a new Active Directory computer. H. Add the local computer to a domain or workgroup. C. D. Create a primary zone named ". Create a zone delegation for GlobalNames.

com/en-us/library/ offline-domain-join-djoin-step. You would need to break a team first. D.aspx http://technet. C.620).aspx http://technet.com/en-us/library/ jj130850(v=wps.exe command The dism.com/en-us/library/ee617245. which is the computer that you want to join to the domain.bystep%28v=ws.com/en-us/library/jj130875(v=wps.microsoft. You also use it to insert the computer account data intothe Windows directory of the destination computer.us/library/cc753708(v=ws.com/en.exe command The imagex.us/library/ff793312 (v=ws.aspx http://winsrvtuts. Add-VMNetworkAdapter Add-NetLbfoTeamNic Remove-NetLbfoTeam Set-NetAdapter Correct Answer: C Section: (none) Explanation Explanation/Reference: A.exe.aspx QUESTION 7 You perform a Server Core Installation of Windows Server 2012 on a server named Server1.microsoft.microsoft. Create the account djoin /provision /domain winsrvtuts.txt /windowspath c:\Windows /localos http:// technet. Server1 has following hardware configurations: · 16GB of RAM · A single quad-core CPU · Three network teams that have two network adapters each You add additional CPUs and RAM to Server1.microsoft. Adds vadapter to vm D.aspx http://technet.aspx QUESTION 6 You have a file server named Server1 that runs Windows Server 2012.microsoft.microsoft. C. You repurpose Server1 as a virtualization host.com/en-us/library/hh848564(v=wps.To perform an offline domain join.microsoft. Add new interface to NIC Team C.microsoft.microsoft.com/en-us/library/ jj130848.com/en.exe command The Add-WindowsPackage cmdlet Correct Answer: B .620).microsoft.wst /machine Win7 /savefile c:\yourFile.com/en-us/library/hh849798.aspx http://technet.620).620). B.10). http://technet.10%29. You use Djoin. You need to create four external virtual switches in Hyper-V. Sets adapter properties B.10).txt Run on the target systemdjoin /requestodj /loadfile c:\yourFile. You install the Hyper-V server role on Server1. The setup.exe to provision computer account data into AD DS. D. B.com/en-us/library/jj130848(v=wps.aspx http://technet.com/2011/08/off-line-domain-join-with-djoin-exe/ http://technet. Which cmdlet should you run first? A. Removed NIC from host You need 4 virtual switches but currently only have 3 teams available. You need to add a graphical user interface (GUI) to Server1.aspx http://technet. Which tool should you use? A. you run commands by using a new tool named Djoin.aspx http://technet.

Section: (none) Explanation Explanation/Reference: The DISM command is called by the Add-WindowsFeature command. B. even those with only a few dozen computers. Here is the systax for DISM: Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:ServerGui-Shell / featurename:Server-Gui-Mgmt QUESTION 8 Your network contains an Active Directory domain named contoso. Security Configuration and Analysis.techtarget. Security templates are inactive until imported into a Group Policy object or the Security Configurationand Analysis. You must therefore visit each computer that should receive the security template settings. Correct Answer: C Section: (none) Explanation Explanation/Reference: http://searchwindowsserver. The domain contains two servers named Server2 runs Windows Server 2012. . you can use this tool to deploy the settings. Of course. System Configuration. Security Templates. this is not feasible in most environments. C. You need to apply template 1 to Server 2.it can configure only the computer on which it is running.com/feature/Deploying-security-templates The Security Configuration and Analysis tool performs two tasks: configuring and analyzing security. The drawback of the tool is that it is not capable of configuring multiple computers at once -.com. Computer Management. You create a security template named Template 1 by using the Security Templates snap-in. Therefore. The tool works with security templates only to perform these duties. once you have a security template. D. Which tool should you use? A. Therefore. this method is best suited to hardening standalone servers that are not part of an Active Directory domain.

You create a virtual machine on Server2 named VM1.http://technet.com/en-us/windows-vista/using-system-configuration QUESTION 9 You have a server named Server 2 that runs Windows Server 2012.aspx http://windows. What should you do? .com/en-us/library/jj730960. Server 2 has the Hyper-V server role installed.microsoft. You need to ensure that you can configure a pass-through disk for VM1. The disks on Server2 are configured as shown in the exhibit.microsoft.

The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. The domain contains two servers that run Windows Server 2012. hypothetically. . this raw piece of storage is not limited in size so. Take Disk 1 offline. QUESTION 10 Your network contains an Active Directory domain named contoso. C. You create a security template named template1 by using the Security Templates snap-in. D. Convert Disk 1 to a basic disk. Create a partition on Disk 1.com.A.technet. B. Convert Disk 1 to a MBR disk. Correct Answer: C Section: (none) Explanation Explanation/Reference: http://blogs. it can be a multi-terabyte LUN.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-hyper-v.aspx Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. Additionally. it must be placed in an Offline state from the Hyper-V server perspective. To ensure the Guest has exclusive access to the storage. You need to apply Template 1 to Server2.

Second. Right-click Security Settings and select the Import Policy from the shortcut menu.Which tool should you use? A. Verify that some of the configurations from the security template are correct in the GPO. QUESTION 11 Your network contains an Active Directory domain named contoso. Third. Now. System Configuration Local Security Policy Server Manager Certificate Templates Correct Answer: B Section: (none) Explanation Explanation/Reference: B http://searchwindowsserver. Create a zone delegation for GlobalNames. D. Expand the GPO to the following node: Computer Configuration\Windows Settings\Security Settings.contoso. You need to prevent Server1 from attempting to resolve Internet host names for the client computers.inf file) that you want to include and click Open.com zone. create OUs for the different types of computers that will receive a different security template. First. B. Create a stub zone named "root". you are ready to include the security templates into the GPOs.techtarget. complete these steps: Open the target GPO using the Group Policy Object Editor.com. The settings that have been imported into the GPO will take approximately 90 minutes to reach the target computer.".com. All of the client computers connect to the Internet by using a web proxy. Repeat these steps for each security template that you create. Server1 has the DNS Server server role installed. Create a primary zone named ". not considering any intersite replication considerations. The domain contains 100 user .com/feature/Deploying-security-templates A best practice for deploying security templates is to import them into a GPO. You deploy a server named Server1 that runs Windows Server 2012. create and link a GPO for each of the computer OUs that you created in the first step. This method relies on the Active Directory and OU design accommodating this rollout. To import a security template into a GPO. Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 12 Your network contains an Active Directory domain named contoso.Before you can implement this method. Browse and select the security template (. move the computer accounts for these computers into the appropriate OU. and then close the Group Policy Object Editor.com. D. What should you do on Server1? A. Configure the Security settings of the contoso. You configure all of the client computers to use Server1 as their primary DNS server. C. C. you must complete the following steps. which will then push out the security settings that you initially configured in the security template. B. The network contains 500 client computers that run Windows 8.

What should you do first? A. run Install-WindowsFeature. D.com. You use the TargetName and TargetType parameters to specify a user. The domain contains two servers named Server1 and Server2.theeldergeek. What should you do first? . security group. Add User1 to the Group Policy Creator Owners group. B. The solution must minimize the number of permissions assigned to User1.accounts that reside in an organizational unit (OU) named 0U1. or computer for which to set the permission level.aspx Grants a level of permissions to a security principal (user.com.com/microsoft_management_console. Modify the permissions on the User1 account.com/en-us/library/ee461038. Correct Answer: A Section: (none) Explanation Explanation/Reference: http://www. or you can use the All parameter to set the permission level for the security principal on all GPOs in the domain. Windows Firewall with Advanced Security on Server2.microsoft. Server1 runs Windows Server 2012. What should you do? A. Modify the permissions on OU1. Internet Explorer on Server2. You need to manage DHCP on Server2 by using the DHCP console on Server1. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server server role installed. C. add a snap-in.htm QUESTION 14 Your network contains an Active Directory domain named contoso. QUESTION 13 Your network contains an Active Directory domain named contoso. D. Correct Answer: B Section: (none) Explanation Explanation/Reference: http://technet. Run the Set-GPPermission cmdlet. security group. You can use the Name or the Guid parameter to set the permission level for the security principal on a single GPO. C. From From From From the Microsoft Management Console on Server1. You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to OU1. B. Server1 runs Windows Server 2012.0. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server server role installed. download and install Windows Management Framework 3. You need to manage DHCP on Server2 by using the DHCP console on Server1. or computer) for one GPO or all the GPOs in a domain. The domain contains two servers named Server1 and Server2. create an inbound rule. Windows PowerShell on Server1.

V server role installed. Note: (not B) You can use Server Manager to manage remote servers that are running Windows Server 2008 and Windows Server 2008 R2. E: Once a virtual switch has been created. You can use Enable-PSRemoting to enable Windows PowerShell remoting on other supported versions of Windows and to re-enable remoting on Windows Server 2012 if it becomes disabled. Windows PowerShell remoting is enabled by default. You replace all of the network adapters on Server1 with new network adapters that support single. modify the Advanced Features settings of the network adapter. create an inbound rule. Because the configuration activates listeners. Internet Explorer on Server2. Choose two. the next step is to configure a virtual .com/b/jhoward/archive/2012/03/12/everything-you-wanted-to-know-about-sr-iov-in-hyper-vpart-1.com. modify the BIOS settings. Which two actions should you perform? (Each correct answer presents part of the solution. Modify the settings of the RDS Virtual virtual switch.root I/O virtualization (SR-IOV). you cannot modify an existing switch to use this option Explanation: The first step when allowing a virtual machine to have connectivity to a physical network is to create an external virtual switch using Virtual Switch Manager in Hyper-V Manager. Delete. run Enable PSRemoting. Correct Answer: D Section: (none) Explanation Explanation/Reference: Explanation: The Enable-PSRemoting cmdlet configures the computer to receive Windows PowerShell remote commands that are sent by using the WS-Management technology.A. C. download and install Windows Management Framework 3. B. On Windows Server?2012. C.0 / Performance Updates Reference: Enable-PSRemoting QUESTION 15 Your network contains an Active Directory domain named contoso. install a feature. Correct Answer: DE Section: (none) Explanation Explanation/Reference: http://blogs. You need to enable SR-IOV for all of the virtual machines on Server1. On each virtual machine. The choice must be made a switch creation time . From From From From Windows Firewall with Advanced Security on Server2. D. and then recreate the RDS Virtual virtual switch.aspx Page 174 exam ref 70-410 book: Enabling SR-IOV is only available when creating a new virtual switch. The additional step that is necessary when using SR-IOV is to ensure the checkbox is checked when the virtual switch is being created. Server1 has the Hyper. It is not possible to change a "non SR-IOV mode" external virtual switch into an "SR-IOV mode" switch. E. B. D. / Windows Management Framework 3. but the following updates are required to fully manage these older operating systems.) A. You do not need to run it on computers that only send commands. Windows PowerShell on Server2. Server Manager on Server1. On each virtual machine. Server1 has a virtual switch named RDS Virtual. On each virtual machine. modify the Hardware Acceleration settings of the network adapter. You need to run this command only once on each computer that will receive commands. The domain contains a server named Server1 that runs Windows Server 2012. it is prudent to run it only where it is needed.0.technet.

* The diagram below illustrates how SR-IOV allows virtual machines to directly address the physical NIC. . but not x86 client). Note: * Steps: / SR-IOV must be enabled on virtual switch / Install additional network drivers in the guest OS / Enable SR-IOV within the VMs though Hyper-V Manager * Single Root I/O Virtualization (SR-IOV) is a standard introduced by the PCI-SIG that owns and manages PCI specifications as open industry standards. It allows an SR-IOV virtual function of a physical network adapter to be assigned directly to a virtual machine to increase network throughput by reducing latency.machine. SR-IOV enables network traffic to bypass the software switch layer of the Hyper-V Virtualization stack to reduce the I/O overhead in this layer. and Windows "8" client x64. At the bottom is a checkbox to enable SR-IOV. Host CPU overhead also get reduced for processing network traffic. We have rearranged the settings for a virtual machine to introduce sub-nodes under a network adapter. SR-IOV in Windows Server "8" is supported on x64 editions of Windows "8" as a guest operating system (as in Windows "8" Server. one of which is the hardware acceleration node.

You need to ensure that the developer can connect to VM1 by using a named pipe. Which virtual machine setting should you configure? . Server1 has the Hyper.vdh with a maximum file size of 16 GB (or 16.V server role installed. Which tool should you use? A.aspx From the DiskPart command-line tool at an elevated command prompt. B. The domain contains a virtual machine named VM1.microsoft.com/en-us/magazine/ee872416. A developer wants to attach a debugger to VM1.com. run the create vdisk command and specify the file (to name the file) and maximum (to set the maximum size in megabytes) parameters.Reference: Everything you wanted to know about SR-IOV in Hyper-V Part 5 QUESTION 16 Your network contains an Active Directory domain named contoso. The domain contains a server named Server1. C. The domain contains a server named Server1 that runs Windows Server 2012. You need to create 3-TB virtual hard disk (VHD) on Server1. Server Manager Diskpart New-StoragePool New-VirtualDisk Correct Answer: B Section: (none) Explanation Explanation/Reference: http://technet. The following code demonstrates how to create a VHD file at C:\vdisks\disk1. QUESTION 17 Your network contains an Active Directory domain named contoso.com. D. Server1 runs Windows Server 2012. The New-VirtualDisk command creates a new virtual disk in the specified storage pool only.000 MB).

com/b/ntdebugging/ archive/2011/12/30/configuring-a-hyper-v-vm-forkernel. C.A. B.microsoft. The second processcan be local (on the same computer as the first) or remote (on a networked computer). so that the output of one is the input of the other. For example. This option connects the virtual serial port to a Windows named pipe on the host operatingsystem or a computer on the network.msdn. A named pipe is a portion of memory that can be used by one processto pass information to another process. By connecting two virtual serial ports to the same named pipe.10). Network Adapter BIOS Processor COM 1 Correct Answer: D Section: (none) Explanation Explanation/Reference: Named pipe. or between avirtual machine and a debugging program on the host operating system that supports the use of named pipes. Named pipes are useful for debugging or for any program that requires a null modem connection. you can create a virtual null modem cableconnection.debugging. a localnamed pipe path could be \\.com/en-us/library/ee449417(v=ws.aspx QUESTION 18 . D. Named pipes can be used to create a virtual null modem cable between two virtual machines.aspx http://blogs.\pipe\mypipename. http://technet.

Server2 is connected to LAN1.10. What should you do? A. The subnets are configured as shown in the following table. .0 route.Your network contains two subnets. Change the metric of the 10. You run the route print command as shown in the exhibit. You need to ensure that Server2 can communicate with the client computers on LAN2. You have a server named Server2 that runs Windows Server 2012.1.

exe netcfg.exe Correct Answer: A Section: (none) Explanation Explanation/Reference: http://support.0 Default gateway: 10. Set the state of the Microsoft ISATAP Adapter #2 interface to disable.EXE to a file and view it with Notepad.254 What should you run? A.1.1 Subnet mask: 255.microsoft.exe. Incorrect: not D: Windows Server 2012 Core still has IPCONFIG. Server1 is configured to obtain an IPv4 address by using DHCP. You need to configure Active Directory replication between Site1 and Site2. Display the configuration of a currently running router on any computer. Default Gateway. You need to configure the IPv4 settings of the network connection on Server1 as follows: IP address: 10. C.240.B.exe tool to perform the following tasks: Configure interfaces. In order to configure TCP/IP settings such as the IP address. Consider piping the output if IPCONFIG.com/kb/242468/en-us You can use the Netsh. Use the scripting feature to run a collection of commands in batch mode against a specified router. netsh.23.EXE that can be used to view the IP configuration. You install a new domain controller. QUESTION 20 You have an existing Active Directory site named Site1.exe ipconfig.1.1. Modern servers typically come with several network interface ports. Run route delete 172.0. Configure routing protocols. Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 19 You have a server named Server1 that runs a Server Core installation of Windows Server 2012.255. Configure filters.2. This causes IPCONFIG.1.EXE to scroll off the screen when viewing its output. C. Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service. Subnet Mask. D.exe msconfig. You create a new Active Directory site and name it Site2. . D.exe. DNS and WINS addresses and many other options you can use Netsh. Configure routes. Set the state of the Teredo interface to disable. B.

exam. Correct Answer: A . Add the Active Directory Lightweight Directory Services (AD/LDS) role to the domain controller by using Server Manager.www. Use the Active Directory Sites and Services console to assign a new IP subnet to Site2. You need to access the Active Directory Schema snap-in. Move the infrastructure master role in the child domain to a domain controller that does not hold the Global Catalog. Log off and log on again by using an account that is a member of the Schema Admins group. Use the Active Directory Sites and Services console to configure the new domain controller as a preferred bridgehead server for Site1. Use the Active Directory Sites and Services console to configure a new site link bridge object. C. and that no account name is listed.dll. B. D. B. Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 22 Your company has an Active Directory domain.You create the site link between Site1 and Site2. Your domain structure contains one root domain and one child domain. First Pass" . Move the RID master role in the child domain to a domain controller that holds the Global Catalog..exe command to connect to the schema master operations master and open the schema for writing. What should you do next? A.. Register Schmmgmt. What should you do? A. Modify the schema to enable replication of the friendlynames attribute to the Global Catalog. You modify the folder permissions on a file server that is in the child domain. Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 21 Your company has an Active Directory forest. C. Move the RID master role in the child domain to a domain controller that does not hold the Global Catalog. D. What should you do? A. Not all domain controllers in the forest are configured as Global Catalog Servers. B. You need to list the account names.com 90 C. Use the Ntdsutil. D. You log on to the domain controller. The Active Directory Schema snap-in is not available in the Microsoft Management Console (MMC). Use the Active Directory Sites and Services console to decrease the site link cost between Site1 and Site2. Move the new domain controller object to Site2. You discover that some Access Control entries start with S-1-5-21. "First Test.

Section: (none) Explanation Explanation/Reference: http://technet.microsoft.com/en-us/library/cc737499(v=ws.10).aspx QUESTION 23 Your network contains a domain controller that is configured as a DNS server. The server hosts an Active Directory-integrated zone for the domain. You need to reduce how long it takes until stale records are deleted from the zone. What should you do? A. B. C. D. From From From From the configuration directory partition of the forest, modify the tombstone lifetime. the configuration directory partition of the forest, modify the garbage collection interval. the aging properties of the zone, modify the no-refresh interval and the refresh interval. the start of authority (SOA) record of the zone, modify the refresh interval and the expire interval.

Correct Answer: C Section: (none) Explanation Explanation/Reference: http://blogs.technet.com/b/networking/archive/2008/03/19/don-t-be-afraid-of-dns-scavenging-just-bepatient.aspx QUESTION 24 You have an Active Directory domain named contoso.com. You have a domain controller named Server1 that is configured as a DNS server. Server1 hosts a standard primary zone for contoso.com. The DNS configuration of Server1 is shown in the exhibit. You discover that stale resource records are not automatically removed from the contoso.com zone. You need to ensure that the stale resource records are automatically removed from the contoso.com zone. What should you do?

A. B. C. D.

Set the scavenging period of Server1 to 0 days. Modify the Server Aging/Scavenging properties. Configure the aging properties for the contoso.com zone. Convert the contoso.com zone to an Active Directory-integrated zone.

Correct Answer: C Section: (none) Explanation Explanation/Reference: http://blogs.technet.com/b/networking/archive/2008/03/19/don-t-be-afraid-of-dns-scavenging-just-bepatient.aspx QUESTION 25 You have a server that runs Windows Server 2012. The server contains the disks configured as shown in the following table.

You need to create a volume that can store up to 3 TB of user files. The solution must ensure that the user files are available if one of the disks in the volume fails. What should you create? A. B. C. D. E. F. G. H. a storage pool on Disk 2 and Disk 3 a spanned volume on Disk 2 and Disk 3 a mirrored volume on Disk 1 and Disk 3 a mirrored volume on Disk 2 and Disk 3 a RAID-5 volume on Disk 1, Disk 2, and Disk 3 a storage pool on Disk 1 and Disk 3 a spanned volume on Disk 0 and Disk 4 a mirrored volume on Disk 1 and Disk 4

Correct Answer: D Section: (none) Explanation Explanation/Reference: Page 44 exam ref 70-410 book: Based on this info, only option D is possible ■ Simple volume Consists of space from a single disk. After you have created a simple volume, you can extend it to multiple disks to create a spanned or striped volume, as long as it is not a system volume or boot volume. You can also extend a simple volume into any adjacent unallocated space on the same disk or, with some limitations, shrink the volume by deallocating any unused space in the volume. ■■ Spanned volume Consists of space from 2 to 32 physical disks, all of which must be dynamic disks. A spanned volume is essentially a method for combining the space from multiple dynamic disks into a single large volume. Windows Server 2012 writes to the spanned volume by filling all the space on the first disk and then filling each of the additional disks in turn. You can extend a spanned volume at any time by adding disk space. Creating a spanned volume does not increase the disk’s read/write performance, or provide fault tolerance. In fact, if a single physical disk in the spanned volume fails, all the data in the entire volume is lost. ■■ Striped volume Consists of space from 2 to 32 physical disks, all of which must be dynamic disks. The difference between a striped volume and a spanned volume is that in a striped volume, the system writes data one stripe at a time to each successive disk in the volume. Striping provides improved performance because each disk drive in the array has time to seek the location of its next stripe while the other drives are writing. Striped volumes do not provide fault tolerance, however, and you cannot extend them after creation. If a single physical disk in the striped volume fails, all the data in the entire volume is lost. ■■ Mirrored volume Consists of an identical amount of space on two physical disks, both of which must be dynamic disks. The system performs all read and write operations on both disks simultaneously, so they contain duplicate copies of all data stored on the volume. If one of the disks fails, the other continues to provide access to the volume until the failed disk is repaired or replaced. ■■ RAID-5 volume Consists of space on three or more physical disks, all of which must be dynamic. The system stripes data and parity information across all the disks so that if one physical disk fails, the missing data can be re-created by using the parity information on the other disks. RAID-5 volumes provide improved read

B. Prevent other users from sending print jobs to Printer1. Assign the Print permission to the Server Operators group Remove the permissions for the Creator Owner group. Correct Answer: CD Section: (none) Explanation . the Administrators group.com. C. You need to create a volume that can store up to 3 TB of user files. What should you create? A. The server contains the disks configured as shown in the following table. D. D. You need to configure Printer1 to meet the following requirements: Ensure that the members of Group1. C. Choose two. You share a printer named Printer1 on Server1. Which two actions should you perform? (Each correct answer presents part of the solution.performance because of the disk QUESTION 26 You have a server that runs Windows Server 2012. A mirrored volume on Disk 1 and Disk 4 A storage pool on Disk 2 and Disk 3 A storage pool on Disk 1 and Disk 3 A mirrored volume on Disk 2 and Disk 3 Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 27 Your network contains an Active Directory domain named contoso. the Server Operators group. E. Assign the Print permission to the Administrators group. Assign the Print permission to Group1. Server1 contains a local group named Group1. The solution must ensure that the user files are available if one of the disks in the volume fails.) A. Remove the permissions for the Everyone group. The domain contains a print server named Server1 that runs Windows Server 2012. and the Print Operators group can send print jobs to Printer1. B.

* Dynamic Memory helps you use memory resources more efficiently.com/en-us/library/ff817651(v=ws. Modify the settings in GPO1. the Administrators group. Hyper-V treats memory as a shared resource that can be reallocated automatically among running virtual machines. GPO1 is used to assign several user rights to a user named User1. In the Users container. A Group Policy object (GPO) named GPO1 is linked to OU1. B. and the Print Operators group are all built-in and already have permissions to send print jobs. Resource control Dynamic Memory NUMA topology Memory weight Correct Answer: B Section: (none) Explanation Explanation/Reference: http://technet. C. You need to minimize the amount of time it takes for both virtual machines to access memory. Dynamic Memory adjusts the amount of memory available to a virtual machine. C. With Dynamic Memory. B. Hyper-V can distribute memory more efficiently among the running virtual machines configured with Dynamic Memory.microsoft. Before this feature was introduced. based on changes in memory demand and values that you specify. Note: The Server Operators group. You need to ensure that User2 is assigned the same user rights as User1 on all of the client computers in OU1.Explanation/Reference: C: To prevent other users from sending print jobs to Printer1 D: To enable Group1 to send print jobs. D. Correct Answer: B . Depending on factors such as workload. changing the amount of memory available to a virtual machine could be done only when the virtual machine was turned off. Reference: Hyper-V Dynamic Memory Configuration Guide QUESTION 29 Your network contains an Active Directory domain named contoso.10). You install the Hyper-V server role on Server1. D.com. Link a WMI filter to GPO1. As a result. You create two virtual machines on Server1 that each have 8 GB of memory. With Dynamic Memory. What should you configure on each virtual machine? A. this efficiency can make it possible to run more virtual machines at the same time on one physical computer. Move User2 to OU1. Modify the link of GPO1. QUESTION 28 You have a new server named Server1 that runs Windows Server 2012. The domain contains 20 computer accounts that reside in an organizational unit (OU) named OU1. Hyper-V can provide a virtual machine with more or less memory dynamically in response to changes in the amount of memory required by the workloads or applications running in the virtual machine. Dynamic Memory is available for Hyper-V in Windows Server 2008 R2 Service Pack 1 (SP1).aspx * Dynamic Memory is a new Hyper-V feature that helps you use physical memory more efficiently. Server1 has two dual-core processors and 32 GB of RAM. What should you do? A. you create a new user named User2.

exe Correct Answer: A Section: (none) Explanation Explanation/Reference: .aspx Support for virtual hard disk storage capacity of up to 64 TB.microsoft. D. . .Allocate disk space as needed. The custom application only requires the Web Server (IIS) server role to be installed.exe imagex. C.Support up to 3 TB of data on a single hard disk. dism. B.com/en-us/library/hh831446. You need to configure storage for a virtual machine to meet the following requirements: . A pass-through disk A fixed-size VHD A dynamically expanding VHD A fixed-size VHDX A dynamically expanding VHDX Correct Answer: E Section: (none) Explanation Explanation/Reference: http://technet.exe servermanagercmd.Use a portable storage format. What should you configure? A.Section: (none) Explanation Explanation/Reference: You can modify the scope of the GPO in order to apply the GPO directly to User2 as well. Which tool should you use? A. QUESTION 30 You have a server named Server1 that runs Windows Server 2012. D.exe ocsetup. vhd max is 2TB QUESTION 31 You have a virtual machine named VM1. You plan to use VM1 as an image that will be distributed to sales users to demonstrate the features of a custom application. You need to ensure that the VHD file for VM1 only contains the required Windows Server 2012 source files. E. You install Windows Server 2012 on VM1. Server1 has the Hyper-V server role installed. B. C.

Take advantage of better logging. modify the properties of Share1. 64-bit. Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.aspx You can use DISM to: Add. Prepare a Windows PE image. The users report that when they access Share1. Service down-level operating systems like Windows Vista with SP1 and Windows Server 2008. Configure international settings. modify the properties of the volume that contains Share1. You need to ensure that the users see only their home folder when they access Share1. remove.10). Upgrade a Windows image to a different edition.xml answer file. Apply changes based on the offline servicing section of an unattend. QUESTION 32 Your network contains an Active Directory domain named contoso.microsoft. D. and Itanium). Enable or disable Windows features. Service all platforms (32-bit. All users have the necessary permissions to access only their home folder.com/en-us/library/cc784710(v=ws. Make use of old Package Manager scripts.microsoft. modify the properties of Share1. modify the properties of the volume that contains Share1.aspx Access based enumeration needs to be enabled: . Share1 contains the home folder of each user. C. Windows Explorer. The domain contains a file server named Server1 that runs Windows Server 2012. Correct Answer: C Section: (none) Explanation Explanation/Reference: http://technet.http://technet. Server Manager.com. What should you do from Server1? A. and enumerate packages and drivers. they can see the home folders of all the users. Server Manager. B.com/en-us/magazine/dd490958. Server1 contains a shared folder named Share1. From From From From Windows Explorer.

The domain contains an organizational unit (OU) named 0U1. . From a command prompt.QUESTION 33 Your network contains an Active Directory domain named contoso. their computer accounts are created in OU1 by default. You need to ensure that when new client computers join the domain. What should you do? A.com.exe command. run the redircmp.

GPO1 is used to publish several applications to a user named User1. run the Move-ADObject cmdlet. The domain contains a user account named User1 that resides in an organizational unit (OU) named OU1. C. Correct Answer: D Section: (none) Explanation Explanation/Reference: Moving user2 to OU1 will give him the same access as User1 QUESTION 35 You have a server that runs Windows Server 2012. From ADSI Edit. In the Users container. What should you do? A. What should you create? .aspx Redirects the default container for newly created computers to a specified.B. The solution must ensure that the user files are available if one of the disks in the volume fails.com. C. Correct Answer: A Section: (none) Explanation Explanation/Reference: http://technet. D.com/en-us/library/cc770619. Modify the settings in GPO1. B. You need to create a volume that can store up to 3 TB of user files. you create a new user named User2. QUESTION 34 Your network contains an Active Directory domain named contoso. You need to ensure that the same applications are published to User2.microsoft. configure the properties of the OU1 object. D. target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers. Modify the security of GPO1. configure the properties of the Computers container. From Windows PowerShell. Link a WMI filter to GPO1. A Group Policy object (GPO) named GPO1 is linked to OU1. From Ldp. Move User2 to OU1. The server contains the disks configured as shown in the following table.

You need to configure the virtual machines to support Network Load Balancing (NLB). Server1 runs Windows Server 2012. A storage pool on disk 2 and 3 is possible and you could use it to create a mirrored volume. The domain contains a server named Server1. A RAID-5 volume on Disk 1. The Hyper-V hosts contains several virtual machines that run Windows Server 2012. QUESTION 37 Your network contains two Hyper-V hosts that run Windows Server 2012. B.com/b/yungchou/archive/2012/08/31/windows-server-2012-storage-virtualizationexplained.A. and Disk 3 A storage pool on Disk 2 and Disk 3 A mirrored volume on Disk 1 and Disk 4 A mirrored volume on Disk 1 and Disk 3 Correct Answer: B Section: (none) Explanation Explanation/Reference: http://blogs. we need to work with what the exhibit gives us. B. You need to create 3-TB virtual hard disk (VHD) on Server1. D. B. C. we cannot imply converting a disk.com.technet. Which virtual machine settings should you configure? A. Port mirroring DHCP guard Router guard MAC address Correct Answer: D Section: (none) Explanation . C. You install the Network Load Balancing feature on the virtual machines. D. C.aspx Raid 5 and mirrored volumes require disks to be dynamic. Which tool should you use? A. Disk 2. D. QUESTION 36 Your network contains an Active Directory domain named contoso.. New-StorageSubsytemVirtualDisk File Server Resource Manager (FSRM) Server Manager Computer Management Correct Answer: D Section: (none) Explanation Explanation/Reference: From computer management all you need to do is right-click disk management and select create VHD.

This indicates whether edge traversal is enabled (Yes) or disabled (No). service. . When edge traversalis enabled. The domain contains a server named Server1 that runs Windows Server 2012. QUESTION 38 Your network contains an Active Directory domain named contoso. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network.com. or port to which the rule App1ies is globally addressable and accessiblefrom outside a network address translation (NAT) or edge device. B. Edge traversal Authorized computers Interface types Remote IP address Correct Answer: A Section: (none) Explanation Explanation/Reference: Edge traversal .Explanation/Reference: http://social. C. Which setting in the rule should you configure? A.microsoft. the Application.technet. D. You create a new inbound rule by using Windows Firewall with Advanced Security.com/Forums/windowsserver/en-US/5b3a0a9d-26a2-49ba-bbbe-29d11fcbb7ce/ nlb-on-hyperv?forum=winserverhyperv For NLB to be configured you need to enable MAC address spoofing.

microsoft.Let each Application determine whether to allow unsolicited traffic from the Internetthrough a NAT edge device.aspx QUESTION 39 You have a server named Server1 that runs a Server Core installation of Windows Server 2012.10%29. Defer to Application . Server1 is configured to obtain an IPv4 address by using DHCP.com/en-us/library/cc731927. Allow edge traversal . You need to configure the IPv4 settings of the network connection on Server1 as follows: .Prevent Applications from receiving unsolicited traffic from the Internet througha NAT edge device.microsoft. http://technet.Select one of the following options from the list: Block edge traversal (default) . Defer to user .Let the user decide whether to allow unsolicited traffic from the Internet through a NAT edgedevice when an Application requests it.aspx http://technet.com/en-us/library/dd421713%28v=ws.Allow Applications to receive unsolicited traffic directly from the Internet through aNAT edge device.

and a default gateway. To create a specific IP address object. D. OLD answer was: Set-NetIPInterface Modifies IP interface properties. Set-NetlPInterface netcfg.com/en-us/library/hh826125.exe Correct Answer: C Section: (none) Explanation Explanation/Reference: http://technet.1.microsoft. and an interface index or interface alias. IPv6 neighbor discovery settings.technet. specify either an IPv4 address or an IPv6 address. C.1.0 on DC2. Install Remote Server Administration Tools on DC2. Install Microsoft . Correct Answer: AD . B. then DHCP is automatically disabled. The domain contains the servers shown in the following table.1.254 What should you run? A. QUESTION 40 Your network contains an Active Directory domain named adatum. You need to ensure that you can use Server Manager on DC1 to manage DC2. D.255. Install Windows Management Framework 3.1 Subnet mask: 255. Choose two. We recommend that you define the prefix length.) A. Which two tasks should you perform? (Each correct answer presents part of the solution. The Set-NetIPInterface cmdlet modifies IP interface properties such as is DHCP.aspx The New-NetIPAddress cmdlet creates and configures an IP address. B. Install Remote Server Administration Tools on DC1.exe New-NetlPAddress msconfig. router settings and Wake on LAN (WoL) settings.com. also known as a subnet mask.0 Default gateway: 10.IP address: 10.com/b/askpfeplat/archive/2013/03/29/mailbag-how-do-you-set-network-adapter-settingswith-powershell-in-windows-8-or-windows-server-2012. C.1.NET Framework 4 on DC2.240. If you run this cmdlet to add an IP address to an interface on which DHCP is already enabled.aspx http://blogs.

run winrm.Section: (none) Explanation Explanation/Reference: http://technet. you must first install .0. In the Server Summary area of the Server Manager home page. but the following updates are required to fully manage these older operating systems (see above).0 on those servers. point to Administrative Tools.NET Framework 4. install a feature. and then click Server Manager. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server server role installed.aspx Windows Management Framework 3. select Enable remote management of this server from other computers. Server Manager on Server1.aspx#BKMK_windows To configure Server Manager remote management by using the Windows interface On the computer that you want to manage remotely. open Server Manager. B. What should you do first? A. a command prompt on Server2.com/en-us/library/hh921475. and then install Windows Management Framework 3. To manage a server remotely by using Server Manager. click Start. You need to manage DHCP on Server2 by using the DHCP console on Server1. the Microsoft Management Console on Server1. .microsoft. Note: In Windows Server 2012. You can use Server Manager to manage remote servers that are running Windows Server 2008 and Windows Server 2008 R2.com/en-us/library/dd759202.com. Server1 runs Windows Server 2012.exe. enable Windows Remote Management. To open Server Manager. To let this computer to be managed remotely by using Server Manager.0 To use this release of Server Manager to access and manage remote servers that are running Windows Server 2008 or Windows Server 2008 R2. D. Correct Answer: A Section: (none) Explanation Explanation/Reference: http://technet. you can use Server Manager to perform management tasks on remote servers.microsoft. C. add a snap-in. click Configure Server Manager Remote Management. The domain contains two servers named Server1 and Server2. From From From From Server Manager on Server2. Do one of the following. you add the server to the Server Manager server pool. Reference: Configure Remote Management in Server Manager QUESTION 41 Your network contains an Active Directory domain named contoso. Remote management is enabled by default on servers that are running Windows Server 2012.

by using Server Manager. but the following updates are required to fully manage these older operating systems. has a nice feature that allows you to remotely manage it. D.Note: * You can use Server Manager to manage remote servers that are running Windows Server 2008 and Windows Server 2008 R2. You need to install the Windows Network Virtualization Filter Driver on Server1. / Windows Management Framework 3. * The tasks that you can perform remotely by using Server Manager include: View Windows automatic updating status Run Best Practices Analyzer scans on roles. B. View or change Windows Firewall information View and manage roles Manage installed services roles View Internet Explorer Advanced Security Configuration settings (IE ESC) Configure Windows Error Reporting View or change Windows Customer Experience Improvement Program (CEIP) status Reference: Configure Remote Management in Server Manager QUESTION 42 You have a server named Server1 that runs Windows Server 2012. Set-NetVirtualizationGlobal Set-NetAdapterVmq Add-WindowsFeature Enable-NetAdapterBinding Correct Answer: D Section: (none) Explanation Explanation/Reference: . C. from another server or from a Windows 7 workstation. Which Windows PowerShell cmdlet should you run? A.0 / Performance Updates * Windows Server 2008 R2. unlike Windows Server 2008 RTM. You plan to enable Hyper-V Network Visualization on Server1.

C. C. When you attempt to connect to Server2 from Server Manager. You can use the Measure-VM or Measure-VMResourcePool cmdlet to obtain this data. Windows PowerShell. Add a second legacy network adapter.QUESTION 43 Server 1 and Server2 host a load-balanced Application pool named AppPool1. What should you do? A." You need to ensure that you can manage Server2 from Server1 by using Server Manager on Server1. Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 44 Your network contains an Active Directory domain named contoso.ADServiceAccountc mdlet.com zone. run Get-DNSServerDiagnostics. B. From From From From Windows PowerShell. D. You need to log the amount of system resources used by each virtual machine. you receive the following error message: "Credentials not valid. and then run the Set-VMNetworkAdoptercmdlet. From Windows Powershell. Server1 runs Windows Server 2012 and has the HyperV server role installed. Configure the Security settings of the contoso.microsoft.aspx The Enable-VMResourceMetering cmdlet starts collecting resource utilization data for a virtual machine or resource pool. Server1 and Server2 are part of a workgroup. You need to ensure that AppPool1 uses a group Managed Service Account as its identity. add a resource allocation policy. run the Measure-VM cmdlet. Run the New. Correct Answer: A Section: (none) Explanation Explanation/Reference: http://technet. you add Server2 to Server Manager. run the Enable-VMResourceMetering cmdlet. D. The domain contains a server named Server1. enable Accounting. Which 3 actions should you perform? A. Modify the settings of AppPool1. Windows System Resource Manager. B. What should you do? . On Server1. Install a domain controller that runs Windows Server 2012.com/en-us/library/hh848481. Windows System Resource Manager.com. QUESTION 45 You have two servers named Server1 and Server2 that run Windows Server 2012.

On Server 2.QUESTION 47 You have a server named Server1. Advanced User (Kerberos V5) Computer (Kerberos V5) Computer and user (Kerberos V5) Default . On Server 2. B. run the Set-NetFirewallRule cmdlet.microsoft. C. B. Join a domain by using the System Properties. C. You establish a Remote Desktop session to Server1.aspx To enable Server Manager remote management by using Windows PowerShell On the computer that you want to manage remotely. Correct Answer: A Section: (none) Explanation Explanation/Reference: Isn't this just obvious? -. Which authentication method should you configure in the connection security rule? A. run the Set-Item cmdlet. Correct Answer: A Section: (none) Explanation Explanation/Reference: http://technet.exe -enable QUESTION 46 You have a server named Server1 that runs a Server Core installation of Windows Server 2012 Standard. E. What should you identify? A. click Run as Administrator. and then press Enter to enable all required firewall rule exceptions. On Server 1.A. Modify the network settings by using Sconfig. and then click Run as Administrator. B. On Server 1. D. D. right-click Windows PowerShell on the taskbar. Disable services by using Msconfig. and then on the app bar. D. Install a feature by using Server Manger.com/en-us/library/hh921475. On the Windows desktop. install the Remote Server Administration Tools (RSAT). The rule must encrypt network communications across the Internet to a computer at another company. run the Configure-SmRemoting cmdlet. Type the following. right-click Windows PowerShell. On the Windows Start screen. Server1 runs Windows Server 2012 and is located in a perimeter network. You need to configure a custom connection security rule on Server1. You need to identify which task can be performed on Server1 from within the Remote Desktop session. do one of the following to open a Windows PowerShell session with elevated user rights. C. Configure-SMRemoting.

Correct Answer: B Section: (none) Explanation Explanation/Reference: Explanation: * Accounts that require access to the customer Active Directory will be granted a special right called Allowed to Authenticate. C.com.com and adatum. The network has Microsoft Exchange Server 2010 deployed. Change the type of Group1 to distribution.com.com.com. You need to prevent Group1 from being used to provide access to the resources in contoso. Modify the Allowed to Authenticate permissions in adatum. B.contoso.com. * For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication. C. What should you do? A. Modify the Managed By settings of Group1. B. D.com contains a universal group named Group1. Modify the name of Group1.com and adatum. Adatum.com. A one-way external trust exists between contoso. Which type of group should you create? A. The forest contains a child domain named corp. D. each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest. All servers run Windows Server 2012. This right is then applied to computer objects (Active Directory domain controllers and AD RMS servers) within the customer Active Directory to which the account needs access.Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 48 Your network contains two Active Directory forests named contoso. QUESTION 49 Your network contains an Active Directory forest named contoso. You need to create a mail-enabled distribution group. Domain local Global Local Universal Correct Answer: D Section: (none) Explanation .

aspx Universal groups Groups that are used to grant permissions on a wide scale throughout a domain tree or forest.com/en-us/library/bb726978. H. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012. E.com. Example: C:\PS>Install-ADDSDomainController -InstallDns -Credential (Get-Credential CORP\Administrator) DomainName "corp. G. Add-AdPrincipalGroupMembership .microsoft.contoso. D.com/en-us/library/hh974723. Which cmdlet should you run? A.com" QUESTION 51 Your network contains an Active Directory forest named contoso. QUESTION 50 Your network contains an Active Directory forest named contoso. Add-AdPrincipalGroupMembership Install-AddsDomainController Install WindowsFeature Install AddsDomain Rename-AdObject Set-AdAccountControl Set-AdGroup Set-User Correct Answer: B Section: (none) Explanation Explanation/Reference: http://technet.Explanation/Reference: http://technet. You need to disable the computer account of Computer1. Members of global groups include accounts and groups from any domain in the domain tree or forest. The forest contains a single domain.microsoft. The domain contains a user named User1 and a global security group named Group1. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012. C. Which cmdlet should you run next? A.com. You need to add a new domain controller to the domain. B. User1 logs on to a client computer named Computer1. Benjamin Craig page 248: Only universal groups should be used as mail-enabled groups. You install Windows Server 2012 on a new server named DC3. The forest contains a single domain. F. Microsoft Exchange Server 2007: Implementation and Administration By Jim McBee. The domain contains a user named User1 and a global security group named Group1.aspx The Install-ADDSDomainController cmdlet installs a domain controller in Active Directory.

aspx Set-ADAccountControl Enabled Specifies if an account is enabled. Possible values for this parameter include: $false or 0 $true or 1 The following example shows how to set this parameter to enable the account. This parameter sets the Enabled property for an account object. B. C. H.microsoft.B. Which cmdlet should you run? A.com. H. E. G. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012. You need to add DC2 as the first domain controller in a new domain in the forest. G. C.aspx Installs a new Active Directory domain configuration . E. An enabled account requires a password. D. F.com/en-us/library/hh974722. Install-AddsDomainController Install-WindowsFeature Install-AddsDomain Rename-AdObject Set-AdAccountControl Set-AdGroup Set-User Correct Answer: F Section: (none) Explanation Explanation/Reference: http://technet. -Enabled $true QUESTION 52 Your network contains an Active Directory forest named contoso. You reconfigure DC2 as a member server in the domain. The domain contains a user named User1 and a global security group named Group1. This parameter also sets the ADS_UF_ACCOUNTDISABLE flag of the Active Directory User Account Control (UAC) attribute.com/en-us/library/ee617249.microsoft. Add-AdPrincipalGroupMembership Install-AddsDomainController Install-WindowsFeature Install-AddsDomain Rename-AdObject Set-AdAccountControl Set-AdGroup Set-User Correct Answer: D Section: (none) Explanation Explanation/Reference: http://technet. D. F.

C. Correct Answer: B Section: (none) Explanation Explanation/Reference: You can change the connection type of a virtual switch from the virtual switch manager without having to remove it: . What should you do? A.contoso. Remove Switch1 and recreate Switch1 as an internal network. Remove Switch1 and recreate Switch1 as a private network. Server1 runs Windows Server 2012 and has the Hyper-V server role installed.contoso. You create an external virtual switch named Switch1.com -SiteName Houston -DatabasePath "D:\NTDS" -SYSVOLPath "D: \SYSVOL" -LogPath "E:\Logs" -NoRebootOnCompletion QUESTION 53 Your network contains an Active Directory domain named contoso. Change the Connection type of Switch1 to Private network. B. The solution must minimize network downtime for the virtual machines.com -InstallDNS -CreateDNSDelegation -DomainMode Win2003 ReplicationSourceDC DC1. Switch1 has the following configurations: Connection type: External network Single-root I/O visualization (SR-IOV): Enabled Ten virtual machines connect to Switch1.com.C:\PS>Install-ADDSDomain -Credential (Get-Credential CORP\EnterpriseAdmin1) -NewDomainName child ParentDomainName corp. The domain contains a member server named Server1. You need to ensure that all of the virtual machines that connect to Switch1 are isolated from the external network and can connect to each other only. D. Change the Connection type of Switch1 to Internal network.corp.

. C. Right-click VM1. B.QUESTION 54 You have a Hyper-V host named Server1 that runs Windows Server 2012. Correct Answer: C .. Delete the existing snapshots. VM1 has several snapshots. Server1 hosts a virtual machine named VM1 that runs Windows Server 2012. You need to modify the snapshot file location of VM1. What should you do? A. and then click Export. Modify the Hyper-V settings. and then modify the settings of VM1. Shut down VM1. D. and then modify the settings of VM1.

Section: (none) Explanation Explanation/Reference: In order for snapshot file location to be changed. all previous snapshots need to be deleted: .

exe command and specify the config parameter. From Windows PowerShell. Correct Answer: C Section: (none) . You need to change the DNS server used by IPv6. configure the Network Settings. C. From Windows PowerShell. From Sconfig. run the Set-NetIpv6Protocol cmdlet.QUESTION 55 You have a server that runs a Server Core installation of Windows Server 2012. D. Run the sc. B. What should you do? A. run the Set-DnsClientServerAddress cmdlet.

"10. You need to ensure that the feature can be installed on Server1. Connect Server1 to the Internet.aspx The Set-DnsClientServerAddress cmdlet sets one or more IP addresses for DNS servers associated with an interface. B. What is the minimum number of 256-GB disks required for the storage pool? A.aspx https://www.com/content/tools/RaidCalc/RaidCalc. You need to create a new 600-GB volume by using thin provisioning. D.asp http://www. Correct Answer: D Section: (none) Explanation Explanation/Reference: .5 Features feature on Server1.com/default. D.NET Framework 3. but the installation fails repeatedly. Install the Web Server (IIS) server role. do the math yourself: http://www. The new volume must use the parity layout. You try to install the Microsoft . PS C:\> Set-DnsClientServerAddress -InterfaceIndex 12 -ServerAddresses ("10. then the DNS servers will override any DHCP configuration for that interface.microsoft. in order to do a parity drive (raid 5) of 600GB we will need at least 4 drives. B.ibeast.2") QUESTION 56 You have a server named Server1 that runs Windows Server 2012.com/raid-calculator QUESTION 57 You have a server named Server1 that runs Windows Server 2012. What should you do? A.1".0.0. This cmdlet statically adds DNS server addresses to the interface. C.Explanation Explanation/Reference: http://technet.0. 2 3 4 5 Correct Answer: C Section: (none) Explanation Explanation/Reference: Based on the RAID calculators.0. C.com/en-us/library/jj590768. You plan to create a storage pool that will contain a new volume. If this cmdlet is used to add DNS servers to the interface. Run the Add-AppxProvisionedPackage cmdlet.raid-calculator.icc-usa. Run the Add-WindowsPackage cmdlet.

com zone. How many IPv6 subnets should you identify? A.NET Framework 3. The forest contains two domains named contoso. create a delegation. On DC2. Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 59 You are configuring the IPv6 network infrastructure for a branch office. The domain controllers are configured as shown in the following table.com. On DC1.com namespace.” These messages may be displayed for the following reasons: Your computer is not connected to the Internet. On DC2. What should you do? A. You need to ensure that DC2 can provide authoritative responses for queries to the contoso. and then retry the operation.” 0x800F081F: “The changes could not be completed.com.aspx If installing the .110). B.5 on demand or enabling it in Control Panel fails.http://msdn. C. On DC1. The corporate network administrator allocates the 2001:DB8:0:C000::/58 address space for use in the branch office. Please reboot your computer and try again. D. QUESTION 58 Your network contains an Active Directory forest named contoso. The forest contains two domain controllers. Please connect. Make sure that you're connected to the Internet.5 by using the Deployment Image Servicing and Management (DISM) command-line tool and specifying the installation media (ISO image or DVD) you installed Windows 8 from. D.com and child.contoso.com/en-us/library/hh506443(v=vs. C.microsoft. modify the Zone Transfers settings. you may get one of the following error messages: 0x800f0906: “Windows couldn't connect to the Internet to download necessary files. and click Retry to try again. create a forwarder. change the replication scope of the contoso.NET Framework 3. 32 64 128 1024 Correct Answer: B Section: (none) Explanation . You need to identify the maximum number of IPv6 subnets you can create. you can enable the . If you cannot connect to the Internet. B.

Choose two. E. C. You need to create an IPv6 reservation for Server2. D. You need to configure Printer1 to be available only from 19:00 to 05:00 every day.aspx The Add-DhcpServerv6Reservation cmdlet reserves a specified IPv6 address for the client identified by the specified Dynamic Host Configuration Protocol (DHCP) v6 unique identifier (ID) (DUID) and identity association ID (IAID).com/en-us/library/jj590730.Explanation/Reference: QUESTION 60 You have two servers named Server1 and Server2 that run Windows Server 2012. C. Server1 has the DHCP Server server role installed.microsoft. the hardware ID the DHCPv6 unique identifier the DHCPv6 identity association ID the SMSBIOS GUID the MAC address Correct Answer: BC Section: (none) Explanation Explanation/Reference: http://technet. B.) A. Which two values should you obtain from Server2? (Each correct answer presents part of the solution. B. You install a printer on Server1. D. E. Which settings from the properties of Printer1 should you modify? A. QUESTION 61 You have a print server named Server1. Device Settings Advanced Security Ports Sharing Correct Answer: B Section: (none) Explanation Explanation/Reference: . You share the printer as Printer1.

QUESTION 62 Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012. You log on to Server1. You need to retrieve a list of the active TCP connections on Server2. Which command should you run from Server1? A. B. C. D. winrm get server2 dsquery * -scope base -attrip,server2 winrs -r:server2netstat netstat> server2

Correct Answer: C Section: (none) Explanation Explanation/Reference: http://msdn.microsoft.com/en-us/library/aa384291(v=vs.85).aspx This command line tool enables administrators to remotely execute most Cmd.exe commands using the WSManagement protocol.

QUESTION 63 You have a server named Server1 that has the Print and Document Services server role installed. You need to provide users with the ability to manage print jobs on Server1 by using a web browser. What should you do? A. B. C. D. Start the Computer Browser service and set the service to start automatically. Install the LPD Service role service. Install the Internet Printing role service. Start the Printer Extensions and Notifications service and set the service to start automatically.

Correct Answer: C Section: (none) Explanation Explanation/Reference: http://technet.microsoft.com/en-us/library/cc731368(v=ws.10).aspx

QUESTION 64 Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012. You plan to create a shared folder. T he shared folder will have a quota limit. You discover that when you run the New Share Wizard, you cannot select the SMB Share Advanced option. You need to ensure that you can use SMB Share - Advanced to create the new share. What should you do on Server1 before you run the New Share Wizard? A. Configure the Advanced system settings.

B. Run the Install-WindowsFeature cmdlet. C. Run the Set-SmbShare cmdlet. D. Install the Share and Storage Management tool. Correct Answer: B Section: (none) Explanation Explanation/Reference:

Install-windowsfeature -name fs-resource-manager -includemanagementtools Installs one or more Windows Server roles, role services, or features on either the local or a specified remote server that is running Windows Server 2012. This cmdlet is equivalent to and replaces Add- WindowsFeature, the cmdlet that was used to install roles, role services, and features in Windows Server 2008 R2. http://www.c-sharpcorner.com/UploadFile/cd7c2e/how-to-install-the-file-server-resource-manager-in-windowss/ QUESTION 65 Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012. A one-way external trust exists between contoso.com and adatum.com. Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com.

Run the Set-GPPermission cmdiet. each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest.com. Add User1 to the Group Policy Creator Owners group.com\Policies folder.com.com\SYSVOL\Contoso.com/en-us/library/cc816733(v=ws. Correct Answer: D Section: (none) Explanation Explanation/Reference: http://www. B. QUESTION 66 Your network contains an Active Directory domain named contoso. D.com. The solution must minimize the number of permissions assigned to User1. Modify the Allowed to Authenticate permissions in contoso.howtogeek. Enable SID quarantine on the trust between contoso. D.aspx * For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication. You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to 0U1. Modify the permission on the \\Contoso. C. Correct Answer: B Section: (none) Explanation Explanation/Reference: http://technet.microsoft. Modify the Allowed to Authenticate permissions in adatum. What should you do? A.com and adatum. Run the Delegation of Control Wizard on OU1.10).com.com/50166/using-the-delegation-of-control-wizard-to-assign-permissions-in-server-2008/ . C. B. Change the scope of Group1 to domain local. The domain contains 100 user accounts that reside in an organizational unit (OU) named OU1.What should you do? A.

com and two sites named Site1 and Site2. When the link between Site1 and Site2 fails.com. the placement of the global catalog server B.com and child. the placement of the PDC emulator C. the placement of the infrastructure master .contoso. users fail to log on to Site2. The forest contains two domains named contoso. You need to identify what prevents the users in Site2 from logging on to the child.com domain.contoso. The domains and the sites are configured as shown in following table.QUESTION 67 Your network contains an Active Directory forest named contoso. What should you identify? A.

You need to ensure that you can clone DC1. The forest contains a single domain. and placement.10).com/en-us/library/cc773108(v=ws. You plan to create a cloned domain controller named DC3 from an image of DC1. cloning fails. At any time. Modify the contents of the DefaultDCCIoneAllowList.10).xml file on DC1.xml file is required for cloning Domain controllers. the placement of the domain naming master Correct Answer: B Section: (none) Explanation Explanation/Reference: http://technet.aspx The PDC emulator master processes password changes from client computers and replicates these updates to all domain controllers throughout the domain.microsoft. If this domain controller cannot connect to the PDC emulator. Correct Answer: AB Section: (none) Explanation Explanation/Reference: http://technet.microsoft. E. Choose two.aspx The PDC emulator processes password changes from earlier-version clients and other domain controllers on a best-effort basis. formatting.Create DCCloneConfig. synchronizes time. and password updates cannot be replicated to it. Both domain controllers are virtual machines on a HyperV host. For that reason. C.com. QUESTION 68 Your network contains an Active Directory forest named contoso. otherwise.microsoft.com/en-us/library/jj574223. by default. Step 3 .xml file is optional unless you install applications or potentially incompatible Windows services on the source domain controller. Add the computer account of DC3 to the Cloneable Domain Controllers group. D. and. All servers runs Windows Server 2012.D. Add the computer account of DC1 to the Cloneable Domain Controllers group. The CustomDCCloneAllowList.aspx Step 5 . you should always use the Windows PowerShell cmdlets to create the XML files and place them in the correct location.) A. there can be only one domain controller acting as the PDC emulator master in each domain in the forest.Authorize a Source DC The source domain controller must have the control access right (CAR) Allow a DC to create a clone of itself on . http://technet. The domain contains two domain controllers named DC1 and DC2.com/en-us/library/dd391870(v=ws. Its contents allow you to specify unique details like the new computer name and IP address. handles password authentication requests involving passwords that have recently changed and not yet been replicated throughout the domain. it may not be able to synchronize time.xml The DcCloneConfig. B.xml file on DC1. this domain controller cannot process authentication requests. The files require precise naming. Run the Enable-AdOptionalFeaturecmdlet. Create a DCCIoneConfig. Which two actions should you perform? (Each correct answer presents part of the solution.

and then click Properties . click Administrative Tools .com domain. QUESTION 69 Your network contains an Active Directory forest. To open Active Directory Sites and Services. modify the properties of the DC1 computer account. click Start . You need to automate the creation of user accounts for the 500 temporary employees. QUESTION 70 Your network contains an Active Directory domain named contoso.aspx To add or remove the global catalog Open Active Directory Sites and Services. right-click NTDS Settings of the selected server object. B.com.contoso. or clear the check box to remove the global catalog. All domain controllers run Windows Server 2012 and are configured as global catalog servers.com and corp. B. Active Directory Domains and Trusts. Active Directory Administrative Center. Your company hires 500 temporary employees for the summer. The human resources department gives you a Microsoft Excel document that contains a list of the temporary employees. By default.com/en-us/library/cc755257. The Set-ADUser cmdlet and the Add-Member cmdlet The Import-CSV cmdlet and the New-ADUsercmdlet ADSI Edit Active Directory Users and Computers . You need to disable the global catalog on DC1. Which tool or tools should you use? A. C. C.contoso. modify the properties of the DC1 computer account. the well-known group Cloneable Domain Controllers has this permission and contains no members. click Start .msc . D.com domain contains a domain controller named DC1. type dssite. modify the NTDS Settings of the DC1 server object. Select the Global Catalog check box to add the global catalog.microsoft. The forest contains two domains named contoso. The PDCE creates this group when that FSMO role transfers to a Windows Server 2012 domain controller. and then click Active Directory Sites and Services .com. modify the properties of the corp.the domain NC head. What should you do? A. The corp. D. Active Directory Sites and Services.contoso. Correct Answer: C Section: (none) Explanation Explanation/Reference: http://technet. In the console tree. Where? Active Directory Sites and Services\Sites\SiteName\Servers In the details pane. From From From From Active Directory Users and Computers. click the server object to which you want to add the global catalog or from which you want to remove the global catalog. To open Active Directory Sites and Services in Windows Server® 2012.

The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012. . Group3.com/en-us/library/ee176874. An administrator creates a security template named Template1. The domain contains two servers named Server1 and Server2 that run Windows Server 2012. The domain contains a server named Server1.com. D.aspx QUESTION 71 Your network contains an Active Directory domain named contoso. Which snap-in should you use? A. Security Templates Authorization Manager Security Configuration and Analysis Resultant Set of Policy Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 73 Your network contains an Active Directory forest named contoso.com. B. The domain contains a user named User1 and three global security groups named Group1. The forest contains a single domain. C. D. You create a security template named Template1 by using the Security Templates snap-in.Correct Answer: B Section: (none) Explanation Explanation/Reference: http://technet.com. . Server1 runs Windows Server 2012. B. Group2 and. System Configuration Local Security Policy Certificate Templates Computer Management Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 72 Your network contains an Active Directory domain named contoso.microsoft. Which tool should you use? A. You need to Apply Template1 to Server1. C.

AddsDomainController Install.microsoft. F. Which cmdlet should you run? A. G. C. D. G. E.aspx The Add-ADPrincipalGroupMembership cmdlet adds a user.com. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012. C. Which cmdlet should you run? A.You need to add User1 to Group1. F. . The solution must minimize the number of permissions assigned to User1. or computer as a new member to one or more Active Directory groups. Group2.AddsDomainController Install. You need to ensure that User1 can manage the group membership of Group1.com/en-us/library/ee617203. B. group. E. H. QUESTION 74 Your network contains an Active Directory forest named contoso. and Group3.aspx The Set-ADGroup cmdlet modifies the properties of an Active Directory group.WindowsFeature Install-AddsDomain Rename-AdObject Set-AdAccountControl Set-AdGroup Set-User Correct Answer: G Section: (none) Explanation Explanation/Reference: http://technet. Add-AdPrincipalGroupMembership Install. service account. Add-AdPrincipalGroupMembership Install. You can modify commonly used property values by using the cmdlet parameters. The forest contains a single domain. D. B. H.WindowsFeature Install-AddsDomain Rename-AdObject Set-AdAccountControl Set-AdGroup Set-User Correct Answer: A Section: (none) Explanation Explanation/Reference: http://technet. The domain contains a user named User1 and a global security group named Group1.microsoft.com/en-us/library/ee617199.

AddsDomainController Install. The domain contains a user named User1 and a global security group named Group1.com. CannotChangePassword Modifies the ability of an account to change its password. Distinguished Name Example: CN=SaraDavis. The forest contains a single domain. G.WindowsFeature Install-AddsDomain Rename-AdObject Set-AdAccountControl Set-AdGroup Set-User Correct Answer: F Section: (none) Explanation Explanation/Reference: http://technet.DC=contoso. Which cmdlet should you run? A.com/en-us/library/ee617249.OU=Europe. B. E. C. VM2 must not require access to the SAN. This parameter changes the Boolean value of the CannotChangePassword property of an account. Which two configurations should you perform? (Each correct answer presents part of the solution.) .aspx Set-ADAccountControl The Set-ADAccountControl cmdlet modifies the user account control (UAC) values for an Active Directory user or computer account. You need to provide VM1 with direct access to the SAN.DC=com GUID (objectGUID) Example: 599c3d2e-f72d-4d20-8a88-030d99495f20 Security Identifier (objectSid) Example: S-1-5-21-3165297888-301567370-576410423-1103 SAM Account Name (sAMAccountName) Example: saradavis QUESTION 75 Your network contains an Active Directory forest named contoso. Choose two.CN=Users.ManagedBy Specifies the user or group that manages the object by providing one of the following property values. You need to prevent User1 from changing his password. The solution must minimize administrative effort. D. Note: The identifier in parentheses is the LDAP display name for the property. To disallow password change by the account set this to $true.microsoft. -CannotChangePassword $false QUESTION 76 You have a Hyper-V host named Host1 that connects to a SAN by using a hardware Fibre Channel adapter. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012. Add-AdPrincipalGroupMembership Install. F. The following example shows how to specify the PasswordCannotChange parameter. UAC values are represented by cmdlet parameters. H.DC=corp.. Host1 contains two virtual machines named VM1 and VM2.

On Host1.A. . Etc. the next step in the process is to link a virtual machine to the virtual SAN. C. select the Add Hardware container. The easiest way to accomplish this is to open the Hyper-V Manager. as shown in the figure above. and then choose the Virtual SAN Manager command from the shortcut menu. D. Correct Answer: AD Section: (none) Explanation Explanation/Reference: Page 164 exam ref 70-410 Step 1: D: Building a Virtual SAN The process of setting up virtual Fibre Channel starts with building a virtual SAN. right click on the listing for your Hyper-V server in the console tree. On Host1. configure a new Virtual Fibre Channel SAN. On VM1. Next. To do so. right click on the virtual machine for which you want to provide Fibre Channel connectivity and select the Settings command from the resulting shortcut menu. E. and then select the Fibre Channel Adapter option from the list of available hardware. add a network adapter. On VM1. B. configure a Fibre Channel adapter. On Host1. Step 2: A: Once you have created a virtual SAN. configure a new virtual switch. modify the Hyper-V settings.

Server1 has 8 GB of RAM. The settings of a virtual machine named Server3 are configured as shown in the exhibit .Note: * Virtual Fibre Channel for Hyper-V (also referred to as Synthetic Fibre Channel) provides VM guest operating systemswith direct access to a Fibre Channel SAN by using a standard World Wide Name (WWN) associated with a virtual machine QUESTION 77 You have a server named Server1 that runs Windows Server 2012. Server1 has the HyperV server role installed. Server1 hosts five virtual machines that run Windows Server 2012.

Which settings should you modify? A. C. BIOS Automatic Start Action Automatic Stop Action Integration Services Correct Answer: C Section: (none) Explanation Explanation/Reference: http://www. B. The solution must prevent data loss.com/hyper-v/hyper-v-automatic-start-and-stop-action/ . D.altaro.You need to ensure that when Server1 restarts. Server3 automatically resumes without intervention.

install the Wireless LAN Service feature.com/en-us/library/hh994698. select the server for which you want to enable the Wireless LAN Service.com. You need to ensure that you can connect to Network1 from Windows Server 2012. D. You install Windows Server 2012 on a . You install the drivers for the wireless network adapter. B. The Add Roles and Features Wizard opens. C. and then click Next. In Select Server features. click Next. In Select server roles. Computer1 connects to a wireless network named Network1. Computer1 has a wired network adapter and a wireless network adapter. and then click Next. Correct Answer: C Section: (none) Explanation Explanation/Reference: http://technet. configure the settings of Windows Connection Manager. click Manage. configure the Wireless Network (IEEE 802.aspx The Wireless LAN service is a feature in Windows Server® 2012 that you can use to enable the wireless WLAN AutoConfig service. What should you do? A. and configures the necessary settings on the wireless network adapter. you install Windows Server 2012 on Computer1 as a second operating system. Once enabled. In Select installation type. select Role-based or feature-based installation.11) Policies settings.microsoft. Computer1 runs Windows 8 Enterprise. enable Select a server from the server pool. From Server Manager. select Wireless LAN Service. the WLAN AutoConfig service dynamically selects which wireless network the computer automatically connects to. This includes automatically selecting and connecting to a more preferred wireless network when one becomes available. QUESTION 79 Your network contains an Active Directory domain named contoso. and then click Next. Click Next. and in Server Pool. in Features. From a local Group Policy object (GPO). To enable the Wireless LAN Service In Server Manager Dashboard.QUESTION 78 You have a laptop named Computer1. In Select destination server. Restart the WLAN AutoConfig service. and then click Add Roles and Features. From a local Group Policy object (GPO). For testing purposes. and to configure the WLAN AutoConfig service for automatic startup.

E. F. B.new server named Server1 and you join Server1 to the domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012. The forest contains a single domain. D. Performance Monitor. C. The domain contains a user named User1 and a global security group named Group1.com. Performance Monitor. D. You need to modify the SAM account name of Group1. Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 80 Your network contains an Active Directory forest named contoso. From From From From Server Manager. click Configure Performance Alerts. Server Manager. click Start Performance Counters. B. C. Which cmdlet should you run? A. Add-AdPrincipalGroupMembership Install AddsDomainControNer Install WindowsFeature Install AddsDomain Rename-AdObject Set-AdAccountControl . You need to ensure that you can view processor usage and memory usage information in Server Manager. What should you do? A. create a Data Collector Set (DCS). start the System Performance Data Collector Set (DCS).

use the SetADUser. Right-click VM1. D.microsoft. The properties of the new volume are shown in the exhibit. B.youtube. A network technician installs a new disk on Server1 and creates a new volume. (Click the Exhibit button. computer..aspx To modify the Security Accounts Manager (SAM) account name of a user. Set-ADComputer or Set-ADGroup cmdlet. and then modify the settings of VM1.com/2012/09/02/relocating-a-hyper-v-vm-folder/ It is not A. or group. Shut down VM1.wordpress. and then modify the settings of VM1.. You need to modify the snapshot file location of VM1. Pause VM1. Delete the existing snapshots. C. and then click Export. What should you do? A. and then modify the settings of VM1. Correct Answer: C Section: (none) Explanation Explanation/Reference: http://doquent. QUESTION 81 You have a Hyper-V host named Server1 that runs Windows Server 2012.G.com/en-us/library/hh852319. Set-AdGroup H. VM1 has several snapshots. watch this: http://www. Server1 hosts a virtual machine named VM1 that runs Windows Server 2012.) .com/watch?v=YvwtpPQk0Cs QUESTION 82 You have a server named Server1 that runs Windows Server 2012. Set-User Correct Answer: G Section: (none) Explanation Explanation/Reference: http://technet.

What should you do first? A. Run the convert. B. File1 contains a shared folder named Share1. C. Correct Answer: B Section: (none) Explanation Explanation/Reference: http://blogs.exe QUESTION 83 You have a file server named File1 that runs Windows Server 2012. . The NTFS permissions for Share1 are shown in the following table. D.com/b/askpfeplat/archive/2013/01/02/windows-server-2012-does-refs-replace-ntfs-whenshould-i-use-it.aspx REFS to NTFS requires format not convert.You need to ensure that you can enable NTFS disk quotas for volume D.exe. Format volume D.technet.exe command. Share1 contains an Application named SalesApp1. Install the File Server Resource Manager role service. Convert the disk to a dynamic disk.

. The domain contains two servers named Server1 and Server2 that run Windows Server 2012. D. write. configure the security filtering of GPO1. On Server2. Correct Answer: D Section: (none) Explanation Explanation/Reference: http://www. D. in order to add files they need the NTFS permission called MODIFY. On Server1.The members of L_Sales discover that they cannot add files to Share1. you open Print Management and you deploy a printer named Printer1 by using a Group Policy object (GPO) named GPO1. install the Group Policy Management feature. so the users from L_sales have read & execute. On Server1. When you open GPO1 on Server1. Based on NTFS permissions: Modify: Users can view and modify files and file properties. Correct Answer: C Section: (none) Explanation . B.com. QUESTION 84 Your network contains an Active Directory domain named contoso. Edit the Share permissions. On a domain controller. create a Group Policy central store. you discover that the Deployed Printers node does not appear. Server1 has the Group Policy Management feature installed. B.. You need to ensure that the members of L_Sales can add files to Share1. What should you do? A. Server2 has the Print and Document Services server role installed. On Server2. Add L_Sales to the Domain Users group.techrepublic. Domain users can run SalesApp1. including deleting and adding files to a directory or file properties to a file. Add the Domain Users group to L_Sales. You need to view the Deployed Printers node in GPO1. What should you do? A. C. modify the Group Policy filtering options of GPO1.exe successfully. C. Edit the NTFS permissions.com/article/windows-101-know-the-basics-about-ntfs-permissions/ The least restrictive permission applies here.

com/en-us/library/cc725932. You will also need the Print Services role installed on a server (can be on your DC).co. From Local Group Policy Editor on Server1.com/en-us/library/ee791816(v=ws.xml file.10). Import the . then the new policy will overwrite the existing policy.com. All of the Applocker policy settings for the member servers are configured in a Group Policy object (GPO) named GPO1. If no Lightweight Directory Access Protocol (LDAP) is specified. so I can only think that it does not deploy the GPO because it had no GPMC on server 2.com/?page_id=1591 http://technet. From Server1. From Server1. .petri.microsoft. When the Merge parameter is used. the local GPO is the default. ready to deploy to your client computers. The wording does not say if GPMC is installed on server 2. and this article assumes that your Domain Controller is a Windows 2008 R2 Server. GPMC is not installed by default: http://pipe2text. Correct Answer: C Section: (none) Explanation Explanation/Reference: http://technet.xml file by using Group Policy Management Editor. C. Its assumed that you have already followed Part One and have one or more printers shared on your server with the necessary drivers. B.inf file by using Group Policy Management Editor.aspx QUESTION 85 Your network contains an Active Directory domain named contoso. From Local Group Policy Editor on Server1.htm# Pre-Requisites To use Group Policy for printer deployment you will need to have a Windows Active Directory domain.Explanation/Reference: Changed answer from A t C. A member server named Server1 runs Windows Server 2012. run the New-ApplockerPolicy cmdlet..inf file.aspx The Set-AppLockerPolicy cmdlet sets the specified Group Policy Object (GPO) to contain the specified AppLocker policy.microsoft. rules in the specified AppLocker policy will be merged with the AppLocker rules in the target GPO specified in the LDAP path. exportan . and you will be using the Print Management and Group Policy Management consoles to configure the various settings. run the Set-ApplockerPolicy cmdlet. On Server1. The merging of policies will remove rules with duplicate rule IDs. If the Merge parameter is not specified. you test a new set of Applocker policy settings by using a local computer policy. D. and the enforcement setting specified by the AppLocker policy in the target GPO will be preserved. look at this: http://www.il/deploying-printers-using-group-policy-windows-2008. exportan . What should you do? A. Import the . You need to merge the local Applocker policy settings from Server1 into the Applocker policy settings of GPO1.

Local Group Policy object—Each computer has exactly one Group Policy object that is stored locally. The domain contains an Application server named Server1. Finally. . enable the Enforced option on GP1. Correct Answer: D Section: (none) Explanation Explanation/Reference: http://technet. What should you do? A. GP1 contains a software restriction policy that blocks an Application named App1. From Group Policy Management. From Group Policy Management.aspx Order of processing settings This section provides details about the order in which Group Policy settings for users and computers are processed. In the local Group Policy of Computer1.microsoft.com/en-us/library/cc785665(v=ws. and so on. You join Computer1 to the domain. add an Application control policy to GP1. Group Policy settings are processed in the following order: 1. You have a workgroup computer named Computer1 that runs Windows 8. the GPOs that are linked to the organizational unit that contains the user or computer are processed. Server1 runs Windows Server 2012. configure a software restriction policy. Server1 is configured as an FTP server. This processes for both computer and user Group Policy processing.) QUESTION 87 Your network contains an Active Directory domain named contoso. run gpupdate /force. On Server1. on the Linked Group Policy Objects tab for the domain in GPMC.exe.exe. You have a Group Policy object (GPO) named GP1 that is linked to the domain. you create a firewall rule to allow connections on TCP port 21.QUESTION 86 Your network contains an Active Directory domain named contoso. A local Group Policy on Computer1 contains an Application control policy that allows App1.Domain—Processing of multiple domain-linked GPOs is in the order specified by the administrator. Run netsh firewall addportopening TCP 21 dynamicftp. 4. B. D. then GPOs that are linked to its child organizational unit. You need to prevent App1 from running on Computer1. 2.10).com.exe uses TCP port 21 as the control port and dynamically requests a data port. App1.** (If there are no conflicts. then the earlier and later settings are merely aggregated.com. 3.Organizational units—GPOs that are linked to the organizational unit that is highest in the Active Directory hierarchy are processed first. Client computers use an FTP Application named App1. What should you do? A.Site—Any GPOs that have been linked to the site that the computer belongs to are processed next. From Computer1. You need to configure Server1 to support the client connections from App1. **which overwrites settings in the earlier GPOs if there are conflicts. C. and GPOs that are linked to the organizational unit of which the computer or user is a direct member are processed last. This order means that the local GPO is processed first.

the computer accounts are automatically created in an organizational unit (OU) named All_Computers. Correct Answer: D Section: (none) Explanation Explanation/Reference: http://technet. the add command only has one variation. From From From From Ldp. B. Syntax set global statefulftp { enable | disable | notconfigured } Parameters statefulftp can be set to one of the following values: enable The firewall tracks the port numbers specified in PORT command requests and in the responses to PASV requests. The firewall does not track outgoing PORT commands or PASV responses. the firewall examines the PORT and PASV requests for these other port numbers and then allows the corresponding data connection to the port number that was requested. C. Windows PowerShell. When statefulftp is enabled. notconfigured Valid only when netsh is configuring a GPO by using the set store command. C. D. the add rule command. You discover that when users join computers to the domain. What should you do? A. ADSI Edit.B.com. and then allows the incoming FTP data traffic entering on the requested port number. configure the properties of the Computers container.exe command. You need to ensure that when users join computers to the domain. run the redircmp. We recommend that you do not use this context on a computer that is running Windows Vista or a later version of Windows In the netsh advfirewall firewall context.com/en-us/library/cc771920%28v=ws. configure the properties of the Computers container. disable This is the default value. Correct Answer: D Section: (none) . run the Move-ADObjectcmdlet. QUESTION 88 Your network contains an Active Directory domain named adatum. Netsh advfirewall set global statefulftp: Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port. D. Create a tunnel connection security rule.microsoft. a command prompt.aspx#BKMK_set_2a The netsh firewall context is supplied only for backward compatibility. Create an outbound firewall rule to allow App1. the computer accounts are created in the Computers container. Run netshadvfirewall set global statefulftp enable.10%29.exe. and so incoming data connections on the PORT or PASV requested port is blocked as an unsolicited incoming connection.

168. You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all of the subnets.255. target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers.255. you can perform reverse lookups for the servers in the contoso.exe add -p 192.com domain. route.255. Each forest contains one domain.0 mask 255.0 mask 255. C.168. From a computer in the adatum.255. From a computer in the contoso.exe add -p 192. Which command should you run? A.12.248.8.0 172.255. The forests use the address spaces shown in the following table.252.255. You need to ensure that you can perform reverse lookups for the servers in the adatum.168. but you cannot perform reverse lookups for the servers in the adatum.31.exe add -p 192.exe add -p 192.microsoft.31.254 route. What should you create? .com domain.255.aspx Redirects the default container for newly created computers to a specified.31.com domain.Explanation Explanation/Reference: http://technet.com domain.com.0 172. A two-way forest trust exists between the forests.254 route.0 172.255. QUESTION 89 Your company has a main office and four branch offices.254 route.12. D.254 Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 90 Your network contains two Active Directory forests named contoso.31. B.com domain.0 mask 255.0 172.com/en-us/library/cc770619. The main office contains a server named Server1 that runs Windows Server 2012.com and adatum.com domain from the computers in the contoso.0. you can perform reverse lookups for the servers in both domains.252.168. The IP configuration of each office is configured as shown in the following table.0 mask 255.255.

You can monitor main mode SAs for information like which peers are currently connected to this computer and which protection suite was used to form the SA. Forwarding according to domain names improves conventional forwarding by adding a name-based condition to the forwarding process. For example.com/en-us/library/cc757172(v=ws.A. expand Security . Event Viewer. The conditional forwarder setting for a DNS server consists of the following: The domain names for which the DNS server will forward queries.microsoft. then the query is forwarded to the IP address of a forwarder associated with the domain name. If the DNS server is configured to forward for the domain name designated in the query. Instead of forwarding all queries it cannot resolve locally to a forwarder.10). You need to view which authentication method was used to establish the initial IPSec connection. When a DNS client or server performs a query operation against a DNS server. exchanging keying material to establish a shared secret key. The domain contains two servers named Server1 and Server2 that run Windows Server 2012. To get to this view In the Windows Firewall with Advanced Security MMC snap-in. Correct Answer: D Section: (none) Explanation Explanation/Reference: http://technet.10). search the Application Log for events that have an ID of 1704. each of the queries for the domain names is forwarded to a DNS server associated with the domain name.aspx Main mode negotiation establishes a secure channel between two computers by determining a set of cryptographic protection suites. Server2 establishes an IPSec connection to Server1. and authenticating computer and user identities. From From From From Windows Firewall with Advanced Security. view the quick mode security association. Windows Firewall with Advanced Security. D. a delegation a trust point a conditional forwarder a GlobalNames zone Correct Answer: C Section: (none) Explanation Explanation/Reference: http://technet.aspx Conditional forwarders are DNS servers that only forward queries for specific domain names. expand Monitoring. C. D. B. view the main mode security association.microsoft. C.com/en-us/library/dd448497(v=ws. What should you do? A. search the Security Log for events that have an ID of 4672. QUESTION 91 Your network contains an Active Directory domain named contoso. a conditional forwarder is configured to forward a query to specific forwarders based on the domain name contained in the query. Event Viewer. in the following figure. the DNS server looks to see if the query can be resolved using its own zone data or the data stored in its cache. One or more DNS server IP addresses for each domain name specified. B.com. A security association (SA) is the information maintained about that secure channel on the local computer so that it can use the information for future network traffic to the remote computer.

reorder.) . QUESTION 92 Your network contains an Active Directory domain named contoso. Encryption: The encryption method used by the SA to secure quick mode key exchanges. 2nd Authentication Remote ID: The authenticated identity of the remote computer used in second authentication. GPO1 is linked to an organizational unit (OU) named OU1. You open Group Policy Management as shown in the exhibit. The following information is available in the table view of all main mode SAs. 2nd Authentication Local ID:: The authenticated identity of the local computer used in second authentication. and sort by these columns in the Results pane: Local Address: The local computer IP address. Remote Address: The remote computer or peer IP address. Integrity: The data integrity method used by the SA to secure quick mode key exchanges.com. Main mode SA information You can add. Key Exchange: The Diffie-Hellman group used to create the main mode SA. (Click the Exhibit button. To see the information for a single main mode SA. 1st Authentication Local ID:: The authenticated identity of the local computer used in first authentication. 1st Authentication Method: The authentication method used to create the SA. 2nd Authentication Method: The authentication method used in the SA. remove. The help desk reports that GPO1 Applies to only some of the users in OU1. double-click the SA in the list. and then click Main Mode. 1st Authentication Remote ID: The authenticated identity of the remote computer used in first authentication.Associations. You have a Group Policy object (GPO) named GPO1 that contains several user settings.

You need to configure GPO1 to Apply to all of the users in OU1.exe.exe uses TCP port 21 as the control port and dynamically requests a data port. Modify the Security settings of GPO1. Correct Answer: D Section: (none) Explanation Explanation/Reference: http://technet.10). C.exe.aspx QUESTION 93 Your network contains an Active Directory domain named contoso. D. Create a tunnel connection security rule. Disable Block Inheritance on OU1. You need to configure Server1 to support the client connections from App1. Run netshadvfirewall set global statefulftp enable. The domain contains an Application server named Server1. Enforce GPO1. Server1 is configured as an FTP server. App1.com/en-us/library/cc739343(v=ws. Modify the GPO status of GPO1. On Server1. Client computers use an FTP Application named App1. Run Set-NetFirewallRule -DisplayNameDynamicFTP -Profile Domain . B. C.exe.com. B. you create a firewall rule to allow connections on TCP port 21.microsoft. D. Create an inbound firewall rule to allow App1. Server1 runs Windows Server 2012. What should you do? A. What should you do? A.

Correct Answer: A Section: (none) Explanation Explanation/Reference: http://technet. Syntax set global statefulftp { enable | disable | notconfigured } Parameters statefulftp can be set to one of the following values: enable The firewall tracks the port numbers specified in PORT command requests and in the responses to PASV requests. notconfigured Valid only when netsh is configuring a GPO by using the set store command. and so incoming data connections on the PORT or PASV requested port is blocked as an unsolicited incoming connection. What should you instruct User1 to do? . and then allows the incoming FTP data traffic entering on the requested port number. an administrator creates a virtual machine named VM1.com/en-us/library/cc771920%28v=ws. A user named User1 is the member of the local Administrators group on Server1. The firewall does not track outgoing PORT commands or PASV responses. You need to ensure that User1 can modify the settings of VM1 by running the Set-Vm cmdlet. When statefulftp is enabled. We recommend that you do not use this context on a computer that is running Windows Vista or a later version of Windows In the netsh advfirewall firewall context. Netsh advfirewall set global statefulftp: Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port.microsoft. QUESTION 94 Your network contains an Active Directory domain named contoso. On Server1. the add command only has one variation.aspx#BKMK_set_2a The netsh firewall context is supplied only for backward compatibility. Server1 runs Windows Server 2012 and has the HyperV server role installed. User1 attempts to modify the settings of VM1 as shown in the following exhibit.com. The domain contains a server named Server1.10%29. disable This is the default value. the add rule command. the firewall examines the PORT and PASV requests for these other port numbers and then allows the corresponding data connection to the port number that was requested.

B. D.A. . Run Windows PowerShell with elevated privileges. On Server1. Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 95 You have a server named Server1 that runs Windows Server 2012. Modify the membership of the local Hyper-V Administrators group. you open Computer Management as shown in the exhibit. C. Install the Integration Services on VM1. Import the Hyper-V module.

You need to ensure that you can create a 3-TB volume on Disk 1. Create a storage pool. Server1 runs a Server Core installation of Windows Server 2012. Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 96 You have 3 server named Server1. and then attach the VHD. Convert the disk to a GPT disk.1. The local area connection on Server1 has the following configuration: IP address: 10. C. D. B. What should you do first? A. Create a VHD.1 . Convert the disk to a dynamic disk.1.

200 as the preferred DNS server.1.cmd interface QUESTION 97 Your network contains two subnets.cmd) to configure and manage several common aspects of Server Core installations. . D. You need to configure Server1 to use 10. Sconfig. Which command should you run? A. Network settings You can configure the IP address to be assigned automatically by a DHCP Server or you can assign a static IP address manually.exe Correct Answer: A Section: (none) Explanation Explanation/Reference: In Windows Server 2012.0 Default gateway: 10.255.254 Preferred DNS server: <none> The network contains a DNS server that has an IPv4 address of 10.1.1.200. This option allows you to configure DNS Server settings for the server as well. B.1.1.cmd net.240.1. sconfig. you can use the Server Configuration tool (Sconfig. The subnets are configured as shown in the following table.Subnet mask: 255.exe Set-NetIPInterface netsh. The solution must not change any other settings on Server1. C.

C. D. Set the state of the Teredo interface to disable. You need to ensure that Server1 can communicate with the client computers on LAN2.0 route. Server1 is connected to LAN1.10. You run the route print command as shown in the exhibit. Correct Answer: A Section: (none) Explanation . B. Set the state of the Microsoft ISATAP Adapter #2 interface to disable. Change the metric of the 10.1. What should you do? A.You have a server named Server1 that runs Windows Server 2012. Change the default gateway address.

10). you can use fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. to increase the security of privileged accounts. you may want to apply a special password policy for accounts whose passwords are synchronized with other data sources. You need to identify what forces the two users to have different password lengths. User2 is forced to create a domain password that has a minimum of eight characters.microsoft.aspx In Windows Server 2008. User1 is forced to create a domain password that has a minimum of 12 characters. For example. . Which tool should you use? A. you can apply stricter settings to the privileged accounts and then apply less strict settings to the accounts of other users.Explanation/Reference: QUESTION 98 Your network contains an Active Directory domain named contoso.com/en-us/library/cc770842(v=ws. A user named User1 and a user named User2 work for the sales department. B. Credential Manager Security Configuration Wizard (SCW) Group Policy Management Active Directory Administrative Center Correct Answer: D Section: (none) Explanation Explanation/Reference: http://technet. Or in some cases. The password policy for the domain is set to require a minimum password length of 10 characters. D. C.com.

com\SYSVOL\Contoso.com\Policies folder. Run the Delegation of Control Wizard on the Policies container. The solution must minimize the number of permissions assigned to User1. You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to 0U1. Run the Delegation of Control Wizard on OU1.QUESTION 99 Your network contains an Active Directory domain named contoso. D.com/50166/using-the-delegation-of-control-wizard-to-assign-permissions-in-server-2008/ . Correct Answer: D Section: (none) Explanation Explanation/Reference: http://www.com. Run the Set-GPPermission cmdlet. The domain contains 100 user accounts that reside in an organizational unit (OU) named OU1. What should you do? A.howtogeek. C. Modify the permission on the \\Contoso. B.

dns file. to view this file. Run ipconfig /displaydns. you can verify SRV locator resource records by viewing Netlogon. Open the Srv.sys file.dns If you are using non-Microsoft DNS servers to support Active Directory. The first record in the file is the domain controller's Lightweight Directory Access Protocol (LDAP) SRV record._tcp.dns is located in the %systemroot%\System32\Config folder. B.Domain_Name .QUESTION 100 You have a server named Server1 that runs Windows Server 2012. What should you do on Server1? A. Correct Answer: B Section: (none) Explanation Explanation/Reference: http://support. such as Microsoft Notepad. You can use a text editor. You need to view the service location (SRV) records that Server1 registers in DNS.com/kb/816587/en-us Netlogon. D.dns. Open the Netlogon. You promote Server1 to a domain controller.microsoft. Netlogon. This record should appear similar to the following: _ldap. C. Run Get-DnsServerDiagnostics.

a clean installation of Windows Server 2012 an offline servicing by using Dism an online servicing by using Dism an upgrade installation of Windows Server 2012 Correct Answer: C Section: (none) Explanation Explanation/Reference: ROD: windows server 2012 enterprise DOES NOT EXIST. C.com/en-us/library/hh825157.microsoft. D. What should you perform? A. maybe they meant data center? http://technet. Which tool should you use? A.QUESTION 101 You have a server named Data1 that runs a Server Core Installation of Windows Server 2012 Standard. You need to configure Data1 to run a Server Core Installation of Windows Server 2012 Enterprise. You want to achieve this goal by using the minimum amount of administrative effort. File Explorer C.based enumeration for a file share on Server1. File Server Resource Manager (FSRM) B.aspx QUESTION 102 You have a server named Server1 that runs Windows Server 2012. You need to enable access. Share and Storage Management . B.

aspx Access-based enumeration displays only the files and folders that a user has permissions to access. .com/en-us/library/dd772681(v=WS.microsoft. Access-based enumeration is now included in the Windows Server 2008 operating system. Server Manager Correct Answer: D Section: (none) Explanation Explanation/Reference: http://technet.D. and you can enable it by using Share and Storage Management.10). It is a feature that was previously available as a downloadable package for the Windows Server® 2003 operating system (it was also included in Windows Server 2003 Service Pack 1).

What should you do on Server1 before you run the New Share Wizard? A. C. Correct Answer: B Section: (none) Explanation Explanation/Reference: . D. You discover that when you run the New Share Wizard. Configure the Advanced system settings.QUESTION 103 Your network contains an Active Directory domain named contoso. Install the File Server Resource Manager role service. you cannot select the SMB Share Advanced option.com. The domain contains a server named Server1. Server1 runs Windows Server 2012. Configure Dynamic Access Control and Apply a central access policy. You need to ensure that you can use SMB Share . Run the Set-SmbSharecmdlet.Advanced to create the new share. The shared folder will have a quota limit. You plan to create a shared folder. B.

All servers run Windows Server 2012. http://www. B. exempt ICMP from IPSec. From a command prompt.Install-windowsfeature -name fs-resource-manager -includemanagementtools Installs one or more Windows Server roles. and features in Windows Server 2008 R2.com. You need to ensure that Server1 can respond to ping requests from computers that do not support IPSec.com/UploadFile/cd7c2e/how-to-install-the-file-server-resource-manager-in-windowss/ QUESTION 104 Your network contains an Active Directory domain named contoso. or features on either the local or a specified remote server that is running Windows Server 2012. C. From a command prompt. This cmdlet is equivalent to and replaces Add. From Windows Firewall with Advanced Security. role services.WindowsFeature. A server named Server1 is configured to encrypt all traffic by using IPSec. What should you do? A. D. From Windows Firewall with Advanced Security. the cmdlet that was used to install roles. role services. allow unicast responses for the Domain Profile.c-sharpcorner. run netsh set global autotuninglevelhighlyrestrictedcongestionprovider=none. Correct Answer: B Section: (none) Explanation . run netsh set global autotuninglevel = restricted congestionprovider = ctcp.

The IP configuration of each office is configured as shown in the following table. The main office contains a server named Server1 that runs Windows Server 2012. D. The temporary location experiences intermittent power failures. ReFS NFS NTFS FAT32 Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 106 Your company has a main office and four branch offices.Explanation/Reference: QUESTION 105 You plan to deploy a file server to a temporary location. . C. You need to create a volume for the shared folders. The file server will contain a dedicated volume for shared folders. B. Which file system should you use? A. The solution must minimize the likelihood of file corruption if a power failure occurs.

exe add -p 172.0. Modify the permissions on the User1 account.com/50166/using-the-delegation-of-control-wizard-to-assign-permissions-in-server-2008/ .0 mask 255.com. route.You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all of the subnets. You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to OU1. B.16. B.0 10.0. C.1 route.0.exe add -p 10.10.18.10.255.252.0 mask 255.exe add -p 172.0 10.16.0.howtogeek. D. Which command should you run? A.0 10.0 route.0.16. The domain contains 100 user accounts that reside in an organizational unit (OU) named 0U1.10. C.0 mask 255. D.16. What should you do? A. Correct Answer: A Section: (none) Explanation Explanation/Reference: http://www.0 mask 255. Modify the permissions on OU1. Add User1 to the Group Policy Creator Owners group.0 172. Run the Set-GPPermission cmdlet.1 route.0.255.252.255.255. The solution must minimize the number of permissions assigned to User1.252.10.10.1 Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 107 Your network contains an Active Directory domain named contoso.252.exe add -p 10.

Run sconfig.exe and configure remote management.com.QUESTION 108 Your network contains an Active Directory domain named contoso. What should you do on Server2? A. Install Remote Server Administration Tools (RSAT).com domain.exe and configure Remote Server Administration Tools (RSAT). Install Windows Management Framework. You join Server2 to the contoso. You need to ensure that you can manage Server2 by using the Computer Management console on Server1. The domain contains a server named Server1 that runs Windows Server 2012. Run sconfig. On a server named Server2. you perform a Server Core Installation of Windows Server 2012. C. B. D. Correct Answer: C Section: (none) Explanation Explanation/Reference: .

.

Which server role should you install on Server2? To answer. On Subnet2. You need to configure Server2 to route DHCP broadcast from Subnet2 to Server1. Point and Shoot: . select the appropriate role in the answer area. you deploy a new server named Server2 that runs Windows Server 2012. Subnet1 contains a DHCP server named Server1. You deploy a new subnet named Subnet2.Point and Shoot QUESTION 1 Your network contains a subnet named Subnet1.

HYPERV1 hosts a virtual machine named DC1. You need to prevent the clock on DC1 from synchronizing from the clock on HYPERV1. What should you configure? .Correct Answer: Section: (none) Explanation Explanation/Reference: QUESTION 2 You have a Hyper-V host named HYPERV1.

select the appropriate object in the answer area. Point and Shoot: Correct Answer: .To answer.

Section: (none) Explanation Explanation/Reference: QUESTION 3 Your network contains an Active Directory domain named contoso. The domain contains a member server named Hyperv1 and a domain controller named DC1. DC1 is a virtual machine on Hyperv1. Hyperv1 has the Hyper-V server role installed.com. .

You need to prevent time conflicts between the time provided by DC1 and other potential time sources. What should you configure? To answer.Users report that the time on their client computer is incorrect. Point and Shoot: . select the appropriate object in the answer area. You log on to DC1 and verify that the time services are configured correctly.

Correct Answer: .

com.Section: (none) Explanation Explanation/Reference: QUESTION 4 Your network contains an Active Directory domain named contoso. Technicians use Windows Deployment Services (WDS) to deploy Windows Server 2012. .

The network contains a server named Server1 that runs Windows Server 2012. Point and Shoot: . Server1 has the Hyper-V server role installed. You need to ensure that you can use WDS to deploy Windows Server 2012 to a virtual machine named VM1. select the appropriate settings in the answer area. Which settings should you configure? To answer.

Correct Answer: .

Domain controllers run either Windows Server 2008 R2 or Windows Server 2012.com. . All client computers run Windows 8.Section: (none) Explanation Explanation/Reference: QUESTION 5 Your network contains an Active Directory domain named contoso.

Point and Shoot: Correct Answer: . select the appropriate service in the answer area. You create a Group Policy object (GPO) that contains several Applocker rules. What should you configure in the GPO? To answer.All computer accounts are located in an organizational unit (OU) named OU1. You link the GPO to OU1. You need to ensure that the Applocker rules Apply to all of the client computers.

0/24. The network ID is 10.1. Point and Shoot: . Server1 runs Windows Server 2012.Section: (none) Explanation Explanation/Reference: QUESTION 6 You have a DNS server named Server1. Which zone should you identify? To answer. select the appropriate zone in the answer area.1. You need to identify which reverse lookup zone is configured correctly. An administrator creates several reverse lookup zones.

you receive the result as shown in the exhibit. . When you run ping dc1.com.contoso.com. The domain contains a domain controller named DC1.corp.Correct Answer: Section: (none) Explanation Explanation/Reference: QUESTION 7 Your network contains an Active Directory domain named corp.contoso.

Point and Shoot: Correct Answer: . select the appropriate rule in the answer area. Which rule should you modify? To answer.You need to ensure that DC1 can respond to the Ping command.

You need to ensure that all local administrators receive User Account Control (UAC) prompts when they run a Microsoft Management Console (MMC). Point and Shoot: Correct Answer: .Section: (none) Explanation Explanation/Reference: QUESTION 8 You have a server named Server1 that runs Windows Server 2012. select the appropriate settings in the answer area. Several users are members of the local Administrators group. Which setting should you modify from the Local Security Policy? To answer.

Section: (none) Explanation Explanation/Reference: QUESTION 9 How can you manage an newly installed server 2012 core from a another server 2012 with computer manager? Point and Shoot: Correct Answer: .

Point and Shoot: . Which settings should you modify from the Local Security Policy? To answer.Section: (none) Explanation Explanation/Reference: QUESTION 10 You have a server named Server1 that runs Windows Server 2012. Server1 is a member of a workgroup. select the appropriate settings in the answer area. You need to ensure that only members of the Administrators group and members of a group named Group1 can log on locally to Server1.

The network contains a member server named Server1 that runs Windows Server 2012. The printers have static IP addresses. .Correct Answer: Section: (none) Explanation Explanation/Reference: QUESTION 11 Your network contains an Active Directory domain named contoso. The network contains two subnets. The IP addresses are consecutive. Server1 has the DHCP Server server role installed.com. You add three new printers to the Warehouse subnet. You need to create an exclusion range that contains the IP addresses of the printers. Server1 is configured to lease IP addresses to the two subnets. The subnets are configured as shown in the following table.

From which node should you configure the exclusion range? To answer. select the appropriate node in the answer area. Point and Shoot: .

Correct Answer: Section: (none) Explanation .

What should you configure on the new server? To answer.com. You need to ensure that you can add the new server to Server Manager on Server1. select the appropriate setting in the answer area. Point and Shoot: . The domain contains a server named Server that runs Windows Server 2012.Explanation/Reference: QUESTION 12 Your network contains an Active Directory domain named contoso. You perform a Server Core Installation of Windows Server 2012 on a new server.

Correct Answer: .

select the appropriate option in the answer area. Print1 has 50 shared printers. From Active Directory Users and Computers.com. Which option should you select? To answer. you browse to Print1 and you discover that the 50 printers are not visible. You need to ensure that you can view the printer objects in Active Directory Users and Computers. .Section: (none) Explanation Explanation/Reference: QUESTION 13 Your network contains an Active Directory domain named contoso. The domain contains a print server named Print1 that runs Windows Server 2012. Each printer is listed in Active Directory.

Point and Shoot: Correct Answer: .

DHCP1 does not ave access to the Internet. You need to install the DHCP Server server role on DHCP1 by using Server Manager. Which folder should you specify as the alternate path for the source files?To answer. You mount a Windows Server 2012 installation image to the C:\Mount folder. . select the appropriate folder in the answer area.Section: (none) Explanation Explanation/Reference: QUESTION 14 You have a server named DHCP1 that runs Windows Server 2012. All roles are removed completely from DHCP1.

Point and Shoot: .

Correct Answer: .

the users can continue to print to Printer1. The sales office has 20 users. App1 has a shared printer named Printer1.000 users. All client computers in the sales office run Windows 8. . What should you configure on App1? To answer.Section: (none) Explanation Explanation/Reference: QUESTION 15 Your company has a main office and a sales office. You need to ensure that if App1 fails. Printer1 connects to a network-attached print device. select the appropriate option in the answer area. The main office has 2. The sales office contains a print server named App1 that runs Windows Server 2012. You plan to connect all of the users in the sales office to Printer1 on App1.

Point and Shoot: Correct Answer: .

Section: (none) Explanation Explanation/Reference: .

Supports at least 100 IPv4 hosts. LAN1 uses the network ID of 10. You need to identify a valid network ID for LAN2 that meets the following requirements: Ensures that hosts on LAN2 can communicate with hosts on LAN1. The test network contains a subnet named LAN1.0/27.1. Uses only private IP addresses. LAN1 and LAN2 will be connected by a router.Drag and Drop QUESTION 1 You are configuring a test network. drag the appropriate network ID and subnet mask to the correct location in the answer area. You plan to add a new subnet named LAN2 to the test network.10. Which network ID should you use? To answer. Select and Place: Correct Answer: .

You need to ensure that you can view the contents of the disk of VM1 from two weeks ago from Server2. VM1 is currently running. Server1 has the Hyper-V server role installed. Which three actions should you perform in sequence? (To answer.) . You plan to use Server2 to perform a forensic analysis of the contents of the disk of VM1 from two weeks ago.Section: (none) Explanation Explanation/Reference: QUESTION 2 You have two servers named Server1 and Server2 that run Windows Server 2012. move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order. VM1 has a snapshot that was created two weeks ago. Server1 hosts a virtual machine named VM1.

Select and Place: Correct Answer: .

Which cmdlets should you run on each server? (To answer.com namespace. The domain contains a member server named Server1. You need to ensure that Server1 can respond authoritatively to queries for the existing contoso.) .com. The domain contains a domain controller named DC1 that has the DNS Server server role installed. DC1 hosts an Active Directory-integrated zone for the domain. more than once. Each cmdlet may be used once. drag the appropriate cmdlets to the correct servers.Section: (none) Explanation Explanation/Reference: QUESTION 3 Your network contains an Active Directory domain named contoso. You install the DNS Server server role on Server1. You may need to drag the split bar between panes or scroll to view content. or not at all.

Select and Place: Correct Answer: .

What should you do? (To answer.Section: (none) Explanation Explanation/Reference: QUESTION 4 Your network contains an Active Directory domain named contoso. Each tool may be used once. drag the appropriate tools to the correct statements. You need to restart Server2. The domain contains two servers named Server1 and Server2. or not at all. Server1 and Server2 run a Server with a GUI installation of Windows Server 2012. You may need to drag the split bar between panes or scroll to view content.com.) Select and Place: . You remove the Graphical Management Tools and Infrastructure feature on Server2. more than once.

You need to create a volume that will remain online if two disks in the volume fail. move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order. Which three actions should you perform in sequence? (To answer.) Select and Place: .Correct Answer: Section: (none) Explanation Explanation/Reference: QUESTION 5 You have a server that runs Windows Server 2012. The solution must minimize the number of disks used to create the volume.

First you add the disks. Two physical disks provide protection against a single disk failure.co. You need to ensure that you can start VM1 by using PXE. You start VM1 and you discover that there is no option to start by using PXE. Then Create the pool Once created you create the virtual disk http://www. . A technician creates a virtual machine named VM1 on Server1 by using the New Virtual Machine Wizard.uk/features/379408/windows-8-storage-spaces-a-how-to-guide QUESTION 6 You have a Hyper-V host named Server1.pcpro.Correct Answer: Section: (none) Explanation Explanation/Reference: Page 53 Exam Ref 70-410 book Mirror Requires the pool to contain at least two physical disks and provides fault tolerance by storing identical copies of every file. five physical disks provide protection against two disk failures.

Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)

Select and Place:

Correct Answer:

Section: (none) Explanation Explanation/Reference: QUESTION 7 You have a Hyper-V host named Server1. Server1 hosts a virtual machine named VM1. You view the properties of VM1 as shown in the following exhibit.

You need to configure bandwidth management for VM1. Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)

Select and Place:

Correct Answer:

Section: (none) Explanation Explanation/Reference:

.

A Group Policy object (GPO) named Application Restriction Policy is linked to OU1. . The computer account of Server 28 is located in an organizational unit (OU) named OU1.Hot Area QUESTION 1 Your network contains an Active Directory domain. The Services console on Server28 is shown in the Services exhibit. The domain contains a server named Server28. The settings of the GPO are configured as shown in the GPO Settings exhibit.

otherwise select No. Each correct selection is worth one point. Hot Area: .Select Yes if the statement can be shown to be true based on the available information.

. The folder permissions of Share1 are configured as shown in the Folder Permissions exhibit.Correct Answer: Section: (none) Explanation Explanation/Reference: QUESTION 2 You have a shared folder named Share1.

(Click the Exhibit button.) . You have a group named Group1.The Share permissions of Share1 are configured as shown in the Share Permissions exhibit. The members of Group1 are shown in the Group1 exhibit.

Each correct selection is worth one point. otherwise select No. Hot Area: .Select Yes if the statement can be shown to be true based on the available information.

You need to ensure that the same set of custom starter GPOs are available in adatum. Each correct selection is worth one point. You have custom starter Group Policy objects (GPOs) defined in contoso.com and adatum. A two-way forest trust exists between the forests.com. .com. identify which action must be performed for the starter GPOs container in each forest.com. Make only one selection in each of the rows. In the table below.Correct Answer: Section: (none) Explanation Explanation/Reference: QUESTION 3 Your network contains two Active Directory forests named contoso.

Hot Area: Correct Answer: .

http://technet. The domain contains a single location named Site1. A copy operation allows you to transfer settings from an existing GPO in Active Directory directly into a new GPO. To copy a GPO. you must have permission to create GPOs in the destination domain.Section: (none) Explanation Explanation/Reference: http://technet. You need to ensure that the clients in both sites receive their IPv4 configurations from Server1. The domain contains a server named Server1 that has the DHCP Server server role installed.aspx Copy.microsoft. The domain will expand to include a second location named Site2. Because a copy operation uses an existing GPO in Active Directory as its source. Site1 and Site2 will connect to each other by using a WAN link. QUESTION 4 Your network contains an Active Directory domain named contoso. The destination domain can be any trusted domain in which you have the rights to create new GPOs.com/en-us/library/cc785343(v=ws. A server named Server2 will be deployed to Site2. A new GPO is always created as part of this process. .10).com/en-us/library/cc781458%28v=ws. Simply add the desired forests and domains in GPMC and use GPMC to copy and paste (or drag and drop) the desired GPOs from one domain to another. Copy operations are suited for moving Group Policy between production environments. Each correct selection is worth one point. Make only one selection in each row. another domain in the same forest. You can use a copy operation to transfer settings to a new GPO in the same domain. and for migrating Group Policy that has been tested in a test domain or forest to a production environment.microsoft. as long as there is trust between the source and destination domains. identify which actions must be performed on each server.com. trust is required between the source and destination domains. or a domain in another forest.aspx A copy operation copies an existing. In the table below. All client computers receive their IPv4 configurations dynamically.10%29. The new GPO created during the copy operation is given a new GUID and is unlinked. live GPO to the desired destination domain.

Hot Area: Correct Answer: Section: (none) Explanation .

Explanation/Reference: QUESTION 5 You have a Hyper-V host named Server1 that runs Windows Server 2008 R2. Make only one selection in each row. All of the virtual machines on Server1 use VHDs. Server2 has the same hardware configurations as Server1. You plan to migrate the Hyper-V host from Server1 to Server2 by using the Windows Server Migration Tools. In the table below. You install the Hyper-V server role on a server named Server2 that runs Windows Server 2012. identify what can be migrated by using the Windows Server Migration Tools. Each correct selection is worth one point. Hot Area: Correct Answer: .

IPv6 addresses and configurations are assigned to all of the servers by using DHCPv6. and DO that run Windows Server 2012. You verify that Server2 can ping the IPv6 address of DC1. The IPv6 routing on Server1 is shown in the following table. select the appropriate options in the answer area. Server2.Section: (none) Explanation Explanation/Reference: QUESTION 6 You have three servers named Server1. What command should you run on Server1? (To answer.) . You need to ensure that Server1 can ping the IPv6 address of DC1.

Hot Area: Correct Answer: Section: (none) Explanation .

In the table below. Make only one selection in each row. identify which actions must be performed on Server1 and Server2. Hot Area: Correct Answer: . Each correct selection is worth one point. You need to ensure that Server2 can be managed by using Server Manager from Server1.Explanation/Reference: QUESTION 7 You have two servers that run Windows Server 2012. The servers are configured as shown in the following table.

Make only one selection in each row. .** Set-Item wsman:localhostClientTrustedHosts Server01 -Concatenate -Force Determine whether the workgroup server that you want to manage is in the same subnet as the computer on which you are running Server Manager. Ans should be: Server 1 Server 2 Server 2 http://technet. In the table below.Section: (none) Explanation Explanation/Reference: **On the computer that is running Server Manager. go on to the next step. If the two computers are in the same subnet.aspx QUESTION 8 You deploy a Server with a GUI installation of Windows Server 2012 Datacenter. To override UAC restrictions on running elevated processes **on workgroup computers**. or if the **workgroup server’s network profile is set to Private** in the Network and Sharing Center. you run the following command: Remove-WindowsFeature ServerGui-Shell. add the workgroup server name to the TrustedHosts list. Each correct selection is worth one point.microsoft. From Windows PowerShell. identify which tools are available on Server1 and which tools are unavailable on Server1.com/en-us/library/hh831453. create a registry entry called LocalAccountTokenFilterPolicy on the workgroup server by running the following cmdlet.

Hot Area: Correct Answer: .

.Section: (none) Explanation Explanation/Reference: QUESTION 9 The settings for a virtual machine named VM2 are configured as shown in the VM2 exhibit.

The settings for Disk1. .vhdx exhibit.vhdx are configured as shown in the Diskl.

Select Yes if the statement can be shown to be true based on the available information.The settings for Disk2. otherwise select No.vhdx exhibit. .vhdx are configured as shown in the Disk2. Each correct selection is worth one point.

Hot Area: Correct Answer: .

select the appropriate actions for each user in the answer area.microsoft.aspx If you want to compact a differencing virtual hard disk or an undo disk. if it is a dynamically expanding virtual hard disk. .10).Section: (none) Explanation Explanation/Reference: http://technet. you must merge the changes to the parent disk and then compact the parent disk.com/en-us/library/cc708394(v=ws. A user named User2 is a member of Group2 and Group3. QUESTION 10 You have a file server named Server1 that runs Windows Server 2012. What should you identify? To answer. You need to identify which actions the users can perform when they access the files in Share1. Server1 contains a folder named Folder1. A user named User1 is a member of Group1 and Group2.

Hot Area: Correct Answer: .

microsoft.ntfs.com/en-us/library/cc784499(WS. QUESTION 11 Your network contains an Active Directory domain named contoso.com/ntfs-permissions-combined. the least restrictive wins.htm As per TRAINSIGNAL 70-410 videos.com.com/article/windows-101-know-the-basics-about-ntfs-permissions/ Combining NTFS and Sharing permissions: http://www. The domain contains an organizational unit (OU) named OU1 as shown in the OU1 exhibit. .techrepublic.Section: (none) Explanation Explanation/Reference: Sharing permissions: http://technet.aspx NTFS: http://www. whenever you have conflicting permissions of the same type.10).

The membership of Group1 is shown in the Group1 exhibit.

You configure GPO1 to prohibit access to Control Panel. GPO1 is linked to OU1 as shown in the GPO1 exhibit. (Click the Exhibit button.)

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: (none) Explanation Explanation/Reference: http://technet.microsoft.com/en-us/library/cc781988(v=ws.10).aspx Since user4 not in the filtering the GPO does not apply to him. QUESTION 12

The scope of the GPO is shown in the Scope exhibit.You have a Group Policy object (GPO) named Server Audit Policy. . The settings of the GPO are shown in the Settings exhibit.

The membership of Group1 is shown in the Group1 exhibit.The domain contains a group named Group1. .

Hot Area: . otherwise select No.Select Yes if the statement can be shown to be true based on the available information. Each correct selection is worth one point.

Correct Answer: Section: (none) Explanation Explanation/Reference: QUESTION 13 You have a server named Server1 that runs Windows Server 2012. Server1 has the HyperV server role .

installed.) Hot Area: Correct Answer: Section: (none) . select the two appropriate network connections in the answer area. Which two network connections should you include on the NIC team? (To answer. You need to implement NIC teaming on Server1.

Explanation Explanation/Reference: .