Download New Updated (June) Microsoft 70-410 Practice Test 251-260

Ensurepass

 

QUESTION 251

You have a server named Server1. Server1 runs Windows Server 2012 R2 and is located in a perimeter network. You need to configure a custom connection security rule on Server1. The rule must encrypt network communications across the Internet to a computer at another company. Which authentication method should you configure in the connection security rule?

 

A.

Advanced

B.

User (Kerberos V5)

C.

Computer (Kerberos V5)

D.

Computer and user (Kerberos V5)

E.

Default

 

Correct Answer: A

Explanation:

You need to make use of Advanced authentication method to ensure that communication is encrypted over the network to the other company from your custom connection security rule on Server1.

 

 

QUESTION 252

Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012 R2. A one-way external trust exists between contoso.com and adatum.com. Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com. What should you do?

 

A.

Modify the Managed By settings of Group1.

B.

Modify the Allowed to Authenticate permissions in adatum.com.

C.

Change the type of Group1 to distribution.

D.

Modify the name of Group1.

 

Correct Answer: B

Explanation:

* Accounts that require access to the customer Active Directory will be granted a special right called Allowed to Authenticate. This right is then applied to computer objects (Active Directory domain controllers and AD RMS servers) within the customer Active Directory to which the account needs access.

* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest.

 

 

 

 

 

QUESTION 253

Your network contains an Active Directory forest named contoso.com. The forest contains a child domain named corp.contoso.com. The network has Microsoft Exchange Server 2010 deployed. You need to create a mail-enabled distribution group. Which type of group should you create?

 

A.

Domain local

B.

Global

C.

Local

D.

Universal

 

Correct Answer: D

Explanation:

http://technet.microsoft.com/en-us/library/bb726978.aspx

Universal groups Groups that are used to grant permissions on a wide scale throughout a domain tree or forest. Members of global groups include accounts and groups from any domain in the domain tree or forest.

Microsoft Exchange Server 2007: Implementation and Administration

By Jim McBee, Benjamin Craig page 248:

Only universal groups should be used as mail-enabled groups.

 

 

QUESTION 254

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.

The domain contains a user named User1 and a global security group named Group1.

You need to add a new domain controller to the domain.

You install Windows Server 2012 on a new server named DC3.

Which cmdlet should you run next?

 

A.

Add-AdPrincipalGroupMembership

B.

Install-AddsDomainController

C.

Install WindowsFeature

D.

Install AddsDomain

E.

Rename-AdObject

F.

Set-AdAccountControl

G.

Set-AdGroup

H.

Set-User

 

Correct Answer: C

Explanation:

http://www.mustbegeek.com/install-domain-controller-in-server-2012-using-windows-powershell/

It is the 2nd step when installing a DC by powershell on a fresh server.

 

 

 

 

 

 

 

 

 

 

 

QUESTION 255

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. The domain contains a user named User1 and a global security group named Group1. User1 logs on to a client computer named Computer1. You need to disable the computer account of Computer1. Which cmdlet should you run?

 

A.

Add-AdPrincipalGroupMembership

B.

Install-AddsDomainController

C.

Install WindowsFeature

D.

Install AddsDomain

E.

Rename-AdObject

F.

Set-AdAccountControl

G.

Set-AdGroup

H.

Set-User

 

Correct Answer: F

Explanation:

http://technet.microsoft.com/en-us/library/ee617249.aspx

Set-ADAccountControl

Enabled

Specifies if an account is enabled. An enabled account requires a password. This parameter sets the Enabled property for an account object. This parameter also sets the ADS_UF_ACCOUNTDISABLE flag of the Active Directory User Account Control (UAC) attribute. Possible values for this parameter include:

$fal
se or 0

$true or 1

The following example shows how to set this parameter to enable the account.

-Enabled $true

 

 

QUESTION 256

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. The domain contains a user named User1 and a global security group named Group1. You reconfigure DC2 as a member server in the domain. You need to add DC2 as the first domain controller in a new domain in the forest. Which cmdlet should you run?

 

A.

Add-AdPrincipalGroupMembership

B.

Install-AddsDomainController

C.

Install WindowsFeature

D.

Install AddsDomain

E.

Rename-AdObject

F.

Set-AdAccountControl

G.

Set-AdGroup

H.

Set-User

 

Correct Answer: D

Explanation:

http://technet.micros
oft.com/en-us/library/hh974722.aspx

 

 

 

 

QUESTION 257

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. You create an external virtual switch named Switch1. Switch1 has the following configurations:

 

– Connection type: External network

– Single-root I/O visualization (SR-IOV): Enabled

– Ten virtual machines connect to Switch1.

 

You need to ensure that all of the virtual machines that connect to Switch1 are isolated from the external network and can connect to each other only. The solution must minimize network downtime for the virtual machines. What should you do?

 

A.

Change the Connection type of Switch1 to Internal network.

B.

Change the Connection type of Switch1 to Private network.

C.

Remove Switch1 and recreate Switch1 as an internal network.

D.

Remove Switch1 and recreate Switch1 as a private network.

 

Correct Answer: D

Explanation:

Original answer is B.

But the correct answer is D.

You cannot change the type of vswitch from external to private when SR-IOV is enabled at vswitch creation -> you need to recreate the vswitch.

 

 

QUESTION 258

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a virtual machine named VM1 that run
s Windows Server 2012 R2. VM1 has several snapshots. You need to modify the snapshot file location of VM1. What should you do?

 

A.

Right-click VM1, and then click Export…

B.

Modify the Hyper-V settings.

C.

Delete the existing snapshots, and then modify the settings of VM1.

D.

Shut down VM1, and then modify the settings of VM1.

 

Correct Answer: C

In order for snapshot file location to be changed, all previous snapshots need to be deleted:

 

clip_image002

 

clip_image003

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 259

Drag and Drop Question

You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 hosts a virtual machine named VM1. VM1 is currently running. VM1 has a snapshot that was created two weeks ago. You plan to use Server2 to perform a forensic analysis of the contents of the disk of VM1 from two weeks ago. You need to ensure that you can view the contents of the disk of VM1 from two weeks ago from Server2. Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)

 

clip_image005

 

Correct Answer:

 

clip_image007

 

 

 

 

 

QUESTION 260

Hotspot Question

Your network contains an Active Directory domain named contoso.com. The network contains two subnets. The subnets are configured as shown in the following table.

 

clip_image009

 

The network contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the DHCP Server server role installed. Server1 is configured to lease IP addresses to the two subnets. You add three new printers to the Warehouse subnet. The printers have static IP addresses. The IP addresses are consecutive. You need to create an exclusion range that contains the IP addresses of the printers. From which node should you configure the exclusion range?To answer, select the appropriate node in the answer area.

 

clip_image011

 

Correct Answer:

 

 

clip_image013

 

Free VCE & PDF File for Microsoft 70-410 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…