70-410 | 10 Tips For Updated 70-410 exam dumps


Q1. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. 

An organizational unit (OU) named OU1 contains the user accounts and the computer accounts for laptops and desktop computers. A Group Policy object (GPO) named GP1 is linked to OU1. You need to ensure that the configuration settings in GP1 are applied only to the laptops in OU1. The solution must ensure that GP1 is applied automatically to new laptops that are added to OU1. 

What should you do? 

A. Modify the GPO Status of GP1. 

B. Configure the WMI Filter of GP1. 

C. Modify the security settings of GP1. 

D. Modify the security settings of OU1. 

Answer:

Q2. - (Topic 3) 

You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. 

You have created and linked a new Group Policy object (GPO) to an organizational unit (OU), named ENSUREPASSServ, which host the computer accounts for servers in the Contoso.com domain. 

You have been tasked with adding a group to a local group on all servers in the Contoso.com domain. This group should not, however, be removed from the local group. 

Which of the following actions should you take? 

A. You should consider adding a restricted group. 

B. You should consider adding a global group. 

C. You should consider adding a user group. 

D. You should consider adding a server group. 

Answer:

Explanation: 

Restricted groups in Group policies are a simple way of delegating permissions or group 

membership centrally to any domain computer or server. Using restricted groups it is easier 

to enforce the lowest possible permissions to any given account. 

Computer ConfigurationWindows SettingsSecurity SettingsRestricted Groups 

Restricted groups allow an administrator to define two properties for security-sensitive 

groups (that is, “restricted” groups). The two properties are Members and Member Of . 

The Members list defines who should and should not belong to the restricted group. 

The Member Of list specifies which other groups the restricted group should belong to. 

When a restricted Group Policy is enforced, any current member of a restricted group that 

is not on the Members list is removed. 

Q3. - (Topic 3) 

Your network contains an Active Directory forest named contoso.com. The forest contains a child domain named corp.contoso.com. 

The network has Microsoft Exchange Server 2010 deployed. 

You need to create a mail-enabled distribution group. 

Which type of group should you create? 

A. Global 

B. Local 

C. Domain local 

D. Universal 

Answer:

Explanation: 

Universal groups Groups that are used to grant permissions on a wide scale throughout a 

domain tree or forest. Members of global groups include accounts and groups from any 

domain in the domain tree or forest. 

Microsoft Exchange Server 2007: Implementation and Administration. By Jim McBee, 

Benjamin Craig page 248: Only universal groups should be used as mail-enabled groups. 

Q4. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. 

You install Windows Server 2012 R2 on a new server named Server1 and you join Server1 to the domain. 

You need to ensure that you can view processor usage and memory usage information in Server Manager. 

What should you do? 

A. From Server Manager, click Configure Performance Alerts. 

B. From Performance Monitor, create a Data Collector Set (DCS). 

C. From Performance Monitor, start the System Performance Data Collector Set (DCS). 

D. From Server Manager, click Start Performance Counters. 

Answer:

Explanation: 

You should navigate to the Server Manager snap-in and there click on All Servers, and then Performance Counters. The Performance Counters, when started can be set to collect and display data regarding processor usage, memory usage, amongst many other resources like disk-related and security related data, that can be monitored. 

: http://technet.microsoft.com/en-us/library/bb734903.aspx 

Q5. - (Topic 1) 

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the 

Hyper-V server role installed. 

An iSCSI SAN is available on the network. 

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. 

You create a LUN on the SAN to host the virtual hard drive files for the virtual machines. 

You need to create a 3-TB virtual hard disk for VM1 on the LUN. The solution must prevent 

VM1 from being paused if the LUN runs out of disk space. 

Which type of virtual hard disk should you create on the LUN? 

A. Dynamically expanding VHDX 

B. Fixed-size VHDX 

C. Fixed-size VHD 

D. Dynamically expanding VHD 

Answer:

Explanation: 

The virtual disk needs to be a VHDX file since it is going to be over 2TB in size and it must be fixed-size so that the space is already taken on the server (that way the server does not run out of space as the volume grows) even if the actual virtual disk does not yet hold that amount of data. 

Q6. - (Topic 2) 

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1. Server1 runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

You create two IPv4 scopes on Server1. The scopes are configured as shown in the following table. 

The DHCP clients in Subnet1 can connect to the client computers in Subnet2 by using an IP address or a FQDN. 

You discover that the DHCP clients in Subnet2 can connect to client computers in Subnet1 by using an IP address only. 

You need to ensure that the DHCP clients in both subnets can connect to any other DHCP client by using a FQDN. 

What should you add? 

A. The 015 DNS Domain Name option to Subnet1 

B. The 015 DNS Domain Name option to Subnet2 

C. The 006 DNS Servers option to Subnet2 

D. The 006 DNS Servers option to Subnet1 

Answer:

Explanation: 

References: http://technet.microsoft.com/en-us/library/ee941136%28v=WS.10%29.aspx Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, p.253 

Q7. HOTSPOT - (Topic 3) 

You have three servers named Server1, Server2, and DC1 that run Windows Server 2012 

R2. IPv6 addresses and configurations are assigned to all of the servers by using DHCPv6. 

The IPv6 routing on Server1 is shown in the following table. 

You verify that Server2 can ping the IPv6 address of DC1. 

You need to ensure that Server1 can ping the IPv6 address of DC1. 

What command should you run on Server1? (To answer, select the appropriate options in 

the answer area.) 

Answer: 

Q8. - (Topic 3) 

You have a file server named File1 that runs Windows Server 2012 R2. 

File1 contains a shared folder named Share1. Share1 contains an Application named 

SalesAppl.exe. 

The NTFS permissions for Share1 are shown in the following table. 

The members of L_Sales discover that they cannot add files to Share1. Domain users can run SalesAppl.exe successfully. 

You need to ensure that the members of L_Sales can add files to Share1. 

What should you do? 

A. Add the Domain Users group to L_Sales. 

B. Add L_Sales to the Domain Users group. 

C. Edit the Share permissions. 

D. Edit the NTFS permissions. 

Answer:

Explanation: 

Based on the NTFS permissions, these users should be able to add files (as they have the “write” permission), so they must have read-only share permissions preventing them from doing so. 

Q9. - (Topic 3) 

You have external virtual switch with srv-io enabled with 10 Virtual Machines on it. You need to make the Virtual Machines able to talk only to each other. 

A. remove the vswitch and recreate it as private. 

B. add new vswitch 

C. remove vswitch and recreate it as public 

D. adjust srv-io settings 

Answer:

Explanation: 

You cannot change the settings of a vswitch with SR-IOV enabled, so you must delete it and recreate it. 

Q10. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

You need to ensure that the local administrator account on all computers is renamed to L.Admin. 

Which Group Policy settings should you modify? 

A. Restricted Groups 

B. Security Options 

C. User Rights Assignment 

D. Preferences 

Answer:

Explanation: 

In Group Policy Object Editor, click Computer Configuration, click Windows Settings, click Security Settings, click Local Policies, and then click Security Options. In the details pane, double-click Accounts: Rename administrator account. The Security Options node includes security settings regarding interactive logon, digital signing of data, restrictions of access to floppy and CD-ROM drives, unsigned driver installations as well as logon dialog box behavior. This category also includes options to configure authentication and communication security within Active Directory.