Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(41-50)!

QUESTION 41
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.
  clip_image001[10]
You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS).
You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE.
Which virtual machine setting should you configure for VM2?

A.    NUMA topology
B.    Resource control
C.    Resource metering
D.    Virtual Machine Chimney
E.    The VLAN ID
F.    Processor Compatibility
G.    The startup order
H.    Automatic Start Action
I.    Integration Services
J.    Port mirroring
K.    Single-root I/O virtualization

Answer: G
Explanation:
G. Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from the network is first
  clip_image001[12]
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx

QUESTION 42
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.
  clip_image001[14]
In the perimeter network, you install a new server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. You need to join Server1 to the contoso.com domain. What should you use?

A.    The New-ADComputer cmdlet
B.    The djoin.exe command
C.    The dsadd.exe command
D.    The Add-Computer cmdlet

Answer: B
Explanation:
A. Creates a new Active Directory computer.
B. Use djoin for offline join in the perimeter network
C. Adds specific types of objects to the directory.
D. Add the local computer to a domain or workgroup.
http://technet.microsoft.com/en-us/library/ee617245.aspx
http://technet.microsoft.com/en-us/library/ff793312(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh849798.aspx

QUESTION 43
Your network contains an Active Directory domain named adatum.com. The domain contains three domain DC3 loses network connectivity due to a hardware failure. You plan to remove DC3 from the domain. You log on to DC3. You need to identify which service location (SRV) records are registered by DC3. What should you do?
 clip_image001[16]

A.    Open the %windir%\system32\config\netlogon.dns file.
B.    Run dcdiag /test:dns
C.    Open the %windir%\system32\dns\backup\adatum.com.dns file.
D.    Run ipconfig /displaydns.

Answer: A
Explanation:
A. Netlogon service creates a log file that contains all the locator resource records and places the logfile in the following location:
B. Analyzes the state of domain controllers in a forest or enterprise and reports any problems to help introubleshooting.
C. dns backup file
D. used to display current resolver cache content You can verify SRV locator resource records by viewing netlogon.dns, located in the
%systemroot%\System32\Config folder.
The SRV record is a Domain Name System (DNS) resource record that is used to identify computers that hostspecific services.
SRV resource records are used to locate domain controllers for Active Directory.
You can use Notepad, to view this file.
The first record in the file is the domain controller’s Lightweight Directory Access Protocol (LDAP) SRV record.
This record should appear similar to the following:
_ldap._tcp.Domain_Name
  clip_image001[18]
http://support.microsoft.com/kb/816587/en-us
http://technet.microsoft.com/en-us/library/cc959303.aspx
http://technet.microsoft.com/en-us/library/cc731968(v=ws.10).aspx

QUESTION 44
Your network contains an Active Directory forest that contains three domains. A group named Group1 is configured as a domain local distribution group in the forest root domain. You plan to grant Group1 read-only access to a shared folder named Share1. Share1 is located in a child domain.
You need to ensure that the members of Group1 can access Share1.
What should you do first?

A.    Convert Group1 to a global distribution group.
B.    Convert Group1 to a universal security group.
C.    Convert Group1 to a universal distribution group.
D.    Convert Group1 to a domain local security group

Answer: B
Explanation:
A. Distribution Groups only used for email
B, Universal can be used for any domain or forest
C. Distribution Groups only used for email
D. Permissions can be assigned only within the same domain as the parent domain local group Group scope Universal can be assigned permissions in any domain or forest.
  clip_image001[20]
http://technet.microsoft.com/en-us/library/cc781446(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc755692(v=ws.10).aspx

QUESTION 45
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. One of the domain controllers is named DCI. The network contains a member server named Server1 that runs Windows Server 2012 R2.
You need to promote Server1 to a domain controller by using install from media (IFM).
What should you do first?

A.    Create a system state backup of DC1.
B.    Create IFM media on DC1.
C.    Upgrade DC1 to Windows Server 2012 R2.
D.    Run the Active Directory Domain Services Configuration Wizard on Server1.
E.    Run the Active Directory Domain Services Installation Wizard on DC1.

Answer: C
Explanation:
A. Backs up system state data to be restored
C. Only valid option. You could install ADDS role on Server 1 and run ADDS configuration wizard andadd DC to existing domain
D. Need to add ADDS role first
E. Wrong server
Installation from media does not work across different operating system versions. In other words, you must use a Windows Server 2012 R2 domain controller to generate installation media to usefor another Windows Server 2012 R2 domain controller installation. We can use the Install from media (IFM) option to install an Additional Domain Controller in an existing domainis the best option such as a branch office scenario where network is slow, unreliable and costly.
IFM will minimize replication traffic during the installation because it uses restored backup files to populate theAD DS database. This will significantly reduce the amount of traffic copied over the WAN link.
Things to remember:
If you are deploying your first Domain Controller in the domain, you cannot use IFM.
The OS will need to match the IFM media. (If you create a 2008 R2 IFM, promote a 2008 R2 DC) If you are creating a DC that will be a Global Catalog Server, create your IFM on a Global Catalog Server.
If you are creating a DC that will be a DNS Server, create your IFM on a DNS Server. If you want to copy the SYSVOL, the DC on which you generate the installation media and the new DC mustbe at least running Windows Server 2008 with Service Pack 2 or Windows Server 2008 R2. Membership of the Domain Admins group is the minimum required to complete IFM. http://www.brandonlawson.com/active-directory/deploying-domain-controllers-with-installfrom- media-ifm/
http://technet.microsoft.com/en-us/library/jj574166.aspx
http://technet.microsoft.com/en-us/library/cc770654%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/library/jj574134.aspx Media
used by the IFM option is created with Windows Server Backup or Ntdsutil.exe from another existingWindows Server 2012 R2 computer only You cannot use a Windows Server 2008 R2 or previous operating system to create media for a Windows Server 2012 R2 domain controller.

QUESTION 46
Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers. The servers are contained in a organizational unit (OU) named ServersOU. You need to create a group named Group1 on all of the servers in the domain.
You must ensure that Group1 is added only to the servers.
What should you configure?

A.    a Local Users and Groups preferences setting in a Group Policy linked to the Domain Controllers OU
B.    a Restricted Groups setting in a Group Policy linked to the domain
C.    a Local Users and Groups preferences setting in a Group Policy linked to ServersOU
D.    a Restricted Groups setting in a Group Policy linked to ServersOU

Answer: C
Explanation:
A. This would add the group to the wrong OU
B. This would affect the whole domain and would effect member of the group
C. allows you to centrally manage local users and groups on domain member computers and is this isthe correct OU for the GPO change
D. Restricted Groups defines what member or groups should exist as part of a group Why use Group Policy preferences?
Unlike Group Policy settings, which App1y to both local computer policy and Active Directory policy, GroupPolicy preferences only App1y to Active Directory policy.
You use preferences to configure many areas of theOS, including:
System devices, such as USB ports, floppy drives and removable media Network shares and mapping network shares to drive letters System and user environment variables
User and group accounts for the local computer
VPN and dial-up networking connections
Printer configuration and mapping
Registry settings, schedule tasks and system services
Settings for Folder Options, Internet Options and Regional and Language Options Settings for power schemes and power management
Start Menu properties and menu items
  clip_image001[22]
http://www.grouppolicy.biz/2010/01/how-to-use-group-policy-preferences-to-secure- localadministrator-groups/
http://technet.microsoft.com/en-us/magazine/hh848751.aspx
http://technet.microsoft.com/en-us/library/cc957640.aspx
http://technet.microsoft.com/en-us/library/cc731972.aspx

QUESTION 47
Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts. Servers are restarted only occasionally.
You need to identify which servers were restarted during the last two days.
What should you do?

A.    Run dsquery computerand specify the -staiepwdpara meter.
B.    Run Get-ADComputerand specify the SearchScope parameter.
C.    Run Get-ADComputerand specify the IastLogonproperty.
D.    Run dsquery serverand specify the -oparameter

Answer: C

QUESTION 48
Your network contains an Active Directory domain named contoso.com. You log on to a domain controller by using an account named Admin1. Admin1 is a member of the Domain Admins group. You view the properties of a group named Group1 as shown in the exhibit. (Click the Exhibit button.) Group1 is located in an organizational unit (OU) named OU1.
You need to ensure that you can modify the Security settings of Group1 by using Active Directory Users and Computers.
What should you do from Active Directory Users and Computers?
 clip_image001[24]

A.    From the View menu, select Users, Contacts, Groups, and Computers as containers.
B.    Right-click OU1 and select Delegate Control
C.    From the View menu, select Advanced Features.
D.    Right-click contoso.com and select Delegate Control.

Answer: C
Explanation:
From ADUC select view toolbar then select advanced features When you open up the ADUC in a default installation of Active Directory, you are only presented with the basiccontainers. These basic containers include the only organizational unit (OU), which is the Domain Controllers OU, as wellas the other containers such as Users and Computers. To see more in-depth containers, you need to configure the ADUC by going to the View option on thetoolbar, then selecting Advanced Features. This will refresh the view within the ADUC and add some new containers. There are no hidden (or Advanced)OUs that will show up when you configure the ADUC in this way. Viewing ADUC Advanced Settings:

  clip_image002[6]
http://searchwindowsserver.techtarget.com/tip/Viewing-advanced-settings-in-ActiveDirectory- Users-and-Computers

QUESTION 49
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. You install Windows Server 2012 on a new computer named DC3. You need to manually configure DC3 as a domain controller. Which tool should you use?

A.    Server Manager
B.    winrm.exe
C.    Active Directory Domains and Trusts
D.    dcpromo.exe

Answer: A
Explanation:
A. using the Add Roles Wizard in Server Manager, followed by the Active Directory Domain Services Configuration Wizard
B. winrm is the server side service for remote managment
C. used for trust between multiple domains
D. Dcpromo.exe has been deprecated. In Windows Server 2012 R2, if you run dcpromo.exe (without anyparameters) from a command prompt, you receive a message directing you to Server Manager
  clip_image001[26]
http://technet.microsoft.com/en-us/library/hh472162.aspx#BKMK_GUI http://technet.microsoft.com/en-us/library/dd163506.aspx
http://technet.microsoft.com/en-us/library/hh831568.aspx

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(21-30)!

QUESTION 31
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. You need to configure a central store for the Group Policy Administrative Templates. What should you do on DC1?

A.    From Server Manager, create a storage pool.
B.    From Windows Explorer, copy the PolicyDefinitions folder to the SYSVOL\contoso.com\policies folder.
C.    From Server Manager, add the Group Policy Management feature
D.    From Windows Explorer, copy the PolicyDefinitions folder to the NETLOGON share.

Answer: B
Explanation:
A. Create Disk Storage Pool
B. PolicyDefinitions folder in SYSVOL
C. Group Policy Management is a console for GPO Mgmt
D. Folder is for logon scripts
PolicyDefinitions folder within the SYSVOL folder hierarchy. By placing the ADMX files in this directory,they are replicated to every DC in the domain; by extension, the ADMX-aware Group Policy ManagementConsole in Windows Vista, Windows 7, Windows Server 2008 and R2 can check this folder as an additionalsource of ADMX files, and will report them accordingly when setting your policies.
By default, the folder is not created. Whether you are a single DC or several thousand, I would stronglyrecommend you create a Central Store and start using it for all your ADMX file storage. It really does work well.
The Central Store To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder ona domain controller. The Central Store is a file location that is checked by the Group Policy tools. The GroupPolicy tools use any .admx files that are in the Central Store. The files that are in the Central Store are laterreplicated to all domain controllers in the domain. To create a Central Store for .admx and .adml files, create a folder that is named PolicyDefinitions in thefollowing location:
\\FQDN\SYSVOL\FQDN\policies
Note: FQDN is a fully qualified domain name.
http://tigermatt.wordpress.com/tag/policydefinitions/
http://support.microsoft.com/kb/929841/en-us
http://www.virtuallyimpossible.co.uk/how-to-create-a-group-policy-central-store/ http://support.microsoft.com/kb/2741591/en-us

QUESTION 32
You install Windows Server 2012 R2 on a standalone server named Server1. You configure Server1 as a VPN server.
You need to ensure that client computers can establish PPTP connections to Server1.
Which two firewall rules should you create? (Each correct answer presents part of the solution. Choose two.)

A.    An inbound rule for protocol 47
B.    An outbound rule for protocol 47
C.    An inbound rule for TCP port 1723
D.    An inbound rule for TCP port 1701
E.    An outbound rule for TCP port 1723
F.    An outbound rule for TCP port 1701

Answer: AC
Explanation:
To enable VPN tunnels between individual host computers or entire networks that have a firewall between them, you must open the following ports:
PPTP
To allow PPTP tunnel maintenance traffic, open TCP 1723. To allow PPTP tunneled data to pass through router, open Protocol ID 47. http://www.windowsitpro.com/article/pptp/which-ports-do-you-need-to-open-on-a-firewall-to- allow-pptp-andl2tp-over-ipsec-vpn-tunnels–46811
If you use a personal firewall or a broadband router, or if there are routers or firewalls between the VPN client and the VPN server, the following ports and protocol must be enabled for PPTP on all firewalls and routers that are between the VPN client and the VPN server:
Client ports Server port Protocol
1024-65535/TCP 1723/TCP PPTP
Additionally, you must enable IP PROTOCOL 47 (GRE).
http://support.microsoft.com/kb/314076/en-us

QUESTION 33
Your network contains an Active Directory domain named adatum.com. The computer accounts for all member servers are located in an organizational unit (OU) named Servers. You link a Group Policy object (GPO) to the Servers OU.
You need to ensure that the domain’s Backup Operators group is a member of the local Backup Operators group on each member server. The solution must not remove any groups from the local Backup Operators groups.
What should you do?

A.    Add a restricted group named adatum\Backup Operators. Add Backup Operators to the This group is
a member of list.
B.    Add a restricted group named adatum\Backup Operators. Add Backup Operators to the Members of
this group list.
C.    Add a restricted group named Backup Operators. Add adatum\Backup Operators to the This group is
a member of list.
D.    Add a restricted group named Backup Operators. Add adatum\Backup Operators to the Members of
this group list.

Answer: A
Explanation:
A. The Member Of list specifies which other groups the restricted group should belong to B. Needs to be added to member of list
C. Wrong group
D. Wrong group
Restricted groups allow an administrator to define two properties for security-sensitive groups (that is,”restricted” groups).
The two properties are Members and Member Of . The Members list defines who should and should not belongto the restricted group. The Member Of list specifies which other groups the restricted group should belong to.
When a restricted Group Policy is enforced, any current member of a restricted group that is not on theMembers list is removed. Any user on the Members list which is not currently a member of the restrictedgroup is added.
The Restricted Groups folder is available only in Group Policy objects associated with domains, OUs,and sites. The Restricted Groups folder does not appear in the Local Computer Policy object. If a Restricted Group is defined such that it has no members (that is, the Members list is empty), then allmembers of the group are removed when the policy is enforced on the system. If the Member Of list is emptyno changes are made to any groups that the restricted group belongs to. In short, an empty Members listmeans the restricted group should have no members while an empty Member Of list means “don’t care” whatgroups the restricted group belongs to.
 clip_image001
http://technet.microsoft.com/en-us/library/cc957640.aspx

QUESTION 34
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. An application named Appl.exe is installed on all client computers. Multiple versions of Appl.exe are installed on different client computers. Appl.exe is digitally signed.
You need to ensure that only the latest version of Appl.exe can run on the client computers.
What should you create?

A.    An application control policy packaged app rule
B.    A software restriction policy certificate rule
C.    An application control policy Windows Installer rule
D.    An application control policy executable rule

Answer: D
Explanation:
A. A publisher rule for a Packaged app is based on publisher, name and version B. You can create a certificate rule that identifies software and then allows or does not allow the software torun, depending on the security level.
C. For .msi or .msp
D. Executable Rules, for .exe and can be based on Publisher, Product name, filename and version. Use Certificate Rules on Windows Executables for Software Restriction Policies This security setting determines if digital certificates are processed when a user or process attempts to runsoftware with an .exe file name extension. This security settings is used to enable or disable certificate rules, atype of software restriction policies rule. With software restriction policies, you can create a certificate rule thatwill allow or disallow software that is signed by Authenticode to run, based on the digital certificate that isassociated with the software. In order for certificate rules to take effect, you must enable this security setting. When certificate rules are enabled, software restriction policies will check a certificate revocation list (CRL) tomake sure the software’s certificate and signature are valid. This may decrease performance when start signedprograms. You can disable this feature. On Trusted Publishers Properties, clear the Publisher and Timestampcheck boxes.
 clip_image001[4]
http://technet.microsoft.com/en-us/library/dd759068.aspx
http://technet.microsoft.com/en-us/library/hh994588.aspx http://www.grouppolicy.biz/2012/08/how-manage-published-a-k-a-metro-apps-in-windows8-using- grouppolicy/
http://technet.microsoft.com/en-us/library/hh994597.aspx#BKMK_Cert_Rules http://technet.microsoft.com/en-us/library/cc782660%28v=ws.10%29.aspx

QUESTION 35
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. You need to ensure that the local Administrator account on all computers is renamed to L_Admin. Which Group Policy settings should you modify?

A.    Security Options
B.    User Rights Assignment
C.    Restricted Groups
D.    Preferences

Answer: A
Explanation:
A. Allows configuration of computers
B. User Rights Assignment policies determines which users or groups have logon rights or privileges on thecomputer
C. Restricted Groups defines what member or groups should exist as part of a group D. With Preferences, local and domain accounts can be added to a local group without affecting the existingmembers of the group In Group Policy Object Editor, click Computer Configuration, click Windows Settings, click Security Settings,click Local Policies, and then click Security Options. In the details pane, double-click Accounts: Rename administrator account.
 clip_image002
http://technet.microsoft.com/en-us/library/cc747484(v=ws.10).aspx
In Group Policy Object Editor, click Computer Configuration, click Windows Settings, click Security Settings, click Local Policies, and then click Security Options. In the details pane, double-click Accounts: Rename administrator account.

QUESTION 36
You have a server that runs Windows Server 2012 R2. The disks on the server are configured as shown in the exhibit. (Click the Exhibit button.) You need to create a storage pool that contains Disk 1 and Disk 2. What should you do first?
 clip_image002[4]

A.    Delete volume E
B.    Convert Disk 1 and Disk 2 to dynamic disks
C.    Convert Disk 1 and Disk 2 to GPT disks
D.    Create a volume on Disk 2

Answer: A
Explanation:
A. Storage Pools use unallocated space
There is no way to create a storage pool with existing data. Storage pools are only a collection ofdrives that are managed by windows.
http://technet.microsoft.com/en-us/library/ff399688.aspx
http://technet.microsoft.com/en-us/library/hh758075.aspx

QUESTION 37
You have a server named Server1 that runs Windows Server 2012 R2. You add a 4-TB disk named Disk 5 to Server1. You need to ensure that you can create a 3-TB volume on Disk 5. What should you do?

A.    Create a storage pool.
B.    Convert the disk to a dynamic disk.
C.    Create a VHD, and then attach the VHD.
D.    Convert the disk to a GPT disk.

Answer: D
Explanation:
MBR max is 2TB, the disk must be GPT
For any hard drive over 2TB, we need to use GPT partition. If you have a disk larger than 2TB size, the rest ofthe disk space will not be used unless you convert it to GPT. An existing MBR partition can’t be converted to GPT unless it is completely empty; you must either deleteeverything and convert or create the partition as GPT. It is not possible to boot to a GPT partition, impossible to convert MBR to GPT without data loss.
http://msdn.microsoft.com/en-us/library/windows/hardware/gg463525.aspx

QUESTION 38
You have a server named Server1 that has a Server Core installation of Windows Server 2008 R2. Server1 has the DHCP Server server role and the File Server server role installed.
You need to upgrade Server1 to Windows Server 2012 R2 with the graphical user interface (GUI). The solution must meet the following requirements:
• Preserve the server roles and their configurations.
• Minimize Administrative effort.
What should you do?

A.    On Server1, run setup.exe from the Windows Server 2012 R2 installation media and select Server with a GUI.
B.    Start Server1 from the Windows Server 2012 R2 installation media and select Server Core Installation.
When the installation is complete, add the Server Graphical Shell feature.
C.    Start Server1 from the Windows Server 2012 R2 installation media and select Server with a GUI.
D.    On Server1, run setup.exe from the Windows Server 2012 R2 installation media and select Server Core
Installation.
When the installation is complete, add the Server Graphical Shell feature

Answer: D
Explanation:
A. Server is on 2008 R2 core, must install 2012 R2 core and then GUI B. Not least effort
C. Not least effort
D. Upgrade to 2012 R2 and install GUI shell
http://technet.microsoft.com/en-us/library/jj574204.aspx Upgrades that switch from a Server Core installation to the Server with a GUI mode of Windows Server 2012 R2 in one step (and vice versa) are not supported. However, after upgrade is complete, Windows Server 2012 R2 allows you to switch freely between Server Core and Server with a GUI modes. For more information about these installation options, how to convert between them, and how to use the new Minimal Server Interface and
Features on Demand, see http://technet.microsoft.com/library/hh831786.

QUESTION 39
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. You need to install the Remote Desktop Services server role on Server2 remotely from Server1. Which tool should you use?

A.    The dsadd.exe command
B.    The Server Manager console
C.    The Remote Desktop Gateway Manager console
D.    The Install-RemoteAccess cmdlet

Answer: B
Explanation:
A. Adds specific types of objects to the directory
B. You can manage remote server by Server Manager and install roles/features C. Remote Desktop Gateway (RD Gateway) is a role service that enables authorized remote users to connectto resources on an internal corporate or private network, from any Internet-connected device that can run theRemote Desktop Connection (RDC) client. D. Performs prerequisite checks for DirectAccess (DA) to ensure that it can be installed, installs DA for remoteaccess (RA) (includes management of remote clients) or for management of remote clients only, and installsVPN (both Remote Access VPN and siteto-site VPN).
 clip_image001[6]
http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831456.aspx
http://technet.microsoft.com/en-us/library/cc725706.aspx
http://technet.microsoft.com/en-us/library/hh918408(v=wps.620).aspx

QUESTION 40
You have a server named Server1 that runs a full installation of Windows Server 2012 R2.
You need to uninstall the graphical user interface (GUI) on Server1. You must achieve this goal by using the minimum amount of Administrative effort. What should you do?

A.    Reinstall Windows Server 2012 R2 on the server.
B.    From Server Manager, uninstall the User Interfaces and Infrastructure feature.
C.    From Windows PowerShell, run Uninstall-WindowsFeature PowerShell-ISE
D.    From Windows PowerShell, run Uninstall-WindowsFeature Desktop-Experience.

Answer: B
Explanation:
A. Not least effort
B. Quick and Easy
C. Uninstalls PS-ISE
D. Doesn’t remove all GUI components
 clip_image001[8]
http://www.petri.co.il/switching-gui-server-core-windows-server-2012.htm

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(21-30)!

QUESTION 21
Your network contains three servers that run Windows Server 2012 R2. The servers are configured as shown in the following table.
 clip_image001[9]
Server3 is configured to obtain an IP address automatically.
You need to prevent Server3 from receiving an IP address from Server1. What should you create on Server1?

A.    A reservation
B.    A filter
C.    A scope option
D.    An exclusion

Answer: B
Explanation:
A. For clients that require a constant IP address
B. Filter to exclude MAC address of Server3
C. Range of allowed IP’s to be assigned
D. Exclude range of IP’s
MAC address based filtering ensure that only a known set of devices in the system are able to obtain an IPAddress from the DHCP
 clip_image002[17]
Reservation and Exclusion, two incredibly different concepts. An exclusion is an address or range of addresses taken from a DHCP scope that the DHCP server is notallowed to hand out. For example, if you have set a DHCP server to exclude the address range 192.168.0.1-192.168.0.10 then the only way a computer on your network would get an address of 192.168.0.4 would be ifyou assigned it statically on that machine. This is because DHCP knows NOT to give this range of IPaddresses out.
A reservation is a specific IP addresses that is tied to a certain device through its MAC address. Forexample, if we have a workstation on the network that requires a certain IP address, but we don’t want to gothrough to trouble of assigning it statically, then we can create a reservation for it. So if the MAC address of theNIC on the computer is AA-BB-00FF-CC-AA and we want it to maintain the IP address of 192.168.0.100 thenwe would create a DHCP reservation under that particular scope saying that the IP address 192.168.0.100
isreserved only for the MAC address AA-BB-00-FF-CC-AA.
http://technet.microsoft.com/en-us/magazine/ff521761.aspx
http://technet.microsoft.com/en-us/library/cc726954(v=ws.10).aspx http://www.windowsnetworking.com/kbase/WindowsTips/Windows2003/AdminTips/Network/DHC PReservationsandExclusions.html

QUESTION 22
Your network contains an Active Directory forest. The forest contains two domains named contoso.com and corp.contoso.com. The forest contains four domain controllers. The domain controllers are configured as shown in the following table.
 clip_image001[11]
All domain controllers are DNS servers. In the corp.contoso.com domain, you plan to deploy a new domain controller named DCS.
You need to identify which domain controller must be online to ensure that DCS can be promoted successfully to a domain controller.
Which domain controller should you identify?

A.    DC1
B.    DC2
C.    DC3
D.    DC4

Answer: C
Explanation:
A. Wrong Domain
B. Wrong Domain
C. Right domain, RID Master must be online
D. Right domain but Not needed to be online
Relative ID (RID) Master:
Allocates active and standby RID pools to replica domain controllers in the same domain. (corp.contoso.com) Must be online for newly promoted domain controllers to obtain a local RID pool that is required to advertise or when existing domain controllers have to update their current or standby RID pool allocation.
The RID master is responsible for processing RID pool requests from all domain controllers in a particular domain. When a DC creates a security principal object such as a user or group, it attaches a unique Security ID (SID) to the object. This SID consists of a domain SID (the same for all SIDs created in a domain), and a relative ID (RID) that is unique for each security principal SID created in a domain. Each DC in a domain is allocated a pool of RIDs that it is allowed to assign to the security principals it creates. When a DC’s allocated RID pool falls below a threshold, that DC issues a request for additional RIDs to the domain’s RID master. The domain RID master responds to the request by retrieving RIDs from the domain’s unallocated RID pool and assigns them to the pool of the requesting DC At any one time, there can be only one domain controller acting as the RID master in the domain.
 clip_image001[13]
http://support.microsoft.com/kb/223346

QUESTION 23
Your network contains an Active Directory domain named contoso.com. You log on to a domain controller by using an account named Admin1. Admin1 is a member of the Domain Admins group. You view the properties of a group named Group1 as shown in the exhibit. (Click the Exhibit button.) Group1 is located in an organizational unit (OU) named OU1.
You need to ensure that users from Group1 can modify the Security settings of OU1 only.
What should you do from Active Directory Users and Computers?
 clip_image001[15]

A.    Modify the Managed By settings on OU1.
B.    Right-click contoso.com and select Delegate Control.
C.    Right-click OU1 and select Delegate Control.
D.    Modify the Security settings of Group1.

Answer: C
Explanation:
A. The distinguished name of the user that is assigned to manage this object.
B. Would delegate control to the whole domain
C. Delegates control to the OU OU1 only
D. Wrong Feature
An organizational unit is the smallest scope or unit to which you can assign Group Policy settings or delegate administrative authority. A user can have administrative authority for all organizational units in a domain or for a single organizational unit.
You can delegate administrative control to any level of a domain tree by creating organizational units within a domain and delegating administrative control for specific organizational units to particular users or groups. Administrative control can be assigned to a user or group by using the Delegation of Control Wizard or through the Authorization Manager console. Both of these tools allow you to assign rights or permissions to particular users or groups.
http://technet.microsoft.com/en-us/library/cc758565%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/library/cc778807%28v=ws.10%29.aspx http://msdn.microsoft.com/en-us/library/windows/desktop/ms676857(v=vs.85).aspx http://technet.microsoft.com/en-us/library/cc732524.aspx

QUESTION 24
Your network contains an Active Directory forest named contoso.com. All domain controllers currently run Windows Server 2008 R2. You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2. The new domain controller will have the following configurations:
– Schema master
– Global catalog server
– DNS Server server role
– Active Directory Certificate Services server role
You need to identify which configurations Administrators by using the Active Directory Installation Wizard.
Which two configurations should you identify? (Each correct answer presents part of the solution. Choose two.)

A.    Transfer the schema master.
B.    Enable the global catalog server.
C.    Install the DNS Server role
D.    Install the Active Directory Certificate Services role.

Answer: AD
Explanation:
AD Installation Wizard will automatically install DNS and allows for the option to set it as a global catalog server. ADCS and schema must be done separately.
 clip_image001[17]
http://technet.microsoft.com/en-us/library/hh831457.aspx

QUESTION 25
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.
 clip_image001[19]
In the perimeter network, you install a new server named Server1 that runs Windows Server 2012 R2. Server1 is in a workgroup. You need to perform an offline domain join of Server1 to the contoso.com domain. What should you do first?

A.    Transfer the PDC emulator role to Dc1.
B.    Run the djoin.exe command.
C.    Run the dsadd.exe command.
D.    Transfer the infrastructure master role to DC1.

Answer: B
Explanation:
A. Creates a new Active Directory computer.
B. Use djoin for offline join in the perimeter network
C. Adds specific types of objects to the directory.
D. Add the local computer to a domain or workgroup.
To perform an offline domain join, you run commands by using a new tool named Djoin.exe. You use Djoin.exe to provision computer account data into AD DS. You also use it to insert the computer account data intothe Windows directory of the destination computer, which is the computer that you want to join to the domain.
Create the account djoin /provision /domain winsrvtuts.wst /machine Win7 /savefile c:\yourFile.txt Run on the target systemdjoin /requestodj /loadfile c:\yourFile.txt /windowspath c:\Windows /localos
http://technet.microsoft.com/en-us/library/ee617245.aspx
http://technet.microsoft.com/en-us/library/ff793312(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh849798.aspx
http://winsrvtuts.com/2011/08/off-line-domain-join-with-djoin-exe/
http://technet.microsoft.com/en-us/library/offline-domain-join-djoin-step- bystep%28v=ws.10%29.aspx

QUESTION 26
Your network contains two Active Directory forests named adatum.com and contoso.com. Both forests contain multiple domains. A two-way trust exists between the forests. The contoso.com domain contains a domain local security group named Group1. Group1 contains contoso\user1 and adatum\user1.
You need to ensure that Group1 can only contain users from the contoso.com domain.
Which three actions should you perform?
To answer, move three actions from the list of actions to the answer area and arrange them in the correct order.
 clip_image002[19]
Answer:
 clip_image002[21]
Explanation:
Domain local Groups that are used to grant permissions within a single domain. Members of domain local groups can include only accounts (both user and computer accounts) and groups from thedomain in which they are defined.
———– to review………. Universal groups can only include objects from its own forest Groups can have — domain local, built-in local, global, and universal. That is, the groups have different areas in different scopes which they are valid.
A domain local group is a security or distribution group that can contain universal groups, global groups, other domain local groups from its own domain, and accounts from any domain in the forest. You can give domain local security groups rights and permissions on resources that reside only in the same domain where the domain local group is located. A global group is a group that can be used in its own domain, in member servers and in workstations of the domain, and in trusting domains. In all those locations, you can give a global group rights and permissions and the global group can become a member of local groups. However, a global group can contain user accounts that are only from its own domain. A universal group is a security or distribution group that contains users, groups, and computers from any domain in its forest as members. You can give universal security groups rights and permissions on resources in any domain in the forest. Universal groups are not supported.
Domain local -Groups that are used to grant permissions within a single domain. Members of domain local groups can include only accounts (both user and computer accounts) and groups from the domain in which they are defined. Built-in local – Groups that have a special group scope that have domain local permissions and, for simplicity, are often referred to as domain local groups. The difference between built-in local groups and other groups is that built-in local groups can’t be created or deleted. You can only modify built-in local groups. References to domain local groups apply to built-in local groups unless otherwise noted. Global -Groups that are used to grant permissions to objects in any domain in the domain tree or forest. Members of global groups can include only accounts and groups from the domain in which they are defined. Universal – Groups that are used to grant permissions on a wide scale throughout a domain tree or forest. Members of global groups include accounts and groups from any domain in the domain tree or forest.
Global to universal. This conversion is allowed only if the group that you want to change is not a member of another global scope group. Domain local to universal. This conversion is allowed only if the group that you want to change does not have another domain local group as a member. Universal to global. This conversion is allowed only if the group that you want to change does not have another universal group as a member. Universal to domain local. There are no restrictions for this operation.
http://technet.microsoft.com/en-us/library/bb726978.aspx
http://technet.microsoft.com/en-us/library/cc755692(v=ws.10).aspx

QUESTION 27
Your network contains an Active Directory domain named contoso.com. You discover that when you join client computers to the domain manually, the computer accounts are created in the Computers container.
You need to ensure that new computer accounts are created automatically in an organizational unit (OU) named Corp.
Which tool should you use?

A.    net.exe
B.    redircmp.exe
C.    regedit.exe
D.    dsadd.exe

Answer: B
Explanation:
A. Used to stop/start protocols
B. Redirects the default container for newly created computers to a specified, target organizational unit
C. Modify local registry entries
D. Adds specific types of objects to the directory
Redirects the default container for newly created computers to a specified, target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers.
You must run the redircmp command from an elevated command prompt.
Redircmp.exe is located in the C:\Windows\System32 folder.
You must be a member of the Domain Admins group or the Enterprise Admins group to use this tool.
http://technet.microsoft.com/en-us/library/bb490949.aspx
http://technet.microsoft.com/en-us/library/cc770619(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx

QUESTION 28
You have a server named Server2 that runs Windows Server 2012 R2. Server2 has the Hyper-V server role installed. The disks on Server2 are configured as shown in the exhibit. (Click the Exhibit button.) You create a virtual machine on Server2 named VM1.
You need to ensure that you can configure a pass-through disk for VM1.
What should you do?
 clip_image001[21]

A.    Convert Disk 1 to a basic disk.
B.    Take Disk 1 offline.
C.    Create a partition on Disk 1.
D.    Convert Disk 1 to a MBR disk.

Answer: B
Explanation:
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks- inhyperv.aspx
Pass-through Disk Configuration
Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspective

QUESTION 29
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 is connected to two Fibre Channel SANs and is configured as shown in the following table.
 clip_image001[23]
You have a virtual machine named VM1. You need to configure VM1 to connect to SAN1.
What should you do first?

A.    Add one HBA
B.    Create a Virtual Fibre Channel SAN.
C.    Create a Hyper-V virtual switch.
D.    Configure network adapter teaming.

Answer: B
Explanation:
You need your virtualized workloads to connect easily and reliably to your existing storage arrays. WindowsServer 2012 provides Fibre Channel ports within the guest operating system, which allows you toconnect to Fibre Channel directly from within virtual machines. This feature protects your investments inFibre Channel, enables you to virtualize workloads that use direct access to Fibre Channel storage, allows youto cluster guest operating systems over Fibre Channel, and provides an important new storage option forservers hosted in your virtualization infrastructure.
With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre Channel storage from within a virtualmachine. This allows you to use your existing Fibre Channel investments to support virtualized workloads.
Support for Fibre Channel in Hyper-V guests also includes support for many related features, such as virtualSANs, live migration, and MPIO.

clip_image001[25]

QUESTION 30
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com. All servers on the L2P.com network have Windows Server 2012 installed, and all workstations have Windows 8 installed.
You are running a training exercise for junior administrators. You are currently discussing the Always Offline Mode.
Which of the following is TRUE with regards to the Always Offline Mode? (Choose all that apply.)

A.    It allows for swifter access to cached files and redirected folders.
B.    To enable Always Offline Mode, you have to satisfy the forest and domain functional-level requirements,
as well as schema requirements.
C.    It allows for lower bandwidth usage due to users are always working offline.
D.    To enable Always Offline Mode, you must have workstations running Windows 7 or Windows
Server 2008 R2.

Answer: AC
Explanation:
Offline Files have four modes of operation:
Online
Slow link
Auto offline
Manual offline
Offline Files transition between the three modes online, slow link and auto offline depending on connection speed. The user can always override the automatic mode selection by manually switching to manual offline mode.
To determine the connection speed two pings with default packet size are sent to the file server. If the average round-trip time is below 80 ms (Windows 7) or 35 ms (Windows 8), the connection is put into online mode, otherwise into slow link mode. The latency value of 35/80 ms is configurable through the Group Policy setting Configure slow-link mode.
Reads, Writes and Synchronization
In online mode, changes to files are made on the file server as well as in the local cache (this induces a performance hit – see this article for details). Reads are satisfied from the local cache (if in sync).
In slow link mode, changes to files are made in the local cache. The local cache is background-synchronized with the file server every 6 hours (Windows 7) or 2 hours (Windows 8), by default. This can be changed through the Group Policy setting Configure Background Sync. . In auto offline mode, all reads and writes go to the local cache. No synchronization occurs. . In manual offline mode, all reads and writes go to the local cache. No synchronization occurs by default, but background synchronization can be enabled through the Group Policy setting Configure Background Sync.
http://technet.microsoft.com/en-us/library/hh968298.aspx
http://helgeklein.com/blog/2012/04/windows-7-offline-files-survival-guide/

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(11-20)!

QUESTION 11
Your network contains an Active Directory domain named corp.contoso.com. The domain contains a domain controller named DC1. When you run ping dcl.corp.contoso.com, you receive the result as shown in the exhibit. (Click the Exhibit button.)
 clip_image002[1]
You need to ensure that DC1 can respond to the Ping command. Which rule should you modify? To answer, select the appropriate rule in the answer area.
 clip_image002[3]
Answer:
 clip_image002[5]

QUESTION 12
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.
 clip_image001[1]
You install a new server named Server 1 that runs a Server Core Instillation of Windows Server 2012 R2. You need to join Server 1 to the contoso.com domain. The solution must minimize administrative effort. What should you use?

A.    The dsadd.exe command
B.    The New-ADComputer cmdlet
C.    The Djoin.exe command
D.    The Add-Computer cmdlet

Answer: D
Explanation:
A. Adds specific types of objects to the directory
B. Creates a new Active Directory computer.
C. Use djoin for offline join in the perimeter network .
D. Add the local computer to a domain or workgroup.
http://technet.microsoft.com/en-us/library/ee617245.aspx
http://technet.microsoft.com/en-us/library/ff793312(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh849798.aspx

QUESTION 13
You have a print server named Server1. Server1 runs Windows Server 2008 R2. You have a file server named Server2. Server2 runs Windows Server 2012 R2. You need to migrate all of the printers on Server1 to Server2. Which actions should you perform on the servers2?
 clip_image002[7]
Answer:
 clip_image002[9]
Explanation:
printbrm -p all:org – Publishes all printers in the directory, or publishes printers that were published originally.
While the original server is still running, use the Printer Migration Wizard or the Printbrm.exe command-line tool to export or back up the print information (such as settings, queues, and drivers) in a printer settings file. Then, import or restore this backup image to a destination server runningWindows Server 2012 that has been configured to run as a print server.
http://technet.microsoft.com/en-us/library/jj134150.aspx

QUESTION 14
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 and is configured as the only domain controller.
You need to retrieve a list of all the user accounts. The list must include the last time each user was authenticated successfully.
Which Windows PowerShell command should you run?
To answer, drag the appropriate cmdlet or property to the correct locations to complete the PowerShell command in the answer area. Each cmdlet or property may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
 clip_image002[11]
Answer:
 clip_image002[13]
Explanation:
To produce a listing of all the users and their last logon date, you can use a command.
Get-ADUser -Filter * -Properties “LastLogonDate” |
sort-object -property lastlogondate -descending |
Format-Table -property name, lastlogondate -AutoSize
http://blogs.technet.com/b/heyscriptingguy/archive/2010/07/20/hey-scripting-guy-how-can-i-use-windows- powershell-to-identify-inactive-user-accounts-in-active-directory-domain-services.aspx http://technet.microsoft.com/en-us/library/ee617192.aspx
http://technet.microsoft.com/en-us/library/cc732952(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc732979.aspx

QUESTION 15
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 contains a single virtual machine named VM1.
You need to ensure that a user named User1 can manage the virtual machine settings of VM1. The solution must minimize the number of permissions assigned to User1.
To which group should you add User1?

A.    Server Operators
B.    Administrators
C.    Power Users
D.    Hyper-V Administrators

Answer: D
Explanation:
This group can reduce the number of users that belong to the local Administrators group while providing users with access to Hyper-VSimplified authorization:
The Hyper-V Administrators group is introduced and is implemented as a local security group.
What value does this change add?
This group can reduce the number of users that belong to the local Administrators group while providingusers with access to Hyper-V.
What works differently?
The Hyper-V Administrators group is a new local security group. Add users to this group instead of thelocal Administrators group to provide them with access to Hyper-V. Members of the Hyper-V Administrators have complete and unrestricted access to all features of Hyper-V.
http://technet.microsoft.com/en-us/library/hh831410.aspx

QUESTION 16
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Windows Server 2012 R2. You create a group Managed Service Account named gservice1. You need to configure a service named Service1 to run as the gservice1 account.
How should you configure Service1?

A.    From the Services console, configure the General settings.
B.    From Windows PowerShell, run Set-Service and specify the -StartupType parameter.
C.    From a command prompt, run sc.exe and specify the config parameter.
D.    From a command prompt, run sc.exe and specify the privs parameter.

Answer: C
Explanation:
A. General settings only allow you to stop, start and set type/paramaters B. Set-Service provides a way for you to change the Description, StartupType, or DisplayName of a service
C. Modifies service configuration
D. Sets the response/action on service failure
http://windows.microsoft.com/en-us/windows-vista/using-system-configuration http://technet.microsoft.com/en-us/library/ee176963.aspx
http://technet.microsoft.com/en-us/library/cc990290(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc738230(v=ws.10).aspx

QUESTION 17
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. A user named User1 attempts to log on to DO, but receives the error message shown in the exhibit. (Click the Exhibit button.)
 clip_image002[15]
You need to ensure that User1 can log on to DC1. What should you do?

A.    Modify the Account is sensitive and cannot be delegated setting of the User1 account.
B.    Grant User1 the Allow log on locally user right.
C.    Modify the Logon Workstations setting of the User1 account.
D.    Add User1 to the Remote Management Users group.

Answer: B
Explanation:
Domain controllers, by default, restrict the types of user accounts that have the ability to log on locally.
Domain controllers, by default, restrict the types of user accounts that have the ability to log on locally.
By default, only members of the Account Operators, Administrators, Backup Operators, Print Operators, andServer Operators groups have the Allowed logon locally system right. If you want to grant a user account theability to log on locally to a domain controller, you must either make that user a member of a group that alreadyhas the Allowed logon locally system right or grant the right to that user account.
Edit Default Domain Controllers Policy Expand Computer Configuration, Policies, Windows Settings, Security Settings, Local Policies, click UserRights Assignment.
Double-click Allow Logon Locally.
http://technet.microsoft.com/en-us/library/ee957044(v=ws.10).aspx

QUESTION 18
Your network contains a single Active Directory domain named contoso.com. The network contains two subnets. The subnets are configured as shown in the following table.
 clip_image001[3]
The network contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the DHCP Server server role installed. Server1 is configured to lease IP addresses to the two subnets. You discover that computers on the Warehouse subnet that have static IP addresses can communicate with the computers on the MainOffice subnet. Computers on the Warehouse subnet that obtain an IP address automatically can only communicate with other computers on the Warehouse subnet.
You need to ensure that all of the computers on the Warehouse subnet can communicate with the computers on the MainOffice subnet.
Which DHCP option should you configure on Server1?

A.    003 Router
B.    011 Resource Location Servers
C.    020 Nonlocal Source Routing
D.    019 IP Layer Forwarding

Answer: A
Explanation:
A. This option is normally used to assign a default gateway to DHCP clients on a subnet. A DHCP clientrequests this option.
B. This option specifies a list of IP addresses for resource location servers
C. This option specifies whether the DHCP client enables or disables the forwarding at the IP layer ofdatagrams that contain source routing information and were sent by a non-local host.
D. This option specifies whether the DHCP client should enable or disable forwarding of datagrams at the IPlayer.
 clip_image001[5]
http://technet.microsoft.com/en-us/library/dd145324(v=ws.10).aspx http://technet.microsoft.com/en-us/library/ee941211(v=ws.10).aspx

QUESTION 19
Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy. You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. You configure all of the client computers to use Server1 as their primary DNS server.
You need to prevent Server1 from attempting to resolve Internet host names for the client computers.
What should you do on Server1?

A.    Configure the Security settings of the contoso.com zone.
B.    Remove all root hints.
C.    Create a primary zone named “.”.
D.    Create a primary zone named “root”.
E.    Create a primary zone named “GlobalNames”.
F.    Create a forwarder that points to 169.254.0.1.
G.    Create a stub zone named “root”.
H.    Create a zone delegation for GlobalNames.contoso.com.

Answer: BC
Explanation:
Explanation:
B. necessary to remove the default root hints files
C. Create a primary zone named “.” ( dot zone, root )
When you install DNS on a Windows server that does not have a connection to the Internet, the zone for the domain is created and a root zone, also known as a dot zone, is also created. This root zone may prevent access to the Internet for DNS and for clients of the DNS. If there is a root zone, there are no other zones other than those that are listed with DNS, and you cannot configure forwarders or root hint servers.
Root domain This is the top of the tree, representing an unnamed level; it is sometimes shown as two empty quotation marks (“”), indicating a null value. When used in a DNS domain name, it is stated by a trailing period (.) to designate that the name is located at the root or highest level of the domain hierarchy. In this instance, the DNS domain name is considered to be complete and points to an exact location in the tree of names. Names stated this way are called fully qualified domain names (FQDNs).
 clip_image001[7]
http://technet.microsoft.com/en-us/library/cc772774%28v=ws.10%29.aspx http://youtu.be/KjMDtlR6Mhk http://support.microsoft.com/kb/298148/en-us

QUESTION 20
Your company has a remote office that contains 600 client computers on a single subnet.
You need to select a subnet mask for the network that will support all of the client computers. The solution must minimize the number of unused addresses.
Which subnet mask should you select?

A.    255.255.252.0
B.    255.255.254.0
C.    255.255.255.0
D.    255.255.255.128

Answer: A
Explanation:
Using a subnet mask of 255.255.252.0 will result in the fewest number of unused IP addresses.

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-410 Exam Dump Free Download(1-10)!

QUESTION 1
How can you manage an newly installed Windows Server 2012 R2 core from a another Windows Server 2012 R2 with computer manager?
 clip_image002
Answer:
 clip_image002[4]

QUESTION 2
Your network contain an active directory domain named Contoso.com. The domain contains two servers named server1 and server2 that run Windows Server 2012 R2.
You create a security template named template1 by using the security template snap-in.
You need to apply template1 to server2. Which tool should you use?

A.    Security Templates
B.    Computer Management
C.    Security Configuration and Analysis
D.    System Configuration

Answer: C
Explanation:
A. Template was already created – Provide standard security option to use in security policies
B. Needs to be applied at the GP level
C. Security templates are inactive until imported into a Group Policy object or the
SecurityConfiguration and Analysis
D. Tool to ID windows problems
 clip_image002[6]
http://technet.microsoft.com/en-us/library/jj730960.aspx
http://windows.microsoft.com/en-us/windows-vista/using-system-configuration

QUESTION 3
Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
You create a group Managed Service Account named gservice1.
You need to configure a service named service1 to run as the gservice1 account.
How should you configure service1?

A.    From Services Console configure the recovery settings
B.    From a command prompt ,run sc.exe and specify the config parameter
C.    From Windows PowerShell,run Set-Service and specify the -PassThrough parameter
D.    From a command prompt ,run sc.exe and specify the sdset parameter

Answer: B
Explanation:
Sc config, Modifies the value of a service’s entries in the registry and in the Service Control Manager database.
obj= {<AccountName> | <ObjectName>}
Specifies a name of an account in which a service will run, or specifies a name of the Windows driver object in which the driver will run. The default setting is LocalSystem.
password= <Password>
Specifies a password. This is required if an account other than the LocalSystem account is used.

QUESTION 4
Your network contains an active directory domain named Contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named OU1.
You need to ensure that user named user1 can link and unlink Group Policy Objects(GPOs) to OU1. The solution must minimize the number of permissions assigned to user1.
What should you do?

A.    Run the Delegation of Control Wizard on the Policies containers
B.    Run the Set-GPPermission cmdlet
C.    Run the Delegation of Control Wizard on OU1
D.    Modify the permission on the user1 account

Answer: C
Explanation:
A. Not minimum permissions
B. Grants a level of permissions to a security principal for one GPO or all the GPOs in a domain C. Minimizes delegated permission to a single OU
D. Will not allow GPO changes to the OU
Delegation of Control Wizard
The following are common tasks that you can select to delegate control of them:
Create, delete, and manage user accounts
Reset user passwords and force password change at next logon Read all user information
Modify the membership of a group
Join a computer to a domain
Manage Group Policy links
Generate Resultant Set of Policy (Planning)
Generate Resultant Set of Policy (Logging)
Create, delete, and manage inetOrgPerson accounts
Reset inetOrgPerson passwords and force password change at next logon Read all inetOrgPerson information
 clip_image001
http://technet.microsoft.com/en-us/library/dd145442.aspx
http://technet.microsoft.com/en-us/library/ee461038.aspx
http://technet.microsoft.com/en-us/library/cc732524.aspx

QUESTION 5
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has 2 dual-core processors and 16 GB of RAM.
You install the Hyper-V server role in Server1.
You plan to create two virtual machines on Server1.
You need to ensure that both virtual machines can use up to 8 GB of memory. The solution must ensure that both virtual machines can be started simultaneously.
What should you configure on each virtual machine?

A.    Dynamic Memory
B.    NUMA topology
C.    Memory weight
D.    Ressource Control

Answer: A
Explanation:
A. Dynamic Memory adjusts the amount of memory available to a virtual machine, based on changes in memory demand and values that you specify
B. Used for high performance apps like SQL
C. Provides Hyper-V with a way to determine how to distribute memory among virtual machines if there is not enough physical memory available in the computer to give every virtual machine its requested amount of memory.
D. Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual machine.
 clip_image001[4]
http://technet.microsoft.com/en-us/library/ff817651(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh831410.aspx
http://technet.microsoft.com/en-us/library/cc742470.aspx

QUESTION 6
You have a server named Server1 that runs Windows Server 2012 R2. You promote Server1 to domain controller. You need to view the service location (SVR) records that Server1 registers on DNS. What should you do on Server1?

A.    Open the Srv.sys file
B.    Open the Netlogon.dns file
C.    Run ipconfig/displaydns
D.    Run Get-DnsServerDiagnostics

Answer: B
Explanation:
A. Timestamp server driver
B. Netlogon service creates a log file that contains all the locator resource records stored in netlogon.
C. used to display current resolver cache content
D. Gets DNS event logging details
 clip_image001[6]
http://technet.microsoft.com/en-us/library/cc959303.aspx
http://technet.microsoft.com/en-us/library/jj649883(v=wps.620).aspx

QUESTION 7
Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Hyper-V server role installed. You have a virtual machine named VM1. VM1 has a snapshot. You need to modify the Snapshot File Location of VM1.
What should you do First?

A.    Copy the snapshot file
B.    Pause VM1
C.    Shut down VM1
D.    Delete the snapshot

Answer: D
Explanation:
How are snapshots stored?
Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located in the same folder as the virtual machine by default. In Hyper-V in Windows Server 2008 R2, the files usually are located in the same folder as the virtual hard disk. The following exceptions affect the location of the snapshot data files: If the virtual machine was imported with snapshots, they are stored in their own folder. If the virtual machine has no snapshots and you configure the virtual machine snapshot setting, all snapshots you takeafterwards will be stored in the folder you specify.
Caution
Do not delete .avhd files directly from the storage location. Instead, use Hyper-V Manager to select the virtual machine, and then delete the snapshots from the snapshot tree. Do not expand a virtual hard disk when it is used in a virtual machine that has snapshots. Doing so will make the snapshots unusable.
http://technet.microsoft.com/en-us/library/dd560637(v=ws.10).aspx

QUESTION 8
You have a server named Server1 that runs Windows Server 2012 R2. Several users are members of the local Administrators group. You need to ensure that all local administrators receive User Account Control (UAC) prompts when they run a Microsoft Management Console (MMC). Which setting should you modify from the Local Security Policy?
To answer, select the appropriate settings in the answer area.
 clip_image001[8]
Answer: B
 clip_image001[10]

QUESTION 9
You have a network printer connected to print server. You need to be able to print if print server goes down.
What should you chose?

A.    brach office direct printing
B.    printer pooling
C.    spooling
D.    Print forwarding

Answer: A
Explanation:
Branch Office Direct Printing can reduce Wide Area Network (WAN) usage by printing directly to a print device instead of a server print queue. This feature can be enabled or disabled on a per printer basis and is transparent to the user. It is enabled by an administrator using the Print Management Console or Windows PowerShell on the server.
The printer information is cached in the branch office, so that if the print server is unavailable for some reason (for example if the WAN link to the data center is down), then it is still possible for the user to print.
Branch Office Direct Printing requires the following operating systems:
Windows Server 2012
Windows 8
http://technet.microsoft.com/en-us/library/jj134156.aspx

QUESTION 10
You have external virtual switch with srv-io enabled with 10 Virtual Machines on it. You need to make the Virtual Machines able to talk only to each other.

A.    remove the vswitch and recreate it as private.
B.    add new vswitch
C.    remove vswitch and recreate it as public
D.    adjust srv-io settings

Answer: A
Explanation:
There are three possible modes for the Hyper-V switch: private, internal, and public. Do not confuse these with IP addressing schemes or any other networking configuration in a different technology.
Private Switch
The private switch allows communications among the virtual machines on the host and nothing else. Even the management operating system is not allowed to participate. This switch is purely logical and does not use any physical adapter in any way. “Private” in this sense is not related to private IP addressing. You can mentally think of this as a switch that has no ability to uplink to other switches.
Internal Switch
The internal switch is similar to the private switch with one exception: the management operating system can have a virtual adapter on this type of switch and communicate with any virtual machines that also have virtual adapters on the switch. This switch also does not have any matching to a physical adapter and therefore also cannot uplink to another switch.
External Switch
This switch type must be connected to a physical adapter. It allows communications between the physical network and the management operating system and virtual machines. Do not confuse this switch type with public IP addressing schemes or let its name suggest that it needs to be connected to a public-facing connection. You can use the same private IP address range for the adapters on an external virtual switch that you’re using on the physical network it’s attached to
http://www.altaro.com/hyper-v/the-hyper-v-virtual-switch-explained-part-1/ #ixzz2W095PeZd http://technet.microsoft.com/en-us/library/hh831823.aspx http://www.altaro.com/hyper-v/hyper-v-virtual-switch-explained-part-2/

Passing Microsoft 70-410 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-410 Dump:

http://www.braindump2go.com/70-410.html

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(111-120)!

QUESTION 111
The Aero Shake feature will work if which of the following conditions are met? Choose Two.

A.    A display adapter compatible with WDDM is installed.
B.    Aero features are downloaded from Microsoft.
C.    The windows experience index is at least 2.
D.    The Windows Experience Index is 3 or greater.

Answer: AD

QUESTION 112
You manage a computer that runs Windows 7. You are tasked to identify which applications were installed during the last week.
What Windows component would you use to find this information? Choose two.

A.    Check the Windows System Change Log in the Control Panel.
B.    View the events in the Applications Log under Windows Logs in the System and Security component
section of the Control Panel.
C.    Review the informational events from Reliability Monitor.
D.    Check the Windows System Diagnostics Report under the Performance Monitor MMC.

Answer: BC

QUESTION 113
Which of the following Windows 7 Editions allows you to join an Active Directory domain? Choose three.

A.    Windows Home Edition
B.    Windows Professional Edition
C.    Windows Ultimate Edition
D.    Windows Enterprise Edition

Answer: BCD
Explanation:
 clip_image002[3]

QUESTION 114
All the games including Titan Chess come with which versions of Windows 7? Choose two.

A.    Windows Home Edition
B.    Windows Professional Edition
C.    Windows Ultimate Edition
D.    Windows Enterprise Edition

Answer: CD

QUESTION 115
Which of the following is not a minimum requirement to install Windows 7?

A.    1 GHz or faster 32-bit (x86) or a 64-bit (x64) processor
B.    4 GB RAM (32-bit)/2 GB RAM (64-bit)
C.    16 GB available disk space (32-bit)/20 GB (64-bit)
D.    DirectX 9 graphics processor with WDDM 1.0 or higher driver

Answer: B

QUESTION 116
Which of the following is not a rating for games in Windows 7?

A.    General Audience (G)
B.    Everyone (E)
C.    Teen (T)
D.    Adults Only (AO)

Answer: A

QUESTION 117
In Windows 7 you can control when users such as kids can login to Windows 7. Which of the following best describes where to configure this option?

A.    You cannot choose this feature unless you are connected to a domain.
B.    Go to the Start, Control Panel, User Accounts and Family Safety, Setup Parental Controls, and then
choose Time Restrictions.
C.    Go to Start, Control Panel. User Profiles, and then Time Restriction Settings.
D.    Go to the Homegroup settings and choose Offline Time Settings.

Answer: B

QUESTION 118
Which of the following best describes how the user is alerted with information system and configuration alerts?

A.    A popup occurs and the Windows 7 desktop contrast is dimmed. Until you acknowledge the alert the
screen will not move.
B.    If Aero is installed the shaking alert flag appears in the index bar of every open window.
C.    A flag in the taskbar with a red “x” indicates there is a problem needing attention.
D.    All of the above.

Answer: C

QUESTION 119
If you have a router in the network your connected to and the Default Gateway is set to 192.168.1.1 and the subnet mask is 255.255.255.0, which of the following are useable IP addresses on that network?

A.    192.168.1.1
B.    192.168.1.300
C.    192.168.1.30
D.    192.168.2.10

Answer: C

QUESTION 120
Which of the following is true of Windows 7?

A.    MailCentral is included as the new default mail client with Windows 7.
B.    Outlook Express is included with Windows 7.
C.    Microsoft Outlook is included with Windows 7.
D.    There is no preinstalled mail client included with Windows 7.

Answer: D

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump: http://www.braindump2go.com/70-680.html

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(101-110)!

QUESTION 101
You manage a stand-alone computer which has only one partition. Windows 7 is run by this computer. The computer is shared by two users that are respectively named User1 and User2. User1 uses Encrypting File System (EFS) to encrypt a file. User1 tries to grant User2 access to the file as shown in the exhibit. (Click the Exhibit button.)
You have to make sure that User1 is able to grant User2 access to the file. What action should you perform to make sure of this?
 clip_image001[1]

A.    Instruct User2 to log on to the computer and take ownership of the file.
B.    Instruct User2 to log on to the computer and encrypt a file.
C.    Instruct User1 to export his certificate to a certificate (.cer) file.
D.    Instruct User1 to move the file to a shared folder on the computer.

Answer: B

QUESTION 102
You have a computer that runs Windows 7.
You need to configure the computer to download updates from a local Windows Server Update Services (WSUS) server. What should you do?

A.    From Windows Update, modify the Windows Update settings.
B.    From the local Group Policy, modify the Windows Update settings.
C.    From the System settings, modify the System Protection settings.
D.    From the local Group Policy, modify the Location and Sensors settings.

Answer: B

QUESTION 103
You plan to install Windows 7 by using a Windows 7 DVD. You need to perform an automated installation of Windows 7. What should you do?

A.    Create an answer file named oobe.xml. Copy the file to a network share.
B.    Create an answer file named winnt.sif. Place the file on a removable drive.
C.    Create an answer file named sysprep.inf. Copy the file to a network share.
D.    Create an answer file named autounattend.xml. Place the file on a removable drive.

Answer: D

QUESTION 104
You have a computer that runs Windows 7.
You perform an image backup. A virus infects the computer and causes the computer to become unresponsive. You need to restore the computer as quickly as possible. What should you do?

A.    Start the computer by using the Last Known Good Configuration feature.
B.    Start the computer from the Windows 7 DVD and then use the Startup Repair tool.
C.    Start the computer from the Windows 7 DVD and then use the System Image Recovery tool.
D.    Start the computer from Windows Preinstallation Environment (Windows PE) and then run Imagex.exe.

Answer: C

QUESTION 105
You have a computer that runs Windows 7. Multiple users log on to the computer. You need to deny one user access to removable devices on the computer. All other users must have access to the removable drives. What should you do?

A.    From the local Group Policy, modify an application control policy.
B.    From Control Panel, modify the BitLocker Drive Encryption settings.
C.    From Device Manager, modify the settings of all removable devices.
D.    From the local Group Policy, modify a removable storage access policy.

Answer: D

QUESTION 106
You have a computer that runs Windows 7. Your company has three custom applications named app1.exe, app2.exe, and app3.exe. The applications have been digitally signed by the company. You need to create a policy that allows only applications that have been digitally-signed by the company to run. What should you create?

A.    An AppLocker executable rule
B.    An AppLocker Windows Installer rule
C.    A software restriction policy and a certificate rule
D.    A software restriction policy and a hash rule

Answer: A

QUESTION 107
A user wants to install the games included with Windows 7 on his PC. They were not installed by default. Windows components can be added or removed using which of the following in Windows 7.

A.    Click the Start Bar, Control Panel, Add/Remove Programs, and click Windows Components.
B.    Click the Start Bar, Control Panel, Programs, then click Turn Windows features on or off.
C.    Click the Start Bar, Settings, Windows Control Center.
D.    Right-click the “My Computer” icon, Choose Properties, Choose Computer Management, on the left
pane choose Add Remove Windows Components.

Answer: B

QUESTION 108
You are installing Windows 7 on from the desktop of a Windows XP Professional PC. Which of the following can be performed from the Windows 7 DVD? Choose three.

A.    Run setup.exe from the DVD to start the Windows 7 installation.
B.    Use the autorun feature on the DVD to start the installation.
C.    Perform a full installation of Windows 7.
D.    Perform and upgrade of Windows 7 keeping all the Windows XP settings.

Answer: ABC

QUESTION 109
Federated Search connectors are installed using what method?

A.    Purchase the Federated Search Installation Tool Pack online and buying individual search connectors
from websites.
B.    Download an .osdx file from a valid source. Double click on the downloaded file and choose Add to install.
C.    Go to Microsoft’s website. Only vendors who have signed up with the Microsoft Federated Search Tool
Writers Guild can participate.
D.    Go to Amazon.com and download the Shared Resource Kit for Federated Searches.

Answer: B

QUESTION 110
Which of the following is not a volume type usable by Windows 7?

A.    FAT
B.    exFAT
C.    NTFS
D.    All of the above are volume types in Windows 7

Answer: D

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump:
http://www.braindump2go.com/70-680.html

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(91-100)!

QUESTION 91
Which of the following must you download from Microsoft’s Web site to obtain USMT 4.0?

A.    Windows Anytime Upgrade
B.    Windows Upgrade Advisor
C.    WAIK
D.    Microsoft Toolkit

Answer: C
Explanation:
User State Migration Tool
USMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState.

QUESTION 92
Which Windows Setup configuration pass applies settings to Windows 7 before Windows Welcome starts?

A.    OobeSystem
B.    AuditSystem
C.    Specialize
D.    OfflineServicing

Answer: A

QUESTION 93
You require fault tolerance for your operating system so that your computer running Windows 7 Home Premium can still boot up if a disk fails. You have two disks and unallocated space on your second disk. What should you do?

A.    Create a VHD and install an image of your computer on the VHD. Use BCDEdit to make the VHD bootable.
B.    Create a RAID-0 volume.
C.    Create a RAID-1 volume.
D.    Create a RAID-5 volume.

Answer: C

QUESTION 94
You have two computers on the same subnet. The computers have the IPv6 addresses shown in the following table:
 clip_image001
You need to test the connection to the IPv6 address from Computer1 to Computer2. Which command should you run?

A.    Ping -6 fe80::44df:1b68%12
B.    Ping -6 fe80::44df:1b68%10
C.    Ping -R fe80::44df:1b68%12
D.    Ping -R fe80::44df:1b68%10

Answer: B
Explanation:
If you are pinging from one host to another using link-local addresses, you also need to include your interface ID, for example ping
fe80::39cd:4c93%10.
The % character followed by a number after each IPv6 address is the interface ID. If you want to display the configuration of the IPv6 interfaces on the local computer, you can enter netsh interface ipv6 show address.
Ping -6
Force using IPv6.

QUESTION 95
You have a computer that runs Windows 7. IPv6 is disabled on the computer.
The computer has the following IPv4 settings:
– IP address: 10.1.1.193
– Subnet mask: 255.255.0.0
– Default gateway: 10.1.1.194
– Preferred DNS server: 10.1.1.195
You need to ensure that the computer can only communicate with computers on the local subnet. What should you do?

A.    Delete the default gateway address.
B.    Delete the preferred DNS server IP address.
C.    Configure the subnet mask to use 255.255.255.0.
D.    Configure the subnet mask to use 255.255.255.192.

Answer: A
Explanation:
Why gateways work
Default gateways are important to make IP routing work efficiently. In most cases, the router that acts as the default gateway for TCP/IP hosts–either a dedicated router or a computer that connects two or more network segments–maintains knowledge of other networks in the larger network and how to reach them. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain extensive and continuously updated knowledge about individual remote IP network segments. Only the router that acts as the default gateway needs to maintain this level of routing knowledge to reach other remote network segments in the larger internetwork. If the default gateway fails, communication beyond the local network segment may be impaired. To prevent this, you can use the Advanced TCP/IP Settings dialog box (in Network Connections) for each connection to specify multiple default gateways. You can also use the route command to manually add routes to the routing table for heavily used hosts or networks.

QUESTION 96
You are running Windows 7 on a portable computer. A custom power plan named “On The Move” is optimized for battery life. The computer remains running when the portable computer is closed. You need to change a setting so that when you close the portable computer, it enters sleep mode. Which setting should you change? (To answer, select the appropriate setting in the work area.)
 clip_image002
Answer:
 clip_image002[6]

QUESTION 97
You have a computer that runs Windows 7. You need to modify the file extensions that are associated to Internet Explorer. What should you do?

A.    From Internet Explorer, click Tools and then click Manage Add-ons.
B.    From Control Panel, open Default Programs and then click Set Associations.
C.    From the local Group Policy, expand Computer Configuration and then click Software Settings.
D.    From Window Explorer, right-click %programfiles%\Internet Explorer\iexplore.exe and then click Properties.

Answer: B

QUESTION 98
You have a computer that runs Windows 7.
You run Ipconfig as shown in the exhibit. (Click the Exhibit button.) You need to ensure that you can establish a DirectAccess connection to the network.
What should you do first?
 clip_image002[8]

A.    Create a new VPN connection.
B.    Configure a static IPv4 address.
C.    Enable IPv6 on the network adapter.
D.    Add an additional default gateway address.

Answer: C

QUESTION 99
You have a computer that runs Windows 7. You discover that an application named App1 runs during the startup process. You need to prevent only App1 from running during startup. Users must be allowed to run App1 manually. What should you do?

A.    From the local Group Policy, modify the application control policy.
B.    From the local Group Policy, modify the software restriction policy.
C.    From the System Configuration tool, select Diagnostic Startup.
D.    From the System Configuration tool, modify the Startup applications.

Answer: D

QUESTION 100
You are in charge of two computers that are respectively named Computer1 and Computer2. Computer1 runs Windows 7 and Computer2 runs Windows XP Professional.
On Computer1, you enable Remote Desktop as shown in the Remote Desktop exhibit. (Click the Exhibit button.)
 clip_image001[6]
Later you log on to Computer2 and try to connect to Computer1 by using Remote Desktop. The connection fails and you receive the error message shown in the Remote Desktop Disconnected exhibit. (Click the Exhibit button.)
 clip_image001[8]
You need to ensure, that you can connect to Computer1 by using Remote Desktop. What action should you perform?

A.    On Computer1, enable the Allow connections from computers running any version of Remote Desktop setting.
B.    On Computer2, assign the Client (Respond Only) IPSec policy.
C.    On Computer1, add your user account to the Remote Desktop Users group.
D.    On Computer2, create a firewall exception for the Remote Desktop Protocol (RDP).

Answer: A

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump:
http://www.braindump2go.com/70-680.html

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(81-90)!

QUESTION 81
Your company has a main office and a branch office. A portable computer runs Windows 7. On the computer, you configure a printer for each office.
You need to configure printing on the computer to meet the following requirements:
– When you are located in the main office, all documents must automatically print to the main office printer.
– When you are located in the branch office, all documents must automatically print to the branch office printer.
What should you do?

A.    From Location and Other Sensors, configure a default location.
B.    From Devices and Printer, configure the Manage Default Printers settings.
C.    From Region and Language, modify the Location settings.
D.    From Network and sharing Center, configure the network location.

Answer: B

QUESTION 82
You have a stand-alone computer that runs Windows 7. You open Windows Update as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can manually change the Windows Update settings on the computer. What should you do?
Windows Update (exhibit):
 clip_image002[13]
Windows Update (exhibit):
 clip_image002[15]

A.    Log on to Windows 7 as member of the Administrators group.
B.    From the local Group Policy, modify the Windows Update settings.
C.    Right-click Windows Update and select Run as administrator.
D.    Right-click the command prompt, select Run as administrator, and then run Wuapp.exe.

Answer: B
Explanation:
Configuring Automatic Updates by using local Group Policy
1. Click Start, and then click Run.
2. Type gpedit.msc, and then click OK.
3. Expand Computer Configuration.
4. Right-click Administrative Templates, and then click Add/Remove Templates.
5. Click Add, click Wuau.adm in the Windows\Inf folder, and then click Open.
6. Click Close.
7. Under Computer Configuration, expand Administrative Templates, expand Windows
 clip_image002[17]
Components, and then expand Windows Update.

QUESTION 83
You have a reference computer that runs Windows 7.
You plan to create an image of the computer and then deploy the image to 100 computers.
You need to prepare the reference computer for imaging. What should you do before you create the image?

A.    Run Package Manager.
B.    Run the System Preparation tool.
C.    Install the User State Migration Tool.
D.    Install Windows Automated Installation Kit.

Answer: B
Explanation:
Sysprep
Sysprep is a tool designed for corporate system administrators, OEMs, and others who need to deploy the Windows?XP operating system on multiple computers. After performing the initial setup steps on a single system, you can run Sysprep to prepare the sample computer for cloning. Sysprep prepares the image for capture by cleaning up various user-specific and computer-specific settings, as well as log files. The reference installation now is complete and ready to be imaged.

QUESTION 84
You have a standalone computer that runs Windows 7.
You need to prevent non-administrative users from using Device Manager. Users must be able to access Event Viewer. What should you do?

A.    From Control Panel, modify the default settings for media and devices.
B.    From Control Panel, modify the default settings for device installation.
C.    From the local computer policy, modify the application control policies.
D.    From the local computer policy, modify the Microsoft Management Console (MMC) settings.

Answer: D
Explanation:
Controlling MMC usage by using local Group Policy
To control MMC usage by using local Group Policy
11. Open MMC 3.0.
12. On the File menu, click Add/Remove Snap-in.
13. In the Available snap-ins list, click the Group Policy editor, and then click Add.
14. In the Select Group Policy Object wizard, use the default setting, Local Computer, in the Group Policy Object field.
15. Click Finish to close the Select Group Policy Object wizard.
16. By default, all available snap-in extensions are enabled. If you want to enable only certain extensions, highlight the snap-in in the Selected snap-ins list, and then click Edit Extensions.
17. By default, snap-ins load as child objects of the Console Root node. Click Advanced to modify this behavior and allow you to choose a different parent snap-in.
18. In the Add or Remove Snap-ins dialog box, click OK.
19. Before closing the new console, perform any of these procedures:
– To restrict access to author mode in MMC
– To restrict access to a permitted list of snap-ins
– To permit or restrict access to a snap-in

QUESTION 85
You have a computer that runs Windows 7 and Windows Internet Explorer 8.
A user named User1 attempts to access a Web page. User1 fails to access the Web page and receives an error message stating that the page does not have a rating. You need to configure Internet Explorer to allow User1 to access Web pages that do not have a rating. Which settings should you modify?

A.    Content Advisor
B.    InPrivate Filtering
C.    Parental Controls
D.    Restricted Sites

Answer: A
Explanation:
Using Content Advisor to help block inappropriate web content The Internet is a great resource for children, offering a wealth of information and experiences. However, it can also expose children to information that might not be appropriate for them. Content Advisor allows you to control the types of Internet content that can be viewed on your computer. Depending on how you configure it, Content Advisor uses ratings that websites voluntarily provide to block or allow certain content. Because not all websites are rated, unrated websites are automatically blocked (but you can choose to allow them). Once you’ve adjusted the settings and turn Content Advisor on, it checks websites as you visit them. To use Content Advisor, you first need to create the supervisor password, and then you can specify the filters and rules you want applied to your children’s web use. To change settings, you’ll need to log in with the supervisor password before you can make changes. The following procedures describe how to create or change your supervisor password, and how to make specific changes to control Internet use.
To allow unrated sites
By default, content advisor will block unrated websites. To allow unrated sites to be viewed, follow the steps below.
9. Click to open Internet Explorer.
10. Click the Tools button, and then click Internet Options.
11. Click the Content tab, and then, under Content Advisor, click Settings. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
12. In the Supervisor Password Required dialog box, type your password, and then click OK.
13. In the Content Advisor dialog box, click the General tab.
14. Under User options

QUESTION 86
Which of the following can be used to increase the physical memory on your Windows 7 PC and increase the speed?

A.    BranchCache
B.    Aero Glass
C.    DirectAccess
D.    ReadyBoost

Answer: D

QUESTION 87
To which of the following versions and editions of Windows 7 can you directly upgrade a computer running Windows Vista Enterprise (x86)?

A.    Windows 7 Home Professional (x86)
B.    Windows 7 Ultimate (x86)
C.    Windows 7 Ultimate (x64)
D.    Windows 7 Enterprise (x64)

Answer: B
Explanation:
Windows 7 Upgrade paths:
http://technet.microsoft.com/en-us/library/dd772579%28v=ws.10%29.aspx The only applicable solution is Windows 7 Enterprise (64-bit) as for the following reasons:
All versions are support Hardware wise.
Requirements:
Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements:
1 GHz 32-bit (x86) or 64-bit (x64) processor
1 GB of system memory a 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available space a graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver, Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics memory XP Mode
Windows XP Mode is a downloadable compatibility option that is available for the Professional, Enterprise, and Ultimate editions of Windows 7. Windows XP Mode uses the latest version of Microsoft Virtual PC to allow you to run an installation of Windows XP virtually under Windows 7.
Use all of the installed memory
The x86 version supports a maximum of 4 GB of RAM, whereas the x64 version supports a maximum of 8 GB of RAM.
Windows 7 Professional
Windows 7 Professional is available from retailers and on new computers installed by manufacturers. It supports all the features available in Windows Home Premium, but you can join computers with this operating system installed to a domain. It supports EFS and Remote Desktop Host but does not support enterprise features such as AppLocker, DirectAccess, BitLocker, and BranchCache.
Windows 7 Enterprise and Ultimate Editions
The Windows 7 Enterprise and Ultimate editions are identical except for the fact that Windows 7 Enterprise is available only to Microsoft’s volume licensing customers, and Windows 7 Ultimate is available from retailers and on new computers installed by manufacturers. The Enterprise and Ultimate editions support all the features available in other Windows 7 editions but also support all the enterprise features such as EFS, Remote Desktop Host, AppLocker, DirectAccess, BitLocker, BranchCache, and Boot from VHD.

QUESTION 88
A user has a home computer with a cable Internet connection and no other computers on his home network. Which of the following methods can this person use to upgrade from Windows 7 Home Premium to Windows 7 Ultimate?

A.    Sysprep
B.    Windows PE
C.    WDS
D.    Windows Anytime Upgrade

Answer: D
Explanation:
Windows Anytime Upgrade
With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small businesses where a small number of intra-edition upgrades is required.
 clip_image002[19]

QUESTION 89
Which of the following tools can you use to determine if the applications installed on your computer running Windows Vista are known to have problems with Windows 7?

A.    Windows 7 Upgrade Advisor
B.    Sysprep
C.    USMT
D.    Windows PE

Answer: A
Explanation:
Windows 7 Upgrade Advisor
Prior to attempting to perform the upgrade from Windows Vista to Windows 7, you should run the Windows 7 Upgrade Advisor. The Windows 7 Upgrade Advisor is an application that you can download from Microsoft’s Web site that will inform you if Windows 7 supports a computer running the current hardware and software configuration of Windows Vista.
Prior to running the Windows 7 Upgrade Advisor, you should ensure that all hardware that you want to use with Windows 7, such as printers, scanners, and cameras, are connected to the computer. The Upgrade Advisor generates a report that informs you of which applications and devices are known to have problems with Windows 7.

QUESTION 90
Which of the following operating systems support an offline migration using USMT? Choose three.

A.    Windows 2000 Professional
B.    Windows XP Professional
C.    Windows Vista
D.    Windows 7

Answer: BCD

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(71-80)!

QUESTION 71
A company has client computers that run Windows 7. You create an AppLocker policy for the client computers.
You need to ensure that the AppLocker policy is enforced after the computers restart.
Which service startup type should you use? (To answer, select the appropriate setting or settings in the work area.)
 

_J)1YSX5}12OBI64I@@L{%9

Answer:
 clip_image001[4]

QUESTION 72
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
A company has client computers that run Windows 7 Enterprise. The company also has a file server running Windows Server 2008 R2 that is configured to use BranchCache.
The branch office with the client computers has a slow network connection to the office with the file server. Users complain of poor performance when connecting to the file server from their client computers.
You need to verify that the client computers are configured to be BranchCache clients.
Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A.    Device Manager
B.    The Local Users and Groups
C.    Share Permissions
D.    The Folder Properties window
E.    The Netsh command
F.    The Icacls command
G.    The Services Management console
H.    The Group Policy Management console
I.    The User Account Control Settings Control Panel window

Answer: EH
Explanation:
To enable BranchCache on Windows 7 client computers using Group Policy, you must first create a Group Policy object (GPO) that will carry the BranchCache configuration. After creating the GPO, you configure the setting that enables BranchCache and choose whether BranchCache will operate in Distributed Cache mode or Hosted Cache mode.
To create a GPO, enable BranchCache, and select the cache mode Click Start, point to Administrative Tools, and click Group Policy Management Console.
Client configuration using netsh
When configuring client computers, you can enable BranchCache and choose between Distributed Cache mode and Hosted Cache mode with a single netsh command.

QUESTION 73
You are running Windows 7 on a portable computer. A custom power plan named “On The Move” is optimized for battery life. The computer enters sleep mode when the portable computer is closed.
You need to change a setting so that when you close the portable computer, nothing happens. Which setting should you change? (To answer, select the appropriate setting in the work area.)
  clip_image002[1]
Answer:
 clip_image002[3]

QUESTION 74
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
A company has a server running Windows Server 2008 R2, with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) set up. The company also has client computers running Windows 7 Enterprise.
You are preparing to capture an image of a Windows 7 client computer.
You need to ensure that the captured image is generic and does not contain the device drivers from the client computer.
What should you do?

A.    Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to True.
B.    Run the Start /w ocsetup command.
C.    Run the PEImg /Prep command.
D.    Run the Dism command with the /Mount-Wim option.
E.    Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No.
F.    Run the Dism command with the /Add-Driver option.
G.    Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes.
H.    Run the BCDEdit /delete command.
I.    Run the ImageX command with the /mount parameter.
J.    Run the Dism command with the /Add-Package option.
K.    Add a boot image and create a capture image in WDS.
L.    Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False.
M.    Run the Diskpart command and the attach command option.

Answer: L
Explanation:
Persisting Plug and Play Device Drivers During generalize You can persist device drivers when you run the Sysprep command with the /generalize option by specifying the PersistAllDeviceInstalls setting in the Microsoft-Windows- PnPSysprep component. During the specialize configuration pass, Plug and Play scans the computer for devices and installs device drivers for the detected devices. By default, these device drivers are removed from the system when you generalize the system. If you set PersistAllDeviceInstalls to true in an answer file, Sysprep will not remove the detected device drivers. For more information, see the Unattended WindowsSetup Reference (Unattend.chm).
http://technet.microsoft.com/en-us/library/dd744512(WS.10).aspx

QUESTION 75
You have upgraded a Windows XP system to Windows 7. One of the applications is not showing menus when you launch it under Windows 7.
How do you fix this issue? (To answer, select the appropriate setting in the work area.)
  clip_image001[6]
Answer:
 clip_image001[8]

QUESTION 76
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
You have a computer running Windows 7.
You create a VHD and install Windows 7 in it.
You reboot your system and notice that the boot menu now shows two installations of Windows 7.
How do you fix it?

A.    Use Sysprep with an answer file to disable one installation.
B.    Run the BCDEdit command.
C.    Run the Start /w ocsetup command.
D.    Run the Dism command.
E.    Add a boot image and create a capture image in WDS.
F.    Run the PEImg /prep command.
G.    Run the ImageX command with the /mount parameter.
H.    Run the Dism command with the /Mount-Wim option.
I.    Run the Dism command with the /Add-Package option.
J.    Run the Diskpart command and the attach command option.
K.    Add a boot image and create a capture image in WDS.

Answer: B
Explanation:
BCDEdit Command-Line Options
Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
BCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements:
BCDEdit exposes a wider range of boot options than Bootcfg.exe.
BCDEdit has improved scripting support.
Note
Administrative privileges are required to use BCDEdit to modify BCD. BCDEdit is the primary tool for editing the boot configuration of Windows Vista and later versions of Windows. It is included with the Windows Vista distribution in the %WINDIR%\System32 folder.
BCDEdit is limited to the standard data types and is designed primarily to perform single common changes to BCD. For more complex operations or nonstandard data types, consider using the BCD Windows Management
Instrumentation (WMI) application programming interface (API) to create more powerful and flexible custom tools.

QUESTION 77
A user is attempting to connect to a secure remote Microsoft SQL database on a computer running Windows 7 Professional. The computer communicates on port 1433. A rule in Windows Firewall with Advanced Security allows communication.
The user cannot connect to the database on the currently defined protocol due to an error in protocol type.
You need to ensure that users can connect to the database. Which setting should you choose? (To answer, select the appropriate setting in the work area.)
  clip_image001[10]
Answer:
clip_image001[12] 

QUESTION 78
A network contains computers that run Windows 7 and Windows Vista.
A computer named Computer1 runs Windows 7.
You need to ensure that only users running Windows 7 and Windows Vista can connect to Computer1 using Remote Desktop.
In the System Properties window, on the Remote tab, what should you do?

A.    Click the Advanced button. Select the Allow this computer to be controlled remotely check box on Computer1.
B.    Select the Allow connections only from computers running Remote Desktop with Network Level Authentication
(more secure) check box on Computer1.
C.    Select the Allow connections from computers running any version of Remote Desktop (less secure) check box
on Computed.
D.    Select the Allow Remote Assistance connections to this computer check box on Computer1.

Answer: B

QUESTION 79
You administer portable computers that have Windows 7 installed. The computers connect to a wireless network that uses WPA2- Enterprise Security. The company’s security policy requires multifactor authentication for the portable computers.
You need to manually configure each portable computer to meet the following requirements:
Users must provide multifactor authentication. The Server Certificate held on the portable computers must match the certificate held on the server.
What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.)
  clip_image002[5]
Answer:
  clip_image002[9]
QUESTION 80
You administer Windows 7 Enterprise computers in your company network.
All computers are deployed from a single Windows image (.wim). You want to deploy the .wim file to newly purchased computers by Windows Deployment Services (WDS).
You need to protect an administrator account password used for deployment in an answer file. What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
  clip_image002[7]
Answer:

clip_image002[11]

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump:
http://www.braindump2go.com/70-680.html

1 318 319 320 321