[Free] 2018(July) Dumps4cert Microsoft 70-410 Dumps with VCE and PDF Download 231-240

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July Microsoft Official New Released 70-410
100% Free Download! 100% Pass Guaranteed!

Installing and Configuring Windows Server 2012

Question No: 231 HOTSPOT – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2.

Several users are members of the local Administrators group.

You need to ensure that all local administrators receive User Account Control (UAC) prompts when they run a Microsoft Management Console (MMC).

Which settings should you modify from the Local Security Policy? To answer, select the appropriate settings in the answer area.

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

B. UAC Is controlled by local security policy. Computer Configuration\Windows Settings\Security Settings\Local

Policies\Security Option

Question No: 232 – (Topic 3)

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 is a DHCP server that is configured to have a scope named Scope1.

Server2 is configured to obtain an IP address automatically.

In Scope1, you create a reservation named Res_Server2 for Server2. A technician replaces the network adapter on Server2.

You need to ensure that Server2 can obtain the same IP address. What should you modify on Server1?

  1. The Name Protection settings of Scope1

  2. The MAC address of Res_Server2

  3. The Advanced settings of Res_Server2

  4. The Network Access Protection Settings of Scope1

Answer: B Explanation:

DHCP reservations are given based upon MAC address (at least on IPv4/DHCPv4).

For clients that require a constant IP address, you can either manually configure a static IP address, or assign a reservation on the DHCP server. Reservations are permanent lease assignments that are used to ensure that a specified client on a subnet can always use the same IP address. You can use DHCP reservations for hosts that require a consistent IP address, but do not need to be statically configured. DHCP reservations provide a mechanism by which IP addresses may be permanently assigned to a specific client based on the MAC address of that client. The MAC address of a Windows client can be found running the ipconfig /all command.

For Linux systems the corresponding command is ifconfig -a. Once the MAC address has been identified, the reservation may be configured using either the DHCP console or at the command prompt using the netsh tool.

Media access control (MAC) address authorization functions in the same way as automatic number identification (ANI) authorization, but it is used for wireless clients and clients connecting to your network by using an 802.1X authenticating switch. Since the network adapter was replaced, you need to modify the MAC address on Server1 to ensure that Server2 can obtain the same IP address.

Reference: http://technet.microsoft.com/en-us/library/dd197535(v=WS.10).aspx

Question No: 233 HOTSPOT – (Topic 3)

Your network contains a domain controller named dc5.adatum.com that runs Windows Server 2012 R2.

You discover that you can connect successfully to DC5 over the network, but you receive a request timed out message when you attempt to ping DC5.

You need to configure DC5 to respond to ping request.

Which firewall rule should you modify on DC5? To answer, select the appropriate rule in the answer area.

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Question No: 234 – (Topic 3)

You have a print server named Server1.

You install a printer on Server1. You share the printer as Printer1.

You need to configure Printer1 to be available only from 19:00 to 05:00 every day. Which settings from the properties of Printer1 should you modify?

  1. Sharing

  2. Security

  3. Advanced

  4. Device Settings

  5. Ports

Answer: C Explanation:

When navigating to the printer properties, the Properties tab is divided into several different

tabs of which the Advanced tab will give you access to the scheduling where you can configure the availability of the printer.

Reference: http://technet.microsoft.com/en-us/library/cc722526.aspx

Question No: 235 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC5. DC5 has a Server Core Installation of Windows Server 2012 R2.

You need to uninstall Active Directory from DC5 manually. Which tool should you use?

  1. The dsamain.exe command

  2. The ntdsutil.exe command

  3. The Remove-ADComputer cmdlet

  4. The Remove-WindowsFeature cmdlet

Answer: C Explanation:

The Remove-ADComputer cmdlet removes an Active Directory computer. Example: Remove-ADComputer -Identity quot;FABRIKAM-SRV4quot;

Remove one particular computer.

References:

http://technet.microsoft.com/en-us/library/ee662310.aspx http://support.microsoft.com/kb/216498 http://technet.microsoft.com/en-us/library/ee617250.aspx

Question No: 236 – (Topic 3)

You have a server named Server1 that runs Windows Server 2012 R2.

You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the installation fails repeatedly.

You need to ensure that the feature can be installed on Server1. What should you do?

  1. Run the Add-AppxProvisionedPackage cmdlet.

  2. Remove the .NET Framework 4.5 Features feature.

  3. Connect Server1 to the Internet.

  4. Install the Web Server (IIS) server role.

Answer: C Explanation:

The files needed are no longer available on the local Hard drive. We need to connect the server to the Internet.

Important to note that when starting with Windows Server 2012 R2 and Windows 8, the feature files for .NET Framework 3.5 (which includes .NET Framework 2.0 and .NET Framework 3.0) are not available on the local computer by default. The files have been removed. Files for features that have been removed in a Features on Demand configuration, along with feature files for .NET Framework 3.5, are available through Windows Update. By default, if feature files are not available on the destination server that is running Windows Server 2012 R2 R2 Preview or Windows Server 2012 R2, the installation process searches for the missing files by connecting to Windows Update. You can override the default behavior by configuring a Group Policy setting or specifying an alternate source path during installation, whether you are installing by using the Add Roles and Features Wizard GUI or a command line.

References:

Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 2: Configure server roles and Features, p. 117

Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80

Question No: 237 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a shared folder named Share1. Share1 contains the home folder of each user.

All users have the necessary permissions to access only their home folder.

The users report that when they access Share1, they can see the home folders of all the users.

You need to ensure that the users see only their home folder when they access Share1. What should you do from Server1?

  1. From Windows Explorer, modify the properties of the volume that contains Share1.

  2. From Server Manager, modify the properties of the volume that contains Share1.

  3. From Server Manager, modify the properties of Share1.

  4. From Windows Explorer, modify the properties of Share1.

Answer: C

Question No: 238 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.

An application named Appl.exe is installed on all client computers. Multiple versions of Appl.exe are installed on different client computers. Appl.exe is digitally signed.

You need to ensure that only the latest version of Appl.exe can run on the client computers. What should you create?

  1. An application control policy packaged app rule

  2. A software restriction policy certificate rule

  3. An application control policy Windows Installer rule

  4. An application control policy executable rule

Answer: D Explanation:

A. A publisher rule for a Packaged app is based on publisher, name and version B. You can create a certificate rule that identifies software and then allows or does not allow the software to run, depending on the security level.

  1. For .msi or .msp

  2. Executable Rules, for .exe and can be based on Publisher, Product name, filename and version. Use Certificate Rules on Windows Executables for Software Restriction Policies This security setting determines if digital certificates are processed when a user or process attempts to run software with an .exe file name extension. This security setting is used to enable or disable certificate rules, a type of software restriction policies rule. With software restriction policies, you can create a certificate rule that will allow or disallow software that is signed by Authenticode to run, based on the digital certificate that is associated with the software. In order for certificate rules to take effect, you must enable this security setting. When certificate rules are enabled, software restriction policies will check a certificate revocation list (CRL) to make sure the software’s certificate and signature are valid. This may decrease performance when start signed programs. You can disable this feature. On Trusted Publishers Properties, clear the Publisher and Timestampcheck boxes.

Question No: 239 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled.

You install the DHCP server role on a virtual machine named Server1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope.

You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1.

You need to ensure that the virtual machines can use Server1 as a DHCP server. What should you do?

  1. Enable MAC address spoofing on Server1.

  2. Enable single-root I/O visualization (SR-IOV) on Server1.

  3. Disable the DHCP guard on Server1.

  4. Disable the DHCP guard on all of the virtual machines that are DHCP clients.

Answer: C Explanation:

DHCP guard setting

This setting stops the virtual machine from making DHCP offers over this network interface. To be clear – this does not affect the ability to receive a DHCP offer (i.e. if you need to use DHCP to acquire an IP address that will work) it only blocks the ability for the virtual machine to act as a DHCP server.

Question No: 240 – (Topic 3)

Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees.

You create a Group Policy object (GPO) named GP1. You link GP1 to the Employees OU. You need to ensure that GP1 does not apply to the members of a group named Managers. What should you configure?

  1. The Security settings of Employees

  2. The WMI filter for GP1

  3. The Block Inheritance option for Employees

  4. The Security settings of GP1

Answer: D Explanation:

  1. Wrong Group

  2. Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group Policy objects (GPOs) based on attributes of the target computer.

  3. Blocking inheritance prevents Group Policy objects (GPOs) that are linked to higher sites, domains, or organizational units from being automatically inherited by the child-level.

  4. Set Managers to – Members of this security group are exempt from this Group Policy object.

Security settings.

You use the Security Settings extension to set security options for computers and users within the scope of a Group Policy object. You can define local computer, domain, and network security settings.

Figure below shows an example of the security settings that allow everyone to be affected by this GPO except the members of the Management group, who were explicitly denied permission to the GPO by setting the Apply Group Policy ACE to Deny. Note that if a member of the Management group were also a member of a group that had an explicit Allow setting for the Apply Group Policy ACE, the Deny would take precedence and the GPO would not affect the user.

100% Dumps4cert Free Download!
Download Free Demo:70-410 Demo PDF
100% Dumps4cert Pass Guaranteed!
70-410 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No


Leave a Reply

Your email address will not be published. Required fields are marked *

  • Categories

  • Tags

  • Hot Exams

  • Hot Exams

  • Hot Catageories

  • microsoft dumps

    62-193 Dumps
    70-243 Dumps
    70-246 Dumps
    70-247 Dumps
    70-331 Dumps
    70-332 Dumps
    70-333 Dumps
    70-334 Dumps
    70-339 Dumps
    70-341 Dumps
    70-342 Dumps
    70-345 Dumps
    70-346 Dumps
    70-347 Dumps
    70-348 Dumps
    70-354 Dumps
    70-355 Dumps
    70-357 Dumps
    70-383 Dumps
    70-384 Dumps
    70-385 Dumps
    70-398 Dumps
    70-410 Dumps
    70-411 Dumps
    70-412 Dumps
    70-413 Dumps
    70-414 Dumps
    70-417 Dumps
    70-461 Dumps
    70-462 Dumps
    70-463 Dumps
    70-464 Dumps
    70-465 Dumps
    70-466 Dumps
    70-467 Dumps
    70-469 Dumps
    70-470 Dumps
    70-473 Dumps
    70-475 Dumps
    70-480 Dumps
    70-481 Dumps
    70-482 Dumps
    70-483 Dumps
    70-484 Dumps
    70-485 Dumps
    70-486 Dumps
    70-487 Dumps
    70-488 Dumps
    70-489 Dumps
    70-490 Dumps
    70-491 Dumps
    70-492 Dumps
    70-494 Dumps
    70-496 Dumps
    70-497 Dumps
    70-498 Dumps
    70-499 Dumps
    70-517 Dumps
    70-532 Dumps
    70-533 Dumps
    70-534 Dumps
    70-535 Dumps
    70-537 Dumps
    70-640 Dumps
    70-642 Dumps
    70-646 Dumps
    70-673 Dumps
    70-680 Dumps
    70-681 Dumps
    70-682 Dumps
    70-684 Dumps
    70-685 Dumps
    70-686 Dumps
    70-687 Dumps
    70-688 Dumps
    70-689 Dumps
    70-692 Dumps
    70-694 Dumps
    70-695 Dumps
    70-696 Dumps
    70-697 Dumps
    70-698 Dumps
    70-703 Dumps
    70-705 Dumps
    70-713 Dumps
    70-734 Dumps
    70-735 Dumps
    70-740 Dumps
    70-741 Dumps
    70-742 Dumps
    70-743 Dumps
    70-744 Dumps
    70-745 Dumps
    70-761 Dumps
    70-762 Dumps
    70-764 Dumps
    70-765 Dumps
    70-767 Dumps
    70-768 Dumps
    70-773 Dumps
    70-774 Dumps
    70-775 Dumps
    70-776 Dumps
    70-778 Dumps
    70-779 Dumps
    70-980 Dumps
    70-981 Dumps
    70-982 Dumps
    74-343 Dumps
    74-344 Dumps
    74-409 Dumps
    74-678 Dumps
    74-697 Dumps
    77-418 Dumps
    77-419 Dumps
    77-420 Dumps
    77-421 Dumps
    77-422 Dumps
    77-423 Dumps
    77-424 Dumps
    77-425 Dumps
    77-426 Dumps
    77-427 Dumps
    77-428 Dumps
    77-600 Dumps
    77-601 Dumps
    77-602 Dumps
    77-603 Dumps
    77-604 Dumps
    77-605 Dumps
    77-725 Dumps
    77-726 Dumps
    77-727 Dumps
    77-728 Dumps
    77-729 Dumps
    77-730 Dumps
    77-731 Dumps
    77-853 Dumps
    77-881 Dumps
    77-882 Dumps
    77-883 Dumps
    77-884 Dumps
    77-885 Dumps
    77-886 Dumps
    77-887 Dumps
    77-888 Dumps
    77-891 Dumps
    98-349 Dumps
    98-361 Dumps
    98-362 Dumps
    98-363 Dumps
    98-364 Dumps
    98-365 Dumps
    98-366 Dumps
    98-367 Dumps
    98-368 Dumps
    98-369 Dumps
    98-372 Dumps
    98-373 Dumps
    98-374 Dumps
    98-375 Dumps
    98-379 Dumps
    98-380 Dumps
    98-381 Dumps
    98-382 Dumps
    98-383 Dumps
    98-388 Dumps
    AZ-100 Dumps
    AZ-101 Dumps
    AZ-102 Dumps
    INF-203x Dumps
    INF-204x Dumps
    INF-205x Dumps
    INF-206x Dumps
    MB2-700 Dumps
    MB2-701 Dumps
    MB2-702 Dumps
    MB2-703 Dumps
    MB2-704 Dumps
    MB2-706 Dumps
    MB2-707 Dumps
    MB2-708 Dumps
    MB2-709 Dumps
    MB2-710 Dumps
    MB2-711 Dumps
    MB2-712 Dumps
    MB2-713 Dumps
    MB2-714 Dumps
    MB2-715 Dumps
    MB2-716 Dumps
    MB2-717 Dumps
    MB2-718 Dumps
    MB2-719 Dumps
    MB2-877 Dumps
    MB5-705 Dumps
    MB6-700 Dumps
    MB6-701 Dumps
    MB6-702 Dumps
    MB6-703 Dumps
    MB6-704 Dumps
    MB6-705 Dumps
    MB6-884 Dumps
    MB6-885 Dumps
    MB6-886 Dumps
    MB6-889 Dumps
    MB6-890 Dumps
    MB6-892 Dumps
    MB6-893 Dumps
    MB6-894 Dumps
    MB6-895 Dumps
    MB6-896 Dumps
    MB6-897 Dumps
    MB6-898 Dumps