Pass the Cisco CCNA Data Center 200-150 exam. “Introducing Cisco Data Center Networking (DCICN)”: https://www.leads4pass.com/200-150.html (Total Questions: 327 Q&As). I know you most want to get here for free 200-150 dumps. The latest free 200-150 exam practice questions and 200-150 pdf help you improve your skills and exam experience!
Test your Cisco CCNA Data Center 200-150 exam level
QUESTION 1 Refer to the exhibit.
Cisco UCS Manager generates a Call Home fault report Which action do you take to resolve the issue? A. Verify that air flows through the chassis correctly B. Remove the equipment that generates excessive heat near the top of the rack C. Ensure that power cables are connected to the fan assemblies of the UCS D. Adjust the chassis temperature threshold to a higher setting Correct Answer: A
QUESTION 2
Refer to the exhibit. Which command allows the Cisco Nexus 5000 switch to continue to start up? A. switch(boot)# load n5000-uk9.5.2.1.N1.4.bin B. switch(boot)# configure terminalswitch(boot-config)# admin-password Cisco123 C. switch(boot)# load n5000-uk9-kickstart.5.2.1.N1.4.bin D. switch(boot)# load system-latest Correct Answer: A
QUESTION 3 Drag and drop the CLI configuration command on the left to the correct order on the right to configure a Layer 3 interface. Not all options are used. Select and Place:
Correct Answer:
QUESTION 4 Drag and drop the Cisco NX-OS user role on the left to the correct default privilege on the right. Select and Place:
Correct Answer:
QUESTION 5 What is the principle function of the data center core layer? A. high-speed packet switching B. access control C. firewalling and intrusion prevention D. QoS marking Correct Answer: A
QUESTION 6 Which types of cable do you use to connect two Cisco switches that are 50 km apart? A. UTP B. STP C. MMF D. SMF Correct Answer: D
QUESTION 7 Which two terms can take the place of the wildcard mask in an ACL? A. eq B. deny C. host D. all E. any Correct Answer: CE
QUESTION 8 Which process does a Cisco router perform immediately upon powering up? A. POST B. BIOS C. booting from NVRAM D. booting from ROM Correct Answer: A
QUESTION 9 How many bits are used for a subnet ID in an IPv6 address? A. 48 B. 16 C. 64 D. 128 E. 10 Correct Answer: B
QUESTION 10 Ethernet 1/1 is assigned IP address 10.1.1.1 with subnet mask 255.255.255.0. Which configuration is used to configure EIGRP on a Cisco Nexus 7000 switch? A. feature eigrp!interface Ethernet1/1ip address 10.1.1.1 255.255.255.0no shutdown!router eigrp 1network 10.1.1.0 0.0.0.255 B. feature eigrp!router eigrp 1autonomous-system 1!interface Ethernet1/1ip address 10.1.1.1/24ip router eigrp 1no shutdown C. router eigrp 1autonomous-system 1!interface Ethernet1/1ip address 10.1.1.1/24ip router eigrp 1no shutdown D. feature eigrp!interface Ethernet1/1ip address 10.1.1.1/24no shutdown!router eigrp 1network 10.1.1.0 0.0.0.255 Correct Answer: B
QUESTION 11 What are two physical subcomponents of the Cisco UCS C-Series server? (Choose two.) A. memory extension node B. hard drive C. fabric interconnect D. power supply E. compute node Correct Answer: AD
QUESTION 12 Which command set creates an access control list on a Cisco Nexus switch to deny only FTP traffic from any source to destination host 10.10.10.110? A. N5K-A(config)# Ip access-list 101 N5K-A(config-acl)# deny judp any host 10.10.1.110. eq 21 N5K-A(config-acl)# permit ip any any B. N5K-A(config)# Ip access-list 101 N5K-A(config-acl)# deny judp any host 10.10.1.110. eq ftp C. N5K-A(config)# deny tcp any host 10.10.1.110. eq ftp N5K-A(config)# access-list 101deny Ip any any D. N5K-A(config)# Ip access-list 101 N5K-A(config-acl)# deny tcp any host 10.10.1.110. eq 21 N5K-A(config-acl)# permit Ip any any Correct Answer: D
QUESTION 13 Which option includes the two devices that can be connected when a Cisco Fabric Extender Transceiver is used? A. Server to Cisco Nexus 5548 Switch B. Server to Cisco Nexus 5010 Switch C. Cisco Nexus 2000 Series Fabric Extender to Cisco Nexus 5500 Switch D. Server to Cisco Nexus 2000 Series Fabric Extender Correct Answer: C
Watch the Cisco CCNA Data Center 200-150 video tutorial online
We offer more ways to make it easier for everyone to learn, and YouTube is the best tool in the video. Follow channels: https://www.youtube.com/@lead4pass116 get more useful exam content.
We have a number of Cisco, Microsoft, IBM, CompTIA, and other exam experts. We update exam data throughout the year. Top exam pass rate! We have a large user base. We are an industry leader! Choose leads4pass to pass the exam with ease!
Summarize:
Free Cisco Proctored Exams for Validating Knowledge 200-150 exam exercise questions and answers, 200-150 pdf and 200-150 video practice questions. These will help you improve your exam experience. I know you want to easily get 200-150 certification! It’s not hard! Experts recommend https://www.leads4pass.com/200-150.html help you easily get certified.
Identity with Windows Server 2016 – Microsoft: 70-742 exam. Share the latest 70-742 dumps and Practice test questions for free. Real and effective exam questions and answers. 70-742 pdf online Download, 70-742 YouTube video online learning to improve skills! Examthings share 30 Practice test questions for FREE! Get the full 70-742 exam dumps: https://www.leads4pass.com/70-742.html (Total questions:224 Q&A)
Latest effective Microsoft MCSA 70-742 Exam Practice Tests
QUESTION 1 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You network contains an Active Directory forest named contoso.com. The forest contains an Active Directory Rights Management Services (AD RMS) deployment. Your company establishes a partnership with another company named Fabrikam, Inc. The network of Fabrikam contains an Active Directory forest named fabrikam.com and an AD RMS deployment. You need to ensure that the users in contoso.com can access rights protected documents sent by the users in fabrikam.com. Solution: From AD RMS in contoso.com, you configure fabrikam.com as a trusted publisher domain. Does this meet the goal? A. Yes B. No Correct Answer: A
QUESTION 2 A technician named Tech1 is assigned the task of joining the laptops to the domain. The computer accounts of each laptop must be in an organizational unit (OU) that is associated to the department of the user who will use that laptop. The laptop names must start with four characters indicating the department followed by a four-digit number Tech1 is a member of the Domain Users group only. Tech1 has the administrator logon credentials for all the laptops. You need Tech1 to join the laptops to the domain. The solution must ensure that the laptops are named correctly, and that the computer accounts of the laptops are in the correct OUs. Solution: You instruct Tech1 to sign in to each laptop, to rename each laptop by using System in Control Panel, and then to join each laptop to the domain by using the Netdom join command. Does this meet the goal? A. Yes B. No Correct Answer: B
QUESTION 3 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a server named Web1 that runs Windows Server 2016. You need to list all the SSL certificates on Web1 that will expire during the next 60 days. Solution: You run the following command. Get-ChildItem Cert:\LocalMachine\Trust |? { $_.NotAfter –It (Get-Date).AddDays( 60 ) } Does this meet the goal? A. Yes B. No Correct Answer: A
QUESTION 4 Your network contains an Active Directory domain named contoso.com. You have an organizational unit (OU) named TestOU that contains test computers. You need to enable a technician named Tech1 to create Group Policy objects (GPOs) and to link the GPOs to TestOU. The solution must use the principle of least privilege. Which two actions should you perform? Each correct answer presents part of the solution. A. Add Tech1 to the Group Policy Creator Owners group. B. From Group Policy Management, modify the Delegation settings of the TestOU OU. C. Add Tech1 to the Protected Users group. D. From Group Policy Management, modify the Delegation settings of the contoso.com container. E. Create a new universal security group and add Tech1 to the group. Correct Answer: AB
QUESTION 5 You have a server named Server1 that runs Windows Server 2016. You need to configure Server1 as a Web Application Proxy. Which server role or role service should you install on Server1? A. Remote Access B. Active Directory Federation Services C. Web Server (IIS) D. DirectAccess and VPN (RAS) E. Network Policy and Access Services Correct Answer: A
QUESTION 6 Your network contains an Active Directory domain named contoso.com. You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.)You discover that some of the settings configured in the A1 Group Policy object (GPO) fail to apply to the users in the OU1 organizational unit (OU). You need to ensure that all of the settings in A1 apply to the users in OU1. What should you do? A. Enable loopback policy processing in A1. B. Block inheritance on OU1. C. Modify the policy processing order for OU1. D. Modify the GPO Status of A1. Correct Answer: C
QUESTION 7 Your network contains an Active Directory domain named contoso.com, All users are in an organizational unit (OU) named Corp_Users. You plan to modify the description of all the users who have a string of 514 in their mobile phone number. You need to view a list of the users that will be modified. What should you run? A. Get-APUser-Filter “mobilePhone-Like \\’*514*\\'” B. Get-ADOrganizationalUnit-LDAPFilter “(mobilePhone=\\’*514*\\’)” C. Get-ADOrganizationalUnit-Filter “mobilePhone-Like \\’*514* “\\’ D. Get-ADUser-LDAPFilter “(mobilePhone=\\’*514*)” Correct Answer: A
QUESTION 8 Your network contains an Active Directory domain named contoso.com. You have an organizational unit (OU) named OU1 that contains the computer accounts of two servers and the user account of a user named User1. A Group Policy object (GPO) named GPO1 is linked to OU1. You have an application named App1 that installs by using an application installer named App1.exe. You need to publish App1 to OU1 by using Group Policy. What should you do? A. Create a Config.zap file and add a file to the File System node to the Computer Configuration node of GPO1. B. Create a Config.xml file and add a software installation package to the User Configuration node of GPO1. C. Create a Config.zap file and add a software installation package to the User Configuration node of GPO1. D. Create a Config.xml file and add a software installation package to the Computer Configuration node of GPO1. Correct Answer: C
QUESTION 9 The network contains an Active Directory forest named contoso.com. The forest contains three domain controllers configured as shown in the following table.
The company physically relocates Server2 from the Montreal office to the Seattle office. You discover that both Server1 and Server2 authenticate users who sign in to the client computers in the Montreal office. Only Server3 authenticates users who sign in to the computers in the Seattle office. You need to ensure that Server2 authenticates the users in the Seattle office during normal network operations. What should you do? A. From Windows PowerShell, run the Set-ADReplicationSite cmdlet. B. From Active Directory Users and Computers, modify the Location Property of Server2. C. From Network Connections on Server2, modify the Internet Protocol Version 4 (TCP/IPv4) configuration. D. From Windows PowerShell, run the Move-ADDirectoryServer cmdlet. Correct Answer: A
QUESTION 10 Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenario. Your network contains an Active Directory domain named contoso.com. The domain contains a single site named Site1. All computers are in Site1. The Group Policy objects (GPOs) for the domain are configured as shown in the exhibit. (Click the Exhibit button.)
The relevant users and client computer in the domain are configured as shown in the following table.
End of repeated scenario. You are evaluating what will occur when you set User Group Policy loopback processing mode to Replace in A7. Which GPO or GPOs will apply to User2 when the user signs in to Computer1 after loopback processing is configured? A. A1 and A7 only B. A3. Al, A5, A6, and A7 C. A3, A5, A1, and A7 only D. A7 only Correct Answer: D
QUESTION 11 Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named R0DC1. You need to retrieve a list of accounts that have their password cached on RODC1. Which command should you run? A. netdom.exe B. ntdsutil.exe C. repadmin.exe D. dcdiag.exe Correct Answer: C Explanation: https://technet.microsoft.com/en-us/library/rodc-guidance-for-administering- the-password-replication- policy(v=ws.10).aspx
QUESTION 12 Your network contains two Active Directory forests named fabrikam.com and contoso.com. Each forest contains a single domain Contoso.com has a Group Policy object (GPO) named Cont_GPO1. You need to apply the settings from Cont_GPO1 to the computers in fabrikam.com. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Back up Cont_GP01. In fabrikam.com, create and link a new GPO by using the Group Policy Management Console (GPMC), and then run the Import Settings Wizard. B. Back up Cont_GP01. In fabrikam.com, run the Restore-GPO cmdlet, and then run the New-GPLink cmdlet. C. Copy \\contoso.com\SysVol\contoso.com\Policies to \\fabrikam.com\SysVol\fabrikam.com\Policies. In fabrikam.com, run the New-GPLink cmdlet. D. Back up Cont_GP01. In fabrikam.com, create and link a new GPO by using the Group Policy Management Console (GPMC), and then run the Restore Group Policy Object Wizard. Correct Answer: AD
QUESTION 13 Your network contains an Active Directory domain named contoso.com. You discover that users can use passwords that contain only numbers. You need to ensure that all the user passwords in the domain contain at least three of the following types of characters: Numbers Uppercase letters Lowercase letters Special characters What should you do? A. the Default Domain Policy B. the local policy on each client computer C. the Default Domain Controllers Policy D. the local policy on each domain controller Correct Answer: B
QUESTION 14 Your network contains an Active Directory forest. The forest contains a domain named contoso.com. The domain contains three domain controllers. A domain controller named lon-dc1 fails. You are unable to repair lon-dc1. You need to prevent the other domain controllers from attempting to replicate to lon-dc1. Solution: From Active Directory Users and Computers, you remove the computer account of lon-dc1. Does this meet the goal? A. Yes B. No Correct Answer: B
QUESTION 15 You deploy a new certification authority (CA) to a server that runs Windows Server 2016. You need to configure the CA to support recovery of certificates. What should you do first? A. Modify the Recovery Agents settings from the properties of the CA. B. Assign the Request Certificates permission to the user account that will be responsible for recovering certificates. C. Configure the Key Recovery Agent template as a certificate template to issue. D. Modify the extensions of the OCSP Response Signing template. Correct Answer: A
QUESTION 16 Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016. On Server1, you create a local user named User1. User1 is a member of the local Administrators group. Server1 has the following local Group Policies: K Local Computer Policy Local Computer\User1Policy Local Computer\Administrators Policy You need to force User1 to change his password every 14 days. Solution: You configure the Password Policy settings in a Group Policy object (GPO) that is linked to the Domain Controllers organizational unit (OU). A. Yes B. No Correct Answer: B
QUESTION 17 Your network contains an Active Directory forest named contoso.com. The forest contains 10 domains. The root domain contains a global catalog server named DC1. You remove the global catalog server role from DC1. You need to decrease the size of the Active Directory database on DC1. Solution: You restart DC1 in Directory Services Repair Mode. You run compact.exe, and then restart DC1. Does this meet the goal? A. Yes B. No Correct Answer: B
QUESTION 18 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You network contains an Active Directory forest named contoso.com. The forest contains an Active Directory Rights Management Services (AD RMS) deployment. Your company establishes a partnership with another company named Fabrikam, Inc. The network of Fabrikam contains an Active Directory forest named fabrikam.com and an AD RMS deployment. You need to ensure that the users in contoso.com can access rights protected documents sent by the users in fabrikam.com. Solution: From AD RMS in contoso.com, you configure fabrikam.com as a trusted user domain. Does this meet the goal? A. Yes B. No Correct Answer: B Contoso would need to be the Trusted User Domain.
QUESTION 19 Your network contains a signle-domin Active Directory forest named contoso.com. The forest functional level is Windows Server 2016. The forest has Dynamic Access Control enabled. The domin contains two domain controllers named DC1 and DC2. Privileged user accounts used to manage Active Directory reside in a group named Contoso\AD_Admins. You create an authentication policy named Policy1 and an authentication policy silo named Silo1. You need to ensure that the accounts in the Contoso\AD-Admins group can sign in to the domain controllers only. Which three configurations should you perform? Each correction answer presents part of the solution. A. Create a managed service account and add the account to permitted Accounts in Silo1. B. Add the privileged user accounts and the domain controllers to Permitted Accounts in Silo1. C. Create an access control condition in Policy1. D. Add the domain controllers to the Contoso\AD_Admins group. E. Assign Silo1 to the privileged user accounts and the domain controllers. Correct Answer: CDE
QUESTION 20 Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016. Server1 has IP Address Management (IPAM) installed. IPAM is configured to use the Group Policy based provisioning method. The prefix for the IPAM Group Policy objects (GPOs) is IP. From Group Policy Management, you manually rename the IPAM GPOs to have a prefix of IPAM. You need to modify the GPO prefix used by IPAM. What should you do? A. Click Configure server discovery in Server Manager. B. Run the Set-IpamConfiguration cmdlet. C. Run the Invoke-IpamGpoProvisioning cmdlet. D. Click Provision the IPAM server in Server Manager. Correct Answer: B The Set-IpamConfiguration cmdlet modifies the configuration for the computer that runs the IPAM server. The -GpoPrefix parameter specifies the unique Group Policy object (GPO) prefix name that IPAM uses to create the group policy objects. Use this parameter only when the value of the ProvisioningMethod parameter is set to Automatic. References: https://technet.microsoft.com/en-us/library/jj590816.aspx
QUESTION 21 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. Your network contains an Active Directory forest named contoso.com. The forest contains a member server named Server1 that runs Windows Server 2016. All domain controllers run Windows Server 2012 R2. Contoso.com has the following configuration. PS C:\> (Get-ADForest).ForestMode Windows2008R2Forest PS C:\> (Get-ADDomain).DomainMode Windows2008R2Domain PS C:\> You plan to deploy an Active Directory Federation Services (AD FS) farm on Server1 and to configure device registration. You need to configure Active Directory to support the planned deployment. Solution: You raise the domain functional level to Windows Server 2012 R2. Does this meet the goal? A. Yes B. No Correct Answer: B Device Registration requires Windows Server 2012 R2 forest schema (not just domain schema).
QUESTION 22 Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenario. You work for a company named Contoso, Ltd. The network contains an Active Directory forest named contoso.com. A forest trust exists between contoso.com and an Active Directory forest named adatum.com. The contoso.com forest contains the objects configured as shown in the following table.Group1 and Group2 contain only user accounts. Contoso hires a new remote user named User3. User3 will work from home and will use a computer named Computer3 that runs Windows 10. Computer3 is currently in a workgroup. An administrator named Admin1 is a member of the Domain Admins group in the contoso.com domain. From Active Directory Users and Computers, you create an organizational unit (OU) named OU1 in the contoso.com domain, and then you create a contact named Contact1 in OU1. An administrator of the adatum.com domain runs the Set-ADUser cmdlet to configure a user named User1 to have a user logon name of [email protected]. End or repeated scenario. You need to ensure that Admin1 can add Group2 as a member of Group3. What should you modify? A. Modify the Security settings of Group3. B. Modify the group scope of Group3. C. Modify the group type of Group3. D. Set Admin1 as the manager of Group3. Correct Answer: B
QUESTION 23 Your network contains an Active Directory domain named contoso.com. You have a Group Policy object (GPO) named GPO1. GPO1 is linked to an organizational unit (OU) named OU1. GPO1 contains several corporate desktop restrictions that apply to all computers. You plan to deploy a printer to the computers in OU1. You need to ensure that any user who signs in to a computer that runs Windows 10 in OU1 receives the new printer. All of the computers in OU1 must continue to apply the corporate desktop restrictions from GPO1. What should you configure? A. a user preference and a WMI filter on GPO1. B. a computer preference that uses item-level targeting C. a computer preference and WMI filter on GPO1 D. a user preference that uses item-level targeting Correct Answer: D
QUESTION 24 A technician named Tech1 is assigned the task of joining the laptops to the domain. The computer accounts of each laptop must be in an organizational unit (OU) that is associated to the department of the user who will use that laptop. The laptop names must start with four characters indicating the department followed by a four-digit number Tech1 is a member of the Domain Users group only. Tech1 has the administrator logon credentials for all the laptops. You need Tech1 to join the laptops to the domain. The solution must ensure that the laptops are named correctly, and that the computer accounts of the laptops are in the correct OUs. Solution: You script the creation of files for an offline domain join, and then you give the files to Tech1. You instruct Tech1 to sign in to each laptop, and then to run djoin.exe. Does this meet the goal? A. Yes B. No Correct Answer: A
QUESTION 25 Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenario. Your network contains an Active Directory domain named contoso.com. The domain contains a single site named Site1. All computers are in Site1. The Group Policy objects (GPOs) for the domain are configured as shown in the exhibit. (Click the Exhibit button.)
The relevant users and client computer in the domain are configured as shown in the following table.
End of repeated scenario. You are evaluating what will occur when you disable the Group Policy link for A6. Which GPOs will apply to User2 when the user signs in to Computer1 after the link for A6 is disabled? A. A1 and A5 only B. A3, A1, and A5 only C. A3, A1, A5, and A4 only D. A3, A1, A5, and A7 Correct Answer: D
QUESTION 26 You network contains an active Directory domain. The domain contains 20 domain controllers. You discover that some Group Policy objects (PROs) are not being applied by all the domain controllers. You need to verify whether GPOs replicate successfully to all the domain controllers. What should you do? A. Set BurFlags in the registry, and then restart the File Replication Service (FRS). Run dcdiag.exe for each domain controller. B. Set BurFlags in the registry, and then restart the File Replication Service (FRS). View the Directory Service event log. C. From Group Policy Management, view the Status tab for the domain. D. Run repadmin.exe for each GPO. Correct Answer: D
QUESTION 27 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals. Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. All client computers run Windows 10. On Server1, you have the following zone configuration.You need to ensure that all of the client computers in the domain perform DNSSEC validation for the fabrikam.com namespace. Solution: From a Group Policy object (GPO) in the domain, you add a rule to the Name Resolution Policy Table (NRPT). Does this meet the goal? A. Yes B. No Correct Answer: A The NRPT stores configurations and settings that are used to deploy DNS Security Extensions (DNSSEC), and also stores information related to DirectAccess, a remote access technology. Note: The Name Resolution Policy Table (NRPT) is a new feature available in Windows Server 2008 R2. The NRPT is a table that contains rules you can configure to specify DNS settings or special behavior for names or namespaces. When performing DNS name resolution, the DNS Client service checks the NRPT before sending a DNS query. If a DNS query or response matches an entry in the NRPT, it is handled according to settings in the policy. Queries and responses that do not match an NRPT entry are processed normally. References: https://technet.microsoft.com/en-us/library/ee649207(v=ws.10).aspx
QUESTION 28 Your network contains an Active Directory domain named contoso.com. The domain contains an enterprise certification authority (CA) named CA1. You duplicate the Computer certificate template, and you name the template Cont_Computers. You need to ensure that all of the certificates issued based on Cont_Computers have a key size of 4,096 bits. What should you do? A. From the properties of CA1, modify the Security settings. B. From the properties of CA1, modify the Request Handling settings. C. From the properties of the Computer template, modify the Key Attestation settings. D. From the properties of Cont_Computers, modify the Cryptography settings. Correct Answer: C
QUESTION 29 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016. The Computer account for Server1 is in organizational unit (OU) named OU1. You create a Group Policy object (GPO) named GPO1 and link GPO1 to OU1. You need to add a domain user named user1 to the local Administrators group on Server1. Solution: From the Computer Configuration node of GPO1, you configure the local Users and Groups preference. Does this meet the goal? A. Yes B. No Correct Answer: A
QUESTION 30 Your network contains an Active Directory domain named contoso.com. The domain contains a user named User1 and an organizational unit (OU) named OU1. You create a Group Policy object (GPO) named GPO1. You need to ensure that User1 can link GPO1 to OU1. What should you do? A. Modify the security setting of User1. B. Add User1 to the Group Policy Creator Owner group. C. Modify the security setting of OU1. D. Modify the security setting of GPO1. Correct Answer: D
We offer more ways to make it easier for everyone to learn, and YouTube is the best tool in the video. Follow channels: https://www.youtube.com/@lead4pass116 get more useful exam content.
Latest Microsoft MCSA 70-742 YouTube videos:
Share 30 of the latest and effective 70-742 exam dumps and Practice test questions for free, 100% real and effective exam questions and answers! Get the full 70-742 dumps:https://www.leads4pass.com/70-742.html (Total questions:224 Q&A)
Networking with Windows Server 2016: 70-741 exam. Share the latest 70-741 dumps and Practice test questions for free. Real and effective exam questions and answers. 70-741 pdf online Download, 70-741 YouTube video online learning to improve skills! Examthings share 30 Practice test questions for FREE! Get the full 70-741 exam dumps: https://www.leads4pass.com/70-741.html (Total questions:240 Q&A)
Latest effective Microsoft MCSA 70-741 Exam Practice Tests
QUESTION 1 Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question. You have a DHCP server named Server1 that has three network cards. Each network card is configured to use a static IP address. You need to prevent all client computers that have physical address beginning with 98-5F from leasing an IP address from Server1. What should you do? A. From the properties of Scope1, modify the Conflict detection attempts setting. B. From the properties of Scope1, configure Name Protection. C. From the properties of IPv4, configure the bindings. D. From IPv4, create a new filter. E. From the properties of Scope1, create an exclusion range. F. From IPv4, run the DHCP Policy Configuration Wizard. G. From Control Panel, modify the properties of Ethernet. H. From Scope1, create a reservation. Correct Answer: E
QUESTION 2 You have a DHCP server named Server1 that runs Windows Server 2016. You plan to implement IPv6 on your network. You need to configure Server1 for stateless DHCPv6. What should you do from the DHCP console? A. Configure the Advanced Properties for Server1 B. Configure the IPv6 Server Options C. Create an IPv6 scope D. Configure the General IPv6 Properties Correct Answer: B
QUESTION 3 You have a server named Server1 that runs Windows Server 2016 and is configured as a domain controller. You install the DNS Server server role on Server1. You plan to store a DNS zone in a custom Active Directory partition. You need to create a new Active Directory partition for the zone. What should you use? A. Set-DnsServer B. Active Directory Sites and Services C. Dns.exe D. Dnscmd.exe Correct Answer: D https://technet.microsoft.com/en-us/library/ee649181(v=ws.10).aspx
QUESTION 4 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1 that runs Windows Server 2016 and has the DNS Server role installed. Automatic scavenging of state records is enabled and the scavenging period is set to 10 days. All client computers dynamically register their names in the contoso.com DNS zone on Server1. You discover that the names of multiple client computers that were removed from the network several weeks ago can still be resolved. You need to configure Server1 to automatically remove the records of the client computers that have been offline for more than 10 days. Solution: You run the dnscmd.exe command and specify the /AgeAllRecords parameter for the zone. Does this meet the goal? A. Yes B. No Correct Answer: B
QUESTION 5 You have a server that is configured as a hosted BranchCache server. You discover that a Service Connection Point (SCP) is missing for the BranchCache server. What should you run to register the SCP? A. setspn.exe B. Reset-BC C. ntdsutil.exe D. Enable-BCHostedServer Correct Answer: D https://technet.microsoft.com/en-us/library/jj862376(v=ws.11).aspx
QUESTION 6 You have Hyper-V host named Server1. Server1 has a network adapter that has virtual machine queue (VMQ) enabled. The network adapter connects at 10 Gbps and has an IPv4 address. Server1 hosts a virtual machine named VM1. VM1 has a single network adapter and four processors. You need to distribute the network processing load across the VM1 processors. What should you do? A. From Device Manager on Server1, configure TCP Checksum Offload (IPv4). B. From Device Manager on VM1, configure TCP Checksum Offload (IPv4). C. From Device Manager on VM1, configure Receive Side Scaling. D. From Windows PowerShell on Server1, run the Enable-NetAdapterRSS cmdlet. Correct Answer: C
QUESTION 7 Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Your network contains an Active Directory domain named contoso.com. The functional level of the domain is Windows Server 2012. The network uses an address space of 192.168.0.0/16 and contains multiple subnets. The network is not connected to the Internet. The domain contains three servers configured as shown in the following table.Client computers obtain TCP/IP settings from Server3. You add a second network adapter to Server2. You connect the new network adapter to the Internet. You install the Routing role service on Server2. Server1 has four DNS zones configured as shown in the following table. You need to create a zone to ensure that Server1 can resolve single-label names. What should you name the zone on Server1? A. . (root) B. WINS C. NetBIOS D. GlobalNames Correct Answer: D https://technet.microsoft.com/en-us/library/cc816610(v=ws.10).aspx
QUESTION 8 Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Your network contains an Active Directory domain named contoso.com. The functional level of the domain is Windows Server 2012. The network uses an address space of 192.168.0.0/16 and contains multiple subnets. The network is not connected to the Internet. The domain contains three servers configured as shown in the following table.Client computers obtain TCP/IP settings from Server3. You add a second network adapter to Server2. You connect the new network adapter to the Internet. You install the Routing role service on Server2. Server1 has four DNS zones configured as shown in the following table. You need to ensure that when a record is added dynamically to fabrikam.com, only the computer that created the record can modify the record. The solution must allow administrators to modify all of the records in fabrikam.com. What should you do? A. Change fabrikam.com to an Active Directory-integrated zone. B. Raise the functional level of the domain. C. Modify the security settings of the Fabrikam.com.dns file. D. Modify the Start of Authority (SOA) settings of fabrikam.com Correct Answer: A https://technet.microsoft.com/en-us/library/cc753751(v=ws.11).aspx
QUESTION 9 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a Hyper-V host named Server1 that hosts a virtual machine named VM1. Server1 and VM1 run Windows Server 2016. The settings for VM1 are configured as shown in the exhibit below.You need to ensure that you can use the Copy-VMFile cmdlet on Server1 to copy files from VM1. Solution: You need to enable the Data Exchange integration service for VM1. Does this meet the goal? A. YES B. NO Correct Answer: A
QUESTION 10 You have multiple servers that run Windows Server 2016 and are configured as VPN servers. You deploy a server named NPS1 that has Network Policy Server (NPS) installed. You need to configure NPS1 to accept authentication requests from the VPN servers. What should you configure on NPS1? A. From RADIUS Clients and Servers, add a remote RADIUS server group. B. From Policies, add a connection request policy. C. From Policies, add a network policy. D. From RADIUS Clients and Servers, add RADIUS clients. Correct Answer: D
QUESTION 11 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You network contains an Active Directory domain named contoso.com. The domain contains a DHCP server named Server1. All client computers run Windows 10 and are configured as DHCP clients. Your helpdesk received calls today from users who failed to access the network from their Windows 10 computer. You open the DHCP console as shown in the exhibit. (Click the Exhibit button.)You need to ensure that all of the Windows 10 computers can receive a DHCP lease. Solution: You activate the scope. Does this meet the goal? A. Yes B. No Correct Answer: A https://technet.microsoft.com/en-us/library/dd183581(v=ws.10).aspx
QUESTION 12 You have multiple servers that run Windows Server 2016 and are configured as VPN servers. You deploy a server named NPS1 that has Network Policy Server (NPS) installed. You need to configure NPS1 to accept authentication requests from the VPN servers. What should you configure on NPS1? A. From RADIUS Clients and Servers, add a remote RADIUS server group. B. From Policies, add a connection request policy. C. From Policies, add a network policy. D. From RADIUS Clients and Servers, add RADIUS clients. Correct Answer: D
QUESTION 13 You have a Scale-Out File Server that has a share named Share1. Share1 contains a virtual disk file named Disk1.vhd. You plan to create a guest failover cluster. You need to ensure that you can use the virtual disk as a shared virtual disk for the gust failover cluster. Which cmdlet should you use? A. Optimize VHD B. Optimize VHDSet C. Convert-VHD D. Set-VHD Correct Answer: A
QUESTION 14 You have an Active Directory domain that contains several Hyper-V hosts that run Windows Server 2016. You plan to deploy network virtualization and to centrally manage Datacenter Firewall policies. Which component must you install for the planned deployment? A. the Data Center Bridging feature B. the Network Controller server role C. the Routing role service D. the Canary Network Diagnostics feature Correct Answer: B
QUESTION 15 Your network contains three subnets, a production subnet that contains production servers, a development network that contains development servers, and a client network that contains client computers. The development network is used to test applications and reproduces servers that are located on the production network. The development network and the production network use the same IP address range. A developer has a client computer on the client network. The developer reports that when he attempts to connect to the IP address 10.10.1.6 from his computer, he connects to a server on the production network. You need to ensure that when the developer connects to 10.10.1.6, he connects to a sever on the development network Which cmdlet should you use? A. New-NetNeighbor B. New-NetRoute C. Set-NetTcpSetting D. Set-NetNeighbir Correct Answer: B
QUESTION 16 You have an Active Directory forest that contains 30 servers and 6,000 Client computers. You deploy a new DHCP server that runs Windows Server 2016. You need to retrieve the list of the authorized DHCP servers. Which command should you run? A. Get-DHCPServerDatabase B. Netstat -p IP -s -a C. Get-DHCPServerInDc D. Show-ADAuthenticationPolicyExpression -AllowedToAuthenticateTo Correct Answer: C To get all authorized DHCP servers in Active Directory, you can use the following PowerShell cmdlet: Get- DhcpServerinDC
QUESTION 17 You have a Hyper-V host named Server1 that runs Windows Server 2016. Server1 has multiple network adapters that have virtual machine queue (VMQ) enabled. On Server1, you create a virtual machine named VM1 as shown in the exhibit.You need to ensure that you can use virtual Receive-side Scaling (vRSS) on VM1. What should you do? A. Add additional memory. B. Add additional processors. C. Add additional network adapters. D. Enable the Data Exchange integration service. Correct Answer: B References: https://docs.microsoft.com/en-us/windows-server/networking/technologies/vrss/vrss-top
QUESTION 18 You have two DNS servers named Server1 and Server2. All client computers run Windows 10 and are configured to use Server1 for DNS name resolution. Server2 hosts a primary zone named contoso.com. Your network recently experienced several DNS spoofing attacks on the contoso.com zone. You need to prevent further attacks from succeeding. What should you do on Server?? A. Configure the contoso.com zone to be Active Directory-integrated. B. Sign the contoso.com zone. C. Configure DNS-based Authentication of Named Entities (DANE) for the contoso.com zone. D. Configure Response Rate Limiting (RRL). Correct Answer: B
QUESTION 19 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solutions, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a server named Server1 that runs Windows Server 2016. Server1 is configured as a VPN server. Server1 is configured to allow domain users to establish VPN connections from 06:00 to 18:00 everyday of the week. You need to ensure that domain users can establish VPN connections only between Monday and Friday. Solution: From Active Directory Users and Computers, you modify the Dial-in Properties of the user accounts. Does this meet the goal? A. Yes B. No Correct Answer: A
QUESTION 20 You have an IP Address Management (IPAM) server named IPAM1 that runs Windows Server 2016. IPAM1 manages 10 DHCP servers. You need to provide a user with the ability to track which clients receive which IP addresses from DHCP. The solution must minimize administrative privileges. A. IPAM MSM Administrators B. IPAM ASM Administrators C. IPAM IP Audit Administrators D. IPAM User Correct Answer: C References: https://technet.microsoft.com/en-us/library/jj878348(v=ws.11).aspx
QUESTION 21 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solutions, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. Your network contains an Active Directory forest named contoso.com. The forest has three sites located in London, Paris and Berlin. The London site contains a web server named Web1 that runs Windows Server 2016. You need to configure Web1 as an HTTP content server for the hosted cache servers located in the Paris and Berlin sites. Solution: You install the Deployment Server role service, and then you restart the World Wide Web Publishing Service. Does this meet the goal? A. Yes B. No Correct Answer: A
QUESTION 22 You have servers named Server1 and DHCP1. Both servers run Windows Server 2016. DHCP1 contains an IPv4 scope named Scope1. You have 1,000 client computers. You need to configure Server1 to lease IP addresses for Scope1. The solution must ensure that Server1 is used to respond to up to 30 percent of the DHCP client requests only. You install the DHCP Server server role on Server1. What should you do next? A. From the DHCP console, run the Configure Failover wizard. B. From Server Manager, install the Network Load Balancing feature. C. From Server Manager, install the Failover Clustering feature. D. From the DHCP console, create a superscope. Correct Answer: A
QUESTION 23 You have an IP Address Management (IPAM) deployment that is used to manage all of the DNS servers on your network. IPAM is configured to use Group Policy provisioning. You discover that a user adds a new mail exchanger (MX) record to one of the DNS zones. You want to identify which user added the record. You open Event Catalog on an IPAM server, and you discover that the most recent event occurred yesterday. You need to ensure that the operational events in the event catalog are never older than one hour. What should you do? A. From the properties on the DNS zone, modify the refresh interval. B. From an IPAM_DNS Group Policy object (GPO), modify the Group Policy refresh interval. C. From Task Scheduler, modify the Microsoft\Windows\IPAM\Audit task. D. From Task Scheduler, create a scheduled task that runs the Update-IpamServer cmdlet. Correct Answer: A
QUESTION 24 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. Your network contains an Active Directory domain named contoso.com. The domain contains a DHCP server named Server2 than runs Windows Server 2016. Users report that their client computers fail to obtain an IP address. You open the DHCP console as shown in the Exhibit. (Click the Exhibit button.)Scope1 has an address range of 172.16.0.10 to 172.16.0.100 and a prefix length of 23 bits. You need to ensure that all of the client computers on the network can obtain an IP address from Server2. Solution: You run the Set-DhcpServerv4MulticastScope cmdlet. Does this meet the goal? A. Yes B. No Correct Answer: B
QUESTION 25 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals. Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. All client computers run Windows 10. On Server1, you have the following zone configuration.You need to prevent Server1 from resolving queries from DNS clients located on Subnet4. Server1 must resolve queries from all other DNS clients. Solution: From Windows Firewall with Advanced Security on Server1, you create an inbound rule. Does this meet the goal? A. Yes B. No Correct Answer: B
QUESTION 26 You have a remote access server named Server1 that runs Windows Server 2016. Server1 has DirectAccess enabled. You have a proxy server named Server2. All computers on the internal network connect to the Internet by using the proxy. On Server1, you run the command Set-DAClient -forceTunnel Enabled. You need to ensure that when a DirectAccess client connects to the network, the client accesses all the Internet resources through the proxy. What should you run on Server1? A. Set-DnsClientNrptRule B. Set.DANetworkLocationServer C. Set-DAClient D. Set-DAServer Correct Answer: C
QUESTION 27 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You network contains an Active Directory domain named contoso.com. The domain contains a DHCP server named Server2 than runs Windows Server 2016. Users report that their client computers fail to obtain an IP address. You open the DHCP console as shown in the Exhibit. (Click the Exhibit button.)Scope1 has an address range of 172.16.0.10 to 172.16.0.100 and a prefix length of 23 bits. You need to ensure that all of the client computers on the network can obtain an IP address from Server2. Solution: You run the Set-DhcpServerv4Scope cmdlet. Does this meet the goal? A. Yes B. No Correct Answer: A https://technet.microsoft.com/itpro/powershell/windows/dhcp-server/set-dhcpserverv4scope
QUESTION 28 You have a Microsoft Azure subscription and an on-premises network. To the on-premises network, you deploy a new server named Server1 that runs Windows Server 2016. In Azure, you configure a virtual gateway on an Azure virtual network. You need to ensure that the computers on the on-premises network can access virtual machines on the Azure virtual network. What should you do on Server1? A. Install the Remote Access server role. From the Routing and Remote Access Server Setup Wizard, select Secure connection between two private networks. B. Install the Data Center Bridging (DCB) feature, and then run the Install-RemoteAccess cmdlet. C. Install the Remote Access server role. From the Routing and Remote Access Server Setup Wizard, select Virtual private network (VPN) access and NAT. D. Install the Data Center Bridging (DCB) feature, and then run the Enable-RemoteAccessRoutingDomain cmdlet. Correct Answer: A
QUESTION 29 You company has a main office in London. The company has 1,000 users who are located in many countries. You plan to deploy a large remote access solution for the company. The London office has three servers named Server1, Server2, and Server3 that run Windows Server 2016. You plan to use Server1 as a VPN server, Server2 as a RADIUS proxy, and Server3 as a RADIUS server. You need to configure Server2 to support the planned deployment. Which three actions should you perform on Server2? Each correct answer presents part of the solution. A. Create a connection request policy. B. Deploy a Windows container. C. Add a RADIUS client. D. Create a network policy. E. Create a remote RADIUS server group. Correct Answer: ACE
QUESTION 30 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals. Refer to exhibit:
Server1 has two virtual machines named VM1 and VM that run Windows Server 2016. VM1 connects to Private VM2 has two network adapters. You need to ensure that VM1 connects to the corporate network by using NAT. Solution: You connect VM1 to Internal1. You run the New-NetNatIpAddress and the New-NetNat cmdlets on Server1. You configure VM1 to use VM2 as the default gateway. Does this meet the goal? A. Yes B. No Correct Answer: A
We offer more ways to make it easier for everyone to learn, and YouTube is the best tool in the video. Follow channels: https://www.youtube.com/@lead4pass116 get more useful exam content.
Latest Microsoft MCSA 70-741 YouTube videos:
Share 30 of the latest and effective 70-741 exam dumps and Practice test questions for free, 100% real and effective exam questions and answers! Get the full 70-741 dumps:https://www.leads4pass.com/70-741.html (Total questions:240 Q&A)
With the help of latest and authentic Microsoft MCSM 070-410 dumps exam questions, you can find the best 070-410 exam preparation kit here and you will also get the 100% guarantee for passing the Microsoft exam. “Installing and Configuring Windows Server 2012” is the name of Microsoft MCSM https://www.leads4pass.com/70-410.html exam dumps which covers all the knowledge points of the real Microsoft exam. I am 100% you will clear this 070-410 by downloading exam dumps. If you are looking to get Microsoft Installing and Configuring Windows Server 2012 certification by passing exam 070-410 then you can pass it in one go.
Update free 070-487 dumps pdf training materials and youtube at leads4pass, latest Microsoft 070-487 dumps questions and answers. Download the best useful Microsoft MCSM 070-410 dumps vce software free try.
Microsoft MCSM 070-410 Dumps Exam Questions And Answers (Q1-Q10)
QUESTION 1
Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an organizational unit (OU) named AllComputers. Client computers run either windows 7 or Windows 8.
You create a Group Policy object (GPO) named GP1.
You link GP1 to the AllComputers OU.
You need to ensure that GP1 applies only to computers that have more than 8 GB of memory.
What should you configure?
A. The Security settings of GP1
B. The Block Inheritance option for AllComputers
C. The Security settings of AllComputers
D. The WMI filter for GP1
Correct Answer: D
Explanation:
Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group Policy objects (GPOs) based on attributes of the target computer. When a GPO that is linked to a WMI filter is applied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates to false, the GPO is not applied (except if the client computer is running Windows Server, in which case the filter is ignored and the GPO is always applied).If the WMI filter evaluates to true, the GPO is applied.
QUESTION 2
Your network contains multiple subnets.
On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2. You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com.
You need to ensure that client computers can resolve single-label names to IP addresses.
What should you do first?
A. Create a reverse lookup zone.
B. Convert the contoso.com zone to an Active Directory-integrated zone.
C. Create a GlobalNames zone.
D. Configure dynamic updates for contoso.com.
Correct Answer: C
Explanation:
You should use GlobalNames zone to take advantage of single-label names. This will also ensure that the zone remains valid.
QUESTION 3
Your network contains an Active Directory domain named contoso.com. The DNS zone for contoso.com is Active-Directory integrated.
The domain contains 500 client computers. There are an additional 20 computers in a workgroup.
You discover that every client computer on the network can add its record to the contoso.com zone.
You need to ensure that only the client computers in the Active Directory domain can register records in the contoso.com zone. 070-410 dumps
What should you do?
A. Sign the contoso.com zone by using DNSSEC.
B. Configure the Dynamic updates settings of the contoso.com zone.
C. Configure the Security settings of the contoso.com zone.
D. Move the contoso.com zone to a domain controller that is configured as a DNS server.
Correct Answer: B
QUESTION 4
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that has the DNS Server server role installed. Server1 hosts a primary zone for contoso.com.
The domain contains a member server named Server2 that is configured to use Server1 as its primary DNS server.
From Server2, you run nslookup.exe as shown in the exhibit.(Click the Exhibit button.)
You need to ensure that when you run Nslookup, the correct name of the default server is displayed.
What should you do?
A. On Server1, create a reverse lookup zone.
B. On Server1, modify the Security settings of the contoso.com zone.
C. From Advanced TCP/IP Settings on Server1, add contoso.com to the DNS suffix list.
D. From Advanced TCP/IP Settings on Server2, add contoso.com to the DNS suffix list.
Correct Answer: A
Explanation:
Make sure that a reverse lookup zone that is authoritative for the PTR resource record exists. PTR records contain the information that is required for the server to perform reverse name lookups.
QUESTION 5
Your network contains an Active Directory domain named contoso.com. The domain contains a DHCP server named Server1 that runs Windows Server 2012 R2.
You create a DHCP scope named Scope1. The scope has a start address of 192.168.1.10, an end address of 192.168.1.50, and a subnet mask of 255.255.255.192.
You need to ensure that Scope1 has a subnet mask of 255.255.255.0.
What should you do first?
A. From the DHCP console, reconcile Scope1.
B. From the DHCP console, delete Scope1.
C. From the DHCP console, modify the Scope Options of Scope1.
D. From Windows PowerShell, run the Set-DhcpServerv4Scope cmdlet.
Correct Answer: B
Explanation:
The only way to change the subnet mask of a scope is to delete and recreate the scope.
Set-DhcpServerv4Scope does not include a parameter for the subnet mask.
QUESTION 6
Your company has a main office and two branch offices. The offices connect to each other by using a WAN link.
In the main office, you have a server named Server1 that runs Windows Server 2012 R2.
Server1 is configured to use an IPv4 address only.
You need to assign an IPv6 address to Server1. The IP address must be private and routable.
Which IPv6 address should you assign to Server1?
A. 2001:ab32:145c::32cc:401b
B. ff00:3rff:65df:145c:dca8::82a4
C. fd00:ab32:14:ad88:ac:58:abc2:4
D. fe80:ab32:145c::32cc:401b
Correct Answer: C
Explanation:
Unique local addresses
Unique local addresses are IPv6 addresses that are private to an organization in the same way that private addresses–such as 10.x.x.x, 192.168.x.x, or 172.16.0.0 – 172.31.255.255–can be used on an IPv4 network.
Unique local addresses, therefore, are not routable on the IPv6 Internet in the same way that an address like 10.20.100.55 is not routable on the IPv4 Internet.
A unique local address is always structured as follows:
The first 8 bits are always 11111101 in binary format. This means that a unique local address always begins with FD and has a prefix identifier of FD00::/8.
QUESTION 7
Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2.All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts.
Servers are restarted only occasionally.
You need to identify which servers were restarted during the last two days.
What should you do?
A. Run Get-ADComputer and specify the SearchScope parameter.
B. Run dsquery computer and specify the -stalepwd parameter.
C. Run dsquery server and specify the -o parameter.
D. Run Get-ADComputer and specify the lastLogon property.
Correct Answer: D
QUESTION 8
Your network contains an Active Directory forest named contoso.com.
The forest contains two domains named contoso.com and child.contoso.com and two sites named Site1 and Site2. The domains and the sites are configured as shown in following table.
When the link between Site1 and Site2 fails, users fail to log on to Site2.
You need to identify what prevents the users in Site2 from logging on to the child.contoso.com domain.
What should you identify?
A. The placement of the global catalog server
B. The placement of the infrastructure master
C. The placement of the domain naming master
D. The placement of the PDC emulator
Correct Answer: D
Explanation:
The exhibit shows that Site2 does not have a PDC emulator. This is important because of the close interaction between the RID operations master role and the PDC emulator role
The PDC emulator processes password changes from earlier-version clients and other domain controllers on a best-effort basis; handles password authentication requests involving passwords that have recently changed and not yet been replicated throughout the domain; and, by default, synchronizes time. If this domain controller cannot connect to the PDC emulator, this domain controller cannot process authentication requests, it may not be able to synchronize time, and password updates cannot be replicated to it.
QUESTION 9
You have a server named Server1 that runs Windows Server 2012 R2.
You plan to use Windows PowerShell Desired State Configuration (DSC) to confirm that the Application Identity service is running on all file servers. 070-410 dumps
You define the following configuration in the Windows PowerShell Integrated Scripting Environment (ISE):
You need to use DSC to configure Server1 as defined in the configuration.
What should you run first?
A. Service1
B. Configuration1
C. Start DscConfiguration
D. Test-DscConfigu ration
Correct Answer: B
QUESTION 10
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.
The disks on Server1 are configured as shown in the exhibit.(Click the Exhibit button.)
You create a virtual machine on Server1.
You need to ensure that you can configure a pass-through disk for the virtual machine.
What should you do?
A. Convert Disk 1 to a GPT disk.
B. Delete partition E.
C. Convert Disk 1 to a dynamic disk.
D. Take Disk 1 offline.
Correct Answer: D
leads4pass is the best site for providing online preparation material for 070-410 exam. Microsoft MCSM 070-410 dumps exam preparation kit https://www.leads4pass.com/70-410.html contains all the necessary 070-410 questions that you need to know. 100% passing guarantee and full refund in case of failure.
Get your Microsoft Specialist 70-483 dumps exam preparation questions in form of 70-483 PDF. Microsoft Specialist 70-483 dumps exam preparation kit contains all the necessary 70-483 questions that you need to know. “Programming in C#” is the name of Microsoft Specialist https://www.leads4pass.com/70-483.html exam dumps which covers all the knowledge points of the real Microsoft exam. The best and most updated latest Microsoft Specialist 70-483 dumps pdf training resources and study guides download free try from leads4pass, pass Microsoft exam 70-483 test easily.
Latest Microsoft 070-341 dumps PDF questions and answers, the best Microsoft 070-341 dumps exam study guide and youtube free try. High quality Microsoft Specialist 70-483 dumps vce youtube and software update online download free try.
Hot Microsoft Specialist 70-483 Dumps Exam Practice Questions And Answers (Q1-Q20)
QUESTION 1
You use the Task.Run() method to launch a long-running data processing operation. The data processing operation often fails in times of heavy network congestion.
If the data processing operation fails, a second operation must clean up any results of the first operation. You need to ensure that the second operation is invoked only if the data processing operation throws an unhandled exception.
What should you do?
A. Create a TaskCompletionSource<T> object and call the TrySetException() method of the object.
B. Create a task by calling the Task.ContinueWith() method.
C. Examine the Task.Status property immediately after the call to the Task.Run() method.
D. Create a task inside the existing Task.Run() method by using the AttachedToParent option.
Correct Answer: B
QUESTION 2
You are modifying an application that processes leases. The following code defines the Lease class. (Line numbers are included for reference only.)
Leases are restricted to a maximum term of 5 years. The application must send a notification message if a lease request exceeds 5 years.
You need to implement the notification mechanism.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
F. Option F
Correct Answer: AB
QUESTION 3
You are developing an application that uses structured exception handling. The application includes a class named ExceptionLogger.
The ExceptionLogger class implements a method named LogException by using the following code segment:
public static void LogException(Exception ex)
You have the following requirements:
* Log all exceptions by using the LogException() method of the ExceptionLogger class.
* Rethrow the original exception, including the entire exception stack.
You need to meet the requirements.
Which code segment should you use?
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: A
QUESTION 4
You are developing an application that includes a class named UserTracker. The application includes the following code segment. 70-483 dumps (Line numbers are included for reference only.)
You need to add a user to the UserTracker instance.
What should you do?
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: D
QUESTION 5
You are adding a public method named UpdateScore to a public class named ScoreCard.
The code region that updates the score field must meet the following requirements:
* It must be accessed by only one thread at a time.
* It must not be vulnerable to a deadlock situation.
You need to implement the UpdateScore() method.
What should you do?
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: B
QUESTION 6
You are developing a C# application that has a requirement to validate some string input data by using the Regex class.
The application includes a method named ContainsHyperlink. The ContainsHyperlink() method will verify the presence of a URI and surrounding markup.
The following code segment defines the ContainsHyperlink() method. (Line numbers are included for reference only.)
The expression patterns used for each validation function are constant.
You need to ensure that the expression syntax is evaluated only once when the Regex object is initially instantiated.
Which code segment should you insert at line 04?
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: D
QUESTION 7
You are developing an application by using C#.
You have the following requirements:
* Support 32-bit and 64-bit system configurations.
* Include pre-processor directives that are specific to the system configuration.
* Deploy an application version that includes both system configurations to testers.
* Ensure that stack traces include accurate line numbers.
You need to configure the project to avoid changing individual configuration settings every time you deploy the application to testers.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Update the platform target and conditional compilation symbols for each application configuration.
B. Create two application configurations based on the default Release configuration.
C. Optimize the application through address rebasing in the 64-bit configuration.
D. Create two application configurations based on the default Debug configuration.
Correct Answer: BD
QUESTION 8
You are developing a method named CreateCounters that will create performance counters for an application.
The method includes the following code. (Line numbers are included for reference only.)
You need to ensure that Counter1 is available for use in Windows Performance Monitor (PerfMon).
Which code segment should you insert at line 16?
A. CounterType = PerformanccCounterType.RawBase
B. CounterType = PerformanceCounterType.AverageBase
C. CounterType = PerformanceCounterType.SampleBase
D. CounterType = PerformanceCounterType.CounterMultiBase
Correct Answer: C
QUESTION 9
You are developing an application that will transmit large amounts of data between a client computer and a server.
You need to ensure the validity of the data by using a cryptographic hashing algorithm.
Which algorithm should you use?
A. HMACSHA256
B. RNGCryptoServiceProvider
C. DES
D. Aes
Correct Answer: A
QUESTION 10
You are developing an assembly that will be used by multiple applications.
You need to install the assembly in the Global Assembly Cache (GAC).
Which two actions can you perform to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Use the Assembly Registration tool (regasm.exe) to register the assembly and to copy the assembly to the GAC.
B. Use the Strong Name tool (sn.exe) to copy the assembly into the GAC.
C. Use Microsoft Register Server (regsvr32.exe) to add the assembly to the GAC.
D. Use the Global Assembly Cache tool (gacutil.exe) to add the assembly to the GAC.
E. Use Windows Installer 2.0 to add the assembly to the GAC.
Correct Answer: DE
QUESTION 11
You are debugging an application that calculates loan interest. The application includes the following code. (Line numbers are included for reference only.)
You need to ensure that the debugger breaks execution within the CalculateInterest() method when the loanAmount variable is less than or equal to zero in all builds of the application.
What should you do?
A. Insert the following code segment at line 03:
Trace.Assert(loanAmount > 0);
B. Insert the following code segment at line 03:
Debug.Assert(loanAmount > 0);
C. Insert the following code segment at line 05:
Debug.Write(loanAmount > 0);
D. Insert the following code segment at line 05:
Trace.Write(loanAmount > 0);
Correct Answer: A
QUESTION 12
You are developing an application that accepts the input of dates from the user.
Users enter the date in their local format. The date entered by the user is stored in a string variable named inputDate. The valid date value must be placed in a DateTime variable named validatedDate.
You need to validate the entered date and convert it to Coordinated Universal Time (UTC). The code must not cause an exception to be thrown. 70-483 dumps
Which code segment should you use?
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: A
QUESTION 13
You are developing an application by using C#. You provide a public key to the development team during development.
You need to specify that the assembly is not fully signed when it is built.
Which two assembly attributes should you include in the source code? (Each correct answer presents part of the solution. Choose two.)
A. AssemblyKeyNameAttribute
B. ObfuscateAssemblyAttribute
C. AssemblyDelaySignAttribute
D. AssemblyKeyFileAttribute
Correct Answer: CD
QUESTION 14
You are adding a public method named UpdateGrade to a public class named ReportCard.
The code region that updates the grade field must meet the following requirements:
* It must be accessed by only one thread at a time.
* It must not be vulnerable to a deadlock situation.
You need to implement the UpdateGrade() method.
What should you do?
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: A
QUESTION 15
You are developing an application that includes a class named BookTracker for tracking library books. The application includes the following code segment. (Line numbers are included for reference only.)
You need to add a user to the BookTracker instance. What should you do?
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: B
QUESTION 16
You are creating a console application by using C#.
You need to access the assembly found in the file named car.dll.
Which code segment should you use?
A. Assembly.Load();
B. Assembly.GetExecutingAssembly();
C. This.GetType();
D. Assembly.LoadFile(“car.dll”);
Correct Answer: D
QUESTION 17
You are developing an application by using C#.
The application includes an object that performs a long running process.
You need to ensure that the garbage collector does not release the object’s resources until the process completes.
Which garbage collector method should you use?
A. WaitForFullGCComplete()
B. WaitForFullGCApproach()
C. KeepAlive()
D. WaitForPendingFinalizers()
Correct Answer: C
QUESTION 18
An application includes a class named Person. The Person class includes a method named GetData.
You need to ensure that the GetData() method can be used only by the Person class and not by any class derived from the Person class.
Which access modifier should you use for the GetData() method?
A. Public
B. Protected internal
C. Internal
D. Private
E. Protected
Correct Answer: D
QUESTION 19
You are creating an application that manages information about your company’s products. The application includes a class named Product and a method named Save.
The Save() method must be strongly typed. It must allow only types inherited from the Product class that use a constructor that accepts no parameters.
You need to implement the Save() method. Which code segment should you use?
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: D
QUESTION 20
You are developing an application. The application includes classes named Mammal and Animal and an interface named IAnimal.
The Mammal class must meet the following requirements:
* It must either inherit from the Animal class or implement the IAnimal interface.
* It must be inheritable by other classes in the application.
You need to ensure that the Mammal class meets the requirements.
Which two code segments can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: AC
Best Microsoft Specialist 70-483 dumps exam practice files in PDF format free download from leads4pass. Latest Microsoft Specialist https://www.leads4pass.com/70-483.html dumps pdf training resources which are the best for clearing 70-483 exam test, and to get certified by Microsoft Microsoft Specialist, download one of the many PDF readers that are available for free.
High quality Microsoft Specialist 70-483 dumps vce youtube:
https://youtu.be/-Nk-Xn-Cxso
What Our Customers Are Saying:
leads4pass is the best provider of IT learning materials and the right choice for you to prepare for Microsoft 70-483 exam. leads4pass provide the latest real questions and answers with lowest prices, help you pass Microsoft 70-483 exam easily at first try.
Microsoft MCSA 70-410 dumps exam preparation kit contains all the necessary 70-410 questions that you need to know. New Microsoft MCSA 70-410 dumps vce youtube demo update free shared. “Installing and Configuring Windows Server 2012” is the name of Microsoft MCSA https://www.leads4pass.com/70-410.html exam dumps which covers all the knowledge points of the real Microsoft exam. At leads4pass you can find all the necessary things for yourself that will help you to pass Microsoft 70-410 exam. You can download Microsoft MCSA 70-410 dumps pdf training material from leads4pass and pass the Microsoft exam 70-410 Installing and Configuring Windows Server 2012 in the first attempt.
Latest Microsoft 070-341 dumps PDF Questions And Answers, The Best 070-341 Exam Study Guide And Youtube Free Try.
High quality Microsoft MCSA 70-410 dumps vce demo update shared to have a free try.
Useful Microsoft MCSA 70-410 Dumps Exam Questions And Answers (Q1-Q10)
QUESTION 1
You work as a senior administrator at CertBus.com. The CertBus.com network consists of a single domain named CertBus.com. All servers on the CertBus.com network have Windows Server 2012 installed, and all workstations have Windows 8 installed.
You are running a training exercise for junior administrators. You are currently discussing the Always Offline Mode.
Which of the following is TRUE with regards to the Always Offline Mode? (Choose all that apply.)
A. It allows for swifter access to cached files and redirected folders.
B. To enable Always Offline Mode, you have to satisfy the forest and domain functional-level requirements, as well as schema requirements.
C. It allows for lower bandwidth usage due to users are always working offline.
D. To enable Always Offline Mode, you must have workstations running Windows 7 or Windows Server 2008 R2.
Correct Answer: AC
Explanation:
Offline Files have four modes of operation:
Online
Slow link
Auto offline
Manual offline
Offline Files transition between the three modes online, slow link and auto offline depending on connection speed. The user can always override the automatic mode selection by manually switching to manual offline mode.
To determine the connection speed two pings with default packet size are sent to the file server. If the average round-trip time is below 80 ms (Windows 7) or 35 ms (Windows 8), the connection is put into online mode, otherwise into slow link mode. The latency value of 35/80 ms is configurable through the Group Policy setting Configure slow-link mode.
Reads, Writes and Synchronization
In online mode, changes to files are made on the file server as well as in the local cache (this induces a performance hit – see this article for details). Reads are satisfied from the local cache (if in sync).
In slow link mode, changes to files are made in the local cache. The local cache is background- synchronized with the file server every 6 hours (Windows 7) or 2 hours (Windows 8), by default. This can be changed through the Group Policy setting Configure Background Sync. . In auto offline mode, all reads and writes go to the local cache. No synchronization occurs. . In manual offline mode, all reads and writes go to the local cache. No synchronization occurs by default, but background synchronization can be enabled through the Group Policy setting Configure Background Sync.
QUESTION 2
Your network contains an Active Directory domain named adatum.com. The computer accounts for all member servers are located in an organizational unit (OU) named Servers. You link a Group Policy object (GPO) to the Servers OU.
You need to ensure that the domain’s Backup Operators group is a member of the local Backup Operators group on each member server. The solution must not remove any groups from the local Backup Operators groups.
What should you do?
A. Add a restricted group named adatum\Backup Operators. Add Backup Operators to the This group is a member of list.
B. Add a restricted group named adatum\Backup Operators. Add Backup Operators to the Members of this group list.
C. Add a restricted group named Backup Operators. Add adatum\Backup Operators to the This group is a member of list.
D. Add a restricted group named Backup Operators. Add adatum\Backup Operators to the Members of this group list.
Correct Answer: A
Explanation:
A. The Member Of list specifies which other groups the restricted group should belong to B. Needs to be added to member of list
C. Wrong group
D. Wrong group
Restricted groups allow an administrator to define two properties for security-sensitive groups (that is,”restricted” groups).
The two properties are Members and Member Of . The Members list defines who should and should not belongto the restricted group. The Member Of list specifies which other groups the restricted group should belong to.
When a restricted Group Policy is enforced, any current member of a restricted group that is not on theMembers list is removed. Any user on the Members list which is not currently a member of the restrictedgroup is added.
The Restricted Groups folder is available only in Group Policy objects associated with domains, OUs,and sites. The Restricted Groups folder does not appear in the Local Computer Policy object. If a Restricted Group is defined such that it has no members (that is, the Members list is empty), then allmembers of the group are removed when the policy is enforced on the system. If the Member Of list is emptyno changes are made to any groups that the restricted group belongs to. In short, an empty Members listmeans the restricted group should have no members while an empty Member Of list means “don’t care” whatgroups the restricted group belongs to.
QUESTION 3
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. An application named Appl.exe is installed on all client computers. Multiple versions of Appl.exe are installed on different client computers. Appl.exe is digitally signed. You need to ensure that only the latestversion of Appl.exe can run on the client computers.
What should you create?
A. An application control policy packaged app rule
B. A software restriction policy certificate rule
C. An application control policy Windows Installer rule
D. An application control policy executable rule
Correct Answer: D
Explanation:
A. A publisher rule for a Packaged app is based on publisher, name and version
B. You can create a certificate rule that identifies software and then allows or does not allow the software torun, depending on the security level.
C. For .msi or .msp
D. Executable Rules, for .exe and can be based on Publisher, Product name, filename and version. Use Certificate Rules on Windows Executables for Software Restriction Policies This security setting determines if digital certificates are processed when a user or process attempts to runsoftware with an .exe file name extension. This security settings is used to enable or disable certificate rules, atype of software restriction policies rule. With software restriction policies, you can create a certificate rule thatwill allow or disallow software that is signed by Authenticode to run, based on the digital certificate that isassociated with the software. 70-410 dumps
In order for certificate rules to take effect, you must enable this security setting. When certificate rules are enabled, software restriction policies will check a certificate revocation list (CRL) tomake sure the software’s certificate and signature are valid. This may decrease performance when start signedprograms. You can disable this feature. On Trusted Publishers Properties, clear the Publisher and Timestampcheck boxes.
QUESTION 4
You have a server named Server1 that runs Windows Server 2012 R2. You add a 4-TB disk named Disk 5 to Server1. You need to ensure that you can create a 3-TB volume on Disk 5. What should you do?
A. Create a storage pool.
B. Convert the disk to a dynamic disk.
C. Create a VHD, and then attach the VHD.
D. Convert the disk to a GPT disk.
Correct Answer: D
Explanation:
MBR max is 2TB, the disk must be GPT
For any hard drive over 2TB, we need to use GPT partition. If you have a disk larger than 2TB size, the rest ofthe disk space will not be used unless you convert it to GPT. An existing MBR partition can’t be converted to GPT unless it is completely empty; you must either deleteeverything and convert or create the partition as GPT. It is not possible to boot to a GPT partition, impossible to convert MBR to GPT without data loss.
QUESTION 5
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. You need to install the Remote Desktop Services server role on Server2 remotely from Server1. Which tool should you use?
A. The dsadd.exe command
B. The Server Manager console
C. The Remote Desktop Gateway Manager console
D. The Install-RemoteAccess cmdlet
Correct Answer: B
Explanation:
A. Adds specific types of objects to the directory
B. You can manage remote server by Server Manager and install roles/features C. Remote Desktop Gateway (RD Gateway) is a role service that enables authorized remote users to connectto resources on an internal corporate or private network, from any Internet-connected device that can run theRemote Desktop Connection (RDC) client. D. Performs prerequisite checks for DirectAccess (DA) to ensure that it can be installed, installs DA for remoteaccess (RA) (includes management of remote clients) or for management of remote clients only, and installsVPN (both Remote Access VPN and siteto-site VPN).
QUESTION 6
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.
You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS). You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE.
Which virtual machine setting should you configure for VM2?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Correct Answer: G
Explanation:
G. Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from the network is first
QUESTION 7
Your network contains an Active Directory domain named adatum.com. The domain contains three domain DC3 loses network connectivity due to a hardware failure. You plan to remove DC3 from the domain. You log on to DC3. You need to identify which service location (SRV) records are registered by DC3. What should you do?
A. Open the %windir%\system32\config\netlogon.dns file.
B. Run dcdiag /test:dns
C. Open the %windir%\system32\dns\backup\adatum.com.dns file.
D. Run ipconfig /displaydns.
Correct Answer: A
Explanation:
A. Netlogon service creates a log file that contains all the locator resource records and places the logfile in the following location:
B. Analyzes the state of domain controllers in a forest or enterprise and reports any problems to help introubleshooting.
C. dns backup file
D. used to display current resolver cache content You can verify SRV locator resource records by viewing netlogon.dns, located in the
%systemroot%\System32\Config folder.
The SRV record is a Domain Name System (DNS) resource record that is used to identify computers that hostspecific services.
SRV resource records are used to locate domain controllers for Active Directory.
You can use Notepad, to view this file.
The first record in the file is the domain controller’s Lightweight Directory Access Protocol (LDAP) SRV record.
This record should appear similar to the following:
_ldap._tcp.Domain_Name
QUESTION 8
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. One of the domain controllers is named DCI. The network contains a member server named Server1 that runs Windows Server 2012 R2. You need to promote Server1 to a domain controller by using install from media (IFM).
What should you do first?
A. Create a system state backup of DC1.
B. Create IFM media on DC1.
C. Upgrade DC1 to Windows Server 2012 R2.
D. Run the Active Directory Domain Services Configuration Wizard on Server1.
E. Run the Active Directory Domain Services Installation Wizard on DC1.
Correct Answer: C
Explanation:
A. Backs up system state data to be restored
C. Only valid option. You could install ADDS role on Server 1 and run ADDS configuration wizard andadd DC to existing domain
D. Need to add ADDS role first
E. Wrong server
Installation from media does not work across different operating system versions. In other words, you must use a Windows Server 2012 R2 domain controller to generate installation media to usefor another Windows Server 2012 R2 domain controller installation. We can use the Install from media (IFM) option to install an Additional Domain Controller in an existing domainis the best option such as a branch office scenario where network is slow, unreliable and costly. IFM will minimize replication traffic during the installation because it uses restored backup files to populate theAD DS database. This will significantly reduce the amount of traffic copied over the WAN link. 70-410 dumps
Things to remember:
If you are deploying your first Domain Controller in the domain, you cannot use IFM. The OS will need to match the IFM media. (If you create a 2008 R2 IFM, promote a 2008 R2 DC) If you are creating a DC that will be a Global Catalog Server, create your IFM on a Global Catalog Server.
If you are creating a DC that will be a DNS Server, create your IFM on a DNS Server. If you want to copy the SYSVOL, the DC on which you generate the installation media and the new DC mustbe at least running Windows Server 2008 with Service Pack 2 or Windows Server 2008 R2. Membership of the Domain Admins group is the minimum required to complete IFM.
Media used by the IFM option is created with Windows Server Backup or Ntdsutil.exe from another existingWindows Server 2012 R2 computer only You cannot use a Windows Server 2008 R2 or previous operating system to create media for a Windows Server 2012 R2 domain controller.
QUESTION 9
Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts.
Servers are restarted only occasionally.
You need to identify which servers were restarted during the last two days.
What should you do?
A. Run dsquery computerand specify the -staiepwdpara meter.
B. Run Get-ADComputerand specify the SearchScope parameter.
C. Run Get-ADComputerand specify the IastLogonproperty.
D. Run dsquery serverand specify the -oparameter
Correct Answer: C
QUESTION 10
You have a server named Server1 that runs Windows Server 2012 R2. You connect three new hard disks to Server1.
You need to create a storage space that contains the three disks. The solution must meet the following requirements:
– Provide fault tolerance if a single disk fails.
– Maximize the amount of files that can be stored in the storage space.
What should you create?
A. A simple space
B. A spanned volume
C. A mirrored space
D. A parity space
Correct Answer: D
Explanation:
A. Stripes data across a set of pool disks, and is not resilient to any disk failures.
B. A spanned volume is a dynamic volume consisting of disk space on more than one physical disk and not fault tolerant
C. Fault tolerant but Not max space
D. Fault tolerant and better space ratio
Parity spaces are designed for capacity efficiency and increased resiliency. Parity spaces are best suited for archival data and streaming media, such as music and videos.
Get Microsoft MCSA 70-410 dumps exam preparation questions in form of 70-410 PDF. The best and most updated latest Microsoft MCSA 70-410 dumps pdf training resources which are the best for clearing https://www.leads4pass.com/70-410.html exam test, and to get certified by Microsoft MCSA. New Microsoft MCSA 70-410 dumps pdf practice materials and study guides free download from leads4pass, pass Microsoft 70-410 exam easily.
Best Microsoft MCSA 70-410 dumps vce youtube:
https://youtu.be/dL91qi8lAwQ
Here Are Some Reviews From Our Customers:
Why Select leads4pass?
leads4pass is the best provider of IT learning materials and the right choice for you to prepare for Microsoft 70-410 exam. Other brands started earlier, but the price is relatively expensive and the questions are not the newest. leads4pass provide the latest real questions and answers with lowest prices, help you pass Microsoft 70-410 exam easily at first try.
The best and most updated latest Microsoft MCSA 70-761 dumps exam training resources in PDF format free download from leads4pass. Helpful newest Microsoft MCSA 70-761 dumps vce youtube demo free shared. “Querying Data with Transact-SQL” is the name of Microsoft MCSA https://www.leads4pass.com/70-761.html exam dumps which covers all the knowledge points of the real Microsoft exam. Get your Microsoft MCSA 70-761 dumps exam preparation questions in form of 70-761 PDF. 100% success and guarantee to pass Microsoft 70-761 exam.
High Quality Microsoft MCSA 70-761 Dumps Exam Questions And Answers Update (Q1-Q10)
QUESTION 1
You have a database that stored information about servers and application errors. The database contains the following tables.
Servers
Errors
You are building a webpage that shows the three most common errors for each server.
You need to return the data for the webpage.
How should you complete the Transact-SQL statement? To answer, drag the appropriate Transact-SQL segments to the correct location. Each Transact-SQL segment may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Correct Answer:
QUESTION 2
You have the following subqueries: Subquery1, Subquery2, and Subquery3.
You need to replace the three subqueries with named result sets or temporary tables. The following requirements must be met:
Which replacement techniques should you use? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Explanation:
Subquery1: common table expression (CTE)
A common table expression (CTE) can be thought of as a temporary result set that is defined within the execution scope of a single SELECT, INSERT, UPDATE, DELETE, or CREATE VIEW statement. A CTE is similar to a derived table in that it is not stored as an object and lasts only for the duration of the query. Unlike a derived table, a CTE can be self-referencing and can be referenced multiple times in the same query.
Subquery2: global temporary table
Global temporary tables are visible to any user and any connection after they are created, and are deleted when all users that are referencing the table disconnect from the instance of SQL Server.
Subquery3: local temporary table
Local temporary tables are visible only to their creators during the same connection to an instance of SQL Server as when the tables were first created or referenced. Local temporary tables are deleted after the user disconnects from the instance of SQL Server.
QUESTION 3
You have the following stored procedure:
You run the following Transact-SQL statements:
What is the result of each Transact-SQL statement? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Explanation:
Box 1: All transactions are rolled back.
The first IF-statement, IF @CODE = ‘C2323’ AND @ApplicationID = 1, will be true, an error will be raised, the error will be caught in the CATCH block, and the only transaction that has been started will be rolled back.
Box 2: Only Log1, Log2, and Log3 tables are updated.
The second IF-statement, IF @Code = ‘C2323’, will be true, so the second transaction will be rolled back, but log1, log2, and log3 was updated before the second transaction.
QUESTION 4
You have a database that contains the following tables.
You need to create a query that lists the lowest-performing salespersons based on the current year-to-date sales period. The query must meet the following requirements:
– Return a column named Fullname that includes the salesperson FirstName, a space, and then LastName.
– Include the current year-to-date sales for each salesperson.
– Display only data for the three salespersons with the lowest year-to-year sales values.
– Exclude salespersons that have no value for TerritoryID.
Construct the query using the following guidelines:
– Use the first letter of a table name as the table alias.
– Use two-part column names.
– Do not surround object names with square brackets.
– Do not use implicit joins.
– Use only single quotes for literal text.
– Use aliases only if required.
Part of the correct Transact-SQL has been provided in the answer area below. Enter the code in the answer area that resolves the problem and meets the stated goals or requirements. You can add code within the code that has been provided as well as below it.
Use the Check Syntax button to verify your work. Any syntax or spelling errors will be reported by line and character position.
Correct Answer: Explanation
Explanation
Explanation/Reference:
Answer: SELECT TOP 3
(p.FirstName + ‘ ‘ + p.LastName) AS FullName
, s.SalesYTD
FROM
Person AS p
INNER JOIN SalesPerson AS s
ON p.PersonID = s.PersonID
WHERE
Answer: TerritoryID IS NOT NULL
ORDER BY
Answer: SalesYTD DESC
QUESTION 5
You have the following Transact-SQL query:
What type of functions are used in the query? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point. 70-761 dumps
Hot Area:
Correct Answer:
Explanation:
Box 1: Scalar
The return value of a function can either be a scalar (single) value or a table.
Box 2: Table-Valued
The APPLY operator allows you to invoke a table-valued function for each row returned by an outer table expression of a query. The table-valued function acts as the right input and the outer table expression acts as the left input. The right input is evaluated for each row from the left input and the rows produced are combined for the final output. The list of columns produced by the APPLY operator is the set of columns in the left input followed by the list of columns returned by the right input.
QUESTION 6
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question on this series.
You have a database that tracks orders and deliveries for customers in North America.
System versioning is enabled for all tables. The database contains the Sales.Customers, Application.Cities, and Sales.CustomerCategories tables.
Details for the Sales.Customers table are shown in the following table:
Details for the Application.Cities table are shown in the following table:
Details for the Sales.CustomerCategories table are shown in the following table:
You are creating a report to measure the impact of advertising efforts that were designed to attract new customers. The report must show the number of new customers per day for each customer category, but only if the number of new customers is greater than five.
You need to write the query to return data for the report.
How should you complete the Transact-SQL statement? To answer, drag the appropriate Transact-SQL segments to the correct locations. Each Transact-SQL segment may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:
Correct Answer:
QUESTION 7
You have a table named Cities that has the following two columns: CityID and CityName.
The CityID column uses the int data type, and CityName uses nvarchar(max).
You have a table named RawSurvey. Each row includes an identifier for a question and the number of persons that responded to that question from each of four cities. The table contains the following representative data:
A reporting table named SurveyReport has the following columns: CityID, QuestionID, and RawCount, where RawCount is the value from the RawSurvey table.
You need to write a Transact-SQL query to meet the following requirements:
– Retrieve data from the RawSurvey table in the format of the SurveyReport table.
– The CityID must contain the CityID of the city that was surveyed.
– The order of cities in all SELECT queries must match the order in the RawSurvey table.
– The order of cities in all IN statements must match the order in the RawSurvey table.
Construct the query using the following guidelines:
– Use one-part names to reference tables and columns, except where not possible.
– ALL SELECT statements must specify columns.
– Do not use column or table aliases, except those provided.
– Do not surround object names with square brackets.
Part of the correct Transact-SQL has been provided in the answer area below. Enter the code in the answer area that resolves the problem and meets the stated goals or requirements. You can add code within the code that has been provided as well as below it.
Use the Check Syntax button to verify your work. Any syntax or spelling errors will be reported by line and character position.
Correct Answer: UNPIVOT
Explanation:
UNPIVOT must be used to rotate columns of the Rawsurvey table into column values.
QUESTION 8
You have two tables named UserLogin and Employee respectively.
You need to create a Transact-SQL script that meets the following requirements:
– The script must update the value of the IsDeleted column for the UserLogin table to 1 if the value of the Id column for the UserLogin table is equal to 1.
– The script must update the value of the IsDeleted column of the Employee table to 1 if the value of the Id column is equal to 1 for the Employee table when an update to the UserLogin table throws an error.
– The error message “No tables updated!” must be produced when an update to the Employee table throws an error.
Which five Transact-SQL segments should you use to develop the solution? To answer, move the appropriate Transact-SQL segments from the list of Transact-SQL segments to the answer area and arrange them in the correct order.
Select and Place:
Correct Answer:
Explanation:
A TRY block must be immediately followed by an associated CATCH block. Including any other statements between the END TRY and BEGIN CATCH statements generates a syntax error.
QUESTION 9
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
You query a database that includes two tables: Project and Task. The Project table includes the following columns:
You plan to run the following query to update tasks that are not yet started:
You need to return the total count of tasks that are impacted by this UPDATE operation, but are not associated with a project. 70-761 dumps
What set of Transact-SQL statements should you run?
A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: B
Explanation:
The WHERE clause of the third line should be WHERE ProjectID IS NULL, as we want to count the tasks that are not associated with a project.
QUESTION 10
You have a database that contains the following tables.
You need to create a query that lists all complaints from the Complaints table, and the name of the person handling the complaints if a person is assigned. The ComplaintID must be displayed first, followed by the person name.
Construct the query using the following guidelines:
– Use two-part column names.
– Use one-part table names.
– Do not use aliases for column names or table names.
– Do not use Transact-SQL functions.
– Do not use implicit joins.
– Do not surround object names with square brackets.
Part of the correct Transact-SQL has been provided in the answer area below. Enter the code in the answer area that resolves the problem and meets the stated goals or requirements. You can add code within the code that has been provided as well as below it.
Use the Check Syntax button to verify your work. Any syntax or spelling errors will be reported by line and character position.
Correct Answer: Explanation
Explanation:
SELECT
Complaints.ComplaintID, Persons.Name
FROM
Complaints LEFT OUTER JOIN Contacts ON Complaints.ComplaintID = Contacts.ComplaintID
LEFT OUTER JOIN Persons ON Contacts.PersonID = Persons.PersonID
Useful Microsoft MCSA 70-761 dumps pdf practice files and study guides download free try from leads4pass. Latest Microsoft MCSA https://www.leads4pass.com/70-761.html dumps pdf training resources which are the best for clearing 70-761 exam test, and to get certified by Microsoft MCSA, download one of the many PDF readers that are available for free. If you are looking to get MCSA certification by passing exam 70-761 then you can pass it in one go.
Best Microsoft MCSA 70-761 dumps vce youtube demo:
leads4pass is the best provider of IT learning materials and the right choice for you to pass Microsoft 70-761 exam. Other brands started earlier, but the questions are not the newest and the price is relatively expensive. leads4pass provide the latest real and cheapest questions and answers, help you pass Microsoft 70-761 exam easily at first try.
With the help of latest and authentic CompTIA A+ 220-802 dumps exam questions, you can find the best 220-802 exam preparation kit here from leads4pass and you will also get the 100% guarantee for passing the CompTIA A+ 220-802 exam. “CompTIA A+ Certification Exam” is the name of CompTIA A+ https://www.leads4pass.com/220-802.html exam dumps which covers all the knowledge points of the real CompTIA exam. The best useful CompTIA A+ 220-802 dumps exam training resources and study guides in PDF format free download from leads4pass. It is the best choice for you to pass CompTIA 220-802 exam.
New CompTIA A+ 220-802 Dumps Exam Practice Questions And Answers (Q1-Q40)
QUESTION 1
Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now.
Which of the following should be done FIRST?
A. Set the application to run in XP compatibility mode
B. Reinstall Windows XP
C. Configure a dual boot with XP and 7
D. Install the application in XP mode
Correct Answer: A
QUESTION 2
A technician is installing a new operating system. The company policy requires that the file system used must support file permissions and security. Which of the following should the technician use to BEST meet the company needs?
A. NTFS
B. CDFS
C. FAT32
D. UDF
Correct Answer: A
QUESTION 3
A technician is trying to request a new IP address to a customer\’s computer through the command prompt. Which of the following commands should the technician use?
A. ipconfig /flushdns
B. ipconfig /renew
C. ipconfig /all
D. ipconfig /release
Correct Answer: B
QUESTION 4
Which of the following is the default location for the User profiles folder in Windows 7?
A. C:\Users
B. C:\Program Files (x86)
C. C:\Documents and Settings\
D. C:\Windows\system32
Correct Answer: A
QUESTION 5
A technician receives a report that the pages coming out of a laser printer are smearing when touched. Which of the following components should the technician check FIRST to resolve this issue?
A. Drum
B. Fuser
C. Pickup roller
D. Corona wire
Correct Answer: B
QUESTION 6
A technician wants to create a new logical volume on a machine. Which of the following Windows 7 utilities will allow a technician to perform this action?
A. DISKPART
B. FORMAT
C. CHKDSK
D. FDISK
Correct Answer: A
QUESTION 7
Which of the following commands should Karen, a technician, use to examine and restore protected system files?
A. SFC
B. RECOVER
C. REPLACE
D. COPY
Correct Answer: A
QUESTION 8
A technician recently replaced a user\’s monitor and now the user is reporting that the screen is filled with static and appears distorted. 220-802 dumps Which of the following will resolve the issue?
A. Lower refresh rate
B. Lower the resolution
C. Raise the resolution
D. Increase refresh rate
Correct Answer: A
QUESTION 9
The computer starts up and runs for less than a minute before shutting down or locking up. This is a symptom of:
A. Overheating.
B. Incompatible RAM.
C. A faulty hard drive.
D. A bad internal USB hub.
Correct Answer: A
QUESTION 10
After an installation of a video adapter, the screen on a Windows 7 system cannot be seen.
Which of the following Windows 7 functions will resolve this?
A. Component Management
B. Startup Repair
C. Device Manager
D. Task Manager
Correct Answer: B
QUESTION 11
Administrative share names are MOST commonly designated by which of the following symbols?
A. !
B. $
C. :
D. *
Correct Answer: B
QUESTION 12
Which of the following is the MOST likely reason for a low wireless signal?
A. The distance from the access point
B. Incompatible wireless hardware
C. The access point is bridged
D. Channel conflict in the access point
Correct Answer: A
QUESTION 13
A customer says they cannot access the network printer. The technician cannot PING the printer from their location.
Which of the following should be the NEXT step in troubleshooting this issue?
A. Check the toner cartridge
B. Reboot client PC
C. Check the link lights on printer NIC
D. Reboot the printer
Correct Answer: C
QUESTION 14
A technician discovers slow data transfer speeds in a wired network. Which of the following would be the MOST probable cause?
A. Using APIPA address
B. Outdated NIC drivers
C. Too many simultaneous connections
D. CAT5 cable connection
Correct Answer: B
QUESTION 15
DRAG DROP
Drag and drop the following Windows Versions to the correct feature on which they are found. Windows Versions may be used more than once.
Select and Place:
Select and Place:
Correct Answer:
QUESTION 16
When a user tries to print, the OS slows down and appears to lock up. Shutting down the Print Spooler Service restores the computer\’s speed, but leaves the user unable to print. 220-802 dumps
Which of the following should be used FIRST to troubleshoot this problem?
A. Rebuild print spooler files
B. Hardware diagnostic software
C. Event viewer
D. Antivirus software
Correct Answer: C
QUESTION 17
Which of the following will help limit unauthorized access to a mobile device?
A. Remote wipes
B. Screen locks
C. Geotracking
D. Antivirus software
Correct Answer: B
QUESTION 18
After accidentally removing a hard drive from a server with three drives in a RAID 5 configuration, a technician notices the server locks up and shuts down. Which of the following can the technician do to quickly fix the problem?
A. Replace the RAID controller and boot.
B. Reinsert the drive and boot.
C. Plug the drive back in, the system will resume automatically.
D. Remove all drives and rebuild the array.
Correct Answer: B
QUESTION 19
A user regularly calls and states that they have a computer with possibly corrupt system files and wants to know how to repair them. Which of the following utilities would resolve the problem?
A. ASR
B. FIXMBR
C. SFC
D. MSCONFIG
Correct Answer: C
QUESTION 20
A user states that they see a warning on their screen about an IP conflict. Which of the following is MOST likely the cause?
A. A static IP address is assigned to the workstation
B. A bad router
C. A bad switch
D. The computer is getting an APIPA address
Correct Answer: A
QUESTION 21
A company would like to prevent commonly known social engineering risks. Which of the following would help mitigate these risks?
A. Annual security training
B. Install new switches
C. Review security policies
D. Require 180 day password expiration
Correct Answer: A
QUESTION 22
A user has asked for a recommendation for a strong password. Which of the following passwords is the STRONGEST?
A. password!
B. Pa$sw0rd
C. pa$4w0rd
D. thisismypsswrd1
Correct Answer: B
QUESTION 23
When walking past a server with a RAID 5 array, a technician hears a loud clicking noise. Which of the following could MOST likely occur?
A. BSOD
B. OS not found on boot
C. Hard drive failure
D. RAID array failure
Correct Answer: C
QUESTION 24
After replacing a motherboard on a customer\’s laptop for a no sound issue, a technician realizes that there is intermittent wireless connectivity on the laptop. 220-802 dumps Which of the following should the technician perform FIRST?
A. Reinstall the driver of the WiFi card.
B. Check to see if there is a wireless switch on the laptop and its current position.
C. Replace the wireless card because it is not fully compatible with the new motherboard.
D. Check if the WiFi antenna is connected properly to the wireless card.
Correct Answer: D
QUESTION 25
Which of the following resources is MOST important for accessing remote virtual environments on a client machine?
A. Network speed
B. CPU speed
C. High speed memory
D. Drive space
Correct Answer: A
QUESTION 26
A technician is changing out a toner cartridge in a high volume printer. As they are removing the empty cyan cartridge, a large amount of blue powder falls out onto rollers in the immediate area. Which of the following should the technician do NEXT?
A. Immediately leave the scene and sound an emergency to security.
B. Use a toner vacuum to remove the spilled toner from the undesired surfaces.
C. Use compressed air to remove the spilled toner from the undesired surfaces.
D. Use the maintenance kit to remove and replace the affected parts.
Correct Answer: B
QUESTION 27
Which of the following steps would allow display output from a laptop to an external display? (Select TWO).
A. Press the appropriate Function Key combination
B. A second video card in the Express card slot
C. Disconnect the integrated display
D. Enabling second monitor in the Windows Display Settings
E. Loading external monitor drivers on the laptop
Correct Answer: AD
QUESTION 28
If a customer wants to create a multi-boot PC with different editions of Windows, which of the following is MOST important to consider?
A. Using multiple partitions
B. Using multiple hard drives
C. Using a single partition
D. Using a PXE boot scheme
Correct Answer: A
QUESTION 29
After being infected with a virus, a user\’s computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user\’s backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?
A. Recovery Console
B. Factory restore CD
C. Anti-malware software
D. System Restore
Correct Answer: B
QUESTION 30
A customer calls a technician frequently for the same problem. Which of the following troubleshooting steps MUST the technician perform NEXT to attempt to permanently solve this issue?
A. Establish a plan of action to resolve the problem and implement the solution.
B. Document findings, actions, and outcomes.
C. Verify full system functionality and implement preventive measures.
D. Identify the problem or symptoms.
Correct Answer: C
QUESTION 31
Which of the following is a disadvantage of running a virtual machine?
A. Decreased performance
B. Long recovery time
C. Hard drive compatibility
D. Difficult software testing
Correct Answer: A
QUESTION 32
Joe reports that the network inkjet printer is not printing any documents. Joe is able to print a test page from the front panel of the printer and the printer has an IP. Which of the following is the cause of the problem?
A. Spooler service has stopped
B. The USB cable is unplugged
C. The printer has no ink
D. The fuser needs to be replaced
Correct Answer: A
QUESTION 33
A customer calls and states that they are getting a lot of pop-ups and the new antivirus they just downloaded is not helping. Which of the following is the MOST likely cause of the issue?
A. Rouge antivirus
B. Need anti-malware scan
C. Security Center Disabled
D. Windows not up to date
Correct Answer: A
QUESTION 34
Which of the following are true regarding Windows 32-bit versus Windows 64-bit Operating Systems? (Select TWO).
A. CPUs that can run Windows 32-bit can also run Windows 64-bit.
B. Device drivers for Windows 32-bit and Windows 64-bit are the same.
C. Not all CPUs are capable of running Windows 64-bit.
D. Windows 64-bit can address larger amounts of RAM.
E. Windows 64-bit is a more secure OS and less susceptible to viruses.
Correct Answer: CD
QUESTION 35
A technician is setting up a wired SOHO network for a client. The client would like to ensure that unauthorized PCs are not easily able to communicate on the network. Which of the following can the technician do?
A. Enable MAC filtering
B. Encrypt passwords
C. Disable SSID
D. Disable DHCP
Correct Answer: A
QUESTION 36
A user has moved into a building and is installing a new wired network. There is existing cabling throughout the building.
The user would like to prevent hardware that they do not own from connecting to the network. 220-802 dumps Which of the following actions would BEST prevent outside users from connecting?
A. Enable static IPs
B. Disable DNS
C. Disable local proxy server
D. Enable MAC filtering
Correct Answer: D
QUESTION 37
Which of the following is solely designed to avoid detection by an antivirus program by using the underlying operating system to its advantage?
A. Rootkit
B. Virus
C. Trojan
D. Worm
Correct Answer: A
QUESTION 38
A new user reports that they are unable to login to the corporate network on their desktop but they are able to access the WLAN from their mobile device. After further inspection, the technician realizes that the wall port is not wired correctly. Which of the following tools would be used to permanently restore network connectivity to the desktop?
A. Wireless locator
B. Tethering with mobile device
C. Punchdown tool
D. Crimper
Correct Answer: C
QUESTION 39
An iOS user does not want to automatically connect to wireless networks that are broadcasting. Which of the following settings must be enabled in iOS 5.x to authorize connecting to wireless networks?
A. Connect to WiFi
B. Change adapter settings
C. Manage wireless networks
D. Ask to join
Correct Answer: D
QUESTION 40
Which of the following allows a user to reset their password with a series of security questions that only the user should know?
A. Permission propagation
B. Administration
C. Verification
D. Authentication
Correct Answer: D
Useful latest CompTIA A+ 220-802 dumps pdf practice materials free download from leads4pass. The best and most updated latest CompTIA A+ https://www.leads4pass.com/220-802.html dumps pdf training resources which are the best for clearing 220-802 exam test, and to get certified by CompTIA A+, download one of the many PDF readers that are available for free with high pass rate.
Best CompTIA A+ 220-802 dumps vce youtube demo:
https://youtu.be/-WSZXnQrx5Q
The Following Are Some Reviews From Our Customers:
High quality IT learning materials offered by the best provider leads4pass. From the following picture, you can see there is a difference between leads4pass and other brands. Other brands started earlier, but the questions are not the latest and it is very expensive. leads4pass provide the cheapest and newest questions with high pass rate, pass CompTIA 220-802 exam easily.
2018 new Microsoft MCSA 70-417 dumps pdf materials and vce youtube demo update free shared. Practice for your Microsoft MCSA 70-417 dumps exam with the help of leads4pass. Download Microsoft MCSA 70-417 dumps real exam questions and verified answers.
High Quality Microsoft MCSA 70-417 Dumps Exam Questions And Answers (11-30)
QUESTION 11
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.
You plan to schedule a complete backup of Server1 by using Windows Server Backup.
You need to ensure that the state of VM1 is saved before the backup starts.
What should you configure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization
Correct Answer: I
QUESTION 12
Which terminology is being described below:
This trust is a manually created trust that shortens the trust path to improve the speed at which authentications, which occur between domain trees, are processed
A. Shortcut Trust
B. Quick Trust
C. Easy Trust
D. Simple Trust
Correct Answer: A
QUESTION 13
You plan to deploy a file server to a temporary location.
The temporary location experiences intermittent power failures.
The file server will contain a dedicated volume for shared folders.
You need to create a volume for the shared folders. The solution must minimize the likelihood of file corruption if a power failure occurs.
Which file system should you use?
A. NFS
B. FAT32
C. ReFS
D. NTFS
Correct Answer: C
QUESTION 14
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1.
You install the Windows PowerShell Web Access gateway on Server1.
You need to provide administrators with the ability to manage the servers in the domain by using the Windows PowerShell Web Access gateway.
Which two cmdlets should you run on Server1? (Each correct answer presents part of the solution. Choose two.)
A. Install PswaWebApplication
B. Add PswaAuthorizationRule
C. Set-WSManlnstance
D. Set-WSManQuickConfig
E. Set-BCAuthentication
Correct Answer: AB
QUESTION 15
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1. 70-417 dumps
You make a change to GPO1.
You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solution must minimize administrative effort.
Which tool should you use?
A. The Set-AdComputercmdlet
B. Group Policy Object Editor
C. Active Directory Users and Computers
D. Group Policy Management Console (GPMC)
Correct Answer: D
QUESTION 16
Your network contains one Active Directory domain named contoso.com.
You pilot DirectAccess on the network.
During the pilot deployment you enable DirectAccess only for a group named Contoso\Test Computers.
Once the pilot is complete, you need to enable DirectAccess for all of the client computers in the domain.
What should you do?
A. From Windows PowerShell, run the Set-DACIient cmdlet.
B. From Windows PowerShell, run the Set-DAServer cmdlet.
C. From Group Policy Management, modify the security filtering of an object named Direct Access Client Settings Group Policy.
D. From Group Policy Management, modify the security filtering of an object named Direct Access Server Settings Group Policy.
Correct Answer: A
QUESTION 17
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
You have fixed-size VHD named Files.vhd.
You need to make the contents in Files.vhd available to several virtual machines. The solution must meet the following requirements:
Ensure that if the contents are changed on any virtual machine, the changes are not reflected on the other virtual machines.
Minimize the amount of disk space used.
What should you do?
A. Create differencing VHD5 that use Files.vhd as the parent disk.
B. Create a fixed-size VHDX. Transfer the information from Files.vhd to the new VHDX file.
C. Convert Files.vhd to a dynamically expanding VHD.
D. Create a dynamically expanding VHDX. Transfer the information from Files.vhd to the new VHDX file.
Correct Answer: A
QUESTION 18
Your network contains an Active Directory domain named adatum.com. The domain contains a server named CA1 that runs Windows Server 2012 R2. CA1 has the Active Directory Certificate Services server role installed and is configured to support key archival and recovery.
You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory Certificate Services (AD CS) database. The solution must prevent User1 from retrieving the private keys from the AD CS database.
What should you do?
A. Assign User1 the Issue and Manage Certificates permission to CA1.
B. Assign User1 the Read permission and the Write permission to all certificate templates.
C. Provide User1 with access to a Key Recovery Agent certificate and a private key.
D. Assign User1 the Manage CA permission to CA1.
Correct Answer: C
QUESTION 19
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.
Cluster1 hosts an application named App1.
You need to ensure that Server2 handles all of the client requests to the cluster for App1. The solution must ensure that if Server2 fails, Server1 becomes the active node for App1.
What should you configure?
A. Affinity – None
B. Affinity – Single
C. The cluster quorum settings
D. The failover settings
E. A file server for general u
F. The Handling priority
G. The host priority
H. Live migration
I. The possible owner
J. The preferred owner
K. Quick migration
L. The Scale-Out File Server
Correct Answer: J
QUESTION 20
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server3 that runs Windows Server 2012 R2 and has the DHCP Server server role installed.
DHCP is configured as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that only Scope1, Scope3, and Scope5 assign the same DNS servers to DHCP clients.
The solution must minimize administrative effort.
What should you do?
Exhibit:
A. Create a superscope and a filter
B. Create a superscope and scope-level policies
C. Configure the Server Options
D. Configure the Scope Options
Correct Answer: D
QUESTION 21
You have a server named Server1 that runs Windows Server 2012 R2.
You plan to create an image of Server1.
You need to remove the source files for all server roles that are not installed on Server1.
Which tool should you use?
A. dism.exe
B. servermanagercmd.exe
C. ocsetup.exe
D. imagex.exe
Correct Answer: A
QUESTION 22
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the IP Address Management (IPAM) Server feature installed. Server2 has the DHCP Server server role installed. A user named User1 is a member of the IPAM Users group on Server1. 70-417 dumps You need to ensure that User1 can use IPAM to modify the DHCP scopes on Server2. The solution must minimize the number of permissions assigned to User1.
To which group should you add User1?
A. IPAM ASM Administrators on Server1
B. IPAMUG in Active Directory
C. DHCP Administrators on Server2
D. IPAM MSM Administrators on Server1
Correct Answer: D
QUESTION 23
You have a virtual machine named VM1 that runs on a host named Host1.
You configure VM1 to replicate to another host named Host2. Host2 is located in the same physical location as Host1.
You need to add an additional replica of VM1. The replica will be located in a different physical site.
What should you do?
A. From VM1 on Host2, click Extend Replication.
B. On Host1, configure the Hyper-V settings.
C. From VM1 on Host1, click Extend Replication.
D. On Host2, configure the Hyper-V settings.
Correct Answer: A
QUESTION 24
You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. You attach a 4-TB disk to Server1.
The disk is configured as an MBR disk. You need to ensure that you can create a 4-TB volume on the disk.
Which Diskpart command should you use?
A. Automount
B. Convert
C. Expand
D. Attach
Correct Answer: B
QUESTION 25
Your company deploys a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2. The forest contains a domain controller named DC10.
On DC10, the disk that contains the SYSVOL folder fails.
You replace the failed disk. You stop the Distributed File System (DFS) Replication service.
You restore the SYSVOL folder.
You need to perform a non-authoritative synchronization of SYSVOL on DC10.
Which tool should you use before you start the DFS Replication service on DC10?
A. Active Directory Sites and Services
B. Ultrasound
C. Adsiedit.msc
D. Frsutil
Correct Answer: C
QUESTION 26
Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2.
You install the Network Load Balancing feature on the virtual machines.
You need to configure the virtual machines to support Network Load Balancing (NLB).
Which virtual machine settings should you configure?
A. DHCP guard
B. Port mirroring
C. Router guard
D. MAC address
Correct Answer: D
QUESTION 27
Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs WindowsServer 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server.
You need to ensure that only computers that send a statement of health are checked for Network Access Protection (NAP) health requirements.
Which two settings should you configure? (Each correct answer presents part of the solution. Choose two.)
A. The NAS Port Type constraints
B. The MS-Service Class conditions
C. The Health Policies conditions
D. The NAP-Capable Computers conditions
E. The Called Station ID constraints
Correct Answer: CD
QUESTION 28
Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named RODC1.
You create a global group named RODC_Admins.
You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on RODC1.
The solution must not provide RODC_Admins with the ability to manage Active Directory objects.
What should you do?
A. From a command prompt, run the dsadd computer command.
B. From Active Directory Users and Computers, run the Delegation of Control Wizard.
C. From Active Directory Users and Computers, configure the Member Of settings of the RODC1 account.
D. From a command prompt, run the dsmgmt local roles command.
Correct Answer: D
QUESTION 29
You have a server named Data1 that runs a Server Core Installation of Windows Server 2012 R2 Standard.
You need to configure Data1 to run a Server Core Installation of Windows Server 2012 R2 Datacenter. You want to achieve this goal by using the minimum amount of administrative effort.
What should you perform?
A. An online servicing by using Dism
B. An offline servicing by using Dism
C. An upgrade installation of Windows Server 2012 R2
D. A clean installation of Windows Server 2012 R2
Correct Answer: A
QUESTION 30
You are a network administrator of an Active Directory domain named contoso.com.
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the DHCP Server server role and the Network Policy Server role service installed. 70-417 dumps
You enable Network Access Protection (NAP) on all of the DHCP scopes on Server1.
You need to create a DHCP policy that will apply to all of the NAP non-compliant DHCP clients.
Which criteria should you specify when you create the DHCP policy?
A. The user class
B. The vendor class
C. The client identifier
D. The relay agent information
Correct Answer: A
The best and most updated latest Microsoft MCSA 70-417 dumps pdf training resources which are the best for clearing 70-417 exam test, and to get certified by Microsoft MCSA. Latest leads4pass 70-417 dumps exam practice files and study guides in PDF format download free try. It is the best choice for you to pass Microsoft 70-417 exam. 100% success and guarantee to pass Microsoft 70-417 exam test.
Useful Microsoft MCSA 70-417 dumps vce youtube:
https://youtu.be/tXkM3WTTltI
Here Are Some Reviews From Our Customers:
Why Choose leads4pass?
leads4pass is the best IT learning material provider. Other brands appeared early, Microsoft MCSA 70-417 dumps exam practice questions are outdated and it is very expensive. leads4pass provide the newest and cheapest questions and answers. leads4pass is the correct choice for IT learning materials, help you pass your exam easily.
Do you want to pass Cisco CCDP 300-101 dumps exam? The best and most updated latest Cisco CCDP 300-101 dumps exam training resources in PDF format free download from leads4pass. Useful Cisco CCDP 300-101 dumps pdf materials and vce youtube demo update free shared. “Implementing Cisco IP Routing” is the name of Cisco CCDP https://www.leads4pass.com/300-101.html exam dumps which covers all the knowledge points of the real Cisco CCDP. High quality latest Cisco CCDP 300-101 dumps exam practice questions and answers free download, 100% success and guarantee to pass Cisco 300-101 exam test easily at first attempt.
Cisco CCDP 300-101 Dumps Exam Questions And Answers (1-30)
QUESTION 1
A network engineer executes the show ip cache flow command. Wich two types of information are displayed in the report that is generated? (Choose 2)
A. top talkers
B. flow export statistics
C. flow sample for specific protocols
D. MLS flow traffic
E. IP packet distribution
Correct Answer: CE
QUESTION 2
At which layer does Cisco Express Forwarding use adjacency tables to populate addressing information?
A. Layer4
B. Layer 2
C. Layer 1
D. Layer 3
Correct Answer: B
QUESTION 3
Which traffic does the following configuration allow? ipv6 access-list cisco permit ipv6 host 2001:DB8:0:4::32 any eq ssh line vty 0 4 ipv6 access-class cisco in
A. all traffic to vty 0 4 from source 2001:DB8:0:4::32
B. only ssh traffic to vty 0 4 from source all
C. only ssh traffic to vty 0 4 from source 2001:DB8:0:4::32
D. all traffic to vty 0 4 from source all
Correct Answer: C
QUESTION 4
Refer to the exhibit.
Will redistributed RIP routes from OSPF Area 2 be allowed in Area 1?
A. Because Area 1 is an NSSA, redistributed RIP routes will not be allowed.
B. Redistributed RIP routes will be allowed in Area 1 because they will be changed into type 5 LSAs in Area 0 and passed on into Area 1.
C. Because NSSA will discard type 7 LSAs, redistributed RIP routes will not be allowed in Area 1.
D. Redistributed RIP routes will be allowed in Area 1 because they will be changed into type 7 LSAs in Area 0 and passed on into Area 1.
E. RIP routes will be allowed in Area 1 only if they are first redistributed into EIGRP.
Correct Answer: A
QUESTION 5
Refer to the exhibit.
If R1 is configured for 6to4 tunneling, what will the prefix of its IPv6 network be? 300-101 dumps
A. 1723:1100:1::/48
B. FFFF:AC1F:6401::/16
C. AC1F:6401::/32
D. 2002:AC1F:6401::/48
E. 3FFE:AC1F:6401::/32
Correct Answer: D
QUESTION 6
Refer to the exhibit.
A new TAC engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is not coming up.
What did the TAC engineer configure incorrectly?
A. The crypto isakmp configuration is not correct.
B. The crypto map configuration is not correct.
C. The network 172.16.1.0 is not included in the OSPF process.
D. The interface tunnel configuration is not correct.
Correct Answer: D
QUESTION 7
Which two methods of deployment can you use when implementing NAT64? (Choose two.)
A. stateless
B. stateful
C. manual
D. automatic
E. static
F. functional
G. dynamic
Correct Answer: AB
QUESTION 8
Which statement about dual stack is true?
A. Dual stack translates IPv6 addresses to IPv4 addresses.
B. Dual stack means that devices are able to run IPv4 and IPv6 in parallel.
C. Dual stack translates IPv4 addresses to IPv6 addresses.
D. Dual stack changes the IP addresses on hosts from IPv4 to IPv6 automatically.
Correct Answer: B
QUESTION 9
The following configuration is applied to a router at a branch site: ipv6 dhcp pool dhcp-pool dns-server 2001:DB8:1:B::1 dns-server 2001:DB8:3:307C::42 domain-name example.com ! If IPv6 is configured with default settings on all interfaces on the router, which two dynamic IPv6 addressing mechanisms could you use on end hosts to provide end-to-end connectivity? (Choose two.)
A. EUI-64
B. SLAAC
C. DHCPv6
D. BOOTP
Correct Answer: AB
QUESTION 10
Which two statements about EVN are true? 300-101 dumps (Choose two)
A. Virtual network tags are assigned per-VRF.
B. it is supported only on access ports.
C. Virtual network tags are assigned globally.
D. Routing metrics can be manipulated only from directly within the routing-context configuration.
E. The VLAN ID in the 802.1q frame carries the virtual network tag.
F. The VLAN ID is the ISL frame carries the virtual network tag.
Correct Answer: AE
QUESTION 11
In which scenario can asymmetric routing occur?
A. active/active firewall setup
B. single path in and out of the network.
C. active/standby firewall setup
D. redundant routers running VRRP
Correct Answer: D
QUESTION 12
Which two options are requirements for EIGRP authentication? (Choose two)
A. A crypto map must be configured.
B. The Authentication key must be configured under the interface running EIGRP.
C. The authentication key must be configured within the EIGRP routing configuration.
D. The authentication key IDs must match between two neighbors.
E. A separate key chain must be configured.
F. AN IPsec profile must be configured.
Correct Answer: BD
QUESTION 13
Which of the following is a GRE Tunnel characteristic?
A. GRE impose more CPU overhead than IPSec on VPN gateways
B. GRE tunnels can run through IPsec tunnels.
C. GRE Tunnel doesn\’t have support for IPv6
D. GRE consists of two sub-protocols: Encapsulated Security Payload (ESP) and Authentication Header (AH).
Correct Answer: B
QUESTION 14
A network engineer has been asked to ensure that the PPPoE connection is established and authenticated using an encrypted password. Which technology, in combination with PPPoE, can be used for authentication in this manner?
A. PAP
B. dot1x
C. IPsec
D. CHAP
E. ESP
Correct Answer: D
QUESTION 15
Refer to the exhibit.
Which statement is correct regarding the operation of NAT-PT between the IPv4 and IPv6 networks shown?
A. The router will determine the IPv4 destination address.
B. The source IPv6 host can use DNS to determine the IPv6-to-IPv4 address mapping.
C. The host is statically configured with the IPv6-to-IPv4 address mapping.
D. ICMP can be used to determine the IPv6-to-IPv4 address mapping.
Correct Answer: B
QUESTION 16
Refer to the exhibit.
Which interoperability technique implemented on the router would allow Host-1 to communicate with Host-2? 300-101 dumps
A. Dual Stack
B. NAT-PT
C. 6to4 tunnel
D. GRE tunnel
E. ISATAP tunnel
Correct Answer: B
QUESTION 17
A network engineer executes the andquot;ipv6 flowsetandquot; command. What is the result?
A. Flow-label marking in 1280-byte or larger packets is enabled.
B. Flow-set marking in 1280-byte or larger packets is enabled.
C. IPv6 PMTU is enabled on the router.
D. IPv6 flow control is enabled on the router.
Correct Answer: A
QUESTION 18
Which two statements are true about using IPv4 and IPv6 simultaneously on a network segment? (Choose two.)
A. Hosts can be configured to receive both IPv4 and IPv6 addresses via DHCP.
B. Host configuration options for IPv4 can be either statically assigned or assigned via DHCP.Host configuration options for IPv6 can be statically assigned only.
C. IPv6 allows a host to create its own IPv6 address that will allow it to communicate to other devices on a network configured via DHCP. IPv4 does not provide a similar capability for hosts.
D. IPv4 and IPv6 addresses can be simultaneously assigned to a host but not to a router interface.
E. IPv6 provides for more host IP addresses but IPv4 provides for more network addresses.
Correct Answer: AC
QUESTION 19
A network engineer enables OSPF on a Frame Relay WAN connecton to various remote sties, but no OSPF adiacencies come up. Which two actions are possible solutions for this issue? (Choose Two)
A. Change the network type to point-to-murpont under WAN interface
B. Enable virtual Iinks
C. Change the networktype to nonbroadcast mutpoint access
D. Configure the neighbor command under OSPF process for each remote site
E. Ensure that the OSPF process number matches among all remote sites
Correct Answer: AD
QUESTION 20
The OSPF database of a router shows LSA types 1, 2, 3, and 7 only. Which type of area is this router connected to?
A. stub area
B. totally stubby area
C. backbone area
D. not-so-stubby area
Correct Answer: D
QUESTION 21
Which of the below mentioned conditions form a neighbor relationship in EIGRP? (Choose three)
A. Hello or ACK received
B. AS number match
C. Hello timer match
D. Identical metric (k values)
E. Dead Timer Match
Correct Answer: ABD
QUESTION 22
Refer to the exhibit.
Given the partial configuration in the exhibit, which IPv6 statement is true?
A. The configuration is an example of an encrypted IPv6 VPN tunnel.
B. The configuration is an example of a one to one IPv6 tunnel.
C. The configuration is an example of a 6to4 tunnel.
D. The configuration is an example of a 4to6 tunnel.
Correct Answer: C
QUESTION 23
Refer to the exhibit.
Which two statements are correct regarding the routes to be redistributed into OSPF? 300-101 dumps (Choose two.)
A. The network 192.168.1.0 will be allowed and assigned a metric of 100.
B. The network 192.168.1.0 will be allowed and assigned a metric of 200.
C. All networks except 10.0.0.0/8 will be allowed and assigned a metric of 200.
D. The network 172.16.0.0/16 will be allowed and assigned a metric of 200.
E. The network 10.0.10.0/24 will be allowed and assigned a metric of 200.
Correct Answer: AD
QUESTION 24
Which Cisco VPN technology uses AAA to implement group policies and authorization and is also used for the XAUTH authentication method?
A. DMVPN
B. Cisco Easy VPN
C. GETVPN
D. GREVPN
Correct Answer: B
QUESTION 25
Which three benefits does the Cisco Easy Virtual Network provide to an enterprise network? (Choose three.)
A. simplified Layer 3 network virtualization
B. improved shared services support
C. enhanced management, troubleshooting, and usability
D. reduced configuration and deployment time for dot1q trunking
E. increased network performance and throughput
F. decreased BGP neighbor configurations
Correct Answer: ABC
QUESTION 26
Which command must be globally enabled on a Cisco router to support IPv6?
A. ip routing ipv6
B. ipv6 unicast-routing
C. ipv6 routing
D. ip classless
E. ipv6 cef
Correct Answer: B
QUESTION 27
What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish? router(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log router (config)#access-list 101 deny ip 192.168.0.0 0.0.255.255 any log router (config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any log router (config)#access-list 101 permit ip any any router (config)#interface fastEthernet 1/0 router (config-if)#ip access-group 101 in
A. It prevents incoming traffic from IP address ranges 10.0.0.0-10.0.0.255, 172.16.0.0- 172.31.255.255, 192.168.0.0-192.168.255.255 and logs any intrusion attempts.
B. It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to the Internet.
C. It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts.
D. It prevents private internal addresses to be accessed directly from outside.
Correct Answer: C
QUESTION 28
Which statement describes what this command accomplishes when inside and outside interfaces are correctly identified for NAT?
ip nat inside source static tcp 192.168.1.50 80 209.165.201.1 8080 extendable
A. It allows host 192.168.1.50 to access external websites using TCP port 8080.
B. It allows external clients coming from public IP 209.165.201.1 to connect to a web server at 192.168.1.50.
C. It allows external clients to connect to a web server hosted on 192.168.1.50.
D. It represents an incorrect NAT configuration because it uses standard TCP ports.
Correct Answer: C
QUESTION 29
Refer to the exhibit.
Will redistributed RIP routes from OSPF Area 2 be allowed in Area 1?
A. Because Area 1 is an NSSA, redistributed RIP routes will not be allowed.
B. Redistributed RIP routes will be allowed in Area 1 because they will be changed into type 5 LSAs in Area 0 and passed on into Area 1.
C. Because NSSA will discard type 7 LSAs, redistributed RIP routes will not be allowed in Area 1.
D. Redistributed RIP routes will be allowed in Area 1 because they will be changed into type 7 LSAs in Area 0 and passed on into Area 1.
E. RIP routes will be allowed in Area 1 only if they are first redistributed into EIGRP.
Correct Answer: A
QUESTION 30
Which command should be added to RTB under router bgp 100 to allow only the external OSPF routes to be redistributed to RTC? 300-101 dumps
A. redistribute ospf 1
B. redistribute ospf 1 match external 1
C. redistribute ospf 1 match external 2
D. redistribute ospf 1 match external 1 external 2
Correct Answer: D
What Our Customers Are Saying:
Newest helpful Cisco CCDP 300-101 dumps pdf practice files and study guides free download from leads4pass. The best useful Cisco CCDP https://www.leads4pass.com/300-101.html dumps pdf training resources which are the best for clearing 300-101 exam test, and to get certified by Cisco CCDP, download one of the many PDF readers that are available for free with high pass rate.
leads4pass is the best provider of IT learning materials and the right choice for you to prepare for the exam. Other brands started earlier, but the price is relatively expensive and the questions are not the newest. leads4pass provide the latest real questions and answers with lowest prices, help you pass the exam easily at first try.